DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Payment Processing CEO Banned from the Business; Company Illegally Debited Millions from Consumers’ Bank Accounts

Posted on March 2, 2010 by Dissent

The chief executive officer of a payment processing company will be banned from the business as part of a settlement resolving Federal Trade Commission charges that the company illegally debited millions of dollars in bogus charges from consumers’ bank accounts.

In 2007, the FTC charged the executive, Tarzenea Dixon, her company, and others with processing unauthorized debits on behalf of deceptive telemarketers and Internet-based schemes they knew, or deliberately avoided knowing, were violating the FTC’s Telemarketing Sales Rule. In addition, the attorneys general of Illinois, Iowa, Nevada, North Carolina, North Dakota, Ohio, and Vermont charged the defendants with violating various state laws.

According to the FTC complaint, the company played a critical role in helping many of its clients carry out these illegal schemes by providing access to the banking system and the means to extract money from consumers’ bank accounts. Between June 23, 2004, and March 31, 2006, the defendants processed more than $200 million in debits and attempted debits. More than $69 million of the attempted debits were returned or rejected by consumers or their banks for various reasons, an indication that in many cases consumers had never authorized the charges. In many instances, the merchants either failed to deliver the promised products or services or sent consumers relatively worthless items.

The settling defendant is Tarzenea Dixon. Her co-defendants are Your Money Access, LLC d/b/a Netchex Corp., Universal Payment Solutions, Check Recovery Systems, Nterglobal Payment Solutions, and Subscription Services, Ltd.; YMA Company, LLC; and Derrelle Janey. In addition to permanently banning Dixon from any payment processing, the settlement order bans her from substantially aiding any marketer when she knows, or consciously avoids knowing, that it is violating the Telemarketing Sales Rule. The order imposes a $22 million judgment that is stayed based on her inability to pay. The full judgment will become due immediately if she is found to have misrepresented her financial condition.

The Commission vote approving the consent in settlement of the court action against Dixon was 4-0. The FTC filed the documents in the U.S. District Court for the Eastern District of Pennsylvania on December 22, 2009, and court entered the order on January 11, 2010.
Litigation against Janey continues. On October 28, 2008, the court entered a default judgment against the corporate defendants, Your Money Access, LLC and YMA Company, LLC, barring them from payment processing for any client whose business practices are deceptive, unfair, or abusive within the meaning of the FTC Act, the Telemarketing Sales Rule, and the state consumer protection laws. The case was part of the FTC’s “Operation Tele-PHONEY” telemarketing fraud law enforcement sweep announced in May 2008.

Wachovia Bank Redress Program

In December 2008, the FTC announced a settlement between the Office of the Comptroller of the Currency and Wachovia Bank, N.A. to issue more than $150 million in redress checks to victims of telemarketing fraud. The checks reimbursed consumers for funds deducted from their accounts by three payment processors that maintained accounts with Wachovia, including Your Money Access.

NOTE: Stipulated final judgments and orders are for settlement purposes only and do not constitute an admission by the defendants of a law violation. Consent judgments have the force of law when signed by the judge.

Source: Federal Trade Commission

Category: Financial Sector

Post navigation

← Wiseguys indicted in $25 million CAPTCHA-bot scheme
UWMC patient financial information compromised →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Nigerian National Sentenced To More Than Five Years For Hacking, Fraud, And Identity Theft Scheme
  • Data breach of patient info ends in firing of Miami hospital employee
  • Texas DOT investigates breach of crash report records, sends notification letters
  • PowerSchool hacker pleads guilty, released on personal recognizance bond
  • Rewards for Justice offers $10M reward for info on RedLine developer or RedLine’s use by foreign governments
  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Google: Hackers target Salesforce accounts in data extortion attacks
  • The US Grid Attack Looming on the Horizon

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • California county accused of using drones to spy on residents
  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act
  • 23andMe Bankruptcy Judge Ponders Trump Bill’s Injunction Impact
  • Hell No: The ODNI Wants to Make it Easier for the Government to Buy Your Data Without Warrant

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.