For most businesses classified as high risk by merchant providers, the application process starts online. Before accepting credit and debit payments as well as MOTO payments, you’ll need to gain approval from a payment processor and sign a monthly or yearly contract.
Depending on several factors like your payment processing history and chargeback rate, you may be provided different price quotes by different merchants or some may refuse to do business with high-risk businesses altogether.
Although application requirements can vary depending on the merchant provider you’re applying with, here are some common requirements you can prepare beforehand:
You may also have to fill up forms regarding your other company details and what type of services you’re looking for.
Although there tends to be a more stringent approval process for high-risk merchants, there are a few things in mind to help streamline the approval process. Firstly, if you are on a terminated merchant file, it may be even more challenging to find a processor to work with.
You may need to lower your chargeback ratio if it is over 2% since many processors might not be willing to accept this level of risk. Incidents of fraud or a high return rate can also impact the approval of your application.
During the application process, remember that the contract for a high-risk merchant account tends to come with longer terms, higher fees, and rolling reserves. Always read the fine print before agreeing with any terms to prevent any financial and legal issues down the line.
For additional guidance on choosing the best high-risk merchant processor for your needs, read on at Processing Card.
Florence Carpenter is passionate about ensuring that the process of opening merchant accounts is as straightforward as possible. She graduated from the University of Michigan with a bachelor’s degree in Marketing.
Demystifying Level II and III Data: What It Does for Merchants
Enter you email below to receive the guide.
High-Risk Merchant Account For Credit Repair and Education
Enter you email below to receive the guide.
Understanding 3D Secure 2.0 Technology
Enter you email below to receive the guide.