...
Expert Payment Guide

What Does "SEC Violation" Mean on Your Credit Card Terminal?

"I've seen this error kill transaction flow for restaurants and retail countless times. The worst part? Most business owners think it's their fault, but the reality is it's often a mismatch in card data or your terminal's encryption keys are out of sync with the acquirer host. The fix is straightforward once you know where to look—and I'm going to walk you through it."
Max Artemenko Founder & Chief Payment Systems Architect, Smart Payment Solutions (USA)
What Does "SEC Violation" Mean on Your Credit Card Terminal?
Code 63
ISO 8583 Respons
Hard
Decline Type
4
Main Causes

What Does “SEC Violation” (Code 63) Mean on Your Credit Card Terminal?

SEC Violation—or “Security Violation” code 63—is an ISO 8583 response code that means your payment processor (the host) rejected the transaction because security verification failed. It’s not your terminal breaking down. It’s the host saying: “This transaction doesn’t pass our safety checks.”

The error appears as a hard decline on your POS screen—the transaction stops, the payment doesn’t go through, and the customer’s card stays in limbo. Unlike soft declines (which disappear if you retry), code 63 usually doesn’t budge until the root cause gets fixed.

Here’s what’s happening under the hood:

  1. Your terminal sends transaction data to the acquiring bank (your merchant processor).
  2. The acquirer routes the request to the card’s issuing bank for approval.
  3. The issuer checks the security parameters: CVV, expiration date, billing address, encryption keys.
  4. If something doesn’t match their records—code 63 fires back, and your terminal displays the decline.
Why “SEC” and not “Security”?

Because payment networks compress everything—they call it “SEC Violation” on receipts and terminal screens, but officially it’s ISO 8583 Response Code 63. Both terms mean the same thing.

Transaction flow and ISO 8583 code 63 Security Violation response path
Transaction flow and ISO 8583 code 63 Security Violation response path

“Code 63 is classified as a hard decline—your processor won’t retry it automatically. It’s not a temporary glitch like insufficient funds. The transaction is blocked until the security issue is resolved. That’s why understanding the root cause matters so much.”

— Max Artemenko, Smart Payment Solutions

Why Does “SEC Violation” (Code 63) Appear: Main Causes

Not all code 63 errors are identical. The security violation umbrella covers several sub-causes. Here’s what actually triggers it:

1. Incorrect CVV or Card Data Mismatch

This is among the most common triggers. If the customer (or your staff) enters the wrong CVV, expiration date, or billing address—the issuer’s verification fails.

What happens:

  • CVV check fails: “That 3-digit code doesn’t match what we have on file.”
  • Expiration date mismatch: Card expired or date entered wrong.
  • Billing address doesn’t match: The ZIP code or street address differs from bank records.

Result: Hard decline, code 63.

Important note:

In most in-store EMV (chip) transactions, the billing address is not entered at the terminal. AVS (Address Verification System) checks apply primarily to keyed/MOTO (Mail Order, Telephone Order) transactions or when payment details are entered manually. For chip card transactions, CVV mismatch is the primary security concern.

2. Invalid Merchant ID (MID) or Terminal ID (TID)

Your terminal is assigned a Merchant ID (MID) by your acquirer—usually 15 digits. The terminal itself gets a Terminal ID (TID)—usually 8 digits. If either is misconfigured or doesn’t match your acquirer’s records, the host rejects the transaction as a security violation.

Why this matters:

  • Misconfigured MID = the processor doesn’t know who you are.
  • Wrong TID = the terminal can’t authenticate to the host.
  • Result: The host blocks the transaction as unverified.

This often happens after:

  • Moving to a new acquirer.
  • Adding a new terminal to your account.
  • Re-provisioning a terminal incorrectly.

For deeper context on how merchant accounts work, see our merchant account guide.

3. Terminal Encryption Keys Out of Sync

POS terminals use DUKPT encryption (Derived Unique Key Per Transaction) to secure cardholder data. Each terminal has encryption keys that must match the keys stored at your acquirer’s host.

When keys fall out of sync:

  • Your terminal encrypts data with Key A.
  • The host tries to decrypt with Key B.
  • Decryption fails → security violation.
  • Code 63 fires.

Common trigger: Encryption keys expire, or the terminal hasn’t been re-provisioned in months.

Key Serial Number (KSN) Context:

Each transaction generates a unique KSN (Key Serial Number)—a 64-bit value that encodes your terminal ID and a transaction counter. The KSN advances with each transaction, enabling the processor’s HSM (Hardware Security Module) to independently derive the correct decryption key without needing the original key. If your KSN stops incrementing (visible on receipts), your encryption keys may be stale.

4. Host-Side Security Rules or Fraud Flags

Sometimes the issuer or acquirer has flagged the transaction as suspicious activity—not because of bad data, but because:

  • Transaction amount exceeds cardholder limits.
  • Purchase pattern looks unusual (e.g., $10,000 purchase from a new merchant in a different country).
  • The card is locked for security review.
  • Cardholder hasn’t confirmed the transaction in their bank app.

Result: The host declines with code 63 as a protective measure.

Diagnostic flowchart for identifying code 63 Security Violation causes
Transaction flow and ISO 8583 code 63 Security Violation response path

How to Fix “SEC Violation” (Code 63) on Your Terminal: Step-by-Step Guide

The fix depends on who’s responsible—the customer, your terminal, or the host. Here’s the diagnostic flow:

Step 1: Quick Troubleshooting (First 5 Minutes)

  1. Reboot the terminal. Hard power-cycle: unplug for 10 seconds, plug back in. Let it complete boot-up.
  2. Retry the transaction. Use the same card. See if code 63 appears again.
  3. Test with a different card. If code 63 only hits this one customer’s card, the problem is their card/data—not your terminal.
  4. Check terminal connectivity. Ensure your POS has internet or dial-up connection to the processor. No connection = no authorization = decline.

If the error persists on all cards → move to Step 2.

Step 2: Verify Your Merchant Account Configuration

This is where most code 63 errors live. Your Merchant ID (MID) and Terminal ID (TID) must match what’s registered with your acquirer.

Check these:

  • Log into your merchant portal (ask your processor for credentials if you don’t have them).
  • Locate your Merchant ID and Terminal ID in the settings.
  • Verify your terminal’s settings match:
    • On most terminals: press [MENU] → [SETUP] → [NETWORK SETTINGS] or similar.
    • Compare the MID/TID on screen to what’s in your merchant portal.
    • If they differ, update the terminal settings or contact your processor.

What you’re looking for:

  • MID and TID must be exactly the same (no typos, no extra spaces).
  • Transaction types (sale, refund, void) must be enabled for your account.
  • Your terminal authorization method (dial-up, internet, leased line) must be active.

If everything matches → move to Step 3.

Step 3: Update Encryption Keys and Terminal Software

If card data is correct and MID/TID align, the problem is usually encryption keys or outdated terminal firmware.

Re-provision your terminal:

  1. Contact your processor’s tech support (or your terminal manufacturer).
  2. Request a terminal re-provisioning via Terminal Management Server (TMS).
  3. The processor sends new encryption keys to your terminal over a secure connection.
  4. Your terminal reboots and syncs keys with the host.
  5. Test a transaction.

Update terminal firmware/EMV parameters:

  • Ask your processor if your terminal has pending software updates.
  • If so, request they push the update remotely (most modern terminals support this).
  • After update, power-cycle and test.

What gets updated:

  • EMV configuration (chip card settings) — see our EMV reader guide for details.
  • AID lists (card brand identifiers).
  • Encryption keys and Key Serial Numbers (KSN).
  • TVR/TSI risk parameters.

If the error still appears → move to Step 4.

Step 4: Escalate to Your Processor’s Support

At this point, the issue likely sits on the host side—something your processor or bank needs to fix.

Prepare this information before calling:

  • RRN (Retrieval Reference Number): 12-digit code on the declined transaction receipt.
  • STAN (Systems Trace Audit Number): 6-digit code, also on the receipt.
  • Merchant ID & Terminal ID: Your MID/TID from settings.
  • Transaction time and amount: Exact timestamp and dollar value.
  • EMV data (if chip card): AID (Application Identifier), TVR (Terminal Verification Results), TSI (Transaction Status Indicator).
  • Error screenshot: Photo of what appeared on screen.
Call your processor’s technical support and say:

“I’m getting code 63 (Security Violation) on multiple transactions. Here’s my RRN, STAN, MID, and TID. Can you check the host logs to see why the authorization is being declined?”

Your processor will:

  • Run diagnostics on their end.
  • Check if your MID/TID is active and properly configured.
  • Verify encryption key sync between terminal and host.
  • Look for security flags or restrictions on your account.
  • Re-provision if needed or escalate to the card network.

Important: Don’t Confuse Terminal Code 63 with “Payment Gateway Security Error”

This is a critical distinction that trips up many business owners.

Terminal vs Gateway Security Errors
Aspect Terminal Security Violation (Code 63) Payment Gateway Security Error (Online)
Where it happens Physical POS terminal (in-store, card-present) Web-based payment form or API (online)
Root cause Card data mismatch (CVV, expiration, billing address), encryption key sync failure, or MID/TID misconfiguration Incorrect gateway credentials, SSL/TLS certificate expired, API authentication failure, or fraudulent transaction flagged by gateway
What’s being checked The terminal verifies card details against issuer records using chip/magstripe data The online gateway verifies API keys, encryption protocol, and cardholder identity verification (3D Secure)
How to fix it Re-enter card, update terminal settings, re-provision keys, contact processor Update gateway credentials, check SSL certificates, enable/disable fraud filters, test API authentication
The difference in a sentence:

Terminal code 63 = local device security problem; gateway error = cloud/internet security problem.

Real example:

  • Restaurant owner gets code 63 at register: Check terminal settings and encryption keys.
  • Same owner’s online order form (website) shows “Payment Gateway Security Error”: Check website SSL certificate and payment processor API credentials.

These are two separate issues with two separate fixes.

The Technical Backbone: ISO 8583 and Code 63

If you’re dealing with processors or integrators, you’ll hear them reference ISO 8583—the international standard for payment messaging. Here’s what you need to know:

ISO 8583 is the standard that defines how payment messages travel between terminals, processors, and banks. Think of it as the “language” all payment systems speak.

Code 63 appears in Field DE 39 (Response Code) of the ISO 8583 message structure. When the host sends back a response to your terminal’s authorization request, it includes a 2-digit code. Code 63 specifically means: “Security Violation.”

Message structure overview:

  • MTI (Message Type Indicator): 4-digit code identifying the message class and function. Authorization responses use MTI 0110.
  • Data Elements (DE): Numbered fields carrying transaction data. Field DE 39 holds the response code.
  • Field DE 39 (Response Code): Contains the 2-digit response from the host. Code 63 = Security Violation.

Why it matters to you:

  • Code 63 is classified as a hard decline—your processor won’t retry it automatically.
  • It’s not a temporary glitch (like a soft decline from insufficient funds).
  • The transaction is blocked until the security issue is resolved.
  • The customer can’t try again with the same card until the underlying problem is fixed.

Other common ISO 8583 codes for context:

ISO 8583 Response Codes (selection)
Code Name What It Means What You Do
63 Security Violation Security check failed (CVV, encryption, MID/TID) Check card data, re-provision terminal, contact processor
05 Do Not Honor Bank declined (often fraud-related) Offer alternative payment
14 Invalid Card Number Bad card number or typo Ask customer to re-enter
54 Expired Card Card past expiration date Offer different card
57 Transaction Not Permitted Operation blocked for this card Contact issuing bank

Diagnostic Checklist for Merchants: From Settings to Keys

If code 63 hits your business, use this checklist to isolate the problem:

Merchant diagnostic checklist for code 63
Problem Where to Check Quick Action Contact
Invalid Merchant ID (MID) Terminal settings (MENU → SETUP) Verify MID matches merchant portal; update if needed Processor/Acquirer
Invalid Terminal ID (TID) Terminal settings (MENU → NETWORK) Verify TID matches merchant account; re-provision if mismatch Processor or Terminal Vendor
Encryption Keys Out of Sync Check terminal re-provisioning date Request new key injection via TMS or direct processor support Processor or Terminal Vendor
EMV Configuration Outdated Terminal firmware version (MENU → INFO) Request firmware/EMV update from processor Processor or Terminal Vendor
Host-Side Security Rules Merchant portal (Transactions / Restrictions) Check for account flags, limits, or fraud holds Processor/Acquirer Support
CVV or Expiration Mismatch N/A (cardholder data) Customer re-enters correct CVV/expiration Customer/Cardholder
Temporary Network Outage Terminal connectivity (signal/internet) Restart terminal, check internet connection or dial-up line ISP or Terminal Vendor

What Cardholders Should Do When Facing Code 63

If your customer hits code 63 at your register, here’s what they can do:

Step 1: Verify Card Details

  • Double-check CVV (3 digits on back, or 4 on Amex).
  • Confirm expiration date is correct.
  • Ensure billing address ZIP code matches their bank records.
  • Ask them to spell out their name as it appears on the card.

Step 2: Check Account Status and Limits

  • Ask them to open their bank’s mobile app or call their bank’s customer service.
  • Have them verify:
    • Account is active and not frozen.
    • Available balance is sufficient for the transaction.
    • Daily transaction limit hasn’t been exceeded.
    • No recent fraud alerts or security holds.

Step 3: Attempt Transaction Again

  • Retry the payment immediately after verifying the above.
  • If it succeeds, great—move on.
  • If code 63 appears again, move to Step 4.

Step 4: Contact Their Card Issuer

  • Ask them to call the number on the back of their card.
  • They’ll speak with their bank and can:
    • Ask why the transaction was declined.
    • Request the hold/flag be lifted if it was a security block.
    • Update any information (address, phone, email) if data was mismatched.
    • Authorize another attempt.

Step 5: Offer Alternative Payment

  • Different card.
  • ACH/bank transfer (if online).
  • Check.
  • Digital wallet (Apple Pay, Google Pay—sometimes works better with NFC contactless payment).
Key takeaway for your staff:

Code 63 is usually not the customer’s fault, and it’s rarely your fault either. It’s a security system working as designed. Be empathetic, help them verify their data, and escalate to their bank if needed.

Prevention and Best Practices: Keep Code 63 Declines Away

Code 63 errors are preventable with smart practices:

1. Regular Terminal Maintenance

  • Monthly: Power-cycle your terminals (unplug 10 seconds, replug).
  • Quarterly: Check for firmware updates via your processor’s TMS portal.
  • Annually: Request full terminal audit and re-provisioning from your processor.

2. Encryption Key Management (DUKPT)

Your terminal uses DUKPT (Derived Unique Key Per Transaction) to encrypt cardholder data. Keys expire.

Key practices:

  • Know your key expiration date. Ask your processor when your terminal keys expire.
  • Schedule key rotation. Before expiration, request re-keying via TMS.
  • Track KSN (Key Serial Number). This counter on your receipt advances with each transaction. If it stops incrementing, keys may be stale.

3. EMV Configuration Updates

EMV standards evolve. Payment networks (Visa, Mastercard) update AID lists and risk parameters.

  • Request quarterly EMV updates from your processor.
  • Check terminal info screen monthly (MENU → INFO → Firmware Version) to see your last update date.
  • If updates are more than 6 months old, request a fresh configuration push.

4. Fraud Rules Calibration

If your acquirer’s anti-fraud system is too aggressive, it flags legitimate transactions.

  • Monitor your decline rate weekly (check your merchant portal for metrics).
  • If declines spike, contact your processor’s risk team—they can adjust sensitivity.
  • Balance is key: You want protection, not false declines.

5. Staff Training

Your team should know:

  • Never write down or store CVV codes. (PCI DSS violation.)
  • Ask customers for card details carefully. Misheard expiration dates cause code 63.
  • When to reboot vs. escalate. Simple reboot for one failed transaction; escalate to tech support if error persists.
  • How to document transaction details for support calls.

Glossary: Key Terms for POS Processing

FinTech/POS Glossary
Term Definition Where Used
ISO 8583 International standard defining how payment messages are structured and transmitted between terminals, processors, and banks. Specifies data element formats, message types, and response codes (including code 63). All card transaction processing
Merchant ID (MID) 15-digit unique identifier assigned by your acquiring bank to your merchant account. Routes transactions to the correct account for settlement. Terminal configuration, transaction routing
Terminal ID (TID) 8-digit unique identifier for a specific POS device or payment terminal. Distinguishes devices within a single merchant account. Terminal configuration, transaction logging
RRN (Retrieval Reference Number) 12-digit code generated for each transaction, used to retrieve transaction records during disputes or troubleshooting. Transaction receipts, support calls
STAN (Systems Trace Audit Number) 6-digit number that tracks transactions chronologically. Helps identify specific transactions in logs. Transaction receipts, audit trails
CVV (Card Verification Value) 3-digit security code on the back of Visa/Mastercard/Discover; 4 digits on Amex front. Verifies physical card possession. Card-not-present transactions, security checks
AVS (Address Verification System) Security check comparing billing address entered at register to address on file with issuer. Primarily used in keyed/MOTO transactions. Manual entry transactions, fraud prevention
DUKPT (Derived Unique Key Per Transaction) Encryption method that generates a unique key for each transaction. Prevents key reuse and enhances security. Terminal encryption, PCI compliance
KSN (Key Serial Number) 64-bit value that encodes terminal ID and transaction counter. Enables secure key derivation on receiving end without transmitting the original key. Transaction receipts, encryption management
EMV Global standard for chip-based credit/debit cards. Reduces counterfeit fraud and enhances transaction security. Chip card transactions, terminal configuration

Summary: Code 63 = Security Check, Not a Crisis

What it is:

ISO 8583 response code 63 (Security Violation)—a hard decline triggered when transaction data doesn’t pass security verification.

Why it happens:

  • Incorrect CVV, expiration, or billing address.
  • Merchant ID or Terminal ID misconfigured.
  • Encryption keys out of sync with host.
  • Host-side security rule triggered.

How to fix it:

  • Verify card data (cardholder).
  • Check terminal settings and MID/TID (merchant).
  • Request re-provisioning and key update (processor).
  • Escalate to technical support if persists (all parties).

How to prevent it:

  • Monthly terminal reboots.
  • Quarterly firmware updates.
  • Annual re-provisioning.
  • EMV configuration updates twice yearly.
  • DUKPT key rotation before expiration.

Code 63 errors stop when you treat payment infrastructure like the operational asset it is. Routine maintenance, timely updates, and proactive support calls prevent the vast majority of these declines.

Your customers want frictionless payments. Your business needs reliable transaction processing. Code 63 is just a reminder that both require attention—and that attention pays dividends in reduced declines, lower chargeback risk, and sustained revenue flow.

Need Help With Code 63 Errors?

Smart Payment Solutions specializes in helping restaurants and retail operations reduce payment processing costs and eliminate errors like code 63. Our team brings years of experience in merchant processing, payment systems architecture, and technical integration.

Get Expert Support

Kviz
Not sure which equipment is right for you?
Answer the questions below and we will select equipment for your business
What type of business are you considering POS equipment for?
Is this for a new or for the existing business?
What solution are you interested in?
What functionality must your terminal have?
What functionality must your POS solution have?
What brands are you most interested in?
Will you need training for your staff on how to use your new equipment?

    What do our customers think about us

    Frequently Asked Questions

    SkyTab Mobile Payment Terminal displaying payment approved screen
    Business consultant ready to assist

      Any other questions?

      Schedule Your Free CONSULTATION Today

      This site is protected by reCAPTCHA and the Google Privacy Policy and
      Terms of Service apply.
      Back up