Card payments accordng to customer authentication
Mark your selections and choose between table on screen and file format. Marking tips

For variables marked Select at least one value you need to select at least one value

Date Select at least one value

Total 10 Selected

Search

Items Select at least one value

Total 26 Selected

Search


Number of selected data cells are:(maximum number allowed is 100,000)

Presentation on screen is limited to 5,000 rows and 200 columns


Number of selected cells exceeds the maximum allowed 100,000
Contact and information

Information

Unit
EUR / number of transactions
Contact
Snježana Del Fabro Delević
tel.: (01) 4719361
e-mail: Snjezana.Del-Fabro@bsi.si

namestnik
Renata Progar Zupan
tel.: (01) 4719304
e-mail: renata.progar-zupan@bsi.si
Footnotes

Footnotes

Data from including 2022 on are in accordance with: Regulation of the European Central Bank amending Regulation (EU) No 1409/2013 on payments statistics (ECB/2013/43) (ECB/2020/59), DECISION of the reporting of payment statistics (108/2021) and Instructions for implementing DECISION of the reporting of payment statistics (152/2021) (https://www.bsi.si/porocanje/porocanje-banki-slovenije/porocila/porocanje-podatkov-statistike-placil).
Data include payment cards issued by domestic: payment service providers and service providers to whom the Payment Services, Electronic Money Issuance Services and Payment Systems Act (Official Gazette of the Republic of Slovenia, Nos. 7/18, 9/18 [corrigendum] and 102/20) does not apply in accordance with Article 3 of the aforementioned law.
Payments with cards dissagregated according to card function, are broken down according to customer authentication: via strong customer authetication and via non-strong custimer authetication.
Strong customer authentication (SCA) means an authentication based on the use of two or more elements categorised as knowledge (something only the user knows), possession (something only the user possesses) and inherence (something the user is) that are independent, in that the breach of one does not compromise the reliability of the others, and is designed in such a way as to protect the confidentiality of the authentication data.
Also cards with e-money functions are included.