Epson payments snafu leaves subscribers unable to print

'Their solution? Do nothing, then brick their customer's £400 printer'

Epson's ReadyPrint subscription-based printing service is designed to take the hassle out of printing but its not working as intended, at least not for everyone.

The service was created to let users print as much as they like without worrying about running out of ink. For a small monthly fee, the firm will send customers refills for their Epson inkjet before they run out.

However, when something goes wrong, the user can also get locked out of their printer, unable to produce any documents, as is the case for one Epson customer who discovered Epson was unable to process his payments.

Reg reader John Lamont signed up for ReadyPrint last year, and the service worked perfectly until February when he got an email informing him that it had not been possible to collect his monthly payment for ReadyPrint, and that Epson would attempt collection again in 14 days.

The email also warned Mr Lamont that his cartridges would stop working following two unsuccessful attempts by Epson to obtain payment for the subscription service.

However, despite Mr Lamont updating his account details, as advised by the email from Epson, the monthly payment was still not taken, and eventually he found himself with a printer that refused to print. The printer simply displayed a message saying: "The ReadyPrint service is unavailable due to an account issue."

Getting in contact with Epson customer services provided a clue. They told Mr Lamont to "please try with a card from another bank if possible. e.g. not RBS or Natwest," so it appeared that the problem is with Epson's back-end systems taking payment from Natwest or RBS accounts.

We contacted Epson, which pointed the finger at Strong Customer Authentication (SCA), the measures that require banks and financial institutions to implement two-factor authentication for some payment transactions.

In a statement, Epson said:

This is not an issue Epson can fix. We have highlighted the issues to our third-party card payment provider to be raised with NatWest as a matter of urgency.

In the meantime, we are sending standard cartridges to those that have registered the issue to enable them to meet their printing needs.

SCA was adopted across Europe as a result of the EU Payment Services Directive 2 (PSD2), and adopted in the UK prior to Brexit. But adoption has not been without its problems as merchants and banks have said they were not given enough time to prepare, and consumer awareness of the new measures also seems to be low.

Epson told us that because of SCA, customers "may receive a text or phone call from your bank when making online transactions asking you to confirm your identity. These should not be ignored as payments could be declined if banks cannot reach you, therefore you should ensure your bank has your up-to-date contact details."

In other words, Epson claims that it is unable to process ReadyPrint payment transactions for some customers because their own bank is blocking the transaction, effectively passing the blame onto the bank, or possibly the customer for not keeping their bank up to date with their contact details.

However, we have found similar complaints from other users on social media, and the common theme seems to be that they are Natwest/RBS customers.

One Epson customer tweeted: "Hello @EpsonUK, You have a known issue with ReadyPrint taking payments from Natwest, and yet you have disabled MY printer because of a problem which is not my fault. I cannot phone up to pay, and cannot print anything. Please sort this out, I am not the only user affected!"

Why should Natwest customers in particular appear to be affected by this? Epson told us they could not comment, but said: "Banks have been required to have these new checks in place from 14th March 2022, although this will vary in practice as banks have individual definitions of 'high' and 'low' transactional risks. A number of different factors will determine if a payment needs to be verified, including the type of payment, who is being paid, the amount and which bank."

However, Mr Lamont is still placing the blame squarely on Epson for not making it clear to customers what was happening.

"Epson cannot blame the banks if they are aware of the issue then fail to communicate this to their customers, which they have not done," he told us.

"Their solution? Do nothing, then brick their customer's £400 printer when they fail to receive payment, knowing why the payment has failed, and not doing anything to prevent the sorry situation," he added.

We put Mr Lamont in contact with Epson, who promised to help him resolve the issue. However, the latest update we have on the situation is that despite receiving fresh ink cartridges from the company, he is still unable to print anything until the payments issue is resolved.

A UK Finance spokesperson commented: "Strong Customer Authentication (SCA) is an important tool in the fight against fraud, adding an additional layer of protection when people pay online using a card. To ensure SCA works properly, customers should make sure their bank has their correct contact details. If a customer has any specific needs, they should contact their bank to discuss what help is available." ®

Similar topics

Other stories you might like

  • Despite 'key' partnership with AWS, Meta taps up Microsoft Azure for AI work
    Someone got Zuck'd

    Meta’s AI business unit set up shop in Microsoft Azure this week and announced a strategic partnership it says will advance PyTorch development on the public cloud.

    The deal [PDF] will see Mark Zuckerberg’s umbrella company deploy machine-learning workloads on thousands of Nvidia GPUs running in Azure. While a win for Microsoft, the partnership calls in to question just how strong Meta’s commitment to Amazon Web Services (AWS) really is.

    Back in those long-gone days of December, Meta named AWS as its “key long-term strategic cloud provider." As part of that, Meta promised that if it bought any companies that used AWS, it would continue to support their use of Amazon's cloud, rather than force them off into its own private datacenters. The pact also included a vow to expand Meta’s consumption of Amazon’s cloud-based compute, storage, database, and security services.

    Continue reading
  • Atos pushes out HPC cloud services based on Nimbix tech
    Moore's Law got you down? Throw everything at the problem! Quantum, AI, cloud...

    IT services biz Atos has introduced a suite of cloud-based high-performance computing (HPC) services, based around technology gained from its purchase of cloud provider Nimbix last year.

    The Nimbix Supercomputing Suite is described by Atos as a set of flexible and secure HPC solutions available as a service. It includes access to HPC, AI, and quantum computing resources, according to the services company.

    In addition to the existing Nimbix HPC products, the updated portfolio includes a new federated supercomputing-as-a-service platform and a dedicated bare-metal service based on Atos BullSequana supercomputer hardware.

    Continue reading
  • In record year for vulnerabilities, Microsoft actually had fewer
    Occasional gaping hole and overprivileged users still blight the Beast of Redmond

    Despite a record number of publicly disclosed security flaws in 2021, Microsoft managed to improve its stats, according to research from BeyondTrust.

    Figures from the National Vulnerability Database (NVD) of the US National Institute of Standards and Technology (NIST) show last year broke all records for security vulnerabilities. By December, according to pentester Redscan, 18,439 were recorded. That's an average of more than 50 flaws a day.

    However just 1,212 vulnerabilities were reported in Microsoft products last year, said BeyondTrust, a 5 percent drop on the previous year. In addition, critical vulnerabilities in the software (those with a CVSS score of 9 or more) plunged 47 percent, with the drop in Windows Server specifically down 50 percent. There was bad news for Internet Explorer and Edge vulnerabilities, though: they were up 280 percent on the prior year, with 349 flaws spotted in 2021.

    Continue reading

Biting the hand that feeds IT © 1998–2022