If you’re searching “Luis Requejo Miami,” you’re probably trying to avoid a predictable nightmare: you choose a payment “partner,” things look fine for 30 days, then the first problem hits and you discover nobody is accountable.
Payments providers don’t just “process transactions.” They touch:
- your revenue
- your customer experience
- your compliance exposure
- your ability to operate without disruption
So you don’t choose them like software. You choose them like a financial infrastructure partner.
HighTech Payments’ content is unusually direct about the industry’s weak trust culture—especially around middlemen, documentation, compliance proof, and transparency.
This article converts that into a clear vendor scorecard.

The payment provider trust problem (why merchants keep getting burned)
The payments industry has:
- complex supply chains (banks, processors, gateways, ISOs)
- opaque contracts
- pricing structures designed to be confusing
- risk controls that can freeze funds quickly
That complexity creates an accountability gap. Middlemen profit inside that gap.
HighTech’s “middleman” article explains that many providers don’t control underwriting, reserves, funding, pricing, disputes, or compliance—so they can’t solve core issues when they arise.
So your job is to demand evidence and responsibility upfront.
The 8 trust signals that matter (and what proof looks like)
1) Clear identity and disclosure (who are you, legally?)
A serious provider discloses their legal status and relationships.
Example: HighTech Payments discloses they are a registered ISO/MSP of Esquire Bank.
You should demand:
- legal entity name
- ISO/MSP disclosure (if applicable)
- sponsor/acquiring bank relationship (who backs the merchant accounts)
- who is the “processor of record” (who ultimately controls the rails)
Red flag: “We work with top-tier banking partners” with no names.
2) Underwriting clarity (what triggers reviews, holds, or termination?)
Underwriting is the gatekeeper of your stability.
Demand:
- approval criteria (documents + underwriting assumptions)
- what changes trigger re-underwriting (products, geos, marketing, volume spikes)
- what thresholds trigger review (refund rate, chargeback rate, sudden growth)
Red flag: “You’re approved, you’re good.” That’s not how underwriting works.
3) Written reserves and payout-hold policies (no surprises)
When payments go bad, it’s usually because money gets held.
Demand:
- reserve policy in writing (when applied, how calculated, duration, release schedule)
- payout delay triggers (refund spikes, chargeback spikes, fraud flags, compliance flags)
- escalation path for release review
Red flag: “We don’t do reserves” (until they do) or “it depends” with no documentation.
4) Transparent pricing you can audit (statements that match proposals)
HighTech’s middleman guidance calls out how opacity and markups are common—especially when you’re dealing with resellers.
Demand:
- complete fee schedule (monthly + per-transaction + incident-based)
- a sample statement (anonymized) and line-by-line explanation
- clarity on what is pass-through vs markup
Red flag: “Rates start at…” without a statement-level breakdown.
5) Compliance proof: PCI evidence, not marketing
HighTech’s PCI proof article is explicit: real providers can supply AOC/ROC/SAQ (as applicable), scans, pentest documentation, and clear scope boundaries.
Stripe also explains that the AOC is the formal evidence of PCI compliance and can be validated via a QSA audit or self-assessment path depending on level.
Demand:
- PCI AOC (and scope)
- security documentation (whitepaper or equivalent)
- clarity on tokenization and vault ownership
Red flag: “We’re PCI compliant, trust us.”
6) Security posture maturity (SOC 2, incident handling, real controls)
HighTech stresses the importance of demonstrating security controls (and calls out superficial encryption buzzwords).
Demand:
- SOC 2 report summary (scope matters)
- incident response approach and notification timelines
- encryption details (at rest/in transit, key management basics)
- access controls and audit logging
Red flag: no documents, no clear security contact, no written security posture.
7) Real support and escalation (not a ticket graveyard)
HighTech talks about 24/7 support claims in their high-risk context; the bigger point is: support must be real when money is held or fraud spikes.
Demand:
- support hours + response SLA
- a real escalation path (names or roles)
- what counts as “urgent” (holds, outages, chargeback spikes)
- technical support for API/gateway issues (if online)
Red flag: “Submit a ticket” as the only option.
8) Operational transparency (reporting, reconciliation, and audit trails)
HighTech positions reporting/analytics and operational tooling as part of the payments stack.
Demand:
- reporting that reconciles deposits to transactions and fees
- dispute reporting with lifecycle status
- permissioning + audit logs (who refunded, who changed settings)
Red flag: dashboards that look good but can’t reconcile to the bank deposit.
The “trust red flags” list (treat these as deal-breakers)
If you see any of these, you walk:
- refusal to name the bank/processor relationship
- no written reserve/hold policy
- no PCI evidence (AOC)
- pricing cannot be explained line-by-line
- vague “security” language with no documentation
- support that can’t answer technical questions
- contract references a different provider than the one selling you the deal
These aren’t “concerns.” They’re predictors of future shutdown pain.
A practical vendor scorecard (use this to compare providers)
Score each category 0–2:
- Disclosure & identity
- Underwriting clarity
- Reserves/holds policy
- Pricing transparency
- PCI proof
- Security maturity
- Support & escalation
- Reporting & reconciliation
12+ = serious provider
8–11 = proceed cautiously; negotiate hard; document everything
<8 = you’re buying risk