Card Systems Cares, Inc. is a non-profit organization making a difference in the world. Learn how you can help today.

Join Us On Facebook


Begin accepting credit cards today.  Applying for a merchant account is easy. We boast one of the highest approval rates in the industry, and most accounts are approved in 24 hours. Complete our pre-application and a Card Systems representative will contact you within 24 hours.  There is no obligation or cost.

Enter full name of owner of the business.

Enter the name of the business.

Please enter a contact e-mail address.

Please include a fax number, starting with the area code.

Enter the company web address.

Choose an industry that most closely matches your business type.


Please estimate the amount of an average charge transaction.

How did you find us? (e.g. search engine, referral)

This question is for testing whether you are a human visitor and to prevent automated spam submissions.
3 + 3 =
Solve this simple math problem and enter the result. E.g. for 1+3, enter 4.

Note: American Express and Discover card require separate approval processes. If you are interested in accepting these cards please inquire when you are contacted by account representative. The application fee cannot be waived if you already own equipment or software that you will use with this account.  After completing the online application, you will be required to submit a hard copy of the merchant processing agreement and application (MPA).

Contact Information
Call us at +1 (239) 549-5055 or toll free at  (866) 207-3298

Privacy Policy

(239) 549-5055
(866) 207-3298

Apply Now
Request more information from Card Systems


There has been an increase in the number of Application Security Attacks and Attacks via Remote Access (Brute Force Password Attacks). The holidays are an especially attractive time to exploit weaknesses in passwords and unpatched systems.

Application Security is the security (or lack thereof) of the applications running on your network. For retailers these could include POS systems, Mobile device operating systems and back-end office systems.

How to protect against Brute Force Password Attacks: