Gift Card Activation Log Claims in THAILAND
1. What “Gift Card Activation Log Claims” Mean in Thailand
A gift card activation log is the digital record showing:
- Time/date of card activation
- Serial number / token ID
- Point of sale or system terminal
- User/account linked to activation
- Redemption history (balance usage)
Common disputes include:
- Customer claims card was never activated but system shows otherwise
- Fraudulent activation by employee or third party
- Duplicate activation due to system glitch
- Unauthorized redemption after leakage of card data
- Merchant refusing redemption despite valid activation logs
2. Legal Status of Gift Cards in Thailand
Thai law generally treats gift cards as:
- Prepaid obligations / stored-value instruments
- Contractual promises between issuer and holder
- Subject to consumer protection rules if issued to the public
Key laws involved:
- Civil and Commercial Code (contract + tort liability)
- Consumer Protection Act B.E. 2522
- Electronic Transactions Act B.E. 2544 (digital evidence validity)
- Penal Code (fraud, theft, computer crimes if applicable)
3. Evidentiary Value of Activation Logs
Under the Electronic Transactions Act, electronic records are admissible if:
- System integrity is proven
- Data is reliably stored
- Access logs are tamper-resistant
- Audit trail exists
However:
- Logs are not automatically conclusive proof
- Courts may require corroboration (CCTV, receipts, witness testimony)
4. Burden of Proof Principle
Thai courts generally apply:
- Claimant must prove entitlement (ownership or valid activation)
- Defendant must prove system integrity if logs are disputed
- If fraud is alleged, clear and convincing evidence is required
5. Six Key Thai Judicial Principles / Case Law Patterns
Below are 6 commonly recognized judicial rulings/principles from Thai Supreme Court jurisprudence dealing with digital records, prepaid instruments, and electronic fraud disputes:
Case Principle 1: Electronic Log Presumption of Accuracy
Thai courts have held that:
System-generated logs are presumed accurate if created in the ordinary course of business.
However, this presumption can be rebutted if:
- System vulnerability is shown
- Logs lack audit traceability
Application: Gift card activation logs are prima facie evidence but not absolute proof.
Case Principle 2: Burden on System Owner in Fraud Allegations
Where a customer alleges unauthorized activation:
- The merchant/system operator must prove system security
- Failure to show safeguards may shift liability to issuer
Application: Retailers must maintain secure activation systems for gift cards.
Case Principle 3: Unauthorized Activation by Employees
Courts have ruled that:
- Employers are liable for employee misuse if it occurs within scope of employment
- Internal fraud using stored-value systems triggers vicarious liability
Application: Misused gift cards activated at POS terminals can bind the company.
Case Principle 4: Conflict Between Receipt and Digital Log
Where receipts and system logs conflict:
- Courts evaluate which system is more reliable and tamper-proof
- Independent evidence (CCTV, transaction timestamps) becomes decisive
Application: Gift card disputes often require multi-source verification.
Case Principle 5: Consumer Protection Favorability Rule
Under consumer protection jurisprudence:
- Ambiguity in gift card terms is interpreted in favor of the consumer
- Unfair refusal to redeem valid cards may be deemed an unfair trade practice
Application: If activation logs are unclear, courts may side with the buyer.
Case Principle 6: Electronic Evidence Must Be Tamper-Proof
Thai courts consistently hold:
- If electronic records can be altered without audit trails, their weight is reduced
- Proper hashing, logging, and access control increase evidentiary strength
Application: Weak IT security can invalidate activation log reliability.
6. How Courts Typically Decide Gift Card Activation Disputes
In practice, Thai courts consider:
- Integrity of POS system
- Whether logs are backed by secure database architecture
- Supporting physical evidence (receipts, CCTV, email confirmations)
- Possibility of internal fraud or external hacking
- Consumer fairness under statutory interpretation
7. Practical Legal Outcome Trends
- Strong audit logs → merchant usually wins
- Weak system controls → liability may shift to issuer
- Missing logs → consumer often favored
- Employee misuse → employer liability likely
- System glitch proven → shared or merchant liability

comments