1 Minnesota State Colleges and Universities System Procedures Chapter 5 Administration Payment Card Industry Technical s Part 1. Purpose. This guideline emphasizes many of the minimum technical requirements necessary to comply with the Payment Card Industry Data Security Standards (PCI DSS). This is not a comprehensive list, and institutions within Minnesota State Colleges and Universities (system) should refer to the PCI-DSS requirements from the PCI Security Standards Council. Part 2. Applicability. Subpart A. This guideline applies to all institutions that accept Payment Cards (e.g. Credit Cards) by any means. Several Self Assessment Questionnaires (SAQs) are used to determine compliance; however identifying which one applies depends on the way payment cards are accepted and how PCI data is retained. Documents from the PCI Security Standards Council can be used to assist with this identification, however this table can be used to approximate which questionnaire should apply: SAQ Validation Type Description Card-not-present (e-commerce or mail/telephone-order) merchants, all cardholder data functions outsourced. This would never apply to face-to-face merchants. Imprint-only merchants with no electronic cardholder data storage Stand-alone terminal merchants, no electronic cardholder data storage Merchants with POS systems connected to the Internet, no electronic cardholder data storage All other merchants (not included in Types 1-4 above) and all service providers defined by a payment brand as eligible to complete an SAQ. SAQ: V1.2 A 13 B 26 B 26 C D PCI DSS s 41 + quarterly scans quarterly scans Subpart B. s below have been categorized with an A, B, C, and/or D to identify to which institutions each requirement applies, based on which SAQ they are required to complete. SAQ D has the most requirements, while SAQ A has the fewest requirements. Subpart C. It is highly recommended that business processes be reviewed first to determine if it is feasible to modify processes in a way that would enable the institution to fall into a category with fewer requirements.
2 Page 2 Subpart D. This guidance applies to only the systems that are in scope for PCI, as defined by the PCI Security Standards Council. Part 3. Guidelines. Subpart A. Install and Maintain a Firewall Configuration to Protect Cardholder Data. Item PCI DSS Description Establish firewall and configuration standards which include a change management process, network diagrams, administrative responsibilities, business justification for all rules / services / protocols / ports, and rules are reviewed at a minimum of every six months Firewall configuration must restrict ingress and egress traffic to only that which is necessary, ensures startup configuration files are secure, restricts and/or controls traffic between any wireless environment and the cardholder environment , 1.3.4, Ensure the firewall allows systems within the 1.3.5, cardholder environment to only communicate to/from the Internet via systems in the demilitarized zone (DMZ), only allows established connections (stateful traffic inspection), and prevents private addresses from being revealed on the Internet The database must be placed in an internal zone, segregated from the demilitarized zone (DMZ) Mobile computers accessing the PCI environment must have a host-based/personal firewall installed.
3 Page 3 Subpart B. Do Not Use Vendor-Supplied Defaults for System Passwords and Other Security Parameters. Item PCI DSS Description Change vendor-supplied security defaults before installing the system or device onto the network Develop configuration standards for all system components, based on industry-accepted system hardening standards. Configuration standards must include: 2a Only one primary function per server. 2b 2.2.2, Disable unnecessary and/or insecure services, protocols, or other functionality. 2c 2.2.3, 2.1.1(b) Configure system parameters securely. 2d 2.3 Encrypt all non-console administrative access. Subpart C. Protect Stored Cardholder Data. Item PCI DSS Description 1 3.1(a), 3.1(b) Develop a data retention and disposal policy which minimizes cardholder data to only that which is required for business, legal, and or regulatory purposes. 2 In lieu of Utilize only Payment Application Data multiple items Security Standard (PA-DSS) validated in payment applications , 3.2.1, 3.2.2, Do not store sensitive verification data, such as the card verification code (a.k.a. CVV2, CVC2, CID, or CAV2), PIN, or the encrypted PIN block. Subpart D. Encrypt Transmission of Cardholder Data Across Open, Public Networks. Item PCI DSS Description Use strong encryption and security protocols when transmitting PCI data over open or public networks Do not send PCI data over end-user messaging technologies, such as , instant messaging, and chat.
4 Page 4 Subpart E. Use and Regularly Update Anti-Virus Software or Programs. Item PCI DSS Description 1 5 Deploy, maintain, and update anti-malware software on all commonly affected systems. Subpart F. Develop and Maintain Security Systems and Applications. Item PCI DSS Description 1 6.2(a), 6.2(b) Establish a process to identify newly discovered security vulnerabilities, and use this to update configuration standards (a) Ensure all systems components and software have the latest security patches installed Review public-facing web applications annually, or install a web-application firewall in front of public-facing applications , 6.5 Internally developed software should not be used in conjunction with PCI data. Subpart G. Restrict Access to Cardholder Data by Business Need-to-Know. Item PCI DSS Description Limit access to system components and cardholder data to only those individuals whose job requires such access, and only to the level of access required.
5 Page 5 Subpart H. Assign a Unique ID to Each Person with Computer Access. Item PCI DSS Description 1 8.1, 8.2, All users must have a unique ID which is, at a minimum, password protected User IDs must be securely issued and handled: 2a 8.5.1, Authorization forms defining required access must be completed, approved by management, and filed 2b 8.5.2, User identity must be verified prior to password resets 2c First time passwords are unique, and must change immediately after the first use 2d Terminated users have access revoked immediately 2e Inactive accounts are disabled at least every 90 days 2f Vendor maintenance accounts are enabled only during the time period needed, and immediately deactivated after use 2g User passwords are changed at least every 90 days 2h , Passwords are at least seven characters long and alpha-numeric 2i Users cannot re-use one of the last four passwords 2j User IDs are locked out after no more than six attempts 2k Accounts are locked out for 30 minutes or until the administrator re-enables it 2l Sessions idle for 15 minutes must require the user to re-enter the password 2m All access to databases must be authenticated 3a 8.3 Two-factor authentication for remote access 3b Automatically disconnect remote access connections after a specific period of inactivity 3c When accessing cardholder data remotely, prohibit copy, move, and storage of data onto local hard drives and removable electronic media
6 Page 6 Subpart I. Restrict Physical Access to Cardholder Data. Item PCI DSS Description 1 9.1, 9.1.1(a), Physically secure access to PCI 9.1.1(b), data/processing facilities (excluding POS 9.1.1(c), 9.4, systems) sufficiently to identify individuals 9.4(c) entering/exiting. Monitor and retain data for three months Maintain a list of computing devices (laptops, PDAs, PCs) and personnel with access 2a Label computing devices with owner, contact information, and purpose , Restrict physical access to network accessible 4 9.2, 9.3, 9.3.1, 9.3.2, jacks, wireless access points, gateways, etc. Develop procedures to distinguish between employees and visitors. Visitor access must be authorized, logged, provided a badge or token, and surrender the badge or token upon departure Securely store media. Ensure a secure courier is utilized and management approves of transporting materials. Classify the media and maintain controls over location and access Securely destroy media or data when no longer needed for business or legal reasons.
7 Page 7 Subpart J. Track and Monitor All Access to Network Resources and Cardholder Data. Item PCI DSS Description Audit trails must link access to system components to an individual. Audit trails must include logging of: 1a Individual access to cardholder data 1b All actions taken by individuals with root/administrative privileges 1c Access to audit trails 1d Invalid access attempts 1e Use of identification and authorization mechanisms 1f Initialization of the audit log 1g Creation and deletion of system-level objects 1h 10.3 For each event: 1h(i) User identification 1h(ii) Type of event 1h(iii) Date and time 1h(iv) Success or failure 1h(v) Origination of event 1h(vi) Identity of affected data, system component, or resource System clocks must be synchronized to multiple external known good sources , , Audit trails must be secured against , 10.7 unauthorized viewing or modifications, with one year of data being retained, and the previous three months immediately available for analysis Audit trails of intrusion detection or intrusion prevention systems (IDS/IPS) and authentication, authorization and accounting activities on all system components must be reviewed daily
8 Page 8 Subpart K. Regularly Test Security System and Processes. Item PCI DSS Description Test for presence of wireless access points at least quarterly, or deploy wireless intrusion detection or intrusion prevention systems Run internal vulnerability scans at least quarterly, and after significant changes Have an external vulnerability scan conducted by a PCI Approved Scanning Vendor (ASV) at least quarterly (a) Have an annual internal and external penetration test covering both the network and application layer conducted by a qualified and independent party (a), 11.4(b) Monitor all traffic in the cardholder environment with intrusion detection / intrusion protection systems, ensuring signatures stay up to date and appropriate individuals are notified of suspected compromises (a), 11.5(b) Use file integrity monitoring software at least weekly to alert personal to unauthorized changes in critical system files, such as system executables, application executables, configuration files, and audit / log files
9 Page 9 Subpart L. Maintain an Information Security Policy. Item PCI DSS Description , Conduct an annual formal risk assessment that identifies threats and vulnerabilities, and update as the environment changes Create documented operational procedures to ensure policy items are properly executed Assign an individual or team the information security management responsibilities including: 3a Establishing, documenting, and distributing security policies and procedures 3b Monitoring, analyzing, and distributing security alerts and information 3c Administer user accounts 3d Monitor and control all access to data Provide security awareness training to employees upon hire and at least annually thereafter Employees must annually acknowledge reading and understanding security policies and procedures Conduct background checks for all potential employees with access to more than one credit card number at a time or to the cardholder data environment Manage service providers, at a minimum: 7a Maintain a list of providers 7b Maintain a written agreement acknowledging responsibility for securing cardholder data 7c Perform proper due diligence prior to engagement of service providers 7d Monitor the service providers PCI DSS compliance status (a) Establish, document, and distribute security incident response and escalation procedures 8a (b) Include roles, responsibilities, communication, and contact strategies, including notification of the payment brands 8b (b) Include business recovery and continuity procedures 8c Include data back-up processes 8d Include analysis of legal requirements for reporting requirements
10 Page 10 Item PCI DSS Description 8e Reference or include incident response procedures from the payment brands 8f Test the plan at least annually 8g Designate specific personnel to be available 24x7 to respond to alerts 8h Provide appropriate incident response training to staff 8i Include alerts from intrusion detection system / intrusion protection system (IDS, IPS) and file-integrity monitoring systems 8j Include a process to evolve the incident response plan with lessons learned and industry developments Subpart M. Policy amendment. The system office will review and update subparts A thru L of System annually to reflect changes in the PCI DSS. No further approval required. Part 4. Definitions. Subpart A. Access. Approved authorization to view, modify or delete system information/data. Access shall be authorized to individuals or groups of users depending on the application of law, system policy or guideline. Technical ability to access information is not necessarily equivalent to legal authority. Subpart B. Approved Scanning Vendor (ASV). Organizations certified by the PCI Security Standards Council to validate adherence to PCI DSS by performing vulnerability scans of Internet facing environments of merchants and service providers. Subpart C. Authorized Individual. Employee, consultant, volunteer or other individual who is approved and allowed access to information within the system to perform an activity on behalf of an institution. The individual may have access to any class of information, according to policy. Subpart D. Breach. Any accidental or deliberate non-compliance with policies or other security controls. Subpart E. Card Verification Code (CVV2, CVC2, CID, or CAV2). A three or four digit value printed on the payment card, but not embossed. It is usually found on the back of the card in or near the signature strip, but is on the front of American Express cards. Subpart F. Data. Information collected, stored, transferred or reported for any purpose, whether in computers or in manual files. Data can include: financial transactions, lists, identifying information about people, projects or processes, and information in the form of reports. Because data has value,
11 Page 11 and because it has various sensitivity classifications defined by federal law and state statute, it must be protected. Subpart G. Demilitarized Zone (DMZ). Networks containing filtered anonymous or authenticated Internet accessible access devices or servers. Examples may include but are not limited to web servers, instant messaging servers, virtual private network (VPN) or remote access servers/services, etc. Subpart H. Electronic Cardholder Data. Data that must be protected by the PCI DSS defined as either all of the information found on the full magnetic strip, or the PAN plus any of the following: cardholder name, expiration data, service code. Subpart I. Employee. Full-time and/or part-time employees, temporary employees and personnel, and contractors and consultants who are resident on the entity s site. Subpart J. May. A statement that is optional. Subpart K. Merchant Bank. The merchant bank is a financial institution which offers financial services to organizations and individuals. The requirement to be PCI compliant is typically found in the contracts between merchant banks and entities with credit card processing accounts (a.k.a. merchant accounts). Subpart L. Must. A statement that is required for a compliant implementation. Subpart M. Must Not. A statement that is prohibited for a compliant implementation. Subpart N. Payment Application Data Security Standard (PA DSS). Provides the definitive data standard for software vendors that develop payment applications. Subpart O. Primary Account Number (PAN). Payment card number that identifies the issuer and the particular cardholder account. Subpart P. Payment Card Industry Data Security Standards (PCI DSS). A standard that defines controls that must be in place around cardholder data. A contractual agreement with the merchant bank requires that all organizations which hold, process, or pass cardholder information from any card branded with the logo of one of the card brands comply with this standard. Subpart Q. Payment Brand. One of the brands of credit cards (e.g. MasterCard, Visa, American Express, etc). Subpart R. Payment Cards. Cards containing payment data, used in purchasing goods and services. Typically referred to as either credit cards or debit cards. Subpart S. PCI Data. Payment card information, as defined by the Payment Card Industry Security Standards Council. PCI data is subject to the PCI Data Security Standards. Such information includes payment account numbers (PANs) plus expiration dates, cardholder names, or verification codes, or data stored on track 2 of the payment card.
12 Page 12 Subpart T. PCI Security Standards Council. The organization responsible for assembling, updating, and maintaining the PCI-DSS. Subpart U. POS System. Point-of-Sale system. Subpart V. Self Assessment Questionnaire. Merchants that process fewer than a given amount of transactions annually are able to complete a Self-Assessment Questionnaire (or SAQ) to demonstrate compliance. Each payment brand has individual requirements, but as an example, Visa allows organizations to complete a SAQ if they process fewer than six million Visa transactions annually. Subpart W. Should. A statement that is recommended but not required. Subpart. Should Not. A statement of practices that are not recommended but which may be followed. Subpart Y. Stateful Inspection. Firewall capability that provides enhanced security by keeping track of communications packets. Only incoming packets with a proper response ( established connections ) are allowed through the firewall. Subpart Z. System. Denotes the Minnesota State Colleges and Universities Board of Trustees, the system office, the state colleges and universities, and any part or combination thereof. Subpart AA. Token. A device that performs dynamic authentication. Subpart BB. Web Application Firewall. An appliance, server plugin, or filter that applies a set of rules to an HTTP conversation. Part 5. Authority. Subpart A. Board policies 1A.1 and 5.23 delegate authority to the vice chancellor to develop system guidelines, consistent with Board policy and system procedure, for the purposes of implementing Board policy Approval Date: 05/17/10, Effective Date: 05/17/10, Date and Subject of Revision: 1/25/12 The Chancellor amends all current system procedures effective February 15, 2012, to change the term Office of the Chancellor to system office or similar term reflecting the grammatical context of the sentence.
University of Sunderland Business Assurance PCI Security Policy Document Classification: Public Policy Reference Central Register IG008 Policy Reference Faculty / Service IG 008 Policy Owner Chief Financial
SAQ D Compliance Scott St. Aubin Senior Security Consultant QSA, CISM, CISSP Ground Rules WARNING: Potential Death by PowerPoint Interaction Get clarification Share your institution s questions, challenges,
General Standards for Payment Card Environments at Miami University 1. Install and maintain a firewall configuration to protect cardholder data and its environment Cardholder databases, applications, servers,
Policy/Procedure Description PCI DSS Policies Install and Maintain a Firewall Configuration to Protect Cardholder Data Establish Firewall and Router Configuration Standards Build a Firewall Configuration
Any physical access to devices or data held in an Melbourne datacentre that houses a customer s cardholder data must be controlled and restricted only to approved individuals. PCI DSS Requirements Version
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015 I. PURPOSE The purpose of this policy is to establish guidelines for processing charges on Payment Cards to protect
PCI Data Security Standards An Introduction to Bankcard Data Security Why should we worry? Since 2005, over 500 million customer records have been reported as lost or stolen 1 In 2010 alone, over 134 million
PCI Data Security and Classification Standards Summary Data security should be a key component of all system policies and practices related to payment acceptance and transaction processing. As customers
05.118 Credit Card Acceptance Policy Authority: Vice Chancellor of Business Affairs History: Effective July 1, 2011 Updated February 2013 Source of Authority: Office of State Controller (OSC); Office of
FACT SHEET Technology Innovation Programme The Visa Europe Technology Innovation Programme () was designed to complement the Payment Card Industry (PCI) Data Security Standard (DSS) by reflecting the risk
Implementation Guide PayLINK Implementation Guide Version 2.1.252 Released September 17, 2013 Copyright 2011-2013, BridgePay Network Solutions, Inc. All rights reserved. The information contained herein
2015 CliftonLarsonAllen LLP PCI Compliance How to Meet Payment Card Industry Compliance Standards May 2015 cliftonlarsonallen.com Overview PCI DSS In the beginning Each major card brand had its own separate
1. Introduction 1.1. Purpose and Background 1.2. Central Coordinator Contact 1.3. Payment Card Industry Data Security Standards (PCI-DSS) High Level Overview 2. PCI-DSS Guidelines - Division of Responsibilities
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
Payment Card Industry Data Security Standard Introduction Purpose Audience Implications Sensitive Digital Data Management In an effort to protect credit card information from unauthorized access, disclosure
Why Is Compliance with PCI DSS Important? The members of PCI Security Standards Council (American Express, Discover, JCB, MasterCard, and Visa) continually monitor cases of account data compromise. These
Payment Cardholder Data Handling Procedures (required to accept any credit card payments) Introduction: The Procedures that follow will allow the University to be in compliance with the Payment Card Industry
No.: C-13 Page: 1 of 6 POLICY: It is the policy of the University of Alaska that all payment card transactions are to be executed in compliance with standards established by the Payment Card Industry Security
PCI Compliance Top 10 Questions & Answers 1. What is PCI Compliance and PCI DSS? 2. Who needs to follow the PCI Data Security Standard? 3. What happens if I don t comply? 4. What are the basic requirements
University of Dayton Credit / Debit Card Acceptance Policy September 1, 2009 Effective Date of this Policy: August 1, 2008 Last Revision: September 1, 2009 Contact for More Information: UDit Internal Auditor
Office of Finance and Treasury How to Accept & Process Credit and Debit Card Transactions Procedure Related Policy Title Credit Card Processing Policy For University Merchant Locations Responsible Executive
How to Complete the Questionnaire The questionnaire is divided into six sections. Each section focuses on a specific area of security, based on the requirements included in the PCI Data Security Standard.
Vanderbilt University Payment Card Processing and PCI Compliance Policy and Procedures Manual PCI Compliance Office Information Technology Treasury VUMC Finance Table of Contents Policy... 2 I. Purpose...
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
Where every interaction matters. PCI Compliance Top 10 Questions and Answers White Paper October 2013 By: Peer 1 Hosting Product Team www.peer1.com Contents What is PCI Compliance and PCI DSS? 3 Who needs
Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance All other SAQ-Eligible Merchants and Service Providers Version 2.0 October 2010 Document
Windows Azure PCI Guide January 2014 Version 1.0 Prepared by: Neohapsis, Inc. 217 North Jefferson St., Suite 200 Chicago, IL 60661 New York Chicago Dallas Seattle PCI Guide January 2014 This document contains
TREASURER S OFFICE ADMINISTRATIVE STANDARDS FOR THE TREASURER S FISCAL PROCEDURE No. 08-01 MERCHANT DEBIT AND CREDIT CARD RECEIPTS 1. Introduction Debit and Credit Card Receipt Standards apply to the administration
WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
cliftonlarsonallen.com PCI Compliance What is New in Payment Card Industry Compliance Standards October 2015 Overview PCI DSS In the beginning Each major card brand had its own separate criteria for implementing
PLACE GROUP UK LONDON STUDENT HOUSING GROUP PAYMENT CARD INDUSTRY DATA SECURITY STANDARD COMPLIANCE STATEMENT PCI DSS (09) VERSION: 2009PCIDSSP4S01 Information updated: 21 October 2012 SAFEGUARDING CARDHOLDER
Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C and Attestation of Compliance Payment Application Connected to Internet, No Electronic Cardholder Data Storage Version
Josiah Wilkinson Internal Security Assessor Nationwide Payment Card Industry Overview PCI Governance/Enforcement Agenda PCI Data Security Standard Penalties for Non-Compliance Keys to Compliance Challenges
PCI PA - DSS Point ipos Implementation Guide VeriFone Vx820 using the Point ipos Payment Core Version 1.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page
Achieving PCI DSS Compliance with A White Paper Spring 2010 Summary The Payment Card Industry Data Security Standard (PCI DSS) is a global information security standard defined by the Payment Card Industry
PCI PA - DSS Point BKX Implementation Guide Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core Version 2.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566
PCI Compliance Reporting Solution Brief Automating Regulatory Compliance and IT Best Practices Reporting Automating Compliance Reporting for PCI Data Security Standard version 1.1 The PCI Data Security
2010 Finance & Business Operations Symposium (FBOS) PCI Compliance Cort M. Kane COO, designdata Judy Durham CFO, NPES Kymberly Bonzelaar, Sr. VP Capital One Richard Eggleston, Sr. Project Director, TMAR
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
CardControl 3.0 Credit Card Processing Overview Overview Credit card processing is a very complex and important system for anyone that sells goods. This guide will hopefully help educate and inform new
Payment Card Industry (PCI) Data Security Standard Summary of s from Version 2.0 to 3.0 November 2013 Introduction This document provides a summary of changes from v2.0 to v3.0. Table 1 provides an overview
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards
Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire B and Attestation of Compliance Imprint Machines or Stand-alone Dial-out Terminals Only, no Electronic Cardholder Data Storage
Credit Card Security Created 16 Apr 2014 Revised 16 Apr 2014 Reviewed 16 Apr 2014 Purpose This policy is intended to ensure customer personal information, particularly credit card information and primary
LogRhythm and PCI Compliance The Payment Card Industry (PCI) Data Security Standard (DSS) was developed to encourage and enhance cardholder data security and facilitate the broad adoption of consistent
Miami University Payment Card Data Security Policy IT Policy IT Standard IT Guideline IT Procedure IT Informative Issued by: IT Services SCOPE: This policy covers all units within Miami University that
Qualified Integrators and Resellers (QIR) Implementation Statement For each Qualified Installation performed, the QIR Employee must complete this document and confirm whether the validated payment application
Payment Card Industry - Data Security Standard () Security Policy Version 1-0-0 3 rd February 2014 University of Leeds 2014 The intellectual property contained within this publication is the property of
What Is It? The Payment Card Industry Data Security Standard (PCIDSS), in particular v3.0, aims to reduce credit card fraud by minimizing the risks associated with the transmission, processing, and storage
UCR Cashiering & Payment Card Services TERMINAL CONTROL MEASURES Instructions: Upon completion, please sign and return to firstname.lastname@example.org when requesting a stand-alone dial up terminal. The University
Cyber Security: Secure Credit Card Payment Process Payment Card Industry Standard Compliance A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Compliant? Bank Name
Controls for the Credit Card Environment Edit Date: May 17, 2007 Status: Approved in concept by Executive Staff 5/15/07 This document contains policies, standards, and procedures for securing all credit
Requirement 1: Install and maintain a firewall configuration to protect cardholder data EC Suite Compliant Ready Hosting s PCI 1.1 Establish firewall and router configuration standards that include the
Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire Instructions and Guidelines Version 1.1 February 2008 Table of Contents About this Document... 1 PCI Data Security Standard
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire B and Attestation of Compliance Merchants with Only Imprint Machines or Only Standalone, Dial-out Terminals Electronic Cardholder
This appendix is a supplement to the Local Government Information Security: Getting Started Guide, a non-technical reference essential for elected officials, administrative officials and business managers.
Case 2:13-cv-01887-ES-JAD Document 282-2 Filed 12/09/15 Page 1 of 116 PageID: 4879 Appendix A Case 2:13-cv-01887-ES-JAD Document 282-2 Filed 12/09/15 Page 2 of 116 PageID: 4880 Payment Card Industry (PCI)
Payment Card Industry Data Security Standard (PCI DSS) Q & A November 6, 2008 What is the PCI DSS? And what do the acronyms CISP, SDP, DSOP and DISC stand for? The PCI DSS is a set of comprehensive requirements
Technical breakout session Small leaks sink great ships Managing data security, fraud and privacy risks Tarlok Birdi, Deloitte Ron Borsholm, WTS May 27, 2009 Agenda 1. PCI overview: the technical intent
Policy V. 4.1.1 Responsible Official: Vice President for Finance and Treasurer Effective Date: September 29, 2010 Accepting Payment Cards and ecommerce Payments Policy Statement The University of Vermont
Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking SUMMARY The Payment Card Industry Data Security Standard (PCI DSS) defines 12 high-level security requirements directed
Blank slide Project Title slide Project: PCI Are You At Risk? Agenda Are You At Risk? Video What is the PCI SSC? Agenda What are the requirements of the PCI DSS? What Steps Can You Take? Available Services
PCI Compliance Frequently Asked Questions Table of Content GENERAL INFORMATION... 2 PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS)...2 Are all merchants and service providers required to comply
PCI Compliance Overview 1 PCI DSS Payment Card Industry Data Security Standard Standard that is applied to: Merchants Service Providers (Banks, Third party vendors, gateways) Systems (Hardware, software)
CREDIT CARD PROCESSING POLICY AND PROCEDURES Note: For purposes of this document, debit cards are treated the same as credit cards. Any reference to credit cards includes credit and debit card transactions.
ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE AGENDA PCI DSS Basics Case Studies of PCI DSS Failure! Common Problems with PCI DSS Compliance
Third-Party Access and Management Policy Version Date Change/s Author/s Approver/s Dean of Information Services 1.0 01/01/2013 Initial written policy. Kyle Johnson Executive Director for Compliance and
Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance All other Merchants and all SAQ-Eligible Service Providers Version 1.1 February 2008 Table
PCI Policies 2011 Appalachian State University Table of Contents Section 1: State and Contractual Requirements Governing Campus Credit Cards A. Cash Collection Point Approval for Departments B. State Requirements
PCI-DSS: A Step-by-Step Payment Card Security Approach Amy Mushahwar & Mason Weisz The PCI-DSS in a Nutshell It mandates security processes for handling, processing, storing and transmitting payment card
PCI Compliance - A Realistic Approach Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM email@example.com What What is PCI A global forum launched in September 2006 for ongoing enhancement
Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance All other Merchants and all SAQ-Eligible Service Providers Version 1.2 October 2008 Document
Credit Card Handling Security Standards Overview Information Technology This document is intended to provide guidance to merchants (colleges, departments, organizations or individuals) regarding the processing
for Sage MAS 90 and 200 ERP Credit Card Processing Version 126.96.36.199 and 188.8.131.52 - January 28, 2010 Sage, the Sage logos and the Sage product and service names mentioned herein are registered trademarks
WHITEPAPER PCI and PA DSS Compliance Assurance PCI and PA DSS Compliance Assurance with LogRhythm MAY 2014 PCI and PA DSS Compliance Assurance with LogRhythm The Payment Card Industry (PCI) Data Security
- 1. Policy Statement All card processing activities and related technologies must comply with the Payment Card Industry Data Security Standard (PCI-DSS) in its entirety. Card processing activities must
PCI DSS requirements solution mapping The main reason for developing our PCI GRC (Governance, Risk and Compliance) tool is to provide a central repository and baseline for reporting PCI compliance across