1 University of Dayton Credit / Debit Card Acceptance Policy September 1, 2009 Effective Date of this Policy: August 1, 2008 Last Revision: September 1, 2009 Contact for More Information: UDit Internal Auditor Investment Officer BACKGROUND In order to protect credit card information, the credit card industry has introduced security requirements that merchants must follow. These guidelines were established to minimize fraud risk and maximize cardholder protection. Failure of merchants to comply with these guidelines may result in fines or the possibility of not being able to accept credit / debit card payments. EXECUTIVE SUMMARY AND PURPOSE To protect against the exposure and possible theft of account and personal cardholder information that has been provided to the University of Dayton during the course of business with the University; and to comply with credit card company requirements for transferring credit card information. SCOPE This policy applies to all University of Dayton departments, faculty, staff, students, organizations and individuals who, on behalf of the University of Dayton, handle electronic or paper documents associated with credit or debit card receipt transactions or accept payments in the form of credit or debit cards. The scope includes any credit or debit card activities conducted at all University of Dayton locations.
2 This policy also applies to all external organizations contracted by University of Dayton departments, faculty, staff, students, organizations and individuals to provide outsourced services for credit or debit card processing for University of Dayton business. DEFINITIONS Application Server: The computer hosting the application with which the general end-users or point-of-sale (POS) terminals connect. Credit Card Information: Any cardholder or card information accessed to initiate a credit or debit card transaction. Cardholder Information Security Program (CISP): A standard of due care for securing Visa cardholder data wherever it is located. Compliance is required of all entities storing, processing, or transmitting Visa cardholder data. Credit Card Number: Any part or all of the unique number identifying the credit or debit card account for a financial transaction. Credit Card Processing: Act of storing, processing or transmitting credit or debit cardholder data. Credit Card Processor: A third party vendor who processes credit and debit card transactions, routes payments to the University of Dayton accounts, charges discounts and adjustment fees and generates statements. Database Servers: The computer storing the sales and / or credit and debit card numbers. e-commerce Application: Any internet-enabled financial transaction application, whether a buying or selling application. Encryption: Scrambling data in a recoverable format. ISO 17799: The International Standards Organization document defining computer security standards. ISO was renumbered ISO in 2007 to bring it into the ISO family of standards. This policy document will be changed to reflect this at a later date. Merchant Number: The unique number identifying the unit accepting credit or debit cards for transactions. This number is necessary to settle the credit and debit card transactions at the appropriate University of Dayton financial institutions. It is also used to identify the specific merchant (departments, faculty, staff, students, organizations and individuals) on the cardholder s monthly credit or debit card statement. Online Credit Card Acceptance: Credit and debit card payments submitted via the web using a third party vendor s software and passed onto the credit card processor for real-time authorization. The third party vendor securely accepts and stores cardholder and sensitive cardholder data in compliance with the credit card company s security requirements.
3 Payment Card Industry (PCI): An industry consortium of the founding electronic payment brands American Express, Discover, JCB, MasterCard, Visa with the intent to help facilitate the broad adoption of consistent data security measures on a global basis. The PCI Data Security Standard (PCI DSS) provides a single, comprehensive security standard - security management, policies, procedures, network architecture, software design and other critical protective measures - to help organizations proactively protect customer data. POS System: Computer or credit card terminals either running as stand alone systems or connecting to a server either at the University of Dayton or at a remote off-site location. Sensitive Cardholder Data: Any personally identifiable data associated with a cardholder, including but not limited to account number, expiration date, name, address, or social security number, CVC2 / CVV2 validation code (a three digit number imprinted on the signature panel of the card), and data stored on track 1 and track 2 of the magnetic stripe of the card. Swipe Terminal: POS credit or debit card terminals POLICY DETAILS All transactions (including electronic based) that involve the transfer of credit card information must be performed on the systems approved by the University s Investment Officer, after a prior compliance and security review by UDit. All application servers that have been approved for this activity must be housed within UDit and administered in accordance with the requirements of all University of Dayton policies as well as the CISP and PCI DSS. The Investment Officer will be responsible for verifying compliance with industry best practices for conducting electronic payment transactions through swipe terminals, while on-line credit card acceptance will be monitored by UDit s IT Risk Management Officer. Departments needing to accept credit / debit cards and obtain a physical terminal to either swipe or key transactions through the swipe terminals must contact the Investment Officer to obtain a Merchant Number, receive training and be given direction as to how to journalize those transactions on the books of the University. Departments needing to engage in electronic commerce are required to work with UDit s IT Risk Management Officer to ensure the e-commerce application meets all University policies, ISO standards and the Payment Card Industry (PCI) Data Security Standard. Credit Card Security Standard Procedures: It is the policy of the University of Dayton that all departments, faculty, staff, students, organizations and individuals that accept credit and debit cards in the normal pursuit of business do so in a secure manner as set forth by the Payment Card Industry (PCI) Data Security Standard. It is the responsibility of the departments, faculty, staff, students, organizations and individuals to ensure all sensitive cardholder data are protected against fraud, unauthorized use or other compromise. Security standards in place include but are not limited to: Ensure your credit / debit card processing terminal is truncating the credit card account number so that only the last 4 digits of the account number are visible. If it is not
4 truncating, you must contact the Investment Office to have the terminal reprogrammed or replaced. Only designated persons should handle sensitive cardholder data. All documentation that contains sensitive cardholder data must be kept at all times in a secure area such as a locked file cabinet, desk drawer or office. Keys may be distributed only to a restricted number of designated individuals. Dual control is recommended for access to secured areas. Any locks must be rekeyed or replaced if suspected of compromise or in the event of a termination or transfer of a designated individual. Do not store credit card information on desktop computers or on portable electronic media devices. Never send unencrypted PANs by end-user messaging technologies (for example, , instant messaging, chat). If credit card information is received via fax machine, the machine must be located in a secure area. If credit card information is received via telephone or mail order, do not write information on anything other than an approved form to be used for such purpose. In all cases, once the credit / debit card has been processed, use a black magic marker pen or other implement to permanently mask all but the last four digits of the credit card number on the document. Leave the last four digits exposed for future reference. Never store the sensitive authentication data full magnetic stripe data, CAV2/CVC2/CVV2/CD or Pin/PIN block. No sooner than six months following completion of the credit or debit card transaction, destroy all data associated with the transaction. Responsibilities of UDit Operate and maintain a central secure solution, under the direction of UD Finance & Administrative Services, for the purpose of transacting electronic payments and for data storage, as required for compliance with credit card company regulations and in compliance with the e-commerce Server Compliance Requirements. Provide advice / tools to enable departments clearly to follow industry best practices, access, firewalls, logging, patches, data storage, passwords, encryption and security. Guidance on acceptable technologies and standards may be found on UD s IT Policy web page, In accordance with UD s IT Incident Handling policy, investigate suspected security breaches and coordinate the response with the appropriate credit card agency, affected customers, and law enforcement as needed.
5 Update all PCI related documentation in coordination with any changes within a PCI environment. UDit Telecommunications and Networking are the only departments authorized, and only under the direction of the Investment Officer, to logically manage and make approved changes to the network infrastructure supporting UD s PCI environments. The IT Risk Managment Office will coordinate the development and distribution of security specific policy and procedures defining responsibilities for all employees and contractors. The IT Risk Management Office will monitor and analyze security alerts originating within and without UD and distributing pertinent information to relevant system owners and managers. Responsibilities of Internal Auditor Perform periodic review of all approved units to determine compliance with this policy and other University policies, state / federal laws and regulations, credit card agency regulations, and contracts with financial institutions. These reviews will be both announced and unannounced. Responsibilities of Investment Office Approve each unit requesting to accept credit cards. Obtain merchant numbers for each approved unit. Obtain approved credit card swipe terminals for each approved unit not using e- commerce for credit and debit card transactions. Oversee credit card accounting for each approved unit. The Investment Officer will chair the change management process, ultimately responsible for monitoring and controlling all access to data. Manage service provider compliance. The Investment Officer will, upon engagement of a service provider, investigate the service provider s PCI fitness and ensure any contract includes acknowledgement of service provider responsibility for any cardholder data they might posses. The Investment Officer will, annually, review service providers PCI DSS compliance.
6 Responsibilities of all University Departments, Faculty, Staff, Students, Organizations and Individuals Use only application servers, credit card processors, database servers, e-commerce applications, POS systems, swipe terminals provided by or approved by UDit s IT Risk Management Officer and the Investment Officer. Include in all PCI-related agreements that service providers will contractually adhere to the PCI DSS requirements and are responsible for the security of the cardholder date they possess. Service agreements must include an acknowledgement that the service provider is responsible for the security of cardholder data held in the provider s possession. UD will actively monitor service providers PCI DSS compliance status. On a regular basis (as defined by individual unit structure), provide appropriate training to all employees associated with credit / debit card processing. UDit s IT Risk Management Officer, Investment Officer, and Internal Auditor will be available to assist in developing the unit specific appropriate training if necessary. Processes and procedures must be in place to ensure management approval prior to moving any and all media from a secured area. Process (batch) transactions on, at a minimum, a daily basis. Record transactions according to the process agreed upon by the Investment Officer and the departments, faculty, staff, students, organizations and individuals. Reconcile and verify credit card transactions along with normal accounting reconciliation process. Monitor the use of credit card transactions for compliance with this policy and other University policies, state / federal laws and regulations, credit card agency regulations, and contracts with financial institutions. Records are subject to audit by both internal and external auditors. Notify UDit s IT Risk Management Officer of any suspected security breaches. Notify UDit s IT Risk Management Officer and the Investment Officer IN ADVANCE of any changes within a PCI environment. Change management procedure and forms may be found on UD s IT Policy web page, At the beginning of the new calendar year, all departments with established merchant accounts or using credit cards in the normal course of their business are required to renew and update their application for merchant account status. Documentation will include a
7 list of individuals approved to administer user accounts. This signed application should be returned to the Investment Officer. Failure to do so will result in a loss of credit card merchant user privileges. EXTERNAL CONSEQUENCES Failure to meet the requirements outlined in this policy will result in suspension of credit card payment capability for the affected units. Additional, fines may be imposed by the affected credit card company, beginning at $10,000 for the first violation up to $80,000 for the fourth violation. INTERNAL CONSEQUENCES Failure to meet the requirements outlined in this policy will result in suspension of credit card payment capability for the affected units. Term of suspension will be commensurate with the level of violation of this Policy. Persons found in violation of this policy are subject to the full range of sanctions, including the loss of computer or network access privileges, disciplinary action, suspension, termination of employment, dismissal from the University, and legal action. Some violations may constitute criminal offenses under local, state, and federal laws. The University of Dayton will carry out its responsibility to report such violations to the appropriate authorities.
8 Appendix I e-commerce Server Compliance Requirements As described on the PCI Security Standards Council website, https://www.pcisecuritystandards.org/index.shtml, the PCI DSS was developed by an industry consortium of the founding electronic payment brands to provide a comprehensive security standard - security management, policies, procedures, network architecture, software design and other critical protective measures - to help organizations proactively protect customer data. While the Council reserves the right to add and revise the requirements to address emerging risks, current requirements fall into the 12 categories below. Please note that these descriptions are not exhaustive and that merchants should refer to the PCI DSS specification available at the website listed above. 1. Install and maintain a firewall configuration to protect cardholder data A firewall protects databases with sensitive cardholder data by restricting outside connections, prevents packets from external networks from entering the internal network. The router containing the firewall does not broadcast internal network addresses to the outside network. There is no implied system trust between DMZ and e-commerce systems. Documentation detailing individual merchant environments and maintained by the Investment Officer should provide business justification for services, protocols and ports and record associated firewall and router rule sets. Changes to the environment must be addressed through the change management procedure and forms found on UD s IT Policy web page, Router and firewall rule sets should be reviewed semi-annually. 2. Do not use vendor-supplied defaults for system passwords and other security parameters System components will be configured in accordance with industry-accepted configuration standards employed within UD s Data Center. UDit and owning staff will monitor software vendor s site regularly for security patches and apply them on the monthly schedule required to comply with PCI requirements. 3. Protect stored cardholder data Data stored on the system will be encrypted in accordance with UD s Electronic Use of Confidential Data policy. Unless otherwise specified in UD s retention policies, stored cardholder data either electronic or paper - will be retained no longer than 6 months unless specifically required for business, legal or regulatory purpose and formally documented by the owning merchant. Disposal of equipment will fall under UD s IT Equipment Disposal and Redisposition policy. Storage media should be logically wiped or physically destroyed when no longer needed. 4. Encrypt transmission of cardholder data across open, public networks All credit card data transmitted over the campus network shall be encrypted. will not be used to send sensitive cardholder data. 5. Use and regularly update anti-virus software or programs Anti-virus updating and detection will be completed regularly by UDit. 6. Develop and maintain secure systems and applications
9 General University staff does not access file information. Access is restricted to the purpose of system and software administration. Access to specific data is limited to a need to know basis with the permission of the merchant department responsible for the data, and only when express permission is given for problem solving purposes. The principle of least privilege restricts data access based on a user s need to know. Access to firewall administration is limited to authorized staff. Merchant environments and configuration standards will be reviewed upon purchase/implementation and annually in coordination with individual assessments to ensure individual environments adhere to configuration standards and use only approved technologies. Changes to individual environments, to include user management, must be processed through the change management procedure and forms found on UD s IT Policy web page, Daily operational procedures will be developed and maintained for individual merchant environments consistent with and enforcing the requirements of this policy. 7. Restrict access to cardholder data by business need to know All users are uniquely identified prior to accessing cardholder information and system resources. 8. Assign a unique ID to each person with computer access Vendor-supplied defaults are not used for system passwords or other security parameters. 9. Restrict physical access to cardholder data The room used to house the systems is secured with a lock to which only approved staff members have access. Vendor access is restricted and no vendor is allowed in the room without adequate supervision. Paper copies that include any sensitive cardholder data from the credit card transactions are stored in a secure location that is locked and are shredded in accordance to the University of Dayton this Credit / Debit Card Acceptance Policy. In no case will sensitive cardholder data be retained longer than the period stipulated in the University of Dayton policy or Federal regulations. Per UD policy, card holder data is considered confidential. Strict control should be maintained over its distribution and removable media holding such data should be clearly labeled as such and inventories conducted annually. Movement must be processed through the change management procedure and forms found on UD s IT Policy web page, Storage media should be logically wiped or physically destroyed when no longer needed. 10. Track and monitor all access to network resources and cardholder data. Logs are available to those with a job related need and allow us to track data access by user ID. These audit trails can be used to reconstruct events and establish accountability. All actions and processes are linked to an active user or system. The audit trails include user identification, type of event, date and time, success or failure, origination of the event, and identity or name of the affected data, system component or resource. The audit trails can reconstruct access to all audit journals, invalid physical and logical access attempts, use of identification and authentication mechanisms, initialization of the audit logs, deletion of objects, actions taken to the compromise of cryptographic keys, changes in the custody of keys or devices or media holding keys, and all encryption key management operations. The audit trails can also reconstruct all actions taken by any
10 individual with access to the system and when new objects are added to a user s address space. Audit history files are retained for at least one year with 3 months history available immediately and data from video cameras for at least 3 months. System clocks and times should be synchronized by UDit s configuration standards. 11. Regularly test security systems and processes Tests are conducted regularly to ensure that security controls, limitations, network connections, and restrictions are working to stop or identify unauthorized access attempts. 12. Maintain a policy that addresses information security for employees and contractors. UD s IT policy framework, including usage policies, may be found at UD s PCI policy and program will be reviewed by stakeholders annually, including review of threats and vulnerabilities, and after significant change to the infrastructure or merchant environment culminating in explicit approval of risk assessment and mitigation recommendations. List of vendors and service providers will be actively maintained and remote access discontinued immediately upon termination of service. UDit will provide guidance on acceptable technologies, products and their configurations. Distribution of sensitive cardholder data is limited to necessary information only, and only to authorized merchant departments and personnel. Any other distribution must be approved by the Vice President for Finance and Administration and the Associate Provost and CIO. Storage of cardholder data onto local hard drives and removable media is strictly prohibited. Remote access through Cisco s VPN solution will disconnect after 15 minutes of inactivity. Formal security awareness training will be provided upon hire and annually, with employees asked annually to review UD s security and usage policies.
11 Appendix II Cardholder Information Security Program Excerpted from the Visa Cardholder Information Security Program, available at CISP Overview When customers offer their bankcard at the point of sale, over the Internet, on the phone, or through the mail, they want assurance that their account information is safe. That s why Visa USA has instituted the Cardholder Information Security Program (CISP). Mandated since June 2001, CISP is intended to protect Visa cardholder data wherever it resides ensuring that members, merchants, and service providers maintain the highest information security standard. In 2004, the CISP requirements were incorporated into an industry standard known as Payment Card Industry (PCI) Data Security Standard resulting from a cooperative effort between Visa and MasterCard to create common industry security requirements. Visa USA maintains CISP as the managing program for data security compliance endorsing the PCI Data Security Standard. Effective September 7, 2006, the PCI Security Standards Council ("PCI SSC") owns, maintains and distributes the PCI Data Security Standard (DSS) and all its supporting documents. Visa USA, however, continues to manage all CISP compliance enforcement and validation initiatives. In addition, the former QDSC Program has also transitioned to the PCI SSC. Please refer to the Assessors page for more information. CISP Compliance CISP compliance is required of all merchants and service providers that store, process, or transmit Visa cardholder data and applies to all payment channels, including retail (brick-andmortar), mail/telephone order, and e-commerce. Compliance with CISP means compliance with the PCI Data Security Standard with the required program validation. The Payment Card Industry (PCI) Data Security Standard offers a single approach to safeguarding sensitive data for all card brands. Other card companies operating in the U.S. have also endorsed the PCI Data Security Standard within their respective programs. Using the PCI Data Security Standard as its framework, CISP provides the tools and measurements needed to protect against cardholder data exposure and compromise. The PCI Data Security Standard consists of twelve basic requirements categorized as follows: PCI Data Security Standard Build and Maintain a Secure Network Protect Cardholder Data 1. Install and maintain a firewall configuration to protect data 2. Do not use vendor-supplied defaults for system passwords and other security parameters 3. Protect stored data 4. Encrypt transmission of cardholder data and sensitive
12 information across public networks Maintain a Vulnerability Management Program Implement Strong Access Control Measures Regularly Monitor and Test Networks Maintain an Information Security Policy 5. Use and regularly update anti-virus software 6. Develop and maintain secure systems and applications 7. Restrict access to data by business need-to-know 8. Assign a unique ID to each person with computer access 9. Restrict physical access to cardholder data 10. Track and monitor all access to network resources and cardholder data 11. Regularly test security systems and processes 12. Maintain a policy that addresses information security By complying with the PCI Data Security Standard, Visa members, merchants, and service providers not only meet their obligations to the payment system, but also build a culture of security that benefits everyone. Compliance validation Separate and distinct from the mandate to comply with the PCI Data Security Standard is the validation of compliance whereby entities verify and demonstrate their compliance status. It is a fundamental and critical function that identifies and corrects vulnerabilities, and protects customers by ensuring that appropriate levels of cardholder information security are maintained. Visa has prioritized and defined levels of compliance validation based on the volume of transactions, the potential risk, and exposure introduced into the payment system by merchants and service providers. For a detailed description of: Go to: Visa merchant levels of compliance criteria and validation actions Merchants Service provider compliance criteria and validation actions Service Providers Visa regulations The Visa USA, Interlink, Inc., and Plus Systems, Inc. Operating Regulations govern the activities of member financial institutions and, by extension, merchants and service providers as participants in the Visa payment system. Members must comply with CISP and are responsible for ensuring the compliance of their merchants, service providers, and their merchants' service providers. Acquirers must include a CISP compliance provision in all contracts with merchants and agents. Specific compliance requirements and validation criteria are provided at this website.
13 Appendix III UDit Internal PCI Audit Requirements At the time of review, the University of Dayton is considered a Level 3 merchant. Technical compliance requirements for that classification are determined by the merchant s acquirer, but should include annual completion of Payment Card Industry (PCI) self-assessment questionnaires well as regular network scans and penetration tests. This document was drafted to detail UDit s responsibilities with regards to ensuring required activities are completed. Quarterly, UDit will conduct a network scan of PCI environments. Annually, 1) UDit will contract with an approved scanning vendor to conduct the required quarterly external vulnerability scans 2) UDit will work with the owning unit to address the self-assessment questionnaire: a. Collect latest documentation to include statement of compliance from vendor(s) b. Prepare/review comprehensive network diagram c. Work with the Unit to determine validation type and appropriate self assessment questionnaire d. Walk through PCI Data Security Standards (DSS), self assessment questionnaire and vendor statement of compliance with the unit e. Coordinate correction/waiver of deficiencies f. UDIT/Investment Officer/Unit sign off UDit will work with owning staff to mitigate any vulnerabilities found and maintain a copy of assessments, findings, notes and resolutions. Documentation will be maintained in the office of the Investment Officer. This document needs to be reviewed by stakeholders identified in the associated policy annually to address changes to UD s merchant status and PCI requirements.
Effective Date: August 2008 Approval: December 17, 2015 PCI General Policy Maintenance of Policy: Office of Student Accounts PURPOSE: To protect against the exposure and possible theft of account and personal
Credit Card Handling Security Standards Overview Information Technology This document is intended to provide guidance to merchants (colleges, departments, organizations or individuals) regarding the processing
Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015 I. PURPOSE The purpose of this policy is to establish guidelines for processing charges on Payment Cards to protect
1. Introduction 1.1. Purpose and Background 1.2. Central Coordinator Contact 1.3. Payment Card Industry Data Security Standards (PCI-DSS) High Level Overview 2. PCI-DSS Guidelines - Division of Responsibilities
TREASURER S OFFICE ADMINISTRATIVE STANDARDS FOR THE TREASURER S FISCAL PROCEDURE No. 08-01 MERCHANT DEBIT AND CREDIT CARD RECEIPTS 1. Introduction Debit and Credit Card Receipt Standards apply to the administration
University of Sunderland Business Assurance PCI Security Policy Document Classification: Public Policy Reference Central Register IG008 Policy Reference Faculty / Service IG 008 Policy Owner Chief Financial
Policy V. 4.1.1 Responsible Official: Vice President for Finance and Treasurer Effective Date: September 29, 2010 Accepting Payment Cards and ecommerce Payments Policy Statement The University of Vermont
05.118 Credit Card Acceptance Policy Authority: Vice Chancellor of Business Affairs History: Effective July 1, 2011 Updated February 2013 Source of Authority: Office of State Controller (OSC); Office of
No.: C-13 Page: 1 of 6 POLICY: It is the policy of the University of Alaska that all payment card transactions are to be executed in compliance with standards established by the Payment Card Industry Security
GRINNELL COLLEGE CREDIT CARD PROCESSING AND SECURITY POLICY PURPOSE The Payment Card Industry Data Security Standard was established by the credit card industry in response to an increase in identify theft
Credit Card Handling Security Standards Overview This document is intended to provide guidance to merchants (colleges, departments, auxiliary organizations or individuals) regarding the processing of charges
Minnesota State Colleges and Universities System Procedures Chapter 5 Administration Payment Card Industry Technical s Part 1. Purpose. This guideline emphasizes many of the minimum technical requirements
Appendix 1 Payment Card Industry Data Security Standards Program PCI security standards are technical and operational requirements set by the Payment Card Industry Security Standards Council to protect
CSU, Chico Credit Card Handling Security Standard Effective Date: July 28, 2015 1.0 INTRODUCTION This standard provides guidance to ensure that credit card acceptance and ecommerce processes comply with
Payment Card Industry Data Security Standard (PCI DSS) Q & A November 6, 2008 What is the PCI DSS? And what do the acronyms CISP, SDP, DSOP and DISC stand for? The PCI DSS is a set of comprehensive requirements
Miami University Payment Card Data Security Policy IT Policy IT Standard IT Guideline IT Procedure IT Informative Issued by: IT Services SCOPE: This policy covers all units within Miami University that
USNH Payment Card Industry Data Security Standard (PCI DSS) Version 3 Administration and Department Policy Draft Revision 3/12/2013 1. Purpose. The purpose of this policy is to assist the University System
Payment Cardholder Data Handling Procedures (required to accept any credit card payments) Introduction: The Procedures that follow will allow the University to be in compliance with the Payment Card Industry
Payment Card Industry Data Security Standard Introduction Purpose Audience Implications Sensitive Digital Data Management In an effort to protect credit card information from unauthorized access, disclosure
The requirements for PCI-DSS compliance are quite numerous and at times extremely complicated due to their interdependent nature and scope. The University has deemed it necessary for those areas currently
BROWN UNIVERSITY University Policy Accepting and Handling Payment Cards to Conduct University Business Table of Contents Purpose... 2 Scope... 2 Authorization... 2 Establishing a new account... 2 Policy
Dartmouth College Merchant Credit Card Policy for Managers and Supervisors Mission Statement Dartmouth College requires all departments that process, store or transmit credit card data remain in compliance
CREDIT CARD PROCESSING POLICY AND PROCEDURES Note: For purposes of this document, debit cards are treated the same as credit cards. Any reference to credit cards includes credit and debit card transactions.
EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy ) Background Due to increased threat of identity theft, fraudulent credit card activity and other instances where cardholder
DELAWARE COLLEGE OF ART AND DESIGN 600 N MARKET ST WILMINGTON DELAWARE 19801 302.622.8000 INFORMATION SECURITY POLICY including Policy for Credit Card Acceptance to Conduct College Business stuff\policies\security_information_policy_with_credit_card_acceptance.doc
UCR Cashiering & Payment Card Services TERMINAL CONTROL MEASURES Instructions: Upon completion, please sign and return to email@example.com when requesting a stand-alone dial up terminal. The University
Blank slide Project Title slide Project: PCI Are You At Risk? Agenda Are You At Risk? Video What is the PCI SSC? Agenda What are the requirements of the PCI DSS? What Steps Can You Take? Available Services
New York University University Policies Title: Payment Card Industry Data Security Standard Policy Effective Date: April 11, 2012 Supersedes: N/A Issuing Authority: Executive Vice President for Finance
FINANCE AND TREASURY POLICIES AND PROCEDURES E071 CREDIT CARD PROCESSING & SECURITY POLICY PURPOSE The purpose of this policy is to establish guidelines for processing charges/credits on Credit Cards to
EASTERN OKLAHOMA STATE COLLEGE ACCEPTING AND HANDLING CREDIT AND DEBIT CARD PAYMENTS POLICIES AND PROCEDURES This document describes Eastern Oklahoma State College s policy and procedures for the proper
What is PCI DSS? PCI DSS is an acronym for Payment Card Industry Data Security Standards. PCI DSS is a global initiative intent on securing credit and banking transactions by merchants & service providers
BUSINESS POLICY TO: All Members of the University Community 2012:12 DATE: April 2012 CREDIT CARD PROCESSING AND SECURITY POLICY (Supersedes Policy 2009:05) Contents Section 1 Policy Statement... 2 Section
PCI Data Security and Classification Standards Summary Data security should be a key component of all system policies and practices related to payment acceptance and transaction processing. As customers
Credit Card Procedures and Policies Texas A&M Health Science Center offers university departments the convenience of accepting credit cards in payment for goods and services provided. All University departments
Payment Card Acceptance Information and Procedure Guide (for publication on the Treasury Webpages) A companion guide to University policy 6120, Payment Card Acceptance Standards for Business Processes,
PCI Policies 2011 Appalachian State University Table of Contents Section 1: State and Contractual Requirements Governing Campus Credit Cards A. Cash Collection Point Approval for Departments B. State Requirements
WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,
Payment Card Industry (PCI) Policy Manual Network and Computer Services Forward This policy manual outlines acceptable use Black Hills State University (BHSU) or University herein, Information Technology
AskUGA 1 of 5 Credit/Debit Cards Responsible administrator: Senior Vice President for Finance and Administration Related Procedure: The Credit/Debit Card Processing Procedures Responsible department: Bursar's
Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking SUMMARY The Payment Card Industry Data Security Standard (PCI DSS) defines 12 high-level security requirements directed
Office of Finance and Treasury How to Accept & Process Credit and Debit Card Transactions Procedure Related Policy Title Credit Card Processing Policy For University Merchant Locations Responsible Executive
PCI Compliance Frequently Asked Questions Table of Content GENERAL INFORMATION... 2 PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS)...2 Are all merchants and service providers required to comply
Policy/Procedure Description PCI DSS Policies Install and Maintain a Firewall Configuration to Protect Cardholder Data Establish Firewall and Router Configuration Standards Build a Firewall Configuration
Achieving PCI DSS Compliance with A White Paper Spring 2010 Summary The Payment Card Industry Data Security Standard (PCI DSS) is a global information security standard defined by the Payment Card Industry
Why Is Compliance with PCI DSS Important? The members of PCI Security Standards Council (American Express, Discover, JCB, MasterCard, and Visa) continually monitor cases of account data compromise. These
PCI Compliance Top 10 Questions & Answers 1. What is PCI Compliance and PCI DSS? 2. Who needs to follow the PCI Data Security Standard? 3. What happens if I don t comply? 4. What are the basic requirements
Third-Party Access and Management Policy Version Date Change/s Author/s Approver/s Dean of Information Services 1.0 01/01/2013 Initial written policy. Kyle Johnson Executive Director for Compliance and
Credit Card Processing and Security Policy Policy Number: Reserved for future use Responsible Official: Vice President of Administration and Finance Responsible Office: Student Account Services Effective
Louisiana State University Finance and Administrative Services Operating Procedure FASOP: AS-22 CREDIT CARD MERCHANT POLICY Scope: All campuses served by Louisiana State University (LSU) Office of Accounting
BROWN UNIVERSITY University Policy Accepting Credit Cards to Conduct University Business Purpose Brown University requires all departments that are involved with credit card handling to do so in compliance
NUMBER: BUSF 4.11 SECTION: Business and Finance SUBJECT: Credit/Debit Card Processing Policy DATE: November 1, 2006 Policy for: All Campuses Procedures for: All Campuses Authorized by: Rick Kelly Issued
Vanderbilt University Payment Card Processing and PCI Compliance Policy and Procedures Manual PCI Compliance Office Information Technology Treasury VUMC Finance Table of Contents Policy... 2 I. Purpose...
Where every interaction matters. PCI Compliance Top 10 Questions and Answers White Paper October 2013 By: Peer 1 Hosting Product Team www.peer1.com Contents What is PCI Compliance and PCI DSS? 3 Who needs
PCI SAQ C-VT PCI COMPLIANCE GUIDE For Merchants and Service Members PCI DSS v2.0 SAQ CVT Merchant Guide 1 Contents Contents... 2 Introduction... 3 Defining an SAQ C Merchant... 3 REQUIREMENTS FOR SAQ-VT...
La règlementation VisaCard, MasterCard PCI-DSS Conférence CLUSIF "LES RSSI FACE À L ÉVOLUTION DE LA RÉGLEMENTATION" 7 novembre 07 Serge Saghroune Overview of PCI DSS Payment Card Industry Data Security
Cyber Security: Secure Credit Card Payment Process Payment Card Industry Standard Compliance A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Compliant? Bank Name
Josiah Wilkinson Internal Security Assessor Nationwide Payment Card Industry Overview PCI Governance/Enforcement Agenda PCI Data Security Standard Penalties for Non-Compliance Keys to Compliance Challenges
Any physical access to devices or data held in an Melbourne datacentre that houses a customer s cardholder data must be controlled and restricted only to approved individuals. PCI DSS Requirements Version
PCI Data Security Standards An Introduction to Bankcard Data Security Why should we worry? Since 2005, over 500 million customer records have been reported as lost or stolen 1 In 2010 alone, over 134 million
Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire Instructions and Guidelines Version 1.1 February 2008 Table of Contents About this Document... 1 PCI Data Security Standard
Account Information Security Merchant Guide At Visa, protecting our cardholders is at the core of everything we do. One of the many reasons people trust our brand is that we make buying and selling safer
Credit Card Security Created 16 Apr 2014 Revised 16 Apr 2014 Reviewed 16 Apr 2014 Purpose This policy is intended to ensure customer personal information, particularly credit card information and primary
Prepared by Treasury Office. This amends A8.710 dated July 2001. A8.710 April 2005 A8.700 TREASURY P 1 of 5 A8.710 Credit Card Program 1. Purpose To provide uniform procedures for the processing of credit
What Is It? The Payment Card Industry Data Security Standard (PCIDSS), in particular v3.0, aims to reduce credit card fraud by minimizing the risks associated with the transmission, processing, and storage
PCI-DSS: Payment Card Industry Data Security Standard Why is this important? Cardholder data and personally identifying information are easy money That we work with this information makes us a target That
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
Cyber - Security and Investigations Ingrid Beierly August 18, 2008 Agenda Visa Cyber - Security and Investigations Today s Targets Recent Attack Patterns Hacking Statistics (removed) Top Merchant Vulnerabilities
Liverpool Hope University PCI DSS Policy Document Control Date Revision/Amendment Details & Reason Author 26 th March 2015 Updates G. Donelan 23 rd June 2015 Audit Committee 7 th July 2015 University Council
What is the PCI standards council? The Payment Card Industry Standards Council is an institution set-up by American Express, Discover Financial Services, JCB, MasterCard Worldwide and Visa International
This appendix is a supplement to the Local Government Information Security: Getting Started Guide, a non-technical reference essential for elected officials, administrative officials and business managers.
Page 1 SECTION 509: Payment Card and Electronic Funds Transfer (EFT) Procedures SOURCE: NDSU President NDSU VP for Finance and Administration NDSU VP for Information Technology It is the University s responsibility
cliftonlarsonallen.com PCI Compliance What is New in Payment Card Industry Compliance Standards October 2015 Overview PCI DSS In the beginning Each major card brand had its own separate criteria for implementing
Ball State University Credit/Debit Card Handling Policy and Procedures I. Background Ball State University accepts payments in various forms including cash, checks and electronic fund transfers. University
Department PCI Self-Assessment Questionnaire Version 1.1 2009 Attestation of Compliance Instructions for Submission This Department PCI Self-Assessment Questionnaire has been developed as an assessment