Data Breach Lawsuits at Target - Credit Card Fraud

Size: px
Start display at page:

Download "Data Breach Lawsuits at Target - Credit Card Fraud"

Transcription

1 Financial Fraud Law Report An A.S. Pratt & Sons PublicatioN february 2014 Editor s Note: Corruption Compliance Steven A. Meyerowitz Anti-Corruption Compliance in 2013: Post-Guidance Trends and Signals for the Future Paul R. Berger, Sean Hecker, Andrew M. Levine, Bruce E. Yannett, Steven S. Michaels, Philip Rohlik, Noelle Duarte Grohmann, and Jane Shvets Compliance Issues Arising out of the Target Data Breach H. David Kotz Cybersecurity: Amid Increasing Attacks and Government Controversy, a Framework to Reduce Risk Emerges Stuart D. Levi Know Your Customer : OFAC Raises Due Diligence Expectations of Non-US Banks Sean M. Thornton Dodd-Frank Wall Street Reform and Consumer Protection Act Update David A. Elliott, Rachel Blackmon Cash, Kristen Peters Watson, and E. Jordan Teague

2 Editor-in-chief Steven A. Meyerowitz President, Meyerowitz Communications Inc. Board of Editors Frank W. Abagnale Author, Lecturer, and Consultant Abagnale and Associates Stephen L. Ascher Jenner & Block LLP Thomas C. Bogle Dechert LLP David J. Cook Cook Collection Attorneys David A. Elliott Burr & Forman LLP William J. Kelleher III Corporate Counsel People s United Bank James M. Keneally Kelley Drye & Warren LLP H. David Kotz Director Berkeley Research Group, LLC Richard H. Kravitz Founding Director Center for Socially Responsible Accounting Frank C. Razzano Pepper Hamilton LLP Sareena Malik Sawhney Director Marks Paneth & Shron LLP Mara V.J. Senn Arnold & Porter LLP John R. Snyder Bingham McCutchen LLP Jennifer Taylor McDermott Will & Emery LLP Bruce E. Yannett Debevoise & Plimpton LLP The Financial Fraud Law Report is published 10 times per year by Matthew Bender & Company, Inc. Copyright 2014 Reed Elsevier Properties SA., used under license by Matthew Bender & Company, Inc. All rights reserved. No part of this journal may be reproduced in any form by microfilm, xerography, or otherwise or incorporated into any information retrieval system without the written permission of the copyright owner. For permission to photocopy or use material electronically from the Financial Fraud Law Report, please access com or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For subscription information and customer service, call Direct any editorial inquires and send any material for publication to Steven A. Meyerowitz, Editor-in-Chief, Meyerowitz Communications Inc., PO Box 7080, Miller Place, NY 11764, [email protected], (phone) / (fax). Material for publication is welcomed articles, decisions, or other items of interest. This publication is designed to be accurate and authoritative, but neither the publisher nor the authors are rendering legal, accounting, or other professional services in this publication. If legal or other expert advice is desired, retain the services of an appropriate professional. The articles and columns reflect only the present considerations and views of the authors and do not necessarily reflect those of the firms or organizations with which they are affiliated, any of the former or present clients of the authors or their firms or organizations, or the editors or publisher. POSTMASTER: Send address changes to the Financial Fraud Law Report, LexisNexis Matthew Bender, 121 Chanlon Road, North Building, New Providence, NJ Direct inquiries for editorial department to catherine. [email protected]. ISBN:

3 Compliance Issues Arising out of the Target Data Breach H. DAVID KOTZ The author of this article discusses the recent data breach at Target and offers data breach prevention advice to companies and consumers. By now, everyone has likely heard about Target s December 19, 2013 announcement that hackers had gained unauthorized access to approximately 40 million Target credit and debit accounts, which would include information such as customers names, credit or debit card numbers, card expiration dates, and three-digit CVV security codes. In January, Target reported that the data breach was even more massive, with at least 70 to 110 million customers being affected. Because of the breach, Target has warned customers to beware of the fraudulent use of their credit and debit card numbers, suggesting that if they notice a charge that appears fraudulent, they should contact Target or their bank. But many card owners do not regularly check on charges posted, and may not be aware that their credit card is being used improperly for some time. Major Data Breaches While receiving a lot of publicity, the Target breach is not the only major incident that has occurred in recent years. In July 2013, federal prosecutors charged five men responsible for a hacking and credit card fraud spree that H. David Kotz presently serves as a director at Berkeley Research Group, where he focuses on internal investigations and matters relating to Foreign Corrupt Practices Act and anti-money laundering regulations. Published by Matthew Bender & Company, Inc. in the February 2014 issue of Financial Fraud Law Report. Copyright 2014 Reed Elsevier Properties SA. 161

4 Financial Fraud Law Report cost companies more $300 million in the biggest cyber crime case filed in U.S. history. According to the indictment, companies targeted by the hackers included NASDAQ, Visa Inc., J.C. Penney Co, JetBlue Airways Corp, and a French retailer called Carrefour SA. Prosecutors estimated that the group of five men from Russia and Ukraine stole 160 million payment card numbers. According to the indictment, they then sold the payment card numbers to resellers, who then sold them on online forums or to cashers who encoded the numbers onto blank plastic cards. In addition, in January 2007, the parent entity to the clothing retailer, TJ Maxx, announced in an SEC filing that more than 45 million credit and debit card numbers had been stolen from its IT systems. Eventually, there were reports that the data breach affected nearly 90 to 100 million cards. TJ Maxx s parent reported that its full-year profit was reduced 25 cents a share due simply to charges tied to the breach. These incidents have worried retailers that they may be the next ones to be hacked. The Target Data Breach Lawsuits have already been filed against Target alleging negligence, fraud, breach of contract, breach of fiduciary duty, invasion of privacy and conversion. Some complaints have claimed that Target s actions were deceptive and willful and are seeking punitive damages. A spokesman for the U.S. Secret Service has confirmed that it is investigating the Target data breach. A Target spokesperson has also said that Target retained a third-party forensic firm to conduct an investigation as well. The results of these investigations will be very important for the industry. The forensic investigation should reveal how the attackers got into the network and how they bypassed any security countermeasures. There are legitimate questions to be answered about the extent to which Target had stored the credit card data in encrypted format, and whether its systems had been certified by a major compliance standard. The forensic investigation should be conducted thoroughly and comprehensively and there should not be any limits placed upon the investigator s authority. Resources should not be an issue and evidence should be identified as soon as possible. Relevant data should be acquired, authenticated and analyzed. Most importantly, the results should be 162

5 Compliance Issues Arising out of the Target Data breach released to the public. Historically, there has not been a great deal of sharing among companies of ideas on how to protect this type of data and prevent breaches. One curious aspect is that Target issued its announcement on December 19, 2013, but the breach took place between November 27 and December 15, The reason for the delay is unclear but it is more reason for consumers to be extra vigilant with confirming purchases on credit and debit cards on an ongoing basis. Preventing Data Breaches The Target data breach is just another reminder that companies must not allow themselves to become complacent when it comes to compliance and IT security. Many U.S. companies have balked at the costs associated with adopting EMV chip technology for credit and debit card payments, a standard widely used in Europe. EMV, named after its developers, Europay, Mastercard and Visa, features encrypted chips and technology that evidently makes them harder to reproduce than the magnetic strip technology most U.S. credit cards use today. A cardholder s confidential data is considered by many to be significantly more secure on a chip-enabled payment card than on a magnetic stripe card. The EMV cards have reportedly been adopted in about 80 countries; yet, some studies show that only about one percent of the U.S. market uses the technology. Retailers should use the Target incident as a learning opportunity to examine their own compliance systems and points of potential breaches. They should investigate whether their password-protected systems are sufficient and engage in the appropriate and continuous monitoring of their systems for suspicious activity. Companies often focus on ensuring adherence to regulatory compliance mandates rather than considering the best strategies for protecting their data. In addition, many companies view the regulatory compliance requirements as a one-time project, rather than an ongoing effort to ensure data protection. Many compliance officials also see technology as a panacea for all concerns and fail to appreciate the human element of IT security and understand and analyze how the technology is utilized. Companies would be well-served 163

6 Financial Fraud Law Report spending significant amounts of time engaging in brainstorming sessions to evaluate IT solutions to potential vulnerabilities. These sessions should include operational executives in addition to IT experts. Company security and risk professionals should also raise the Target incident as a reminder to business executives that security and compliance breaches can have serious repercussions to a company s bottom line. The business impact on Target from the data breach is a strong example of how companies may be penny-wise and pound-foolish by not investing sufficiently in IT security and expending enough time and human resources to analyze potential problems. What Can Consumer do? Consumers should also be reminded of the importance of remaining watchful and closely monitor their transactions. Passwords should be changed frequently and folks should not be shy about challenging suspicious charges, even if they are of small amounts. Credit card statements should be shredded and consumers should be careful about making too many online purchases, particularly with obscure websites. Individuals should consider switching from debit cards to credit cards, as debit cards have fewer protections than credit cards when it comes to fraud. There can be positives that come from the Target data breach in terms of increased awareness and vigilance on the part of companies and customers if the breach can serve as a much needed wake-up call for industry officials and consumers. 164

Financial Fraud Law Report

Financial Fraud Law Report Financial Fraud Law Report An A.S. Pratt & Sons Publication February 2013 Headnote: Guidance Steven A. Meyerowitz The FCPA Guidance Road Map Mara V.J. Senn, Drew A. Harker, Arthur Luk, and Philippe A.

More information

Financial Fraud Law Report

Financial Fraud Law Report Financial Fraud Law Report An A.S. Pratt & Sons PUBlication June 2013 Headnote: the Perfect fcpa Storm? Steven A. Meyerowitz Unprecedented fcpa Wake-Up Call for U.S. Broker-Dealers and Foreign Banks: Has

More information

Financial Fraud Law Report

Financial Fraud Law Report Financial Fraud Law Report An A.S. Pratt & Sons Publication january 2014 Headnote: The Feds Get Tougher Steven A. Meyerowitz SAC Civil Forfeiture Action Raises Stakes for Insider Trading Harry Morgan,

More information

Financial Fraud Law Report

Financial Fraud Law Report Financial Fraud Law Report An A.S. Pratt & Sons Publication May 2014 Editor s Note: Mary Jo White s SEC Steven A. Meyerowitz SEC Enforcement: Top 10 Developments Under Mary Jo White Thomas A. Zaccaro,

More information

Financial Fraud Law Report

Financial Fraud Law Report Financial Fraud Law Report AN A.S. PRATT & SONS PUBLICATION February 2015 Editor s Note Steven A. Meyerowitz Recent Developments in U.S. Domestic Bribery Case Law Reaffirm Various Risks and Tensions In

More information

VOLUME 3 NUMBER 10 NOVEMBER/DECEMBER 2011

VOLUME 3 NUMBER 10 NOVEMBER/DECEMBER 2011 Financial Fraud Law Report VOLUME 3 NUMBER 10 NOVEMBER/DECEMBER 2011 HEADNOTE: EMPLOYEE EMBEZZLEMENT Steven A. Meyerowitz 877 THE STATE OF AFFAIRS REGARDING EMPLOYEE EMBEZZLEMENTS Stephen A. Pedneault

More information

VOLUME 4 NUMBER 6 JUNE 2012

VOLUME 4 NUMBER 6 JUNE 2012 Financial Fraud Law Report VOLUME 4 NUMBER 6 JUNE 2012 HEADNOTE: CASES, RULES, AND SETTLEMENTS: THE WORLD OF FINANCIAL FRAUD Steven A. Meyerowitz 481 U.S. SUPREME COURT NARROWLY INTERPRETS THE STATUTE

More information

Financial Fraud Law Report

Financial Fraud Law Report Financial Fraud Law Report An A.S. Pratt & Sons Publication october 2014 EDITOR S NOTE: BE PREPARED Steven A. Meyerowitz Insider Trading Broker-Dealer Compliance Requirements and Best Practices Daniel

More information

POSSIBLE CHANGES TO THE FEDERAL TRADE COMMISSION S HOLDER RULE COULD AFFECT CONSUMER FINANCE Stephen J. Newman and Geoffrey L.

POSSIBLE CHANGES TO THE FEDERAL TRADE COMMISSION S HOLDER RULE COULD AFFECT CONSUMER FINANCE Stephen J. Newman and Geoffrey L. An A.S. Pratt PUBLICATION JULY/AUGUST 2016 EDITOR S NOTE: THE SUMMER READING ISSUE Victoria Prussen Spears POSSIBLE CHANGES TO THE FEDERAL TRADE COMMISSION S HOLDER RULE COULD AFFECT CONSUMER FINANCE Stephen

More information

How To Write A Government Contracting Law Report

How To Write A Government Contracting Law Report AN A.S. PRATT PUBLICATION OCTOBER 2015 VOL. 1 NO. 7 PRATT S GOVERNMENT CONTRACTING LAW REPORT EDITOR S NOTE: CYBERSECURITY FOR CONTRACTORS Victoria Prussen Spears ACTIONS FORESHADOW UNIFORM CYBERSECURITY

More information

WRITTEN TESTIMONY BEFORE THE HEARING ON FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN TARGET

WRITTEN TESTIMONY BEFORE THE HEARING ON FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN TARGET WRITTEN TESTIMONY BEFORE THE SENATE COMMITTEE ON THE JUDICIARY HEARING ON PRIVACY IN THE DIGITAL AGE: PREVENTING DATA BREACHES AND COMBATING CYBERCRIME FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN EXECUTIVE

More information

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT Advisor Article DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT By James R. Carroll, David S. Clancy and Christopher G. Clark* Skadden, Arps, Slate, Meagher & Flom Customer data security

More information

Answering your cybersecurity questions The need for continued action

Answering your cybersecurity questions The need for continued action www.pwc.com/cybersecurity Answering your cybersecurity questions The need for continued action January 2014 Boards and executives keeping a sustained focus on cybersecurity do more than protect the business:

More information

With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful.

With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful. With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful. Breach Overview Q: Media reports are stating that Target experienced a data breach. Can you provide more

More information

Langara College PCI Awareness Training

Langara College PCI Awareness Training Langara College PCI Awareness Training Have you heard of PCI? Due to the increase of credit card fraud and identity theft, major credit card companies like Visa, MasterCard and Amex have formed a security

More information

EMV and Small Merchants:

EMV and Small Merchants: September 2014 EMV and Small Merchants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service

More information

PCI Data Security Standards. Presented by Pat Bergamo for the NJTC February 6, 2014

PCI Data Security Standards. Presented by Pat Bergamo for the NJTC February 6, 2014 PCI Data Security Standards Presented by Pat Bergamo for the NJTC February 6, 2014 Introduction 3/3/2014 2 Your Speaker Patrick Bergamo, CISSP Director of Information Security & Delivery Delta Corporate

More information

welcome to liber8:payment

welcome to liber8:payment liber8:payment welcome to liber8:payment Our self-service kiosks free up staff time and improve the overall patron experience. liber8:payment further enhances these benefits by providing the convenience

More information

toast EMV in 2015: How Restaurants Can Prepare for the New Chip-and-Pin Standard

toast EMV in 2015: How Restaurants Can Prepare for the New Chip-and-Pin Standard toast EMV in 2015: How Restaurants Can Prepare for the New Chip-and-Pin Standard Table of Contents For more than 40 years, merchants and consumers have used magnetic stripe credit cards and compatible

More information

Payment Card Industry Data Security Standard (PCI DSS) Q & A November 6, 2008

Payment Card Industry Data Security Standard (PCI DSS) Q & A November 6, 2008 Payment Card Industry Data Security Standard (PCI DSS) Q & A November 6, 2008 What is the PCI DSS? And what do the acronyms CISP, SDP, DSOP and DISC stand for? The PCI DSS is a set of comprehensive requirements

More information

Frequently Asked Questions

Frequently Asked Questions PCI Compliance Frequently Asked Questions Table of Content GENERAL INFORMATION... 2 PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS)...2 Are all merchants and service providers required to comply

More information

Understand the Business Impact of EMV Chip Cards

Understand the Business Impact of EMV Chip Cards Understand the Business Impact of EMV Chip Cards 3 What About Mail/Telephone Order and ecommerce? 3 What Is EMV 3 How Chip Cards Work 3 Contactless Technology 4 Background: Behind the Curve 4 Liability

More information

Data Breach Cost. Risks, costs and mitigation strategies for data breaches

Data Breach Cost. Risks, costs and mitigation strategies for data breaches Data Breach Cost Risks, costs and mitigation strategies for data breaches Tim Stapleton, CIPP/US Deputy Global Head of Professional Liability Zurich General Insurance Data Breaches: Greater frequency,

More information

EMV and Restaurants: What you need to know. Mike English. October 2014. Executive Director, Product Development Heartland Payment Systems

EMV and Restaurants: What you need to know. Mike English. October 2014. Executive Director, Product Development Heartland Payment Systems October 2014 EMV and Restaurants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service marks

More information

The Home Depot Provides Update on Breach Investigation

The Home Depot Provides Update on Breach Investigation The Home Depot Provides Update on Breach Investigation Breach confirmed Investigation focused on April forward No evidence of debit PIN numbers compromised No customers liable for fraudulent charges Customers

More information

6-8065 Payment Card Industry Compliance

6-8065 Payment Card Industry Compliance 0 0 0 Yosemite Community College District Policies and Administrative Procedures No. -0 Policy -0 Payment Card Industry Compliance Yosemite Community College District will comply with the Payment Card

More information

Joe A. Ramirez Catherine Crane

Joe A. Ramirez Catherine Crane RIMS/RMAFP PRESENTATION Joe A. Ramirez Catherine Crane RISK TRANSFER VIA INSURANCE Most Common Method Involves Assessment of Risk and Loss Potential Risk of Loss Transferred For a Premium Insurance Contract

More information

This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen.

This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen. RECENT DATA BREACHES This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen. Data security is a number one priority at Northwest. We take every

More information

Accepting Payment Cards and ecommerce Payments

Accepting Payment Cards and ecommerce Payments Policy V. 4.1.1 Responsible Official: Vice President for Finance and Treasurer Effective Date: September 29, 2010 Accepting Payment Cards and ecommerce Payments Policy Statement The University of Vermont

More information

COLUMBUS STATE COMMUNITY COLLEGE POLICY AND PROCEDURES MANUAL

COLUMBUS STATE COMMUNITY COLLEGE POLICY AND PROCEDURES MANUAL PAYMENT CARD INDUSTRY COMPLIANCE (PCI) Effective June 1, 2011 Page 1 of 6 (1) Definitions a. Payment Card Industry Data Security Standards (PCI-DSS): A set of standards established by the Payment Card

More information

HOME DEPOT DATA BREACH

HOME DEPOT DATA BREACH HOME DEPOT DATA BREACH This notice contains important information about the data breach announced by Home Depot, affecting some debit and credit cards used at Home Depot stores beginning April 2014. Data

More information

To all GRSB debit and credit card customers:

To all GRSB debit and credit card customers: To all GRSB debit and credit card customers: A data breach at the Target Corporation may have exposed 40 million credit/debit cards to potential fraudulent activity. If you made purchases in a Target store

More information

CyberSecurity for Law Firms

CyberSecurity for Law Firms CyberSecurity for Law Firms Cracking the Cyber Code: Recent Headlines, Reinforcing the Need and Response Planning July 16, 2013 Making the Case Matthew Magner Senior Underwriting Officer Chubb & Son, a

More information

PCI and EMV Compliance Checkup

PCI and EMV Compliance Checkup PCI and EMV Compliance Checkup ATM Security Jim Pettitt Director, ATM Security Diebold Incorporated Agenda ATM threats today Top of mind risk PCI Impact on Security U.S. EMV Migration Conclusions / recommendations

More information

October 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches

October 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches October 24, 2014 Mitigating Legal and Business Risks of Cyber Breaches AGENDA Introductions Cyber Threat Landscape Cyber Risk Mitigation Strategies 1 Introductions 2 Introductions To Be Confirmed Title

More information

mobile payment acceptance Solutions Visa security best practices version 3.0

mobile payment acceptance Solutions Visa security best practices version 3.0 mobile payment acceptance Visa security best practices version 3.0 Visa Security Best Practices for, Version 3.0 Since Visa s first release of this best practices document in 2011, we have seen a rapid

More information

The Cost of Payment Card Data Theft and Your Business. Aaron Lego Director of Business Development

The Cost of Payment Card Data Theft and Your Business. Aaron Lego Director of Business Development The Cost of Payment Card Data Theft and Your Business Aaron Lego Director of Business Development Presentation Agenda Items we will cover: 1. Background on Payment Card Industry Data Security Standards

More information

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the

More information

What is EMV? What is different?

What is EMV? What is different? U.S. consumers are receiving new debit and credit cards with embedded chip technology that better stores and protects cardholder information. These new chip cards are part of the new card standard, Europay,

More information

GUIDANCE ON PAYMENT PROCESSOR RELATIONSHIPS (Revised July 2014)

GUIDANCE ON PAYMENT PROCESSOR RELATIONSHIPS (Revised July 2014) Federal Deposit Insurance Corporation 550 17th Street NW, Washington, D.C. 20429-9990 Financial Institution Letter FIL-127-2008 November 7, 2008 GUIDANCE ON PAYMENT PROCESSOR RELATIONSHIPS (Revised July

More information

PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS

PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS The following claim scenarios are hypothetical and are offered solely to illustrate the types of situations that may result in claims. Although sorted by industry,

More information

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking SUMMARY The Payment Card Industry Data Security Standard (PCI DSS) defines 12 high-level security requirements directed

More information

CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008

CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft when he intentionally

More information

The Merchant. Skimming is No Laughing Matter. A hand held skimming device. These devices can easily be purchased online.

The Merchant. Skimming is No Laughing Matter. A hand held skimming device. These devices can easily be purchased online. 1 February 2010 Volume 2, Issue 1 The Merchant Serving Florida State University s Payment Card Community Individual Highlights: Skimming Scam 1 Skimming at Work 2 Safe at Home 3 Read your Statement 4 Useful

More information

Platinum and Platinum Rewards Visa EMV Credit Cards Frequently Asked Questions (FAQ s)

Platinum and Platinum Rewards Visa EMV Credit Cards Frequently Asked Questions (FAQ s) Platinum and Platinum Rewards Visa EMV Credit Cards Frequently Asked Questions (FAQ s) What is EMV? EMV stands for Europay, MasterCard and Visa. EMV or chip cards have been in use in Europe for over 20

More information

Data Security Basics for Small Merchants

Data Security Basics for Small Merchants Data Security Basics for Small Merchants 28 October 2015 Stan Hui Director, Merchant Risk Lester Chan Director, Merchant Risk Disclaimer The information or recommendations contained herein are provided

More information

PCI DSS COMPLIANCE DATA

PCI DSS COMPLIANCE DATA PCI DSS COMPLIANCE DATA AND PROTECTION EagleHeaps FROM CONTENTS Overview... 2 The Basics of PCI DSS... 2 PCI DSS Compliance... 4 The Solution Provider Role (and Accountability).... 4 Concerns and Opportunities

More information

DATA SECURITY BREACH: THE NEW THIRD CERTAINTY OF LIFE

DATA SECURITY BREACH: THE NEW THIRD CERTAINTY OF LIFE DATA SECURITY BREACH: THE NEW THIRD CERTAINTY OF LIFE ACC-Charlotte February 4, 2015 THIS WILL NEVER HAPPEN TO ME! Death, Taxes & Data Breach Not just Home Depot, Target or Sony Do you employ the next

More information

Payment Card Security

Payment Card Security Payment Card Security January 31, 2008 Kieran Norton, Senior Manager Security & Privacy Services, Deloitte & Touche LLP Focus of the Presentation PCI Overview Background Current Environment Key Considerations

More information

Security Best Practices

Security Best Practices White Paper Security Best Practices Maintaining tight security, including using both standard and advanced fraud detection and prevention tools, is crucial to maintaining a successful business. No merchant

More information

Preventing. Payment Card Fraud. Is your business protected?

Preventing. Payment Card Fraud. Is your business protected? BY TROY HAWES Preventing Payment Card Fraud Is your business protected? AT A GLANCE + The theft of credit card payment data by hackers is not limited to large corporations. + Many smaller companies fall

More information

Security Breaches and Vulnerability Experiences Overview of PCI DSS Initiative and CISP Payment Application Best Practices Questions and Comments

Security Breaches and Vulnerability Experiences Overview of PCI DSS Initiative and CISP Payment Application Best Practices Questions and Comments Security in the Payment Card Industry OWASP AppSec Seattle Oct 2006 Hap Huynh, Information Security Specialist, Visa USA [email protected] Copyright 2006 - The OWASP Foundation Permission is granted to copy,

More information

Important Customer Notice. Information Concerning Data Security Incident at Some Staples Stores

Important Customer Notice. Information Concerning Data Security Incident at Some Staples Stores Important Customer Notice Information Concerning Data Security Incident at Some Staples Stores Staples wants to make customers aware that we have confirmed a data security incident involving customer payment

More information

Volume 2 Number 3 march 2010

Volume 2 Number 3 march 2010 Financial Fraud Law Report Volume 2 Number 3 march 2010 Headnote: Insider Trading Steven A. Meyerowitz 193 Insider Trading: Rejuvenated Enforcement Efforts Suggest a Fresh Look at Compliance and Supervision

More information

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION

More information

Cybersecurity. Are you prepared?

Cybersecurity. Are you prepared? Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data

More information

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows: What is PCI DSS? PCI DSS is an acronym for Payment Card Industry Data Security Standards. PCI DSS is a global initiative intent on securing credit and banking transactions by merchants & service providers

More information

DATA BREACHES AND ITS IMPACT ON CONSUMERS

DATA BREACHES AND ITS IMPACT ON CONSUMERS DATA BREACHES AND ITS IMPACT ON CONSUMERS AGENDA About UNCLE Credit Union Current Trends Financial Industry Target Breach EMV 3 Layers Of Prevention Cybersecurity Framework Protecting Your Identity Legislative

More information

PCI Security Standards Council

PCI Security Standards Council PCI Security Standards Council Jeremy King, European Director 2013 Why PCI Matters Applying PCI How You Can Participate Agenda 2 Why PCI Matters Applying PCI How You Can Participate Agenda About the PCI

More information

TERMINAL CONTROL MEASURES

TERMINAL CONTROL MEASURES UCR Cashiering & Payment Card Services TERMINAL CONTROL MEASURES Instructions: Upon completion, please sign and return to [email protected] when requesting a stand-alone dial up terminal. The University

More information