Data Breach Lawsuits at Target - Credit Card Fraud
|
|
|
- Blake Kelley
- 5 years ago
- Views:
Transcription
1 Financial Fraud Law Report An A.S. Pratt & Sons PublicatioN february 2014 Editor s Note: Corruption Compliance Steven A. Meyerowitz Anti-Corruption Compliance in 2013: Post-Guidance Trends and Signals for the Future Paul R. Berger, Sean Hecker, Andrew M. Levine, Bruce E. Yannett, Steven S. Michaels, Philip Rohlik, Noelle Duarte Grohmann, and Jane Shvets Compliance Issues Arising out of the Target Data Breach H. David Kotz Cybersecurity: Amid Increasing Attacks and Government Controversy, a Framework to Reduce Risk Emerges Stuart D. Levi Know Your Customer : OFAC Raises Due Diligence Expectations of Non-US Banks Sean M. Thornton Dodd-Frank Wall Street Reform and Consumer Protection Act Update David A. Elliott, Rachel Blackmon Cash, Kristen Peters Watson, and E. Jordan Teague
2 Editor-in-chief Steven A. Meyerowitz President, Meyerowitz Communications Inc. Board of Editors Frank W. Abagnale Author, Lecturer, and Consultant Abagnale and Associates Stephen L. Ascher Jenner & Block LLP Thomas C. Bogle Dechert LLP David J. Cook Cook Collection Attorneys David A. Elliott Burr & Forman LLP William J. Kelleher III Corporate Counsel People s United Bank James M. Keneally Kelley Drye & Warren LLP H. David Kotz Director Berkeley Research Group, LLC Richard H. Kravitz Founding Director Center for Socially Responsible Accounting Frank C. Razzano Pepper Hamilton LLP Sareena Malik Sawhney Director Marks Paneth & Shron LLP Mara V.J. Senn Arnold & Porter LLP John R. Snyder Bingham McCutchen LLP Jennifer Taylor McDermott Will & Emery LLP Bruce E. Yannett Debevoise & Plimpton LLP The Financial Fraud Law Report is published 10 times per year by Matthew Bender & Company, Inc. Copyright 2014 Reed Elsevier Properties SA., used under license by Matthew Bender & Company, Inc. All rights reserved. No part of this journal may be reproduced in any form by microfilm, xerography, or otherwise or incorporated into any information retrieval system without the written permission of the copyright owner. For permission to photocopy or use material electronically from the Financial Fraud Law Report, please access com or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For subscription information and customer service, call Direct any editorial inquires and send any material for publication to Steven A. Meyerowitz, Editor-in-Chief, Meyerowitz Communications Inc., PO Box 7080, Miller Place, NY 11764, [email protected], (phone) / (fax). Material for publication is welcomed articles, decisions, or other items of interest. This publication is designed to be accurate and authoritative, but neither the publisher nor the authors are rendering legal, accounting, or other professional services in this publication. If legal or other expert advice is desired, retain the services of an appropriate professional. The articles and columns reflect only the present considerations and views of the authors and do not necessarily reflect those of the firms or organizations with which they are affiliated, any of the former or present clients of the authors or their firms or organizations, or the editors or publisher. POSTMASTER: Send address changes to the Financial Fraud Law Report, LexisNexis Matthew Bender, 121 Chanlon Road, North Building, New Providence, NJ Direct inquiries for editorial department to catherine. [email protected]. ISBN:
3 Compliance Issues Arising out of the Target Data Breach H. DAVID KOTZ The author of this article discusses the recent data breach at Target and offers data breach prevention advice to companies and consumers. By now, everyone has likely heard about Target s December 19, 2013 announcement that hackers had gained unauthorized access to approximately 40 million Target credit and debit accounts, which would include information such as customers names, credit or debit card numbers, card expiration dates, and three-digit CVV security codes. In January, Target reported that the data breach was even more massive, with at least 70 to 110 million customers being affected. Because of the breach, Target has warned customers to beware of the fraudulent use of their credit and debit card numbers, suggesting that if they notice a charge that appears fraudulent, they should contact Target or their bank. But many card owners do not regularly check on charges posted, and may not be aware that their credit card is being used improperly for some time. Major Data Breaches While receiving a lot of publicity, the Target breach is not the only major incident that has occurred in recent years. In July 2013, federal prosecutors charged five men responsible for a hacking and credit card fraud spree that H. David Kotz presently serves as a director at Berkeley Research Group, where he focuses on internal investigations and matters relating to Foreign Corrupt Practices Act and anti-money laundering regulations. Published by Matthew Bender & Company, Inc. in the February 2014 issue of Financial Fraud Law Report. Copyright 2014 Reed Elsevier Properties SA. 161
4 Financial Fraud Law Report cost companies more $300 million in the biggest cyber crime case filed in U.S. history. According to the indictment, companies targeted by the hackers included NASDAQ, Visa Inc., J.C. Penney Co, JetBlue Airways Corp, and a French retailer called Carrefour SA. Prosecutors estimated that the group of five men from Russia and Ukraine stole 160 million payment card numbers. According to the indictment, they then sold the payment card numbers to resellers, who then sold them on online forums or to cashers who encoded the numbers onto blank plastic cards. In addition, in January 2007, the parent entity to the clothing retailer, TJ Maxx, announced in an SEC filing that more than 45 million credit and debit card numbers had been stolen from its IT systems. Eventually, there were reports that the data breach affected nearly 90 to 100 million cards. TJ Maxx s parent reported that its full-year profit was reduced 25 cents a share due simply to charges tied to the breach. These incidents have worried retailers that they may be the next ones to be hacked. The Target Data Breach Lawsuits have already been filed against Target alleging negligence, fraud, breach of contract, breach of fiduciary duty, invasion of privacy and conversion. Some complaints have claimed that Target s actions were deceptive and willful and are seeking punitive damages. A spokesman for the U.S. Secret Service has confirmed that it is investigating the Target data breach. A Target spokesperson has also said that Target retained a third-party forensic firm to conduct an investigation as well. The results of these investigations will be very important for the industry. The forensic investigation should reveal how the attackers got into the network and how they bypassed any security countermeasures. There are legitimate questions to be answered about the extent to which Target had stored the credit card data in encrypted format, and whether its systems had been certified by a major compliance standard. The forensic investigation should be conducted thoroughly and comprehensively and there should not be any limits placed upon the investigator s authority. Resources should not be an issue and evidence should be identified as soon as possible. Relevant data should be acquired, authenticated and analyzed. Most importantly, the results should be 162
5 Compliance Issues Arising out of the Target Data breach released to the public. Historically, there has not been a great deal of sharing among companies of ideas on how to protect this type of data and prevent breaches. One curious aspect is that Target issued its announcement on December 19, 2013, but the breach took place between November 27 and December 15, The reason for the delay is unclear but it is more reason for consumers to be extra vigilant with confirming purchases on credit and debit cards on an ongoing basis. Preventing Data Breaches The Target data breach is just another reminder that companies must not allow themselves to become complacent when it comes to compliance and IT security. Many U.S. companies have balked at the costs associated with adopting EMV chip technology for credit and debit card payments, a standard widely used in Europe. EMV, named after its developers, Europay, Mastercard and Visa, features encrypted chips and technology that evidently makes them harder to reproduce than the magnetic strip technology most U.S. credit cards use today. A cardholder s confidential data is considered by many to be significantly more secure on a chip-enabled payment card than on a magnetic stripe card. The EMV cards have reportedly been adopted in about 80 countries; yet, some studies show that only about one percent of the U.S. market uses the technology. Retailers should use the Target incident as a learning opportunity to examine their own compliance systems and points of potential breaches. They should investigate whether their password-protected systems are sufficient and engage in the appropriate and continuous monitoring of their systems for suspicious activity. Companies often focus on ensuring adherence to regulatory compliance mandates rather than considering the best strategies for protecting their data. In addition, many companies view the regulatory compliance requirements as a one-time project, rather than an ongoing effort to ensure data protection. Many compliance officials also see technology as a panacea for all concerns and fail to appreciate the human element of IT security and understand and analyze how the technology is utilized. Companies would be well-served 163
6 Financial Fraud Law Report spending significant amounts of time engaging in brainstorming sessions to evaluate IT solutions to potential vulnerabilities. These sessions should include operational executives in addition to IT experts. Company security and risk professionals should also raise the Target incident as a reminder to business executives that security and compliance breaches can have serious repercussions to a company s bottom line. The business impact on Target from the data breach is a strong example of how companies may be penny-wise and pound-foolish by not investing sufficiently in IT security and expending enough time and human resources to analyze potential problems. What Can Consumer do? Consumers should also be reminded of the importance of remaining watchful and closely monitor their transactions. Passwords should be changed frequently and folks should not be shy about challenging suspicious charges, even if they are of small amounts. Credit card statements should be shredded and consumers should be careful about making too many online purchases, particularly with obscure websites. Individuals should consider switching from debit cards to credit cards, as debit cards have fewer protections than credit cards when it comes to fraud. There can be positives that come from the Target data breach in terms of increased awareness and vigilance on the part of companies and customers if the breach can serve as a much needed wake-up call for industry officials and consumers. 164
Financial Fraud Law Report
Financial Fraud Law Report An A.S. Pratt & Sons Publication February 2013 Headnote: Guidance Steven A. Meyerowitz The FCPA Guidance Road Map Mara V.J. Senn, Drew A. Harker, Arthur Luk, and Philippe A.
Financial Fraud Law Report
Financial Fraud Law Report An A.S. Pratt & Sons PUBlication June 2013 Headnote: the Perfect fcpa Storm? Steven A. Meyerowitz Unprecedented fcpa Wake-Up Call for U.S. Broker-Dealers and Foreign Banks: Has
Financial Fraud Law Report
Financial Fraud Law Report An A.S. Pratt & Sons Publication january 2014 Headnote: The Feds Get Tougher Steven A. Meyerowitz SAC Civil Forfeiture Action Raises Stakes for Insider Trading Harry Morgan,
Financial Fraud Law Report
Financial Fraud Law Report An A.S. Pratt & Sons Publication May 2014 Editor s Note: Mary Jo White s SEC Steven A. Meyerowitz SEC Enforcement: Top 10 Developments Under Mary Jo White Thomas A. Zaccaro,
Financial Fraud Law Report
Financial Fraud Law Report AN A.S. PRATT & SONS PUBLICATION February 2015 Editor s Note Steven A. Meyerowitz Recent Developments in U.S. Domestic Bribery Case Law Reaffirm Various Risks and Tensions In
VOLUME 3 NUMBER 10 NOVEMBER/DECEMBER 2011
Financial Fraud Law Report VOLUME 3 NUMBER 10 NOVEMBER/DECEMBER 2011 HEADNOTE: EMPLOYEE EMBEZZLEMENT Steven A. Meyerowitz 877 THE STATE OF AFFAIRS REGARDING EMPLOYEE EMBEZZLEMENTS Stephen A. Pedneault
VOLUME 4 NUMBER 6 JUNE 2012
Financial Fraud Law Report VOLUME 4 NUMBER 6 JUNE 2012 HEADNOTE: CASES, RULES, AND SETTLEMENTS: THE WORLD OF FINANCIAL FRAUD Steven A. Meyerowitz 481 U.S. SUPREME COURT NARROWLY INTERPRETS THE STATUTE
Financial Fraud Law Report
Financial Fraud Law Report An A.S. Pratt & Sons Publication october 2014 EDITOR S NOTE: BE PREPARED Steven A. Meyerowitz Insider Trading Broker-Dealer Compliance Requirements and Best Practices Daniel
POSSIBLE CHANGES TO THE FEDERAL TRADE COMMISSION S HOLDER RULE COULD AFFECT CONSUMER FINANCE Stephen J. Newman and Geoffrey L.
An A.S. Pratt PUBLICATION JULY/AUGUST 2016 EDITOR S NOTE: THE SUMMER READING ISSUE Victoria Prussen Spears POSSIBLE CHANGES TO THE FEDERAL TRADE COMMISSION S HOLDER RULE COULD AFFECT CONSUMER FINANCE Stephen
How To Write A Government Contracting Law Report
AN A.S. PRATT PUBLICATION OCTOBER 2015 VOL. 1 NO. 7 PRATT S GOVERNMENT CONTRACTING LAW REPORT EDITOR S NOTE: CYBERSECURITY FOR CONTRACTORS Victoria Prussen Spears ACTIONS FORESHADOW UNIFORM CYBERSECURITY
WRITTEN TESTIMONY BEFORE THE HEARING ON FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN TARGET
WRITTEN TESTIMONY BEFORE THE SENATE COMMITTEE ON THE JUDICIARY HEARING ON PRIVACY IN THE DIGITAL AGE: PREVENTING DATA BREACHES AND COMBATING CYBERCRIME FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN EXECUTIVE
DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT
Advisor Article DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT By James R. Carroll, David S. Clancy and Christopher G. Clark* Skadden, Arps, Slate, Meagher & Flom Customer data security
Answering your cybersecurity questions The need for continued action
www.pwc.com/cybersecurity Answering your cybersecurity questions The need for continued action January 2014 Boards and executives keeping a sustained focus on cybersecurity do more than protect the business:
With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful.
With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful. Breach Overview Q: Media reports are stating that Target experienced a data breach. Can you provide more
Langara College PCI Awareness Training
Langara College PCI Awareness Training Have you heard of PCI? Due to the increase of credit card fraud and identity theft, major credit card companies like Visa, MasterCard and Amex have formed a security
EMV and Small Merchants:
September 2014 EMV and Small Merchants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service
PCI Data Security Standards. Presented by Pat Bergamo for the NJTC February 6, 2014
PCI Data Security Standards Presented by Pat Bergamo for the NJTC February 6, 2014 Introduction 3/3/2014 2 Your Speaker Patrick Bergamo, CISSP Director of Information Security & Delivery Delta Corporate
welcome to liber8:payment
liber8:payment welcome to liber8:payment Our self-service kiosks free up staff time and improve the overall patron experience. liber8:payment further enhances these benefits by providing the convenience
toast EMV in 2015: How Restaurants Can Prepare for the New Chip-and-Pin Standard
toast EMV in 2015: How Restaurants Can Prepare for the New Chip-and-Pin Standard Table of Contents For more than 40 years, merchants and consumers have used magnetic stripe credit cards and compatible
Payment Card Industry Data Security Standard (PCI DSS) Q & A November 6, 2008
Payment Card Industry Data Security Standard (PCI DSS) Q & A November 6, 2008 What is the PCI DSS? And what do the acronyms CISP, SDP, DSOP and DISC stand for? The PCI DSS is a set of comprehensive requirements
Frequently Asked Questions
PCI Compliance Frequently Asked Questions Table of Content GENERAL INFORMATION... 2 PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS)...2 Are all merchants and service providers required to comply
Understand the Business Impact of EMV Chip Cards
Understand the Business Impact of EMV Chip Cards 3 What About Mail/Telephone Order and ecommerce? 3 What Is EMV 3 How Chip Cards Work 3 Contactless Technology 4 Background: Behind the Curve 4 Liability
Data Breach Cost. Risks, costs and mitigation strategies for data breaches
Data Breach Cost Risks, costs and mitigation strategies for data breaches Tim Stapleton, CIPP/US Deputy Global Head of Professional Liability Zurich General Insurance Data Breaches: Greater frequency,
EMV and Restaurants: What you need to know. Mike English. October 2014. Executive Director, Product Development Heartland Payment Systems
October 2014 EMV and Restaurants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service marks
The Home Depot Provides Update on Breach Investigation
The Home Depot Provides Update on Breach Investigation Breach confirmed Investigation focused on April forward No evidence of debit PIN numbers compromised No customers liable for fraudulent charges Customers
6-8065 Payment Card Industry Compliance
0 0 0 Yosemite Community College District Policies and Administrative Procedures No. -0 Policy -0 Payment Card Industry Compliance Yosemite Community College District will comply with the Payment Card
Joe A. Ramirez Catherine Crane
RIMS/RMAFP PRESENTATION Joe A. Ramirez Catherine Crane RISK TRANSFER VIA INSURANCE Most Common Method Involves Assessment of Risk and Loss Potential Risk of Loss Transferred For a Premium Insurance Contract
This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen.
RECENT DATA BREACHES This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen. Data security is a number one priority at Northwest. We take every
Accepting Payment Cards and ecommerce Payments
Policy V. 4.1.1 Responsible Official: Vice President for Finance and Treasurer Effective Date: September 29, 2010 Accepting Payment Cards and ecommerce Payments Policy Statement The University of Vermont
COLUMBUS STATE COMMUNITY COLLEGE POLICY AND PROCEDURES MANUAL
PAYMENT CARD INDUSTRY COMPLIANCE (PCI) Effective June 1, 2011 Page 1 of 6 (1) Definitions a. Payment Card Industry Data Security Standards (PCI-DSS): A set of standards established by the Payment Card
HOME DEPOT DATA BREACH
HOME DEPOT DATA BREACH This notice contains important information about the data breach announced by Home Depot, affecting some debit and credit cards used at Home Depot stores beginning April 2014. Data
To all GRSB debit and credit card customers:
To all GRSB debit and credit card customers: A data breach at the Target Corporation may have exposed 40 million credit/debit cards to potential fraudulent activity. If you made purchases in a Target store
CyberSecurity for Law Firms
CyberSecurity for Law Firms Cracking the Cyber Code: Recent Headlines, Reinforcing the Need and Response Planning July 16, 2013 Making the Case Matthew Magner Senior Underwriting Officer Chubb & Son, a
PCI and EMV Compliance Checkup
PCI and EMV Compliance Checkup ATM Security Jim Pettitt Director, ATM Security Diebold Incorporated Agenda ATM threats today Top of mind risk PCI Impact on Security U.S. EMV Migration Conclusions / recommendations
October 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches
October 24, 2014 Mitigating Legal and Business Risks of Cyber Breaches AGENDA Introductions Cyber Threat Landscape Cyber Risk Mitigation Strategies 1 Introductions 2 Introductions To Be Confirmed Title
mobile payment acceptance Solutions Visa security best practices version 3.0
mobile payment acceptance Visa security best practices version 3.0 Visa Security Best Practices for, Version 3.0 Since Visa s first release of this best practices document in 2011, we have seen a rapid
The Cost of Payment Card Data Theft and Your Business. Aaron Lego Director of Business Development
The Cost of Payment Card Data Theft and Your Business Aaron Lego Director of Business Development Presentation Agenda Items we will cover: 1. Background on Payment Card Industry Data Security Standards
GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability
GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the
What is EMV? What is different?
U.S. consumers are receiving new debit and credit cards with embedded chip technology that better stores and protects cardholder information. These new chip cards are part of the new card standard, Europay,
GUIDANCE ON PAYMENT PROCESSOR RELATIONSHIPS (Revised July 2014)
Federal Deposit Insurance Corporation 550 17th Street NW, Washington, D.C. 20429-9990 Financial Institution Letter FIL-127-2008 November 7, 2008 GUIDANCE ON PAYMENT PROCESSOR RELATIONSHIPS (Revised July
PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS
PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS The following claim scenarios are hypothetical and are offered solely to illustrate the types of situations that may result in claims. Although sorted by industry,
Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking
Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking SUMMARY The Payment Card Industry Data Security Standard (PCI DSS) defines 12 high-level security requirements directed
CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008
CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft when he intentionally
The Merchant. Skimming is No Laughing Matter. A hand held skimming device. These devices can easily be purchased online.
1 February 2010 Volume 2, Issue 1 The Merchant Serving Florida State University s Payment Card Community Individual Highlights: Skimming Scam 1 Skimming at Work 2 Safe at Home 3 Read your Statement 4 Useful
Platinum and Platinum Rewards Visa EMV Credit Cards Frequently Asked Questions (FAQ s)
Platinum and Platinum Rewards Visa EMV Credit Cards Frequently Asked Questions (FAQ s) What is EMV? EMV stands for Europay, MasterCard and Visa. EMV or chip cards have been in use in Europe for over 20
Data Security Basics for Small Merchants
Data Security Basics for Small Merchants 28 October 2015 Stan Hui Director, Merchant Risk Lester Chan Director, Merchant Risk Disclaimer The information or recommendations contained herein are provided
PCI DSS COMPLIANCE DATA
PCI DSS COMPLIANCE DATA AND PROTECTION EagleHeaps FROM CONTENTS Overview... 2 The Basics of PCI DSS... 2 PCI DSS Compliance... 4 The Solution Provider Role (and Accountability).... 4 Concerns and Opportunities
DATA SECURITY BREACH: THE NEW THIRD CERTAINTY OF LIFE
DATA SECURITY BREACH: THE NEW THIRD CERTAINTY OF LIFE ACC-Charlotte February 4, 2015 THIS WILL NEVER HAPPEN TO ME! Death, Taxes & Data Breach Not just Home Depot, Target or Sony Do you employ the next
Payment Card Security
Payment Card Security January 31, 2008 Kieran Norton, Senior Manager Security & Privacy Services, Deloitte & Touche LLP Focus of the Presentation PCI Overview Background Current Environment Key Considerations
Security Best Practices
White Paper Security Best Practices Maintaining tight security, including using both standard and advanced fraud detection and prevention tools, is crucial to maintaining a successful business. No merchant
Preventing. Payment Card Fraud. Is your business protected?
BY TROY HAWES Preventing Payment Card Fraud Is your business protected? AT A GLANCE + The theft of credit card payment data by hackers is not limited to large corporations. + Many smaller companies fall
Security Breaches and Vulnerability Experiences Overview of PCI DSS Initiative and CISP Payment Application Best Practices Questions and Comments
Security in the Payment Card Industry OWASP AppSec Seattle Oct 2006 Hap Huynh, Information Security Specialist, Visa USA [email protected] Copyright 2006 - The OWASP Foundation Permission is granted to copy,
Important Customer Notice. Information Concerning Data Security Incident at Some Staples Stores
Important Customer Notice Information Concerning Data Security Incident at Some Staples Stores Staples wants to make customers aware that we have confirmed a data security incident involving customer payment
Volume 2 Number 3 march 2010
Financial Fraud Law Report Volume 2 Number 3 march 2010 Headnote: Insider Trading Steven A. Meyerowitz 193 Insider Trading: Rejuvenated Enforcement Efforts Suggest a Fresh Look at Compliance and Supervision
WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR
KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION
Cybersecurity. Are you prepared?
Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data
PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:
What is PCI DSS? PCI DSS is an acronym for Payment Card Industry Data Security Standards. PCI DSS is a global initiative intent on securing credit and banking transactions by merchants & service providers
DATA BREACHES AND ITS IMPACT ON CONSUMERS
DATA BREACHES AND ITS IMPACT ON CONSUMERS AGENDA About UNCLE Credit Union Current Trends Financial Industry Target Breach EMV 3 Layers Of Prevention Cybersecurity Framework Protecting Your Identity Legislative
PCI Security Standards Council
PCI Security Standards Council Jeremy King, European Director 2013 Why PCI Matters Applying PCI How You Can Participate Agenda 2 Why PCI Matters Applying PCI How You Can Participate Agenda About the PCI
TERMINAL CONTROL MEASURES
UCR Cashiering & Payment Card Services TERMINAL CONTROL MEASURES Instructions: Upon completion, please sign and return to [email protected] when requesting a stand-alone dial up terminal. The University
