Higher Education and PCI Compliance: Definitions, Challenges, and Actions
|
|
|
- Gwendolyn Rosamond Ball
- 10 years ago
- Views:
Transcription
1 Higher Education PCI Compliance: Definitions, Challenges, Actions The Problem The general public holds higher education institutions to a high stard in the realm of science technology. As discoveries in science technology continue to amaze, people continue to look to the universities for progress. State federal funds go to universities to pursue discovery the next cure, the faster processor, the smaller CPU. And if the universities don t deliver, the people expect them to educate the people that will. Unfortunately, as the newspapers attest, in the realm of data security, the people are, understably, losing faith in higher education institutions. In the past year, reports say that hackers invaded more than 29 college or university networks in the United States, one independent report estimates that up to 30 percent of data security breaches reported in the media last year took place at a college or university. 1 A university can no longer wait to protect its students, professor employees. A wealth of personal information already resides on university servers Social Security numbers, grades, health records, etc. But, as universities continue to add a variety of payment options (on or off-line), they re dealing with more more payment card information. This proliferation of payment card acceptance at universities adds yet another item to an institution s already bulging risk inventory, as well as puts them into scope for the Payment Card Industry s Data Security Stard (PCI DSS). A symposium held in May 2006 by the Treasury Institute for Higher Education discussed the PCI DSS, its relation to higher education institutions the challenges universities face when implementing a compliance program. This paper includes a great deal of information presented at that two day workshop (for more information, please see the PCI DSS Symposium link in the Resources section found at the end of this paper). Prior to 2004, to assure consumers of their brs reputations as trustworthy payment options, each of the major card associations (Visa, MasterCard, American Express Discover) drew up individual data security programs they required merchants to follow in order to accept their card br. As one might imagine, the process of ensuring compliance with four different, yet equally complex, security regulation methods proved impossible for many merchants. To simplify the process, in December 2004 Visa MasterCard aligned their security stards Visa s Cardholder Information Security Program (CISP) MasterCard s Site Data Protection Program (SDP) announced the creation of the PCI DSS. Since its creation, both American Express Discover have accepted the stard as well. When considering the PCI DSS s scope, many people think of large retailers or largevolume e-commerce merchants; higher education institutions don t quite fit the traditional merchant mold. For instance, to encourage maintain the free exchange of ideas, they commit themselves to open networks. With payment processing systems, many times, spread over a large geographical area; universities 1 Doan, Lynn. "College Door Ajar for Online Criminals." Los Angeles Times 30 May June 2006 <
2 often utilize multiple IT departments that may not coordinate. Higher education institutions also depend on often less-than-satisfactory state federal funding that demotes data security to the bottom of many priority lists. In addition, they have a great many merchants accepting payment cards on their campuses bookstores, hospitals, parking services, pre-paid campus cards, athletic departments, alumni organizations, housing food services, among others. While a number of departments accept payment cards on behalf of the university, it s likely the institution itself has one contract with its acquiring bank (the bank that credits a merchant s account for their payment card receipts or batch ) the merchant agreement. Unfortunately, the above scenario often results in a decentralized processing system. In some cases, departments/merchants request their own merchant ID (an acquirerassigned number used to identify an entity that accepts payment cards; for purposes of reporting, processing billing) directly from the institution s bank, leaving the university s financial management staff in the dark. In others; from the university s block of merchant IDs assigned by its acquiring bank, some departments may have as many as 12, but only use two. This decentralization prevents an institution from knowing where cardholder data resides on their servers perhaps the greatest obstacle to PCI compliance. If an institution does not know where an asset is located, they cannot protect it. And without central oversight, departments may think of PCI compliance as an IT or finance issue, when in reality it is the responsibility of every department. Without a centrally managed merchant ID system, an institution may not have a full grasp of which of their departments actually accept payment cards, let alone whether or not they re PCI compliant. Without a thorough understing of their entire payment card environment, an institution can not compare its practices to the PCI DSS, or even know where to implement PCI compliant policies, procedures technology. In reality, PCI compliance is the entire institution s responsibility with duties accountability assigned at every level of the payment process. Decentralized acceptance of card payment can lead to relationships with multiple third party vendors, making it difficult to create enforce the policies procedures necessary to maintaining PCI compliance. In addition, after a statistical analysis of its 2005 digital forensics investigations, AmbironTrustWave found that 60 percent of compromises were due to third party error. It s important to remember that a breach in just one department could possibly hinder the entire institution s ability to accept payment cards at all. Any institution that does not implement a PCI compliance program with central oversight enforcement will find the process difficult, if not impossible. Understing PCI Preventing data security attacks is not a simple issue to address for any organization, higher education or otherwise. Organizations with a stake in the flow of electronic commerce respond to threats in a variety of ways. As mentioned above, all major credit card brs, including American Express Discover, now endorse the PCI DSS. The card brs require that all merchants service providers that
3 store, transmit or process credit card holder information comply with the PCI stard. The PCI-DSS consists of 12 requirements in pursuit of six goals: Building Maintaining a Secure Network 1. Install maintain a firewall configuration to protect data 2. Do not use vendor-supplied defaults for system passwords other security parameters Protecting Cardholder Data 3. Protect stored data 4. Encrypt transmission of cardholder data sensitive information across public networks Maintaining a Vulnerability Management Program 5. Use regularly update anti-virus software 6. Develop maintain secure systems applications Implementing Strong Access Control Measures 7. Restrict access to data by business need-to-know 8. Assign a unique ID to each person with computer access 9. Restrict physical access to cardholder data Regularly Monitoring Testing Networks 10. Track monitor all access to network resources cardholder data 11. Regularly test security systems processes Maintaining an Information Security Policy 12. Maintain a policy that addresses information security Depending on an institution s payment card transaction volume, the card associations may require it to validate PCI compliance through on-site assessments performed on a recurring basis by an approved independent third-party assessor. While merchant (Table 1.1) service provider (Table 1.2) level definitions may vary slightly among the card brs, most defer to Visa s definitions:
4 Table 1.1 Level Merchant Classification Criteria (as of July 18, 2006) Visa & MasterCard: Any merchant-regardless of acceptance channel-that: 1 Processes over 6 million Visa or MasterCard transactions per year Has suffered a hack or an attack that resulted in an account data compromise Visa or MasterCard determines should meet the Level 1 merchant requirements Has been identified by any other payment card br as Level 1 AMEX: Any merchant-regardless of acceptance channel-that processes over 2.5 million AMEX transactions Visa: Any merchant-regardless of acceptance channel-that processes 1 million to 6 million Visa transactions 2 MasterCard: Any merchant that processes 150,000 to 6 million MasterCard e- commerce transactions AMEX: Any merchant-regardless of acceptance channel-that processes 50,000 to 2.5 million AMEX transactions Visa: Any merchant that processes 20,000 to 1 million Visa e-commerce transactions 3 MasterCard: Any merchant that processes 20,000 to 150,000 MasterCard e- commerce transactions AMEX: Any merchant-regardless of acceptance channel-that processes less than 50,000 AMEX transactions 4 Visa: Any merchant that processes fewer than 20,000 Visa e-commerce transactions or processes fewer than 1 million Visa transactions MasterCard: Any merchant that processes fewer than 20,000 MasterCard e- commerce transactions less than 6 million MasterCard transactions Table 1.2 Service Provider Level Selection Criteria 1 All VisaNET processors (Member nonmember) all payment gateways 2 Any service provider that is not in Level 1 stores, processes, or transmits more than 1,000,000 Visa accounts/transactions annually 3 Any service provider that is not in Level 1 stores, processes, or transmits less than 1,000,000 Visa accounts/transactions annually
5 Table 1.3 Merchant Level Validation Actions Validated By Deadline 1 Annual On-site PCI Data Security Assessment Qualified Data Security Company or Internal Audit if signed by Officer of the company Qualified Independent Scan Vendor 9/30/04 New level 1 merchants have up to one year from identification to validate AMEX: 10/31/06 2 Annual PCI Self-Assessment Questionnaire Merchant New level 2 merchants: 9/30/07 Qualified Independent Scan Vendor AMEX: 10/31/06 3 Annual PCI Self-Assessment Questionnaire Merchant 6/30/05 AMEX: Recommended 10/31/06 Qualified Independent Scan Vendor ***AMEX will establish matory date in 2007*** 4 Annual PCI Self-Assessment Questionnaire Merchant Validation requirements dates are determined by the merchant s acquirer Qualified Independent Scan Vendor Table 1.4 Service Provider Level 1 Validation Actions Validated By Deadline Annual On-Site PCI Data Security Assessment Qualified Data Security Company Qualified 9/30/04 Independent Scan Vendor 2 Annual On-Site PCI Data Security Assessment Qualified Data Security Company Qualified 9/30/04 Annual PCI Self-Assessment Questionnaire Independent Scan Vendor Service Provider 3 9/30/04
6 Where a university lies within this framework is not exactly clear. The institution may hold one merchant agreement or contract with their acquiring bank, however, a number of merchant IDs that accept payment cards exist beneath that agreement. Whether the card associations acquiring banks look to the entire institution s volume of transactions or look at the volume of transactions for each separate business unit, or merchant ID, assign each a corresponding merchant level (i.e., one level one merchant vs. nine level four merchants) depends on the bank card association concerned. During a panel discussion at the aforementioned symposium mentioned in the introduction of this paper, representatives from Visa, American Express, Discover one acquiring bank answered questions about where universities fit in the merchant levels scheme. The consensus was that ultimately it s the acquiring bank s responsibility to identify a university s merchant level, unless otherwise identified by the card associations. The acquiring bank representative said that it depends on the university s merchant agreement with their bank. If they have one merchant agreement all card payments from various departments roll into that one agreement, that aggregate total of transactions would be used to determine merchant level. Whereas if separate university departments have separate merchant agreements with the acquiring bank, each separate department would be considered separately regarding their transaction volume merchant level. Because American Express Discover are themselves both card brs acquirers, they also examine the merchant agreement to determine merchant levels. Roles Responsibilities Card Associations As the authors enforcers of the PCI DSS, the card associations hold the highest position of power in the process, however with power comes responsibility, including: Ensuring the stard is current relevant to new technologies attack methods Examining the effects on merchants implementing the stard o Making implementation of the stard feasible Ensuring the stard is clearly written understable Resolving confusion over interpretation of the stard Defining merchant levels validation expectations Determining fines in the event of a breach Acquiring Banks Because it s nearly impossible for the card associations to contact every merchant ensure they comply with the PCI DSS, ultimately, it s the acquiring banks that administrate PCI compliance. The card associations stipulate that acquiring banks mate merchant compliance with the PCI DSS. In the event of a breach, the associations issue fines directly to the acquiring banks (though an acquiring bank s contract with a merchant normally holds the merchant liable should a breach occur). Acquiring banks responsibilities include: Negotiating merchant agreements
7 Informing their merchants of the PCI DSS o Determining merchants levels o Validation requirements Clearly defining liability in the event of a breach Merchants The 12 requirements themselves remain the responsibility of the merchant. While the card associations created them, merchants must implement the policies, procedures technologies they need to achieve compliance. The card associations issue fines to the acquiring bank, the acquirer s contract with a merchant will generally specify that the merchant is liable should a data security breach be traced back to their place of business. Costs of the investigation, remediation, card reissuance, fines therefore, all fall to the merchant. A merchant s responsibilities include: Meeting the requirements of the PCI DSS Requiring by contract that engaged third parties meet all PCI security stards o Understing what processors those third parties use Completing the PCI Self-Assessment Questionnaire, if required Hiring a Qualified Independent Scan Vendor, if required Engaging a qualified outside assessor if necessary Protecting other confidential information Auditors Assessors A level one merchant may not have the necessary resources to hire or dedicate a full-time compliance staff to perform an audit. They must therefore engage a Qualified Data Security Company (QDSC) to perform an on-site audit of their environment. If identified as a level one, two or three merchant; a Qualified Independent Scan Vendor must complete their required quarterly network scan. All QDSCs are certified by the card associations, work directly with the merchant, submit documentation questions directly to the acquiring bank or card associations on the merchant s behalf. The PCI DSS is daunting to any merchant, the majority will want to utilize the expertise of a qualified assessor to help them through the questionnaire, point out vulnerabilities, make remediation suggestions or provide other data security information. However, in the event of a breach, the compromised merchant is obliged to undergo a complete forensics investigation conducted by a QDSC. An assessor is responsible for: Developing in-depth knowledge of the PCI DSS requirements Understing the card associations interpretation of the stard Validation Documentation including Report on Compliance (ROC) Keeping current on industry best practices Conducting quarterly annual network scans penetration tests Best Practices Developing an adequate compliance program takes time, convincing an entire university population that it s in their best interest, takes even more. However,
8 taking the initiative to begin a compliance program is the hardest part, once taken, the progress is often swift in the end, worth the effort. The best practices explained below come from real world examples of what universities have found helped them most on their journey toward compliance. The practices outlined below are only a general overview should not be relied upon without careful consideration review with a qualified data security expert. Buy-in At first glance it would seem only the finance IT departments are concerned with PCI compliance, however, the entire university needs to get involved. Without assistance from every department that accepts payment cards, a compliance manager won t know where information is located in their infrastructure, be able to enforce the necessary policies procedures, or secure the resources required to even get the program started. The compliance manager should facilitate buy-in across all departments by convincing upper-management (the Board of Regents, controllers, etc.) that their participation is crucial in convincing others of the importance of PCI compliance. An institution can achieve buy-in in a number of ways: Gather relevant information to present to upper management o Articles/Headlines discussing university breaches o Liability costs Reputation Fines Card Re-Issuance fees Forensic investigation costs Costs of notifying victims Remediation costs Create a full-time position to manage compliance or assign a complianceproject manager o Shows an institution takes compliance seriously o Employee should report regularly on progress issues to uppermanagement representative o Develop communication campaign to inform engage departments Form an e-commerce review board o Should include Treasury office, Office of Information Technology, Legal o Review department requests for e-commerce capabilities o Review departmental progress towards/maintenance of PCI compliance Create an administrative e-commerce guide o Explains university e-commerce policies procedures o Explains importance of PCI DSS the university s compliance policies Send a letter explaining the PCI DSS the university s expectations o Sent to department heads/business managers o Identify stakeholders o Inform stakeholders that PCI DSS is their responsibility o Explain consequences of non-compliance Shut down of e-commerce site by management if noncompliant Fines if breached Department on their own if breached
9 In the beginning, it s most important to identify the stakeholders in any compliance project. As harsh as it may seem, these individuals must be responsible, held accountable, for non-participation. This paves the way for open dialogue with upper management to answer any questions, helps keep the program on course. Assessment With the decentralization of merchant ID management prevalent in the university environment, a compliance manager may find it difficult to ascertain exactly how payment card or other confidential information enters their network, or where it resides once it s there. This determination is the fundamental first step to compliance It is just as important to define what an institution is NOT responsible for. For example; if a department conducts e-commerce, but uses a separate provider to actually take, transmit store cardholder information, that department s PCI obligations may decrease significantly (assuming the provider has signed the necessary third party agreement). Any compliant payment processes currently in use should be explored as possible solutions for all departments. With an understing of processes currently in place a manager can more easily assist departments in implementing the changes required. To conduct an introductory assessment, a compliance-project manager should: Make department heads accountable for their network infrastructure Meet with department heads to ascertain who is within scope of the assessment Underst e-commerce solutions currently in use Examine IP addresses merchant IDs to confirm e-commerce merchants Hire an outside assessor if necessary o Provides unbiased feedback from a Visa-qualified data security professional Weigh risks rewards of certain departments using e-commerce o For example, a student group selling t-shirts for a one-time event, is there a more appropriate payment option? While only a starting point, these meetings emphasize that the university s commitment to PCI compliance is real, that it expects the same commitment from its individual departments. This is similar to, a logical continuation of the buy-in step detailed above. Network architectures can be complex, it may be more realistic for larger universities to hire an outside assessor to complete this step. Segmentation Universities thrive on the collision of ideas one idea challenging another. To foster this environment, ideas must flow freely. This is just one way universities differ from traditional merchants with regard to PCI compliance. Whereas an e-commerce retailer can restrict access to their network lock-down everything on a need-toknow basis, universities have a special interest in keeping networks as open as possible. PCI compliance, the strong access control measures contained in the stard, do not fundamentally conflict with open networks. The PCI DSS only requires that organizations place strict access control measures on payment card information. To support open networks, but also secure assets, a compliance program should: Call for segmentation within the environment
10 o Continue open access to university resources Libraries, interest groups, etc. o Separate critical assets Payment card information, Social Security numbers, grades, etc. Restrict access to segments that contain cardholder other confidential information o Need-to-know basis o Build boundaries around segments (firewalls, IDS/IPS, etc.) A university, like a city, has a wealth of resources it wants to make available. For example; a city has a library that it wants open to all residents. To decrease the risk of stolen media material, the city hires a security guard to watch the front door; but for the most part access to the library is unrestricted as the assets are non-critical. However, the city also has critical assets. These are kept in a bank, under lock key with access granted only to certain authorized individuals. In this way ALL assets are treated in a way appropriate to their importance or relevance. Third Parties A number of university athletic departments use a third party vendor (such as Paciolan, tickets.com or Ticketmaster) for automated ticket sales. This vendor allows the upload of events, seating charts pricing. A sports fan will visit their favorite university sports team s site click on a link for tickets. The site then sends them to the vendor s online shopping cart. The vendor then hles all payment transactions, completely separate from the university s Web site network infrastructure. This is just one example, but when accepting payment cards, more likely than not, at some point in the process a university uses a third party. As mentioned above, more than half of all data security breaches occur due to third party error. In any payment card environment, it s imperative to know what third parties are performing what services that their services comply with the PCI DSS. When using a third party s products or services, an institution must: Ensure the party signs a third party agreement o Require that they meet all PCI security stards o Specifically assigning liability in the event of a breach If using a payment application, ensure the application follows Visa s Payment Application Best Practices (PABP) A university may find it best to completely outsource their e-commerce solution so that their network does not transmit, process, or store cardholder data (illustrated below in diagram 1.1). In this arrangement, a cardholder visits a university site or online storefront, which redirects them to a third party site (a HOP or Hosted Order Page provided by vendors such as CyberSource, First Data or RBSLynk) to facilitate the transaction. This does not exempt the university from PCI compliance; they still must ensure that the security posture of the server that redirects cardholders to another site is compliant. They must also sign a third party agreement with the HOP provider stipulating that the provider will hle cardholder data in a PCI compliant manner. This third party agreement requirement does not apply only to HOP configurations. Depending on the payment card environment, any number of third party vendors can be involved increasing the risk.
11 Diagram 1.1 Acquirer/Merchant Bank Card Br Card Issuer 3 rd Party Processor Payment confirmation Can be same provider in some scenarios Redirected Hosted Order Page University Consumer Training While the PCI DSS may seem mostly a technical stard, in the end, employees are the first line of defense, or the first failure point. In order to follow PCI compliant policies procedures, they must underst where they apply, how to follow them. They also need education on the proper use implementation of technology within the environment. Any environment is only as secure as its weakest link many times due to ignorance, human error, or malicious intent that link is an organization s members. Any compliance program should include yearly training sessions for staff that address: The PCI DSS importance of compliance The university s policies procedures Accepting payment cards Requesting a merchant ID Consequences should an employee or department fail to follow written policies
12 The incident response plan Resources for those using or starting e-commerce PCI compliance, risk management in general, is not a one-time event. It s cyclical, constant reassessment is necessary for any entity to stay informed of mitigate risk. Continuing education affirms this best practice keeps PCI compliance at the top of the institution s priority list. Conclusion Security breaches in the university environment are almost a weekly occurrence. These breaches impact universities just as they do corporations, despite their lying outside the corporate mold. A university s commitment to open networks, multiple merchants under one merchant agreement reliance on outside funding for resources all add complexity to the compliance process. The best practices outlined in this paper are ideals, or what would be implemented with unlimited resources, but depending on available funding, some steps may involve more time or customization. Any entity looking to start a program aimed at PCI compliance needs a realistic plan. Ideally, this plan would first call for enlisting the cooperation of its upper management by setting up an introductory meeting with the appropriate individuals. The costs of non-compliance should be laid out in detail with special emphasis on the necessity of upper management s support in gaining the cooperation of the entire university. The project manager should also meet with IT finance departments to fully explain the project their corresponding roles responsibilities. The next step involves contacting all remaining personnel to effect the necessary culture shift towards compliance. This effort will explain the process in appropriate detail, emphasize upper management support, inform those more directly affected of their responsibilities. During assessment meetings, the goal is to identify all e-commerce activity within the institution, as well as underst how that e-commerce payment card acceptance is conducted by each merchant. If applicable, involved parties need to determine which departments hold merchant IDs. If resources allow, a scan of the environment should be conducted to ensure all systems are accounted for. This scan can be performed in-house, or by a Qualified Data Security Company (QDSC). Based on information gathered from the assessment stage, PCI compliant policies procedures can be created for all departments that currently (or with plans to) accept payment cards or conduct e-commerce. Ideally, this process involves working with the IT department to create a network architecture that segments the environment, cordoning off sensitive information from systems that remain accessible to all. At this point, third parties engaged in the university s acceptance of payment cards should be closely examined renewed or changed as necessary. Finally, a training education program for all departments employees involved in payment card acceptance should be designed implemented. This program should aim to lay out specific roles responsibilities for employees departments, make them aware of any resources available should they have any questions or concerns.
13 If an institution of higher education wishes to accept payment cards, they must comply with the PCI DSS. The stard is based on best data security practices, as such will go a long way to protect all other critical assets. PCI Compliance mitigates risk, protects universities from the costs of a breach, hardens their overall security stance. When a university complies with the PCI DSS, they not only protect themselves, but also their lifeblood their students employees. Resources The Treasury Institute for Higher Education s PCI DSS Symposium ticle&sid=45 Visa Cardholder Information Security Program p.html?it=wb / Learn%20More American Express Data Security Operating Procedures (DSOP) request_type=navigate&page=datasecurityrequirements Discover Information Security Compliance (DISC)
PCI COMPLIANCE FOR HIGHER EDUCATION BEST PRACTICES CHECKLIST. Presented By: The Treasury Institute for Higher Education.
PCI COMPLIANCE FOR HIGHER EDUCATION BEST PRACTICES CHECKLIST Presented By: The Treasury Institute for Higher Education & AmbironTrustWave Pg. 1 of 10 Executive Summary This checklist is intended to help
Payment Card Industry Data Security Standard (PCI DSS) Q & A November 6, 2008
Payment Card Industry Data Security Standard (PCI DSS) Q & A November 6, 2008 What is the PCI DSS? And what do the acronyms CISP, SDP, DSOP and DISC stand for? The PCI DSS is a set of comprehensive requirements
Two Approaches to PCI-DSS Compliance
Disclaimer Copyright Michael Chapple and Jane Drews, 2006. This work is the intellectual property of the authors. Permission is granted for this material to be shared for non-commercial, educational purposes,
Frequently Asked Questions
PCI Compliance Frequently Asked Questions Table of Content GENERAL INFORMATION... 2 PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS)...2 Are all merchants and service providers required to comply
PCI Compliance: How to ensure customer cardholder data is handled with care
PCI Compliance: How to ensure customer cardholder data is handled with care Choosing a safe payment process for your business Contents Contents 2 Executive Summary 3 PCI compliance and accreditation 4
Achieving Compliance with the PCI Data Security Standard
Achieving Compliance with the PCI Data Security Standard June 2006 By Alex Woda, MBA, CISA, QDSP, QPASP This article describes the history of the Payment Card Industry (PCI) data security standards (DSS),
PCI Compliance Overview
PCI Compliance Overview 1 PCI DSS Payment Card Industry Data Security Standard Standard that is applied to: Merchants Service Providers (Banks, Third party vendors, gateways) Systems (Hardware, software)
How To Protect Visa Account Information
Account Information Security Merchant Guide At Visa, protecting our cardholders is at the core of everything we do. One of the many reasons people trust our brand is that we make buying and selling safer
PCI Compliance at The University of South Carolina. Failure is not an option. Rick Lambert PMP University of South Carolina ricklambert@sc.
PCI Compliance at The University of South Carolina Failure is not an option Rick Lambert PMP University of South Carolina [email protected] Payment Card Industry Data Security Standard (PCI DSS) Who Must
PCI Compliance Top 10 Questions and Answers
Where every interaction matters. PCI Compliance Top 10 Questions and Answers White Paper October 2013 By: Peer 1 Hosting Product Team www.peer1.com Contents What is PCI Compliance and PCI DSS? 3 Who needs
La règlementation VisaCard, MasterCard PCI-DSS
La règlementation VisaCard, MasterCard PCI-DSS Conférence CLUSIF "LES RSSI FACE À L ÉVOLUTION DE LA RÉGLEMENTATION" 7 novembre 07 Serge Saghroune Overview of PCI DSS Payment Card Industry Data Security
Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.
Payment Card Industry Data Security Standard Training Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc. March 27, 2012 Agenda Check-In 9:00-9:30 PCI Intro and History
PCI Compliance. Top 10 Questions & Answers
PCI Compliance Top 10 Questions & Answers 1. What is PCI Compliance and PCI DSS? 2. Who needs to follow the PCI Data Security Standard? 3. What happens if I don t comply? 4. What are the basic requirements
How To Protect Your Business From A Hacker Attack
Payment Card Industry Data Security Standards The payment card industry data security standard PCI DSS Visa and MasterCard have developed the Payment Card Industry Data Security Standard or PCI DSS as
PCI DATA SECURITY STANDARD OVERVIEW
PCI DATA SECURITY STANDARD OVERVIEW According to Visa, All members, merchants and service providers must adhere to the Payment Card Industry (PCI) Data Security Standard. In order to be PCI compliant,
Comodo HackerGuardian. PCI Security Compliance The Facts. What PCI security means for your business
Comodo HackerGuardian PCI Security Compliance The Facts What PCI security means for your business Overview The Payment Card Industry Data Security Standard (PCI DSS) is a set of 12 requirements intended
PAI Secure Program Guide
PAI Secure Program Guide A complete guide to understanding the Payment Card Industry Data Security Requirements and utilizing the PAI Secure Program. Letter From the CEO Welcome to PAI Secure. As you
How To Comply With The Pci Ds.S.A.S
PCI Compliance and the Data Security Standards Introduction The PCI DSS, a set of comprehensive requirements for enhancing payment account data security, was developed by the founding payment brands of
Payment Card Industry Data Security Standard
Payment Card Industry Data Security Standard Abhinav Goyal, B.E.(Computer Science) MBA Finance Final Trimester Welingkar Institute of Management ISACA Bangalore chapter 13 th February 2010 Credit Card
Worldpay s guide to the Payment Card Industry Data Security Standard (PCI DSS)
Worldpay s guide to the Payment Card Industry Data Security Standard (PCI DSS) What is PCI DSS? The 12 Requirements Becoming compliant with SaferPayments Understanding the jargon SaferPayments Be smart.
WHITE PAPER. PCI Basics: What it Takes to Be Compliant
WHITE PAPER PCI Basics: What it Takes to Be Compliant Introduction A long-running worldwide advertising campaign by Visa states that the card is accepted everywhere you want to be. Unfortunately, and through
Josiah Wilkinson Internal Security Assessor. Nationwide
Josiah Wilkinson Internal Security Assessor Nationwide Payment Card Industry Overview PCI Governance/Enforcement Agenda PCI Data Security Standard Penalties for Non-Compliance Keys to Compliance Challenges
White Paper September 2013 By Peer1 and CompliancePoint www.peer1.com. PCI DSS Compliance Clarity Out of Complexity
White Paper September 2013 By Peer1 and CompliancePoint www.peer1.com PCI DSS Compliance Clarity Out of Complexity Table of Contents Introduction 1 Businesses are losing customer data 1 Customers are learning
PCI Compliance: Protection Against Data Breaches
Protection Against Data Breaches Get Started Now: 877.611.6342 to learn more. www.megapath.com The Growing Impact of Data Breaches Since 2005, there have been 4,579 data breaches (disclosed through 2013)
Project Title slide Project: PCI. Are You At Risk?
Blank slide Project Title slide Project: PCI Are You At Risk? Agenda Are You At Risk? Video What is the PCI SSC? Agenda What are the requirements of the PCI DSS? What Steps Can You Take? Available Services
Payment Card Industry Data Security Standard
Payment Card Industry Data Security Standard Office of the State Treasurer Ryan Pitroff Banking Services Manager [email protected] PCI-DSS A common set of industry tools and measurements to help
Your guide to the Payment Card Industry Data Security Standard (PCI DSS) Merchant Business Solutions. Version 5.0 (April 2011)
Your guide to the Payment Card Industry Data Security Standard (PCI DSS) Merchant Business Solutions Version 5.0 (April 2011) Contents Contents...2 Introduction...3 What are the 12 key requirements of
The PCI DSS Compliance Guide For Small Business
PCI DSS Compliance in a hosted infrastructure A Rackspace White Paper Spring 2010 Summary The Payment Card Industry Data Security Standard (PCI DSS) is a global information security standard defined by
SecurityMetrics Introduction to PCI Compliance
SecurityMetrics Introduction to PCI Compliance Card Data Compromise What is a card data compromise? A card data compromise occurs when payment card information is stolen from a merchant. Some examples
PCI DSS Payment Card Industry Data Security Standard. Merchant compliance guidelines for level 4 merchants
Appendix 2 PCI DSS Payment Card Industry Data Security Standard Merchant compliance guidelines for level 4 merchants CONTENTS 1. What is PCI DSS? 2. Why become compliant? 3. What are the requirements?
How To Protect Your Credit Card Information From Being Stolen
Visa Account Information Security Tool Kit Welcome to the Visa Account Information Security Program 2 Contents 1. Securing cardholder data is everyone s concern 4 2. Visa Account Information Security (AIS)
Property of CampusGuard. Compliance With The PCI DSS
Compliance With The PCI DSS Today s Agenda PCI DSS Introduction How are Colleges and Universities Affected? How Do You Validate Compliance? Best Practices Q&A CampusGuard Full-Service QSA/ASV Firm We Know
05.118 Credit Card Acceptance Policy. Vice Chancellor of Business Affairs. History: Effective July 1, 2011 Updated February 2013
05.118 Credit Card Acceptance Policy Authority: Vice Chancellor of Business Affairs History: Effective July 1, 2011 Updated February 2013 Source of Authority: Office of State Controller (OSC); Office of
An article on PCI Compliance for the Not-For-Profit Sector
Level 8, 66 King Street Sydney NSW 2000 Australia Telephone +61 2 9290 4444 or 1300 922 923 An article on PCI Compliance for the Not-For-Profit Sector Page No.1 PCI Compliance for the Not-For-Profit Sector
PAYMENT CARD INDUSTRY (PCI) COMPLIANCE HISTORY & OVERVIEW
PAYMENT CARD INDUSTRY (PCI) COMPLIANCE HISTORY & OVERVIEW David Kittle Chief Information Officer Chris Ditmarsch Network & Security Administrator Smoker Friendly International / The Cigarette Store Corp
Introduction to PCI DSS Compliance. May 18, 2009 1:15 p.m. 2:15 p.m.
Introduction to PCI DSS Compliance May 18, 2009 1:15 p.m. 2:15 p.m. Disclaimer The opinions of the contributors expressed herein do not necessarily state or reflect those of the National Association of
Becoming PCI Compliant
Becoming PCI Compliant Jason Brown - [email protected] Enterprise Security Architect Enterprise Architecture Department of Technology, Management and Budget State of Michigan @jasonbrown17 History
PCI Security Compliance
E N T E R P R I S E Enterprise Security Solutions PCI Security Compliance : What PCI security means for your business The Facts Comodo HackerGuardian TM PCI and the Online Merchant Overview The Payment
VISA EUROPE ACCOUNT INFORMATION SECURITY (AIS) PROGRAMME FREQUENTLY ASKED QUESTIONS (FAQS)
VISA EUROPE ACCOUNT INFORMATION SECURITY (AIS) PROGRAMME FREQUENTLY ASKED QUESTIONS (FAQS) Q1: What is the purpose of the AIS programme? Q2: What exactly is the Payment Card Industry (PCI) Data Security
PCI DSS COMPLIANCE DATA
PCI DSS COMPLIANCE DATA AND PROTECTION EagleHeaps FROM CONTENTS Overview... 2 The Basics of PCI DSS... 2 PCI DSS Compliance... 4 The Solution Provider Role (and Accountability).... 4 Concerns and Opportunities
Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking
Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking SUMMARY The Payment Card Industry Data Security Standard (PCI DSS) defines 12 high-level security requirements directed
Cyber Security: Secure Credit Card Payment Process Payment Card Industry Standard Compliance
Cyber Security: Secure Credit Card Payment Process Payment Card Industry Standard Compliance A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Compliant? Bank Name
Merchant guide to PCI DSS
Merchant guide to PCI DSS Contents What is PCI DSS and why was it introduced?... 3 Who needs to become PCI DSS compliant?... 3 BOIPA Simple PCI DSS - 3 step approach to helping businesses... 3 What does
Payment Card Industry Data Security Standards.
Payment Card Industry Data Security Standards. Your guide to protecting cardholder data Helping you manage the risk. Credit Card fraud and data compromises are an increasingly serious problem, costing
Payment Card Industry Data Security Standard (PCI DSS) v1.2
Payment Card Industry Data Security Standard (PCI DSS) v1.2 Joint LA-ISACA and SFV-IIA Meeting February 19, 2009 Presented by Mike O. Villegas, CISA, CISSP 2009-1- Agenda Introduction to PCI DSS Overview
Accepting Payment Cards and ecommerce Payments
Policy V. 4.1.1 Responsible Official: Vice President for Finance and Treasurer Effective Date: September 29, 2010 Accepting Payment Cards and ecommerce Payments Policy Statement The University of Vermont
MasterCard PCI & Site Data Protection (SDP) Program Update. Academy of Risk Management Innovate. Collaborate. Educate.
MasterCard PCI & Site Data Protection (SDP) Program Update Academy of Risk Management Innovate. Collaborate. Educate. The Payment Card Industry Security Standards Council (PCI SSC) Open, Global Forum Founded
Cyber - Security and Investigations. Ingrid Beierly August 18, 2008
Cyber - Security and Investigations Ingrid Beierly August 18, 2008 Agenda Visa Cyber - Security and Investigations Today s Targets Recent Attack Patterns Hacking Statistics (removed) Top Merchant Vulnerabilities
PCI DSS Overview. By Kishor Vaswani CEO, ControlCase
PCI DSS Overview By Kishor Vaswani CEO, ControlCase Agenda About PCI DSS PCI DSS Applicability to Banks, Merchants and Service Providers PCI DSS Technical Requirements Overview of PCI DSS 3.0 Changes Key
A Compliance Overview for the Payment Card Industry (PCI)
A Compliance Overview for the Payment Card Industry (PCI) Many organizations are aware of the Payment Card Industry (PCI) and PCI compliance but are unsure if they are doing everything necessary. This
June 19, 2013. Bobbi McCracken, Associate Vice Chancellor Financial Services. Subject: Internal Audit of PCI Compliance.
RIVERSIDE: AUDIT & ADVISORY SERVICES June 19, 2013 To: Bobbi McCracken, Associate Vice Chancellor Financial Services Subject: Internal Audit of PCI Compliance Ref: R2013-03 We have completed our audit
What are the PCI DSS requirements? PCI DSS comprises twelve requirements, often referred to as the digital dozen. These define the need to:
What is the PCI standards council? The Payment Card Industry Standards Council is an institution set-up by American Express, Discover Financial Services, JCB, MasterCard Worldwide and Visa International
Are You Prepared to Successfully Pass a PCI-DSS and/or a FISMA Certification Assessment? Fiona Pattinson, SHARE: Seattle 2010
Are You Prepared to Successfully Pass a PCI-DSS and/or a FISMA Certification Assessment? Fiona Pattinson, SHARE: Seattle 2010 atsec information security, 2010 About This Presentation About PCI assessment
This appendix is a supplement to the Local Government Information Security: Getting Started Guide, a non-technical reference essential for elected
This appendix is a supplement to the Local Government Information Security: Getting Started Guide, a non-technical reference essential for elected officials, administrative officials and business managers.
And Take a Step on the IG Career Path
How to Develop a PCI Compliance Program And Take a Step on the IG Career Path Andrew Altepeter Any organization that processes customer payment cards must comply with the Payment Card Industry s Data Security
Payment Card Industry Compliance Overview
January 31, 2014 11:30am 12:30pm Central Hosted by: Texas.gov Presented by: Jayne Holland Barbara Brinson Payment Card Industry Compliance Overview Securing Government Payments Audio Dial In: 866-740-1260
Understanding Payment Card Industry (PCI) Data Security
Understanding Payment Card Industry (PCI) Data Security Office of the State Controller November 2010 State of North Carolina The Enemy Major Security Breaches TJ-Max Heartland Hannaford Foods BJ s Wholesale
UCSB Credit Card Processing and PCI Compliance
UCSB Credit Card Processing and PCI Compliance Sandra Featherson Associate Director of Controls Campus Credit Card Coordinator May 2011 Agenda Campus Credit Card Process Overview Terminology Approval/Acceptance
PCI DSS Presentation University of Cincinnati
PCI DSS Presentation University of Cincinnati Quick PCI Level Set Higher Ed Challenges Getting Compliant Application w/ customers Q& A PCI DSS Payment Card Industry Data Security Standard What is the PCI
PCI Data Security Standards
PCI Data Security Standards An Introduction to Bankcard Data Security Why should we worry? Since 2005, over 500 million customer records have been reported as lost or stolen 1 In 2010 alone, over 134 million
Don Roeber Vice President, PCI Compliance Manager. Lisa Tedeschi Assistant Vice President, Compliance Officer
Complying with the PCI DSS All the Moving Parts Don Roeber Vice President, PCI Compliance Manager Lisa Tedeschi Assistant Vice President, Compliance Officer Types of Risk Operational Risk Normal fraud
CREDIT CARD MERCHANT PROCEDURES MANUAL. Effective Date: 5/25/2011
CREDIT CARD MERCHANT PROCEDURES MANUAL Effective Date: 5/25/2011 Updated: May 25, 2011 TABLE OF CONTENTS Introduction... 1 Third-Party Vendors... 1 Merchant Account Set-up... 2 Personnel Requirements...
Payment Cardholder Data Handling Procedures (required to accept any credit card payments)
Payment Cardholder Data Handling Procedures (required to accept any credit card payments) Introduction: The Procedures that follow will allow the University to be in compliance with the Payment Card Industry
PCI Data Security Standard Overview and observations from the field. Andrea Del Miglio Practice Manager 28 March 2007
PCI Data Security Standard Overview and observations from the field Andrea Del Miglio Practice Manager 28 March 2007 Sample Agenda Slide 1 PCI background information 2 PCI Data Security Standard 1.1 3
Why Is Compliance with PCI DSS Important?
Why Is Compliance with PCI DSS Important? The members of PCI Security Standards Council (American Express, Discover, JCB, MasterCard, and Visa) continually monitor cases of account data compromise. These
TNHFMA 2011 Fall Institute October 12, 2011 TAKING OUR CUSTOMERS BUSINESS FORWARD. The Cost of Payment Card Data Theft and Your Business
TAKING OUR CUSTOMERS BUSINESS FORWARD The Cost of Payment Card Data Theft and Your Business Aaron Lego Director of Business Development Presentation Agenda Items we will cover: 1. Background on Payment
Your Compliance Classification Level and What it Means
General Information What are the Payment Card Industry (PCI) Data Security Standards? The PCI Data Security Standards represents a common set of industry tools and measurements to help ensure the safe
University of Dayton Credit / Debit Card Acceptance Policy September 1, 2009
University of Dayton Credit / Debit Card Acceptance Policy September 1, 2009 Effective Date of this Policy: August 1, 2008 Last Revision: September 1, 2009 Contact for More Information: UDit Internal Auditor
University Policy Accepting Credit Cards to Conduct University Business
BROWN UNIVERSITY University Policy Accepting Credit Cards to Conduct University Business Purpose Brown University requires all departments that are involved with credit card handling to do so in compliance
Agenda. Agenda. Security Testing: The Easiest Part of PCI Certification. Core Security Technologies September 6, 2007
Security Testing: The Easiest Part of PCI Certification Core Security Technologies September 6, 2007 Agenda Agenda The PCI Standard: Security Basics and Compliance Challenges Compliance + Validation =
PCI DSS. Payment Card Industry Data Security Standard. www.tuv.com/id
PCI DSS Payment Card Industry Data Security Standard www.tuv.com/id What Is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is the common security standard of all major credit cards brands.the
IT Security Compliance PCI DSS FOR MERCHANTS THE PAYMENT CARD INDUSTRY DATE SECURITY STANDARD WHITE PAPER
July 9 th, 2012 Prepared By: Mark Akins PCI QSA, CISSP, CISA WHITE PAPER IT Security Compliance PCI DSS FOR MERCHANTS THE PAYMENT CARD INDUSTRY DATE SECURITY STANDARD PCI DSS for Merchants The Payment
Clark University's PCI Compliance Policy
ï» Clark University's PCI Compliance Policy Who Should Read this Policy: All persons who have access to credit card information, including: Every employee that accesses handles or maintains credit card
Franchise Data Compromise Trends and Cardholder. December, 2010
Franchise Data Compromise Trends and Cardholder Security Best Practices December, 2010 Franchise Data Security Agenda Cardholder Data Compromise Overview Breach Commonalities Hacking Techniques Franchisee
Payment Card Industry Data Security Standards Compliance
Payment Card Industry Data Security Standards Compliance Please turn off, or to vibrate, all cell-phones/electronics Expected course length: 1 Hour Questions are welcomed. Who Created It? & What Is It?
MEETING PCI COMPLIANCE WITH SONICWALL GLOBAL MANAGEMENT SYSTEM
MEETING PCI COMPLIANCE WITH SONICWALL GLOBAL MANAGEMENT SYSTEM PCI DSS 1.1 compliance requirements demand a new level of administration and oversight for merchants, banks and service providers to maintain
CREDIT CARD MERCHANT POLICY. All campuses served by Louisiana State University (LSU) Office of Accounting Services
Louisiana State University Finance and Administrative Services Operating Procedure FASOP: AS-22 CREDIT CARD MERCHANT POLICY Scope: All campuses served by Louisiana State University (LSU) Office of Accounting
Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4
WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,
PCI: The Dark Side. May 2012 Roanoke, VA
PCI: The Dark Side May 2012 Roanoke, VA Agenda The problem Who are they? Why? What do they steal? How do they do it? What can they do with it? How can you stop it? Ron King, Ed Ko, CampusGuard CampusGuard
Puzzled about PCI compliance? Proactive ways to navigate through the standard for compliance
Puzzled about PCI compliance? Proactive ways to navigate through the standard for compliance March 29, 2012 1:00 p.m. ET If you experience any technical difficulties, please contact 888.228.0988 or [email protected]
PCI DSS 101 FOR CTOs AND BUSINESS EXECUTIVES
PCI DSS 101 FOR CTOs AND BUSINESS EXECUTIVES CUTTING THROUGH THE COMPLEXITY AND CONFUSION Over the years, South African retailers have come under increased pressure to gain PCI DSS (Payment Card Industry
Westpac Merchant. A guide to meeting the new Payment Card Industry Security Standards
Westpac Merchant A guide to meeting the new Payment Card Industry Security Standards Contents Introduction 01 What is PCIDSS? 02 Why does it concern you? 02 What benefits will you receive from PCIDSS?
The Cost of Payment Card Data Theft and Your Business. Aaron Lego Director of Business Development
The Cost of Payment Card Data Theft and Your Business Aaron Lego Director of Business Development Presentation Agenda Items we will cover: 1. Background on Payment Card Industry Data Security Standards
