Introductions 1 min 4



Similar documents
EMV and Small Merchants:

EMV FAQs. Contact us at: Visit us online: VancoPayments.com

EMV and Restaurants: What you need to know. Mike English. October Executive Director, Product Development Heartland Payment Systems

A Guide to EMV. Version 1.0 May Copyright 2011 EMVCo, LLC. All rights reserved.

Preparing for EMV chip card acceptance

toast EMV in 2015: How Restaurants Can Prepare for the New Chip-and-Pin Standard

EMV and Restaurants What you need to know! November 19, 2014

EMV : Frequently Asked Questions for Merchants

Heartland Secure. By: Michael English. A Heartland Payment Systems White Paper Executive Director, Product Development

What is EMV? What is different?

EMV Frequently Asked Questions for Merchants May, 2014

EMV Chip and PIN. Improving the Security of Federal Financial Transactions. Ian W. Macoy, AAP August 17, 2015

What Merchants Need to Know About EMV

Payment Card Industry (PCI) Data Security Standard. PCI DSS Applicability in an EMV Environment A Guidance Document Version 1

THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP

Fundamentals of EMV. Guy Berg Senior Managing Consultant MasterCard Advisors

EMV's Role in reducing Payment Risks: a Multi-Layered Approach

The Adoption of EMV Technology in the U.S. By Dave Ewald Global Industry Sales Consultant Datacard Group

Payments Transformation - EMV comes to the US

OpenEdge Research & Development Group April 2015

Implication of EMV Migration for the U.S. Transportation Industry. May 1, Implication of EMV Migration for the U.S. Transportation Industry

EMV in Hotels Observations and Considerations

Visa Recommended Practices for EMV Chip Implementation in the U.S.

U.S. Bank. U.S. Bank Chip Card FAQs for Program Administrators. In this guide you will find: Explaining Chip Card Technology (EMV)

CPIM Academy. Cash 257 Merchant Services and Revenue Collection

How Secure are Contactless Payment Systems?

Fiscal Service EMV Education Series EMV-Compliant Point-of-Sale Card Acceptance for Federal Agencies. Fiscal Service / Vantiv July 27, 2015

EMV and Chip Cards Key Information On What This Is, How It Works and What It Means

Chip Card (EMV ) CAL-Card FAQs

Emerging Trends in the Payment Ecosystem: The Good, the Bad and the Ugly DAN KRAMER

Understand the Business Impact of EMV Chip Cards

Euronet s EMV Chip Solutions Superior Protection with Enhanced Security against Fraud

Mobile Near-Field Communications (NFC) Payments

Credit Card Processing Overview

FUTURE PROOF TERMINAL QUICK REFERENCE GUIDE. Review this Quick Reference Guide to. learn how to run a sale, settle your batch

Your Reference Guide to EMV Integration: Understanding the Liability Shift

EMV EMV TABLE OF CONTENTS

FOR A BARRIER-FREE PAYMENT PROCESSING SOLUTION

Changing Consumer Purchasing Patterns. John Mayleben, CPP SVP, Technology and Product Development Michigan Retailers Association

Card Network Update Chip (EMV) Acceptance in the United States At-A-Glance

Secure Payments Framework Workgroup

welcome to liber8:payment

THE ROAD TO U.S. EMV MIGRATION Information and Strategies to Help Your Institution Make the Change

CardControl. Credit Card Processing 101. Overview. Contents

The Canadian Migration to EMV. Prepared By:

The Merchant and EMV: What You Need to Know to Prepare for the Magstripe to EMV Transition

How to Prepare. Point of sale requirements are changing. Get ready now.

A RE T HE U.S. CHIP RULES ENOUGH?

Why You Should Adopt EMV Chip Card Technology

A Guide to EMV Version 1.0 May 2011

Enhancing Payment Card Security New Measures to be Phased in from 2 nd Quarter 2010 to 1 st Quarter 2011

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:

What Issuers Need to Know Top 25 Questions on EMV Chip Cards and Personalization

EMV FAQs for developers

EMV: A to Z (Terms and Definitions)

E M V I M P L E M E N TAT I O N T O O L S F O R S U C C E S S, P C I & S E C U R I T Y. February 2014

EMV and Encryption + Tokenization: A Layered Approach to Security

U.S. Smart Card Migration: Stripe to EMV Claudia Swendseid, Federal Reserve Bank of Minneapolis Terry Dooley, SHAZAM Kristine Oberg, Elavon

INTRODUCTION AND HISTORY

M/Chip Functional Architecture for Debit and Credit

FOR A BARRIER-FREE PAYMENT PROCESSING SOLUTION

Tokenization: FAQs & General Information. BACKGROUND. GENERAL INFORMATION What is Tokenization?

Mitigating Fraud Risk Through Card Data Verification

The Impact of Emerging Payment Technologies on Retail and Hospitality Businesses. National Computer Corporation

Card Technology Choices for U.S. Issuers An EMV White Paper

U.S. EMV Debit Implementation Guidelines for POS Acquirers

EMV ADOPTION AND ITS IMPACT ON FRAUD MANAGEMENT WORLDWIDE

Payment Methods. The cost of doing business. Michelle Powell - BASYS Processing, Inc.

Electronic Payments Part 1

Visa U.S. Merchant EMV Chip Acceptance Readiness Guide. 10 Steps to Planning Chip Implementation for Contact and Contactless Transactions

EMV Acquiring at the ATM: Early Planning for Credit Unions

Digital Payment Solutions TSYS Enterprise Tokenization:

PROTECT YOUR BUSINESS FROM LOSSES WHILE ACCEPTING CREDIT CARDS

Card Payments Roadmap in the United States: How Will EMV Impact the Future Payments Infrastructure?

Prevention Is Better Than Cure EMV and PCI

NCR CONNECTED PAYMENTS The vision for payment acceptance in restaurants

MasterCard Special Edition

Credit card: permits consumers to purchase items while deferring payment

American Express Contactless Payments

EMV mobile Point of Sale (mpos) Initial Considerations

Guide to Payment Processing

Visa U.S. Merchant EMV Chip Acceptance Readiness Guide. 10 Steps to Planning Chip Implementation for Contact and Contactless Transactions

ACQUIRER OR ACQUIRING BANK A financial institution (often a bank) where a merchant has an account to process transactions and card payments

Transcription:

1

2

1 Minute 3

Introductions 1 min 4

5

2 Minutes Briefly Introduce the topics for discussion. We will have time for Q and A following the webinar. 6

Randy - EMV History / Chip Cards /Terminals 5 Minutes The EMV specification, originally named for Europay, MasterCard and Visa, is a global standard for interoperable credit and debit payment cards, point-of-sale (POS) payment terminals and transaction processing networks based on chip card technology. 1965 Eurocard 1992 Merged with Eurocheque to form Europay In 2002 Europay International merged with MasterCard International to form MasterCard, Inc. Today the company is known as MasterCard Worldwide. JCB (Japan Credit Bureau) 2004 AMEX 2009 China Union Pay 2013 Discovercard Later in 2013 7

Randy As these Card Brands (e.g. Visa, Mastercard, etc.) gained prominence in their regions, problems began to arise as these brands began to do business in the international marketplace. Travelers and consumers need to use these cards abroad. Furthermore, as a multitude of new technologies grow, so did the programmatic methodology for using these typs of cards. Thus, EMVCo was formed. EMVCo exists to facilitate worldwide interoperability and acceptance of secure payment transactions. Wherein, each of these brands is a separate entity with the sole purpose of handling payment card transactions, EMVCo is an international standards body, formed by the card brands for the purpose of creating, among other things, operational standards. For instance, prior to their existence every different company had a different rollout methodology for EMV cards, and was building their own solution that was not interoperable with other cards. (Wild Wild West) Some of the roles of EMVco are: Payment card and terminal evaluation 8

Performing security evaluation of hardware Management of interoperability issues (standardization) Contactless Specifications Common Payment Application Tokenization Contact Chip Specifications 8

Randy Chip cards, also known as smart cards, contain embedded microprocessors that provide strong transaction security features and other application capabilities not possible with traditional magnetic stripe cards. The EMV specifications also provide for new, highly efficient transaction methods that cannot be achieved with traditional magnetic stripe cards. These include contact and contactless transactions as well as mobile payment operations. 9

Ways to represent an account with allowing only an account number Go Card Smart Destinations Advantages: Read Write Access application block application unblock card block external authenticate (7816-4) generate application cryptogram get data (7816-4) get processing options internal authenticate (7816-4) PIN change / unblock read record (7816-4) select (7816-4) verify (7816-4). 10

Randy What are Chip and Pin Cards? The chip uses cryptography to talk securely with the credit card terminal and can require a PIN number to complete the transaction. Configured by the issuing bank. Randy to find stats on % pin adoption. Jerry discuss the more technical details Card authentication: Transactions require an authentic card validated either online using a dynamic cryptogram or offline using Static Data Authentication (SDA) or Dynamic Data Authentication (DDA). Cardholder Verification Method (CVM): The CVM ensures that the person attempting to make the transaction is the person to whom the card belongs using Online PIN, Offline PIN, Signature, or no CVM. (Varying degrees of CVM today. 3 or 4 digits numbers CVV, even last 4 digit CVM (not very effective) Online and Offline Authorization: EMV transactions are authorized based on security parameters established by the issuer. 11

Randy Chip Cards can only be processed at an EMV terminal Mag Swipe Backup for non functioning Chip In most cases these EMV terminals will support Contact less Using NFC (Near Field Communication) Apple Pay Google Wallet Visa Pay Wave Mastercard Pay Pass American Express Express Pay Discover Zip 12

Does anyone in the room have an Integrated Circuit Credit Card? 5% adoption US in 2013 What is my wallet? Up to 50% adoption by the end of the year? Compare Expiration Dates 13

14

Randy I can give you 4 compelling reasons. You do not want your attraction to be on this list. Does anyone know how many Credit cards will stolen during these 4 data breaches? 200 Million Credit Cards were stolen from these 4 companies alone in large card present data breaches Target over 40 million cards in a breach that lasted under 20 days. Including over 70 million PII records There were some large card not present breaches as well to Play Station Network and others 15

Randy Why else should my attractions care about EMV Remember EMVco? In 2008, it was estimated that US travelers experienced nearly 10 Million mag swipe related issues when traveling abroad totaling nearly half a billion dollars 16

17

Randy First, lets talk about Card Present vs Non Card Present fraud 18

Randy First, lets talk about Card Present vs Non Card Present fraud UK Stats 2004-2011 73% Drop of counterfeit mag swipe 56% drop from lost or stolen cards 33% Overall drop Worldwide Credit Card fraud eclipsed $11 Billion in 2012 EMV only protects your attraction from Card Present (CP) fraud and not Card Not Present (CNP) fraud. In 2012 CP Fraud accounted for almost $800 Million in the United States EMV Payment Cards protect merchants by making counterfeit cards nearly impossible to manufacture Requires a fraudster to manufacture a legitimate looking physical credit card with Chip Added risk of fraudster presenting such card In 2012, US accounted for 47.3% of the worldwide payment card fraud losses but generated only 23.5% of total volume. 19

Tangent conversation Source of this fraud came from POS breaches to begin with Cutting off the supply for the fraudsters Examples in our industry: Online CNP fraud far outweighs onsite CP fraud: -Russia stolen cards -lists -San Diego Zoo on demand purchase stolen credit card 19

Switch speakers to Jerry to hit this home: - Every time there is a major national data breach, I am talking to 20 customers asking how to get credit cards out of the system. - -Most attractions just want the data security that comes along with the more secure EMV process But aside from the primary goal of being able to accept a chip card, there is a second and arguably more important benefit of adopting EMV at POS data security. Many of the recent data breaches in the U.S. have exploited security weaknesses in the POS system (PC or software) to capture credit card data that had passed through the POS. So, it makes sense that if you can prevent the POS from ever having access to sensitive card data, there would be nothing for the hackers to gain in the event of a breach. And this is exactly what some implementations of EMV support the ability to keep all sensitive payment card data out of your system. 20

Jerry 21

Jerry In order to understand the upcoming liability shift, we need to define some terminology 22

In order to understand the upcoming liability shift, we need to define some terminology 23

Jerry Before we dive into what the liability shift is, let s ask a question. At your attraction today, who gets left holding the bag when a fraudulent transaction occurs? Your Attraction Issuing Bank Card Brand 24

Jerry 25

Jerry 26

Jerry 27

Jerry 28

Jerry 29

Jerry 30

31

Jerry Remember: EMV Liability is only for Card Present (CP) Transactions Your attraction will only be responsible for fraudulent transactions if a customer presents an EMV Payment Card from an Issuing Bank and fraud occurs on EMV Terminalls Will Guests arrive with EMV Cards? Presently there are over 1 Billion Payment Cards in the United States (610 million credit cards, and 520 million debit cards) Current adoption rate is about 5% of domestic cards Cost to issue EMV Payment Cards is expected to be $1.5 Billion 32

Jerry What is your current amount of CP chargebacks What amount of those chargebacks is fraud related typically about 15% (not friendly fraud 49%) What is your expected ROI with calculated expected fraud increase vs. cost of implementation, training, sustainment? Will the fraud go up? Over how many years? Sustainment costs? Other Costs? 33

Jerry What happens if we do not adopt and a Bank issues a non EMV card which has fraud 34

35

Jerry Vs 1.6 Billion from Issuing Banks 36

Jerry 37

Jerry Currently, many installations use a basic USB or serially-connected magnetic stripe reader like the one pictured above. Used in the pre-emv fully-integrated payment solution with a POS or Cash Register, there is nothing specific about the mag stripe reader that limits its use with any particular software, merchant, or payment processor. It is merely a way to get the credit card magnetic stripe track data back into the POS, after which it is sent to your payment processor. The most common purchase flow is that upon completion of entering the items into the POS transaction, the guest hands the credit card to the POS operator, who swipes the card, and returns it to the guest. 38

Jerry Or, a stand alone unit is used without any integration to a POS or a Cash Register. 39

Jerry Going forward, an EMV-compliant payment terminal like the one pictured above will need to be deployed anywhere you take a payment card, which will be a considerable investment for merchants. Unlike the mag stripe reader, the payment terminal needs to be key-injected by its manufacturer or reseller, and will be configured specifically to work only with a certain merchant, certain encryption keys, and a certain payment processor. Also unlike the magnetic stripe reader, the EMV-compliant payment terminal is guestoperated. The payment card never leaves the guest s hands in an EMV transaction. 40

Jerry A non-integrated EMV payment solution is one where the POS system and the EMV payment terminal are not connected in any way. In this model, after ringing up a sale on your POS, your POS operator needs to manually enter the requested sale amount on a disconnected payment terminal. The payment terminal has its own network connection, and goes directly to the payment host for authorization. No data flows between the POS and payment terminal, ever. While this is great for insulating your system from sensitive payment card data, it adds a time-consuming and error-prone extra step in your sales process, and provides no journalization in your sales system. In this model, your POS, and the PC it resides on, are thought to be PCI out-of-scope, due to the fact that no sensitive card data is ever exposed to the POS. 41

Jerry A semi-integrated EMV payment solution is one where a limited amount of information flows between the POS system and the payment terminal, but the payment terminal will never return sensitive data, like a full credit card number, for example. In this model, your POS operator rings up the sale as normal, and then selects a non-cash Form of Payment (FOP) that requires authorization. The FOP selection causes the POS to send a request to the payment terminal (represented by arrow #1 above), passing it a limited amount of data, such as the requested transaction amount, the type of transaction (sale, refund), and perhaps a transaction ID. The payment terminal has its own display and prompts the guest to insert their chipped credit card, and then requests authorization directly from the payment host (represented by arrow #2) via the payment terminal s own network connection. After the payment terminal receives its response from the payment host (arrow #3), a response message is sent to the POS from the payment terminal (arrow #4), but it s very important to note that the interface back to the POS does not support the ability to pass sensitive information. A full credit card number cannot be passed back into the POS. Based on the response message, the POS knows whether the payment request was successful, or if a second payment should be attempted with a different FOP. Similar to the non-integrated model, in this semi-integrated model, your POS, and the PC is resides on, are thought to be PCI out-of-scope, due to the fact that no sensitive card data is ever exposed to the POS. 42

Jerry A fully-integrated EMV payment solution is one where the EMV payment terminal communicates only with the POS system. In this model, the POS uses the EMV payment terminal to read the chip card, but then brings all data back into the POS system, with the requirement that the POS system, and not the payment terminal, contact the payment host for authorization. If you use a mag-stripe reader to process credit cards in POS today, this is an example of a fully-integrated payment solution. And although most fully-integrated EMV solutions provide the ability to encrypt the data at time of capture before sending it to the POS, the POS and the PC running it are now thought to be PCI in-scope. The risk of a breach yielding sensitive card data from a fully-integrated solution is minimized, but not eliminated, by the use of encryption. Because the POS and its PC now being in PCI scope, the development and certification efforts for POS vendors would be greater, and often will also require our customers to perform merchant-level certifications prior to being allowed to process production payment requests. 43

Jerry Encryption utilizes a key to alter data, and in theory, a party would require the matching decryption key to restore the data to its original state. In terms of credit card processing, end to end encryption (E2EE) describes the process whereby card data is encrypted the moment it s captured by the payment terminal, and it remains encrypted until it arrives at the payment host (e.g. Paymentech). With E2EE, even if a malicious party was able to intercept network traffic, they would still not see any sensitive data in clear text. POS systems are generally not permitted to use encrypted credit card information for the purpose of subsequent sales (e.g. storing encrypted credit card data for recurring payments in a payment plan after the initial down payment). Tokenization is a representation of sensitive credit card data, allowing subsequent payment authorization requests to be made when the physical card is no longer present. A common use of a payment token is to permit automatic recurring payments, without requiring the guest to be present with their card for those payments. A token can be used instead of a credit card number, however, tokens are merchant specific, meaning, if a hacker accessed your system and was able to acquire payment tokens, those tokens would be worthless to those attempting to process a payment outside of your merchant system. 44

Jerry Hardware Costs The hardware cost to roll-out an EMV terminal everywhere that you can accept a credit card. Final pricing is not yet available on the various payment terminals, but as a very rough rule of thumb, assume a minimum of $500 per payment terminal. If you have 100 POS locations from which you can complete a credit card sale, you ll likely have a minimum of $50,000 in terminal purchases. Network The network infrastructure costs to support separate, secure network access everywhere you plan to deploy an EMV payment terminal. Credit Card Visibility The effect of not having full credit card data in your system. As an example, do you receive reports from your payment provider regarding fraudulent card usage, and do you have a need to look up other usages of that card in your POS system? Recurring Payments Do you use payment plans for some products, and if so, are those products sold online, in person, or both? Security concerns over keeping card data in your system. Your current fraud losses at the POS. If your losses are lower than the cost to adopt 45

EMV, and your security concerns are low, you may decide to delay EMV adoption. Compatibility Do the terminals work with your POS system, and other systems Terminal Configuration The terminals require code injection to work properly 45

46

Pros and Cons table Randy to come up with something 20% of the population will not know their PIN 47

Pros and Cons table Randy to come up with something 20% of the population will not know their PIN 48

49