Payment Card Industry - Data Security Standard (PCI-DSS) Security Policy



Similar documents
University of Sunderland Business Assurance PCI Security Policy

Technology Innovation Programme

PCI DSS Requirements - Security Controls and Processes

Becoming PCI Compliant

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C and Attestation of Compliance

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

A Rackspace White Paper Spring 2010

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C-VT and Attestation of Compliance

General Standards for Payment Card Environments at Miami University

74% 96 Action Items. Compliance

Achieving PCI-Compliance through Cyberoam

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire B and Attestation of Compliance

Payment Card Industry Data Security Standard C-VT Guide

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C and Attestation of Compliance

Project Title slide Project: PCI. Are You At Risk?

March

PCI PA - DSS. Point ipos Implementation Guide. Version VeriFone Vx820 using the Point ipos Payment Core

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire B and Attestation of Compliance

PCI PA - DSS. Point BKX Implementation Guide. Version Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core

PCI DSS v2.0. Compliance Guide

PCI Requirements Coverage Summary Table

A MERCHANTS GUIDE TO THE PAYMENT APPLICATION DATA SECURITY STANDARD (PA-DSS)

Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015

Payment Card Industry Data Security Standard Self-Assessment Questionnaire B-IP Guide

Windows Azure Customer PCI Guide

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

PCI Requirements Coverage Summary Table

Policies and Procedures

Enforcing PCI Data Security Standard Compliance

Minnesota State Colleges and Universities System Procedures Chapter 5 Administration. Guideline Payment Card Industry Technical Requirements

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Managed Hosting & Datacentre PCI DSS v2.0 Obligations

Payment Cardholder Data Handling Procedures (required to accept any credit card payments)

PLACE GROUP UK LONDON STUDENT HOUSING GROUP PAYMENT CARD INDUSTRY DATA SECURITY STANDARD COMPLIANCE STATEMENT PCI DSS (09) VERSION: 2009PCIDSSP4S01

Symposium (FBOS) PCI Compliance. Connecting Great Ideas and Great People. Agenda

Payment Card Industry (PCI) Data Security Standard ROC Reporting Instructions for PCI DSS v2.0

TREASURER S OFFICE ADMINISTRATIVE STANDARDS FOR THE TREASURER S FISCAL PROCEDURE No MERCHANT DEBIT AND CREDIT CARD RECEIPTS

Qualified Integrators and Resellers (QIR) Implementation Statement

Implementation Guide

Presented By: Bryan Miller CCIE, CISSP

Payment Card Industry (PCI) Data Security Standard. Requirements and Security Assessment Procedures. Version 3.1 April 2015

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0

PCI Compliance Training

Credit Card Security

Payment Card Industry (PCI) Compliance. Management Guidelines

PCI Compliance. How to Meet Payment Card Industry Compliance Standards. May cliftonlarsonallen.com CliftonLarsonAllen LLP

PCI DSS Compliance Guide

PCI DSS Quick Reference Guide

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire A and Attestation of Compliance

Payment Card Industry (PCI) Data Security Standard. Requirements and Security Assessment Procedures. Version 3.0 November 2013

Demystifying the Payment Card Industry - Data Security Standard

SAQ D Compliance. Scott St. Aubin Senior Security Consultant QSA, CISM, CISSP

Worldpay s guide to the Payment Card Industry Data Security Standard (PCI DSS)

PCI Data Security Standards

PCI Compliance Top 10 Questions and Answers

Parallels Plesk Panel

AISA Sydney 15 th April 2009

Why Is Compliance with PCI DSS Important?

PCI Compliance. What is New in Payment Card Industry Compliance Standards. October cliftonlarsonallen.com CliftonLarsonAllen LLP

Payment Card Industry (PCI) Data Security Standard

PCI DSS Compliance Information Pack for Merchants

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire A-EP and Attestation of Compliance

PCI DSS Quick Reference Guide Understanding the Payment Card Industry Data Security Standard version 3.1

Retail Stores Networks and PCI compliance

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C-VT and Attestation of Compliance

Accounting and Administrative Manual Section 100: Accounting and Finance

PCI Compliance. Top 10 Questions & Answers

Reducing PCI DSS Scope with the TransArmor First Data TransArmor Solution

ISO PCI DSS 2.0 Title Number Requirement

PA-DSS Implementation Guide for. Sage MAS 90 and 200 ERP. Credit Card Processing

Josiah Wilkinson Internal Security Assessor. Nationwide

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance

Miami University. Payment Card Data Security Policy

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:

Case 2:13-cv ES-JAD Document Filed 12/09/15 Page 1 of 116 PageID: Appendix A

This appendix is a supplement to the Local Government Information Security: Getting Started Guide, a non-technical reference essential for elected

PCI DSS 3.1 Security Policy

PCI DSS Requirements Version 2.0 Milestone Network Box Comments. 6 Yes

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance

Cyber Security: Secure Credit Card Payment Process Payment Card Industry Standard Compliance

Standard: PCI Data Security Standard (PCI DSS) Version: 2.0 Date: March Information Supplement: Protecting Telephone-based Payment Card Data

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Payment Card Industry Self-Assessment Questionnaire

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

Payment Card Industry (PCI) Data Security Standard

Leveraging PCI to Manage Risks of Accepting Credit Cards. Not-for-Profit Webinar Series March 10, 2015

Don Roeber Vice President, PCI Compliance Manager. Lisa Tedeschi Assistant Vice President, Compliance Officer

PCI Data Security and Classification Standards Summary

PAYMENT CARD INDUSTRY (PCI) COMPLIANCE WORKBOOK. PCI SAQ TYPE A-EP Level 4. Virtual Terminals

PDQ Guide for the PCI Data Security Standard Self-Assessment Questionnaire C (Version 1.1)

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version to 2.0

Need to be PCI DSS compliant and reduce the risk of fraud?

PA-DSS Implementation Guide: Steps to ensure that your POS system is secure

So you want to take Credit Cards!

SECTION: SUBJECT: PCI-DSS General Guidelines and Procedures

How To Protect Data From Attack On A Network From A Hacker (Cybersecurity)

SonicWALL PCI 1.1 Implementation Guide

Thoughts on PCI DSS 3.0. September, 2014

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

Visa U.S.A Cardholder Information Security Program (CISP) Payment Application Best Practices

Transcription:

Payment Card Industry - Data Security Standard () Security Policy Version 1-0-0 3 rd February 2014 University of Leeds 2014 The intellectual property contained within this publication is the property of the University of Leeds. This publication (including its text and illustrations) is protected by copyright. Any unauthorised projection, editing, copying, reselling, rental or distribution of the whole or part of this publication in whatever form (including electronic and magnetic forms) is prohibited. [Any breach of this prohibition may render you liable to both civil proceedings and criminal penalties].

Security Policy Document Ownership and Management Policy Author Kevin Darley, IT Security Co-ordinator ( Internal Security Assessor [ISA]) Policy Owner Jane Madeley, Finance Director The audience of this document should be aware that a physical copy may not be the latest available version. The latest version, which supersedes all previous versions, is available at http://www.leeds.ac.uk/informationsecurity Those to whom this Policy applies are responsible for familiarising themselves periodically with the latest version and for complying with Policy requirements at all times. Version Number Date Circulation Changes 1.0 03/02/14 Finance Website IT Website First formal issue For information in alternative formats (for example, in Braille, large print or an electronic format), please email k.j.darley@leeds.ac.uk. You can also contact us by fax 0113 343 5411 or by telephone 0113 343 1118. Security Policy Version 1-0-0 Page 2 of 11

Security Policy 1. Introduction This policy sets out the requirements which are necessary to protect the security of all credit and debit card payments received and processed by the University which are governed by the Payment Card Industry Data Security Standard (). Compliance with is mandatory for any company or organisation which stores, processes, or transmits payment cardholder data. Failure to comply with these requirements could result in the University being fined and no longer permitted to process card payments. The policy applies primarily to staff associated with the Cardholder Data Environment (CDE) 1 but extends to anyone else who processes card payments, even on a temporary basis. It will be reviewed annually as a minimum by the author and updated where necessary in accordance with the Standard to reflect changes to business objectives, risk environment, changes to the CDE and inscope systems or the University s merchant level. Prior to each publication, it will be audited and signed off by an independent Internal Security Assessor (ISA) or commissioned Qualified Security Assessor (QSA). 2 This document was approved in February 2014 by the Finance Director and Director of IT. It is recognised that there are specific processes and University Standards that need to be developed in support of the Policy. Compliance will be achieved through the University s Payment Card Security Compliance project. 2. Applicability to the University The University does not store or transmit payment card data but does process card payments which are subsequently handled by external service providers who are each certified as being compliant. The University is a Level 3 Merchant 3 which means that certification to the Standard requires the completion of an annual self-assessment questionnaire (SAQ) to demonstrate compliance. The University s CDE requires completion of SAQ C 4 requires implementation of a subset of the prescriptive controls that are required by the standard. 3. Summary of Requirements and Applicability to the University The defines the minimum criteria required for those processing card payments to become and remain compliant. This section provides a summary of the prescriptive controls as defined in Appendix 1. The Security Policy is supported by University specific documentation comprising: Network Security Standard; Systems Security Standard; Operational Security Standard; Access Control Standard; Training Standard; Incident Response Plan; and, Finance Procedures. 1 The CDE comprises all aspects of payment card transaction including the technology, electronic resources, processes and procedures. 2 ISAs and QSAs are qualified in to the same level but an ISA can only assess their employer s own compliance programme. 3 Merchants are categorised by the payment card brands dependent on the number of card transactions they process each year. The University processes between 20,000 and 1,000,000 transactions per year and have been categorised by Visa as Level 3. 4 There are 6 SAQs within the scheme. Level 2, 3 and 4 Merchants select the most appropriate SAQ based on their CDE. Level 1 Merchants do not complete an SAQ, but have to file a report on compliance (ROC) annually. Security Policy Version 1-0-0 Page 3 of 11

Security Policy These documents outline the specific requirements in each respective area to enable the University to comply and maintain compliance with the. General 1. Only those members of the University who are officially employed or engaged in a role associated with the CDE are permitted to access systems and technologies which form part of the CDE, and then only in accordance with their specific responsibilities and permissions associated with that role. 2. All changes to the CDE will be managed and controlled according to the University s Service Management Stream formal change management process. 3. Devices which are capable of storing or transmitting unencrypted data must not be connected to any system or device which forms part of the CDE, either physically or logically. Where appropriate PCs will be configured to prevent connectivity of such devices. 4. All requests for technical support for components within the CDE must be recorded with the University s Service Management Reporting Tool, so as to provide a full audit trail of incidents, faults and resolution activities. Individual Responsibilities 5. Staff processing card payments must fully comply with the University s Finance Procedure Processing of Credit and Debit Card Payments when processing all cardholder data, and adhere to the University s Information Security Policies when using any computer or component which is within the scope of the CDE. (http://www.leeds.ac.uk/finance/policies/credit_cards/index.htm and http://it.leeds.ac.uk/info/113/policies_and_information_security) 6. Computers and technologies used for or in association with the CDE are not to be used for any purpose other than official University business. 7. Privately-owned computers and other equipment (including mobile telephones, laptop computers and tablets) must not be used for the processing, storage or transmission of any cardholder data associated with any aspect of University business. Authorisation 8. No components, including individual Virtual Terminals (VTs), PIN Entry Devices (PEDs), web payment servers and tills, are to be added to or removed from the CDE without the explicit consent of the University s Deputy Finance Director. 9. Payment card data is not to be processed or stored on any computer or transmitted via any network without having first obtained the express written permission of the University s Deputy Finance Director in accordance with the University s Finance Procedures. 10. The authority of the University s Deputy Finance Director must be obtained prior to any new system or service being commissioned which will involve the processing of credit and debit card payments and all new payment applications must be PCI-PA DSS compliant. 11. Any computer and other equipment which forms part of CDE must not be connected to the wireless Security Policy Version 1-0-0 Page 4 of 11

Security Policy network without the prior written consent of the IT Security Co-ordinator. 12. The IP addresses of computers and other equipment which forms part of the CDE must not be changed without the prior written consent of the IT Security Co-ordinator. Virtual Terminals (VTs), Tills and Web Payment Servers 13. No software is to be installed on VTs, tills and servers except for software which is used for official University business and which is installed by official IT Support staff who are authorised to work on systems which form part of the CDE, or by recognised third parties who are associated with systems within the CDE. 14. Monthly checks will be undertaken of all VTs to ensure that automated anti-virus software and security patching mechanisms have been effective and that the protection remains current. 15. Security patches for operating systems and applications will be applied to systems which are in scope as part of the University s compliance programme. These will be applied within 28 days of release. Anti-virus software will be maintained on all such systems. 16. Support of VTs and servers will only be carried out by authorised computer technicians who are familiar with the specific configuration and the environment in which they are located. 17. Only authorised technicians will be permitted to remotely connect to VTs and servers and only approved software and methods will be permitted for this purpose. 18. Tills that are on the University s network will be segmented from the general University network by being placed on their own virtual local area network (VLAN) and firewall protected. 19. Where possible, tills are to be connected to the wired network. No tills are to be connected to the wireless network without approval from the IT Security Co-ordinator. 20. The Catering Systems Manager and his assigned deputy may provide technical support to the tills via authorised tools only. 21. When requested by the Catering Team, the company that supports the tills application may also remotely access the tills to provide technical support via approved means. The Catering Manager will maintain a record of such connections. Virtual Terminal Operations Areas 22. Cameras, mobile telephones (incorporating cameras) and visual, and audio recording devices must not be used in areas accommodating VTs. 23. All Alumni VTs are to be physically checked on each occasion prior to being booted up for a campaign to ensure that there is nothing which looks untoward or suspicious, such as a device connected to a USB port or spurious cables. Anything which appears suspicious must be reported immediately to the IT Security Co-ordinator. PIN Entry Devices (PEDs) 24. Only PEDs which are listed on the https://www.pcisecuritystandards.org/ website as being an Security Policy Version 1-0-0 Page 5 of 11

Security Policy approved PIN Transaction Security Device (PCI PTS) will be used within the University s CDE. 25. PEDs are only to be connected to the Siemens University PABX or Public Switched Telephone Network (PSTN) lines. They must not be connected to voice over IP (VOIP) systems or the University s wired or wireless networks without the recorded written consent of the IT Security Coordinator. 4. Requirements The is based upon 12 technical and operational requirements which are mandated by the PCI Security Standards Council as prescriptive controls. Those controls which are mandated by the Standard, and which are applicable to the University s merchant status in accordance with SAQ C can be found at Appendix 1. Security Policy Version 1-0-0 Page 6 of 11

Security Policy Appendix 1 Applicable Policy Requirements The defines the minimum criteria required for those processing card payments to become and remain compliant. This section outlines the minimum requirement which need to be implemented in order for a Level 3 Merchant to be compliant with the Standard in accordance with the requirements of SAQ C. Policy Undertaking Requirement 1 Install and maintain a firewall configuration to protect cardholder data 1.2 Firewall and router configurations shall restrict connections between un-trusted networks and any system components in the CDE. 1.2.1 Inbound and outbound traffic shall to be restricted to that which is necessary for the CDE. 1.2.3 Perimeter firewalls must be installed between any wireless networks and the CDE, and configured to deny or control (as applicable) any traffic from the wireless environment into the CDE. 1.3 Direct public access between the Internet and any system component in the CDE is prohibited. 1.3.1 A DMZ must be implemented to limit inbound traffic to only system components that provide authorized publicly accessible services, protocols, and ports. Direct connections inbound or outbound for traffic between the Internet and the CDE is not 1.3.3 allowed. 1.3.5 Unauthorized outbound traffic from the CDE to the Internet is not allowed. 1.3.6 Stateful inspection (dynamic packet filtering) must be implemented. Requirement 2 Do not use vendor-supplied defaults for system passwords and other security parameters 2.1 Vendor-supplied defaults must be changed before installing a system on the network, including but not limited to passwords, simple network management protocol (SNMP) community strings, and elimination of unnecessary accounts. 2.1.1 The wireless vendor defaults for wireless environments connected to the CDE must be changed before connectivity, including but not limited to default wireless encryption keys, passwords, and SNMP community strings. 2.2.2 Only necessary and secure services, protocols and daemons as required for the function of the system are to be enabled. 2.3 All non-console administrative access must be encrypted using strong cryptography. Technologies such as SSH, VPN, or SSL/TLS must be used for web-based management and other non-console administrative access. Requirement 3 Protect stored cardholder data 3.3 The Primary Account Number (PAN) will be masked when displayed. Requirement 4 Encrypt transmission of cardholder data across open, public networks 4.1 Strong cryptography and security protocols (for example, SSL/TLS, IPSEC, SSH) must be used to safeguard sensitive cardholder data during transmission over open, public networks. 4.1.1 Wireless networks transmitting cardholder data or connected to the CDE, must use industry best practices to implement strong encryption for authentication and transmission. 4.2 PANs must not be sent by unprotected end-user messaging. Security Policy Version 1-0-0 Page 7 of 11

Security Policy Requirement 5 Use and regularly update anti-virus software or programs 5.1 Anti-virus software must be deployed on all systems commonly affected by malicious software. 5.1.1 Ensure that all utilised anti-virus programs used are capable of detecting, removing, and protecting against known types of malicious software. 5.2 All anti-virus mechanisms must be current, actively running, and generating audit logs. Requirement 6 Develop and maintain secure systems and applications 6.1 All system components and software are to be protected from known vulnerabilities by having the latest vendor-supplied security patches installed. Critical security patches must be installed within one month of release. Requirement 7 Restrict access to cardholder data by business need to know 7.1 Access to system components and cardholder data must be limited to only those individuals whose job requires such access. Access limitations must include the following: 7.1.1 Access rights to privileged user IDs will be restricted to the least privileges necessary to perform job responsibilities. 7.1.2 Assignment of privileges must be based on individual personnel s job classification and function. Requirement 8 Assign a unique ID to each person with computer access 8.3 Where applicable, two-factor authentication will be used for remote access (network-level access originating from outside the network) to the network by employees, administrators, and third parties. (For example, remote authentication and dial-in service (RADIUS) with tokens; terminal access controller access control system (TACACS) with tokens; or other technologies that facilitate two-factor authentication). 8.5.6 Accounts used by vendors for remote access must only be enabled when needed and must be monitored when in use. Requirement 9 Restrict physical access to cardholder data 9.6 All cardholder data must be physically secure. 9.7 Strict control is to be maintained over the internal and external distribution of any kind of media. 9.7.1 Media must be classified so the sensitivity of the data can be determined. 9.7.2 The media must be sent by secure courier or by another delivery method that can be accurately tracked. 9.8 Management must approve any and all media that is moved from a secured area. 9.9 Strict control must be maintained over the storage and accessibility of media. 9.10 All media must be destroyed when it is no longer needed for business or legal reasons as follows: 9.10.1 Shred, incinerate, or pulp hardcopy materials so that cardholder data cannot be reconstructed. Requirement 10 Track and monitor all access to network resources and cardholder data Security Policy Version 1-0-0 Page 8 of 11

Security Policy 10.0 There are no controls in section 10 as part of SAQC. Requirement 11 Regularly test security systems and processes 11.1 Tests are to be undertaken on a quarterly basis for the presence of wireless access points and to detect any unauthorized wireless access points. 11.2 Both internal and external network vulnerability scans must be performed at least quarterly 5 and after any significant change to systems which form part of the CDE or which support payment card transactions. 11.2.1 Perform quarterly internal vulnerability scans. 11.2.2 Perform quarterly external vulnerability scans via an Approved Scanning Vendor (ASV), approved by the Payment Card Industry Security Standards Council (PCI SSC). 11.2.3 Perform internal and external scans after any significant change 6. Requirement 12 Maintain a policy that addresses information security for all personnel 12.1 The University s Security Policy shall accomplish the following: 12.1.1 Addresses all applicable PCI DSS requirements. 12.1.3 Include a review at least annually and updates when the environment changes. 12.2 Daily operational security procedures must comply with the Operational Security Standard. 12.3 Usage policies for critical technologies, which define proper use of these technologies, have been developed which: 12.3.1 Require explicit approval by authorized parties. 12.3.2 Stipulate authentication requirements for use of the technology. 12.3.3 List of all such devices and personnel with access. 12.3.5 Define acceptable uses of the technology. 12.3.6 Define acceptable network locations for the technologies. 12.3.8 Automatic disconnect sessions for remote-access technologies after a specific period of inactivity. 12.4 Information security responsibilities for all personnel are clearly defined within the security policy and procedures. 12.5 The following information security management responsibilities are to be assigned to an individual or team: 12.5.3 Establish, document, and distribute security incident response and escalation procedures to ensure timely and effective handling of all situations. 12.6 A formal security awareness program which is designed to make all personnel aware of the importance of cardholder data security has been implemented. 12.6.1 Personnel are required to undertake security awareness training upon hire and at least annually. 12.6.2 That there is an established process for engaging service providers including proper due diligence prior to engagement. 5 Note: It is not required that four passing quarterly scans must be completed for initial PCI DSS compliance if the assessor verifies 1) the most recent scan result was a passing scan, 2) the entity has documented policies and procedures requiring quarterly scanning, and 3) vulnerabilities noted in the scan results have been corrected as shown in a re-scan. For subsequent years after the initial PCI DSS review, four passing quarterly scans must have occurred. 6 Note: Quarterly external vulnerability scans must be performed by an Approved Scanning Vendor (ASV), approved by the Payment Card Industry Security Standards Council (PCI SSC). Scans conducted after network changes may be performed by internal staff. Security Policy Version 1-0-0 Page 9 of 11

Security Policy 12.8 Policies and procedures to manage service providers must be implemented and maintained. These are to include: 12.8.1 A maintained list of service providers. 12.8.2 A written agreement that includes an acknowledgement that the service providers are responsible for the security of cardholder data the service providers possess. 12.8.3 There is an established process for engaging service providers including proper due diligence prior to engagement. 12.8.4 That there is a program to monitor service providers PCI DSS compliance status at least annually. Security Policy Version 1-0-0 Page 10 of 11

Security Policy Appendix 2 - Glossary CDE PA-DSS PCI PCI SSC PED POI PTS VT Cardholder Data Environment - The people, processes and technology that store, process or transmit cardholder data or sensitive authentication data, including any connected system components. PCI DSS Payment Application Data Security Standard. Acronym for Payment Card Industry. Payment Card Industry Data Security Standard. Payment Card Industry Security Standards Council. PIN entry device. Acronym for Point of Interaction, the initial point where data is read from a card. An electronic transaction-acceptance product, a POI consists of hardware and software and is hosted in acceptance equipment to enable a cardholder to perform a card transaction. The POI may be attended or unattended. POI transactions are typically integrated circuit (chip) and/or magnetic-stripe card-based payment transactions. Payment Card Industry PIN Transaction Security, PTS is a set of modular evaluation requirements managed by PCI Security Standards Council, for PIN acceptance POI terminals. Please refer to www.pcisecuritystandards.org. A virtual terminal is web-browser-based access to an acquirer, processor or third party service provider website to authorize payment card transactions, where the merchant manually enters payment card data via a securely connected web browser. Unlike physical terminals, virtual terminals do not read data directly from a payment card. Because payment card transactions are entered manually, virtual terminals are typically used instead of physical terminals in merchant environments with low transaction volumes. Security Policy Version 1-0-0 Page 11 of 11