Ball State University

Similar documents
Administration and Department Credit Card Policy

Subject: Protecting cardholder data in support of the Payment Card Industry (PCI) Data Security Standards

OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE

Credit Card Handling Security Standards

Payment Card Acceptance Administrative Policy

Subject: Protecting cardholder data in support of the Payment Card Industry (PCI) Data Security Standards

Payment Card Industry Data Security Standards (PCI DSS) Initial Training

Payment Card Security Policy

COLORADO STATE UNIVERSITY Financial Procedure Statements FPI 6-6

CREDIT CARD PROCESSING AND SECURITY

BUSINESS POLICY. TO: All Members of the University Community 2016:07. Credit Card Processing and Security Policy (Supersedes Policy 2009:05 & 2012:12)

Payment Card Industry Training 2014

UNL PAYMENT CARD POLICIES AND PROCEDURES. Table of Contents

PAI Secure Program Guide

PCI Training. If your department processes credit card information, it is CRITICAL that you understand the importance of protecting this data.

PCI Compliance and Payment Card Processing Policy

The University of Michigan Treasurer s Office Card Services. Merchant Services Policy Document

Clark University's PCI Compliance Policy

Campus Administrative Policy

PAYMENT CARD INDUSTRY

Q: What is PCI? Q: To whom does PCI apply? Q: Where can I find the PCI Data Security Standards (PCI DSS)? Q: What are the PCI compliance deadlines?

Visa s Approach to Card Fraud and Identity Theft

CASH HANDLING. These procedures apply to any individual handling or processing University or Auxiliary Organization cash or cash equivalents.

Amstar Brands Payment Methods Manual. First Data Locations

PCI FAQ Q: What is PCI? ALL process, store transmit Q: To whom does PCI apply? Q: Where can I find the PCI Data Security Standards (PCI DSS)?

What is PCI Compliance?

VPSS Certification Frequently Asked Questions

Business Practices Seminar April 3, 2014

Credit Card Acceptance and Processing Procedures

Payment Card Industry Data Security Standards (PCI DSS) Awareness Training

minimise card fraud in your business.

Payment Card Industry Compliance Policy

Merchant Services Card Acceptance and Reference Guide

Merchant Payment Card Processing Guidelines

WEBINAR. Five Steps to PCI Compliance. Madeline Long. Ron Demmans. Download these slides at Director of Sales Solveras

Event Merchant Card Services

Securing Credit Card Data at UB (complying with Payment Card Industry Data Security Standards)

Global Visa Card-Not-Present Merchant Guide to Greater Fraud Control. Protect Your Business and Your Customers with Visa s Layers of Security

Application of Policy. All University faculty, staff, and third party service providers.

PCI 101: Transaction Volumes and Validation Requirements. By Chip Ross January 4, 2019

PCI security standards: A high-level overview

2.1.3 CARDHOLDER DATA SECURITY

protect fraudulent against transactions your business Introduction What is a fraudulent transaction? Merchant Responsibilities Card Present

Table of Contents. Overview. What is payment processing? Who s Who. Types of Payment Solutions. Online Transactions. Interchange Process

Credit Card Processing Best Practices

CASH HANDLING PROCEDURES

Administration Policy

Data Breach Financial Protection Program Terms and Conditions

CARD ISSUER DUTIES & RESPONSIBILITIES. Copyright 2013 CO-OP Financial Services

PayPal Website Payments Pro and Virtual Terminal Agreement

Tips for Preventing Credit Card Fraud and Avoiding Chargebacks

Indiana University Payment Card Merchant Agreement

PCI-DSS for Credit Unions

Before debiting the Cardholder, the Merchant shall conduct the checks specified below.

CASH HANDLING PROCEDURES

TERMS FOR THE PARTICIPATION IN CARD SCHEMES

University of Illinois Community Credit Union Consumer Remote Deposit Anywhere Terms & Conditions

American Express Data Security Operating Policy Thailand

Payment Processing 101

A report showing the merchant s settlement. The acquirer settlement report is generated by the acquiring bank at the end of every billing cycle.

Rules for Visa Merchants Card Acceptance and Chargeback Management Guidelines

F ISCAL ACCOUNTABILITY PROCEDURES PROCEDURE 3.4 CASH HANDLING OVERVIEW ADMINISTRATIVE PROCEDURES. Adopted Date: 08/02/2014 Revised Date: 10/12/2017

CREDIT CARD PROCESSING OPERATIONS GUIDE. Guide for merchants using Bank of America Merchant Services (BAMS)

NATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE

Selected Terms & Conditions for Wells Fargo Business Debit, ATM and Deposit Cards

Cyber ERM Proposal Form

Bursar s Office University Department Cash Receipting System Users. Updated 03/16/2018

MERCHANT MEMBER PACKAGE AGREEMENT & APPLICATION

ADDENDUM TO BANGOR ONLINE INTERNET BANKING AGREEMENT:

NAPBS BACKGROUND SCREENING AGENCY ACCREDITATION PROGRAM ACCREDITATION STANDARD AND AUDIT CRITERIA Version 2.0. Potential Verification for Onsite Audit

HIPAA Compliance Guide

REGULATIONS for the processing of card payments.

How to combat card fraud. A guide to detecting and preventing card fraud

A to Z Jargon buster. Call +44 (0) to discuss your upgrade options

DELHAIZE AMERICA PHARMACIES AND WELFARE BENEFIT PLAN HIPAA SECURITY POLICY (9/1/2016 VERSION)

Suncorp MPOS. Terms and Conditions for a Suncorp Merchant Facility

Card Processing Guide Merchant Operating Instructions

RentWorks Version 4 Credit Card Processing (CCPRO) User Guide

Cash Handling Policy & Procedures

Suncorp Bank EFTPOS. Terms and Conditions for a Suncorp Merchant Facility

CARD PROGRAM SERVICES. Terms and Conditions (Merchant Agreement)

Mobile Check Deposit Disclosure & Agreement

Eclipse Credit Card Authorization. Release (Eterm)

card fraud business Helpful information for Merchants Avoiding card fraud

SureRent 2020 Private Landlord Tenant Screening Application Package

Your Merchant Facility and Managing Risk

Clydesdale Bank and Yorkshire Bank Merchant Services

Compute Managed Services Schedule to the Products and Services Agreement

Cyber Risk Proposal Form

2009 North49 Business Solutions Inc. All rights reserved.

Solar Eclipse Credit Card Authorization. Release 9.0.4

H 7789 S T A T E O F R H O D E I S L A N D

TRAVEL CARD PROGRAM POLICY AND PROCEDURES. West Chester University

Loaded Everyday card terms and conditions

BOQ MERCHANT FACILITY

Data Security Addendum for inclusion in the Contract between George Mason University (the University ) and the Selected Firm/Vendor

Merchant Operating Guide: Payment Processing Solutions

Cyber-Insurance: Fraud, Waste or Abuse?

No refunds will be granted In cases of extenuating circumstances, refunds will be granted solely on the decision of St Paul Greek Orthodox Church

CARDNET. Card payments made easy for you and your customers

Transcription:

PCI Data Security Awareness Training Agenda What is PCI-DSS PCI-DDS Standards Training Definitions Compliance 6 Goals 12 Security Requirements Card Identification Basic Rules to Follow Myths 1

What is PCI-DSS? The Payment Card Industry Data Security Standards (PCI-DSS) are regulations that were created to ensure safe handling of sensitive information and to protect cardholder data. The PCI Council was established in 2006 by Visa, MasterCard, Discover, and American Express 2

Why Have Standards To protect the credit card brands reputation as a secure method of payment To protect customer cardholder data To establish consistency for any entity accepting credit and debit cards Importance of Training While processing credit cards you will be exposed to a lot of sensitive information that is protected by law. This training will show you how to handle credit card information in a safe and secure manner. 3

Training Training is required for all campus personnel who have access to credit card information As a processor of credit card transactions; or Reviewers of reports that contain credit card data Training is required upon employment and annually PCI-DSS Definitions Cardholder Customer to whom a card is issued or individual authorized to use the card Cardholder Data Cardholder Validation Value or Code Compromise Encryption Full magnetic stripe or the Primary Account Number (PAN) plus any of the following Primary Account Number Cardholder Name Expiration Date Service Code Data element on a card s magnetic stripe that uses secure cryptographic process to protect data integrity on the stripe, and reveals any alteration or counterfeiting. Intrusion into computer system where unauthorized disclosure, modification, or destruction of cardholder data is suspected. Process of converting information into an unintelligible form except to holders of a specific key. Use of encryption protects information between the encryption process and the decryption process against unauthorized disclosure. 4

PCI-DSS Definitions Firewall Information Security Hardware, software, or both that protect resources of one network from intruders from other networks. Protection of information to insure confidentiality, integrity and availability Magnetic Stripe Merchant Data encoded in the magnetic stripe is used for authorization during transactions when the card is presented. Any person/business that accepts payments by debit or credit cards Issuer Bank or other organization issuing a payment card on behalf of a Payment Brand (e.g. MasterCard & Visa) or Payment Brand issuing a payment card directly (e.g. Amex, Discover, JCB) PCI-DSS Definitions POS Service Code Vulnerability Scan Point of Sale. Hardware and/or software is used to process payment card transactions at merchant locations Three or four digit number on the magnetic stripe that specifies acceptance requirements and limitations for a magnetic stripe read transaction Scans used to identify vulnerabilities in operating systems, services and devices that could be used by hackers to target the university s private network PAN Primary Account Number is the payment card number (credit or debit) that identifies the issuer and the particular cardholder account. Also referred to as the Account Number 5

Who Must Comply with PCI? Any organization that accepts, processes, or transmits cardholder data. This includes Compliance with PCI-DDS Since Ball State accepts payment cards, the university is subject to PCI DSS standards Adhering to the standards is not optional There are significant financial costs to non compliance It only takes one incident of data compromise to put the university at risk Non compliance is not worth the risk 6

Compliance with PCI-DDS Failure to comply with PCI DSS can result in stiff contractual penalties or sanctions from members of the payment card industry including: Fines of $500,000 per data security incident Fines of $50,000 per day for non compliance with published standards Liability for all fraud losses incurred from compromised account numbers Liability for the cost of re issuing cards associated with the compromise Suspension of merchant accounts Campus PCI-DDS Merchants All Ball State merchants must be PCI DSS compliant and are responsible for ensuring their compliance It applies to all payments channels, including in person, mail, telephone order and e commerce 7

PCI-DDS Goals The 6 Goals of PCI DDS Build and Maintain a Secure Network Protect Cardholder Data Maintain a Vulnerability Management Program Implement Strong Access Control Measures Regularly Monitor and Test Networks Maintain an Information Security Policy PCI-DSS 12 Security Requirements Build and Maintain a Secure Network Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not use vendor supplied defaults for system passwords and other security parameters Protect Cardholder Data Requirement 3: Protect stored cardholder data Requirement 4: Encrypt transmission of cardholder data across open, public networks Maintain a Vulnerability Management Program Requirement 5: Use and regularly update anti virus software Requirement 6: Develop and maintain secure systems and applications 8

12 Security Requirements Strong Access Control Measures Requirement 7: Restrict access to cardholder data by business need to know Requirement 8: Assign a unique ID to each person with computer access Requirement 9: Restrict physical access to cardholder data Regularly Monitor and Test Networks Requirement 10: Track and monitor all access to network resources and cardholder data Requirement 11: Regularly test security systems and processes Maintain an Information Security Policy Requirement 12: Maintain a policy that addresses information security Credit Card Processing Example Card Present Transaction: Every request receives a response that directs the acquirer or the merchant on how to proceed with the transaction (Approve or Deny) Seven Steps Cardholder provides credit card account to merchant Merchant s bank asks credit card to determine cardholder s bank Credit card authorization system checks card security features and sends to cardholder s bank for approval 1 2 3 Cardholder completes purchase and receives receipt Merchant's bank sends approval to merchant 7 Credit card bank sends approval to merchant s bank 6 Cardholder s bank approves purchase 5 4 9

Card Identification Features VISA card logo All VISA account numbers start with a 4, MasterCard starts with a 5 and Discover starts with a 6. Embossing should be clear and uniform in size and spacing. The number on the front and back of the card, plus the one printed on the sales receipt should all match. VISA Holographic emblem 3 digit security code also called the CVV2 number. Card expiration month and year. Do not accept a card after the expiration date. Only the person whose name is embossed on a VISA is entitled to use it. Magnetic stripe containing identification, PAN and special security information. The signature on the back of the card should match the customer s signature on the receipt. The signature panel is tamper evident. American Express Card Identification Features The letters AMEX and a phosphorescence in the Centurion portrait are visible under an ultraviolet light. Pre printed (non embossed) Card Identification Number (CID) should always appear above the account number. Card expiration month and year. Do not accept a card after the expiration date. Only the person whose name is embossed on an American Express Card is entitled to use it. All American Express account numbers start with a 3. Embossing should be clear and uniform in size and spacing. The number on the front and back of the card, plus the one printed on the sales receipt should all match. With this statement on the card, American Express reserves the right to pick up the card at any time. Some cards have a hologram of the American Express image embedded into the magnetic stripe. The signature on the back of the card should match the customer s signature on the receipt. The signature panel is tamper evident. 10

Importance of CVV2/CID Visa, MasterCard and Discover 3 digit CVV2/CID number American Express CID 4 digit number The CVV2/CID number ensures the caller actually has a credit card in hand when making a purchase. When a customer physically hands you their card and you swipe it in a credit card terminal, you will not need to use the CVV2/CID number. Do you know why? The terminal reads and transmits data from the magnetic strip which includes the CVV2/CID security code. Processing Computers Computers used for processing payments should only be used for processing payments Should never be used for non work related processing such as e mail should not be stored or executed on payment processing computers Only authorized activity should be executed Absolutely no personal or authentication data can be stored on the computer 11

Point of Sale Registers Identify any third party claiming to be maintenance or a repair person for payment card devices before granting them access to the device Review their credentials and work order Call the business they are representing Before installing or replacing a received payment card device (or allowing a third party to do so) receive acceptance verification from your supervisor Pay close attention to any suspicious behavior around a payment card device. For example plugging something into the wall around or in the same room as the payment card device. Opening the device If you detect this report it immediately to your supervisor Ball State Procedures Contact the Controller s Office when considering any changes to your credit card system PCI Questionnaire and Scans Daily Batch Settlements (covering and cross training in case of absences) Daily Transmittals and Reconciliations Retention policy Incident response Background checks 12

Basic Credit Card Security Rules Keep the card in the customer s line of sight at all times. Match signatures on the signed receipt to the back of the card. Accept only the 4 major credit cards, or those identified by your department. Write cardholder information only on designated forms. Obtain the security code on the back of the card for all telephone sales. Store all documents containing cardholder data in a secure locked area. Process refunds to the card used for the original purchase. Never share cardholder information outside your work environment. Never send or receive card data through e messaging. (ie. Email, e mail attachments, texting or chat rooms.) Note: Some of the rules may not apply to your department since each department may have different business processes. Always check with supervisor when you are not sure. Basic Credit Card Security Rules Keep the Card in the Customer s Line of Sight at All Times DO s Place the card on the counter as you log into the POS terminal. Hold the card up in front of you or keep it on the counter if you need to use both hands. DO NOT s Place the card below the counter Walk away with the customer s card or leave it sitting on the counter Place the card in a drawer Lastly, do not place the card behind anything that would block the customer s view of seeing their card 13

Basic Credit Card Security Rules Match signatures on the signed receipt to the back of the card Verify a signature appears on the card Verify the signatures on the card and the receipt look a like. Verify the signature area on the card is intact and not voided. Verify the color markings on the signature stripe are there. If you have any concerns or the signatures do not match contact your supervisor. Basic Credit Card Security Rules Obtain the Security Code on the Back of the Card for all Telephone Sales When you ask for the security code you are validating the card is in the physical possession of the cardholder. If the CVV2/CID number does not match the issuing bank s file, the transaction will be declined. The CVV2/CID number should never be written down on a paper document. The CVV2/CID number can only be entered through a terminal. 14

Basic Credit Card Security Rules Write Cardholder Data Only on Designated Forms If Mail/Phone order transactions are permitted in your department. Then record: Customer s name Phone number Credit card number Once the order has been placed or recorded all paper documents should be securely shredded in cross shedder or securely stored if the department s Mail/Phone procedure permits Credit Card Security Rules Store All Documents Containing Card Holder Data in a Secure Locked Area To secure cash and credit card receipts: Organize credit card receipts into a stack Place the receipts inside a cash bag Deliver the bag to the safe or cash room Order forms should only remain in a restricted area under lock and key until the forms can be destroyed by a designated individual. 15

Credit Card Security Rules Process Refunds to the Card Used for the Original Transaction If the original order was an internet transaction the cardholder s information and card number will be linked to the order. A refund will be automatically issued based on the information recorded. Do NOT enter a customer s card information over the phone to issue a refund for an internet transaction. If a customer does not have their original card when requesting a refund inform them a check will be issued for the refund amount. Credit Card Security Rules Do Not Discuss Cardholder Information Outside of Your Work Area Do not discuss a customer and their credit card anywhere outside of the designated work area This includes the break room, hallway or at lunch Do not discuss or send any card data through e messaging This includes e mails, e mail attachments, texting, chat rooms or any social media 16

PCI DDS Myths? Myth 1 One vendor and product will make us compliant No single vendor or product fully addresses all 12 requirements of PCI DSS Myth 2 Outsourcing card processing makes us compliant Outsourcing simplifies but does not provide automatic compliance We must ensure providers comply with PCI standards Request a certificate of compliance annually from providers Myth 3 PCI compliance is an IT project The IT staff implements technical and operational aspects PCI compliance is an ongoing process of assessment, remediation, reporting PCI DDS Myths? Myth 4 PCI will make us secure Successful completion of a scan or assessment is ONLY a snapshot in time Security exploits are NON STOP and get stronger every day PCI compliance efforts are a continuous process of assessment and remediation to ensure safety of cardholder data Myth 5 PCI is unreasonable; it requires too much Most aspects of PCI DSS are a common best practice for security Myth 6 PCI requires us to hire a Qualified Security Assessor PCI DSS provides the option of doing an internal assessment with an officer sign off if acquirer and/or merchant bank agree 17

PCI DDS Myths? Myth 7 We don t take enough credit cards to be compliant PCI compliance is required for any business that accepts payment cards even if the quantity of transactions is just one Myth 8 We completed a SAQ so we re compliant Technically, this is true for merchants who are not required to do on site assessments for PCI DSS compliance. True security of cardholder data requires non stop assessment and remediation to ensure the likelihood of a breach is kept as low as possible. Myth 9 PCI makes us store cardholder data Both PCI DSS and the payment card brands strongly discourage storage of cardholder data by merchants and processors PCI DDS Myths? Lastly. Myth 10 PCI is too hard Understanding PCI DSS can seem daunting, especially for merchants without security or a large IT department However, PCI DSS mostly calls for good, basic security 18

Great Job! You re all done! 19