Accepting Credit Cards and PCI Compliance

Slides:



Advertisements
Similar presentations
Surviving the PCI Self -Assessment James Placer, CISSP West Michigan Cisco Users Group Leadership Board.
Advertisements

CARIBBEAN CREDIT CARD CORPORATION LTD.
Evolving Challenges of PCI Compliance Charlie Wood, PCI QSA, CRISC, CISA Principal, The Bonadio Group January 10, 2014.
FinTUG/VNUG 13 November Silja Serenade Secure real-time multi channel electronic payment service with NonStop By Ari Viitanen.
Navigating the New SAQs (Helping the 99% validate PCI compliance)
Zenith Visa Web Acquiring A quick over view. Web Acquiring Allows merchants to receive payments for goods and services through the Internet Allows customers.
JEFF WILLIAMS INFORMATION SECURITY OFFICER CALIFORNIA STATE UNIVERSITY, SACRAMENTO Payment Card Industry Data Security Standard (PCI DSS) Compliance.
Credit Card Compliance Regulations Mandated by the Payment Card Industry Standards Council Accounting and Financial Services.
CARD ACCEPTANCE PROCEDURES Facilitator: Kristy A Stanley Fraud and Compliance Officer June
© Vendor Safe Technologies 2008 B REACHES BY M ERCHANT T YPE 70% 1% 9% 20% Data provided by Visa Approved QIRA November 2008 from 475 Forensic Audits.
Presented by : Vivian Eberhardt, Supervisor Cash and Credit Operations
Warm-up: April 11 What’s the difference between a checking and savings account?
Debit Card Plastic card that looks like a credit card
Data Security Standard. What Is PCI ? Who Does It Apply To ? Who Is Involved With the Compliance Process ? How We Can Stay Compliant ?
How to do Business Online - Securely Presented by: Michael Gulliver First Data Regional Credit and Risk Director.
Electronic Transaction Security (E-Commerce)
Around the World, Around the Corner WorldPay for Small Business.
Why Comply with PCI Security Standards?
“Electronic Payment System”
Youngstown State University PCI Training enter or left click on mouse to advance slides.
Web Advisory Committee June 17,  Implementing E-commerce at UW  Current Status and Future Plans  PCI Data Security Standard  Questions.
Electronic Transactions for your PTA organization June 26, 2013 North Fulton Council PTA ® everychild. onevoice. ®
AS Level ICT Selection and use of input devices and input media: Capturing transaction data.
The Kent Card Supporting Direct Payments Jean Penney - Project Manager, Independent Living - KCC.
By: Piyumi Peiris 11 EDO. Swipe cards are a common type of security device used by many people. They are usually a business-card-sized plastic card with.
Become an ePay Program Payments Expert!
Visa Europe Confidential PCI DSS Protecting your business Lara Fiorani, Visa Europe Basel 25 April, 2006.
BZUPAGES.COM Electronic Payment Systems Most of the electronic payment systems on internet use cryptography in one way or the other to ensure confidentiality.
EFTPOS and credit Card payments Jana Skriveris Line 4 Due: 14 th Nov Business Admin.
CIS 342: e-Commerce Applications Prof Frye
Viterbo University Credit Card Training Updated
Confidential – For Discussion & General Information Purposes Only EMV to Card Not Present Fraud Gavin Levin, CTP eReceivables Consultant.
CREDIT CARD FRAUD. TYPES OF CREDIT CARD FRAUD Counterfeit credit card use. Card lost or stolen by the card holder. Fraud committed without the actual.
VirtualMerchant Secure Hosted Software Solution. Introducing VirtualMerchant  Complete hosted payment solution that instantly transforms PCs into “virtual”
The next generation of payments is here. Is your business ready?
Getnationwide.com Let’s Talk about EMV Danielle Rourke.
Payment Card Acceptance Security Awareness Interactive Quiz.
ThankQ Solutions Pty Ltd Tech Forum 2013 PCI Compliance.
e-Learning Module Credit/Debit Payment Card Acceptance and Security
North Carolina Office of the State Controller
VeriFone Virtual Terminal Web-Hosted Hosted Payment Gateway
Langara College PCI Awareness Training
INTRODUCTION TO SIM.DLL AGENDA SIM.DLL Overview and Features SIM.DLL Requirements Supported Terminals Transaction Flow Benefits.
Checking & Savings Accounts Economics What is a Checking Account?  Common financial service used by many consumers (a place to keep money)  Funds.
Jon Bonham, CISA, QSA Director, ERC
Salient features of facility:  Minimum amount of withdrawal Rs.100/- (thereafter in multiples of Rs.100/- ).  Maximum of Rs.1000/- per day per.
Confidential and Proprietary - NOT TO BE DISTRIBUTED WITHOUT THE EXPRESS WRITTEN PERMISSION OF BANK OF AMERICA MERCHANT SERVICES. ASTRA EMV Review/Best.
WHAT NEW, WHAT NEXT IN PAYMENT PROCESSING. EMV WHAT IS EMV? 3  An acronym created by Europay ®, MasterCard ® and Visa ®  The global standard for the.
Commercial Card Expense Reporting (CCER) The Trustees of Roanoke College An internet solution Accessed via Wells Fargo’s secure Commercial Electronic Office.
PCI COMPLIANCE & A/R AUTOMATION 101 Nodus Technologies, Inc.
North Carolina Office of the State Controller
Credit Card Compliance
Payment Card Industry (PCI) Rules and Standards
Payment Card Industry (PCI) Rules and Standards
Lesson 5.2 Banking Services and Fees
PCI-DSS Security Awareness
Credit Card Training Updated
Internet Payment.
Breaches by Merchant Type
Sage (Accpac) Partner since 1999 Sage Gold Development Partner
Own Your Identity.
UGA Extension Credit Card Processing Training
Switchover from Teledeposit to VIRTUAL TERMINAL Moneris Solutions
Financial Institutions and Services
Own Your Identity.
New Jersey Gasoline C-Store Automotive Association
Presented by: Jeff Soukup
UD PCI GUIDELINES A guide for compliance with PCI DSS and the University of Delaware Payment Card Program ALWAYS Process payments immediately using a solution.
Payment Card Industry Data Security Standards (PCI-DSS) Training
Presentation transcript:

Accepting Credit Cards and PCI Compliance What are the Requirements? Information Session

Agenda Who Key Players What PCI Compliant Why World events When Now Where All campus How Education/Work If you are a merchant that accepts credit cards cards, you are required to be compliant with the Payment Card Industry Data Security Standards or PCI DSS

Who Key Players Moneris Solutions PCI Security Standards Council (who oversee the Payment Card Information Data Security Standards (PCI DSS)) Merchants - MUN and MUN Depts

Who Moneris Solutions Moneris Solutions is a joint investment between RBC Royal Bank and BMO Bank of Montreal that was launched in December 2000. Transaction processing is their business; VISA, Mastercard, Debit They provide a full range of service and products from point of sale terminals to full e-commerce solutions. Quote from web page: “Moneris is the industry leader in payment processing because we focus all our efforts on the three key elements of payment processing - technology, innovation and people “ Moneris is the supplier to Memorial for all our credit card processing; no other company is allowed to be used.

Who PCI Security Standards Council Founded in 2006 by some of the largest credit card companies including VISA and Mastercard Responsible for PCI Security Standards The payment card companies themselves would levy any fines and penalties that arise due to non compliance. The PCI Security Standards Council is an open global forum, launched in 2006, that is responsible for the development, management, education, and awareness of the PCI Security Standards, including the Data Security Standard (PCI DSS), Payment Application Data Security Standard (PA-DSS), and PIN Transaction Security (PTS) requirements.

Who Memorial University We accept credit cards We are required to be PCI DSS Compliant

What Payment Card Information Data Security Standards (PCI DSS) Started by combining VISA and Mastercard account and cardholder security programs The result is a set of 12 requirements The PCI Data Security Standard represents a common set of industry tools and measurements to help ensure the safe handling of sensitive information. Initially created by aligning Visa's Account Information Security (AIS)/Cardholder Information Security (CISP) programs with MasterCard's Site Data Protection (SDP) program, the standard provides an actionable framework for developing a robust account data security process - including preventing, detecting and reacting to security incidents. The updated version, version 1.1, developed by the founding members of the PCI Security Standards Council, became effective with the launch of the PCI Security Standards Council. Show video http://www.youtube.com/watch?v=xpfCr4By71U https://www.pcisecuritystandards.org/merchants/index.php Look at #1 document

Why How did we get here? The electronic age makes merchants the new target for financial fraud Lax security by a merchant enables criminals to steal and use consumer financial information from payment card transactions and processing systems

Why Fraud Sony admitted that the personal details of 77M users were hacked. Winners and HomeSense parent, TJX Co. lost millions of customers information to hackers. Brock University lost personal information of donors to unauthorized access.

When Timing MUN has been “working” on this since 2007 Still working towards total compliance

Where At MUN Who is responsible? Everyone (locally to a dept; or centrally) Person who handles the hardware (credit card machine) Person who accepts a credit card as payment Person who designs a web page to accept credit cards Person who looks after MUN’s databases MUN’s Security Officer Centrally means it’s a C&C responsibility or MUN Security Officier; or Moneris Administrator; or Financial and Administrative Services Locally means the dept who has the machine; credit card acceptance is decentralized so each dept that requests to accept credit card by any method accepts this responsibility.

How What to Secure? Electronic connections/transmission Hardware – Machines Electronic storage of records Paper based storage of records What to Secure? Focus on protecting cardholder data under your control You are responsible for protecting cardholder data at the point of sale, and as it flows into the payment system. The best step you can take is to not store any cardholder data. Compliance with the PCI standard includes protecting: Card readers Point of sale systems Store networks & wireless access routers Payment card data storage and transmission Payment card data stored in paper-based records

How Types of Connections Connectivity (central responsible) Telephone lines IP lines over the internet Virtual terminal Pin pads (connected to a computer)

How Hardware – Machines Security of Hardware hand held machines It must be secure (locally) Used properly (swipe; chip) (locally) Up to date technology and security (centrally) These are the hand held machines; pin pads; portable. Behind a counter, under the counter; not in view or reach of the public. You can get a tether to have it attached. Wireless are less secure so more precautions must be taken with them. Technology and security – Moneris will ensure we have the up to date machine required. See documents # 2, 3, 4, 5 ,6

How Electronic storage of records (Centrally) Credit card numbers; CVC’s Current system do not “capture” these details Do not “manually” capture” What are reasons credit card number and details would be written down? Ask attendees.

How Security Features Chip PAN – Primary Account number Expiry date CID – Amex Magnetic stripe CA2/CID/CVC2/CVV2 (Discover/ JCB/Mastercard/Visa)

How Paper based storage of records Credit card numbers; CVC’s Never maintained (locally) If written down; ensure in secure place until shredded or at cashiers office (locally)

How Awareness Face to Face Suspicious customer behaviour Card security features and Proper processing procedures Code 10 authorizations Fraud Prevention begins with keeping your eyes and ears open. Signs of suspicious customer behaviour can include: Customer has randomly collected merchandise without the usual care Customer may appear nervous or in a hurry The customer may take the card from their pocket instead of their wallet and the signatures may not match Customer makes large, random, expensive purchases

How Credit Card itself All cards are designed with special security features to deter counterfeiting and alteration. When you are presented with a card, look for the following elements: On the front Verify the match of print and embossing Embossing Hologram Valid Date Compare account numbers On the back Signature panel Signature

… nothing is more important than keeping your customer’s payment card data secure We do not want Memorial to be a news story!

Questions/Comments/Concerns. Contact: Heather Whelan hjwhelan@mun Questions/Comments/Concerns? Contact: Heather Whelan hjwhelan@mun.ca 709-864-4391 Thanks so much for coming. If you have any questions or would like links to any of the sites or information please contact me.