Youngstown State University PCI Training enter or left click on mouse to advance slides.

Slides:



Advertisements
Similar presentations
Weighing the Risks and Benefits of Online Financial Transactions
Advertisements

An Educational Partnership of Consumer Action and Chase
JPMorgan Chase Purchasing Card Training
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely P J Human Resources Pte Ltd presents:
Compliance with Federal Trade Commission’s “Red Flag Rule”
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Operational Risks Task 13. What is CNP? CNP stands for Card Not Present and is when you order or pay for something online as you are not in front of the.
Complying With Payment Card Industry Data Security Standards (PCI DSS)
Accepting Credit Cards and PCI Compliance
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
SAFEGUARDING DHS CLIENT DATA PART 2 SAFEGUARDING PHI AND HIPAA Safeguards must: Protect PHI from accidental or intentional unauthorized use/disclosure.
Welcome to Florida International University Online J.O.B.S. Link Applicant Tutorial.
GPC Print Online Ordering System What is it? How do you use it? What are the benefits?
Presented by : Vivian Eberhardt, Supervisor Cash and Credit Operations
Warm-up: April 11 What’s the difference between a checking and savings account?
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Credit Card Fraud PRESENTED BY THE VIRGINIA OFFICE OF THE ATTORNEY GENERAL June 2013.
Why Comply with PCI Security Standards?
UConn ECE is your opportunity to take UConn courses while still in high school. The UConn ECE courses you will take are equivalent to the same course at.
Purchasing Card Record Keeping & Retention REVISED
Become an ePay Program Payments Expert!
Welcome to the Southeastern Louisiana University’s Online Employment Site Applicant Tutorial!
Banking: Checking Account What is a Checking Account? An account where money is deposited and kept for day-to-day expenses Also called demand deposit.
Banking:
EFTPOS and credit Card payments Jana Skriveris Line 4 Due: 14 th Nov Business Admin.
Information guide.
2015 ANNUAL TRAINING By: Denise Goff
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Cash Handling Cash Handling Policies and Procedures May 27, 2015.
Viterbo University Credit Card Training Updated
Online Course This online course takes approximately 30 minutes to complete. You must successfully pass the exam with an 80%. Cash Management Training.
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely presents:
Identity Protection (Red Flag/PCI Compliance/SSN Remediation) SACUBO Fall Workshop Savannah, GA November 3, 2009.
PCI COMPLIANCE Compliance is mandatory for all organizations that accept credit cards.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
Cash Handling and Funds Collection Policies and Procedures.
Credit Card Merchant Training PCI Why Now? In October 2015, there will be a fraud liability shift that will affect merchants not able to accept.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
EFTPOS and credit card payments Rachel Garcia Line 4 Due:14 th November Business Admin Michael Barry.
P URCHASING C ARD T RAINING FOR R EVIEWERS AND C ARDHOLDERS Presented by Blair Blankinship UB’s Director of Procurement.
e-Learning Module Credit/Debit Payment Card Acceptance and Security
Web deposits replace the Clemson University Receipt Transmittal, used only for CU deposits, funds With web department deposits, you can now enter.
Langara College PCI Awareness Training
Checking & Savings Accounts Economics What is a Checking Account?  Common financial service used by many consumers (a place to keep money)  Funds.
1 10/2013. This training is provided for cashiers, phone-a-thon participants, and fiscal personnel involved in payment card activities that are never.
PCI COMPLIANCE Compliance is mandatory for all organizations that accept credit cards.
Commercial Card Expense Reporting (CCER) The Trustees of Roanoke College An internet solution Accessed via Wells Fargo’s secure Commercial Electronic Office.
Payment Card Industry (PCI) Rules and Standards
I Travel Booking Training
Payment Card Industry (PCI) Rules and Standards
PCI-DSS Security Awareness
What Do I Need To Comply? A written policy for your unit detailing how you process payments; Cash Handling Training, renewed every two years; A safe,
Multnomah Education Service District
UGA Extension Credit Card Processing Training
A guide to sign-up as a Notetaker with the MU Disability Center.
Red Flags Rule An Introduction County College of Morris
Credit Card Training Updated
University of South Florida Credit Card Presentation
Fraud Prevention.
What is BankMobile? A process to select how to receive student refunds and student payroll payments It is fast, secure, and convenient. Go to:
Clemson University Red Flags Rule Training
Protecting Your Credit Identity
PCI Device Inspections
UD PCI GUIDELINES A guide for compliance with PCI DSS and the University of Delaware Payment Card Program ALWAYS Process payments immediately using a solution.
Credit Card Training Updated
Payment Card Industry Data Security Standards (PCI-DSS) Training
Presentation transcript:

Youngstown State University PCI Training enter or left click on mouse to advance slides

In response to consumer concerns with the security of credit card usage, the Payment Card Industry (PCI) council – which includes American Express, Discover, MasterCard, and Visa – has issued Payment Card Industry Data Security Standards (PCI DSS) which must be complied with by any business or organization accepting those card brands. If compliance is not maintained, Youngstown State University could lose its right to accept those cards, suffer fees, fines, permit financial harm to befall our stakeholders, and irreparably damage the University’s reputation. Part of the University’s PCI Compliance Plan is an annual PCI training conducted by the Bursar. Overview

Youtube Video 12 PCI Standards PCI Council Training Video Click on arrow button in middle of screen to begin Video

Which statement below is true? o The only person who should be presenting a credit card to you for payment is the person whose name is on the front of the card and their name is signed. o It is okay to accept a parent's credit card from a student as long as their last name matches and they can show proof of relationship. o It is okay to accept a spouse's credit card if the last names match. o It is okay to accept someone else's credit card if the person in possession of the card has a signed letter from the owner of the card and their signature. Correct Answer

Due Diligence for Employees (including Student Employees) who work with credit cards, and/or credit card machines.… The machines should be settled every night after closing. Do not allow anyone to inspect or remove the machine unless you know who they are. If your machine appears to have been tampered with, please contact Gloria Kobus, Bursar. You are required to keep the signed copy of the credit card receipt for 18 months. It is OK to hand enter credit card numbers, (phone, fax, and US mail are okay as long as the credit card number is kept secure until entered and destroyed afterwards). DO NOT accept credit card numbers taken through . If a credit card is denied, do NOT override under any circumstances (phone call from a “bank” for example). You should not accept an unsigned card. Do not accept a credit card if the signatures do not match, the card appears to have been altered or tampered with, or you are told when the card is swiped to “pick up” the card.

Which of the following are red flags for potential credit card fraud and may indicate that a closer inspection of the card or extra identification may be required? o The person using the credit card tries to distract or rush you during the sale. o The person makes a large purchase right after opening or right before closing. o A purchase is made, and the person leaves and then returns to make more purchases. o The card appears to have been altered or damaged.  All of the above.

PCI Training Video Click on arrow button in middle of screen to begin Video Youtube PCI Information

Make sure you are not storing full credit card numbers anywhere. Please double check old forms on file, old receipts, ect. Black out or destroy the credit card number. It is NOT okay to throw away old credit card receipts with full credit card numbers – PCI requirements override record retention requirements. General Reminders :

Please double check to make sure there are no Social Security numbers on old forms or stored in your computer. Do not post or display SSNs or transmit over the internet. Limit access to personal information as much as possible. Be sure to change passwords on a regular basis and never use default passwords. Secure customer records and information by locking rooms and file cabinets. If you think that you’ve had a compromise/breach (for example, a locked cabinet with credit card numbers waiting to be entered was broken into), please contact the Bursar. The Bursar will work with the department to determine the extent of the breach and may need to contact Visa etc., the local FBI, and/or U.S. Secret Service. Please make sure anyone in your department who will be working with credit cards completes this training. Just a reminder for departmental credit card users, please do not write down the credit card number for someone else to use and make sure when entering the credit card number on- line that it is only through a secure site (https). Additional Reminders!!!!

Which of the following could indicate a counterfeit credit card?  The embossing on the card is illegible or the card doesn't have an expiration date.  If the name on the card does not match the signature or there is a misspelling.  The hologram is not clear or the picture in the hologram does not move.  If the card does not start with the correct numberic digit All American Express cards start with a 3 All Visa cards start with a 4 All MasterCards start with a 5 All Discover cards start with a 6 All of the Above

Don’t Get Targeted

Average cost per breach: $5.4 million $400k on detection on escalation cost $565k on notifications $1.4 million of post breach cost $3 million on lost customer base Breaking down the avg. cost

Thank you Don’t forget !!!!! Directors/Responsible Party: complete the requirement form and return to Gloria Kobus Office of University Bursar, Meshel Hall, Room 227. Staff: complete the requirement form and give to your Director or Responsible Party. Both forms can be found at: