SlideShare a Scribd company logo
While processing credit cards
you will be exposed to a lot of
sensitive information.
This training will show you how
to handle credit card
information in a safe and
secure manner.
Albert Gonzalez, 28
With accomplices, he was involved in data
breaches of most of the major data breaches:
Heartland, Hannaford Bros., 7-Eleven, T.J.
Maxx, Marshalls, BJ’s Wholesale Club,
OfficeMax, Barnes & Noble, Sports Authority,
Dave & Busters, Boston Market, Forever 21,
DSW and others.
Customers trust that we will
keep their account
information safe from crooks
like these.
Source:
Number of incidents per year.
Source:
Source:
Source:
Source:
Source:
Source:
Source:
1. Securing the IT environment
2. Managing and retaining data
3. Managing IT risk and compliance
4. Ensuring privacy
6. Managing System Implementations
7. Preventing and responding to computer fraud
10. Managing vendors and service providers
http://www.aicpa.org/InterestAreas/InformationTechnology/Resources/TopTechnologyInitiatives/Pages/2013TTI.aspx
Orange text are all
PCI related
https://www.youtube.com/watch?v=1boEXDVkKjU
Data Element Storage
Permitted
Protection
Required
PCI DSS 3.4
Cardholder
Data
Primary Account
Number (PAN)
Yes Yes Yes
Cardholder Name Yes Yes No
Service Code Yes Yes No
Expiration Date Yes Yes No
Sensitive
Authentication
Data
Full Magnetic
Stripe Data
No N/A N/A
CVC2 / CVV2 / CID
/ CAV2
No N/A N/A
PIN / PIN Block No N/A N/A
• Acquirer (Merchant Bank)
 Bankcard association member that initiates
and maintains relationships with merchants
that accept payment cards
• Hosting Provider
 Offer various services to merchants and
other service providers.
Card Brand
Acquirer
Hosting
Provider
Merchant
Cardholder
 Maintain standards for PCI
to provide quarterly scans
Card
Brands
PCI SSC
QSA
ASV
 Own and manage PCI DSS, including maintenance, revisions,
interpretation and distribution
 Define common audit requirements to validate compliance
 Manage certification process for security assessors and network
scanning vendors
 Establish minimum qualification requirements
 Maintain and publish a list of certified assessors and vendors
Incident Evaluation
Safe
Harbor
$$$$$$
Merchants may be subject to fines by the card associations if deemed
non-compliant. For your convenience fine schedules for Visa and
MasterCard are outlined below. (Banks no longer publish fines)
http://www.firstnationalmerchants.com/ms/html/en/pci_compliance/pci_data_secur_stand.html
Category Criteria Requirements Compliance date
Level 1
•Any merchant that has suffered a hack or an attack that resulted in
an account data compromise
•Any merchant having more than six million total combined
MasterCard and Maestro transactions annually
•Any merchant meeting the Level 1 criteria of Visa
•Any merchant that MasterCard, in its sole discretion, determines
should meet the Level 1 merchant requirements to minimize risk to
the system
•Annual Onsite Assessment1
•Quarterly Network Scan conducted by an ASV2 30 June 20123
Level 2
•Any merchant with more than one million but less than or equal to
six million total combined MasterCard and Maestro transactions
annually
•Any merchant meeting the Level 2 criteria of Visa
•Annual Self-Assessment4
•Onsite Assessment at Merchant Discretion4
•Quarterly Network Scan conducted by an ASV2
30 June 20124
Level 3
•Any merchant with more than 20,000 combined MasterCard and
Maestro e-commerce transactions annually but less than or equal to
one million total combined MasterCard and Maestro e-commerce
transactions annually
•Any merchant meeting the Level 3 criteria of Visa
•Annual Self-Assessment
•Quarterly Network Scan conducted by an ASV2 30 June 2005
Level 4 •All other merchants5 •Annual Self-Assessment
•Quarterly Network Scan conducted by an ASV2 Consult Acquirer
Assess
ReportRemediate
https://www.youtube.com/watch?v=PoQwUT31Lgg
• Clearly primary account number (16 digit PAN)
• Valid thru date
• Holographic security emblem
• Card logo (Visa)
• Cardholder's name
(Click on the credit card to check your answers)
Look at the above card. Can you find
each of the parts listed below?
Front side of card
First, lets look at the
front side of a typical
credit card.
Valid thru date
Holographic
emblem
Card logo
PAN
Now, look at the back
side of a credit card.
• Signature panel
• A 3 digit security code also called the
CVV2 number
• Magnetic stripe
(Click on the credit card to check your
answers)
Can you find each of the parts listed
below on the above card?
Back side of card
CVV2
Signature
Panel
Magnetic Strip
Have you ever
wondered what
is encoded in the
magnetic strip? • Cardholder name and address
• Account number
• Expiration date
• Special security information to detect
fraudulent cards
Once the card is swiped, this
information is electronically
relayed to the card issuer, who
then uses it to authorize the sale.
The magnetic strip contains:
Now that you know the
anatomy for Discover,
MasterCard, and Visa
cards, lets explore
American Express
card.
CID Code
The American Express card has the same safety
features as Discover, MasterCard and Visa, but a
little different structure.
The American Express's equivalent to the 3 digit
CVV2 security code is a 4 digit CID security code
which appears on the face of the card.
American Express Card
The Security number
ensures the caller actually
has a credit card in hand
when making the
purchase.
CVV2/CID number
When a customer physically hands you their card
and you swipe it in a credit card terminal, you will
not need to use the security number. This is
because when swiped through the card reader, the
terminal reads and transmits data from the
magnetic stripe which includes the CVV2/CID
security code.
CAV2/CVC2/CVV2/CID
Check out these 10
rules for credit card
security.
Credit Card Security Rules
1. Do not process transaction for other businesses or entities.
2. Don’t process cash refunds.
3. Keep the card in the customer’s line of sight.
4. Match signatures on the signed receipt to the back of the card and
the last four digits of the PAN (card number).
5. Accept only the major credit cards, or those identified by your
department. Honor customer’s choice.
6. Obtain the security code on the back of the card for all telephone
sales.
7. Write cardholder information only on designated forms.
8. Store all documents containing card holder data in a secure locked
area.
9. Never send or receive card data through e-messaging
10.Never share cardholder information outside your work environment.
Some of these rules may not
apply to your department. Each
department has a different
business process, so remember
to double check with your
supervisor if you have any
questions.
Sorry I cannot
process a credit card
and give you cash.
Refunds must be
placed on card used
for the initial
purchase.
What if someone does not have their
original card?
If a customer doesn’t have their original
card, inform them a check will be issued
for the refund amount.
Internet Transactions
It's much simpler for internet transactions
since the cardholder’s information and
card number are linked to the sale. A
refund will be automatically issued based
on the original transaction and card used.
Never enter the customer’s card information over
the phone to issue a refund for an internet
transaction.
Rule 3 applies to any
sales situation where
a customer hands
you a credit card.
Keep the card in the customer's line of sight at all times.
Do this:
• Place the card on the counter as you log
into the POS terminal.
• Hold the card up in front of you or
keeps it on the counter if you needs
both hands.
NOT this:
• Place the card below the counter
• Walk away from your station with the
customer's card
• Place the card in the drawer
• Place the card behind an object that
blocks the customer's view
Rule 4 requires you
to make sure the
signatures match.
Check the following items:
• A signature appears on the card.
• The signatures on the card and receipt look similar.
• The signature area on the card is intact and not voided.
• Color markings appear on the signature stripe.
If the signatures do not match or you have
a concern about the authenticity of the card,
call your supervisor.
Match signatures on the signed receipt to
the back of the card.
For magnetic-stripe card transactions, match
the name and last four digits of the account
number on
the card to those printed on the receipt.
Can I see your
ID please?
Accept only the
credit cards your
organization has
approved.
Make sure the logos above appear
on the card. Your department may
even limit which of these 4 cards
they accept, so make sure you find
out.
This is your last line of
defense for preventing
the fraudulent use of a
card via internet or
phone.
Obtain the security code on the back of
the card for all telephone sales.
• When you (the merchant) ask for this number, you are validating the
card is in the physical possession of the cardholder (purchaser).
• If the security number does not match the issuing bank's file, the
transaction will be declined and you will receive a message saying the
security code does not match.
The CCAV2/CVC2/CVV2/CID number should never be written down on any paper document. It can only be entered through a
terminal.
We protect your
information!
This rule pertains mostly
to telephone sales but
should be kept in mind
for all credit card
transaction.
Write cardholder data only on designated forms.
• Follow your department’s policy for
MOTO (Mail/Telephone order)
transactions.
• If MOTOs are allowed in your
department, always record the
customer's name, phone number, and
credit card number on the designated
form.
• Once the order has been placed or
recorded, all paper documents are
securely stored and destroyed when no
longer needed.
This rule applies when cardholder
data is received by mail, fax, or phone.
(Any physical copies of PAN)
Store all documents containing card holder data in a secure
locked area.
Place all order forms in a designated
restricted area under lock and key. These
documents will remain here until they are
later destroyed by designated staff.
To secure cash and credit card receipts:
• Organize credit card receipts into a
stack.
• Place the receipts inside the cash bag.
• Deliver the bag to the safe or cash
room.
Perform a search for CHD every 6 months
http://www.youtube.com/watch?v=iC38D5am7go
Under no
circumstances should
cardholder information
be sent via any
electronic format.
Never send card data through e-messaging
This includes all electronic
communication such as
emails, attachments to
emails, text messaging and
chat rooms.
Never discuss a
customer's personal
card information
outside of work.
Never share cardholder information
outside your work environment.
You can discuss at a high
level about your work with
credit cards, but never
mention specifics.
Customers are trusting you
with their sensitive account
information! Treat their
information as if it were your
own. Including SSN and
other information.
To prevent
skimming, you
should be on the
lookout for:
https://www.youtube.com/watch?v=njET6_q1hWw
Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016

More Related Content

What's hot

Ec ch5 e payment system
Ec ch5 e payment systemEc ch5 e payment system
Ec ch5 e payment system
Ahmad sohail Kakar
 
3. rupay debit card
3.  rupay debit card3.  rupay debit card
3. rupay debit card
Devi Thirupathi
 
Electronic payment System
Electronic payment SystemElectronic payment System
Electronic payment System
Rajat Sharma
 
Debit card
Debit cardDebit card
Debit card
Sanjana027
 
Marketing bab2
Marketing bab2Marketing bab2
Marketing bab2
Siti Norhanida Hairudin
 
Credit Card Fraud
Credit Card Fraud Credit Card Fraud
Credit Card Fraud
Mikael Wagner
 
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissectedamiable_indian
 
PLASTIC MONEY
PLASTIC MONEYPLASTIC MONEY
PLASTIC MONEY
ANANDHU BALAN
 
9781423903055 ppt ch11
9781423903055 ppt ch119781423903055 ppt ch11
9781423903055 ppt ch11临枫 盖
 
Emv and fraud
Emv and fraudEmv and fraud
Emv and fraud
Ujwal Tamminedi
 
Prepaid Card Fraud: Understanding the Problem, Developing a Solution
Prepaid Card Fraud:  Understanding the Problem, Developing a SolutionPrepaid Card Fraud:  Understanding the Problem, Developing a Solution
Prepaid Card Fraud: Understanding the Problem, Developing a Solution
Christopher Uriarte
 
Presentation on Debit and credit card
Presentation on Debit and credit cardPresentation on Debit and credit card
Presentation on Debit and credit card
Saadi Rahman
 
The internet banking journey in india
The internet banking journey in indiaThe internet banking journey in india
The internet banking journey in india
Mohit Negi
 
Plastic money
Plastic moneyPlastic money
Plastic money
Basat Nazir
 
Study of Online Banking Security Mechanism in India: Take ICICI Bank as an Ex...
Study of Online Banking Security Mechanism in India: Take ICICI Bank as an Ex...Study of Online Banking Security Mechanism in India: Take ICICI Bank as an Ex...
Study of Online Banking Security Mechanism in India: Take ICICI Bank as an Ex...
IOSR Journals
 
Smart Card EMV for Dummies
Smart Card EMV for DummiesSmart Card EMV for Dummies
Smart Card EMV for Dummies
Silly Beez
 
Crcards and dbcards
Crcards and dbcardsCrcards and dbcards
Crcards and dbcardsAesha Shah
 

What's hot (20)

Ec ch5 e payment system
Ec ch5 e payment systemEc ch5 e payment system
Ec ch5 e payment system
 
3. rupay debit card
3.  rupay debit card3.  rupay debit card
3. rupay debit card
 
Electronic payment System
Electronic payment SystemElectronic payment System
Electronic payment System
 
Debit card
Debit cardDebit card
Debit card
 
emv-ebook
emv-ebookemv-ebook
emv-ebook
 
Marketing bab2
Marketing bab2Marketing bab2
Marketing bab2
 
Credit Card Fraud
Credit Card Fraud Credit Card Fraud
Credit Card Fraud
 
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissected
 
PLASTIC MONEY
PLASTIC MONEYPLASTIC MONEY
PLASTIC MONEY
 
9781423903055 ppt ch11
9781423903055 ppt ch119781423903055 ppt ch11
9781423903055 ppt ch11
 
Emv and fraud
Emv and fraudEmv and fraud
Emv and fraud
 
Prepaid Card Fraud: Understanding the Problem, Developing a Solution
Prepaid Card Fraud:  Understanding the Problem, Developing a SolutionPrepaid Card Fraud:  Understanding the Problem, Developing a Solution
Prepaid Card Fraud: Understanding the Problem, Developing a Solution
 
Presentation on Debit and credit card
Presentation on Debit and credit cardPresentation on Debit and credit card
Presentation on Debit and credit card
 
The internet banking journey in india
The internet banking journey in indiaThe internet banking journey in india
The internet banking journey in india
 
Plastic money
Plastic moneyPlastic money
Plastic money
 
Plastic money
Plastic moneyPlastic money
Plastic money
 
Study of Online Banking Security Mechanism in India: Take ICICI Bank as an Ex...
Study of Online Banking Security Mechanism in India: Take ICICI Bank as an Ex...Study of Online Banking Security Mechanism in India: Take ICICI Bank as an Ex...
Study of Online Banking Security Mechanism in India: Take ICICI Bank as an Ex...
 
Smart Card EMV for Dummies
Smart Card EMV for DummiesSmart Card EMV for Dummies
Smart Card EMV for Dummies
 
Crcards and dbcards
Crcards and dbcardsCrcards and dbcards
Crcards and dbcards
 
E commerce
E  commerce E  commerce
E commerce
 

Viewers also liked

WKU PCI DSS Training
WKU PCI DSS TrainingWKU PCI DSS Training
WKU PCI DSS Training
Brent Haselhoff
 
Card fraud and compliance training
Card fraud and compliance trainingCard fraud and compliance training
Card fraud and compliance trainingethnos
 
CNT 54 Administering Windows Client
CNT 54 Administering Windows ClientCNT 54 Administering Windows Client
CNT 54 Administering Windows Client
Donald E. Hester
 
PCI-DSS for IDRBT
PCI-DSS for IDRBTPCI-DSS for IDRBT
PCI-DSS for IDRBT
Shanmugavel Sankaran
 
PCI Compliance for Hipsters
PCI Compliance for HipstersPCI Compliance for Hipsters
PCI Compliance for Hipsters
Phillip Jackson
 
PCI compliance and fraud prevention for non profits
PCI compliance and fraud prevention for non profitsPCI compliance and fraud prevention for non profits
PCI compliance and fraud prevention for non profits
NetSquared Vancouver
 
2016 Maze Live Fraud Environment
2016 Maze Live Fraud Environment2016 Maze Live Fraud Environment
2016 Maze Live Fraud Environment
Donald E. Hester
 
EI - PCI and NCI for Sales Training
EI - PCI and NCI for Sales TrainingEI - PCI and NCI for Sales Training
EI - PCI and NCI for Sales TrainingWilliam Dougherty
 
Conversational Commerce and Magento 2: Breaking new ground with Facebook, Ale...
Conversational Commerce and Magento 2: Breaking new ground with Facebook, Ale...Conversational Commerce and Magento 2: Breaking new ground with Facebook, Ale...
Conversational Commerce and Magento 2: Breaking new ground with Facebook, Ale...
Phillip Jackson
 
Introduction to Dynamic Malware Analysis ...Or am I "Cuckoo for Malware?"
Introduction to Dynamic Malware Analysis   ...Or am I "Cuckoo for Malware?"Introduction to Dynamic Malware Analysis   ...Or am I "Cuckoo for Malware?"
Introduction to Dynamic Malware Analysis ...Or am I "Cuckoo for Malware?"
Lane Huff
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
Daniel P Wallace
 

Viewers also liked (11)

WKU PCI DSS Training
WKU PCI DSS TrainingWKU PCI DSS Training
WKU PCI DSS Training
 
Card fraud and compliance training
Card fraud and compliance trainingCard fraud and compliance training
Card fraud and compliance training
 
CNT 54 Administering Windows Client
CNT 54 Administering Windows ClientCNT 54 Administering Windows Client
CNT 54 Administering Windows Client
 
PCI-DSS for IDRBT
PCI-DSS for IDRBTPCI-DSS for IDRBT
PCI-DSS for IDRBT
 
PCI Compliance for Hipsters
PCI Compliance for HipstersPCI Compliance for Hipsters
PCI Compliance for Hipsters
 
PCI compliance and fraud prevention for non profits
PCI compliance and fraud prevention for non profitsPCI compliance and fraud prevention for non profits
PCI compliance and fraud prevention for non profits
 
2016 Maze Live Fraud Environment
2016 Maze Live Fraud Environment2016 Maze Live Fraud Environment
2016 Maze Live Fraud Environment
 
EI - PCI and NCI for Sales Training
EI - PCI and NCI for Sales TrainingEI - PCI and NCI for Sales Training
EI - PCI and NCI for Sales Training
 
Conversational Commerce and Magento 2: Breaking new ground with Facebook, Ale...
Conversational Commerce and Magento 2: Breaking new ground with Facebook, Ale...Conversational Commerce and Magento 2: Breaking new ground with Facebook, Ale...
Conversational Commerce and Magento 2: Breaking new ground with Facebook, Ale...
 
Introduction to Dynamic Malware Analysis ...Or am I "Cuckoo for Malware?"
Introduction to Dynamic Malware Analysis   ...Or am I "Cuckoo for Malware?"Introduction to Dynamic Malware Analysis   ...Or am I "Cuckoo for Malware?"
Introduction to Dynamic Malware Analysis ...Or am I "Cuckoo for Malware?"
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 

Similar to Payment Card Cashiering for Local Governments 2016

PCI DSS Training compliance training for companies
PCI DSS Training compliance training for companiesPCI DSS Training compliance training for companies
PCI DSS Training compliance training for companies
gealehegn
 
Point of Sale Merchant Procedures
Point of Sale Merchant ProceduresPoint of Sale Merchant Procedures
Point of Sale Merchant Procedures
- Mark - Fullbright
 
PCI Compliance 101
PCI Compliance 101PCI Compliance 101
PCI Compliance 101
pgalletta
 
Small_Merchant_Guide_to_Safe_Payments
Small_Merchant_Guide_to_Safe_PaymentsSmall_Merchant_Guide_to_Safe_Payments
Small_Merchant_Guide_to_Safe_PaymentsSteve Abrams
 
Electronic payment by ahmad
Electronic payment by ahmadElectronic payment by ahmad
Electronic payment by ahmad
Mohd. Ahmad Siddiqi
 
Get started with card payments
Get started with card paymentsGet started with card payments
Get started with card payments
Graeme McGilliard
 
Small Businesses: Tips to Avoiding Fraudulent Chargebacks
Small Businesses: Tips to Avoiding Fraudulent ChargebacksSmall Businesses: Tips to Avoiding Fraudulent Chargebacks
Small Businesses: Tips to Avoiding Fraudulent Chargebacks
- Mark - Fullbright
 
Guide to Understanding Credit Card Processing for Merchants
Guide to Understanding Credit Card Processing for MerchantsGuide to Understanding Credit Card Processing for Merchants
Guide to Understanding Credit Card Processing for Merchants
ChloeBeckham
 
Payment gateway/payment service providers and future trends in mobile payment...
Payment gateway/payment service providers and future trends in mobile payment...Payment gateway/payment service providers and future trends in mobile payment...
Payment gateway/payment service providers and future trends in mobile payment...Danail Yotov
 
Contactless Payment Pp
Contactless Payment PpContactless Payment Pp
Contactless Payment Ppcolleneakard
 
The Target Breach – Follow The Money
The Target Breach – Follow The MoneyThe Target Breach – Follow The Money
The Target Breach – Follow The Money
Resilient Systems
 
PCI FAQs and Myths - BluePay
PCI FAQs and Myths - BluePayPCI FAQs and Myths - BluePay
PCI FAQs and Myths - BluePay
BluePayProcessing
 
Security access and payments methods
Security access and payments methodsSecurity access and payments methods
Security access and payments methodsadiabo
 
Security access and payments methods
Security access and payments methodsSecurity access and payments methods
Security access and payments methods
adiabo
 
Security access and payments methods
Security access and payments methodsSecurity access and payments methods
Security access and payments methodsadiabo
 
PCI Compliance Seminar
PCI Compliance SeminarPCI Compliance Seminar
PCI Compliance Seminardlinehan2
 
E-PAYMENT SYSTEMS.PPT.pptx
E-PAYMENT SYSTEMS.PPT.pptxE-PAYMENT SYSTEMS.PPT.pptx
E-PAYMENT SYSTEMS.PPT.pptx
SahithBeats
 
EMV: Preparing for Changes to the Retail Payment Process
EMV: Preparing for Changes to the Retail Payment ProcessEMV: Preparing for Changes to the Retail Payment Process
EMV: Preparing for Changes to the Retail Payment Process
- Mark - Fullbright
 
PCI Compliance Process
PCI Compliance ProcessPCI Compliance Process
PCI Compliance Process
BluePayProcessing
 

Similar to Payment Card Cashiering for Local Governments 2016 (20)

PCI DSS Training compliance training for companies
PCI DSS Training compliance training for companiesPCI DSS Training compliance training for companies
PCI DSS Training compliance training for companies
 
Point of Sale Merchant Procedures
Point of Sale Merchant ProceduresPoint of Sale Merchant Procedures
Point of Sale Merchant Procedures
 
PCI Compliance 101
PCI Compliance 101PCI Compliance 101
PCI Compliance 101
 
Small_Merchant_Guide_to_Safe_Payments
Small_Merchant_Guide_to_Safe_PaymentsSmall_Merchant_Guide_to_Safe_Payments
Small_Merchant_Guide_to_Safe_Payments
 
Electronic payment by ahmad
Electronic payment by ahmadElectronic payment by ahmad
Electronic payment by ahmad
 
Get started with card payments
Get started with card paymentsGet started with card payments
Get started with card payments
 
Small Businesses: Tips to Avoiding Fraudulent Chargebacks
Small Businesses: Tips to Avoiding Fraudulent ChargebacksSmall Businesses: Tips to Avoiding Fraudulent Chargebacks
Small Businesses: Tips to Avoiding Fraudulent Chargebacks
 
Show me the debit
Show me the debitShow me the debit
Show me the debit
 
Guide to Understanding Credit Card Processing for Merchants
Guide to Understanding Credit Card Processing for MerchantsGuide to Understanding Credit Card Processing for Merchants
Guide to Understanding Credit Card Processing for Merchants
 
Payment gateway/payment service providers and future trends in mobile payment...
Payment gateway/payment service providers and future trends in mobile payment...Payment gateway/payment service providers and future trends in mobile payment...
Payment gateway/payment service providers and future trends in mobile payment...
 
Contactless Payment Pp
Contactless Payment PpContactless Payment Pp
Contactless Payment Pp
 
The Target Breach – Follow The Money
The Target Breach – Follow The MoneyThe Target Breach – Follow The Money
The Target Breach – Follow The Money
 
PCI FAQs and Myths - BluePay
PCI FAQs and Myths - BluePayPCI FAQs and Myths - BluePay
PCI FAQs and Myths - BluePay
 
Security access and payments methods
Security access and payments methodsSecurity access and payments methods
Security access and payments methods
 
Security access and payments methods
Security access and payments methodsSecurity access and payments methods
Security access and payments methods
 
Security access and payments methods
Security access and payments methodsSecurity access and payments methods
Security access and payments methods
 
PCI Compliance Seminar
PCI Compliance SeminarPCI Compliance Seminar
PCI Compliance Seminar
 
E-PAYMENT SYSTEMS.PPT.pptx
E-PAYMENT SYSTEMS.PPT.pptxE-PAYMENT SYSTEMS.PPT.pptx
E-PAYMENT SYSTEMS.PPT.pptx
 
EMV: Preparing for Changes to the Retail Payment Process
EMV: Preparing for Changes to the Retail Payment ProcessEMV: Preparing for Changes to the Retail Payment Process
EMV: Preparing for Changes to the Retail Payment Process
 
PCI Compliance Process
PCI Compliance ProcessPCI Compliance Process
PCI Compliance Process
 

More from Donald E. Hester

Cybersecurity for Local Gov for SAMFOG
Cybersecurity for Local Gov for SAMFOGCybersecurity for Local Gov for SAMFOG
Cybersecurity for Local Gov for SAMFOG
Donald E. Hester
 
2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local Gov2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local Gov
Donald E. Hester
 
What you Need To Know About Ransomware
What you Need To Know About RansomwareWhat you Need To Know About Ransomware
What you Need To Know About Ransomware
Donald E. Hester
 
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
Donald E. Hester
 
2016 Maze Live Cyber-security for Local Governments
2016 Maze Live Cyber-security for Local Governments2016 Maze Live Cyber-security for Local Governments
2016 Maze Live Cyber-security for Local Governments
Donald E. Hester
 
GASB 68 and 71 Planning for the Second Year
GASB 68 and 71 Planning for the Second YearGASB 68 and 71 Planning for the Second Year
GASB 68 and 71 Planning for the Second Year
Donald E. Hester
 
Implementing GASB 72: Fair Value Measurement and Application
Implementing GASB 72: Fair Value Measurement and ApplicationImplementing GASB 72: Fair Value Measurement and Application
Implementing GASB 72: Fair Value Measurement and Application
Donald E. Hester
 
2016 Maze Live 1 GASB update
2016 Maze Live 1 GASB update2016 Maze Live 1 GASB update
2016 Maze Live 1 GASB update
Donald E. Hester
 
Cyber Security for Local Gov SAMFOG
Cyber Security for Local Gov SAMFOGCyber Security for Local Gov SAMFOG
Cyber Security for Local Gov SAMFOG
Donald E. Hester
 
Annual Maze Live Event 2016 – GASB Updates & Best Practices
Annual Maze Live Event 2016 – GASB Updates & Best Practices Annual Maze Live Event 2016 – GASB Updates & Best Practices
Annual Maze Live Event 2016 – GASB Updates & Best Practices
Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: MonitorUnderstanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...
Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: CategorizeUnderstanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Donald E. Hester
 

More from Donald E. Hester (20)

Cybersecurity for Local Gov for SAMFOG
Cybersecurity for Local Gov for SAMFOGCybersecurity for Local Gov for SAMFOG
Cybersecurity for Local Gov for SAMFOG
 
2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local Gov2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local Gov
 
What you Need To Know About Ransomware
What you Need To Know About RansomwareWhat you Need To Know About Ransomware
What you Need To Know About Ransomware
 
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
 
2016 Maze Live Cyber-security for Local Governments
2016 Maze Live Cyber-security for Local Governments2016 Maze Live Cyber-security for Local Governments
2016 Maze Live Cyber-security for Local Governments
 
GASB 68 and 71 Planning for the Second Year
GASB 68 and 71 Planning for the Second YearGASB 68 and 71 Planning for the Second Year
GASB 68 and 71 Planning for the Second Year
 
Implementing GASB 72: Fair Value Measurement and Application
Implementing GASB 72: Fair Value Measurement and ApplicationImplementing GASB 72: Fair Value Measurement and Application
Implementing GASB 72: Fair Value Measurement and Application
 
2016 Maze Live 1 GASB update
2016 Maze Live 1 GASB update2016 Maze Live 1 GASB update
2016 Maze Live 1 GASB update
 
Cyber Security for Local Gov SAMFOG
Cyber Security for Local Gov SAMFOGCyber Security for Local Gov SAMFOG
Cyber Security for Local Gov SAMFOG
 
Annual Maze Live Event 2016 – GASB Updates & Best Practices
Annual Maze Live Event 2016 – GASB Updates & Best Practices Annual Maze Live Event 2016 – GASB Updates & Best Practices
Annual Maze Live Event 2016 – GASB Updates & Best Practices
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: MonitorUnderstanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: CategorizeUnderstanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
 

Recently uploaded

一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
ehbuaw
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Congressional Budget Office
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
Get Government Grants
 
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
ehbuaw
 
2024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 362024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 36
JSchaus & Associates
 
PPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933FPPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933F
ahcitycouncil
 
PPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way StopPPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way Stop
ahcitycouncil
 
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
ehbuaw
 
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptxMHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
ILC- UK
 
ZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdfZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdf
Saeed Al Dhaheri
 
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
850fcj96
 
Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023
ARCResearch
 
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
850fcj96
 
Russian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale warRussian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale war
Antti Rautiainen
 
Many ways to support street children.pptx
Many ways to support street children.pptxMany ways to support street children.pptx
Many ways to support street children.pptx
SERUDS INDIA
 
What is the point of small housing associations.pptx
What is the point of small housing associations.pptxWhat is the point of small housing associations.pptx
What is the point of small housing associations.pptx
Paul Smith
 
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
evkovas
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
ehbuaw
 
The Role of a Process Server in real estate
The Role of a Process Server in real estateThe Role of a Process Server in real estate
The Role of a Process Server in real estate
oklahomajudicialproc1
 
PPT Item # 7 - BB Inspection Services Agmt
PPT Item # 7 - BB Inspection Services AgmtPPT Item # 7 - BB Inspection Services Agmt
PPT Item # 7 - BB Inspection Services Agmt
ahcitycouncil
 

Recently uploaded (20)

一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
 
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
 
2024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 362024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 36
 
PPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933FPPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933F
 
PPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way StopPPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way Stop
 
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
一比一原版(ANU毕业证)澳大利亚国立大学毕业证成绩单
 
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptxMHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
 
ZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdfZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdf
 
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
 
Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023
 
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
 
Russian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale warRussian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale war
 
Many ways to support street children.pptx
Many ways to support street children.pptxMany ways to support street children.pptx
Many ways to support street children.pptx
 
What is the point of small housing associations.pptx
What is the point of small housing associations.pptxWhat is the point of small housing associations.pptx
What is the point of small housing associations.pptx
 
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
 
The Role of a Process Server in real estate
The Role of a Process Server in real estateThe Role of a Process Server in real estate
The Role of a Process Server in real estate
 
PPT Item # 7 - BB Inspection Services Agmt
PPT Item # 7 - BB Inspection Services AgmtPPT Item # 7 - BB Inspection Services Agmt
PPT Item # 7 - BB Inspection Services Agmt
 

Payment Card Cashiering for Local Governments 2016

  • 1.
  • 2.
  • 3.
  • 4. While processing credit cards you will be exposed to a lot of sensitive information. This training will show you how to handle credit card information in a safe and secure manner.
  • 5. Albert Gonzalez, 28 With accomplices, he was involved in data breaches of most of the major data breaches: Heartland, Hannaford Bros., 7-Eleven, T.J. Maxx, Marshalls, BJ’s Wholesale Club, OfficeMax, Barnes & Noble, Sports Authority, Dave & Busters, Boston Market, Forever 21, DSW and others. Customers trust that we will keep their account information safe from crooks like these.
  • 7. Number of incidents per year. Source:
  • 8.
  • 13.
  • 15.
  • 17. 1. Securing the IT environment 2. Managing and retaining data 3. Managing IT risk and compliance 4. Ensuring privacy 6. Managing System Implementations 7. Preventing and responding to computer fraud 10. Managing vendors and service providers http://www.aicpa.org/InterestAreas/InformationTechnology/Resources/TopTechnologyInitiatives/Pages/2013TTI.aspx Orange text are all PCI related
  • 19.
  • 20. Data Element Storage Permitted Protection Required PCI DSS 3.4 Cardholder Data Primary Account Number (PAN) Yes Yes Yes Cardholder Name Yes Yes No Service Code Yes Yes No Expiration Date Yes Yes No Sensitive Authentication Data Full Magnetic Stripe Data No N/A N/A CVC2 / CVV2 / CID / CAV2 No N/A N/A PIN / PIN Block No N/A N/A
  • 21. • Acquirer (Merchant Bank)  Bankcard association member that initiates and maintains relationships with merchants that accept payment cards • Hosting Provider  Offer various services to merchants and other service providers. Card Brand Acquirer Hosting Provider Merchant Cardholder
  • 22.  Maintain standards for PCI to provide quarterly scans Card Brands PCI SSC QSA ASV
  • 23.
  • 24.  Own and manage PCI DSS, including maintenance, revisions, interpretation and distribution  Define common audit requirements to validate compliance  Manage certification process for security assessors and network scanning vendors  Establish minimum qualification requirements  Maintain and publish a list of certified assessors and vendors
  • 25.
  • 26.
  • 27.
  • 28.
  • 30.
  • 31.
  • 32. Merchants may be subject to fines by the card associations if deemed non-compliant. For your convenience fine schedules for Visa and MasterCard are outlined below. (Banks no longer publish fines) http://www.firstnationalmerchants.com/ms/html/en/pci_compliance/pci_data_secur_stand.html
  • 33.
  • 34.
  • 35. Category Criteria Requirements Compliance date Level 1 •Any merchant that has suffered a hack or an attack that resulted in an account data compromise •Any merchant having more than six million total combined MasterCard and Maestro transactions annually •Any merchant meeting the Level 1 criteria of Visa •Any merchant that MasterCard, in its sole discretion, determines should meet the Level 1 merchant requirements to minimize risk to the system •Annual Onsite Assessment1 •Quarterly Network Scan conducted by an ASV2 30 June 20123 Level 2 •Any merchant with more than one million but less than or equal to six million total combined MasterCard and Maestro transactions annually •Any merchant meeting the Level 2 criteria of Visa •Annual Self-Assessment4 •Onsite Assessment at Merchant Discretion4 •Quarterly Network Scan conducted by an ASV2 30 June 20124 Level 3 •Any merchant with more than 20,000 combined MasterCard and Maestro e-commerce transactions annually but less than or equal to one million total combined MasterCard and Maestro e-commerce transactions annually •Any merchant meeting the Level 3 criteria of Visa •Annual Self-Assessment •Quarterly Network Scan conducted by an ASV2 30 June 2005 Level 4 •All other merchants5 •Annual Self-Assessment •Quarterly Network Scan conducted by an ASV2 Consult Acquirer
  • 36.
  • 37.
  • 38.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60. • Clearly primary account number (16 digit PAN) • Valid thru date • Holographic security emblem • Card logo (Visa) • Cardholder's name (Click on the credit card to check your answers) Look at the above card. Can you find each of the parts listed below? Front side of card First, lets look at the front side of a typical credit card. Valid thru date Holographic emblem Card logo PAN
  • 61. Now, look at the back side of a credit card. • Signature panel • A 3 digit security code also called the CVV2 number • Magnetic stripe (Click on the credit card to check your answers) Can you find each of the parts listed below on the above card? Back side of card CVV2 Signature Panel Magnetic Strip
  • 62.
  • 63. Have you ever wondered what is encoded in the magnetic strip? • Cardholder name and address • Account number • Expiration date • Special security information to detect fraudulent cards Once the card is swiped, this information is electronically relayed to the card issuer, who then uses it to authorize the sale. The magnetic strip contains:
  • 64.
  • 65.
  • 66.
  • 67. Now that you know the anatomy for Discover, MasterCard, and Visa cards, lets explore American Express card. CID Code The American Express card has the same safety features as Discover, MasterCard and Visa, but a little different structure. The American Express's equivalent to the 3 digit CVV2 security code is a 4 digit CID security code which appears on the face of the card. American Express Card
  • 68. The Security number ensures the caller actually has a credit card in hand when making the purchase. CVV2/CID number When a customer physically hands you their card and you swipe it in a credit card terminal, you will not need to use the security number. This is because when swiped through the card reader, the terminal reads and transmits data from the magnetic stripe which includes the CVV2/CID security code. CAV2/CVC2/CVV2/CID
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80. Check out these 10 rules for credit card security. Credit Card Security Rules 1. Do not process transaction for other businesses or entities. 2. Don’t process cash refunds. 3. Keep the card in the customer’s line of sight. 4. Match signatures on the signed receipt to the back of the card and the last four digits of the PAN (card number). 5. Accept only the major credit cards, or those identified by your department. Honor customer’s choice. 6. Obtain the security code on the back of the card for all telephone sales. 7. Write cardholder information only on designated forms. 8. Store all documents containing card holder data in a secure locked area. 9. Never send or receive card data through e-messaging 10.Never share cardholder information outside your work environment. Some of these rules may not apply to your department. Each department has a different business process, so remember to double check with your supervisor if you have any questions.
  • 81. Sorry I cannot process a credit card and give you cash.
  • 82.
  • 83. Refunds must be placed on card used for the initial purchase. What if someone does not have their original card? If a customer doesn’t have their original card, inform them a check will be issued for the refund amount. Internet Transactions It's much simpler for internet transactions since the cardholder’s information and card number are linked to the sale. A refund will be automatically issued based on the original transaction and card used. Never enter the customer’s card information over the phone to issue a refund for an internet transaction.
  • 84. Rule 3 applies to any sales situation where a customer hands you a credit card. Keep the card in the customer's line of sight at all times. Do this: • Place the card on the counter as you log into the POS terminal. • Hold the card up in front of you or keeps it on the counter if you needs both hands. NOT this: • Place the card below the counter • Walk away from your station with the customer's card • Place the card in the drawer • Place the card behind an object that blocks the customer's view
  • 85. Rule 4 requires you to make sure the signatures match. Check the following items: • A signature appears on the card. • The signatures on the card and receipt look similar. • The signature area on the card is intact and not voided. • Color markings appear on the signature stripe. If the signatures do not match or you have a concern about the authenticity of the card, call your supervisor. Match signatures on the signed receipt to the back of the card.
  • 86. For magnetic-stripe card transactions, match the name and last four digits of the account number on the card to those printed on the receipt.
  • 87.
  • 88.
  • 89.
  • 90. Can I see your ID please?
  • 91.
  • 92. Accept only the credit cards your organization has approved. Make sure the logos above appear on the card. Your department may even limit which of these 4 cards they accept, so make sure you find out.
  • 93. This is your last line of defense for preventing the fraudulent use of a card via internet or phone. Obtain the security code on the back of the card for all telephone sales. • When you (the merchant) ask for this number, you are validating the card is in the physical possession of the cardholder (purchaser). • If the security number does not match the issuing bank's file, the transaction will be declined and you will receive a message saying the security code does not match. The CCAV2/CVC2/CVV2/CID number should never be written down on any paper document. It can only be entered through a terminal.
  • 95. This rule pertains mostly to telephone sales but should be kept in mind for all credit card transaction. Write cardholder data only on designated forms. • Follow your department’s policy for MOTO (Mail/Telephone order) transactions. • If MOTOs are allowed in your department, always record the customer's name, phone number, and credit card number on the designated form. • Once the order has been placed or recorded, all paper documents are securely stored and destroyed when no longer needed.
  • 96. This rule applies when cardholder data is received by mail, fax, or phone. (Any physical copies of PAN) Store all documents containing card holder data in a secure locked area. Place all order forms in a designated restricted area under lock and key. These documents will remain here until they are later destroyed by designated staff. To secure cash and credit card receipts: • Organize credit card receipts into a stack. • Place the receipts inside the cash bag. • Deliver the bag to the safe or cash room.
  • 97.
  • 98. Perform a search for CHD every 6 months
  • 100. Under no circumstances should cardholder information be sent via any electronic format. Never send card data through e-messaging This includes all electronic communication such as emails, attachments to emails, text messaging and chat rooms.
  • 101. Never discuss a customer's personal card information outside of work. Never share cardholder information outside your work environment. You can discuss at a high level about your work with credit cards, but never mention specifics. Customers are trusting you with their sensitive account information! Treat their information as if it were your own. Including SSN and other information.
  • 102.
  • 103.
  • 104.
  • 105. To prevent skimming, you should be on the lookout for:
  • 106.