SlideShare a Scribd company logo
1 of 45
[object Object],Payment Card Industry Data Security Standards
What is PCI & PCIDSS ,[object Object],[object Object],[object Object]
Why is PCI compliance important? ,[object Object],[object Object],[object Object],[object Object],[object Object]
How Could Cardholder Information be Compromised?   ,[object Object],[object Object],[object Object]
Who Must Comply with the PCI Data Security Standards? ,[object Object],[object Object],[object Object]
PCI Data Security Standards Defined by the Card Associations Require Merchants to: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
1. Build and Maintain a Secure Network ,[object Object]
2. Protect Cardholder Data ,[object Object],[object Object]
3. Maintain a Vulnerability Management Program to Protect Stored Data. ,[object Object],[object Object],[object Object],[object Object]
4. Install Antivirus Software.   ,[object Object]
5. Regularly Monitor and Test Networks. ,[object Object],[object Object]
6. Maintain an Information Security Policy.   ,[object Object]
Merchant Levels of Compliance  Level 1 – Any merchant-regardless of acceptance channel-processing over 6,000,000 Visa transaction per year. Any merchant that has suffered a hack or an attack that resulted in an account data compromise. Any merchant that Visa, at its sole discretion, determines should meet the Level 1 merchant requirements to minimize risk to the Visa system Any merchant identified by any other payment card brand as level 1.  Level 2 –Any merchant-regardless of acceptance channel-processing 1,000,000 to 6,000,000 Visa transactions per year. eCommerce merchants  (1m trans/yr – 6M trans/yr) Must comply & pass third party audits ,[object Object],[object Object]
Merchant Levels of Compliance  Level 3 – Any Merchant processing 20,000 to 1,000,000 Visa e-commerce transaction per year. Required to comply ,[object Object],[object Object],Level 4 –All other merchants-regardless of acceptance channel-processing up to 1,000,000 Visa transactions per year.  And all merchant processing fewer than 20,000 Visa e-commerce transactions per year,
Level 1 – Large Retail Merchants Level of compliance is determined by merchant’s size ,[object Object],[object Object],[object Object],All merchants (regardless of size) are subject to annual audits and quarterly scans if they have a compromised data situation. Large Retail Merchants  (Wal-Mart, Target, etc)
Level 1 – Large Retail Merchants Validation Action Validated By Due Date Annual On-site PCI Data Security Assessment Qualified Data Security Company of Internal Audit if signed by Office of the Company 9/30/2004 Quarterly Network Scan Qualified Independent Scan Vendor New Level 1 merchants have up to one year from identification to validate
Level 2 - Mid/Large Merchants ,[object Object],[object Object],[object Object]
Level 2 - Mid/Large Merchants Validation Action Validated By Due Date Annual On-site PCI Self-Assessment Questionnaire Merchant Current Quarterly Network Scan Qualified Independent Scan Vendor New Level 2 merchants: 9/30/2007
Level 3 – Mid/Low Merchants ,[object Object],[object Object],[object Object]
Level 3 – Mid/Low Merchants Validation Action Validated By Due Date Annual On-site Self-Assessment Questionnaire Merchant Current Quarterly Network Scan Qualified Independent Scan Vendor 6/30/2005
Level 4 - Small Merchants ,[object Object],[object Object],[object Object]
Level 4* - Small Merchants *The PCI DDS requires that all merchants perform external network scanning to achieve compliance. Acquirers may require submission of scan reports and/or questionnaires by level 4 merchants. Validation Action Validated By Due Date Annual On-site PCI Self-Assessment Questionnaire Merchant Current Quarterly Network Scan Qualified Independent Scan Vendor Validation requirements and dates are determined by the merchant’s acquirer
POS Software Developers must be PABP Compliant Merchant’s software can  never store the CVV data ,[object Object],[object Object],[object Object],[object Object]
POS Software Developers must be PABP Compliant ,[object Object],[object Object]
How do you know which POS Software Complies with PABP Standards? ,[object Object]
Why Should Merchants Comply with PCI Standards? ,[object Object],[object Object],[object Object]
Potential Cost to a Merchant for a Compromise ,[object Object],[object Object],[object Object],[object Object],First Violation Second Violation Third Violation $50,000 $100,000 Management discretion
Summary of Steps to Compliance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Visa Alerts 10:54:07 by David Press ,[object Object],[object Object]
Visa alerts ,[object Object]
Credit Firms Push to Thwart Fraud ,[object Object],[object Object],[object Object]
An article appeared in the September 25th edition of the  Wall Street Journal   ,[object Object]
An article appeared in the September 25th edition of the  Wall Street Journal   ,[object Object]
An article appeared in the September 25th edition of the  Wall Street Journal   ,[object Object]
Case Study: The POS System Attacker Retail Store Processor Corporate Internet
Compromise Statistics: Industry SpiderLabs data is gathered from more than 140 card compromise cases. Food Service Industry represents the majority of the compromises. Cases By Industry
Compromise Statistics: Acceptance Cases by Card Acceptance About 4 out of every 5 cases is a traditional Brick and Mortar environment. Card Present Merchants are not aware of these risks!
Compromise Statistics: System Type Majority of the cases involved a compromise of a Software based POS system. None of these systems were Visa PABP or PCI DSS compliant. Cases By System Type
Compromise Statistics: Connectivity All Internet connectivity should be considered high risk.  SpiderLabs has tracked a trend in migration from T1 and Dial-Up to DSL/Cable.  Cases By Connectivity
Compromise Statistics: Error Merchant Error vs. 3rd Party Error Half of the compromises were caused by a fault in the service provided by a 3rd party to a Merchant . POS Developers, Integrators, IT Firms are not following PCI DSS and leaving Merchants at Risk!
Compromise Statistics: Track Data Track Data storage is never permitted in any environment post authorization. Non-Compliant software packages are storing Track Data and the Merchants did not know until it was too late! Brick and Mortar Cases w/ Track Data Storage
Compromise Statistics: PCI DSS Violations Most Common “Not In-Place” Requirement 1:   Install and maintain a firewall to protect data Requirement 3:   Protect stored data Requirement 6:   Develop and maintain secure systems and applications Requirement 8:   Assign a unique ID to each person with computer access Requirement 10:   Track and monitor all access to network and card data Requirement 11:   Regularly test security systems and processes
Compromise Statistics: SpiderLabs Top 10 Top 10 Reasons/Methods of Compromise ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Compromise Statistics: Riskiest Merchant Profile of the Merchant w/ Greatest Compromise Potential Industry:   Food Service Payment Acceptance:   Card Present System Type:   Non-Compliant Software POS Connectivity:   DSL or Cable Modem
Websites ,[object Object],[object Object],[object Object]

More Related Content

What's hot

QR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONSQR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONSJournal For Research
 
Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Siya Agarwal
 
EMV Card Migration: How the EMV Transaction Flow Works
EMV Card Migration: How the EMV Transaction Flow WorksEMV Card Migration: How the EMV Transaction Flow Works
EMV Card Migration: How the EMV Transaction Flow WorksAnnMargaret Tutu (AMT)
 
JAKTA - BMM Presentation Belgrade conference October 22nd 2012
JAKTA - BMM Presentation Belgrade conference October 22nd 2012 JAKTA - BMM Presentation Belgrade conference October 22nd 2012
JAKTA - BMM Presentation Belgrade conference October 22nd 2012 Mirjana Acimovic
 
End-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card ProcessingEnd-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card ProcessingLennon808
 
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTUREATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURERadhika Venkat
 
Abdullin modern payments security. emv, nfc, etc
Abdullin   modern payments security. emv, nfc, etcAbdullin   modern payments security. emv, nfc, etc
Abdullin modern payments security. emv, nfc, etcDefconRussia
 
E business paper bba
E business paper bbaE business paper bba
E business paper bbaEmmaSidd
 
EMV Migration Webinar / Lessons Learned + Next Steps
EMV Migration Webinar / Lessons Learned + Next StepsEMV Migration Webinar / Lessons Learned + Next Steps
EMV Migration Webinar / Lessons Learned + Next StepsIngenico Group
 
Cognia PCI DSS compliance services
Cognia PCI DSS compliance servicesCognia PCI DSS compliance services
Cognia PCI DSS compliance servicesCognia
 
Out of Scope Whitepaper
Out of Scope WhitepaperOut of Scope Whitepaper
Out of Scope WhitepaperMark Moreno
 

What's hot (20)

Presentationonsecurityfeatureofatm2 130621034116-phpapp02
Presentationonsecurityfeatureofatm2 130621034116-phpapp02Presentationonsecurityfeatureofatm2 130621034116-phpapp02
Presentationonsecurityfeatureofatm2 130621034116-phpapp02
 
EMV 201 EMF June 2016
EMV 201 EMF June 2016EMV 201 EMF June 2016
EMV 201 EMF June 2016
 
QR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONSQR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONS
 
AVEACreditRisk_Activities-100912 copy
AVEACreditRisk_Activities-100912 copyAVEACreditRisk_Activities-100912 copy
AVEACreditRisk_Activities-100912 copy
 
Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)
 
EMV: What you Need to Know
EMV: What you Need to KnowEMV: What you Need to Know
EMV: What you Need to Know
 
Atm security
Atm securityAtm security
Atm security
 
Money-4 P2P platform
Money-4 P2P platformMoney-4 P2P platform
Money-4 P2P platform
 
Emv chip card buyers guide
Emv chip card buyers guideEmv chip card buyers guide
Emv chip card buyers guide
 
EMV Card Migration: How the EMV Transaction Flow Works
EMV Card Migration: How the EMV Transaction Flow WorksEMV Card Migration: How the EMV Transaction Flow Works
EMV Card Migration: How the EMV Transaction Flow Works
 
JAKTA - BMM Presentation Belgrade conference October 22nd 2012
JAKTA - BMM Presentation Belgrade conference October 22nd 2012 JAKTA - BMM Presentation Belgrade conference October 22nd 2012
JAKTA - BMM Presentation Belgrade conference October 22nd 2012
 
End-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card ProcessingEnd-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card Processing
 
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTUREATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
 
Abdullin modern payments security. emv, nfc, etc
Abdullin   modern payments security. emv, nfc, etcAbdullin   modern payments security. emv, nfc, etc
Abdullin modern payments security. emv, nfc, etc
 
E business paper bba
E business paper bbaE business paper bba
E business paper bba
 
EMV Migration Webinar / Lessons Learned + Next Steps
EMV Migration Webinar / Lessons Learned + Next StepsEMV Migration Webinar / Lessons Learned + Next Steps
EMV Migration Webinar / Lessons Learned + Next Steps
 
Atm (bm)
Atm (bm)Atm (bm)
Atm (bm)
 
Cognia PCI DSS compliance services
Cognia PCI DSS compliance servicesCognia PCI DSS compliance services
Cognia PCI DSS compliance services
 
Out of Scope Whitepaper
Out of Scope WhitepaperOut of Scope Whitepaper
Out of Scope Whitepaper
 
Atm security
Atm securityAtm security
Atm security
 

Similar to PCI Compliance 101

ECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce MerchantECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce MerchantMelanie Beam
 
eCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain MediaeCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain MediaeCommerce Merchants
 
Visa Compliance Mark National Certification
Visa Compliance Mark National CertificationVisa Compliance Mark National Certification
Visa Compliance Mark National CertificationMark Pollard
 
PCI DSS Data Security Compliance Program Overview
PCI DSS Data Security Compliance Program OverviewPCI DSS Data Security Compliance Program Overview
PCI DSS Data Security Compliance Program Overview- Mark - Fullbright
 
PCI compliance and fraud prevention for non profits
PCI compliance and fraud prevention for non profitsPCI compliance and fraud prevention for non profits
PCI compliance and fraud prevention for non profitsNetSquared Vancouver
 
A practical guides to PCI compliance
A practical guides to PCI complianceA practical guides to PCI compliance
A practical guides to PCI complianceJisc
 
Risks of not complying with sox and pci compliance
Risks of not complying with sox and pci complianceRisks of not complying with sox and pci compliance
Risks of not complying with sox and pci complianceSysCloud
 
You Know You Need PCI Compliance Help When…
You Know You Need PCI Compliance Help When…You Know You Need PCI Compliance Help When…
You Know You Need PCI Compliance Help When…Rochester Security Summit
 
Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...
Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...
Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...Stephanie Gutowski
 
Pci compliance overview earth link business
Pci compliance overview earth link businessPci compliance overview earth link business
Pci compliance overview earth link businessMike Shelah
 
P0 Pcidss Overview
P0 Pcidss OverviewP0 Pcidss Overview
P0 Pcidss Overviewb28stu
 
PCI_Presentation_OASIS
PCI_Presentation_OASISPCI_Presentation_OASIS
PCI_Presentation_OASISDermot Clarke
 
Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...
Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...
Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...Rapid7
 
Reduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - WhitepaperReduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - WhitepaperShaun O'keeffe
 
Evolve Pci Compliance
Evolve   Pci ComplianceEvolve   Pci Compliance
Evolve Pci Compliancehypknight
 
Introduction to PCI DSS
Introduction to PCI DSSIntroduction to PCI DSS
Introduction to PCI DSSSaumya Vishnoi
 
Educause+PCI+briefing+4-19-20162345.pptx
Educause+PCI+briefing+4-19-20162345.pptxEducause+PCI+briefing+4-19-20162345.pptx
Educause+PCI+briefing+4-19-20162345.pptxgealehegn
 

Similar to PCI Compliance 101 (20)

ECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce MerchantECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce Merchant
 
eCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain MediaeCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain Media
 
Visa Compliance Mark National Certification
Visa Compliance Mark National CertificationVisa Compliance Mark National Certification
Visa Compliance Mark National Certification
 
PCI DSS Data Security Compliance Program Overview
PCI DSS Data Security Compliance Program OverviewPCI DSS Data Security Compliance Program Overview
PCI DSS Data Security Compliance Program Overview
 
PCI compliance and fraud prevention for non profits
PCI compliance and fraud prevention for non profitsPCI compliance and fraud prevention for non profits
PCI compliance and fraud prevention for non profits
 
PCI DSS
PCI DSSPCI DSS
PCI DSS
 
A practical guides to PCI compliance
A practical guides to PCI complianceA practical guides to PCI compliance
A practical guides to PCI compliance
 
Risks of not complying with sox and pci compliance
Risks of not complying with sox and pci complianceRisks of not complying with sox and pci compliance
Risks of not complying with sox and pci compliance
 
You Know You Need PCI Compliance Help When…
You Know You Need PCI Compliance Help When…You Know You Need PCI Compliance Help When…
You Know You Need PCI Compliance Help When…
 
Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...
Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...
Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...
 
Pci compliance overview earth link business
Pci compliance overview earth link businessPci compliance overview earth link business
Pci compliance overview earth link business
 
P0 Pcidss Overview
P0 Pcidss OverviewP0 Pcidss Overview
P0 Pcidss Overview
 
PCI_Presentation_OASIS
PCI_Presentation_OASISPCI_Presentation_OASIS
PCI_Presentation_OASIS
 
Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...
Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...
Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...
 
MTBiz May-June 2019
MTBiz May-June 2019 MTBiz May-June 2019
MTBiz May-June 2019
 
Reduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - WhitepaperReduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - Whitepaper
 
PCI Compliance Process
PCI Compliance ProcessPCI Compliance Process
PCI Compliance Process
 
Evolve Pci Compliance
Evolve   Pci ComplianceEvolve   Pci Compliance
Evolve Pci Compliance
 
Introduction to PCI DSS
Introduction to PCI DSSIntroduction to PCI DSS
Introduction to PCI DSS
 
Educause+PCI+briefing+4-19-20162345.pptx
Educause+PCI+briefing+4-19-20162345.pptxEducause+PCI+briefing+4-19-20162345.pptx
Educause+PCI+briefing+4-19-20162345.pptx
 

PCI Compliance 101

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. Level 1 – Large Retail Merchants Validation Action Validated By Due Date Annual On-site PCI Data Security Assessment Qualified Data Security Company of Internal Audit if signed by Office of the Company 9/30/2004 Quarterly Network Scan Qualified Independent Scan Vendor New Level 1 merchants have up to one year from identification to validate
  • 17.
  • 18. Level 2 - Mid/Large Merchants Validation Action Validated By Due Date Annual On-site PCI Self-Assessment Questionnaire Merchant Current Quarterly Network Scan Qualified Independent Scan Vendor New Level 2 merchants: 9/30/2007
  • 19.
  • 20. Level 3 – Mid/Low Merchants Validation Action Validated By Due Date Annual On-site Self-Assessment Questionnaire Merchant Current Quarterly Network Scan Qualified Independent Scan Vendor 6/30/2005
  • 21.
  • 22. Level 4* - Small Merchants *The PCI DDS requires that all merchants perform external network scanning to achieve compliance. Acquirers may require submission of scan reports and/or questionnaires by level 4 merchants. Validation Action Validated By Due Date Annual On-site PCI Self-Assessment Questionnaire Merchant Current Quarterly Network Scan Qualified Independent Scan Vendor Validation requirements and dates are determined by the merchant’s acquirer
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35. Case Study: The POS System Attacker Retail Store Processor Corporate Internet
  • 36. Compromise Statistics: Industry SpiderLabs data is gathered from more than 140 card compromise cases. Food Service Industry represents the majority of the compromises. Cases By Industry
  • 37. Compromise Statistics: Acceptance Cases by Card Acceptance About 4 out of every 5 cases is a traditional Brick and Mortar environment. Card Present Merchants are not aware of these risks!
  • 38. Compromise Statistics: System Type Majority of the cases involved a compromise of a Software based POS system. None of these systems were Visa PABP or PCI DSS compliant. Cases By System Type
  • 39. Compromise Statistics: Connectivity All Internet connectivity should be considered high risk. SpiderLabs has tracked a trend in migration from T1 and Dial-Up to DSL/Cable. Cases By Connectivity
  • 40. Compromise Statistics: Error Merchant Error vs. 3rd Party Error Half of the compromises were caused by a fault in the service provided by a 3rd party to a Merchant . POS Developers, Integrators, IT Firms are not following PCI DSS and leaving Merchants at Risk!
  • 41. Compromise Statistics: Track Data Track Data storage is never permitted in any environment post authorization. Non-Compliant software packages are storing Track Data and the Merchants did not know until it was too late! Brick and Mortar Cases w/ Track Data Storage
  • 42. Compromise Statistics: PCI DSS Violations Most Common “Not In-Place” Requirement 1: Install and maintain a firewall to protect data Requirement 3: Protect stored data Requirement 6: Develop and maintain secure systems and applications Requirement 8: Assign a unique ID to each person with computer access Requirement 10: Track and monitor all access to network and card data Requirement 11: Regularly test security systems and processes
  • 43.
  • 44. Compromise Statistics: Riskiest Merchant Profile of the Merchant w/ Greatest Compromise Potential Industry: Food Service Payment Acceptance: Card Present System Type: Non-Compliant Software POS Connectivity: DSL or Cable Modem
  • 45.

Editor's Notes

  1. Can you change the Title to Thieve are trying to steal credit card data from your Merchants. Can you add the word Internet in the first sentence? Can you change the 2 nd second sentence to Professional thieves go dumpster diving for credit card thrown out by unsuspecting merchants.
  2. Under Install and Maintain a Firewall add: Dial only terminals are not required to comply with this mandate Dial Only POS Systems with a connection to the Internet are required to comply with this standard. Under Protect Stored Data Add – Databases and files stored on computer discs must be encrypted and access limited to trusted personnel. CDs, floppy disks, removable disc drive containing credit card data must be encrypted and secured during storage.
  3. Under Install and Maintain a Firewall add: Dial only terminals are not required to comply with this mandate Dial Only POS Systems with a connection to the Internet are required to comply with this standard. Under Protect Stored Data Add – Databases and files stored on computer discs must be encrypted and access limited to trusted personnel. CDs, floppy disks, removable disc drive containing credit card data must be encrypted and secured during storage.
  4. Add – Databases and files stored on computer discs must be encrypted and access limited to trusted personnel. CDs, floppy disks, removable disc drive containing credit card data must be encrypted and secured during storage.
  5. Add – Databases and files stored on computer discs must be encrypted and access limited to trusted personnel. CDs, floppy disks, removable disc drive containing credit card data must be encrypted and secured during storage.
  6. Merchant must install and maintain a updated anti-virus software on their computers and POS Systems.
  7. Merchant must install and maintain a updated anti-virus software on their computers and POS Systems.
  8. Should we say the merchant also pays for the cost of forensics and then explain what forensics is?
  9. Should we say the merchant also pays for the cost of forensics and then explain what forensics is?
  10. Should we say the merchant also pays for the cost of forensics and then explain what forensics is?
  11. Should we say the merchant also pays for the cost of forensics and then explain what forensics is?
  12. Make a note that the CCV Card Code is never allowed to be stored or just remove it from the slide Add Customer Card Number
  13. Make a note that the CCV Card Code is never allowed to be stored or just remove it from the slide Add Customer Card Number
  14. forensics