PCI Compliance & PCI Standards

The Payment Card Industry Data Security Standard

12 steps to reduce risk, maximize PCI compliance & stop ID theftPCI Compliance & PCI Standards

The Payment Card Industry Data Security Standard (PCI) is a worldwide information security standard assembled by the Payment Card Industry Security Standards Council. The standard was created to help organizations that process card payments prevent credit card fraud through increased controls of data and its exposure to compromise

Who must comply with (PCI)?

The standard applies to all organizations, which hold, process, or pass cardholder information from any card branded with the logo of one of the card brands.  PCI defines a 12 step process that vendors need to adhere to show that they are taking the necessary steps to avoid online access or compromise to their card processing data. Failure to achieve PCI compliance could cause a retailer to face substantial penalties - up to $500,000 -depending on the volume of transactions processed.

Fraud Fighter™, a division of UVeritech, enables organizations that process credit card payments to go a step beyond PCI compliance requirements by (a) validating the identification of the person presenting a credit card, (b) to authenticate the credit card itself, and (c) in those locations where high-volume credit card processing occurs, to capture an image of the identification document and store it in an encrypted file for later retrieval should a fraudulent transaction occur.

PCI’s “12 Step Process”

Build and Maintain a Secure Network
Requirement 1: Install and maintain a firewall configuration to protect data
Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters
Protect Cardholder Data
Requirement 3: Protect stored data
Requirement 4: Encrypt transmission of cardholder data and sensitive information across public networks
Maintain a Vulnerability Management Program
Requirement 5: Use and regularly update anti-virus software
Requirement 6: Develop and maintain secure systems and applications
Implement Strong Access Control Measures
Requirement 7: Restrict access to data by business need-to-know
Requirement 8: Assign a unique ID to each person with computer access
Regularly Monitor and Test Networks
Requirement 9: Restrict physical access to cardholder data
Requirement 10: Track and monitor all access to network resources and cardholder data
Requirement 11: Regularly test security systems and processes
Maintain an Information Security Policy
Requirement 12: Maintain a policy that addresses information security

 


Terms of Use | Privacy Statement | Site Map | Link to FraudFighter | Copyright © Uveritech Inc. 2024