Page 36 - GS181202
P. 36

Education




                                                                facilities for cardholder numbers, so they use a third-
                                                                party provider (such as TrustCommerce).  In other cases,
                                                                merchants are ignorant of the legal and commonsense
                                                                security requirements, and they store cardholder data on
                                                                their own unsecured computer systems.
                          Legal ease:
                                                                It is a best practice for ISOs to go through this analysis
                                                                with each merchant to learn precisely where cardholder
                                                                state  is  stored  and  precisely  who  has  promised  to  store
                                                                or  transmit that  data  for  the merchant.   When  a  breach
                                                                occurs, both the ISO and the merchant will want to know
                                                                where and why data was rendered vulnerable to prevent
                                                                future breaches, as well as allocate liability for the ensuing
        Data breach                                             losses.

                                                                Document data storage liability
        allocation of liability                                 The processing agreement between the merchant and the

                                                                acquiring  bank  will  leave  all  responsibility  for  security
        By Adam Atlas                                           of cardholder data in the hands of the merchant. The ISO
                                                                should help the merchant take that understanding one
        Attorney at Law                                         step further to see who really stores the data and what
                                                                promises have been made about that storage.
                  ata breaches are a part of contemporary busi-
                  ness. Despite substantial efforts by both indus-  For example, if a merchant has engaged a gateway to
                  try and governments to limit the chances of   store its cardholder data, the merchant should look to that
        D a data breach and the negative repercussions          gateway for promises about the degree of security that
        associated with them, they continue to occur and cause   will be used in storing the data.
        significant harm.
                                                                The PCI Security Standards Council is an industry
        As ISOs evolve from simple sales organizations to active   standards-setting organization that has established
        participants in the flow of data related to merchant    specific security standards related to the storage of
        payment transactions, they are earning correspondingly   cardholder  data.  The  Payment  Card  Industry  (PCI)
        greater liability for breaches that occur along the way. The   security standards came into existence partly because of a
        purpose of this article is to highlight key considerations   fear that if the industry did not regulate itself, government
        for ISOs, from a legal perspective, arising from a merchant   would intervene and impose standards on the industry.
        data breach.
        Know who stores cardholder data                         By contract, virtually every participant in the payments
                                                                industry promises to comply with PCI standards. The
        If there is no data being stored, the chances of a breach   standards dictate levels of compliance that are a function
        are much lower. For several reasons, it is essential for   of the quantity and type of cardholder data being stored.
        ISOs to know precisely where merchant data is stored.    The more you store, the more secure you have to be.
        Specifically, ISOs should know where cardholder data is
        stored, given that cardholder data is the most sensitive   Back to the documents: the agreement between a gateway
        data in the payment operations of merchants. Note that   storing cardholder data and a merchant should contain
        merchants are often ignorant of where their data is stored.    promises by the gateway as to its level of PCI compliance.
                                                                It is helpful for an ISO to know precisely who has made
        The process of finding out where data is stored starts   what promises with respect to cardholder data storage.
        at the POS. When cardholders (online or in person)
        enter their payment card information, that information   Before leaving the subject of promises made, it is impor-
        goes somewhere.  Usually, it is picked up by a secure   tant to touch on limitations of liability. When a security
        element within the POS device or hosting platform and is   breach occurs, the merchant who collected the compro-
        transmitted by a secure gateway (for example, Authorize.  mised cardholder data could be liable for substantial fines
        net) to the merchant’s processor (for example, First Data)   – even if the merchant did not store the data itself.  The
        for presentment to payment networks (for example, Visa).    reason for this is that the merchant had the duty, under the
                                                                merchant agreement, to select a vendor (that is, gateway)
        Sometimes merchants wish to retain a copy of cardholder   that had secure data collection and transmission capabili-
        data, but they rarely have their own secure storage     ties. Where the gateway fails, the processor may look to



        36
   31   32   33   34   35   36   37   38   39   40   41