Page 18 - GS180702
P. 18

Views






             The very point of sale                             does not violate the Payment Card Industry Data Security
                                                                Standard (PCI DSS). It's what happens afterward that
                                                                determines whether the merchant is complying with PCI
                                                                DSS guidelines.

                                                                "Merchants want to be friendly and allow their customers
                                                                to take a pillow home," said Matthew Halbleib, audit
                                                                director at SecurityMetrics. "They need to design a process
        If you see something,                                   that  allows  employees  to  do  this."  Halbleib  pointed  out
                                                                that  PCI  DSS  version  3.2.3  disallows  storing  "sensitive
                                                                authentication data," which the PCI Security Standards
        speak up                                                Council defines as post-authorization card data.



        By Dale S. Laszig,                                      "Sensitive  authentication  data must not  be stored after
                                                                authorization, even if encrypted," states page 8 of the PCI
        DSL Direct LLC                                          DSS 3.2.3 manual, published in May 2018. "This applies
                                                                even where there is no PAN [primary account number] in
                    ost of us would like to leave our jobs behind   the environment."
                    when on vacation, but that's not easy for pay-  Physical and virtual security
                    ment pros. Every time we walk into a store,
        M open a mobile app or shop online, we're               Chris Bucolo, director of market strategy at ControlScan
        reminded of our industry. These reminders can be exciting   Inc., said there are understandably many concerns about
        or cringeworthy, depending on the circumstances. Here   the more technical aspects of PCI and data security, but
        are some examples (I'm sure you can think of many more):  in reality, many PCI DSS requirements are procedural
                                                                in nature, and payment pros do not need IT knowledge
            •  Exciting: to see checkout evolve from three acts   to understand and address them. Physical security and
               (payment presentment, authorization and close) to   procedures are just as important as those relating to the
               one act. When we exit an Uber or Amazon Go store,   network and electronic processing aspects, he noted. The
               payments magically happen.                       key is to weigh convenience issues with security risks
            •  Cringeworthy: to see noncompliant equipment in   and look for ways to protect customers while delivering a
               a checkout lane. EMV (Europay, Mastercard and    seamless, enjoyable customer experience.
               Visa) guidelines became effective in 2015, making
               merchants without chip card readers 100 percent   Referring to the salesperson's offer recounted above, Bucolo
               liable for a security breach.                    added, "The practice the sales associate described may not
                                                                have sounded so concerning had she said, 'We have a very
            •  Exciting:  to see  available  points, cash,  rewards,   clear and strict policy/procedure we follow internally,' and
               coupons and credit cards on a checkout screen and   offered more details about how the store protects the data."
               be able to pay in any combination. These options are   He provided the following examples:
               widely available on mobile wallets and ecommerce
               sites.                                             •  We protect the data by keeping it locked in a special
                                                                      fireproof cabinet that is also behind a locked door.
            •  Cringeworthy: to be asked for multiple forms of        Only a few key people have access.
               identification while people fuss and fidget behind
               us in the checkout queue, because the merchant     •  When you return the item we go in that cabinet
               doesn't use available technologies to securely         and retrieve the receipt the same day, and we use a
               authenticate users in seconds.                         cross-cut shredder to destroy any evidence of a card
                                                                      number.
        The pillow case
                                                                  •  We do not allow the information to be recorded or
        Last year, a sales associate at a furniture store offered to lend   kept anywhere else.
        me a pillow. She said, "I'll write your credit card number on
        this receipt and bill you if you don't bring it back." When   •  If the consumer does not return the item, we pro-
        I expressed concern about exposing my credit card data,       cess a card transaction on our system and then fol-
        she offered to tear up  the  receipt or  give  it  back when I   low the same destruction procedure for the receipt.
        returned the pillow. The following day, as promised, she   Follow the (card) flow
        retrieved the receipt from a locked safe behind a service
        counter and returned it to me.                          Halbleib said companies need to define their cardholder
                                                                data environments, first by identifying all the places where
        In subsequent discussions with security analysts, I learned   data flows, then by applying controls around those card
        that writing a credit card number on a piece of paper
        18
   13   14   15   16   17   18   19   20   21   22   23