Training for individuals involved in the processing of ......Training for individuals involved in...

30
Training for individuals involved in the processing of merchant card payments (credit card and debit card transactions) on behalf of the campus. Applies to: Full and part-time employees Temporaries Consultants Contractors Volunteers June 1, 2015

Transcript of Training for individuals involved in the processing of ......Training for individuals involved in...

Page 1: Training for individuals involved in the processing of ......Training for individuals involved in the processing of merchant card payments ... • Contractors • Volunteers June 1,

Training for individuals involved in the processing of merchant card payments (credit card and debit card transactions) on behalf of the campus.

Applies to:• Full and part-time employees

• Temporaries• Consultants• Contractors• Volunteers

June 1, 2015

Page 2: Training for individuals involved in the processing of ......Training for individuals involved in the processing of merchant card payments ... • Contractors • Volunteers June 1,

Training Objectives What is PCI-DSS Standards What is PCI Compliance? What is Cardholder Data? Applicability of PCI DSS What’s the Importance of PCI Compliance? Twelve Requirements of PCI DSS Personal Responsibility PCI Data Security Awareness Training Best Practices - Dos and Don’ts Behind the Scenes Card Brands’ Identification Features Chip and PIN Technology Next Steps

Page 3: Training for individuals involved in the processing of ......Training for individuals involved in the processing of merchant card payments ... • Contractors • Volunteers June 1,

What is PCI-DSS Standards? The Payment Card Industry Data Security Standards

(PCI-DSS) are requirements of the merchant card brands

(Visa, MasterCard, Discover, American Express, JCB)

PCI-DSS were created on behalf of the brands by the PCI

Security Standards Council

The goal of PCI-DSS is to protect cardholder data

Page 4: Training for individuals involved in the processing of ......Training for individuals involved in the processing of merchant card payments ... • Contractors • Volunteers June 1,

What is Cardholder Data? Cardholder data to be protected includes:

Cardholder’s name

Primary account number (PAN)

Expiration date (month/year)

Track data (On magnetic strip)

Security code / Card Verification Value (CVV)

PIN number (Debit cards only)

Cardholder data can be in:

Paper form or

Electronic form

Page 5: Training for individuals involved in the processing of ......Training for individuals involved in the processing of merchant card payments ... • Contractors • Volunteers June 1,

Applicability of PCI-DSS PCI-DSS apply to anyone who does any one of the following:

Stores

Processes, or

Transmits cardholder data

PCI-DSS apply to all forms of payment card acceptance:

Mail

Phone

Fax

Point-of-sale

Online (Web)

Page 6: Training for individuals involved in the processing of ......Training for individuals involved in the processing of merchant card payments ... • Contractors • Volunteers June 1,

What’s the Importance of PCI Compliance?

As a merchant accepting card payments, the campus must be in compliance with the PCI-DSS standards at all times

The campus has to periodically attest its compliance to appropriate parties

The campus’s failure to be compliant can result in: Damage to campus’s reputation and adverse publicity

Potential fines – Up to $1 million per occurrence

Costs associated with forensic investigations and notifying customers

Inability for campus to continue to accept card payments

Employee disciplinary actions

Page 7: Training for individuals involved in the processing of ......Training for individuals involved in the processing of merchant card payments ... • Contractors • Volunteers June 1,

Build and Maintain a Secure Network

Requirement 1: Install and maintain a firewall configuration to protect cardholder data

Requirement 2: Do not use vendor-supplied defaults for system passwords and other security

parameters

Protect Cardholder Data

Requirement 3: Protect stored cardholder data

Requirement 4: Encrypt transmission of cardholder data across open, public networks

Maintain a Vulnerability Management Program

Requirement 5: Use and regularly update anti-virus software

Requirement 6: Develop and maintain secure systems and applications

Implement Strong Access Control Measures

Requirement 7: Restrict access to cardholder data by business need-to-know

Requirement 8: Assign a unique ID to each person with computer access

Requirement 9: Restrict physical access to cardholder data

Regularly Monitor and Test Networks

Requirement 10: Track and monitor all access to network resources and cardholder data

Requirement 11: Regularly test security systems and processes

Maintain an Information Security Policy

Requirement 12: Maintain a policy that addresses information security

Twelve Requirements of PCI-DSS

Although some of the requirements apply to the campus’s IT staff, many of the requirements apply to the campus’s business staff.

Page 8: Training for individuals involved in the processing of ......Training for individuals involved in the processing of merchant card payments ... • Contractors • Volunteers June 1,

Personal Responsibility As an employee, contractor, student, or volunteer who

interacts with credit card data, you are the first line of defense against fraud and security breaches

You are expected to be aware of the campus’s policies and procedures and to be ever vigilant when interacting with payment card data and credit card transactions

Page 9: Training for individuals involved in the processing of ......Training for individuals involved in the processing of merchant card payments ... • Contractors • Volunteers June 1,

PCI Data Security Awareness Training

You are required to complete training and attest to the training: Upon hire or initial engagement, and

Take annual refresher training

Through your continued vigilance and implementation of PCI standards, you assist the campus in being PCI compliant

Page 10: Training for individuals involved in the processing of ......Training for individuals involved in the processing of merchant card payments ... • Contractors • Volunteers June 1,

Best Practices Adhering to best practices by individuals will assist the

campus in being PCI compliant

The following slides contain practices that should be followed and practices that should be avoided

Page 11: Training for individuals involved in the processing of ......Training for individuals involved in the processing of merchant card payments ... • Contractors • Volunteers June 1,

Credit Card Receipts • Ensure credit card receipts are stored

securely

• Ensure that card receipts are disposed of by shredding in accordance with campus policy

Page 12: Training for individuals involved in the processing of ......Training for individuals involved in the processing of merchant card payments ... • Contractors • Volunteers June 1,

Truncate PANs• Verify that both the campus and customer card receipts

only bear truncated versions of the primary account number (PAN)

• Only the last four digits should be displayed

Example: XXXX-XXXX-XXXX-9534

Page 13: Training for individuals involved in the processing of ......Training for individuals involved in the processing of merchant card payments ... • Contractors • Volunteers June 1,

Physical Protection of Devices A new requirement of PCI-DSS (Version 3.0) requires the campus to institute

procedures to periodically physically inspect for fraudulent skimmers that may be attached to devices, and to check for fraudulent substitution by checking the serial numbers of the devices.

Devices include POS terminals, kiosks, PC’s used in processing card transactions

• Training of employees include:• Verify the identity of any third-

party persons claiming to be repair or maintenance personnel;

• Be aware of suspicious behavior around devices (for example, attempts by unknown persons to unplug or open devices);

• Inspect POS terminals and devices at beginning of each shift for tampering

Page 14: Training for individuals involved in the processing of ......Training for individuals involved in the processing of merchant card payments ... • Contractors • Volunteers June 1,

Physical Security of Card Media• Do not leave any paper or electronic card media physically unsecured

• Restrict physical access to areas where cardholder data is handled and stored

• Only allow employees who have a legitimate business need to access cardholder information

• Do not have card receipts or related documents on display to the general public

• Visitors in areas where cardholder data is stored must be identified and escorted, with a visitor’s log being maintained

Page 15: Training for individuals involved in the processing of ......Training for individuals involved in the processing of merchant card payments ... • Contractors • Volunteers June 1,

Email Containing PANs• Do not send any unencrypted emails containing the

full primary account number (PAN). The truncated last four digits are okay to send.

• Do not process a payment based on information received by email.

• Should you receive an email containing a PAN:• Delete the email immediately• Do not print or forward the email• Notify the customer you are unable to process the payment

• These restrictions apply to instant messaging and chats

Page 16: Training for individuals involved in the processing of ......Training for individuals involved in the processing of merchant card payments ... • Contractors • Volunteers June 1,

Two Types of Account DataThere are two types of Account Data:• Cardholder Data• Sensitive Authentication Data

Note that the data elements designated as sensitive authentication data can never be stored by the campus

Page 17: Training for individuals involved in the processing of ......Training for individuals involved in the processing of merchant card payments ... • Contractors • Volunteers June 1,

Security ID Codes• Each of the card brands assign a unique security code to each

card issued• For Amex, it is a four-digit number located on the front of the card• For all other brands, it is a three digit number located on the back• The code is referred by different names and may be called the card

verification value or ID (CVV) (CW2) (CID)• The Security ID Code is considered “sensitive authentication data”

• Never write down, store, or email the security ID code

• The code is a fraud tool to prove the customer is in physical possession of the card. Keeping a record of the code defeats the purpose of the code.

• If provided to you, the number is only to be retained until the authorization has been approved by the card processor

• The potential fine levied by Visa for storing sensitive authentication data after authorization, such as CVV or PIN (in case of a debit card), is $50,000

Page 18: Training for individuals involved in the processing of ......Training for individuals involved in the processing of merchant card payments ... • Contractors • Volunteers June 1,

Passwords• Adhere to the campus’s policy regarding

the creation of strong passwords and the frequent changing of passwords

• Do not write down passwords for others to find, or share your password

• Do not use vendor-supplied defaults for system passwords and other security parameters

• Ensure that vendor default passwords are changed before a system goes live

Page 19: Training for individuals involved in the processing of ......Training for individuals involved in the processing of merchant card payments ... • Contractors • Volunteers June 1,

Social Engineering Social Engineering is a non-technical method of intrusion

hackers use that relies heavily on human interaction and often involves tricking people into breaking normal security procedures

Adhere to the campus’s security procedures pertaining to the use of computers, responding to emails, and visiting inappropriate websites

• Examples of social engineering include:• Phishing – Emails appearing to be from a known

person or organization asking for confidential information

• Shoulder surfing – Individuals looking over your shoulder to observe confidential information

• Tailgating – Individuals seeking entry to a restricted area

• Dumpster Diving –Individuals looking for confidential information in your trash (e.g., sticky note with password, discarded reports, etc.)

• Remote access – Individuals seeking to control your computer remotely

Page 20: Training for individuals involved in the processing of ......Training for individuals involved in the processing of merchant card payments ... • Contractors • Volunteers June 1,

Service Providers The campus may use third-party service providers to

facilitate the processing of merchant cards

Campus management assumes the role of verifying that these providers are PCI compliant

Should you become aware that one of these service providers is not adhering to one of the PCI requirements, you should notify management

• Service providers include the merchant card processor, as well as any gateway that processes online payments

Page 21: Training for individuals involved in the processing of ......Training for individuals involved in the processing of merchant card payments ... • Contractors • Volunteers June 1,

Payment Applications The campus may use various payment applications to

process card-present transactions, as well as mail orders and telephone orders (MOTO) Examples include POS software and Virtual Terminals Campus management assumes the role of verifying these

applications are PCI compliant (validated) before purchasing

• You must also follow the vendor’s implementation guide when using these applications in order to maintain the PCI compliance status:• Do not use the default password

• Do not deactivate anti-virus protection

• All updates must be applied timely

Page 22: Training for individuals involved in the processing of ......Training for individuals involved in the processing of merchant card payments ... • Contractors • Volunteers June 1,

Security Incident Reporting The campus has a security incident reporting plan

Your role in this plan may vary, but will include: Notify your supervisor immediately of any suspected or real security

breach or of stolen cardholder data

Document any information you know while waiting for a response to the incident, including date, time, and the nature of the incident

• In case of a network environment:• Do not access or alter compromised systems

• Do not turn the compromised machine off

• Isolate compromised systems from the network

• Preserve logs and electronic evidence

• Log all actions taken

All incident reporting by the campus management is to be conducted through the Office of State Controller, not directly to any card brand

Page 23: Training for individuals involved in the processing of ......Training for individuals involved in the processing of merchant card payments ... • Contractors • Volunteers June 1,

Behind the Scenes Various departments and staff within the campus have certain

responsibilities pertaining to PCI compliance, in addition to you as an individual

Examples: IT staff is involved with firewall management, encryption,

penetration testing, vulnerability scanning, log management, antivirus software updates, etc.

The business office staff is involved in monitoring service providers’ PCI compliance, ensuring that all POS software acquired is PCI compliant, completing self-assessment questionnaires, etc.

The campus utilizes a PCI Qualified Security Assessor (QSA) firm, known as Coalfire, to assist in its PCI compliance efforts

Page 24: Training for individuals involved in the processing of ......Training for individuals involved in the processing of merchant card payments ... • Contractors • Volunteers June 1,

Card Brands’ Identification Features In addition to PCI-DSS requirements, each card brand has

certain card identification and fraud detection features which you should be aware of

Examples include:

Uniqueness of the brand’s 4-digit Bank Identification Number (BIN)

Location of the brand’s security code (card id number)

Visa, MC, and Discover are 3-digit on the back; Amex is 4-digit on front

Location of card’s expiration date

Number to call for a suspicious card (Code 10 authorization)

The following four slides depict each brand’s features

Page 25: Training for individuals involved in the processing of ......Training for individuals involved in the processing of merchant card payments ... • Contractors • Volunteers June 1,
Page 26: Training for individuals involved in the processing of ......Training for individuals involved in the processing of merchant card payments ... • Contractors • Volunteers June 1,
Page 27: Training for individuals involved in the processing of ......Training for individuals involved in the processing of merchant card payments ... • Contractors • Volunteers June 1,
Page 28: Training for individuals involved in the processing of ......Training for individuals involved in the processing of merchant card payments ... • Contractors • Volunteers June 1,
Page 29: Training for individuals involved in the processing of ......Training for individuals involved in the processing of merchant card payments ... • Contractors • Volunteers June 1,

Chip and PIN Technology The campus may be acquiring new POS terminals that

incorporate new security features – Chip & Pin (aka EMV)

New technology involves processing cards that bare an imbedded Chip instead of a magnetic stripe

The POS terminals will be able to process the new Chip and PIN cards as well as the old magnetic stripe cards

The POS terminals may be stand-alone, or they may have a reader device that is attached to the swipe POS terminal

Page 30: Training for individuals involved in the processing of ......Training for individuals involved in the processing of merchant card payments ... • Contractors • Volunteers June 1,

Next Steps You have completed the first step of your PCI Security Awareness Training The second step is to complete a quiz to test your understanding of this

training module You must score a grade of 80 percent or better to pass

The third step is to obtain and read the campus’s PCI Data Security Policy for Business Users You may be provided addition procedures that are specific to your job duties

(e.g., telephone orders, POS terminals, online orders, etc.)

The fourth step is to obtain the certificate of completion of training: Indicating you have passed the quiz Acknowledging your receipt of the campus’s PCI Data Security Policy

This training is good for one calendar year after you pass the quiz