Page 1 of 2
Crystal Sulzer of Ferrari Merchants reviews 12 essential requirements for operators to check and verify before they can be considered PCI compliant.
A PCI compliance deadline for the credit card processing industry is just around the corner. By July 2010 all merchants must be certified that they are compliant with the Payment Card Industry Data Security Standards. With more and more diversity on how we take credit cards, it has become more confusing to the merchant as to whether PCI applies to them or not. PCI APPLIES TO EVERYONE; even the companies that take only one or two cards a year.
There are 12 requirements that a merchant must follow and adhere to when dealing with customers' credit card information.
1) Install and maintain a firewall configuration to protect cardholder data.
a. By installing a firewall, this helps minimize the exposure from people trying to hack into your system. There is not guarantee that someone cannot hack a firewall; but it does help minimize the accessibility of your system from people just randomly surfing systems.
2) Do not use vendor-supplied defaults for system passwords and other security parameters.
a. Again, some of this is common sense. Use a password only you are going to know. Keep a list of your password accessible for your eyes only. Some systems will even tell you how secure your password is.
3) Protect stored data.
a. Do not store cardholder data unless it is really necessary.
b. Do not email sensitive information such as full card number and expiration dates.
c. Do not locate servers or other payment card system storage devices outside of a locked, fully secured and access-controlled room.
d. Once information is stored, you should not have the full account number or the expiration date accessible at all.
4) Encrypt transmissions of cardholder data across open, public networks
a. Again, the full credit card number should never be seen.
b. If you are working on a system that has multiple users, make sure they only see the data on a need to know basis and only have access if absolutely necessary.
5) Use and regularly update anti-virus software
a. Virus software doesn't also help protect your data, it also helps protect your e:mails. Viruses can attach them selves to e:mails and kill you computer.
b. Recommendation is not to use just free anti-virus software. Remember you get what you pay for.
6.) Develop and maintain secure systems and application.
a. Know what software you are putting on your system. Downloading applications from the internet can have spy ware leaving your computer compromised even if you have a firewall, because you gave it permission to be on your system.