• Connect
  • Bookmark Us
  • AF Twitter
  • AF YouTube
  • AF LinkedIn
  • Subscribe
  • Subscription Link
Arent Fox
  • Firm

    • History

    • Awards & Recognitions

    • Diversity

      • Overview
      • Diversity Scholarship
      • Employees on Diversity
      • LGBT Initiative
      • Women’s Leadership Development Initiative
    • Alumni

    • Pro Bono

      • Overview
      • Current Pro Bono Work
      • Community Involvement
      • Pro Bono Newsletter
      • Pro Bono Awards & Honors
      • FAQ: Pro Bono & Working at Arent Fox
    • Leadership

      • Firm Management
      • Administrative Leadership
  • Deals & Cases

  • People

  • Practices & Industries

    • Practices

      • Advertising, Promotions & Data Security
      • Government Relations
      • Antitrust & Competition Law
      • Health Care
      • Appellate
      • Insurance & Reinsurance
      • Bankruptcy & Financial Restructuring
      • Intellectual Property
      • Commercial Litigation
      • International Trade
      • Communications, Technology & Mobile
      • Labor & Employment
      • Construction
      • Municipal & Project Finance
      • Consumer Product Safety
      • OSHA
      • Corporate & Securities
      • Political Law
      • ERISA
      • Real Estate
      • Environmental
      • Tax
      • FDA Practice (Food & Drug)
      • Wealth Planning & Management
      • Finance
      • White Collar & Investigations
      • Government Contractor Services
    • Industries

      • Automotive
      • Energy Law & Policy
      • Fashion, Luxury Goods & Retail
      • Government Real Estate & Public Buildings
      • Hospitality
      • Life Sciences
      • Long Term Care & Senior Living
      • Media & Entertainment
      • Medical Devices
      • Nonprofit
      • Sports
  • Newsroom

    • Alerts

    • Events

    • Media Mentions

    • Press Releases

    • Social Media

    • Subscribe

  • Careers

    • Lawyers

    • Law Students

    • Professional Staff

  • Contact

    • Washington, DC

    • New York, NY

    • Los Angeles, CA

    Alerts

    • Newsroom Overview
      • Alerts

        Alerts by Criteria

        E.g., 1 / 21 / 2013
        E.g., 1 / 21 / 2013
      • Events
      • Media Mentions
      • Press Releases
      • Social Media
      • Subscribe

    You are here

    Home » Newsroom » Alerts

    Share

    • Printer-friendly version
    • Send by email
    • A Title
    • A Title
    • A Title
    • A
    • A
    • A

    New Security Standards Available to Merchants to Prevent I.D. Theft

    August 8, 2005

    Earlier this year, Visa and Mastercard jointly established the Payment Card Industry Data Security Standard (“PCI-DSS”). PCI-DSS was established in order to safeguard cardholder data and prevent identity-theft based on stolen credit card information.

    Currently, PCI-DSS is a voluntary standard that the payment card industry has chosen to impose on its affiliated merchants as a condition for participation in card programs. Merchants participating in card programs must have their compliance with this standard validated on an on-going basis. Participating merchants who fail to comply can be assessed monetary penalties and lose their ability to participate in card programs.

    The PCI-DSS is composed of 12 discrete requirements, which are summarized below. Basically, these requirements force merchants to develop a secure network and continually take steps to ensure that the security of the network remains intact.

    I. Developing Secure Network

    • Install and maintain a firewall configuration to protect data. A firewall must be installed on the company’s computer network that will prevent unauthorized access to stored cardholder data from both outside and inside the company’s network. Public access to system components storing cardholder data must also be limited. Additionally, steps must be taken to ensure that internal IP addresses are not revealed to outside Internet users.
    • Do not use vendor-supplied defaults for system passwords and other security parameters. Vendor-supplied default passwords and security parameters must be changed before a new system is installed on the secure computer network. System components should also be configured to minimize security vulnerabilities.
    • Protect stored data. Cardholder data must be protected by minimizing the amount of data stored on the network and by storing retained data in encrypted formats. The data storage amount and the data retention time should be the minimum necessary for business, legal, and regulatory purposes. While this data is stored on the computer network, the data must be rendered unreadable through encryption and access to encryption keys should be strictly limited.
    • Encrypt transmission of cardholder data and sensitive information across public networks. Cardholder data must be encrypted during transmission over the Internet.
    • Use and regularly update anti-virus software. Anti-virus software must be used on all computer servers and desktop computers to protect the company’s computer network from harmful attacks. The anti-virus software must be current, actively running, and capable of generating audit logs.
    • Develop and maintain secure systems and applications. Computer network security vulnerabilities must be continually re-evaluated and addressed. The company must establish a process for identifying newly discovered security vulnerabilities, such as subscribing to industry security alert services. For certain types of systems, the company must install the latest vendor-supplied security patches within one month of release. Additionally, the company should follow control procedures for all system and software configuration changes to ensure that these changes do not introduce hard-to-correct vulnerabilities to the system.
    • Restrict access to data by business need-to-know. Only allow individuals to have access to cardholder information if those individuals need the access to fulfill their job functions. In certain instances, the company must establish a mechanism to permit each user to only access the information on the system necessary for that individual’s job-related activities.
    • Assign a unique ID to each person with computer access. Each person with access to the computer network and cardholder data must be given a unique username. To ensure unique identification, all users must also authenticate their identification through a secondary method. The company must implement security protocols to ensure that password integrity is not compromised.
    • Restrict physical access to cardholder data. The company must restrict physical access to cardholder data and systems that store cardholder data so that unauthorized removal of systems or hardcopies of stored data does not occur. Access to data should be controlled by physically securing all paper and electronic media that contain cardholder information. In addition, this provision proscribes requirements for inventorying, labeling and transferring the data.
    • Track and monitor all access to network resources and cardholder data. The company must establish a mechanism to link all system access and activities to individual users through a system activities log. The system should automatically create audit trails for all individual user access of cardholder data and other system activities that could indicate tampering attempts.
    • Regularly test security systems and processes. Security controls and network restrictions must be tested routinely to ensure they can identify and stop unauthorized access attempts. Network vulnerability scans must be conducted at least quarterly, and attempts to penetrate the network must be conducted at least once a year. Vulnerability scans and network penetration tests should also be conducted after any significant infrastructure or application modification.
    • Maintain a policy that addresses information security. The company must establish and maintain a security policy that addresses all the requirements of the PCI-DSS. The security policy should clearly define information security responsibilities for all employees and contractors so that they are aware of the sensitivity of the data and their responsibilities for protecting it.
    II. Validation Requirement

    In addition to taking the steps necessary to meet the PCI-DSS requirements, merchants participating in card programs must have their compliance with this standard validated on an on-going basis. Participating merchants who fail to comply can be assessed monetary penalties and lose their ability to participate in card programs.

    There are three different methods that can be used by merchants to validate compliance: Annual On-Site Security Audit, Quarterly System Perimeter Scan Report, and Annual Self-Assessment Questionnaire. The combination of validation methods that a merchant must use depends on the number of transactions that the merchant processes annually. Large merchants (more than 6,000,000 annual transactions) must perform an annual audit and quarterly perimeter scans.

    Medium-sized merchants (20,000 to 6,000,000 annual transactions) must perform quarterly perimeter scans and fill out the annual self-assessment questionnaire. Small merchants (less than 20,000 annual transactions) are not currently required to complete any validation method, but the industry recommends that they perform the quarterly perimeter scans and the annual questionnaire.

    Proposed Legislation

    As stated earlier, PCI-DSS is currently a voluntary standard that the payment card industry has chosen to impose on its affiliated merchants as a condition for participation in card programs. Various pieces of proposed congressional legislation would mandate more stringent regulation of the collection and dissemination of personal information obtained from consumers.

    While much of this legislation focuses on providing consumers the ability to prevent companies from selling or passing on their personal information, some legislation also focuses on preventing the unauthorized disclosure of personal information.

     

    Anthony Lupo
    202-857-6353
    lupo.anthony@arentfox.com

    Sarah Bruno
    202-775-5760
    bruno.sarah@arentfox.com

    Related People

    • Sarah L. Bruno
    • Anthony V. Lupo

    Related Practices

    Advertising, Promotions & Data Security
    Intellectual Property
    • Firm
    • Deals & Cases
    • People
    • Practices & Industries
    • Newsroom
    • Careers
    • Contact

    Footer Main

    • Firm
    • Deals & Cases
    • People
    • Practices & Industries
    • Newsroom
    • Careers
    • Subscribe
    • Alumni
    • Diversity
    • Legal Notice
    • Privacy Policy
    • Social Media Disclaimer
    • Nondiscrimination
    • Site Map
    • Client/Staff Login

    Offices

    • Washington, DC
      1717 K Street, NW
      Washington, DC 20036
      Tel: 202.857.6000
    • New York, NY
      1675 Broadway
      New York, New York 10019
      Tel: 212.484.3900
    • Los Angeles, CA
      555 West Fifth Street, 48th Floor
      Los Angeles, California 90013
      Tel: 213.629.7400
    • © Copyright 2013 Arent Fox LLP. All Rights Reserved.

      Legal Disclaimer
      Contents may contain attorney advertising under the laws of some states. Prior results do not guarantee a similar outcome.