Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »

PCI Compliance Homepage

As a business accepting card payments, Seattle Pacific University needs to take a number of steps to ensure we are protecting our customers, our business and reducing our exposure to fraud.

Annually, any department within the university who accepts payment via credit or debit card, must complete a PCI DSS self-assessment questionnaire to ensure compliance with the Payment Card Industry Data Security Standards (PCI DSS). Finance and CIS are available to provide support to departments completing PCI DSS self assessment questionnaires and Finance will retain a copy of department’s completed questionnaires.

Policy

This policy addresses the people, processes and controls required to protect Cardholder Data (CHD) received, processed, transmitted, stored by, or stored on behalf of, Seattle Pacific University.

SPU schools and departments (SPU merchants) who accept payment via credit or debit cards, must comply with Payment Card Industry Data Security Standards (PCI DSS), must complete annual PCI DSS self-assessment questionnaires, must submit to periodic compliance inspections or audits, and may be required to submit to vulnerability scanning and penetration testing of systems which interact with and connect to the Cardholder Data Environment (CDE). SPU Merchants shall be responsible for costs associated with PCI DSS compliance as well as any fines or other fees associated with their non-compliance. In order to be able to interact with CHD and the CDE, SPU employees and Third Party Service Providers (TPSPs) must also complete internal and or external training, as directed, and attest to their understanding of PCI DSS compliance and their agreement to abide by the conditions of this policy.

The policy applies to CHD received, processed, transmitted and/or stored on behalf of Northwestern University interests regardless of the processing channel or banking relationship, including but not limited to card swipe terminals, POS systems, e-Commerce/web applications, virtual terminals, paper forms, facsimile or telephone. All individuals involved in the processing of debit and/or credit card payments or who otherwise are exposed to credit and/or debit card information must comply with the Payment Card Industry Data Security Standard. This includes but is not limited to:  Operational staff who handle, process, settle, reconcile, report on or otherwise interact with debit and credit card payments, or information.  Technical staff who develop and/or maintain systems and solutions used to process cardholder information including hardware, software, networks and firewalls; this can include IT security personnel, network administrators, web administrators, web developers/programmers, project managers and any individual responsible for developing, implementing, integrating, managing securing and maintaining solutions which interact with the CDE.  Third Party Service Providers (TPSPs) onsite or offsite (e.g. contractors, vendors, business partners, temporary help, etc.) who handle, process, settle, reconcile, report on or otherwise interact with debit and/or credit card payments, and information, or who are responsible for developing, implementing, integrating and managing solutions which interact with the Cardholder Data Environment, or which provider secure destruction of CHD.  TPSPs with incidental access to the CDE and CHD, such as maintenance or custodial firms. Treasury Operations/e-Commerce Operations Page 2 of 4 http://www.northwestern.edu/controller/treasury-operations/e-commerce-operations/credit-card-security-pci-dss.html GENERAL REQUIREMENTS All card processing activities and related technologies must comply fully with the Payment Card Industry Data Security Standard (PCI DSS). Any activity conducted or any technology employed that obstructs compliance with any portion of the PCI DSS is a violation of this policy and is subject to immediate remedial action. Unless specified otherwise, each of these requirements applies to all merchant card locations. This policy shall be reviewed annually and updated as needed to reflect changes to business objectives, the risk environment or the applicable standards. Material policy changes will be communicated by email to NU merchants and through ongoing education in self-service or in-person presentation format. ADDITIONAL GUIDANCE FOR DEPARTMENTS Each merchant card location is responsible for compliance with PCI DSS. Please pay special attention to the following specific requirements where the department is usually the primary control point. This is not to imply that a merchant can focus on selected requirements, all merchants are required to ensure compliance with all PCI DSS requirements. NOTE: The specific PCI DSS requirements highlighted below are referenced by the PCI DSS v3.1 requirement numbers enclosed in parenthesis. (PCI DSSv3.1 2.1) Always change vendor-supplied defaults before installing a system on the network, including but not limited to passwords, simple network management protocol (SNMP) community strings, and elimination of unnecessary accounts. (PCI DSSv3.1 2.2.a) Examine the organization’s system configuration standards for all types of system components and verify the system configuration standards are consistent with industry-accepted hardening standards. (PCI DSSv3.1 2.2.b) Verify that system configuration standards are updated as new vulnerability issues are identified, as defined in Requirement 6.2. (PCI DSSv3.1 2.2.c) Verify that system configuration standards are applied when new systems are configured. (PCI DSSv3.1 2.2.3.b) Verify that common security parameter settings are included in the system configuration standards. (PCI DSSv3.1 3.1) Keep cardholder data storage to a minimum by implementing data retention and disposal policies, procedures and processes. (PCI DSSv3.1 3.1.1) Implement a data retention and disposal policy (PCI DSSv3.1 3.2) Do not store sensitive authentication data after authorization (even if encrypted). (PCI DSSv3.1 3.3) Mask PAN when displayed (the first six and last four digits are the maximum number of digits to be displayed). (PCI DSSv3.1 4.1) Use strong cryptography and security protocols (for example, SSL/TLS, IPSEC, SSH, etc.) to safeguard sensitive cardholder data during transmission over open, public networks. Treasury Operations/e-Commerce Operations Page 3 of 4 http://www.northwestern.edu/controller/treasury-operations/e-commerce-operations/credit-card-security-pci-dss.html (PCI DSSv3.1 4.2) Never send unprotected PANs by end-user messaging technologies (for example, e-mail, instant messaging, chat, etc.). (PCI DSSv3.1 5.2) Ensure that all anti-virus mechanisms are current, actively running, and generating audit logs. (PCI DSSv3.1 6.1.b) Examine policies related to security patch installation to verify they require installation of all critical new security patches within one month. (PCI DSSv3.1 6.2) Establish a process to identify and assign a risk ranking to newly discovered security vulnerabilities. (PCI DSSv3.1 7.1) Limit access to system components and cardholder data to only those individuals whose job requires such access. (PCI DSSv3.1 8.5.8.b) Examine authentication policies/procedures to verify that group and shared passwords or other authentication methods are explicitly prohibited. (PCI DSSv3.1 9.1) Use appropriate facility entry controls to limit and monitor physical access to systems in the cardholder data environment. (PCI DSSv3.1 9.7) Maintain strict control over the internal or external distribution of any kind of media. (PCI DSSv3.1 9.10.1) Shred, incinerate, or pulp hardcopy materials so that cardholder data cannot be reconstructed (PCI DSSv3.1 9.10.2) Render cardholder data on electronic media unrecoverable so that cardholder data cannot be reconstructed. (PCI DSSv3.1 11.1) Test for the presence of wireless access points and detect unauthorized wireless access points on a quarterly basis. (PCI DSSv3.1 11.2) Run internal and external network vulnerability scans at least quarterly and after any significant change in the network (such as new system component installations, changes in network topology, firewall rule modifications, product upgrades). (PCI DSSv3.1 12.1) Establish, publish, maintain, and disseminate a security policy (PCI DSSv3.1 12.1.1) Addresses all PCI DSS requirements (PCI DSSv3.1 12.1.2) Includes an annual process that identifies threats, and vulnerabilities, and results in a formal risk assessment (PCI DSSv3.1 12.1.3) Includes a review at least annually and updates when the environment changes Policy References Payment Card Industry (PCI) Data Security Standard – Requirements and Security Assessment Procedures Version 3.1 815 ILCS 530 Illinois Personal Information Protection Act (PIPA) of 2006 Treasury Operations/e-Commerce Operations Page 4 of 4 http://www.northwestern.edu/controller/treasury-operations/e-commerce-operations/credit-card-security-pci-dss.html PCI DSS Glossary of Terms and Concepts: http://www.northwestern.edu/controller/treasuryoperations/e-commerce-operations/docs/PCI DSS-Glossary-v3

  • No labels