When accepting credit card payments, it's crucial to ensure that your business adheres to the Payment Card Industry Data Security Standard (PCI DSS). PCI DSS is a set of security standards designed to protect cardholder data and reduce the risk of fraud. If you process, store, or transmit credit card information, you must comply with these standards.
Please Note
While we assist with some aspects of PCI compliance, the responsibility ultimately lies with you, the retailer. You must ensure that each part of the compliance process is completed and maintained.
Here’s an overview of what PCI compliance involves and how it impacts your business.
What is PCI Compliance?
PCI Compliance means that your business meets the security requirements set by the Payment Card Industry. These standards are designed to protect cardholder data from being stolen or misused. If you accept card payments, your business must comply with these standards to protect your customers and avoid potential penalties.
Why is PCI Compliance Important?
Maintaining PCI compliance is essential because it helps prevent data breaches, protects your business reputation, and ensures you avoid hefty fines from your payment processor (acquirer) if you're found non-compliant.
The 12 Requirements for PCI Compliance
To become PCI compliant, your business needs to adhere to these twelve key requirements:
1. Use and Maintain Firewalls: Firewalls are the first line of defence against unauthorised access to cardholder data. They help block attackers from accessing your network.
2. Proper Password Protections: Change default passwords on devices and software, and ensure passwords are updated regularly to enhance security.
3. Protect Cardholder Data: Encrypt all cardholder data to protect it from unauthorised access.
4. Encrypt Transmitted Data: Ensure any cardholder data you send is encrypted and only sent to trusted locations.
5. Use and Maintain Anti-Virus Software: Regularly update your anti-virus software to protect devices that handle cardholder data.
6. Properly Updated Software: Keep your software up to date with the latest security patches, especially on devices that interact with cardholder data.
7. Restrict Data Access: Limit access to cardholder data to only those employees who need it.
8. Unique IDs for Access: Ensure that each employee with access to cardholder data has a unique ID to track who accesses what information.
9. Restrict Physical Access: Securely store any physical or digital cardholder data in a location with limited access.
10. Create and Maintain Access Logs: Keep logs of all access to sensitive data to monitor and respond to unauthorized attempts.
11. Scan and Test for Vulnerabilities: Regularly scan your systems for vulnerabilities and fix any security issues promptly.
12. Document Policies: Maintain detailed records of your security policies, software, and equipment to demonstrate compliance.
How to Achieve PCI Compliance
If your business has a Merchant ID (MID), you are responsible for achieving PCI compliance for each MID you use, whether it's for in-store or online transactions.
The compliance process typically involves the following steps:
1. Complete a Business Profile: Answer questions about how your business handles cardholder data, which helps determine your required compliance level.
2. Perform a Vulnerability Scan: Schedule regular scans to check for weaknesses in your system. This scan should be performed quarterly and must pass for compliance.
3. Complete a Self-Assessment Questionnaire (SAQ): This questionnaire evaluates your business’s security measures. You must answer all questions honestly and accurately.
4. Attest the Results: Once the scan passes, and the SAQ is complete, you must attest to the results to confirm your compliance.
Citrus-Lime’s Role in PCI Compliance
As your technology partner, Citrus-Lime provides the infrastructure that supports your payment systems. While we play a significant role in securing online transactions, especially on our eCommerce platform, it's important to note that:
- In-Store Payments: You are responsible for ensuring your in-store environment is secure. This includes securing your network and devices that handle cardholder data.
- Online Payments: We ensure the security of the infrastructure hosting your eCommerce site. If vulnerabilities are found during a scan, we will work to resolve them.
While we assist with some aspects of PCI compliance, the responsibility ultimately lies with you, the retailer. You must ensure that each part of the compliance process is completed and maintained.
Terminal and In-Store Payment Compliance
If you use payment terminals (card machines/Point of Interaction devices) provided through Citrus-Lime, you have specific PCI compliance responsibilities that differ from online payments.
Important: Pre-Deployment Compliance Requirement
Before you can receive payment terminals, you must complete a PCI compliance assessment.
- All terminal providers require customers to complete a Self-Assessment Questionnaire (SAQ-D) before terminals are deployed
- This is a mandatory part of the terminal onboarding process
- Terminal providers will not ship terminals until compliance verification is complete
Why this requirement exists: Even though our terminals use advanced encryption technology, you must demonstrate that your business has appropriate security controls in place to protect cardholder data and maintain a secure payment environment.
Your Terminal Compliance Responsibilities
Once terminals are deployed, you are responsible for:
1. Physical Security of Terminals
- Store terminals securely when not in use (locked drawer, secure room)
- Inspect terminals regularly for signs of tampering or damage
- Never remove tamper-evident seals - report any broken seals immediately
- Maintain an inventory of all terminals including serial numbers and locations
- Report lost or stolen terminals immediately to your terminal provider and Citrus-Lime support
- Prevent unauthorized access - only authorized staff should use terminals
- Return terminals to provider for disposal - never dispose of terminals yourself
2. Network Security
- Ensure terminals are connected to secure networks with appropriate firewall protection
- If using wireless connectivity, use WPA2 or WPA3 encryption with strong passwords
- Restrict terminal network traffic to only the terminal provider's endpoints
- Keep network segmentation between terminals and other business systems
3. Staff Training
- Train employees on how to use terminals securely
- Teach staff to recognize signs of tampering (scratches, loose parts, unusual behavior)
- Ensure staff know how to protect customer PINs during entry (prevent "shoulder surfing")
- Train staff to immediately report suspicious activity or device issues
4. Incident Response
- Have a process to respond if a terminal is lost, stolen, or suspected of being compromised
- Immediately notify the terminal provider to deactivate any compromised device
- Document all security incidents involving terminals
- Remove suspected compromised terminals from service immediately
5. Annual Compliance Validation
- Complete annual PCI compliance assessments as required by your terminal provider
- Maintain current documentation of your security controls
- Update security policies annually
Final Thoughts
Maintaining PCI compliance is an ongoing process that requires diligence. By following the outlined steps and regularly reviewing your security practices, you can protect your business and your customers' data. Remember, the sooner you address PCI compliance, the more secure your business will be.