{"id":4671,"date":"2015-12-03T03:22:00","date_gmt":"2015-12-03T08:22:00","guid":{"rendered":"http:\/\/3dmerchant.com\/blog\/?p=4671"},"modified":"2021-12-03T09:34:53","modified_gmt":"2021-12-03T14:34:53","slug":"credit-card-data-merchant-store-pci-compliance-revisited","status":"publish","type":"post","link":"https:\/\/3dmerchant.com\/blog\/merchant-processing-security\/pci-compliance-merchant-processing-security\/credit-card-data-merchant-store-pci-compliance-revisited","title":{"rendered":"What credit card data can a merchant store? PCI Compliance revisited."},"content":{"rendered":"<p>There&#8217;s a lot of misinformation about collecting and storing credit card data, especially in business to business (B2B) environments for card not present transactions. Best card not present practices and how Payment Card Industry Data Security Standards (PCI DSS) requirement 3, protect stored cardholder data, applies are reviewed in this article.<\/p>\n<p>Getting paid for one time it&#8217;s not OK to store cardholder data after authorization. The only cardholder data that may be stored after authorization is the primary account number or PAN (rendered unreadable), expiration date, cardholder name, and service code.<\/p>\n<p>Merchants are not permitted to store full track data, which includes the cardholder number (primary account number or PAN) and expiration date or other sensitive authentication data after authorization.<\/p>\n<p>Per Payment Card Industry Data Security Standards (PCI DSS) Requirement 3, protect stored cardholder data, The only cardholder data that may be stored after authorization is the primary account number or PAN (rendered unreadable), expiration date, cardholder name, and service code.<\/p>\n<p>This applies even if the data is protected by:<\/p>\n<p>Encryption<br \/>\nPassword protection<br \/>\nData scrambling\/obfuscation<br \/>\nMasking<br \/>\nProprietary data formats<br \/>\nOther mechanisms<\/p>\n<p>What&#8217;s the exception?<br \/>\nBusinesses may have a need to store track data (temporarily) for troubleshooting purposes. Why? Track misreads, network errors, encryption issues, etc. This is not a daily business practice, but a temporary solution. PCI requires documentation Ensure documented procedures include:<\/p>\n<p>Collecting sensitive authentication data only when needed to solve a specific problem<br \/>\nCollecting the minimum amount of data needed to solve the specific problem<br \/>\nStoring any such data in a specific, secure location with limited access<br \/>\nDo not retain more data than needed<br \/>\nEncrypt data when stored\/transmitted<br \/>\nSecurely delete data immediately when troubleshooting is complete<br \/>\nInclude a destruction practice<br \/>\nVerify data cannot be retrieved once troubleshooting is complete<\/p>\n<p>Typical location of card verification value or codes include:<\/p>\n<p>Paper<br \/>\nDatabases<br \/>\nFlat files<br \/>\nLog files<br \/>\nDebug files<\/p>\n<p>Systems that commonly store card verification value or code data:<\/p>\n<p>Authorization servers<br \/>\nWeb servers<br \/>\nKiosk<\/p>\n<p>Card verification value or codes are NOT required for recurring card-not-present transactions.? If your system requires you to key enter the CVV each time, this is a red flag. Ensure your systems is sending transactions with the proper flag for unscheduled credential on file. Reasons why you would have to enter every time:<br \/>\nUsing a desktop terminal and key entering each time. The transactions are not being sent with correct indicator.<br \/>\nIt\u2019s also a PCI DSS requirement that unprotected PANs must not be sent or received via any end-user messaging technologies (such as e-mail, instant messaging, and chat). However, users may not be aware of this, and may be e-mailing PANs internally or even externally without the organization\u2019s knowledge<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There&#8217;s a lot of misinformation about collecting and storing credit card data, especially in business to business (B2B) environments for card not present transactions. Best card not present practices and how Payment Card Industry Data Security Standards (PCI DSS) requirement &hellip; <a href=\"https:\/\/3dmerchant.com\/blog\/merchant-processing-security\/pci-compliance-merchant-processing-security\/credit-card-data-merchant-store-pci-compliance-revisited\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":11,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[142],"tags":[],"class_list":["post-4671","post","type-post","status-publish","format-standard","hentry","category-pci-compliance-merchant-processing-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/3dmerchant.com\/blog\/wp-json\/wp\/v2\/posts\/4671","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/3dmerchant.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/3dmerchant.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/3dmerchant.com\/blog\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/3dmerchant.com\/blog\/wp-json\/wp\/v2\/comments?post=4671"}],"version-history":[{"count":3,"href":"https:\/\/3dmerchant.com\/blog\/wp-json\/wp\/v2\/posts\/4671\/revisions"}],"predecessor-version":[{"id":6308,"href":"https:\/\/3dmerchant.com\/blog\/wp-json\/wp\/v2\/posts\/4671\/revisions\/6308"}],"wp:attachment":[{"href":"https:\/\/3dmerchant.com\/blog\/wp-json\/wp\/v2\/media?parent=4671"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/3dmerchant.com\/blog\/wp-json\/wp\/v2\/categories?post=4671"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/3dmerchant.com\/blog\/wp-json\/wp\/v2\/tags?post=4671"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}