{"id":5108,"date":"2019-01-10T08:53:06","date_gmt":"2019-01-10T13:53:06","guid":{"rendered":"https:\/\/3dmerchant.com\/blog\/?p=5108"},"modified":"2021-12-03T03:25:06","modified_gmt":"2021-12-03T08:25:06","slug":"hotel-party-credit-card-authorization-form-alert","status":"publish","type":"post","link":"https:\/\/3dmerchant.com\/blog\/merchant-processing-security\/credit-card-authorization-form-merchant-processing-security\/hotel-party-credit-card-authorization-form-alert","title":{"rendered":"Hotel Third Party Credit Card Authorization Form Alert"},"content":{"rendered":"\n<p>Is your hotel third party authorization form compliant  with both Payment Card Industry Data Security Standards (PCI) compliance and card network acceptance rules? Beware solutions that are neither,  risking an expensive data breach, lost reputation, and reduced profits.  Due to significant rules changes in 2017, hotel management and  hospitality advisors must adopt new technology solutions to comply.<\/p>\n\n\n\n<p>Shifting from a paper credit card authorization form to a digitally \nsigned cloud form often fails to meet intended goals to prevent fraud \nand increase security. For example, some digitally signed third party \ncredit card authorization form solutions authenticate the cardholder \nwith address and security code verification.&nbsp;Authorized merchant \nemployees access and decrypt the signed document, then key-enter the \ncardholder data into another system for subsequent authorizations. The \ndocument containing PAN and security code remains on file for some \nperiod of time.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>\n  &#8220;This method is rife with compliance problems, leaving hotels \nunprotected from friendly fraud, &#8216;it wasn\u2019t me, I didn\u2019t authorize&#8217; and \ndata breach risk&#8221;, per Christine Speedy, PCI Council QIR certified. \n<\/p><\/blockquote>\n\n\n\n<p>For instance, <strong>per PCI Compliance 3.2, the security code, must not be stored after authorization, even if encrypted<\/strong>.\n Whether the security code can be stored prior to authorization, PCI \nleaves up to card brands and acquirers. Per Visa Core rules, section \n5.4.3.1, merchants cannot even ask for the Card Verification Value 2 \n(CVV2) from the Cardholder on any written form. <\/p>\n\n\n\n<p>A series of card not present acceptance rules changes are driving an urgent need for hotels to update. These <strong>significant changes include the process to store cards, use stored cards, and obtain authorizations<\/strong>. All this means, whatever worked in the past is no longer valid today.\n In the digitally signed form example, there\u2019s no relation between the \ninitial cardholder authentication transaction and any future \nauthorizations. However, if done properly, the issuer would have \nreturned a response acknowledging the merchant notification that they\u2019d \ngotten permission to store the card; future authorizations would include\n that response.<\/p>\n\n\n\n<p>Hackers continue to target the hospitality industry and they&#8217;ve been \nquite successful. With 338 breaches in the 2018 Verizon Data Breach \nreport, the accommodation sector ranks in the top three of most \nincidents and breaches. InterContinental Hotels Group, Marriott \nInternational, Radisson Hotel Group, Hilton, and Hyatt have all had \nbreaches as have suppliers to the industry like Sabre Hospitality. If \nyou know you&#8217;re going to be attacked, why not eliminate employee access \nto cardholder data completely?<\/p>\n\n\n\n<p><strong>How can hotels better protect against card not present credit card fraud?<\/strong> 3-D secure is a global protocol designed to be an additional security layer for online credit and debit card transactions. <strong>By\n combining a web-based authorization form with 3-D Secure cardholder \nauthentication, including Verified by Visa, fraud liability shifts to \nthe issuer<\/strong>, much like EMV chip shifts liability to the issuer. \nBy using a payment gateway to manage initial and subsequent \nauthorizations, with the capability to invoke 3-D secure, merchants\n mitigate chargeback risk and avoid the time consuming process of \nfighting to get their money back after they occur. As a bonus, some \nissuers support reduced interchange rates, the bulk of credit card \nprocessing fees, when 3-D Secure is invoked. No cardholder data is ever \nvisible to employees.<\/p>\n\n\n\n<p>With every part of the payment ecosystem needing to make changes- \ncard issuer, acquirer (merchant account processor), payment gateway- \nit\u2019s inevitable that there will be gaps in compliance. Non-compliance \nwith rules can result in fines, penalty fees, and removal from card \nacceptance.&nbsp;<\/p>\n\n\n\n<p><strong>Key questions to ask when evaluating hotel third party credit card authorization solutions:<\/strong><\/p>\n\n\n\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Is the security code ever stored?<\/p>\n\n\n\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Is 3-D secure supported?<\/p>\n\n\n\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Is it compliant with the Visa stored credential mandate, including unscheduled credential on file?<\/p>\n\n\n\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;After the initial authorization, are subsequent authorizations\n submitted with retail, MOTO (telephone order), or e-commerce \ntransaction type?<\/p>\n\n\n\n<p>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Correct Answers: no, yes, yes, MOTO<\/p>\n\n\n\n<p><strong><em>Keywords: #<\/em><\/strong>creditcardfraud #databreach #lodging #hotels #pcicompliance #creditcardauthorizationform<\/p>\n\n\n\n<p><strong><em>Call <\/em><\/strong><a href=\"https:\/\/3dmerchant.com\/blog\/about\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><em>Christine Speedy,<\/em><\/strong><\/a><strong><em>\n PCI Council QIR certified, for PCI compliant web-based third party \nauthorization forms and other hotel payment technology to make your \nbusiness more profitable and secure. 954-942-0483, 9-5 ET.<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Is your hotel third party authorization form compliant with both Payment Card Industry Data Security Standards (PCI) compliance and card network acceptance rules? Beware solutions that are neither, risking an expensive data breach, lost reputation, and reduced profits. Due to &hellip; <a href=\"https:\/\/3dmerchant.com\/blog\/merchant-processing-security\/credit-card-authorization-form-merchant-processing-security\/hotel-party-credit-card-authorization-form-alert\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":11,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[463],"tags":[454],"class_list":["post-5108","post","type-post","status-publish","format-standard","hentry","category-credit-card-authorization-form-merchant-processing-security","tag-credit-card-authorization-form"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/3dmerchant.com\/blog\/wp-json\/wp\/v2\/posts\/5108","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/3dmerchant.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/3dmerchant.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/3dmerchant.com\/blog\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/3dmerchant.com\/blog\/wp-json\/wp\/v2\/comments?post=5108"}],"version-history":[{"count":2,"href":"https:\/\/3dmerchant.com\/blog\/wp-json\/wp\/v2\/posts\/5108\/revisions"}],"predecessor-version":[{"id":5111,"href":"https:\/\/3dmerchant.com\/blog\/wp-json\/wp\/v2\/posts\/5108\/revisions\/5111"}],"wp:attachment":[{"href":"https:\/\/3dmerchant.com\/blog\/wp-json\/wp\/v2\/media?parent=5108"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/3dmerchant.com\/blog\/wp-json\/wp\/v2\/categories?post=5108"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/3dmerchant.com\/blog\/wp-json\/wp\/v2\/tags?post=5108"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}