University of Oxford Finance Division FINANCIAL POLICY 2.1.2 CARD DATA SECURITY (RECEIPTS VIA PAYMENT CARD) Date: 23rd December 2008 Version: 1.03 Status: Final Author: Nick Carver FINANCIAL POLICY 2.1.2 CARD DATA SECURITY (RECEIPTS VIA PAYMENT CARD) TABLE OF CONTENTS Page EXECUTIVE SUMMARY ................................................................................................................... 3 PURPOSE ....................................................................................................................................... 3 SCOPE ............................................................................................................................................ 3 OVERVIEW ................................................................................................................................... 4 PAYMENT CARD INDUSTRY SECURITY STANDARDS (PCI SS) .............................................. 6 PCI SECURITY STANDARDS COUNCIL (PCI SSC) ................................................................ 6 PCI DATA SECURITY STANDARD (PCI DSS) ........................................................................ 6 OVERVIEW OF PCI DSS REQUIREMENTS ............................................................................. 6 PCI DSS COMPLIANCE AND NON-COMPLIANCE ................................................................ 7 RESPONSIBILITIES ............................................................................................................................ 8 POLICY FOR SECURITY OF CARD DATA ..................................................................................... 9 GENERAL GUIDANCE ................................................................................................................ 9 POLICY FOR RECEIVING OR OBTAINING CARD DATA................................................... 10 CARD AUTHORISATION FORM ............................................................................................. 11 POLICY FOR TRANSMITTING CARD DATA TO REMOTE CARD TERMINALS ............ 11 POLICY FOR PROCESSING CARD DATA THROUGH THE CARD TERMINAL .............. 12 POLICY FOR STORING CARD DATA..................................................................................... 12 POLICY FOR CARD DATA RECEIVED AND PROCESSED ONLINE ................................. 13 PROCEDURE FOR REPORTING CARD DATA IRREGULARITIES .................................... 14 CARD DATA SECURITY POLICY AND PROCEDURES REVIEW ...................................... 14 APPENDICES ..................................................................................................................................... 15 A B C CARD DATA TO BE KEPT / TO BE DESTROYED ......................................................... 15 CARD TRANSACTION TERMINOLOGY ........................................................................ 15 CARD TRANSACTION MAP ............................................................................................. 16 REVISION HISTORY......................................................................................................................... 17 REVIEW AND AUTHORISATION ................................................................................................... 17 23 December 2008 – Version 1.03 Page 2 of 17 FINANCIAL POLICY 2.1.2 CARD DATA SECURITY (RECEIPTS VIA PAYMENT CARD) EXECUTIVE SUMMARY PURPOSE The purpose of this financial policy is to control the transmission and storage of customer information and data received in respect of processing receipts by credit or debit card. This policy considers how the University obtains the customer information and data and how it is transmitted, processed, and stored. This financial policy should be compatible, and read in conjunction, with the processes and associated financial control framework as published on the University Finance Division website for: Cash and Banking Card transactions Note: wherever a statement in this policy refers to ‘Card’, the statement applies to credit, debit, charge, and procurement cards, unless specifically stated otherwise. SCOPE The main areas covered by this ‘card data security’ policy are: Receiving card data Transmitting card data Processing card data Storing card data 23 December 2008 – Version 1.03 Page 3 of 17 FINANCIAL POLICY 2.1.2 CARD DATA SECURITY (RECEIPTS VIA PAYMENT CARD) OVERVIEW This policy deals with the controls required over the transmission, processing, and storage of all data and information received in respect of all card receipts accepted by the University. The management and control of data and information received in respect of cards at the University involves departments, budgetary units, the Treasury Section and the Cashiers Office. Key controls for controlling card data are as follows: Receiving or obtaining card data Card data should be received by appropriate methods only; preferably using face-to-face (chip & pin) transactions, where the customer is present and able to enter their card details directly into the card terminal; or via the online payments system. Receiving card payments, where the customer is not present, is discouraged, but if it is necessary, the preferred method is to receive the card details by phone and enter them immediately into the card terminal. Any card details sent by fax must only be received by Cashiers, who have a fax machine located in a secure environment. Card details must never be sent by email or by other electronic method, or be entered into any online payment system other than that approved by the University. Transmitting card data (to remotely held card terminals) Where personal card data has to be transmitted (from order taking / receiving location to card processing location), the card data must be recorded on ‘card authorisation forms’ and the forms must be kept secure at all stages of the transmission. If sending card authorisation forms to Central Cashiers, this can be either: (a) Faxed to their secure fax OR (b) hand delivered, OR (c) sent via the University secure (cash) carrier. Where ‘card authorisation forms’ are to be transmitted to card terminals held in departments, they must be hand delivered or sent via the University secure carrier. Do not transmit ‘card authorisation form’ data via email or any other electronic method, or send the forms by internal or external post. 23 December 2008 – Version 1.03 Page 4 of 17 FINANCIAL POLICY 2.1.2 CARD DATA SECURITY (RECEIPTS VIA PAYMENT CARD) OVERVIEW (continued) Storing card data Sensitive card data must never be retained after being used for processing. All records of card security details or authentication data must be destroyed. The bottom of the ‘card authorisation form’, where such card details are recorded, must be cut off and shredded or destroyed by other means. No track data (card electronic data) must be stored. The rest of the ‘card authorisation form’, and till rolls supporting card transactions, can be stored, as long as they are held with access restricted to authorised personnel only. Card data received and processed online Only the University approved online payment facility must be used for payment by credit card online. EPOS systems must be compliant with PCI DSS requirements and this policy, where applicable. Do not transmit card data over the University network. 23 December 2008 – Version 1.03 Page 5 of 17 FINANCIAL POLICY 2.1.2 CARD DATA SECURITY (RECEIPTS VIA PAYMENT CARD) PAYMENT CARD INDUSTRY SECURITY STANDARDS (PCI SS) PCI SECURITY STANDARDS COUNCIL (PCI SSC) The PCI Security Standards Council was founded by American Express, MasterCard Worldwide, and Visa Inc (amongst others). Participating organisations include merchants, payment card issuing banks, processors, developers and other vendors. It is a global open body formed to develop, enhance, disseminate, and assist with the understanding of security standards for payment account security. The Council maintains, evolves, and promotes the PCI security standards. Link to PCI Security Standards Council for more detail. PCI DATA SECURITY STANDARD (PCI DSS) PCI Security Standards are technical and operational requirements set by the PCI SSC to protect cardholder data. The standards apply to all organisations that store, process or transmit cardholder data. The Council is responsible for managing the security standards, while compliance with the PCI DSS is enforced by the founding members of the Council. OVERVIEW OF PCI DSS REQUIREMENTS The 12 requirements of PCI DSS are covered by this policy as stated below. Requirements 1-2 Build and maintain a secure network These sections are not covered by this policy as the University employs 3rd parties to process online transactions securely. Requirements 3-4 Protect cardholder data These sections are covered by this policy and primarily state that the University should not store or transmit card and transaction data unnecessarily. Organisations accepting payment cards are expected to protect cardholder data and prevent their unauthorised use. Requirements 5-6 Maintain a vulnerability management programme As for requirements 1-2, these sections are not covered by this policy. Requirements 7-9 Implement robust control measures / Control access to card data These sections are covered by this policy and deal with access to card data, which should be limited to when there is a business requirement and restricted to relevant staff only. Requirements 10-11 Regularly monitor and test your computer networks As for requirements 1-2, these sections are not covered by this policy. Requirement 12 Make information security a priority This section is covered by this policy and requires the University to create and maintain a security policy to ensure ongoing compliance with PCI DSS, including the need to ensure that all employees are aware of the importance of card data security. 23 December 2008 – Version 1.03 Page 6 of 17 FINANCIAL POLICY 2.1.2 CARD DATA SECURITY (RECEIPTS VIA PAYMENT CARD) PCI DSS COMPLIANCE AND NON-COMPLIANCE Compliance The PCI DSS applies to all entities that store, process and/or transmit cardholder data. It covers technical and operational system components included in or connected to cardholder data. All Merchants who accept or process payment cards must comply with the PCI DSS. Non-compliance MasterCard and Visa can impose substantial penalties for non-compliance with the PCI DSS regulations, with further penalties for any actual data compromise. As a final resort, the Merchant can be refused permission to process card data. 23 December 2008 – Version 1.03 Page 7 of 17 FINANCIAL POLICY 2.1.2 CARD DATA SECURITY (RECEIPTS VIA PAYMENT CARD) RESPONSIBILITIES The key responsibilities in connection with the policy for card data security are given below. Heads of Departments and Units Heads of Departments and Units are responsible for ensuring that this policy is adhered to, in particular the policies on: receiving card data transmitting card data processing card data storage of card data Departmental Administrators Department administrators must act as the Card Data Security Officer for their unit(s) where cards are accepted for payment of goods and services or as gifts received. As Card Data Security Officer, the departmental administrator must ensure card data received and processed in accordance with this policy. Head of Treasury The Head of Treasury must ensure that: this policy is maintained, reviewed, and communicated effectively the cashiers office is adequately resourced and trained in the card data storage procedures the controls over card data are effective and secure, and regularly reviewed. The Head of Treasury must ensure that the Head of Financial Assurance Services is advised if an investigation of material non-compliance is required, and that incidents are escalated, where necessary, to the Director of Finance. Chief Cashier The Chief Cashier has overall reponsibility for ensuring this card data security policy is: communicated to all relevant parties regularly reviewed kept up-to-date in respect of process, procedures and internal and external regulations adhered to Further detail on responsibilities Further detail on the responsibilities of staff for each step and element of the process of receiving payment by card can be found in the Financial Control Frameworks for ‘Cash and Banking’ and ‘Card transactions’, available on the University Finance Division website. 23 December 2008 – Version 1.03 Page 8 of 17 FINANCIAL POLICY 2.1.2 CARD DATA SECURITY (RECEIPTS VIA PAYMENT CARD) POLICY FOR SECURITY OF CARD DATA This policy sets out the rules and actions to be taken to safeguard all card data received and processed by the University. It is important that customers’ and donors’ card data is treated as confidential and kept secure at all times. Card processes This policy is to be followed in conjunction with the University card processes, which vary according to the nature of the transaction (i.e. Customer present/not present; Department has card terminal/uses Central Cashiers; Online). GENERAL GUIDANCE Preferred card data processing procedure When setting up procedures for taking card payments, the preferred procedure is to transact card data: Using face-to-face (Chip & PIN) transactions (where the customer is present and the order taker or sales person has a card terminal), or Using the Online Payments System for online stores. Discouraged card data processing procedures The following methods for processing card transactions, whilst acceptable, are discouraged: Receiving payment by card where the ‘Customer is Not Present’ (other than via the Online Payments System). Note: This is applicable whether the card terminal is with the order taker / sales person or remotely situated. Instances where the order is taken by phone and entered directly into the card terminal could be considered as an exception to this rule. Receiving payment by card where the order-taker does not have immediate access to a card terminal (i.e. where the card terminal is in a department office remote from the order taker, or where the Central Cashiers’ Office card terminal is used). Prohibited card data processing procedures The following methods for receiving and/or processing card transactions are strictly prohibited: Receiving card data via e-mail or any other electronic method Using any online payment system apart from the official University system, unless prior sanction is obtained from the Head of Treasury. 23 December 2008 – Version 1.03 Page 9 of 17 FINANCIAL POLICY 2.1.2 CARD DATA SECURITY (RECEIPTS VIA PAYMENT CARD) POLICY FOR RECEIVING OR OBTAINING CARD DATA No card details via email or other electronic method Do not accept customer’s card details via e-mail or any other electronic method, under any circumstances. Obtaining card details where customer is not present Receiving payment by card where ‘customer is not present’ (other than via an online store) is discouraged. However, it is recognised that customers often wish to make payments over the phone, in which case the following procedures must be followed: Obtaining card details by phone The preferred method of taking card details where the customer is not present is by phone, where the order taker has immediate access to a card terminal. In such circumstances, the order taker must enter the card transaction directly into the card terminal. Alternatively, if the order taker does not have immediate access to a card terminal, but if the card details are not entered directly into the card terminal, the card details must only be written down on a ‘card authorisation form’ (see below). Card details entered directly where customer and card terminal present Where the customer is present and the order taker or sales person has a card terminal, it is essential that customers enter their PIN (Personal Identification Number) into the card terminal unobserved. The customer’s PIN or other card details must not be written down, electronically copied, or otherwise obtained or recorded. Obtaining card details in other circumstances In certain other cases, card details may be taken as follows: By post, on an order form, in which case the details should be immediately transferred to a ‘card authorisation form’, and removed from the order form and destroyed (see below) By fax, in which case the faxed card details should only be received by Cashiers. 23 December 2008 – Version 1.03 Page 10 of 17 FINANCIAL POLICY 2.1.2 CARD DATA SECURITY (RECEIPTS VIA PAYMENT CARD) CARD AUTHORISATION FORM Complete the ‘Card Authorisation Form’ A card authorisation form must be completed, where the transaction cannot be processed immediately: If the customer is not present, and the order taker does not have access to a card terminal, this should be in accordance with the process the receiving department or unit does not have a card terminal - Customer not present. WARNING: This rule and associated process also applies, where the receiving department or unit has a card terminal, but it is remote from the order-taker. If the customer is present, but there is not a card terminal available for use at the time of the transaction a card authorisation form must be completed in accordance with the process ‘the receiving unit does not have a card terminal - Customer present’. Do not write down customer card details anywhere other than on the ‘card authorisation form’. POLICY FOR TRANSMITTING CARD DATA TO REMOTE CARD TERMINALS Send the ‘Card Authorisation form’ to the card processor Where the receiving department or unit has a card terminal, remote from the order taker or sales person, the card authorisation form must be completed and passed straightaway, [and only], to the section which holds the card terminal, as soon as possible after taking card payment instructions from the customer. Where the receiving department or unit does not have a card terminal, the card authorisation form must be completed and passed straightaway, [and only], to Central Cashiers, as soon as possible after taking card payment(s). In all circumstances, the data must be held securely at all times i.e. not left in an unattended in-tray, or where any unauthorised person can access the information. Forms should be transmitted as follows: Fax the ‘Card Authorisation Form’ to the card processor The transmission of the completed card authorisation form should be by fax wherever possible, although must only be faxed to a machine in a secure area, to which the card processor has access. Note: Currently only the fax in Central Cashiers has been designated as secure enough to receive card data. Where ‘Card Authorisation Form’ not sent by fax Card Authorisation Forms can be hand delivered or alternatively transmitted to the card processor by the Cash Collection company in that same way as cash is sent to the Cashiers for banking. Do not transmit the completed ‘card authorisation form’, or any other customer card details, via e-mail, any other electronic method, or by external or internal post, under any circumstances. 23 December 2008 – Version 1.03 Page 11 of 17 FINANCIAL POLICY 2.1.2 CARD DATA SECURITY (RECEIPTS VIA PAYMENT CARD) POLICY FOR PROCESSING CARD DATA THROUGH THE CARD TERMINAL Processing card authorisation forms through the card terminal Upon receipt of the card authorisation form(s), they should be checked for completeness, and where applicable, the card transactions should be processed immediately through the card terminal by the card processor, whether at a department/unit’s site, or by Central Cashiers. Incomplete Card Authorisation Forms Where the card authorisation form is not complete, the originator should be contacted for the missing detail. Cashiers will refer back to the originating Department for the required information. Failed card terminal processing Where the card terminal transaction fails to complete successfully, the originator and the cardholder must be notified, and alternative payment must be sought. Cashiers will refer back to the originating Department for instructions. POLICY FOR STORING CARD DATA Destroy card security details Card security details, or Authentication data, such as the 3-digit security code, card verification codes (CVC), and any other authentication data must be permanently deleted (cut off the foot of the ‘card authorisation form’ and destroyed) immediately after successful processing of the card details. Card security details must never be stored in any computer application system at the University (EPOS, Financial, HR, etc). Note: When destroying the card security details, they should be crosscut shredded, incinerated, or pulped! Destroy the card security details (where not the card processor) When the order taker, sales personnel, or dispatcher of the ‘card authorisation form’ has confirmed with the card processor that the transaction has been processed successfully, they must destroy any record they have of the card details. Track data No track data (i.e. information held on the magnetic strip and/or chip of a card) should be stored under any circumstances. Card data storage The rest of the ‘card authorisation form’ (excluding the 3-digit security code) must be stored securely in an access-restricted cupboard, filing cabinet, or safe. Access must be granted only to relevant staff. Note: Requirement 9 of the PCI DSS (see above) requires that the University “Restrict physical access to the storage area where the cardholder data is kept.”. 23 December 2008 – Version 1.03 Page 12 of 17 FINANCIAL POLICY 2.1.2 CARD DATA SECURITY (RECEIPTS VIA PAYMENT CARD) Till rolls EPOS/Till rolls may include the customer card number (or partial card number), and must be stored securely in accordance with the storage of the ‘card authorisation form’ above. No other card data stored No other records of customer’s card details (e.g. database/spreadsheet incorporating customer card information) are to be kept. POLICY FOR CARD DATA RECEIVED AND PROCESSED ONLINE The University has a secure online payment facility supplied by a 3rd party secure host. This host is fully PCI DSS compliant. It is recommended that any Department wishing to take payments online should use this facility, whereby goods and services can be sold online, and all payments are collected and processed securely. Any alternative online payment system must be sanctioned in advance by the Head of Treasury. Departments must not arrange for web sales etc, set up web shops or online stores without prior approval. Refer also to the controls for web sales shops. EPOS and PCI DSS requirements All EPOS systems used by University departments must be compliant with PCI DSS requirements (see above). EPOS systems Departments or units, who have EPOS systems, (or departments / units considering purchasing an EPOS system), should refer to cashiers for advice. Do not transmit card data using the University’s network Do not use the University’s network for taking internet/web payment by card, nor must card details be accepted via e-mail, or any other electronic media, as the University network is not secure for this purpose. 23 December 2008 – Version 1.03 Page 13 of 17 FINANCIAL POLICY 2.1.2 CARD DATA SECURITY (RECEIPTS VIA PAYMENT CARD) PROCEDURE FOR REPORTING CARD DATA IRREGULARITIES Reporting non-compliance or irregularities Any non-compliance with the policies in this document, or any other irregularities detected in respect of card and the use of cards, must be reported immediately to the Chief Cashier. Reporting to the Acquiring Bank The University staff member receiving or processing the card details, or the Chief Cashier must report any irregularity concerning the failure of a card to process, or any other suspicious activities by the cardholder, to the acquiring bank. The police must also be informed if there is reason to believe a crime may have been attempted or committed Reporting to Financial Assurance Services With agreement from the Head of Treasury, the Chief Cashier will report, or submit for consultation, the non-compliance, or irregularity to Financial Assurance Services in accordance with circumstances. Escalation reporting procedure With agreement from the Head of Treasury, the Chief Cashier may escalate the reported noncompliance or irregularity to the Director of Finance, depending on the circumstances. CARD DATA SECURITY POLICY AND PROCEDURES REVIEW Review departments’ card data security procedures All departments which have card terminals or EPOS systems, should be visited at least once a year by a member of the Central Cashiers’ Office, to: stress the importance of complying with the Card Data Security policy, review their card data receiving, transmitting, processing and storage procedures, give advice on how to correct deficiencies, Compliance Certificates Departments receiving card data or processing cards must sign a compliance certificate every 6 months. In addition, where the department uses the Central Cashiers’ Office to process payments by card, they must also complete and sign a ‘Request for Card processing form’. Policy review This card data security policy should be regularly reviewed and kept up-to-date in line with changes to regulations Advice on cash and banking For further advice on card data security, and on cash and banking, contact Central Cashiers' office. 23 December 2008 – Version 1.03 Page 14 of 17 FINANCIAL POLICY 2.1.2 CARD DATA SECURITY (RECEIPTS VIA PAYMENT CARD) APPENDICES A CARD DATA TO BE KEPT / TO BE DESTROYED The following customer card data must never be known or written down by University personnel: Personal Identification number (PIN) Card stripe data The following customer card data must not be retained by University personnel, and must be destroyed, immediately after processing the card transaction: Card verification code (CVC) Authorisation code (3 digit security code) The following customer card data may be retained by the University under the Data Protection Act, but only if there is a defined business need to do so: B Type of card (Visa/Mastercard/etc) Card number Expiry date Start date Name of Card holder CARD TRANSACTION TERMINOLOGY Card data terminology is used in this policy document. Brief explanations of the most important of these are given below. Refer also to the Card Transaction Map in Appendix C Card terminal ‘Card terminal’ is the official terminology for the hand-held or desktop terminal, into which a card is inserted, and together with the entry of the customer’s personal identification number (PIN) submits the transaction for validation and processing. Acquiring bank The acquiring bank issues Merchant Accounts and Card terminals, collects the card payments and authorises or declines the card transactions. Merchant The merchant or retailer is the card processor, which when referred by this policy, is always the authorised personnel or units of the University of Oxford. 23 December 2008 – Version 1.03 Page 15 of 17 FINANCIAL POLICY 2.1.2 CARD DATA SECURITY (RECEIPTS VIA PAYMENT CARD) C CARD TRANSACTION MAP VISA/MASTERCARD E. Provide authorisation 4. Provide authorisation t es qu Re . 3 es qu Re D. o ati r is tho u ta n ris tho au o ati ation thoris of au ation nfirm 5. Co C. Transaction via network F. Confirmation of authorisation n - Provide payment system - Global companies who manage credit cards CARD ISSUERS PAYMENT SERVICE PROVIDER - Banks acorss the world - Issue cards that use the system/ network ork via netw ONLINE MERCHANT Needs a merchant account, but as Acquiring Bank will not accept information from the merchant via the internet, needs to use an approved Payment Service Provider (PSP). tle et action Eg. Barclays Merchant Services trans S H. he st les th e Eg. WPM 6. Se tt n tio ac ns tra - Issue merchant account IDs - Authorise/decline transactions - Collect payments - Pay money into Retailer bank account 1.Transaction for authorisation Provide secure payment screens and server for transmitting data to Payment Service Provider(PSP). A. Item purchased online ACQUIRING BANK G. 3rd PARTY SECURE HOST Route of a 'normal' credit card transaction saction 2. Tran ion act ans r t s ree Ag B.Secure transmission olle &c Eg. Barclays Epdq, Realex, Netbanx ds fun cts Integrate e-commence website with international credit card networks so that transactions can be authorised and payment collected. MERCHANT/RETAILER Issued a merchant account ID by Aquiring bank, subject to status. Route of a University online transaction 23 December 2008 – Version 1.03 Page 16 of 17 FINANCIAL POLICY 2.1.2 CARD DATA SECURITY (RECEIPTS VIA PAYMENT CARD) REVISION HISTORY Version 0.01 0.02 0.03 0.04 1.00 1.01 1.02 1.03 Date 28-Aug-2008 24-Sep-2008 14-Oct-2008 24-Oct-2008 04-Nov-2008 19-Nov-08 05-Dec-08 23-Dec-08 Author Nick Carver Nick Carver Nick Carver Nick Carver Nick Carver Nick Carver Nick Carver Nick Carver Description of Revision Original draft After discussion with Chief Cashier After review by the Chief Cashier After aligning with process Final for authorisation and publication Minor amendments Executive summary added plus a few minor amendments Reviewed by HO Treasury REVIEW AND AUTHORISATION This Financial Policy for the storage of card data has been reviewed, and is confirmed as correct and compliant with the University’s financial controls, by: BARRY PEMBERTON, Head of Financial Assurance Services This Financial Policy is authorised as a policy, supporting the Treasury Management Policies, Process Controls and Financial Regulations, by: STEVE HOWARTH, Treasurer 23 December 2008 – Version 1.03 Page 17 of 17
© Copyright 2026 Paperzz