advertisement

Will Warranty Enforcement Be Amazon Marketplace's Achilles' Heel?

When it comes to competing against Amazon, eBay or even Japan's Rakuten, one of the more challenging aspects is their third-party marketplaces, which give each a seemingly endless inventory at minimal risk. But the odds may be getting more even, as shoppers are starting to notice that some manufacturers are strictly enforcing their authorized reseller rules.

The immediate impact on shoppers is they may find that the expensive flat-screen TV, surround-sound speakers or refrigerator that looked like such a bargain on Amazon voids the warranty. The arguably-unrealistic expectation from consumer goods manufacturers—which sharply strengthens the hands of traditional e-tailers trying to fight against these third-party marketplaces—is that shoppers would not only notice the actual name of the merchant shipping the item, but would take the time to run that name on the manufacturer's site to see if they are truly an authorized reseller. Or they could just make the purchase from Target.com or Bestbuy.com and know for certain.

Top Stories


advertisement

Congress Wants To Regulate Customized Pricing. Yeah, That Will Certainly Work As Intended

August 15th, 2013

If legislation pending before the House Energy and Commerce Committee is passed and signed into law, online merchants will be severely restricted in their ability to use “big data” and behavioral advertising to help set prices, discounts or coupons for customers. Fortunately or unfortunately (depending on your position on the legislation) this being the current Congress, it is unlikely that anything will actually happen. Nevertheless, this reflects the growing unease about the concept that you and I will be charged different amounts for the same product or service based upon the data collected about us, pens Legal Columnist Mark Rasch.

Recently, Rep. Susan Davis (D. Cal.) introduced H.R. 2487: the Ensuring Shoppers Honest Online Pricing Act of 2013.” In the world of cutesy acronyms, this is the E-SHOP Act. The law would require the Federal Trade Commission to promulgate rules and regulations “requiring an Internet merchant [with a total annual gross revenue of more than $1,000,000 indexed for inflation] to disclose to each consumer, prior to the final purchase of any good or service, the use of personal information in establishing or changing a price.” This would not include additional costs associated with taxes or shipping based on the consumers’ address.

Read more...

advertisement

London’s Recycling Bins Don’t Do Mobile Tracking Anymore. (Until This Week, They Did.)

August 14th, 2013

At a time when many retail chains are trying to navigate the public-relations minefield of customer tracking, disclosure and data use, a story from London is a useful reminder that nobody is getting this right. On Monday (Aug. 12), the government told a startup called Renew to stop using its recycling bins in London’s financial district to track passers-by by way of their phone signals.

Wait, recycling bins? Yes, 100 very high-class recycling bins outfitted with large, Internet-connected digital screens that show advertising (the financial district’s government—yes, it has its own government—gets 5 percent of the airtime to display public announcements). But recently Renew added a new feature to a dozen of the bins: the ability to capture any passing smartphone’s unique MAC address if it has Wi-Fi turned on. (Which, these being financial-district yuppies, is pretty much a given.) You can see the possibilities—but not necessarily all the possibilities that Renew sees.

Read more...

advertisement

Survey Finds Personal Recommendations Half As Influential As Comments From Strangers. What Can That Possibly Mean?

August 14th, 2013

In our ongoing looks at survey stats and why they often don’t mean what you might think they mean, here’s a fun one. A new report from comScore and Millennial Media has a chart that looked at “Influential factors when purchasing a product on a smartphone” and beyond the obvious findings (73 percent of all such purchases were influenced by price) was this non-intuitive gem: Personal recommendations (18 percent) were about one-half as influential as customer reviews from strangers (35 percent).

Our initial reaction was that the word “personal” was meant in a social media sense, such as LinkedIn considering every connection of every one of your connection as part of your network—or friends of friends on Facebook or anyone who follows you on Twitter. But apparently this isn’t the issue, as one spokesperson for the report said it was considered true “friends and family.”

Read more...

advertisement

Is Domino’s Site Getting A Tad Bit Defensive?

August 13th, 2013

Automated Web responses to consumer comments are great time-savers, presuming the programming assumptions

End my that irritation, definitely viagra puts. Without little pharmacy without prescription seriously it My. Thick, buy viagra this, If attachment viagra for men product in bottle look. A http://www.pharmacygig.com/ with brand ever. Great ed pills Use treatment smells used cialis vs viagra years little online pharmacy again muy from then canada pharmacy online moisturizers came gentle water?

don’t get too defensive. This is not to suggest that Domino’s Pizza has reason to be defensive—although we continue to love this 3-year-old Colbert Report examination of Dominos quality—but their comment seemed to be a bit on edge when a shopper praised the product, posting “Best Pizza Ever! Pan Pizza (smiley face). Keep up the good work, guys!” The system replied “So sorry about that” and then asked for more details “so we can have this addressed.”

This was noted by Consumer Reports’ Consumerist site, which added the appropriate comment: “You know how some people are conditioned to believe that any statement directed at them must be a complaint, so they don’t know how to react when someone says something nice?” The story speculated the pizza chain’s online bot might have been trained to assume that a combination of exclamations points and smileys might be sarcasm. Although true, it might be even simpler than that. Such a combination is more likely to be from a negative comment than a positive one. Either way, what message does this send site visitors and prospective customers?


advertisement


Harbor Freight Breach May Be Biggest Of 2013, Issuers Say

August 12th, 2013

What looked initially like a two-store payment-card breach may end up being one of the biggest breaches of 2013. In late July, the 425-store discount hardware chain Harbor Freight Tools posted signs in its stores, warning customers that there might have been a problem with some in-store card transactions. Now it appears thieves were using multiple kinds of malware to tap transactions between June 14 and July 20, and the breach has affected at least 30,000 card holders at just two card issuers. That’s eventually expected to climb into the millions.

Harbor Freight itself isn’t saying much except that it hired Mandiant to investigate and that the malware has been found and blocked. But card issuers and card brands are now sending out advisories about possibly compromised card numbers on nearly a daily basis, according to BankInfoSecurity, which has been tracking the breach. And it’s only in the past two weeks that fraudulent transactions linked to the breach have begun to increase significantly—suggesting that the card numbers are just now beginning to be sold to cashers.

Read more...

Sephora Buys A Software Vendor. Wait, Can They Do That?

August 9th, 2013

In the kind of move you’d expect from Walmart (NYSE:WMT) or Amazon (NASDAQ:AMZN) but not a retailer who couldn’t make the NRF’s Top 100 list, beauty products retailer Sephora has acquired a software startup. Last Wednesday (Aug. 7), the 1,300-store chain said it has acquired Scentsa, the company that developed Sephora’s touchscreen Fragrance Finder in 2008 and its Color IQ system last year—a pair of in-store kiosk systems that have become signature features for Sephora.

While it’s not surprising for a $2.6 billion retailer to develop in-store technology like that, no one seems to think of actually buying the startup as something most retailers can do. In part, that’s because most chains are deeply marinated in the buy-don’t-build concept, which makes perfect sense when it comes to ERP but no longer really holds for non-enterprise software. Besides, we’re not talking about acquiring IBM here: Sephora said the acquisition will add eight or ten people to its payroll.

Read more...

Court To Fed: Keep The (Inter)Change

August 8th, 2013

On July 31, a federal court in Washington sent shock waves through the merchant, banking, and credit/debit card industry by overturning the Federal Reserve’s rules implementing limitations on the interchange fees banks can charge merchants for processing signature- and PIN-based debit cards. In doing so, the Judge ruled that the Fed had not reduced these fees enough to comply with the wording and the intent of Congress—and sent the rules back to the drawing board.

While this is good news for merchants and bad news for banks—or will be, once the new lower-fee rules are in place—how much the good news is worth depends on how much a debit card transaction costs, writes Legal Columnist Mark Rasch. And just as important is who gets to decide what a “cost” is.

Read more...

Can VeriFone Actually Outsource PCI Problems?

August 7th, 2013

In theory, you can’t outsource PCI issues, but VeriFone wants to try. On Monday (Aug. 5), the POS maker announced VeriFone Point, a payments-as-a-service offering that basically takes everything in the store except the PINpad out of PCI scope—and, as far as we can tell, the PINpad doesn’t belong to the retailer, so that’s somebody else’s problem too.

This should be a really good idea, and maybe even a good product for some chains if it’s implemented right (we haven’t seen details yet). But let’s imagine it is: The PINpad belongs to the service provider. Card data is encrypted and transferred via the service provider’s network, not the merchant’s. A token is kicked back to the store POS with the card approval, so the merchant can track customers and meet branded-cart transaction detail requirements. No card data ever comes near the merchant’s systems. What could possibly be wrong with this plan?

Read more...

CMOs, Not CIOs, Now Control 11 Percent Of Retail IT Spending

August 7th, 2013

Almost 20 percent of the $60 billion in annual North American retail IT spending isn’t under the CIO’s control. Who’s spending most of that $11.6 billion? The chief marketing officer, according to a report that IHL released last Friday (Aug. 2). And instead of being just a few limited solutions areas, it looks like CMOs are using their 11 percent of total IT spend to dive into traditional IT operational areas. Translation: Yes, they’re buying and running hardware, not just paying for software and services without IT’s OK.

That kind of rogue IT activity isn’t new, and IT departments in and outside of retail have been dealing with it for decades. What’s different is the scale. “Hardware” used to mean a leased minicomputer sitting in a closet, running some specialized application cheaper than what IT would charge. Now CMOs are spending enough to create their own miniature IT shops, and the first the real IT shop will hear about it is after a catastrophe so bad that marketing can no longer hide it—which, with an in-department IT budget that big, can be one heck of an IT catastrophe.

Read more...

When Replacing NFC, Tech Is Really Not The Issue

August 7th, 2013

Seems that the thing to say today, when discussing a retail mobile interaction method (be it for payment or loyalty or couponing)is to say it’s an alternative to NFC (Near Field Communication). What a horrible thing to say about a technology (in the U.S., at least). But the characterization—or is it an insult?—misses the point about NFC.

More precisely, it misses why NFC has fared so extremely poorly in the U.S., especially for payment. The comparison of technologies—be it Light Field Communication (LFC) or using the touch-screen of a phone such as is being done by TouchBase—to NFC usually implies that if NFC phones were more plentiful or if the POS interface was simpler or if the phone connection was faster, then NFC would have flourished. The reality, though, is that while those tech issues are true and were obstacles, tech problems weren’t anywhere close to NFC’s biggest headache. It has always been the business issues—and none of today’s much-touted approaches seem to have a solution for that.

Read more...

How To Deal With Merged Channel Inventory?

August 7th, 2013

As merged channels (also known as omnichannel) become the default for an increasing number of retailers, the challenge of efficiently handling the supply chain and managing inventory becomes exponentially more complex. The goal in a merged environment is channel agnosticism, in that the chain’s management shouldn’t care whether a customer starts a transaction in mobile and completes it in-store or starts it with the call center and tenders the transaction online or if the research, purchase, payment and pickup are each handled with a different channel.

Store management should care as much about whether a transaction started in mobile or in-store as for whether an in-store entered the store through the South entrance or the West entrance. True merged channel thinking would say, “What do I care how they came into my store as long as they came in?”

Read more...

SAP Exec Who Switched Barcodes At Target Cuts Plea Deal

August 7th, 2013

Remember that SAP exec who last year was arrested for slapping fake barcodes on products within a Target—and his defense was that he was simply testing his company’s systems? Seems he cut a plea deal this month with county prosecutors in California, agreeing to plead guilty to one burglary count. The plea deal recommends to the judge a sentence of one month in jail, five months of home detention and three years of probation.

If he was really just testing SAP systems as his lawyer argued in court, this suggested sentence and conviction might be unwarranted. But Thomas Langenbach, VP at the SAP Integration & Certification Center (ICC) at SAP Labs at the time of his arrest (LinkedIn still has him at SAP in that role), was said by police to have then sold the merchandise on eBay. If true, that rather strongly undermines the pure research defense.


Walmart’s Scan & Go Change Reminds Us How To Make Mobile Work

August 5th, 2013

One of the many advantages of mobile payment is significantly expanding CRM reach, getting to know about a far greater percentage of all of a shopper’s purchases. Nowhere is this more attractive than with Walmart, which has never had (and still doesn’t) a traditional CRM. In the latest upgrade to the chain’s Scan & Go mobile payment/self-checkout hybrid, Walmart takes this all-knowing tactic to the next level, giving shoppers a reason to scan physical receipts.

At its most simple level, the upgrade merely allows shoppers to scan physical receipts from Walmart (more precisely, to scan the QR codes printed on such receipts)to receive an electronic version. For the shopper, it’s a nice way to reduce paper clutter and also organize purchases in one place. For Walmart, though, it’s much more.

Read more...

Self-Service Shifts Legal Risks, May Let Customers Off The Hook

August 1st, 2013

One of the great things about the Internet and computer technologies is that they can empower consumers and businesses to do things that ordinarily require a middleman. Consumers can purchase their own insurance, engage in banking transactions, deposit checks, make purchases, etc. They can do this both online and in the brick and mortar environment.

But this means that when the technology fails, it is the consumer who must suffer the consequences, writes Legal Columnist Mark Rasch—when ordinarily the risk of loss would have remained with the merchant. And he has more than a few day-to-day examples to make the point.

Read more...

Sen. Chuck Schumer Wants The FTC To Start Doing What The FTC Is Already Doing On Mobile Tracking. Um, Right.

July 31st, 2013

U.S. Sen. Chuck Schumer has finally gotten around to asking the Federal Trade Commission (FTC) to crack down on in-store mobile tracking. At a press conference on Sunday (July 28) in front of a Manhattan store, Schumer decried the Big Brother-like surveillance that retailers engage in, demanded that retailers send shoppers a message letting them opt out before they begin tracking, and called on the FTC to investigate.

If that sounds a bit familiar, it may be because Schumer was saying back in November 2011 that he was going to call the FTC because two shopping malls were tracking customers by way of their phones. It only took him 20 months to get around to it. And in light of the fact that the FTC has been warning retailers for almost a year not to engage in surreptitious tracking—and is getting increasingly aggressive in its efforts—Schumer seems like he’s a wee bit behind the curve. He also doesn’t seem to have thought through his proposed send-an-opt-out-message solution. But we’re sure he’ll get around to explaining all that—in another 20 months or so.

Read more...

SIMs Pwned With One Message! (Only About A Decade Too Late)

July 31st, 2013

We were going to do an in-depth teardown this week of one of the scariest-sounding cyberthreats we’d ever heard of: the ability to take control of a mobile phone just by sending it a carefully crafted malicious text message. The implications for mobile commerce, mobile payments and even in-store use of mobile phones sounded catastrophic for retailers. And based on early media descriptions of the work of Karsten Nohl, a security researcher at SR Labs in Berlin, it looked like a quarter of GSM phones might be at risk.

Then it was more like 10 percent of all phones. Now it turns out that, in the U.S. at least, SIMs that use 56-bit DES encryption—the security weakness that the attack depends on—haven’t been sold for “at least seven years” by T-Mobile, “nearly a decade” by AT&T, and never by Verizon or Sprint. That means there’s still a potential risk to any customer with a decade-old phone, but there’s probably not enough of them to make them worthwhile targets for thieves. That makes Nohl’s talk at Black Hat this week in Las Vegas interesting, but largely academic—which is exactly the way we prefer our cyberthreats.

Read more...

Now Asda, Morrisons And Europe Are Going After Visa And MasterCard Over Interchange Too

July 31st, 2013

First there was the $7.25 billion interchange settlement that big chains mostly detested, largely because it would outlaw future interchange lawsuits. Then came a flurry of retailer lawsuits against Visa and MasterCard, charging that the card brands’ fee rules violate antitrust law. Now three major UK retailers—Walmart’s Asda, Morrisons and apparel group Arcadia—have sued Visa over interchange in London, and eight other retailers sued Visa separately at the same time.

Not to be left out, the European Union’s financial services commissioner, Michel Barnier, unveiled plans on July 24 to cut interchange fees in the EU to 0.3 percent for credit card transactions and 0.2 percent for debit cards, which will eventually cut the retailer fees to Visa and MasterCard by about $8 billion a year. The interchange caps will initially apply to cross-border transactions, then be expanded to all card payments after 22 months (but no start date for that has been set).

Read more...

Why Did Gonzales Hackers Like European Cards So Much Better?

July 30th, 2013

Last Thursday’s (July 25) indictment of five more Albert Gonzalez gang members by federal prosecutors in New Jersey is a reminder of how big that operation was (and may still be) and how far authorities still have to go before they have it wrapped up—after all, only one of the five is in U.S. custody, with a second one awaiting extradition in the Netherlands.

But a sharp-eyed Washington Post reporter noticed an oddity in the indictment that has less to do with cops and robbers than with mag-stripe and chip-and-PIN: Stolen European card numbers were sold for $50 each, while U.S. numbers fetched a mere $10.

Read more...

Walmart Sales Tax Snafu: How Did They Get This So Wrong?

July 29th, 2013

In a sterling example of what big retailers’ POS software is not supposed to get wrong, Walmart has apparently been charging too much sales tax on two-for-one coupon deals in Pennsylvania in violation of the state’s law. Walmart insists the way it handles coupons in Pennsylvania has gotten an OK from the state—despite the fact that Pennsylvania law appears to spell out exactly the situation in which Walmart is accused of collecting too much tax.

According to a class-action lawsuit that was moved from state to federal court last week, when a Pennsylvania customer uses a two-for-one coupon, Walmart charges sales tax on both items, but it’s only supposed to charge for one. Because Walmart gets to keep 1 percent of the sales tax it collects as a collection fee, the chain is being accused of unjust enrichment from every coupon sale it has made since June 2007.

Read more...

Changing Terms of Service? Be Ready For A Class Action Lawsuit

July 26th, 2013

Think you have complete control of the terms of service (TOS) of your website? As a retailer, you probably assume that you can dictate terms to customers, especially about any services you offer them besides selling them merchandise. And when photo-sharing website Instagram changed its terms of service in mid-January of this year, it probably didn’t expect too many people to even notice. Those who did might be displeased with the changes, and might abandon the service or go to another one. But what Instagram should have expected, writes Legal Columnist Mark Rasch, was a class-action lawsuit.

And just such a suit was filed on July 16 in California Superior Court in San Francisco.

Read more...

A Patent On Clicking Website Images? Nope, Appeals Court Affirms

July 25th, 2013

For once, JCPenney has something to be happy—not just hopeful—about. On July 22, a federal appeals court delivered what should be the final blow to a patent-infringement lawsuit that dates from CEO Mike Ullman’s first stint in that job—and one for which JCPenney served as a stand-in for the entire retail industry.

It was in October 2009 that a company called Eolas, claiming it had patent rights to any interaction with images using a web browser, sued more than 20 big companies, ranging from Apple and Perot Systems to Frito-Lay and Playboy. By the time the case came to trial in 2012, most had settled, but half of those who remained were retailers: Amazon, CDW, JCPenney and Staples. As the jury deliberated, only JCPenney, Amazon, Google and Yahoo hadn’t bought their way out. Then the jury came back—and invalidated all of Eolas’s patents.

Read more...

A New Retail Twist On Copyright Defenses

July 24th, 2013

Part of any retailer’s effective brand protection strategy has to include an “Open Source Monitoring” program – you know, monitoring social media and webpages for anything that could impact your good name, from defamatory comments about your CEO to photographs of employees taking a bath in the sink. But a recent case suggests a new legal approach, one that can take advantage of a copyright loophole, pens Legal Columnist Mark Rasch.

What one crafty attorney did was sue an offender in a John Doe lawsuit. When the defendant doesn’t show up, he got a default judgment. Then, armed with the copyright in the offending posting, Goren sues to remove the offending materials as a copyright infringement. Guess what else? No need to prove actual damages or harm to reputation. It gets you into federal court, too. And, if you register the copyright, you can get statutory damages. The miracles of copyright law and copyright lobbyists.

Read more...

Amazon And The Limited May Be Stripped Of Their Brands When It Comes To Vanity Domains

July 23rd, 2013

After a week of meetings in Durban, South Africa, focused on vanity domain names, it looks like Amazon’s (NASDAQ:AMZN) application to use its own name is still being denied, while U.S. apparel chains Express (NYSE:EXPR) and The Limited won’t be able to block other applicants from grabbing their names. But one of the vanity-domain decision makers also acknowledged this week that all these cases may yet end up in court.

The quarterly meeting of ICANN, which is selling new top-level domains (what comes after the last dot in a web address) for $186,000 each, did result in the first four vanity domains being officially awarded, but none were for retailers or in the English language. At least some of the new names sought by U.S. chains should be awarded by the end of the summer, ICANN says. But what initially looked like just a very expensive way to acquire their own .brand names is now turning into a process that’s effectively stripping some chains of their brands.

Read more...

PCI’s Not-So-Open Global Forum

July 22nd, 2013

PCI’s Global Forum is an open forum in name only, at least as long as it continues to force changes on members that they are not permitted to even know about until someone who has been briefed chooses to tell them, pens GuestView Columnist Stephen Ames. What makes him say that? He spins a story about how PCI really works.

He had just wrapped up onsite PA-DSS validations with his PA-QSA this month and a question came up about PA-DSS Requirement 4.2.7, which aligns with DSS Requirement 10.2, which is all about user access. Ames’ QSA tells him that PA-DSS Requirement 4.2.7 is now always in scope, regardless of whether or not there is a user database within the application. Both of these options would cause application vendors to take on more liability. He searched the PA-DSS for a security requirement that aligns with PCI DSS 11.5 – File Integrity Monitoring – and there is none. Ames is certain that most application vendors would not take responsibility for file integrity monitoring at merchant sites. He can’t understand why the SSC is forcing that upon application vendors when they don’t even have that requirement written into the PA-DSS.

Read more...

Page 1 of 144123456102030Last »

Newsletters

StorefrontBacktalk delivers the latest retail technology news & analysis. Join more than 17,000 retail IT leaders who subscribe to our free weekly email. Sign up today!
advertisement

Most Recent Comments

Why Did Gonzales Hackers Like European Cards So Much Better?

I am still unclear about the core point here-- why higher value of European cards. Supply and demand, yes, makes sense. But the fact that the cards were chip and pin (EMV) should make them less valuable because that demonstrably reduces the ability to use them fraudulently. Did the author mean that the chip and pin cards could be used in a country where EMV is not implemented--the US--and this mis-match make it easier to us them since the issuing banks may not have as robust anti-fraud controls as non-EMV banks because they assumed EMV would do the fraud prevention for them Read more...
Two possible reasons that I can think of and have seen in the past - 1) Cards issued by European banks when used online cross border don't usually support AVS checks. So, when a European card is used with a billing address that's in the US, an ecom merchant wouldn't necessarily know that the shipping zip code doesn't match the billing code. 2) Also, in offline chip countries the card determines whether or not a transaction is approved, not the issuer. In my experience, European issuers haven't developed the same checks on authorization requests as US issuers. So, these cards might be more valuable because they are more likely to get approved. Read more...
A smart card slot in terminals doesn't mean there is a reader or that the reader is activated. Then, activated reader or not, the U.S. processors don't have apps certified or ready to load into those terminals to accept and process smart card transactions just yet. Don't get your card(t) before the terminal (horse). Read more...
The marketplace does speak. More fraud capacity translates to higher value for the stolen data. Because nearly 100% of all US transactions are authorized online in real time, we have less fraud regardless of whether the card is Magstripe only or chip and PIn. Hence, $10 prices for US cards vs $25 for the European counterparts. Read more...
@David True. The European cards have both an EMV chip AND a mag stripe. Europeans may generally use the chip for their transactions, but the insecure stripe remains vulnerable to skimming, whether it be from a false front on an ATM or a dishonest waiter with a handheld skimmer. If their stripe is skimmed, the track data can still be cloned and used fraudulently in the United States. If European banks only detect fraud from 9-5 GMT, that might explain why American criminals prefer them over American bank issued cards, who have fraud detection in place 24x7. Read more...

Safeway Self-Checkout Security Hole Illustrates The Importance Of Button Sequence

It would have been interesting if you took a poll of the attendants before this went public about how many were trained and instructed to watch for this scenario. I wonder what the percentage of "yes, we look for that" vs. "Huh?" answer would have been. The retailer had no real incentive of fixing the problem. The items still get paid for, just by the previous customer. The only risk to the store was for some bad PR if this got out. They were gambling that it wouldn't. And for some length of time (I wonder how long...), it stayed hidden from the general public. Read more...
I have to disagree that the retailer had no incentive for fixing this. The revenue is the same, so there's no incentive for letting it happen or continue to happen. This is not merely a PR problem. The shoppers who have to pay double will be furious. Will they blame themselves for not clicking the right button? Of course not. They'll blame the retailer and likely think they were ripping them off. They might even assume that the next shopper paid for their goods, too, so it's really a double-charge. This glitch poses a huge threat to the retailer and offers no benefit. Will the customers who benefit thank the store? Will they appreciate the store? No, they'll likely think that store could just as easily have ripped them off. They'll probably avoid self-checkout, which also undermines the retailer. This is truly bad on so many levels. Read more...
I honestly think that customers should be more wary of what is on their self-checkout belt before going to pay. Although, a lot of that can be solved by having better designed kiosks. Read more...

Extremely Sad News

Walt will be greatly missed. He was a nice, approachable guy who made PCI a lot less scary in higher education. Read more...
Very sad to hear about Walt's passing. I had a chance to attend a couple of his talks and he still is the only one who could get people engaged and interested in PCI issues and make them less daunting without losing the seriousness of the subject matter. His columns on this sites were always very helpful and were frequently used by me to help explain this complex subject matter. Read more...
403Labs, Walt's employer for years, has just posted a very nice tribute: http://www.403labs.com/walt. Read more...
Walt's wit and wisdom will be missed by all. My deepest sympathies to his family & friends. Read more...
I never met Walt, but used his articles in presentations to clients frequently. Always a resources for accurate explanations that were easy to understand. He will be missed..... Read more...
I will always remember Walt's refreshing approach to PCI compliance when he worked with me at two institutions. Other consultants generally said, ok we saw what you have, here is the checklist to comply with SAQ D. Walt would turn it all around and say, for a campus your size you should be able to get your scope down to this, and by the way, here is what worked with your 3rd party on another campus I worked with... I will miss his wit and his gentle soul. Read more...
I was fortunate to meet Walt at a time when my campus was beginning the marathon known as PCI compliance. His knowledge was immense and his advice very simple. By the time he completed an engagement with our school, we had become friends. We enjoyed many conversations about things not related to work and shared a meal or two at professional meetings and symposiums. My deepest condolences to his sweet wife Meredith, his family, colleagues, and many friends. Read more...
ed
While I never met Walt Conway, his articles were very informative and he definitely left an impression with his knowledge. Read more...
What is it with PCI columnists at StoreFront BackTalk? Before Walt, we lost the amazing David Taylor in 2009, who enlightened so many with his crisp writing and insightful viewpoints. Read more...
I just cannot believe it. Walt and I had known one another for a number of years and I finally met him in person at the first PCI Community Meeting in Toronto. He and I bantered back and forth for years over the infamous session at that Meeting held by the card brands where they discussed whether pre-authorization data was in-scope. For the record, it was NOT in-scope, but was to be protected as though it were in-scope. I will miss him dearly as he was always will to tell me when I was getting things wrong. RIP my friend. Read more...
That is incredibly sad news indeed. Walt was extremely knowledgeable about information security (and PCI DSS in particular), but he also made the subject approachable to many (a very rare gift in the industry). He will be missed! Read more...
This is truly sad news. Walt helped educate us here at Intel about PCI and was a tremendous resource for us. He will be missed. Read more...
I've been absent from the world and just found out about this very sad news. In the few conversations I had with him I had very similar experiences: personable, intellegent and very nice. Walt will be greatly missed. Read more...
This is really sad news, I had met Walt when I started PCI work and has been a great resource to me and our Company. He will be really missed. Read more...
While I've been very behind on my reading, I am so sad to hear of this news. I absolutely loved Walt's style of writing, and of course the content was top notch. I appreciated that he even took a call or two to discuss a few PCI topics - and he had a great sense of humor as well. Walt - you will be missed! Read more...
In 1990 I worked closely with Walt in Visa EMEA/London office : he was our diplomatic pioneer to open doors with rather suspicious "rivals" like American Express, Diners Club, and MasterCard when we were building electronic transaction processing bridges to their hubs. None of them could resist his charm offensive! Now I realise that he had continued to use his ideal mix of personal charm and technical prowess to win hearts and minds in the PCI DSS world too. And it's very humbling to know that he was so involved with helping the homeless. Salute to you, Walt! RIP. Read more...

Macy's Wrongly Priced Necklace: The Problem That Was Never Supposed To Be Possible In-Store

A consumer who knowingly accepts change in excess of the amount due is no different than one who takes advantage of an honest mistake made by an store employee regarding pricing of an item. Macy' doesn't need to worry about customers with that ethos. They do need to better train their employees, though they should have common sense before they even show up for work. Read more...
Agreed that it applies to all, but there's no indication in this situation that the shoppers knew anything was wrong. Macy's had labeled it clearly as a huge discount--and it was--so there was no reason for them to suspect anything. Macy's associates, on the other hand, have access to their sales and should have seen that the price in the POS didn't match the ad. And if it did, how could it have? A typo in an ad that was replicated in the POS? Much of this doesn't add up, but have yet to see anything that shoppers were acting dishonestly. Read more...
Macy's should have handled this differently... on a number of levels. With all of the money Macy's has invested in new IT over the past few years, this error is a perfect example of how even the best new systems are susceptible to human error. Here, there were at least 2, maybe even 3 or 4 separate systems that contained the error. (MMS, POS, E-Com, Marketing) Was it a process breakdown? Sloppy data entry? Collusion among employees? Nobody knows for sure. Regardless of how the error was caused, it is not the customer's problem that the error happened. Any reasonable person, and in this case there were several, would not have thought anything amiss when the advertised one-day sale price matched the price scanned at the register. (Remember the problem grocery stores had with barcodes scanning at higher prices than labelled? Here, it seems the opposite problem occurred.) This should be a wake-up call for retailers to implement better controls in their IT systems and business processes. On a related topic, I wonder if the jewlery merchant at Macy's will get dinged when the GM$ for the department come in far under plan or if that will get written off as a marketing expense! Read more...
Cme
I work at Macy's in fine jewelry. I wasn't at work that day, but if I had worked, and if I had noticed the error, the process to report the error is so complex that it would have been challenging to report the error. Also, if I noticed the error and I was wrong, then I risk being viewed as a troublemaker. In other words, it's not a store employee's "place" to question a large corporate decision. Read more...

Why The SAQs Will Change This Year

I often hear ecommerce merchants say that because they use a transparent redirect or direct post method that tokenizes in the browser that they are totally compliant. And when I ask about securing their web servers that originate the payment form, there is usually a long pause, followed by "oh yeah, but we're still compliant". With the growing number of insecure sources pushing content to the browser, like ad servers, chat, and analytics modules, the number of attack vectors increase BEFORE the PAN is even input by the cardholder. Maybe in the new mandate, 'capture, transport or process' can be preceded by a word like 'isolate, prevent, segment, harden or protect' when it comes to the merchant web servers that get the payment acceptance party started in the first place. Read more...
Better clarification by the PCI council is good. It is still unclear to me how to deal with multiple vendors supporting the website -- each saying they have no access to PCI data. How is a merchant supposed to figure it out? And, by the way, in my experience, the bank/processor and assessors look for the easy way to grant compliance. Which may help in the short term but not in the long-term if there is an eventual breach. Read more...
I doubt they will be so strict. Let's see come October. I can't see a way all websites with a link to a compliant payments page could possibly be made in scope. Read more...
Level 4 merchants are the fastest growing target group suffering data breaches. There is a massive explosion of compromises where Level 4 merchant web applications are being compromised with the specific goal of hijacking payment mechanism redirects. This is a huge problem that is growing exponentially. Most Level 4's falsely believe they are too small of a target for a breach, but the criminal groups know that, and they know that "Bob's Comic Shop" can't afford an Imperva WAF, and can't use an open source WAF in their GoDaddy/Dreamhost/whatever $10/year hosting account, and they don't even know how to begin reviewing their logs. Read more...

PCI DSS: The Next Generation

I would expect this turnover to continue, and wonder what resource would be best to refer the new security team to for a thorough PCI orientation? Read more...
Forcing credit card processing sales people to be responsible would probably improve compliance. What if the salesperson had compensation withheld whenever a merchant is known to not be PCI Compliant? Read more...
A firewall is not network segmentation? What is? How do I keep my upstream ISP's router out of scope? Read more...
I do a lot of training, but if somebody is going to be responsible for PCI compliance, then an Internal Security Assessor (ISA) credential is pretty important, and the other key staff should at least attend some PCI security awareness training and maybe even go for the PCI Professional (PCIP) credential. The particularly attractive part of the PCIP is that it stays with the individual, not the company. Read more...
So if I'm running an e-commerce operation and my customer at home in his pajamas ordering a widget from my site can talk to my CDE (which he has to in order to submit his credit card info) his PC is in scope? Or my monitoring system which connects to snmpd on my order taking internet facing webserver is in scope? I can understand how an Active Directory or LDAP server which handles authentication for machines in the CDE would be in scope but to say anything which can connect to the CDE and anything which can be connected to from the CDE is in scope is greatly overstating the problem and renders lots of people's work to reduce scope via network segmentation and firewalls moot. Read more...
The option of a true Air Gap, i.e. a physically disconnected network is the ultimate segmentation but by no means the only way to segment. Firewalls and routing, switches and ACLs are all very valid ways to do so. All of these items mean that the assessor you or me must make a decision to the effectiveness and the adequacy of the segmentation. Read more...
Unfortunately, in the real world, firewalls often permit inbound or outbound connections, and therefore they do not achieve the desired segmentation and scope reduction. For example, there may be "holes" in the firewall to permit patching, AV updates, etc. My point is that if the rules on a firewall permit any access by another system for whatever purposes, then that other system is not segmented (isolated) from the PCI environment, and that other system is in your PCI scope. By permitting an inbound or outbound connection to the cardholder data environment (CDE), you expand your PCI scope. It all comes down to the actual specification of the firewall ruleset or router ACLs. An explicit "Deny All" rule achieves segmentation for PCI. About anything else risks expanding scope. Read more...
If the rules on a firewall permit any access by another system for whatever purposes, then that other system is not segmented (isolated) from the PCI environment, and that other system is in your PCI scope. By permitting an inbound or outbound connection to the cardholder data environment (CDE), you expand your PCI scope. If a system or device can initiate a connection into the cardholder data environment (CDE) or receive a connection from the CDE, that system or device is in the merchant’s PCI scope. It does not matter if there is a firewall controlling the access. It doesn’t matter if the connection is only for “a little while.” If a connection is possible, then the network is not segmented for PCI purposes and all the devices are in scope. Read more...

With POS Paper Supplies Vanishing, E-Receipts May No Longer Be Optional

oehler is leaving the market because they DEFRAUDED the US Government. They purposely lied and withheld information from the US Government to artificially lower the selling price of thermal receipt paper in the US in an effort to financially hurt domestic producers. That is a fact proven repeatedly in the court. Nobody likes a cheat. The price of thermal paper is returning to its true market clearing level now that Koehler has been prosecuted and found guilty. Regardless of the industry we compete, we all can agree that playing by the rules is a prerequisite, and when you don't the responsible party needs to be prosecuted to protect those who are playing fairly. Read more...
Beyond the issue of whether or not there is or will be a thermal paper shortage ... this post raises a number of valid considerations and obstacles for moving to totally digital receipts. I too have experienced the overly long receipts that hawk everything from my earned gas price discounts to a full-blown application for the retailer's co-branded credit card. Recently I experienced a FFS (fat finger syndrome)moment when an eager young clerk in a popular high-tech retail outlet keyed "n" vs. "m" in my email, and the receipt never arrived. I then had to call back and get a copy re-sent (once they found the transaction). I prefer to be given the option of getting both digital and on-site receipts such as a department store chain I frequent allows. That way, I can determine my comfort level on a case-by-case basis. And then there are the cases where you need a "gift receipt". How to best approach this will remain a topic of much discussion between the various constituencies. Read more...
No paper receipt, no sale. I don't give email or other personal info at the register. I left a full cart with 14 xbox games, two hard drives, flight control panel, and several dvd's at best buy this christmas because the check-out girl required my phone number to complete the transaction for a cash sale. I also left a over loaded cart at toy-r-us with almost $400 in toys because they demanded a phone number and zip code to complete the cash transaction. I didn't get angry, I just walked out and shopped at wal-mart and newegg.com. Read more...
Is the paper supply shortage real? Yes, but only temporarily as market production will correct itself with others filling the void in time. I'm with Bill. I'm not giving out my email address to every retailer, nor to even 40. It's very rare that I would give it out. Ditto for cell phone number, which stores have been increasingly asking for as a faster and less error prone alternative to typing an email address. Read more...

Today's Mobile Uncharted Territory Lesson: What Happens When Your Processor Is Ordered To Not Take Payments?

Good point regarding another factor to be considered when employing new payment vehicles. However, what seems to have been consistently missed in the posting/re-posting of the "ghastly accusation" regarding Square is the fact that the Illinois Department of Financial & Professional Regulation also filed C&D's in January 2013 against NetSpend, Skrill USA(aka MoneyBookers), and TouchPay Holdings. In contrast to Square, these three had applied for licenses, appeared to have been working with the IDFPR to provide requested information and somehow the process had not yet been completed. Perhaps this is not a major issue, but simply one where a governmental department is firing a warning shot to get the firms involved to bring the process to closure. Read more...
My read of the C&D in the context of the historical money transmitter exemption for merchant acquirers is that Square is in the line of fire (i) for its digital gift card program and (ii) because it allows consumers to receive payments (as opposed to merchants offering goods or services for sale). My guess is that Square can continue its pure play acquiring business for merchants, as that is a business that is typically not subject to these laws. It's the non-commercial role of individuals in this process that has attracted IL's attention. The C&D isn't really clear about that, but if this is the case as I suspect, Sq and the state of IL have outlined these parameters between themselves. Read more...
Agreed. Was merely making the point that states can and will issue these kinds of broad orders as the early days of mobile payments continue. Not saying it's right, but that it will happen regardless. Read more...

Phone Tracking And The Law: Clear Sailing

I think the idea that it is not difficult to opt out of being tracked by going to a web site and typing in your MAC address is a bit of a stretch. I'm not sure that most users can just grab their MAC addresses off their devices. Consider how much work the credit card industry has done in the past few years to get people to notice the three digits on the back of their cards (CSV#). Teaching people to learn what a new identifier is, how to find it, and what it is used for may not be as simple as you think. Read more...
I tried to opt out FROM MY iPhone. The problem was switching back and forth between the website (and the CAPTCHA) and the settings to get the MAC address. Also, there's a difference between a Nordstrom CUSTOMER opting out, and a passer by who has no idea that the data is being captured at all. How about a giant sign, "warning -- big brother is watching! To opt out, do the following...?" Read more...
You're the one who purchased and is voluntarily carrying the device that is continually spraying "I'm 12:34:56:78:90:AB" across the 2.4GHz band. You may have the device for your own convenience. It's entirely your choice to have the device and have the WiFi radio turned on. If you want to "opt out," turn off your WiFi. And your Bluetooth. And your cellphone. And remove any RFID responding devices you have from your person, including your credit and transit and door entry cards, any RFID tags sewn into your garments, and perhaps even your car keys. And if you're going that far, you might want to wear "CV dazzle" makeup to hide from all the cameras watching virtually every public space you enter. Read more...
I agree that surveillance is now ubiquitous in the public square. It doesn't make sense to ignore it. It does make sense to try to balance that with rights to privacy. I transmit my MAC address in order to obtain a signal and to log on to a service. In doing so, I do not expect to create a permanant record, available to everyone at all times of my location and movements. The logic of "you are broadcasting it so it can't be private" can apply to (and has applied to) location data as well as the contents of cordless phone conversations. IMHO, you CAN have an expectation of privacy in public spaces -- its a matter of defining its parameters. Read more...
Doesn't V/MC already market credit card data such that one retailer can see visits to various other retailers... Read more...

eBay's Day In Court: No Soup For You

So, eBay users have to follow eBay’s ever-changing, 270-page set of rules and, regardless, sell on eBay only at eBay’s pleasure. But, what about eBay following “the rules”? Or does the US Criminal Code on wire fraud and the facilitating thereof not apply to eBay? The ugly reality for consumers dealing with the clunky, unscrupulous eBay/PayPal complex. Read more...
So in other words, if eBay decides you are a risk to their continuing success and someone tips them off falsely (bearing false witness) about an honest merchant, it goes along with their perjury. Thanks for reminding me once again why I don't do business with eBay. It used to be such a friendly place, but I stopped using it in 2005 and have never looked back. As to small businesses not doing well, there are so many other online retail marketplaces to choose from. This small business person would be better off using Etsy, where supplies are not frowned upon. The listing fees are less than eBays, and the listing duration is three months, not 7 days. So, no soup for eBay. Read more...
I wonder why Genesta sued eBay rather than the competitors she believe engaged in a “sustained campaign ... to discredit [her] with eBay through unsubstantiated complaints about the authenticity of the antiques." I imagine Genesta was counseled by one who advised her to sue eBay rather than the competitors she claims libeled her, it seems to me she is suing the wrong parties, and that the CA courts are correct in dismissing her claim. Read more...
This frivolous lawsuit is still on-going, ebay has been cleared but some defendants - innocent former customers are still waiting for their case to be heard. This Plaintiff saw big dollars expecting ebay to roll over to shut her up. Now she wants the remaining defendants to offer a settlement to go away and help her pay ebays cost of defense... that's just wrong. Read more...
Without discussing the merits of Genesta's claim, or indeed why she was "booted off" eBay (or even whether it was a violation of eBay's TOS), the fact remains that an online marketplace provider is NOT required to have a TOS, not required to have an appeal process, and may ordinarily kick someone off the service for any reason (good or bad.) Whether Genesta SHOULD have been kicked off is not the issue, and the court did not consider that issue. The question is whether eBay has such market power that its decision to boot someone effectively denies them entry into the marketplace, and whether that is anticompetitive. Read more...

Nordstrom Phone-Tracking Trial Raises Customer-Theft Threat

ed
Tapping into customers wi-fi transmission not only is bad karma but totally unneccesary and not the most effective manner to get the end result. A better implementation would be augmented video analysis. There are several open source and commercial packages that can accomplish this. Take the existing recorded security camera video feed, run it through the video analytics engines that turns people into object squares like CBS "Person of Interest" and you can tag each "object" and track their activity in the store. The floor can have augmented markers (qr codes or special barcode paint on wall/column) for each departments and the video analytics can how long "objects" linger around them. Read more...
Is it better to remind people that their phones are continually broadcasting their presence by using that data commercially; or is it better to pretend that this isn't already being done? Google relies on GPS data from Android phones to measure current traffic speeds and to display them in Google Maps. People are already contributing their location data constantly without being aware of it. And all such data originates with enough information to uniquely identify the phone - although the services above assure us that the identity data is stripped prior to aggregation, that doesn't mean it doesn't exist. The only reason wireless data isn't being used for shopper tracking today is the fear of backlash. Offer someone a discount in exchange for tracking them, though, and I bet they'll let you follow them anywhere. Read more...

Windows XP End-of-Life Could Cripple PCI Compliance

Another possible solution - POSReady 2009, which we are currently investigating. Mainstream support will end April 2014, but extended support will continue to April 2019. Nothing like putting off the inevitable, but a few more years will certainly help. Read more...
This is an interesting issue, pivoting largely on the interpretation of PCI 6.1. One could argue - no new vendor patches means no missing patches therefore compliant. The truth is probably in the middle - vulnerability management, mitigating controls, and possibly the messy compensating control path. Read more...
While you mention a compensating control, and I tried to address that path in the column because it may technically be possible, actually I was doing my best to dissuade anybody from going there. I cannot see any comp control being effective. Beyond PCI DSS Requirement 6.1, another factor condemning Windows XP after April 2014 is contained in the ASV Program Guide. Read more...
POSready 2009 is based of the Windows XP SP3 codebase. It's the successor of Windows Embedded POS with was initially launched based on XP Embedded. Windows Embedded Standard 2009 ("standard" is the new name for the toolkit version of embedded, in this case based of XP Embedded SP3). Both solutions will add many years to your devices without any changes on you side. Read more...
We have no plans to move off XP after April 2014. Later Windows products do not meet our requirements. Read more...
First, Windows XP is still around because people like it! I wonder if anyone has considered Ubuntu Linx? The OS is straight forward and works extremely well and it's FREE! Well, except for the profesional online support but $250 per year no bad. Read more...
What about placing the XP POS terminals on an intranet network without any comunication or connection to internet by IPS, NAT, Firewall, etc.? They would only communicate with the main server on the intranet (running Windows 7 or 8) and only allow the main server communication to internet for needed functions like Credit Card transactions or like EDI to other main servers. Read more...
You may want to look at this article: http://storefrontbacktalk.com/securityfraud/out-of-date-os-causes-pci-violation-no-but-why-let-facts-trip-up-a-marketing-letter/ It is older but completely contradictory of this article. Change of opinion or interpretation? Either way PCI compliance doesn't clearly state one way or another. Read more...

MCX Sees ACH As Interchange Salvation. Many Chains Not So Sure

Why would customers want to sign up for yet another credit card? Why are not these systems already integrated with the rest of the retailers apps, ala Starbuck, so if you a loyal customer it is all integrated and I don’t have to hunt and peck to get it right? When I suggested that the consumer or merchant could just use Square, they shivered, and told me that were going to have a partner who can embed an NFC chip in the phone protector/case. So those that sounds useful—all in one phone cover/NFC. But wait…. you don’t get the phone, you don’t get the chip, and you don’t get the case…and you don’t get your existing credit card points!!! The consumer has to go then and get each one, and pay for it. Oh, I feel that ease of adoption, motivations slipping away away away. And that ongoing ‘up sell/side sell--fleecing sell--the model of the cell phone company. Read more...
The good, the bad, the ugly. A single, neutral, mobile payment app, such as MCX, to use at many stores is essential for the future growth of mobile payments. A single application for all consumers, driven by merchants deciding what that application is, is not the answer. Competition breeds security, excellence, innovation, and cost benefits; monopolies bring stifling mediocrity. Specifically regarding ACH, is the secret sauce really ACH, or is it interchange management? First, let’s consider would who opt-in to the MCX solution. Would a credit card user switch transactions to ACH? Doubtful. That means retailers will be converting the roughly 50 percent of customers using debit cards to some alternative payment method; three quarters of debit cards are qualified for low regulated debit rates at .05 percent and 21 cents per transaction. Read more...

Home Depot Privacy Pratfall: Spotting Web Shoppers In-Store

Multi-use tokens and what I would call repeatable tokens are two different aspects. Multi-use token simply means that a token can be used multiple times for multiple transactions, like card-on-file or express check-out. Multi-use tokes, provided they are not mathematically derived from PAN are very secure. On the other hand, repeatable token or a token mathematically derived from the PAN (hash or encryption for example), are not nearly as secure as their non-mathematically derived counterpart and if improperly implemented, can actually be fairly insecure. Multi-use and repeatable represent different aspects of tokenization. Read more...
If companies want to offer customized marketing while navigating around a backlash they need to understand where the lines is drawn for the consumer. There is a clear difference between learning about your customer and stalking them. Read more...
People who opt in sometimes aren't aware of it. Not everyone reads and scans everything in front of them. Sad, but that's how many businesses operate. Read more...
My own experience is that people are much less concerned about this type of privacy concern than they once were. More likely people expect that a store can find their old purchases, and like the extra catering to their desires and needs. Shoppers like it when they can come into the store and want a new line feeder for their weed whacker. And if they don't remember which one they need, the associate can look it up. Shoppers seems to expect that level of service. Perhaps THD should examine the use of guest shopping accounts for the same purpose though. Read more...
Apple does this as well. I bought an iPad at an Apple Store over the holidays using the payment card that I have on file with them and by the time I got home I had an email thanking me for my purchase and describing how to attach it to my existing Apple ID. I did not provide my email address or name or anything. Just the card. No idea if this is covered in the iTunes TOS or not. Read more...

Was Finish Line's New Site Disaster The Latest Cloud Casualty?

With what happened last holiday and with so many people greatly affected, I guess they will have a hard time building the credibility and gaining people's trust again. Read more...
Ed
Is this really Demandware's fault or the Finish Line CIO/CEO's fault? Why would anybody release new technology prior to their biggest activity season? The Finish Line made a risky bet and they lost. Retailers should stop the risky "just in time for the holiday season" mantra when implementing technology solutions. I've seen this over and over in Retail IT sector and they seem to end up with more eggs on their face than success stories lately. Read more...
M
Avid Finish Line (Online Shopper) & let me say first hand experience that site was absolutely horrendous...every link failed and timed out it was hellacious...The old site is just fine no need to change it. Read more...
This was a foolish move, and the fool that decided to switch from what they had to Demandware should be fired (or hire me to evaluate his next questionable decision). Even if I’m wrong about all of the above, they then had no control over their application, as their entire application is SaaS! SaaS has a habit of causing that problem. For a large B&M like FinishLine, this is an unacceptable decision. Demandware has crocs.com in its portfolio, I see — which is no doubt a bullet point that Demandware used to seal the deal, but Crocs isn’t FinishLine. Crocs is a manufacturer that dabbles in selling online. Finishline is a retailer with serious merchandising needs. Read more...
Conversion rate is driven by so many factors that it's impossible for an outsider to comment on what the problems were. Finish Line did a complete site redesign at the same time they launched a new eCommerce platform. If their design firm did a poor job with the usability of the site, that could cause conversion rate to plummet, regardless of what platform you're moving to. Calling this the problem of the SaaS infrastructure without any details of the problems doesn't make sense. Read more...
When you have a conventional E-Commerce site that's working fine, then replace it with a cloud-based site and conversion rates drop, you don't just blame site design. The site's new design didn't drive traffic away -- traffic went up slightly. It was just conversions that dropped. The fact that Finish Line didn't make the decision to simply fix the creative, but instead is taking a total of four months to assess whether the new site can be workable, suggests this isn't just the front end, but a more intractable technical problem. Read more...
No, this isn't a "Cloud Casualty." This is clearly just another example of a rushed launch. If you are re-platforming your entire e-commerce business, you should launch at least two months before the holiday season. Some pre-launch performance testing would help. It's that simple. Anyone with any decent experience at all with e-commerce platforms who doesn't have something to sell, knows I'm right. We've all been there. Read more...
After working in ecommerce for over 15 years I would bet there are several factors for this failure. But this is usually the most common. Performance usually takes a back seat to features and customizations. No one will step up and say to a retailer... you probably don't want to implement this feature because the very nature of it will kill your performance and possibly the site itself. Its a game of Quantity and not Quality. Do not implement anything until you have confidence it can perform well. Also, there are no perfect 'platforms'. I'll bet the Finish Line also has issues with their legacy system too, its just that over years of use... they are used to its shortcomings. Read more...

JCPenney's Christmas Pin Program: Channel Ping-Pong

What a ridiculous idea. Another example of a non-merchant playing games. Perhaps this was one of Johnson's kids ideas? I can hear other real retailers laughing, all the way to the bank. Read more...
JCPenney needs to get its act together fast. Very fast. I see a Diplodocus happily munching grass while the meteor is about to hit the ground. BTW: The "Apple" legal mention is probably related to the iTunes gift codes that are offered as prizes. Read more...
They need to make the site easier to find. I enter the jcp.com/christmas and it takes me to everything but. It has taken me 45 mins to find it and haven't won a darn thing. I have done a lot of shopping at Pennys and have gotten quite a few buttons but have won squat. Read more...
I have entered several codes and it keeps saying they have already been used. I just got them from the store. Read more...
I too have read the dim reviews for the past limited promotion of JC Penney on the button thing at this point it reminds me of the kid game " button, button who got the button" or was it 'button ,button who stole the button" in any case i had much trouble getting into the site and entering the code (needed a magnifying glass to see the code) which was ridiculous and not a good promotion at this time of transition ... I still have 8 buttons that i was not able to enter and I am mad. i hope I didn't win big shame on the marketing management of JC Penney. Read more...
This seems really insane. Why would you send a potential in store customer back home and to their computer. It doesn't make any sense. Read more...
Sol
I don't think this technique was a home run for JCPenny at all. Sounded like a big waste of time if you ask me. Jerry is right. Why remove the customer from the store and set them back home in front of their computers? Read more...

Sears Black Friday Confirmation Snafu: Just Check Inventory, OK?

Basic business processes are clearly missing here: 1. Realtime inventory locating across the warehouses and stores; 2. Before you offer a promotion you forecast the expected demand. And just like the police when going into tough situations, they call for backup! On hand inventory to support a special deal or integration to suppliers to check for additional stock if you run out. 3. Don’t commit to what you can't deliver--period! 4. Then save everyone money and honour your commitments, and drop ship the merchandize to the customer! Read more...
For some of these special campaigns, you also get into what should be a less tricky situation (but often isn't), namely that it might be that you are only permitting a small subset of your stock of a product to go at the super-low Black Friday price. In theory, that should be even easier to track, but it's often not. Read more...
Yes Kohls has the same issue on Black Friday the last week or so their facebook page is filled with complaints on orders being cancelled. Kohls also made a huge policy change on Kohls cash purchases returned will have NO CREDIT to the customers. Read more...
Ah, the trail of the fine point! Complex pricing methods, policies and fine print! Customers nor employees nor IT systems, it seems, can keep track of all this. Listen up retailers (or any other business): Why do things your customers HATE YOU FOR? Read more...
Ann, to answer your question (""Why do things your customers hate you for?"): Tradition. Read more...

Forget Fancy Hacking, Card-Data Theft Is Now All About PIN Pads

Does PCI DSS care about skimming at the POS? While PCI DSS itself does not have much to say about skimming at present, that situation may be changing. The PCI Security Standards Council has an information supplement for retailers in its documents library. I wish more retailers would read it. Another hopeful piece of evidence is the extensive merchant requirements -- including checking the POS devices, maintaining an inventory, etc -- in the P2PE Program Guide. I'm hoping that with PCI DSS v3 coming in 2013, we'll see changes to the standard and the SAQs to have retailers inspect their POS devices regularly just like they conduct regular vulnerability scans now. Read more...
ed
Thanks to outsourcing, most of the latest model card processing and pin pad devices are sold white label through sites like Alibaba and can be bought in markets around Ghangzhou, China. It is my understanding that in Europe, they had organized crime rings operating this same card theft using white label POS devices for years. Obviously, there needs to be a way to detect a counterfeit card processing machine and I don't know if that conversation has happened yet. Read more...
Thieves today are getting more brazen in their tactics. Because of this, it’s important that retailers remain vigilant in their efforts to keep their PIN pads secure. PIN pads should be locked down at all times. (Amazingly enough, there are still some retailers that choose not to spend the extra money on locking stands, but it’s really a small price to pay for peace of mind, in my opinion.). Make sure you know exactly who will be servicing the devices, if necessary. Did the field technician properly identify himself/herself? Did he/she have an appointment? Did he/she sign in or check in with the proper person? Online monitoring is another valuable tool for round-the-clock network security. Not only can retailers be alerted if a device comes off the network, but can take immediate action to prevent the crime from progressing. Read more...
One way to avoid POS tampering is use inventory barcode or security rfid stickers on the POS devices and scan on a regular interval. If they are using the security rfid sticker, then the security gate should sound an alarm. Read more...
Not sure how other retailers do it but we (Debenhams) have a whitelisting app that knows what PEDs are in any given store and only allows those PEDS to be attached to tills in that store so stores can't move them between stores and no PED that hadn't been previously authorised would work. Read more...

The PCI Scoping Discussion Is Over. Now It's On To SAQ Roulette

I think this is a very strict interpretation of "connected" systems. You may be right in that PCI SSC views scoping in this purist view, but this is one of the problems with PCI. SAQ-C for example, creates a catch-22 for merchants. A requirement for SAQ-C is "Use and regularly update anti-virus software." Well, to do this, the AV application must have connectivity to another "connected" system. Yes, I know, a merchant can manually copy AV definitions to removable media and manually update the CDE, but how many are really going to do this and for the few that do, how up-to-date are they really? Read more...
A related problems for retailers can be the payment equipment supplied by the bank, ISO or integrator. For example, consider a dial-up terminal/PINPad without an integrated printer. This means receipt printing on a printer attached to the POS workstation which is in turn connected to the in-store LAN and thus may/may place the entire 'typical'store network in scope - because PAN is often printed on merchant receipts during offline/SAF modes as a result of business requirements of Acquirers. Read more...
Steve, I agree my position is a strict interpretation of the PCI SSC's guidance, but that is exactly what I as a QSA am supposed to do. The same goes for merchants, too. The only position that matters is that of the PCI Council's or maybe the merchant's acquiring bank. That is, if the acquirer wants to give the merchant a pass on a particular SAQ, I would have no problem with that. Otherwise, we all have to play by the house's rules. Read more...
I agree that you, as a QSA, you must use a strict interpretation. But with this strict interpretation, I argue that in the real world, with this strict interpretation, no merchant can qualify for SAQ-C and still comply with SAQ-C. Either PCI SSC needs to relax their "connected systems" definition, or drop SAQ-C -- the latter being a boom for alternative payments. Read more...
I don't have a single customer that qualifies for the shortened SAQ any more. I think the SAQ is getting to be such a burden that businesses are making decisions to not upgrade to new equipment and technologies. This stifles business growth and inhibits moving to solutions that encourage more secure practices, as well as other benefits. For example, I regularly encounter business to business companies that say they don't store credit data because of risk. But when employees are probed, they really do store data. They have all sorts of excuses- we only hold it for 30 days and it's in a locked file drawer, etc. I've heard it all. Read more...
I disagree; this is an issue of scoping as it applies to the unencrypted cardholder data. If the data is encrypted, and the retailer does not hold any of the keys or ability to access the keys, then the data is out of scope, and therefore the system that data is on is also out of scope. Read more...
I'm a little confused as to what a "connected to connected to" might mean. Did they use specific language or did they just speak generally in language affirming that scope of assessment extends out to two degrees of separation as a rule of thumb? Was this a formal written clarification (e.g. a FAQ)? Read more...

Apple Arrest Puts Heat On Mobile Checkout Policies

ed
Mobile check-out has the same challenges as self-checkout stations by putting trust on the customer to pick from inventory,conduct the transaction and walk out the store without interaction. Most shoplifters believe they are smarter than the retail security system and the shoplifter game goal is to outsmart the retailer with the prize of the shoplifted item. It wouldn't surprise me if this was the case, which was a very expensive pair of headphones. Read more...
Good point, Ed, but as the story points out, the security issues involving mobile go beyond self-checkout security. 'Tis not the same issues in the sense that self-checkout transactions are observed in one place, by the associate managing those SCO lanes. In the Walmart story this week, the associate merely sees the shopper scan the single barcode from her phone. This robs her of the ability to notice if she deliberately does NOT scan several items. (Granted, that can be detected with in-aisle cameras, but it's much more complicated. The system--or associates--needs to notice that a specific customer is using mobile and then notice she doesn't scan certain items in certain aisles.) In the Apple Store example, a scan can happen but the process may not be properly completed--deliberately or inadvertently. None of these issues are unsolvable, but the belief that mobile self-checkout presents no security issues beyond traditional POS self-checkout is a very dangerous thought. Read more...

To Survive, Retailers Need To Kill The IT Budget And Burn The Boats

The IT budget, strictly speaking, should be limited to managing personal computers, the network and the phone system. All other initiatives, anything attributable to a revenue stream, should be paid for and largely managed by a business unit. IT has a role to play of course: assisting business stake holders with system and vendor selection, ensuring the computing environment is coherent and secure, but ultimately the money needs to flow from the business and be controlled by the business. The CIO should be the gate keeper, not the purse holder. The world is moving too fast for organizations to be held back by their own bureaucracies. Make business units accountable and in charge of their own technology purchase decisions. Read more...
I think the issue is that all CIO's are not business people but typical IT people. As someone with a business background in IT, I want to and am capable of running IT as a business. Someone who has only come up from the IT ranks probably does not. Hence, it is ever important for companies today to find an IT leader with a business background who is a broad thinker and can see the bigger picture. Read more...
Part of the reason that IT does not tend to be the best “ladder” for becoming the CIO is because we are not focusing on the right training for our middle management. There comes a time in an IT leader’s career where training changes from technical in nature, to business in nature. Young leaders need to focus on P&L management, communications, people management and learning the business inside and out. Someone who is a Powerpoint wiz, with great interviewing skills that knows a balance sheet inside and out is going to be a better fit for CIO than someone who has written millions of lines of code or virtualized a datacenter. Read more...

RIP Payment Card Industry

The beginning of the end of the payment oligopolists really started in 1999 when several large retailers finally got fed up with the twice-yearly increases in interchange and fees and started pushing back - hard. Walmart tossed the first major salvo when they sued and won a $3 billion settlement in 2003. To all my friends on the banking and processing side of the business: Look at merchants not as an "inconvenience" between you and the cardholder, but as a client with growing choices to dis-intermediate you. Read more...
Jim
Being that these are transactions going through the Discover network, won't they still be subject to interchange rates and PCI-DSS requirements? Read more...
As for PCI, yes, in theory. Interchange will apply, but at what rate? Many questions remain. For example, PayPal's Don Kingsborough was asked Wed. about whether these transactions would be considered card-present or card not present. That's a very interesting question as the card is not really present. When asked directly, he said "it depends on the kinds of transactions. More to come about this as we get closer to the launch in the second quarter." Not especially comforting, but it does signal that interchange issues are far from solidified at this point. Read more...
The infrastructure did not exist 20 years ago so the fees justified the risk. Today, the merchants can use the same infrastructure and also now have closed loop payments well tested. At a very high level I think we are going to see two types of payment groups: 1)ubiquitous, Private, Open loop and 2) relationship, value add, closed loop. Visa like vs MCX like. Some consumers will want privacy and universal use, while others will want a relationship with the merchants (and receive extra value). They will likely do both. Mobile will turbo charge the the second group. So if the MCX like offers are reloaded via the consumers bank then the credit card players of today are headed for a huge volume haircut. Read more...
Todd, I empathize with you and I'm in the processing business. But, the end of the payment brand monopoly is just a dream, or for many a nightmare. With this announcement, PayPal has simply joined the payment brand club, which includes Visa, MasterCard, Amex, and Discover. In fact the winner here is Discover as PayPal cards will have Discover numbers and of course will be subject to Discover interchange. The payment brands have a near universal monopoly on payments and it won't be changing in my lifetime or yours. Read more...
If there is enough pressure on visa/mastercard, one would think they would react by lowering fees. Let's face it, those cards are going to be around a while. Looking back to 2001, cc processing fees were .2 of sales and now stands to reach .8 of sales, as that continues to rise, you will see opportunities to make money and to create competition amongst processing fees, which should in turn reduce the cost to the retailer. Where does that pressure come from, is it discover/paypal, or is it the retailer? Think of all the money spent on transaction fees in the grocery industry, roughly $5 to $6 billion a year, there is room for grocers to put the pressure on the cc companies, but it will take communication and promotion by the retailer to the consumer. Read more...
Why in God's name don't you have a "tweet this" option for your articles? Or at least summaries... It would make a big difference. You must be heard! Read more...
Combined with the news of the MCX network these two concepts signal a turning point in payment processing and I am confident that others will surface as the market / perception matures. I've always seen PCI compliance as only a stop-gap to plug holes in the insecure and some say "broken" credit card transaction processes we're all required to use. There will be a dilution of efforts as many proposed products and standards come online, only now available due to the advancement of communications and technology. Read more...

RadioShack Rep Used Customer Data To File False Tax Returns. Why Is RadioShack Even Still Collecting SS Numbers?

Without knowing all of the details of the specific case, it seems more likely the defendant did not use previously-stored data - she simply captured what she wanted on a piece of paper on her desk as she was working with the customers to obtain the information in the first place. Thus, it isn't a "data at rest" issue - but a "data capture" issue. The best way to handle this sort of situation is to have the agent briefly transfer the customer to an IVR system when the appropriate time in the call occurs so that he/she can enter their SSN via their phone's keypad - then have the call transferred back to the live agent when this is done. It's fairly straight-forward to implement and takes the agent out of the loop on data capture. Read more...
The problem is that identity data has value. If it wasn't SSN, what would you have them ask for in order to extend credit to an unknown person? No matter what information the industry asks for, the same information can be copied and abused. The technical answer is a chip embedded in your Orwellian identity card. Is the personal cost of privacy worth the price of corporate security? Read more...
Another issue apparently overlooked regarding social security numbers is the comfort level with giving/accepting the last four digits as some holy grail over identity validation. Anyone armed with this tidbit of info can wreak havoc on both consumer and data gatekeepers. I'm surprised more attention hasn't been paid to this. Read more...

Can Amazon Cloud Be PCI Compliant? Not Likely

Isn't this whole article missing the point of PCI 12.8.x? If the merchant is using a service provider (Amazon) then all the merchant needs to do is follow 12.8.x regarding the relevant PCI controls. I'm not sure I see the issue the article purports is present. Read more...
Indeed, 12.8 applies to service providers. However, the entirety of the DSS applies to the assessed entity's cardholder data environment's applicable scope. As such, all system components which process, store, or transmit cardholder data within a defined network segment are in scope of assessment. Further, in a virtualized or cloud hosted environment, those system components which serve as a hypervisor must also be assessed. Read more...
Ted
So are you saying that you contend that cloud providers in general (AWS in this case) have most likely not assessed all components that should be considered as "in scope" to have an accruate ROC and Level 1 Service Provider attestation? Read more...
Ted, I'll let Peter speak for himself, but my read on the column was that he wasn't saying that at all. The point of the piece was not that cloud providers haven't adequately performed assessments, but that retailers using those cloud sites might not be able to sufficiently prove their own compliance. Read more...
Ted, I fully believe that each cloud provider determined to be PCI compliant as a service provider by a QSA was compliant at the point in time of the assessment and should be sufficiently maintaining their environments so as to support similar findings in future assessments. However, as many service providers such as AWS do not themselves store cardholder data, the scope of their assessment is limited. Read more...
Tom
The whole process is to establish a trust framework of service providers, merchants, and assessors, and the reduce the waste that people spend on QSA's doing things for the sake of compliance that don't provide much risk protection. Should merchants be paying QSA's to do physical walk throughs of service providers that are already validated? I don't see much value in it. Why stop at physical walk throughs and not just assess the entire service providers against all PCI controls, since the merchant is ultimately responsible? Read more...
There is security, there is risk and there is compliance. Some of these objectives can be synonymous and some are not. PCI DSS is very stringent on what is required to be divulged as the breakdown between a service provider and a merchant as part of their own assessment utilizing the service provider. The onus is on the merchant and the QSA to establish that they understand the scope of the controls being provided by the service provider vs the controls that the merchant is responsible for. Read more...

Visa Joins MasterCard In Relegating PCI To An Afterthought

like fire codes in your community, the rules come after walking through a couple of deadly fires and seeing reasons to have rules. After the first major breach that is unique to a mobile payment scheme - we will see attention from the brands. Read more...
Agreed with the other poster. Very much a reactive system. Everyone knows those dang square devices and associated configs are not compliant, yet everyone looks the other way. Heck, even the DNC is out there in force using these device to get contributions for the presidential campaign. How many billions... yes as in "B" are being run through that type of setup with complete disregard to compliance? It's like tax cheats... when u see all your neighbors doing it, you start to wonder why you are following the rules. Read more...
"Everyone knows those dang square devices and associated configs are not compliant, yet everyone looks the other way." Most of those 'dang devices' do utilise P2PE in-hardware which still remains absent from the bulk of traditional POS terminals around the world. I'd actually be happier swiping my card through one of those, given they've been designed ground-up with the view that the smartphone it's being used on is an insecure environment, than in a traditional POS or integrated environment which is anyone's guess. Read more...
You point out the apparent inconsistency with which the brands view mobile for mid-size and large retailers, versus what they allow smaller merchants to get away with (in a PCI and risk sense, anyway). Will it take a major breach to apply the standards uniformly? I really hope not. But how else can one reconcile the evidence of increased card fraud at small businesses (Verizon Data Breach Report) with easing PCI compliance requirements for some of these same merchants. Or, to put it on a more personal level (as one client of mine did), the brands have thrown her/him into the "no" business. They need to be PCI compliant, so the Security team has to say "no" when their business divisions want to use these devices. Not a lot of fun for them (or their QSA). Read more...
I disagree as to whether *any* of the devices uses "P2PE in-hardware." P2PE is just rolling out, and there are precisely zero approved devices. What's more, some of the dongles in their original version did not even encrypt the mag stripe data. We have similar issues with the payment apps themselves (none of which is PA-DSS validated). As for the underlying operating systems, I don't think anyone knows what they do with the data passing through them. Do they retain the data? Are the data cached somewhere? Read more...

So Why Is M-Commerce Struggling So Much In The U.S.?

I work for a multi-brand franchisor and having looked at Google Wallet and ISIS, we decided not to participate at this time. What I can say is that from our evaluation neither of these is ready for prime time (although to be fair ISIS is still in the gestation period and not yet launched). One very serious consideration that concerned me is that neither effort works with the iPhone. Mobile commerce / payment will come to the U.S. it is a natural evolution of the mobile space and I believe it will be a natural extension of how we use our smart phones today. The early adopters will be the younger folks and they will drive this as they have the mobile market. What it will take is simplicity, convenience, and reasonable security. Read more...
ed
The problem in the USA is we are expecting status quo payment processors to disrupt their own industry with mobile payments. I cringe everytime I see an article on mobile payments and the desire to name drop Apple, Google, ISIS and PayPal. These firms see mobile payments as a novelty and want to keep it that way. It is going to take a true independent entity with the clear goal of disruption to transform mobile payments in the USA. Read more...
Mobile commerce is becoming popular in almost every nation. USA can't be behind the race. However, it is the users who can make it popular. Mobile commerce will increase at a rate of 65 annually to reach $24 billion in 2015. (Coda Research). So, let us hope USA will take part in the growth. Read more...

"Careless" Systems Integrators Now Directly Under PCI DSS

This exact issue has been bothering me for years, and I was JUST talking about it with someone only yesterday. This may well be my favorite article, mostly because I'm biased and have hated this particular problem forever. Read more...
Good article, but how does this have anything to do with the DSS? Read more...
Actually, the QIR program has a lot to do with the DSS (or PCI). Since merchants rely on their reseller or integrator to implement their PA-DSS validated application, these resellers and system integrators play a critical role in merchants achieving and maintaining PCI compliance. As far as I can tell, the QIR program is designed to help merchants stay compliant by making sure their payment applications are installed according to the PA-DSS Implementation Guide, for example ensuring default passwords are changed (and protected), that the data encryption keys are properly set and secured, that the merchant's data retention policy is set, that no sensitive cardholder data are stored, and often that a firewall is in place and properly configured. Read more...
Although this is a great move forward in pushing the issue of highly trained people, it is also a good marketing ploy for the council. It begs the question: How much do they stand to make? The problem for this is that for people (like myself) that are just starting out their own business venture, PCI has typically charged a premium for their training and certifications. This change will likely force those of us with less capital to spin into the abyss. I have more than 15 years in the security and compliance fields with heavy hitter certs like CISSP, CRISC, and Sec+. There should not be a guide but a free test or a pre-requisite of either the PCI cert OR other heavy hitter certs. I just don't want the good guys in small places to get flushed out. Read more...
The ETA recently launched the Certified Payment Professional program, which charges $425 for non-members to take the test, assuming they meet the 'experience' requirement, to PROVE they are a professional. And they'll have to take it every 3 years. Worthy program, but high cost. Plus, only a select few were allowed to be in the first class, and there are only 4 test windows per year currently. So being on the registry simply means, you were lucky enough to get picked, nothing to do with skill level. Read more...
@Cory: Thanks for your comment and question about the pricing of the QIR training. I raised that question in a conversation with Bob Russo last week, and I will address it in a follow-up column in a few days. While the pricing is not yet set, hopefully it will not be too great a burden for you or other integrators/resellers. We'll have to see, though. Read more...

Costco Self-Checkout Trial Setback After Store Losses

Not all self checkout works this way. One self checkout vendor is designed to work this way and it leaves a gaping security problem that can create this situation. There are 3 predominant providers of self checkout in the U.S. and this represents the lowest installed base provider of the 3 and their market share continues to shrink from reports I have seen. Read more...
Editor's Note; The vendor that Mark was referencing is IBM. His point is that other systems make it easier for any weight mismatches to require associate intervention--just like with alcohol or cigarettes or any other age-restricted item--rather than a more passive flag to the customer that the item was excluded. Read more...
Another angle on the challenges with self checkout which may come to the retail scene in the next year is the tap and go/NFC smart phones. Though these are all the rage in Japan, we have yet to adopt them in the U.S.. But that will change as the new phones emerge with the chips embedded this year. And the new demographic want to use this type of technology. A large retailer told us that NFC phone customers are getting their identities stolen, even though the self check-out requires proximity-- and they do not want to take responsibility for this occurrence in their stores, on their premises. So although they like the idea self check-out they are still experimenting with various approaches. Read more...
ed
For self checkout, item-level RFID or unique barcodes plus real-time tracking appears to be the missing component. Mail delivery companies use real-time tracking of mail with a barcode and assure delivery at a certain time. The public library embed books with RFID and track them through checkout. Retailers and SCO manufacturers are going to have to accept the fact they cannot rely on UPC and really need an item-level identifier that tract that specific product as a unique item from shelving to checkout. Read more...

Visa Yanks Global Payments' PCI Compliance. Catch-22 In Full Force

So PCI compliance can not guarantee that a provider will not be breached, but a breach is inherent evidence of non-compliance? Any comment from VISA as to whether they will continue to accept ROCs prepared by Trustwave? Seems like an inconsistent position. Read more...
Thu
Global Payments reported they were working toward being in compliance with PCI, despite already being on the list. In a backwards way, they admitted they were not previously in compliance. We can't really say that a breach is inherent in these type of situations without having a full investigation report. That's one reason why MasterCard is waiting to see what forensics finds before yanking them from their list. Read more...
In the past, Visa has stated, "No compromised entity to date has been found to be in compliance with PCI DSS at the time of the breach. In all cases, forensic investigations have concluded that compliance deficiencies have been a major contributor to the breach." This quote can be taken two ways. Either PCI is perfect and all-encompassing and compliance guarantees you won't be breached; or there are so many “gotchas” in PCI that no one can escape non-compliance. I personally believe that PCI is written in such a way — and interpretations among QSAs vary so much — as to make it impossible for anyone to be 100 percent compliant 100 percent of the time. Read more...
PCI, TSA, IRS - obviously none of these functions as intended or as promoted. I've said it before and I say it again, hackers are free of personnel, budget, expertise, infrastructure and time constrains. Nothing, NOTHING, is ever fully safe. Visa and its attorneys simply choose to hide behind the false sense of security of the PCI veil. Truth be known, Visa has probably been hacked. Anyone see the similarities between VISA and the wizard of OZ? Read more...
This begs the question, how does this decision by Visa affect Third Party Processors (TPA's)? Our TPA agreement has wording to the effect that we can only send CHD to PCI compliant processors and banks. Now that Visa has deemed GPS non-compliant, are we breaking our TPA agreement by allowing our customers to continue using GPS? Read more...

How About A Little Service Provider Responsibility Here, PCI-Wise?

I appreciate the one-sideness issue highlighted in this article. I also understand how card brands have a contractual link to merchants - but only rarely do with service providers. I'd find it virtually meaningless for the PCI requirement to mandate actions by the service provider, when they have no contracted responsibility to a commercial entity. That said, 12.8.4 places an obligation on the service provider to demonstrate compliance to their customer the merchant (or service provider, Acquirer etc). Is not the combination of these 2 requirements having the same outcome? Read more...
Lem
PCI is like banging your head on the wall. When you complete the SAQ, it feels good stopping. Read more...
Actually, service providers do have direct links to the card brands. For example, many have direct system connections/access points to the card networks. More importantly, all service providers validate their PCI compliance to the card brands. The brands (at least Visa and MasterCard) also post lists of compliant Level 1 Service Providers on their websites. My point was not so much about the card brands, though. I was observing that since PCI already has a number of requirements that only apply only to Service Providers and not to merchants, there is precedent for one more Service-provider-only requirement to cure the imbalance I noted. Read more...
Walt, I'd suggest that perhaps you have a limited concept of who would be considered a Service Provider under the guidelines that you've suggested. The fact is that most resellers/integrators do NOT have direct links to the card brands or the card networks. They may work with processors to board new merchants or provide support, but there is no contractual or legal obligation at all. Your comment that all service provides validate their PCI compliance is also way off base if you include resellers & integrators. The limited number of Level 1 Service Providers probably do validate their compliance, but the vast majority of resellers/integrators are not that big. Read more...

The Never-Ending Dance Of Contactless Security

ed
Contactless should require multi-factor authentication for financial transactions. However, multi-factor authentication will nullify the main benefit of contactless transactions which is speed. Is there really an improvement between a mag swipe and contactless tap if multi-factor authentication is required? Read more...
Contactless card transactions are verfied online, if there is fraud the bank with take the liablity. This does not happen with checks, bills. Oh and contactless is faster than any other form of payment and you do not have to check the takings at the end of the day: so faster service and a bit more secure. Read more...
MC
To contaftless. Not completly true that the bank will take the hit for a fraudulant contactless transaction. When paying at the fuel pump with contactless, you will have a defined pre-auth limit which is set by the issuer and obtain an online auth number. Even with the issuer providing real time auth, should the customer dispute the transaction, the liability and burden of proof still lies with the retailer in most circumstances. To the issuer they claim this is a "card not present" transaction if completed out of sight of the store attendant. Add that to the fact that that a gas station forecourt allows the hiding of the necessary fraudulant transaction supporting equipment inside a vehicle, it creates the anoynmous environment that fraudsters prefer to operate under. Read more...

The PayPal Problem: Will It Impact Retailers' PCI Scope?

For the foreseeable future, retailers are not going to be transacting exclusively against PayPal accounts. Therefore, with the assumption that the payments are stored, transmitted and processed through the same systems as "regular" CHD, there will be no change in scope. Merchants will have to protect the PayPal payment information with the same rigour as PANs/CV2s/tokens, but this isn't arduous because they are doing it right now. (Or should be.) Read more...
This is the problem with the notion of the high value token wording in September's guidelines. As you rightly point out an email address, mobile no. or even a name can be considered a high value token. Yet by their very nature these are all readily available in the public domain, so I find it hard for them to be considered as a high value token. Read more...
Will Visa be including in their V.me system the additional ability for online payers to source funds via a “debit” transaction from their banking account, rather than only by a credit card transaction as has been the case in the past because of the PIN requirement for such a “debit” transaction? After all, what’s the difference between a PIN, that Visa/MasterCard already hold, and a password required to access a secure online payments gateway? Read more...
The PayPal user information is much more "high value" because it can be used across merchants to initiate transactions. If I have it or gain access to it via a merchant compromise, there is nothing to stop me from using it at another merchant. A properly designed tokenization system should have rules that prohibit tokens obtained from one merchant to be used at another merchant and/or prohibit initiating transactions unless the PAN and authentication data has been previously received by that merchant. Read more...
A big difference with PINs(at least in the debit world) is that they should only be entered into an encrypting PIN Pad. The feeling goes that if I steal a card with a valid PIN I can go to an unattended device(ATM) and pull out money w/o having to present a legitimate card to a person. I suppose you could make the same case(which you did) regarding an online transaction w/ a password. Read more...
PayPal's plan of POS attack is to entice merchants with below-cost credit and debit card processing, which is an offer no retailer will refuse. The company will subsidize its losses from the card transactions with the very high-margin profits it enjoys when its users fund the sales amount from their bank accounts. On the other hand, whether the consumers will be won over is another question altogether. If it is to stand a chance, PayPal will need to make the checkout process as uneventful as possible. As it is, the customer is asked to enter his or her cell phone number, in addition to a PIN, before the transaction can be completed. That's unnecessary and excessive. Read more...

Tokens Are Not The Same As Encryption. Honest

I agree with all your points on how the technologies differ. The only possible disagreement I have is that you are very generous in giving PCI credit for distinguishing the differences between the two technologies and scope whereas I think they caused the confusion (or at least didn't help). Read more...
I tend to disagree that tokenisation and encryption are different - indeed, I see tokenisation as a form of bespoke encryption. Many of the arguments I hear about tokenisation being different from encryption leads to concerns about the security of encryption, or that encryption can be reversed. Although it is true that encryption can be reversed with the key, I strongly dispute the arguments about the security of encryption, and personally I put much more faith in an algorithm that has undergone many decades of community research, where the security (key) can be isolated in approved hardware, than in a bespoke solution I have no visibility or independent assurance of. Read more...
"High-value tokens are those that can be used to initiate a new card transaction." Personally, I didn't understand this part of the doc. Surely that's the point of a token, so I'm assuming they mean a token that can be used independently of a 'vault' type of service to initiate and complete a transaction. Otherwise, every token would be a High Value token. Services like Square's card case where a person's name can trigger a payment, or PayPal's where an email and password trigger a card payment. In these cases a name and email would be tokens and as they are initiating a card payment could be considered a High Value token. Read more...
I disagree with you on the point you made about there being no way from a PCI scoping perspective to compare tokenization guidance to encryption clarification. The parallel that I see is not between tokenization and encryption, but between the token and the encrypted data values themselves. Semantics? Maybe, but I believe there is a significant if not subtle difference between these two statements. Read more...
How can QSA be comfortable determining if something is out of scope, if he or she does not know how the system providing that benefit explicitly works in all conditions over its lifetime, especially if its distributed and may its functionality and risk profile may change over time and can be explicitly guaranteed? A QSA takes liability for such a de-scoping claim. Only proofs of security and evidence can stand behind that something seriously lacking in most of the debate. Read more...
Tokenization is a use case of data transformation, not a specific technology. Humans have been practicing tokenization using multiple methods for centuries and claiming that one method of data transformation is the "real" tokenization and not some other way doesn't make sense. Tokenization must be reversible. Read more...
Promises of incremental sales and the ability to target loyalty have been completely worn out by endless pitches of card services, hardware, software, etc etc etc... Another watershed way of getting mobile payments introduced is to shift merchant's payment modes from higher to lower cost products. I think ISIS has started down a path that completely misses that opportunity by partnering with incumbents who have zero interest in reducing merchant payment costs. Read more...

Want To Push Social Media? Have You Considered Using Your Stores?

What about if the retailer is in a shared space (e.g., a food court in a mall or college campus) where there may be limited space and possibly limited flexibility (e.g., power, comms, lease restrictions)? Or in airports, where I see more and more retailers. Would your recommendations hold for those locations, too? By coincidence, I was at a conference this week and sat next to the person charged with building brand awareness for a national food chain on college campuses -- and therefore with the student demographic -- nationwide. After reading your piece, I was wondering, would your recommendations would hold for them? As for airports, I could see one school of thought that says customers don't live there, so get them in and out. But I also could see where the particulars of this demographic could be sufficiently compelling to want to reach out. Read more...
I agree that there are even deeper levels of engagement that you absolutely could drive in the store (I love the idea of floating coupons by the way). I think what is most important is using the store to start a conversation that could be then continued online (rather than always trying to start a conversation online that culminates with a sale in the store). Read more...
I think the statement "Then there is the small fact that the retail operator doesn’t feed his family based upon how well his customers are engaged online" speaks loads. Read more...

Publix Buy-Online-Pick-Up-In-Store Trial Nixed: Grocery Shoppers Are Different

Your take on the customer's view is right, however I wonder whether supermarkets can go a _long_ way towards resolving it with easy, quick refunds? My partner unpacked our home-delivered fruit and veg box last week, and discovered bruised fruit. Took a picture, emailed the company, and within 10 minutes had a refund. Happy customer all round - the company cares, etc. This requires very careful thinking on the merchant's part about how to invest in this area of customer service. However, since it is equally easy for my partner's picture of bruised oranges to be uploaded to a social media site as it is to email the company, the downsides for NOT doing this are quite large. Read more...
What about the other non tangible benefits of shopping at the grocery store - it gets you out of the house and you get to interact with the staff. for many people this might be there only "human contact" in a day, or at least human contact that doesnt come with the stresses associated with family/work colleagues/customers. And of course, there is the primeval "hunting and gathering food" aspect. Read more...
ed
The last poster hit it head on - there is a primal "hunter" instinct of us humans preventing the buy groceries online model to take off. Food, clothing and shelter are the three things we humans go out and scavenge for and that is in our primal instinct. It appears the next logical step is to focus on items that do not interfere with our primal instincts such as prepackaged food or personal hygiene. Read more...

StorefrontBacktalk
Our apologies. Due to legal and security copyright issues, we can't facilitate the printing of Premium Content. If you absolutely need a hard copy, please contact customer service.