advertisement

Will Warranty Enforcement Be Amazon Marketplace's Achilles' Heel?

When it comes to competing against Amazon, eBay or even Japan's Rakuten, one of the more challenging aspects is their third-party marketplaces, which give each a seemingly endless inventory at minimal risk. But the odds may be getting more even, as shoppers are starting to notice that some manufacturers are strictly enforcing their authorized reseller rules.

The immediate impact on shoppers is they may find that the expensive flat-screen TV, surround-sound speakers or refrigerator that looked like such a bargain on Amazon voids the warranty. The arguably-unrealistic expectation from consumer goods manufacturers—which sharply strengthens the hands of traditional e-tailers trying to fight against these third-party marketplaces—is that shoppers would not only notice the actual name of the merchant shipping the item, but would take the time to run that name on the manufacturer's site to see if they are truly an authorized reseller. Or they could just make the purchase from Target.com or Bestbuy.com and know for certain.

Top Stories


advertisement

Is Carrier IQ A PCI Problem? (Hint: The Answer’s Yes.)

December 7th, 2011

Most of the uproar over Carrier IQ and its monitoring software installed on many smartphones has focused on conventional privacy worries—whether an outsider is capturing and storing sensitive private information. But a bigger concern for retailers might be the fact that Carrier IQ can reportedly broadcast payment-card numbers unencrypted over Wi-Fi as the numbers are being entered by online customers or in-store associates.

Never mind whether Carrier IQ or the mobile operator is keeping this information. If it’s merely being transmitted unencrypted, a thief monitoring a store’s wireless networks might be able to scoop it up in transit.

Read more...

advertisement

Best Buy’s Cloud: Wild West Gives Way To Making The Same Data Mistakes Again

December 7th, 2011

Many chains have seen the cloud as a nice way to get unlimited data storage on the cheap. But Best Buy’s initial cloud efforts revealed something much more fun: a lawless area where IT management didn’t have any rules.

A funny thing happened, though: “Everybody has always said that if we could do the datacenter over again, we’d make no mistakes and everything would be perfect. It would be this incredible Utopian datacenter, except that we’re all making the same mistakes that we made in the datacenter originally, because you go to the cloud like the Wild West,” said Thomas Kelly, Best Buy’s enterprise architect for cloud services.

Read more...

advertisement

Starbucks Reports 26 Million Mobile Transactions, A Good Sign Of Consumer Mobile Comfort

December 7th, 2011

Starbucks on Tuesday (Dec. 6) released select mobile transaction stats for 2011, showing some 26 million mobile transactions. More meaningfully, the chain said it had tracked $110.5 million reloaded via the mobile app, which is a tiny percentage (4.6 percent) of the $2.4 billion put onto Starbucks Cards through non-mobile means.

The Starbucks mobile app merely displays the same barcode that exists on the customer’s plastic Starbucks Card. That means there is no wireless transmission, nor are any meaningful changes to the POS or card-swipe required. It does, however, require a change-of-behavior from the customer, and that might be the hardest and most valuable element.

Read more...

advertisement

The Unexpected Benefits of Tokenization

December 7th, 2011

One of the biggest benefits of tokenization might be the implementation process itself. That is, while using properly constructed tokens can reduce a merchant’s PCI scope, the process of planning, designing and implementing can produce significant benefits, too. One result from tokenization is restricting the further spread of cardholder data throughout the enterprise. Another is that the implementation process gives you a running start in complying with PCI version 2.0.

PCI Columnist Walter Conway argues that tokenization requires a lot of work to implement. It would be a shame to not take full advantage of that work and the benefits that come from it.

Read more...

advertisement


Cutting Edge Is The Last Place A Retailer Wants To Be, In Terms Of Tracking Mobile Shoppers

December 7th, 2011

The ongoing debate about how far retailers can—and should—go when tracking customers through their mobile devices is getting confused, thanks to the illegal misinterpretations made by some of the vendors pushing these approaches.

But Legal Columnist Mark Rasch wants to be clear: Be ahead of the curve in tracking consumers, and do it before case law and legislation have a chance to play themselves out, and you could find yourself with legal headaches for years—potentially having to somehow remove all of that ill-gotten data from your systems.

Read more...

Wal-Mart’s Shopycat Facebook Sends Customers To Other Sites—Really Rarely, Though

December 1st, 2011

Wal-Mart on Thursday (Dec. 1) officially rolled out its Shopycat Facebook app, which lets consumers see WalmartLabs-fueled gift suggestions for all of your Facebook friends, based on their posts and stated likes/dislikes. Wal-Mart said that “Shopycat is designed to trigger gift ideas for friends ranging from music, books and movies to games and electronics, making gifting more fun and saving on time and the pressures of discovering the perfect gift.” About time that someone put an end to this pressure to find the perfect gift. Effort, thought and attention are simply making America weak. When I think gifts for loved ones, I think compromise and just get it over with. (And yes, that fits in so well with the image that Wal-Mart is trying to shake.)

The idea is indeed interesting, as the Wal-Mart algorithms have already done the work of predicting what would be desirable. Then again, does it factor in that something of strong interest to someone has likely already been purchased by—or for—them? One nice touch about Shopycat is that it doesn’t technically limit its suggestions to walmart.com and Wal-Mart stores. But testing on the app certainly shows that the overwhelming majority of choices are—coincidentally—only on walmart.com.

Read more...

Target.com Dumps Clever Idea—And Survives Black Friday

December 1st, 2011

The biggest E-Commerce surprise of Black Friday was probably what didn’t happen: The problem-plagued Target.com didn’t crash. Despite an absent E-Commerce chief for six weeks before the big day, and what some saw as a half-hearted defense of the site by Target’s CEO on an earnings call, the chain’s online store weathered the Black Friday-Cyber Monday weekend with just some performance degradation—about the same as other major E-tailers.

The most likely reason it survived: Target.com deep-sixed its clever but ill-fated experiment in limiting the number of customers who could be on the site at the same time.

Read more...

When Will Mall Tracking Make Sense? When It’s Not Anonymous

November 30th, 2011

Maybe using mobile phone signals to track customers isn’t looking so sweet after all. On Monday (Nov. 28) two U.S. shopping malls said they stopped using a people-tracking system that used mobile signals, after the malls’ developer got letters from U.S. Sen. Charles Schumer (D-NY), who threatened to call in the Federal Trade Commission to investigate privacy issues. That’s despite the fact that the system is designed to be anonymous—and the system’s legality is untested.

There are some ironies in all this. One is that, with all the genuinely invasive customer-tracking technologies online and even in malls, the mobile signals used in this one really are anonymous to everyone but the mobile phone operators. Another is that if the system were actually targeting individual customers and the data were used by store associates, it might actually be more palatable to shoppers. After all, when location data is anonymously collected, it feels creepy. But when an associate knows you’ve already been to Wet Seal and Nordstrom, that just means she knows your tastes and can serve you better—or at least it feels that way.

Read more...

In The Dillard’s/JDA Software Settlement, Details Of Sleazy Vendor Practices Come Out

November 30th, 2011

Late on Wednesday (Nov. 30), the 11-year-long battle between the 288-store 29-state Dillard’s chain and JDA Software/i2 finally closed, when JDA agreed to write Dillard’s a check for $57 million. The vendor’s check was to compensate Dillard’s for what were allegedly lies the software company used when selling a supply chain system. But the filings in the case provide a rare look into how software companies regard sales tactics and it’s essential reading for all IT execs before their next meeting with any software sales rep.

Quick background: JDA was not involved in this matter when the sale was made in 2000 and is only now involved because JDA bought i2 in January 2010. In June 2010, the case went to trial and a Texas jury awarded Dillard’s $237 million. That’s an impressive amount given that Dillard’s had only paid $2.4 million for the software. JDA/i2 appealed and Wednesday’s settlement happened while the appeal was still processing. Dillard’s position has been that JDA lied to them during the sales process and that the $6.1 billion chain didn’t receive the value the vendor had promised.

Read more...

Google Wallet Doesn’t Need Operators’ OK—And That Could Mean A Fight

November 30th, 2011

When it comes to mobile payments, mobile operators may already be losing control of their money-handling dreams—to Google. Tinkerers have now figured out how to run Google Wallet on Samsung’s Galaxy Nexus—an Android phone from Verizon that isn’t supposed to be running Google’s mobile wallet service. Some Verizon users were able to install their own Citi payment-card information in Google Wallet, and even collect the $10 credit for the Google prepaid “card” that comes with the service.

Those tinkerers didn’t actually hack Google Wallet—they just changed settings on the phone to let it run Google’s payment application. And for now, this isn’t something ordinary customers would likely do. But the tinkering did demonstrate that Google doesn’t need a mobile operator’s cooperation to run Wallet on an Android phone. If telcos push back and try to block Google Wallet, that could create a new fight at the POS—with retailers caught in the middle.

Read more...

Google’s Retail Experiment With In-Store Location Is Encouraging, But Needs Much More Fine-Tuning

November 30th, 2011

When Google on Tuesday (Nov. 29) announced a retail program for inside product tracking—with initial trials from Home Depot, Macy’s, Bloomingdale’s, IKE, Japan’s Mitsukoshi plus the Mall of America—it offered a relatively easy path for in-store navigation for retailers. But it also hasn’t licked the most daunting challenge: location precision. Google’s not even claiming location accuracy of better than “within several meters.”

The Google program, initially limited to Android phones, works by getting detailed floorplans from the retailer. Once the system detects the consumer has entered that address, it defaults to that map and then uses in-store tracking to show the customer’s location compared with product aisles. But “several meters” could be dozens of feet in either direction (the term “several” has deliciously vague. Merriam-Webster helpfully defines it as “more than two but fewer than many”). The altitude feature is supposed to know which floor you’re on and to display the correct floor map—that’s a nice touch—but without more finetuning, it will have trouble navigating someone to the right aisle, let alone within that aisle, as Meijer recently discovered.


JCPenney Uses Mobile As A Clever Way To Track Where Gifts Go

November 30th, 2011

The elves at JCPenney have come up with something rather clever: a mobile app that allows for gift recipients to hear custom voice messages from a gift-giver. And a program that packs a multi-layered CRM data-collection punch. The recipient scans a QR code that is taped to the gift and instantly hears the gift-giver’s voice relaying a holiday-friendly message. (In my family, it would something sweet like “Here are the ^#&! gloves you wanted. So where’s the $50 you borrowed from me?”)

The reason this idea has such potential is the chain is using the mobile device solely as a tool, where both JCPenney and the app quickly get out of the way and let the recipient and the gift-giver truly communicate. From a CRM perspective, it’s clever for JCPenney because they set it up to force the system to call the gift-giver back to record the message. Therefore, the chain can gather lots of mobile numbers for later messaging use and, depending on future tracking purposes, perhaps much more through in-store interactions. The first step, though, is to collect those numbers and this is a wonderfully innocuous way to start.

Read more...

Pizza Kiosk Raises Creative In-Store Options

November 30th, 2011

The mundane underappreciated customer kiosk has been undergoing some radical changes recently. Among the most far-reaching and/or strangest: one that serves live crabs, offers ice cream in exchange for a literally measurable smile, a porn kiosk that asks a lot of specific questions and promises privacy protections, a Pepsi social kiosk that allows you to buy soda for strangers, a convenience store sandwich machine that uses privacy to boost sales, a wine kiosk that detects if you’re already drunk and a machine that measures customers for custom suits.

But this new kiosk out of Europe may just take the record (although that live crab-dispensing kiosk is pretty hard to beat). It makes pizza—from scratch. This thing shows customers its realtime process of kneading dough, forming the round, adding tomato sauce and toppings and then baking it—all in three minutes. A kiosk that creates and delivers a fresh pizza may not play well in every retailer environment, but it’s worth a shot. Honestly, Nordstrom, would a pizza kiosk in your aisles really kill you?

Read more...

Despite The Hype, E-Commerce Sales Stats From This Holiday Season Show Flat Percentage Growth

November 29th, 2011

Amidst all of the reports this week detailing record-breaking revenue for the start of the holiday shopping season, one critical point has been overshadowed. While E-Commerce sales have indeed been strong, the rate of increase has been essentially flat for the third year in a row. Indeed, the rate of increase of sales this year is projected to be lower than either of the other two most recent years. EMarketer’s comparison stats only go back to 2007, showing a 19.4 growth in 2007′s holiday season, an unusual drop in 2008 (-7.8 percent) and then three similar growth stats for 2009( 16.9 percent), 2010 (17.4 percent) and 2011 (16.8 percent). On the happy side, in this economy, a steady 16-17 percent annual growth rate is pretty nice. And given the steady (other than 2008) E-Commerce revenue increases through this year’s projected $46.7 billion online holiday season, the slight drop of growth percentage is certainly acceptable.

But with the revenue hype fest that has been going on the last few days, it’s worth remembering that this year is simply projected to have the same kind of season-over-season growth that it’s enjoyed the last couple of years.

Read more...

Is PCI Skimping On Skimming?

November 29th, 2011

PCI does not address skimming at your point-of-sale (POS) devices, especially those self-service areas that are not under constant control of a clerk or manager. PCI Columnist Walter Conway thinks it should and that now may be the perfect time to make a change in your POS practices and PCI itself. Although this may be the season of sharing, that should not include sharing your POS devices with the bad guys. The PCI Council recognizes the risk from card skimming. They have held information sessions highlighting the threat at the Community Meetings and they published in 2009 a document informing retailers of the risks of skimming.

However, as of today, there is nothing in the PCI DSS directly addressing how retailers should protect their POS devices from being compromised by a bad guy installing a skimmer. The timing for updating or clarifying PCI now is excellent. Each version of PCI DSS has a three-year lifecycle and we are now into the second year of PCI version 2.0. That means that as of November 1 we are in the formal period when Participating Organizations worldwide provide feedback on improving payment security and the PCI DSS itself.

Read more...

Quick-and-Dirty (And Dangerous) Wi-Fi Retail Deployments Likely To Be Rampant In 2012

November 28th, 2011

As mobile trials of all kinds kick into highgear next year, there’s almost certainly going to be a trend that will signal very bad security news: a soaring number of retail Wi-Fi trials, many of which will likely be quick-and-dirty efforts to be able to support customers who want to use mobile in-store. Wi-Fi security is bad enough as is, let alone what will happen with lot of slapdash rollouts.

Some of the security problems with Wi-Fi are well known and there isn’t a security consultant worth the paranoia they sell who can’t spout their list of the dumbest retail Wi-Fi deployments. There is a small ray of hope. Although Wi-Fi is often quite insecure, the newest Wi-Fi offerings today are a tad bit better. If we can assume that many of the new deployments will be using somewhat more robust approaches, it might be a somewhat smaller catastrophe. Remember that a Wi-Fi mobile disaster doesn’t have to be a security breach. Given how easy it is for a children’s toy or a wireless microphone to disrupt Wi-Fi and potentially halt mobile payments or, even worse, cause double billings, even a data-secure network could cause mobile nightmares. Ahhh, the joys of Wi-Fi.


DDoS Attackers Switch Gears: Hit The Router, Not The Web Server

November 17th, 2011

Distributed denial-of-service attacks on commercial Web sites have taken a nasty turn since last year: They’re now throwing four times as many packets, and the type of packets are more likely to bring targeted sites to their knees. That’s according to security vendor Prolexic Technologies, which on Thursday (Nov. 17) is slated to release a report that says since Q3 2010, attackers have shifted from attacks that aim at Web servers to those that target routers—a change that could require retailers to put up much stronger defenses against brute-force attacks.

It’s hard enough defending against a botnet firing an endless stream of “show me your homepage” requests at an E-Commerce site. Retailers have already seen those attacks amped up to 50 times their previous level during a few days after Black Friday last year. But the new style of attack (so far aimed mainly at online gambling sites) is likely to require a lot more hardware to pick off nasty packets—and it’s hardware that’s only necessary until the attack ends, at which point it’s very expensive bric-a-brac.

Read more...

MasterCard And Intel Want To Put Contactless Readers In Laptops—Maybe Even Soon Enough To Matter

November 16th, 2011

E-Commerce has been depending on the trustworthiness of strangers for a long time—customers typing in what might easily be stolen payment-card numbers from thousands of miles away. That might be changing soon, and with a real advantage for E-tailers. On Monday (Nov. 14), MasterCard and Intel announced a push to install a contactless reader in laptops, so they’ll function as PayPass readers to take contactless payment cards—with a lot less trust required.

A MasterCard spokesman wouldn’t commit to the card brand accepting such transactions as “card present,” at least not at this point. It’s early—MasterCard and Intel expect to get all the authentication issues nailed down by 2012, with actual payments by laptop-owning online shoppers starting shortly thereafter. But anything that uses built-in hardware to close the gulf between the retailer and the physical card should help push interchange rates down.

Read more...

A Wireless Tracking Way To Solve The In-Aisle Digital Receipt Verification Problem

November 16th, 2011

The biggest practical challenge to in-aisle mobile checkout is verifying the receipt as the customer tries to leave. Verification is not foolproof, but it will dramatically slow traffic, which is counterproductive. What retailers need is a way to associate that phone with the customer and the purchase, and to track all three throughout the store, up to the exit. Fortunately—and simultaneously unfortunately—the very nature of a smartphone provides just such a wireless way.

By using the phone’s signals, the store could track that customer and could know exactly when that customer is approaching the exit and alert the greeter/loss-prevention associate to the approach. No need to verify the receipt, no need to stop the customer at all (unless the greeter sees something beyond the purchased items, but that’s always been the case). There are clearly hurdles to this approach. But it’s one of the few that addresses most of the current in-aisle mobile payment headaches.

Read more...

What Wal-Mart Didn’t Say About Its POS Move

November 16th, 2011

Wal-Mart’s newest mobile acquisition may be a lot more than the world’s largest retailer is admitting. On November 10, the chain announced that it acquired Grabble, a tiny Australian mobile POS startup that can deliver receipts to customers’ phones. Wal-Mart also did a good job of scrubbing the Internet of information about what Grabble actually makes: hardware that attaches to POS systems to capture purchases and other customer data in real time, so that information can be used without having to change existing back-end POS software. Mobile receipts are just one obvious application.

It never really made much sense that Wal-Mart would go all the way to Australia for a mobile-receipts startup—that’s hardly a new idea. But a box that plugs into a POS, so it’s easy to experiment on a store-by-store basis with everything from mobile receipts and coupons to plug-and-play CRM, inventory and analytics systems, sounds like it’s worth the trip. And that could explain why Wal-Mart worked so hard to make most details about Grabble disappear.

Read more...

Tablet Retail Impact: Sometimes, No Change Is The Best Strategy

November 16th, 2011

What, if anything, should retailers do differently about tablet computers, in an M-Commerce context? Not much, it turns out. But it’s hard to glean that from the flood of stats out there. Consider some numbers IBM Coremetrics has been talking up recently. The company reported that “shoppers using an iPad will lead to more retail purchases more often per visit than other mobile devices,” with iPad conversion rates at 6.8 percent versus 3.6 percent for all mobile devices. That may be true, of course. But it’s also obvious that the larger screen of a tablet will enable more activity than the typical smartphone. What if IBM Coremetrics had said that shoppers using a laptop or a desktop computer will deliver more purchases than a smartphone? What if IBM Coremetrics had said that shoppers using a laptop or a desktop computer will deliver more purchases than a smartphone?

That said, tablets are becoming quite popular, and a migration of sales from PCs and laptops down to tablets is inevitable. From the chain’s perspective, though, that change may be barely felt, because the tablets will simply be accessing your regular Web site. At best, it might be a slightly tweaked version of your site. Most of the current tablets don’t really need much—if any—tweaking to deliver an acceptable experience.

Read more...

Could Lord & Taylor’s “Claim Your Prom Dress” Effort Be Improved With ZIP Codes And Some Pull-Downs?

November 16th, 2011

Lord & Taylor recently tried an experiment where high-school girls were able to purchase a prom dress and then claim it for that event at that school, to theoretically make it less likely some other girl would show up at the prom wearing the same dress. The idea is interesting but limited, in the sense that the same dress is being sold at other retailers. It also suffers from the problem of only working when the customer bothers to go through the tagging process.

Why not use ZIP codes (IP address locations are typically too inaccurate and/or cover too wide an area to be practical for a prom no-duplicates strategy) and a high school pull-down menu (with a behind-the-scenes list of each school’s primary ZIP codes) to flag likely repeats? This approach pushes this idea beyond high-school proms and could be used to flag apparel conflicts at any type of event or formal function. Weddings? Theater? This could even be helpful beyond events. What about giving an option to indicate the name of an employer? Depending on the size of the employer, it might be nice to know if that business suit you’ve been eyeing has already been purchased by anyone else within that company.

Read more...

StorefrontBacktalk Will Not Publish Newsletter For Thanksgiving

November 16th, 2011

Given the dominance of the key U.S. holiday next week (we mean Thanksgiving, not Black Friday), StorefrontBacktalk‘s weekly newsletter won’t publish on November 24. Everything else will still be live (the Web sites, our Kindle version, our Twitter tweets, our mobile sites, etc.), but we need a little time off to burn some turkey and over-season some stuffing.

Speaking of which, we want to tap into the knowledge of our audience with a question that has nothing to do with retail technology. One of us here at StorefrontBacktalk is going to try something new for Thanksgiving: Cooking the turkey on a gas grill. The problem is that, well, it’s me. And my Weber grill seems to have two temperature settings: 750 degrees Fahrenheit and OFF. To be precise, it has tons of settings, but those two numbers seem to be the only heat levels the beast is capable of delivering and maintaining. In a short duration grilling (say 5 to 8 minutes), it’s easy to compensate. But when dinner for a dozen people needs to cook for five hours, I’m open to any tricks to get the temperature to get down to 325 degrees and to stay there. Any suggestions? If you do have any suggestions, please E-mail me at Help Evan To Not Turn His Entree Into Sawdust Held Together By Static Electricity.


Mobile Tracking Would Be Great, If It Weren’t Illegal. (What, Everything Has To Be Perfect With You?)

November 16th, 2011

When we told you recently about the Australian shopping mall that tracked customer movement through mobile phone signals, it presented a very compelling CRM opportunity. It would also almost certainly be illegal in the U.S.

Here, it is illegal to intercept the contents of a cell phone call or to force a cell phone provider to pony up information about a user without—at a minimum—a court order based upon a certification by a law enforcement or other official that the information is relevant to an ongoing criminal (or sometimes intelligence) case, writes Legal Columnist—and former federal prosecutor—Mark Rasch. The federal pen register law makes it a crime to “install or use a pen register or trap and trace device” without such a court order, unless you are a “provider of electronic or wire communication service” and your use of the pen register is for certain limited purposes. There is little doubt that neither a mobile nor a mall operator would be considered a “provider of electronic communication services.”

Read more...

EMV Is Simply Not Worth The Effort. Not Even A Little

November 16th, 2011

Ever since Visa reversed itself and embraced EMV this summer, GuestView Columnist Trinette Huber—who by day is information privacy and security manager for the 2,700-store Sinclair Oil company—has been wondering why. She has concluded it’s not for the security. For the last five years, Huber pens, she has been advising, cajoling, arguing and sometimes arm-twisting when it comes to PCI compliance for Sinclair’s distributors and c-store operators. “We’ve been waiting for technology that protects credit-card data. Stop coming back to the trough to get retailers to pay for something that doesn’t remove PCI compliance requirements and protect online transactions.”

Huber adds: “Chip-and-PIN doesn’t eliminate your requirement to be PCI compliant. You still have to do that. If we adopt Europe’s old technology, the card data will still pass in the clear. You still need to spend all of that money securing your point-of-sales, auditing your network and reporting on your compliance status. Well, maybe not reporting to Visa—if you meet its requirements—but there’s still MasterCard, American Express and Discover.”

Read more...

Newsletters

StorefrontBacktalk delivers the latest retail technology news & analysis. Join more than 17,000 retail IT leaders who subscribe to our free weekly email. Sign up today!
advertisement

Most Recent Comments

Why Did Gonzales Hackers Like European Cards So Much Better?

I am still unclear about the core point here-- why higher value of European cards. Supply and demand, yes, makes sense. But the fact that the cards were chip and pin (EMV) should make them less valuable because that demonstrably reduces the ability to use them fraudulently. Did the author mean that the chip and pin cards could be used in a country where EMV is not implemented--the US--and this mis-match make it easier to us them since the issuing banks may not have as robust anti-fraud controls as non-EMV banks because they assumed EMV would do the fraud prevention for them Read more...
Two possible reasons that I can think of and have seen in the past - 1) Cards issued by European banks when used online cross border don't usually support AVS checks. So, when a European card is used with a billing address that's in the US, an ecom merchant wouldn't necessarily know that the shipping zip code doesn't match the billing code. 2) Also, in offline chip countries the card determines whether or not a transaction is approved, not the issuer. In my experience, European issuers haven't developed the same checks on authorization requests as US issuers. So, these cards might be more valuable because they are more likely to get approved. Read more...
A smart card slot in terminals doesn't mean there is a reader or that the reader is activated. Then, activated reader or not, the U.S. processors don't have apps certified or ready to load into those terminals to accept and process smart card transactions just yet. Don't get your card(t) before the terminal (horse). Read more...
The marketplace does speak. More fraud capacity translates to higher value for the stolen data. Because nearly 100% of all US transactions are authorized online in real time, we have less fraud regardless of whether the card is Magstripe only or chip and PIn. Hence, $10 prices for US cards vs $25 for the European counterparts. Read more...
@David True. The European cards have both an EMV chip AND a mag stripe. Europeans may generally use the chip for their transactions, but the insecure stripe remains vulnerable to skimming, whether it be from a false front on an ATM or a dishonest waiter with a handheld skimmer. If their stripe is skimmed, the track data can still be cloned and used fraudulently in the United States. If European banks only detect fraud from 9-5 GMT, that might explain why American criminals prefer them over American bank issued cards, who have fraud detection in place 24x7. Read more...

Safeway Self-Checkout Security Hole Illustrates The Importance Of Button Sequence

It would have been interesting if you took a poll of the attendants before this went public about how many were trained and instructed to watch for this scenario. I wonder what the percentage of "yes, we look for that" vs. "Huh?" answer would have been. The retailer had no real incentive of fixing the problem. The items still get paid for, just by the previous customer. The only risk to the store was for some bad PR if this got out. They were gambling that it wouldn't. And for some length of time (I wonder how long...), it stayed hidden from the general public. Read more...
I have to disagree that the retailer had no incentive for fixing this. The revenue is the same, so there's no incentive for letting it happen or continue to happen. This is not merely a PR problem. The shoppers who have to pay double will be furious. Will they blame themselves for not clicking the right button? Of course not. They'll blame the retailer and likely think they were ripping them off. They might even assume that the next shopper paid for their goods, too, so it's really a double-charge. This glitch poses a huge threat to the retailer and offers no benefit. Will the customers who benefit thank the store? Will they appreciate the store? No, they'll likely think that store could just as easily have ripped them off. They'll probably avoid self-checkout, which also undermines the retailer. This is truly bad on so many levels. Read more...
I honestly think that customers should be more wary of what is on their self-checkout belt before going to pay. Although, a lot of that can be solved by having better designed kiosks. Read more...

Extremely Sad News

Walt will be greatly missed. He was a nice, approachable guy who made PCI a lot less scary in higher education. Read more...
Very sad to hear about Walt's passing. I had a chance to attend a couple of his talks and he still is the only one who could get people engaged and interested in PCI issues and make them less daunting without losing the seriousness of the subject matter. His columns on this sites were always very helpful and were frequently used by me to help explain this complex subject matter. Read more...
403Labs, Walt's employer for years, has just posted a very nice tribute: http://www.403labs.com/walt. Read more...
Walt's wit and wisdom will be missed by all. My deepest sympathies to his family & friends. Read more...
I never met Walt, but used his articles in presentations to clients frequently. Always a resources for accurate explanations that were easy to understand. He will be missed..... Read more...
I will always remember Walt's refreshing approach to PCI compliance when he worked with me at two institutions. Other consultants generally said, ok we saw what you have, here is the checklist to comply with SAQ D. Walt would turn it all around and say, for a campus your size you should be able to get your scope down to this, and by the way, here is what worked with your 3rd party on another campus I worked with... I will miss his wit and his gentle soul. Read more...
I was fortunate to meet Walt at a time when my campus was beginning the marathon known as PCI compliance. His knowledge was immense and his advice very simple. By the time he completed an engagement with our school, we had become friends. We enjoyed many conversations about things not related to work and shared a meal or two at professional meetings and symposiums. My deepest condolences to his sweet wife Meredith, his family, colleagues, and many friends. Read more...
ed
While I never met Walt Conway, his articles were very informative and he definitely left an impression with his knowledge. Read more...
What is it with PCI columnists at StoreFront BackTalk? Before Walt, we lost the amazing David Taylor in 2009, who enlightened so many with his crisp writing and insightful viewpoints. Read more...
I just cannot believe it. Walt and I had known one another for a number of years and I finally met him in person at the first PCI Community Meeting in Toronto. He and I bantered back and forth for years over the infamous session at that Meeting held by the card brands where they discussed whether pre-authorization data was in-scope. For the record, it was NOT in-scope, but was to be protected as though it were in-scope. I will miss him dearly as he was always will to tell me when I was getting things wrong. RIP my friend. Read more...
That is incredibly sad news indeed. Walt was extremely knowledgeable about information security (and PCI DSS in particular), but he also made the subject approachable to many (a very rare gift in the industry). He will be missed! Read more...
This is truly sad news. Walt helped educate us here at Intel about PCI and was a tremendous resource for us. He will be missed. Read more...
I've been absent from the world and just found out about this very sad news. In the few conversations I had with him I had very similar experiences: personable, intellegent and very nice. Walt will be greatly missed. Read more...
This is really sad news, I had met Walt when I started PCI work and has been a great resource to me and our Company. He will be really missed. Read more...
While I've been very behind on my reading, I am so sad to hear of this news. I absolutely loved Walt's style of writing, and of course the content was top notch. I appreciated that he even took a call or two to discuss a few PCI topics - and he had a great sense of humor as well. Walt - you will be missed! Read more...
In 1990 I worked closely with Walt in Visa EMEA/London office : he was our diplomatic pioneer to open doors with rather suspicious "rivals" like American Express, Diners Club, and MasterCard when we were building electronic transaction processing bridges to their hubs. None of them could resist his charm offensive! Now I realise that he had continued to use his ideal mix of personal charm and technical prowess to win hearts and minds in the PCI DSS world too. And it's very humbling to know that he was so involved with helping the homeless. Salute to you, Walt! RIP. Read more...

Macy's Wrongly Priced Necklace: The Problem That Was Never Supposed To Be Possible In-Store

A consumer who knowingly accepts change in excess of the amount due is no different than one who takes advantage of an honest mistake made by an store employee regarding pricing of an item. Macy' doesn't need to worry about customers with that ethos. They do need to better train their employees, though they should have common sense before they even show up for work. Read more...
Agreed that it applies to all, but there's no indication in this situation that the shoppers knew anything was wrong. Macy's had labeled it clearly as a huge discount--and it was--so there was no reason for them to suspect anything. Macy's associates, on the other hand, have access to their sales and should have seen that the price in the POS didn't match the ad. And if it did, how could it have? A typo in an ad that was replicated in the POS? Much of this doesn't add up, but have yet to see anything that shoppers were acting dishonestly. Read more...
Macy's should have handled this differently... on a number of levels. With all of the money Macy's has invested in new IT over the past few years, this error is a perfect example of how even the best new systems are susceptible to human error. Here, there were at least 2, maybe even 3 or 4 separate systems that contained the error. (MMS, POS, E-Com, Marketing) Was it a process breakdown? Sloppy data entry? Collusion among employees? Nobody knows for sure. Regardless of how the error was caused, it is not the customer's problem that the error happened. Any reasonable person, and in this case there were several, would not have thought anything amiss when the advertised one-day sale price matched the price scanned at the register. (Remember the problem grocery stores had with barcodes scanning at higher prices than labelled? Here, it seems the opposite problem occurred.) This should be a wake-up call for retailers to implement better controls in their IT systems and business processes. On a related topic, I wonder if the jewlery merchant at Macy's will get dinged when the GM$ for the department come in far under plan or if that will get written off as a marketing expense! Read more...
Cme
I work at Macy's in fine jewelry. I wasn't at work that day, but if I had worked, and if I had noticed the error, the process to report the error is so complex that it would have been challenging to report the error. Also, if I noticed the error and I was wrong, then I risk being viewed as a troublemaker. In other words, it's not a store employee's "place" to question a large corporate decision. Read more...

Why The SAQs Will Change This Year

I often hear ecommerce merchants say that because they use a transparent redirect or direct post method that tokenizes in the browser that they are totally compliant. And when I ask about securing their web servers that originate the payment form, there is usually a long pause, followed by "oh yeah, but we're still compliant". With the growing number of insecure sources pushing content to the browser, like ad servers, chat, and analytics modules, the number of attack vectors increase BEFORE the PAN is even input by the cardholder. Maybe in the new mandate, 'capture, transport or process' can be preceded by a word like 'isolate, prevent, segment, harden or protect' when it comes to the merchant web servers that get the payment acceptance party started in the first place. Read more...
Better clarification by the PCI council is good. It is still unclear to me how to deal with multiple vendors supporting the website -- each saying they have no access to PCI data. How is a merchant supposed to figure it out? And, by the way, in my experience, the bank/processor and assessors look for the easy way to grant compliance. Which may help in the short term but not in the long-term if there is an eventual breach. Read more...
I doubt they will be so strict. Let's see come October. I can't see a way all websites with a link to a compliant payments page could possibly be made in scope. Read more...
Level 4 merchants are the fastest growing target group suffering data breaches. There is a massive explosion of compromises where Level 4 merchant web applications are being compromised with the specific goal of hijacking payment mechanism redirects. This is a huge problem that is growing exponentially. Most Level 4's falsely believe they are too small of a target for a breach, but the criminal groups know that, and they know that "Bob's Comic Shop" can't afford an Imperva WAF, and can't use an open source WAF in their GoDaddy/Dreamhost/whatever $10/year hosting account, and they don't even know how to begin reviewing their logs. Read more...

PCI DSS: The Next Generation

I would expect this turnover to continue, and wonder what resource would be best to refer the new security team to for a thorough PCI orientation? Read more...
Forcing credit card processing sales people to be responsible would probably improve compliance. What if the salesperson had compensation withheld whenever a merchant is known to not be PCI Compliant? Read more...
A firewall is not network segmentation? What is? How do I keep my upstream ISP's router out of scope? Read more...
I do a lot of training, but if somebody is going to be responsible for PCI compliance, then an Internal Security Assessor (ISA) credential is pretty important, and the other key staff should at least attend some PCI security awareness training and maybe even go for the PCI Professional (PCIP) credential. The particularly attractive part of the PCIP is that it stays with the individual, not the company. Read more...
So if I'm running an e-commerce operation and my customer at home in his pajamas ordering a widget from my site can talk to my CDE (which he has to in order to submit his credit card info) his PC is in scope? Or my monitoring system which connects to snmpd on my order taking internet facing webserver is in scope? I can understand how an Active Directory or LDAP server which handles authentication for machines in the CDE would be in scope but to say anything which can connect to the CDE and anything which can be connected to from the CDE is in scope is greatly overstating the problem and renders lots of people's work to reduce scope via network segmentation and firewalls moot. Read more...
The option of a true Air Gap, i.e. a physically disconnected network is the ultimate segmentation but by no means the only way to segment. Firewalls and routing, switches and ACLs are all very valid ways to do so. All of these items mean that the assessor you or me must make a decision to the effectiveness and the adequacy of the segmentation. Read more...
Unfortunately, in the real world, firewalls often permit inbound or outbound connections, and therefore they do not achieve the desired segmentation and scope reduction. For example, there may be "holes" in the firewall to permit patching, AV updates, etc. My point is that if the rules on a firewall permit any access by another system for whatever purposes, then that other system is not segmented (isolated) from the PCI environment, and that other system is in your PCI scope. By permitting an inbound or outbound connection to the cardholder data environment (CDE), you expand your PCI scope. It all comes down to the actual specification of the firewall ruleset or router ACLs. An explicit "Deny All" rule achieves segmentation for PCI. About anything else risks expanding scope. Read more...
If the rules on a firewall permit any access by another system for whatever purposes, then that other system is not segmented (isolated) from the PCI environment, and that other system is in your PCI scope. By permitting an inbound or outbound connection to the cardholder data environment (CDE), you expand your PCI scope. If a system or device can initiate a connection into the cardholder data environment (CDE) or receive a connection from the CDE, that system or device is in the merchant’s PCI scope. It does not matter if there is a firewall controlling the access. It doesn’t matter if the connection is only for “a little while.” If a connection is possible, then the network is not segmented for PCI purposes and all the devices are in scope. Read more...

With POS Paper Supplies Vanishing, E-Receipts May No Longer Be Optional

oehler is leaving the market because they DEFRAUDED the US Government. They purposely lied and withheld information from the US Government to artificially lower the selling price of thermal receipt paper in the US in an effort to financially hurt domestic producers. That is a fact proven repeatedly in the court. Nobody likes a cheat. The price of thermal paper is returning to its true market clearing level now that Koehler has been prosecuted and found guilty. Regardless of the industry we compete, we all can agree that playing by the rules is a prerequisite, and when you don't the responsible party needs to be prosecuted to protect those who are playing fairly. Read more...
Beyond the issue of whether or not there is or will be a thermal paper shortage ... this post raises a number of valid considerations and obstacles for moving to totally digital receipts. I too have experienced the overly long receipts that hawk everything from my earned gas price discounts to a full-blown application for the retailer's co-branded credit card. Recently I experienced a FFS (fat finger syndrome)moment when an eager young clerk in a popular high-tech retail outlet keyed "n" vs. "m" in my email, and the receipt never arrived. I then had to call back and get a copy re-sent (once they found the transaction). I prefer to be given the option of getting both digital and on-site receipts such as a department store chain I frequent allows. That way, I can determine my comfort level on a case-by-case basis. And then there are the cases where you need a "gift receipt". How to best approach this will remain a topic of much discussion between the various constituencies. Read more...
No paper receipt, no sale. I don't give email or other personal info at the register. I left a full cart with 14 xbox games, two hard drives, flight control panel, and several dvd's at best buy this christmas because the check-out girl required my phone number to complete the transaction for a cash sale. I also left a over loaded cart at toy-r-us with almost $400 in toys because they demanded a phone number and zip code to complete the cash transaction. I didn't get angry, I just walked out and shopped at wal-mart and newegg.com. Read more...
Is the paper supply shortage real? Yes, but only temporarily as market production will correct itself with others filling the void in time. I'm with Bill. I'm not giving out my email address to every retailer, nor to even 40. It's very rare that I would give it out. Ditto for cell phone number, which stores have been increasingly asking for as a faster and less error prone alternative to typing an email address. Read more...

Today's Mobile Uncharted Territory Lesson: What Happens When Your Processor Is Ordered To Not Take Payments?

Good point regarding another factor to be considered when employing new payment vehicles. However, what seems to have been consistently missed in the posting/re-posting of the "ghastly accusation" regarding Square is the fact that the Illinois Department of Financial & Professional Regulation also filed C&D's in January 2013 against NetSpend, Skrill USA(aka MoneyBookers), and TouchPay Holdings. In contrast to Square, these three had applied for licenses, appeared to have been working with the IDFPR to provide requested information and somehow the process had not yet been completed. Perhaps this is not a major issue, but simply one where a governmental department is firing a warning shot to get the firms involved to bring the process to closure. Read more...
My read of the C&D in the context of the historical money transmitter exemption for merchant acquirers is that Square is in the line of fire (i) for its digital gift card program and (ii) because it allows consumers to receive payments (as opposed to merchants offering goods or services for sale). My guess is that Square can continue its pure play acquiring business for merchants, as that is a business that is typically not subject to these laws. It's the non-commercial role of individuals in this process that has attracted IL's attention. The C&D isn't really clear about that, but if this is the case as I suspect, Sq and the state of IL have outlined these parameters between themselves. Read more...
Agreed. Was merely making the point that states can and will issue these kinds of broad orders as the early days of mobile payments continue. Not saying it's right, but that it will happen regardless. Read more...

Phone Tracking And The Law: Clear Sailing

I think the idea that it is not difficult to opt out of being tracked by going to a web site and typing in your MAC address is a bit of a stretch. I'm not sure that most users can just grab their MAC addresses off their devices. Consider how much work the credit card industry has done in the past few years to get people to notice the three digits on the back of their cards (CSV#). Teaching people to learn what a new identifier is, how to find it, and what it is used for may not be as simple as you think. Read more...
I tried to opt out FROM MY iPhone. The problem was switching back and forth between the website (and the CAPTCHA) and the settings to get the MAC address. Also, there's a difference between a Nordstrom CUSTOMER opting out, and a passer by who has no idea that the data is being captured at all. How about a giant sign, "warning -- big brother is watching! To opt out, do the following...?" Read more...
You're the one who purchased and is voluntarily carrying the device that is continually spraying "I'm 12:34:56:78:90:AB" across the 2.4GHz band. You may have the device for your own convenience. It's entirely your choice to have the device and have the WiFi radio turned on. If you want to "opt out," turn off your WiFi. And your Bluetooth. And your cellphone. And remove any RFID responding devices you have from your person, including your credit and transit and door entry cards, any RFID tags sewn into your garments, and perhaps even your car keys. And if you're going that far, you might want to wear "CV dazzle" makeup to hide from all the cameras watching virtually every public space you enter. Read more...
I agree that surveillance is now ubiquitous in the public square. It doesn't make sense to ignore it. It does make sense to try to balance that with rights to privacy. I transmit my MAC address in order to obtain a signal and to log on to a service. In doing so, I do not expect to create a permanant record, available to everyone at all times of my location and movements. The logic of "you are broadcasting it so it can't be private" can apply to (and has applied to) location data as well as the contents of cordless phone conversations. IMHO, you CAN have an expectation of privacy in public spaces -- its a matter of defining its parameters. Read more...
Doesn't V/MC already market credit card data such that one retailer can see visits to various other retailers... Read more...

eBay's Day In Court: No Soup For You

So, eBay users have to follow eBay’s ever-changing, 270-page set of rules and, regardless, sell on eBay only at eBay’s pleasure. But, what about eBay following “the rules”? Or does the US Criminal Code on wire fraud and the facilitating thereof not apply to eBay? The ugly reality for consumers dealing with the clunky, unscrupulous eBay/PayPal complex. Read more...
So in other words, if eBay decides you are a risk to their continuing success and someone tips them off falsely (bearing false witness) about an honest merchant, it goes along with their perjury. Thanks for reminding me once again why I don't do business with eBay. It used to be such a friendly place, but I stopped using it in 2005 and have never looked back. As to small businesses not doing well, there are so many other online retail marketplaces to choose from. This small business person would be better off using Etsy, where supplies are not frowned upon. The listing fees are less than eBays, and the listing duration is three months, not 7 days. So, no soup for eBay. Read more...
I wonder why Genesta sued eBay rather than the competitors she believe engaged in a “sustained campaign ... to discredit [her] with eBay through unsubstantiated complaints about the authenticity of the antiques." I imagine Genesta was counseled by one who advised her to sue eBay rather than the competitors she claims libeled her, it seems to me she is suing the wrong parties, and that the CA courts are correct in dismissing her claim. Read more...
This frivolous lawsuit is still on-going, ebay has been cleared but some defendants - innocent former customers are still waiting for their case to be heard. This Plaintiff saw big dollars expecting ebay to roll over to shut her up. Now she wants the remaining defendants to offer a settlement to go away and help her pay ebays cost of defense... that's just wrong. Read more...
Without discussing the merits of Genesta's claim, or indeed why she was "booted off" eBay (or even whether it was a violation of eBay's TOS), the fact remains that an online marketplace provider is NOT required to have a TOS, not required to have an appeal process, and may ordinarily kick someone off the service for any reason (good or bad.) Whether Genesta SHOULD have been kicked off is not the issue, and the court did not consider that issue. The question is whether eBay has such market power that its decision to boot someone effectively denies them entry into the marketplace, and whether that is anticompetitive. Read more...

Nordstrom Phone-Tracking Trial Raises Customer-Theft Threat

ed
Tapping into customers wi-fi transmission not only is bad karma but totally unneccesary and not the most effective manner to get the end result. A better implementation would be augmented video analysis. There are several open source and commercial packages that can accomplish this. Take the existing recorded security camera video feed, run it through the video analytics engines that turns people into object squares like CBS "Person of Interest" and you can tag each "object" and track their activity in the store. The floor can have augmented markers (qr codes or special barcode paint on wall/column) for each departments and the video analytics can how long "objects" linger around them. Read more...
Is it better to remind people that their phones are continually broadcasting their presence by using that data commercially; or is it better to pretend that this isn't already being done? Google relies on GPS data from Android phones to measure current traffic speeds and to display them in Google Maps. People are already contributing their location data constantly without being aware of it. And all such data originates with enough information to uniquely identify the phone - although the services above assure us that the identity data is stripped prior to aggregation, that doesn't mean it doesn't exist. The only reason wireless data isn't being used for shopper tracking today is the fear of backlash. Offer someone a discount in exchange for tracking them, though, and I bet they'll let you follow them anywhere. Read more...

Windows XP End-of-Life Could Cripple PCI Compliance

Another possible solution - POSReady 2009, which we are currently investigating. Mainstream support will end April 2014, but extended support will continue to April 2019. Nothing like putting off the inevitable, but a few more years will certainly help. Read more...
This is an interesting issue, pivoting largely on the interpretation of PCI 6.1. One could argue - no new vendor patches means no missing patches therefore compliant. The truth is probably in the middle - vulnerability management, mitigating controls, and possibly the messy compensating control path. Read more...
While you mention a compensating control, and I tried to address that path in the column because it may technically be possible, actually I was doing my best to dissuade anybody from going there. I cannot see any comp control being effective. Beyond PCI DSS Requirement 6.1, another factor condemning Windows XP after April 2014 is contained in the ASV Program Guide. Read more...
POSready 2009 is based of the Windows XP SP3 codebase. It's the successor of Windows Embedded POS with was initially launched based on XP Embedded. Windows Embedded Standard 2009 ("standard" is the new name for the toolkit version of embedded, in this case based of XP Embedded SP3). Both solutions will add many years to your devices without any changes on you side. Read more...
We have no plans to move off XP after April 2014. Later Windows products do not meet our requirements. Read more...
First, Windows XP is still around because people like it! I wonder if anyone has considered Ubuntu Linx? The OS is straight forward and works extremely well and it's FREE! Well, except for the profesional online support but $250 per year no bad. Read more...
What about placing the XP POS terminals on an intranet network without any comunication or connection to internet by IPS, NAT, Firewall, etc.? They would only communicate with the main server on the intranet (running Windows 7 or 8) and only allow the main server communication to internet for needed functions like Credit Card transactions or like EDI to other main servers. Read more...
You may want to look at this article: http://storefrontbacktalk.com/securityfraud/out-of-date-os-causes-pci-violation-no-but-why-let-facts-trip-up-a-marketing-letter/ It is older but completely contradictory of this article. Change of opinion or interpretation? Either way PCI compliance doesn't clearly state one way or another. Read more...

MCX Sees ACH As Interchange Salvation. Many Chains Not So Sure

Why would customers want to sign up for yet another credit card? Why are not these systems already integrated with the rest of the retailers apps, ala Starbuck, so if you a loyal customer it is all integrated and I don’t have to hunt and peck to get it right? When I suggested that the consumer or merchant could just use Square, they shivered, and told me that were going to have a partner who can embed an NFC chip in the phone protector/case. So those that sounds useful—all in one phone cover/NFC. But wait…. you don’t get the phone, you don’t get the chip, and you don’t get the case…and you don’t get your existing credit card points!!! The consumer has to go then and get each one, and pay for it. Oh, I feel that ease of adoption, motivations slipping away away away. And that ongoing ‘up sell/side sell--fleecing sell--the model of the cell phone company. Read more...
The good, the bad, the ugly. A single, neutral, mobile payment app, such as MCX, to use at many stores is essential for the future growth of mobile payments. A single application for all consumers, driven by merchants deciding what that application is, is not the answer. Competition breeds security, excellence, innovation, and cost benefits; monopolies bring stifling mediocrity. Specifically regarding ACH, is the secret sauce really ACH, or is it interchange management? First, let’s consider would who opt-in to the MCX solution. Would a credit card user switch transactions to ACH? Doubtful. That means retailers will be converting the roughly 50 percent of customers using debit cards to some alternative payment method; three quarters of debit cards are qualified for low regulated debit rates at .05 percent and 21 cents per transaction. Read more...

Home Depot Privacy Pratfall: Spotting Web Shoppers In-Store

Multi-use tokens and what I would call repeatable tokens are two different aspects. Multi-use token simply means that a token can be used multiple times for multiple transactions, like card-on-file or express check-out. Multi-use tokes, provided they are not mathematically derived from PAN are very secure. On the other hand, repeatable token or a token mathematically derived from the PAN (hash or encryption for example), are not nearly as secure as their non-mathematically derived counterpart and if improperly implemented, can actually be fairly insecure. Multi-use and repeatable represent different aspects of tokenization. Read more...
If companies want to offer customized marketing while navigating around a backlash they need to understand where the lines is drawn for the consumer. There is a clear difference between learning about your customer and stalking them. Read more...
People who opt in sometimes aren't aware of it. Not everyone reads and scans everything in front of them. Sad, but that's how many businesses operate. Read more...
My own experience is that people are much less concerned about this type of privacy concern than they once were. More likely people expect that a store can find their old purchases, and like the extra catering to their desires and needs. Shoppers like it when they can come into the store and want a new line feeder for their weed whacker. And if they don't remember which one they need, the associate can look it up. Shoppers seems to expect that level of service. Perhaps THD should examine the use of guest shopping accounts for the same purpose though. Read more...
Apple does this as well. I bought an iPad at an Apple Store over the holidays using the payment card that I have on file with them and by the time I got home I had an email thanking me for my purchase and describing how to attach it to my existing Apple ID. I did not provide my email address or name or anything. Just the card. No idea if this is covered in the iTunes TOS or not. Read more...

Was Finish Line's New Site Disaster The Latest Cloud Casualty?

With what happened last holiday and with so many people greatly affected, I guess they will have a hard time building the credibility and gaining people's trust again. Read more...
Ed
Is this really Demandware's fault or the Finish Line CIO/CEO's fault? Why would anybody release new technology prior to their biggest activity season? The Finish Line made a risky bet and they lost. Retailers should stop the risky "just in time for the holiday season" mantra when implementing technology solutions. I've seen this over and over in Retail IT sector and they seem to end up with more eggs on their face than success stories lately. Read more...
M
Avid Finish Line (Online Shopper) & let me say first hand experience that site was absolutely horrendous...every link failed and timed out it was hellacious...The old site is just fine no need to change it. Read more...
This was a foolish move, and the fool that decided to switch from what they had to Demandware should be fired (or hire me to evaluate his next questionable decision). Even if I’m wrong about all of the above, they then had no control over their application, as their entire application is SaaS! SaaS has a habit of causing that problem. For a large B&M like FinishLine, this is an unacceptable decision. Demandware has crocs.com in its portfolio, I see — which is no doubt a bullet point that Demandware used to seal the deal, but Crocs isn’t FinishLine. Crocs is a manufacturer that dabbles in selling online. Finishline is a retailer with serious merchandising needs. Read more...
Conversion rate is driven by so many factors that it's impossible for an outsider to comment on what the problems were. Finish Line did a complete site redesign at the same time they launched a new eCommerce platform. If their design firm did a poor job with the usability of the site, that could cause conversion rate to plummet, regardless of what platform you're moving to. Calling this the problem of the SaaS infrastructure without any details of the problems doesn't make sense. Read more...
When you have a conventional E-Commerce site that's working fine, then replace it with a cloud-based site and conversion rates drop, you don't just blame site design. The site's new design didn't drive traffic away -- traffic went up slightly. It was just conversions that dropped. The fact that Finish Line didn't make the decision to simply fix the creative, but instead is taking a total of four months to assess whether the new site can be workable, suggests this isn't just the front end, but a more intractable technical problem. Read more...
No, this isn't a "Cloud Casualty." This is clearly just another example of a rushed launch. If you are re-platforming your entire e-commerce business, you should launch at least two months before the holiday season. Some pre-launch performance testing would help. It's that simple. Anyone with any decent experience at all with e-commerce platforms who doesn't have something to sell, knows I'm right. We've all been there. Read more...
After working in ecommerce for over 15 years I would bet there are several factors for this failure. But this is usually the most common. Performance usually takes a back seat to features and customizations. No one will step up and say to a retailer... you probably don't want to implement this feature because the very nature of it will kill your performance and possibly the site itself. Its a game of Quantity and not Quality. Do not implement anything until you have confidence it can perform well. Also, there are no perfect 'platforms'. I'll bet the Finish Line also has issues with their legacy system too, its just that over years of use... they are used to its shortcomings. Read more...

JCPenney's Christmas Pin Program: Channel Ping-Pong

What a ridiculous idea. Another example of a non-merchant playing games. Perhaps this was one of Johnson's kids ideas? I can hear other real retailers laughing, all the way to the bank. Read more...
JCPenney needs to get its act together fast. Very fast. I see a Diplodocus happily munching grass while the meteor is about to hit the ground. BTW: The "Apple" legal mention is probably related to the iTunes gift codes that are offered as prizes. Read more...
They need to make the site easier to find. I enter the jcp.com/christmas and it takes me to everything but. It has taken me 45 mins to find it and haven't won a darn thing. I have done a lot of shopping at Pennys and have gotten quite a few buttons but have won squat. Read more...
I have entered several codes and it keeps saying they have already been used. I just got them from the store. Read more...
I too have read the dim reviews for the past limited promotion of JC Penney on the button thing at this point it reminds me of the kid game " button, button who got the button" or was it 'button ,button who stole the button" in any case i had much trouble getting into the site and entering the code (needed a magnifying glass to see the code) which was ridiculous and not a good promotion at this time of transition ... I still have 8 buttons that i was not able to enter and I am mad. i hope I didn't win big shame on the marketing management of JC Penney. Read more...
This seems really insane. Why would you send a potential in store customer back home and to their computer. It doesn't make any sense. Read more...
Sol
I don't think this technique was a home run for JCPenny at all. Sounded like a big waste of time if you ask me. Jerry is right. Why remove the customer from the store and set them back home in front of their computers? Read more...

Sears Black Friday Confirmation Snafu: Just Check Inventory, OK?

Basic business processes are clearly missing here: 1. Realtime inventory locating across the warehouses and stores; 2. Before you offer a promotion you forecast the expected demand. And just like the police when going into tough situations, they call for backup! On hand inventory to support a special deal or integration to suppliers to check for additional stock if you run out. 3. Don’t commit to what you can't deliver--period! 4. Then save everyone money and honour your commitments, and drop ship the merchandize to the customer! Read more...
For some of these special campaigns, you also get into what should be a less tricky situation (but often isn't), namely that it might be that you are only permitting a small subset of your stock of a product to go at the super-low Black Friday price. In theory, that should be even easier to track, but it's often not. Read more...
Yes Kohls has the same issue on Black Friday the last week or so their facebook page is filled with complaints on orders being cancelled. Kohls also made a huge policy change on Kohls cash purchases returned will have NO CREDIT to the customers. Read more...
Ah, the trail of the fine point! Complex pricing methods, policies and fine print! Customers nor employees nor IT systems, it seems, can keep track of all this. Listen up retailers (or any other business): Why do things your customers HATE YOU FOR? Read more...
Ann, to answer your question (""Why do things your customers hate you for?"): Tradition. Read more...

Forget Fancy Hacking, Card-Data Theft Is Now All About PIN Pads

Does PCI DSS care about skimming at the POS? While PCI DSS itself does not have much to say about skimming at present, that situation may be changing. The PCI Security Standards Council has an information supplement for retailers in its documents library. I wish more retailers would read it. Another hopeful piece of evidence is the extensive merchant requirements -- including checking the POS devices, maintaining an inventory, etc -- in the P2PE Program Guide. I'm hoping that with PCI DSS v3 coming in 2013, we'll see changes to the standard and the SAQs to have retailers inspect their POS devices regularly just like they conduct regular vulnerability scans now. Read more...
ed
Thanks to outsourcing, most of the latest model card processing and pin pad devices are sold white label through sites like Alibaba and can be bought in markets around Ghangzhou, China. It is my understanding that in Europe, they had organized crime rings operating this same card theft using white label POS devices for years. Obviously, there needs to be a way to detect a counterfeit card processing machine and I don't know if that conversation has happened yet. Read more...
Thieves today are getting more brazen in their tactics. Because of this, it’s important that retailers remain vigilant in their efforts to keep their PIN pads secure. PIN pads should be locked down at all times. (Amazingly enough, there are still some retailers that choose not to spend the extra money on locking stands, but it’s really a small price to pay for peace of mind, in my opinion.). Make sure you know exactly who will be servicing the devices, if necessary. Did the field technician properly identify himself/herself? Did he/she have an appointment? Did he/she sign in or check in with the proper person? Online monitoring is another valuable tool for round-the-clock network security. Not only can retailers be alerted if a device comes off the network, but can take immediate action to prevent the crime from progressing. Read more...
One way to avoid POS tampering is use inventory barcode or security rfid stickers on the POS devices and scan on a regular interval. If they are using the security rfid sticker, then the security gate should sound an alarm. Read more...
Not sure how other retailers do it but we (Debenhams) have a whitelisting app that knows what PEDs are in any given store and only allows those PEDS to be attached to tills in that store so stores can't move them between stores and no PED that hadn't been previously authorised would work. Read more...

The PCI Scoping Discussion Is Over. Now It's On To SAQ Roulette

I think this is a very strict interpretation of "connected" systems. You may be right in that PCI SSC views scoping in this purist view, but this is one of the problems with PCI. SAQ-C for example, creates a catch-22 for merchants. A requirement for SAQ-C is "Use and regularly update anti-virus software." Well, to do this, the AV application must have connectivity to another "connected" system. Yes, I know, a merchant can manually copy AV definitions to removable media and manually update the CDE, but how many are really going to do this and for the few that do, how up-to-date are they really? Read more...
A related problems for retailers can be the payment equipment supplied by the bank, ISO or integrator. For example, consider a dial-up terminal/PINPad without an integrated printer. This means receipt printing on a printer attached to the POS workstation which is in turn connected to the in-store LAN and thus may/may place the entire 'typical'store network in scope - because PAN is often printed on merchant receipts during offline/SAF modes as a result of business requirements of Acquirers. Read more...
Steve, I agree my position is a strict interpretation of the PCI SSC's guidance, but that is exactly what I as a QSA am supposed to do. The same goes for merchants, too. The only position that matters is that of the PCI Council's or maybe the merchant's acquiring bank. That is, if the acquirer wants to give the merchant a pass on a particular SAQ, I would have no problem with that. Otherwise, we all have to play by the house's rules. Read more...
I agree that you, as a QSA, you must use a strict interpretation. But with this strict interpretation, I argue that in the real world, with this strict interpretation, no merchant can qualify for SAQ-C and still comply with SAQ-C. Either PCI SSC needs to relax their "connected systems" definition, or drop SAQ-C -- the latter being a boom for alternative payments. Read more...
I don't have a single customer that qualifies for the shortened SAQ any more. I think the SAQ is getting to be such a burden that businesses are making decisions to not upgrade to new equipment and technologies. This stifles business growth and inhibits moving to solutions that encourage more secure practices, as well as other benefits. For example, I regularly encounter business to business companies that say they don't store credit data because of risk. But when employees are probed, they really do store data. They have all sorts of excuses- we only hold it for 30 days and it's in a locked file drawer, etc. I've heard it all. Read more...
I disagree; this is an issue of scoping as it applies to the unencrypted cardholder data. If the data is encrypted, and the retailer does not hold any of the keys or ability to access the keys, then the data is out of scope, and therefore the system that data is on is also out of scope. Read more...
I'm a little confused as to what a "connected to connected to" might mean. Did they use specific language or did they just speak generally in language affirming that scope of assessment extends out to two degrees of separation as a rule of thumb? Was this a formal written clarification (e.g. a FAQ)? Read more...

Apple Arrest Puts Heat On Mobile Checkout Policies

ed
Mobile check-out has the same challenges as self-checkout stations by putting trust on the customer to pick from inventory,conduct the transaction and walk out the store without interaction. Most shoplifters believe they are smarter than the retail security system and the shoplifter game goal is to outsmart the retailer with the prize of the shoplifted item. It wouldn't surprise me if this was the case, which was a very expensive pair of headphones. Read more...
Good point, Ed, but as the story points out, the security issues involving mobile go beyond self-checkout security. 'Tis not the same issues in the sense that self-checkout transactions are observed in one place, by the associate managing those SCO lanes. In the Walmart story this week, the associate merely sees the shopper scan the single barcode from her phone. This robs her of the ability to notice if she deliberately does NOT scan several items. (Granted, that can be detected with in-aisle cameras, but it's much more complicated. The system--or associates--needs to notice that a specific customer is using mobile and then notice she doesn't scan certain items in certain aisles.) In the Apple Store example, a scan can happen but the process may not be properly completed--deliberately or inadvertently. None of these issues are unsolvable, but the belief that mobile self-checkout presents no security issues beyond traditional POS self-checkout is a very dangerous thought. Read more...

To Survive, Retailers Need To Kill The IT Budget And Burn The Boats

The IT budget, strictly speaking, should be limited to managing personal computers, the network and the phone system. All other initiatives, anything attributable to a revenue stream, should be paid for and largely managed by a business unit. IT has a role to play of course: assisting business stake holders with system and vendor selection, ensuring the computing environment is coherent and secure, but ultimately the money needs to flow from the business and be controlled by the business. The CIO should be the gate keeper, not the purse holder. The world is moving too fast for organizations to be held back by their own bureaucracies. Make business units accountable and in charge of their own technology purchase decisions. Read more...
I think the issue is that all CIO's are not business people but typical IT people. As someone with a business background in IT, I want to and am capable of running IT as a business. Someone who has only come up from the IT ranks probably does not. Hence, it is ever important for companies today to find an IT leader with a business background who is a broad thinker and can see the bigger picture. Read more...
Part of the reason that IT does not tend to be the best “ladder” for becoming the CIO is because we are not focusing on the right training for our middle management. There comes a time in an IT leader’s career where training changes from technical in nature, to business in nature. Young leaders need to focus on P&L management, communications, people management and learning the business inside and out. Someone who is a Powerpoint wiz, with great interviewing skills that knows a balance sheet inside and out is going to be a better fit for CIO than someone who has written millions of lines of code or virtualized a datacenter. Read more...

RIP Payment Card Industry

The beginning of the end of the payment oligopolists really started in 1999 when several large retailers finally got fed up with the twice-yearly increases in interchange and fees and started pushing back - hard. Walmart tossed the first major salvo when they sued and won a $3 billion settlement in 2003. To all my friends on the banking and processing side of the business: Look at merchants not as an "inconvenience" between you and the cardholder, but as a client with growing choices to dis-intermediate you. Read more...
Jim
Being that these are transactions going through the Discover network, won't they still be subject to interchange rates and PCI-DSS requirements? Read more...
As for PCI, yes, in theory. Interchange will apply, but at what rate? Many questions remain. For example, PayPal's Don Kingsborough was asked Wed. about whether these transactions would be considered card-present or card not present. That's a very interesting question as the card is not really present. When asked directly, he said "it depends on the kinds of transactions. More to come about this as we get closer to the launch in the second quarter." Not especially comforting, but it does signal that interchange issues are far from solidified at this point. Read more...
The infrastructure did not exist 20 years ago so the fees justified the risk. Today, the merchants can use the same infrastructure and also now have closed loop payments well tested. At a very high level I think we are going to see two types of payment groups: 1)ubiquitous, Private, Open loop and 2) relationship, value add, closed loop. Visa like vs MCX like. Some consumers will want privacy and universal use, while others will want a relationship with the merchants (and receive extra value). They will likely do both. Mobile will turbo charge the the second group. So if the MCX like offers are reloaded via the consumers bank then the credit card players of today are headed for a huge volume haircut. Read more...
Todd, I empathize with you and I'm in the processing business. But, the end of the payment brand monopoly is just a dream, or for many a nightmare. With this announcement, PayPal has simply joined the payment brand club, which includes Visa, MasterCard, Amex, and Discover. In fact the winner here is Discover as PayPal cards will have Discover numbers and of course will be subject to Discover interchange. The payment brands have a near universal monopoly on payments and it won't be changing in my lifetime or yours. Read more...
If there is enough pressure on visa/mastercard, one would think they would react by lowering fees. Let's face it, those cards are going to be around a while. Looking back to 2001, cc processing fees were .2 of sales and now stands to reach .8 of sales, as that continues to rise, you will see opportunities to make money and to create competition amongst processing fees, which should in turn reduce the cost to the retailer. Where does that pressure come from, is it discover/paypal, or is it the retailer? Think of all the money spent on transaction fees in the grocery industry, roughly $5 to $6 billion a year, there is room for grocers to put the pressure on the cc companies, but it will take communication and promotion by the retailer to the consumer. Read more...
Why in God's name don't you have a "tweet this" option for your articles? Or at least summaries... It would make a big difference. You must be heard! Read more...
Combined with the news of the MCX network these two concepts signal a turning point in payment processing and I am confident that others will surface as the market / perception matures. I've always seen PCI compliance as only a stop-gap to plug holes in the insecure and some say "broken" credit card transaction processes we're all required to use. There will be a dilution of efforts as many proposed products and standards come online, only now available due to the advancement of communications and technology. Read more...

RadioShack Rep Used Customer Data To File False Tax Returns. Why Is RadioShack Even Still Collecting SS Numbers?

Without knowing all of the details of the specific case, it seems more likely the defendant did not use previously-stored data - she simply captured what she wanted on a piece of paper on her desk as she was working with the customers to obtain the information in the first place. Thus, it isn't a "data at rest" issue - but a "data capture" issue. The best way to handle this sort of situation is to have the agent briefly transfer the customer to an IVR system when the appropriate time in the call occurs so that he/she can enter their SSN via their phone's keypad - then have the call transferred back to the live agent when this is done. It's fairly straight-forward to implement and takes the agent out of the loop on data capture. Read more...
The problem is that identity data has value. If it wasn't SSN, what would you have them ask for in order to extend credit to an unknown person? No matter what information the industry asks for, the same information can be copied and abused. The technical answer is a chip embedded in your Orwellian identity card. Is the personal cost of privacy worth the price of corporate security? Read more...
Another issue apparently overlooked regarding social security numbers is the comfort level with giving/accepting the last four digits as some holy grail over identity validation. Anyone armed with this tidbit of info can wreak havoc on both consumer and data gatekeepers. I'm surprised more attention hasn't been paid to this. Read more...

Can Amazon Cloud Be PCI Compliant? Not Likely

Isn't this whole article missing the point of PCI 12.8.x? If the merchant is using a service provider (Amazon) then all the merchant needs to do is follow 12.8.x regarding the relevant PCI controls. I'm not sure I see the issue the article purports is present. Read more...
Indeed, 12.8 applies to service providers. However, the entirety of the DSS applies to the assessed entity's cardholder data environment's applicable scope. As such, all system components which process, store, or transmit cardholder data within a defined network segment are in scope of assessment. Further, in a virtualized or cloud hosted environment, those system components which serve as a hypervisor must also be assessed. Read more...
Ted
So are you saying that you contend that cloud providers in general (AWS in this case) have most likely not assessed all components that should be considered as "in scope" to have an accruate ROC and Level 1 Service Provider attestation? Read more...
Ted, I'll let Peter speak for himself, but my read on the column was that he wasn't saying that at all. The point of the piece was not that cloud providers haven't adequately performed assessments, but that retailers using those cloud sites might not be able to sufficiently prove their own compliance. Read more...
Ted, I fully believe that each cloud provider determined to be PCI compliant as a service provider by a QSA was compliant at the point in time of the assessment and should be sufficiently maintaining their environments so as to support similar findings in future assessments. However, as many service providers such as AWS do not themselves store cardholder data, the scope of their assessment is limited. Read more...
Tom
The whole process is to establish a trust framework of service providers, merchants, and assessors, and the reduce the waste that people spend on QSA's doing things for the sake of compliance that don't provide much risk protection. Should merchants be paying QSA's to do physical walk throughs of service providers that are already validated? I don't see much value in it. Why stop at physical walk throughs and not just assess the entire service providers against all PCI controls, since the merchant is ultimately responsible? Read more...
There is security, there is risk and there is compliance. Some of these objectives can be synonymous and some are not. PCI DSS is very stringent on what is required to be divulged as the breakdown between a service provider and a merchant as part of their own assessment utilizing the service provider. The onus is on the merchant and the QSA to establish that they understand the scope of the controls being provided by the service provider vs the controls that the merchant is responsible for. Read more...

Visa Joins MasterCard In Relegating PCI To An Afterthought

like fire codes in your community, the rules come after walking through a couple of deadly fires and seeing reasons to have rules. After the first major breach that is unique to a mobile payment scheme - we will see attention from the brands. Read more...
Agreed with the other poster. Very much a reactive system. Everyone knows those dang square devices and associated configs are not compliant, yet everyone looks the other way. Heck, even the DNC is out there in force using these device to get contributions for the presidential campaign. How many billions... yes as in "B" are being run through that type of setup with complete disregard to compliance? It's like tax cheats... when u see all your neighbors doing it, you start to wonder why you are following the rules. Read more...
"Everyone knows those dang square devices and associated configs are not compliant, yet everyone looks the other way." Most of those 'dang devices' do utilise P2PE in-hardware which still remains absent from the bulk of traditional POS terminals around the world. I'd actually be happier swiping my card through one of those, given they've been designed ground-up with the view that the smartphone it's being used on is an insecure environment, than in a traditional POS or integrated environment which is anyone's guess. Read more...
You point out the apparent inconsistency with which the brands view mobile for mid-size and large retailers, versus what they allow smaller merchants to get away with (in a PCI and risk sense, anyway). Will it take a major breach to apply the standards uniformly? I really hope not. But how else can one reconcile the evidence of increased card fraud at small businesses (Verizon Data Breach Report) with easing PCI compliance requirements for some of these same merchants. Or, to put it on a more personal level (as one client of mine did), the brands have thrown her/him into the "no" business. They need to be PCI compliant, so the Security team has to say "no" when their business divisions want to use these devices. Not a lot of fun for them (or their QSA). Read more...
I disagree as to whether *any* of the devices uses "P2PE in-hardware." P2PE is just rolling out, and there are precisely zero approved devices. What's more, some of the dongles in their original version did not even encrypt the mag stripe data. We have similar issues with the payment apps themselves (none of which is PA-DSS validated). As for the underlying operating systems, I don't think anyone knows what they do with the data passing through them. Do they retain the data? Are the data cached somewhere? Read more...

So Why Is M-Commerce Struggling So Much In The U.S.?

I work for a multi-brand franchisor and having looked at Google Wallet and ISIS, we decided not to participate at this time. What I can say is that from our evaluation neither of these is ready for prime time (although to be fair ISIS is still in the gestation period and not yet launched). One very serious consideration that concerned me is that neither effort works with the iPhone. Mobile commerce / payment will come to the U.S. it is a natural evolution of the mobile space and I believe it will be a natural extension of how we use our smart phones today. The early adopters will be the younger folks and they will drive this as they have the mobile market. What it will take is simplicity, convenience, and reasonable security. Read more...
ed
The problem in the USA is we are expecting status quo payment processors to disrupt their own industry with mobile payments. I cringe everytime I see an article on mobile payments and the desire to name drop Apple, Google, ISIS and PayPal. These firms see mobile payments as a novelty and want to keep it that way. It is going to take a true independent entity with the clear goal of disruption to transform mobile payments in the USA. Read more...
Mobile commerce is becoming popular in almost every nation. USA can't be behind the race. However, it is the users who can make it popular. Mobile commerce will increase at a rate of 65 annually to reach $24 billion in 2015. (Coda Research). So, let us hope USA will take part in the growth. Read more...

"Careless" Systems Integrators Now Directly Under PCI DSS

This exact issue has been bothering me for years, and I was JUST talking about it with someone only yesterday. This may well be my favorite article, mostly because I'm biased and have hated this particular problem forever. Read more...
Good article, but how does this have anything to do with the DSS? Read more...
Actually, the QIR program has a lot to do with the DSS (or PCI). Since merchants rely on their reseller or integrator to implement their PA-DSS validated application, these resellers and system integrators play a critical role in merchants achieving and maintaining PCI compliance. As far as I can tell, the QIR program is designed to help merchants stay compliant by making sure their payment applications are installed according to the PA-DSS Implementation Guide, for example ensuring default passwords are changed (and protected), that the data encryption keys are properly set and secured, that the merchant's data retention policy is set, that no sensitive cardholder data are stored, and often that a firewall is in place and properly configured. Read more...
Although this is a great move forward in pushing the issue of highly trained people, it is also a good marketing ploy for the council. It begs the question: How much do they stand to make? The problem for this is that for people (like myself) that are just starting out their own business venture, PCI has typically charged a premium for their training and certifications. This change will likely force those of us with less capital to spin into the abyss. I have more than 15 years in the security and compliance fields with heavy hitter certs like CISSP, CRISC, and Sec+. There should not be a guide but a free test or a pre-requisite of either the PCI cert OR other heavy hitter certs. I just don't want the good guys in small places to get flushed out. Read more...
The ETA recently launched the Certified Payment Professional program, which charges $425 for non-members to take the test, assuming they meet the 'experience' requirement, to PROVE they are a professional. And they'll have to take it every 3 years. Worthy program, but high cost. Plus, only a select few were allowed to be in the first class, and there are only 4 test windows per year currently. So being on the registry simply means, you were lucky enough to get picked, nothing to do with skill level. Read more...
@Cory: Thanks for your comment and question about the pricing of the QIR training. I raised that question in a conversation with Bob Russo last week, and I will address it in a follow-up column in a few days. While the pricing is not yet set, hopefully it will not be too great a burden for you or other integrators/resellers. We'll have to see, though. Read more...

Costco Self-Checkout Trial Setback After Store Losses

Not all self checkout works this way. One self checkout vendor is designed to work this way and it leaves a gaping security problem that can create this situation. There are 3 predominant providers of self checkout in the U.S. and this represents the lowest installed base provider of the 3 and their market share continues to shrink from reports I have seen. Read more...
Editor's Note; The vendor that Mark was referencing is IBM. His point is that other systems make it easier for any weight mismatches to require associate intervention--just like with alcohol or cigarettes or any other age-restricted item--rather than a more passive flag to the customer that the item was excluded. Read more...
Another angle on the challenges with self checkout which may come to the retail scene in the next year is the tap and go/NFC smart phones. Though these are all the rage in Japan, we have yet to adopt them in the U.S.. But that will change as the new phones emerge with the chips embedded this year. And the new demographic want to use this type of technology. A large retailer told us that NFC phone customers are getting their identities stolen, even though the self check-out requires proximity-- and they do not want to take responsibility for this occurrence in their stores, on their premises. So although they like the idea self check-out they are still experimenting with various approaches. Read more...
ed
For self checkout, item-level RFID or unique barcodes plus real-time tracking appears to be the missing component. Mail delivery companies use real-time tracking of mail with a barcode and assure delivery at a certain time. The public library embed books with RFID and track them through checkout. Retailers and SCO manufacturers are going to have to accept the fact they cannot rely on UPC and really need an item-level identifier that tract that specific product as a unique item from shelving to checkout. Read more...

Visa Yanks Global Payments' PCI Compliance. Catch-22 In Full Force

So PCI compliance can not guarantee that a provider will not be breached, but a breach is inherent evidence of non-compliance? Any comment from VISA as to whether they will continue to accept ROCs prepared by Trustwave? Seems like an inconsistent position. Read more...
Thu
Global Payments reported they were working toward being in compliance with PCI, despite already being on the list. In a backwards way, they admitted they were not previously in compliance. We can't really say that a breach is inherent in these type of situations without having a full investigation report. That's one reason why MasterCard is waiting to see what forensics finds before yanking them from their list. Read more...
In the past, Visa has stated, "No compromised entity to date has been found to be in compliance with PCI DSS at the time of the breach. In all cases, forensic investigations have concluded that compliance deficiencies have been a major contributor to the breach." This quote can be taken two ways. Either PCI is perfect and all-encompassing and compliance guarantees you won't be breached; or there are so many “gotchas” in PCI that no one can escape non-compliance. I personally believe that PCI is written in such a way — and interpretations among QSAs vary so much — as to make it impossible for anyone to be 100 percent compliant 100 percent of the time. Read more...
PCI, TSA, IRS - obviously none of these functions as intended or as promoted. I've said it before and I say it again, hackers are free of personnel, budget, expertise, infrastructure and time constrains. Nothing, NOTHING, is ever fully safe. Visa and its attorneys simply choose to hide behind the false sense of security of the PCI veil. Truth be known, Visa has probably been hacked. Anyone see the similarities between VISA and the wizard of OZ? Read more...
This begs the question, how does this decision by Visa affect Third Party Processors (TPA's)? Our TPA agreement has wording to the effect that we can only send CHD to PCI compliant processors and banks. Now that Visa has deemed GPS non-compliant, are we breaking our TPA agreement by allowing our customers to continue using GPS? Read more...

How About A Little Service Provider Responsibility Here, PCI-Wise?

I appreciate the one-sideness issue highlighted in this article. I also understand how card brands have a contractual link to merchants - but only rarely do with service providers. I'd find it virtually meaningless for the PCI requirement to mandate actions by the service provider, when they have no contracted responsibility to a commercial entity. That said, 12.8.4 places an obligation on the service provider to demonstrate compliance to their customer the merchant (or service provider, Acquirer etc). Is not the combination of these 2 requirements having the same outcome? Read more...
Lem
PCI is like banging your head on the wall. When you complete the SAQ, it feels good stopping. Read more...
Actually, service providers do have direct links to the card brands. For example, many have direct system connections/access points to the card networks. More importantly, all service providers validate their PCI compliance to the card brands. The brands (at least Visa and MasterCard) also post lists of compliant Level 1 Service Providers on their websites. My point was not so much about the card brands, though. I was observing that since PCI already has a number of requirements that only apply only to Service Providers and not to merchants, there is precedent for one more Service-provider-only requirement to cure the imbalance I noted. Read more...
Walt, I'd suggest that perhaps you have a limited concept of who would be considered a Service Provider under the guidelines that you've suggested. The fact is that most resellers/integrators do NOT have direct links to the card brands or the card networks. They may work with processors to board new merchants or provide support, but there is no contractual or legal obligation at all. Your comment that all service provides validate their PCI compliance is also way off base if you include resellers & integrators. The limited number of Level 1 Service Providers probably do validate their compliance, but the vast majority of resellers/integrators are not that big. Read more...

The Never-Ending Dance Of Contactless Security

ed
Contactless should require multi-factor authentication for financial transactions. However, multi-factor authentication will nullify the main benefit of contactless transactions which is speed. Is there really an improvement between a mag swipe and contactless tap if multi-factor authentication is required? Read more...
Contactless card transactions are verfied online, if there is fraud the bank with take the liablity. This does not happen with checks, bills. Oh and contactless is faster than any other form of payment and you do not have to check the takings at the end of the day: so faster service and a bit more secure. Read more...
MC
To contaftless. Not completly true that the bank will take the hit for a fraudulant contactless transaction. When paying at the fuel pump with contactless, you will have a defined pre-auth limit which is set by the issuer and obtain an online auth number. Even with the issuer providing real time auth, should the customer dispute the transaction, the liability and burden of proof still lies with the retailer in most circumstances. To the issuer they claim this is a "card not present" transaction if completed out of sight of the store attendant. Add that to the fact that that a gas station forecourt allows the hiding of the necessary fraudulant transaction supporting equipment inside a vehicle, it creates the anoynmous environment that fraudsters prefer to operate under. Read more...

The PayPal Problem: Will It Impact Retailers' PCI Scope?

For the foreseeable future, retailers are not going to be transacting exclusively against PayPal accounts. Therefore, with the assumption that the payments are stored, transmitted and processed through the same systems as "regular" CHD, there will be no change in scope. Merchants will have to protect the PayPal payment information with the same rigour as PANs/CV2s/tokens, but this isn't arduous because they are doing it right now. (Or should be.) Read more...
This is the problem with the notion of the high value token wording in September's guidelines. As you rightly point out an email address, mobile no. or even a name can be considered a high value token. Yet by their very nature these are all readily available in the public domain, so I find it hard for them to be considered as a high value token. Read more...
Will Visa be including in their V.me system the additional ability for online payers to source funds via a “debit” transaction from their banking account, rather than only by a credit card transaction as has been the case in the past because of the PIN requirement for such a “debit” transaction? After all, what’s the difference between a PIN, that Visa/MasterCard already hold, and a password required to access a secure online payments gateway? Read more...
The PayPal user information is much more "high value" because it can be used across merchants to initiate transactions. If I have it or gain access to it via a merchant compromise, there is nothing to stop me from using it at another merchant. A properly designed tokenization system should have rules that prohibit tokens obtained from one merchant to be used at another merchant and/or prohibit initiating transactions unless the PAN and authentication data has been previously received by that merchant. Read more...
A big difference with PINs(at least in the debit world) is that they should only be entered into an encrypting PIN Pad. The feeling goes that if I steal a card with a valid PIN I can go to an unattended device(ATM) and pull out money w/o having to present a legitimate card to a person. I suppose you could make the same case(which you did) regarding an online transaction w/ a password. Read more...
PayPal's plan of POS attack is to entice merchants with below-cost credit and debit card processing, which is an offer no retailer will refuse. The company will subsidize its losses from the card transactions with the very high-margin profits it enjoys when its users fund the sales amount from their bank accounts. On the other hand, whether the consumers will be won over is another question altogether. If it is to stand a chance, PayPal will need to make the checkout process as uneventful as possible. As it is, the customer is asked to enter his or her cell phone number, in addition to a PIN, before the transaction can be completed. That's unnecessary and excessive. Read more...

Tokens Are Not The Same As Encryption. Honest

I agree with all your points on how the technologies differ. The only possible disagreement I have is that you are very generous in giving PCI credit for distinguishing the differences between the two technologies and scope whereas I think they caused the confusion (or at least didn't help). Read more...
I tend to disagree that tokenisation and encryption are different - indeed, I see tokenisation as a form of bespoke encryption. Many of the arguments I hear about tokenisation being different from encryption leads to concerns about the security of encryption, or that encryption can be reversed. Although it is true that encryption can be reversed with the key, I strongly dispute the arguments about the security of encryption, and personally I put much more faith in an algorithm that has undergone many decades of community research, where the security (key) can be isolated in approved hardware, than in a bespoke solution I have no visibility or independent assurance of. Read more...
"High-value tokens are those that can be used to initiate a new card transaction." Personally, I didn't understand this part of the doc. Surely that's the point of a token, so I'm assuming they mean a token that can be used independently of a 'vault' type of service to initiate and complete a transaction. Otherwise, every token would be a High Value token. Services like Square's card case where a person's name can trigger a payment, or PayPal's where an email and password trigger a card payment. In these cases a name and email would be tokens and as they are initiating a card payment could be considered a High Value token. Read more...
I disagree with you on the point you made about there being no way from a PCI scoping perspective to compare tokenization guidance to encryption clarification. The parallel that I see is not between tokenization and encryption, but between the token and the encrypted data values themselves. Semantics? Maybe, but I believe there is a significant if not subtle difference between these two statements. Read more...
How can QSA be comfortable determining if something is out of scope, if he or she does not know how the system providing that benefit explicitly works in all conditions over its lifetime, especially if its distributed and may its functionality and risk profile may change over time and can be explicitly guaranteed? A QSA takes liability for such a de-scoping claim. Only proofs of security and evidence can stand behind that something seriously lacking in most of the debate. Read more...
Tokenization is a use case of data transformation, not a specific technology. Humans have been practicing tokenization using multiple methods for centuries and claiming that one method of data transformation is the "real" tokenization and not some other way doesn't make sense. Tokenization must be reversible. Read more...
Promises of incremental sales and the ability to target loyalty have been completely worn out by endless pitches of card services, hardware, software, etc etc etc... Another watershed way of getting mobile payments introduced is to shift merchant's payment modes from higher to lower cost products. I think ISIS has started down a path that completely misses that opportunity by partnering with incumbents who have zero interest in reducing merchant payment costs. Read more...

Want To Push Social Media? Have You Considered Using Your Stores?

What about if the retailer is in a shared space (e.g., a food court in a mall or college campus) where there may be limited space and possibly limited flexibility (e.g., power, comms, lease restrictions)? Or in airports, where I see more and more retailers. Would your recommendations hold for those locations, too? By coincidence, I was at a conference this week and sat next to the person charged with building brand awareness for a national food chain on college campuses -- and therefore with the student demographic -- nationwide. After reading your piece, I was wondering, would your recommendations would hold for them? As for airports, I could see one school of thought that says customers don't live there, so get them in and out. But I also could see where the particulars of this demographic could be sufficiently compelling to want to reach out. Read more...
I agree that there are even deeper levels of engagement that you absolutely could drive in the store (I love the idea of floating coupons by the way). I think what is most important is using the store to start a conversation that could be then continued online (rather than always trying to start a conversation online that culminates with a sale in the store). Read more...
I think the statement "Then there is the small fact that the retail operator doesn’t feed his family based upon how well his customers are engaged online" speaks loads. Read more...

Publix Buy-Online-Pick-Up-In-Store Trial Nixed: Grocery Shoppers Are Different

Your take on the customer's view is right, however I wonder whether supermarkets can go a _long_ way towards resolving it with easy, quick refunds? My partner unpacked our home-delivered fruit and veg box last week, and discovered bruised fruit. Took a picture, emailed the company, and within 10 minutes had a refund. Happy customer all round - the company cares, etc. This requires very careful thinking on the merchant's part about how to invest in this area of customer service. However, since it is equally easy for my partner's picture of bruised oranges to be uploaded to a social media site as it is to email the company, the downsides for NOT doing this are quite large. Read more...
What about the other non tangible benefits of shopping at the grocery store - it gets you out of the house and you get to interact with the staff. for many people this might be there only "human contact" in a day, or at least human contact that doesnt come with the stresses associated with family/work colleagues/customers. And of course, there is the primeval "hunting and gathering food" aspect. Read more...
ed
The last poster hit it head on - there is a primal "hunter" instinct of us humans preventing the buy groceries online model to take off. Food, clothing and shelter are the three things we humans go out and scavenge for and that is in our primal instinct. It appears the next logical step is to focus on items that do not interfere with our primal instincts such as prepackaged food or personal hygiene. Read more...

StorefrontBacktalk
Our apologies. Due to legal and security copyright issues, we can't facilitate the printing of Premium Content. If you absolutely need a hard copy, please contact customer service.