Fortnum & Mason’s PCI Weakness: Customer Service
Written by Evan SchumanHistoric British retailer Fortnum & Mason—with roots dating back to 1704—is finding that PCI compliance doesn’t end with IT. The chain had to confess last week that a customer service rep was asking customers to E-mail their full credit-card data—including CVV—to process routine refunds.
Clearly, one errant employee is something every chain has (for many, it’s more like several thousand errant employees, but let’s not go there). But this example brings up a too-often overlooked PCI fact: Compliance is an issue for every employee. That means training and quite a few new policies and procedures. Mobile payment, being a disruptive factor, will only make things worse, because it creates many more opportunities for payment-card data to be captured/retained against the rules.
The Fortnum & Mason situation, which—to the best of our knowledge—was first reported by Computerworld UK, started out with what undoubtedly seemed to be a reasonable customer service customer interaction.
The rep understood enough about PCI and payment-card procedures to know that such data cannot be preserved. The problem happened when the rep took the next step.
Fortnum & Mason “does not process direct crediting automatically due to encryption measures.” So far, so good. “I understand you do not want to give out your details, however. We do not keep them on file due to security reasons.” Again, everything is looking good.
The rep then said: “The only way I can refund you is if I do have them. We will instantly destroy your details as soon as you are refunded.” And there we have the double-whammy of PCI boo-boos: The rep understood that such data can’t be stored, but somehow didn’t see how asking for it to be E-mailed would undo that.
Then there’s the card data security coup de grâce: The rep’s belief that the ability exists to “instantly destroy your details as soon as you are refunded.” Setting aside the data backups for both the retailer and the customer, there’s the issue of sending that information across multiple E-mail servers and the Internet in plain text. The rep even acknowledged “encryption measures,” but didn’t see how this request—which the customer had the good sense to refuse—contradicted it.
A Fortnum & Mason spokesperson, Sarah Street, issued a statement that fessed up. The retailer had initially denied that customer service had sought the payment-card data, but it then corrected that statement.
“We have now fully investigated the claim that a customer was asked for their credit card details via E-Mail and we can confirm that an error was inadvertently made in an effort to expedite a refund,” the statement said. “We apologize for causing concern for this genuine human error, done with best intentions to aid the customer. It is against our procedures and we have taken action to ensure that this will not occur again.”
It was a good, contrite statement and fully appropriate.
January 25th, 2012 at 10:04 pm
This is a great example of “customer service” trumping security. I disagree with one conclusion, however. Based on my experience, this is most definitely not an “isolated problem” as you state. Rather it is something I and QSAs like me run into regularly.
Part of the cause is a lack of training. As you point out, PCI compliance requires employees be trained not to do things like asking for payment cards over email. That the customer service rep did that is bad enough. Worse is the Fortnum & Mason spokesperson foolishly stating both how important their customers’ security is AND that the company is PCI compliant.
This situation also has me wondering if they also have a call recording system that captures and stores card data, too. Just for quality purposes, of course…
It is disappointing that a leading retailer like Fortnum’s would be so casually dismissive of their customers’ security.