advertisement
advertisement

This is page 3 of:

The Latest PCI Compliance Stats Disappointing For Level 3s

April 14th, 2010

But that scenario still assumes the person answering the compliance question even knows the answer. What if he or she is confused about what constitutes prohibited data? Much more likely, what if that person believes the retailer is not storing such data but many of his or her colleagues are secretly doing it? (Marketing. Always blame marketing. When seeking out an ethics-challenged department, marketing is universally a prime choice.)

To be fair, it doesn’t even have to be ethics-challenged. Other departments—and even some people in E-Commerce or IT—may simply not know the rules. At a large chain, data retention questions are simply impossible to answer honestly. But they are easy to reply to apathetically, because the answer being sought is so clear.

The 2009 Visa report brought some new “prohibited data retention” data points into the mix. For the first time, Visa added columns for Level 3 and Level 4 merchants. But the included data wasn’t especially helpful (“Not applicable” and “To Be Determined,” respectively). Visa also added VisaNet Processor (direct connection) and Agent (downstream). Rather than the 100 percent or 99 percent for Level 1s and Level 2s, though, VisaNet and Agent got the vague “high,” with no definition. (We assume “high” is better than the undefined “moderate.” It at least sounds better.)

So, does this mean that VisaNet and Agent are, to some unspecified extent (but presumably a lot higher than one percent—given Visa’s willingness to report 99 percent for years), indeed retaining prohibited data? That’s comforting.

Regardless, the key story here is merchant compliance and the failure so far to get the millions of merchants that account for a third of all Visa card transactions to be PCI compliant. What is good for large merchants should also be good for smaller merchants, especially because these smaller merchants self-assess (versus needing an outside assessment by a QSA) and they can use a self-assessment questionnaire (SAQ) that can be a short as 11 questions. Smaller merchants have been victimized disproportionately, and the consequences of a major breach and fine may mean bankruptcy.

A year ago, when StorefrontBacktalk PCI Columnist Walt Conway first started tracking these numbers, he figured the brands would turn their attention to small merchants in 2009. And Visa did indeed issue a series of mandates. But these requirements don’t seem to be having much of an impact based on the numbers Visa itself reports.

It will take a concerted effort on the part of the brands to make progress, and their only leverage is interchange. Incentive interchange rates successfully paved the way for broad adoption of electronic terminals at the point of sale back in the 1980s and 1990s. Maybe that approach can be used again to incent merchants to become PCI compliant and stay compliant. We’re not sure how it would work, but clever minds should be able to devise a program with appropriate incentives and penalties, like was done with CAP.

The only alternative is to have more mandates and acquirer reporting. Unfortunately, these requirements have had only “moderate” success so far. And yet it is hard to see widespread compliance coming about any other way.

One answer may be the acquirer-provided secure processing products that are announced weekly. We need to get to “plug-and-play PCI” that will work for the franchisee, college athletic department, golf course, theater and hardware store that is not compliant today and needs to be. Even with this approach, an interchange incentive from the brands sure would help.


advertisement

4 Comments | Read The Latest PCI Compliance Stats Disappointing For Level 3s

  1. cestmoi Says:

    Why would companies be jumping to get PCI compliance if it is not mandated by law? Especially when they can hold off as long as possible and then get compliance without wasting each year’s audit fee since 2007 (per article’s start date)… so companies who got on board back to 2004 got screwed by paying yearly fees since then.

  2. Walt Conway Says:

    @cestmoi, Thanks for your comment, but I have to disagree with such a cynical view of PCI and the benefits of compliance. Companies should want to be compliant to protect their customers and their brand. If you are going to take payment cards then you have an obligation to be secure. Being PCI compliant and – more importantly – being secure is important to your business and your customers. Rather than being a waste, PCI compliance is a smart investment.

    I guess you could avoid compliance and try to fly under your acquirer’s radar, or you could lie on your SAQ. But you do not really benefit by such action. You increase your risk of an expensive data breach which is more expensive than being compliant and, hopefully, secure. In other words, if you think compliance is expensive, noncompliance can cost more.

  3. Cindy Valladares Says:

    PCI can unlock IT budgets, so it’s important to determine the cost of compliance. However, I’m with you, Walt, that the cost of non compliance is way higher than that of compliance. Surveys show the average cost of a data breach being $6.6 million. With this info, it’s very easy to argue that compliance is not expensive.

    One of the reasons why a breach is so expensive is because breaches go undiscovered and uncontained for weeks or months. Imagine leaving the door to your home wide open, and not finding out what robbers stole for months! It could get very expensive. Close that breach to detection gap and you can control the damages to your organization much quicker.

  4. nick Says:

    PCI compliance is a money making thing for scan companies and Visa/MC is in bed with these companies. Getting scanned and submitting a report to the banks will not stop a hacker. If you still get hacked even though you have every safety element possible on your site, the banks will still fine the merchant. Period. Where are the banks saying that if you submit PCI scan and self assessment to then quarterly, then you are off the hook if you get hacked? They will still find a reason to fine the merchant. Why are merchants going to pay for scumbags crimes?

Newsletters

StorefrontBacktalk delivers the latest retail technology news & analysis. Join more than 60,000 retail IT leaders who subscribe to our free weekly email. Sign up today!
advertisement

Most Recent Comments

Why Did Gonzales Hackers Like European Cards So Much Better?

I am still unclear about the core point here-- why higher value of European cards. Supply and demand, yes, makes sense. But the fact that the cards were chip and pin (EMV) should make them less valuable because that demonstrably reduces the ability to use them fraudulently. Did the author mean that the chip and pin cards could be used in a country where EMV is not implemented--the US--and this mis-match make it easier to us them since the issuing banks may not have as robust anti-fraud controls as non-EMV banks because they assumed EMV would do the fraud prevention for them Read more...
Two possible reasons that I can think of and have seen in the past - 1) Cards issued by European banks when used online cross border don't usually support AVS checks. So, when a European card is used with a billing address that's in the US, an ecom merchant wouldn't necessarily know that the shipping zip code doesn't match the billing code. 2) Also, in offline chip countries the card determines whether or not a transaction is approved, not the issuer. In my experience, European issuers haven't developed the same checks on authorization requests as US issuers. So, these cards might be more valuable because they are more likely to get approved. Read more...
A smart card slot in terminals doesn't mean there is a reader or that the reader is activated. Then, activated reader or not, the U.S. processors don't have apps certified or ready to load into those terminals to accept and process smart card transactions just yet. Don't get your card(t) before the terminal (horse). Read more...
The marketplace does speak. More fraud capacity translates to higher value for the stolen data. Because nearly 100% of all US transactions are authorized online in real time, we have less fraud regardless of whether the card is Magstripe only or chip and PIn. Hence, $10 prices for US cards vs $25 for the European counterparts. Read more...
@David True. The European cards have both an EMV chip AND a mag stripe. Europeans may generally use the chip for their transactions, but the insecure stripe remains vulnerable to skimming, whether it be from a false front on an ATM or a dishonest waiter with a handheld skimmer. If their stripe is skimmed, the track data can still be cloned and used fraudulently in the United States. If European banks only detect fraud from 9-5 GMT, that might explain why American criminals prefer them over American bank issued cards, who have fraud detection in place 24x7. Read more...

StorefrontBacktalk
Our apologies. Due to legal and security copyright issues, we can't facilitate the printing of Premium Content. If you absolutely need a hard copy, please contact customer service.