PCI Data Security Standards Compliance
REMITOS cares for the protection of payments and wants to introduce you to the most important security standards.
Every merchant, payment processor, and any organization that stores and processes sensitive card data online must comply with Payment Card Industry Data Security Standards (PCI DSS). REMITOS is certified as a PCI DSS Level 1 (the highest level) service provider that maintains a protected environment for its merchants and their customers.
What is PCI DSS?
Data Security Standards were set by Security Standards Council cooperatively established by Visa, MasterCard, American Express, Discover and JCB to reduce the risk of data breaches, identity thefts and other fraudulent as well as criminal activities. These standards are obligatory to businesses of any size. PCI standards protect not only you as a merchant but also cardholders.
Levels of compliance
There are 4 levels of PCI compliance determined by your annual transaction volume. Note that every level has different requirements. Don’t be afraid of the requirements; we will always be there for you if you need any advice.
What are the general PCI DSS requirements?
There are 12 requirements grouped into 6 categories:
- Build and maintain a secure network.
- Install and maintain a firewall configuration to protect cardholder data.
- Do not use vendor-supplied defaults for system passwords and other security parameters.
- Protect cardholder data.
- Protect stored cardholder data.
- Encrypt transmission of cardholder data across open, public networks.
- Maintain a vulnerability management program.
- Use and regularly update anti-virus software or programs.
- Develop and maintain secure systems and applications.
- Implement strong access control measures.
- Restrict access to cardholder data by business need-to-know.
- Assign a unique ID to each person with computer access.
- Restrict physical access to cardholder data.
- Regularly monitor and test networks.
- Track and monitor all access to network resources and cardholder data.
- Regularly test security systems and processes.
- Maintain an information security policy.
- Maintain a policy that addresses information security for employees and contractors.