EMV, PCI, Tokenization, Encryption What You Should Know for Presented by: The Bryan Cave Payments Team

Similar documents
EMV THE DEFINITIVE GUIDE FOR US MERCHANTS AND POS RESELLERS

MAKE WAY FOR THE EMV CREDIT CARD. What You Need to Know for a Smarter POS Strategy.

EMV FAQ S FROM A MERCHANT S PERSPECTIVE

Agenda. What is EMV. Chip vs Mag Stripe. Benefits of EMV. Timeframes & Liability Shift. Costs. Things to consider. Questions

EMV and Educational Institutions:

EMV Implementation Guide

CHIP CARDS. Banks are issuing payment cards embedded with security chips to help protect you against fraud at the register. What is a Chip Card?

The Small Business Guide to Mastering EMV

The Changing Landscape of Card Acceptance

EMV Chip Cards. Table of Contents GENERAL BACKGROUND GENERAL FAQ FREQUENTLY ASKED QUESTIONS GENERAL BACKGROUND...1 GENERAL FAQ MERCHANT FAQ...

EMV Adoption in the U.S.

EMV is coming. Here s how to stay ahead of the trend. Presented by CO-OP Financial Services

Ignite Payment s Program on EMV

EMV is coming. But it s ever changing.

Getting Out of PA-DSS Scope and Eliminating the High Cost of EMV: What you need to know

Merchant Considerations for U.S. Chip Migration. EMV Migration Forum/National Retail Federation September 2014

EMV and Apple Pay. The world of credit cards is on the move.

EMV Terminology Guide

Merchant Considerations for U.S. Chip Migration. EMV Migration Forum/National Retail Federation September 2014

ATM Webinar Questions and Answers May, 2014

EMV Migration. What You Need to Know about the Technology, the Security Protection it Provides, and When to Implement

EMV in the U.S. Liability shift; what does this mean for the U.S.?

October is Here: Are Issuers, Merchants & Consumers Ready for EMV?

EMV Cards - Chipping Away at Fraud

EMV Beyond October 1, Kristi Kuehn VP, Compliance Heartland

EMV: GET READY. Michelle Thornton, CO-OP Financial Services

PCI Data Breach Preparedness How To Prevent Your Organization From Becoming the Next Data Breach Headline

It s Not Too Late for EMV What You Need To Do Now!

Top 5 Facts Merchants Need To Know About EMV

Introduction to EMV BEYOND PAYMENT

GoiNG SMARt U.S. implementation of SMARt PAyMENt cards on the horizon 10 SUMMER 2013 TEN

EMV: The Race Is On! September 24, 2013

Crash Course: What are EMV and the EMV Liability Shift?

EMV & Fraud POS Fraud Mitigation Tips for Merchants First Data Corporation. All Rights Reserved.

EMV A Chip Off the New Block

A Merchant s Path to EMV Understanding Impacts To Your Business

Credit and Debit Card Fraud

EMV Adoption. What does this mean to your ATMs?

Heartland Payment Systems

Semi-Integrated EMV Payment Solution

Understanding the 2015 U.S. Fraud Liability Shifts

PAYMENT CARD INDUSTRY DATA SECURITY STANDARD SELF-ASSESSMENT QUESTIONNAIRE (SAQ) A GUIDE

International Operators Seminar. Bem-vindo! Bienvenidos! Bonjour! Croeso! Foon ying! Hujambo! Velkomen! Welkom! Welcome!

Card Payment acceptance at Common Use positions at airports

Is Your Organization Ready for the EMV Challenge?

Effective Communication Practices for U.S. Chip Migration. Communication & Education Working Committee June 2014

Risk-based Approach to PCI DSS Validation

MITIGATE THE RISK OF FRAUD AND COMPLIANCE COSTS with EMV mandates. An NCR white paper

EMV Basics and the market

Let s Talk about EMV. getnationwide.com

Secure Remote Payment Council (SRPc) White Paper Discussion: EMV Enhancements Post Implementation September 13, 2016

EMV: Frequently Asked Questions for Merchants

EMV: Facts at a Glance

Datacap s Guide to EMV in the US

Why chip cards? HELP PREVENT FRAUD: HELP AVOID LIABILITY: ACCEPT MOBILE TAP & PAY TOO: DYNAMIC AUTHENTICATION: Contact us

EMV FREQUENTLY ASKED QUESTIONS (FAQs)

EMV for Merchants and Merchant Acquirers: U.S. Migration Considerations. Smart Card Alliance Webinar October 6, 2011

jhapassport EMV Update:

VARTECH NATION. EMV Certification for IT Professionals

Merchant Services What You Need to Know. Agenda 6/5/2017. Overview of Merchant Services. EMV, Tokenization/Encryption, and PCI (Oh My!

EMV chip technology ARE COMPANIES AND CONSUMERS REALLY READY?

Covering Your Assets: Payment Landscape and Technology

Visa and MasterCard Drive Adoption of EMV Payment Technologies in the United States

Tokenization April Tokenization. Gregory H. Soule, CPA, CISA, CISSP, CFE Senior Manager. Andrews Hooper Pavlik PLC

Chip and PIN Programme. Using chip and PIN

EMV Just the Facts. Ozarks Association of Government Accountants

Payment Card Industry Compliance. May 12, 2011

PCI BLOG. P2PE, EMV, Tokenization, Oh My!

EMV WHAT DOES IT MEAN? HOW WILL IT AFFECT US? HOW DO WE SWITCH TO EMV?

Dates Visa MasterCard Discover American Express. Acquirers, subprocessors. support EMV. International ATM liability shift 2

EMV Frequently Asked Questions for Merchants May, 2015

U.S. Bank. U.S. Bank Chip Card FAQs for Program Administrators. In this guide you will fnd: Explaining Chip Card Technology (EMV)

Why contactless pickpocketing is impossible

Version 7.4 & higher is Critical for all Customers Processing Credit Cards!

Dear Valued Member, Sincerely, Jerry Jordan President & CEO CGR Credit Union

KNOW YOUR RUPAY DEBIT CARD

EMV IN THE U.S. HOW FAR HAVE WE COME AND WHERE ARE WE GOING? Andy Brown

The State of EMV Harland Clarke Card Services

EMV: Coming Soon to a Card Near You

Chargeback Best Practices. September 7, 2016

Frequently Asked Questions for Merchants May, 2015

EMV: The Next Generation of Payments

Changing Consumer Purchasing Patterns

PCI COMPLIANCE PCI COMPLIANCE RESPONSE BREACH VULNERABLE SECURITY TECHNOLOGY INTERNET ISSUES STRATEGY APPS INFRASTRUCTURE LOGS

Are You Ready for EMV?

WHAT IS EMV IN THE U.S., AND HOW DOES IT AFFECT MY BANK? APRIL 28, 2015

Payment Processor Buying Guide. How to prepare for sending out an RFP

Hot Topics in Payments Cornerstone CU League Small CU Committee July 9, 2014

Payment Card Industry Data Security Standard Self-Assessment Questionnaire B Guide

EMV Migration Updates and Next Steps

THE ADOPTION OF EMV TECHNOLOGY IN THE U.S. By Guy Berg Global Industry Sales Consultant Datacard Group

Policies and Procedures

EMV: Strengthen Your Business Through Secure Payments

Technology Developments in Card-Based Payments WACHA Payments 2013

Target, the third largest retailer in the U.S., suffered a

What Do Merchants Need to Be Successful Online?

Payment Gateway Overview. Get familiar with credit card processing & our platform

PIN & PAY CARD FREQUENTLY ASKED QUESTIONS (FAQS) (Revised 17 August 2017)

Security enhancement on HSBC India Debit Card

E M V O V E R V I E W. July 2014

Transcription:

EMV, PCI, Tokenization, Encryption What You Should Know for 2015 Presented by: The Bryan Cave Payments Team

Agenda Overview of Secured Payments Judie Rinearson (NY) EMV Courtney Stout (DC) End to End Encryption Jennifer Crowder (KC) Tokenization Jennifer Crowder (KC) Implementation Courtney Stout (DC) Third Party Contract John ReVeal (DC) Conclusion John ReVeal (DC) 2

Judith Rinearson, New York SECURED PAYMENTS OVERVIEW 3

Securing Merchant Payments Benefits and Challenges Substantial emphasis in payments industry on securing payments. Two goals preventing fraud and data breaches. Will address benefits and challenges of each, issues for merchants upgrading their systems, and the legal and contractual issues that must be addressed along the way. 4

Fraud Prevention Fraud prevention involves implementing efforts to authenticate to validity of the payment card and the customer s right to use the card. Current focus EMV. EMV validates a card (through the check of the chip data) that a card is not invalid or stolen, and validates the user through the PIN. In Europe, once EMV implemented, fraudsters turned their focus to online fraud prevention. 5

Several focuses: Data Breach Prevention End-to-End (or point to point) Encryption Tokenization Not receiving or storing sensitive data at all 6

Outline Today s Presentation will cover: What is EMV? What are the benefits of EMV? What is End-to-End (E2E) Encryption? What are the benefits and challenges of E2E Encryption? What is tokenization? How does it fit in? How does a merchant bring it all together? What do you need to consider if you re contracting with a third party? 7

Courtney Stout, Washington, DC WHAT IS EMV? 8

What is EMV? EMV is a chip technology that is becoming the global standard for credit and debit card payments. The payment instruments contain embedded microprocessor chips. - Chips store cardholder data. - Chips provide dynamic (e.g., changing) authentication. Benefits include increased security, reduced fraud and new payment methods. The U.S. is late to the game in adopting EMV. EMV is named after the original developers of the smart chip technology - Europay, MasterCard and Visa. EMV is also referred to as: smart card, smart-chip card, EMV smart card, EMV card, chip and PIN, chip and signature, or chip enabled card. 9

How are EMV Cards Different? Why are EMV cards more secure than traditional cards? Traditional cards contain unchanging payment card data on a magnetic stripe. Anyone accessing the magnetic stripe data gains the card data necessary to make purchases. Every time an EMV card is used for payment, the chip creates a unique transaction code that cannot be used again. How do EMV transactions work? Both the EMV card transaction and the magnetic stripe transaction have two basic steps: the card is read and then the transaction verification is completed. Consumers will no longer swipe their payment card. Data is transmitted between the card and the issuing bank (or other database) to verify the card and to create the unique transaction data for the purchase. 10

Why Move to EMV? Driven by Payment Card Network Milestones Liability shift occurs effective October 2015: The payment card network rules contain provisions that shift liability for fraudulent card transactions. Under current rules, consumer losses from counterfeit fraud fall back on the issuing bank or the processor. U.S. deadline of October 1, 2015, for a fraud liability shift. Liability for card present transactions (e.g., in store POS) will shift to whoever is the least EMV-compliant in the payment chain. So, if a merchant has not implemented EMV card readers, the liability for the card fraud will shift to the merchant after October 1, 2015. 11

Card Network Rules EMV Liability Shift Visa: The party at fault for a chip-on-chip transaction not occurring will be liable. MasterCard: The party who does not support EMV assumes liability for counterfeit card transactions. MasterCard supports a liability shift for lost, stolen, and never received or issued (NRI) cards to the party that does not support PIN as a cardholder verification method. MasterCard offers additional incentives to merchants to encourage rapid EMV adoption. American Express: The party that has the most secure form of EMV technology will have the least responsibility for certain types of fraudulent transactions. Discover: The party with the highest level of available payments security benefits from the fraud liability shift. 12

President Obama s Executive Order October 17, 2014 Intended to improve the security of consumer financial transactions. Requires all federal agencies to begin, as soon as possible, a transition to chip-and-pin technology. Effective immediately, new Direct Express prepaid cards must have enhanced Chip & Pin security features. By 1/1/2015 must have a plan to replace all existing non-chip and PIN Direct Express Cards. Increased efforts to assist victims of identity theft. Also, plans to ensure that federal agencies with access to personal data require the use of multiple factors of authentication and an effective identity proofing process. http://www.whitehouse.gov/the-press-office/2014/10/17/fact-sheetsafeguarding-consumers-financial-security 13

Jennifer Crowder, Kansas City ENCRYPTION AND TOKENIZATION 14

What is End-to-End Encryption? End-to-End (E2E) or Point-to-Point (P2P) encryption means all data in a particular data flow is encrypted. For example, payment card data either arrives at a merchant encrypted or is immediately encrypted by a merchant upon receipt; then this encryption is maintained until the merchant transmits the data to the processor. It essentially provides a secure digital tunnel through which data can flow securely. 15

Goals and Benefits of E2E Encryption Data that is accessed by unauthorized third parties cannot be read or used. Many of the data breaches of the past few years would have been non-incidents if the data had been encrypted. Considered very high security for sensitive data. 16

What do PCI standards say about E2E Encryption? PCI Standards recognize that End-to-End Encryption (or Point-to-Point Encryption), is a safer solution. Merchants who implement validated encryption programs benefit by receiving a reduced scope for their PCI-DSS assessment. For a reduced scope, requirements include: Merchant must use a validated encryption solution. Merchant must never store, process, or transmit clear-text account data within their encryption environment (unless PCI approved). PCI DSS compliance of the decryption environment must be confirmed on an annual basis. Source: https://www.pcisecuritystandards.org/documents/p2pe_v1-1.pdf 17

What is required to achieve E2E Encryption goal? In the retail environment, entire data flow must be encrypted. Card readers must support E2E Encryption technology. Readers must be integrated with the host computer and data must move under a bank-approved communications protocol to send and receive authorization requests via a secure global payment gateway. While more expensive and time consuming than tokenization, E2E Encryption protects a greater range of data. 18

From PCI Security Standards Council: Illustration of a Typical Implementation 19

Tokenization What is tokenization? PCI Standards Council s view. Payment Card Networks view. 20

Tokenization vs E2E Encryption Tokenization Tokenization Pros: Account data is not stored or sent in its "real" form at all (possibly on the first initial transaction but not afterward). Easier to establish and maintain than encryption. Tokenization Cons: Typically only account data is tokenized. Does not address all data in use by organizations. May not work with applications and processing technologies. E2E Encryption End to end encryption Pros: Data is secured all the way from each endpoint to the processing destination. May integrate better with existing technology. End to end encryption Cons: May introduce more overhead in processing. Key management and other encryption processes may be hard to manage. Source: http://www.bankinfosecurity.com/tokenization-vs-end-to-end-encryption-experts-weigh-in-a-1869/op-1 21

Courtney Stout, Washington, DC IMPLEMENTATION 22

Implementation With liability shift, many merchants have sufficient financial incentive to move to EMV. Most experts agree that tokenization will be a key part of merchants security measures in the next 3-5 years. With increased data breach risks, and since their collected data goes beyond payment card data, merchants have incentive to go further and try for E2E encryption. 23

Challenges Existing infrastructure. Existing payments equipment and services contracts. Uncertainty of which providers will provide long term solution. Need to keep up with changing payment card network requirements and benefits eligibility. To some extent payment card networks may pick winners. Hard to conduct cost benefit analysis since rules are still developing. 24

John ReVeal, Washington, DC THIRD PARTY CONTRACTS 25

Selecting Providers Perform appropriate due diligence in selecting third parties. Evaluate the third party s legal and regulatory compliance program and expertise. Evaluate the third party s depth of resources and previous experience in the specific area, obtain reference checks, review regulatory filings when available. Assess their financial condition, including through reviews of audited financial statements. 26

Selecting Providers Perform appropriate due diligence in selecting third parties (continued). Ensure the third party periodically conducts thorough background checks on its senior management and employees, as well as subcontractors. Assess the provider s information security systems. 27

Selecting Providers Perform appropriate due diligence in selecting third parties (continued). Evaluate the provider s business resumption and contingency planning policies, procedures and systems. Verify that the provider has appropriate fidelity bond coverage to insure against losses attributable to dishonest acts, liability coverage for losses attributable to negligence, and hazard insurance covering fire, loss of data, and protection of documents. 28

Provider Contracts Clearly address the nature and scope of the arrangement. Identify the specific services. Be clear on who provides what facilities and equipment. Address compliance with laws. Address the ability to subcontract services. 29

Provider Contracts Include performance measures or benchmarks. Ensure that the contract requires the provider to create and maintain appropriate records. Include the right to audit and to require remediation. If third party audits will be relied on, ensure that they appropriately address technology and security standards. Address responsibilities and cost allocations for changes required due to new or amended regulations. 30

Provider Contracts Include business resumption and contingency plan requirements. Require the provider to maintain adequate insurance and to provide evidence of coverage where appropriate. Consider whether to provide for arbitration. Be clear on events of default and the standards for termination of the contract. 31

Moving Forward The RFI, RFP processes. Contracting with providers. Challenge of legacy systems and providers Requirement to maintain compliance with PCI and payment card network rules The gamble of upgrading systems in ever-changing environment What can you expect from providers to address these issues? 32

Increasing Security Preventing Fraud Conclusion Complying with network rules Save the Date for Future Webinars: How to be Ready for Legal Issues that Arise in a Data Incident Tuesday, January 27 th Key Issues in Money Transmitter Licensing Thursday, February 19 th 33