What You Need to KNOW About PCI Compliance

large yellow lock with PCI logo

As a merchant who stores payment information, you need to comply with the Payment Card Industry Data Security Standard (PCI DSS) or Payment Application Data Security Standard (PA DSS). PCI stands for the Payment Card Industry and was established on September 7th, 2006 by five of the leading credit card associations. Their goal was to protect sensitive cardholder information from being compromised which can cause credit card fraud. These standards were created to ensure merchants are keeping their customers' sensitive payment information safe and secure.

At Constellation Payments, we can help you reduce or even eliminate your PCI compliance needs. Instead of storing sensitive customer payment data, let us hold your information in our secure, Level One PCI compliant infrastructure. We can securely save your customers' credit card numbers and offer hosted pages from our environment to avoid your need to capture payment information. Do you wish to retain this information about your customers' payment data so you can use to process future payments? Read up on our tokenization technology that will allow you to store a non-sensitive token value that represents your customers' payment data.

Requirements to meet PCI compliance …

  • 1

    Build and Maintain a Secure Network

    Requirement 1: Install and maintain a firewall configuration to protect cardholder data.

    Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters.

  • 2

    Protect Cardholder Data

    Requirement 3: Protect stored cardholder data.

    Requirement 4: Encrypt transmission of cardholder data across open, public networks.

  • 3

    Maintain a Vulnerability Management Program

    Requirement 5: Use and regularly update anti-virus software.

    Requirement 6: Develop and maintain secure systems and applications.

  • 4

    Implement Strong Access Control Measures

    Requirement 7: Restrict access to cardholder data by business need-to-know.

    Requirement 8: Assign a unique ID to each person with computer access.

    Requirement 9: Restrict physical access to cardholder data.

  • 5

    Regularly Monitor and Test Networks

    Requirement 10: Track and monitor all access to network resources and cardholder data.

    Requirement 11: Regularly test security systems and processes.

  • 6

    Maintain an Information Security Policy

    Requirement 12: Maintain a policy that addresses information security.