| 11:32 am on Nov 4, 2004 (gmt 0)|
Storing Card details is a touchy subject with all the Schemes.
Best practice minimums are:
- Store card details (i.e CC number, expiry) in encrypted form that then can only be read intoto by those with a "need to know" - in reality no-one. By intoto I mean any stored data should be masked for display i.e. 4494 ******** 21008. This maintains the integrity of the data but doesn't allow it to be compromised through copying from display screens.
- Store cardholder details (name, address, contact details) in a SEPERATE encrypted database with a unique reference identifyer linking the two.
Needless to say both DBs need to be behind a robust firewall with outbound traffic barred.
Also, and this is critical, NO sensitive data should be stored (ie CVV2, CVV or CID values) - that is an instant "removal of service" compliance issue.
If you need more background drop me a line.
| 1:36 pm on Nov 4, 2004 (gmt 0)|
Also make sure that you do not display the credit card number on the screen once it is entered. In eight states it is against the law & will become standard soon.
You should check out the Visa CISP requirements also
| 2:10 am on Nov 5, 2004 (gmt 0)|
Thanks for the advice guys.
Can either one of you point me to more information regarding storing the CVV or CVV2? I believe the merchant account needs this information to charge the card, is this not true?
| 10:20 am on Nov 5, 2004 (gmt 0)|
You may capture the CVV/CVV2 *solely* for the purposes of forwarding that value to the acquirer as part of the auth request message. At the point the auth request is made the CVV/CVV2 value *must* be completely and irrevocably purged from the merchant system.
If you or the merchant you are working with store the CVV/CVV2 value you risk losing your acceptance facility but more importantly you are directly contributing to a weaknening of the defence these digits offer Merchants and Issuers alike.
CVV/CVV2 is critical in defending against CreditMaster type attacks so please ensure you ensure the continued efficacy of the program.
If in doubt partner with your merchant's acquirer to understand their requirements - alternatively, a Corey has pointed out, use CISP (in the US) find it at: [usa.visa.com...]
or AIS if you are outside the US. Either are useful as a benchmark for best practice - although they can seem quite onerous.
To recap - you don't need to store the CVV or CVV2 value as in most cases the issuer will either straight deny a bad value or feedback via the auth response message that the value was incorrect. You need to ensure that whichever way a bad value is reported to your client they cannot continue with the sale.
Hope this helps.
| 11:46 am on Nov 5, 2004 (gmt 0)|
It really depends on how much of a target you are. The more of a target you are, the more careful you need to be.
Consider Amazon - from what I understand, they have a computer (or computers) they call the cc motel -- the numbers check in, they don't check out :).
It's connected solely via a serial cable to the rest of their system, which makes it extremely feasible to do a careful security audit of the interface.
When they get a number, they send it over to the ccmotel, along with a unique identifier. They then store the unique ID, and send that ID over to the CCmotel whenever the card needs to be authorized/charged.
| 2:05 pm on Nov 5, 2004 (gmt 0)|
Sorry I cannot remember what links can be posted & what links cannot be posted on this board. I would just rather err on the side of caution & not post them
There are also some companies and gateways that will store half the CC number on their server & half on yours
| 3:16 am on Nov 6, 2004 (gmt 0)|
I have custom ecom system.
Once the order has been processed, the cc number is deleted.
Due to liabilites, I would not consider any other option.
I also have my clients sign an agreement that they are responsible for any open cc numbers.
If they are slow to process orders, that is their liablity not mine.
I try to secure all data the best I can, but any data can be compromised.
If they want to store cc number, tell them they should seek a consultant to aquire a proper insurance policy.
| 1:40 am on Nov 7, 2004 (gmt 0)|
This might be a dumb question: why not just use Paypal? Customers don't need an account to make a credit card purchase anymore.
| 8:28 am on Nov 7, 2004 (gmt 0)|
|This might be a dumb question: why not just use Paypal? Customers don't need an account to make a credit card purchase anymore. |
That is only for United States merchants with the proper account.
| 9:30 am on Nov 7, 2004 (gmt 0)|
I'm in the UK and have just started using PP in peference to WorldPay - and it is the case for me. I now only use WP as a kind of back-up. PP has come a long in the last few years.
| 11:52 am on Nov 7, 2004 (gmt 0)|
"I'm in the UK and have just started using PP in peference to WorldPay - and it is the case for me. I now only use WP as a kind of back-up. PP has come a long in the last few years"
Later2, if you get a payment from an unverified PayPal user, how do you go about verifying the payment - with WorldPay you have AVS and CVV, with PayPal you have - nothing?
| 2:07 pm on Nov 7, 2004 (gmt 0)|
Good question. Does anyone else have a view on this?
| 4:50 pm on Nov 7, 2004 (gmt 0)|
Well with Paypal, you are using their merchant account & it should be up to them to do AVS & CCV. Of course a lot of times, this does not happen with Paypal. With your own merchant account, you do have a lot more control over this. I would love to see Paypal implement more fraud measures but so many organizations think that just the archaic AVS procedures are enough.
| 7:13 pm on Nov 9, 2004 (gmt 0)|
we store the card data on a seperate server that is not connected directly to the Internet. This server is accessed using a "tunnel" from the main server. This makes it v. diff for anyone who might gain access to our server to access the card database
| 7:16 pm on Nov 9, 2004 (gmt 0)|
|Also, and this is critical, NO sensitive data should be stored (ie CVV2, CVV or CID values) - that is an instant "removal of service" compliance issue. |
well, amazon should be barred then. They store all values in their "wallet", and when making repeat purchases, you need not enter in any values again.
| 9:14 pm on Nov 9, 2004 (gmt 0)|
They might not store the CVV. These digits do not need to be passed to the gateway to complete a purchase.
| 9:29 pm on Nov 9, 2004 (gmt 0)|
And furthermore, who knows, with their volume, they may well be connecting to visanet directly...
| 12:55 pm on Nov 11, 2004 (gmt 0)|
On our site we delete encrypted cc numbers after 30 days. Now this means registered customers do have to renter this data with return visits/purchases (unlike Amazon), but we think this practice outweighs the convenience for the customer in terms of security. The 30 days is generally a reasonable time in which most order adjustments will need to be made. Of course, we keep the number in a non Web environment for later transactional adjustments such as credits on returns which frequently occur after 30 days, at least in our business.
| 6:57 am on Nov 13, 2004 (gmt 0)|
Can't store them really. You need a Cisp provider U.S. Try Trustcommerce, they have some great products and it's the best I've used so far.