Forum Moderators: buckworks

Message Too Old, No Replies

How to collect credit card numbers securely online?

         

wildpanda

6:27 am on Dec 7, 2007 (gmt 0)

10+ Year Member



I now accept customers' credit card details by fax. I am wondering how to receive credit card info online and process them offline? How to store customers' card info securely online? I do not use payment gateway, just collect and store creidt card details in a secure way online.
Can anybody give any suggestion.

rocknbil

6:59 am on Dec 7, 2007 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



Welcome aboard wildpanda, read up on PCI compliance:

PCI Compliance Guide [pcicomplianceguide.org]

In a nutshell, this is a data security standard considered acceptable by credit card companies. It involves a rigorous auditing process that reviews your network security systems and methods of collection and storage of credit card information. This means your servers must be under your control, not on a shared or leased hosting, which is out of the reach for most merchants.

The second consideration is that you you review your offline merchant account, you will likely be in violation of your contract if you use it for this purpose. This is why an online merchant account is structured differently and generally more expensive than an offline account.

The best option, really, is to relinquish yourself of this responsibility and set up an online merchant account, which places the responsibility of PCI compliance on them or the gateway that interfaces with the merchant account. You then only need to install an SSL cert on your web site and securely pass the info to them, without actually storing this data on your server.

ytswy

10:00 am on Dec 7, 2007 (gmt 0)

10+ Year Member



What rocknbil said.

ambellina

3:10 pm on Dec 7, 2007 (gmt 0)

10+ Year Member



I third the motion.

ByronM

3:12 pm on Dec 7, 2007 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



Please note that SELF COMPLIANCE even if you use a 3rd party payment gateway is HIGHLY RECOMMENDED and will only HELP you in the event of any issues.

In fact many 3rd party gateways REQUIRE compliance and will provide you with a PCI monitoring service free of charge to self-audit that compliance.

(Such as PayPal Payments Pro)

jsinger

6:16 pm on Dec 7, 2007 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



I now accept customers' credit card details by fax.

What happens when customer dials the wrong number and gets a fax machine elsewhere. We get wrong number faxes occasionally.

incrediBILL

9:11 pm on Dec 9, 2007 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



I do online processing and store ZERO credit card details, just the authorization information.

What it sounds like you want to do since you post the sale later is to use AUTHONLY as a sales type online. With AUTHONLY it pre-authorizes the credit card which will “reserve" the amount specified, it will not actually bill the consumer’s credit card. This process is used for Book and Ship sales transactions, where a merchant gets an order and at a later date, completes the transfer of funds.

Basically you go into the remote control panel for the credit card processor and complete and book the transaction later.

100% secure, NO sensitive credit card, NO details stored on your server or premises, nothing an employee or hacker can steal.

Do anything less and you're at risk and you don't want to be at risk because fines from Visa can be nasty, like $50K or some other ugly amount to cover their costs of damage control, and you can lose your merchant account.

[edited by: incrediBILL at 9:24 pm (utc) on Dec. 9, 2007]

grobe

5:41 am on Dec 10, 2007 (gmt 0)

10+ Year Member



You can use a free shopping cart like Mal's E-commerce (for higher volume users they also have a premium service). Do a Google search for it.

wildpanda

7:05 am on Dec 14, 2007 (gmt 0)

10+ Year Member



I am also using Payment Gateway, but the gateway only accept creidt card has 3D secure service. (Verified by VISA and MasterCard SecureCode). For non-3D credit cards, We accept by telephone and fax.

a8news

1:02 pm on May 18, 2008 (gmt 0)

10+ Year Member



Hello everyone! I too am new to the issue of pci compliance and am trying to get my head around the vagaries of conforming to the standard,s and what the specific requirements are. I am looking to transfer a website from a shared hosting account to a virtual dedicated server with godaddy, and use website payments pro (direct payment) to conduct transactions through paypal. No card data will be stored on the server, and transmitted only to paypal via their own APIs.

My first question is, is this a lost cause to begin with - i.e. is it even possible to achieve compliance on a virtual dedicated account (specifically with godaddy)? I ask because I have received mixed information on this (from godaddy reps themselves as well as gleaned from chatter around the intertubese). If it's not possible, is the only option to pay hefty prices for enterprise level hosting and merchant accounts - effectively cutting out very small businesses of ecommerce? Otherwise, if it is possible, how does one determine specific requirements?

I have read comments from people in numerous places (including on this website) indicating they have achieved compliance on godaddy servers using paypal pro, which is what I am hoping to do. However, godaddy's legal agreement specifically states: "The Services are not intended to provide a PCI (Payment Card Industry) compliant environment and therefore should not be considered as one." Well, if the fundamental infrastructure of the hosting environment is "not to be considered" compliant, then certainly the buck simply stops there - i.e. nothing you do to secure your VPS, including software firewalls, antivirus, ssl, bulletproof code, etc. can change the fact that the system on which these measures rest is non-compliant to begin with, right? But if this is true, why has godaddy told me essentially, (after much prodding and with very indirect language) "it's possible, wink, wink, nudge, nudge, know what I mean -- but you are responsible for all the security of your own server, wink, wink, nudge, nudge." Really? How can I be responsible for the server's security, if I have no access to or control over the hardware or network - items which fall explicitly under the scope of PCI requirements? I don't know how godaddy manages their data centers, and clearly they are not in a position to describe it to me since that in itself would be a security breach...sigh...so how do I find out where I stand?

If I have ultimate control over the ability to achieve compliance, GREAT, but again, how does that reconcile with policies such as those quoted from godaddy above? Furthermore, if I do in fact have the power to achieve compliance, what are the specific responsibilities I will have and how do I uphold them?

For example, if i were to go with godaddy VPS and website payments pro (assuming compliance is possible with this setup), is there an issue with choosing redhat vs centos? should I pay extra for plesk to manage firewall and/or AV or should I stick to ipfw etc. and the additional complexity of manual configuration? Recommendations for working with the paypal API vis a vis PCI?

Bottom line, i represent a small business with a very low volume of transactions looking to offer online purchasing to customers as a convenience, and have a very small budget for hosting and merchant services. At the same time, I want to protect customer data and comply with required standards to avoid debilitating fines. To do this, I need straight answers and practical guidance that doesn't always end with "pay them, they're experts and they'll just do it for you."

Thanks for any help anyone out there can provide...and sorry for rambling!

piatkow

1:07 pm on May 18, 2008 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



PCI is a major issue which causes headaches for major players with big IT departments. For SMEs the best adviced is probably to outsource the problems to a specialist card processing service and get on with running the business.

a8news

1:42 pm on May 18, 2008 (gmt 0)

10+ Year Member



Thanks so much for your reply. Its simewhat comforting to know that this issue doesn't revolve around my individual ignorance or incompetence. Your suggestion sounds like the best approach, but does it mean that I have to rule out a $30 vps account, and $30 paypal account in favor of services that will cost potentially thousands more? It just seems to me like this is just (at least in part) another cottage industry designed to obfuscate the system and drive small players either out, or into paying for protection (why do Sopranos come to mind?). At the end of the day I am still left wondering if it is even possible to meet the requirements with the kind of setup I described, notwithstanding the elaborate hoop jumping that may be required to actually follow through successfully.

Thanks!

pageoneresults

2:06 pm on May 18, 2008 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



This means your servers must be under your control, not on a shared or leased hosting, which is out of the reach for most merchants.

I'm glad I read that closely. We're in the process of preparing to store encrypted CC information. As soon as I read this topic I IM'd my lead programmer to get his input...

Assuming someone ever got hold of our database, without the encryption key(s) they can't do anything about it. They can run a server farm for years to try and decrypt our key(s).

Also, the key(s) are on a separate server from the database. They would need to hack into multiple servers first.

Phishing is much faster than hacking and a lot easier.

Unless the hacked server is so lax in security.

Those were just a few of the comments that "immediately" flew in when I questioned our methods in regards to this. We store CC information due to subscription based charges.

Yes, I realize that security is only as good as your systems and those who manage them. I'm giving more thought to this now that this topic has surfaced.

rocknbil

2:31 am on May 19, 2008 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



We store CC information due to subscription based charges.

Just FYI, this is NOT necessary for subscriptions if you are using a processor that supports recurring billing. Authorize.net, Netbilling, payPal, to name three. When you cross this line is when PCI compliance becomes an issue.

To a8news, welcome aboard! I think you may be misunderstanding what goDaddy is saying (big surprise there lol . . . )

PCI compliance is an issue if you are storing credit card information. While that's not the "whole story," it's the most important one. PCI compliance involves, MOSTLY, the security of the hardware and network on which the data is stored. This is what G.D. is saying, "our servers cannot be made PCI compliant."

This shouldn't be a problem for you if you use a reputable payment processor. If you use Website Payment's Pro, PCI compliance is payPal's job, not yours.

If you wish to accept credit card information on the form to be directly posted to payPal - not stored - all you need is a good SSL cert. When you make your "post" (to the gateway/payPal) the processor will only accept connections from a secure server anyway.

I hope that points you in the right direction.

a8news

8:19 pm on May 19, 2008 (gmt 0)

10+ Year Member



rocknbil:

I hope that points you in the right direction.

That's exactly what it does, and it's exactly the kind of answer I was looking for and hoping for. Thank you [and everyone else]!