RSI Security

What Happens if You’re Not PCI Compliant?

If your company processes credit and other card-based financial transactions, you need to abide by the Payment Card Industry (PCI)’s Data Security Standards (DSS), published by the Security Standards Council (SSC). Neglecting these frameworks can result in severe consequences for your business. 

But exactly what happens if you are not PCI compliant, and what can you do to make sure no compliance penalties are enforced on your company? This guide answers these questions and more. 

 

What Happens if You Are Not PCI Compliant?

Before understanding how bad noncompliance can be, it’s essential to grasp just how common it is. According to Verizon’s most recent Payment Security Report, a majority of companies have failed to reach full compliance for the greater part of the past decade. The only two exceptions occurred in 2016 and 2017, in which 55.4 and 52.5 percent of businesses, respectively, fully complied.

What happened to all those companies? 

In this guide, we’ll break down everything you need to know about non-compliance and how to avoid it, including:

But first, let’s take a quick look at exactly who needs to be compliant and why.


Download Our PCI DSS Checklist

 

Who Exactly Needs to Be PCI Compliant?

Compliance with PCI DSS requirements applies more or less unilaterally to all companies that process and store cardholder data. But the exact specifications for validating compliance differ depending on a given company’s average annual volume of payment card transactions.

There are four “levels,” per Visa’s PCI compliance support guide, which break down as follows:

These levels are in reverse order because of their relative thresholds, which are highest at the “lowest” level (level 1). Likewise, the particular requirements for validation of compliance are also at their most stringent at level 1. 

But compliance itself is the same at all levels.

 

Breakdown of Noncompliance Penalties

The specific penalties your company will face for PCI noncompliance depend on several factors. Firstly, your business’s size and nature will determine how big of a fine or penalty you are assed. Secondly, the extent of non-compliance is also an important determinant.

The most common ranges for fines break down across four distinct categories:

And thirdly, the actual payment processor you have a merchant account with will also determine the fine you have to pay. Surprisingly, the PCI SSC itself is not responsible for enforcement.

 

Who Enforces PCI Compliance Penalties?

The PCI SSC was created in 2006 when five of the most prominent stakeholders in the credit and lending industries came together: Visa, MasterCard, American Express, and JCB International.

Governance of the PCI SSC and authorship of the PCI DSS are shared equally across all five members. However, the actual verification of compliance and enforcement of noncompliance penalties is undertaken individually by each institution. In practice, this means companies never come into contact with the SSC itself; instead, they are contacted by JCB, Discover, etc.

Furthermore, the actual body that removes funds from your account in the case of a fine may be another institution altogether. For example, in a 2012 legal battle, two restaurant owners filed suit against US Bank over PCI-related penalties being removed improperly from their accounts.

 

 

The Hidden Costs of PCI Noncompliance

Direct penalties enforced by the payment processors are far from the only consequence of noncompliance. The biggest threats are cybercrime itself — direct theft, fraud, and related reputational damage. 

Not following PCI requirements opens you up to potential long-term costs.

Consider these takeaways from IBM and Ponemon Institute’s study on data breaches:

In addition, noncompliance can lead to your company being placed on the Visa/ MasterCard Terminated Merchant File (TMF). This can have long-lasting reputational impacts on your ability to do business with banks, merchants, and other institutions; it lasts for a minimum of five years.

 

PCI Compliance Requirements

The PCI compliance requirements’ primary set is set out in the Payment Card Industry Data Security Standard (PCI DSS), the PCI SSC’s flagship framework. But many companies also need to implement a set of requirements laid out in the Payment Application Data Security Standard (PA DSS), formerly known as Payment Application Best Practices.

Altogether, both frameworks comprise 26 total requirements (12 PCI DSS, 14 PA DSS), all of which need to be implemented independently of each other regardless of overlapping controls.

However, the PCI DSS requirements are more critical to understand and implement since a workaround for PA DSS compliance exists in the form of pre-approved platforms ready for deployment. The following sections will detail all requirements, beginning with the PCI DSS:

 

Breakdown of PCI DSS Requirements

At the core of the PCI DSS sit six logical groups that house its 12 main security requirements. Its requirements all break down further into sub-requirements, and there are testing procedures and guidance notes provided for each in a matrix in PCI DSS v.3.2.1, pages 19 through 155.

These groups and main requirements breakdown as follows:

While these 12 requirements offer comprehensive security oversight of card-based payments, they fail to address elements of payment application systems. Hence the PA DSS.

 

Breakdown of PA DSS Requirements

Similar to the PCI DSS, the core of PA DSS comprises 14 security requirements. These aren’t distributed in groups, but they break down into sub-requirements, with guidance, like those in PCI DSS. Similarly, they are detailed in a matrix in PA DSS v.3.2, pages 14 through 74.

The 14 requirements of PA DSS, including overlaps with PCI DSS, break down as follows:

Implementation of all 14 requirements is not necessarily required for all companies. PCI SSC publishes a list of verified PA DSS compliant applications, including many ready for immediate deployment. But the list frequently changes, so you need to monitor for continuous compliance.

 

Assessment, Verification, and Compliance

Compliance with PCI DSS and PA DSS, along with other PCI frameworks, takes more than just implementing all requirements and sub-requirements. Your company also needs to document and verify implementation through internal reporting or external audit, depending on your level.

To return to Visa’s PCI guide, compliance verification requirements breakdown as follows:

In addition to these annual reports, certain other PCI compliance elements require more frequent, third-party verification. For example, PCI DSS requirement 11.2.2 calls for regular vulnerability scans by approved scanning vendors (ASV) once per quarter for most companies.

 

The Impact of Professional Advisory Services

The best way to cover all your bases and guarantee none of the consequences detailed above happen to you is by contracting with a services provider for all-in-one PCI DSS services. Here at RSI Security, we offer everything you need for immediate and long-term compliance, including:

See our PCI DSS Data Sheet for more information on how we can help. The talented team at RSI Security has helped companies achieve PCI and broader compliance (HIPAA, etc.) for over a decade. Now that you know what happens if you are not PCI compliant, it should be clear just how important it is to get your defenses in order. Contact RSI Security today to get started!


Speak with a PCI Compliance expert today – Schedule a free consultation

 

Exit mobile version