Call Recording - Protecting Payment Card Data
Call Recording - Protecting Payment Card Data
Information Supplement:
Table of Contents
Executive Summary Clarification of the PCI DSS Guidelines for Voice Recordings Recap: The PCI SSC FAQ PCI DSS Requirements for Stored Cardholder Data Decision Process for Voice Recordings Hints and Tips for Call Centers About the PCI Security Standards Council 3 4 4 4 6 8 12
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard.
Executive Summary
The following information and guidance is intended to provide payment security advice for merchants and service providers who accept and/or process payment card data over the telephone. This information highlights the key areas organizations with callcenter operations need to address in order to process payment cards securely, and how best to protect their business and their customers from the risks of data compromise and fraud. The intent of this document is to provide supplemental guidance, and the information provided here does not replace or supersede PCI DSS requirements. The PCI Security Standards Council (PCI SSC) is not responsible for enforcing compliance or determining whether a particular implementation is compliant. Merchants and service providers should work with their acquirers or payment card brands, as applicable, to understand their compliance validation and reporting responsibilities.
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard.
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard.
The following table gives a summary of the PCI DSS guidelines for cardholder data elements:
Data Element Primary Account Number (PAN) Cardholder Data Account Data Cardholder Name Service Code Expiration Date Full Magnetic Stripe Data Sensitive Authentication Data* CAV2/CVC2/CVV2/ CID PIN/PIN Block
Render Stored Account Data Unreadable per Requirement 3.4 Yes No No No Cannot store per Requirement 3.2 Cannot store per Requirement 3.2 Cannot store per Requirement 3.2
What this means: Essentially, sensitive authentication data must not be retained after authorization (Requirement 3.2); and for telephone operations, sensitive authentication data means the CAV2/CVC2/CVV2/CID and/or PIN values that may be taken during a telephone call.
Where to Start
The following page shows the process a merchant should follow when assessing the risk for their call center operations and aims to further clarify the FAQ above.
Sensitive authentication data must not be stored after authorization (even if encrypted). Full track data from the magnetic stripe, equivalent data on the chip, or elsewhere.
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard.
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard.
* Flowchart Notes: Are controls in place to ensure Sensitive Authentication Data cannot be queried?
Sensitive Authentication Data must be secured in a manner consistent with PCI DSS and must not be able to be queried. Data that is queriable may be retrieved through use of a search tool or by issuing a system instruction/task or a set of instructions/tasks. Examples of instructions/tasks that could result in data being retrieved include but are not limited to Defined searches based on character sets or data format Database query functions Decryption mechanisms Sniffer tools Data mining functions Data analysis tools Built-in utilities for sorting, collating or retrieving data
Note: Encrypting sensitive authentication data is not by itself sufficient to render the data non-queriable. For data to be considered non-queriable it must not be feasible for general users of the system or malicious users that gain access to the system to retrieve or access the data. Access to the types of functions listed above must be extremely limited, explicitly authorized, documented, and actively monitored. Additionally, controls must be in place to prevent unauthorized access to these functions. Other methods that may help to render SAD non-queriable include but are not limited to: a. b. c. d. e. Removing call recordings from the call recording solution Taking the call recordings offline Vaulting the call recordings Enforcing dual access controls to the vaulted call recordings Allowing only single call recordings to be retrieved from vaults
Before considering this option, every possible effort must first be made to eliminate sensitive authentication data. There must be a documented, legitimate reason why sensitive authentication data cannot be eliminated (for example, a legislative or regulatory obligation), and a comprehensive risk assessment performed at least annually. The detailed justification and risk assessment results must be made available to the acquiring bank and/or payment card brand as applicable. This option is a last resort only, and the desired outcome is always the elimination of all sensitive authentication data after authorization. If technologies are available to fulfil PCI DSS requirements without contravening government laws and regulations, these technologies should be used.
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard.
Call centers will need to ensure that the PAN is masked when displayed (no more than the first six and last four digits should be displayed). This is part of PCI DSS Requirement 3.3 and includes: Allowing access to the full PAN only on a need-to-know basis. Segmenting call-center operations so that the minimum required number of agents have access to payment card data; for example, payment card information can be entered by a sales agent, but a customer service representative may have access only to the masked PAN. Considering solutions where the agent does not have to enter card information into the system. If the above is not possible, requiring agents to enter payment card information as it is given to them and then mask the information once they verify its accuracy. This may mean sourcing agent desktop applications that can mask card information once it has been entered and verified.
Call centers will need to ensure that PAN data is rendered unreadable (for example, encrypted using strong cryptography) when stored. This is part of PCI DSS Requirement 3.4 and includes ensuring PANs stored within the QA/recording and CRM solutions are encrypted using strong cryptography, or are otherwise rendered unreadable.
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard.
Call centers will need to ensure that transmission of cardholder data across public networks is encrypted. This is part of PCI DSS Requirement 4 and includes: Using strong encryption protocols such as Secure Socket Layer and Transport Layer Security (SSL/TLS), Secure Shell (SSH), or Internet Protocol Security (IPsec) to secure transmission of any cardholder data over public networks, including: - Both wired and wireless networks used by at-home/remote agents and supervisors. For example, via a Virtual Private Network (VPN) with SSL/TLS. Please note that Wired Equivalent Privacy (WEP) protocol is no longer permissible as a security control for wireless networks. - Any public network segments used to carry or send screen or voice recordings. - Voice or data streams over Voice over IP (VoIP) telephone systems, whenever sent over an open or public network. Note that only those consumer or enterprise VoIP systems that provide strong cryptography should be used. Requiring agents to use analog telephone lines when a VoIP telephone system does not provide strong cryptography, Ensuring that payment card information is never sent over an unencrypted, end-user messaging medium such as chat, SMS (Simple Messaging System)/text or e-mail, or other non-encrypted communication channels. As a best practice, ensuring that stored recordings are not played back over a speakerphone if payment card information is included.
Call centers will need to ensure that proper user authentication is implemented for staff, agents, and administrators. This is part of PCI DSS Requirements 7 and 8 and includes: Restricting access to QA/recording and CRM data containing payment card data based on the users log-in account and corporate role; for example, providing screen recording play-back interfaces where the payment card information is displayed only to managers and compliance officers during legal discovery, and having it blacked out (masked) for all other supervisors and QA specialists Segmenting call-center operations so that the minimum required number of agents have access to payment card data; for example, payment card information can be entered by a sales agent, but a customer service representative may have access only to the masked PAN. Ensuring at-home/remote authentication process. agents and supervisors use a two-factor
Ensuring that agents and supervisors do not share user IDs and passwords.
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard.
Call centers will need to ensure that they adhere to an information security policy. This includes: Developing daily operational security procedures that are consistent with all PCI DSS requirements and clearly defining the responsibilities of all personnel. Developing usage policies for critical technologies to define proper use of these technologies for all personnel. Assigning an individual or team specific security responsibilities. Implementing a formal security awareness program so that all personnel are conscious of the importance of payment card security, and to make sure that all personnel are properly trained and knowledgeable about all security policies and procedures. Annually reviewing all security policies and procedures with all in-house and at-home/remote agents. As a best practice, require agents to acknowledge the security requirements as part of their daily sign-in process Screening of potential employees prior to hiring. In addition, as a best practice, monitoring of both at-home/remote agents and in-house agents. These practices help minimize the risk of attacks from internal sources. In any instance, call-center managers should ensure that controls are implemented to monitor policy compliance for on-site, remote and at-home users. Ensuring that at-home/remote agents are prohibited from unauthorized copying, moving, and storing of cardholder data onto local hard drives and removable electronic media when accessing cardholder data via remoteaccess technologies.
Call centers will need to ensure that any media used to record the information must be clearly labeled, inventoried and rendered unreadable following PCI DSS requirements. Pay particular attention to sensitive authentication data: Storage is not permitted. Physical and logical access to the media as well as logical access to the product used to record the calls should be restricted. All interaction with the recordings should be logged. Storage and backup/archiving of the recording solution must not become a backdoor to the solution. A destruction policy should be put in place such that recordings are not kept any longer than necessary. It is advisable to find a call-recording product allowing you to track logical and physical access to media containing data. It should also provide encryption features, strong authentication and detailed reporting and logging.
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard.
10
Finally, call centers will need to ensure that all PCI DSS requirements are implemented. This includes: Strong authentication controls for all personnel with access to call recordings. Ensuring there are no direct connections between systems storing audio recordings and the Internet. Ensuring that systems are maintained to secure configuration standards and are regularly tested for vulnerabilities. Ensuring that at-home/remote agent and supervisor PCs have personal firewalls installed and operational. Ensure that at-home/remote agents and supervisor PCs have the latest version of the corporate virus protection software and definition files Ensure that at-home/remote agent and supervisor PCs have the latest approved security patches installed. Requiring agents and supervisors to use only company-approved systems.
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard.
11
ACKNOWLEDGEMENT
This Information Supplement contains material from a resource developed by PCI SSC Board of Advisor member Barclaycard. The Council thanks Barclaycard for making this content available to share with the wider PCI community.
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard.
12