Who has to comply with the PCI standardsEach of PCI SSC’s founding payment brand members (American Express, Discover, JCB International, MasterCard and Visa) currently have their own PCI compliance programs for the protection of their affiliated payment card account data. Entities should contact the payment brands directly for information about their compliance programs. Contact details for the payment brands can be found in How do I contact the payment card brands? Is VoIP in scope for PCI DSS?PCI DSS requirements apply wherever account data is stored, processed, or transmitted. While PCI DSS does not explicitly reference the use of VoIP, VoIP traffic that contains cardholder data is in scope for applicable PCI DSS controls, in the same way that other IP network traffic containing cardholder data would be. For vulnerability scans, what is meant by quarterly?The intent of “quarterly” vulnerability scans, as defined in PCI DSS Requirement 11.2, is to have them conducted as close to three months apart as possible, to ensure vulnerabilities are identified and addressed in a timely manner. In order to meet this requirement, an entity is required to complete their internal and external scans, and perform any required remediation, every three months. | Are compliance certificates recognized for PCI DSS validation?No. The only documentation recognized for PCI DSS validation are the official documents from the PCI SSC website. Any other form of certificate or documentation issued for the purposes of illustrating compliance to PCI DSS or any other PCI standard are not authorized or validated, and their use is not acceptable for evidencing compliance. The use of certificates or other non-authorized documentation to validate PCI DSS Requirement 12.8 and/or Requirement 12.9 is also not acceptable. Can I fax payment card numbers and still be PCI DSS Compliant?Any cardholder data that is stored, processed, or transmitted must be protected in accordance with PCI DSS. If faxes are sent or received via modem over a traditional PSTN phone line, these are not considered to be traversing a public network. On the other hand, if a fax is sent or received via the Internet, it is traversing a public network and must be encrypted per PCI DSS Requirement 4.1. Any systems – such as fax servers or workstations – that the cardholder data passes through must be secured according to PCI DSS. Also, any cardholder data on the fax that is electronically stored must comply with PCI DSS Requirement 3.4 to render the cardholder data unreadable. If the fax system is combined with an email system (for example, via a fax-to-email gateway), the emails would also be subject to Requirement 4.2. (Refer to FAQ #1085 Can unencrypted PANs be sent over e-mail, instant messaging, SMS, or chat?) Does PCI DSS apply to “hot cards,” expired, cancelled or invalid card account numbers?PCI DSS applies to any primary account number (PAN), including active, expired, or cancelled PAN, except where the organization can provide documentation which confirms that the PAN is inactive or otherwise disabled and no longer poses a fraud risk to the payment system. If, however, the PAN is later reactivated, PCI DSS will again apply. |
What does DCAT actually do?DCAT is a cloud based platform that manages and records the process and actions you have taken to comply with whatever regulation you have to comply with. How do you know what assets are in the network ?We carry out an automated asset discovery exercise creating an asset register from which you select the assets that represent a risk and input the asset register into DCAT Do you touch any of our data?No we do not touch or copy any data, we report on the risk associated with compromising that data or asset. | How is DCAT priced?DCAT is priced on the number of employees in your company, enabling us/you to scale from single employer to enterprise size accounts. How is DCAT deployed?DCAT is a cloud based platform, once signed up we send you a link to register and we set you up the same day. |