  {"id":197,"date":"2023-07-12T16:06:55","date_gmt":"2023-07-12T20:06:55","guid":{"rendered":"https:\/\/www.yorku.ca\/uit\/infosecdev\/?page_id=197"},"modified":"2023-09-15T01:20:46","modified_gmt":"2023-09-15T05:20:46","slug":"payment-card-industry-pci-dss","status":"publish","type":"page","link":"https:\/\/www.yorku.ca\/uit\/infosec\/payment-card-industry-pci-dss\/","title":{"rendered":"Payment Card Industry (PCI DSS)"},"content":{"rendered":"\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">PAYMENT CARD INDUSTRY DATA SECURITY STANDARD TRAINING &amp; RESOURCES<\/h4>\n\n\n\n<p>All 快播视频 merchants are required to complete the Payment Card Industry Data Security Standard (PCI DSS) training as part of the compliance requirement. Please complete the following tasks to fulfill the training requirement.<\/p>\n\n\n\n<p><strong>All Merchants<\/strong>&nbsp;are to review and understand the&nbsp;<a href=\"https:\/\/www.moneris.com\/en\/Support\/Compliance-and-Security\/PCI-Data-Security\">Payment Card Processing Controls and Compliance Memo<\/a><\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns infographics-block card-deck is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column bg-light p-4 mb-2 is-layout-flow wp-block-column-is-layout-flow\">\n<p><strong>Merchants with Point-of-Sales (POS) System<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.moneris.com\/-\/media\/Files\/Downloadable_Guides\/Moneris-Protecting-POS-bro-05_10_10.ashx\">Protecting the POS<\/a><\/li><li><a href=\"https:\/\/www.moneris.com\/-\/media\/Files\/Legacy_Downloadable_Guides\/PyP_Recommended_Checklist_for_Integrated_POS_Devices.ashx\">Recommended Checklist for Integrated POS Devices<\/a><\/li><li><a href=\"https:\/\/www.moneris.com\/-\/media\/Files\/Legacy_Downloadable_Guides\/PyP_Recommended_Checklist_for_Standalone_POS_Terminals.ashx\">Recommended Checklist for Standalone POS Terminals<\/a><\/li><\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column bg-light p-4 mb-2 is-layout-flow wp-block-column-is-layout-flow\">\n<p><strong>Skimming Prevention<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.pcisecuritystandards.org\/documents\/Skimming%20Prevention%20BP%20for%20Merchants%20Sept2014.pdf\">Information Supplement: Skimming Prevention Best Practices for Merchants<\/a><\/li><li><a href=\"https:\/\/www.pcisecuritystandards.org\/documents\/skimming_prevention_overview_one_sheet.pdf\">Skimming Prevention: Overview of Best Practices for Merchants<\/a><\/li><\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column bg-light p-4 mb-2 is-layout-flow wp-block-column-is-layout-flow\">\n<p><strong>PCI DSS Guidelines<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.yorku.ca\/secretariat\/policies\/policies\/payment-card-data-security-procedures\/\">Payment Card Data Security Procedures<\/a><\/li><li><a href=\"https:\/\/www.yorku.ca\/secretariat\/policies\/policies\/payment-card-data-security-guideline\/\">Payment Card Data Security Guideline<\/a><\/li><li><a href=\"https:\/\/www.moneris.com\/en\/Support\/Compliance-and-Security\/PCI-Data-Security\">Payment Card Processing Controls and Compliance Memo<\/a><\/li><\/ul>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns infographics-block card-deck is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column bg-light p-4 mb-2 is-layout-flow wp-block-column-is-layout-flow\">\n<p><strong>PCI Security Standard Council<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.pcisecuritystandards.org\/documents\/Skimming%20Prevention%20BP%20for%20Merchants%20Sept2014.pdf\">Information Supplement: Skimming Prevention Best Practices for Merchants<\/a><\/li><li><a href=\"https:\/\/www.pcisecuritystandards.org\/documents\/skimming_prevention_overview_one_sheet.pdf\">Skimming Prevention: Overview of Best Practices for Merchants<\/a><\/li><\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column bg-light p-4 mb-2 is-layout-flow wp-block-column-is-layout-flow\">\n<p><strong>Moneris<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.moneris.com\/en\/support\/compliance-and-security\/Protecting-Against-Fraud\">Protecting Against Fraud<\/a><\/li><li><a href=\"https:\/\/www.moneris.com\/-\/media\/Files\/Downloadable_Guides\/Moneris-Protecting-POS-bro-05_10_10.ashx\">Protecting the POS<\/a><\/li><li><a href=\"http:\/\/www.moneris.com\/-\/media\/Files\/Legacy_Downloadable_Guides\/PyP_Merchant_Best_Practices_to_Deter_Skimming.ashx\">Merchant Best Practices to Deter Skimming<\/a><\/li><li><a href=\"https:\/\/www.moneris.com\/-\/media\/Files\/Legacy_Downloadable_Guides\/PyP_Recommended_Checklist_for_Integrated_POS_Devices.ashx\">Recommended Checklist for Integrated POS Devices<\/a><\/li><li><a href=\"https:\/\/www.moneris.com\/-\/media\/Files\/Legacy_Downloadable_Guides\/PyP_Recommended_Checklist_for_Standalone_POS_Terminals.ashx\">Recommended Checklist for Standalone POS Terminals<\/a><\/li><li><a href=\"https:\/\/www.moneris.com\/-\/media\/Files\/Legacy_Downloadable_Guides\/PyP_Point_of_Purchase_Integrity_Checklist.ashx\">Point of Purchase Integrity Checklist<\/a><\/li><\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column bg-light p-4 mb-2 is-layout-flow wp-block-column-is-layout-flow\">\n<p><strong>Other Resources<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"http:\/\/usa.visa.com\/merchants\/protect-your-business\/cisp\/data-security-demo\/m1\/index.htm\">VISA's Business Guide to Data Security Video (Video: 5 minutes long)<\/a><\/li><li><a href=\"https:\/\/youtu.be\/R8dQo-hrlR4\">Interact Fraud Prevention for Merchants (Youtube link)<\/a><\/li><li><a href=\"http:\/\/infosec.yorku.ca\/files\/2014\/12\/Fraud-Alert-Skimming-Attack-with-Shim-EXTERNAL-020217-EN-FINAL.pdf?x12764\">Moneris Fraud Alert for POS Merchants 2017: Skimming Attack Using Shim<\/a><\/li><\/ul>\n<\/div>\n<\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>PAYMENT CARD INDUSTRY DATA SECURITY STANDARD TRAINING &amp; RESOURCES All 快播视频 merchants are required to complete the Payment Card Industry Data Security Standard (PCI DSS) training as part of the compliance requirement. Please complete the following tasks to fulfill the training requirement. All Merchants&nbsp;are to review and understand the&nbsp;Payment Card Processing Controls and Compliance [&hellip;]<\/p>\n","protected":false},"author":1984,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","ngg_post_thumbnail":0,"footnotes":""},"tags":[],"class_list":["post-197","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Payment Card Industry (PCI DSS) - Information Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.yorku.ca\/uit\/infosec\/payment-card-industry-pci-dss\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Payment Card Industry (PCI DSS) - Information Security\" \/>\n<meta property=\"og:description\" content=\"PAYMENT CARD INDUSTRY DATA SECURITY STANDARD TRAINING &amp; RESOURCES All 快播视频 merchants are required to complete the Payment Card Industry Data Security Standard (PCI DSS) training as part of the compliance requirement. Please complete the following tasks to fulfill the training requirement. All Merchants&nbsp;are to review and understand the&nbsp;Payment Card Processing Controls and Compliance [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.yorku.ca\/uit\/infosec\/payment-card-industry-pci-dss\/\" \/>\n<meta property=\"og:site_name\" content=\"Information Security\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-15T05:20:46+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/payment-card-industry-pci-dss\\\/\",\"url\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/payment-card-industry-pci-dss\\\/\",\"name\":\"Payment Card Industry (PCI DSS) - Information Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/#website\"},\"datePublished\":\"2023-07-12T20:06:55+00:00\",\"dateModified\":\"2023-09-15T05:20:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/payment-card-industry-pci-dss\\\/#breadcrumb\"},\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/payment-card-industry-pci-dss\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/payment-card-industry-pci-dss\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Payment Card Industry (PCI DSS)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/#website\",\"url\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/\",\"name\":\"Information Security\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/#organization\",\"name\":\"Information Security\",\"url\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/wp-content\\\/uploads\\\/sites\\\/806\\\/2025\\\/05\\\/Image-4.png\",\"contentUrl\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/wp-content\\\/uploads\\\/sites\\\/806\\\/2025\\\/05\\\/Image-4.png\",\"width\":1024,\"height\":1024,\"caption\":\"Information Security\"},\"image\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Payment Card Industry (PCI DSS) - Information Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.yorku.ca\/uit\/infosec\/payment-card-industry-pci-dss\/","og_locale":"en_US","og_type":"article","og_title":"Payment Card Industry (PCI DSS) - Information Security","og_description":"PAYMENT CARD INDUSTRY DATA SECURITY STANDARD TRAINING &amp; RESOURCES All 快播视频 merchants are required to complete the Payment Card Industry Data Security Standard (PCI DSS) training as part of the compliance requirement. Please complete the following tasks to fulfill the training requirement. All Merchants&nbsp;are to review and understand the&nbsp;Payment Card Processing Controls and Compliance [&hellip;]","og_url":"https:\/\/www.yorku.ca\/uit\/infosec\/payment-card-industry-pci-dss\/","og_site_name":"Information Security","article_modified_time":"2023-09-15T05:20:46+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.yorku.ca\/uit\/infosec\/payment-card-industry-pci-dss\/","url":"https:\/\/www.yorku.ca\/uit\/infosec\/payment-card-industry-pci-dss\/","name":"Payment Card Industry (PCI DSS) - Information Security","isPartOf":{"@id":"https:\/\/www.yorku.ca\/uit\/infosec\/#website"},"datePublished":"2023-07-12T20:06:55+00:00","dateModified":"2023-09-15T05:20:46+00:00","breadcrumb":{"@id":"https:\/\/www.yorku.ca\/uit\/infosec\/payment-card-industry-pci-dss\/#breadcrumb"},"inLanguage":"en-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.yorku.ca\/uit\/infosec\/payment-card-industry-pci-dss\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.yorku.ca\/uit\/infosec\/payment-card-industry-pci-dss\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.yorku.ca\/uit\/infosec\/"},{"@type":"ListItem","position":2,"name":"Payment Card Industry (PCI DSS)"}]},{"@type":"WebSite","@id":"https:\/\/www.yorku.ca\/uit\/infosec\/#website","url":"https:\/\/www.yorku.ca\/uit\/infosec\/","name":"Information Security","description":"","publisher":{"@id":"https:\/\/www.yorku.ca\/uit\/infosec\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.yorku.ca\/uit\/infosec\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-CA"},{"@type":"Organization","@id":"https:\/\/www.yorku.ca\/uit\/infosec\/#organization","name":"Information Security","url":"https:\/\/www.yorku.ca\/uit\/infosec\/","logo":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/www.yorku.ca\/uit\/infosec\/#\/schema\/logo\/image\/","url":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2025\/05\/Image-4.png","contentUrl":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2025\/05\/Image-4.png","width":1024,"height":1024,"caption":"Information Security"},"image":{"@id":"https:\/\/www.yorku.ca\/uit\/infosec\/#\/schema\/logo\/image\/"}}]}},"taxonomy_info":[],"featured_image_src_large":false,"author_info":{"display_name":"clara03","author_link":"https:\/\/www.yorku.ca\/uit\/infosec\/author\/clara03\/"},"comment_info":0,"_links":{"self":[{"href":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-json\/wp\/v2\/pages\/197","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-json\/wp\/v2\/users\/1984"}],"replies":[{"embeddable":true,"href":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-json\/wp\/v2\/comments?post=197"}],"version-history":[{"count":3,"href":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-json\/wp\/v2\/pages\/197\/revisions"}],"predecessor-version":[{"id":897,"href":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-json\/wp\/v2\/pages\/197\/revisions\/897"}],"wp:attachment":[{"href":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-json\/wp\/v2\/media?parent=197"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-json\/wp\/v2\/tags?post=197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}