Who Must Comply with PCI DSS in the Payment Industry

Author

Reads 1.2K

A Merchant Walking On The Street
Credit: pexels.com, A Merchant Walking On The Street

If you're a merchant or service provider that stores, processes, or transmits sensitive payment information, you must comply with PCI DSS. This includes any business that accepts, processes, or stores cardholder data.

Any business that accepts card payments, including online and offline transactions, must comply with PCI DSS. This includes e-commerce sites, brick-and-mortar stores, and service providers like banks and payment processors.

Merchants and service providers of all sizes, from small businesses to large corporations, must comply with PCI DSS. This includes any business that handles cardholder data, including payment card numbers, expiration dates, and security codes.

Payment processors, banks, and other financial institutions that handle sensitive payment information must also comply with PCI DSS.

Who Must Comply

Any organization, regardless of size or number of transactions, that accepts, transmits or stores any cardholder data must comply with the PCI DSS.

Merchants who accept payment cards bearing the logos of any of the five members of PCI SSC (American Express, Discover, JCB, MasterCard or Visa) as payment for goods and/or services must comply with the PCI DSS.

A vibrant street market scene with local merchants selling fresh seafood in basins.
Credit: pexels.com, A vibrant street market scene with local merchants selling fresh seafood in basins.

This includes service providers that store, process, or transmit cardholder data on behalf of other merchants or service providers. For example, an ISP that hosts merchants as customers must comply with the PCI DSS.

Issuing banks are not required to undergo PCI DSS validation, but they must secure sensitive data in a PCI DSS-compliant manner. Acquiring banks, on the other hand, must comply with PCI DSS and have their compliance validated with an audit.

What Are the Levels and How Are They Determined?

Merchants will fall into one of the four merchant levels based on Visa transaction volume over a 12-month period. This volume is based on the aggregate number of Visa transactions from a merchant Doing Business As (DBA).

Transaction volume is calculated by adding up the number of Visa transactions processed by a merchant, including credit, debit, and prepaid transactions. In cases where a merchant corporation has multiple DBAs, acquirers must consider the aggregate volume of transactions stored, processed, or transmitted by the corporate entity.

Aerial view of an Asian woman rowing a merchant boat filled with goods on a tranquil river.
Credit: pexels.com, Aerial view of an Asian woman rowing a merchant boat filled with goods on a tranquil river.

Merchant levels are determined by Visa and are categorized as follows: Level 1 includes merchants processing over 6 million Visa transactions per year, Level 2 includes merchants processing 1 million to 6 million Visa transactions per year, Level 3 includes merchants processing 20,000 to 1 million Visa e-commerce transactions per year, and Level 4 includes merchants processing fewer than 20,000 Visa e-commerce transactions per year.

The PCI Compliance levels are organized into four tiers, with Level 1 being the strictest and Level 4 being the least severe. Almost all small and medium-sized businesses (SMBs) classify as Level 3 or Level 4 merchants.

Here's a summary of the merchant levels:

If a merchant suffers a data breach, they may be escalated to a higher validation level, which can result in increased compliance requirements and potential fines.

Third-Party Compliance

Merely using a third-party company doesn't exclude a company from PCI DSS compliance.

Organizations using third-party processors have to be PCI DSS compliant, as it may cut down on their risk exposure but doesn't mean they can ignore the PCI DSS.

Hand inserting card into contactless payment terminal for secure online transaction.
Credit: pexels.com, Hand inserting card into contactless payment terminal for secure online transaction.

Third-party agents who perform solicitation activities, deploy ATM or POS devices, or manage encryption keys must be registered in the TPA Registration Program before issuers, acquirers, and merchants can use their services.

Issuing banks are not required to undergo PCI DSS validation, but they must secure sensitive data in a PCI DSS-compliant manner.

Third-Party Processor Compliance

Using a third-party processor can help reduce the effort to validate compliance, but it doesn't mean you're exempt from PCI DSS compliance.

Merely using a third-party company doesn't exclude a company from PCI DSS compliance. Organizations must still adhere to the standards.

A Service Provider is defined by the PCI SSC as a business entity not directly involved in payment processing, but still handling cardholder data. This includes companies that provide services controlling or impacting cardholder data security.

As a Service Provider, merchants who accept payment cards and store, process, or transmit cardholder data on behalf of other merchants or service providers must achieve compliance.

Third-party agents performing solicitation activities, deploying acceptance devices, or managing encryption keys must be registered in the TPA Registration Program before issuers, acquirers, and merchants can use their services.

Debit Card Transactions in Scope?

Bustling market scene with fresh vegetables and traditional merchant in Asia.
Credit: pexels.com, Bustling market scene with fresh vegetables and traditional merchant in Asia.

Debit card transactions are in scope for PCI, which means they must comply with the Payment Card Industry Security Standards Council (PCI SSC) requirements.

In-scope debit cards include any debit, credit, and pre-paid cards branded with one of the five card association/brand logos that participate in the PCI SSC, such as American Express, Discover, JCB, MasterCard, and Visa International.

These logos are a clear indicator that the card is in scope for PCI compliance, and merchants must ensure their systems and processes are secure to protect sensitive cardholder data.

Handling Card Data

Handling card data can be a complex and costly endeavor, especially if you're required to meet the 300+ security controls in the Payment Card Industry Data Security Standard (PCI DSS).

Some business models do require the direct handling of sensitive credit card data, which can be a significant burden. If you're one of them, you'll need to purchase, implement, and maintain security software and hardware, even if the card data only traverses your servers for a short moment.

A woman makes a secure online payment using a laptop and credit card in a cozy setting.
Credit: pexels.com, A woman makes a secure online payment using a laptop and credit card in a cozy setting.

Companies that don't need to handle sensitive credit card data shouldn't. Third-party solutions like Stripe Elements can securely accept and store the data, reducing complexity, cost, and risk.

With third-party solutions, card data never touches your servers, so you'll only need to confirm a few straightforward security controls, such as using strong passwords.

If you're unsure about your PCI DSS compliance requirements, it's best to consult with a security expert or check with Visa, which manages all data security compliance enforcement and validation initiatives.

Low-Cost, Low-Risk SaaS

Using a third-party processor doesn't exempt your organization from PCI DSS compliance. You still need to validate your compliance, even if it does reduce your risk exposure.

Handling card data is a significant responsibility, and if your business model requires it, you'll need to meet all 300+ security controls in PCI DSS. This can be a daunting task, especially if card data only briefly touches your servers.

A businessman in a suit opens the door to a yellow taxi on a city street during the day.
Credit: pexels.com, A businessman in a suit opens the door to a yellow taxi on a city street during the day.

If you don't need to handle sensitive credit card data, it's best to avoid it altogether. Third-party solutions like Stripe Elements can securely accept and store the data, simplifying the process and reducing complexity.

A hosted Software-as-a-Service (SaaS) ecommerce platform is a low-cost, low-risk option for online stores. This approach saves money on hardware, software licenses, and support, making it a more affordable choice.

To qualify for a SaaS ecommerce platform, your company should consider the following:

  • Wants to save money on hardware, software licenses, and support.
  • Doesn't have people to fiddle with hardware and software.
  • Prefers to pay one monthly fee to cover your ecommerce platform.
  • Wants to remain PCI-compliant with a minimum of effort.

Using a SaaS ecommerce platform can make PCI compliance a breeze, as you only need to complete a self-assessment questionnaire (SAQ) as a Level 2-4 merchant or an ROC (Report on Compliance) if you're a Level 1 merchant. This reduces the time and expense associated with PCI compliance.

Debit Card Transactions

Debit card transactions can be a bit confusing, but basically, they're in scope for PCI if they're branded with one of the five card association logos that participate in the PCI SSC.

In other words, if you're dealing with debit cards from American Express, Discover, JCB, MasterCard, or Visa International, you'll need to follow PCI DSS guidelines.

Debit cards are considered in-scope cards, just like credit and pre-paid cards.

Compliance Process

Close-up view of a modern contactless payment terminal for seamless transactions.
Credit: pexels.com, Close-up view of a modern contactless payment terminal for seamless transactions.

To ensure PCI DSS compliance, issuers and acquirers must verify that all their service providers and merchants adhere to the requirements.

Issuers and acquirers are responsible for confirming cardholder data is being safely handled by their service providers and merchants. This process helps identify any weaknesses that need to be addressed.

By doing so, issuers and acquirers can expose any vulnerabilities and take corrective action to prevent data breaches.

Compliance Process

To maintain compliance, you'll need to undergo a vulnerability scan if you qualify for certain self-assessment Questionnaires (SAQs) or if you store cardholder data post-authorization. If you qualify for SAQ A-EP, B-IP, C, D-Merchant, or D-Service Provider under version 3.x of the PCI DSS, a quarterly scan by a PCI SSC Approved Scanning Vendor (ASV) is required.

You'll need to submit a passing scan every 90 days or once per quarter. Merchants and service providers should submit compliance documentation according to the timetable determined by their acquirer. Scans must be conducted by a PCI SSC Approved Scanning Vendor (ASV) such as ControlScan.

Home users are particularly vulnerable to security threats due to their often inadequate protection. Adopting a 'path of least resistance' model, intruders often target home users, exploiting their always-on broadband connections and typical home use programs.

Validation of Compliance

Credit: youtube.com, BECS Validation - The Elements of Compliance

Validation of compliance is not mandatory for all entities, but required for merchants and service providers who process, store or transmit cardholder data. Visa and Mastercard require merchants and service providers to be validated according to the PCI DSS.

Issuing banks are not required to undergo PCI DSS validation, although they must secure sensitive data in a PCI DSS-compliant manner. Acquiring banks must comply with PCI DSS and have their compliance validated with an audit.

To confirm cardholder data is being safely handled, issuers and acquirers are responsible for ensuring that all their service providers, merchants and merchants’ service providers comply with the PCI DSS requirements. This is the best way to expose any weaknesses that need to be addressed.

You may need to submit remediation validation records and compliance reports to the acquiring bank and card brands. Level 4 merchants must maintain requirements for 4, 9, and 11.

If you qualify for certain self-assessment Questionnaires (SAQs) or you electronically store cardholder data post authorization, then a quarterly scan by a PCI SSC Approved Scanning Vendor (ASV) is required to maintain compliance. This includes SAQ A-EP, SAQ B-IP, SAQ C, SAQ D-Merchant, and SAQ D-Service Provider.

Ecommerce Requirements

Credit: youtube.com, PCI DSS Compliance for Your Ecommerce Site | The Journey

Any organization that accepts, transmits, or stores cardholder data must comply with PCI DSS.

Ecommerce platforms are required to ensure PCI compliance for their organization if they host and manage their own platform.

The required compliance level is determined by the number of credit or debit card transactions processed annually over a 12-month period.

All merchants fall into one of four levels: Level 1, Level 2, Level 3, or Level 4.

Level 1 is the strictest in terms of DSS requirements, while Level 4 is the least severe.

Almost all small and medium-sized businesses classify as Level 3 or Level 4 merchants.

Non-compliance is equally as costly as a breach, in which the merchant is required to assess to the Level 1 standard for the next year, including an on-site audit.

The PCI Compliance levels are organized into four tiers: Level 1, Level 2, Level 3, and Level 4.

Level 1 merchants include organizations that process a high volume of transactions, but the article does not specify the exact number.

PCI DSS Requirements

Person Holding Credit Card and Payment Terminal
Credit: pexels.com, Person Holding Credit Card and Payment Terminal

As a merchant, you'll need to determine your required compliance level for PCI DSS. This is based on your credit or debit card transaction volume over a 12-month period.

There are four levels of compliance, with Level 1 being the strictest in terms of DSS requirements. Level 4 is the least severe.

Almost all small and medium-sized businesses (SMBs) classify as Level 3 or Level 4 merchants. However, this doesn't mean they shouldn't maintain compliance with the same diligence as larger organizations.

Non-compliance is equally as costly as a breach, where you're required to assess to the Level 1 standard for the next year, including an on-site audit. This is a costly misconception among SMBs who believe they don't need to worry about compliance.

Stripe and PCI DSS

Stripe significantly simplifies the PCI burden for companies that integrate with their services. Any organization that accepts, transmits or stores any cardholder data must comply with PCI DSS, regardless of size or number of transactions.

A happy businessman in a formal suit smiling confidently outdoors against a modern architectural backdrop.
Credit: pexels.com, A happy businessman in a formal suit smiling confidently outdoors against a modern architectural backdrop.

Stripe acts as a PCI advocate and can help in several ways. They'll analyze your integration method and advise you on how to reduce your compliance burden.

For large merchants (Level 1), Stripe can connect you with several auditors that deeply understand the different Stripe integration methods. There are more than 350 such QSA companies around the world.

Stripe's services, such as Checkout and Elements, use a hosted payment field for handling all payment card data. This means the cardholder enters all sensitive payment information in a payment field that originates directly from Stripe's PCI DSS–validated servers.

Stripe will notify you ahead of time if a growing transaction volume will require a change in how you validate compliance. This helps you stay ahead of the game and avoid any last-minute surprises.

US Legislation

In the US, PCI DSS compliance isn't required by federal law, but some states have different rules.

Compliance is indeed required by law in a few states, including Nevada, which incorporated PCI DSS into state law in 2009, requiring merchants to comply and shielding them from liability in case of a data breach.

Close-up of a businessman in a suit showing determination with a fist.
Credit: pexels.com, Close-up of a businessman in a suit showing determination with a fist.

Minnesota was the first state to enact a law related to PCI DSS in 2007, prohibiting the retention of certain payment-card data for more than 48 hours after a transaction is authorized.

Nevada's law also allows merchants to use other approved security standards to avoid liability, giving them some flexibility in how they meet the compliance requirement.

Washington state followed suit in 2010, incorporating PCI DSS into its state law, but with a twist: entities aren't required to be PCI DSS-compliant, but those that are will be shielded from liability in case of a data breach.

Frequently Asked Questions

Do banks have to comply with PCI DSS?

Banks that issue credit cards on behalf of major credit card companies must comply with PCI DSS to avoid losing privileges and facing fines. Compliance is crucial for banks to continue processing and issuing credit cards.

Adrian Fritsch-Johns

Senior Assigning Editor

Adrian Fritsch-Johns is a seasoned Assigning Editor with a keen eye for compelling content. With a strong background in editorial management, Adrian has a proven track record of identifying and developing high-quality article ideas. In his current role, Adrian has successfully assigned and edited articles on a wide range of topics, including personal finance and customer service.

Love What You Read? Stay Updated!

Join our community for insights, tips, and more.