educational

PCI Compliance

PCI-DSS may sound like just another geek acronym, but everyone who takes electronic payments over the Internet has good reason to know what it is — and should only deal with payment processors who can state their compliance to this important security standard. PCI-DSS stands for payment card industry data security standard, and is a set of security principles established to protect credit card payment processing and all the sensitive information associated with it.

The requirements consist of six major security controls categories. They are:

1. Build and maintain a secure network by using a firewall and eliminating vendor supplied passwords.
2. Protect cardholder data by protecting stored credit card data thru encryption and data retention policies.
3. Maintain a vulnerability management program by use of anti-virus software and security development of systems and applications including the use of change control.
4. Implement strong access control measures by restricting logical and physical access to cardholder data.
5. Regularly monitor and test networks by use of logging tools, intrusion detection, file-integrity monitoring tools and regular penetration testing.
6. Maintain an information security policy by having a formal corporate policy that addresses information security.

These requirements address enterprise security for payment card processing and are currently managed by the PCI-DSS Security Council, a consortium made up of representatives from the major payment cards. The standard can be found at the council’s website, www.pcisecuritystandards.org.

A quick glance at the security standard will reveal that it covers everything from physical security to wireless security and all potential methods of compromise of card data. A quick review of news stories on the same topics indicates that each of these areas have been methods of successful compromises in the past.

Even though at first glance this may appear to be an overbearing list of requirements, many firms find that their current practices are close to being inline with the regulations. Though if it is otherwise, there are plenty of firms out there that can provide direction in order to come into compliance.

The goal of PCI-DSS was targeted to provide a safer environment for online payment card processing, though of course the underlying goal was to encourage more online credit card usage by instilling confidence to the consumer over the security/safety of online payments.

One of the obvious drivers was the growing fraud in online processing.

Following the old adage “Why rob the bank? Because that’s where the money is,” it was soon recognized that the growth of online payments was a treasure trove of financial information, that initially wasn’t always treated with the security it deserved, and soon became an easy target for online hacking. One site even emerged just to count the number of instances and records of known compromises of both online and physical data leakage PrivacyRights.org.

What was seen in the hacking cases initially were attacks against the large processors in hopes of obtaining large amounts of data in one location or processor; but as the larger processors adopted the PCI standard and therefore became more secure, the hacker community began moving down the food chain to the smaller and possibly less protected processors. This is why no one can “play the ostrich“ and believe they are too small to be a target, as anyone who has card data can become a potential target.

For large merchants, certification requires an initial self assessment of their enterprise, or a 3rd party assessment to the established standard. Once this is complete they must submit to a qualified security assessor (QSA) who will certify the compliance of the entity. This then gets submitted to the PCI organization and recorded. Upon confirmation of compliance, the processor can post their compliance with the PCI DSS standard. A list of compliant processors is available by region. For the U.S. the standard is known as PCI. The foreign version is called AIS for account information security. You can find the lists of PCI/AIS compliant companies at the Visa USA website, from Visa Europe and from Visa Asia Pacific.

So why is it important to only deal with processors who are PCI compliant?

By meeting this compliance standard, merchants dealing with the processor should have some degree of confidence that the customer data submitted to the processor will be treated with a commensurate level of security (the fewer times you lose your customer data, the better). The last thing a merchant wants is to be associated with an online hack of customer data, and given the new privacy laws in many states, data compromises of personal information must now be publically announced to the consumer when they occur (California was one of the first to enact such a law, known as SB 1836).

Additionally it should be noted that while you may have already achieved or are working with a PCI compliant processor, it is not a onetime exercise. The following recurring aspects need to be exercised in order to main compliance:

  • There are annual reviews – PCI compliance ROC.
  • Semi-annual – review server configuration standards.
  • Quarterly – vulnerability scanning.
  • Quarterly – access control review.
  • Daily – logging audit trails.

As an online merchant, PCI should no longer be just another acronym, but something that should be kept in mind for all your online payment processing. Maximizing your profits (and keeping them), as well as maintaining a high recurring customer base (hacked customers usually don’t return in droves), go hand-in-hand with PCI security.

As a 20 year veteran of Internet security, this author has long realized it’s a case of “us against them,” and for job security, can easily say, this threat is not going away anytime soon.

Copyright © 2025 Adnet Media. All Rights Reserved. XBIZ is a trademark of Adnet Media.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.

More Articles

opinion

Breaking Down HB 805 and How it Affects the Adult Industry

North Carolina House Bill 805 was enacted July 29, after the state legislature overrode Governor Josh Stein’s veto. The provisions that relate to the adult industry, imposing requirements for age verification, consent and content removal, are scheduled to become effective Dec. 1. Platforms have until then to update their policies and systems to comply with the new regulations.

Corey D. Silverstein ·
opinion

Staying Compliant With Payment Standards Across Europe and Australia

So, you’ve got your eye on international growth. Smart move. No matter where adult-industry merchants operate, however, one requirement remains consistent: regulatory compliance. This isn’t just a legal checkbox — it’s a critical component of keeping payments flowing and business operations intact.

Jonathan Corona ·
opinion

How to Avoid Copyright Pitfalls When Using Music in Adult Content

When creating an adult video, bringing your vision to life often means assembling just the right ingredients — including the right music. However, adding music to adult content can raise complex legal and ethical issues.

Lawrence G. Walters ·
opinion

New Visa Rules Adult Merchants Need to Know

In December 2024, I shared an update on the upcoming rollout of Visa’s Acquirer Monitoring Program, also known as VAMP. The final version went into effect in June, and enforcement will begin in October. With just a month to go, now is the time to review what’s changing and how to stay compliant.

Cathy Beardsley ·
opinion

WIA Profile: Lainie Speiser

With her fiery red hair and a laugh that practically hugs you, Lainie Speiser is impossible to miss. Having repped some of adult’s biggest stars during her 30-plus years in the business, the veteran publicist is also a treasure trove of tales dating back to the days when print was king and social media not even a glimmer in the industry’s eye.

Women in Adult ·
opinion

Fighting Back Against AI-Fueled Fake Takedown Notices

The digital landscape is increasingly being shaped by artificial intelligence, and while AI offers immense potential, it’s also being weaponized. One disturbing trend that directly impacts adult businesses is AI-powered “DMCA takedown services” generating a flood of fraudulent Digital Millennium Copyright Act (DMCA) notices.

Corey D. Silverstein ·
opinion

Building Seamless Checkout Flows for High-Risk Merchants

For high-risk merchants such as adult businesses, crypto payments are no longer just a backup plan — they’re fast becoming a first choice. More and more businesses are embracing Bitcoin and other digital currencies for consumer transactions.

Jonathan Corona ·
opinion

What the New SCOTUS Ruling Means for AV Laws and Free Speech

On June 27, 2025, the United States Supreme Court handed down its landmark decision in Free Speech Coalition v. Paxton, upholding Texas’ age verification law in the face of a constitutional challenge and setting a new precedent that bolsters similar laws around the country.

Lawrence G. Walters ·
opinion

What You Need to Know Before Relocating Your Adult Business Abroad

Over the last several months, a noticeable trend has emerged: several of our U.S.-based merchants have decided to “pick up shop” and relocate to European countries. On the surface, this sounds idyllic. I imagine some of my favorite clients sipping coffee or wine at sidewalk cafés, embracing a slower pace of life.

Cathy Beardsley ·
profile

WIA Profile: Salima

When Salima first entered the adult space in her mid-20s, becoming a power player wasn’t even on her radar. She was simply looking to learn. Over the years, however, her instinct for strategy, trust in her teams and commitment to creator-first innovation led her from the trade show floor to the executive suite.

Women in Adult ·
Show More