educational

PCI Compliance

PCI-DSS may sound like just another geek acronym, but everyone who takes electronic payments over the Internet has good reason to know what it is — and should only deal with payment processors who can state their compliance to this important security standard. PCI-DSS stands for payment card industry data security standard, and is a set of security principles established to protect credit card payment processing and all the sensitive information associated with it.

The requirements consist of six major security controls categories. They are:

1. Build and maintain a secure network by using a firewall and eliminating vendor supplied passwords.
2. Protect cardholder data by protecting stored credit card data thru encryption and data retention policies.
3. Maintain a vulnerability management program by use of anti-virus software and security development of systems and applications including the use of change control.
4. Implement strong access control measures by restricting logical and physical access to cardholder data.
5. Regularly monitor and test networks by use of logging tools, intrusion detection, file-integrity monitoring tools and regular penetration testing.
6. Maintain an information security policy by having a formal corporate policy that addresses information security.

These requirements address enterprise security for payment card processing and are currently managed by the PCI-DSS Security Council, a consortium made up of representatives from the major payment cards. The standard can be found at the council’s website, www.pcisecuritystandards.org.

A quick glance at the security standard will reveal that it covers everything from physical security to wireless security and all potential methods of compromise of card data. A quick review of news stories on the same topics indicates that each of these areas have been methods of successful compromises in the past.

Even though at first glance this may appear to be an overbearing list of requirements, many firms find that their current practices are close to being inline with the regulations. Though if it is otherwise, there are plenty of firms out there that can provide direction in order to come into compliance.

The goal of PCI-DSS was targeted to provide a safer environment for online payment card processing, though of course the underlying goal was to encourage more online credit card usage by instilling confidence to the consumer over the security/safety of online payments.

One of the obvious drivers was the growing fraud in online processing.

Following the old adage “Why rob the bank? Because that’s where the money is,” it was soon recognized that the growth of online payments was a treasure trove of financial information, that initially wasn’t always treated with the security it deserved, and soon became an easy target for online hacking. One site even emerged just to count the number of instances and records of known compromises of both online and physical data leakage PrivacyRights.org.

What was seen in the hacking cases initially were attacks against the large processors in hopes of obtaining large amounts of data in one location or processor; but as the larger processors adopted the PCI standard and therefore became more secure, the hacker community began moving down the food chain to the smaller and possibly less protected processors. This is why no one can “play the ostrich“ and believe they are too small to be a target, as anyone who has card data can become a potential target.

For large merchants, certification requires an initial self assessment of their enterprise, or a 3rd party assessment to the established standard. Once this is complete they must submit to a qualified security assessor (QSA) who will certify the compliance of the entity. This then gets submitted to the PCI organization and recorded. Upon confirmation of compliance, the processor can post their compliance with the PCI DSS standard. A list of compliant processors is available by region. For the U.S. the standard is known as PCI. The foreign version is called AIS for account information security. You can find the lists of PCI/AIS compliant companies at the Visa USA website, from Visa Europe and from Visa Asia Pacific.

So why is it important to only deal with processors who are PCI compliant?

By meeting this compliance standard, merchants dealing with the processor should have some degree of confidence that the customer data submitted to the processor will be treated with a commensurate level of security (the fewer times you lose your customer data, the better). The last thing a merchant wants is to be associated with an online hack of customer data, and given the new privacy laws in many states, data compromises of personal information must now be publically announced to the consumer when they occur (California was one of the first to enact such a law, known as SB 1836).

Additionally it should be noted that while you may have already achieved or are working with a PCI compliant processor, it is not a onetime exercise. The following recurring aspects need to be exercised in order to main compliance:

  • There are annual reviews – PCI compliance ROC.
  • Semi-annual – review server configuration standards.
  • Quarterly – vulnerability scanning.
  • Quarterly – access control review.
  • Daily – logging audit trails.

As an online merchant, PCI should no longer be just another acronym, but something that should be kept in mind for all your online payment processing. Maximizing your profits (and keeping them), as well as maintaining a high recurring customer base (hacked customers usually don’t return in droves), go hand-in-hand with PCI security.

As a 20 year veteran of Internet security, this author has long realized it’s a case of “us against them,” and for job security, can easily say, this threat is not going away anytime soon.

Copyright © 2025 Adnet Media. All Rights Reserved. XBIZ is a trademark of Adnet Media.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.

More Articles

profile

WIA Profile: Leah Koons

If you’ve been to an industry event lately, odds are you’ve heard Leah Koons even before you’ve seen her. As Fansly’s director of marketing, Koons helps steer one of the fastest-growing creator platforms on the web.

Women in Adult ·
opinion

What France's New Law Means for Age Verification Worldwide

When France implemented its Security and Regulation of the Digital Space (SREN) law on April 11, it marked a pivotal moment in the ongoing global debate surrounding online safety and access to adult content.

Corey D. Silverstein ·
opinion

From Tariffs to Trends: Staying Resilient in a Shaky Online Adult Market

Whenever I check in with clients these days, I encounter the same concerns. For many, business has not quite bounced back after the typical post-holiday-season slowdown. Instead, consumers have been holding back due to the economic uncertainty around the Trump administration’s new tariffs and their impact on prices.

Cathy Beardsley ·
opinion

Optimizing Payment Strategies for High Ticket Sales

Payment processing for more expensive items, such as those exceeding $1,000 per order, can create unique challenges. For adult businesses, those challenges are magnified. Increased fraud risk, elevated chargeback ratios and heavier scrutiny from banks and processors are only the beginning.

Jonathan Corona ·
profile

WIA Profile: Lexi Morin

Lexi Morin’s journey into the adult industry began with a Craigslist ad and a leap of faith. In 2011, fresh-faced and ambitious, she was scrolling through job ads on Craigslist when she stumbled upon a listing for an assistant makeup artist.

Women In Adult ·
profile

Still Rocking: The Hun Celebrates 30 Years in the Game

In the ever-changing landscape of adult entertainment, The Hun’s Yellow Pages stands out for its endurance. As one of the internet’s original fixtures, literally nearly as old as the web itself, The Hun has functioned as a living archive for online adult content, quietly maintaining its relevance with an interface that feels more nostalgic than flashy.

Jackie Backman ·
opinion

Digital Desires: AI's Emerging Role in Adult Entertainment

The adult industry has always been ahead of the curve when it comes to embracing new technology. From the early days of dial-up internet and grainy video clips to today’s polished social media platforms and streaming services, our industry has never been afraid to innovate. But now, artificial intelligence (AI) is shaking things up in ways that are exciting but also daunting.

Steve Lightspeed ·
opinion

More Than Money: Why Donating Time Matters for Nonprofits

The adult industry faces constant legal battles, societal stigma and workplace challenges. Fortunately, a number of nonprofit organizations work tirelessly to protect the rights and well-being of adult performers, producers and industry workers. When folks in the industry think about supporting these groups, donating money is naturally the first solution that comes to mind.

Corey D. Silverstein ·
opinion

Consent Guardrails: How to Protect Your Content Platform

The adult industry takes a strong and definite stance against the creation or publication of nonconsensual materials. Adult industry creators, producers, processors, banks and hosts all share a vested interest in ensuring that the recording and publication of sexually explicit content is supported by informed consent.

Lawrence G. Walters ·
opinion

Payment Systems: Facilitator vs. Gateway Explained

Understanding and selecting the right payment platform can be confusing for anyone. Recently, Segpay launched its payment gateway. Since then, we’ve received numerous questions about the difference between a payment facilitator and a payment gateway. Most merchants want to know which type of platform best meets their business needs.

Cathy Beardsley ·
Show More