<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Question on PCI Compliance ... in Integration and Testing</title>
    <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/17018#M9549</link>
    <description>&lt;P&gt;I'm not sure DPM would be excluded from PCI compliance, the definitions of what PCI covers are very broad.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;At the end of the day, if someone gets into your server/hosting, and they're any good, they could probably skim the credit card details, at least temporarily, of any payment gateway integration option you use; the exception is perhaps the 100% hosted payment page.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 12 Sep 2011 04:11:13 GMT</pubDate>
    <dc:creator>toml1247</dc:creator>
    <dc:date>2011-09-12T04:11:13Z</dc:date>
    <item>
      <title>Question on PCI Compliance ...</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/185#M125</link>
      <description>&lt;P&gt;Hello.&amp;nbsp; I have a question on PCI compliance for my clients.&amp;nbsp; Auth.net recommend using the AIM connection method.&amp;nbsp; They claim this is the most secure method.&amp;nbsp; However, after reading the PCI self-assessment questionnaire (OHHH BOY), I am not so sure.&amp;nbsp; Basically, the AIM method seems to leave my clients more vulnerable since they are capturing the cc on their server.&amp;nbsp; Since the client server captures the cc information, doesn't the server have to be PCI compliant?&amp;nbsp; &lt;EM&gt;&lt;STRONG&gt;This doesn't just mean running a scan -- PCI compliant servers cost hundreds of dollars per month (per client)!&amp;nbsp;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Maybe I am missing something.&amp;nbsp; As I read the PCI paperwork and self-assessment questionnaire, I get the feeling the cc companies are putting so many requirements on small e-commerce businesses.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What do you think?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mona&lt;/P&gt;</description>
      <pubDate>Thu, 17 Sep 2009 01:33:05 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/185#M125</guid>
      <dc:creator>focuswebtech</dc:creator>
      <dc:date>2009-09-17T01:33:05Z</dc:date>
    </item>
    <item>
      <title>Re: Question on PCI Compliance ...</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/187#M126</link>
      <description>&lt;P&gt;I'm not so sure Auth.net actually claims AIM to be the most secure. The SIM method would be more secure (assuming a sloppy developer using the AIM method) since all the client details (i.e. credit card info, etc) are being entered on Auth.net's servers directly instead of going through your servers first.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And someone correct me if I'm wrong but I would think that if you have no real reason to capture and record a client's CC number in your own DB, it would be best not to since it increases your risk and liability. This would at least obviate the need for you to secure credit card info since you don't store it. If you then send all the client details to Auth.net right after the client submits the info, I would think that all you would need is an SSL connection (also assuming due diligence made by the developer in terms of securing the form) to secure the data in transit and the checkout process should be solid.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Sep 2009 03:32:23 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/187#M126</guid>
      <dc:creator>Nichiren</dc:creator>
      <dc:date>2009-09-17T03:32:23Z</dc:date>
    </item>
    <item>
      <title>Re: Question on PCI Compliance ...</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/188#M127</link>
      <description>&lt;P&gt;I am hoping to get some good opinions here so thanks so much for your input.&amp;nbsp; This PCI compliance issue doesn't seem very straight forward.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Auth.net absolutely says AIM is recommended and most secure.&amp;nbsp; Check it out here:&amp;nbsp; &lt;A rel="nofollow" href="http://developer.authorize.net/api/aim/" target="_blank"&gt;http://developer.authorize.net/api/aim/&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"AIM is Authorize.Net's recommended connection method and offers the most secure and flexible integration. AIM allows merchants to host their own secure payment form and send transactions to the payment gateway using an end-to-end secure sockets layer (SSL) connection. AIM is the required connection method for shopping cart developers participating in the Authorize.Net Shopping Cart Certification (SCC) program."&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, I agree that ANY method CAN be bad if the developer doesn't use proper methods.&amp;nbsp; But, EVEN IF a developer uses https for the check out form, purchases an SSL, and scans their site daily, &lt;EM&gt;&lt;STRONG&gt;that is NOT enough to be PCI compliant&lt;/STRONG&gt;&lt;/EM&gt; (according to the PCI self-assessment questionnaire). And, those are the only things that auth.net seems to be saying are necessary.&amp;nbsp; If you read the questionnaire (or do a search for pci compliant servers), you will see that it takes ALOT of work to have a PCI compliant server.&amp;nbsp; We got a quote from &lt;A rel="nofollow" href="http://www.rackspace.com" target="_blank"&gt;www.rackspace.com&lt;/A&gt; of $500+ per month!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So ... why does it cost so much to get a "PCI compliant server," while shared hosting sites seem to think they just need an SSL and daily scanning?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Confusing ...&lt;/P&gt;&lt;P&gt;Mona&lt;/P&gt;</description>
      <pubDate>Thu, 17 Sep 2009 03:57:41 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/188#M127</guid>
      <dc:creator>focuswebtech</dc:creator>
      <dc:date>2009-09-17T03:57:41Z</dc:date>
    </item>
    <item>
      <title>Re: Question on PCI Compliance ...</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/189#M128</link>
      <description>&lt;P&gt;Here is a blog post with a much better (more detailed) description of my concerns:&lt;/P&gt;&lt;P&gt;&lt;A rel="nofollow" href="http://skeptikal.org/2009/05/is-mass-hosting-pci-compliant-biting.html." target="_blank"&gt;http://skeptikal.org/2009/05/is-mass-hosting-pci-compliant-biting.html.&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mona&lt;/P&gt;</description>
      <pubDate>Thu, 17 Sep 2009 04:03:46 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/189#M128</guid>
      <dc:creator>focuswebtech</dc:creator>
      <dc:date>2009-09-17T04:03:46Z</dc:date>
    </item>
    <item>
      <title>Re: Question on PCI Compliance ...</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/192#M130</link>
      <description>&lt;P&gt;A properly coded site never records the CC in the site's database.&amp;nbsp; The CC is passed along from page to page as a form POST parameter over a (I hope!) SSL encrypted connection.&amp;nbsp; It will be in the server's memory for a time, but not in any place that an attacker could get at without a great deal of difficulty, and if they could do that, you're toast anyway.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One thing to watch out for, though, that recently tripped me up, is if you use a PHP cart with the default "register_globals" feature on, the POST parameters WILL be stored in the database, temporarily, in the session table.&amp;nbsp; This potentially exposes all the CC information "in the clear" to anyone who can open the database, though it is only while the customer is on a page where the CC number was passed to it as a POST parameter.&amp;nbsp; You should ensure that register_globals is off - you may need to make changes to your cart software if it depends on it being on.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Sep 2009 09:54:14 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/192#M130</guid>
      <dc:creator>hotslots132</dc:creator>
      <dc:date>2009-09-17T09:54:14Z</dc:date>
    </item>
    <item>
      <title>Re: Question on PCI Compliance ...</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/201#M136</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.developer.cybersource.com/t5/user/viewprofilepage/user-id/300"&gt;@focuswebtech&lt;/a&gt; wrote:&lt;BR /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So ... why does it cost so much to get a "PCI compliant server," while shared hosting sites seem to think they just need an SSL and daily scanning?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Confusing ...&lt;/P&gt;&lt;P&gt;Mona&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Shared hosting sites don't give a flying cow about PCI compliance. They'll do the absolute minimum amount of work to be able to say they are compliant and even then they probably aren't.&amp;nbsp; Shared hosts are trying to make as much money as they can by cramming as many sites on to one server as possible. They're not really concerned about the websites any further then they need to make sure they are up so they can get paid.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Oh, and rackspace is way too expensive. I just migrated away all 40+ clients of ours and are now saving over $800 a month and have a server that is at least four times as powerful. I'd avoid them and look at Hostgator instead.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Sep 2009 13:11:12 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/201#M136</guid>
      <dc:creator>stymiee</dc:creator>
      <dc:date>2009-09-17T13:11:12Z</dc:date>
    </item>
    <item>
      <title>Re: Question on PCI Compliance ...</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/204#M138</link>
      <description>&lt;P&gt;I don't know that shared hosting, itself, is the issue. The key with PCI compliance, at least as far as this community is concerned, is that your e-commerce site should not store any of the data that is required to be protected - primarily the Personal Account Number (credit card number, etc.) and CVV value.&amp;nbsp; If all you do is pass those values (over a SSL-protected link) to authorize.net, and make sure they are not stored on your server anywhere, ever, then you're probably ok.&amp;nbsp; (I think you need to have some protection against unauthorized access to the server and its files, but that can be done even on a shared host, unless they have serious bugs.)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will agree, though, that shared hosting creates some risks.&amp;nbsp; I once used a shared host that had security holes that allowed files to be written to other user's directories.&amp;nbsp; I no longer use that host.&amp;nbsp; My client uses a managed server at 1&amp;amp;1, where they are the only user of that server, and that has worked well for them.&amp;nbsp; All things considered, I'd rather be on a separate server than a shared host.&amp;nbsp; Some services offer virtual hosting which, if properly done, should be ok.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Sep 2009 13:44:35 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/204#M138</guid>
      <dc:creator>hotslots132</dc:creator>
      <dc:date>2009-09-17T13:44:35Z</dc:date>
    </item>
    <item>
      <title>Re: Question on PCI Compliance ...</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/211#M142</link>
      <description>&lt;P&gt;I agree with Hotslots.&amp;nbsp; We have talked with PCI consultants about all of this PCI.&amp;nbsp; We were using AIM but decided to switch to the SIM method to get rid of some of the liability.&amp;nbsp; The SIM is limiting for us but we are PCI compliant now.&amp;nbsp; On our website, when it comes to capturing the CC info, we put ANET's page in an IFrame to submit the payment then the thank you page goes back to our website.&amp;nbsp; But if you are using AIM, the rule is you can have the CC and CVV numbers just long enough to complete the transaction, so like a split second.&amp;nbsp; If you HAVE to store anything, store the last four of the CC number not the whole thing.&amp;nbsp; But if that is the case, they want you to have your CC server AS WELL AS all other servers and networks that are connected PCI compliant also!&amp;nbsp; The thinking is that if they break into a different server on your network then they could potentially reach your server with the CC info on it.&amp;nbsp; HUGE pain.&amp;nbsp; That is why we switched to SIM and let ANET store it all.&amp;nbsp; If you can make it work without capturing it you are much better off.&amp;nbsp; If fraud happens, the credit card company will go after the bank then the bank will come after you.&amp;nbsp; If you are PCI compliant, you have a great defense.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Sep 2009 15:31:41 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/211#M142</guid>
      <dc:creator>Webguys2</dc:creator>
      <dc:date>2009-09-17T15:31:41Z</dc:date>
    </item>
    <item>
      <title>Re: Question on PCI Compliance ...</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/213#M143</link>
      <description>&lt;P&gt;We also use McAfee (formerly HackerSafe) for our daily scans,&amp;nbsp;they are reasonably priced and can aid in finding some of your vulnerabilities.&amp;nbsp; If you have&amp;nbsp;to host your site and use the SIM method along with a scan,&amp;nbsp;you should be well on your way.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Sep 2009 16:00:17 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/213#M143</guid>
      <dc:creator>Webguys2</dc:creator>
      <dc:date>2009-09-17T16:00:17Z</dc:date>
    </item>
    <item>
      <title>Re: Question on PCI Compliance ...</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/226#M148</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;EM&gt;Webguys2 wrote:&lt;/EM&gt;&lt;BR /&gt;&lt;P&gt;&lt;EM&gt;We have talked with PCI consultants about all of this PCI.&amp;nbsp; We were using AIM but decided to switch to the SIM method to get rid of some of the liability.&amp;nbsp; The SIM is limiting for us but we are PCI compliant now.&amp;nbsp; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Right!&amp;nbsp; That is exactly what I was trying to get at in my original post.&amp;nbsp; I totally agree that it makes sense to use AIM so the liability is put on auth.net, not our clients.&amp;nbsp; However, auth.net says in its documentation that they recommend AIM as the more secure method!&amp;nbsp; Unless the client is on a PCI-compliant server in a PCI-compliant data center, that is not true.&lt;/P&gt;&lt;P&gt;---&lt;/P&gt;&lt;P&gt;&lt;EM&gt;But if you are using AIM, the rule is you can have the CC and CVV numbers just long enough to complete the transaction, so like a split second.&lt;/EM&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Where did you see this information?&amp;nbsp; The information I read in the PCI compliance documentation and the Self-Assessment questionnaire says that any merchant that &lt;EM&gt;&lt;STRONG&gt;captures, stores, or transmits &lt;/STRONG&gt;&lt;/EM&gt;credit card information (even over an SSL) must be PCI compliant.&amp;nbsp; I would guess that many IT security people would say that a split second is all it takes for a hacker script to pick up the cc info.&lt;/P&gt;&lt;P&gt;---&lt;/P&gt;&lt;P&gt;&lt;EM&gt;If you HAVE to store anything, store the last four of the CC number not the whole thing.&amp;nbsp; But if that is the case, they want you to have your CC server AS WELL AS all other servers and networks that are connected PCI compliant also!&amp;nbsp; The thinking is that if they break into a different server on your network then they could potentially reach your server with the CC info on it.&amp;nbsp; HUGE pain.&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, that is why I don't think you can get PCI compliance with shared hosting.&amp;nbsp; Too many vulnerabilities&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think many people think that an e-commerce store only needs to worry about PCI compliance if they store CC info.&amp;nbsp; I think that is a huge misconception.&amp;nbsp;&amp;nbsp; Take a look here for the top 10 misconceptions:&lt;/P&gt;&lt;P&gt;&lt;A rel="nofollow" href="http://www.neospire.net/business.solutions/pci.dss.misconceptions.php" target="_blank"&gt;http://www.neospire.net/business.solutions/pci.dss.misconceptions.php&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;MC is not starting to fine some level 1, 2, and 3 merchants for &lt;STRONG&gt;&lt;EM&gt;non-compliance&lt;/EM&gt;&lt;/STRONG&gt;.&amp;nbsp; There doesn't even have to be a breach!&amp;nbsp; Check it out here:&lt;/P&gt;&lt;P&gt;&lt;A rel="nofollow" href="http://www.storefrontbacktalk.com/securityfraud/mastercard-becomes-the-first-card-brand-to-publish-pci-fines/" target="_blank"&gt;http://www.storefrontbacktalk.com/securityfraud/mastercard-becomes-the-first-card-brand-to-publish-pci-fines/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I really believe that on-line merchants using AIM are very vulnerable for fines.&amp;nbsp; Would love to hear what auth.net has to say about that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mona&lt;/P&gt;</description>
      <pubDate>Thu, 17 Sep 2009 19:55:16 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/226#M148</guid>
      <dc:creator>focuswebtech</dc:creator>
      <dc:date>2009-09-17T19:55:16Z</dc:date>
    </item>
    <item>
      <title>Re: Question on PCI Compliance ...</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/230#M152</link>
      <description>&lt;P&gt;You have to worry about PCI compliance if you handle credit card data.&amp;nbsp; But if you use AIM properly, you can comply.&amp;nbsp; I disagree that using AIM, in and of itself, leaves a merchant vulnerable.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Sep 2009 20:39:14 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/230#M152</guid>
      <dc:creator>hotslots132</dc:creator>
      <dc:date>2009-09-17T20:39:14Z</dc:date>
    </item>
    <item>
      <title>Re: Question on PCI Compliance ...</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/236#M155</link>
      <description>&lt;P&gt;After reading and researching, my understanding (and what I am telling my clients) is &lt;STRONG&gt;&lt;EM&gt;if you use AIM and your web server/hosting is NOT PCI compliant, you are vulnerable.&lt;/EM&gt;&lt;/STRONG&gt;&amp;nbsp; Even if use an SSL to transfer the data, that is NOT enough.&amp;nbsp; To remove the requirement for a server to be PCI compliant, you must send the consumer to a third-party site for the entire checkout process.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Per &lt;A rel="nofollow" href="http://www.neospire.net/business.solutions/pci.dss.misconceptions.php," target="_blank"&gt;http://www.neospire.net/business.solutions/pci.dss.misconceptions.php,&lt;/A&gt; here are a few of the biggest misconceptions about PCI compliance:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;STRONG&gt;Since I don't store credit card information, I don't have to be PCI compliant&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;FALSE. &lt;/STRONG&gt;The PCI DSS does not just apply to the storage of credit card data but also to the handling of data while it is processed or transmitted over networks, phone lines, faxes, etc.&amp;nbsp; While not storing credit card data does eliminate some compliance requirements the majority of the controls dictated by the DSS remain in effect. The only way to avoid PCI compliance is to transfer the risk entirely to someone else, such as PayPal’s Website Payments Standard service where customers interact with the PayPal software directly and credit card information never traverses your own servers.&lt;BR /&gt;&lt;BR /&gt;&lt;P&gt;PCI Compliance Guide- &lt;A rel="nofollow" href="http://www.pcicomplianceguide.org/iso-acquirer-20080930-legal-rights-pci-compliance.php" target="_blank"&gt;Legal rights and responsibilities&lt;/A&gt;&lt;BR /&gt;PayPal PCI Applicability - &lt;A rel="nofollow" href="https://www.paypal.com/pcicompliance" target="_blank"&gt;https://www.paypal.com/pcicompliance&lt;/A&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;I use PayPal/Authorize.NET therefore I don't have to be PCI complaint&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;There are certain payment products that do transfer the burden of PCI compliance to the payment services provider (e.g. PayPal’s Website Payments Pro) however they require that a consumer be forwarded to the payment provider’s servers to complete their order. If your website integrates with PayPal via an API then you are still liable for PCI compliance since your servers capture and transmit the credit card data first.&lt;BR /&gt;&lt;BR /&gt;&lt;P&gt;PayPal PCI Applicability - &lt;A rel="nofollow" href="https://www.paypal.com/pcicompliance" target="_blank"&gt;https://www.paypal.com/pcicompliance&lt;/A&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Thu, 17 Sep 2009 23:11:57 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/236#M155</guid>
      <dc:creator>focuswebtech</dc:creator>
      <dc:date>2009-09-17T23:11:57Z</dc:date>
    </item>
    <item>
      <title>Re: Question on PCI Compliance ...</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/237#M156</link>
      <description>&lt;P&gt;That list of misconceptions is from a hosting provider which has a vested interest in scaring you away from other hosts.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Get the information from the horse's mouth&lt;A rel="nofollow" href="https://www.pcisecuritystandards.org/pdfs/pci_ssc_quick_guide.pdf" target="_self"&gt; PCI Security Standard Quick Guide&lt;/A&gt; and &lt;A rel="nofollow" href="http://www.pcisecuritystandards.org/" target="_self"&gt;pcisecuritystandards.org&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Sep 2009 23:22:39 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/237#M156</guid>
      <dc:creator>hotslots132</dc:creator>
      <dc:date>2009-09-17T23:22:39Z</dc:date>
    </item>
    <item>
      <title>Re: Question on PCI Compliance ...</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/238#M157</link>
      <description>&lt;P&gt;Actually, that same list is printed on many different sites.&amp;nbsp; Here it is again on this site:&lt;/P&gt;&lt;P&gt;&lt;A rel="nofollow" href="http://www.focusonpci.com/site/index.php/Articles/pci-misconceptions.html." target="_blank"&gt;http://www.focusonpci.com/site/index.php/Articles/pci-misconceptions.html.&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, I have read the PCI standards and the SAQ.&amp;nbsp; My understanding is that what I state above (AIM is NOT compliant if your host is not compliant).&amp;nbsp; I guess that is why I am asking the question.&amp;nbsp; Do you have any specific resources that contradict that?&amp;nbsp; I would LOVE to be wrong here -- it would make things much easier.&amp;nbsp; But, I can not find a way around the host being PCI compliant, running in a PCI compliant data center, if you want to use AIM. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Where does it say otherwise?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mona&lt;/P&gt;</description>
      <pubDate>Thu, 17 Sep 2009 23:48:22 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/238#M157</guid>
      <dc:creator>focuswebtech</dc:creator>
      <dc:date>2009-09-17T23:48:22Z</dc:date>
    </item>
    <item>
      <title>Re: Question on PCI Compliance ...</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/239#M158</link>
      <description>&lt;P&gt;Mona,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I agree that if a host's environment doesn't meet the requirements of PCI, then you're not in compliance.&amp;nbsp; But I don't agree that using AIM is risky just because the host doesn't make a statement of PCI compliance.&amp;nbsp; Most commercial hosts do meet the requirements, such as establishing a firewall, having secure physical access, etc.&amp;nbsp; The PCI standard has an appendix A addressing shared hosting.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will comment that I do not claim to be a PCI expert, but I do think that a merchant using AIM can claim conformance to PCI on most hosting services (assuming reasonable care is taken.)&amp;nbsp; At least as far as my client is concerned, the PCI standard highlights areas I know we still have to address before we can claim, with a straight face, that we conform.&amp;nbsp; My work in that area is not done yet.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Sep 2009 00:10:53 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/239#M158</guid>
      <dc:creator>hotslots132</dc:creator>
      <dc:date>2009-09-18T00:10:53Z</dc:date>
    </item>
    <item>
      <title>Re: Question on PCI Compliance ...</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/263#M175</link>
      <description>&lt;P&gt;Is anyone here from auth.net that can shed some light on this issue?&amp;nbsp; Is AIM compliant on a shared server?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mona&lt;/P&gt;</description>
      <pubDate>Sat, 19 Sep 2009 06:17:26 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/263#M175</guid>
      <dc:creator>focuswebtech</dc:creator>
      <dc:date>2009-09-19T06:17:26Z</dc:date>
    </item>
    <item>
      <title>Re: Question on PCI Compliance ...</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/265#M177</link>
      <description>&lt;P&gt;I think I'm with hotslots here.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From the PCI:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PCI DSS Applicability Information&lt;/P&gt;&lt;P&gt;(table, other information)&lt;/P&gt;&lt;P&gt;then towards the bottom of the page:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;PCI DSS, however, does not apply if PANs are not stored, processed, or transmitted.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ok, we're not (hopefully) talking about storing credit card data when using AIM, and&amp;nbsp; Authorize.Net is doing the processing once they get the data, AND they are the ones storing any sensitive authentication data.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Transmitting? Well, perhaps, but if you try to make the argument that any transmission of the CC data in and of itself triggers the need for PCI DSS then every single piece of equipment involved ( the customer's machine, routers, backbones, each 'hop' machine in the path, etc.)&amp;nbsp; needs to be PCI compliant...So even SIM is not compliant because the customers machine is 'transmitting' data over the net and that process is (almost certainly) not PCI compliant.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That's a bit far fetched, and reading through the PCI guidelines it seems clear (to me) that their focus is on servers/machines that actually store and process the information, not the incoming feeds.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I'm wrong, and transmission of data means ANY transmission of sensitive data, then e-commerce on the web is effectively dead and we might as well do something else to make a living... :-)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;my $.02&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;</description>
      <pubDate>Sat, 19 Sep 2009 18:20:58 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/265#M177</guid>
      <dc:creator>SteveMay</dc:creator>
      <dc:date>2009-09-19T18:20:58Z</dc:date>
    </item>
    <item>
      <title>Re: Question on PCI Compliance ...</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/3571#M3249</link>
      <description>&lt;P&gt;I know this is an older thread, but I've had some of the same questions and after reading a lot of documentation on PCI-DSS and PA-DSS, I've found the helpful clarification below (this is from&amp;nbsp;&lt;A href="https://www.pcisecuritystandards.org/pdfs/pci_pa_dss.pdf" rel="nofollow" target="_blank"&gt;https://www.pcisecuritystandards.org/pdfs/pci_pa_dss.pdf&lt;/A&gt;). &amp;nbsp;From this excerpt and the text surrounding it in the document, I conclude:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- If you are the developer *and sole operator* of a SaaS-based integrated payment application - see in particular point 1 below, which distinguishes SaaS from shrink-wrapped software (SwS?)&lt;/P&gt;&lt;P&gt;- And your application does NOT store sensitive cardholder data (though it may transiently receive and retransmit such data to a payment gateway like Authorize.net, as long as it destroys/does not persist the data after the transaction is processed)&lt;/P&gt;&lt;P&gt;- And your application IS NOT sold/licensed to any other entity to deploy or operate it&lt;/P&gt;&lt;P&gt;- And your application and its hosting/networking/security environment is PCI-DSS compliant (there are various compliance levels depending on your transaction volume, etc., but many compliance levels can be achieved thru a self-assessment questionnaire that is not too onerous)&lt;/P&gt;&lt;P&gt;- THEN PA-DSS does not apply to you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;however, you still are on the hook for PCI -DSS compliance, though for most small businesses that will probably put them in the category that allows them to fill out the self assessment questionnaire and possibly require external network scans.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;anyone getting a different reading from this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;armando&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PA-DSS does NOT apply to payment applications offered by application or service providers only as a service (unless such applications&amp;nbsp;&lt;/P&gt;&lt;P&gt;are also sold, licensed, or distributed to third parties) because:&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) The application is a service offered to customers (typically merchants) and the customers do not have the ability to manage, install,&amp;nbsp;&lt;/P&gt;&lt;P&gt;or control the application or its environment; &amp;nbsp;&lt;/P&gt;&lt;P&gt;2) The application is covered by the application or service provider’s own PCI DSS review (this coverage should be confirmed by the&amp;nbsp;&lt;/P&gt;&lt;P&gt;customer); and/or &amp;nbsp;&lt;/P&gt;&lt;P&gt;3) The application is not sold, distributed, or licensed to third parties.&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;Examples of these “software as a service” payment applications include:&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) Those offered by Application Service Providers (ASP) who host a payment application on their site for their customers’ use. Note that&amp;nbsp;&lt;/P&gt;&lt;P&gt;PA-DSS would apply, however, if the ASP’s payment application is also sold to, and implemented on, a third-party site, and the&amp;nbsp;&lt;/P&gt;&lt;P&gt;application was not covered by the ASP’s PCI DSS review. &amp;nbsp;&lt;/P&gt;&lt;P&gt;2) Virtual terminal applications that reside on a service providers’ site and are used by merchants to enter their payment transactions.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note that PA-DSS would apply if the virtual terminal application has a portion that is distributed to, and implemented on, the&amp;nbsp;&lt;/P&gt;&lt;P&gt;merchant’s site, and was not covered by the virtual terminal provider’s PCI DSS review.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Jun 2010 01:30:05 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/3571#M3249</guid>
      <dc:creator>armandofox</dc:creator>
      <dc:date>2010-06-16T01:30:05Z</dc:date>
    </item>
    <item>
      <title>Re: Question on PCI Compliance ...</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/3780#M3457</link>
      <description>&lt;P&gt;You are right. The server or computer you are working on needs to be PCI compliant.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Jun 2010 23:43:23 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/3780#M3457</guid>
      <dc:creator>bethshady</dc:creator>
      <dc:date>2010-06-30T23:43:23Z</dc:date>
    </item>
    <item>
      <title>Re: Question on PCI Compliance ...</title>
      <link>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/16230#M9175</link>
      <description>&lt;P&gt;If you use AIM, you're in scope for PCI. Many many developers (including several on this thread) wishfully think that they won't be in scope if they merely transmit the card data onward to Authorize.net using the AIM api.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;All of those developers are wrong under the current PCI rules. Since the card info is transiting your server, a bad guy could break into your server or into your software and steal the card info as it flys by. Doesn't matter how unlikely it is, you're now in the scope of PCI.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;To use Authorize.Net and stay out of the PCI Scope, use integration methods SIM or the new DPM - &amp;nbsp;&lt;A href="http://developer.authorize.net/api/dpm/" target="_blank"&gt;Direct Post Method&lt;/A&gt;. Both keep your server out of scope.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Aug 2011 18:08:24 GMT</pubDate>
      <guid>https://community.developer.cybersource.com/t5/Integration-and-Testing/Question-on-PCI-Compliance/m-p/16230#M9175</guid>
      <dc:creator>larrykluger</dc:creator>
      <dc:date>2011-08-17T18:08:24Z</dc:date>
    </item>
  </channel>
</rss>

