Payment Card Industry Data Security Standard
Core DefinitionPCI DSS is a global set of data security requirements designed to help merchants securely process credit and debit card payments. It was created by Visa, MasterCard, American Express, Discover, and JCB in 2006 and is now managed by the PCI Security Standards Council (PCI SSC).
- Contains 12 core requirements to standardize cardholder data security
- Applies to all entities that store, process, or transmit cardholder data
- Compliance is contractually required to accept payment cards
- Not specific to any one institution — it applies globally
Arrow Payments
Boots on the GroundFounded by Deborah Jackson in 2005 in Chicago, IL. Arrow specializes in higher education payment processing solutions.
- Guided completion of SAQs
- AOC reminders
- PCI training enrollment & completion reports
- Vendor implementation & integration
- Tailored solution recommendations
- Device troubleshooting
CampusGuard
Qualified Security AssessorCampusGuard serves as the independent Qualified Security Assessor (QSA) for Tufts.
- Vendor compliance reviews
- PCI training course content
- Vulnerability scanning
- Annual SAQ review & compliance sign-off
| Data Element | Description | Protection Required |
|---|---|---|
| Primary Account Number (PAN) | The 16-digit credit card number — the most critical element | Must be protected at all times |
| Cardholder Name | Name of the card account holder | Must be protected |
| Expiration Date | Month/year the card expires | Must be protected |
| Card Verification Code (CVV) | 3 or 4-digit security code on the card | Never store after authorization |
| Cardholder Address | Billing address associated with the account | Must be protected |
| Magnetic Stripe / Chip Data | Full track data from swipe or dip | Never store after authorization |
| Cardholder PIN | Personal Identification Number for debit transactions | Never store |
Financial Impact
- Average cost per stolen record: $245
- 100,000 records × $245 = $25M+ breach cost
- 2024 average U.S. data breach cost: $9.36M
- Fines up to $500,000 per card brand
- Banking fines, legal fees, federal audit costs
Operational Impact
- Loss of ability to accept credit cards
- Cost of forensic investigation & cleanup
- Consumer notification & protection costs
- Cost of reissuing affected credit cards
- Fraudulent charges expense
- Reputational loss — customer trust is hard to rebuild
Non-Compliance with PCI DSS Requirements
Primary CauseFailing to implement or maintain PCI DSS controls is the most direct path to a breach. Know the requirements that apply to your department and ensure continuous compliance.
Third-Party Vulnerabilities
Vendor RiskVendors and service providers with access to your cardholder data environment can introduce risk. Review vendor Attestations of Compliance (AOCs) annually.
Lack of or Inadequate Training
Human FactorNew or untrained employees may not understand how to securely accept payments. Annual PCI training is required for all users who interact with payment systems.
Phishing & Social Engineering
Targeted AttacksAttackers trick employees into revealing credentials or clicking malicious links. If you receive a suspicious email, ask before acting — never assume it's legitimate.
Weak or Default Passwords
Credential RiskReused, default, or weak passwords are a primary cause of breaches. Use strong, unique passwords and a password manager. Update passwords at least every 90 days.
Non-Compliant Devices or Processes
Process RiskEntering credit card numbers into a university computer is a PCI violation. Never use non-approved devices or processes. Only use PCI DSS-compliant terminals and systems.
Physical Tampering / Device Theft
Physical SecurityCriminals may swap or tamper with payment terminals to steal card data (skimming). Inspect devices regularly for signs of tampering. Lock up devices when not in use and submit tamper logs monthly.
Unauthorized Access to Secure Areas
Access ControlPhysical access to systems, servers, or documents containing cardholder data must be restricted and logged. Report any unauthorized access immediately.
Treasury
Institutional Oversight- Oversees merchant accounts and related policies and procedures
- Reviews requests for third-party service providers
- Ensures campus-wide PCI DSS compliance
- Files annual PCI Attestation with the bank (December)
Account Managers
Departmental LeadOne Account Manager is assigned as the primary PCI contact for each department that accepts credit card payments.
- Complete annual PCI tasks and self-assessments (SAQs)
- Maintain a list of departmental users requiring PCI training
- Oversee device inspections and submit tamper logs
- Communicate any changes in payment processing to Arrow Payments
- Ensure security controls are consistently implemented
- Complete vendor reviews (AOCs)
- Adhere to Tufts' Incident Response Plan (IRP)
Account Users
Day-to-Day Operations- Complete annual PCI training
- Maintain PCI best practices in day-to-day operations
- Report any suspicious activity or evidence of device tampering
Financial Penalties
Monetary- Legal fees
- Banking fines (per card stolen)
- Cost of federal audits
- Forensic investigation and cleanup costs
- Fines up to $500,000 per card brand
Operational Consequences
Operational- Loss of ability to accept credit card payments
- Loss of trust from banking institutions and partners
- Reputational damage with customers
- Operational disruption during investigation
Knowledge Test
25 questions covering PCI foundations, cardholder data, breach causes, roles and responsibilities, and the 2026 compliance program.