What is PCI Compliance?

What is PCI Compliance?

what-is-pci-compliance-pci-logo.jpg

PCI Compliance means your business is abiding by data security standards established by the Payment Card Industry Security Standards Council, and verified as such. This council was formed by Visa, MasterCard, Discover, American Express and JCB International, and the standards are designed to help merchants safely secure, store, process, and handle sensitive customer data. All businesses that accept credit cards are subject to these standards.
In essence, the major card brands have created a system to verify that you’re meeting pre-set security standards for PCI compliance. These standards are updated regularly, to help merchants mitigate potentially unsafe card practices. By becoming PCI Compliant, you’re ensuring that your business is staying as protected (as much as possible) from fraud, and accepting credit cards in the manner that Visa/MC/Discover/Amex deem safe and appropriate.

Becoming PCI compliant and staying compliant is pretty simple. Your business will be required to go through an annual Self-Assessment Questionnaire to determine any potentially unsafe practices. Certain organizations may have additional requirements to become compliant based on their processing methods.

    • Related Articles

    • PCI Compliance Scan: How To Find Public IP Address

      How To Find Public IP Address INTRO To assist you with completing a successful PCI scan (for PCI compliance), we'll need the public IP address of your store. What is an IP address? An IP address is a unique number assigned to every computer on the ...
    • Where do I take my PCI questionnaire?

      After your account is approved with CoCard Business, you will receive PCI Compliance registration emails to begin the process. Once you become PCI compliant, you'll receive a certificate that will detail how long it is good for until you have to ...
    • Glossary of Terms

      A AAA Acronym for "authentication, authorization, and accounting." Protocol for authenticating a user based on their verifiable identity, authorizing a user based on their user rights, and accounting for a user’s consumption of network resources. ...