Bonesnap;11047963 wrote:Are you sure you're not type 1, or any of them? Whenever we have done an ecommerce site we always make sure the client knows we are not storing any payment information (especially credit card) whatsoever. Sometimes they ask us if we can store the credit card and we tell them a resounding NO.
I wanted to say I know for sure that I'm not 1,2, or 3, but had to admit to myself that the language in this document is not super-clear. There's a certain lack of precision in the document that I find troubling. Given that this document was created by a supposedly august body of Important Entities, I would imagine they could accomplish a higher degree of specificity. I'm pretty sure my sites are all SAQ Validation Type 4.
Bonesnap;11047963 wrote:But I am wondering if you are technically a "merchant"? Wouldn't Authorize.Net (or Paypal, etc.) be the merchant?
Technically, I'm not -- I'm a software developer. But the people I work for are merchants. They sell stuff. As weedpacket says, Paypal and Authorize.net are brokers. I might be wrong, but I think that technically they are in the business of escrow.
Bonesnap;11047963 wrote:We do 95% of our work with Authorize.Net and in most cases if we need to use their CIM (customer information manager/module) we only store the CIM ID that it generates and reference from there. Everything about the customer including their payment profiles are stored with them, which I would assume are PCI compliant. I was always under the impression that as long as the "burden" of storing this sensitive information was "passed off" to another service or party, you were being PCI compliant because you're simply not storing any sensitive information. I know that Authorize.Net won't enable your account unless you already have your security certificate for your domain/hosting.
There is more to being PCI-compliant than passing off the storage of cardholder data to another entity. Passing off the storage of the data to another party relieves you of 90% of the security burden, but you still have to make sure everything is secure that you do actually deal with. If people enter credit card info into a form hosted on your server, you have a substantial amount of responsbility: making sure it's securely hosted, making sure your server is protected against hacks, making sure connections to the payment gateway are encrypted and that you properly verify the cert of the remote host and peer, etc.
Bonesnap;11047963 wrote:Now I am second-guessing all the ecommerce sites we have done :eek:
You might want to check out Self-Assessment Questionnaire #4.
Weedpacket wrote:I still don't think holding the credit card information for the milliseconds it takes to perform a transaction counts as "storage". (Can you imagine the fun copyright lawyers could have if having a music app read an MP3 file to play it counted as "copying"?)
Yes I think you are right. "Storage" surely refers to writing data to a file or database. Really frustrating how vague these concepts are.
What do we think about storing a credit card expiration date? If I create a CIM payment profile (or paypal billing agreement) where the "cardholder data" is stored by authorize.net or paypal, surely there's no harm in remembering when this payment method is going to expire?