TITLE

7 Deadly Myths and Solutions for PCI Compliance

AUTHOR(S)
Cougias, Dorian
PUB. DATE
October 2008
SOURCE
Hospitality Upgrade;Autumn2008, p142
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article offers information on the seven deadly myths on Payment Card Industry Data Security Standards (PCI DSS) compliance initiative of hospitality industry in the U.S. The myths include the applicability of PCI DSS on the different standards and personalities of the society as well as the susceptibleness of small business on hacking and fraudulent acts, personal identifiable data in credit cards offers risk opportunities despite the existence of firewall systems, PCI DSS offers various benefits to businesses, not all information infrastructure complies with PCI DSS standards and does not offer complicated process and offers a lot of resources. It also offers information on how to address the issue as well as importance of PCI DSS compliance.
ACCESSION #
34991816

 

Related Articles

  • Read-write rule property research of the combined function about the confidentiality and integrality. Liu Yi-he // Journal of Communication & Computer;May2008, Vol. 5 Issue 5, p40 

    Read-write rule about the combined function at the article function will be discussed in this paper. There are some good properties about the function, and its read-write rule is a read-write rule expansion of BLP model and Biba model by analysis in this paper.

  • Compliance Issues Arising out of the Target Data Breach. KOTZ, H. DAVID // Financial Fraud Law Report;Feb2014, Vol. 6 Issue 2, p161 

    The focuses on the data breach of the retail company Target Corp. in the U.S. It provides details of the data breach, which affect approximately 40 million credit and debit accounts including information on the customers' names and credit or debit card numbers. It also mentions the lawsuits...

  • Full Attention to Data Security Can Help Avoid Security Nightmares. Smitha, Michael E. // Hospitality Upgrade;Autumn2008, p34 

    The article discusses the importance of full attention on data security in the U.S. According to the author, 68% of reported cases and customer concerns with hospitality industry cite the issues of data breaches in credit cards which resulted to the owner's financial liability and fraud issues....

  • STAYING SAFE ONLINE. Broussard, Troy J. // SB Magazine;May2012, Vol. 14 Issue 5, p72 

    The article reports on online safety and cyber security in the U.S. It mentions the effort of AT&T to increase network security to protect consumers and global digital infrastructure from the threats that compromise safety, privacy and personal data. It offers guidelines on how to minimize...

  • Managing the Data Loss Crisis.  // Risk Management (00355593);Jun2008, Vol. 55 Issue 6, p34 

    The article discusses data breaches at companies and the manner in which companies should handle such crises. Statistics are presented indicating the costs and frequency of data breaches of U.S. companies. Techniques the author recommends organizations should use once a breach occurs are...

  • Protect data from employees.  // Communications News;Nov2008, Vol. 45 Issue 11, p6 

    The article focuses on the significance of data security from employees. It notes that organizations invest resources to ensure the security of confidential customer and employee information. Common internal security measures includes employee education programs, data access monitoring and...

  • How to Protect data against the threat of the employee. Rolls, Jon // Computer Weekly;11/18/2008, p14 

    The article presents suggestions to business enterprises in Great Britain on safeguarding sensitive and confidential data from accidental data loss and theft by employees. It mentions that a businesses' customer loyalty, reputation and competitive advantage could be affected by a breach of...

  • Increased Capacity of Information Hiding using Mixed Codebooks of Vector Quantization Algorithms: LBG, KPE and KMCG. Kekre, H. B.; Athawale, Archana; Sarode, Tanuja K.; Sagvekar, Kalpana // Advances in Computational Sciences & Technology;Jun2010, Vol. 3 Issue 2, p245 

    Data hiding involves embedding secret data into various forms of digital media such as text, image, audio, and video. With the rapid growth of network communication, data-hiding techniques are widely used in protecting copyright, embedding captions and communicating secretly. . In this paper, we...

  • Getting to grips with data classification. Glynn, Sean // IM@T.Online;Dec2010/Jan2011, p3 

    The article discusses data classification and presents suggestions for implementing a data classification scheme in an organization. Data classification forms an important part of information lifecycle management and involves providing a level of sensitivity to data used by an organization. It...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics