Data Security Ignoring the PCI Data Security Standard Could Cost You!


Is compliance with payment card data security standards being ignored?

The recent £500,000 fine, levied by the UK Information Commissioner on DSG, the owner of Currys PC World and Dixons Travel stores, highlights a worrying trend of non-compliance with payment card security standards. Our Security & Privacy Team has prepared a full blog post on the DSG fine.

It seems somewhat perverse that, in a world where data breach scrutiny and sanctions have increased dramatically, compliance with payment card security standards have fallen.

However, this appears to be the case, at least according to Verizon’s Payment Security Report.  Published in September 2019, alarmingly, the report reveals that full compliance with the Payment Card Industry Data Security Standard fell to 36.7% globally in 2019 – dropping from 52.5% in 2018.  The report breaks this down by region as follows:

In grading terms, Asia-Pacific achieves a high C, Europe, Middle East and Africa a lowly E and summer schooling is on the cards for the Americas. In each case, the careers teacher is busy realigning expectations.

This drop is no one-off, but follows a steady decline over the past three years from a peak at 55.4% in 2016.

What is the Payment Card Industry Data Security Standard?

For people with a severe aversion to acronyms, I apologise and please brace yourself.  I shall try to be brief.

In 2006, Visa, Master-Card, JCB, Discover and American Express founded the Payment Card Industry Security Standards Council (PCI SSC) to establish common security standards.  These include:

In general terms, the PCI DSS are intended to apply to all organizations or merchants that accept, transmit or store any cardholder data (such as e.g. the cardholder name, primary account number, expiration date and security code), with the PA-DSS and PTS setting out additional standards for software applications and devices.

The standards are intended to be imposed by a virtuous contractual waterfall flowing down from card issuing members – to customers (typically banks) – to merchants – to service providers (including e.g. payment processors, payment application providers and device manufacturers).

Significantly, the PCI DSS is not typically imposed or enforced on the basis of statute although, in the United States, legislative proposals have been proposed several times.

Why should businesses care?

The answer is – for many reasons.  These include:

Comment

The exact reason for the current slump in PCI DSS compliance is unclear, although it is likely to be due to a combination of factors including:

In the UK, a number of recent security breaches and fines have shone a very bright light on PCI DSS failings.  In particular, in relation to the DSG fine noted above, when considering the technical and organisational provisions within DSG’s wider IT estate, the ICO highlighted an assessment by an information security consultancy in May 2017 (prior to the breach in 2018).  That assessment had noted that the integrity of the POS terminals should not be relied upon and that such terminals may not be compliant with the requirements of the PCI DSS as relating to store networks and POS terminals.

Although the ICO noted that that PCI DSS compliance is not in itself indicative of compliance, the ICO considers it helpful when determining an “appropriate” measure of security in relation to personal data processed by the payment card environment. Furthermore, the guidance on the ICO’s website specifically states:

Although compliance with the PCI-DSS is not necessarily equivalent to compliance with the GDPR’s security principle, if you process card data and suffer a personal data breach, the ICO will consider the extent to which you have put in place measures that PCI-DSS requires particularly if the breach related to a lack of a particular control or process mandated by the standard.

In light of the fact that both the recent travel industry breaches involved the loss of payment card details, including card numbers and expiration dates, the ICO will no doubt be paying careful attention to whether those companies complied with their PCI DSS obligations.

However, the Sword of Damocles (in the shape of fines up to of £183m British Airways) will not be falling any time soon, as the ICO has agreed to an extension of the regulatory process until 31 March 2020.  It also seems highly likely that the fines will be reduced, particularly given the resources at these organizations’ disposal, but the ICO is nonetheless likely to wish to flex its muscles in this new GDPR world and we await the outcome with bated breath.

In the meantime, some key points to consider if you process cardholder data:


© Copyright 2025 Squire Patton Boggs (US) LLP
National Law Review, Volume X, Number 51