May 2009 Archives

Wal-Mart this month became the latest major retailer to experiment with self-service kiosks, selling space in 77 stores for units that buy back used video games and issue credits directly to various payment cards.

The initial trial is entirely isolated, with the kiosk vendor having access only to its own network and not to Wal-Mart's. But the $375 billion chain is officially considering having the machines offer in-store credits in the form of gift cards, which would mean allowing the kiosks two-way access to POS and potentially CRM data. That would force some serious strategic debate about how far outside vendor kiosks can--and should--be allowed to play inside a retailer's databases.

The initial version of the kiosks collect payment card information as well as drivers license data. Even setting aside the potential future POS/CRM access, the payment and highly-sensitive driver's license data will force some of that debate right away. How secure are the kiosks? Who is ultimately responsible in the event of a security breach, both from a legal and PCI perspective?

Beyond lawyers and assessors, consumers and the dollars they control will likely blame the retailer for any problems that started with a kiosk in or right next to its store. Wal-Mart officials are stressing that the Wal-Mart logo will not be used on any of the trial kiosks, although the Wal-Mart blue and yellow brand colors will absolutely be used. "This is not Wal-Mart's machine," said Melissa O'Brien, a spokeswoman for Wal-Mart's entertainment division. "We are leasing space to them in our store vestibules just like with do with other companies." And that nuanced distinction will be explained to every Wal-Mart customer how?

The insistence that no brand be used displayed will be a nice point for the lawyers, but it won't do much for public perception. PCI Safe Harbor and legal indemnification won't help much if consumers feel betrayed.

Another troubling issue is data ownership. If Wal-Mart gets consumers to come to their stores and asks them to interact with a kiosk in the store, can the kiosk vendor use that information to help other retailers? As a pragmatic matter, how can they not do so?

The kiosks will know precisely who is returning what products and for how much money. Wouldn't consumers goods manufacturers--such as the ones that made that game as well as the ones that make rival offerings--kill for such data? Or to even be able to send a message to those people? And what about other retailers trying to steal some marketshare?

Alan Rudy, CEO of E-Play, the Ohio-based kiosk operator that is working with Wal-Mart on this trial, insisted the units securely handle credit and debit card data. He said E-Play retains ownership of all information gathered by the kiosks and has no plans to share or sell it, but he wouldn't rule out anything for the future.

Rest of the story


The opportunities offered by the advent of proximity mobile payments are clear; differentiated payment services, increased transaction volumes, faster transactions, increased customer convenience, operational efficiencies and the ability to increase customer loyalty through targeted gift and loyalty programs. With implementations already in place in Europe and Japan, strong consumer interest and the ability to leverage the contactless POS infrastructure already in place, NFC-enabled proximity mobile payments show much promise. But how will security be managed in an ecosystem with so many stakeholders, each managing their own unique aspect of the process? The news is good.

Both the financial and mobile industries have made much progress in defining how NFC-enabled mobile payments will take place and how financial information will be secured. Security is bolstered by the use of industry standards and by the technology supporting proximity mobile payments. Industry organizations have defined standards based approaches to ensuring that payment account information is delivered securely to the mobile phone and stored securely in the phone's secure element.

The NFC-enabled mobile phone leverages the existing ISO/IEC 14443 standard for communicating payment information from the phone to the merchant's POS terminal. Appropriate risk analysis of an operational model for proximity mobile payments can identify where there is potential for fraud or misuse, develop mitigation measures and assign responsibility. From the consumer's perspective, the proximity mobile phone payment looks just like a contactless credit or debit card transaction.

Mobile phones can also leverage two-factor authentication technology to secure the payment application and information. Requiring a passcode or a fingerprint to initiate or respond to the terminal's attempt to initiate or validate a transaction can provide the consumer with additional comfort and a sense of control over a transaction.

While implementations may vary, industry players are moving in a consistent direction. Industry organizations are working to increase ease of access, global interoperability and security of mobile payment technology to consumers. Pilot studies in the United States and implementations worldwide have tested both the technology and the mobile payments process. Proximity mobile payments technology is solid, and will serve this exciting new payment frontier well. Industry stakeholders can leverage the proven technology and a merchant infrastructure that is ready to go to take advantage of consumers' ever-growing love of mobile technology.

Download whitepaper

Whether you realize it or not, touch technology quickly is becoming the intuitive input delivery method of choice. Look no further than self-service food ordering at the gas pump, ATMs, gambling (in the back of a Las Vegas taxi cab of all places), and kiosks at nearly every department store. Depending on the situation, a good touch screen application can be a cheap way of improving the customer experience or making someone's job easier. With demand for solutions that do both, someone out there is putting these deals together. Why shouldn't it be you? I talked with touch technology experts about what specifically you need to know to seize these touch screen opportunities.

Government And Healthcare Are Ripe For Touch Screen Solutions
It's common knowledge that touch screen applications are predominant in the retail POS (point of sale) and hospitality markets. Experts agree that these markets will continue to provide VARs with revenue for years to come. However, chances are you're going to find yourself competing against other POS VARs for sales in these saturated markets. If you're looking for some underserved growth areas, there are plenty. John Dittig, channel sales manager of Elo TouchSystems, notes that he's seeing increases in touch screen adoption in healthcare and industrial applications. "The basic advantages of touch screens are time management and cost savings," says Dittig. "Most touch applications are made for ease of doing business or making employees more effective in their daily roles. There typically are not many disadvantages. Wherever there is a need for a human interface, touch makes processes and procedures better in most verticals."

One hot touch screen market isn't quite a market at all, but rather an emerging subset of the retail market: digital signage. Digital signage can be used to do everything from advertising in-store sales to delivering flight schedule information. Rob Baumgartner, director, commercial business unit of Planar Systems, says he's seeing requests for wide screen and large 40-inch-plus touch displays for digital signage applications. This is great for touch screen vendors, but when it comes to installation, is digital signage a job for a POS VAR or an audio-video specialist? "AV guys are used to some hardware issues including mounting large displays," says Baumgartner. "POS VARs have the advantage of being able to deliver solutions that account for POS needs and wants. Since digital signage typically provides computer-generated content rather than television or movie content, this points to POS VARs as the ones doing the work." If you aren't convinced that digital signage is your next moneymaker, Baumgartner has another idea. "As prices drop and people become more comfortable with touch technology in self-service applications, we've also seen growth in markets such as government, specifically with self-service kiosk applications in post offices and other government offices," says Baumgartner.

Understand The Pros And Cons Of Touch Screen Technologies
Landing on a market is only half the battle. In fact, the environments of each market pose unique challenges and pitfalls the unassuming VAR can fall prey to. "One of the most common mistakes is implementing touch technology based on cost rather than the application or environmental requirements," says Larry Loerch, sales manager, direct and channel sales at 3M Touch Systems. "For instance, offering affordable resistive touch screens in an unsupervised environment could lead to higher cost of ownership and lost revenue due to downtime and replacement/repair of damaged equipment." As your client's trusted advisor, it's ultimately your responsibility to recommend one touch screen over another. Therefore, you should be aware of the benefits and shortcomings associated with all the different touch technologies (see below). Also, the latest technology isn't necessarily the best -- rather, let each specific solution dictate which touch technology you recommend. "How the user interfaces with the touch screen is very important," says Loerch. "For instance, will the unit be used under supervision? Will the user be providing gloved, bare finger, or stylus input? Will the touch screen be located in an area with a large amount of sunlight or heat?" If you're replacing an existing touch screen, Loerch says you should be sure to examine the condition of the existing unit for surface wear, scratches, and contaminants on the screen. It may provide clues as to which technology should be used.

Of course, the prices vary according to brand, touch technology, and size. As a general rule, expect as much as a 20% increase in cost when choosing between different touch technologies. Loerch adds one final piece of information not to be overlooked:  "In addition to choosing the correct touch technology, it's important to ensure the software drivers for the touch screen will work with the operating system of the solution you're putting in place," he says. In the age of plug and play, many assume the addition of what looks like a PC monitor will be recognized by the OS seamlessly.


               Your Guide To Common Touch Screen Technologies
Resistive
  • Utilizes thin electrically charged layers that, when pressed together by an object, create a change in the electrical current registered as a touch event by the controller
  • Most widely used and cost-effective touch technology
  • Can activate with a glove, stylus, pen, or credit card
  • Works with liquid or solid contaminants
  • Typically the lowest-priced option

Infrared (IR) 
An infrared touch screen panel employs one of two very different methodologies. One method uses thermal-induced changes of the surface resistance. This method is sometimes slow and requires warm hands. Another method is an array of vertical and horizontal IR sensors that detects the interruption of a modulated light beam near the surface of the screen. IR touch screens have the most durable surfaces and are used in many military applications that require a touch panel display. 

Surface Acoustic Wave (SAW)
  • Uses ultrasonic waves that pass over the surface of the touch screen. When touched, the ultrasonic waves are interrupted and provide the location of the touch to the screen controller.
  • Hard glass substrate
  • Easy to clean
  • Can activate with a glove, stylus, pen, or credit card
  • High optical quality
  • Durable technology for demanding applications

"The main attraction of SAW is that you can use almost anything to activate it," explains Rob Baumgartner, director, commercial business unit of Planar Systems. "This also is the main drawback -- accidental touches. SAW isn't good in many medical applications because fluids running down a touch screen can change settings."
Capacitive
  • Uses a thin coating to conduct a continuous electrical current across the touch screen sensor. When the current is interrupted by the electrical field of a human touch, the coordinates of the touch are relayed to the controller
  • Hard glass substrate
  • Most durable touch technology available
  • Easy to clean
  • Works with liquid or solid contaminants
  • High optical quality

"People assume it's going to be a finger interacting with the touch screen, but if you watch a touch screen in use, you may be surprised how often people are using other things," says Baumgartner. "The hard surface of capacitive provides protection. Because it relies on electricity instead of a mechanical pressure point, the mechanism doesn't wear out."


While sensational data breaches experienced by big-box retailers and processors fill the headlines, 85 percent of reported data compromises involve small merchants - defined as Level 4 by the Payment Card Industry (PCI) Data Security Standard (DSS). More than 6 million small merchants are doing business in North America; fewer than 5 percent have attested to compliance with the PCI DSS.

By Joan E. Herbig
ControlScan

These are potentially costly statistics for acquirers, who ultimately shoulder the monetary burden should their merchants experience breaches.

Beyond their abundance, Level 4 merchants carry unique challenges. Acquirers can reduce their overall risk and dramatically improve compliance rates among these merchants by overcoming four often-overlooked pitfalls when designing their PCI compliance programs.

Challenge 1: Little awareness of security

Small merchants are focused on making ends meet. They have little awareness of - or time to focus on - security best practices. The few who have heard of PCI compliance typically don't know the standard applies to them. They assume PCI compliance is only for the "big guys" or e-commerce merchants.

Those who realize PCI compliance does apply to them often approach it as a perfunctory process. The benefits of better security often aren't clear to them, and they don't realize breaches could be catastrophic for their businesses.

Acquirers are required to develop a plan to address and educate small merchants about the PCI DSS. The PCI Security Standards Council (SSC) provides basic air cover, but acquirers that take a proactive, targeted approach to engage Level 4 merchants with a variety of educational materials and tactics will become valuable partners to their merchants and gain a competitive advantage.

Education should be a significant component of any acquirer's comprehensive merchant outreach strategy to drive PCI compliance. Examples of helpful educational tools for small merchants include:

  • FAQs tailored to Level 4 merchants
  • PCI DSS basics
  • Tools to help merchants determine their PCI Self-Assessment Validation category and whether they require quarterly scans
  • Overview of the risks merchants face if they are not PCI compliant
Additionally, acquirers should advise small merchants against storing credit card data without a compelling business reason for doing so, and direct them to use Payment Application DSS-compliant applications. That way, small merchants will experience a simpler path to PCI compliance and reduce their risk of data compromise.

Challenge 2: Lack of technical expertise

Most small merchants have few or no technical staffers to manage the PCI compliance process. All of them are required to complete Self Assessment Questionnaires (SAQs) annually and maintain compliance throughout the year. Many have problems answering basic questions in the SAQ because the language is often aimed at technical users.

Questions like the following frequently arise:

  • What validation type am I?
  • What is a payment application?
  • What is encrypted data?
  • What is a firewall?
How do I know if I'm storing prohibited card data?
Level 4 merchants typically have no idea how credit card data flows through their businesses, and most don't have security awareness programs to educate employees on best practices for ensuring the security of cardholder information. Thus, they are highly reliant on outside parties, including their acquirers or POS equipment vendors, and often receive conflicting advice.

Acquirers can help reduce confusion by providing small merchants with guidelines to answer SAQ questions that are specific to each merchant's environment. This makes it easier to complete the SAQ and improves the quality of responses. Acquirers may also want to consider providing security awareness training, in everyday language, to provide fundamental information small merchants need to guard against data compromises.

Going forward, acquirers may want to establish processes for obtaining sufficient information about their merchants' environments that will enable them to answer certain questions, such as what payment application a given merchant uses. This data could be pre-entered in an online SAQ to make the process easier and less frustrating for the merchant.

Challenge 3: Diverse merchant environments

Small merchants often need multiple touch points to become knowledgeable and engaged in the PCI compliance process. Retailers lacking computer or e-mail access present acquirers with challenges regarding how to fully track and convey compliance rates for their small merchant portfolios.

Acquirers must be prepared to provide paper versions of the SAQ to merchants without online access. Moreover, acquirers should develop a content management and reporting strategy for these one-off measures. This will ensure they maintain a holistic view of compliance for their merchant portfolios.

Acquirer portfolios frequently consist of large concentrations of non-English speaking merchants, which compounds the difficulty of the entire compliance process. While the PCI SSC provides the SAQ in English and six other languages, acquirers still face the issue of providing training and technical support to help merchants answer the questions effectively. Acquirers will need to formulate plans to provide the SAQ and support for completing the SAQ in multiple languages.

Challenge 4: Web site vulnerabilities

Small merchants with externally facing Internet Protocols (IPs) must complete quarterly vulnerability scans (SAQ Validation types 4 and 5) to comply with the PCI DSS. Small merchants face unique challenges in complying with this requirement.

Before scanning even begins, small merchants typically ask basic questions, including:

  • What is an externally facing IP?
  • What do I need to scan?
  • How do I find my firewall password?
  • Do I need to scan my POS system that is connected to the Internet?

Most vulnerabilities found in small merchant scanning results require assistance from outside vendors to remediate. For example, dangerous structured query language injection and cross-site scripting vulnerabilities require a programmer to remediate; however, most merchants don't have a programmer in-house and are often not sure whom to commission.

The merchant's host also plays a role in remediating vulnerabilities, and while there are many cooperative hosts, some are not willing to make the changes required to bring the merchant into compliance.

Changes to consider

Developing and implementing a successful Level 4 compliance program is not easy, but acquirers that take the time to develop a plan that anticipates the unique challenges their small merchants face upfront will increase the likelihood of realizing much higher compliance rates and less merchant frustration.

Acquirers that don't have the time and resources to dedicate to comprehensive PCI compliance should consider partnering with a company that specializes in PCI compliance for small merchants.

Different deployment options exist, ranging from full outsourcing to a hybrid model, where an acquirer's support team is trained to handle some aspects of support. This helps ensure the acquirer is equipped with knowledge to answer basic technical questions that often stall merchants early in the PCI compliance process.

Security is becoming increasingly multilayered and complex, so even those with expertise have difficulty configuring security tools correctly. Acquirers managing a PCI compliance program should be prepared to "get in the trenches" to effectively support their merchants.

Whether managed in-house or externally though a third-party, a well-executed PCI program helps acquirers reduce risk and provides an opportunity for them to take a leadership position and establish stronger relationships with their merchants.

Joan Herbig is Chief Executive Officer of ControlScan. She has more than 20 years' experience in the high-tech world and serves on the Electronic Transactions Association's Risk and Fraud committee. Contact her at [email protected] or 800-825-3301.
ATM Card Skimming is a method used by criminals to capture data from the magnetic stripe on the back of an ATM card. The devices used are smaller than a deck of cards and are often fastened in close proximity to or over the top of an ATM's factory-installed card reader.

Pin Capturing refers to a method of strategically attaching cameras and various other imaging devices to ATMs; in order to fraudulently capture the ATM user's PIN.

We've seen a lot of reports and presentations but this is one of the best and current.  Thieves are getting very sophisticated.  Download the guide for more information.

ATM_Card_Skimming_and_PIN_Capturing_Awareness_Guide_.pdf



Related Ring Sites:
  GoKIS  |   ThinClient.org  |   keefner.com  |   Visi Kiosk site  |   KIOSK  |   Kis-kiosk.com  |
Resource Sites:
  Elo TouchSystems  |   Acire Inc.  |   Nextep  |   TIO Networks  |   Olea  |   Self-Service Networks  |   Meridian Kiosks  |   Provisio  |   Kioware  |
  Selling Machine Partners  |   Source Technologies  |   Seepoint  |   5Point  |   Nanonation  |   Netkey  |   KioskCom  |   Summit Research  |   NCR  |