PCI DSS Compliance
The Payment Card Industry Data Security Standard (PCI DSS) provides a baseline of technical and operational requirements designed to protect account data. It is a set of security standards to protect user data and reduce the risk of fraud and data breaches. Expertflow understands the importance of safeguarding sensitive information, especially regarding financial data. This article explains how Expertflow ensures PCI DSS compliance within our system.
PCI DSS Requirements | Compliance | Expertflow CX Compliance |
---|---|---|
Build and Maintain a Secure Network and Systems | ||
| COMPLIANT | Expertflow CX can be integrated with firewalls. |
| COMPLIANT | Passwords are configurable and are backed by password policy. |
Protect Cardholder Data | ||
| PARTIAL-COMPLIANT | CX message content is encrypted at rest (in case if customer shares payment card information with the agent via messages). Call recordings are also encrypted at rest. Note: Call transcripts don’t eradicate cardholder data if it’s communicated during the call. |
| COMPLIANT | Expertflow CX uses TLS for secure communication. See Data Encryption for details. |
Maintain a Vulnerability Management Program | ||
| NOT APPLICABLE | Customer/Partner responsibility |
| COMPLIANT | Different security compliances are applied at various stages of CI. A packaged release is also periodically scanned via a vulnerability scanner, and security patches are released to tackle newly identified vulnerabilities. |
Implement Strong Access Control Measures | ||
| COMPLIANT | Role-based access controls (RBAC) and group-based access controls (GBAC) are implemented in Expertflow CX so that only authorized Agents can access the application. For more details, see Agent Authorization with Agent Desk |
| COMPLIANT | Same as above. |
| NOT APPLICABLE | It’s a partner’s responsibility. |
Regularly Monitor and Test Networks | ||
| NOT APPLICABLE | Customer/Partner responsibility |
11. Regularly test security systems and processes | COMPLIANT | A packaged release is periodically scanned via a vulnerability scanner. For newly identified vulnerabilities, security maintenance releases are announced. |
12. Maintain an Information Security Policy. Maintain a policy that addresses information security for all personnel. | COMPLIANT |