Ohio University

Credit Card Handling

Getting Started

Accepting credit and debit cards improves a customer’s experience while also creating greater efficiencies in payment collection. However, having this convenience requires thorough preparation and constant vigilance in order to maintain card data security. This page outlines what a department needs to know and do to become a merchant. Under no circumstance should a department contract with a credit card processor to begin accepting credit/debit cards. Departments cannot accept credit/debit cards until they have the approval of the Office of the Bursar.

Payment Processing Options

Payment cards can be accepted using terminal, point-of-sale, or online systems:

  • Terminals are small, desktop devices that can process credit and debit transactions and allow users to tap, swipe, or insert a card (chip and PIN), or to enter information manually.
  • Point-of-sale (POS) systems are computers specialized to process payments for a department’s specific business needs—typically one or more PCs connected to a central server or to a hosted environment. A POS system is more complex than a terminal and requires additional security and maintenance. POS systems support the same credit and debit payment cards and entry methods as a terminal. 
    • Note! Please contact the Office of the Bursar before you purchase any POS hardware or software. We will work with you to ensure that the POS system you are looking to purchase is compatible with the university’s credit card processor and meets any or all operational and security requirements.  The purchase must also be managed by Procurement.
  • Online (ecommerce) applications enable departments to accept credit and debit payments over the internet. The Office of the Bursar can create eMarket sites for online payment processing. Departments that have their own ecommerce system can use the CASHNet® Checkout gateway to handle payment processing. Integrating with the CASHNet® Checkout gateway requires some programming but eliminates any card data security requirements for a department’s web site. 
    • Note! Departments are not allowed to accept payments via PayPal, Venmo, Square or other methods which requires funds to flow to personal bank accounts. Contact the Office of the Bursar so that we can assist you with a solution!

All these methods can process Visa, MasterCard, American Express, and Discover cards. Departments may determine which of these cards they want to accept, although most accept all four brands. Any payment processing choice(s) must be approved by the Office of the Bursar before any transactions will be processed.

First Steps

  1. Obtain approval to become  a cash handling department by completing the Departmental Cash Collection Application found on our Cash Handling page.
  2. Review our  PCI Information Security page to understand what is required for your department to  comply with all card data security standards.
  3. Ensure that employees complete the annual Cash Handling and Credit Card Security Awareness Training. This training is required for all employees who handle payment card data.
    • Faculty/staff employees (not student employees)
      • Connect to the Office of the Bursar’s website at www.ohio.edu/bursar
      • Under Other Bursar Services select cash handling
      • Click on the Professional Development Pathways link
      • Click on View all courses
      • Register for the Cash Handling and Credit Card Security Awareness training.
      • Participants will receive an email following registration with instructions on how to access the training.
    • Student employees
      • Once access is provided, access instructions will be provided.
      • Student employees will be provided access to the student developed training.
      • Submit a list to bursar@ohio.edu the student employee name, OHIO id (email address), PID number, planning unit, and location where they are employed.

What to Expect

Once your request to begin accepting payments has been approved, we will notify your department and work with you to set up the payment options you have chosen.

  • Terminals require a new merchant ID to be established with the university’s credit card processor. Allow up to four weeks for that process to complete.   
  • Point-of-sale systems' setup time will vary widely. If a new merchant ID is required, allow six to ten weeks for that process to complete.
  • Online merchant setup time is determined by how quickly you can integrate your website with CASHNet®.
  • eMarket setup is dependent upon the complexity of your offering.  Review our eMarket  page for more information.

Responsibilities

The Office of the Bursar has the responsibility and authority to:

  • Develop and issue operating policies and procedures for handling merchant card services
  • Provide general supervision of merchant card operations
  • Develop and maintain processes and systems
  • Enforce compliance with Payment Card Industry Data Security Standard (PCI DSS) for credit/debit card security
  • Investigate breaches involving cardholder information and recommend disciplinary action

Departments authorized to accept credit/debit card payments are responsible for:

  • Documenting departmental procedures in detail, to include:
    • Methods of payment card acceptance
    • Step-by-step instructions on how to process payments
    • A complete list of all departmental PCI trained employees (this training meets the training requirement)
  • Complete Self-Assessment Questionnaire (SAQ) annually
    • The Office of the Bursar will coordinate with the department manager
  • Complete a payment processing equipment inventory audit annually and inspect devices often
  • Reviewing and understanding the content and requirements contained on the PCI Information Security page
  • Exercising reasonable care in screening charge transactions to reduce credit card misuse and loss of funds.
  • Ensuring that all employees annually complete the required Cash Handling and Credit Card Security Awareness Training.
  • Assisting the Office of the Bursar with responding to chargebacks.

Employees handling credit cards are responsible for:

  • Keeping all cardholder information secure
  • Reviewing and understanding the content and requirements contained on the PCI Information Security page
  • Annually complete the Cash Handling and Credit Card Security Awareness Training.

Definitions

Cardholder Data (CHD)
Cardholder data consists of  the full primary account number (PAN), cardholder name, expiration date and service code.

Chargeback
A chargeback is the reversal of a credit card payment previously received.  If a department fails to prove that a customer authorized a credit card transaction, the amount of the transaction will be deducted from the department's account.

Merchant Department
A university department that accepts credit and/or debit cards as a way to pay for goods, services, information, or gifts.

Primary Account Number (PAN)
The PAN is a unique credit or debit card number that identifies the issuing bank and the cardholder account.

Point of Sale (POS)
Hardware and/or software used to process credit/debit card transactions at merchant locations.

Redact
The process of removing sensitive or classified information from a document before it is stored.

SAQ
Acronym for “Self-Assessment Questionnaire.”  Reporting tool used to document self-assessment results from an entity’s PCI DSS assessment.

Accept Cards for Payment

Departments authorized to accept credit or debit card payments must exercise reasonable care in screening transactions to reduce credit/debit card misuse.

Fiscal officers and operations managers must acquaint themselves with the information found on this page and the PCI-DSS Procedures pages (insert links accordingly).  That information should be incorporated as part of training provided to staff who are processing transactions.    

Procedure

To accept cards for payment:

Card Present (in person purchase) – Chip Cards

  1. Ask customer to insert card into the chip ready device and leave the card in the device during the entire transaction.
  2. The chip card and terminal will determine if a PIN or signature is required for verification.
  3. If a PIN is required, the device prompts the customer to enter it. (When a PIN-based transaction is approved, the customer retrieves the chip card from the terminal. There is no opportunity for you to examine the card.)
  4. If the transaction is PIN-verified, there is no need for a signature.
  5. If the customer does not know their PIN, ask for another form of payment.
  6. Print a copy of the transaction receipt for the customer.
  7. If the transaction is not PIN-based, the receipt will have a signature line for the customer to sign.
  8. Ask the customer for their card to compare signatures from the receipt and the back of the chip card. Do not accept an unsigned card.

Card Present (in person purchase) – Magnetic Stripe Cards

  1. Make sure the card is signed.
  2. Hold the card through the entire transaction.
  3. Insert the card only once unless prompted to do otherwise by the device.  
  4. Print the sales receipt.
  5. Obtain the customer's signature and compare it to the signature on the card. If the receipt signature differs significantly from the card's signature, ask to see another form of photo identification.

Card Not Present (mail, telephone, or web order)

Most of the safeguards for card not present purchases are embedded in the software or terminal. When you process the transaction, the system or terminal will prompt you to enter information, such as the customer's billing address and the card security code, which is designed to reduce fraud.

If your department has an e-commerce website, do not enter card information for customers or accept payment information by email, chat, instant message or any similar messaging technology, as that increases security risks. Direct the customer to your sales website and to make the purchase for themselves.

Respond to Chargebacks (Disputed Transactions)

Cardholders have the right to dispute transactions they claim were not authorized or were charged in error. Disputed transactions that remain unresolved can negatively affect the ability of the University to continue accepting credit/debit cards.

To respond to disputed transactions:

  1. When a cardholder disputes a charge with their financial institution, the Office of the Bursar is contacted.
  2. The Office of the Bursar provides transaction details to the dispute resolution contact at the merchant department. They ask the department to provide supporting documentation (copy request) regarding the transaction.
  3. The department dispute resolution contact has 2 business days to respond with the requested documentation. There is no grace period. If you miss this deadline, the revenue from the transaction will be debited from your department's account.
  4. The Office of the Bursar forwards the documentation (rebuttal) to the financial institution who reviews it and makes a decision. The department may be asked to provide additional information.
  5. The disputed transaction is decided in favor of either the merchant department or the customer. The Office of the Bursar posts any adjustments to the department's account.

Refund a Transaction

When an item or service is purchased using a credit or debit card and a refund is necessary, the refund must be credited to the same card account from which the purchase was made.

To refund a transaction:

  • Process the refund through the same technology used to make the original sale (for example, terminal, web, Point of Sale (POS) system).
  • Always credit the same card account used in the original sale. Do not issue cash or a check.
  • Do not refund more than the amount of the original sale. Do not consolidate multiple refunds in one transaction because that can cause the transaction to be flagged as possible fraud.

 

Reconcile Credit/Debit Card Transactions

The Office of the Bursar posts receipt transactions to Oracle each business day. Departments must reconcile their internal sales records with the amounts posted to Oracle regularly. Departments must also perform a monthly reconciliation to ensure that sales log matches the amounts posted to the Oracle general ledger. Reconcile all accounts to be sure all revenue has been posted properly in Oracle. If there is a discrepancy, contact the Office of the Bursar as soon as possible at cashier@ohio.edu.       

 

Keeping Merchant Card Records

Records are official and trustworthy documents used for accountability and transparency. Requirements for retaining records are mandated by federal and state laws and regulations. Merchant card records consist of documentation of orders, sales receipts, settlement reports, and Payment Card Industry (PCI) self-assessment questionnaires (SAQs) and related documents.

Your department must retain sales receipts and order forms in a PCI-compliant manner. Retain these records for the current fiscal year and 4 previous fiscal years. Destroy records from these expired records as is convenient, but at least every month. Card numbers should be redeacted immediately upon processing a transaction. If a transaction is being disputed, keep the transaction records until the dispute is resolved even if the 12 month period has expired.

For assistance, consult the Office of the Bursar.

Redaction

Redaction is the process of removing sensitive or classified information from a document before it is stored.

To redact information from a paper document:

  1. Before scanning a document (use either of the following methods):
    • Physically cut out all the text to be redacted and dispose of the clippings by cross-cut shredding or by using an officially approved document destruction service, such as Shred-It.
    • Use opaque tape or paper to completely cover over the sections to be redacted.
  2. After completely cutting out or covering the text to be redacted, copy or scan the document, making sure no un-redacted sensitive personal information is visible; use the resulting copy or image.

Insufficient redaction methods

Do not use the following methods to redact information from documents, as they are insufficient:

  • Changing text color: Changing the redacted text's font color to match the document's background color leaves the redacted text easily discoverable to anyone who clicks and drags over the area using a mouse.
  • Covering or highlighting text: Covering redacted text with images or comments, or highlighting text with a matching color, leaves the redacted text discoverable.
  • Deleting only visible data: Digital files retain embedded and hidden metadata containing revision history and other information. Metadata can reveal anything that was contained in the file at any time, even text that was previously deleted or changed, and even if the file was re-saved. Metadata can be useful for tracking revisions, but if it is not purged from the document, anyone can view deleted information, even after the document has been converted to PDF format.
  • White Out or Correction Tape: The white out or correction tape can be removed from the document exposing the sensitive data.
  • Black marker: A hard copy of a document redacted with black marker may still provide enough image detail to enable someone to see what was assumed hidden; this method is especially risky if that same data repeats multiple times across a document.

Payment Card Acceptance Requirements

IN PERSON
The card must be swiped through (magnetic), inserted (chip), or tapped on a card processing terminal or PIN pad. Follow the prompts given by the terminal or PIN pad. Do not keep any card information after a transaction has completed.

PHONE
Card and account information can be keyed into the card processing terminal. Follow the prompts given by the terminal. If any card information is written down while entering a transaction, that information must be shredded once the transaction has been completed.

FAX
Most PC-based FAX software does not provide a secure repository for storing incoming FAXes, therefore the best method to accept card information is by a standalone FAX machine in a controlled location. Treat these FAXes the same way as you would treat cash.

Card information can be keyed into the card processing terminal. Follow the prompts given by the terminal. Once a transaction is complete, the card information on the FAX must be redacted . If an entire FAX must be kept, removing  the card information from the document is preferable.

MAIL
Card information can be keyed into a card processing terminal. Follow the prompts given by the terminal. Once a transaction is complete, the part of the mailed form containing card information must be redacted.

EMAIL
Card information must never be accepted in an email message. If a customer sends card information by email, delete that email, also deleting it from your deleted items or trash folder.  Send a response to the customer that card information is not accepted by email. In the response, give the customer a list of alternative methods of sending their card information (FAX, mail, phone, etc. ). When you reply to the original email, delete any card information that was provided before sending the message.

SMS TEXT MESSAGING
Card information must never be accepted in test messaging or any other type of instant messaging system.  If a customer sends card information in this manner, delete the message and send a response that card information is not accepted in that manner.  In the response, give the customer a list of alternative methods of sending their card information (FAX, mail, phone, etc.). Be certain when you reply that any card information has been deleted prior to submission.

FORM DESIGN TIP
When designing a form that will have an area to enter card information, put that section at the bottom of the form. After a payment has been processed, the bottom of the form can be cut or torn and then cross-cut shredded. Remove card information before scanning or imaging the form, or prepping for other long-term storage. Card information on paper being disposed  must always be shredded.

PROCESSING DELAY TIP
It is best to accept card information only when it can be processed immediately. If a delay is required and card information must be stored, do not store it in electronic format, and treat the paper containing card information as if it were cash.

 

Security

Protecting customers’ payment card information is more than a great  idea—it’s a requirement. Two sets of standards apply to merchant card-processing units:

  • The Payment Card Industry Data Security Standard (PCI DSS) is technical and operational requirements set by the PCI Security Standards Council to protect cardholder data. The PCI DSS applies to all business entities that store, process, or transmit cardholder data. The Council is responsible for managing these security standards, and compliance is enforced by the founding members' council: American Express, Discover Financial Services, Visa and MasterCard.
  • The PCI Information Security page  provides additions that relate to the PCI DSS.

It is each merchant department's responsibility to follow all policies and procedures in the PCI DSS, as well as those put in place by Ohio University. Merchants that do not follow these policies and procedures may lose the ability to accept card payments.

The Office of the Bursar and the Office of Information Technology Security Office are responsible for making sure that all university departments that accept payment cards (for the sale of goods or services) comply with all applicable data security standards. We conduct periodic reviews of each department's processing environment to ensure that all policies and procedures are being followed. As always, any business operation is subject to formal review by the Office of Internal Audit.

 

Become PCI Compliant

All department heads must ensure that their department follows the Payment Card Industry Data Security Standard (PCI DSS) to keep credit/debit card data secure. All departments must meet this standard or they will not be allowed to accept credit/debit cards.

Meeting this standard protects your department and the university. Data breaches can result in fines, penalties, loss of privileges from the credit/debit card processor, and damage to the university’s reputation. This standard also protects your customers. Data breaches can lead to identity theft and can result in lawsuits. In addition, customers are reluctant to shop at locations with a history of data breaches.

Procedure

To become PCI compliant, consult with the Office of the Bursar and the Office of Information Technology Security Office. They will help you determine your compliance in the areas below:

  • Build and maintain a secure network
  • Protect cardholder data
  • Maintain anti-virus software
  • Implement strong access control measures
  • Regularly monitor and test networks
  • Maintain an information security policy

Validate PCI Compliance Annually

All departments that accept credit/debit cards must follow the Payment Card Industry Data Security Standard (PCI DSS) for credit/debit card security. Departments must validate their compliance with the PCI Standard each year.

Before you change how you process credit/debit payments, contact the Office of the Bursar to ensure that you remain in compliance. You may need to re-validate your compliance before your next scheduled annual validation.

To validate PCI compliance annually:

  1. The department manager or designated contact receives an email reminder from the Office of the Bursar.
  2. Complete a Self-Assessment Questionnaire (SAQ).
  3. Confirm that all staff are staying current with their annual Payment Card Data Security training.
  4. The Office of the Bursar and the Office of Information Technology Security Office reviews the questionnaire and may contact the department if there are any outstanding issues.

Store Cardholder Data on Paper Securely

Because storing cardholder data on paper increases the risk of a security breach, avoid doing so unless you have a strong business need.

Procedure

To store cardholder data on paper securely:

  1. If you believe you have a business need to store cardholder data, consult with the Office of the Bursar to confirm your business need and determine the best method for storage.
  2. Follow these minimum PCI Standard for any paper that contains card information:
  • Store all materials containing cardholder information in a locked file cabinet, safe, or other secure storage mechanism in a restricted/secure area.
  • Never store sensitive authentication data such as CVC2/CVV2/CID or PIN after the sale has been processed.
  • Limit access to sales drafts, reports, or other sources of cardholder data to employees on a need-to-know basis
  • Make sure all identifying information is removed or redacted according to the guidelines in Keeping Merchant Card Records.
  • Show only the last four digits of the credit/debit card account number on printed receipts.
  • Conduct a periodic inventory of stored paper forms to account for all credit/debit transaction documents. When destroying paper forms that contain cardholder information, render them unreadable by incinerating or pulping them or by using a cross-cut shredder.
  • Do not store card information in any electronic system, including customer databases or spreadsheets.
  • Do not send card information on paper to a different physical location without using a secure courier service that will confirm safe delivery.

Payment Card Industry Standards

All University departments that accept payment cards must follow all the requirements in Payment Card Industry Data Security Standard v3.2 and in the PCI Information Security page.

The most essential documents for complying with PCI DSS are provided in the following list: