Document Feedback - Review and Comment
Step 1 of 4: Comment on Document
How to make a comment?
1. Use this to open a comment box for your chosen Section, Part, Heading or clause.
2. Type your feedback into the comments box and then click "save comment" button located in the lower-right of the comment box.
3. Do not open more than one comment box at the same time.
4. When you have finished making comments proceed to the next stage by clicking on the "Continue to Step 2" button at the very bottom of this page.
Important Information
During the comment process you are connected to a database. Like internet banking, the session that connects you to the database may time-out due to inactivity. If you do not have JavaScript running you will recieve a message to advise you of the length of time before the time-out. If you have JavaScript enabled, the time-out is lengthy and should not cause difficulty, however you should note the following tips to avoid losing your comments or corrupting your entries:
-
DO NOT jump between web pages/applications while logging comments.
-
DO NOT log comments for more than one document at a time. Complete and submit all comments for one document before commenting on another.
-
DO NOT leave your submission half way through. If you need to take a break, submit your current set of comments. The system will email you a copy of your comments so you can identify where you were up to and add to them later.
-
DO NOT exit from the interface until you have completed all three stages of the submission process.
(1) The Payment Card Industry Data Security Standards (PCI DSS) are a set of industry standards designed to mitigate the risks associated with handling payment card data, including fraud and identity theft. (2) PCI DSS applies to all entities involved in payment card processing, including merchants, processors, acquirers, issuers, and service providers. It promotes consistent security standards to protect cardholder data from fraud and security breaches by defining requirements for ICT systems, networks, and manual processes that handle payment card information. (3) This Policy applies to all University staff, contractors or other parties who, in the course of doing business on behalf of the University, are involved in processing, storing or transmitting payment card data. (4) In accordance with its merchant agreements with credit card providers, the University is obligated to protect cardholder information during payment transactions. This obligation ensures the security and confidentiality of cardholder data throughout the entire payment process. (5) The University is committed to safeguarding all payment card data it receives and ensuring compliance with PCI-DSS requirements. This includes securely using, storing, transmitting, and destroying payment card data to protect against unauthorised access and fraudulent activities. (6) To maintain PCI DSS compliance, the University must implement and uphold a comprehensive set of controls covering the twelve requirements, organised under six main categories within the entire Cardholder Data Environment (CDE): (7) Staff and connected third-parties must handle all cardholder data in a manner consistent with PCI DSS and this Policy. This includes adhering to the guidelines for the entire Cardholder Data Environment (CDE), which (8) Only authorised and properly trained staff may accept and/or access payment card information. (9) Staff accepting credit and debit card payments on behalf of La Trobe University must complete the online PCI Merchant (or similar) training module annually, with training records also retained locally. (10) The Senior Manager, Business Support Services is responsible for maintaining a list of authorised and trained staff which is reviewed on an annual basis. (11) All staff who complete training must agree to comply with all University policies and procedures as part of this training. (12) All requests to become an authorised and trained user must be made via a ASK Finance Request and will be assessed and approved on a case by case basis by the Senior Manager, Business Support Services. (13) The capability to accept and process payment card information can only be established through Finance Operations, after approval from the Senior Manager – Business Support Services. A listing of all such areas shall be maintained by Finance Operations - Business Support Services. (14) Payment card data will only be accepted by the University via the following methods: (15) Payments must not be accepted or processed if the cardholder provides payment card information via email. If such information is received: (16) Cardholder data received via telephone must be processed whilst the customer is on the line. Writing down a customer's payment card information to process later is prohibited and any calls that are recorded must be (17) The University does not condone receiving cardholder data on voicemail. In such instances: (18) To ensure maximum security during transmission, staff should use devices and systems that employ Point-to- Point Encryption (P2PE) or End-to-End Encryption (E2EE). (19) Cardholder data, including the Primary Account Number (PAN), must not be entered via a laptop or computer keyboard, or stored, processed, or transmitted on La Trobe University computers, including any portable devices such as USB flash drives, compact disks, personal digital assistants, tablets, or phones. (20) Hardcopy cardholder data must not be collected or stored in any format, including the Primary Account Number (PAN), expiry date, and credit card security codes (CVV, including CVV2, CVC2, and CID). Any digital storage of cardholder data must use strong encryption or tokenization methods to protect the data. Storing a partial PAN, such as the last four digits, is permitted but must still be handled securely to prevent unauthorised access. (21) EFTPOS machines and other devices used to collect cardholder data must be stored securely when not in use, either in a safe, locked filing cabinet, or with a PIN lock, and kept in a secure environment. Use tamper-evident stickers across the seams of the EFTPOS terminals if available. (22) Any suspected or perceived tampering or substitution of EFTPOS devices must be immediately reported to the (23) All service providers and third-party vendors that provide payment card services on behalf of the University must be PCI DSS compliant. (24) Contracts with service providers and third-party vendors should include a statement requiring the vendor to maintain PCI DSS compliance, provide annual proof of compliance, and immediately notify the University in writing of any PCI DSS breach. (25) All suspected breaches must immediately be reported to the IS Service Desk via ASK IS or on telephone number (03) 9479 1500. The IS Service Desk will report all actual or suspected incidents to Finance. Finance, in coordination with IS, will assess the incident, initiate an appropriate investigation, and determine any remedial or corrective actions required in accordance with applicable policies and procedures. (26) The Chief Financial Officer (or their nominee) is responsible for: (27) The Chief Information Officer (or their nominee) is responsible for: (28) Any suspected or perceived breach involving the disclosure, theft, or misuse of payment card information must be immediately reported to the Senior Manager – Business Support Services or other Finance Director. Based on investigative findings, the CFO will decide if other entities need to be notified of the breach (e.g., card associations, merchant bank, cardholders). (29) Any incidents also need to be reported to the University’s Compliance Manager via compliance@latrobe.edu. (30) Any request for an exemption from this Policy should be referred to the Senior Manager – Business Support Services or other Finance Director for review and recommendation to the Chief Financial Officer for approval. Any such exemptions are to be fully documented and retained in La Trobe's record management system. (31) For the purpose of this Policy and Procedure: (32) This Policy is made under the La Trobe University Act 2009.Payment Card Industry Data Security Standards (PCI DSS) Policy
Section 1 - Key Information
Top of Page
Policy Type and Approval Body
Administrative – Vice-Chancellor
Accountable Executive – Policy
Chief Financial Officer
Responsible Manager – Policy
Senior Manager, Business Support Services
Review Date
23 May 2028
Section 2 - Purpose
Section 3 - Scope
Section 4 - Key Decisions
Top of Page
Key Decisions
Role
Authorise users and areas to handle payment card data.
Determine notification requirements for any detected or suspected breaches of payment card data,
Chief Financial Officer
Section 5 - Policy Statement
Build and maintain a secure
network and systems
Do not use vendor-supplied defaults for system passwords and other security parameters
Protect cardholder data
Encrypt transmission of cardholder data across open, public networks
Maintain a vulnerability
management program
Develop and maintain secure systems and applications
Implement strong access control measures
Assign a unique ID to each person with computer access
Restrict physical access to cardholder data
Regularly monitor and test networks
Regularly test security systems and processes
Maintain an information security policy
Maintain a policy that addresses information security for all personnel
Section 6 - Procedures
encompasses the people, processes, and technology involved in storing, processing, or transmitting cardholder
data or sensitive authentication data.Part A - Staff Handling Payment Card Data
Part B - Accepting Payment Cards
Part C - Acceptable Payment Methods
paused if a customer needs to provide their cardholder details.
PCI-compliant secure device immediately and then delete the message.Part D - Processing or Transmitting Cardholder Data using La Trobe
Part E - Storing Cardholder Data
Part F - Cardholder Data Collected Through EFTPOS Machines
Senior Manager – Business Support Services or other Finance Director.Part G - Service Providers and Third-Party Vendors
Part H - Incident Response
Part I - Ongoing Compliance Requirements
EFTPOS terminals;
requirements and University policies, in coordination with relevant business units and Information Services;
vulnerabilities, and supporting the development and implementation of remediation plans as needed;
Part J - Breaches
Part K - Exemptions
Section 7 - Definitions
Top of Page
support.Section 8 - Authority and Associated Information