PCI Security Standards Council Issues Best Practices for Mobile Payment Acceptance Security
Time 2 Minute Read

On September 13, 2012, the PCI Security Standards Council (“PCI SSC”) issued new guidelines entitled “PCI Mobile Payment Acceptance Security Guidelines” (the “Guidelines”), which outline best practices for mobile payment acceptance security. As we reported in May, the PCI SSC Mobile Working Group published its “At a Glance: Mobile Payment Acceptance Security” fact sheet, detailing how merchants can more securely accept payments on mobile devices.

The Guidelines set forth guidance for securing the actual payment transaction and preserving the integrity of the broader mobile application platform environment. The Guidelines provide a number of recommendations intended to address the main risks associated with mobile payment transactions, including account data entering the device, account data residing in the device, and account data leaving the device. These recommendations include:

  • Ensuring account data is appropriately encrypted before it enters the mobile device (e.g., via a validated PCI Point-to-Point Encryption (“P2PE”) solution);
  • Ensuring a trusted path exists between the data entry mechanism and that mobile device to help prevent unauthorized parties from intercepting the data;
  • Ensuring that account data is only processed within a “trusted execution environment” and adopting a data-leakage prevention methodology based on industry best practices; and
  • Encrypting data in accordance with the Payment Card Industry Data Security Standard (“PCI DSS”) prior to transmitting the data outside of the trusted execution environment.

With respect to securing the mobile platform and application environment, the PCI SSC advises merchants to implement a number of security measures, including developing server-side controls and reporting unauthorized access attempts; implementing controls to prevent the escalation of device privileges; supporting a mechanism that permits the payment application to be disabled by the merchant or solution provider; developing a process for detecting and reporting device theft or loss; conforming mobile payment-acceptance applications to secure coding, engineering and testing conventions; and protecting against vulnerabilities through patch management and anti-malware products.

As we reported earlier this month, the Federal Trade Commission issued guidelines for mobile app developers. In addition, last month the National Telecommunications and Information Administration of the U.S. Department of Commerce initiated a multistakeholder process to develop guidance for transparency in the mobile environment.

You May Also Be Interested In

Time 3 Minute Read

The Federal Trade Commission has issued a new Policy Statement encouraging the adoption of robust age‑verification technologies by pledging not to bring enforcement actions under the COPPA Rule against operators of general‑ or mixed‑audience sites that collect, use or disclose personal information solely to determine users’ ages, so long as long as they follow strict safeguards.

Time 1 Minute Read

On February 6, 2026, the Federal Trade Commission announced its second report to Congress on its efforts to combat ransomware and other cyber attacks.

Time 2 Minute Read

On January 28, 2026, the U.S. Federal Trade Commission held a workshop entitled “Protecting American Children: A Workshop to Explore Age Verification Technologies.”

Time 1 Minute Read

On January 28, 2026, the Federal Trade Commission will hold a public workshop on age verification technologies.

Search

Subscribe Arrow

Recent Posts

Categories

Tags

Archives

Jump to Page