A bank card security breach can manifest itself in a variety of different ways. Below we have detailed six potential security breachs that Merchants must remain aware of.
If forms and documentation related to a commercial transaction have been tampered with, accessed inappropriately, or removed without consent, Western's Security Breach Protocol should be followed.
If the Merchant suspects that POS device(s) have been tampered with, Western's Security Breach Protocol should be followed.
If at any time the Merchant suspects that internal systems have been accessed inappropriately or if the Merchant suspects that data might have been altered, deleted, or compromised, Western's Security Breach Protocol should be followed.
In the case where forms or documentation has gone missing, paperwork has been misplaced, or records are absent from a data system and the Merchant does not think that a compromise has occurred, Western's Security Breach Protocol should be followed.
If the Merchant suspects a data system has been breached or has been targeted for hacking, Western's Security Breach Protocol should be followed.
Similar to the Technical Breach, if the Merchant suspects that there is an unauthorized technology component present in the PCI environment, Western's Security Breach Protocol should be followed.