E13PA

[et_pb_section bb_built=”1″ admin_label=”section” custom_padding=”0px|0px|0px|0px” fullwidth=”on” _builder_version=”3.0.47″][et_pb_fullwidth_header title=”EI3PA Compliance ” background_layout=”dark” text_orientation=”center” header_scroll_down=”on” scroll_down_icon=”%%3%%” button_one_url=”http://www.mdsny.com/contact/” _builder_version=”3.0.63″ title_font_size=”63px” content_font_size=”26px” subhead_font=”Droid Sans||||” subhead_font_size=”31px” background_color=”#2d3743″ background_image=”https://www.mdsny.com/wp-content/uploads/2017/07/dreamstime_xxl_11130855.jpg” background_blend=”overlay”]

Ensure Your Consumer Credit Information from Experian is Secure and Compliant With Industry Regulations

[/et_pb_fullwidth_header][/et_pb_section][et_pb_section bb_built=”1″ admin_label=”section” custom_padding=”54px|0px|9px|0px” _builder_version=”3.0.47″][et_pb_row admin_label=”row” custom_padding=”0px|0px|0px|0px” background_color=”#ffffff” _builder_version=”3.0.47″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”1_2″][et_pb_text _builder_version=”3.0.47″ text_line_height=”1.5em” header_line_height=”1.2em” background_size=”initial” background_position=”top_left” background_repeat=”repeat”]

Meeting industry standards for the protection of consumer credit information is a critical security requirement if you store, process, transmit, or provide data from the credit bureau, Experian.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″][et_pb_text text_orientation=”center” _builder_version=”3.0.47″ text_font=”||||” text_font_size=”58px” background_size=”initial” background_position=”top_left” background_repeat=”repeat”]

   Is Your Organization Prepared?

[/et_pb_text][et_pb_button button_url=”http://www.mdsny.com/contact/” button_text=”Find Out Now” button_alignment=”center” _builder_version=”3.0.47″ custom_button=”on” button_text_size=”27px” button_text_color=”rgba(0,0,0,0.95)” button_border_width=”2px” button_border_color=”#0c000c” button_border_radius=”1px” button_text_color_hover=”#ffffff” button_bg_color_hover=”#3dacb6″ background_color=”#7EBEC5″ /][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ admin_label=”section” custom_padding=”10px|0px|45px|0px” _builder_version=”3.0.47″][et_pb_row admin_label=”row” make_fullwidth=”on” custom_padding=”27px|0px|0px|0px” _builder_version=”3.0.47″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″][et_pb_text _builder_version=”3.0.47″ text_font=”Droid Sans||||” text_font_size=”21px” text_text_color=”#2b2b2b” text_line_height=”1.8em” background_size=”initial” background_position=”top_left” background_repeat=”repeat”]

In 2009, Experian created a set of requirements to promote stronger protection of consumer credit information. These requirements are known as the Experian Independent Third Party Assessment (EI3PA) standard. EI3PA is based on the Payment Card Industry Data Security Standard (PCI DSS) and establishes 12 requirements for organizations to comply with to protect data supplied by Experian. It also mandates that all organizations have a qualified security assessor (QSA) perform a third-party audit to demonstrate compliance.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ admin_label=”section” background_color=”#e6eaea” custom_padding=”28px|0px|0px|0px” _builder_version=”3.0.47″][et_pb_row admin_label=”row” make_fullwidth=”on” custom_padding=”0px|0px|1px|0px” background_color=”#e6eaea” _builder_version=”3.0.47″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″][et_pb_text _builder_version=”3.0.47″ text_font=”Droid Sans||||” text_font_size=”20px” text_text_color=”#2b2b2b” text_line_height=”1.5em” background_size=”initial” background_position=”top_left” background_repeat=”repeat”]

Who is Affected?

The EI3PA came about because Experian wanted to make sure that credit history information shared with their partners was secured appropriately. Rather than create their own standard starting from scratch they just grabbed the PCI Data Security Standard (PCI DSS).  The PCI DSS outlines controls that should be in place to protect card holder data (credit card numbers).  In this case instead of applying to credit card data each control applies to credit history information.  This means a third party handling Experian credit histories will need to comply with each of the 12 PCI DSS Requirements.  The requirement categories are (just replace “cardholder” with “credit history”):

 

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ admin_label=”section” custom_padding=”0px|0px|54px|0px” _builder_version=”3.0.47″][et_pb_row admin_label=”row” make_fullwidth=”on” parallax_method_1=”off” module_id=”#my-accordion” _builder_version=”3.0.47″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″][et_pb_text _builder_version=”3.0.47″ text_font=”Droid Sans||||” text_font_size=”21px” text_text_color=”#2b2b2b” text_line_height=”1.4em” background_size=”initial” background_position=”top_left” background_repeat=”repeat”]

The 12 Experian Independent Third Party Assessment (EI3PA) requirements:

[/et_pb_text][et_pb_toggle title=”Build and Maintain a Secure Network” open_toggle_background_color=”#e6eaea” open_toggle_text_color=”#2b2b2b” closed_toggle_background_color=”#2b2b2b” _builder_version=”3.0.47″ title_font=”Droid Sans|on|||” title_font_size=”20px” title_text_color=”#ffffff” body_font=”Droid Sans||||” body_font_size=”17px” body_text_color=”#2d3743″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”]

Requirement 1: Install and maintain a firewall configuration to protect cardholder data

Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters

[/et_pb_toggle][/et_pb_column][/et_pb_row][et_pb_row admin_label=”row” make_fullwidth=”on” parallax_method_1=”off” module_id=”#my-accordion” _builder_version=”3.0.47″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″][et_pb_toggle title=”Protect Cardholder Data” open_toggle_background_color=”#e6eaea” open_toggle_text_color=”#2b2b2b” closed_toggle_background_color=”#2b2b2b” _builder_version=”3.0.47″ title_font=”Droid Sans|on|||” title_font_size=”20px” title_text_color=”#ffffff” body_font=”Droid Sans||||” body_font_size=”17px” body_text_color=”#2d3743″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”]

Requirement 3: Protect stored cardholder data

Requirement 4: Encrypt transmission of cardholder data across open, public networks

[/et_pb_toggle][/et_pb_column][/et_pb_row][et_pb_row admin_label=”row” make_fullwidth=”on” parallax_method_1=”off” module_id=”#my-accordion” _builder_version=”3.0.47″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″][et_pb_toggle title=”Maintain a Vulnerability Management Program” open_toggle_background_color=”#e6eaea” open_toggle_text_color=”#2b2b2b” closed_toggle_background_color=”#2b2b2b” _builder_version=”3.0.47″ title_font=”Droid Sans|on|||” title_font_size=”20px” title_text_color=”#ffffff” body_font=”Droid Sans||||” body_font_size=”17px” body_text_color=”#2d3743″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”]

Requirement 5: Use and regularly update anti-virus software or programs

 

Requirement 6: Develop and maintain secure systems and applications

 

[/et_pb_toggle][/et_pb_column][/et_pb_row][et_pb_row admin_label=”row” make_fullwidth=”on” parallax_method_1=”off” module_id=”#my-accordion” _builder_version=”3.0.47″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″][et_pb_toggle title=”Implement Strong Access Control Measures” open_toggle_background_color=”#e6eaea” open_toggle_text_color=”#2b2b2b” closed_toggle_background_color=”#2b2b2b” _builder_version=”3.0.47″ title_font=”Droid Sans|on|||” title_font_size=”20px” title_text_color=”#ffffff” body_font=”Droid Sans||||” body_font_size=”17px” body_text_color=”#2d3743″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”]

Requirement 7: Restrict access to cardholder data by business need to know

Requirement 8: Assign a unique ID to each person with computer access

Requirement 9: Restrict physical access to cardholder data

[/et_pb_toggle][/et_pb_column][/et_pb_row][et_pb_row admin_label=”row” make_fullwidth=”on” parallax_method_1=”off” module_id=”#my-accordion” _builder_version=”3.0.47″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″][et_pb_toggle title=”Regularly Monitor and Test Networks” open_toggle_background_color=”#e6eaea” open_toggle_text_color=”#2b2b2b” closed_toggle_background_color=”#2b2b2b” _builder_version=”3.0.47″ title_font=”Droid Sans|on|||” title_font_size=”20px” title_text_color=”#ffffff” body_font=”Droid Sans||||” body_font_size=”17px” body_text_color=”#2d3743″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”]

Requirement 10: Track and monitor all access to network resources and cardholder data

Requirement 11: Regularly test security systems and processes

 

[/et_pb_toggle][/et_pb_column][/et_pb_row][et_pb_row admin_label=”row” make_fullwidth=”on” parallax_method_1=”off” module_id=”#my-accordion” _builder_version=”3.0.47″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″][et_pb_toggle title=”Maintain an Information Security Policy” open_toggle_background_color=”#e6eaea” open_toggle_text_color=”#2b2b2b” closed_toggle_background_color=”#2b2b2b” _builder_version=”3.0.47″ title_font=”Droid Sans|on|||” title_font_size=”20px” title_text_color=”#ffffff” body_font=”Droid Sans||||” body_font_size=”17px” body_text_color=”#2d3743″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”]

Requirement 12: Maintain a policy that addresses information security for all personnel

 

[/et_pb_toggle][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ admin_label=”section” background_color=”#e6eaea” custom_padding=”24px|0px|0px|0px” _builder_version=”3.0.63″][et_pb_row admin_label=”row” custom_padding=”15px|0px|28px|0px” _builder_version=”3.0.47″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″][et_pb_cta title=”Don’t Wait Until the Last Minute to Meet New Compliance Standards!” button_url=”http://www.mdsny.com/contact/” button_text=”Learn More” use_background_color=”off” background_layout=”light” _builder_version=”3.0.63″ header_font=”Droid Sans|on|||” header_font_size=”30px” body_font=”Droid Sans||||” body_font_size=”19px” background_size=”initial” background_position=”top_left” background_repeat=”repeat”]

Contact a MDS today to receive expert guidance on how to get your security program up and running.

[/et_pb_cta][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section bb_built=”1″ admin_label=”Blurb” background_color=”#2d3743″ inner_shadow=”on” custom_padding=”40px|0px|0px|0px” make_fullwidth=”on” _builder_version=”3.0.63″ global_module=”118956″][et_pb_row admin_label=”row” global_parent=”118956″ make_fullwidth=”on” custom_padding=”0px|0px|17px|0px” background_color=”#2d3743″ background_position_1=”top_left” background_position_2=”top_left” background_position_3=”top_left” background_repeat_1=”no-repeat” background_repeat_2=”no-repeat” background_repeat_3=”no-repeat” _builder_version=”3.0.63″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”1_2″][et_pb_blurb global_parent=”118956″ background_layout=”dark” _builder_version=”3.0.63″ header_font=”Droid Sans||||” header_font_size=”26px” header_text_color=”#d1d1d1″ body_font=”Droid Sans||||” body_font_size=”16px” body_text_color=”#dfdfdf” background_size=”initial” background_position=”top_left” background_repeat=”repeat” inline_fonts=”Droid Sans”]

Our Pledge:

Building out and maintaining your IT ecosystem doesn’t have to be a do-it-yourself project. MDS can help identify network issues, configure devices, and optimize your infrastructure to maximize efficiency and performance. Our consultants are highly trained technology specialists that understand the complexities of multi-vendor environments and have the knowledge and skills to help your business become more agile, customer-focused and operationally efficient.

[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_4″][et_pb_blurb global_parent=”118956″ background_layout=”dark” _builder_version=”3.0.63″ header_font_size=”26px” header_text_color=”#d1d1d1″ body_font=”Droid Sans||||” body_font_size=”16px” body_text_color=”#dbdbdb” background_size=”initial” background_position=”top_left” background_repeat=”repeat”]

Upcoming Events:

Ransomware is on the rise: let’s talk about how to stay safe over some wine!

[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_4″][et_pb_blurb global_parent=”118956″ background_layout=”dark” _builder_version=”3.0.63″ header_font_size=”26px” header_text_color=”#d1d1d1″ body_font=”Droid Sans||||” body_font_size=”16px” body_text_color=”#dfdfdf” background_size=”initial” background_position=”top_left” background_repeat=”repeat”]

Contacts: |

NYC Headquarters:
307 West 38th Street, Suite 1801
New York, NY 10018
Tel: 646-744-1000

Miami Office:
Tel: 786-899-2980
San Juan Office: Tel: 646-460-6229

Email
: contactus@mdsny.com

[/et_pb_blurb][/et_pb_column][/et_pb_row][/et_pb_section]