What is PCI DSS?
PCI DSS stands for Payment Card Industry Data Security Standard. It is a set of security requirements designed to protect cardholder data wherever it is stored, processed, or transmitted. Any organisation that accepts, processes, or handles card payments must comply with PCI DSS.
What PCI DSS Covers
PCI DSS stands for Payment Card Industry Data Security Standard. It is a set of security rules that exist for one reason: to stop criminals stealing card payment data. The standard was created by the five major card brands -- Visa, Mastercard, American Express, Discover, and JCB -- who formed the Payment Card Industry Security Standards Council (PCI SSC) in 2006 to manage and update the rules.
First published in 2004, PCI DSS establishes a baseline of security controls that every organisation handling card data must follow. It does not matter whether you are a multinational retailer processing millions of transactions or a two-person business taking the occasional phone payment. If card data passes through your systems, PCI DSS applies to you.
The 12 Requirements
PCI DSS is built around 12 core requirements, grouped into six practical categories. Think of them as layers of defence -- each one addresses a different way that card data could be compromised.
Build and Maintain a Secure Network
- Install and maintain network security controls such as firewalls and security groups to keep unauthorised traffic out
- Change all vendor-supplied default passwords and security settings before deploying any system -- attackers try default credentials first
Protect Account Data
- Protect stored cardholder data using encryption and strict access controls so that even if someone gets into your systems, the data is unreadable
- Encrypt cardholder data whenever it travels across open or public networks -- for example, between a call centre and a payment gateway
Maintain a Vulnerability Management Programme
- Use and regularly update anti-virus and anti-malware software across all systems
- Keep applications and systems patched and up to date, because known vulnerabilities are the easiest way in for attackers
Implement Strong Access Control
- Restrict access to cardholder data strictly on a need-to-know basis -- if someone does not need the data to do their job, they should not have access
- Assign unique user IDs so that every action on every system can be traced to a specific person
- Control physical access to servers, offices, and data centres where cardholder data is stored
Regularly Monitor and Test Networks
- Log and monitor all access to network resources and cardholder data -- if something suspicious happens, you need to know about it quickly
- Test security systems and processes regularly through vulnerability scans and penetration testing
Maintain an Information Security Policy
- Document and maintain a security policy that covers all personnel, contractors, and third parties with access to your environment
Why PCI DSS Exists
Before PCI DSS, each card brand had its own separate security programme. Merchants had to juggle different requirements from Visa, Mastercard, and the rest, often duplicating effort and creating gaps. PCI DSS unified these into a single standard that applies universally, making it clearer for businesses to understand what they need to do.
The underlying goal is straightforward: if every organisation that touches card data follows the same minimum security standards, the chances of a data breach drop significantly. And when breaches do happen, the damage is contained because the data is encrypted, access is limited, and there are logs to trace what happened.
PCI DSS Versions
The standard evolves as threats change. PCI DSS v4.0, released in March 2022, brought significant updates including more flexible approaches to meeting requirements, stronger authentication standards, and a greater focus on continuous security rather than point-in-time compliance. Organisations had until 31 March 2025 to fully transition to v4.0.
Compliance Levels
Merchants are grouped into four levels based on their annual transaction volume. Level 1 merchants -- those processing over six million card transactions per year -- face the most rigorous requirements, including an annual on-site audit by a Qualified Security Assessor (QSA). Smaller merchants can validate compliance through self-assessment questionnaires (SAQs), which are less intensive but still mandatory.
Service providers that store, process, or transmit card data on behalf of merchants have their own compliance requirements, typically assessed at Level 1 regardless of volume.
PCI DSS and Telephone Payments
Telephone payments present a unique challenge for PCI DSS compliance. When a customer reads their card number to an agent, or enters it on their phone keypad, that data passes through the voice channel. Call recordings capture it. Agents hear it. Screens may display it. All of these touchpoints bring systems into PCI DSS scope.
This is why technologies like DTMF masking have become essential for businesses that take payments over the phone. By preventing card data from entering the agent environment, these solutions remove entire swathes of infrastructure from the scope of PCI DSS assessment -- a process known as descoping.
Consequences of Non-Compliance
Failing to comply with PCI DSS carries real consequences. Card brands can impose fines ranging from several thousand to hundreds of thousands of pounds per month. Your acquiring bank may increase your transaction processing fees or, in serious cases, terminate your merchant agreement entirely -- meaning you can no longer accept card payments.
Beyond the financial penalties, a data breach caused by poor security can devastate customer trust. Businesses that suffer breaches often see customer churn, negative press coverage, and long-term reputational damage that takes years to recover from. For many organisations, the cost of non-compliance far outweighs the investment required to get compliant in the first place.
Paytia is certified to PCI DSS Level 1, the highest level of security certification in the payment card industry. This means Paytia's platform has been independently audited and verified to meet every one of the 12 PCI DSS requirements.
By routing card payment data through Paytia's certified infrastructure, businesses can remove their own contact centres and telephony systems from PCI DSS scope entirely. This approach -- known as descoping -- means organisations do not need to secure every agent workstation, call recording server, or network segment against the full weight of PCI DSS requirements.
For more detail on how Paytia helps businesses meet their compliance obligations, see our PCI DSS compliance page.
Frequently Asked Questions
Who needs to comply with PCI DSS?
Any organisation that stores, processes, or transmits payment card data must comply with PCI DSS. This includes retailers, online shops, call centres, service providers, and any business that accepts card payments -- regardless of size or transaction volume.
What is the difference between PCI DSS Level 1 and other levels?
PCI DSS Level 1 applies to organisations processing over six million card transactions per year, or any service provider handling large volumes of card data. Level 1 requires an annual on-site audit by a Qualified Security Assessor. Lower levels (2 through 4) allow self-assessment questionnaires, which are less rigorous but still mandatory.
What happens if my business is not PCI DSS compliant?
Non-compliance can lead to fines from card brands ranging from thousands to hundreds of thousands of pounds per month. You may also face higher transaction processing fees, and in serious cases, your acquiring bank may revoke your ability to accept card payments altogether.
See how Paytia handles pci dss
Book a personalised demo and we'll show you how our platform works with your setup.
Trusted by law firms, insurers, healthcare providers and regulated businesses worldwide. Learn more about Paytia