Network Computing

12 Musts for Your EFT Program
October 9, 2007

Identity-theft issues online have prompted regulatory bodies and certain U.S. states to create rules and laws governing the protection of personal information and the proper procedure for reporting a data breach. Drilling down on this issue is Andrew Conry-Murray, business editor at Network Computing magazine and author of “The Symantec Guide to Home Internet Security,” in an article published on TechSoup.org — a hub of technology information and assistance for nonprofit organizations. The article specifically looks at the security requirements that pertain to most nonprofit organizations that process credit card transactions online. According to Conry-Murray, nonprofits should familiarize themselves with the Payment Card