Outbound Telemarketing

Work with Us.

Become an Agent. Join the Falcon Team.

PREV
NEXT

Give us a call. We'd love to speak with you.

PCI Compliance

Keeping your donor information safe and secure.

Secure Payment Concept

Falcon Fundraising, Inc. is PCI Compliant.

The safety and security of cardholder data is of paramount importance to Falcon Fundraising, Inc. We adhere to a strict set of standards and protocols to protect cardholder information and maintain our PCI compliance. Falcon Fundraising, Inc. never stores cardholder information. Pledges are entered directly into your PCI compliant web portal, ensuring the safest and most secure method of completing each transaction.

 

Falcon Fundraising, Inc. has been designated compliant with PCI DSS SAQ D v 3.1, as a Level 2 Service Provider.

The most recent copy of our PCI Documentation (including SAQ, internal/external vulnerability scans and penetration tests) is available upon request.

 

About PCI Compliance

The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle cardholder information, and is mandated by the major credit card brands (Visa, MasterCard, American Express, Discover, etc.), and administered by the Payment Card Industry Security Standards Council.  PCI standards were created to increase controls around cardholder data to decrease credit card fraud, and are applied to any organization that handles cardholder information. The PCI Data Security Standard is a multilayered security standard and includes requirements for security management, procedures, internal policies, network architecture, software design and other critical protective measures.

The PCI Security Standard includes 12 requirements for compliance, grouped into six control objectives. Each level of PCI compliance must:

  • Build and maintain a secure network
  • Protect cardholder data
  • Maintain a vulnerability management program
  • Implement strong access control measures
  • Regularly monitor and test networks
  • Maintain an information security policy
TOP