Monday - Friday 8AM - 8PM, Saturday 10AM - 6PM  +855-458-2276

What's Your Life Worth?

Terms and Conditions

Terms of service

OVERVIEW
This website is operated by Tactical Society. Throughout the site, the terms “we”, “us” and “our” refer to Tactical Society. Tactical Society offers this website, including all information, tools and services available from this site to you, the user, conditioned upon your acceptance of all terms, conditions, policies and notices stated here.

By visiting our site and/ or purchasing something from us, you engage in our “Service” and agree to be bound by the following terms and conditions (“Terms of Service”, “Terms”), including those additional terms and conditions and policies referenced herein and/or available by hyperlink. These Terms of Service apply to all users of the site, including without limitation users who are browsers, vendors, customers, merchants, and/ or contributors of content.


Please read these Terms of Service carefully before accessing or using our website. By accessing or using any part of the site, you agree to be bound by these Terms of Service. If you do not agree to all the terms and conditions of this agreement, then you may not access the website or use any services. If these Terms of Service are considered an offer, acceptance is expressly limited to these Terms of Service.

Any new features or tools which are added to the current store shall also be subject to the Terms of Service. You can review the most current version of the Terms of Service at any time on this page. We reserve the right to update, change or replace any part of these Terms of Service by posting updates and/or changes to our website. It is your responsibility to check this page periodically for changes. Your continued use of or access to the website following the posting of any changes constitutes acceptance of those changes.

Our store is hosted on Shopify Inc. They provide us with the online e-commerce platform that allows us to sell our products and services to you.

SECTION 1 - ONLINE STORE TERMS
By agreeing to these Terms of Service, you represent that you are at least the age of majority in your state or province of residence, or that you are the age of majority in your state or province of residence and you have given us your consent to allow any of your minor dependents to use this site.
You may not use our products for any illegal or unauthorized purpose nor may you, in the use of the Service, violate any laws in your jurisdiction (including but not limited to copyright laws).
You must not transmit any worms or viruses or any code of a destructive nature.
A breach or violation of any of the Terms will result in an immediate termination of your Services.

SECTION 2 - GENERAL CONDITIONS
We reserve the right to refuse service to anyone for any reason at any time.
You understand that your content (not including credit card information), may be transferred unencrypted and involve (a) transmissions over various networks; and (b) changes to conform and adapt to technical requirements of connecting networks or devices. Credit card information is always encrypted during transfer over networks.
You agree not to reproduce, duplicate, copy, sell, resell or exploit any portion of the Service, use of the Service, or access to the Service or any contact on the website through which the service is provided, without express written permission by us.
The headings used in this agreement are included for convenience only and will not limit or otherwise affect these Terms.

SECTION 3 - ACCURACY, COMPLETENESS AND TIMELINESS OF INFORMATION
We are not responsible if information made available on this site is not accurate, complete or current. The material on this site is provided for general information only and should not be relied upon or used as the sole basis for making decisions without consulting primary, more accurate, more complete or more timely sources of information. Any reliance on the material on this site is at your own risk.
This site may contain certain historical information. Historical information, necessarily, is not current and is provided for your reference only. We reserve the right to modify the contents of this site at any time, but we have no obligation to update any information on our site. You agree that it is your responsibility to monitor changes to our site.

SECTION 4 - MODIFICATIONS TO THE SERVICE AND PRICES
Prices for our products are subject to change without notice.
We reserve the right at any time to modify or discontinue the Service (or any part or content thereof) without notice at any time.
We shall not be liable to you or to any third-party for any modification, price change, suspension or discontinuance of the Service.

SECTION 5 - PRODUCTS OR SERVICES (if applicable)
Certain products or services may be available exclusively online through the website. These products or services may have limited quantities and are subject to return or exchange only according to our Return Policy.
We have made every effort to display as accurately as possible the colors and images of our products that appear at the store. We cannot guarantee that your computer monitor's display of any color will be accurate.
We reserve the right, but are not obligated, to limit the sales of our products or Services to any person, geographic region or jurisdiction. We may exercise this right on a case-by-case basis. We reserve the right to limit the quantities of any products or services that we offer. All descriptions of products or product pricing are subject to change at anytime without notice, at the sole discretion of us. We reserve the right to discontinue any product at any time. Any offer for any product or service made on this site is void where prohibited.
We do not warrant that the quality of any products, services, information, or other material purchased or obtained by you will meet your expectations, or that any errors in the Service will be corrected.

SECTION 6 - ACCURACY OF BILLING AND ACCOUNT INFORMATION
We reserve the right to refuse any order you place with us. We may, in our sole discretion, limit or cancel quantities purchased per person, per household or per order. These restrictions may include orders placed by or under the same customer account, the same credit card, and/or orders that use the same billing and/or shipping address. In the event that we make a change to or cancel an order, we may attempt to notify you by contacting the e?mail and/or billing address/phone number provided at the time the order was made. We reserve the right to limit or prohibit orders that, in our sole judgment, appear to be placed by dealers, resellers or distributors.

You agree to provide current, complete and accurate purchase and account information for all purchases made at our store. You agree to promptly update your account and other information, including your email address and credit card numbers and expiration dates, so that we can complete your transactions and contact you as needed.

For more detail, please review our Returns Policy.

SECTION 7 - OPTIONAL TOOLS
We may provide you with access to third-party tools over which we neither monitor nor have any control nor input.
You acknowledge and agree that we provide access to such tools ”as is” and “as available” without any warranties, representations or conditions of any kind and without any endorsement. We shall have no liability whatsoever arising from or relating to your use of optional third-party tools.
Any use by you of optional tools offered through the site is entirely at your own risk and discretion and you should ensure that you are familiar with and approve of the terms on which tools are provided by the relevant third-party provider(s).
We may also, in the future, offer new services and/or features through the website (including, the release of new tools and resources). Such new features and/or services shall also be subject to these Terms of Service.

SECTION 8 - THIRD-PARTY LINKS
Certain content, products and services available via our Service may include materials from third-parties.
Third-party links on this site may direct you to third-party websites that are not affiliated with us. We are not responsible for examining or evaluating the content or accuracy and we do not warrant and will not have any liability or responsibility for any third-party materials or websites, or for any other materials, products, or services of third-parties.
We are not liable for any harm or damages related to the purchase or use of goods, services, resources, content, or any other transactions made in connection with any third-party websites. Please review carefully the third-party's policies and practices and make sure you understand them before you engage in any transaction. Complaints, claims, concerns, or questions regarding third-party products should be directed to the third-party.

SECTION 9 - USER COMMENTS, FEEDBACK AND OTHER SUBMISSIONS
If, at our request, you send certain specific submissions (for example contest entries) or without a request from us you send creative ideas, suggestions, proposals, plans, or other materials, whether online, by email, by postal mail, or otherwise (collectively, 'comments'), you agree that we may, at any time, without restriction, edit, copy, publish, distribute, translate and otherwise use in any medium any comments that you forward to us. We are and shall be under no obligation (1) to maintain any comments in confidence; (2) to pay compensation for any comments; or (3) to respond to any comments.
We may, but have no obligation to, monitor, edit or remove content that we determine in our sole discretion are unlawful, offensive, threatening, libelous, defamatory, pornographic, obscene or otherwise objectionable or violates any party’s intellectual property or these Terms of Service.
You agree that your comments will not violate any right of any third-party, including copyright, trademark, privacy, personality or other personal or proprietary right. You further agree that your comments will not contain libelous or otherwise unlawful, abusive or obscene material, or contain any computer virus or other malware that could in any way affect the operation of the Service or any related website. You may not use a false e?mail address, pretend to be someone other than yourself, or otherwise mislead us or third-parties as to the origin of any comments. You are solely responsible for any comments you make and their accuracy. We take no responsibility and assume no liability for any comments posted by you or any third-party.

SECTION 10 - PERSONAL INFORMATION
Your submission of personal information through the store is governed by our Privacy Policy. To view our Privacy Policy.

SECTION 11 - ERRORS, INACCURACIES AND OMISSIONS
Occasionally there may be information on our site or in the Service that contains typographical errors, inaccuracies or omissions that may relate to product descriptions, pricing, promotions, offers, product shipping charges, transit times and availability. We reserve the right to correct any errors, inaccuracies or omissions, and to change or update information or cancel orders if any information in the Service or on any related website is inaccurate at any time without prior notice (including after you have submitted your order).
We undertake no obligation to update, amend or clarify information in the Service or on any related website, including without limitation, pricing information, except as required by law. No specified update or refresh date applied in the Service or on any related website, should be taken to indicate that all information in the Service or on any related website has been modified or updated.

SECTION 12 - PROHIBITED USES
In addition to other prohibitions as set forth in the Terms of Service, you are prohibited from using the site or its content: (a) for any unlawful purpose; (b) to solicit others to perform or participate in any unlawful acts; (c) to violate any international, federal, provincial or state regulations, rules, laws, or local ordinances; (d) to infringe upon or violate our intellectual property rights or the intellectual property rights of others; (e) to harass, abuse, insult, harm, defame, slander, disparage, intimidate, or discriminate based on gender, sexual orientation, religion, ethnicity, race, age, national origin, or disability; (f) to submit false or misleading information; (g) to upload or transmit viruses or any other type of malicious code that will or may be used in any way that will affect the functionality or operation of the Service or of any related website, other websites, or the Internet; (h) to collect or track the personal information of others; (i) to spam, phish, pharm, pretext, spider, crawl, or scrape; (j) for any obscene or immoral purpose; or (k) to interfere with or circumvent the security features of the Service or any related website, other websites, or the Internet. We reserve the right to terminate your use of the Service or any related website for violating any of the prohibited uses.

SECTION 13 - DISCLAIMER OF WARRANTIES; LIMITATION OF LIABILITY
We do not guarantee, represent or warrant that your use of our service will be uninterrupted, timely, secure or error-free.
We do not warrant that the results that may be obtained from the use of the service will be accurate or reliable.
You agree that from time to time we may remove the service for indefinite periods of time or cancel the service at any time, without notice to you.
You expressly agree that your use of, or inability to use, the service is at your sole risk. The service and all products and services delivered to you through the service are (except as expressly stated by us) provided 'as is' and 'as available' for your use, without any representation, warranties or conditions of any kind, either express or implied, including all implied warranties or conditions of merchantability, merchantable quality, fitness for a particular purpose, durability, title, and non-infringement.
In no case shall Tactical Society, our directors, officers, employees, affiliates, agents, contractors, interns, suppliers, service providers or licensors be liable for any injury, loss, claim, or any direct, indirect, incidental, punitive, special, or consequential damages of any kind, including, without limitation lost profits, lost revenue, lost savings, loss of data, replacement costs, or any similar damages, whether based in contract, tort (including negligence), strict liability or otherwise, arising from your use of any of the service or any products procured using the service, or for any other claim related in any way to your use of the service or any product, including, but not limited to, any errors or omissions in any content, or any loss or damage of any kind incurred as a result of the use of the service or any content (or product) posted, transmitted, or otherwise made available via the service, even if advised of their possibility. Because some states or jurisdictions do not allow the exclusion or the limitation of liability for consequential or incidental damages, in such states or jurisdictions, our liability shall be limited to the maximum extent permitted by law.

SECTION 14 - INDEMNIFICATION
You agree to indemnify, defend and hold harmless Tactical Society and our parent, subsidiaries, affiliates, partners, officers, directors, agents, contractors, licensors, service providers, subcontractors, suppliers, interns and employees, harmless from any claim or demand, including reasonable attorneys’ fees, made by any third-party due to or arising out of your breach of these Terms of Service or the documents they incorporate by reference, or your violation of any law or the rights of a third-party.

SECTION 15 - SEVERABILITY
In the event that any provision of these Terms of Service is determined to be unlawful, void or unenforceable, such provision shall nonetheless be enforceable to the fullest extent permitted by applicable law, and the unenforceable portion shall be deemed to be severed from these Terms of Service, such determination shall not affect the validity and enforceability of any other remaining provisions.

SECTION 16 - TERMINATION
The obligations and liabilities of the parties incurred prior to the termination date shall survive the termination of this agreement for all purposes.
These Terms of Service are effective unless and until terminated by either you or us. You may terminate these Terms of Service at any time by notifying us that you no longer wish to use our Services, or when you cease using our site.
If in our sole judgment you fail, or we suspect that you have failed, to comply with any term or provision of these Terms of Service, we also may terminate this agreement at any time without notice and you will remain liable for all amounts due up to and including the date of termination; and/or accordingly may deny you access to our Services (or any part thereof).

SECTION 17 - ENTIRE AGREEMENT
The failure of us to exercise or enforce any right or provision of these Terms of Service shall not constitute a waiver of such right or provision.
These Terms of Service and any policies or operating rules posted by us on this site or in respect to The Service constitutes the entire agreement and understanding between you and us and govern your use of the Service, superseding any prior or contemporaneous agreements, communications and proposals, whether oral or written, between you and us (including, but not limited to, any prior versions of the Terms of Service).
Any ambiguities in the interpretation of these Terms of Service shall not be construed against the drafting party.

SECTION 18 - GOVERNING LAW
These Terms of Service and any separate agreements whereby we provide you Services shall be governed by and construed in accordance with the laws of United States.

SECTION 19 - CHANGES TO TERMS OF SERVICE
You can review the most current version of the Terms of Service at any time at this page.
We reserve the right, at our sole discretion, to update, change or replace any part of these Terms of Service by posting updates and changes to our website. It is your responsibility to check our website periodically for changes. Your continued use of or access to our website or the Service following the posting of any changes to these Terms of Service constitutes acceptance of those changes.

SECTION 20 - STATE LAWS
Merchant abides by individual state laws to ship knives across state lines

  • Knifes are securely packaged in a container that will protect the carriers from harm. 
  • Tactical Society will make sure the material is securely fixed inside with either proper amounts of packing filler such as packing peanuts or other material so that it doesn’t move around during normal Postal Service handling.


SECTION 21 - CONTACT INFORMATION
Questions about the Terms of Service should be sent to us at tacticalsociety@yahoo.com.
 

Credit Card Policy

Contents

Introduction. 1

Information Security Policy. 3

  1. Network Security. 4
  2. Acceptable Use Policy. 4
  3. Protect Stored Data. 4
  4. Information Classification. 5
  5. Access to the Sensitive Cardholder Data. 5
  6. Physical Security. 6
  7. Protect Data in Transit. 6
  8. Disposal of Stored Data. 7
  9. Security Awareness and Procedures. 7
  10. Credit Card (PCI) Security Incident Response Plan. 8
  11. Transfer of Sensitive Information Policy. 12
  12. User Access Management. 12
  13. Access Control Policy. 13

Appendix A – Agreement to Comply Form – Agreement to Comply With Information Security Policies. 15

Introduction

 

This Policy document encompasses all aspects of security surrounding confidential company information and must be distributed to all company employees. All company employees must read this document in its entirety and sign the form confirming they have read and fully understand this policy. This document will be reviewed and updated by Management on an annual basis or when relevant to include newly developed security standards into the policy and re-distributed to all employees and contractors where applicable.

 

Information Security Policy

 

TACTICAL SOCIETY GEAR & SECURITY INC. handles sensitive cardholder information daily.  Sensitive Information must have adequate safeguards in place to protect the cardholder data, cardholder privacy, and to ensure compliance with various regulations, along with guarding the future of the organisation.

TACTICAL SOCIETY GEAR & SECURITY INC. commits to respecting the privacy of all its customers and to protecting any customer data from outside parties.  To this end management are committed to maintaining a secure environment in which to process cardholder information so that we can meet these promises.

Employees handling sensitive cardholder data should ensure:

 

  • Handle Company and cardholder information in a manner that fits with their sensitivity and classification;
  • Limit personal use of TACTICAL SOCIETY GEAR & SECURITY INC. information and telecommunication systems and ensure it doesn’t interfere with your job performance;
  • TACTICAL SOCIETY GEAR & SECURITY INC. reserves the right to monitor, access, review, audit, copy, store, or delete any electronic communications, equipment, systems and network traffic for any purpose;
  • Do not use e-mail, internet and other Company resources to engage in any action that is offensive, threatening, discriminatory, defamatory, slanderous, pornographic, obscene, harassing or illegal;
  • Do not disclose personnel information unless authorised;
  • Protect sensitive cardholder information;
  • Keep passwords and accounts secure;
  • Request approval from management prior to establishing any new software or hardware, third party connections, etc.;
  • Do not install unauthorised software or hardware, including modems and wireless access unless you have explicit management approval;
  • Always leave desks clear of sensitive cardholder data and lock computer screens when unattended;
  • Information security incidents must be reported, without delay, to the individual responsible for incident response locally – Please find out who this is.

We each have a responsibility for ensuring our company’s systems and data are protected from unauthorised access and improper use.  If you are unclear about any of the policies detailed herein you should seek advice and guidance from your line manager.

 

1.     Network Security

 

A high-level network diagram of the network is maintained and reviewed on a yearly basis.  The network diagram provides a high level overview of the cardholder data environment (CDE), which at a minimum shows the connections in and out of the CDE.  Critical system components within the CDE, such as POS devices, databases, web servers, etc., and any other necessary payment components, as applicable should also be illustrated.

 

In addition, ASV should be performed and completed by a PCI SSC Approved Scanning Vendor, where applicable.  Evidence of these scans should be maintained for a period of 18 months.

 

2.     Acceptable Use Policy

 

Management’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to TACTICAL SOCIETY GEAR & SECURITY INC.’s established culture of openness, trust and integrity. Management is committed to protecting the employees, partners and TACTICAL SOCIETY GEAR & SECURITY INC. from illegal or damaging actions, either knowingly or unknowingly by individuals. TACTICAL SOCIETY GEAR & SECURITY INC. will maintain an approved list of technologies and devices and personnel with access to such devices as detailed in Appendix B.

 

  • Employees are responsible for exercising good judgment regarding the reasonableness of personal use.
  • Employees should take all necessary steps to prevent unauthorized access to confidential data which includes card holder data.
  • Keep passwords secure and do not share accounts. Authorized users are responsible for the security of their passwords and accounts.
  • All PCs, laptops and workstations should be secured with a password-protected screensaver with the automatic activation feature.
  • All POS and PIN entry devices should be appropriately protected and secured so they cannot be tampered or altered.
  • The List of Devices in Appendix B will be regularly updated when devices are modified, added or decommissioned. A stocktake of devices will be regularly performed and devices inspected to identify any potential tampering or substitution of devices. 
  • Users should be trained in the ability to identify any suspicious behaviour where any tampering or substitution may be performed. Any suspicious behaviour will be reported accordingly.
  • Information contained on portable computers is especially vulnerable, special care should be exercised.
  • Postings by employees from a Company email address to newsgroups should contain a disclaimer stating that the opinions expressed are strictly their own and not necessarily those of TACTICAL SOCIETY GEAR & SECURITY INC., unless posting is in the course of business duties.
  • Employees must use extreme caution when opening e-mail attachments received from unknown senders, which may contain viruses, e-mail bombs, or Trojan horse code.

 

3.     Protect Stored Data 

 

  • All sensitive cardholder data stored and handled by TACTICAL SOCIETY GEAR & SECURITY INC. and its employees must be securely protected against unauthorised use at all times. Any sensitive card data that is no longer required by TACTICAL SOCIETY GEAR & SECURITY INC. for business reasons must be discarded in a secure and irrecoverable manner.
  • If there is no specific need to see the full PAN (Permanent Account Number), it has to be masked when displayed.
  • PAN'S which are not protected as stated above should not be sent to the outside network via end user messaging technologies like chats, ICQ messenger etc.,

 

It is strictly prohibited to store:

  1. The contents of the payment card magnetic stripe (track data) on any media whatsoever.
  2. The CVV/CVC (the 3 or 4 digit number on the signature panel on the reverse of the payment card) on any media whatsoever.
  3. The PIN or the encrypted PIN Block under any circumstance.

 

4.     Information Classification

 

Data and media containing data must always be labelled to indicate sensitivity level.

 

  • Confidential data might include information assets for which there are legal requirements for preventing disclosure or financial penalties for disclosure, or data that would cause severe damage to TACTICAL SOCIETY GEAR & SECURITY INC. if disclosed or modified. Confidential data includes cardholder data.
  • Internal Use data might include information that the data owner feels should be protected to prevent unauthorized disclosure.
  • Public data is information that may be freely disseminated.

 

5.     Access to the Sensitive Cardholder Data

 

All Access to sensitive cardholder should be controlled and authorised. Any job functions that require access to cardholder data should be clearly defined.

  • Any display of the card holder should be restricted at a minimum to the first 6 and the last 4 digits of the cardholder data.
  • Access to sensitive cardholder information such as PAN’s, personal information and business data is restricted to employees that have a legitimate need to view such information.
  • No other employees should have access to this confidential data unless they have a genuine business need.
  • If cardholder data is shared with a Service Provider (3rd party) then a list of such Service Providers will be maintained as detailed in Appendix C.
  • TACTICAL SOCIETY GEAR & SECURITY INC. will ensure a written agreement that includes an acknowledgement is in place that the Service Provider will be responsible for the for the cardholder data that the Service Provider possess.
  • TACTICAL SOCIETY GEAR & SECURITY INC. will ensure that a there is an established process, including proper due diligence is in place, before engaging with a Service provider.
  • TACTICAL SOCIETY GEAR & SECURITY INC. will have a process in place to monitor the PCI DSS compliance status of the Service provider.

 

6.     Physical Security 

 

Access to sensitive information in both hard and soft media format must be physically restricted to prevent unauthorised individuals from obtaining sensitive data.

 

  • Media is defined as any printed or handwritten paper, received faxes, floppy disks, back-up tapes, computer hard drive, etc.
  • Media containing sensitive cardholder information must be handled and distributed in a secure manner by trusted individuals.
  • Visitors must always be escorted by a trusted employee when in areas that hold sensitive cardholder information.
  • Procedures must be in place to help all personnel easily distinguish between employees and visitors, especially in areas where cardholder data is accessible. “Employee” refers to full-time and part-time employees, temporary employees and personnel, and consultants who are “resident” on Company sites. A “visitor” is defined as a vendor, guest of an employee, service personnel, or anyone who needs to physically enter the premises for a short duration, usually not more than one day.
  • A list of devices that accept payment card data should be maintained.
  • The list should include make, model and location of the device.
  • The list should have the serial number or a unique identifier of the device
  • The list should be updated when devices are added, removed or relocated
  • POS devices surfaces are periodically inspected to detect tampering or substitution.
  • Personnel using the devices should be trained and aware of handling the POS devices
  • Personnel using the devices should verify the identity of and=y third party personnel claiming to repair or run maintenance tasks on the devices, install new devices or replace devices.
  • Personnel using the devices should be trained to report suspicious behaviour and indications of tampering of the devices to the appropriate personnel. TACTICAL SOCIETY GEAR & SECURITY INC. sites. A “visitor” is defined as a vendor, guest of an employee, service personnel, or anyone who needs to enter the premises for a short duration, usually not more than one day.
  • Strict control is maintained over the external or internal distribution of any media containing card holder data and has to be approved by management
  • Strict control is maintained over the storage and accessibility of media
  • All computer that store sensitive cardholder data must have a password protected screensaver enabled to prevent unauthorised use.

 

7.     Protect Data in Transit 

 

All sensitive cardholder data must be protected securely if it is to be transported physically or electronically.

 

  • Card holder data (PAN, track data, etc.) must never be sent over the internet via email, instant chat or any other end user technologies.
  • If there is a business justification to send cardholder data via email or by any other mode then it should be done after authorization and by using a strong encryption mechanism (i.e. – AES encryption, PGP encryption, IPSEC, etc.).
  • The transportation of media containing sensitive cardholder data to another location must be authorised by management, logged and inventoried before leaving the premises. Only secure courier services may be used for the transportation of such media. The status of the shipment should be monitored until it has been delivered to its new location.

 

8.     Disposal of Stored Data

 

  • All data must be securely disposed of when no longer required by TACTICAL SOCIETY GEAR & SECURITY INC., regardless of the media or application type on which it is stored.
  • An automatic process must exist to permanently delete on-line data, when no longer required.
  • All hard copies of cardholder data must be manually destroyed when no longer required for valid and justified business reasons. A quarterly process must be in place to confirm that all non-electronic cardholder data has been appropriately disposed of in a timely manner.
  • TACTICAL SOCIETY GEAR & SECURITY INC. will have procedures for the destruction of hardcopy (paper) materials. These will require that all hardcopy materials are crosscut shredded, incinerated or pulped so they cannot be reconstructed.
  • TACTICAL SOCIETY GEAR & SECURITY INC. will have documented procedures for the destruction of electronic media. These will require:
    • All cardholder data on electronic media must be rendered unrecoverable when deleted e.g. through degaussing or electronically wiped using military grade secure deletion processes or the physical destruction of the media;
    • If secure wipe programs are used, the process must define the industry accepted standards followed for secure deletion.
  • All cardholder information awaiting destruction must be held in lockable storage containers clearly marked “To Be Shredded” - access to these containers must be restricted.

 

 

9.     Security Awareness and Procedures 

 

The policies and procedures outlined below must be incorporated into company practice to maintain a high level of security awareness. The protection of sensitive data demands regular training of all employees and contractors.

 

  • Review handling procedures for sensitive information and hold periodic security awareness meetings to incorporate these procedures into day to day company practice.
  • Distribute this security policy document to all company employees to read. It is required that all employees confirm that they understand the content of this security policy document by signing an acknowledgement form (see Appendix A).
  • All employees that handle sensitive information will undergo background checks (such as criminal and credit record checks, within the limits of the local law) before they commence their employment with TACTICAL SOCIETY GEAR & SECURITY INC..
  • All third parties with access to credit card account numbers are contractually obligated to comply with card association security standards (PCI/DSS).
  • Company security policies must be reviewed annually and updated as needed.

 

 

 

10.                        Credit Card (PCI) Security Incident Response Plan

 

  • TACTICAL SOCIETY GEAR & SECURITY INC. PCI Security Incident Response Team (PCI Response Team) is comprised of the Information Security Officer and Merchant Services. TACTICAL SOCIETY GEAR & SECURITY INC. PCI security incident response plan is as follows:

 

  1. Each department must report an incident to the Information Security Officer (preferably) or to another member of the PCI Response Team.
  2. That member of the team receiving the report will advise the PCI Response Team of the incident.
  3. The PCI Response Team will investigate the incident and assist the potentially compromised department in limiting the exposure of cardholder data and in mitigating the risks associated with the incident.
  4. The PCI Response Team will resolve the problem to the satisfaction of all parties involved, including reporting the incident and findings to the appropriate parties (credit card associations, credit card processors, etc.) as necessary.
  5. The PCI Response Team will determine if policies and processes need to be updated to avoid a similar incident in the future, and whether additional safeguards are required in the environment where the incident occurred, or for the institution.

 

TACTICAL SOCIETY GEAR & SECURITY INC. PCI Security Incident Response Team (or equivalent in your organisation):

 

CIO

 

 

 

Communications Director

 

 

Compliance Officer

 

 

 

Counsel

 

 

 

Information Security Officer

 

 

 

Collections & Merchant Services

 

 

 

Risk Manager

 

 

 

 

Information Security PCI Incident Response Procedures:

 

  • A department that reasonably believes it may have an account breach, or a breach of cardholder information or of systems related to the PCI environment in general, must inform TACTICAL SOCIETY GEAR & SECURITY INC. PCI Incident Response Team. After being notified of a compromise, the PCI Response Team, along with other designated staff, will implement the PCI Incident Response Plan to assist and augment departments’ response plans.

 

Incident Response Notification

 

Escalation Members (or equivalent in your company):

 

Escalation – First Level:

Information Security Officer Controller

Executive Project Director for Credit Collections and Merchant Services Legal Counsel

Risk Manager

 

Director of TACTICAL SOCIETY GEAR & SECURITY INC. Communications

 

Escalation – Second Level:

TACTICAL SOCIETY GEAR & SECURITY INC. President

Executive Cabinet

 

Internal Audit

Auxiliary members as needed

 

      External Contacts (as needed)

Merchant Provider Card Brands

Internet Service Provider (if applicable)

Internet Service Provider of Intruder (if applicable) Communication Carriers (local and long distance) Business Partners

Insurance Carrier

External Response Team as applicable (CERT Coordination Center 1, etc) Law Enforcement Agencies as applicable inn local jurisdiction

 

In response to a systems compromise, the PCI Response Team and designees will:

 

  1. Ensure compromised system/s is isolated on/from the network.
  2. Gather, review and analyze the logs and related information from various central and local safeguards and security controls
  3. Conduct appropriate forensic analysis of compromised system.
  1. Contact internal and external departments and entities as appropriate.
  2. Make forensic and log analysis available to appropriate law enforcement or card industry security personnel, as required.
  3. Assist law enforcement and card industry security personnel in investigative processes, including in prosecutions.

 

The credit card companies have individually specific requirements that the Response Team must address in reporting suspected or confirmed breaches of cardholder data. See below for these requirements.

 

Incident Response notifications to various card schemes 

 

  1. In the event of a suspected security breach, alert the information security officer or your line manager immediately.
  2. The security officer will carry out an initial investigation of the suspected security breach.
  3. Upon confirmation that a security breach has occurred, the security officer will alert management and begin informing all relevant parties that may be affected by the compromise.

 

 VISA Steps

 

If the data security compromise involves credit card account numbers, implement the following procedure:

 

  • Shut down any systems or processes involved in the breach to limit the extent, and prevent further exposure.
  • Alert all affected parties and authorities such as the Merchant Bank (your Bank), Visa Fraud Control, and the law enforcement.
  • Provide details of all compromised or potentially compromised card numbers to Visa Fraud Control within 24 hrs.
  • For more Information visit: http://usa.visa.com/business/accepting_visa/ops_risk_management/cisp_if_ compromised.html

 

Visa Incident Report Template

 

This report must be provided to VISA within 14 days after initial report of incident to VISA. The following report content and standards must be followed when completing the incident report. Incident report must be securely distributed to VISA and Merchant Bank. Visa will classify the report as “VISA Secret”*.

  1. Executive Summary

 

  1. Include overview of the incident
  2. Include RISK Level(High, Medium, Low)
  3. Determine if compromise has been contained
  1. Background
  • Initial Analysis
  1. Investigative Procedures

 

  1. Include forensic tools used during investigation
  1. Findings
    1. Number of accounts at risk, identify those stores and compromised

 

  1. Type of account information at risk
  2. Identify ALL systems analyzed. Include the following:

 

  • Domain Name System (DNS) names

 

  • Internet Protocol (IP) addresses

 

  • Operating System (OS) version

 

  • Function of system(s)

 

  1. Identify ALL compromised systems. Include the following:

 

  • DNS names

 

  • IP addresses

 

  • OS version

 

  • Function of System(s)
  1. Timeframe of compromise

 

  1. Any data exported by intruder
  2. Establish how and source of compromise
  3. Check all potential database locations to ensure that no CVV2, Track 1 or Track 2 data is stored anywhere, whether encrypted or unencrypted (e.g., duplicate or backup tables or databases, databases used in development, stage or testing environments, data on software engineers’ machines, etc.)
  4. If applicable, review VisaNet endpoint security and determine risk
  1. Compromised Entity Action
  • Recommendations

 

  • Contact(s) at entity and security assessor performing investigation

 

*This classification applies to the most sensitive business information, which is intended for use within VISA. Its unauthorized disclosure could seriously and adversely impact VISA, its employees, member banks, business partners, and/or the Brand.

 

MasterCard Steps:

 

  1. Within 24 hours of an account compromise event, notify the MasterCard Compromised Account Team via phone at 1-636-722-4100.
  2. Provide a detailed written statement of fact about the account compromise (including the contributing circumstances) via secured e-mail to  compromised_account_team@mastercard.com.

 

  1. Provide the MasterCard Merchant Fraud Control Department with a complete list of all known compromised account numbers.
  2. Within 72 hours of knowledge of a suspected account compromise, engage the services of a data security firm acceptable to MasterCard to assess the vulnerability of the compromised data and related systems (such as a detailed forensics evaluation).

 

  1. Provide weekly written status reports to MasterCard, addressing open questions and issues until the audit is complete to the satisfaction of MasterCard.
  2. Promptly furnish updated lists of potential or known compromised account numbers, additional documentation, and other information that MasterCard may request.

 

  • Provide finding of all audits and investigations to the MasterCard Merchant Fraud Control department within the required time frame and continue to address any outstanding exposure or recommendation until resolved to the satisfaction of MasterCard.

 

 

Once MasterCard obtains the details of the account data compromise and the list of compromised account numbers, MasterCard will:

 

  1. Identify the issuers of the accounts that were suspected to have been compromised and group all known accounts under the respective parent member IDs.

 

  1. Distribute the account number data to its respective issuers.

 

Employees of TACTICAL SOCIETY GEAR & SECURITY INC. will be expected to report to the security officer for any security related issues. The role of the security officer is to effectively communicate all security policies and procedures to employees within TACTICAL SOCIETY GEAR & SECURITY INC. and contractors. In addition to this, the security officer will oversee the scheduling of security training sessions, monitor and enforce the security policies outlined in both this document and at the training sessions and finally, oversee the implantation of the incident response plan in the event of a sensitive data compromise.

 

 

Discover Card Steps

 

  1. Within 24 hours of an account compromise event, notify Discover Fraud Prevention at (800) 347-3102
  2. Prepare a detailed written statement of fact about the account compromise including the contributing circumstances
  • Prepare a list of all known compromised account numbers

 

  1. Obtain additional specific requirements from Discover Card

 

 

American Express Steps

 

  1. Within 24 hours of an account compromise event, notify American Express Merchant Services at (800) 528-5200 in the U.S.
  2. Prepare a detailed written statement of fact about the account compromise including the contributing circumstances
  • Prepare a list of all known compromised account numbers Obtain additional specific requirements from American Express

 

11.                        Transfer of Sensitive Information Policy

 

  • All third-party companies providing critical services to TACTICAL SOCIETY GEAR & SECURITY INC. must provide an agreed Service Level Agreement.
  • All third-party companies providing hosting facilities must comply with TACTICAL SOCIETY GEAR & SECURITY INC.’s Physical Security and Access Control Policy.
  • All third-party companies which have access to Card Holder information must
  1. Adhere to the PCI DSS security requirements.
  2. Acknowledge their responsibility for securing the Card Holder data.
  3. Acknowledge that the Card Holder data must only be used for assisting the completion of a transaction, supporting a loyalty program, providing a fraud control service or for uses specifically required by law.
  4. Have appropriate provisions for business continuity in the event of a major disruption, disaster or failure.
  5. Provide full cooperation and access to conduct a thorough security review after a security intrusion by a Payment Card industry representative, or a Payment Card industry approved third party.

 

12.                        User Access Management

 

  • Access to Company is controlled through a formal user registration process beginning with a formal notification from HR or from a line manager.
  • Each user is identified by a unique user ID so that users can be linked to and made responsible for their actions. The use of group IDs is only permitted where they are suitable for the work carried out.
  • There is a standard level of access; other services can be accessed when specifically authorized by HR/line management.
  • The job function of the user decides the level of access the employee has to cardholder data
  • A request for service must be made in writing (email or hard copy) by the newcomer’s line manager or by HR. The request is free format, but must state:

 

Name of person making request;

Job title of the newcomers and workgroup;

Start date;

Services required (default services are: MS Outlook, MS Office and Internet access).

 

  • Each user will be given a copy of their new user form to provide a written statement of their access rights, signed by an IT representative after their induction procedure. The user signs the form indicating that they understand the conditions of access.
  • Access to all TACTICAL SOCIETY GEAR & SECURITY INC. systems is provided by IT and can only be started after proper procedures are completed.

 

  • As soon as an individual leaves TACTICAL SOCIETY GEAR & SECURITY INC. employment, all his/her system logons must be immediately revoked.
  • As part of the employee termination process HR (or line managers in the case of contractors) will inform IT operations of all leavers and their date of leaving.

 

 

13.                Access Control Policy

 

  • Access Control systems are in place to protect the interests of all users of TACTICAL SOCIETY GEAR & SECURITY INC. computer systems by providing a safe, secure and readily accessible environment in which to work.
  • TACTICAL SOCIETY GEAR & SECURITY INC. will provide all employees and other users with the information they need to carry out their responsibilities in an as effective and efficient manner as possible.
  • Generic or group IDs shall not normally be permitted, but may be granted under exceptional circumstances if sufficient other controls on access are in place.
  • The allocation of privilege rights (e.g. local administrator, domain administrator, super-user, root access) shall be restricted and controlled, and authorization provided jointly by the system owner and IT Services. Technical teams shall guard against issuing privilege rights to entire teams to prevent loss of confidentiality.
  • Access rights will be accorded following the principles of least privilege and need to know.
  • Every user should attempt to maintain the security of data at its classified level even if technical security mechanisms fail or are absent.
  • Users electing to place information on digital media or storage devices or maintaining a separate database must only do so where such an action is in accord with the data’s classification.
  • Users are obligated to report instances of non-compliance to TACTICAL SOCIETY GEAR & SECURITY INC. CISO.
  • Access to TACTICAL SOCIETY GEAR & SECURITY INC. IT resources and services will be given through the provision of a unique Active Directory account and complex password.
  • No access to any TACTICAL SOCIETY GEAR & SECURITY INC. IT resources and services will be provided without prior authentication and authorization of a user’s TACTICAL SOCIETY GEAR & SECURITY INC. Windows Active Directory account.
  • Password issuing, strength requirements, changing and control will be managed through formal processes. Password length, complexity and expiration times will be controlled through Windows Active Directory Group Policy Objects.
  • Access to Confidential, Restricted and Protected information will be limited to authorised persons whose job responsibilities require it, as determined by the data owner or their designated representative. Requests for access permission to be granted, changed or revoked must be made in writing.
  • Users are expected to become familiar with and abide by TACTICAL SOCIETY GEAR & SECURITY INC. policies, standards and guidelines for appropriate and acceptable usage of the networks and systems.
  • Access for remote users shall be subject to authorization by IT Services and be provided in accordance with the Remote Access Policy and the Information Security Policy. No uncontrolled external access shall be permitted to any network device or networked system.
  • Access to data is variously and appropriately controlled according to the data classification levels described in the Information Security Management Policy.
  • Access control methods include logon access rights, Windows share and NTFS permissions, user account privileges, server and workstation access rights, firewall permissions, IIS intranet/extranet authentication rights, SQL database rights, isolated networks and other methods as necessary.
  • A formal process shall be conducted at regular intervals by system owners and data owners in conjunction with IT Services to review users’ access rights. The review shall be logged and IT Services shall sign off the review to give authority for users’ continued access rights.

 

Appendix A – Agreement to Comply Form – Agreement to Comply With Information Security Policies 

 

 

 BRIAN GORDON

________________________

Employee Name (printed) 

 

_FINANCE_______________

Department 

 

I agree to take all reasonable precautions to assure that company internal information, or information that has been entrusted to TACTICAL SOCIETY GEAR & SECURITY INC. by third parties such as customers, will not be disclosed to unauthorised persons. At the end of my employment or contract with TACTICAL SOCIETY GEAR & SECURITY INC., I agree to return all information to which I have had access as a result of my position. I understand that I am not authorised to use sensitive information for my own purposes, nor am I at liberty to provide this information to third parties without the express written consent of the internal manager who is the designated information owner. 

I have access to a copy of the Information Security Policies, I have read and understand these policies, and I understand how it impacts my job. As a condition of continued employment, I agree to abide by the policies and other requirements found in TACTICAL SOCIETY GEAR & SECURITY INC. security policy. I understand that non-compliance will be cause for disciplinary action up to and including dismissal, and perhaps criminal and/or civil penalties. 

I also agree to promptly report all violations or suspected violations of information security policies to the designated security officer. 

 

 

 BRIAN GORDON

________________________

Employee Signature 

 

6-6-2022

________________________

Date