BILL ANALYSIS                                                                                                                                                                                                    Ó






                  SENATE BANKING & FINANCIAL INSTITUTIONS COMMITTEE
                             Senator Noreen Evans, Chair
                              2013-2014 Regular Session

          SB 1351 (Hill)                          Hearing Date:  April 9,  
          2014  

          As Amended: March 26, 2014
          Fiscal:             No
          Urgency:       No
          

           SUMMARY    Would, until January 1, 2020, require the issuance and  
          acceptance of credit and debit cards equipped with microchips  
          capable of storing a personal identification number (PIN), as  
          specified.
          
           DESCRIPTION
           
            1.  Would enact findings and declarations relating to the  
              adoption of microchip technology for credit cards in over 80  
              countries throughout the world, not including the United  
              States, and to the value of these cards in combatting  
              payment card fraud.

           2.  Would, on and after January 1, 2015, require any contract  
              entered into between a financial institution and a payment  
              card network to govern the circumstances under which the  
              logo of the payment card network is displayed on a payment  
              card issued by that financial institution to include a  
              provision requiring that any new or replacement payment card  
              issued by that financial institution with that payment  
              network logo, on or after October 1, 2015, to a cardholder  
              with a California mailing address, have an embedded  
              microchip capable of storing a PIN or any other technology  
              that is generally accepted within the payments industry as  
              being more secure than microchip technology at preventing  
              card-present payment card fraud.

           3.  Would delay the imposition of the requirement summarized in  
              Number 2, above, by two years for small financial  
              institutions, which would be defined as financial  
              institutions with assets of $5 billion or less.

           4.  Would, on and after October 1, 2015, require a retailer  
              that accepts a payment card to provide a means of processing  




                                                 SB 1351 (Hill), Page 2




              card-present payment card transactions involving payment  
              cards equipped with embedded microchips capable of storing  
              PINs or other technology that is generally accepted within  
              the payments industry as being more secure than microchip  
              technology at preventing card-present payment card fraud.

           5.  Would delay the imposition of the requirement summarized in  
              Number 4, above, by two years for small retailers and gas  
              station pump payment terminals, and would define a small  
              retailer as a retailer with ten or fewer employees.

           6.  Would state the intent of the Legislature that the bill  
              provide consumer protection consistent with federal law.

           7.  Would sunset on January 1, 2020.  

           EXISTING LAW   No existing state or federal law explicitly  
          requires implementation of specific payment card technologies by  
          card-issuing financial institutions, nor acceptance of specific  
          payment card technologies by retailers.  Relevant state data  
          breach and data security laws are briefly summarized below.   
          Existing state law:

            1.  Requires any agency, person, or business that owns or  
              licenses computerized data to disclose a breach of the  
              security of the system to any California resident whose  
              unencrypted personal information was, or is reasonably  
              believed to have been, acquired by an unauthorized person.   
              The disclosure must be made in the most expedient time  
              possible and without unreasonable delay, consistent with the  
              legitimate needs of law enforcement (Civil Code Sections  
              1798.29 and 1798.82).  

            2.  Requires any agency, person, or business that maintains  
              computerized data that the agency, person, or business does  
              not own to notify the owner or licensee of the information  
              of any security breach immediately following its discovery,  
              if personal information was, or is reasonably believed to  
              have been, acquired by an unauthorized person (Civil Code  
              Sections 1798.29 and 1798.82).   

            3.  Imposes (with limited exceptions) an across-the-board data  
              security standard on businesses that own or license personal  
              information about California residents.  The Information  
              Security Law requires such businesses to implement and  
              maintain reasonable security procedures and practices  




                                                 SB 1351 (Hill), Page 3




              appropriate to the nature of the information, to protect the  
              personal information from unauthorized access, destruction,  
              use, modification, or disclosure (Civil Code Section  
              1798.81.5)  

           COMMENTS

          1.  Purpose:   This bill is intended to reduce card-present  
              payment card fraud by requiring the use of microchip  
              technology.

           2.  Background:   SB 1351 is based upon the premise that the  
              U.S., generally, and California, specifically, will  
              experience less card-present, point-of-sale (POS) payment  
              card fraud by migrating away from credit and debit cards  
              equipped with magnetic stripes toward credit and debit cards  
              equipped with integrated circuit cards.  Credit and debit  
              cards that contain embedded integrated circuit cards are  
              known by many names, including "chip cards," "integrated  
              circuit cards," "smart cards," and "EMV cards."  The term  
              "chip card" will be used in this analysis.

          This bill's author observes, "Retail fraud from counterfeit  
              credit cards has more than doubled since 2007 in the U.S.,  
              one of the last countries in the world that relies almost  
              exclusively on magnetic strip identification technology for  
              credit cards.  Even though credit cards with embedded  
              microchips reduce card-present fraud, less than one percent  
              of credit cards issued in the U.S. have chips.  By  
              comparison, chip-based credit cards - which carry  
              identification information as encrypted data in a microchip  
              that can be read only by special scanners in stores -  
              reduced counterfeit card fraud in Britain by 70 percent from  
              2007 to 2012, according to the U.K. Card Association.   
              Meanwhile, hackers have found it increasingly easy to copy  
              identifying information on magnetic stripes and produce fake  
              cards.  If chip cards were used in the U.S., fraud losses  
              could be halved, Aite Group estimates.  U.S. merchants and  
              banks had 2012 losses of $11.3 billion due to credit card  
              fraud, or 5 cents on every $100 spent, according to the  
              Nilson report."

          According to a white paper written by payment processor First  
              Data and information assembled by the research and  
              investment-focused Aite Group, there are over 1.2 billion  
              chip payment cards in circulation worldwide, and over 15  




                                                 SB 1351 (Hill), Page 4




              million POS terminals capable of reading those cards.   
              Nearly all of those cards and card readers reside outside  
              the U.S.  Of the 5.6 billion credit and debit cards in  
              circulation in the U.S., only an estimated 15 million to 20  
              million are chip cards, issued mainly to people who travel  
              overseas frequently.  Only 14 percent of all payment  
              terminals in the country are capable of reading chip cards.   


          At the present time, the timeline for U.S. migration to chip  
              cards is uncertain.  As will be discussed in more detail  
              below, the major card networks are pressuring card-issuing  
              depository institutions and merchants to migrate to chip  
              cards by October 2015.  However, full migration represents a  
              chicken-and-egg challenge.  Banks and credit unions are  
              hesitant to issue chip cards to their card-holding customers  
              if those cards cannot be read by the POS devices used by  
              merchants.  Merchants are hesitant to expend the significant  
              costs necessary to update their POS devices to chip readers  
              before chip cards are in wide circulation.  According to  
              recent press accounts, the cost to achieve full migration  
              (presumably to chip and PIN, though the press accounts are  
              unclear on this point) is estimated at approximately $8  
              billion: $6.8 billion to replace POS devices, $1.4 billion  
              to issue new cards, and $500 million for ATM upgrades. 

           3.  Definition of Key Terms:   Several key terms are defined  
              immediately below, in order to help ensure that those  
              debating SB 1351 use consistent terminology.

           Payment card fraud  is the use of a payment card to purchase  
              goods or services by an individual who is not the card owner  
              and is not authorized by the card owner to use the card.   
              Payment card fraud can either be  card-present fraud  , where  
              the person presenting the card is face-to-face with the  
              merchant, and the card is present during the transaction;  
              or, it can be  card-not-present (CNP) fraud  , where the person  
              providing the card number and other relevant card  
              information is not face-to-face with the merchant, and the  
              card is not physically present and available to the merchant  
              during the transaction, as is the case during transactions  
              completed online, via phone, or via mail.  

           Existing card fraud  can occur when an unauthorized person gains  
              physical access to a payment card that has been lost,  
              stolen, or discarded by its owner without being destroyed.   




                                                 SB 1351 (Hill), Page 5




              It can also occur when the card physically remains with the  
              cardholder, but the card number and other identifying  
              cardholder information is stolen and either counterfeited to  
              create a new card with the same number or fraudulently used  
              in one or more CNP transactions.  Existing card fraud  
              affects accounts that were opened by the actual card owner,  
              but subsequently used for fraudulent purchases not  
              authorized by the card owner.  

           New card fraud  involves the establishment of a new payment card  
              account in the name of someone whose identity has been  
              stolen.  Because the person in whose name the account is  
              opened is often unaware of the existence of the new account,  
              new card fraud can be harder to detect, and can go on for  
              longer periods of time, than existing card fraud.

          SB 1351 is intended to reduce the incidence of card-present, POS  
              payment card fraud on both new and existing accounts.  
          .
           Identity theft  , or more accurately identity fraud or  
              impersonation, occurs when one person uses someone else's  
              personal information (e.g., name, date of birth, or social  
              security number) to commit fraud or other crimes.  There are  
              many different types of identity theft, including criminal,  
              financial, medical, and others.  Financial identity theft  
              includes the creation of new payment card accounts in the  
              name of the person whose identity was stolen.  SB 1351 does  
              not focus on identity theft; instead, it focuses on  
              preventing one of the potential consequences of identity  
              theft.

           Data breaches  involve the theft or unintentional disclosure of  
              data residing on a computer system or other electronic  
              device.  A data breach may not result in payment card fraud  
              or identity theft, if the data breached are encrypted or  
              otherwise unusable, or if the people whose data are stolen  
              take immediate steps to close existing accounts, monitor  
              their accounts for fraudulent activity, and monitor their  
              credit reports for unauthorized account creation.  In the  
              alternative, a data breach can lead to identity theft and/or  
              payment card fraud, if enough payment card data and other  
              personal identification information in a usable form is  
              stolen.  SB 1351 does not directly focus on preventing data  
              breaches.  However, as discussed in more detail below (see  
              "Why can chip cards sometimes provide greater fraud  
              protection than magnetic stripe cards?"), the bill may  




                                                 SB 1351 (Hill), Page 6




              reduce the frequency of certain types of data breaches, by  
              making certain credit card data less attractive to thieves.

           4.  How Do Chip Cards Work?   The chips in chip cards are  
              integrated circuits, and thus, microcomputers.  Because they  
              are equipped with embedded microcomputers (also called  
              microcontrollers), chip cards can securely store large  
              amounts of data, carry out their own on-card functions such  
              as encryption and authentication, and interact more  
              intelligently with card readers than cards equipped with  
              magnetic stripes.  Unlike cards equipped with magnetic  
              stripes, whose stored data are static (unchanging from one  
              transaction to the next), chip cards generate a new code for  
              each transaction, making them far less susceptible to  
              cloning than traditional magnetic stripe cards.  

          Generally speaking, very little information on chip cards is "in  
              the clear" (i.e., unencrypted).  According to experts  
              familiar with chip technology, only the card number,  
              expiration date, and three-digit security code are available  
              "in the clear" on these cards.  Cardholder names are  
              commonly not in the clear on these cards, nor is other  
              cardholder data, such as billing address.

          Chips in chip cards are commonly one of three types: contact,  
              contactless, and dual-interface (capable of being read in  
              contact or contactless mode).  Cards equipped with contact  
              chips must be inserted into a chip-enabled terminal in order  
              to be read, to ensure that the contacts on the chip can make  
              physical connection with the contact readers in the  
              terminal.  Because contact cards lack an antenna with which  
              to wirelessly transmit data from the chip, data on these  
              chips cannot be read without physical connectivity.

          Contactless cards contain chips equipped with wireless antennae.  
               These antennae must be within approximately one and a half  
              inches of a terminal or other reader in order to be read.   
              Contactless chips with the latest technology can be turned  
              off.  Other contactless chips cannot be turned off, but can  
              be shielded.  Some companies sell sleeves into which  
              contactless chip cards can be placed, to protect these cards  
              from being remotely read unless they are physically removed  
              from the sleeve.  At least one company currently advertises  
              a wallet equipped with similar shielding.  

          However, experts contacted by Committee staff wished to assure  




                                                 SB 1351 (Hill), Page 7




              the Legislature that contactless chip cards do not represent  
              security hazards to their holders.  Not only must the cards  
              be extremely close to a reader to be read, there is very  
              little useful information available from these cards, even  
              if it they are read by thieves.  A card number, expiration  
              date, and three-digit security code are of little use to a  
              fraudster, without a cardholder name or address.  Experts  
              advise that the address verification software used by most  
              merchants who accept credit and debit cards would reject a  
              transaction attempted by someone who lacked the billing  
              address or billing zip code for an account.  

           5.  Why Can Chip Cards Sometimes Provide Greater Fraud  
              Protection Than Magnetic Stripe Cards?   The microchips used  
              in chip cards generate new verification values each time the  
              card is used in a transaction.  This dynamic technology  
              differs greatly from the static manner in which magnetic  
              stripe-equipped cards transmit data.  For example, when a  
              magnetic stripe card is swiped ten different times, the same  
              information is transmitted to the card reader each time the  
              card is swiped.  However, if a chip card is dipped or  
              scanned using a radio frequency reader ten different times,  
              it returns a unique authentication code each time.  

          Because a new code is generated each time a chip card is used,  
              it is very difficult to for chip cards to be cloned  
              (counterfeited); the dynamic authentication technology is  
              simply not capable of being duplicated in a manner that will  
              return the same dynamic codes as those that would be  
              returned by a valid chip card.  

          The following statement by Visa explains the value of chip  
              cards:  "Not only will chip technology accelerate mobile  
              innovations, it is also expected to secure payments into the  
              future through the use of dynamic authentication.  Chip  
              technology greatly reduces a criminal's ability to use  
              stolen payment card data by introducing dynamic values for  
              each transaction.  Even if payment card data is compromised,  
              a counterfeit card would be unusable at the point of sale  
              without the presence of the card's unique elements.  By  
              reducing static authentication, we diminish the value of  
              stolen cardholder data, benefitting all stakeholders."

          Chip cards, however, are not panaceas.  Although chip cards  
              cannot be cloned into other chip cards, chip card data can  
              be captured and used to create a counterfeit magnetic stripe  




                                                 SB 1351 (Hill), Page 8




              card.  Once a counterfeit magnetic stripe card is created,  
              it has the potential for fraudulent use in a card-present,  
              POS transaction with a retailer that accepts magnetic stripe  
              cards or in a CNP transaction.  

          Available evidence from other countries supports the assertion  
              that a migration to chip cards reduces card-present POS  
              fraud, but increases the percentage of fraud perpetrated  
              through CNP transactions ("CNP Fraud:  A Primer on Trends  
              and Authentication Processes," Smart Card Alliance, February  
              2014).  Not surprisingly, fraudsters attack the most  
              vulnerable point in a payment system; when steps are taken  
              to make card-present fraud more difficult to perpetrate,  
              fraudsters shift to CNP fraud.

          Will migration to chip cards result in fewer data breaches?  The  
              answer is unclear.  The data generated by chip cards is no  
              less susceptible to theft than the data generated by  
              magnetic stripe cards, but its value to thieves is much  
              smaller than the value of magnetic stripe card data.   
              Because thieves typically focus on vulnerabilities that have  
              the greatest lucrative potential, they may direct their  
              focus away from chip card data and toward other types of  
              data that are easier to use in a fraudulent manner.
           
          6.  Allocation of Financial Responsibility When Payment Card  
              Fraud Occurs:   Generally speaking, as long as a consumer  
              notifies their card issuer that a transaction is fraudulent,  
              the card issuer will not require the cardholder to pay for  
              the goods or services that were fraudulently obtained.  But,  
              if the consumer doesn't pay, who does?  It depends.   
               
              If payment card fraud occurs in an in-person (card-present)  
              transaction, despite every party's adherence to their  
              contractual obligations to prevent fraud, the card-issuing  
              financial institution is typically responsible for covering  
              the cost of that fraud.  According to information provided  
              by one of the major payment networks, financial institutions  
              cover the cost of approximately 80 percent of card-present  
              fraud.  This cost allocation framework is one of the reasons  
              why migration to chip cards is so challenging in the  
              short-term.  Card-issuing financial institutions (rather  
              than merchants) bear most of the costs of card-present fraud  
              and will thus receive most of the cost savings from this  
              migration, but merchants are being asked to shoulder the  
              majority of costs attributable to migration. 




                                                 SB 1351 (Hill), Page 9





              In recognition of the challenges posed by existing liability  
              allocation rules for migration to chip cards, the major  
              payment card networks have announced a liability shift,  
              which they will begin to apply in October 2015.  In August  
              2011, Visa announced plans to accelerate the migration to  
              chip technology in the U.S.  One of the key elements of  
              Visa's migration roadmap includes a "liability shift for  
              domestic and cross-border counterfeit card-present  
              point-of-sale (POS) transactions, effective October 1, 2015.  
               Fuel-selling merchants will have an additional two years,  
              until October 1, 2017, before a full liability shift takes  
              effect for transactions generated from automated fuel  
              dispensers.  Currently, POS counterfeit fraud is largely  
              absorbed by card issuers.  With the liability shift, if a  
              contact chip card is presented to a merchant that has not  
              adopted, at a minimum, contact chip terminals, liability for  
              counterfeit fraud may shift to the merchant's acquirer [the  
              merchant's bank].  The liability shift encourages chip  
              adoption since any chip-on-chip transaction (chip card read  
              by a chip terminal) provides the dynamic authentication data  
              that helps to better protect all parties.  The U.S. is the  
              only country in the world that has not committed to either a  
              domestic or cross-border liability shift associated with  
              chip payments."  

              MasterCard made a similar announcement to its customers in  
              January 2012.  

              Significantly, the Visa and MasterCard announcements only  
              affect card-present, POS transactions.  They do not affect  
              CNP transactions, nor do they extend to ATM transactions.   
              Historically, merchants typically bear the cost of CNP  
              fraud.  According to a report prepared by specialty  
              publisher Nilson based on 2012 data (Nilson Report, Issue  
              1023), retailers bear just over one third of the cost of  
              payment card fraud losses annually.  CNP fraud represents  
              the largest category of merchants' fraud costs.  

              The Visa and MasterCard announcements also do not extend to  
              liability for covering the cost to re-issue new payment  
              cards, when payment card fraud is detected.  One of the  
              other significant costs of payment card fraud involves  
              card-reissuance.  When a valid card number is fraudulently  
              obtained, card-issuing financial institutions typically  
              cancel the card whose number was compromised and re-issue a  




                                                 SB 1351 (Hill), Page 10




              new card to the legitimate cardholder.  The cost to reissue  
              these cards is borne by the card-issuing financial  
                                                     institutions, a cost pressure that will not be alleviated by  
              the liability shift imposed by the card networks.  

              It should also be noted that the cost allocation rules and  
              proposed liability shift summarized above are based upon the  
              assumption that each party involved in authorizing a  
              fraudulent transaction complies with all of their  
              contractual responsibilities to prevent fraud.  Often,  
              mistakes are made by one or more party when a fraudulent  
              transaction is authorized.  For this reason, financial  
              responsibility for covering the cost of payment card fraud  
              is often determined by overlaying the results of forensic  
              security investigations with the terms of contracts that  
              govern the responsibilities of each party in a payment  
              transaction.  In reality, despite the planned liability  
              shifts described above, the cost of holding customers  
              harmless for fraudulent transactions involving their cards  
              is allocated, and will continue to be allocated, based on  
              the responsibility of each party for authorizing the  
              fraudulent transaction.  

           7.  Should We Migrate to "Chip" Or "Chip and PIN"?   The Visa and  
              MasterCard roadmaps summarized above call for migration to  
              chip.  They are agnostic on whether migration to chip should  
              also be accompanied by a migration to "chip and PIN."  The  
              majority of integrated circuit card implementations  
              worldwide to date have been of the "chip and PIN" variety,  
              but, according to Visa, none (other than Canada) was  
              accomplished in a single move.  In nearly all instances,  
              countries migrated first to chip, and only later to chip and  
              PIN.

          There is considerable disagreement over whether chip and PIN is  
              any safer than chip or chip and signature at preventing  
              card-present, POS payment card fraud.  Some experts assert  
              that the anti-theft value of chip cards derives from their  
              dynamic authentication methods, and not in their reliance on  
              a cardholder's use of a static PIN at the time of sale.   
              These experts observe that PINs can be stolen, and  
              signatures can be forged; however, chip cards cannot be  
              counterfeited, and it is that inability to be cloned that  
              represents their true anti-theft value.  These experts  
              assert that the use of PINs provides little marginal benefit  
              in combatting payment card fraud, but adds significant  




                                                 SB 1351 (Hill), Page 11




              additional cost for both card issuers and retailers.  They  
              suggest that the U.S. should complete its migration to chip,  
              before we attempt to integrate a migration to chip and PIN.

          On the flip side, some, including the California Retailers  
              Association, strongly advocate migration to chip and PIN.   
              They reason that if retailers are going to invest  
              significant amounts of money in new payment terminals, they  
              ought to get the greatest security bang for their buck.   
              They assert that the addition of PINs to chip cards provides  
              a greater level of security, and point to the magnetic  
              stripe card environment (in which use of PINs is widely  
              believed to add a layer of security missing with signatures)  
              to support their conclusion. 

              This bill would require migration to chip and PIN by October  
              2015 (October 2017 for small banks, small retailers, and  
              fuel sellers).  In that way, it goes beyond the payment card  
              networks' roadmap.

           8.  Should the State and Local Governments Be Exempted From This  
              Bill?  As drafted, this bill would exempt from the  
              definition of retailers subject to the bill "the state, a  
              county, city, city and county, or any other political  
              subdivision of this state."  The author is proposing to  
              exempt the state and local governments from the requirements  
              of this bill primarily for cost reasons; imposing such  
              requirements on the state and local governments could prove  
              prohibitively expensive, and could result in failure of the  
              bill on fiscal grounds.  

          However, numerous studies of payment card fraud, in both the  
              U.S. and elsewhere, conclude that thieves migrate to the  
              most vulnerable points in a payments system.  If most  
              retailers in California migrate to acceptance of chip cards,  
              and the state and local governments do not, they may find  
              themselves besieged by crooks, aiming to take advantage of  
              their use of outdated payment technology.  Although it may  
              be extremely expensive to require the state and local  
              governments to migrate to chip, it may be equally, if not  
              more costly, to combat the efforts of thieves seeking to  
              capitalize on governments' use of outdated magnetic stripe  
              readers and to deal with the payment card fraud that  
              results.  
           
           9.  Should Credit Cards Issued By Retailers Be Subject to This  




                                                 SB 1351 (Hill), Page 12




              Bill?   As drafted, SB 1351 is silent on the manner in which  
              it is intended to apply to retailers that issue credit and  
              debit cards to their customers.  According to bank and  
              retailer representatives, some retailer-issued credit and  
              debit cards contain payment network logos, while others do  
              not.  If a credit or debit card containing a payment network  
              logo is counterfeited, the counterfeit card could be used at  
              any merchant that accepts cards with that payment network  
              logo - not just at the retailer that issued the valid card.   
              Because of the significant potential for payment card fraud  
              that could result in these cases, an amendment is suggested  
              (see Amendment 12b) to apply this bill to retailer-issued  
              payment cards that carry payment network logos.

          According to retailer representatives, if a credit or debit card  
              that lacks a payment network logo is counterfeited, the  
              counterfeit card can only be used at the retailer that  
              issued the valid card.  Thus, the potential for widespread  
              payment card fraud is considerably smaller.  If the author  
              wishes to amend his bill to cover retailer-issued cards that  
              lack payment network logos, an amendment is included for his  
              consideration (see 12e).  However, given the limited number  
              of places counterfeit, non-payment-network-logoed cards can  
              be used, it is unclear whether the benefits of migrating  
              these cards to chip and PIN exceed the cost of doing so.   
           
           10. Which Banks and Credit Unions Will Get Two Additional Years  
              to Comply With This Bill's Provisions?   SB 1351 would give  
              financial institutions with $5 billion or less in assets an  
              additional two years in which to comply with its provisions.  
               In an effort to get a sense for which depository  
              institutions would receive this additional time, Committee  
              staff reached out to the California Independent Bankers  
              Association and California Credit Union League.  Although  
              the lists provided by both organizations only include banks  
              and credit unions with a physical presence in California  
              (and could thus exclude depository institutions located out  
              of California, with card-holding California customers), they  
              are informative.  

          It appears that most credit unions and community banks with a  
              California presence fall below the $5 billion threshold, and  
              would thus be given until October 1, 2017 to comply with the  
              provisions of this bill.  Community banks which exceed the  
              $5 billion asset threshold, and which would therefore not  
              receive the additional two years, include Farmers and  




                                                 SB 1351 (Hill), Page 13




              Merchants Bank of Long Beach, BBCN Bank (Los Angeles),  
              Citizens Business Bank (Ontario), Pacific Western Bank  
              (Santa Monica), Cathay Bank (Los Angeles), California Bank &  
              Trust (San Diego), Silicon Valley Bank (Santa Clara), East  
              West Bank (Pasadena), OneWest Bank (Pasadena), City National  
              Bank (Beverly Hills), and First Republic Bank (San  
              Francisco).  Westamerica Bank of San Rafael falls just below  
              the $5 billion threshold and could rise above it, depending  
              on changes in its deposit base and its merger and  
              acquisition plans.

          Credit unions which exceed the $5 billion asset threshold  
              include First Tech Federal Credit Union (Mountain View), San  
              Diego County Credit Union (San Diego), Star One Credit Union  
              (Santa Clara), Golden 1 Credit Union (Sacramento), and  
              SchoolsFirst Credit Union (Orange).  


































                                                 SB 1351 (Hill), Page 14




           11. Summary of Arguments in Support:   

               a.     Consumers Union (CU) supports SB 1351 on the basis  
                 that it will help reduce the number of Californians whose  
                 credit and debit information is stolen by taking steps to  
                 reduce counterfeit payment card fraud.  CU supports  
                 requiring the highest possible existing payment card  
                 security standard, and applauds SB 1351's emphasis on  
                 both card issuers and merchants.  Although SB 1351 would  
                 not stop all payment card fraud, the bill would help  
                 reduce it.  Over 90 percent of retail sales are made at a  
                 physical point of sale, the focus of this bill.

               CU is also supportive of the bill's requirement of chip and  
                 PIN.  "EMV cards allow for several cardholder  
                 verification methods including chip and signature and  
                 chip and PIN.  PIN is considered a more secure  
                 verification method than signature.  Requiring a PIN may  
                 prevent a stolen physical card from being used at the  
                 point of sale if the point of sale requires a PIN.  So,  
                 if a consumer's wallet was stolen and an EMV chip and PIN  
                 card was taken but that PIN wasn't known to the thief,  
                 the thief could not use that card to go on a shopping  
                 spree so long as all the merchants at the mall required a  
                 PIN to complete a transaction.  By requiring that the  
                 microchip technology use a PIN for verification, SB 1351  
                 is ensuring better consumer protection than either  
                 magstripe or chip and signature can provide."

               b.     Privacy Rights Clearinghouse supports Senator Hill's  
                 attempt to protect Californians from the now-pervasive  
                 epidemic of card-present payment card fraud.  "Recent  
                 high-profile payment card breaches at Target,  
                 Neiman-Marcus, Michaels, and other retailers clearly  
                 demonstrate the need to move away from magnetic stripe  
                 technology."  

           12. Summary of Arguments in Opposition:    

               a.     The California Bankers Association (CBA) opposes the  
                 bill on several grounds.  First, CBA asserts that the  
                 bill interferes with interstate commerce by attempting to  
                 regulate contracts between two out-of-state parties,  
                 neither of which is the state or a California consumer.   
                 Because of this, the state does not have standing to  
                 demand contract conditions.




                                                 SB 1351 (Hill), Page 15





               Second, the bill applies to payment cards that contain  
                 payment network logos, but not to private label cards  
                 issued by retailers.  Federal law requires banks to  
                 establish, maintain, and continually test their data  
                 security protocols to protect their customers from data  
                 security hackers.  Banks also maintain state-of-the-art  
                 fraud detection computer programs to detect unusual  
                 spending patterns on bank-issued cards.  Private label  
                 cards do not maintain these types of protections and will  
                 not maintain the added protections under the bill.  There  
                 is no reason to exempt private label cards from the bill,  
                 especially since they currently lack the enhanced  
                 security protections provided for bank-issued cards.

               Third, the bill's broad definition of a retailer covers a  
                 bank's ATM and in-branch card readers.  Although banks  
                 are in the process of upgrading their ATMs to accommodate  
                 new card technology, it is not expected to be completed  
                 by the October 1, 2015 deadline.  

               Finally, the bill specifically exempts state and local  
                 government entities as either the entity originating the  
                 issuance of payment cards or accepting payment cards for  
                 transactions.  The bill only applies to credit and debit  
                 cards, but does not include electronic benefit transfer  
                 cards for social service recipients because those cards  
                 are prepaid cards.  Social service beneficiaries or  
                 people making payments to government entities should have  
                 the same security protections that are afforded to all  
                 other credit and debit card transactions.
                
                b.     A coalition of business groups, including the  
                 California Chamber of Commerce, California Hotel and  
                 Lodging Association, California Restaurant Association,  
                 and Association of California Life and Health Insurance  
                 companies expressed similar concerns as those expressed  
                 by CBA.  In addition to those concerns, which are  
                 discussed immediately above, the coalition notes that the  
                 bill will set a bad precedent by placing a specific  
                 method of fraud prevention in statute.  "We are learning  
                 of all the ingenious and innovative ways that hackers and  
                 fraudsters are employing today, but they continue to get  
                 more and more creative.  Unfortunately, this bill ties  
                 the hands of the law-abiding companies that need dynamic  
                 and innovative methods instead of a one-size fits all  




                                                 SB 1351 (Hill), Page 16




                 approach to fight fraudsters and hackers."

               The coalition is also concerned about the broad definition  
                 of retailer in the bill, which not only covers large  
                 companies, but also small stores, small restaurants, and  
                 non-profits.  Businesses with very small profit margins  
                 may have to resort to cash-only transactions to avoid the  
                 requirements in the bill.

               Finally, the coalition questions whether the bill will  
                 provide its purported protections.  Payment cards issued  
                 after October 1, 2015 to comply with the provisions of SB  
                 1351 will have to include magnetic stripes to accommodate  
                 entities that are not required to accept chip and PIN  
                 cards until October 1, 2017.  For this reason, financial  
                 institutions and retailers in California that are subject  
                 to the October 1, 2015 implementation deadline in the  
                 bill will incur the costs and potential liability created  
                 by the bill, without fully experiencing the expected  
                 benefits.  

          13. Amendments:   The following technical amendments are  
              suggested, to help ensure that the bill can be implemented,  
              as intended by its author.  None of these amendments is  
              expected to remove outstanding opposition.

               a.     Clarify that the bill is intended to apply to POS  
                 transactions, and not to ATM transactions:

               Page 4, lines 9 through 11, amend the bill as follows:   
                 that accepts a payment card  in a card-present, point of  
                 sale transaction  shall provide a means of processing  
                 card-present  point of sale  transactions involving payment  
                 cards equipped with an embedded

               b.     Define financial institution, and clarify that it  
                 can include a retailer which issues its own in-house  
                 credit or debit card with a payment network logo:  

               Page 4, between lines 29 and 30, insert:  "Financial  
                 institution" means a depository institution or other  
                 entity that issues a payment card to a cardholder for use  
                 by that cardholder to purchase goods, services, or  
                 anything else of value.  For purposes of this bill,  
                 financial institution can include a retailer.





                                                 SB 1351 (Hill), Page 17




               c.     Clarify when the $5 billion asset threshold will be  
                 applied to financial institutions for purposes of  
                 determining which financial institutions are deemed  
                 "small financial institutions" for purposes of the bill,  
                 and clarify how long a financial institution has in which  
                 to comply with the bill if it exceeds the $5 billion  
                 threshold at some point after the bill becomes operative.  
                  

               Page 4, line 31, after "less" insert:  as of January 1,  
                 2015.  Any small financial institution whose assets  
                 subsequently exceed $5 billion shall be provided with one  
                 year from the date it first exceeds the $5 billion  
                 threshold to comply with subdivision (a) of Section  
                 1748.70.  

               d.     Page 4, line 33:  Strike "chapter" and insert:   
                 title

               e.     If this Committee wishes to ask the bill's author to  
                 apply the bill to retailer-issued credit and debit cards  
                 that lack payment network logos, the following amendment  
                 could be added:  

               Page 4, between lines 15 and 16, insert: (b) A retailer  
                 that issues a payment card which lacks a payment network  
                 logo shall ensure that any new or replacement payment  
                 card issued on or after October 1, 2017 has an embedded  
                 microchip capable of storing a PIN or any other  
                 technology that is generally accepted within the payments  
                 industry as being more secure than microchip technology  
                 for card-present fraud prevention.
        
          14. Prior and Related Legislation:   

               a.     AB 779 (Jones), 2007-08 Legislative Session:  Would  
                 have mandated compliance with specified Payment Card  
                 Industry Data Security Standards (PCI DSS) by entities  
                 that sell goods or services to any resident of California  
                 and accept as payment a credit card, debit card, or other  
                 payment device, as specified.  Vetoed by Governor  
                 Schwarzenegger.

               b.     AB 1656 (Jones), 2007-08 Legislative Session:   
                 Substantially similar to AB 779.  Vetoed by Governor  
                 Schwarzenegger.




                                                 SB 1351 (Hill), Page 18





               c.     AB 1710 (Dickinson and Wieckowski), 2013-14  
                 Legislative Session:  Would mandate compliance with  
                 specified PCI DSS by entities that sell goods or services  
                 to any resident of California and accept as payment a  
                 credit card, debit card, or other payment device, as  
                 specified; make any such entity liable for reimbursing  
                 all reasonable and actual costs of providing notice of a  
                 data breach and for the reasonable and actual costs of  
                 replacing payment cards following a data breach; would  
                 add to California's data breach notification  
                 requirements, as specified; and would add to the remedies  
                 available to prosecute violations of the aforementioned  
                 provisions.  Pending before the Assembly Judiciary  
                 Committee.  

           
          LIST OF REGISTERED SUPPORT/OPPOSITION
          
          Support
           
          Consumers Union
          Privacy Rights Clearinghouse
           
          Opposition
               
          Association of California Life and Health Insurance Companies
          California Bankers Association
          California Chamber of Commerce
          California Hotel and Lodging Association
          California Restaurant Association

          Consultant: Eileen Newhall  (916) 651-4102