BILL ANALYSIS Ó SENATE BANKING & FINANCIAL INSTITUTIONS COMMITTEE Senator Noreen Evans, Chair 2013-2014 Regular Session SB 1351 (Hill) Hearing Date: April 9, 2014 As Amended: March 26, 2014 Fiscal: No Urgency: No SUMMARY Would, until January 1, 2020, require the issuance and acceptance of credit and debit cards equipped with microchips capable of storing a personal identification number (PIN), as specified. DESCRIPTION 1. Would enact findings and declarations relating to the adoption of microchip technology for credit cards in over 80 countries throughout the world, not including the United States, and to the value of these cards in combatting payment card fraud. 2. Would, on and after January 1, 2015, require any contract entered into between a financial institution and a payment card network to govern the circumstances under which the logo of the payment card network is displayed on a payment card issued by that financial institution to include a provision requiring that any new or replacement payment card issued by that financial institution with that payment network logo, on or after October 1, 2015, to a cardholder with a California mailing address, have an embedded microchip capable of storing a PIN or any other technology that is generally accepted within the payments industry as being more secure than microchip technology at preventing card-present payment card fraud. 3. Would delay the imposition of the requirement summarized in Number 2, above, by two years for small financial institutions, which would be defined as financial institutions with assets of $5 billion or less. 4. Would, on and after October 1, 2015, require a retailer that accepts a payment card to provide a means of processing SB 1351 (Hill), Page 2 card-present payment card transactions involving payment cards equipped with embedded microchips capable of storing PINs or other technology that is generally accepted within the payments industry as being more secure than microchip technology at preventing card-present payment card fraud. 5. Would delay the imposition of the requirement summarized in Number 4, above, by two years for small retailers and gas station pump payment terminals, and would define a small retailer as a retailer with ten or fewer employees. 6. Would state the intent of the Legislature that the bill provide consumer protection consistent with federal law. 7. Would sunset on January 1, 2020. EXISTING LAW No existing state or federal law explicitly requires implementation of specific payment card technologies by card-issuing financial institutions, nor acceptance of specific payment card technologies by retailers. Relevant state data breach and data security laws are briefly summarized below. Existing state law: 1. Requires any agency, person, or business that owns or licenses computerized data to disclose a breach of the security of the system to any California resident whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person. The disclosure must be made in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement (Civil Code Sections 1798.29 and 1798.82). 2. Requires any agency, person, or business that maintains computerized data that the agency, person, or business does not own to notify the owner or licensee of the information of any security breach immediately following its discovery, if personal information was, or is reasonably believed to have been, acquired by an unauthorized person (Civil Code Sections 1798.29 and 1798.82). 3. Imposes (with limited exceptions) an across-the-board data security standard on businesses that own or license personal information about California residents. The Information Security Law requires such businesses to implement and maintain reasonable security procedures and practices SB 1351 (Hill), Page 3 appropriate to the nature of the information, to protect the personal information from unauthorized access, destruction, use, modification, or disclosure (Civil Code Section 1798.81.5) COMMENTS 1. Purpose: This bill is intended to reduce card-present payment card fraud by requiring the use of microchip technology. 2. Background: SB 1351 is based upon the premise that the U.S., generally, and California, specifically, will experience less card-present, point-of-sale (POS) payment card fraud by migrating away from credit and debit cards equipped with magnetic stripes toward credit and debit cards equipped with integrated circuit cards. Credit and debit cards that contain embedded integrated circuit cards are known by many names, including "chip cards," "integrated circuit cards," "smart cards," and "EMV cards." The term "chip card" will be used in this analysis. This bill's author observes, "Retail fraud from counterfeit credit cards has more than doubled since 2007 in the U.S., one of the last countries in the world that relies almost exclusively on magnetic strip identification technology for credit cards. Even though credit cards with embedded microchips reduce card-present fraud, less than one percent of credit cards issued in the U.S. have chips. By comparison, chip-based credit cards - which carry identification information as encrypted data in a microchip that can be read only by special scanners in stores - reduced counterfeit card fraud in Britain by 70 percent from 2007 to 2012, according to the U.K. Card Association. Meanwhile, hackers have found it increasingly easy to copy identifying information on magnetic stripes and produce fake cards. If chip cards were used in the U.S., fraud losses could be halved, Aite Group estimates. U.S. merchants and banks had 2012 losses of $11.3 billion due to credit card fraud, or 5 cents on every $100 spent, according to the Nilson report." According to a white paper written by payment processor First Data and information assembled by the research and investment-focused Aite Group, there are over 1.2 billion chip payment cards in circulation worldwide, and over 15 SB 1351 (Hill), Page 4 million POS terminals capable of reading those cards. Nearly all of those cards and card readers reside outside the U.S. Of the 5.6 billion credit and debit cards in circulation in the U.S., only an estimated 15 million to 20 million are chip cards, issued mainly to people who travel overseas frequently. Only 14 percent of all payment terminals in the country are capable of reading chip cards. At the present time, the timeline for U.S. migration to chip cards is uncertain. As will be discussed in more detail below, the major card networks are pressuring card-issuing depository institutions and merchants to migrate to chip cards by October 2015. However, full migration represents a chicken-and-egg challenge. Banks and credit unions are hesitant to issue chip cards to their card-holding customers if those cards cannot be read by the POS devices used by merchants. Merchants are hesitant to expend the significant costs necessary to update their POS devices to chip readers before chip cards are in wide circulation. According to recent press accounts, the cost to achieve full migration (presumably to chip and PIN, though the press accounts are unclear on this point) is estimated at approximately $8 billion: $6.8 billion to replace POS devices, $1.4 billion to issue new cards, and $500 million for ATM upgrades. 3. Definition of Key Terms: Several key terms are defined immediately below, in order to help ensure that those debating SB 1351 use consistent terminology. Payment card fraud is the use of a payment card to purchase goods or services by an individual who is not the card owner and is not authorized by the card owner to use the card. Payment card fraud can either be card-present fraud , where the person presenting the card is face-to-face with the merchant, and the card is present during the transaction; or, it can be card-not-present (CNP) fraud , where the person providing the card number and other relevant card information is not face-to-face with the merchant, and the card is not physically present and available to the merchant during the transaction, as is the case during transactions completed online, via phone, or via mail. Existing card fraud can occur when an unauthorized person gains physical access to a payment card that has been lost, stolen, or discarded by its owner without being destroyed. SB 1351 (Hill), Page 5 It can also occur when the card physically remains with the cardholder, but the card number and other identifying cardholder information is stolen and either counterfeited to create a new card with the same number or fraudulently used in one or more CNP transactions. Existing card fraud affects accounts that were opened by the actual card owner, but subsequently used for fraudulent purchases not authorized by the card owner. New card fraud involves the establishment of a new payment card account in the name of someone whose identity has been stolen. Because the person in whose name the account is opened is often unaware of the existence of the new account, new card fraud can be harder to detect, and can go on for longer periods of time, than existing card fraud. SB 1351 is intended to reduce the incidence of card-present, POS payment card fraud on both new and existing accounts. . Identity theft , or more accurately identity fraud or impersonation, occurs when one person uses someone else's personal information (e.g., name, date of birth, or social security number) to commit fraud or other crimes. There are many different types of identity theft, including criminal, financial, medical, and others. Financial identity theft includes the creation of new payment card accounts in the name of the person whose identity was stolen. SB 1351 does not focus on identity theft; instead, it focuses on preventing one of the potential consequences of identity theft. Data breaches involve the theft or unintentional disclosure of data residing on a computer system or other electronic device. A data breach may not result in payment card fraud or identity theft, if the data breached are encrypted or otherwise unusable, or if the people whose data are stolen take immediate steps to close existing accounts, monitor their accounts for fraudulent activity, and monitor their credit reports for unauthorized account creation. In the alternative, a data breach can lead to identity theft and/or payment card fraud, if enough payment card data and other personal identification information in a usable form is stolen. SB 1351 does not directly focus on preventing data breaches. However, as discussed in more detail below (see "Why can chip cards sometimes provide greater fraud protection than magnetic stripe cards?"), the bill may SB 1351 (Hill), Page 6 reduce the frequency of certain types of data breaches, by making certain credit card data less attractive to thieves. 4. How Do Chip Cards Work? The chips in chip cards are integrated circuits, and thus, microcomputers. Because they are equipped with embedded microcomputers (also called microcontrollers), chip cards can securely store large amounts of data, carry out their own on-card functions such as encryption and authentication, and interact more intelligently with card readers than cards equipped with magnetic stripes. Unlike cards equipped with magnetic stripes, whose stored data are static (unchanging from one transaction to the next), chip cards generate a new code for each transaction, making them far less susceptible to cloning than traditional magnetic stripe cards. Generally speaking, very little information on chip cards is "in the clear" (i.e., unencrypted). According to experts familiar with chip technology, only the card number, expiration date, and three-digit security code are available "in the clear" on these cards. Cardholder names are commonly not in the clear on these cards, nor is other cardholder data, such as billing address. Chips in chip cards are commonly one of three types: contact, contactless, and dual-interface (capable of being read in contact or contactless mode). Cards equipped with contact chips must be inserted into a chip-enabled terminal in order to be read, to ensure that the contacts on the chip can make physical connection with the contact readers in the terminal. Because contact cards lack an antenna with which to wirelessly transmit data from the chip, data on these chips cannot be read without physical connectivity. Contactless cards contain chips equipped with wireless antennae. These antennae must be within approximately one and a half inches of a terminal or other reader in order to be read. Contactless chips with the latest technology can be turned off. Other contactless chips cannot be turned off, but can be shielded. Some companies sell sleeves into which contactless chip cards can be placed, to protect these cards from being remotely read unless they are physically removed from the sleeve. At least one company currently advertises a wallet equipped with similar shielding. However, experts contacted by Committee staff wished to assure SB 1351 (Hill), Page 7 the Legislature that contactless chip cards do not represent security hazards to their holders. Not only must the cards be extremely close to a reader to be read, there is very little useful information available from these cards, even if it they are read by thieves. A card number, expiration date, and three-digit security code are of little use to a fraudster, without a cardholder name or address. Experts advise that the address verification software used by most merchants who accept credit and debit cards would reject a transaction attempted by someone who lacked the billing address or billing zip code for an account. 5. Why Can Chip Cards Sometimes Provide Greater Fraud Protection Than Magnetic Stripe Cards? The microchips used in chip cards generate new verification values each time the card is used in a transaction. This dynamic technology differs greatly from the static manner in which magnetic stripe-equipped cards transmit data. For example, when a magnetic stripe card is swiped ten different times, the same information is transmitted to the card reader each time the card is swiped. However, if a chip card is dipped or scanned using a radio frequency reader ten different times, it returns a unique authentication code each time. Because a new code is generated each time a chip card is used, it is very difficult to for chip cards to be cloned (counterfeited); the dynamic authentication technology is simply not capable of being duplicated in a manner that will return the same dynamic codes as those that would be returned by a valid chip card. The following statement by Visa explains the value of chip cards: "Not only will chip technology accelerate mobile innovations, it is also expected to secure payments into the future through the use of dynamic authentication. Chip technology greatly reduces a criminal's ability to use stolen payment card data by introducing dynamic values for each transaction. Even if payment card data is compromised, a counterfeit card would be unusable at the point of sale without the presence of the card's unique elements. By reducing static authentication, we diminish the value of stolen cardholder data, benefitting all stakeholders." Chip cards, however, are not panaceas. Although chip cards cannot be cloned into other chip cards, chip card data can be captured and used to create a counterfeit magnetic stripe SB 1351 (Hill), Page 8 card. Once a counterfeit magnetic stripe card is created, it has the potential for fraudulent use in a card-present, POS transaction with a retailer that accepts magnetic stripe cards or in a CNP transaction. Available evidence from other countries supports the assertion that a migration to chip cards reduces card-present POS fraud, but increases the percentage of fraud perpetrated through CNP transactions ("CNP Fraud: A Primer on Trends and Authentication Processes," Smart Card Alliance, February 2014). Not surprisingly, fraudsters attack the most vulnerable point in a payment system; when steps are taken to make card-present fraud more difficult to perpetrate, fraudsters shift to CNP fraud. Will migration to chip cards result in fewer data breaches? The answer is unclear. The data generated by chip cards is no less susceptible to theft than the data generated by magnetic stripe cards, but its value to thieves is much smaller than the value of magnetic stripe card data. Because thieves typically focus on vulnerabilities that have the greatest lucrative potential, they may direct their focus away from chip card data and toward other types of data that are easier to use in a fraudulent manner. 6. Allocation of Financial Responsibility When Payment Card Fraud Occurs: Generally speaking, as long as a consumer notifies their card issuer that a transaction is fraudulent, the card issuer will not require the cardholder to pay for the goods or services that were fraudulently obtained. But, if the consumer doesn't pay, who does? It depends. If payment card fraud occurs in an in-person (card-present) transaction, despite every party's adherence to their contractual obligations to prevent fraud, the card-issuing financial institution is typically responsible for covering the cost of that fraud. According to information provided by one of the major payment networks, financial institutions cover the cost of approximately 80 percent of card-present fraud. This cost allocation framework is one of the reasons why migration to chip cards is so challenging in the short-term. Card-issuing financial institutions (rather than merchants) bear most of the costs of card-present fraud and will thus receive most of the cost savings from this migration, but merchants are being asked to shoulder the majority of costs attributable to migration. SB 1351 (Hill), Page 9 In recognition of the challenges posed by existing liability allocation rules for migration to chip cards, the major payment card networks have announced a liability shift, which they will begin to apply in October 2015. In August 2011, Visa announced plans to accelerate the migration to chip technology in the U.S. One of the key elements of Visa's migration roadmap includes a "liability shift for domestic and cross-border counterfeit card-present point-of-sale (POS) transactions, effective October 1, 2015. Fuel-selling merchants will have an additional two years, until October 1, 2017, before a full liability shift takes effect for transactions generated from automated fuel dispensers. Currently, POS counterfeit fraud is largely absorbed by card issuers. With the liability shift, if a contact chip card is presented to a merchant that has not adopted, at a minimum, contact chip terminals, liability for counterfeit fraud may shift to the merchant's acquirer [the merchant's bank]. The liability shift encourages chip adoption since any chip-on-chip transaction (chip card read by a chip terminal) provides the dynamic authentication data that helps to better protect all parties. The U.S. is the only country in the world that has not committed to either a domestic or cross-border liability shift associated with chip payments." MasterCard made a similar announcement to its customers in January 2012. Significantly, the Visa and MasterCard announcements only affect card-present, POS transactions. They do not affect CNP transactions, nor do they extend to ATM transactions. Historically, merchants typically bear the cost of CNP fraud. According to a report prepared by specialty publisher Nilson based on 2012 data (Nilson Report, Issue 1023), retailers bear just over one third of the cost of payment card fraud losses annually. CNP fraud represents the largest category of merchants' fraud costs. The Visa and MasterCard announcements also do not extend to liability for covering the cost to re-issue new payment cards, when payment card fraud is detected. One of the other significant costs of payment card fraud involves card-reissuance. When a valid card number is fraudulently obtained, card-issuing financial institutions typically cancel the card whose number was compromised and re-issue a SB 1351 (Hill), Page 10 new card to the legitimate cardholder. The cost to reissue these cards is borne by the card-issuing financial institutions, a cost pressure that will not be alleviated by the liability shift imposed by the card networks. It should also be noted that the cost allocation rules and proposed liability shift summarized above are based upon the assumption that each party involved in authorizing a fraudulent transaction complies with all of their contractual responsibilities to prevent fraud. Often, mistakes are made by one or more party when a fraudulent transaction is authorized. For this reason, financial responsibility for covering the cost of payment card fraud is often determined by overlaying the results of forensic security investigations with the terms of contracts that govern the responsibilities of each party in a payment transaction. In reality, despite the planned liability shifts described above, the cost of holding customers harmless for fraudulent transactions involving their cards is allocated, and will continue to be allocated, based on the responsibility of each party for authorizing the fraudulent transaction. 7. Should We Migrate to "Chip" Or "Chip and PIN"? The Visa and MasterCard roadmaps summarized above call for migration to chip. They are agnostic on whether migration to chip should also be accompanied by a migration to "chip and PIN." The majority of integrated circuit card implementations worldwide to date have been of the "chip and PIN" variety, but, according to Visa, none (other than Canada) was accomplished in a single move. In nearly all instances, countries migrated first to chip, and only later to chip and PIN. There is considerable disagreement over whether chip and PIN is any safer than chip or chip and signature at preventing card-present, POS payment card fraud. Some experts assert that the anti-theft value of chip cards derives from their dynamic authentication methods, and not in their reliance on a cardholder's use of a static PIN at the time of sale. These experts observe that PINs can be stolen, and signatures can be forged; however, chip cards cannot be counterfeited, and it is that inability to be cloned that represents their true anti-theft value. These experts assert that the use of PINs provides little marginal benefit in combatting payment card fraud, but adds significant SB 1351 (Hill), Page 11 additional cost for both card issuers and retailers. They suggest that the U.S. should complete its migration to chip, before we attempt to integrate a migration to chip and PIN. On the flip side, some, including the California Retailers Association, strongly advocate migration to chip and PIN. They reason that if retailers are going to invest significant amounts of money in new payment terminals, they ought to get the greatest security bang for their buck. They assert that the addition of PINs to chip cards provides a greater level of security, and point to the magnetic stripe card environment (in which use of PINs is widely believed to add a layer of security missing with signatures) to support their conclusion. This bill would require migration to chip and PIN by October 2015 (October 2017 for small banks, small retailers, and fuel sellers). In that way, it goes beyond the payment card networks' roadmap. 8. Should the State and Local Governments Be Exempted From This Bill? As drafted, this bill would exempt from the definition of retailers subject to the bill "the state, a county, city, city and county, or any other political subdivision of this state." The author is proposing to exempt the state and local governments from the requirements of this bill primarily for cost reasons; imposing such requirements on the state and local governments could prove prohibitively expensive, and could result in failure of the bill on fiscal grounds. However, numerous studies of payment card fraud, in both the U.S. and elsewhere, conclude that thieves migrate to the most vulnerable points in a payments system. If most retailers in California migrate to acceptance of chip cards, and the state and local governments do not, they may find themselves besieged by crooks, aiming to take advantage of their use of outdated payment technology. Although it may be extremely expensive to require the state and local governments to migrate to chip, it may be equally, if not more costly, to combat the efforts of thieves seeking to capitalize on governments' use of outdated magnetic stripe readers and to deal with the payment card fraud that results. 9. Should Credit Cards Issued By Retailers Be Subject to This SB 1351 (Hill), Page 12 Bill? As drafted, SB 1351 is silent on the manner in which it is intended to apply to retailers that issue credit and debit cards to their customers. According to bank and retailer representatives, some retailer-issued credit and debit cards contain payment network logos, while others do not. If a credit or debit card containing a payment network logo is counterfeited, the counterfeit card could be used at any merchant that accepts cards with that payment network logo - not just at the retailer that issued the valid card. Because of the significant potential for payment card fraud that could result in these cases, an amendment is suggested (see Amendment 12b) to apply this bill to retailer-issued payment cards that carry payment network logos. According to retailer representatives, if a credit or debit card that lacks a payment network logo is counterfeited, the counterfeit card can only be used at the retailer that issued the valid card. Thus, the potential for widespread payment card fraud is considerably smaller. If the author wishes to amend his bill to cover retailer-issued cards that lack payment network logos, an amendment is included for his consideration (see 12e). However, given the limited number of places counterfeit, non-payment-network-logoed cards can be used, it is unclear whether the benefits of migrating these cards to chip and PIN exceed the cost of doing so. 10. Which Banks and Credit Unions Will Get Two Additional Years to Comply With This Bill's Provisions? SB 1351 would give financial institutions with $5 billion or less in assets an additional two years in which to comply with its provisions. In an effort to get a sense for which depository institutions would receive this additional time, Committee staff reached out to the California Independent Bankers Association and California Credit Union League. Although the lists provided by both organizations only include banks and credit unions with a physical presence in California (and could thus exclude depository institutions located out of California, with card-holding California customers), they are informative. It appears that most credit unions and community banks with a California presence fall below the $5 billion threshold, and would thus be given until October 1, 2017 to comply with the provisions of this bill. Community banks which exceed the $5 billion asset threshold, and which would therefore not receive the additional two years, include Farmers and SB 1351 (Hill), Page 13 Merchants Bank of Long Beach, BBCN Bank (Los Angeles), Citizens Business Bank (Ontario), Pacific Western Bank (Santa Monica), Cathay Bank (Los Angeles), California Bank & Trust (San Diego), Silicon Valley Bank (Santa Clara), East West Bank (Pasadena), OneWest Bank (Pasadena), City National Bank (Beverly Hills), and First Republic Bank (San Francisco). Westamerica Bank of San Rafael falls just below the $5 billion threshold and could rise above it, depending on changes in its deposit base and its merger and acquisition plans. Credit unions which exceed the $5 billion asset threshold include First Tech Federal Credit Union (Mountain View), San Diego County Credit Union (San Diego), Star One Credit Union (Santa Clara), Golden 1 Credit Union (Sacramento), and SchoolsFirst Credit Union (Orange). SB 1351 (Hill), Page 14 11. Summary of Arguments in Support: a. Consumers Union (CU) supports SB 1351 on the basis that it will help reduce the number of Californians whose credit and debit information is stolen by taking steps to reduce counterfeit payment card fraud. CU supports requiring the highest possible existing payment card security standard, and applauds SB 1351's emphasis on both card issuers and merchants. Although SB 1351 would not stop all payment card fraud, the bill would help reduce it. Over 90 percent of retail sales are made at a physical point of sale, the focus of this bill. CU is also supportive of the bill's requirement of chip and PIN. "EMV cards allow for several cardholder verification methods including chip and signature and chip and PIN. PIN is considered a more secure verification method than signature. Requiring a PIN may prevent a stolen physical card from being used at the point of sale if the point of sale requires a PIN. So, if a consumer's wallet was stolen and an EMV chip and PIN card was taken but that PIN wasn't known to the thief, the thief could not use that card to go on a shopping spree so long as all the merchants at the mall required a PIN to complete a transaction. By requiring that the microchip technology use a PIN for verification, SB 1351 is ensuring better consumer protection than either magstripe or chip and signature can provide." b. Privacy Rights Clearinghouse supports Senator Hill's attempt to protect Californians from the now-pervasive epidemic of card-present payment card fraud. "Recent high-profile payment card breaches at Target, Neiman-Marcus, Michaels, and other retailers clearly demonstrate the need to move away from magnetic stripe technology." 12. Summary of Arguments in Opposition: a. The California Bankers Association (CBA) opposes the bill on several grounds. First, CBA asserts that the bill interferes with interstate commerce by attempting to regulate contracts between two out-of-state parties, neither of which is the state or a California consumer. Because of this, the state does not have standing to demand contract conditions. SB 1351 (Hill), Page 15 Second, the bill applies to payment cards that contain payment network logos, but not to private label cards issued by retailers. Federal law requires banks to establish, maintain, and continually test their data security protocols to protect their customers from data security hackers. Banks also maintain state-of-the-art fraud detection computer programs to detect unusual spending patterns on bank-issued cards. Private label cards do not maintain these types of protections and will not maintain the added protections under the bill. There is no reason to exempt private label cards from the bill, especially since they currently lack the enhanced security protections provided for bank-issued cards. Third, the bill's broad definition of a retailer covers a bank's ATM and in-branch card readers. Although banks are in the process of upgrading their ATMs to accommodate new card technology, it is not expected to be completed by the October 1, 2015 deadline. Finally, the bill specifically exempts state and local government entities as either the entity originating the issuance of payment cards or accepting payment cards for transactions. The bill only applies to credit and debit cards, but does not include electronic benefit transfer cards for social service recipients because those cards are prepaid cards. Social service beneficiaries or people making payments to government entities should have the same security protections that are afforded to all other credit and debit card transactions. b. A coalition of business groups, including the California Chamber of Commerce, California Hotel and Lodging Association, California Restaurant Association, and Association of California Life and Health Insurance companies expressed similar concerns as those expressed by CBA. In addition to those concerns, which are discussed immediately above, the coalition notes that the bill will set a bad precedent by placing a specific method of fraud prevention in statute. "We are learning of all the ingenious and innovative ways that hackers and fraudsters are employing today, but they continue to get more and more creative. Unfortunately, this bill ties the hands of the law-abiding companies that need dynamic and innovative methods instead of a one-size fits all SB 1351 (Hill), Page 16 approach to fight fraudsters and hackers." The coalition is also concerned about the broad definition of retailer in the bill, which not only covers large companies, but also small stores, small restaurants, and non-profits. Businesses with very small profit margins may have to resort to cash-only transactions to avoid the requirements in the bill. Finally, the coalition questions whether the bill will provide its purported protections. Payment cards issued after October 1, 2015 to comply with the provisions of SB 1351 will have to include magnetic stripes to accommodate entities that are not required to accept chip and PIN cards until October 1, 2017. For this reason, financial institutions and retailers in California that are subject to the October 1, 2015 implementation deadline in the bill will incur the costs and potential liability created by the bill, without fully experiencing the expected benefits. 13. Amendments: The following technical amendments are suggested, to help ensure that the bill can be implemented, as intended by its author. None of these amendments is expected to remove outstanding opposition. a. Clarify that the bill is intended to apply to POS transactions, and not to ATM transactions: Page 4, lines 9 through 11, amend the bill as follows: that accepts a payment card in a card-present, point of sale transaction shall provide a means of processing card-present point of sale transactions involving payment cards equipped with an embedded b. Define financial institution, and clarify that it can include a retailer which issues its own in-house credit or debit card with a payment network logo: Page 4, between lines 29 and 30, insert: "Financial institution" means a depository institution or other entity that issues a payment card to a cardholder for use by that cardholder to purchase goods, services, or anything else of value. For purposes of this bill, financial institution can include a retailer. SB 1351 (Hill), Page 17 c. Clarify when the $5 billion asset threshold will be applied to financial institutions for purposes of determining which financial institutions are deemed "small financial institutions" for purposes of the bill, and clarify how long a financial institution has in which to comply with the bill if it exceeds the $5 billion threshold at some point after the bill becomes operative. Page 4, line 31, after "less" insert: as of January 1, 2015. Any small financial institution whose assets subsequently exceed $5 billion shall be provided with one year from the date it first exceeds the $5 billion threshold to comply with subdivision (a) of Section 1748.70. d. Page 4, line 33: Strike "chapter" and insert: title e. If this Committee wishes to ask the bill's author to apply the bill to retailer-issued credit and debit cards that lack payment network logos, the following amendment could be added: Page 4, between lines 15 and 16, insert: (b) A retailer that issues a payment card which lacks a payment network logo shall ensure that any new or replacement payment card issued on or after October 1, 2017 has an embedded microchip capable of storing a PIN or any other technology that is generally accepted within the payments industry as being more secure than microchip technology for card-present fraud prevention. 14. Prior and Related Legislation: a. AB 779 (Jones), 2007-08 Legislative Session: Would have mandated compliance with specified Payment Card Industry Data Security Standards (PCI DSS) by entities that sell goods or services to any resident of California and accept as payment a credit card, debit card, or other payment device, as specified. Vetoed by Governor Schwarzenegger. b. AB 1656 (Jones), 2007-08 Legislative Session: Substantially similar to AB 779. Vetoed by Governor Schwarzenegger. SB 1351 (Hill), Page 18 c. AB 1710 (Dickinson and Wieckowski), 2013-14 Legislative Session: Would mandate compliance with specified PCI DSS by entities that sell goods or services to any resident of California and accept as payment a credit card, debit card, or other payment device, as specified; make any such entity liable for reimbursing all reasonable and actual costs of providing notice of a data breach and for the reasonable and actual costs of replacing payment cards following a data breach; would add to California's data breach notification requirements, as specified; and would add to the remedies available to prosecute violations of the aforementioned provisions. Pending before the Assembly Judiciary Committee. LIST OF REGISTERED SUPPORT/OPPOSITION Support Consumers Union Privacy Rights Clearinghouse Opposition Association of California Life and Health Insurance Companies California Bankers Association California Chamber of Commerce California Hotel and Lodging Association California Restaurant Association Consultant: Eileen Newhall (916) 651-4102