How to protect a credit card database

The cross-reference for the credit card to match that value is only maintained on one server. Meanwhile, anywhere the token is sent does not have to be subject to PCI requirements as it does not use the actual credit card data.

Hollis acknowledges that the second step – destroy and descope – is a source of tension as businesses want to retain customers' details for future sales. Online sellers usually issue cookies on the first transaction so they can recognise a computer, and as they have the data, make the following transactions easier.