Article 12. Ensuring the protection of information in the System 12.1. General provisions on the protection of information in the System.
12.1.1. The Rules establish general requirements for the protection of information processed by the System Participants subject to mandatory protection in accordance with the applicable legislation (legislation of the country of incorporation), as well as protection in accordance with the Rules.
12.1.2. Information protection is ensured by the implementation by the System Members of legal, organizational and technical measures aimed at:
- compliance with the confidentiality of information;
- exercising the right of access to information in accordance with applicable law;
- ensuring the protection of information from unauthorized access, destruction, modification, blocking, copying, provision and distribution, as well as from other illegal actions in relation to information.
12.1.3. Each Member of the System independently determines the procedure for ensuring information protection in accordance with the applicable legislation and the Rules and approves internal documents establishing specific requirements for information protection and the procedure for their implementation. In the event that the requirements of the Rules contradict the requirements of the applicable legislation, the provisions of the applicable legislation shall be used.
12.1.4. To carry out work on information protection and control (assessment) of compliance with information protection requirements, the System Participants may engage on a contractual basis organizations that have licenses for activities for the technical protection of confidential information and (or) for activities for the development and production of confidential information protection tools.
12.1.5. The System Participants shall ensure that third parties involved in the provision of money transfer services comply with the requirements for ensuring information security, taking into account the list of operations performed by them and the automated systems, software, computer and telecommunication equipment used.
12.1.6. Participants are obliged to review the current procedure for ensuring information protection when making money transfers in connection with changes in the requirements for information protection determined by the legislative acts of the country of origin (incorporation, Rules, changes in the requirements established in the Rules (for foreign Participants in accordance with applicable law) for information protection, identification of shortcomings in monitoring the implementation of the procedure for ensuring information protection, within the time limits specified in the regulatory documents.
12.1.7. In order to ensure the protection of information in the System, the System Operator shall:
- develops a list of requirements for ensuring the protection of information in the System,
mandatory for all Members of the System;
- check the System Members for compliance with the requirements when joining the System Rules in the role defined by the System Rules, as well as when changing the technological or organizational conditions of the System Participant's work in the System;
- checks the System Members in terms of compliance with the requirements for information protection in the System.
12. 2. Information protected in the System.
12.2.1. The requirements for ensuring the protection of information established by the Rules when making money transfers are applied to ensure the protection of the following information (hereinafter referred to as protected information):
- information on money transfers made, including information contained in notices (confirmations) regarding the acceptance of orders of the System Members for execution, as well as in notices (confirmations) regarding the execution of orders of the System Participants;
- information on cash balances in bank accounts;
- information contained in clients' money transfer orders, System Agents' orders;
- information about money transfers made using payment cards;
- information on payment clearing positions;
- information necessary for customers to certify the right to dispose of money;
- information on the configuration that determines the parameters of the operation of automated systems, software, computer facilities, telecommunication equipment, the operation of which is provided by the money transfer operator and used to carry out money transfers, as well as information on the configuration that determines the parameters of the operation of technical means for information protection;
- key information of cryptographic information protection tools used in money transfers;
- restricted information, including personal data and other information subject to mandatory protection in accordance with applicable law, processed when making money transfers.
12.3. Requirements for ensuring information security.
12.3.1. The requirements define the basic principles of information protection and are aimed at minimizing the risks of information security breaches.
12.3.2. Compliance with the Requirements when making money transfers is ensured by:
- selection of organizational measures for information protection; determination in internal documents of the procedure for the application of organizational measures of information protection; determination of persons responsible for the application of organizational measures of information protection; the application of organizational protection measures;
- implementation of control over the application of organizational measures for information protection; performing other necessary actions related to the application of organizational measures for information protection;
- selection of technical means of information protection; determination in internal documents of the procedure for the use of information security equipment, including configuration information that determines the parameters of operation of information security equipment;
- appointment of persons responsible for the use of technical means of information protection; use of technical means of information protection; implementation of control over the use of technical means of information protection; performing other necessary actions related to the use of technical means of information protection.
12.3.3. Participants of the System are obliged to ensure the protection of information when making money transfers in accordance with the requirements of the legislation of the country of origin (incorporation).
12.3.4. The requirements for ensuring the protection of information when making transfers are applied to protect the information specified in paragraph 12.2.1. of the Rules, as well as restricted information defined in the internal documents of the Operator and other Participants, processed when the Participants interact in the System.
12.3.5. Each Member of the System shall ensure compliance with the Requirements for ensuring information security, taking into account the list of operations performed by the Member of the System, and the automated systems, software, computer equipment, telecommunications equipment used, the operation of which is provided by the Member of the System.
12.4. Procedure for ensuring information protection in the System.
12.4.1. In order to ensure the protection of information in the System during storage, processing, exchange of protected information, the System Members shall ensure the implementation, including, but not limited to, the following measures:
- compliance with organizational measures for information protection;
- support for the vulnerability management program;
- creation and maintenance of a secure network infrastructure;
- monitoring of network infrastructure;
- implementation and maintenance of measures to control access to protected information;
- other measures aimed at improving the protection of information.
12.4.2. As part of the creation and maintenance of a secure network infrastructure, the Participants provide support for the configuration of firewalls for data protection, ensuring the analysis of information passing through them, as well as ensuring the restriction of direct access from the outside to the components of the System containing protected information.
12.4.3. The use of passwords and other default security parameters set by the software manufacturer is not allowed.
12.4.4. As part of the implementation of measures to support the vulnerability management program, the Participants are obliged to comply with the requirements established by the Rules for ensuring the protection of information from the effects of malicious codes, to ensure that all components of the System involved in the storage, processing and exchange of protected information use only the latest versions of software developed to counteract external or internal exploitation of vulnerabilities.
12.4.5. As part of the implementation of measures to implement and maintain measures to control access to protected information, the System Participants shall ensure the restriction of access and registration of persons who have access to protected information, including the following:
- access to protected information only to those persons who need such access to perform the functions assigned to them;
- providing access to each employee using a unique name, account, password and/or digital signature verification key to access protected information;
- restriction of access to material media containing protected information, strict control over their storage;
- immediate revocation of access when the person's authority to access the protected information is terminated.
12.4.6. As part of the implementation of measures to monitor the network infrastructure, the System Participants must control access to network resources and protected information, for which they organize monitoring of events related to access to network resources, record user actions necessary for the investigation and analysis of the causes of incidents, ensure the storage of event logs for at least one year, and in operational access for at least three months, provide scheduled and unscheduled (when changes are made) checks of systems, processes and software to maintain their security at the proper level.
12.4.7. When using the Internet to make money transfers, the System Agents ensure:
- application of organizational measures of information protection and (or) use of technical means of information protection designed to prevent access to the content of protected information transmitted over the Internet; unauthorized access to protected information at information infrastructure facilities using the Internet; unauthorized access to protected information by exploiting software vulnerabilities;
- reducing the severity of the consequences of impacts on information infrastructure facilities in order to create conditions for the impossibility of providing money transfer services or untimely money transfers;
- filtering of network packets during information exchange between computer networks in which information infrastructure facilities are located and the Internet.
12.4.8. Access to the Software is carried out using personalized accounts. Passwords for accounts must comply with the internal requirements of the Agents, while the following must be ensured:
a) use of at least 12 characters in the password (must contain: capital and uppercase letters, numbers, special characters);
b) the minimum password validity period is 15 minutes;
c) the frequency of password change at least once every 60 days with a ban on the use of any of the 7 previous passwords;
d) in case of two-factor authentication, the validity period of passwords can be extended, by agreement of the parties, up to one year;
e) password protection during storage and in the process of operation.
12.4.9. Agents of the System are prohibited from using non-personal accounts and administrative accounts to create transfers in the System. Passwords for administrative accounts must be changed from the standard and meet the following requirements:
a) use of at least 14 characters in the password (must contain: capital and uppercase letters, numbers, special characters);
b) frequency of password change at least once every 30 calendar days with a ban on the use of any of the previous passwords;
d) in case of two-factor authentication, the validity period of passwords can be extended, by agreement of the parties, up to one year;
c) protection of the password during storage and in the process of operation.
12.4.10. Agents ensure the participation of persons responsible for ensuring information security in the System in the development and approval of technical specifications for the creation (modernization) of information infrastructure facilities.
12.4.11. Agents of the System ensure the implementation of the prohibition of the use of protected information at the stage of creation of information infrastructure facilities.
12.4.12. At the stages of operation and decommissioning of information infrastructure facilities, the System agents ensure:
a) implementation of the prohibition of unauthorized copying of protected information;
b) protection of backups of protected information;
c) destruction of protected information in cases when the specified information is no longer used, with the exception of protected information moved to archives, the maintenance and preservation of which are provided for by the requirements of the applicable legislation and the Rules;
d) destruction of protected information, including information contained in archives, in a way that ensures the impossibility of its restoration.
12.4.13. Agents of the System provide the possibility for the client to suspend (block) the acceptance for execution of orders to make money transfers on behalf of the specified client.
12.4.14. Agents of the System shall ensure accounting and control of the composition of the software installed and (or) used on computer equipment.
12.4.15. Agents of the System develop and apply organizational measures for information protection, which shall include, among other things:
the presence of an information security policy;
identification of persons responsible for ensuring information security;
availability of the necessary documentation and regulations for the operation of software and hardware;
the procedure for the use of technical means of information protection, including information on the configuration of technical means of information protection, determining the parameters of their operation;
procedures for monitoring the actions of users of information systems;
procedures for managing changes in automated information systems;
the procedure for accounting, use and storage of documents and information carriers;
organization and procedure for archiving and backing up information;
procedure for action in abnormal (emergency) situations;
procedures for granting and distributing user rights;
activities to raise user awareness in the field of information security.
12.4.16. The procedure for applying organizational measures to protect information is determined by the internal regulations of the Agents.
12.4.17. The composition of technical means of information protection shall be formed by the System Participants based on the approved threat model in accordance with the identified current threats, and shall include (but not limited to) the following means:
- identification and authentication;
- physical access control;
- intrusion detection;
- security control (analysis);
- delineation of user powers;
- protection against unauthorized access;
- ensuring the integrity of information;
- cryptographic protection of information;
- anti-virus and spam protection;
- firewall and traffic filtering;
- Log user actions.
12.4.18. When operating information infrastructure facilities, the System Participants shall ensure:
- protection of electronic messages from distortion, falsification, redirection, unauthorized familiarization and (or) destruction, false authorization;
- control (monitoring) of compliance with the established technology for the preparation, processing, transmission and storage of electronic messages and protected information at information infrastructure facilities;
- authentication of incoming electronic messages;
- mutual (two-way) authentication of participants in the exchange of electronic messages;
- restoration of information on cash balances on bank accounts, information on electronic money balances and data of payment card holders in case of deliberate (accidental) destruction (distortion) or failure of computer equipment;
- reconciliation of output electronic messages with the corresponding input and processed electronic messages when making settlements in the System;
- detection of falsified electronic messages, including imitation by third parties of customer actions when using electronic means of payment, and the performance of transactions related to money transfers by an intruder on behalf of an authorized client (substitution of an authorized client) after the authorization procedure has been completed.
12.4.19. To the extent not established in the Rules, the System Participants, guided by the applicable legislation, independently determine the procedure for ensuring information protection when performing their functions in the System when making money transfers, including determining the composition and procedure for the application of organizational information protection measures, the composition and procedure for the use of information security equipment, including information on the configuration of information security equipment, determining the parameters of their work, the procedure for registration and storage of information on paper and (or) in electronic form, containing confirmation of the implementation of the procedure for the application of organizational measures for information protection and the use of technical means of information protection.
12.4.20. In order to ensure the protection of information in the System, the System Participants are obliged to:
- comply with applicable laws, requirements and other regulatory authorities aimed at preventing money transfers without the consent of customers.
- upon receipt from the Operator of the notification provided for in clause 18.6. of the Rules, immediately on the day of receipt of the notification, request from the Client confirmation of the resumption of the execution of the money transfer order. Based on the results of interaction with the Client, immediately inform the Operator about the resumption of the transfer execution or withdraw the transfer.
- comply with the requirements of the System Operator to ensure information security;
- identify incidents related to violations of information security requirements and promptly respond to them;
- inform the System Operator about cases of information security violations and measures taken to eliminate them;
- upon receipt of a request from the System Operator to eliminate violations within a period of no more than 30 (thirty) days to eliminate all violations and notify the System Operator of the fulfillment of the requirements;
- carry out measures aimed at identifying threats to information security, and take measures to prevent the identified threats;
- analyze the vulnerabilities of information systems, monitor the applicable legislation in the field of information protection and take measures to improve the methods and means of information protection.
- use the information identified by the Operator on technical data describing computer attacks aimed at the objects of the information infrastructure of the Operator and (or) its customers in relation to its infrastructure in order to prevent money transfers.
- inform the Operator of the contact details of the department/person responsible for countering money transfers.
12.4.21. The System Operator performs the following additional functions to ensure the protection of information in the System:
- creates a system for identifying and monitoring money transfers in the payment system based on information about transfers;
- provides access to the System Agents to the system for detecting and monitoring money transfers in the payment system in order to identify and monitor money transfers;
- informs the Agents about the detection of incidents in the payment system related to violations of the requirements for ensuring the protection of information when making money transfers, by posting information on the official website on the Internet www.leskarpay.com;
- ensures confidentiality, integrity, authenticity and availability of information about all Agents of the System at all stages of its processing and transmission;
- performs procedures for the secure distribution of cryptographic keys used in the processing and transfer of information between the System Agents;
- ensures the use of electronic signatures for incoming and outgoing electronic documents;
- controls the exchange of authorization and clearing messages in order to timely identify security threats in the System and individual System Participants;
- informs the System Participants about threats to the security of the System and proposes measures to prevent these threats.
12.4.22. The system for identifying and monitoring the Client's money transfers is based on specialized anti-fraud solutions that are implemented by the Agent and the processing center of the payment system. These decisions contain a set of rules on the basis of which the decision to block the Transfer is made. The Rules take into account the peculiarities of the Client's behavior, the geography of his operation, the boundary conditions (limits) for transactions, data on the device from which the operation is carried out, the time intervals of the operation and other criteria. The rules are formed by the developer of the anti-fraud solution and/or the Operator. Also, information from the database about attempts to transfer money without the client's consent is uploaded to anti-fraud systems.
12.4.23. In case of blocking of a transfer, depending on the specific system, the responsible persons of the Agent and the Operator are immediately sent a corresponding notification. Transfer systems provide for obtaining additional confirmation from the initiator of the transfer, on the basis of which a decision is made to cancel the stopped transfer.
12.4.24. In case of detection of a money transfer without the Client's consent by the System Agent, the latter cancels this transfer by means of the transfer system or informs the responsible person of the Operator about such transfer using contact information (e-mail address and/or phone number) provided by the Operator to the Participant.
12.4.25. Agents of the System are obliged to improve methods, procedures, hardware and software, to ensure compliance with the requirements in the field of information protection imposed by the applicable legislation of the authorized executive authorities, and the Rules, taking into account the changing and improving threats to information protection when making money transfers.
12.4.26. Agents of the System are obliged to have a structural unit or appoint a responsible person (employee) responsible for organizing and monitoring information protection in the System in accordance with the requirements of applicable legislation governing this area of activity (hereinafter referred to as the Structural Unit for Information Protection). The responsible person is endowed with the necessary powers and provided with the necessary resources to ensure information security. The Agent notifies the Operator about the responsible employee, his contact details, including full name, phone number and e-mail by an official letter. In the same letter, the Agent notifies the Operator of the external IP addresses used by the Operator to connect to the Software. In case of a change in the responsible employee or a change in the list of IP addresses, the Agent is obliged to notify the Operator no later than 7 days in advance.
12.4.27. The structural unit for information protection shall be vested with the necessary powers and provided with the necessary resources to ensure the protection of information.
12.4.28. Structural subdivision for information protection and structural subdivision for informatization (automation) shall not have a common head.
12.4.29. The structural unit for information protection carries out planning and control of ensuring the protection of information when making money transfers, for which it is vested with the following powers:
- to control (monitor) the implementation of the procedure for ensuring the protection of information when making money transfers;
- determine the requirements for technical means of information protection and organizational measures of information protection;
- monitor the compliance of the System Agent's employees with the requirements for ensuring the protection of information when making money transfers;
- participate in the investigation of incidents related to violation of the requirements for ensuring the protection of information during money transfers, and propose the application of disciplinary sanctions, as well as send proposals for improving information protection methods;
- participate in actions related to the implementation of the requirements for ensuring the protection of information during money transfers, used when restoring the provision of payment system services after failures and failures in the operation of information infrastructure facilities.
12.4.30. Agents of the System shall ensure the registration of persons who have the rights to:
a) on the formation of electronic messages containing instructions for money transfers (hereinafter referred to as electronic messages);
b) access to protected information;
c) cryptographic key management;
d) on the impact on information infrastructure facilities, which may lead to a disruption in the provision of money transfer services.
12.4.31. Agents of the System shall ensure the implementation of the prohibition of one person to perform the following roles at one time:
a) roles related to the creation (modernization) of an information infrastructure facility and the operation of an information infrastructure facility;
b) roles related to the operation of the information infrastructure facility in terms of its intended use and the operation of the information infrastructure facility in terms of its maintenance and repair.
12.4.32. Agents of the System are obliged to ensure that their employees are informed about the possible risks of obtaining unauthorized access to protected information for the purpose of money transfers by persons who do not have the right to dispose of this money, and recommended measures to reduce them.
12.4.33. Failure to comply with the requirements for the protection of information received by the Agent in connection with the performance of the functions assigned to him in accordance with the Rules, which led to the illegal disclosure/compromise of the specified information, is a material violation of the Rules and the basis for the Operator to take enforcement measures provided for by the Rules.
12.4.34. In case of detection of violations, the System Operator has the right to send a request to the System Agent to eliminate violations, and in case of repeated violation of information protection requirements within the last 12 (twelve) months or inaction, to take measures up to the suspension/termination of the Agent's activities in the System. If such violation of information protection requirements endangers the security of other System Agents, the System Operator shall have the right to suspend the Agent's activities in the System without prior notice until such violations are eliminated or to terminate its activities within the System.
12.4.35. At the request of the Operator, but at least once every two years, the System agents shall send information to the Operator for the purpose of analyzing the provision of information protection in the payment system when making money transfers.
12.4.36. Within the framework of the risk management system in the System, the Operator shall additionally determine the procedure for ensuring the protection of information in the System for money transfer operators who are Agents (hereinafter referred to as the requirements for ensuring the protection of information in the System). The requirements for ensuring the protection of information in the System are determined in relation to the following activities that the Agents are obliged to perform:
- management of information security risk (hereinafter referred to as IS as a System Agent) as one of the types of operational risk;
- establishment of the composition of indicators of the level of information security risk in the System (the System Operator recommends setting at least two indicators: the number of incidents of information security violation and the amount of losses from information security risk incidents);
- implementation of processes for identifying and identifying information security risk in the System in relation to the information infrastructure facilities of the System participants involved in the operation in the System, including but not limited to the following methods (if applicable):
- analysis of the database of operational risk events, including IS risk events (hereinafter referred to as the Event Database);
- conducting an annual self-assessment of the level of operational risk, including information security risk, and forms (methods) of control aimed at reducing its level, based on formalized questionnaires;
- analysis of the dynamics of quantitative indicators aimed at measuring and controlling the level of operational risk, including information security risk, at a certain point in time (key risk indicators);
- analysis of information of the organization's employees obtained as part of the initiative informing the Risk Management Service and (or) the Internal Audit Service by the organization's employees;
- analysis of other external and internal sources of information and methods of identifying risks.
The results of the IS risk identification procedure are used to carry out procedures for qualitative assessment of the level of IS risk and correct accounting of the relationship between the identified IS risk and risk events.
The processes of identifying and identifying information security risks should be aimed at identifying events, actions, conditions that may affect information systems and business processes that implement payment services within the System, as well as determining possible consequences, analyzing the causes and sources of information security risk events;
Identification and analysis of information security risk in the System includes the identification of risk sources and events, the occurrence of which may lead to the occurrence of an incident (risk event), and the determination of the risk value for each of the identified risk events, characterized by the probability of the occurrence of risk events and the value of possible consequences of their occurrence; analysis of penetration capabilities, when testing each area, the process of responding to information security incidents and the ability to restore performance, in case of possible compromise of the security of IT systems, is assessed; use of specialized software to identify software and hardware vulnerabilities; continuous monitoring of information security events;
Implementation of processes for responding to information security incidents and restoring the normal functioning of information infrastructure facilities in the event of information security incidents. Restoration of the normal functioning of information infrastructure facilities in the event of information security incidents is a sequence of actions developed in accordance with an approved internal document and directly depends on the specifics of the information system and the causes of the incident (for example, the method of attack used).
The main objectives of the incident response process are:
- prevent or minimize the consequences of an incident while maintaining business continuity within the System;
- to ensure effective and timely restoration of operability (normal functioning) of information resources;
- to increase the level of information security in the organization and the efficiency of incident management;
- implementation of interaction in the exchange of information on information security incidents;
- Work on the development, certification and (or) conformity assessment in relation to the application software of automated systems and applications, including payment applications provided by payment application providers to customers of money transfer operators who are Agents of the System, shall be carried out taking into account the requirements of applicable law.
12.4.37. Procedure, forms and terms of informing System Agents about incidents identified in the System related to violations of information security requirements when making money transfers, procedure for interaction in case of detection of the above incidents in the System. Incidents in the field of information protection include events related to violation of the requirements for ensuring the protection of information when making money transfers, which have led or may lead to money transfers without the consent of the client, failure to provide money transfer services.
The System Operator shall establish appropriate requirements for the content, form and frequency of submission of information sent by the Agents for the purpose of analyzing the provision of information protection in the System when making money transfers, as well as for the purpose of interaction in case of detection of incidents in the field of information protection (information is provided only in relation to activities within the System):