Reader Security
Firmware and software update
Square will update the firmware associated with the Reader and POS application automatically as needed. For
the Reader, this will occur automatically with limited Seller interaction required. For the Square POS app, the
user will be prompted through standard OS messaging in addition to messaging within the app, once started.
These updates may address various issues, including security updates. In the event of a critical update, the
Square Point of Sale app will notify the Seller of the critical nature of the update and advise a course of action
for applying the update. Based on the criticality of the update, Square may disable transaction processing until
the update is successfully applied. For the Point of Sale (POS) application, the Seller will see updated
applications released every two (2) weeks. Based on the criticality of the updates that have been made to the
application, and the age of the currently installed app, Square may disable transaction processing until an
updated application is successfully installed.
Infrequent or seasonal use
The Reader has a primary battery and backup battery. The primary battery is used for operation of the Reader.
The backup battery is used to maintain the tamper-detection features of the Reader. If the primary battery is
entirely discharged the backup battery will maintain tamper-detection of the device for one year. If the Reader is
not fully charged annually it may enter into a tampered state and become inoperable.
Common use and recharging of the primary battery will prevent the Reader from entering a tampered state. For
infrequent or seasonal users of the Reader we recommend charging the Reader fully at least once each year.
Tamper detection and response
External Inspection of Reader
Under normal operation, the Reader employs internal active tamper-response mechanisms as described below.
These mechanisms are enforced automatically and do not require any initial configuration by the user.
Prior to accepting payments with the Reader, the Seller must inspect the Reader for evidence of external
tampering. Procedures should include, at minimum, examination to identify:
●
Evidence of inserts, wires, overlays or any unknown component connected to the
Reader or inside the card slot
●
Evidence of modification or disassembly of the Reader
●
Visible or tactile changes to the cable connections or card slot
if you discover any evidence of external tampering.
Содержание S089
Страница 1: ...Square Mobile PIN Security Policy and Procedures PCI Software PIN on COTS ...
Страница 5: ...Top view Front view Back view Installation ...
Страница 15: ...S089 ...
Страница 16: ...SPF1 01 ...