Module 21: Compliance, Security, and Regulatory Responsibilities in Virtual Card Products

🧠 Learning Objectives

By the end of this module, you will:

Understand the core compliance frameworks that govern card products (especially PCI DSS)

Learn what responsibilities fall on product teams, platforms, and partners

Avoid major risks related to data handling, KYC, AML, and merchant behavior

Know how to build card features that comply with scheme and issuer policy

Design systems and flows that minimize your regulatory surface area while enabling scale

Why Compliance Matters in Virtual Cards

Card products touch:

End-user identity and spending behavior

Regulated financial networks (Visa, Mastercard, Verve, UnionPay)

Stored and transmitted card data (PAN, CVV, expiry)

Cross-border currency conversion and asset movement

Even if your API provider (like Bitnob or Marqeta) abstracts some complexity, you are still operationally and reputationally responsible for compliance.

If you get this wrong:

Your BIN can be blacklisted

Your merchant partners may be cut off

You expose users to fraud and data breaches

You risk heavy fines from card networks or regulators

Core Frameworks You Must Understand

FrameworkScopeWho It Applies To
PCI DSSCard data security (storage, access, transmission)Anyone touching PAN, CVV, etc.
KYC/AMLIdentity verification, source of fundsPlatform and issuer jointly
Card Scheme RulesUsage, MCCs, chargebacks, limitsIssuers, processors, you (indirectly)
Data Protection (e.g. GDPR)User consent, data storage, deletion rightsYou and any third-party processors
Local Regulatory (CBN, FCA, etc.)Licensing, transaction rulesVaries by market, usually applies to issuer or platform-level partners

PCI DSS (Payment Card Industry Data Security Standard)

PCI DSS is the global standard that governs how cardholder data is stored, handled, and transmitted.

If your system stores, processes, or even touches card data, you must comply with PCI DSS.

Key Cardholder Data Elements:

Data ElementCan You Store It?
PAN (card number)Only if encrypted and compliant
CVVNo – cannot store post-issuance
Expiry DateYes, with controls
Cardholder NameYes, low risk

If you’re not PCI DSS compliant, you must:

Use tokenized card data via API

Avoid logging raw PAN or CVV

Never display CVV more than once

Mask PANs in all UIs (5078 **** **** 1234)

Use PCI-compliant SDKs or gateways for sensitive actions

What If You're Using a PCI-Compliant Provider?

Good platforms (like Bitnob, Lithic, Marqeta) are PCI DSS Level 1 certified.

If you’re building on them:

You inherit part of their compliance, but you must not bypass their protections

Avoid doing anything that puts you back in scope (like raw PAN logging or direct DB storage)

Build your admin tools and support dashboards to consume tokenized data, not raw values

Compliance in Product Design

AreaWhat to Do
KYC TieringShow clear user levels (e.g. “Tier 1: ₦50k/day limit”)
FX Fee DisclosureAlways display fee + rate breakdown
Card Termination FlowClearly notify user that card cannot be recovered
Dispute WorkflowLog user claims, provide evidence to issuer
MCCRestrictionsBlock UI entry to known-prohibited categories (e.g., gambling, crypto)
Card Expiry ManagementRemind user before card expires (and handle refund on termination)

Key Things You Must Never Do

Store CVV in plaintext or even encrypted

Log full PANs in server logs, analytics, or error messages

Replay transaction payloads for debugging without secure storage

Let customer support copy/paste full card numbers

Display masked cards without authentication (e.g., app open without PIN/FaceID)

Anti-Money Laundering (AML) and Risk Controls

Even if you’re not a licensed financial entity, you must design with AML best practices:

RiskMitigation
Multi-account abuseFingerprint devices, emails, or funding sources
Card testingLimit per-user issuance, monitor decline patterns
Refund launderingCap refunds, link refunds to successful spend
Anonymous spendEnforce KYC before card activation or large top-ups

Compliance Logging and Audits

You should always log:

Card creation events

Card lifecycle transitions (who froze, terminated, when)

Transaction decline reasons

Refunds, chargebacks, and disputes

KYC tier upgrades and limits

These are not only useful for support — they’re vital for audits, partner reviews, and scheme relationships.

Recap

Compliance is not just your provider’s responsibility — it's built into your product

PCI DSS governs what data you touch and how you touch it

Never store CVV, and always use masked PANs with authentication

Your product must explain limits, fees, and card status clearly to stay compliant

You’re part of a regulated value chain — act like it, even if you don’t hold a license