1. Assess – Identifying card holder data, taking an inventory of your assets and business processes for payment card processing, and analyzing them for vulnerabilities that could expose card holder data.
2. Remediate 0 fixing vulnerabilities and not storing card holder data unless you need it.
3. Report – Compiling and submitting required remediation validation records(if applicable), and submitting compliance reports to the acquiring bank and card brands.
Saturday, January 10, 2009
Labels: Software stuff 0 comments
Sunday, January 4, 2009
A newspaper published fom Mumbai. Delhi.
Labels: Newspaper 0 comments
Subscribe to:
Posts (Atom)