v.1.1


[PCI-DSS] Requirement 12: Maintain a policy that addresses information security A strong security policy sets the security tone for the whole company and informs employees what is expected of them. All employees should be aware of the sensitivity of data and their responsibilities for protecting it.

Reply
Share/Bookmark

 

Thread Tools Search this Thread Display Modes
Old 03-18-2007, 03:39 AM   #1
admin
Administrator
 
admin's Avatar
 
Join Date: Jul 2002
Posts: 264
Thanks: 1
Thanked 0 Times in 0 Posts
admin has much to be proud ofadmin has much to be proud ofadmin has much to be proud ofadmin has much to be proud ofadmin has much to be proud ofadmin has much to be proud ofadmin has much to be proud ofadmin has much to be proud of
Default 12.3.6 Acceptable network locations for the technologies

12.3.6 Verify that the usage policies require acceptable network locations for the technology
admin is offline   Reply With Quote
Old 05-19-2011, 05:39 AM   #2
rob16 
Junior Member
 
Join Date: May 2011
Posts: 1
Thanks: 0
Thanked 0 Times in 0 Posts
rob16 is on a distinguished road
Default

Hello,

Wondered if anyone could help on what this actually looks like?

Does this mean specifying things such as where you should and shouldn't use a laptop for example?

Any help appreciated

Regards

Rob
rob16 is offline   Reply With Quote
Old 11-02-2011, 05:56 AM   #3
khajuraho 
Junior Member
 
Join Date: Nov 2011
Posts: 1
Thanks: 0
Thanked 0 Times in 0 Posts
khajuraho is on a distinguished road
Default

Do you have any procedure document for it
khajuraho is offline   Reply With Quote
Reply
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off


Similar Threads

Thread Thread Starter Forum Replies Last Post
8.3 Implement two-factor authentication for remote access to the network by employees, administrators, and third parties. Use technologies such as remote authentication and dial-in service (RADIUS) or terminal access controller access control system (TACACS) with tokens; or VPN (based on SSL/TLS or IPSEC) with individual certificates. admin [PCI-DSS] Requirement 8: Assign a unique ID to each person with computer access 3 01-13-2014 06:18 AM
[PCI-DSS] 1.3.8 Implement IP masquerading to prevent internal addresses from being translated and revealed on the Internet, using RFC 1918 address space. Use network address translation (NAT) technologies—for example, port address translation (PAT). admin [PCI-DSS] Requirement 1: Install and maintain a firewall configuration to protect cardholder data 1 06-03-2008 06:08 PM
12.3.5 Acceptable uses of the technology admin [PCI-DSS] Requirement 12: Maintain a policy that addresses information security 0 03-18-2007 03:39 AM
12.3 Develop usage policies for critical employee-facing technologies (such as modems and wireless) to define proper use of these technologies for all employees and contractors. Ensure these usage policies require the following: admin [PCI-DSS] Requirement 12: Maintain a policy that addresses information security 0 03-18-2007 03:37 AM
[PCI-DSS] 3.5.2 Store cryptographic keys securely in the fewest possible locations and forms. admin [PCI-DSS] Requirement 3: Protect stored cardholder data 0 03-18-2007 02:55 AM


All times are GMT -4. The time now is 04:06 PM.


All logos and trademarks in this site are property of their respective owner.
The comments are property of their posters, all the rest ©2007 - 2014 by PCI Network except where noted otherwise.
Powered by vBulletin, Copyright ©2000 - 2014, vBulletin Solutions, Inc.