PostHeaderIcon

Information Security Policy

All Sensitive Information must be stored securely and disposed of in a secure manner when no longer needed for business reasons. Any media (i.e – paper, floppy disk, backup tape, computer hard drive, etc.) that contains sensitive information must be protected against unauthorized access. Media no longer needed must be destroyed in such a manner to render sensitive data irrecoverable (i.e. – shredding, degaussing, disassembly, etc.). Credit Card Information Handling Specifics • Destroy cardholder information in a secure method when no longer needed. Media containing card information must be destroyed by shredding or other means of physical destruction that would render the data irrecoverable(shred, degauss, etc.). • It is prohibited to store the contents of the credit card magnetic stripe (track data) on any media whatsoever. • It is prohibited to store the card-validation code (3 or 4 digit value printed on the signature panel of the card) on any media whatsoever. • All but the last 4 numbers of the credit card account number must be masked (i.e. – x’s or *’s) when the number is displayed electronically or on paper. Protect Data in Transit If Sensitive Information needs to be transported physically or electronically, it must be protected while in transit (i.e. – to a secure storage facility or across the Internet). • Sensitive Information and Credit card account numbers must never be e-mailed without using proper encryption technologies (i.e. – PGP encryption). • Media containing Sensitive Information and credit card account numbers must only be given to trusted persons for transport to off-site locations.

Pages: 1 2 [3] 4 5 6 7


Add comment:
Name:
Sait link: http://
Your message:
Enter today\\\\'s date, 2 digits
(spam protection):
 



News

Find Cheaper telecoms with Commsquote.com

By: Hiring a computer consulting firm involves taking into account a whole different set of questions than the ones you ask when you’re hiring employees for your own company. A computer consultant is not on your payroll, so you have to make sure that you’re dealing with a trustworthy company that fits the needs of your business. Here are a few questions to consider when you’re looking to hire a new computer consulting firm. By: "Your Guide to Buying Digital Cameras" - Taking Beautiful Digital Pics Made Simple! Tips on how to use a digital camera like a pro and an insider look at basic digital photography By: In this world of telecoms and broadband with mobile and everyone fighting for your business, who do you know to use for your current business telecoms and which provider will treat you like a customer and not a number and will not sign you up on a low rate and then increase your telecoms rates and charges at a later date.



Popular

Jennifer Schuett – A Rape Victim Fights Back

Jennifer Schuett – A Rape Victim Fights BackAuthor: Nate WaymireOn August 10, 1990 Jennifer Schuett was an 8-year-old girl who fell asleep in her own room on a hot summer night. She lived with her mother, a single parent who worked hard to raise a daughter in the small town of Dickinson, Texas. What happened next would change her entire life … and nearly end it. As Jennifer slept, an unidentified man snuck in through her window and took the girl in his arms.



New!

Travel to India and experience a world in itself

Travel to India and experience a world in itselfAuthor: onlinenewsncredible India undoubtedly, is a symbol of different environmental features having desert regions, coastal areas, valleys, mountain ranges, dry plateaus, tropical rain forests and many more. Besides these, India is the land of various seasons, colorful festivals and cheerful celebrations, thereby reflecting high spirits of Indian people. Its vibrant and rich culture has always fascinated tourists from all over the world, in large quantity.