top of page
< Back

12.3 PCI DSS (v3.2.1)

Compliance Standard

Compliance Version

Control ID




Requirement 12: Maintain a policy that addresses information security for all personnel


Develop usage policies for critical technologies and define proper use of these technologies.

Note: Examples of critical technologies include, but are not limited to, remote access and wireless technologies, laptops, tablets, removable electronic media, e-mail usage and Internet usage.

Ensure these usage policies require the following:

bottom of page