Version History
Is it expected that P2PE applications be assessed per Domain 2 requirements (for example, 2A-1.2.c) if forensics tools are not effective due to architectural constraints of the POI device?
| Date | Title | Actions |
|---|---|---|
| Link changed https://www.pcisecuritystandards.org/faq/articles/Frequently_Asked_Question/is-it-expected-that-p2pe-applications-be-assessed-per-domain-2-requirements-for-example-2a-1-2-c-if-forensics-tools-are-not-effective-due-to-architectural-constraints-of-the-poi-device/ → https://www.pcisecuritystandards.org/faqs/1343/ | ||
| Is it expected that P2PE applications be assessed per Domain 2 requirements (for example, 2A-1.2.c) if forensics tools are not effective due to architectural constraints of the POI device? | view version · view diff from previous | |
| Is it expected that P2PE applications be assessed per Domain 2 requirements (for example, 2A-1.2.c) if forensics tools are not effective due to architectural constraints of the POI device? | view version | |