πΌ 12.3 Develop usage policies for critical technologies and define proper use of these technologies.
-
Contextual name: πΌ 12.3 Develop usage policies for critical technologies and define proper use of these technologies.
-
ID:
/frameworks/pci-dss-v3.2.1/12/03
-
Located in: πΌ 12 Maintain a policy that addresses information security for all personnel.
Descriptionβ
Examples of critical technologies include, but are not limited to, remote access and wireless technologies, laptops, tablets, removable electronic media, e-mail usage and Internet usage.
Similarβ
- Sections
/frameworks/pci-dss-v4.0/12/02/01
- Internal
- ID:
dec-c-cc36f64b
- ID:
Similar Sections (Take Policies From)β
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
πΌ PCI DSS v4.0 β πΌ 12.2.1 Acceptable use policies for end-user technologies are documented and implemented. |
Similar Sections (Give Policies To)β
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
πΌ PCI DSS v4.0 β πΌ 12.2.1 Acceptable use policies for end-user technologies are documented and implemented. |