Thoroughly inspect the device for any sign of tampering or damage of the external integrity of the plastic. Save the shipping carton and packing material for future repacking or moving the device. Remove the clear protective film from the display. Remove any protective plastic wrapping and place the unit on a table or countertop 4. Remove the P400/P200 unit from the shipping carton. Validate the authenticity of the sender by verifying the shipping tracking number and other information located on the product order paperwork. PRODUCT IDENTIFICATION AND INSPECTION Carefully inspect the shipping carton and its contents for possible tampering or damage. Failure to use the terminal in accordance with this security policy will cause the terminal to not be in compliance with the PCI PTS POI Modular Security Requirements version 4.x approval of the device. SCOPE The security policy applies to all P400/P200 terminals, which are PCI PTS version 4.x POI approved. AUTHORIZED USE ONLY Ĥ CHAPTER 1 INTRODUCTION This Security Policy provides guidance for the proper and secure usage of Payment Card Industry (PCI) Payment Terminal Security (PTS) Approved Point of Interaction version 4.x devices, such as P400/P200 terminals. Chapter 3, Security Policy, provides information on how to securely deploy P200/P400 terminals. Chapter 2, Firmware and Application Maintenance, provides information on System Mode and Application Download procedures. AUDIENCE This guide is the primary source of information for technicians, administrators and site managers who will deploy and manage the P400/P200 terminals This guide is useful for the following users: Deployers of P400/P200 terminals in end user sites Performs specific tasks required to deploy a new P400/P200 terminal to the field, such as: o o o Terminal configuration Application software download Testing of the terminal prior to deployment Administrators or Site Managers Performs administrative and on-site duties, such as: o o o Changing passwords Perform routine tests and terminal maintenance Configure terminals for remote diagnostics and downloads ORGANIZATION This guide is organized as follows: Chapter 1, Introduction, provides an overview of this Security Policy. Within this document, these products are both referenced simply as the P400/P200. 9 KEY MANAGEMENT ADMINISTRATION SECURITY DEVICE DIAGNOSTICS DEVICE SECURITY CODERS/DEVELOPERS (Firmware and Application) CRYPTOGRAPHY FIRMWARE UPDATES DECOMMISSIONING/REMOVAL FROM SERVICE CHAPTER REFERENCES ACRONYMS Oct 2016 AUTHORIZED USE ONLY ģ PREFACE APPLICABILITY This guide may be applied to the following Verifone products: P400 P400 Plus P200 P200 Plus Please note that variants of the above products are also governed by this security policy. 4 CHAPTER FIRMWARE AND APPLICATION MAINTENANCE. 1 P400 / P400 Plus & P200 / P200 Plus PCI PTS POI Security Policy v1.6Ģ Contents PREFACE.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |