12.3.6 Verify that the usage policies require acceptable network locations for the technology
[PCI DSS 1.x] 12.3.6 Acceptable network locations for the technologies
[READ-ONLY] Archives
[RETIRED] PCI DSS v.1.x Questions and Answers
Maintain an Information Security Policy
Hello,
Wondered if anyone could help on what this actually looks like?
Does this mean specifying things such as where you should and shouldn’t use a laptop for example?
Any help appreciated
Regards
Rob
Do you have any procedure document for it