[PCI DSS 3.0] 12.5.5 Monitor and control all access to data.

12.5.5 Monitor and control all access to data.

12.5.5 Verify that responsibility for monitoring and controlling all access to data is formally assigned.

Each person or team with responsibilities for information security management should be clearly aware of their responsibilities and related tasks, through specific policy. Without this accountability, gaps in processes may open access into critical resources or cardholder data.