|
Was the credit card authorization binder stored in the inactive file cabinet in the security room when not in use?
|
| |
|
|
|
|
Were expired credit card authorization forms purged from the binder as required?
|
| |
|
|
|
|
Were all documents other than customer signed credit card authorization forms free of credit card numbers?
|
| |
|
|
|
|
Were all documents free of CVV codes?
|
| |
|
|
|
|
Were all passcodes being protected?
|
| |
|
|
|
|
Were security cameras working, properly placed and recording?
|
| |
|
|
|
|
Was the networking board/networking equipment in a secure area or an area that is frequently monitored?
|
| |
|
|
|
|
Have all network ports in the showroom or other areas frequented by customers been deactivated?
|
| |
|
|
|
|
Were all customer returned laptops, desktops, gaming systems, and tablets properly secured in the store?
|
| |
|
|
|
|
Was the Monthly Internal Security Checklist completed every month?
|
| |
|
|
|