Compromised Devices—11.300 (c)
- Last UpdatedDec 13, 2016
- 1 minute read
(c) Following loss management procedures to electronically deauthorize lost, stolen, missing, or otherwise potentially compromised tokens, cards, and other devices that bear or generate identification code or password information, and to issue temporary or permanent replacements using suitable, rigorous controls."
Loss management procedures must be clearly defined and consistently applied to protect the integrity of electronic signatures when passwords or any other signature component or component generating device is lost or compromised.