Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

AVEVA™ System Platform

Compromised Devices—11​.300 (c)

  • Last UpdatedDec 13, 2016
  • 1 minute read

"(c) Following loss management procedures to electronically deauthorize lost, stolen, missing, or otherwise potentially compromised tokens, cards, and other devices that bear or generate identification code or password information, and to issue temporary or permanent replacements using suitable, rigorous controls."

Loss management procedures must be clearly defined and consistently applied to protect the integrity of electronic signatures when passwords or any other signature component or component generating device is lost or compromised.

TitleResults for “How to create a CRG?”Also Available in