When developing security processes for handling credit card data on the business unit’s information system, the information security manager should FIRST:
A. review corporate policies regarding credit card information.
B. implement the credit card companies’ security requirements.
C. ensure that systems handle credit card data are segmented.
D. review industry’s best practices for handling secure payments.
A. review corporate policies regarding credit card information.
B. implement the credit card companies’ security requirements.
C. ensure that systems handle credit card data are segmented.
D. review industry’s best practices for handling secure payments.