
Table of contents
Table of contents 3
1. P2PE Solution Information and Solution Provider Contact Details 4
1.1 P2PE Solution Information 4
1.2 Solution Provider Contact Information 4
2. Confirm devices were not tampered with and confirm the identity of any third party personnel 5
2.1 Instructions for ensuring POI devices originate from trusted sites/locations only 5
2.2 Instructions for confirming POI device and packaging were not tampered with, and for establishing
secure, confirmed communications with the solution provider 5
2.3 Instructions to confirm the business need for, and identities of, any third-party personnel claiming
to be support or repair personnel, prior to granting those personnel access to POI devices. 8
3 Approved POI Devices, Applications/Software, and the Merchant Inventory 9
3.1 POI Device Details 9
3.2 POI Software/Application Details 14
3.3 POI Inventory & Monitoring 20
4 POI Device Installation Instructions 22
4.1 Installation and connection instructions 22
4.2 Guidance for selecting appropriate locations for deployed devices 23
4.3 Guidance for physically securing deployed devices to prevent unauthorized removal or
substitution 23
5. POI Device Transit 25
5.1 Instructions for securing POI devices intended for, and during, transit 25
5.2 Instructions for ensuring POI devices are shipped to trusted sites/locations only 25
6 POI Device Tamper & Modification Guidance 26
6.1 Instructions for physically inspecting POI devices and preventing skimming, including instructions
and contact details for reporting any suspicious activity 26
6.2 Instructions for responding to evidence of POI device tampering 30
7 Device Encryption Issues 31
7.1 Instructions for responding to POI device encryption failures 31
8 POI Device Troubleshooting 32
8.1 Instructions for troubleshooting a POI device 32
9 Additional Guidance 33
9.1 Additional Guidance for the Genius Smart P2PE solution 33
9.2 Instructions for how to confirm hardware, firmware, and application versions on POI devices 33
10. Appendix: Checklist for Remote Key Injection 36