● Public access must be limited to only parts of the device a customer is expected to use to
complete a transaction (for example, PIN-pad and card reader).
● Place devices in an environment that deters compromise attempts.
● Use appropriate lighting, access paths, and visible security measures.
● The device must be positioned in a way to help prevent tampering.
● Customer access to the device must be limited to the parts of the device that a customer is
expected to use to complete a transaction, such as the PIN-pad and card reader. Consider
using a stand or mounting plate that physically restricts access to the other parts of the
device. Consider keeping POI devices behind a desk or counter so that they may be passed
to the customer only if PIN entry is required.
● Mount the device in such a way as to obscure observation of the PIN-pad. When possible,
use visual shields or stands that enable the cardholder to pivot the keypad to ensure privacy.
● If the customer will not interact with the device, place the device on a trusted employee’s
desk where only that employee can access the device so that it is not accessible by
customers or other employees.
● Using the guidance in Section 3.3 of this document, physically secure deployed devices to
prevent unauthorized removal or substitution. Mobile devices and any devices not in use
must be physically secured in a locked storage area. Update the Storage Access Log each
time the storage area is accessed, including checking in and checking out mobile devices.
See the “Securing POI devices in storage” portion of Section 3.3 of this document for more
information.
Comply with all POI device manufacturer recommendations regarding temperature extremes, moisture
exposure, vibration, ventilation requirements, etc.
Appropriate locations for POI devices awaiting deployment:
Consider the following when choosing a location for POI devices that are awaiting deployment. Always
secure physical access to devices that are not deployed or currently being used, including devices that are
awaiting deployment.
At each location, designate a secure storage method for POI devices not in use. Physical access must be
strictly secured using a locking mechanism. Suitable secure storage options include a locked cabinet, safe,
lock box, etc. For access to the secure storage area, define a limited number of trusted custodians who alone
will have access. Keys, passwords, and/or combinations must be kept secure at all times. Non-authorized
individuals must not have access to the secure storage or to the keys, passwords, and/or combinations used
to secure the storage area.
Update the Storage Access Log each time the secure storage is accessed. See the “Securing POI devices in
storage” portion of Section 3.3 of this document for more information.
Appropriate locations for POI devices undergoing repair or otherwise not in use:
Consider the following when choosing a location for POI devices that are undergoing repair or otherwise not
in use. Always secure physical access to devices that are not deployed or being used.
At each location, designate a secure storage method for POI devices undergoing repair or not in use.
Physical access must be strictly secured using a locking mechanism. Suitable secure storage options include
a locked cabinet, safe, lock box, etc. For access to the secure storage area, define a limited number of
trusted custodians who alone will have access. Keys, passwords, and/or combinations must be kept secure
at all times. Non-authorized individuals must not have access to the secure storage or to the keys,
passwords, and/or combinations used to secure the storage area.