Mechanisms exist to prohibit the storage of sensitive transaction authentication data after authorization.
Does the organization prohibit the storage of sensitive transaction authentication data after authorization?