PCI Compliance1 April 202613 min read

PCI DSS 4.0.1 Compliance Deadline: What UK Businesses Need to Know in 2026

Everything UK businesses need to know about the PCI DSS 4.0.1 compliance deadline. Covers what changed, key dates, who is affected, what to do now, penalties for non-compliance, and how to reduce scope through secure telephone payment technology.

The clock is ticking. On 31 March 2025, PCI DSS version 3.2.1 was officially retired, and every organisation that stores, processes, or transmits cardholder data must now comply with PCI DSS version 4.0.1. But the transition is far from over. A significant number of the new requirements introduced in PCI DSS 4.0 were designated as “future-dated” — meaning organisations had until 31 March 2025 to treat them as best practices before they became mandatory. That date has now passed, and the full weight of PCI DSS 4.0.1 applies.

For UK businesses, this is not an abstract compliance exercise. It affects how you take payments over the phone, how your contact centre operates, how your IT team manages security, and how your acquiring bank assesses your risk. This guide explains what has changed, who is affected, what the key deadlines are, what you need to do, and what happens if you fall short.

What Is PCI DSS 4.0.1?

PCI DSS 4.0.1 is the latest version of the Payment Card Industry Data Security Standard, maintained by the PCI Security Standards Council (PCI SSC). It replaces PCI DSS 4.0, which itself replaced version 3.2.1. The “4.0.1” designation reflects minor corrections and clarifications issued in June 2024 to address ambiguities in the original 4.0 text, but the substance of the requirements remains the same as PCI DSS 4.0.

The standard applies globally to every organisation in the payment card ecosystem: merchants, service providers, payment processors, acquirers, and issuers. In the UK, this includes businesses of every size — from single-person e-commerce operations to FTSE 100 retailers and multinational contact centre operators.

The Key Dates You Need to Know

Understanding the PCI DSS 4.0.1 timeline is critical for planning your compliance approach:

  • March 2022: PCI DSS 4.0 published. Organisations could begin transitioning immediately.
  • June 2024: PCI DSS 4.0.1 published with minor corrections and clarifications to 4.0.
  • 31 March 2024: PCI DSS 3.2.1 officially retired for assessments. All new assessments must use 4.0 or 4.0.1.
  • 31 March 2025: All future-dated requirements in PCI DSS 4.0.1 become mandatory. No more grace period. Every requirement in the standard now applies in full.

If your organisation completed its most recent PCI DSS assessment against version 3.2.1 or treated the future-dated requirements as optional best practices, you are now out of compliance. Your next assessment — whether that is an annual Self-Assessment Questionnaire (SAQ) or a Report on Compliance (ROC) — must demonstrate full compliance with PCI DSS 4.0.1, including every requirement that was previously future-dated.

What Changed from PCI DSS 3.2.1 to 4.0.1

PCI DSS 4.0.1 is not a minor update. It represents the most significant overhaul of the standard in over a decade. The changes fall into several categories.

Customised approach

PCI DSS 4.0.1 introduces a “customised approach” alongside the traditional “defined approach.” Under the customised approach, organisations can meet the intent of a requirement using alternative controls, provided they can demonstrate through a rigorous risk assessment that their approach achieves the same security objective. This flexibility is welcome for mature security organisations but demands significantly more documentation and justification than the defined approach.

Targeted risk analysis

Several requirements now mandate that organisations perform a targeted risk analysis to determine the frequency of certain security activities (such as log reviews, vulnerability scans, and password rotations). Rather than prescribing fixed intervals, PCI DSS 4.0.1 requires organisations to justify their chosen frequency based on their specific risk profile. This is more flexible but also more demanding — you must document your rationale and be prepared to defend it during assessment.

Enhanced authentication

Multi-factor authentication (MFA) requirements have been significantly expanded. Under PCI DSS 4.0.1, MFA is required for all access to the cardholder data environment (CDE), not just remote access as under 3.2.1. This affects every administrator, developer, and support engineer who accesses systems that store, process, or transmit card data — whether they are on-site or remote.

Stronger encryption requirements

The standard tightens requirements around encryption, including the protection of cardholder data on trusted networks (not just across public networks), stronger key management practices, and updated cipher suite requirements. TLS 1.0 and 1.1 have been prohibited since PCI DSS 3.2.1, but 4.0.1 strengthens expectations around the implementation and management of encryption throughout the environment.

Anti-phishing and security awareness

New requirements mandate technical controls to detect and protect against phishing attacks targeting personnel. This goes beyond traditional security awareness training — organisations must implement automated technical measures such as email filtering, link analysis, and domain-based message authentication (DMARC, DKIM, SPF) to reduce the risk of phishing-related compromises.

Script management for payment pages

One of the most discussed new requirements applies to organisations with e-commerce payment pages. PCI DSS 4.0.1 requires that all scripts executing on payment pages are authorised, integrity-monitored, and inventoried. This addresses the growing threat of Magecart-style attacks, where malicious JavaScript is injected into checkout pages to skim card data. For contact centres that also operate online payment channels, this requirement adds a new layer of technical obligation.

Expanded logging and monitoring

Requirements for security event logging and monitoring have been strengthened. Organisations must implement automated mechanisms to detect and alert on security events, review logs more frequently, and ensure that log data is protected from tampering. The standard also introduces requirements for detecting and responding to failures in critical security controls.

Service provider obligations

Organisations that provide services to other entities in the payment ecosystem face additional requirements under PCI DSS 4.0.1, including more rigorous documentation of shared responsibilities, regular confirmation of compliance status, and enhanced incident response procedures.

Who Is Affected in the UK?

PCI DSS 4.0.1 affects every UK organisation that handles cardholder data. The specific impact depends on your role in the payment chain and how you take payments.

Contact centres and telephone payment operations

If your agents hear, see, or type card numbers during telephone payments, your entire telephony infrastructure, agent workstations, network, and call recording systems are in scope for PCI DSS 4.0.1. The expanded MFA requirements, enhanced logging, and stronger encryption standards all apply to these environments. For contact centres that have been operating under 3.2.1 controls, the gap to 4.0.1 compliance can be significant.

E-commerce businesses

Online retailers using hosted payment pages or iframes face new obligations around script management and page integrity monitoring. Those using redirect-based payment flows may also see changes to their SAQ requirements.

Retailers with physical card terminals

Brick-and-mortar retailers using chip-and-PIN terminals are typically the least affected, particularly if they use point-to-point encryption (P2PE) validated solutions. However, the updated standard still imposes new requirements around network segmentation validation, MFA for administrative access, and security awareness training.

Service providers and payment processors

UK payment service providers, processors, and technology vendors face the most demanding set of new requirements, including additional controls around multi-tenancy, customer isolation, penetration testing, and incident response.

Small businesses

Small businesses are not exempt. If you take even a single card payment, PCI DSS applies. The simplified SAQ process exists to make compliance manageable for smaller organisations, but the underlying requirements of 4.0.1 still govern what your payment processes must look like.

What UK Businesses Need to Do Now

If you have not yet addressed the transition to PCI DSS 4.0.1, you need to act now. Here is a practical roadmap.

1. Understand your current compliance position

Review your most recent PCI DSS assessment. Was it completed against version 3.2.1 or 4.0? Did it treat future-dated requirements as best practices? If so, those requirements are now mandatory, and your next assessment must address them.

2. Conduct a gap analysis

Compare your current security controls against the full requirements of PCI DSS 4.0.1. The PCI SSC publishes a detailed summary of changes document that maps every new and modified requirement. Focus particularly on the requirements that were future-dated, as these are the areas most likely to require new controls or processes.

3. Prioritise the highest-impact changes

Not all new requirements carry equal weight. Prioritise based on risk and effort:

  • MFA expansion — Ensure MFA is in place for all access to the CDE, not just remote access.
  • Targeted risk analysis — Document your risk-based justification for the frequency of security activities.
  • Anti-phishing controls — Implement technical measures to detect and prevent phishing attacks.
  • Script management — If you operate payment pages, inventory and monitor all scripts.
  • Enhanced logging — Ensure automated alerting and tamper-proof log storage are in place.

4. Reduce your PCI DSS scope

The most effective way to simplify PCI DSS 4.0.1 compliance is to reduce the number of systems that handle cardholder data. For telephone payments, this means adopting technologies like DTMF masking or channel separation that prevent card data from entering your contact centre environment. When card data never touches your agents, workstations, network, or call recordings, those systems fall out of PCI DSS scope entirely.

Paytia’s DTMF suppression technology does exactly this. Agents stay on the call with the customer, but card details are entered via the telephone keypad and routed directly to Paytia’s PCI DSS Level 1 certified infrastructure. The agent never sees or hears the card number. The result: your contact centre can typically complete SAQ A instead of SAQ C or D, dramatically reducing the number of 4.0.1 controls you need to implement.

5. Update your SAQ or prepare for your ROC

Work with your acquiring bank or QSA to confirm which SAQ applies to your organisation under PCI DSS 4.0.1. The SAQ templates have been updated to reflect the new requirements. If you are a Level 1 merchant or service provider requiring a ROC, ensure your QSA is assessing against 4.0.1 and that their methodology accounts for all previously future-dated requirements.

6. Train your team

PCI DSS 4.0.1 strengthens requirements around security awareness training. Ensure all staff who handle cardholder data or support payment systems receive updated training that covers the new requirements, your organisation’s specific controls, and the evolving threat landscape.

7. Review your service providers

If you rely on third-party service providers for payment processing, hosting, or telephony, confirm their compliance with PCI DSS 4.0.1. Request their updated Attestation of Compliance (AoC) and review the shared responsibility matrix to ensure there are no gaps between what they cover and what you are responsible for.

What Happens If You Are Not Compliant?

Non-compliance with PCI DSS carries real consequences. These are not theoretical — they are actively enforced through the card scheme programmes.

  • Fines from card brands: Visa, Mastercard, and other card schemes can impose fines on acquiring banks, which are passed through to the non-compliant merchant. Fines can range from £4,000 to £80,000 per month, escalating the longer non-compliance persists.
  • Increased transaction fees: Non-compliant merchants may be placed on elevated risk programmes with higher per-transaction fees.
  • Mandatory forensic investigation: If a data breach occurs and the organisation is found to be non-compliant, the card brands can require a forensic investigation conducted by a PCI Forensic Investigator (PFI) at the merchant’s expense. These investigations typically cost £20,000 to £100,000 or more.
  • Loss of card acceptance: In extreme cases, non-compliant organisations can lose the ability to accept card payments altogether — effectively shutting down a major revenue channel.
  • Reputational damage: A publicised data breach erodes customer trust, damages brand reputation, and can take years to recover from.
  • Regulatory action: For FCA-regulated firms, a payment data breach resulting from non-compliance could trigger additional regulatory scrutiny and potential enforcement action under Consumer Duty obligations.

How Paytia Helps UK Businesses Meet PCI DSS 4.0.1

Paytia’s secure telephone payment platform is designed to dramatically simplify PCI DSS compliance for organisations that take card payments over the phone. Here is how we help with the transition to PCI DSS 4.0.1:

  • Scope reduction: By preventing card data from entering your contact centre environment, Paytia removes your telephony, agent workstations, network, and call recording systems from PCI DSS scope. This means the majority of the new 4.0.1 requirements simply do not apply to those systems.
  • SAQ simplification: Organisations using Paytia for telephone payments can typically complete SAQ A rather than SAQ C or D. SAQ A under PCI DSS 4.0.1 contains significantly fewer requirements than SAQ C or D, even accounting for the new controls added in 4.0.1.
  • PCI DSS Level 1 certified: Paytia is independently certified to PCI DSS Level 1 — the highest level of compliance — and maintains this certification against the current version of the standard, including 4.0.1.
  • DTMF suppression: Card details are captured via the telephone keypad with DTMF tones masked in real time. Agents stay on the call but never hear or see card data.
  • Channel separation: Secure payment links sent during or after calls give customers a second option that supports 3D Secure and digital wallets.
  • Cloud-based deployment: No hardware, no on-premise infrastructure, and no complex integration projects. Paytia works with your existing telephony and payment gateway.
  • Compliance support: Our team helps you understand the impact of PCI DSS 4.0.1 on your specific operation and provides the documentation you need for your SAQ or QSA assessment.

Frequently Asked Questions

Is PCI DSS 4.0.1 mandatory now?

Yes. As of 31 March 2025, all requirements in PCI DSS 4.0.1 — including those that were previously future-dated — are fully mandatory. There is no further grace period.

What is the difference between PCI DSS 4.0 and 4.0.1?

PCI DSS 4.0.1 contains minor corrections, clarifications, and formatting updates to version 4.0. The substantive security requirements are the same. The PCI SSC recommends using 4.0.1 for all assessments going forward.

Do small businesses need to comply with PCI DSS 4.0.1?

Yes. PCI DSS applies to every organisation that stores, processes, or transmits cardholder data, regardless of size. Small businesses typically complete a simplified Self-Assessment Questionnaire, but the underlying standard is the same.

How can I reduce the cost of PCI DSS 4.0.1 compliance?

The most effective strategy is scope reduction — removing systems from contact with cardholder data so they fall outside PCI DSS requirements. For telephone payments, technologies like DTMF suppression and secure payment links achieve this by routing card data directly to a certified provider, bypassing your entire contact centre environment.

What SAQ do I need under PCI DSS 4.0.1?

This depends on how you take payments. If you use a technology like DTMF masking that prevents card data from entering your environment, you typically qualify for SAQ A. If agents type card details into a virtual terminal, you likely need SAQ C or SAQ D. Your acquiring bank or QSA can confirm the correct SAQ for your setup. Review the PCI DSS levels to understand where your organisation sits.

The transition to PCI DSS 4.0.1 is the biggest change to payment security standards in over a decade. The organisations that act now — reducing scope, updating controls, and choosing the right technology partners — will find compliance manageable and cost-effective. Those that delay risk fines, increased costs, and the operational disruption of a last-minute scramble.

If your organisation takes card payments over the phone and you want to understand how Paytia can simplify your path to PCI DSS 4.0.1 compliance, book a demo or contact our team to discuss your requirements.

Further reading: PCI DSS glossary | PCI DSS compliance glossary | PCI DSS levels glossary | SAQ self-assessment glossary | DTMF suppression solutions

Ready to take secure payments?

Get started in minutes, not months. No hardware, no software installs, no changes to your phone system. Just secure, PCI-compliant payments.