PCI DSS v4.0.1

PCI DSS v4.0.1 for contact centres — what changed and what you need now

PCI DSS v4.0.1 has been the mandatory standard for processing, storing, or transmitting cardholder data since 31 March 2025. If your contact centre is still working off v4.0 documentation, or worse, v3.2.1, the gap is no longer optional. The good news for contact centres taking secure phone payments: most of what changed in v4.0.1 either codifies what good operators were already doing, or makes the case for descoping much stronger.

What changed in v4.0.1

PCI DSS v4.0.1 is technically a minor revision of v4.0 — the version that replaced v3.2.1 in March 2024. The changes between v4.0 and v4.0.1 are clarifications and corrections, not new requirements. The bigger shift is between v3.2.1 and the v4 family.

The 13 future-dated requirements that were recommended best practice under v4.0 became mandatory on 31 March 2025 under v4.0.1. These are the ones that catch out contact centres most often:

There are eight more in the same bucket. The pattern is the same: things contact centres had been told for years they should do are now things they must do, with documentation and evidence.

What this means for contact centres specifically

Contact centres taking card payments over the phone sit in one of three categories under v4.0.1:

Category 1 — agents hear card data.The worst position to be in. The agent's headset is in scope. The call recording is in scope. The agent's workstation is in scope. The contact-centre LAN is in scope. The IVR is in scope. Most of the call-leg infrastructure is in scope. The targeted risk analysis required under 12.3.1 has to cover all of it.

Category 2 — agents stay on the line, but card data is masked or removed before it reaches them. This is what DTMF masking technology does. The customer keys their card details on their handset; the tones are intercepted before they reach the agent's audio leg. Agents do not hear card data and recordings do not capture it. The card-data environment shrinks dramatically — typically by around 96 per cent in scope volume.

Category 3 — fully self-service IVR, no agent involvement. Card data never touches an agent at all. Scope reduction is similar to Category 2 but the customer experience is more transactional. Suits high-volume scenarios like utility bills.

Most UK contact centres operate a mix of Category 2 and Category 3, with DTMF masking on agent-assisted calls and IVR for out-of-hours self-service. Category 1 operators are increasingly rare among regulated buyers, but pockets remain in healthcare and SME insurance.

Where DTMF masking fits in v4.0.1

PCI DSS v4.0.1 does not mandate DTMF masking by name. It does, however, accept the principle behind it — that the most reliable way to remove a system from the cardholder-data environment is to ensure cardholder data never enters it.

This is why DTMF masking sits well with the v4.0.1 emphasis on documented scope reduction. The targeted risk analysis required under Requirement 12.3.1 is much shorter when there is genuinely nothing to risk-analyse, because the agent leg, the recording, and the contact-centre LAN do not see card data at all.

Paytia has been PCI DSS Level 1 since founding — the highest tier, required for any organisation handling more than six million card transactions a year — and has maintained that certification through every revision of the standard, including the move from v3.2.1 to v4.0 to v4.0.1. Customers using Paytia DTMF masking typically reduce their PCI scope by up to 96 per cent, which means a v4.0.1 audit covers a fraction of the systems it would otherwise need to.

How to verify your v4.0.1 compliance status

A short checklist you can run this week:

  1. Confirm the version of PCI DSS your last attestation was against. If it says v3.2.1 or v4.0, you have a gap.
  2. Identify which Self-Assessment Questionnaire (SAQ) you used. SAQ-D-MER is the most common for contact centres; SAQ-C-VT applies to virtual terminals; SAQ-B-IP applies to IP-connected POI devices.
  3. Run the targeted risk analysis required under Requirement 12.3.1 for each requirement that allows flexibility. The most commonly missed step in early-2026 audits.
  4. Inventory payment page scripts and confirm change-and-tamper detection is in place if you operate any hosted payment pages.
  5. Verify your incident response procedures specifically address PAN-where-it-shouldn't-be detection.

If items 3, 4, or 5 surface gaps, the question becomes whether to remediate inside the existing CDE or to descope by removing card data from the path entirely. The economics increasingly favour descoping.

Common gaps and how to close them

The four gaps we see most often when contact centres come to us mid-audit:

Call recordings still contain DTMF tones. The recording was made before masking was introduced, or the masking was implemented incorrectly. Solution: confirm DTMF suppression is happening at the right point in the call leg, and audit the recording archive for tone-bearing files.

Agent workstation drift. A workstation that was previously out of scope is brought into scope by an unrelated change — a new browser extension, a screen-share tool, a CRM integration. Solution: re-run the targeted risk analysis against the actual deployed configuration, not the documented one.

Hosted payment page script inventory missing. A common one for contact centres that added a virtual terminal during 2020. Solution: produce the inventory required under 6.4.3.

Incident response gaps.The runbook covers a breach but not "we found PAN stored in a Slack channel." Solution: amend the runbook to cover stored-PAN-in-the-wrong-place detection and response.

Talk to a specialist about your scope

If you're taking card payments over the phone and you're not confident your v4.0.1 attestation will pass cleanly, the conversation usually starts with a simple question — what is actually in scope today, and what could be out of scope tomorrow if card data never reached the agent leg in the first place. Talk to a Paytia specialist and we'll walk through your environment in 30 minutes.

FAQ

Frequently asked questions

When did PCI DSS v4.0.1 become mandatory?
PCI DSS v4.0.1 became the mandatory standard on 31 March 2025. The 13 future-dated requirements that were best practice under v4.0 became mandatory on the same date. Any attestation completed after 31 March 2025 must be against v4.0.1.
What's the difference between PCI DSS v4.0 and v4.0.1?
v4.0.1 is a minor revision of v4.0. It clarifies and corrects ambiguous or error-bearing language but introduces no new requirements. The substantive change is the move from v3.2.1 to the v4 family, which happened in March 2024. v4.0.1 is the version contact centres are now audited against.
Which v4.0.1 requirements affect contact centres most?
Requirements 6.4.3 (payment page script inventory), 8.6.2 (application account login controls), 11.6.1 (change-and-tamper detection), 12.3.1 (targeted risk analysis), and 12.10.7 (PAN-storage incident response) are the ones we see most often in contact-centre audit findings. The pattern is documentation and evidence requirements, not new technical controls.
Does DTMF masking still fully meet PCI DSS v4.0.1?
Yes. PCI DSS v4.0.1 accepts the principle that the most reliable scope reduction is keeping card data out of the environment in the first place. DTMF masking does exactly that — card data never enters the agent leg, the call recording, or the contact-centre LAN. Paytia DTMF masking has been PCI-DSS Level 1 certified through v3.2.1, v4.0, and v4.0.1.
How can a contact centre verify it's v4.0.1 compliant?
Confirm your last attestation was against v4.0.1 (not v4.0 or v3.2.1), confirm you have completed the targeted risk analysis required under Requirement 12.3.1, and confirm your script inventory and incident response procedures meet 6.4.3 and 12.10.7. If any of those are missing or stale, you have a remediation gap — usually closeable inside a quarter, faster if descoping is on the table.

Used by British American Tobacco · Howard Kennedy · CITB · Clinical Partners · Trinity Hall College

Since 2016

Building secure payments

PCI DSS Level 1

Highest certification

99.99%

Platform uptime

£40M+

Transactions processed