3.4.a Obtain and examine documentation about the system used to protect the PAN, including the vendor, type of system/process, and the encryption algorithms (if applicable). Verify that the PAN is rendered unreadable using any of the following methods:
• One-way hashes based on strong cryptography
• Truncation
• Index tokens and pads, with the pads being securely stored
• Strong cryptography, with associated key-management processes and procedures