3.2.3 For a sample of system components, examine data sources, including but not limited to the following and verify that PINs and encrypted PIN blocks are not stored under any circumstance:
Incoming transaction data
All logs (for example, transaction, history, debugging, error)
History files
Trace files
Several database schemas
Database contents