Service Provider Compliance Acknowledgment

PCI DSS 4.0.1 Requirement 12.9.1 requires service providers (TPSPs) to give customers a written acknowledgment that the service provider is responsible for securing any account data it stores, processes, or transmits, and for security where it could impact the customer’s cardholder data environment (CDE) (PCI DSS v4.0.1 Requirement 12.9.1). Operationalize it by standardizing contract language, mapping it to each service, and retaining signed or otherwise provable acceptance.

Key takeaways:

  • You need a written customer-facing acknowledgment of the TPSP’s responsibility for account data security (PCI DSS v4.0.1 Requirement 12.9.1).
  • Scope includes both data you directly handle and systems/services that can affect the customer’s CDE, even if you never store card data.
  • Auditors expect repeatable evidence: templates, executed agreements, service-to-ack mapping, and a control owner with renewal/change triggers.

This requirement is simple in wording and easy to fail in practice. Many service providers assume their security obligations are “covered” by a general security addendum, generic terms and conditions, or a SOC report. Requirement 12.9.1 asks for something more explicit: you must acknowledge to each customer, in writing, that you are responsible for the security of account data you possess (or store, process, transmit on their behalf) and for security of anything you do that could impact the customer’s cardholder data environment (CDE) (PCI DSS v4.0.1 Requirement 12.9.1).

For a Compliance Officer, CCO, or GRC lead, the fast path is to (1) define which offerings make you a TPSP and which customer relationships are in scope, (2) standardize an acknowledgment clause that survives procurement redlines, (3) operationalize it as a contract lifecycle control with evidence that’s easy to produce under assessment.

This page gives requirement-level implementation guidance: who it applies to, what to do step-by-step, what proof to retain, and where teams usually stumble during PCI assessments.

Regulatory text

Text (verbatim): “Additional requirement for service providers only: TPSPs acknowledge in writing to customers that they are responsible for the security of account data the TPSP possesses or otherwise stores, processes, or transmits on behalf of the customer, or to the extent that they could impact the security of the customer's cardholder data environment.” (PCI DSS v4.0.1 Requirement 12.9.1)

Operator interpretation (plain English)

If you are a service provider that touches payment-related account data, or you provide a service that can affect a customer’s CDE, you must tell the customer in writing that you are responsible for protecting that data and protecting your side of the shared environment where you can impact their CDE (PCI DSS v4.0.1 Requirement 12.9.1).

This is a “no-ambiguity” requirement. It is designed to prevent gaps where:

  • the customer assumes the TPSP is securing the service, but the TPSP positions security as “customer’s problem,” or
  • the TPSP claims “we never see card data,” while still operating systems (connectivity, logging, support access, scripts, integrations) that can materially affect the customer’s CDE.

Who it applies to

In-scope entities

  • Service providers / TPSPs offering services to customers where the TPSP stores, processes, or transmits account data on the customer’s behalf, or can otherwise impact the security of the customer’s CDE (PCI DSS v4.0.1 Requirement 12.9.1).

In-scope operational contexts (common real-world cases)

  • Payment processors, gateways, tokenization providers, fraud tools, hosted checkout, payment orchestration.
  • Managed services that administer infrastructure connected to, or that can access, the customer’s CDE (for example, remote support tools used to access systems in scope).
  • SaaS platforms that ingest, transform, route, or log payment-related data fields (even if “incidental”).
  • Any third party with privileged access that could impact confidentiality or integrity of systems that store/process/transmit cardholder data.

Out-of-scope note (don’t over-exempt yourself)

Teams often argue they are out of scope because “we don’t store PAN.” Requirement 12.9.1 also covers responsibility “to the extent that they could impact the security of the customer's cardholder data environment” (PCI DSS v4.0.1 Requirement 12.9.1). If you can affect their CDE, you still need the acknowledgment.

What you actually need to do (step-by-step)

1) Confirm you are acting as a TPSP for each offering

Create a simple service catalog view that answers, for each product/service:

  • Do we store, process, transmit account data for customers?
  • Could the service impact the customer’s CDE (connectivity, integrations, admin access, managed components, support access)?

Output: a scoped list of offerings and customer contract types where 12.9.1 must be present (PCI DSS v4.0.1 Requirement 12.9.1).

2) Standardize the “compliance acknowledgment” language

Work with Legal/Commercial to add an acknowledgment clause to:

  • Master Service Agreement (MSA), and/or
  • Data Security Addendum (DSA), and/or
  • Order Form terms (only if the order form is always executed and governs)

Drafting goal: make the obligation explicit and customer-readable:

  • Acknowledge responsibility for security of account data you possess/store/process/transmit on behalf of the customer.
  • Acknowledge responsibility for security controls where you can impact the customer’s CDE.
  • Avoid burying this as implied language (“each party shall use reasonable security measures”). The requirement expects an acknowledgment of responsibility (PCI DSS v4.0.1 Requirement 12.9.1).

Implementation tip: maintain a “fallback clause” for heavy redlines so Sales has an approved alternative that still meets the requirement.

3) Bind the acknowledgment to “writing” that you can prove

Writing can be satisfied through executed contractual documents or accepted online terms, as long as you can prove acceptance. Your bar is auditability:

  • Signed MSA/DSA/order form, or
  • Electronic acceptance with immutable records (contract platform audit trail, clickwrap logs), plus versioned terms.

4) Map the acknowledgment to each customer and each relevant service

Build a small control register (spreadsheet is fine if controlled) that ties:

  • Customer legal entity
  • Services purchased (from catalog)
  • Contract(s) covering the relationship
  • Where the 12.9.1 acknowledgment appears (document name + section)
  • Effective date, renewal date, and change triggers

Auditors ask two questions: “Is the language present?” and “Is it present for the customers/services in scope?” Your mapping answers the second question cleanly.

5) Add contract lifecycle triggers so you don’t drift out of compliance

Define triggers that force review of the acknowledgment language:

  • New product launch that touches account data or interfaces with CDE
  • Material architecture change affecting data flows or access
  • Renewal, re-papering, or major amendment
  • Acquisition/merger changing contracting entity

Assign an owner (often Legal Ops or Vendor/Customer Risk within GRC) who is accountable for ensuring the clause stays in approved templates.

6) Operationalize in your deal desk and exception process

Your control breaks down when Sales bypasses templates. Put guardrails in place:

  • Contracting playbook: “No 12.9.1 clause, no signature.”
  • Redline workflow: route clause edits to a named approver.
  • Exception register: if a customer refuses the clause, record the deviation, rationale, compensating language, and risk acceptance decision.

7) Make it easy to retrieve evidence during PCI assessment

Centralize storage in your contract repository with consistent naming and metadata. The day your assessor asks, you should be able to produce:

  • Template language history, and
  • A representative sample of executed customer agreements showing acceptance.

Required evidence and artifacts to retain

Keep evidence that proves existence, coverage, and execution:

  1. Approved template language
  • Current MSA/DSA template (version-controlled)
  • Clause library entry for 12.9.1 acknowledgment
  • Documented approval (Legal + Compliance)
  1. Executed customer acknowledgments
  • Signed agreements, executed addenda, or provable clickwrap acceptance logs
  • Contract version and effective date
  1. Coverage mapping
  • Customer-to-service mapping with contract references and clause location
  • Service catalog scoping notes tied to account data/CDE impact rationale (PCI DSS v4.0.1 Requirement 12.9.1)
  1. Governance artifacts
  • Contracting workflow and redline approval process
  • Exceptions register and risk acceptances (if any)

Common exam/audit questions and hangups

Expect these:

  • “Show me where you acknowledge responsibility in writing.” Provide the clause in your template and executed agreements (PCI DSS v4.0.1 Requirement 12.9.1).
  • “Which customers are covered?” Assessors may pick samples across products, geographies, or contracting entities. Your coverage mapping should answer quickly.
  • “You say you don’t store card data. How can you impact the customer’s CDE?” Be ready with a service architecture/data flow explanation and why the acknowledgment still applies (PCI DSS v4.0.1 Requirement 12.9.1).
  • “What happens when Sales uses a non-standard contract?” Show your process control and exception governance.

Frequent implementation mistakes (and how to avoid them)

  1. Relying on a SOC report instead of an acknowledgment. Attestations and reports are not the customer-facing written acknowledgment this requirement calls for (PCI DSS v4.0.1 Requirement 12.9.1). Put it in the contract.

  2. Acknowledging “reasonable security” without stating responsibility. The requirement is explicit about acknowledging responsibility for security of account data and CDE impact (PCI DSS v4.0.1 Requirement 12.9.1). Make the subject (“TPSP”) and responsibility unambiguous.

  3. Only covering direct account data handling, ignoring “could impact the CDE.” If your admins, integrations, or hosted components touch systems that connect to the customer CDE, you are in scope for the second clause (PCI DSS v4.0.1 Requirement 12.9.1).

  4. No evidence trail for clickwrap. If you use online acceptance, retain versioned terms and logs that link a customer to a specific version and timestamp.

  5. Letting redlines silently delete the clause. Put a redline control in your deal desk workflow. Any modification to the clause needs an approver.

Enforcement context and risk implications

No public enforcement cases were provided in the source catalog for this requirement. Practically, the risk is assessment failure and downstream contractual confusion during incidents. If an incident occurs and the contract is ambiguous about TPSP responsibilities, response can stall while parties dispute scope. Requirement 12.9.1 is intended to remove that ambiguity upfront (PCI DSS v4.0.1 Requirement 12.9.1).

Practical 30/60/90-day execution plan

First 30 days: establish scope and standard language

  • Identify in-scope offerings and customer contract types against the requirement’s two tests (account data handling; CDE impact) (PCI DSS v4.0.1 Requirement 12.9.1).
  • Draft the acknowledgment clause and bake it into your MSA/DSA templates.
  • Define your evidence model: what you will show an assessor and where it lives.

Days 31–60: operationalize through contracting workflows

  • Update deal desk checklists and approval routing for redlines.
  • Stand up the coverage mapping (customer → service → contract → clause reference).
  • Train Sales Ops/Legal Ops on “no clause, no close” handling and the exception process.

Days 61–90: remediate backlog and harden the control

  • Triage existing customers: prioritize those using in-scope services and those up for renewal/amendment.
  • Remediate gaps via addenda or contract amendments where needed.
  • Run an internal “mock sample” retrieval exercise: pick customer records and prove acknowledgment within a short window, using only your repository and mapping.

Ongoing: keep it from breaking

  • Add product launch and architecture change reviews to the trigger list.
  • Review exceptions periodically and retire them through re-papering when feasible.

Tooling note (where Daydream fits)

If you manage acknowledgments across many customers and offerings, Daydream can help by standardizing control evidence collection (templates, executed agreements, mapping) and keeping a current audit-ready record set across third-party and customer compliance obligations.

Frequently Asked Questions

Does the acknowledgment have to be in the MSA, or can it be in a security addendum?

The requirement is “in writing” and customer-facing, so an MSA, DSA, or other executed agreement can work if it is part of the binding contract set and you can prove acceptance (PCI DSS v4.0.1 Requirement 12.9.1).

We don’t store cardholder data. Do we still need this?

Possibly. The requirement also applies where your service could impact the security of the customer’s cardholder data environment, even if you don’t store/process/transmit account data directly (PCI DSS v4.0.1 Requirement 12.9.1).

Can we satisfy this with a statement on our website or trust page?

A public statement may help communication, but you still need a written acknowledgment to the customer that you can evidence as accepted (for example, executed terms or clickwrap logs) (PCI DSS v4.0.1 Requirement 12.9.1).

What evidence do assessors usually want to see?

Assessors commonly ask for the template clause plus executed customer agreements (or acceptance logs) for a sample of customers, and a mapping that shows all in-scope customers are covered (PCI DSS v4.0.1 Requirement 12.9.1).

A customer wants us to remove or narrow the clause. Can we accept that?

You can negotiate, but you need to preserve the core acknowledgment of responsibility described in the requirement. If you accept deviations, document the exception, get formal approval, and track it for remediation at renewal (PCI DSS v4.0.1 Requirement 12.9.1).

How do we handle resellers or indirect customers?

If your contracting party is a reseller, ensure the written acknowledgment exists with the party you contract with, and evaluate whether your model requires flow-down language so the end customer receives equivalent acknowledgment and clarity on responsibilities (PCI DSS v4.0.1 Requirement 12.9.1).

Frequently Asked Questions

Does the acknowledgment have to be in the MSA, or can it be in a security addendum?

The requirement is “in writing” and customer-facing, so an MSA, DSA, or other executed agreement can work if it is part of the binding contract set and you can prove acceptance (PCI DSS v4.0.1 Requirement 12.9.1).

We don’t store cardholder data. Do we still need this?

Possibly. The requirement also applies where your service could impact the security of the customer’s cardholder data environment, even if you don’t store/process/transmit account data directly (PCI DSS v4.0.1 Requirement 12.9.1).

Can we satisfy this with a statement on our website or trust page?

A public statement may help communication, but you still need a written acknowledgment to the customer that you can evidence as accepted (for example, executed terms or clickwrap logs) (PCI DSS v4.0.1 Requirement 12.9.1).

What evidence do assessors usually want to see?

Assessors commonly ask for the template clause plus executed customer agreements (or acceptance logs) for a sample of customers, and a mapping that shows all in-scope customers are covered (PCI DSS v4.0.1 Requirement 12.9.1).

A customer wants us to remove or narrow the clause. Can we accept that?

You can negotiate, but you need to preserve the core acknowledgment of responsibility described in the requirement. If you accept deviations, document the exception, get formal approval, and track it for remediation at renewal (PCI DSS v4.0.1 Requirement 12.9.1).

How do we handle resellers or indirect customers?

If your contracting party is a reseller, ensure the written acknowledgment exists with the party you contract with, and evaluate whether your model requires flow-down language so the end customer receives equivalent acknowledgment and clarity on responsibilities (PCI DSS v4.0.1 Requirement 12.9.1).

Authoritative Sources

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream
PCI DSS 4.0: Service Provider Compliance Acknowledgment | Daydream