PCI Compliance Requirements for Electrical Contractors

PCI Compliance Requirements for Electrical Contractors
By alphacardprocess December 20, 2025

Electrical contractors don’t always think of themselves as “payment businesses,” but the moment you accept card payments—whether in the office, on a jobsite, over the phone, through invoices, or via an online quote request—you become responsible for protecting cardholder data. 

That responsibility is defined by the Payment Card Industry Data Security Standard (PCI DSS). The newest baseline in active use is PCI DSS v4.0.1 (published June 2024), and a major compliance milestone is that the “future-dated” requirements that were treated as best practices became mandatory after March 31, 2025.

This guide explains PCI compliance requirements for electrical contractors in practical terms—how card data can enter your environment, what your real obligations are, and how to pass validation with minimal operational disruption. 

It’s written for real-world contractor workflows: field crews, service trucks, dispatch, progress billing, retainers, change orders, and emergency calls. You’ll also see forward-looking guidance on where PCI compliance requirements for electrical contractors are heading next, especially around authentication, e-commerce scripts, and service-provider oversight.

Why PCI compliance requirements for electrical contractors matter in day-to-day operations

Why PCI compliance requirements for electrical contractors matter in day-to-day operations

PCI compliance requirements for electrical contractors exist because payment data theft doesn’t only happen in “big tech.” Contractors are often targeted precisely because they can look like smaller organizations with busy teams, mixed devices, and lots of payment entry points. 

A single compromised tablet used for on-site payments, a forwarded invoice email that includes card details, or a remote access tool left unsecured can expose customers and your company to chargebacks, fees, account termination risk, and brand damage.

Electrical contractors tend to accept payments in several ways that expand exposure: mobile card readers in the field, “card on file” for repeat customers, phone payments taken by office staff, emailed payment links, online payment portals, and integrated accounting or field service management platforms. Each method changes your PCI scope—meaning how many PCI DSS controls you must follow and prove.

Another reason PCI compliance requirements for electrical contractors matter: your bank (acquirer) and the card brands require validation. 

That validation could be as lightweight as an annual self-assessment questionnaire (SAQ) plus quarterly scans (for certain environments), or as heavy as a formal on-site assessment, depending on transaction volume and risk. 

PCI DSS v4.x also sharpened expectations around continuous security practices—strong authentication, better logging, tighter control of web payment pages, and clearer responsibility boundaries with vendors.

If you treat PCI compliance requirements for electrical contractors as a one-time “checkbox,” it tends to fail at renewal time, after a breach, or when you change software. If you treat it as a workflow design problem—reducing where card data touches your systems—you can keep PCI scope small and compliance manageable.

What counts as “cardholder data” and where electrical contractors accidentally store it

What counts as “cardholder data” and where electrical contractors accidentally store it

PCI compliance requirements for electrical contractors apply whenever you store, process, or transmit cardholder data (or sensitive authentication data). In contractor environments, the most common accidental storage points aren’t servers—they’re people and everyday tools.

Cardholder data typically includes the primary account number (PAN), and if stored, it must be protected heavily. Sensitive authentication data (like full magnetic stripe data, CVV/CVC, or PIN blocks) must never be stored after authorization. 

That’s where many well-meaning processes go wrong: a dispatcher writes down a card number and CVV during a storm outage rush, then snaps a photo “temporarily,” or an office admin pastes payment info into job notes.

Here are frequent “hidden” storage locations in contractor workflows:

  • Email threads: customers email card details; staff forward it; it sits in inboxes and backups.
  • Text messages: technicians receive a card number over SMS or messaging apps.
  • PDF invoices and attachments: a “payment authorization form” is saved to a shared drive.
  • CRM/job notes: office staff record “card ending 1234 + expiration” (expiration can increase risk; even partial data can complicate scope).
  • Call recordings: recorded phone lines capture card numbers unless properly paused/redacted.
  • Spreadsheets: “accounts receivable” trackers with card-on-file references.
  • Mobile devices: cached forms, screenshots, clipboard history, or app logs.
  • Printed work orders: paper copies in trucks, then thrown away without shredding.

PCI compliance requirements for electrical contractors push you toward a simple principle: don’t let card data touch your systems unless you absolutely must. 

The fastest path to lower scope is to outsource payment capture to PCI-compliant providers using hosted payment pages, payment links, or compliant terminals—so your team never handles raw card data.

Understanding PCI DSS v4.0.1

Understanding PCI DSS v4.0.1

A “latest and updated” PCI compliance requirements for electrical contractors guide must reflect the current version and timeline. PCI DSS v4.0.1 is the active refinement of PCI DSS v4.0, published in June 2024, with a formal “summary of changes” published in August 2024.

More importantly for implementation: PCI DSS v4 introduced “future-dated” requirements that were considered best practice until March 31, 2025, after which they became mandatory during assessments.

This matters because many small and mid-sized merchants (including contractors) historically passed PCI validation with minimal controls. The post–March 31, 2025 environment expects stronger security defaults, especially around:

  • Authentication and access controls
  • Web application protections
  • Vendor/service provider accountability
  • Anti-phishing and stronger MFA patterns
  • Visibility (logging) and response readiness

PCI compliance requirements for electrical contractors don’t automatically mean “more paperwork.” They often mean your payment design choices matter more than ever. 

If you accept payments through a standalone, PCI-validated terminal or fully hosted payment link that keeps card data away from your devices, you can still keep your compliance level relatively light. If you accept card data directly via your website, store it, or key it into general-purpose devices, you may inherit much heavier obligations.

A practical takeaway: if your current setup was “fine” under older habits, it might now create validation friction or require compensating controls. Aligning your payment channels with reduced scope is the simplest way to stay ahead of PCI DSS v4.0.1 expectations.

PCI scope for electrical contractors: how payment methods change your obligations

PCI scope for electrical contractors: how payment methods change your obligations

PCI compliance requirements for electrical contractors depend heavily on scope—what systems, people, and processes touch card data. Two electrical contractors can have the same revenue and radically different PCI burdens based on how they accept payments.

Field terminals and mobile readers (lowest scope when implemented correctly)

If technicians take payments using a PCI-validated card reader that encrypts card data and sends it directly to the processor, your environment can be kept small. 

The key is ensuring the mobile device isn’t storing or exposing card data and that you’re using reputable, validated solutions. This setup typically supports simpler SAQs because your business systems never see the full PAN.

The risks are mostly operational: lost devices, weak passcodes, shared logins, or installing untrusted apps on the same phone/tablet used for payments. PCI compliance requirements for electrical contractors here emphasize device security, access control, and vendor management rather than internal card data storage.

Card-not-present by phone (scope grows fast)

If your office staff keys card numbers into a virtual terminal, PCI scope increases because you’re handling card data in your environment. Even if you don’t store it intentionally, the risk of it being written down, captured in screen recordings, or present in call recordings is real.

To reduce scope, prefer phone payment solutions that support secure pause/resume for call recording or use a provider’s secure IVR (“enter card details using keypad”) so staff never hears or sees the full number.

Invoicing, payment links, and hosted payment pages (scope reduction strategy)

If you email a payment link that takes customers to a hosted payment page, you’re pushing card capture to the provider’s environment. This is one of the best PCI compliance requirements for electrical contractors strategies: it matches how contractors bill (deposits, progress payments, change orders) and reduces the chance staff collects card details.

Website payments and embedded forms (scope depends on architecture)

E-commerce style acceptance (even for service deposits) can increase scope if your website handles card data—or if scripts on your site can alter what customers see. 

PCI DSS v4.x includes stronger attention to payment page integrity and e-commerce flows, and SAQ eligibility can change based on whether you truly outsource the payment function or embed it in a way that affects transaction security.

The short version: PCI compliance requirements for electrical contractors are easiest when you avoid receiving raw card data in your systems. Every step you take toward outsourcing card capture reduces compliance cost and breach exposure.

PCI validation levels and which SAQ an electrical contractor might use

Electrical contractors usually validate PCI compliance through a Self-Assessment Questionnaire (SAQ), unless transaction volume or risk factors require a formal assessment. Your bank/processor determines your merchant level and validation expectations, but the SAQ type is mostly driven by your payment channels and scope.

PCI DSS v4.x includes updated SAQs and revised guidance/eligibility clarification, including updates released for PCI DSS v4.0.1 and related instructions. The key is: don’t guess your SAQ. An incorrect SAQ can fail review even if your intentions are good.

Common SAQ patterns for contractors:

  • Hosted payment pages / payment links often align with SAQ A if your website doesn’t handle card data and you meet eligibility.
  • E-commerce sites that can affect transaction security may push toward SAQ A-EP in certain architectures.
  • Standalone terminals can align with simpler SAQs depending on connectivity and whether systems are isolated.
  • Virtual terminals / key entry often increase requirements because you’re directly processing card-not-present transactions.

A critical detail: SAQ eligibility has been clarified and adjusted over time, especially for e-commerce flows and embedded payment experiences. If your “Pay Now” button is actually an embedded frame or script-heavy checkout, your SAQ category may change depending on control and exposure.

For PCI compliance requirements for electrical contractors, your best practice is to document each payment channel, map it to where card data flows, and keep evidence that you do not store sensitive authentication data. This makes your annual validation far smoother and reduces surprises during bank review.

The 12 PCI DSS requirement families explained for electrical contractor workflows

PCI DSS is organized into requirement areas that cover network security, data protection, access control, monitoring, and governance. 

For PCI compliance requirements for electrical contractors, the smartest approach is to interpret each requirement through contractor realities: office networks, dispatch software, mobile devices, and vendor platforms.

Network security controls in mixed office environments

If your office network shares Wi-Fi between admin machines, guest access, and occasionally technician devices, segmentation becomes relevant. 

You want a design where payment-related systems (virtual terminal machines, accounting endpoints used for payment reconciliation) are isolated from general browsing and guest access. Even small contractors benefit from a “business Wi-Fi” and a separate “guest Wi-Fi” with strong router/admin password hygiene.

Secure configurations and patching

Contractors often use commodity routers, laptops, and tablets. PCI compliance requirements for electrical contractors emphasize secure baselines—changing default passwords, disabling unnecessary services, and applying patches routinely. PCI DSS v4.x expects stronger vulnerability management maturity, not just occasional updates.

Protecting stored data by avoiding storage

The best control is not to store PAN at all. If you must store a token or truncated number for reference, do it through your payment provider and store only what’s allowed. Train staff that “notes fields” and “attachments” are never a place for card data.

Encrypting transmission and keeping payment capture isolated

Use provider-approved apps and secure payment channels. If your website takes payments, make sure it’s using modern TLS and that you’ve reduced third-party script risk (more on that below).

Access control: least privilege for dispatch, AR, and managers

Contractors often share logins due to shift work. PCI compliance requirements for electrical contractors strongly discourage shared accounts because you can’t trace actions to individuals. Move to named accounts, role-based access (dispatch vs AR vs technician), and remove access promptly when employees leave.

Monitoring, logging, and incident response

Even if you’re small, you need a basic incident response plan: who to call (processor, IT, bank), how to contain devices, and how to preserve evidence. Logging doesn’t require an enterprise SIEM, but you should be able to show activity records for systems in scope and detect suspicious access patterns.

These requirement families sound “big,” but the contractor-friendly strategy is: reduce scope, then implement lightweight but consistent controls on what remains in scope.

Access control and MFA: the fastest-growing PCI requirement pressure point

One of the most important PCI compliance requirements for electrical contractors in the current era is access control, especially multi-factor authentication (MFA). PCI DSS v4.x strengthened expectations around MFA and access pathways into environments where payment data could be affected.

For contractors, access control problems usually come from:

  • Shared logins for dispatch software or a virtual terminal
  • Weak passwords reused across vendor portals
  • Remote access tools used by “the IT guy” with no oversight
  • Technicians using personal phones with no screen lock
  • Former employees still having access to email or payment tools

A contractor-ready MFA plan looks like this:

  1. Enable MFA on your payment portal and virtual terminal (processor dashboards almost always support it).
  2. Enable MFA on email accounts, because email often controls password resets and invoice links.
  3. Require MFA for remote access (remote desktop, VPN, management portals).
  4. Use role-based access so technicians don’t have admin rights on devices that touch payment tools.
  5. Adopt a password manager for office staff to reduce reuse and improve complexity.

PCI compliance requirements for electrical contractors also increasingly reward “phishing-resistant” approaches in spirit, even when not explicitly mandated for every small merchant. 

As attackers target contractor email to intercept invoices and reroute payment links, MFA plus secure email becomes a practical anti-fraud requirement, not just a compliance one.

Website payments, payment page integrity, and third-party scripts

Many electrical contractors now take deposits or service-call payments online, often via a website form. This is an area where PCI compliance requirements for electrical contractors can shift quickly depending on how your site is built.

If you fully redirect customers to a hosted payment page, you’re generally reducing exposure. If you embed payment elements, use scripts, or host pages that affect how customers enter payment data, you must think about integrity: can a malicious script alter the page and skim card numbers?

PCI SSC and ecosystem guidance around SAQs and e-commerce eligibility has continued to evolve, including clarifications for outsourced payment models that still involve embedded elements like iframes.

The practical impact: your compliance validation may require you to prove that your website cannot be easily modified to capture payment data, and that you manage third-party scripts carefully.

For contractor sites, the biggest script risks often come from:

  • Chat widgets
  • Marketing pixels
  • Website builder plugins
  • Tag managers
  • Scheduling widgets
  • Analytics tools added without change control

A simple approach to meet PCI compliance requirements for electrical contractors on the web:

  • Prefer hosted payment links/pages for deposits and invoice payments.
  • Keep the payment flow isolated from the main site when possible.
  • Limit third-party scripts on pages that initiate payments.
  • Use reputable providers and keep your CMS/plugins updated.
  • Maintain change control: document who can update the site, and how changes are reviewed.

Future prediction: website-based payment flows will face more routine scrutiny, even for smaller merchants, because web skimming attacks are common and scalable. Contractors who choose clean hosted flows will keep compliance easier than those who build complex embedded checkout experiences.

Vulnerability management, quarterly scans, and what “ASV” means for contractors

Some electrical contractors are surprised when their processor asks for quarterly vulnerability scans. This typically applies when your environment includes internet-facing systems in scope (for example, certain web environments or exposed endpoints tied to payment handling). An Approved Scanning Vendor (ASV) performs external scans against public IPs/domains.

PCI DSS v4.x places strong emphasis on vulnerability management maturity and timely remediation, and it removed some ambiguity by favoring automated technical solutions in certain contexts (for example, around protecting public-facing web apps).

A contractor-friendly vulnerability management routine:

  • Maintain an inventory of devices and systems that touch payment processes (office computers used for virtual terminal, website admin accounts, payment portal access devices).
  • Patch operating systems, browsers, and key software on a schedule (monthly is common).
  • Remove admin rights from everyday user accounts.
  • If you do need scans, treat them as a workflow: scan → review findings → remediate → re-scan.
  • Avoid “shadow IT” (random remote tools and plugins installed without approval).

PCI compliance requirements for electrical contractors are not about becoming an enterprise SOC. They are about proving you have a repeatable process to keep known vulnerabilities from sitting unaddressed while you continue handling payments.

Future prediction: even smaller organizations will be pushed toward more continuous patching and clearer asset inventories, because modern ransomware and credential theft exploit predictable gaps. Good IT hygiene will increasingly overlap with PCI validation expectations.

Policies, training, and contractor-specific “people controls” that auditors look for

Even if you outsource most payment capture, PCI compliance requirements for electrical contractors still include operational expectations: policies, training, and evidence that your team follows safe handling rules. This is often where contractors fail—not because of malicious intent, but because busy teams create “temporary” workarounds that become permanent.

A practical policy set for an electrical contractor should cover:

  • Prohibited storage: no card numbers or CVV in email, texts, photos, job notes, or attachments.
  • Phone payment handling: no writing down card details; use secure entry methods; pause call recordings if used.
  • Device rules: screen lock required; no shared accounts; lost devices reported immediately.
  • Access lifecycle: joiner/mover/leaver steps for removing access when staff changes.
  • Vendor usage: only approved payment apps and portals.
  • Incident response basics: who to call, what to disconnect, what not to wipe.

Training doesn’t need to be a corporate LMS. It does need to be consistent and documented: short onboarding training, refreshers, and a simple sign-off. PCI DSS v4.x continues the trend of requiring more demonstrable operational maturity, and banks/processors often ask for proof that policies exist and staff awareness is real.

PCI compliance requirements for electrical contractors are most sustainable when you bake them into standard operating procedures:

  • Payment by link instead of card over email
  • Secure portal notes instead of sensitive data in free-text fields
  • Named logins for dispatch and AR
  • Clear “stop and escalate” rules when a customer tries to send card data in unsafe ways

Future prediction: training expectations will continue to rise as social engineering becomes the dominant breach pattern in small businesses. Contractors who train staff to recognize invoice fraud and credential phishing will reduce both compliance risk and real financial loss.

Working with service providers: what you must collect and keep on file

Electrical contractors rely heavily on service providers: processors, gateways, invoicing platforms, field service software, website hosts, IT consultants, and sometimes managed security providers. PCI compliance requirements for electrical contractors include making sure your service providers are appropriately compliant for the services they deliver.

The most important habit is evidence collection. Keep:

  • Your provider’s Attestation of Compliance (AOC) or compliance documentation
  • A list of what payment functions each vendor handles
  • Contract or support terms defining who is responsible for security tasks (updates, access controls, logging, incident response support)

PCI DSS v4.x increased emphasis on clarity and accountability across third parties, and the ecosystem has continued to publish updates and guidance for merchant validation and SAQ usage.

For contractors, the risk is assuming “the software company handles it,” while you still have in-scope endpoints, weak access controls, or staff storing card details outside the system.

A simple vendor governance checklist aligned with PCI compliance requirements for electrical contractors:

  • Confirm the provider supports your intended SAQ path (for example, hosted payments to reduce scope).
  • Ensure MFA is available and enabled on vendor portals.
  • Limit who has admin rights in vendor dashboards.
  • Review vendor access periodically (quarterly is a practical cadence).
  • Require secure support practices (no passwords sent by email; no unattended remote access).

Future prediction: vendor oversight will become more structured even for smaller merchants, because breaches increasingly occur through supply chain and credential compromise. Keeping AOCs and documenting responsibility boundaries will feel less “compliance-y” and more like basic business protection.

Step-by-step PCI compliance plan for electrical contractors

PCI compliance requirements for electrical contractors become manageable when you follow a repeatable plan rather than reacting to annual questionnaire season. Here’s a contractor-friendly approach that keeps paragraphs of work small and consistent.

Step 1: Inventory every way you take card payments

List: in-person terminal, mobile reader, phone/virtual terminal, invoice link, website deposit, recurring billing, and any “card on file” processes. For each, note who touches it and what device/software is used.

Step 2: Map where card data could enter your environment

If you truly use hosted pages/terminals, card data should never appear in your systems. If you accept phone payments, you must treat the workstation and process as in scope. Identify risky channels like email and text.

Step 3: Choose a “scope reduction” target design

Most electrical contractors do best with:

  • Card-present terminals for field and office
  • Hosted invoice payment links for AR
  • Secure customer portal if needed
    This design typically keeps PCI compliance requirements for electrical contractors lighter than mixed DIY processes.

Step 4: Lock down identity and devices

Enable MFA where possible. Enforce screen locks. Remove shared logins. Reduce admin privileges. This single area solves a huge percentage of real-world breaches.

Step 5: Implement a no-storage rule and enforce it

Create a standard response for customers who try to email card details: “For your security, we can’t accept card details by email. Please use this secure link or call to pay via our secure method.”

Step 6: Complete validation and maintain evidence

Pick the correct SAQ, keep vendor AOCs, document training, and store scan reports if required. Use the same folder structure every year so renewal becomes easy.

PCI compliance requirements for electrical contractors are easiest when your payments are designed for compliance from the start. Most pain comes from retrofitting controls after a tool sprawl has already happened.

Common PCI mistakes electrical contractors make (and how to fix them)

Even well-run contractors fail PCI compliance requirements for electrical contractors due to a few repeating issues. Fixing these often reduces scope and improves security immediately.

Mistake 1: Accepting card details by email “just this once”

This is the most common failure point. The fix is to eliminate the option with process design: always send a hosted payment link or use secure entry methods. Train staff to refuse politely and consistently.

Mistake 2: Storing “authorization forms” as PDFs

If those forms contain full PAN or CVV, you’ve created a high-risk data store. Replace with tokenized customer vaults managed by the payment provider, or use compliant recurring billing tools where you never store raw card data.

Mistake 3: Shared virtual terminal logins

Shared logins break accountability and weaken security. Move to named accounts, role permissions, and MFA.

Mistake 4: Website plugin overload on payment paths

Extra scripts and plugins raise risk. Keep payment initiation pages clean, updated, and controlled. Prefer hosted payment pages for deposits.

Mistake 5: Not knowing who owns “IT security”

Many contractors rely on informal IT support. PCI compliance requirements for electrical contractors require clear responsibility—even if outsourced. Document who patches devices, who manages accounts, and how incidents are handled.

Future prediction: these mistakes will become costlier as banks and providers tighten enforcement and as fraud tactics increasingly target small service businesses. A contractor who designs secure payment workflows now will avoid expensive disruption later.

FAQ

Q.1: What PCI compliance requirements for electrical contractors apply if I only take cards in the field?

Answer: If you only accept cards using a PCI-validated terminal or mobile reader that encrypts card data and sends it directly to the processor, your scope can be relatively small. 

You’ll still have PCI compliance requirements for electrical contractors, such as annual validation (often via an SAQ) and operational controls like device security, strong access control, and policies preventing storage of card data in notes or photos. 

The key is ensuring your technicians never write down card numbers and your devices are locked down with screen locks and named accounts.

Q.2: Do PCI compliance requirements for electrical contractors apply to ACH or bank transfers?

Answer: PCI DSS applies to payment cards, not ACH. However, many contractors accept both cards and ACH through the same invoicing platform. If that platform also processes cards, your PCI compliance requirements for electrical contractors still apply to the card portion. Also, the same security practices—MFA, least privilege, secure email—still matter because invoice fraud can hit any payment type.

Q.3: If I use hosted invoice payment links, do I still need PCI compliance?

Answer: Yes, but your PCI compliance requirements for electrical contractors are usually lighter. You typically still complete an annual validation and maintain policies, vendor documentation, and secure access controls. 

Hosted payment pages can reduce your technical scope because your systems don’t handle raw card data, but you must still ensure your staff doesn’t collect card details outside the hosted flow.

Q.4: What changed after March 31, 2025 for PCI compliance requirements for electrical contractors?

Answer: PCI DSS v4 included future-dated requirements that were treated as best practices until March 31, 2025, after which they became mandatory in assessments.

For contractors, this increases focus on stronger authentication, improved vulnerability management practices, better control of web payment flows, and clearer vendor responsibility evidence.

Q.5: Do I need quarterly scans as an electrical contractor?

Answer: It depends on your environment. If you have internet-facing systems in scope for card processing, your provider may require quarterly ASV scans. 

If you only use standalone terminals or fully hosted payment pages with no in-scope public endpoints, scans may not apply. Your processor or compliance program will specify your validation requirements.

Q.6: How do I avoid storing cardholder data accidentally?

Answer: Implement a strict rule: no card details in email, texts, photos, spreadsheets, attachments, or job notes. Use hosted payment links or secure entry methods. Configure call recording to pause during payment entry if you take phone payments. 

Train staff with scripts for refusing unsafe payment requests. This is one of the most effective PCI compliance requirements for electrical contractors practices because it reduces both risk and scope.

Q.7: Which SAQ do electrical contractors usually complete?

Answer: It depends on how you accept cards. Hosted payment pages often align with SAQ A when eligibility is met, while certain e-commerce flows can require SAQ A-EP depending on how the website affects payment security.

Terminal-only environments may map to other SAQs depending on connectivity and architecture. Your processor/compliance program should confirm the correct SAQ based on your setup.

Q.8: What’s the most important “first fix” for PCI compliance requirements for electrical contractors?

Answer: Enable MFA on payment portals and business email, stop accepting card details via email/text, and move as many payments as possible to hosted payment links or PCI-validated terminals. These steps reduce exposure quickly and make the rest of compliance far easier.

Conclusion

PCI compliance requirements for electrical contractors can feel intimidating until you reframe them as a design problem: reduce where card data can go. The best-performing contractor payment setups are simple: PCI-validated terminals for in-person payments, hosted invoice payment links for AR, and minimal web complexity for deposits.

 Once you limit card data exposure, compliance becomes a set of lightweight controls—MFA, named accounts, device security, vendor documentation, and a no-storage culture.

PCI DSS v4.0.1 and the post–March 31, 2025 landscape make this approach even more important. The standard’s direction is clear: stronger authentication, better visibility, tighter web payment integrity, and more structured vendor accountability.

Electrical contractors who modernize payment workflows now will not only meet PCI compliance requirements for electrical contractors more easily, but also reduce fraud, chargebacks, and business disruption.