Mechanisms exist to prohibit the storage of sensitive transaction authentication data after authorization.