Security and Validations

Choose the Electronic Data Transmission (EDT) method that satisfies your desired level of security and is compatible with your existing systems.

 

EDT solutions security measures

HTTPS

Description

Secured Internet solution. This method requires a Web browser capable of 128-bit encryption. (Note: No cost to customer.)

Connection security

A Web browser capable of 128-bit Secure Socket Layer encryption is necessary for data transmission. The Secure Socket Layer works to encrypt, authenticate and exchange data over insecure public networks using HTTP. Transmissions are ID and password specific.

Data security

Electronic transmissions are set up using a unique ID and password. This acts as a validation checkpoint from sender to recipient and helps prevent any compromising of data provider information. In addition, after the transmission has been received and verified, the data is loaded to a program specifically created for each data provider (the same as we do for physical media). This program performs additional validations, using customer-specific ID fields before processing to our database.

 

FTP(S)

Description

File Transfer Protocol. This transmission method uses an existing Internet connection for file transfer, but requires some type of encryption software for safe data exchange. Encryption may be performed before or during transmission. (Note: Customer may need to purchase software.)

Connection security

Encryption software that requires the exchange of public keys or an SSL-capable client is used to transmit data. Depending on the transmission choice, data may be encrypted before or during transmission.

Data security

Electronic transmissions are set up by either an exchange of encryption keys or a dynamic encryption process. This acts as a validation checkpoint from sender to recipient and helps prevent any compromise of data provider information. In addition, after the transmission has been received and verified, the data is loaded to a program specifically created for each data provider (the same as we do for physical media). This program performs additional validations, using customer specific ID fields before processing to our database.