horizontal separator
    • Increase sizeDecrease sizeFont
    • Search keyword:  security and validations

    Security and Validations

    Choose the Electronic Data Transmission (EDT) method that satisfies your business's desired level of security and is compatible with your existing systems.

    HTTPS

    Secured Internet solution. Data Exchange Gateway
    Connection security
    A Web browser capable of 128-bit Secure Socket Layer encryption is necessary for data transmission. The Secure Socket Layer works to encrypt, authenticate, and exchange data over insecure public networks using HTTP. Transmissions are ID and password specific.
    Data security
    Electronic transmissions are securely set up using a unique ID and password. This acts as a validation checkpoint from sender to recipient and helps prevent any compromising of data provider information. In addition, after the transmission has been received and verified, the data is loaded to a program specifically created for each data provider (the same as we do for physical media). This program acts to perform additional validations, using customer-specific ID fields before processing to our database.

    FTP(S)

    File Transfer Protocol. This transmission method uses an existing Internet connection for file transfer, but requires some type of encryption software for safe data exchange. Encryption may be performed before or during transmission. (Note: Customer may need to purchase software.
    Connection security
    Encryption software that requires the exchange of public keys or an SSL-capable client is used to transmit data. Depending on the transmission choice, data may be encrypted before or during transmission.
    Data security
    Electronic transmissions are securely set up by either an exchange of encryption keys or a dynamic encryption process. This acts as a validation checkpoint from sender to recipient and helps prevent any compromising of data provider information. In addition, after the transmission has been received and verified, the data is loaded to a program specifically created for each data provider (the same as we do for physical media). This program acts to perform additional validations, using customer specific ID fields before processing to our database.

    Connect®: Direct (leased line)

    This method requires a dedicated connection (phone line) to TransUnion. This method uses the Sterling Commerce® Connect:® Direct Software. (Note: Customer must purchase software.)
    Connection security
    In requiring a dedicated phone line and system node, this method ensures data is accepted only when the system specifications and security access requirements are met.
    Data security
    Electronic transmissions are securely set up with a dedicated line and user security authorization parameters. This acts as a validation checkpoint from sender to recipient and helps prevent any compromising of data provider information. In addition, after the transmission has been received and verified, the data is loaded to a program specifically created for each data provider (the same as we do for physical media). This program acts to perform additional validations, using customer-specific ID fields before processing to our database.

    Connect®: Direct (Internet)

    This method utilizes IP addresses and the Internet to complete the file transfer. It uses the Sterling Commerce® Connect:® Direct and Secure+ software packages. (Note: Customer must purchase software.)
    Connection security
    Requiring a dedicated phone line and system node, this method ensures data is accepted only when the system specifications and security access requirements are met.
    Data security
    Electronic transmissions are securely set up with a dedicated line and user security authorization parameters. This acts as a validation checkpoint from sender to recipient and helps prevent any compromising of data provider information. In addition, after the transmission has been received and verified, the data is loaded to a program specifically created for each data provider (the same as we do for physical media). This program acts to perform additional validations, using customer specific ID fields before processing to our database.
    vertical separator
    separator image