Skip to content

Security Policy

The State of Utah and take Internet security very seriously. Our technology and policies are designed to make your online transactions safe, private, and secure. Rigorous policies and procedures are utilized to safeguard your personal information, such as social security numbers, banking information, and personal data.

Internal security groups as well as third party security assessors scan servers and the various online services regularly. systems are routinely monitored for threats and appropriate precautions are taken to mitigate known threats.

We encourage all users to use strong passwords and change them regularly to minimize risk.

Utah dot gov securityWhenever you see this icon on a Utah State government webpage, the following security measures have been taken:

State of the Art SSL (Secure Socket Layer) Encryption - This enables the encryption of sensitive information during an online transaction. Information sent via SSL can no longer be read as plain text.

Cybertrust Certified Logo;Cybertrust - policies and procedures have been examined, measured and validated by Cybertrust, the global information security specialist.

Secure Internal Networks - Data transferred between databases is done using a secure protocol. For example, in many cases FTP or Virtual Private Networks (VPN) are utilized to ensure that only authorized users can access the network and no one can intercept data.

Data Storage Policies - Unless necessary, does not permanently store financial information so it cannot be retrieved or compromised.

Physical Location Security - All physical locations where hardware and software are located are physically secured and only accessible by individuals with proper credentials.

Payment Card Industry Data Security Standards (PCI DSS) Compliant - Adherence to performance measurements outlined in the PCI DSS annual self evaluation, as well as submission to regular scans from Security Metrics to search for network vulnerabilities.

Application Security - Software tools are employed to scan for individual application vulnerabilities.

The State of Utah and work hard to protect your personal information while you do business with government online.


Was the information on this page helpful?

How can this page be improved?

Back to Top