Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

5/20/2010
08:48 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

National Tenant Network Data Centers Now SAS70 Type II Compliant

Access to non-public information through NTN systems and networks is limited to individuals who have legitimate business need to access such information

PORTLAND, Ore., May 19 /PRNewswire/ -- NTN Data Security: National Tenant Network, Inc. (NTN) implements SAS70 Type II security standards and continues to ensure compliance with Gramm Leach Bliley (GLB) Safeguard provisions as they relate to the administrative, technical and physical safeguarding of subscriber and consumer information.

Secure, Limited Access

Access to non-public information through NTN systems and networks is limited to individuals who have legitimate business need to access such information and who are authorized by NTN.

Vulnerability Management

End user Web connection requirements

Each end user who accesses NTN's confidential information must have an agreement on file with NTN or one of NTN's affiliate offices. Each end user (customer) can only access reports or data for which they are authorized. In most cases, to access information such as credit reports an end user must be certified by an independent outside certification/inspection authority.

In the NTN multi-state national server banks, all confidential data is maintained on secured hosts behind firewalls. To the extent reasonably available, encryption technology is utilized for both storage and transmission of all confidential subscriber and consumer information.

With respect to the security of information resources, the technology is constantly evolving so the expectation is that NTN will continuously monitor the technology and make adjustments as necessary to preserve the infrastructure.

NTN is a nationally recognized leader in resident screening and leasing services.

NTN has been covered and recommended by CNN and NBC News.

CONTACT:

NTN, Inc. Edward F. Byczynski, CEO 525 SW First Suite 105 Lake Oswego, Oregon 97034 Phone: 1.800.228.0989 Fax: 1.800.340.1116 E-Mail: [email protected] Website: http://www.ntnonline.com

This press release was issued through eReleases(R). For more information, visit eReleases Press Release Distribution at http://www.ereleases.com.

SOURCE NTN, Inc.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-24259
PUBLISHED: 2021-05-05
The “Elementor Addon Elements� WordPress Plugin before 1.11.2 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method.
CVE-2021-24260
PUBLISHED: 2021-05-05
The “Livemesh Addons for Elementor� WordPress Plugin before 6.8 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method.
CVE-2021-24261
PUBLISHED: 2021-05-05
The “HT Mega – Absolute Addons for Elementor Page Builder� WordPress Plugin before 1.5.7 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by ...
CVE-2021-24262
PUBLISHED: 2021-05-05
The “WooLentor – WooCommerce Elementor Addons + Builder� WordPress Plugin before 1.8.6 has a widget that is vulnerable to stored Cross-Site Scripting (XSS) by lower-priv...
CVE-2021-24263
PUBLISHED: 2021-05-05
The “Elementor Addons – PowerPack Addons for Elementor� WordPress Plugin before 2.3.2 for WordPress has several widgets that are vulnerable to stored Cross-Site Scriptin...