CFAA Security Criteria


UTA utilizes a powerful 128-bit Secure Sockets Layer (SSL) encryption during your online sessions to safeguard your data. Secure Sockets Layer (SSL) technology secures your Web site by encrypting the information in transit and providing authentication. Encryption is a way of converting plain text to a coded algorithmic sequence before it leaves your computer, so that if it is intercepted it is virtually unreadable. We use multiple encryption keys that allow us to convert the information back to a readable format.

Firewall Protection

Firewall protection and other security measures prevent access by unauthorized users. Firewalls can be thought of as a selective barrier that only permits authorized information to UTA’s server. In order to gain access to authorized information, the Web browser you are using must know the proper protocol and language. Even then, only limited information is available.

Personalized Sessions

Creating a personalized session each time a user logs in enables UTA to monitor all activity which has transpired. After 15 minutes of inactivity, the system automatically will close the session and log you off the site. This reduces the risk of others accessing your information from an unattended computer. Re-establishing and authenticating your credentials for your online session helps to reduce unauthorized access to your UTA accounts.

Online Security

Additional security mechanisms are available via digital certificates and other key public infrastructure services, through the VeriSign Certification Authority. This web site authentication system, VeriSign, validates that you are really doing business with us (not an impostor) and that the information that you are sending can not be intercepted or decrypted by anyone other than us. To verify that your session is secure, look for https: instead of http: in the URL address line, and a secure symbol (for example, closed padlock or key) on the status bar of your browser located on the lower part of the screen. If you would like to view our Certification Practices Statement, click here.

We have a number of other security procedures in place, which we must keep confidential in order to maintain their security. They are designed so that our Internet partnership may be a safe and secure one.

These controls are designed to allow us to take a proactive approach and ensure a secure transaction environment. We also encourage you, the customer, to take steps in protecting your personal information.

  • Never share your password with anyone. REMEMBER, an UTA REPRESENTATIVE WILL NEVER ASK YOU FOR YOUR PASSWORD.
  • We recommend that you change your Password on a regular basis. You should change your password immediately if you think that it may have been compromised and contact UTA immediately.
  • Consider using a personal firewall to prevent hackers from invading your personal computer, especially if you are using DSL or Cable Modem to access the Internet.
  • Install virus protection software and scan all downloaded software as well as all diskettes before use. Also, do not accept email attachments from unknown sources.
  • When done with your transactions, always click on the logoff button on the site to exit out of the application. When using a public PC (such as in a library or school), close the browser when you are finished.

For more information on how to prevent identity theft and what to do if you are a victim of identity theft, visit the Federal Trade Commission’s website at


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s