Call Toll Free:1-800-540-3848 | Fax: 714-502-3901
secure banner
It's Your Data, It's Our Job to Protect It. ››

Rest assured, Advanced Image Direct (AID) offers our clients unsurpassed data security. With 256-bit encryption, 24/7 management and regular vulnerability audits –
your data has never been safer. AID prides itself in making secure data transfer, data storing and communications for our clients an utmost priority.All this,coupled with
20 years experience, extraordinary service and proven direct mail results, make AID a worldwide leader. See for yourself, our secure, professional and state-of-the-art
facilitywelcomes you. Call today, we look forward to being your secure direct mail solution provider.

Security Solutions to Support Compliance
with the Gramm-Leach-Bliley Act

The federal Gramm-Leach-Bliley Act (GLBA), also known as the Financial Modernization Act, requires banks, insurance companies, brokerages, and other financial institutions to establish administrative, technological, and physical safeguards to ensure the confidentiality and integrity of customer records and information. In order to comply with this mandate, financial institutions are required to identify and assess security risks, plan and implement security solutions to protect sensitive information, and establish measures to monitor and manage security systems. Section 501(b) of the GLBA established the high-level privacy and security requirements that financial institutions must comply with in order to protect customer information. The U.S. Federal Trade Commission (FTC) implemented this section and issued its Final Rule (16 Code of Federal Regulations [CFR] Part 314) in May 2002. VeriSign offers a suite of services to support financial institutions in complying with sections §314.3 and §314.4 of the FTC Final Rule: • AID ensures the security of networks that hold customer information, through 24/7 proactive management of the network security infrastructure to detect, prevent, and respond to network attacks, intrusions, and other system failures (§314.4 [b][3]) + Compliance Assessment AID is constantly identifying and assessing threats to customer information and evaluating the effectiveness of current and future safeguards. + Attack Detection, Prevention, and Response To comply with the GLBA, financial institutions handling sensitive customer data must be able to detect, prevent, and respond to network attacks, intrusions, and other system failures (§314.4 [b][3]). In addition, they must be able to maintain audit trails for all data activity and system events. AID continues to enhance and update our security protocols in the best interest of our clients.

Minimize Risk of Breaches of Personal
Information under California SB 1386

California Senate Bill (SB) 1386 requires any agency, business, or person owning, licensing, or maintaining a computerized database of personal information on California residents to immediately notify the customers if the security of their personal information is breached. This requirement became operative on July 1, 2003, is likely to be duplicated by other states or the federal government and applies even if no personal information is stolen. In addition, it authorizes lawsuits and injunctions if breaches are not reported in a timely manner. Enterprises recognize the difficulty of providing written or electronic notices to customers in the event of a breach. Accordingly, most enterprises operating in California recognize the need to prevent security breaches that necessitate reporting and may potentially damage their reputation. To minimize risk exposure caused by unauthorized access to or disclosure of information, enterprises are acting quickly to identify and assess security risks, plan and implement services to protect sensitive information, and establish measures to monitor and manage security systems. AID Identifying and assessing threats to customer information and evaluating the effectiveness of current safeguards is a complex task that requires in-depth knowledge of security technology and practices, as well as continual identification of ever changing security threats and requirements. At AID we leverage our deep expertise, proven methodologies, and state-of-the-art assessment tools to thoroughly assess current state and vulnerability of existing network-security implementations, including policies, technology, operations, use, performance, and physical security.

Support Compliance with
the Health Insurance Portability
and Accountability Act (HIPAA)

As healthcare organizations move information online to automate business processes, streamline communications, and improve customer service, safeguarding electronic data has evolved from an internally defined business practice to an externally imposed requirement of the federal government. Health plans, clearinghouses, healthcare providers, Medicare/Medicaid agencies, and other healthcare organizations must comply with federal Health Insurance Portability and Accountability Act (HIPAA) regulations regarding the confidentiality, integrity, and availability of private health information. To comply with these mandates, healthcare organizations have moved quickly to assess risks, correct weaknesses, and establish mechanisms for proving regulatory compliance. The U.S. Department of Health and Human Services issued the Final Rule on HIPAA Security Standards in February 2003 (45 Code of Federal Regulations [CFR] Parts 160, 162, and 164). Most healthcare organizations were required to comply with the Final Rule on Security Standards as of April 21, 2005. As noted in the Final Rule on Security Standards, “The implementation of reasonable and appropriate security measures also supports compliance with the privacy standards, just as the lack of adequate security can increase the risk of violation of the privacy standards.” At AID we understand the finer points and implications associated with lack of compliance for health care providers. We know and understand this market better than many of our competitors.