Northern Trust Logo

Security Center


Information and Data Security

Protecting Northern Trust’s information from unauthorized access and accidental disclosure is a top priority. Northern Trust pursues information security with the same commitment to excellence that we apply to understanding our client’s financial needs. This includes utilizing a variety of technical and procedural controls to mitigate existing technology risks and proactively address emerging threats. Key technology controls are identified, prioritized, monitored and tested to help configure our networks and applications.

At Northern Trust, we work hard to keep your information secure. To protect your information, Northern Trust regularly evaluates and updates its security technologies and maintains physical, electronic and procedural safeguards that meet and exceed federal standards. We also adhere to strict institutional policies and procedures that limit access to personal information to those providing services on your behalf. Of course, we understand that the protection of your sensitive information does not start and stop with Northern Trust, so we've provided some helpful resources below. Although the information below is not exhaustive, it will help you improve your level of personal security.

Using Mobile Devices Securely

The keys to maintaining the security of applications on your mobile device is to install only from known, trusted, sources and to keep your apps current by installing updates as soon as they are available.