Security Policy

Multi-Health Systems, Inc. (MHS) protects the personal data of our customers, the data of their clients, and the data collected through electronic commerce practices with the highest level of security. We agree to use such information for the purposes outlined and to hold such information within the strictest confidence. This applies to both on and off-line information that is collected and used in the course of our activities.

Security FAQ

FAQ about how MHS protects the online and off-line data of its customers and their clients.

FAQ about the security of the LS/CMI.

FAQ bout the security of the Conners Continuous Performance Test 3 (CPT 3)

FAQ about the security of the MAC+ portal.

FAQ about the security of the GEARS portal.

FAQ about the security of the TA portal.

Security Policies

Policy statement on access control and information security.

Policy statement about the criminal record check conducted by a third-party provider on MHS employees and applicants in positions of trust.

Description of the procedures followed by MHS when performing a background check on employees and applicants.

Policy statement about a training program to make employees aware of the threats that exists offline and online.

Policy statement about the security features that govern how users and processes communicate and interact with systems and resources.

Policy statement about MHS standards for data exchange used within application and infrastructure configuration.

Details on how MHS will prevent data loss, corruption, and misuse of computing resources when malware is introduced to the MHS IT network.

Guidelines on how MHS manages, protects, and classifies data retention periods. This includes retaining data when there is a business need to do so and how to dispose of data that is no longer required.

Listing of the steps involved in the decommission of a platform, solution, or technology.

A set of instructions that detail the roles, tasks, and steps that MHS will take to detect, respond to, and recover from network security incidents.

Details on how MHS minimizes the risk associated with non-performing or non-compliant vendors in order to meet enterprise requirements.