Information security is essential to us. We work hard to protect both the security of our health data and the security of any information you give us. We have in place a comprehensive privacy and security program.

We welcome your feedback and questions

Our information security measures

When you visit our website

We use cookies to collect information about visitors to our site. Cookies tell us how often people visit, what pages they view and where they access those pages. This helps us monitor traffic and site use and tailor our content to your needs.

Cookies don’t provide us with any personal information. All the information we collect is anonymous.

If you like, you can set the preferences in your web browser to deny cookies or remove them after you visit our site. This doesn’t affect the site’s performance or your ability to access information.

When you give us information

We store this information securely. For example, when you visit our site, you might tell us the organization you work for or your email address.

We may use such information to help us determine new content and appropriate topics and services, or to manage how we distribute materials. But we do not disclose, share or sell any personal information about visitors to our site. Read our Website User Privacy Policy to find out more.

When you access applications

We take appropriate steps to ensure the confidentiality and security of health data.

As part of our customer service, we provide access to a wide range of publicly available information. We also make various online services available to registered clients. Those using such services can access them only with a secure password and user ID.

Some of the information we provide involves agreements with organizations that restrict access to that information. In such cases, the information is available only to authorized visitors. We therefore verify the identity of anyone who tries to use these applications.

We may also review and analyze the use of this restricted area to

  • Verify your identity and allow you to access appropriate/authorized areas
  • Understand your needs and eligibility for products and services
  • Recommend particular products and services
  • Provide ongoing service

We may follow up with clients who use restricted-access applications. We do this to ensure that they are complying with the security protocols in the signed access agreements.