Legal
PMS operates a controlled environment within secured infrastructure by a multi-layered security approach. Information Systems are protected using globally accepted IT security industry standards.
PMS applies physical, administrative and logical security to protect computer hardware, programs and networks, including firewalls, intrusion detection sensors, network probes, antivirus protection systems and secured interfaces. Personally Identifiable Information (PII) and Protected Health Information (PHI) is preserved from unauthorized access by management of appropriate access controls and the least privilege principle. Protected data is secured by encryption in transit and at rest. PMS ensures IT assets are securely disposed at end of useful life, ensuring that all data storage mediums are destroyed and disposed of safely.
The PMS security management processes and systems ensure data integrity and minimize risks for unauthorized use. As part of the computer end user security PMS process and controls, you are responsible of contributing to secure your information by limiting external access to this website via your personal profile and by keeping your login information confidential. You should log out of your browser at the end of each computer session to ensure that others cannot access your applicant data, especially if you share a computer with someone else or are using a computer in a public environment.