Unity Security

Security


Unity members trust us to protect their personal information. We take this duty seriously and we strive to keep data safe.

Our ​Privacy and Security Committee meets regularly to check and improve our data control and security. We keep secure, and limit access to, data files, reports and sources that have Protected Health Information (PHI).


Unity’s culture highlights the importance of security and privacy. Employees are trained to keep PHI data secure. This protects our members and meets the requirements of the Health Insurance Portability and Accountability (HIPAA) Privacy Rule.

Unity's Online Security

Keeping your personal information safe is our top priority. All personal data is protected by many layers and types of security. We follow industry-proven best practices.

 

Encryption

We protect the confidentiality of your data by encrypting sensitive information. Encryption is a way of concealing and securing data. Unity uses a 128-bit Secure Socket Layer (SSL). This is a very secure level of encryption.

 

Firewalls

Your data is protected with a system of firewalls. Firewalls are designed to prevent unapproved access. The firewalls help protect our private network from unauthorized Internet users.

 

Anti-Virus

Unity systems are protected with anti-virus software. The software gets automatic updates that help stop new viruses before they get in the system. This software also helps stop other kinds of malicious code.

 

Intrusion Prevention

Unity continually checks the whole system and makes sure data is secure. We use an Intrusion Prevention System (IPS) and other monitoring tools. These tools alert our security team so that they can find and block attacks against our systems.

 

Security Information and Event Management (SIEM)

Unity analyzes data in real time to check for threats. We also check to make sure that everything is working properly. Data is collected from all security and network hardware, software and systems.

 

Disaster Recovery

Unity has back-up systems in place. This means that all critical systems and data will continue be safe and available. This is a common way to prepare for a range of problems that can include power outages or natural disasters.

 

Vulnerability Scanning

Sometimes computer software has weaknesses that are discovered after they are installed. Vulnerability scanning tools are used to find these kinds of weaknesses. The tool reports potential problems and then they are analyzed and resolved.

 

Facility Security

Unity buildings have controlled access to all entrances. Employees follow rules that protect data. These rules (policies and procedures) are checked and updated regularly.

 

Additional Resources

 

Questions?

Contact Unity Customer Service at 800.362.3310 or by sending a messageMyChart link.


For questions about your rights, or for assistance, you can contact:

Office of the Commissioner of Insurance
PO Box 7873
Madison, WI 53707-7873