Microsite Health Logo
From our Technology Department

Technology Policies

Overview
The Executive Whisper, LLC (dba Microsite Health) offers healthcare providers a method to  increase new patients and revenue with an all-in-one digital marketing solution. The solution includes a tailored website, online advertising, patient-conversion training and software tracking. It also comes with a dedicated Success Team to guide the program through all phases and help ensure success. 

Website
The website’s content is customized to the client's specific practice.  Microsite Health uses WordPress (a free Open Source Web publishing platform) as its content management system and overlays a visual editor to improve the client experience and the ease of use. 

HIPAA Compliance – BAA

Terms of Service and Liability

For complete details of Microsite Health's Services offered, terms of use, and liability, refer to "Website Development and Marketing Services Agreement" provided with our Proposal. The following provides a summary of our terms and conditions for reference only:

Microsite Health Service includes, but is not necessarily limited to, the development of a cloud-based provider website (“Provider Website”), and the provision of marketing services specifically outlined in our Proposal (collectively, the “Marketing Services”). 

(i) Provider Website. Microsite Health will develop a cloud-based Provider Website for Client in accordance with the terms outlined in Proposal.

(ii) Marketing Services. Microsite Health will provide the Marketing Services indicated in the Proposal. Where applicable, Microsite Health will make the analytic report element of the Marketing Services (the “Analytics”) available to Client in accordance with these Terms and any other Microsite Health rules and policies then in effect. The Analytics allows Client to set up an account and password to access the Analytics. Client may authorize employees or subcontractors to use the Analytics on behalf of Client (each, a “User”); such Users are subject to these Terms, and Client agrees to be responsible for the actions of all Users who receive authorization to use the Service, including but not limited to their access to the Analytics.

(iii) Restrictions. Client will not, and will not permit or authorize third parties to: (a) rent, lease, resell or otherwise permit unauthorized third parties to access or use the Service; (b) reverse engineer, reverse assemble or otherwise attempt to discover the source code for any software made available as part of the Service; or (c) circumvent or disable any security or other technological features or measures of the Service.

(iv) Ownership of Website and Social Media Accounts Upon Termination. Upon termination of Agreement, You will retain ownership of the Website and we will transfer said Website to you per the terms outlined in the Proposal. All Social Media Accounts (AdWords, Facebook, Instagram, etc.) and Landing Page materials prepared by us on your behalf and account shall be owned by us and shall be our sole and exclusive property. Upon termination of this agreement, the Social Media Accounts set up on your behalf shall be closed and removed from our umbrella account.

Operational Security

Overview
Microsite Health employs a public cloud deployment model using both physical and virtualized resources for its main solutions (Microsite.com, Micrositehealth.com and Smart Tracking). All software maintenance and configuration activities are conducted by Microsite Health employees, remotely from our corporate office in Chicago.

All infrastructure responsibilities lay with Microsite Health, and customers are provided with functionality to manage their content, users, and roles at the application level.

Microsite Health follows guidance from the ISO/IEC 27002:2013 standard along with our 10 years of experience in operating highly secure web-based solutions to guide its security efforts. Additionally, Microsite Health employs industry standard practices for security controls such as firewalls, intrusion detection, and change management.

Microsite Health distributed architecture for data collection and processing allows it to scale horizontally as the number of customers and volume of traffic increase. Microsite Health uses multiple monitoring processes and tools to continuously track network resources, operating systems, applications and capacity. Systems are scaled up when predetermined capacity thresholds are reached.

Only authorized personnel can administer systems or perform security management and operational functions. Authorization for and implementation of changes are segregated responsibilities wherever appropriate to the organization.

Physical Security and Data Centers

Microsite Health’s infrastructure is physically located at the Rackspace US, Inc. facility in Dallas, Texas. This is a tier 3 data center, designed specifically for maximum security and availability. The data center has obtained a SOC (Service Organization Control) report or ISO 27001 certification, and employ industry best-practices, including badge and biometric access entry systems, redundant power sources, redundant air conditioning units and fire suppression systems. Security personnel and cameras monitor this location 24 hours a day, 365 days a year. Only authorized personnel are allowed inside the data center and all accesses are logged.

A more complete description of Rackspace’s security management is here:
https://www.rackspace.com/en-us/security/management

Microsite’s Security Management

Microsite Health infrastructure is managed by a team who employs industry best practices such as default deny rules for firewalls, intrusion detection systems and automated patch management. All key repeatable processes and security checks in Microsite Health production environment are either documented in procedures or implemented as automation scripts, and approved by management.

Microsite Health maintains and follows formal change management processes. All changes to the production environment (network, systems, platform, application, configuration) are tracked and implemented by a dedicated team.

All deployments into production or change to the production environment (network, systems, platform, application, configuration, etc.) must be submitted to, reviewed and approved by the change management meeting team prior to implementation.

Microsite Health relies on well-defined processes, disciplined execution and continual training of staff.

Protection Against Malware

All Linux production external-facing web servers have anti-malware software installed and are scanned weekly; and all deployed code is scanned for malware daily.

Microsite Health strictly prohibits customers accessing servers via FTP or SFTP and therefore does not allow uploading of WordPress or other third-party plugins or software via either method. Microsite Health reserves the right to review any customer request to add any third-party plugins or software. Any plugin or software allowed under Microsite Health policy meets the highest standard of security compliance and is approved by Sucuri Inc., a highly respected security firm.

Customer Data Security

All data and files provided by customers to Microsite Health remain the property of the respective customers and are classified as highly confidential under Microsite Health’s information classification policy. Access to customer data and files is restricted to legitimate business use only.

Microsite Health Information Security and Access Policy prohibits copying customer data on removable media devices, including flash drives, hard drives, tapes or other media, other than for legitimate business purposes and with the express authorization from the customer. This authorization can be contingent on encryption being used.

Password complexity rules are enforced in all environments to protect against brute force dictionary or other passwords threats.

Accesses to resources are controlled by explicit roles in all environments. Employees are given appropriate accounts on systems which they are authorized to access following the “least privilege” principle.

Access to customer data is limited to legitimate business need, including activities required to support customers’ use of the Microsite Health Solutions. Employees may only access resources relevant to their work duties.

Sensitive Data Prohibited

Microsite Health maintains appropriate security breach notification processes in alignment with the various US state laws pertaining to consumer privacy.

Microsite Health prohibits the use of its Solutions to collect, process and store sensitive data.

Website Monitoring

Microsite Health Operations uses an industry standard enterprise application management solution to monitor systems, trigger alerts based on event logs, and to facilitate alerting, trend analysis, and risk assessment.

24×7 monitoring of critical network events with intrusion detection system (IDS) and log aggregation systems gives Microsite Health Operations the ability to identify and address any unauthorized access to assets (including access to customer data) within the production network.

Alerting is in place to notify Microsite Health Operations team of any issue. Escalation procedures exist to ensure the timely communication of significant security incidents through the management chain and ultimately to any affected customer.

Security in Development and Support Process

Microsite Health follows an agile development methodology in which products are deployed on an iterative, rapid release cycle. Security and security testing are implemented throughout the entire software development methodology.

Microsite Health Website Solution relies on WordPress, and acknowledges its dependency on WordPress’ security practices and updates. Microsite Health also uses third-party components, plugins, and APIs. All use of open source software is subject to technical and legal review and approval.

Quality Assurance is involved at each phase of the lifecycle and security best practices are a mandated aspect of all development activities. Our main test areas include volume, stress, security, performance, resource usage, configuration, compatibility, installation, and recovery testing.

Microsite Health uses both internal and third-party security vulnerability scans, including those provided by Sucuri Inc.

Data Backup and Recovery

Microsite Health stores all customer data in the cloud-based production environment on fully redundant storage systems, and utilizes a multi-tiered backup approach. Daily and intraday data is backed up on a scheduled basis to separate near-line storage devices and/or backup media.

All backups are stored in secure containers and transferred offsite weekly for storage in a secure, environmentally controlled, reputable third-party data archive facility per Rackspace policy and procedures.

All backup files are retained for 30 days. During that time, Microsite Health maintains the ability to recover and reinstall backed up files on an as-needed basis.

Disaster Recovery

Microsite Health business continuity planning (BCP) and disaster recovery (DR) activities prioritize critical functions supporting the delivery of its cloud-based Solutions to its customers.

A system-level failure, for any component in the Microsite Health Solutions environment, is easily identified and resolved through both Microsite Health and Rackspace 24×7 monitoring systems. When monitoring detects a failure, failed systems are automatically removed from the production environment, and the operations team is alerted and resolves the issue or escalates to the appropriate vendor as needed.

All servers and databases are backed up with Image Snapshot. The snapshot contains all files and data that are located on the servers. It also contains the configured OS and services that Microsite Health has loaded. Any server can be quickly rebuilt with the particular OS and stack that had been installed along with all the data from the previous snapshot to minimize downtime.

[email protected]
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram