Information security incidents

MedStack Confidential

Metadata

Use automated systems to detect, log, and alert on suspicious activity

Immediately respond upon detection

Notify the appropriate parties when any breach of PII or PHI occurs