Last Updated: March 3, 2020
Keeping your data secure, confidential, and readily accessible are Pacific Research Group’s greatest priorities. Our industry-leading security program is based on the concept of defense in depth: securing our organization, and users’ data, at every layer.
Our security program aligns with CIS CSC 20 and NIST Cybersecurity frameworks and our CORE solution is HITRUST CSF certified. Our payments platform is PCI DSS Level 1 service provider certified. While no system can guard against every potential threat, Pacific Research Group’s defensive line is advanced and monitored 24/7, 365 days a year by highly trained professionals.
The focus of Pacific Research Group’s security program is to prevent unauthorized access to user data. To this end, our team of dedicated security practitioners, working in partnership with peers across the company, take exhaustive steps to identify and mitigate risks, implement best practices, and continuously develop ways to improve.
Pacific Research Group’s security team, led by the Chief Information Security Officer (“CISO”), is responsible for the implementation and management of our security program. The CISO is supported by members of the Cybersecurity Team, who focus on Security Architecture, Product Security, Security Engineering and Operations, Detection and Response, and IT Risk and Compliance.
This Security Policy should be read in conjunction with the Privacy Policy.
This Security Policy contains defined terms, which are defined elsewhere in the Agreement. Please refer to these defined terms in reviewing this Security Policy.
When you access, view or use any part of the Pacific Research Group services, you are accepting the terms and conditions of this Agreement.
If you are agreeing to this Security Policy on behalf of a corporation or other legal entity, you represent that you have the authority to bind such entity and its affiliates to the Agreement. If you do not have such authority, you must not enter into this Agreement and may not use any of our services or content.
Having considered the above preliminary matters and mutual agreements below, the Parties hereby agree as follows:
Pacific Research Group’s security team has built a robust, secure development lifecycle, which utilizes manual code reviews, static code analysis, and external/internal red team penetration testing. While we strive to catch all vulnerabilities in the design and testing phases, we realize that sometimes, mistakes happen. With this in mind, we have created a public bug reporting program to facilitate responsible disclosure of potential security vulnerabilities. All identified vulnerabilities are validated for accuracy, triaged, and tracked to resolution.
All data transmitted between Pacific Research Group users and the Pacific Research Group services is done so using strong encryption protocols. Pacific Research Group supports the latest recommended secure cipher suites to encrypt all traffic in transit, including the use of TLS 1.2 protocols and AES256 encryption.
Credit Card and PHI (SOAP notes field) data at rest in Pacific Research Group’s production network is encrypted using industry standards for data encryption. All encryption keys are stored in a secure server on a segregated network with limited access. Pacific Research Group has implemented appropriate safeguards to protect the creation, storage, retrieval, and destruction of secrets such as encryption keys and service account credentials. Each Pacific Research Group user’s data is hosted in our shared infrastructure and logically separated from other users’ data. We use a combination of storage technologies to ensure user data is protected from hardware failures and returns quickly when requested.
Network access to Pacific Research Group’s production environment from open, public networks (the Internet) is restricted, with only a small number of production services accessible from the Internet. Only those network protocols essential for the delivery of MINDBOBDY’s service to its users are open at our perimeter. Pacific Research Group utilizes third-party Content Distribution Network (“CDN”) services for redundancy and performance of services. In addition to CDN, Distributed Denial of Service (“DDoS”) and bot protections are provided through third-party services. All secure servers are protected by firewalls, best-of-class router technology, TLS encryption, file integrity monitoring, and network intrusion detection that identifies malicious traffic and network attacks.
All workstations issued to Pacific Research Group personnel are configured by Pacific Research Group to comply with our standards for security. These standards require all workstations to be properly configured, updated, tracked, and monitored by Pacific Research Group endpoint management solutions. Pacific Research Group’s default workstation configuration encrypts data at rest, requires strong passwords, and locks when idle. Workstations run up-to-date monitoring software to report potential malware, unauthorized software, or other compromises.
To minimize the risk of data exposure, Pacific Research Group adheres to the principles of least privilege and role-based permissions when provisioning access. Pacific Research Group employees and affiliates are only authorized to access data that they reasonably must handle to fulfill their current job responsibilities. All production access is reviewed internally and is part of compliance with PCI and HITRUST.
To further reduce the risk of unauthorized access to data, Pacific Research Group employs multi-factor authentication for all privileged access to systems with highly-classified data, including our production environment, which hosts our user data.
Pacific Research Group monitors servers, workstations, and networks to maintain and analyze a comprehensive view of the security state of its corporate and production infrastructure. Administrative access, use of privileged commands, and system calls on all servers hosting sensitive data in the Pacific Research Group production network are logged, analyzed, and retained in accordance with PCI and HITRUST requirements.
All networks are monitored using a Security Incident Event Management (“SIEM”) system that gathers logs from all network systems and creates alert triggers based on correlated events. In addition to internally managed SIEM, Pacific Research Group utilizes third-party incident detection and response services for additional monitoring and analysis.
Intrusion detection sensors throughout our internal network report events to the internal and external SIEM systems for logging and for the creation of alerts and reports.
In order to provide you with our services, Pacific Research Group may rely on other service organizations that provide their services to Pacific Research Group (“Subservice Organizations”). Where those Subservice Organizations may impact the security of Pacific Research Group’s production environment, we take appropriate steps to ensure our security posture is maintained by establishing agreements that require Subservice Organizations to adhere to confidentiality commitments we have made to users. Pacific Research Group monitors the effective operation of the Subservice Organization’s safeguards by conducting reviews of all such controls before use.
Pacific Research Group is continuously monitoring, auditing, and improving the design and operating effectiveness of our security controls. These activities are regularly performed by both third-party credentialed assessors and Pacific Research Group’s internal IT Risk and Compliance teams.
Assessment and audit results are shared with senior management, and all findings are tracked to ensure prompt remediation.
In addition to our compliance audits and assessments, Pacific Research Group engages both internal red teams and independent external entities to conduct application-level and infrastructure-level penetration tests at least annually. The results of these tests are shared with senior management and any potential issues are triaged, prioritized, and remediated promptly.
Our hosting and cloud service providers are PCI compliant and have completed the industry standard SOC 2 certifications. This includes controls and processes such as multi-factor authentication, role-based access controls (“RBAC”), redundant utilities, and strict change management processes.
No computer system or information can ever be fully protected against every possible threat. Pacific Research Group is committed to providing reasonable and appropriate security controls to protect our services, Websites, and information against foreseeable threats. If you have any questions about Pacific Research Group security, you can contact us at info@pacificresearchgroup.com
Pacific Research Group maintains the security of Pacific Research Group systems, however, you as a Pacific Research Group user are responsible for implementing other security practices. We recommend that you:
Pacific Research Group is certified as a Level 1 Service Provider under PCI DSS Version 3.2
Any merchant who accepts Visa, MasterCard, American Express, or Discover credit cards for payment is subject to the Payment Card Industry Data Security Standard (“PCI DSS”), which outlines credit card processing merchants' responsibilities for the protection of Cardholder Data. We strongly recommend you follow the requirements of the PCI DSS when handling Cardholder Data. Please refer to the PCI DSS website for a complete list of all rules and restrictions that may apply
At a minimum, you must:
DISCLAIMER OF RESPONSIBILITY FOR CARDHOLDER DATA. If you use the optional Payment Processing Service to process payments, Pacific Research Group is responsible for protecting Cardholder Data only after such Cardholder Data is encrypted and received by Pacific Research Group’s system(s). You remain responsible for the proper handling and protection of Cardholder Data until such Cardholder Data is encrypted and received by Pacific Research Group’s system(s).
Your API credentials are extremely sensitive. If you use our API, you must follow the policies below to ensure that you’re accessing user data in a safe and secure manner. Using your API credentials indicates that you agree to the terms of this Security Policy. If you or a member of your team violates this policy, you could permanently lose access to the Pacific Research Group API.
You must:
Pacific Research Group reserves the right to delete any API credentials after 30 days of low activity (less than 100 calls).
We may, in our sole discretion, make changes to this Security Policy from time to time. Any changes we make will become effective when we post a modified version of the Security Policy to Our Website, and we agree the changes will not be retroactive.
Contact Us.
If you have any questions regarding this Privacy Policy you can contact us via email at info@pacificresearchgroup.com or via postal mail at:
Pacific Research Group
ATTN:Security Policy Issues
120 Tustin Ave. Suite C, Newport Beach, CA 92663
We would be happy to hear from you.
Phone: 800 951-0929
Email: info@pacificresearchgroup.com
Pacific Research Group
120 Tustin Ave. C
Newport Beach, CA 92663