You are currently in the confidential and secure reporting structure of EthicsPoint. Below are the choices available to you. Please click on the arrow (Arrow Example) to select the type of report you would like to make.

Security & Privacy
Violations of our Security and Privacy Corporate Policies and Procedures
Misuse of electronic devices (USB, CD, blackberry, other) Use personal electronic devices (USB, CD, BlackBerry and other) to save PHI or confidential information. Use electronic devices (personal or MCS property) without being authorized by the Security and Privacy Department. Use of electronic devices (personal or MCS property) without an encryption tool approved by MCS IT personnel.
Misuse of Fax Left fax with PHI or confidential information unattended.
Misuse of ID Cards An employee with the ID card or an external person in MCS facilities without an ID card, or visitor badge. Visitors must be accompanied by an employee.
Misuse of laptop or PC Use of personal laptop or PC for business purpose. Use of MCS property laptop or PC with an encryption mechanism. Use of Laptop or PC for a non business purpose.
Misuse of MCS applications Use of personal applications for business purpose. Use of MCS applications for a non business purpose.
Misuse of MCS systems Use MCS system for none business related purpose.
Misuse of Printers Left document with PHI or confidential information unattended.
Misuse of user name and/or passwords User name and password shared with other employee, consultant or any other individual.
Misuse of VPN connections Use unauthorized VPN connections (ex. Personal use)