In This Issue

Past Newsletters

Local and Other News

Newsletter Subscriptions

Be the first to know about new products, services, health care reform and more by subscribing to our newsletter. Visit our Profile and Preference Center to sign up today.


UnitedHealth Group Data Security Update

October 11, 2017

The health care industry continues to be a target of sophisticated cybersecurity attacks. Threats range from ransomware to denial of service attacks that are linked to the proliferation of the “Internet of Things.” 1 For this reason, cybersecurity has emerged as a top concern for the health care industry. Security compromises have resulted in the loss or compromise of sensitive and protected health information.

Health care organizations must invest in strong cybersecurity and data protection practices designed to help protect the confidentiality, integrity and availability of information systems and assets.

Commitment to Securing Customer Data
At UnitedHealth Group, our commitment to securing data is integral to the relationships we have with all of our customers and vendors alike. We continue to focus on deploying leading security practices to stay apace with evolving cybersecurity threats and risks to customer data.

Key Security Objectives
We use industry-leading security frameworks to help protect data, leverage technology and deliver best-in-class security operations and services.


Information Security Program
UnitedHealthcare manages and supports a robust information security program with protocols that are based on industry practices, applicable regulatory obligations, defense industry practices, and customer considerations. Policy, standards and guidelines, reviewed on a frequent basis, are used to manage the specific requirements of general computing, audit and security controls. Regulatory requirements, including the HIPAA Security Rule, are also reflected in our information security program.

Other Key Areas of Focus

  • Network Security: Leading security technology for perimeter defense of network computing assets continues to be a priority providing a first line of defense.
  • Cybersecurity: World-class threat hunting, digital forensics services and data scientists to sustain and leverage one of the largest security event data lakes in industry.
  • Operational Security: A multi-factor access strategy that includes smart cards, tokens and a centralized access control model.
  • Vendor Risk Management: Risk assessments are performed by Enterprise Information Security and Vendor Management offices to review findings, agree on mitigating activities and set forth ‘trust but verify’ processes until risks are appropriately mitigated.

For additional information about UnitedHealth Group’s Information Security Program, please review our Enterprise Information Security brochure or contact your UnitedHealthcare representative with questions. 

1The “Internet of Things”  is a giant network of connected “things” (which also includes people). This is the concept of basically connecting any device with an on and off switch to the Internet (and/or to each other).

January 1, 2018 PDL Updates

The following updates will take effect for the OptumRx direct Prescription Drug Lists (PDLs) on January 1, 2018. Learn more

New Sales Automation Management Tool

Check out our new Sales Automation Management (SAM). Learn more

UnitedHealth Group News

Visit our newsroom for the latest about programs, reports and initiatives designed to help people live healthier lives.