security information€¦ · security information non transactional • unlike online banking or...

2
The security of your data is our top priority. The Living Balance Sheet ® system employs the most advanced security features and protocols to keep your data safe, private and secure, 24 hours a day, 7 days a week. Comprehensive security protection measures include password protection, secure socket layer encryption, firewalls, intrusion detection, audits, inspections and more. Security Information Non Transactional Unlike online banking or shopping websites, your money cannot be moved, withdrawn or accessed on our system. Highest Encryption Our system uses a 256-bit Secure Socket Layer to scramble your data to prevent access to unauthorized users. Password Protection You have a unique User ID and Password. If three consecutive login attempts fail, the system automatically locks your account for 10 minutes, blocking any manual or programmed hacking attempts. Your User ID and Password will never be given out over the phone or sent to an email address that is not pre-registered with your account. You can be confident that your important information is safe and secure. SECURITY FEATURES

Upload: others

Post on 18-Jul-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Security Information€¦ · Security Information Non Transactional • Unlike online banking or shopping websites, your money cannot be moved, withdrawn or accessed on our system

The security of your data is our top priority. The Living Balance Sheet®

system employs the most advanced security features and protocols to keep

your data safe, private and secure, 24 hours a day, 7 days a week.

Comprehensive security protection measures include password protection,

secure socket layer encryption, firewalls, intrusion detection, audits,

inspections and more.

Security Information

Non Transactional• Unlike online banking or shopping websites, your money cannot be moved, withdrawn or accessed on our system.

Highest Encryption• Our system uses a 256-bit Secure Socket Layer to scramble your data to prevent access to unauthorized users.

Password Protection• You have a unique User ID and Password. If three consecutive login attempts fail, the system automatically locks your account for 10 minutes, blocking any manual or programmed hacking attempts.

• Your User ID and Password will never be given out over the phone or sent to an email address that is not pre-registered with your account.

You can be confident that your important information is safe and secure.

S E C U R I T Y F E A T U R E S

Page 2: Security Information€¦ · Security Information Non Transactional • Unlike online banking or shopping websites, your money cannot be moved, withdrawn or accessed on our system

Data is Secured behind Firewalls• Firewalls block unauthorized data access. If an incoming packet of information is flagged, it is not allowed to enter the system.

Designated as a VeriSign® Secure Site • The application cannot be accessed through an unsecure connection. It uses 256-bit encryption, the latest and most secure available today.

Certified Hacker Safe • Hackersafe approval means our ASP-based system updates every 15 minutes with tests for newly discovered vulnerabilities and validates fixes from hundreds of sources worldwide.

The Living Balance Sheet® and The Living Balance Sheet® Logo are registered service marks of The Guardian Life Insurance Company of America (Guardian), New York, NY. © Copyright 2005-2015 Guardian

Pub 3889 Rev. 12/20152015-13900 Exp. 11/2017

VeriSign is a registered trademark of VeriSign, Inc

Our Comprehensive Privacy Policy• We do not pass personal data to any third Party. Detailed Privacy & Security Policy links are accessible at the bottom of every web page.

Security & Incident Response• The team members, from the executive staff, operations, customer service and technology and development groups, each have their own responsibilities to help ensure system security.

Protection Year Round• Any recorded intrusion attempts would be analyzed to determine the identity of the intruders and the extent of the intrusion.

• If unauthorized server access was detected the software would sound an alarm and notify operation’s staff.

• The Secure Network Infrastructure is regularly audited and inspected to ensure that the security tools utilized are up to date.

M O R E S E C U R I T Y F E A T U R E S

World Class Technology & Data Security

P E A C E O F M I N D T H R O U G H