Support and Security
At Raymond James, we recognize the trust you place in us.
Because support and security are of the utmost importance, Raymond James has an in-house team of professionals as well as specialized programs to provide technical assistance in order to prevent and detect intrusion or other suspicious activity.
How we protect our clients
At Raymond James, cyber security is clearly one of our most important priorities. Our clients trust that we will do everything in our power to protect and secure their privacy and accounts. And we take the faith they place in us very seriously. Putting the needs of clients first has always been our fundamental belief. And by putting their needs first – including the need for quality security and privacy safeguards – is the best way to ensure their success and, in turn, the success of the firm.
From technological safeguards to employee policies and operating procedures, we maintain constant vigilance. This also includes having a dedicated Privacy Office committed to ensuring we have best practices in place to protect the personal information of our clients. Here are some other ways we are protecting our clients:
Our technological systems are monitored 24 hours a day, 365 days a year, for signs of tampering or unauthorized activity. We employ the use of encryption, virtual private networks, penetration/-vulnerability testing, and the latest firewall and antivirus technology. Email monitoring is also utilized for regulatory and compliance purposes in order to protect our clients. We also maintain strict controls to limit and monitor employee access to our systems.
Our information technology professionals constantly research and develop enhancements to keep us at the vanguard of data security. A team of independent auditors reviews our technological systems quarterly.
Raymond James has specialized programs to prevent and detect intrusion, including an extensive incident response program. Our incident response team ensures appropriate technology and resources will be dedicated to the monitoring and prevention of cyber security threats.
Technology Risk Management
Confidentiality, integrity, and availability of our systems and client data are of the upmost importance to Raymond James. To reduce the risk associated with threats and vulnerabilities, we employ a risk-based control framework to protect our systems and data according to their sensitivity and criticality. IT risk assessments are continuously performed, and any outstanding remediation items are actively monitored.
Our employee policies emphasize the importance of preserving confidentiality. Newly hired associates receive an employee handbook that provides comprehensive information about our privacy policies and procedures, together with security-awareness training. In addition, all employees must attend regular training sessions on ethics and security. Our regulatory compliance specialists ensure that we meet regulatory requirements to preserve clients’ privacy.
All financial/investment advisors affiliated with Raymond James also receive training at our national conferences.
Our professional business continuity team focuses on preparing for potential business disruptions due to unforeseen circumstances such as natural disasters. Its goal is to ensure that critical operations continue and data remains secure during emergencies. The team oversees management of our remote operations centre and emergency functions such as data retention, backup procedures and off-site information storage.
Raymond James plays an active role among industry-wide organizations that share a common interest in protecting data and enhancing cyber security.
The annual investment Raymond James makes in cyber security has now become one of our line items. But it is critical that we continue to invest to ensure the present and future safety of our clients. It is also another major benefit to be part of a firm with the resources and capital to invest to make this happen.