How T. Rowe Price Helps to Protect Your Information
At T. Rowe Price, safeguarding your online security and privacy is our highest priority. We use strict controls to help ensure that your online experience is safe and reliable. T. Rowe Price's network is protected by various security infrastructures, including industry-standard firewall technology and intrusion-prevention systems.
Be cautious of any unsolicited message you receive that asks for personal information. Do not respond to or open attachments or click on links within an e-mail or text message if you suspect the message is fraudulent.
T. Rowe Price uses Secure Sockets Layer/Transport Layer Security (SSL/TLS) technology to establish an encrypted connection between your browser and our Web applications. SSL/TLS websites start with "https://" instead of "http://" and signify that you are in a secure online session with us. To ensure your protection, we require a modern version of SSL/TLS and industry standard encryption strength - these are supported by current versions of all modern browsers.
T. Rowe Price offers Extended Validation (EV) certificates: additional protection to help ensure you are accessing T. Rowe Price’s official website.
When accessing our website, you should see the address bar in green and/or display the T. Rowe Price name alongside the lock symbol. This view will vary depending on your browser.
System activity is logged in order to preserve the information necessary to validate the transmission of data.
Online Account Access
If you have online access to an account you hold at T. Rowe Price, we want to make sure you know what to expect.
To help ensure you are accessing T. Rowe Price’s authentic website, please note the Extended Validation (EV) certificates in your browser’s address bar. When accessing the T. Rowe Price official website, you should see the address bar in green and/or display the T. Rowe Price name alongside the lock symbol. This view will vary depending on your browser.
T. Rowe Price periodically evaluates the login experience to make it easy and secure to access your account. As we make enhancements, you may notice different screens as you log in to your account.
As always, we welcome your feedback as we strive to deliver the best login experience for our customers.
Depending on the product or service you select, there will be specific requirements for setting up a user name and password. The site will display the requirements as you navigate the set-up process. There also may be the opportunity to set up security questions and multi-factor authentication to further protect your account.
Notifications and Confirmations
For online transactions, a confirmation statement is mailed promptly after the transaction date. You can choose to receive an email and or/text message alert that a confirmation has been posted to your online account instead of having the confirmation sent by mail. Make sure you review your account activity periodically. For security purposes, you will be asked to provide personal information for identity verification when you call us. When a customer requests a change of address, we send a confirmation letter to both the old address and the new address.
Restriction of Online Account Access
T. Rowe Price reserves the right to restrict online account access for any account that exhibits suspicious activity. In such a situation, you will be notified so that we can verify the activity of your online account with you.
How T. Rowe Price handles suspected fraud incidents:
In the event of activity that results in an unauthorized disbursement of funds from a client's account, T. Rowe Price will work with the clients and other parties involved, including law enforcement agents when appropriate, to investigate the incident.
Our goal will be to recover the funds and re–invest the money in the client's account, if permissible. Each situation is handled on a case–by–case basis and in the event that the funds cannot be recovered in full, potential responsibility will be evaluated by T. Rowe Price based on the circumstances involved in the incident.
What is Social Engineering?
Social engineering is a term for manipulating or deceiving people into providing confidential information or performing an action that compromises their personal information. Social engineers are con artists. Phishing is a common form of social engineering that uses fraudulent messages to trick customers into unsafe electronic activity. The most common forms of phishing are e-mails, text messages, and pop-up messages. The motive is to trick you into clicking on a link or opening attachments that infect your computer with malware or into providing personal or confidential information such as your user name and password. Other forms of social engineering are fraudulent telephone calls or text messages purportedly from organizations such as the IRS, your credit card company, or financial institution. Never provide or confirm any personal information to an unknown sender.
Protecting Your Personal Information and Preventing Identity Theft
T. Rowe Price will not ask for personal information via e-mail or text message. You should only provide account information via T. Rowe Price's secure website via the Message Center in your account dashboard, when calling T. Rowe Price, or by U.S. mail/express delivery.
What Else You Can Do
We recommend our clients practice good computer habits, such as:
- Keeping all internet browsers up to date with the latest version
- Regularly running anti-virus and anti-spyware software
- Keeping the device operating system and software up-to-date with patches
- Keeping passwords confidential
- Only using trusted networks when accessing personal or financial information
Only using trusted devices with proper security settings to access personal or financial information
Avoid being a victim of a social engineer or scam artist by being an educated and aware online consumer. Learn more by visiting FTC Consumer Information portal, a service of the U.S. Federal Trade Commission and other federal agencies.
If you are a victim of an Internet crime, report it to IC3, a service of the U.S. Federal Bureau of Investigation and the National White Collar Crime Center. You should also report attempted identity theft to the local authorities as well as to the Federal Trade Commission's Complaint Assistant Application.