Now available: Participant Account View, which mirrors participants’ online accounts so you can better provide support and guidance. Go to the Participant Look-Up in the Tools section under Plan Management to try it out.

Marquee Header

Continuous protection. Always evolving.

From plan sponsors to participants, cybersecurity is on everyone's mind--and everyone expects you to protect their data. Here's what we're doing to help protect privacy and prevent fraud.

88% of consumers say their perception of business is improved when there is an investment in the customer experience, including security. Experian, 2020 Global Identity and Fraud Report

Looking to be better informed about cybersecurity? Do you want to know if your provider is taking all the steps necessary to protect your data? We've compiled the 10 critical cybersecurity questions to ask.

Protection in Action

Our enterprise-wide security strategy protects account holders with a combination of technology, policies, and processes. 

Cybersecurity is a responsibility we take very seriously–and these are the measures we take.


Our security strategy is informed by frequent board and committee briefings, executive tabletop sessions, periodic security briefings, and an established business continuity plan.


Our associates are carefully vetted and thoroughly trained in security awareness and incident response protocols.


We employ advanced network and data protection, access management, and authentication protocols, plus cybersecurity data analysis.


We design processes to ensure appropriate controls are in place for all that we do. Ongoing risk assessment management and testing are vital parts of our best practices.

Vigilance/ Monitoring

We continuously monitor plan, participant, and transaction activity, around the clock, every day of the year.

Strengthening Security of Participant Interactions Online and by Phone

T. Rowe Price makes every effort to ensure that participant interactions are not only seamless but also well protected through robust security practices for authentication.

Multi-Factor Authentication

Multi-Factor Authentication provides an additional layer of security to normal login requirements and call center interactions. It requires participants to provide information that only they have access to: a code they must enter during login or provide to our call center representatives at the start of their phone call.

Multi-Factor Authentication is required for all participants-who are guided through the setup process during login or when creating their online account.

Voice Biometrics

The voice biometrics process passively authenticates callers as they naturally engage with the call center. This new technology evaluates several criteria for each caller, including voice characteristics, caller behavior, call location, and device characteristics, beginning with their first interaction with our call center. If the call seems suspicious, the system will automatically trigger additional authentication procedures.

Our Account Protection Program

The T. Rowe Price Account Protection Program is designed to assure plan sponsors and participants that their accounts are protected in the event of fraud. Under the program, we’ll restore eligible account losses caused by unauthorized activity* when plans and participants follow some best practices.

Plan sponsors and participants should contact us immediately if they suspect a potential breach or fraudulent activity.

All reported concerns will be thoroughly investigated to determine program applicability. The Account Protection Program may not apply if the security best practices outlined in this document are not followed.

Contact your T. Rowe Price representative to find out how we can partner to protect your participants.