At T. Rowe Price, ensuring your online security and privacy is a high priority. The following measures are designed to ensure your communications and transactions on the T. Rowe Price Web site are as safe and reliable as any other means of doing business with us.
- Security online
- Online transactions
- Online transaction limits
- Transaction cancellations
- Access controls
- Termination of online account access
- Protecting your personal information and preventing identity theft
- Information on iVerify
Our online account services use the latest Internet technology for secure communications between your PC and our computer networks. We have installed a digital certificate on our computer that uses a special means of communicating with your browser called Secure Sockets Layer (SSL) protocol. This establishes a "handshake" with your computer that verifies that when you connect to our Web site, you have truly contacted T. Rowe Price. In fact, upon logging in to our site, you will note that the security icon, typically a key or a lock, in the bottom left-hand portion of your screen will be closed or connected, signifying that you are in a secure session with T. Rowe Price.
To provide access to your accounts and tools via our Web site, we require the use of a Netscape Navigator or Microsoft Internet Explorer browser that supports 128-bit encryption (also called domestic or U.S. grade). The "128-bit" designation refers to the length of the key used to encrypt or scramble the data being transmitted. The longer the key, the stronger and more difficult it is for an outside party to intercept and break our communication code. It is one of the highest levels of encryption currently available. In fact, because of the power of this technology, the U.S. government has, until recently, prohibited 128-bit technology from being exported; thus the name, "domestic grade" encryption. If for any reason you exit the Account Access system, your encrypted session will be interrupted, and you will need to log in again when returning to the Account Access system.
If you place a trade online and it is accepted by T. Rowe Price, a confirmation statement is mailed promptly after the transaction date. In addition, Shareholder Service representatives will be able to view the transaction on our computer system should you make an inquiry.
Online transaction limits
T. Rowe Price has placed the following limits on individual mutual fund transactions:
- Purchases and redemptions cannot exceed $100,000 per account per day. Exchanges cannot exceed $500,000 per account per day. An account is defined as an investment in a single fund.
- For Brokerage accounts, these criteria do not apply; however, sufficient funds or shares must be held in the Brokerage account and/or the accompanying money market sweep account prior to the submission of an online order.
- Online redemptions are not permitted from Education IRA accounts.
- If we find you have violated our excessive trading policy in either a non-retirement or retirement account, you may be barred indefinitely and without further notice from further purchases of T. Rowe Price funds.
If an online transaction is entered in error, you may request that the trade be canceled if notification is received prior to the close of the market for that business day (normally 4 p.m. ET). Earlier notification may be required for mutual fund transactions placed in a brokerage account.
Trade cancellation requests can be made by calling T. Rowe Price.
- For all T. Rowe Price Fund orders, call a Shareholder Service Representative at 1-800-541-8803.
- For Brokerage Advantage customers who placed a T. Rowe Price Fund order, and for all non-T. Rowe Price Fund orders, call a Brokerage Representative at 1-800-225-7720.
For security purposes, you will be asked to provide personal information for identity verification.
All system activity is logged in order to preserve all of the information necessary to validate the transmission of data.
Our policies provide for the use of authorizations, rights, and privileges to help ensure that authorized personnel and systems have access to account data.
Special hardware and software are used to build a 'firewall" to protect confidential data from a public network, such as the Internet and are designed to both detect and reject intruder actions.
Termination of online account access
T. Rowe Price reserves the right to terminate online account access for any account in which there is suspicious activity. In such a situation, you typically will be notified so that we can verify the activity with you.
Protecting Your Personal Information and Preventing Identity Theft
What is "Phishing"?
Phishing e-mails (also called "spoof" e-mails) are unsolicited e-mails sent to random e-mail addresses, allegedly from a financial services company. They may appear to be legitimate e-mails from a bank, mutual fund or other financial services provider, but they actually represent a scam designed to obtain a person's account number, password or other personal information. This information, in turn, can be used to defraud investors. By using names of established financial services firms in their e-mails and fake Web sites, "phishers" are able to convince some recipients to respond and provide personal information to them. Phishers can then withdraw money from accounts or make other unauthorized transactions.
What phishing e-mails look like and how they work?
The good news is that phishing e-mails may display one or more of the following "giveaways":
- Phishing e-mails try to create a sense of urgency. Their headlines usually contain warnings designed to provoke an emotional reaction that will prompt the recipient to divulge personal information via the Web. These e-mails often contain language such as "Your account will be closed or temporarily suspended unless..." Alternatively, they may include "too good to be true" special offers or promises.
- These e-mails sometimes contain embedded links to a fraudulent Web site that closely resembles a financial company's actual web site. The texts of these e-mails request the recipient to go to the fraudulent Web site and enter personal information.
- Phishing e-mails often intentionally contain spelling errors that allow these types of messages to pass undetected through spam filters.
- Additionally, phishing e-mails sometimes contain fields or boxes requesting the recipient to "update information" or "log-on" to the recipient's account. For those who do respond, they may unwittingly assist the scammer, who may record the data that is entered and can misuse it for financial or identity theft.
Some phishing e-mails don't solicit personal information. Instead, they provide links or attachments that, if opened, install spyware that records keystrokes and searches for passwords: this information is relayed back to the phisher.
What you can do
To avoid being scammed by a phisher, be an educated and aware online consumer. Just as you should refuse to give out your credit card number, Social Security number or any financial account information to a telephone solicitor, you should apply the same common-sense rule when dealing with the online world and e-mail.
- Be wary of any unsolicited e-mail you receive that appears to be from a financial services company and requests personal information. Remember, phishing e-mails often use scare tactics to provoke an emotional reaction that will prompt recipients to turn over account numbers, usernames, passwords, social security numbers, credit card numbers or birth dates.
- In general, immediately delete any e-mails that you suspect are spoofs. Report them as appropriate, but avoid opening them.
- If you do open an e-mail that you suspect is a spoof, do not click on any links or open any attachments provided.
Other ways to protect your online security
- Don't provide personal or account information of any kind in response to an unsolicited e-mail or telephone inquiry. This includes filling out forms in e-mail messages that ask for personal financial information. If you are unsure whether the contact is legitimate, call the company directly. Don't use any telephone number that was supplied in the e-mail or by the telephone solicitor. Use the company's 800 number that is printed on your account statement or obtain one from an 800 number directory and speak to a customer service representative about the inquiry.
- Consider setting up online accounts with your financial institutions when possible and monitor them regularly, rather than waiting for a paper statement to arrive by U.S. mail. When you are set up to receive paper statements, call the company if a paper statement does not arrive with the standard time period. Review online accounts and paper statements to ensure that all transactions posted are legitimate.
- Avoid giving your password to anyone, and change your password regularly.
- If you use wireless technology in public areas such as airports and hotels, be sure that your network is secure. Use encryption where possible. Ask your manufacturer for more details. Don't leave your computer unattended when traveling or in public places.
- If you use Internet Explorer, visit http://www.microsoft.com/security/ regularly to download the latest security-related updates from Microsoft. Keep your computer's anti-virus software updated on a regular basis.
- Bookmark Web addresses on your Internet browser for sites you visit frequently and for future visits, use only that bookmarked address to access the site. For example, type the T. Rowe Price Web address [www.troweprice.com] to go to our site and then bookmark the Web address on your Internet browser.
- As another means of checking for fraudulently opened accounts in your name (especially credit accounts), periodically order a copy of your
credit report from the three major credit reporting bureaus:
Equifax: 800-685-1111 / www.equifax.com
Experian: 888-397-3742 / www.experian.com
TransUnion: 800-916-8800 / www.transunion.com
- Under federal law, you are entitled to one free credit report each year from these companies. Report any unauthorized accounts to the applicable credit bureau and to the financial service company holding the fraudulent account. Talk to the credit bureaus about other tools they offer to help stop further fraudulent accounts from being opened.
- You should also report attempted identity theft to the local authorities as well as to the Federal Trade Commission's e-mail box - firstname.lastname@example.org
- The Federal Trade Commission Web site (www.ftc.gov) contains helpful information about phishing as well as steps to take if you think you've been the victim of identity theft.
How T. Rowe Price helps to protect your privacy
- T. Rowe Price's policy is not to send unsolicited e-mails asking for your password or other personal information.
- When a change of address for a retail customer has been requested, our policy is to send a confirming letter to both the old address and the new address.
In addition, you should only communicate account information via T. Rowe Price's secure Web site or when calling T. Rowe Price, or by mail.
At T. Rowe Price, ensuring your privacy is a high priority.
In our continuing effort to implement effective security measures to protect shareholders opening new accounts online, T. Rowe Price has begun using "True Identity", a method of helping to confirm that new accounts being opened online are established by the true customer, and not by an identity thief. This not only helps to make our shareholders safer - it also helps to make verification faster and more secure.
Information on iVerify
T. Rowe Price has added an optional feature to the login process to help protect your account information. iVerify uses a unique image and phrase to notify you that you are logging on to a valid T. Rowe Price website. You can sign up for iVerify from the login page, where you will receive step-by-step instructions. For more information on how iVerify works click here to Learn More.