Data Security

Overview

We’re relentlessly focused on data security so you don’t have to be.

We work with the most sensitive information, every day.

Thousands of companies and individuals entrust us with information that helps them reach their financial and business goals. Protecting their information and retaining their trust are at the heart of our business—and it’s a responsibility we take very seriously.

When you choose FuturePlan, you gain the strength and security of a National organization including: data protection protocols, and backend technologies, the most advanced in the our industry. We go above and beyond what ERISA requires to ensure we take care of the people we serve.

A Security Culture

Secure digital habits and sensitivity to every single piece of information we handle is seamlessly ingrained in our workplace culture.

Our associates go through regular security screenings, attend annual security trainings, are periodically tested throughout the year, and receive frequent briefings on the latest security risks.

We limit and continually audit access to sensitive information on a need-to-know basis, backed up by multiple levels of required logins and management review.

We treat personal client information with the same vigor and care as the intellectual property we use to run our business.

Investment in Security

Security is a cost of doing business and part of our core mission, because the trust of our partners, clients, and stakeholders is paramount.

We invest heavily both in best-in-class technologies and in our people.

Investment in these two areas works in tandem to make our systems and your data safe and secure.

The depth, breadth and multi-layer resiliency of our in-house cybersecurity and IT systems is truly unique to the third-party administrator (TPA) industry.

  • Best-in-class security tools like Endpoint Detection and Response (EDR) and Intrusion Prevention Systems (IPS)
  • We limit and continually audit access to sensitive information on a need-to-know basis, backed up by multiple levels of required logins and management review.
  • We treat personal client information with the same vigor and care as the intellectual property we use to run our business.
  • We invest heavily both in best-in-class technologies and in our people.
  • Investment in these two areas works in tandem to make our systems and your data safe and secure.
  • System activity monitoring