Last Updated: June 2015

Online Security

  • We disclose client information ONLY as outlined in our Privacy Policy (PDF) in ways necessary to the conducting business or comply with laws.
  • We never sell client information.
  • We have implemented physical, electronic, and procedural safeguards to prevent unauthorized access to client information.
  • We conduct regular reviews of our computer systems and all security features.
  • We limit employee access to customer information.
  • We train our employees regularly in our security policies to optimize customer information protection and privacy.
  • We conduct regular vendor security due diligence to ensure that our vendors protect customer information in accordance with our security policies and standards.

Online Security Tips

  • Keep your security software updated (antivirus/antispyware software, system updates, and patches).
  • Install spam filtering and blocking software.
  • Use a firewall.
  • Use an encrypted Wi-Fi connection.
  • Make sure websites are encrypted when accessing Personal Information and/or making a transaction. Look for “https://…” in the address bar of the website. The “s” indicates “secured” and means the web page uses encryption.
  • Avoid using your Social Security number as your username whenever possible.
  • Avoid predictable passwords such as your Social Security number, date of birth, pet’s name, etc.
  • Use complex passwords and change them regularly.
  • Use security questions and answers for your passwords that are not easy for others to guess.
  • User multi-factor authentication with your passwords whenever possible.
  • Don’t open emails from unfamiliar sources, and don’t click on strange links in instant messages.
  • Don’t record your online credentials in a location that others can
  • Always log off completely from websites and computers when you are finished using them.
  • Don’t download free software from a source that you cannot verify.
  • Review your online account information regularly.
  • Stay on guard and trust your instincts if something doesn’t seem right.

Information and Tools from Industry Resources

Managed by the Federal Trade Commission, this informative resource is a collaboration by a number of federal agencies to promote online responsibility and safety.

Microsoft Safety & Security Center

Microsoft provides as a resource for safety and security of primarily Microsoft products.

Apple Product Security

Apple provides as a resource for safety and security of primarily Apple products.

Federal Trade Commission: Identity Theft

Get free copies of brochures for understanding identity theft, watch educational videos, and quickly access links and sample letters for filing a complaint.

Request a free credit report, available to all U.S. residents every 12 months from each of the 3 nationwide consumer credit reporting agencies:

Report an Online Security Issue

If you suspect your online security has been compromised, follow these steps to help control the problem.

Identity theft and account fraud

    1. Contact FP as soon as possible at 877-553-7780.
    2. Contact the fraud department at one of the three major credit bureaus to request that a fraud alert be placed on your file.
    3. Close the accounts that you suspect have been compromised and open new ones.
    4. Change your usernames and passwords on all online accounts.
    5. File a police report and obtain a copy to provide to your creditors if asked.
    6. File a report with the Federal Trade Commission (FTC). The FTC will use this information in their investigations to better understand the online security issues facing victims.

Virus or malware on your computer

      1. Check to ensure your personal computer has the most recent security patches and antivirus software.
      2. Run a scan and clean up any malware that is found.

Suspicious email

If you’re concerned that an email you’ve received is fraudulent, or you want to confirm that the email is really from FP, we can help you verify that it is legitimate.

Please send a message to with the following information:

    1. The suspected email, either forwarded to us as part of your message, or included as an attachment
    2. Your full name, email address, and phone number
    3. Your answers (yes or no) to the following questions:
      • Did you click on any links or images within the suspected email?
      • Did you enter or submit any login credentials?