How CFG Protects Your Privacy
We recognize the trust you place in us when you disclose your personal information. Ensuring that your personal information is secure is very important to us.
We have safeguards in place from technical to physical safeguards, along with employee training and policies and procedures in place to maintain the security of your private information.
Physical Security
Physical security is the primary security layer on which all the other software and hardware security is based. A secure computing and networking environment is impossible to achieve unless appropriate physical security controls are put in place. Access to our offices is restricted and we use key cards to limit access.
Technological Security
Our technological systems are monitored 24 hours a day, every day of the year, for signs of tampering or unauthorized access or activity. We use encryption, virtual private networks, penetration and vulnerability testing, and the latest firewall and antivirus technology. Email monitoring is also utilized for regulatory and compliance purposes in order to protect our clients. We also strictly limit those that have access to our systems and offices.
We employ information technology professionals to monitor, research and develop enhancements to keep our systems, networks and data secure.
Risk Management
We employ a risk-based control framework to protect our systems and data according to the sensitivity and need for appropriate access. IT risk assessments are performed on a regular basis and any outstanding remediation items are actively monitored.
Incident Response
We have employed our IT professionals to utilize specialized programs to prevent and detect intrusion, including an extensive incident response program. Our incident response team ensures appropriate technology and resources will be dedicated to the monitoring and prevention of cyber security threats.
Employee Training
Our policies and procedures express the importance of maintaining confidentiality. All employees are provided with comprehensive information at time of hire and on a regular basis about our privacy policies and procedures. In addition, all employees participate in ongoing training on handling client information and security including cybersecurity awareness training.
Business Continuity
Our business continuity plan focuses on preparing for potential unpredictable disruptions due to unforeseen circumstances such as natural disasters. Our goal is to ensure that critical operations continue and data remains secure during these types of emergencies. Our executive management team oversees our operations and emergency functions which includes data retention, backup procedures and off-site storage of information.
Industrywide Coordination
We coordinate with industrywide organizations and law enforcement agencies that are devoted to sharing information about physical and cybersecurity.