Image alt tag

Error!

X

There was a problem contacting the server. Please try after sometime.

Sorry, we are unable to process your request.

Error!

X

We're sorry, but the Insights and Intelligence Tool is temporarily unavailable

If this problem persists, or if you need immediate assistance, please contact Customer Service at 1-888-522-2388.

Error!

X

We're sorry, but the Literature Center checkout function is temporarily unavailable.

If this problem persists, or if you need immediate assistance, please contact Customer Service at 1-888-522-2388.

Tracked Funds

You have 0 funds on your mutual fund watch list.

Begin by selecting funds to create a personalized watch list.

(as of 12/05/2015)

Pending Orders

You have 0 items in your cart.

Subscribe and order forms, fact sheets, presentations, and other documents that can help advisers grow their business.

A verification Email Has Been Sent

Close

An email verification email has been sent to .
Follow the instructions to complete the email validation process.

I have not received my verification email

Check your SPAM mailbox and make sure that twelcome@lordabbett.com is allowed to send you mail.

I'm still having trouble

If you're still having trouble verifying your email address. feel free to contact us.

1-888-522-2388
clientservices@lordabbett.com


OK

We're sorry. We found no record of the email address you provided.

Close

Register For a LordAbbett.com Account
Using Your Email Address.

  • Registered Financial Advisors gain access to:
  • Our data mining tool, Insight & Intelligence
  • Best in-class practice management content
  • Educational events, videos and podcasts.
  • The Lord Abbett Review - Subscribe now!

Registered but Having Problems?

If you believe you are registered and are having problems verifying your email address, feel free to contact us.

1-888-522-2388 clientservices@lordabbett.com

Terms & Condition

X

These Terms of Use ("Terms of Use") are made between the undersigned user ("you") and Lord, Abbett & Co. ("we" or "us"). They become effective on the date that you electronically execute these Terms of Use ("Effective Date").

A. You are a successful financial consultant that markets securities, including the Lord Abbett Family of Funds;

B. We have developed the Lord Abbett Intelligence System (the "Intelligence System"), a state of the art information resource that we make available to a limited community of broker/dealers through the Internet at a secure Web site (the "LAIS Site"); and

C. We wish to provide access to the Intelligence System to you as an information tool responsive to the demands of your successful business pursuant to these Terms of Use. Accordingly, you and we, intending to be legally bound, hereby agree as follows:]

1. Overview. · Scope. These Terms of Use (which we may amend from time to time) govern your use of the Intelligence System. · Revisions; Changes. We may amend these Terms of Use at any time by posting amended Terms of Use ("Amended Terms of Use") on the LAIS Site. Any Amended Terms of Use will become effective immediately upon posting. Your use of the Intelligence System after any Amended Terms of Use become effective will be deemed to constitute your acceptance of those Amended Terms of Use.We may modify or discontinue the Intelligence System at any time, temporarily or permanently, with or without notice to you. Purpose of the Intelligence System. The Intelligence System is intended to be an information resource that you may use to contribute to your business research. The Intelligence System is for broker/dealer use only; it is not to be used with the public in oral, written or electronic form. The information on the Intelligence System and LAIS Site is for your information only and is neither the tax, legal or investment advice of Lord Abbett or its third-party sources nor their recommendation to purchase or sell any security.

2. Your Privileges. · Personal Use. Your use of the Intelligence System is a nontransferable privilege granted by us to you and that we may deny, suspend or revoke at any time, with or without cause or notice. · Access to and Use of the Intelligence System. The User ID and password (together, an "Access ID") issued by us to you (as subsequently changed by you from time to time) is for your exclusive access to and use of the Intelligence System. You will: (a) be responsible for the security and use of your Access ID, (b) not disclose your Access ID to anyone and (c) not permit anyone to use your Access ID. Any access or use of the Intelligence System through the use of your Access ID will be deemed to be your actions, for which you will be responsible. · Required Technology. You must provide, at your own cost and expense, the equipment and services necessary to access and use the Intelligence System. At any time, we may change the supporting technology and services necessary to use the Intelligence System. · Availability. We make no guarantee that you will be able to access the Intelligence System at any given time or that your access will be uninterrupted, error-free or free from unauthorized security breaches.

3. Rights in Data. Our use of information collected from you will be in accordance with our Privacy Policy posted on the LAIS Site. Our compliance with our Privacy Policy will survive any termination of these Terms of Use or of your use of the Intelligence System.

4. Your Conduct in the Use of the Intelligence System. You may access, search, view and store a personal copy of the information contained on the LAIS Site for your use as a broker/dealer. Any other use by you of the Intelligence System and the information contained on the LAIS Site these Terms of Use is strictly prohibited. Without limiting the preceding sentence, you will not: · Engage in or permit any reproduction, copying, translation, modification, adaptation, creation of derivative works from, distribution, transmission, transfer, republication, compilation or decompilation, reverse engineering, display, removal or deletion of the Intelligence System, any portion thereof, or any data, content or information provided by us or any of our third-party sources in any form, media or technology now existing or hereafter developed, that is not specifically authorized under these Terms of Use.

· Remove, obscure or alter any notice, disclaimer or other disclosure affixed to or contained within the Intelligence System, including any copyright notice, trademark and other proprietary rights notices and any legal notices regarding the data, content or information provided through the Intelligence System.

· Create a hyperlink to, frame or use framing techniques to enclose any information found anywhere on the LAIS Site without our express prior written consent.

· Impersonate any person, or falsely state or otherwise misrepresent his or her affiliation with any person in connection with any use of the Intelligence System.

· Breach or attempt to breach the security of the Intelligence System or any network, servers, data, or computers or other hardware relating to or used in connection with the Intelligence System; nor (b) use or distribute through the Intelligence System software or other tools or devices designed to interfere with or compromise the privacy, security or use of the Intelligence System by others or the operations or assets of any person.

· Violate any applicable law, including, without limitation, any state federal securities laws. 5. Your Representations and Warranties. You hereby represent and warrant to us, for our benefit, as of the time of these Terms of Use and for so long as you continue to use the Intelligence System, that (a) you are, and will continue to be, in compliance with these Terms of Use and any applicable laws and (b) you are authorized to provide to us the information we collect, as described in our Privacy Policy.

6. Disclaimer of Warranties.

· General Disclaimers.

THE INTELLIGENCE SYSTEM, THE LAIS SITE AND ALL DATA, INFORMATION AND CONTENT ON THE LAIS SITE ARE PROVIDED "AS IS" AND “AS AVAILABLE” AND WITHOUT ANY REPRESENTATIONS OR WARRANTIES OF ANY KIND. WITHOUT LIMITING THE PRECEDING SENTENCE, LORD ABBETT, ITS AFFILIATES, AGENTS, THIRD-PARTY SUPPLIERS AND LICENSORS, AND THEIR RESPECTIVE EMPLOYEES, CONTRACTORS, DIRECTORS, OFFICERS AND SHAREHOLDERS (COLLECTIVELY, THE “LORD ABBETT GROUP”) EXPRESSLY DISCLAIM ALL WARRANTIES, WHETHER EXPRESS, IMPLIED OR STATUTORY, INCLUDING THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE, AND NONINFRINGEMENT. YOU EXPRESSLY AGREE THAT YOUR USE OF THE LAIS SITE, THE INTELLIGENCE SYSTEM, AND THE DATA, INFORMATION AND CONTENT PRESENTED THERE ARE AT YOUR SOLE RISK AND THAT THE LORD ABBETT GROUP WILL NOT BE RESPONSIBLE FOR ANY (A) ERRORS OR INACCURACIES IN THE DATA, CONTENT AND INFORMATION ON THE LAIS SITE AND THE INTELLIGENCE SYSTEM OR (B) ANY TERMINATION, SUSPENSION, INTERRUPTION OF SERVICES, OR DELAYS IN THE OPERATION OF THE LAIS SITE OR THE INTELLIGENCE SYSTEM.

· Disclaimer Regarding Investment Research.

THE INTELLIGENCE SYSTEM INCORPORATES DATA, CONTENT AND INFORMATION FROM VARIOUS SOURCES THAT WE BELIEVE TO BE ACCURATE AND RELIABLE. HOWEVER, THE LORD ABBETT GROUP MAKES NO CLAIMS, REPRESENTATIONS OR WARRANTIES AS TO THE ACCURACY, TIMELINESS, COMPLETENESS OR TRUTHFULNESS OF SUCH DATA, CONTENT AND INFORMATION. YOU EXPRESSLY AGREE THAT YOU ARE RESPONSIBLE FOR INDEPENDENTLY VERIFYING YOUR INVESTMENT RESEARCH PRIOR TO FORMING YOUR INVESTMENT DECISIONS OR RENDERING INVESTMENT ADVICE. THE LORD ABBETT GROUP WILL NOT BE LIABLE FOR ANY INVESTMENT DECISION MADE BY YOU OR ANY OTHER PERSON BASED UPON THE DATA, CONTENT AND INFORMATION PROVIDED THROUGH THE INTELLIGENCE SYSTEM OR ON THE LAIS SITE.

· Survival.

THIS SECTION 6 SHALL SURVIVE ANY TERMINATION OF THESE TERMS OF USE OR YOUR USE OF THE INTELLIGENCE SYSTEM..

7. Limitations on Liability.

NONE OF THE MEMBERS OF THE LORD ABBETT GROUP WILL BE LIABLE TO YOU OR ANY OTHER PERSON FOR ANY DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, PUNITIVE, SPECIAL OR EXEMPLARY DAMAGES (INCLUDING LOSS OF PROFITS, LOSS OF USE, TRANSACTION LOSSES, OPPORTUNITY COSTS, LOSS OF DATA, OR INTERRUPTION OF BUSINESS) RESULTING FROM, ARISING OUT OF OR IN ANY WAY RELATING TO THE INTELLIGENCE SYSTEM, THE LAIS SITE OR YOUR USE THEREOF, EVEN IF THE LORD ABBETT GROUP HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THIS SECTION 7 WILL SURVIVE ANY TERMINATION OF THESE TERMS OF USE OR YOUR USE OF THE INTELLIGENCE SYSTEM.

8. Miscellaneous Provisions.

· Governing Law. This Agreement will governed by and construed in accordance with the laws of the State of New York, without giving effect to applicable conflicts of law principles.

THE UNIFORM COMPUTER INFORMATION TRANSACTIONS ACT OR ANY VERSION THEREOF, ADOPTED BY ANY STATE, IN ANY FORM ("UCITA") WILL NOT APPLY TO THESE TERMS OF USE. TO THE EXTENT THAT UCITA IS APPLICABLE, THE PARTIES HEREBY AGREE TO OPT OUT OF THE APPLICABILITY OF UCITA PURSUANT TO THE OPT-OUT PROVISION(S) CONTAINED THEREIN.

The Intelligence System is not intended to be used by consumers, nor are the consumer protection laws of any jurisdiction intended to apply to the Intelligence System. You agree to initiate and maintain any action, suit or proceeding relating to these Terms of Use or arising out of the use of the Intelligence System exclusively in the courts, state and federal, located in or having jurisdiction over New York County, New York.

YOU HEREBY CONSENT TO THE PERSONAL JURISDICTION AND VENUE OF THE COURTS, STATE AND FEDERAL, LOCATED IN OR HAVING JURISDICTION OVER NEW YORK COUNTY, NEW YORK. YOU AGREE THAT YOU WILL NOT OBJECT TO A PROCEEDING BROUGHT IN YOUR LOCAL JURISDICTION TO ENFORCE AN ORDER OR JUDGMENT OBTAINED IN NEW YORK.

· Relationship of Parties. The parties to these Terms of Use are independent contractors and nothing in these Terms of Use will be construed as creating an employment relationship, joint venture, partnership, agency or fiduciary relationship between the parties.

· Notice. All notices provided under these Terms of Use will be in writing and will be deemed effective: (a) when delivered personally, (b) when received by electronic delivery, (c) one business day after deposit with a commercial overnight carrier specifying next day delivery, with written verification of receipt, or (d) three business days after having been sent by registered or certified mail, return receipt requested. We will only accept notices from you in English and by conventional mail addressed to: General Counsel Lord, Abbett & Co. 90 Hudson Street Jersey City, N.J. 07302-3973 We may give you notice by conventional mail or electronic mail addressed to the last mail or electronic mail address transmitted by you to us.

· Third-Party Beneficiaries. The members of the Lord Abbett Group are third-party beneficiaries of the rights and benefits provided to us under these Terms of Use. You understand and agree that any right or benefit available to us or any member of the Lord Abbett Group hereunder will also be deemed to accrue to the benefit of, and may be exercised directly by, any member of the Lord Abbett Group to the extent applicable.

· Survival. This Section 8 will survive any termination of these Terms of Use or your use of the Intelligence System. The undersigned hereby signs these Terms of Use. By electronically signing and clicking "Accept" below, these Terms of Use will be legally binding on me. To sign these Terms of Use, confirm your full name and enter your User ID and Password (as your electronic signature) in the fields indicated below and click the “I Accept” button.

Reset Your Password

Financial Professionals*

Your password must be a minimum of characters.

Confirmation Message

Your LordAbbett.com password was successully updated. This page will be refreshed after 3 seconds.

OK

 

Practice Management

An SEC official notes that “some practices aren't doing nearly enough to get their cyber house in order.”

This Practice Management article is intended for financial advisors only (registered representatives of broker/dealers or associated persons of Registered Investment Advisors).

 

Advisors and brokers aren't doing enough to protect their information technology systems and the sensitive client information they contain, and many firms have been slow to respond to the challenge, according to SEC officials.

In a live stream of the annual SEC Speaks conference, commission leaders noted that cybersecurity has become a priority across the commission, and is a particular focus for the Division of Enforcement and the exam unit.

The SEC is in the midst of the second phase of its cybersecurity initiative, whereby it is conducting a series of exams evaluating how advisors and brokers are handling information security, controlling access to sensitive material, and planning for how to detect and respond to an attack, among other issues.

Kevin Goodman, associate director of broker/dealer examinations at the Office of Compliance Inspections and Examinations (OCIE), noted that those security reviews are ongoing, but the early results have made it clear that some practices aren't doing nearly enough to get their cyber house in order.

"[N]ot surprisingly, there are some indications of firms that aren't doing some of the important yet fairly simple things that they should be doing," Goodman said. "We've seen access rights that really aren't being managed well. We've seen firms dealing with third parties and not really assessing at all the level of cyber awareness and preparedness at those third-party firms."

“Testing Approach”
Goodman suggested that the commission might publish a risk alert after it digests the findings from the second phase of its cybersecurity initiative, which he described as "a testing approach" to follow up on the first phase, a fact-finding endeavor he called "a correspondence effort."

"We learned a lot from phase one, and we've learned enough to know that there's a meaningful role our non-expert cyber examiners can play in assessing cyber preparedness," Goodman said.

"So we're going into firms and actually testing things like how they manage access controls," he explained. "Are they designed to limit access reasonably to the functions that various people play? Do they keep tabs on those access rights as people's roles change? Once someone has an access right or misappropriates an access right and gets into the system, how does the system's architecture work? Can people move around anywhere they want within that system's architecture, or is it designed so that if someone gets in either properly or improperly they're walled off to some reasonable area?"

OCIE examiners also are looking at the credentialing systems firms have in place that grant users access to their networks, in particular whether they are using multi-factor authentication.

"Hopefully, you need a token or something other than just a password," Goodman said. "Well, we're trying to see is that really used by firms consistently and across firms."

Of course, OCIE's role essentially is to serve as the eyes and ears for the commission, and Goodman was quick to point out that his division does not make policy or handle enforcement actions. But cybersecurity is very much on the radar of the unit that does bring cases against bad actors in the industry.

Sanction Liabilities
Stephanie Avakian, the deputy director of the SEC's Division of Enforcement, explained that her team sees three general areas in which cybersecurity issues could result in a firm getting hit with a sanction.

In the first instance, the SEC might pursue action against a firm for failing to take appropriate steps to safeguard clients' information, which could entail a violation of Regulation S-P or Regulation S-ID.

A more flagrant category of violations would entail the use of stolen, nonpublic information to profit from trading or market manipulation ahead of some event like a corporate earnings announcement or a merger.

In the third category, the SEC's enforcement unit is looking at how registered companies respond to a cybersecurity incident, and would consider bringing an action if a firm failed to notify customers affected by a data breach or did not cooperate with law-enforcement authorities.

Avakian said that the SEC has brought actions against market participants for the first two categories of violations, but not yet the third, since the enforcement division is offering firms some latitude in how they respond to a cyber-attack.

"A company that's been the victim of an intrusion is just that—a victim. And the first priority is to assess the situation, address the intrusion, minimize the damage," she said.

"In the case of public companies, we are not looking to second-guess good-faith decisions," she added. "As I noted, we've not yet brought a disclosure case, and there've been a number of cyber incidents at public companies. But can I envision circumstances where we would bring an action? Sure. But it would have to be a significant disclosure failure to warrant that."

Avakian stressed that it is important for victims of a cyber-attack to promptly engage with the relevant law-enforcement organization, whether it be the FBI, the Department of Homeland Security, or local authorities.

"Whether a company self-reports to law enforcement is a critical factor," she said. "We will give significant credit to companies that self-report, so while companies might be reluctant to report a cyber-incident because of the potential for an investigation, it would be a significant disclosure failure that leads to an action."

Enforcement Actions
The SEC has brought cyber-related enforcement actions in the other two areas of concern that Avakian flagged, including a case the commission announced in August against more than 30 defendants charged with trading on hacked corporate information and netting more than $100 million in illegal profits.

In the RIA sphere, the commission reached a settlement in September with RT Jones, a St. Louis-based advisor, in a case involving a data breach that compromised the personal information of some 100,000 individuals.

"In that case, the firm stored sensitive information of its clients and others on its third-party hosted Web server, and the Web server was attacked in 2013 by an unknown hacker who gained access to copyrights, all the data on the server, leaving all the individuals and clients vulnerable to theft," Avakian said. "RT Jones violated Regulation S-P because it failed entirely to adopt written policies and procedures designed to safeguard customer information, which is what Regulation S-P requires."

To be sure, that was only one case, and the SEC has been moving cautiously in bringing enforcement actions in the cybersecurity arena. But Avakian, offering a general assessment, suggested that advisors and other registrants need to take a more rigorous approach in shoring up their systems to protect sensitive client information.

"We see a spectrum of cyber-awareness and attention," she said, "and some firms essentially have nothing, so this is something we have to look at."

—by Kenneth Corbin

Kenneth Corbin is a Financial Planning contributing writer in Washington.

sourcemedia_group

RELATED CONTENT

Please confirm your literature shipping address

Please review the address information below and make any necessary changes.

All literature orders will be shipped to the address that you enter below. This information can be edited at any time.

Current Literature Shipping Address

* Required field