It wasn't so much of a "complaint," but I did write the TSP a letter asking for specifics. What exactly constitutes a "compromised" computer? Exactly where and what are the procedures TSP will take to investigate the source of any "compromise?" Is the policy effective if the "compromise" comes from TSP itself? What are the internal controls TSP has taken to ensure it is 1-not the source of "compromise," 2-What actions are being taken to stop "compromises" from spreading from individual accounts to the TSP at large (thereby potentially "compromising" my account) and 3-who do I contact if in fact, the source of the "compromise" is from the TSP and has passed such "compromise" to my computer or effected my account? Haven't heard back yet, not holding my breath in any case. It seems, though, that they would be liable if they didn't have proper controls in place and my account (or any one else's) was improperly accessed via someone else's through the TSP. But I'm not a hack, so don't know how that might happen.
Best Of |
Favorites & Replies |
Start a New Board |
My Fool |
BATS data provided in real-time. NYSE, NASDAQ and NYSEMKT data delayed 15 minutes.
Real-Time prices provided by BATS. Market data provided by Interactive Data.
Company fundamental data provided by Morningstar. Earnings Estimates, Analyst Ra