Message Font: Serif | Sans-Serif
No. of Recommendations: 1
It wasn't so much of a "complaint," but I did write the TSP a letter asking for specifics. What exactly constitutes a "compromised" computer? Exactly where and what are the procedures TSP will take to investigate the source of any "compromise?" Is the policy effective if the "compromise" comes from TSP itself? What are the internal controls TSP has taken to ensure it is 1-not the source of "compromise," 2-What actions are being taken to stop "compromises" from spreading from individual accounts to the TSP at large (thereby potentially "compromising" my account) and 3-who do I contact if in fact, the source of the "compromise" is from the TSP and has passed such "compromise" to my computer or effected my account?

Haven't heard back yet, not holding my breath in any case. It seems, though, that they would be liable if they didn't have proper controls in place and my account (or any one else's) was improperly accessed via someone else's through the TSP. But I'm not a hack, so don't know how that might happen.
Print the post  


Live Video Event Monday!
The GP team is hosting a live video event on Monday at 4 p.m. ET. Don't worry if you can't make it — we'll have a replay and a transcript. Click for more!
When Life Gives You Lemons
We all have had hardships and made poor decisions. The important thing is how we respond and grow. Read the story of a Fool who started from nothing, and looks to gain everything.
Contact Us
Contact Customer Service and other Fool departments here.
Work for Fools?
Winner of the Washingtonian great places to work, and Glassdoor #1 Company to Work For 2015! Have access to all of TMF's online and email products for FREE, and be paid for your contributions to TMF! Click the link and start your Fool career.