Additional Broadridge resources:
View our Contact Us page for additional information.
Our representatives and specialists are ready with the solutions you need to advance your business.
Want to speak with a sales representative?
Table Heading | |
---|---|
+1 800 353 0103 | North America |
+442075513000 | EMEA |
+65 6438 1144 | APAC |
Your sales rep submission has been received. One of our sales representatives will contact you soon.
Want to speak with a sales representative?
Table Heading | |
---|---|
+1 800 353 0103 | North America |
+442075513000 | EMEA |
+65 6438 1144 | APAC |
Mitigating security risks in a constantly changing environment is something Broadridge takes seriously. Banks, broker-dealers, issuers, mutual funds and institutional investors worldwide trust Broadridge to securely process and distribute the securities data and investor information that drives their businesses and the global marketplace.
To protect the technology infrastructure that stores, processes and transmits our clients’ confidential information, Broadridge has a dedicated and trained Information Security team with the sole purpose of managing Broadridge’s internal and external security efforts including securing our facilities and data centers, educating our associates, and protecting our clients’ confidential information.
Our information security program is designed to meet the needs of our clients who entrust us with their sensitive information. We maintain International Organization for Standardization (“ISO”) 27001 certification for most of our business units and core applications and facilities, and, where applicable, align to other industry standards or frameworks, including Cloud Security Alliance’s Cloud Controls Matrix (“CSA CCM”), Payment Card Industry Data Security Standard (“PCI DSS”), Health Insurance Portability and Accountability Act (“HIPAA”), and HITRUST Common Security Framework (“HITRUST CSF”). We take the following actions, among others, to demonstrate our commitment to maintaining the highest levels of information security, provide for the availability of critical data and systems, maintain regulatory compliance, manage our material risks from cybersecurity threats, and to identify, protect against, detect, respond to, and recover from cybersecurity incidents: