1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tresset [83]
4 years ago
6

Su

Computers and Technology
1 answer:
Luba_88 [7]4 years ago
8 0

As a consumer, you want the professionals you work with to treat you fairly and honestly. Unfortunately, that's not always what happens. Even ethically-minded professionals face demands on their business lives that often don't allow them to focus enough attention on ethical issues.


When dealing with a financial professional, it's important for you to hold the professional to a high ethical standard. In an attempt to distinguish itself and its professionals, the Certified Financial Planner Board of Standards has established a code of ethics for certified planners to follow. Because many companies that provide financial services, including Ameriprise (NYSE:AMP) and Principal Financial (NYSE:PFG), employ financial planners certified by the CFP Board, knowing the rules that govern them can give you valuable information about what to expect. In addition, even if you work with other financial professionals, you can apply these rules to decide what standards you want your professional to follow.


Code of ethics

The CFP Board includes seven basic principles in its code of ethics. These principles define your rights and the way you should expect a financial professional to treat you. In the view of the CFP Board:


You have a right to a planner with integrity, one who earns your trust and treats you honestly.

A planner's advice should be objective and focused solely on your needs.

Your planner should be competent and well-educated about the financial planning profession, with a continuing commitment to stay informed about new developments in the financial industry.

You should be treated fairly, and your planner should tell you clearly how your professional relationship will work, how the planner will be compensated, and any potential conflicts of interest that may exist.

Your planner should keep any personal information you provide confidential.

The planner you work with should have any required licenses or credentials necessary to do the work you ask the planner to do.

Finally, planners should be diligent in performing any work they agree to do, not only in developing a financial plan for you, but also in helping you to implement it.


Financial professionals who seek the CFP Board's certifications are bound by this code of ethics. That's why attorneys and other advisors often recommend that clients look for board-certified financial planners.


Applying ethical principles

Although broad ethical principles give clients some degree of comfort, the application of those principles to specific situations can be somewhat vague. In order to clarify the application of its code of ethics, the CFP Board has included a set of rules more specifically discussing common issues that arise during financial planning.


You might be interested in
~ I already know this ~ who was the bits victim in five nights at freddys 4 <br> ___10 points___
Andreas93 [3]

Answer:

i dont know anything about them only that the bear is the ducks son and the duck is the fox mom.

Explanation:

6 0
3 years ago
Read 2 more answers
For each policy statement, select the best control to ensure Ken 7 Windows Limited fulfills the stated requirements and also pro
elena-14-01-66 [18.8K]

Answer:

1. Option (a) is the correct answer. "Place a firewall between the Internet  and your Web server".

2.  Option (e) is the correct answer. "Require encryption for all traffic flowing into and out from the Ken 7 Windows environment".

3. Option (d) is the correct answer. "Implement Kerberos authentication for all internal servers".

4. The correct answer is option (g) "Require all personnel attend a lunch and learn session on updated network security policies".

5. Option (c) is the correct answer. "Enforce password complexity".

Explanation:

1. Users who tried to use ken 7 network resources for social media access will not be enable to do so.

2. Encryption for inflow and outflow of traffic from Ken 7 windows environment will monitor any personal devices which is connected to Ken 7 windows network.

3. The implementation of Kerberos authentication will deny anonymous users access to protected resources in Ken 7 infrastructure.

4.All personnel will be taught the network policies  to avoid sending report to unsecured printers.

5.  The more complex passwords are, the more secured the server will be. A complex password should be enforce for network security.

8 0
3 years ago
When pasting a circle drawn by the presentation software drawing tool into a spreadsheet, that circle will go into the selected
ivann1987 [24]
The answer is ............................ False
6 0
3 years ago
Read 2 more answers
Que se trata el RUC<br>​
mariarad [96]
No se senor i no sure
7 0
3 years ago
Intellectual property rights are exclusive rights that help protect both the created and the creation. IPR offers exclusively wh
dedylja [7]
IPR offers ownership of the intellectual property. The owner of the property has the right to a monetary gain from those who wish to use it.
8 0
3 years ago
Read 2 more answers
Other questions:
  • You use_____ to view an XPS file
    10·1 answer
  • How do computers perform complicated tasks built from simple instructions?
    14·1 answer
  • A(n) ______ system is a set of programs that coordinates all the activities among computer or mobile device hardware. a. managem
    10·1 answer
  • A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or
    8·1 answer
  • Why is it so important to adhere to principles that have been put forth by reputable organizations to ensure that you are mainta
    10·1 answer
  • 1
    7·1 answer
  • _______________ is a computer networking protocol used by hosts to retrieve IP address assignments.
    11·1 answer
  • Programming in https<br>​
    5·1 answer
  • How do you enter the decimal 73 into the computer?
    11·1 answer
  • Given an array of integers a, your task is to calculate the digits that occur the most number of times in the array. Return the
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!