Broker Check

Online Tools

Online tools help you know where you stand – from wherever you’re standing. Instant insight and control at your fingertips.

Client Access

Stay up-to-date on your financial accounts, review your statements and tax-reporting documents, track your asset allocation, view your fund selections, see how funds are performing, and access market information. Client Access also offers Bill Pay and the ability to transfer funds between your accounts.

Mobile Check Deposit

Safely and conveniently deposit checks into your accounts using the camera on your smartphone or tablet.

Vault

Upload, store and organize digital copies of vital documents, and collaborate with us by viewing documents and comment back and forth. 

eSignature

Review, sign and return important financial documents to our office quickly and securely without having to leave home!

To begin the process of electronically signing documents, you'll need access to your email and to text-enabled messaging on your mobile phone. (Note: Text and data charges may apply depending on your carrier and plan.)

Ask your advisor support representative or view this guide to help walk you through the process.


Security at Raymond James

Working with a financial advisor who knows you well allows additional capabilities in personally identifying you when requests are made. This is why we often require phone conversations and additional security procedures when you make certain requests. We also receive alerts when there is unusual account activity detected by the Raymond James cybersecurity team, and follow protocols when suspicious activity is identified.

The first and most basic way Raymond James protects your personal information is through physical security. The Raymond James headquarters in St. Petersburg, Florida has security guards on-site 24 hours a day, video surveillance throughout the campus and employee ID badges are required to enter and at all times within the building.

Next, Raymond James protects your personal information from cyber-attacks through a number of highly sophisticated systems, including but not limited to:

  • A Cyber Threat Center and dedicated Intel Analysts that monitor technology systems 24/7, 365 days a year.
  • Limited and monitored access to systems. This includes precautions such as multi-step login requirements, constantly changing pass-codes, independent tech system audits, rigorous vendor approval processes and access strictly limited to need.
  • Remote data storage in a low-risk geographic location.

Learn more about how Raymond James protects your privacy.