"PBA Blue Guardian: Dedicated to Supporting Law Enforcement"

ACCIDENT INSURANCE
Accident Insurance pays benefits for injuries and expenses associated with a covered accident.
CRITICAL ILLNESS INSURANCE
Critical Illness Insurance pays a lump-sum benefit following the diagnosis of a critical illness, such as a heart attack, cancer, or stroke.
HOSPITAL INDEMNITY INSURANCE
Hospital Indemnity Insurance pays you directly for covered accidents or sicknesses associated with a hospitalization.
Group Whole Life
The coverage offers fully guaranteed premiums payable to age 95, death benefits and cash value that can be used along the way.
Group Term to 100
You are considering level premium, group term life insurance to age 100. The death benefit is guaranteed not to change for the first 5 certificate years, and thereafter is guaranteed not to be less than the minimum death benefit specified in the certificate.
Disability Income Insurance
Disability Income Insurance replaces part of your income if you can't work due to illness or injury, helping you cover essential expenses..
Previous slide
Next slide

Contact us

Wellfleet Policy Disclosure

  • Accident InsuranceCritical Illness Insurance, and Hospital Indemnity Insurance are limited benefit policies. They are not health insurance and do not meet the minimum essential coverage requirements under the Affordable Care Act (ACA).

  • This document is intended to highlight some of the features of Wellfleet coverage but is not an insurance contract.

  • Wellfleet Workplace Benefits provide limited coverage and are not a substitute for ACA-mandated healthcare coverage. As with most supplemental offerings, benefits may vary by state, and some products may not be available in all states.

  • Rates: Premium rates are subject to change, and Wellfleet reserves the right to adjust these rates with proper notice, as detailed in the policy and proposal.

  • Company Information: Wellfleet is the marketing name used for the insurance and administrative operations of Wellfleet Insurance Company, Wellfleet New York Insurance Company, and Wellfleet Group, LLC. All insurance products are managed or administered by Wellfleet Group, LLC. Availability of products depends on business or regulatory approval and may vary by state.


Allstate Policy Disclosure

  • Group Whole Life Insurance benefits are provided under form GWLP or state variations.

  • Rider Benefits are offered under the following forms or state variations:

    • Accelerated Death Benefit for Terminal Illness or Condition (GWPTI)
    • Children’s Term (GWPCT)
    • Accelerated Death Benefit for Long-Term Care with Restoration of Benefits and Extension of Benefits (GWCLTCRE, GWCLTCRE1)
  • This is a brief overview of the benefits available under the Group Voluntary Policy underwritten by American Heritage Life Insurance CompanyAllstate Benefits is the marketing name for American Heritage Life Insurance Company (Home Office: Jacksonville, FL), a subsidiary of The Allstate Corporation.

  • Insurance Details: Exclusions, restrictions, and other provisions are included in the certificates issued. If the employee opts for electronic delivery, the policy summary and accompanying notices will be provided electronically via www.allstatebenefits.com/mybenefits.

  • Use Restrictions: This document is for use with producers, brokers, or for employer presentations. It is not intended for consumer sales and should not be disseminated to the public.

Security Information

This website is accessed over the public Internet, and your connection to it is fully encrypted and secure. We have implemented a wide range of measures to ensure the security of the data entrusted to us by customers.

Infrastructure

  • Redundant and fault-tolerant servers
  • Multiple data centers
  • Battery and diesel generator backup power
  • Multiple network connections
  • Fire suppression systems

Technology

  • Secure data encryption
  • Intrusion prevention systems
  • Firewalls
  • Data backups
  • Server hardening
  • Routine security updates
  • Vulnerability and antivirus scanning
  • Penetration testing
  • Email encryption

Secure Facilities

  • Biometric locks
  • On-site security
  • Video monitoring

Security-Aware Company Culture

  • Security and privacy training
  • Individual acknowledgment of policies
  • Frequent password changes

Business Processes

  • Code reviews
  • Thorough testing and release planning
  • “Need-to-know” access policies
  • Secure data disposal practices

Internal Controls
We have controls in place to ensure that sensitive data is protected and to minimize the risk of compromise due to errors, accidents, natural disasters, or malicious actions.

While our security measures are extensive, you should always verify that you are accessing the website through a secure connection and avoid transmitting files over an unsecured network.

HTTPS

HTTPS (Hypertext Transfer Protocol Secure) is the method your web browser uses to connect securely to the website. SSL (Secure Sockets Layer) provides server authentication and data integrity through a digital certificate issued by a trusted authority. This digital certificate verifies the connection between the server’s public key and its identity, ensuring that you are not connecting to an impostor server.

Communication via HTTPS is secured with advanced encryption, preventing tampering or eavesdropping. Depending on your web browser, you may be able to request a security report to assess the strength of your connection.

You can confirm that you’re on a secure server by checking the URL. If it begins with https:// instead of http://, the connection is secure. Your browser will alert you if there is a problem with the website’s security certificate, in which case you should avoid logging in to ensure your connection is secure.

Infrastructure

The servers that host this website are located in separate data centers in the United States. To reduce the risk of disruption from a catastrophic event, these data centers are located hundreds of miles apart, connected to different network providers, and powered by separate grids. If necessary, service can be transferred between data centers within minutes.

Each data center employs extensive security measures, including:

  • Man traps and biometric locks (two-factor authentication)
  • 24-hour on-site security with escorted access
  • Security cameras with digital recording and storage
  • Sign-in/sign-out logs for all visitors
  • Locked server cabinets

The facilities also offer continuous on-site support for uninterrupted operation:

  • 24-hour remote support
  • Battery backups
  • Diesel generators
  • Fire suppression systems

Some information sent by the website may be delivered via a Content Delivery Network (CDN), which distributes assets like images, videos, and scripts through local servers near your internet provider. Personal information, however, is never sent over the CDN for security reasons.

Backups

In addition to real-time data replication between the primary and secondary data centers, customer information is protected by regular backups. Dedicated archive servers at each facility store backups for all customer databases. These backups are automatically copied between data centers. We frequently test backups to ensure they are valid.

Backup retention includes:

  • Incremental backups every few minutes for two weeks
  • Full backups every week for two months
  • At least one full backup each month for one year

All backups are compressed and encrypted using the Advanced Encryption Standard (AES), which is recognized as one of the most secure encryption methods and is used by the U.S. and Canadian governments.

Technical Safeguards

We have implemented several technical safeguards to ensure network and host security, as well as to manage server vulnerability. These include:

  • DMZ (Demilitarized Zone): Houses servers that interact with the Internet.
  • Firewalls: Dedicated appliances that control the flow of information to and from the DMZ.
  • Defense-in-depth: A layered security approach to prevent direct attacks on critical systems.
  • Intrusion Detection and Prevention Systems (IDPS): Detect attacks against the network.
  • Server Hardening: Disabling unnecessary services and restricting server communications.
  • Vulnerability Management: Regularly reviewing, testing, and deploying security patches.
  • Antivirus and Antispyware Scanning: Applied to both servers and employee workstations.

Monthly vulnerability scans are performed to validate these security measures.

Secure Coding Practices

Our system security also depends on managing the Software Development Life Cycle (SDLC) effectively. Each phase of the SDLC includes security tasks to ensure that security is integrated throughout the development process. The SDLC requires that:

  • Security impact is considered for each change.
  • Security patches and configuration changes are tested thoroughly.
  • Production and test environments are separate and have adequate access controls.
  • Responsibilities for testing and production are clearly separated.
  • Production data is not used for testing or development.
  • User inputs are validated to prevent vulnerabilities.
  • Errors are handled appropriately.
  • Role-based access controls are consistently enforced.
  • Communications are secure.
  • Cryptography is applied to protect sensitive data where appropriate.
  • Code changes are reviewed by knowledgeable personnel.
  • Automated tools are regularly used to detect vulnerabilities.

Privacy Policy

The use of this website is subject to the Terms of Use Agreement, which identifies the Sponsor. The Sponsor is firmly committed to protecting your privacy when you use this website. We understand the importance of how your information is used and shared, and we know this is something you care about deeply. Thank you for trusting us to safeguard your personal information, which we do with the utmost care. This Privacy Policy outlines the information we collect and how it will be used. By accessing this website, you agree to the practices described in this Privacy Policy.

For more details on how your information is securely protected on this website, please refer to the Security Information section.

Types and Uses of Personal Information

This website must collect personal information to facilitate benefit enrollment. The personal information collected may include:

  • Your name, Social Security Number, date of birth, gender, mailing address, phone number, and email address.
  • Information about dependents and family members who may be insured or listed as beneficiaries.
  • Employment details, work history, and salary information.
  • Medical information, or Personal Health Information (“PHI”), disclosed during the enrollment or application process.

Additional information may be collected automatically during your use of the website. This general information includes:

  • Your Internet domain.
  • Your IP address.
  • The pages you access on the website.
  • The time and date of access.

Both personal and automatically collected information are kept strictly confidential by the Sponsor. This information is only used for internal purposes, such as providing requested services, improving marketing and promotional efforts, analyzing website usage, enhancing website content and offerings, and customizing the site’s layout. Except as disclosed in this Privacy Policy, the Sponsor will not sell, rent, lend, or otherwise disclose any personal information to third parties. However, your personal information may be shared with the Sponsor’s affiliates, agents, or contractors when providing services.

HIPAA Information

While using this website, you may share information classified as Protected Health Information (“PHI”) under the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”). Please refer to the HIPAA Notice for details on how your PHI may be used and disclosed.

User Profile

Your User ID and Password (Personal Identification Number or PIN) provide access to this site and are associated with your user profile. This profile may include preferences such as language, email format, and areas of interest.

Cookies

Cookies are pieces of data transferred to your hard drive for record-keeping purposes. This website uses cookies to track your online session, allowing the server to maintain information as you navigate from page to page. Most internet browsers let you erase cookies, block all cookies, or receive a warning before a cookie is stored. Please note that blocking cookies may prevent the website from functioning properly.

Disclosures Required by Law

Under certain circumstances, the Sponsor may be required to disclose information to federal or state authorities. The Sponsor may also disclose any information about you to law enforcement or government officials that we, at our sole discretion, believe is necessary or appropriate. By accepting this Privacy Policy, you authorize us to do so.

External Links

This website may contain links to other websites. We encourage all our partners, contributors, and third parties to adopt privacy policies that respect our users’ privacy. However, the Sponsor is not responsible for the privacy practices or content of such websites. Once you disclose information to other parties, even if linked from this website, different rules may apply to the use and disclosure of your personal information. The Sponsor does not control the privacy policies of third parties, and you will be subject to their policies when interacting with their websites.

Amendments and Updates

The Sponsor may review its privacy practices periodically, and these practices may be subject to change. The Sponsor reserves the right to modify this Privacy Policy at any time by posting the revisions on this website. However, this Privacy Policy is not intended to, and does not, create any contractual or legal rights for any party.

Business Transfers

In the course of business, the Sponsor or its assets may be acquired. In such transactions, customer information will be considered one of the transferred assets.

Terms of Use Agreement

The website provides access for enrolling in benefits offered by your employer or group. It also keeps track of personal information required for benefit enrollment. This Terms of Use Agreement (the “Agreement”) consists of two key parts:

  1. Consent to Enroll Electronically
    Your consent to use electronic records and signatures for benefit enrollment purposes.

  2. Terms and Conditions
    A legal notice outlining the terms of use and limitations of the site sponsor’s liability.

Please read the Agreement carefully before using the website.

The website is owned by Abby’s Consulting Services LLC, a New Jersey-based company, and the enrollment platform is operated by Innovative Enrollment Solutions LLC, a Rhode Island corporation (herein referred to as the “Sponsor”). By using the website, the software associated with it, services, electronic documentation, media, printed materials, and related content (collectively the “Product”), you accept the terms of this Agreement. If you do not agree to these terms, you may not access or use the Product. Your continued use of the Product indicates that you have read, understood, and agree to the terms in this Agreement. This Agreement represents the entire understanding between you and the Sponsor and supersedes any prior proposals, representations, or agreements.

Consent to Enroll Electronically

This is an electronic enrollment process for personal insurance coverage that uses electronic records, transactions, and signatures. By completing this process, you agree to the terms and conditions of the insurance policies you are enrolling in and understand that your completion of this process serves as your electronic signature.

By using your user ID and password (or Personal Identification Number), you consent to conducting this transaction electronically. Your electronic signature is legally binding and enforceable as if you had signed a paper document.

After enrollment, the companies administering your coverage may deliver your insurance policies or certificates by mail, email, or via the internet.

The company may offer access to certain electronic records of your enrollment through the internet, but this is not guaranteed.

Terms and Conditions

By using the Product for insurance enrollment, you agree to the following Terms and Conditions (the “Terms”). Please read them carefully. If these Terms are not acceptable, you do not have permission to use this website and must exit immediately. The Sponsor reserves the right to update these Terms, which you will be bound by, and will notify you of any changes.

Disclaimer

To the fullest extent permitted by law, the Product is provided “as is” without warranties of any kind, either express or implied. The Sponsor, its officers, directors, employees, agents (collectively “Representatives”), and suppliers disclaim all warranties, including but not limited to implied warranties of merchantability and fitness for a particular purpose.

Neither the Sponsor nor its Representatives or suppliers guarantee that the Product will be uninterrupted, error-free, or free of defects. They also disclaim responsibility for correcting defects or covering the cost of such corrections.

The Sponsor is not responsible for websites linked to the Product. The inclusion of any link does not imply approval or endorsement by the Sponsor or its Representatives.

Limitation of Liability

Under no circumstances shall the Sponsor, its Representatives, or suppliers be liable for any direct, incidental, consequential, indirect, or punitive damages arising from the use or inability to use the Product, even if advised of the possibility of such damages.

Trademarks and Copyrights

Unless otherwise stated, all trademarks, trade names, logos, icons, service marks, and images are proprietary to the Sponsor, its Representatives, or suppliers. Nothing in the Product grants any license or right to use these without the written permission of the applicable party. Unauthorized use may violate copyright, trademark, privacy, publicity, and communication regulations.

Software Licenses

You acknowledge that any software made available through the Product may include technology subject to export control laws and regulations of the United States and other jurisdictions. You agree not to transfer or export such software in violation of these laws. The Sponsor, its Representatives, and suppliers do not authorize the downloading or export of any software or technical data from the Product to any jurisdiction prohibited by export control laws.