BY ANNE TYLER HALL AND ERIC SCHILLINGER
Cybersecurity has become a daily struggle for businesses. In the last decade, cybersecurity breaches soared, with companies like Capital One having more than 100 million individuals impacted.
The unprecedented technological challenges caused by the global pandemic have exacerbated the cybersecurity vulnerabilities of employers, many of which already struggled with unprotected data issues and weak cybersecurity practices. Even in a post-pandemic business environment, it remains imperative that companies employ best practices for cybersecurity awareness, prevention, and security as a part of their culture.
These cybersecurity practices extend beyond general business transactions and include, importantly, employer-sponsored retirement plans, such as 401(k) and pension plans. As of 2018, the Employee Benefits Security Administration (EBSA), which is the enforcement arm of the Department of Labor (DOL) for benefits-related matters, estimates that there are 34 million participants in private pension plans and 106 million participants in defined contribution plans (e.g., 401(k) plans)—collectively representing estimated aggregate assets of $9.3 trillion.
Because retirement plan participant information is commonly maintained and accessible online, retirement plans are a prime target for cybersecurity criminals. The absence of sufficient cybersecurity protections places plan participants and plan assets at risk from both internal and external cybersecurity threats. Separate from the general business reasons for the provision of adequate protection of benefit plan participants’ money and data, ERISA requires plan fiduciaries (e.g., employers) to take appropriate precautions to mitigate these risks.
On April 14, 2021, the DOL issued a triad of informal guidance (DOL cybersecurity guidance) as follows: s DOL’s Tips for Hiring a Service Provider with Strong Cybersecurity Practices. The DOL proffers best practices focused on plan fiduciaries hiring (and monitoring) third parties to secure and protect participant data.
- DOL’s Cybersecurity Program Best Practices. This guidance focuses on best practices for plan record keepers and other service providers responsible for plan-related IT systems and data.
- Online Security Tips. These recommendations include strategies to plan participants and beneficiaries to avoid losses to their account balance due to online cybersecurity fraud.
- Consider the service provider’s cybersecurity standards, practices, policies, and results; and compare these to standards adopted by other service providers.
- Request validation of the service provider’s cybersecurity practices and the levels of security standards that the provider claimed to have met and implemented.
- Consider the service provider’s industry track record (including prior security incidents and related legal proceedings).
- Evaluate whether the service provider has experienced prior security breaches and how it has responded. Consider the service provider’s cybersecurity insurance liability coverage (including coverage for breaches caused by both internal and external threats).
- Ensure, when contracting with a service provider, that the contract stipulates the provider’s adherence to ongoing cybersecurity and information security standards.
- a formal, well-documented cybersecurity program;
- prudent, annual risk assessments;
- reliable, annual third-party audit of security controls;
- clearly defined and assigned information security roles;
- strong access to control procedures;
- appropriate security reviews and independent security assessments for assets or data stored in the cloud or managed by a third-party service provider;
- periodic cybersecurity awareness training; s a secure system development life cycle (SDLC) program;
- an effective business resiliency program addressing business continuity, disaster recovery, and incident response;
- encryption of sensitive data, stored and in transit; s strong technical controls consistent with best security practices; and
- a paradigm for an appropriate response to any past cybersecurity incidents.
- routine monitoring of online retirement plan account(s);
- use of unique passwords for online accounts; s use of multi-factor authentication;
- maintenance of updated personal contact information;
- closing of unused online accounts;
- avoidance of free wi-fi;
- avoidance of phishing attacks;
- use and maintenance of antivirus software; and s immediate reporting of identity thefts and cybersecurity incidents.
COPYRIGHT 2021 BY THE BUREAU OF NATIONAL AFFAIRS, INC. This column does not necessarily reflect the opinion of The Bureau of National Affairs, Inc. or its owners. Author Information Anne Tyler Hall is the founding attorney of Hall Benefits Law, and her team counsels clients on fiduciary matters, healthcare reform, executive compensation, health and welfare benefits, and retirement plan legal issues. Eric Schillinger is Lead ERISA Counsel at HBL and concentrates his practice in the areas of qualified, health and welfare, and nonqualified employee benefit plans, including pension, defined contribution, deferred compensation, health care, life insurance, disability, fringe, and other employer-provided benefits. Bloomberg Tax Insights articles are written by experienced practitioners, academics, and policy experts discussing developments and current issues in taxation. To contribute, please contact us at TaxInsights@bloombergindustry.com .