Department of Labor’s Cybersecurity Guidance for Benefit Plans Signals Increased Scrutiny

May 5, 2021

Reading Time : 5 min

Cybersecurity has become an area of critical importance to plan sponsors and administrators of employee benefit plans, as well as their service providers, as they increasingly rely on the Internet and IT systems to administer those plans. In a February 2021 Government Accountability Office (GAO) Report, the GAO, an independent and non-partisan U.S. legislative agency that monitors and audits government spending and operations, highlighted the significant cybersecurity risks to benefit plans and called on the DOL to clarify responsibilities for fiduciaries and provide guidance related to minimum cybersecurity expectations. Although DOL’s recent guidance is “sub-regulatory guidance,” which does not have the authority of federal agency regulations under the Administrative Procedure Act (APA), the guidance presents DOL’s first official action focused on mitigating the significant cybersecurity risks to participant data and plan assets.

DOL’s three pieces of cybersecurity guidance target different audiences and emphasize the importance of each stakeholder’s role in preventing fraud and loss. The following is a brief summary of each guidance document.

  1. Tips for Hiring a Service Provider: In its first piece of guidance, DOL emphasizes that retirement plan sponsors should prudently select service providers that demonstrate strong cybersecurity practices. The guidance provides the following “tips” to prudently select and monitor service providers:
    • Ask about the service provider’s information security standards, practices and policies and audit results, and compare them to the industry standards adopted by other financial institutions. DOL suggests that plan sponsors look for service providers that follow a recognized standard for information security and use an independent auditor to review and validate cybersecurity.
    • Ask the service provider how it validates its practices, and what levels of security standards it has met and implemented. Plan sponsors should seek contractual provisions that provide the right to review audit results demonstrating compliance with the security standards.
    • Evaluate the service provider’s track record in the industry, including public information regarding information security incidents, other litigation and legal proceedings related to vendor’s services.
    • Ask whether the service provider has experienced past security breaches, what happened and how the service provider responded.
    • Find out if the service provider has any insurance policies that would cover losses caused by cybersecurity and identity theft breaches (including breaches caused by internal threats, such as misconduct by the service provider’s own employees or contractors, and breaches caused by external threats, such as a third party hijacking a plan participant’s account).
    • When contracting with a service provider, DOL advocates that plan sponsors make sure that the contract requires ongoing compliance with cybersecurity and information security standards and does not contain provisions that limit the service provider’s responsibility for data breaches. Additionally, the contract should annually require the service provider to obtain a third-party audit to determine compliance with information security policies and procedures.
  2. Cybersecurity Program Best Practices: In the second piece of guidance, DOL provides a list of best practices for record-keepers and other plan service providers responsible for plan-related IT systems and data. Although the guidance provides “tips” for plan service providers to develop a cybersecurity governance program, the guidance is also relevant for plan sponsors and administrators that maintain IT systems and plan data in-house. This guidance is notable because DOL states “plan fiduciaries have an obligation to ensure the proper mitigation of cyber security risks” and suggests that plan fiduciaries’ duty of prudence entails the evaluation of whether a service provider is properly situated to mitigate cybersecurity risks. The following summarizes DOL’s 12 recommended best practices:
    • Have a formal, well-documented cybersecurity program that identifies and assesses internal and external cybersecurity risks that may threaten the confidentiality, integrity, or availability of stored nonpublic information.
    • Conduct prudent annual risk assessments.
    • Have a reliable annual third-party audit of security controls.
    • Clearly define and assign information security roles and responsibilities.
    • Have strong access control procedures.
    • Ensure that any assets or data stored in a cloud or managed by a third-party service provider are subject to appropriate security reviews and independent security assessments.
    • Conduct periodic cybersecurity awareness training.
    • Implement and manage a secure system development life cycle (SDLC) program.
    • Have an effective business resiliency program addressing business continuity, disaster recovery and incident response.
    • Encrypt sensitive data, stored and in transit.
    • Implement strong technical controls in accordance with best security practices.
    • Appropriately respond to any past cybersecurity incidents.
  3. Participant Security Tips: In its third piece of guidance, DOL offers plan participants and beneficiaries ways to reduce the risk of fraud and loss related to accessing retirement accounts online. The guidance provides the following “tips” to prevent a participant’s risk of loss to their retirement account:
    • Routinely monitor online retirement accounts.
    • Use strong and unique passwords and multi-factor authentication (MFA).
    • Keep personal contact information current and close or delete unused accounts.
    • Beware of unsecured Wi-Fi and phishing attacks.

DOL’s guidance makes clear the protection of participant data and plan assets from cybercriminals is a critical consideration for all benefit plan stakeholders. ERISA establishes minimum standards and requirements intended to protect plan participants and beneficiaries in private sector benefit plans and requires plan fiduciaries to act prudently when administering plans. But ERISA regulations are silent on how plan constituents should comply with these requirements. Prior to issuing its guidance, DOL had not clarified its view as to whether plan administrators were responsible for mitigating cybersecurity risks. The recent literature makes clear that in DOL’s view, retirement plan fiduciaries are obligated to ensure the proper mitigation of cybersecurity risks, and the guidance provides helpful data points for plan record-keepers and service providers to protect plan data.

In light of DOL’s guidance, plan sponsors and administrators that handle data management in-house that have yet to develop a formal cybersecurity program should do so now, and those with cybersecurity programs currently in effect should re-evaluate those programs to ensure they align with DOL’s suggested best practices. Plan sponsors and administrators should also revisit their contractual engagements with service providers to ensure they have adopted a well-documented cybersecurity program that offers adequate protections in the event of a breach. Although the guidance is framed as “tips” and “best practices” and currently has no enforcement mechanism, it signals the DOL’s heightened focus on cybersecurity in light of more frequent attacks and increasingly sophisticated breach techniques. The guidance specifically addresses retirement plans, but fiduciaries of health and welfare plans are subject to the same fiduciary responsibilities under ERISA. Stakeholders should evaluate their cybersecurity practices and policies and implement the DOL’s best practices where possible to ensure their benefit plans do not fall victim to data compromise.

Share This Insight

Previous Entries

Data Dive

October 17, 2024

During the course of any lending transaction, lenders will conduct a due diligence review of the borrower, including reviewing any relevant “know-your-customer” information. In the context of a fund finance transaction, this due diligence is likely to include a review of fund organizational documents, subscription agreements and side letters, if any, from the fund’s investors. Providing this information to lenders is an essential and practical aspect of incurring any fund-level financing, and is often expressly permitted by a fund’s governing documentation. Especially in the context of a subscription credit facility, where investor commitments and the related right to collect capital contributions are the primary source of repayment for the loan, a lender will need to see information that could potentially include sensitive or confidential information about investors.

...

Read More

Data Dive

September 17, 2024

Following the publication of the European Union’s Artificial Intelligence Act (AI Act or Act) on 12 July 2024, there are now a series of steps that various EU bodies need to take towards implementation. One of the first key steps is in relation to the establishment of codes of practice to “contribute to the proper application” of the AI Act.

...

Read More

Data Dive

August 6, 2024

On July 30, 2024, the Senate passed the Kids Online Safety and Privacy Act (S. 2073) via an overwhelmingly bipartisan vote of 91-3 shortly before departing for the August recess.

...

Read More

Data Dive

July 18, 2024

On 12 July 2024, the European Union Artificial Intelligence Act (AI Act or Act) was published in the Official Journal of the European Union (EU), marking the final step in the AI Act’s legislative journey. Its publication triggers the timeline for the entry into force of the myriad obligations under the AI Act, along with the deadlines we set out below. The requirement to ensure a sufficient level of AI literacy of staff dealing with the operation and use of AI systems will, for example, apply to all providers and deployers on 2 February 2025.

...

Read More

Data Dive

July 18, 2024

On June 18, 2024, the United States Securities and Exchange Commission (SEC) announced a settlement with R.R. Donnelley & Sons Company (RRD) for alleged internal control and disclosure failures following a ransomware attack in 2021. Without admitting or denying the SEC’s findings, the business communications and marketing services provider agreed to pay a civil penalty of over $2.1 million to settle charges alleging violations of Section 13(b)(2)(B) of the Securities Exchange Act of 1934 (Exchange Act) and Exchange Act Rule 13a-15(a).1

...

Read More

Data Dive

June 11, 2024

In May, the National Institute of Standards and Technology (NIST) issued updated recommendations for security controls for controlled unclassified information (CUI) that is processed, stored or transmitted by nonfederal organizations using nonfederal systems, (NIST Special Publication 800-171 (SP 800-171), Revision 3). These security requirements are “intended for use by federal agencies in contractual vehicles or other agreements that are established between those agencies and nonfederal organizations.”1 While these new controls are only applicable to nonfederal entities that agree to comply with the new issuance, Revision 3 signals the next phase of expected security for government contractors.

...

Read More

Data Dive

May 31, 2024

On May 21, 2024, the European Union finalized the adoption of the groundbreaking EU Artificial Intelligence Act, a comprehensive and sector-agnostic legislation that extends globally. This 420-page Act aims to regulate the deployment and development of AI systems, categorizing them into high-risk and low-risk, and even banning certain types of AI. The Act emphasizes trust, transparency, and accountability in AI usage, promoting the safe integration of AI technologies. This legislation sets a potential global benchmark for AI regulation, although its complexity may pose interpretative and implementation challenges for stakeholders. We set out the key provisions below.

...

Read More

Data Dive

May 30, 2024

On May 17, 2024, Colorado Governor Jared Polis signed into law S.B. 205, a pioneering piece of legislation aimed at regulating high-risk AI systems. This new law, set to take effect on February 1, 2026, introduces stringent requirements for AI developers and deployers, focusing on risk management and the prevention of algorithmic discrimination. This legislation marks a significant step in state-level AI regulation, potentially setting a precedent similar to the impact of GDPR on privacy laws.

...

Read More

© 2024 Akin Gump Strauss Hauer & Feld LLP. All rights reserved. Attorney advertising. This document is distributed for informational use only; it does not constitute legal advice and should not be used as such. Prior results do not guarantee a similar outcome. Akin is the practicing name of Akin Gump LLP, a New York limited liability partnership authorized and regulated by the Solicitors Regulation Authority under number 267321. A list of the partners is available for inspection at Eighth Floor, Ten Bishops Square, London E1 6EG. For more information about Akin Gump LLP, Akin Gump Strauss Hauer & Feld LLP and other associated entities under which the Akin Gump network operates worldwide, please see our Legal Notices page.