
Trump Administration Executive Order (EO) Tracker
On April 14, the Department of Labor’s Employee Benefits Security Administration (EBSA) issued its first cybersecurity-focused guidance related to benefit plans regulated by Employee Retirement Income Security Act (ERISA). Such plans typically involve the collection and use of a wealth of sensitive and detailed personal information regarding plan participants. The cybersecurity guidance emphasizes that plan sponsors and fiduciaries, and their service providers, are expected to take steps to mitigate cybersecurity risks under their ERISA fiduciary obligations.
As a practical matter, impacted companies will want to review and confirm that their organizations’ actions align with the guidance, particularly with respect to how they oversee the third parties hired to administer such plans. And while much of the content of the new cybersecurity guidance will be familiar to those who have worked with plans covered by the Health Insurance Portability and Accountability Act (HIPAA), there are some differences. For example, EBSA references explicitly the use of additional specific elements such as secure system development and multi-factor authentication.
EBSA’s guidance comes in the form of three related documents. The first document is aimed at plan service providers—those responsible for plan-related IT systems and data—and is also instructive for those who hire them. The second and third documents are shorter and provide guidance to plan sponsors on conducting due diligence when hiring service providers and to employees seeking to protect their benefit accounts, respectively.
The most substantial guidance document, Cybersecurity Program Best Practices, sets forth suggested cybersecurity practices for those responsible for plan-related IT systems and data. The document notes that plan fiduciaries should consider service providers’ alignment with the following 12 “best practices” when making hiring decisions:
Many of these practices will be familiar to those that support certain types of regulated plans, such as health plans governed by HIPAA and its implementing regulations, or have designed their cybersecurity programs and controls to align with other prescriptive cybersecurity laws, regulations, and frameworks. For example, #10 calls for sensitive data to be encrypted at rest and in transit, which is similar to HIPAA’s encryption requirements as well as the New York Department of Financial Services (NYDFS) Cybersecurity Regulations, and #2 calls for regular risk assessments akin to similar requirements under HIPAA and NYDFS regulations. EBSA’s guidance in some cases includes a level of specificity beyond HIPAA and certain other cybersecurity laws/regulations, however, such as in #5 which recommends multifactor authentication be used “wherever possible” (whereas HIPAA merely requires regulated entities to evaluate appropriate authentication mechanisms) and review of access privileges occur at least every three months (whereas HIPAA requires periodic access reviews, without specifying frequency).
Other noteworthy aspects of EBSA’s guidance, as compared to other cybersecurity laws and regulations such as HIPAA, include the following:
The second document, Tips for Hiring a Service Provider with Strong Cybersecurity Practices, directs plan sponsors to conduct due diligence when selecting service providers. According to EBSA’s guidance, fiduciaries should be prudent in selecting plan service providers, evaluating their cybersecurity practices and track records. Fiduciaries should also ensure that their contracts permit them to adequately monitor service providers’ compliance with cybersecurity standards.
The third and final document, Online Security Tips, provides guidance to help employees secure their benefit accounts. The tips include choosing strong passwords, enabling multifactor authentication, watching out for phishing, using an antivirus, and monitoring and updating online accounts.
Cybersecurity continues to be a top risk for almost all entities. EBSA’s new guidance demonstrates how another agency has stepped forward to articulate expectations for entities regulated under its authority. Companies will be prudent to review and consider how best to address the new guidance, as its requirements are reasonably likely to become a point of reference in any litigation or enforcement actions stemming from a breach or other type of cybersecurity incident that affects ERISA-covered benefits plan data.
Authored by Paul Otto, Harriet Pearson, and Jacob Wall.