A chain is as strong as its weakest link. Companies that strive to protect their data and their employees from cyber-attacks may be vulnerable if their defined contribution (DC) record keeper or TPA (third party administrator) either does not have adequate protection or uses data without the permission of the company. In fact, adequate protection against cyber-attacks could lead to fiduciary liability according to a major law firm.
The law firm of Pillsbury Winthrop Shaw Pittman explains that DC plan sponsors are responsible for insuring that third parties that are given access to company and employee sensitive data have taken adequate measures to protect against cyber-attacks. In addition, plan sponsors should also be sure that these vendors are not using the data improperly or selling it without permission including health and financial wellness providers. TPAs and record keepers that are part of a larger, financial service company will likely have adequate protection and policies to protect data obtained while servicing DC plans but local, independent firms may not, warns Pillsbury.
Other dangers include the use of offshore outsourcers who may also have access to the company’s DC plan data. There is no comprehensive regulatory framework governing cyber security protocol and certainly nothing under ERISA but more and more DC plan sponsors are starting to realize that they are a digital fiduciary as outlined by UCLA Professor Shlomo Benartzi as the vast majority of plan participants interface with their DC plan through computers.
What to do? Pillsbury recommends that plans:
- Conduct due diligence of DC vendors that have access to the plan and participant data
- Conduct periodic reviews of the contract with these third parties
- Review whether their vendors have insurance and possibly obtain their own protection against litigation which is probably not covered under other policies
Plan sponsors should consider:
- Requesting a copy of their vendors’ cyber security program and if they have an assigned officer
- Asking if threats are shared with clients
- Review their vendors’ process
- Exert more control over sensitive data
- Leverage Homeland Security’s SAFETY Act