• Skip to content
  • Skip to primary sidebar
Bell Nunnally & Martin LLP

News/Events

Alerts | May 27, 2025

Cybersecurity Guidance for Employee Health and Welfare Plans

On Sept. 6, 2024, the U.S. Department of Labor issued Compliance Assistance Release No. 2024-01, which confirmed cybersecurity guidance that applies to all plans governed by the Employee Retirement Income Security Act (ERISA), including employee health and welfare plans.

Texas injury benefit plans, or non-subscription plans, are included in this guidance as they must comply with ERISA requirements that are applicable to welfare plans. 

The guidance includes three tips, summarized below, which applies to plan sponsors, fiduciaries and participants, respectively.

  1. Hiring a Service Provider – tips for plan sponsors and fiduciaries in selecting a security provider with strong cybersecurity practices as required by ERISA.
  2. Cybersecurity Best Practices – tips for plan fiduciaries and service providers in implementing a strong cybersecurity program.
  3. Online Security Tips – tips for plan participants in accessing retirement accounts and other employee benefit information online.

Hiring a Service Provider

Employers often rely on service providers to maintain employee health and welfare plan records and keep participant information confidential and secure. When selecting a service provider, employers and plan fiduciaries should focus on the following inquiries:

  1. Industry Standards: ask about the service provider’s security standards, practices and policies and audit results, and compare them with industry standards adopted by other financial/health institutions.
  2. Compliance Review: ensure the service contract gives you the right to review audit results demonstrating compliance with security standards.
  3. Performance History: evaluate the service provider’s track record in the industry, including security incidents and litigation relating to the vendor’s services.
  4. Prior Security Breaches: ask the provider directly about prior security breaches and how they were handled.
  5. Insurance Policies: ask whether the provider has insurance policies that would cover losses caused by cybersecurity breaches and the scope of coverage.
  6. Ongoing Compliance: ensure the contract for services requires ongoing compliance with cybersecurity standards.

Cybersecurity Program Best Practices

These best practices apply to recordkeepers and other service providers who are responsible for online storage of plan-related data, and also to plan fiduciaries who make the decision on the service provider they should hire.

  1. Formal, Well Documented Cybersecurity Program: A prudent program will address how to: identify risks to assets, information and systems; protect those assets; detect and respond to cybersecurity events; recovery from the event; disclose the event as appropriate; and restore normal operations.
  2. Annual Risk Assessments: Employers should codify a risk assessment’s scope, methodology and frequency.
  3. Annual Third-Party Audit of Security Controls: The audit should provide an unbiased report of existing risks, vulnerabilities and weaknesses.
  4. Information Security Roles and Responsibilities: An effective cybersecurity program must be managed by someone at the senior executive level who is qualified with knowledge of changing cybersecurity guidelines, risks and countermeasures.
  5. Strong Access Control Procedures: Ensure procedures are in place requiring a user to prove they are who they say they are and have the appropriate access to systems and data.
  6. Assets or Data Stored in a Cloud or Managed by a Third-Party Service Provider: See above section regarding Hiring a Service Provider to ensure participant information is kept confidential and secure.
  7. Periodic Cybersecurity Awareness Training: Conduct training at least annually for all personnel and updated to reflect risks identified by the most recent risk assessment. Ensure plan participants are well-versed on the online security tips below.
  8. Secure System Development Life Cycle (SDLC) Program: An SDLC program ensures security assurance activities like penetration testing, code review and architecture analysis are part of the system’s development effort.
  9. Business Resiliency Program: Implement a business resiliency program that will address business continuity, disaster recovery and incident response in light of a cybersecurity event or disaster.
  10. Encrypt Sensitive Data: Ensure prudent standards for encryption are in place to protect the confidentiality and integrity of data at rest or in transit.
  11. Strong Technical Controls: Maintain up to date hardware, software and firmware models; vendor-supported firewalls; and antivirus software. Also ensure routine patch management and data backup.
  12. Appropriately respond to any past cybersecurity incidents. Provide appropriate notice; investigate the incident; honor any contractual or legal obligations with respect to the breach; and fix the problem to prevent its recurrence.

Online Security Tips

As an employer, ensure through necessary training that plan participants adhere to the following to reduce the risk of fraud and loss of personal data and assets:

  1. Register, set up and routinely monitor your online account.
  2. Use strong and unique passwords/passphrases.
  3. Use Multi-Factor Authentication.
  4. Keep personal contact information current.
  5. Close or delete unused accounts.
  6. Be wary of free Wi-Fi.
  7. Beware of phishing attacks.
  8. Use antivirus software and keep apps and software current.
  9. Know how to report identity theft and cybersecurity incidents.

For additional guidance and information on ERISA compliance, please reach out to our ERISA compliance team.

Primary Sidebar

Related Attorneys

  • Sydnie A. Shimkus

    Sydnie A. Shimkus

    Partner

    sshimkus@bellnunnally.com
    214-740-1490

Related Practices

  • Labor and Employment
Stay in the know...
Don’t miss anything — Subscribe to our email list!
2323 Ross Avenue, Suite 1900, Dallas, Texas 75201 | 214.740.1400
© 2025 Bell Nunnally & Martin LLP All Rights Reserved
  • Sitemap
  • Disclaimer
  • Privacy Policy
  • Client Pay
legalink logo Site by
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
  • People
  • Practices
  • Industries
  • News/Events
  • Contact Us
  • About Us
  • Clients
  • Careers
  • Client Pay