Archived Insight | April 25, 2019

Incident Response Plans: Be Prepared for a Data Breach

As plan fiduciaries, sponsors are ultimately responsible for data protection. That’s true even when day-to-day cybersecurity is delegated to the third-party administrator (TPA) handling benefits administration.

That’s why it’s important for sponsors of plans with outsourced administration to oversee cybersecurity and create an incident response plan.

Have a question? We have answers.

Send us a message. 

Speak with Us

Key aspects of cybersecurity oversight

Thorough oversight of outsourced cybersecurity includes these steps:

It’s also important for plan sponsors with outsourced administration to have an incident-response plan they can follow in the event of an actual data breach.

What to include in an incident response plan when you've outsourced to a TPA

You'll need an incident response plan even if you've outsourced all of your administration tasks to a TPA. To develop a meaningful incident response plan in this scenario, address all of the following:

Be prepared — and avoid finger-pointing

Monitoring outsourced cybersecurity gives you confidence that your plan data is being adequately protected.

Creating an incident response plan helps ensure you’ll be prepared to respond if plan data is breached. If you’ve outsourced functions to more than one vendor, having an incident response plan will help avoid finger-pointing among vendors in the event of a breach.

Read other insights

2025 ATC IT Summit Tennessee

ConnectivITy: Bridging Ideas. Bolstering Innovation. Building Connections.

Take your health and pension plan operations and IT to the next level and learn about the challenges facing benefit organizations today.
Serious Mature Female Manager Analyzes Documents During Meeting

HIPAA/HITECH Privacy & Security Compliance: PDF Checklist

To stay on top of compliance with the HIPAA/HITECH Privacy and Security rules, download our checklist, covering 15 best-practice compliance to-dos.
Female Doctor Using A Computer At The Hospital

Beyond Mandates: The Importance of Protecting Health Data

Learn the two trends driving IT risks today and how often to conduct a HIPAA Security/HITECH risk assessment in our new article from our ATC experts.

This page is for informational purposes only and does not constitute legal, tax or investment advice. You are encouraged to discuss the issues raised here with your legal, tax and other advisors before determining how the issues apply to your specific situations.