Cybersecurity & Tech
Performing due diligence on all data and security protocols when selecting and monitoring vendors;
Developing privacy provisions for contracts with TPAs and other service providers over and above standard confidentiality agreements;
Limiting access to sensitive information to necessary personnel;
Training personnel on the law and the fiduciary responsibilities;
Developing written policies and procedures detailing for personnel the applicable state and federal laws;
Continuing to monitor and watch over service providers with access to sensitive data.
National Law Review | Jackson Lewis P.C. | Employee Benefit Plans and Data Security Issues
Thank you for subscribing to our newsletter.
Great things are just around the corner!