Every SSN You Hold Is a Fiduciary Obligation
ERISA doesn't just protect assets. It protects data. And the costs of failure are measured in millions.
$750K drained from one participant. $17.5M Infosys McCamish settlement. $8.7M Horizon Actuarial class action. $1.2M NWRPC settlement. Sources: Court filings, SEC disclosures
The Cost of Failure
The financial consequences of inadequate data protection are no longer theoretical. In recent years, $750,000 was drained from a single participant's account via fraudulent impersonation — documented in ERISA lawsuit court filings. Infosys McCamish agreed to a $17.5 million settlement after a ransomware attack exposed data for 6 million people. Horizon Actuarial faced an $8.7 million class action after multiemployer benefit plan data was compromised. Northwest Retirement Plan Consultants settled for $1.2 million after their 2024 breach affected hundreds of employer plans.
These aren't edge cases. They're the new normal for retirement plan service providers who can't demonstrate adequate data protection.
How Many SSNs Are in Your Systems Right Now?
Take a moment and estimate. 10,000 participants? 50,000? More? Each Social Security number represents a real person who trusted their employer's retirement plan — and by extension, trusted you — to protect their most sensitive personal information. Every date of birth, every bank account number for direct deposit, every beneficiary designation contains data that identity thieves can monetize.
As a TPA, you don't just process this data. You store it, transmit it to recordkeepers, receive it from payroll providers, and archive it for compliance purposes. The data flows through your systems constantly — and every flow point is a potential exposure.
The Fiduciary Standard Applies to Data
Plan sponsors, auditors, and regulators now expect TPAs to demonstrate that participant data is protected with the same rigor as plan assets. The DOL's cybersecurity guidance makes this clear: data protection is a fiduciary responsibility, not just an IT concern.
Plan sponsors are asking specific questions: What happens if YOU get breached? What's YOUR incident response plan? Where does OUR participants' data physically reside? Who has access to it? How is it encrypted? If your IT provider can't answer these questions with specifics and documentation, that's not an IT problem — it's a fiduciary problem.
The IT Implications
Meeting the fiduciary standard for data protection requires specific IT controls. Encryption at rest and in transit for all participant data. Access controls that enforce least privilege — staff only access the data they need for their role. Audit trails that document who accessed what data and when. Backup and disaster recovery procedures that protect against data loss. Incident response plans that define exactly what happens when a breach is detected, including participant notification timelines.
These aren't aspirational goals. They're the minimum standard that DOL expects, plan sponsors demand, and courts enforce when breaches lead to litigation.
From Fiduciary Risk to Fiduciary Confidence
TPAIT helps TPAs protect participant data and prove it. Our cybersecurity services address the specific data protection requirements of ERISA plan fiduciaries — from encryption and access controls to incident response and breach notification support. When a plan sponsor asks where their participants' data resides, you answer with specifics: a U.S.-based Tier III datacenter with SOC 1/2 compliance, VLAN-isolated environments, and encrypted offsite replication.
See how our Private Cloud provides the data sovereignty that ERISA fiduciaries require.
Key Takeaways
Data = Fiduciary Duty
ERISA protects participant data with the same rigor as plan assets. Cybersecurity is a fiduciary obligation.
Encrypt Everything
AES-256 at rest, TLS 1.2+ in transit, encrypted backups — with documentation to prove it.
Know Your Exposure
How many SSNs are in your systems? Each one is a person who trusted you with their most sensitive data.
Protect the Data Your Participants Trusted You With
Get a free assessment of your data protection controls against DOL fiduciary standards.
Book Free IT & Cyber Assessment (opens in new tab)