[1]The SEC and Cybersecurity Regulation:

    American companies are getting [2]hacked, and the Securities and
    Exchange Commission wants corporate executives to do something about
    it. According to a White House Council of Economic Advisers
    [3]report released earlier this year, malicious cyber activity cost
    the U.S. economy between $57 billion and $109 billion in 2016. The
    report acknowledged a [4]widely [5]recognized root of the problem:
    "[C]yberattacks and cyber theft impose externalities that may lead
    to rational underinvestment in cybersecurity by the private sector
    relative to the socially optimal level of investment."

    But [6]despite outrage and hearings in Congress after major
    breaches, like the [7]Equifax hack disclosed last year, Congress has
    not passed new legislation. There is no current [8]central federal
    mandate that offers protections for personal data. Instead as a
    legal [9]treatise puts it, the U.S. "has a patchwork system of
    federal and state laws and regulations that can sometimes overlap,
    dovetail and contradict one another."It's in that context that the
    Securities and Exchange Commission (SEC) has, under its authority of
    enforcing the federal securities laws, steadily increased its
    regulation of cybersecurity-related matters. A top SEC official
    [10]said last year that: "The greatest threat to our markets right
    now is the cyber threat." And SEC Chairman Jay Clayton [11]told the
    Senate Banking Committee that in regard to cyber attacks, companies
    "should be disclosing more" and that there should be "better
    disclosure about their risk portfolios and sooner disclosures about
    intrusions." In another statement, Clayton [12]announced:

    The Commission is focused on identifying and managing cybersecurity
    risks and ensuring that market participants--including issuers,
    intermediaries, investors and government authorities--are actively
    and effectively engaged in this effort and are appropriately
    informing investors and other market participants of these risks.

    The SEC's jurisdiction covers a [13]considerable range of
    cyber-related issues. This post tracks the commission's strategy for
    incentivizing investment in cybersecurity defenses by mandating
    disclosure and imposing liability on the victims of data breaches.
    Recent SEC activity suggests that this is a direction the agency is
    headed in, particularly with little sign of cybercrime [14]slowing
    anytime soon.

                       The SEC's Cybersecurity Foray

    In 2011, at the [15]urging of Sen. Jay Rockefeller, then the
    chairman of the Senate Commerce Committee, the SEC's Division of
    Corporation Finance issued [16]guidance on companies' disclosure
    obligations relating to cybersecurity risks and cyber incidents. The
    document established that:

    The [Securities Act of 1933 and Securities Exchange Act of 1934], in
    part, are designed to elicit disclosure of timely, comprehensive,
    and accurate information about risks and events that a reasonable
    investor would consider important to an investment decision.
    Although no existing disclosure requirement explicitly refers to
    cybersecurity risks and cyber incidents, a number of disclosure
    requirements may impose an obligation on registrants to disclose
    such risks and incidents. In addition, material information
    regarding cybersecurity risks and cyber incidents is required to be
    disclosed when necessary in order to make other required disclosures
    …

    The SEC then went on to identify [17]several specific areas that
    require disclosure of cyber-related information, including
    investment "risk factors," the business' description of itself,
    disclosure controls and procedures, among others. The SEC later
    affirmed the importance of these guidelines in a 2014 roundtable
    event convened shortly after the release of the [18]NIST
    Cybersecurity Framework. At that event, SEC chairwoman Mary Jo White
    [19]stated: "The SEC's formal jurisdiction over cybersecurity is
    directly focused on the integrity of our market systems, customer
    data protection, and disclosure of material information." Following
    the roundtable, the SEC's cybersecurity oversight principally
    consisted of issuing further [20]guidance documents, [21]risk
    alerts, and, in some cases, directing companies to disclose
    information on specific cyberattacks in [22]comment letters.

                     Liability for Victims of Breaches

    In October 2015, the agency [23]brought its first an action against
    a corporation that suffered a data breach. Under [24]Regulation S-P,
    which requires financial firms to adopt written policies and
    procedures that are "reasonably designed" to protect customer
    records and information, the SEC found that a St. Louis investment
    firm had failed to establish cybersecurity policies and procedures
    in advance of a data breach that compromised the information of
    approximately 100,000 people. The firm ultimately settled with the
    SEC for $75,000. In announcing the settlement, a SEC official
    [25]noted: "[I]t is important to enforce the safeguards rule even in
    cases like this when there is no apparent financial harm to
    clients."

    In 2016, the SEC again [26]brought an action under Regulation S-P.
    After a former Morgan Stanley employee downloaded data related to
    730,000 accounts to his own personal server, which was then likely
    hacked by a third-party, the bank agreed to a $1 million penalty.
    (The employee, Galen Marsh, also pleaded guilty to [27]illegally
    accessing confidential client information.) In particular, the SEC
    order noted that Morgan Stanley's policy and procedures failed to
    include "reasonably designed and operating authorization modules …
    that restricted employee access to only the confidential customer
    data as to which such employees had a legitimate business need;
    auditing and/or testing … and monitoring and analysis of employee
    access."

     The Creation of the Cyber Unit and the Commission's 2018 Guidance

    In September 2017, the SEC chairman Jay Clayton issued what a
    Washington Post [28]report described as "an unusual eight-page
    statement on cybersecurity." In that [29]statement, Clayton revealed
    that hackers had breached a SEC network that stored documents filed
    by publicly traded companies, potentially giving the intruders
    access to nonpublic information. Also in that same statement,
    Clayton laid out a broader strategy for policing public companies'
    cybersecurity strategies. He said:

    [T]he Commission incorporates cybersecurity considerations in its
    disclosure and supervisory programs, including in the context of the
    Commission's review of public company disclosures, its oversight of
    critical market technology infrastructure, and its oversight of
    other regulated entities, including broker-dealers, investment
    advisers and investment companies.

    Then a few days later, the SEC [30]announced the creation of a Cyber
    Unit within its Enforcement Division; the new unit would be tasked
    with "targeting cyber-related misconduct." Outlining the Cyber
    Unit's priorities in a [31]speech, a SEC official explicitly pointed
    to "requir[ing] registered entities to have reasonable safeguards in
    place to address cybersecurity threats" and "cases where there may
    be a cyber-related disclosure failure by a public company," among
    others.

    Next, in February 2018, the commission voted to unanimously to
    approve a "[32]statement and interpretive guidance to assist public
    companies in preparing disclosures about cybersecurity risks and
    incidents." The SEC described the new document as "reinforcing and
    expanding upon the staff's 2011 guidance." One area where the
    commission affirmatively noted that it had gone further than the
    staff guidance was in articulating "the importance of cybersecurity
    policies and procedures."

    The first part of the document tracks the specific disclosure
    obligations first announced in the 2011 guidance. In a company's
    periodic reporting, the document said, disclosure of cyber risks and
    incidents are generally necessary for a company's: business and
    operations, risk factors, legal proceedings, management discussion
    and analysis of financial condition and results of operations,
    financial statements, disclosure controls and procedures, and
    corporate governance. Exemplifying its effort to compel companies to
    more rigorously consider cyber risks, the commission [33]added a
    disclosure requirement for "the nature of the board's role in
    overseeing the management of [cybersecurity] risk."

    After that, in a section titled, "Policies and Procedures," the SEC
    recommended that: "Companies should assess whether they have
    sufficient disclosure controls and procedures in place to ensure
    that relevant information about cybersecurity risks and incidents is
    processed and reported to the appropriate personnel, including up
    the corporate ladder." The SEC then went on to cite specific
    regulations requiring companies to have certain policies in place to
    identify and evaluate risk. Commenting on the implications of the
    document, a Mayer Brown [34]post noted, "[t]he guidance encompasses
    more than disclosure."

    Notably, the commissions' two Democratic-recommended members were
    critical of the guidance for not going far enough. Commissioner Kara
    Stein [35]questioned the efficacy of "re-issuing staff guidance
    solely to lend it a Commission imprimatur." She called for measures
    beyond disclosure, including seeking notice and comment for a slate
    of new rules that would require companies to take proactive security
    measures. (Stein, whose term [36]ends on Dec. 31, also advocated for
    more robust cybersecurity regulation by the SEC in a recent
    [37]speech at Georgia State University College of Law). Commissioner
    Robert Jackson Jr.'s [38]statement cited analysis from the recent
    White House Council of Economic Advisers report that suggested that
    2011 guidance had not resulted in meaningful disclosure. (A New York
    Times [39]article in March of this year reported that in 2017, only
    24 companies reported breaches to the SEC, while researchers found
    that there were more than 4,000 cyber-attacks during that period.)

                Recent Actions Imposing Liability on Victims

    Since the creation of the Cyber Unit, the SEC has brought two
    enforcement actions against victims of breaches. The agency also
    recently issued a substantial report suggesting future enforcement
    against victims of breaches that are not in compliance with certain
    safeguards.

    In April 2018, the SEC [40]announced its [41]first-ever enforcement
    against a company for a failing to disclose a breach. In 2014,
    Russian hackers stole the personal information for more than 500
    million accounts from the company formerly known as Yahoo. But Yahoo
    did not disclose the breach until two years later, when it was in
    the process of closing the sale of its operating business to
    Verizon. Meanwhile, Yahoo made no mention of the breach in its SEC
    filings. The commission found that Yahoo's statements violated both
    statutes and regulations requiring the accurate disclosure of
    "material" information. Yahoo ultimately agreed to a $35 million
    fine.

    In September, the SEC brought another first-of-its-kind
    [42]enforcement action. This time, the agency found a financial firm
    in violation of a rule that it had never enforced before that
    requires investment firms to maintain an up-to-date program for
    preventing identity theft. The order outlined a phishing scheme in
    which attackers impersonated the firm's contractors over a six-day
    period in 2016 and convinced employees on the firm's support line to
    reset certain passwords. The hackers then used the new passwords to
    gain access to the personal information of 5,600 customers. Even
    though the firm did have some protection in place, the SEC found
    them inadequate, in part because in two instances, the malevolent
    actors called from phone numbers the firm had previously associated
    with fraudulent activity. The SEC ultimately found the firm's
    conduct [43]so egregious that it deemed the violation "willful." The
    firm agreed to pay a $1 million settlement.

    And, most recently, on Oct. 16, the SEC made [44]headlines with an
    [45]investigative report "cautioning that public companies should
    consider cyber threats when implementing internal accounting
    controls." The report analyzed nine public companies that fell
    victim to cyber fraud, wiring a total of $100 million to hackers
    impersonating either executives (often the CEO) or third-party
    vendors. One firm made 14 payments amounting to over $45 million in
    losses before the scheme was uncovered by an alert from a foreign
    bank. While the commission declined to bring actions against the
    investigated firms, the report suggested that internal accounting
    controls required by federal securities laws "may need to be
    reassessed in light of emerging risks, including risks arising from
    cyber-related frauds." As a [46]memo from Davis Polk observed,"[t]he
    report thus effectively serves as notice that in the future, a
    company experiencing a cyber event could later find itself in the
    SEC's crosshairs."

                                    ***

    Jack Goldsmith and Stuart Russell note in a recent [47]Hoover essay
    that there has long been skepticism of the regulation of digital
    networks in the United States. Indeed, many attribute this lack of
    regulation to the U.S. technology sector's extortionary record of
    innovation. But as a greater volume of sensitive information is
    stored online and, in turn, stolen,, the pendulum may be shifting in
    the other direction. Especially in the absence of new legislation
    from Congress, the SEC seems determined to put cybersecurity on the
    agenda of the nation's corporate boardrooms.

  (Via [48]Lawfare - Hard National Security Choices)
  Also on:

  [49]Twitter
    __________________________________________________________________

  My original entry is here: [50]The SEC and Cybersecurity Regulation. It
  posted Mon, 26 Nov 2018 20:44:53 +0000.
  Filed under: business,

References

  1. https://www.lawfareblog.com/sec-and-cybersecurity-regulation
  2. https://www.wired.com/story/2018-worst-hacks-so-far/
  3. https://www.whitehouse.gov/articles/cea-report-cost-malicious-cyber-activity-u-s-economy/
  4. https://www.schneier.com/essays/archives/2003/11/liability_changes_ev.html
  5. https://www.economist.com/leaders/2016/12/20/incentives-need-to-change-for-firms-to-take-cyber-security-more-seriously
  6. https://www.politico.com/story/2018/01/01/equifax-data-breach-congress-action-319631
  7. https://www.nytimes.com/2017/09/07/business/equifax-cyberattack.html
  8. https://legal.thomsonreuters.com/en/insights/articles/data-breach-liability
  9. https://content.next.westlaw.com/Document/I02064fbd1cb611e38578f7ccc38dcbee/View/FullText.html?contextData=(sc.Default)&transitionType=Default&firstPage=true&bhcp=1
 10. https://www.reuters.com/article/us-usa-sec-enforcement-exclusive/exclusive-new-sec-enforcement-chiefs-see-cyber-crime-as-biggest-market-threat-idUSKBN18Z2TX
 11. https://www.whiteandwilliams.com/resources-alerts-Policing-Financial-Cyber-Crime-SEC-Announces-New-Cyber-Unit.html
 12. https://www.sec.gov/news/public-statement/statement-clayton-2017-09-20
 13. https://www.sec.gov/spotlight/cybersecurity-enforcement-actions
 14. https://www.mcafee.com/enterprise/en-us/assets/executive-summaries/es-economic-impact-cybercrime.pdf
 15. https://www.commerce.senate.gov/public/_cache/files/4ceb6c11-b613-4e21-92c7-a8e1dd5a707e/41A8309A6FC78E9630AEEA660D81D379.5.11.11-letter-to-sec.pdf
 16. https://www.sec.gov/divisions/corpfin/guidance/cfguidance-topic2.htm
 17. https://www.wilmerhale.com/en/insights/publications/sec-issues-new-guidance-on-disclosing-cybersecurity-risks-and-incidents-october-27-2011
 18. https://www.lawfareblog.com/nist-cybersecurity-framework-issued
 19. https://www.sec.gov/spotlight/cybersecurity-roundtable/cybersecurity-roundtable-transcript.txt
 20. https://www.sec.gov/investment/im-guidance-2015-02.pdf
 21. https://www.sec.gov/about/offices/ocie/cybersecurity-examination-sweep-summary.pdf
 22. https://corpgov.law.harvard.edu/2017/10/05/the-equifax-hack-sec-data-breach-and-issuer-disclosure-obligations/#12
 23. https://www.sec.gov/news/pressrelease/2015-202.html
 24. https://www.sec.gov/spotlight/regulation-s-p.htm
 25. https://www.sec.gov/news/pressrelease/2015-202.html
 26. https://www.sec.gov/news/pressrelease/2016-112.html
 27. https://www.justice.gov/usao-sdny/pr/former-morgan-stanley-financial-adviser-sentenced-manhattan-federal-court-illegally-0
 28. https://www.washingtonpost.com/news/business/wp/2017/09/20/sec-reveals-it-was-hacked-information-may-have-been-used-for-illegal-stock-trades/?utm_term=.d8d7ab742489
 29. https://www.sec.gov/news/public-statement/statement-clayton-2017-09-20
 30. https://www.sec.gov/news/press-release/2017-176
 31. https://www.sec.gov/news/speech/speech-avakian-2017-10-26
 32. https://www.sec.gov/rules/interp/2018/33-10459.pdf
 33. http://clsbluesky.law.columbia.edu/2018/06/05/latham-watkins-discusses-new-sec-guidance-on-cybersecurity/
 34. https://www.mayerbrown.com/sec-issues-updated-guidance-on-cybersecurity-disclosures-02-28-2018/
 35. https://www.sec.gov/news/public-statement/statement-stein-2018-02-21
 36. https://www.marketsmedia.com/wall-street-readies-for-democratic-house/
 37. https://www.sec.gov/news/speech/speech-stein-092718
 38. https://www.sec.gov/news/public-statement/statement-jackson-2018-02-21
 39. https://www.nytimes.com/2018/03/05/business/dealbook/sec-cybersecurity-guidance.html
 40. https://www.sec.gov/litigation/admin/2018/33-10485.pdf
 41. https://www.ropesgray.com/en/newsroom/alerts/2018/05/35-Million-Yahoo-Fine-Reflects-SECs-Heightened-Cybersecurity-Focus
 42. https://www.sec.gov/litigation/admin/2018/34-84288.pdf
 43. https://www.nytimes.com/2018/10/08/business/dealbook/voya-sec-cyber.html
 44. https://www.wsj.com/articles/sec-calls-for-better-accounting-controls-as-cyber-scams-increase-1539726047
 45. https://www.sec.gov/news/press-release/2018-236
 46. https://www.davispolk.com/publications/adding-insult-injury-sec-warns-cyber-incidents-may-lead-enforcement-action
 47. https://www.lawfareblog.com/strengths-become-vulnerabilities-how-digital-world-disadvantages-united-states-its-international-0
 48. https://www.lawfareblog.com/recent
 49. https://twitter.com/prjorgensen/status/1067158123973091330
 50. https://www.prjorgensen.com/?p=2358