Scarinci Hollenbeck, LLC, LLCScarinci Hollenbeck, LLC, LLC

Firm Insights

Chief Compliance Officers Now Targeted For Data Breaches

Author: Scarinci Hollenbeck, LLC

Date: November 13, 2015

Key Contacts

Back

The Securities and Exchange Commission (SEC) has made it clear that cybersecurity is a top priority. In a series of recent speeches, officials have focused attention on chief compliance officers and emphasized that chief compliance officers may be in the agency’s crosshairs when breaches occur.

The SEC announced that it plans to conduct a second round of cybersecurity compliance exams in the near future. Issues of concern include governance and risk assessment, access rights and controls, data loss prevention, vendor management, training, and incident response.

The Securities and Exchange Commission (SEC) has made it clear that cybersecurity is a top priority. In a series of recent speeches, officials have focused attention on chief compliance officers and emphasized that chief compliance officers may in the agency’s crosshairs when breaches occur.

In September, the SEC brought and settled charges against R.T. Jones Capital Equities Management. The agency alleged that the adviser failed to establish the required cybersecurity policies and procedures in advance of a breach that compromised the personally identifiable information of approximately 100,000 individuals. While financial firms will largely face liability for cybersecurity compliance failures, CCOs who shirk their duties could themselves also be on the receiving end of an enforcement action.

In remarks at the NRS 30th Annual Fall Investment Adviser and Broker-Dealer Compliance Conference, SEC Chief of Staff Andrew J. Donohue stated that the agency would continue to bring enforcement actions against compliance officers when appropriate. He specifically highlighted that chief compliance officers that wholly fail to carry out their responsibility to implement compliance programs and policies, including those involving cybersecurity and data privacy, could face an SEC enforcement action. However, he also reiterated the agency’s position that the agency does “not bring cases based on second-guessing compliance officers’ good faith judgments.”

In an October 16 speech, SEC Chair Mary Jo White further reiterated the importance of cybersecurity measures, noting that advisers are encouraged to assess their “ability to prevent, detect and respond to attacks in light of their compliance obligations under the federal securities laws.” She further stated:

Cybersecurity is the shared responsibility of all regulators and market participants, including investment advisers, to guard the broader financial system against intrusions. While cybersecurity attacks cannot be entirely eliminated, it is incumbent upon private fund advisers to employ robust, state-of-the-art plans to prevent, detect, and respond to such intrusions.

The bottom line is that chief compliance officers must be proactive when addressing cybersecurity.

As a starting point, regulated financial firms should consult the SEC’s Cybersecurity Guidance issued earlier this year. It advises that all firms should take the following compliance steps:

  1. Conduct a periodic assessment of:
    1. the nature, sensitivity and location of information that the firm collects, processes and/or stores, and the technology systems it uses;
    2. internal and external cybersecurity threats to and vulnerabilities of the firm’s information and technology systems;
    3. security controls and processes currently in place;
    4. the impact should the information or technology systems become compromised; and
    5. the effectiveness of the governance structure for the management of cybersecurity risk. An effective assessment would assist in identifying potential cybersecurity threats and vulnerabilities so as to better prioritize and mitigate risk.
  2. Create a strategy that is designed to prevent, detect and respond to cybersecurity threats. Such a strategy could include:
    1. controlling access to various systems and data via management of user credentials, authentication and authorization methods, firewalls and/or perimeter defenses, tiered access to sensitive information and network resources, network segregation, and system hardening;
    2. data encryption;
    3. protecting against the loss or exfiltration of sensitive data by restricting the use of removable storage media and deploying software that monitors technology systems for unauthorized intrusions, the loss or exfiltration of sensitive data, or other unusual events;
    4. data backup and retrieval; and
    5. the development of an incident response plan. Routine testing of strategies could also enhance the effectiveness of any strategy.

Implement the strategy through written policies and procedures and training that provide guidance to officers and employees concerning applicable threats and measures to prevent, detect and respond to such threats, and that monitor compliance with cybersecurity policies and procedures. Firms may also wish to educate investors and clients about how to reduce their exposure to cybersecurity threats concerning their accounts.

    No Aspect of the advertisement has been approved by the Supreme Court. Results may vary depending on your particular facts and legal circumstances.

    Scarinci Hollenbeck, LLC, LLC

    Related Posts

    See all
    Failing to Comply With NJ Rent Control Exemption May Prove Costly post image

    Failing to Comply With NJ Rent Control Exemption May Prove Costly

    What Developers Need to Know About New Jersey’s Rent Control Exemption Law to Ensure Entitlement to Exemption for Newly Constructed Multi-family Housing.  A property owner in Jersey City is facing a $400 million federal class action lawsuit alleging that the landlord did not follow the procedural steps required to be eligible for exemption from local […]

    Author: Patrick T. Conlon

    Link to post with title - "Failing to Comply With NJ Rent Control Exemption May Prove Costly"
    Crypto Securities Law: When Tokens Become Investment Contracts post image

    Crypto Securities Law: When Tokens Become Investment Contracts

    The application of traditional federal securities laws to crypto assets continues to evolve. In some cases, the Securities and Exchange Commission (SEC) considers tokens and other digital assets to be securities. This makes them subject to federal securities law, including the Securities Act of 1933 and the Securities Exchange Act of 1934. This classification has […]

    Author: Bryce S. Robins

    Link to post with title - "Crypto Securities Law: When Tokens Become Investment Contracts"
    The Due Diligence Process for NY Condominiums and Cooperatives post image

    The Due Diligence Process for NY Condominiums and Cooperatives

    While the New York City real estate market can be extremely competitive, moving too quickly often backfires. Before purchasing a condominium or cooperative in New York City, it is important to do you homework. Purchasing property in NYC can involve a dizzying number of legal issues. These include condo and co-op rules, rent restrictions, and […]

    Author: Jesse M. Dimitro

    Link to post with title - "The Due Diligence Process for NY Condominiums and Cooperatives"
    Smart Contract Legal Issues: Drafting Agreements for Blockchain post image

    Smart Contract Legal Issues: Drafting Agreements for Blockchain

    Smart contracts feature a unique blend of legal agreement and technical code. This innovation has the potential to reshape how business is conducted. At the same time, smart contract legal issues around enforceability, jurisdiction, identity, and compliance are common. The legal framework for these self-executing agreements is still evolving. What Are Smart Contracts? Smart contracts, […]

    Author: Bryce S. Robins

    Link to post with title - "Smart Contract Legal Issues: Drafting Agreements for Blockchain"
    Are Stay Interviews the Key to Retaining Top Talent? post image

    Are Stay Interviews the Key to Retaining Top Talent?

    Retaining top talent continues to be one of the greatest challenges facing employers today. Even in an employer’s market, the loss of a key employee can disrupt operations and result in significant costs. While compensation plays a role, long-term retention often depends on workplace culture, communication, and employee engagement. One increasingly popular strategy for improving […]

    Author: Angela A. Turiano

    Link to post with title - "Are Stay Interviews the Key to Retaining Top Talent?"
    Why Secured Transactions Are Important post image

    Why Secured Transactions Are Important

    Secured transactions form the backbone of a wide range of business dealings, including business loans, mortgages, and inventory financing. Because the stakes are often high and relatively minor oversights can have drastic consequences, lenders and borrowers should thoroughly understand how to form an enforceable security agreement that protects their legal rights. What Is a Secured […]

    Author: Dan Brecher

    Link to post with title - "Why Secured Transactions Are Important"

    No Aspect of the advertisement has been approved by the Supreme Court. Results may vary depending on your particular facts and legal circumstances.

    Sign up to get the latest from our attorneys!

    Explore What Matters Most to You.

    Consider subscribing to our Firm Insights mailing list by clicking the button below so you can keep up to date with the firm`s latest articles covering various legal topics.

    Stay informed and inspired with the latest updates, insights, and events from Scarinci Hollenbeck. Our resource library provides valuable content across a range of categories to keep you connected and ahead of the curve.

    Let`s get in touch!

    * The use of the Internet or this form for communication with the firm or any individual member of the firm does not establish an attorney-client relationship. Confidential or time-sensitive information should not be sent through this form. By providing a telephone number and submitting this form you are consenting to be contacted by SMS text message. Message & data rates may apply. Message frequency may vary. You can reply STOP to opt-out of further messaging.

    Sign up to get the latest from the Scarinci Hollenbeck, LLC attorneys!