{"id":1272,"date":"2017-07-20T16:37:19","date_gmt":"2017-07-20T20:37:19","guid":{"rendered":"https:\/\/www2.law.temple.edu\/10q\/?p=1272"},"modified":"2017-07-20T16:37:19","modified_gmt":"2017-07-20T20:37:19","slug":"the-sec-and-cybersecurity","status":"publish","type":"post","link":"https:\/\/law.temple.edu\/10q\/the-sec-and-cybersecurity\/","title":{"rendered":"The SEC and Cybersecurity"},"content":{"rendered":"<p>The Securities and Exchange Commission (\u201cSEC\u201d) has been squarely focused on cybersecurity and data protection for the last several years. The SEC launched an initiative to examine investment advisers\u2019 cybersecurity compliance and controls in 2014, and these areas remain an examination priority. The SEC has also published multiple cybersecurity guidance and risk alerts since 2014. David Glockner, regional director of the SEC\u2019s Chicago office, recently stated that the SEC will lead its \u201cefforts with respect to cyber-security controls through the exam program, not through enforcement.\u201d However, the SEC has also brought enforcement actions against investment advisers resulting from cyber-attacks and the firms\u2019 lack of written cybersecurity policies and procedures designed to prevent against such attacks. Investment advisers, and those who counsel them, should be aware of the SEC\u2019s authority to mandate and enforce cybersecurity controls.<\/p>\n<p>The SEC brought its first cybersecurity enforcement action against an adviser in September 2015, when it instituted administrative and cease-and-desist proceedings against R.T. Jones Capital Equities Management, Inc. (\u201cR.T. Jones\u201d), alleging that R.T. Jones failed to adopt written policies and procedures reasonably designed to protect customer records and information in violation of Rule 30(a) of Regulation S-P (the \u201cSafeguards Rule\u201d). The Safeguards Rule requires registered investment advisers to adopt written policies and procedures reasonably designed to safeguard customer records and information. The proceedings stemmed from a July 2013 attack on R.T. Jones\u2019s server that left the personally identifiable information (\u201cPII\u201d) of more than 100,000 individuals vulnerable to theft. The order alleged that \u201c[f]rom at least September 2009 through July 2013, R.T. Jones stored sensitive PII of clients on its third party-hosted web server without adopting written policies and procedures regarding the security and confidentiality of that information and the protection of that information from anticipated threats or unauthorized access.\u201d To mitigate the risks of future cyber threats, R.T. Jones appointed an information security manager, adopted and implemented a written information security policy, no longer stores PII on its webserver and encrypts any PII stored on its internal network, installed new firewall and logging systems to prevent and detect malicious incursions, and retained a cybersecurity firm to provide ongoing reports and advice on the firm\u2019s information technology security. R.T. Jones was ordered to pay a civil money penalty of $75,000.<\/p>\n<p>In a second action, against Morgan Stanley Smith Barney, LLC (\u201cMSSB\u201d) in June 2016, the SEC found that MSSB willfully violated the Safeguards Rule despite its adoption of written policies and procedures relating to the protection of customer PII, because those policies were not reasonably designed to safeguard its customers\u2019 PII as required by the Safeguards Rule. The SEC alleged that from 2011 to 2014, an MSSB employee misappropriated the PII of approximately 730,000 customers, including customers\u2019 names, addresses, and account numbers, balances and securities holdings. In its findings, the SEC alleged that MSSB\u2019s written policies and procedures failed to adequately address certain key administrative, technical and physical safeguards, such as: reasonably designed and operating authorization modules for certain business portals to restrict employee access to only the confidential customer data that employees had a legitimate business interest to use; auditing and\/or testing of the effectiveness of such authorization modules; and monitoring and analyzing of employee access to and use of the portals. In addition to remedial efforts already undertaken, MSSB was ordered to pay a civil money penalty of $1,000,000.<\/p>\n<p>As Mr. Glockner noted at the SEC\u2019s compliance outreach program in Chicago, the agency is \u201cfocused on trying to prevent these problems before they occur.\u201d The SEC has previously articulated its views on effective cybersecurity protocols by providing guidance for investment advisers to assess cybersecurity risks, including periodic assessments of: (1) the nature, sensitivity and location of information that the firm collects, processes and\/or stores, and the technology systems it uses; (2) internal and external cybersecurity threats to and vulnerabilities of the firm\u2019s information and technology systems; (3) security controls and processes currently in place; (4) the impact should information or technology systems become compromised; and (5) the effectiveness of the governance structure for the management of cybersecurity risks. Mr. Glockner has also emphasized that written policies and procedures may be found to be deficient on their face even if there was no breach. For that reason, an adviser\u2019s policies and procedures should be tailored to its operations.<\/p>\n<p>The SEC\u2019s guidance has also pointed to certain practices investment advisers may wish to implement to ensure the sufficiency of their cybersecurity compliance and controls, including:<\/p>\n<ul>\n<li>Controlling access to various systems and data via management of user credentials, authentication and authorization methods, firewalls and\/or perimeter defenses, tiered access to sensitive information and network resources, network segregation, and system hardening;<\/li>\n<li>Data encryption;<\/li>\n<li>Protecting against the loss or exfiltration of sensitive data by restricting the use of removable storage media and deploying software that monitors technology stems for unauthorized intrusions, the loss or exfiltration of sensitive data, or other unusual events;<\/li>\n<li>Data backup and retrieval;<\/li>\n<li>The development of an incident response plan; and<\/li>\n<li>Routine testing of these strategies.<\/li>\n<\/ul>\n<p>These strategies should be implemented through written policies and procedures and training that provide guidance to officers and employees concerning applicable threats and measures to prevent, detect and respond to such threats, and that monitor compliance with cybersecurity policies and procedures. Investment advisers may also wish to educate investors and clients about how to reduce their exposure to cyber threats concerning their accounts.<\/p>\n<hr \/>\n<p><em><a href=\"http:\/\/www.drinkerbiddle.com\/people\/m\/mccarthy-diana-e\">Diana E. McCarthy (LAW &#8217;93)<\/a> is a partner as Drinker Biddle in the firm\u2019s Investment Management Group. She\u00a0focuses on representations of registered investment companies, including exchange-traded funds, and their independent boards of directors, investment advisers and other financial services companies.<\/em><\/p>\n<p><em><a href=\"http:\/\/www.drinkerbiddle.com\/people\/l\/lindauer-joshua-m\">Joshua M. Lindauer<\/a>\u00a0is an associate at Drinker Biddle where he\u00a0counsels a variety of clients in the investment management industry, including investment advisers and investment companies. He also advises clients on the formation, governance, reorganization and ongoing operations of investment companies, such as product structuring, marketing, operations, and compliance.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Diana E. McCarthy (LAW \u201993) and Joshua M. Lindauer examine the SEC through the lens of cybersecurity enforcement<\/p>\n","protected":false},"author":5,"featured_media":1273,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12,52,38,20],"tags":[223,376,377,378,379,380,373,381,198],"coauthors":[2,374,375],"class_list":["post-1272","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-alumni-authored","category-compliance","category-regulated-industries","category-technology","tag-cybersecurity","tag-david-glockner","tag-guidance","tag-morgan-stanley-smith-barney-llc","tag-pii","tag-r-t-jones","tag-regulations","tag-safegaurds-rule","tag-sec","masonry-post","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-33"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The SEC and Cybersecurity - The Temple 10-Q<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/law.temple.edu\/10q\/the-sec-and-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The SEC and Cybersecurity - The Temple 10-Q\" \/>\n<meta property=\"og:description\" content=\"Diana E. McCarthy (LAW \u201993) and Joshua M. Lindauer examine the SEC through the lens of cybersecurity enforcement\" \/>\n<meta property=\"og:url\" content=\"https:\/\/law.temple.edu\/10q\/the-sec-and-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"The Temple 10-Q\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-20T20:37:19+00:00\" \/>\n<meta name=\"author\" content=\"Books Schatschneider, Diana E. McCarthy (LAW \u201993), Joshua M. Lindauer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Books Schatschneider, Diana E. McCarthy (LAW \u201993), Joshua M. Lindauer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/law.temple.edu\/10q\/the-sec-and-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/law.temple.edu\/10q\/the-sec-and-cybersecurity\/\"},\"author\":{\"name\":\"Books Schatschneider\",\"@id\":\"https:\/\/law.temple.edu\/10q\/#\/schema\/person\/23e7012f0cf133dbeb0e76693c9e0154\"},\"headline\":\"The SEC and Cybersecurity\",\"datePublished\":\"2017-07-20T20:37:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/law.temple.edu\/10q\/the-sec-and-cybersecurity\/\"},\"wordCount\":989,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/law.temple.edu\/10q\/the-sec-and-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/law.temple.edu\/10q\/wp-content\/uploads\/sites\/12\/2017\/07\/pexels-photo-241028-scaled.jpg\",\"keywords\":[\"Cybersecurity\",\"David Glockner\",\"Guidance\",\"Morgan Stanley Smith Barney LLC\",\"PII\",\"R.T. Jones\",\"Regulations\",\"Safegaurds Rule\",\"SEC\"],\"articleSection\":[\"Alumni Authored\",\"Compliance\",\"Regulated Industries\",\"Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/law.temple.edu\/10q\/the-sec-and-cybersecurity\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/law.temple.edu\/10q\/the-sec-and-cybersecurity\/\",\"url\":\"https:\/\/law.temple.edu\/10q\/the-sec-and-cybersecurity\/\",\"name\":\"The SEC and Cybersecurity - The Temple 10-Q\",\"isPartOf\":{\"@id\":\"https:\/\/law.temple.edu\/10q\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/law.temple.edu\/10q\/the-sec-and-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/law.temple.edu\/10q\/the-sec-and-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/law.temple.edu\/10q\/wp-content\/uploads\/sites\/12\/2017\/07\/pexels-photo-241028-scaled.jpg\",\"datePublished\":\"2017-07-20T20:37:19+00:00\",\"author\":{\"@id\":\"https:\/\/law.temple.edu\/10q\/#\/schema\/person\/23e7012f0cf133dbeb0e76693c9e0154\"},\"breadcrumb\":{\"@id\":\"https:\/\/law.temple.edu\/10q\/the-sec-and-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/law.temple.edu\/10q\/the-sec-and-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/law.temple.edu\/10q\/the-sec-and-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/law.temple.edu\/10q\/wp-content\/uploads\/sites\/12\/2017\/07\/pexels-photo-241028-scaled.jpg\",\"contentUrl\":\"https:\/\/law.temple.edu\/10q\/wp-content\/uploads\/sites\/12\/2017\/07\/pexels-photo-241028-scaled.jpg\",\"width\":2560,\"height\":1706},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/law.temple.edu\/10q\/the-sec-and-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/law.temple.edu\/10q\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The SEC and Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/law.temple.edu\/10q\/#website\",\"url\":\"https:\/\/law.temple.edu\/10q\/\",\"name\":\"The Temple 10-Q\",\"description\":\"Temple&#039;s Business Law Magazine\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/law.temple.edu\/10q\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/law.temple.edu\/10q\/#\/schema\/person\/23e7012f0cf133dbeb0e76693c9e0154\",\"name\":\"Books Schatschneider\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/62b6c5fa1068c42262dab498d74cb3fc60fbba8344047dc13348bd3aacf7b70a?s=96&d=mm&r=g9dc77189f33a293d2c82a50cd24ebb9f\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/62b6c5fa1068c42262dab498d74cb3fc60fbba8344047dc13348bd3aacf7b70a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/62b6c5fa1068c42262dab498d74cb3fc60fbba8344047dc13348bd3aacf7b70a?s=96&d=mm&r=g\",\"caption\":\"Books Schatschneider\"},\"url\":\"https:\/\/law.temple.edu\/10q\/author\/rschatsc\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The SEC and Cybersecurity - The Temple 10-Q","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/law.temple.edu\/10q\/the-sec-and-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"The SEC and Cybersecurity - The Temple 10-Q","og_description":"Diana E. McCarthy (LAW \u201993) and Joshua M. Lindauer examine the SEC through the lens of cybersecurity enforcement","og_url":"https:\/\/law.temple.edu\/10q\/the-sec-and-cybersecurity\/","og_site_name":"The Temple 10-Q","article_published_time":"2017-07-20T20:37:19+00:00","author":"Books Schatschneider, Diana E. McCarthy (LAW \u201993), Joshua M. Lindauer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Books Schatschneider, Diana E. McCarthy (LAW \u201993), Joshua M. Lindauer","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/law.temple.edu\/10q\/the-sec-and-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/law.temple.edu\/10q\/the-sec-and-cybersecurity\/"},"author":{"name":"Books Schatschneider","@id":"https:\/\/law.temple.edu\/10q\/#\/schema\/person\/23e7012f0cf133dbeb0e76693c9e0154"},"headline":"The SEC and Cybersecurity","datePublished":"2017-07-20T20:37:19+00:00","mainEntityOfPage":{"@id":"https:\/\/law.temple.edu\/10q\/the-sec-and-cybersecurity\/"},"wordCount":989,"commentCount":0,"image":{"@id":"https:\/\/law.temple.edu\/10q\/the-sec-and-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/law.temple.edu\/10q\/wp-content\/uploads\/sites\/12\/2017\/07\/pexels-photo-241028-scaled.jpg","keywords":["Cybersecurity","David Glockner","Guidance","Morgan Stanley Smith Barney LLC","PII","R.T. Jones","Regulations","Safegaurds Rule","SEC"],"articleSection":["Alumni Authored","Compliance","Regulated Industries","Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/law.temple.edu\/10q\/the-sec-and-cybersecurity\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/law.temple.edu\/10q\/the-sec-and-cybersecurity\/","url":"https:\/\/law.temple.edu\/10q\/the-sec-and-cybersecurity\/","name":"The SEC and Cybersecurity - The Temple 10-Q","isPartOf":{"@id":"https:\/\/law.temple.edu\/10q\/#website"},"primaryImageOfPage":{"@id":"https:\/\/law.temple.edu\/10q\/the-sec-and-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/law.temple.edu\/10q\/the-sec-and-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/law.temple.edu\/10q\/wp-content\/uploads\/sites\/12\/2017\/07\/pexels-photo-241028-scaled.jpg","datePublished":"2017-07-20T20:37:19+00:00","author":{"@id":"https:\/\/law.temple.edu\/10q\/#\/schema\/person\/23e7012f0cf133dbeb0e76693c9e0154"},"breadcrumb":{"@id":"https:\/\/law.temple.edu\/10q\/the-sec-and-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/law.temple.edu\/10q\/the-sec-and-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/law.temple.edu\/10q\/the-sec-and-cybersecurity\/#primaryimage","url":"https:\/\/law.temple.edu\/10q\/wp-content\/uploads\/sites\/12\/2017\/07\/pexels-photo-241028-scaled.jpg","contentUrl":"https:\/\/law.temple.edu\/10q\/wp-content\/uploads\/sites\/12\/2017\/07\/pexels-photo-241028-scaled.jpg","width":2560,"height":1706},{"@type":"BreadcrumbList","@id":"https:\/\/law.temple.edu\/10q\/the-sec-and-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/law.temple.edu\/10q\/"},{"@type":"ListItem","position":2,"name":"The SEC and Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/law.temple.edu\/10q\/#website","url":"https:\/\/law.temple.edu\/10q\/","name":"The Temple 10-Q","description":"Temple&#039;s Business Law Magazine","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/law.temple.edu\/10q\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/law.temple.edu\/10q\/#\/schema\/person\/23e7012f0cf133dbeb0e76693c9e0154","name":"Books Schatschneider","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/62b6c5fa1068c42262dab498d74cb3fc60fbba8344047dc13348bd3aacf7b70a?s=96&d=mm&r=g9dc77189f33a293d2c82a50cd24ebb9f","url":"https:\/\/secure.gravatar.com\/avatar\/62b6c5fa1068c42262dab498d74cb3fc60fbba8344047dc13348bd3aacf7b70a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/62b6c5fa1068c42262dab498d74cb3fc60fbba8344047dc13348bd3aacf7b70a?s=96&d=mm&r=g","caption":"Books Schatschneider"},"url":"https:\/\/law.temple.edu\/10q\/author\/rschatsc\/"}]}},"jetpack_featured_media_url":"https:\/\/law.temple.edu\/10q\/wp-content\/uploads\/sites\/12\/2017\/07\/pexels-photo-241028-scaled.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/law.temple.edu\/10q\/wp-json\/wp\/v2\/posts\/1272","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/law.temple.edu\/10q\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/law.temple.edu\/10q\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/law.temple.edu\/10q\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/law.temple.edu\/10q\/wp-json\/wp\/v2\/comments?post=1272"}],"version-history":[{"count":0,"href":"https:\/\/law.temple.edu\/10q\/wp-json\/wp\/v2\/posts\/1272\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/law.temple.edu\/10q\/wp-json\/wp\/v2\/media\/1273"}],"wp:attachment":[{"href":"https:\/\/law.temple.edu\/10q\/wp-json\/wp\/v2\/media?parent=1272"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/law.temple.edu\/10q\/wp-json\/wp\/v2\/categories?post=1272"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/law.temple.edu\/10q\/wp-json\/wp\/v2\/tags?post=1272"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/law.temple.edu\/10q\/wp-json\/wp\/v2\/coauthors?post=1272"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}