Sprung Link Text
On February 21, 2018, the Securities and Exchange Commission released new interpretive guidance on public company disclosures regarding cybersecurity risks and incidents.
The new interpretive guidance outlines the SEC’s views regarding disclosures by public companies relating to cybersecurity risks, events and incidents under existing securities laws. It also outlines the SEC’s views regarding the importance of appropriate disclosure controls and procedures, insider trading policies and selective disclosure safeguards in the context of cybersecurity incidents.
Although the interpretive guidance makes clear that the SEC views cybersecurity as a key disclosure matter, it does little to provide public companies with specific guidance on SEC expectations for what is required to be disclosed and when.
The interpretive guidance, however, does provide a useful review of the existing disclosure obligations related to cybersecurity matters and the disclosures that may be triggered upon the occurrence of cybersecurity incidents or events. In much the same way as the interpretive guidance issued by the SEC staff in 2011, the new interpretive guidance provides a framework for thinking about the various areas where cybersecurity-related disclosures may need to be made, such as risk factors, business description, MD&A, legal proceedings and financial statement disclosures.
More importantly, the interpretive guidance outlines, for the first time, the SEC view that:
Finally, although the Commission was unanimous in its approval of the interpretive guidance, Commissioners Kara Stein and Robert Jackson both expressed reservations and advocated for the SEC to do more. Commissioner Stein acknowledged that further action in this area may require formal SEC rule-making rather than interpretation of existing rules, and the interpretive guidance itself states that the Commission “continues to consider other means of promoting appropriate disclosure of cyber incidents.” This could mean that the Commission may consider new rules that specifically mandate the content and the timing of cybersecurity-related disclosures. It may also mean that the SEC now is considering bringing the first enforcement cases against public companies related to inadequate cybersecurity disclosures or ineffective disclosure controls and procedures.
On October 13, 2011, the staff of the Division of Corporation Finance of the SEC released interpretive guidance regarding public company disclosure obligations relating to cybersecurity risks and incidents. The existing interpretive guidance largely directs public companies to consider the materiality of cybersecurity risks and incidents when preparing public disclosures, when complying with periodic and current reporting requirements and in connection with a securities offering.
In contrast to the 2011 guidance, the new interpretive guidance is a statement from the SEC itself and not the staff of the Division of Corporation Finance. The SEC sets the tone for the interpretive guidance in the beginning by declaring that “cybersecurity risks pose a grave threat to investors, our capital markets, and our country.”
In the interpretive guidance the SEC states that it believes that:
The new guidance reminds companies to consider the materiality of cybersecurity risks and incidents when preparing disclosures for periodic reports and registration statements. It also recognizes that, when assessing whether a particular risk or incident should be disclosed, companies weigh, among other things, the potential materiality of the risk and the importance of the compromised information. Companies consider the “nature, extent, and potential magnitude” of the risk or incident as they relate to the company’s operations and the range of harms the risk or incident could cause. The potential “harms” include financial and reputational effects, impact on customer and vendor relationships and litigation or regulatory investigations by governmental authorities.
The new interpretive guidance reiterates that the disclosure requirements related to cybersecurity risks and incidents are based on the relevant disclosure considerations that arise in connection with any business risk, with no specific disclosure requirement that explicitly refers to cybersecurity matters. The SEC, consistent with the existing interpretive guidance, identifies a number of general disclosure requirements that would mandate a consideration of cybersecurity matters. These disclosure requirements include (a) risk factors, (b) MD&A, (c) description of the business, (d) legal proceedings, (e) financial statements and (f) disclosures of boards of directors’ role in risk management.
The guidance makes clear that companies are not required to make disclosures that compromise their own cybersecurity efforts or those of law enforcement that are investigating an incident, but the SEC does expect companies to nevertheless make disclosures of cybersecurity risks and incidents that are material to investors in a timely manner. This tension is exacerbated by the related duty to correct prior disclosures that a company determines to be untrue when made. The guidance also notes that some courts have found a duty to update disclosures that, although true when made, later become materially inaccurate. All of this is particularly relevant in the cybersecurity context as companies struggle with assessing the materiality of a risk or incident with information that is changing rapidly, while having to consider what, how and when to disclose the risk or incident to shareholders without being misleading or making a material omission.
The new guidance encourages companies to adopt “comprehensive policies and procedures related to cybersecurity and to assess their compliance regularly, including the sufficiency of their disclosure controls and procedures as they relate to cybersecurity disclosure.” The Exchange Act requires that companies maintain disclosure controls and procedures and that management evaluates their effectiveness. The SEC believes that to have effective disclosure controls and procedures, public companies must put in place adequate processes so that the appropriate personnel, including senior management, that are responsible for making disclosure decisions receive timely reporting on cybersecurity-related risks and incidents. Companies should ensure they have controls and procedures that allow them to (a) identify cybersecurity risks and incidents, (b) assess and analyze the impact on a company’s business, (c) evaluate the significance of the risk or incident and (d) make timely disclosures regarding such risks and incidents. The SEC expects the certifications that companies make related to disclosure controls and procedures should take into account the adequacy of the controls and procedures related to identifying, assessing, evaluating and disclosing cybersecurity risks and incidents.
The new guidance reminds companies, directors, officers and other insiders that trading on the basis of material non-public information related to a cybersecurity risk or incident is illegal. The SEC notes that “information about a company’s cybersecurity risks and incidents may be material non-public information, and directors, officers and other corporate insiders would violate the antifraud provisions if they trade the company’s securities in breach of their duty of trust or confidence while in possession of that material non-public information.” To protect against this conduct, the SEC advises that companies establish comprehensive policies and procedures that restrict trading on information related to cybersecurity risks or incidents. The SEC points out that during the assessment and investigative stage of a cybersecurity incident, where information and, more importantly, materiality of the incident is uncertain, is the most important time to impose “prophylactic measures” to protect against directors, officers and insiders from trading on the basis of information that is later determined to be material.
The new guidance reminds public companies to ensure they have policies and procedures in place to comply with a central Regulation FD requirement that when disclosures of material nonpublic information are made to certain individuals or entities, such as shareholders, broker dealers or investment advisors, simultaneous disclosure is made to the public.
Although every company has a different cybersecurity risk profile that demands a level of focus and attention appropriate to its profile and the materiality of cybersecurity matters to its business, the following are things most companies should consider now: