SEC Guidance on Disclosure of Cyber Incident by Public Companies - A Refresher
Imran Ahmad
Partner and Head of Technology, Co-Chair Cybersecurity and data privacy at Norton Rose Fulbright
Given the frequency of cybersecurity incidents, this is a good time to revisit the Securities and Exchange Commission's (SEC) 2018 guidance on cybersecurity disclosures by public companies. Many of these concepts are also found in the Canadian Securities Administrators' (CSA) Staff Notice 11-332.
General Principle
According to the SEC, given the frequency, magnitude and cost of cybersecurity incidents, it is critical that public companies inform investors about material cybersecurity risks and incidents in a timely fashion, including those companies that are subject to material cybersecurity risks but may not yet have been the target of a cyber-attack.
The SEC goes on to say that, "crucial to a public company’s ability to make any required disclosure of cybersecurity risks and incidents in the appropriate timeframe are disclosure controls and procedures that provide an appropriate method of discerning the impact that such matters may have on the company and its business, financial condition, and results of operations, as well as a protocol to determine the potential materiality of such risks and incidents." [emphasis added]
Materiality
According to the SEC, in addition to the information expressly required the SEC's regulation, a company must disclose "such further material information, if any, as may be necessary to make the required statements, in light of the circumstances under which they are made, not misleading."
It is noteworthy that the SEC considers omitted information to be material is there is a substantial likelihood that a reasonable investor would consider the information to be important when making an investment decision.
Materiality will depend on:
While the SEC recognizes that an investigation into a cybersecurity incident can take time, it notes that this "would not on its own provide a basis for avoiding disclosure of a material cybersecurity incident."
Disclosure of Cyber Risks
Companies should consider the following issues, among others, in evaluating cybersecurity risk factor disclosure:
领英推荐
Other Considerations
The guidance document lists other factors that should be considered when drafting cybersecurity incident and/or risk disclosures:
What Does This All Mean?
While the number of cybersecurity incidents have increased globally in the past 18 months, an interesting development is the ability of threat actors to compromise seemingly large public organizations who dedicate significant resources to cybersecurity. Further, the incidents are more impactful and can, in some instances, meet the materiality threshold discussed above.
Understanding what should be considered and what should be disclosed in a public disclosure document, either in Canada or the United States (or elsewhere), can be tricky to say the least. This is because it is not immediately clear what the impact of a cybersecurity incident may be on an company.
Having on-hand a materiality matrix and understanding what factors should be considered should be built into every public company's Cyber Incident Response Plan (CIRP).
One last point: once a decision is made to disclose, particular care should be taken to ensure that the disclosure is accurate and not misleading. There are several examples where companies tried to downplay the impact of a cybersecurity incident in their disclosure and were found to have bee offside.
For more reading on this topic, check out this excellent article from Harvard Law School Forum on Corporate Governance: