SEC demands cyber security disclosure
US financial markets regulator says data breaches affect investment
By James Niccolai | IDG News Service | Published 00:28, 18 October 11
Public companies may need to look more closely at their exposure to cyberattacks after new guidelines were released this week by the US regulator the Securities and Exchange Commission (SEC).
The guidelines, from the SEC's division of corporation finance, aim to help companies determine when they need to disclose cyberattacks or the amount of risk they pose to a business.
In general, public companies in the US are required to disclose incidents that could have a material impact on their business. While the current regulations don't specifically mention cyberattacks, the new guidelines say they need to be reported in some cases.
Companies should disclose the risk of cyber-incidents "if these issues are among the most significant factors that make an investment in the company speculative or risky," say the new guidelines.
To determine that, companies need to look at factors such as how likely it is they will be targeted by an attack and what the cost of an attack might be, in terms of disruption to operations or loss of sensitive data.
They may also be required to give details about hacking incidents that took place in the past.
"For example, if a registrant experienced a material cyberattack in which malware was embedded in its systems and customer data was compromised, it likely would not be sufficient for the registrant to disclose that there is a risk that such an attack may occur." Instead, they would probably be required to reveal specifics of the incident, the SEC said.
The guidelines come in a year that has seen numerous high profile hacking incidents, including a massive attack on Sony that forced it to take its PlayStation Network offline for more than a month.
The risk of cyberattacks has always been a potential disclosure issue, but the SEC guidance "really highlights the issue and brings it to the fore," according to David Navetta, a founding partner of Information Law Group, which provides legal services related to IT matters.
Even so, he wrote in a company blog post, "materiality is still going to be a big issue, and not every breach will need to be reported as many/most will not likely involve the potential for a material impact to a company."
One interpretation of the guidelines is that "companies internally are going to have to more carefully forecast and estimate the impact of cyber incidents and the consequences of failing to implement adequate security," Navetta wrote.
"This analysis will go well beyond privacy-related security issues where most companies have focused (due to various privacy laws and regulator activity), and implicate key operational issues impacted by security breaches," he said.
Share:Facebook Twitter Google Plus Stumble Upon Reddit Share This Email this article
The Nokia Devices and Services business helped boost Microsoft's revenue, but hurt profitsmore ..
“Youth doesn’t always equal innocence” says KPMG fraud expertmore ..
Rising competition, pricing pressures and the pound’s rise were to blame for reducing corporate profits, EY saidmore ..
The agency told Facebook that no enforcement action will be taken, the company said in a filingmore ..
In M&A a cyber attack on a target company could have a material impact on its valuemore ..
Pernod Ricard CFO Gilles Bogaert has nailed his 'green' colours to the mastmore ..