Part 248-Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Personal Information, 13692-13719 [E8-4612]
Download as PDF
13692
Federal Register / Vol. 73, No. 50 / Thursday, March 13, 2008 / Proposed Rules
Securities and Exchange Commission,
100 F Street, NE., Washington, DC
20549–1090.
SECURITIES AND EXCHANGE
COMMISSION
17 CFR Part 248
[Release Nos. 34–57427; IC–28178; IA–2712;
File No. S7–06–08]
RIN 3235–AK08
Part 248—Regulation S–P: Privacy of
Consumer Financial Information and
Safeguarding Personal Information
Securities and Exchange
Commission.
ACTION: Proposed rule.
AGENCY:
The Securities and Exchange
Commission (‘‘Commission’’) is
proposing amendments to Regulation
S–P, which implements certain
provisions of the Gramm-Leach-Bliley
Act (‘‘GLBA’’) and the Fair Credit
Reporting Act (‘‘FCRA’’) for entities
regulated by the Commission. The
proposed amendments would set forth
more specific requirements for
safeguarding information and
responding to information security
breaches, and broaden the scope of the
information covered by Regulation S–
P’s safeguarding and disposal
provisions. They also would extend the
application of the disposal provisions to
natural persons associated with brokers,
dealers, investment advisers registered
with the Commission (‘‘registered
investment advisers’’) and transfer
agents registered with the Commission
(‘‘registered transfer agents’’), and
would extend the application of the
safeguarding provisions to registered
transfer agents. Finally, the proposed
amendments would permit a limited
transfer of information to a nonaffiliated
third party without the required notice
and opt out when personnel move from
one broker-dealer or registered
investment adviser to another.
DATES: Comments must be received on
or before May 12, 2008.
ADDRESSES: Comments may be
submitted by any of the following
methods:
mstockstill on PROD1PC66 with PROPOSALS3
SUMMARY:
Electronic Comments
• Use the Commission’s Internet
comment form (https://www.sec.gov/
rules/proposed.shtml); or
• Send an e-mail to rulecomments@sec.gov. Please include File
Number S7–06–08 on the subject line;
or
• Use the Federal eRulemaking Portal
(https://www.regulations.gov). Follow the
instructions for submitting comments.
Paper Comments
• Send paper comments in triplicate
to Nancy M. Morris, Secretary,
VerDate Aug<31>2005
17:19 Mar 12, 2008
Jkt 214001
All submissions should refer to File
Number S7–06–08. This file number
should be included on the subject line
if e-mail is used. To help us process and
review your comments more efficiently,
please use only one method. The
Commission will post all comments on
the Commission’s Internet Web site
(https://www.sec.gov/rules/
proposed.shtml). Comments are also
available for public inspection and
copying in the Commission’s Public
Reference Room, 100 F Street, NE.,
Washington, DC 20549, on official
business days between the hours of 10
a.m. and 3 p.m. All comments received
will be posted without change; we do
not edit personal identifying
information from submissions. You
should submit only information that
you wish to make available publicly.
FOR FURTHER INFORMATION CONTACT:
Catherine McGuire, Chief Counsel, or
Brice Prince, Special Counsel, Office of
the Chief Counsel, Division of Trading
and Markets, (202) 551–5550; or
Penelope Saltzman, Acting Assistant
Director, or Vincent Meehan, Senior
Counsel, Office of Regulatory Policy,
Division of Investment Management,
(202) 551–6792, Securities and
Exchange Commission, 100 F Street,
NE., Washington, DC 20549.
The
Commission today is proposing
amendments to Regulation S–P 1 under
Title V of the GLBA,2 the FCRA,3 the
Securities Exchange Act of 1934 (the
‘‘Exchange Act’’),4 the Investment
Company Act of 1940 (the ‘‘Investment
Company Act’’),5 and the Investment
Advisers Act of 1940 (the ‘‘Investment
Advisers Act’’).6
D. Exception for Limited Information
Disclosure When Personnel Leave Their
Firms
III. General Request for Comments
IV. Paperwork Reduction Act
V. Cost-Benefit Analysis
VI. Initial Regulatory Flexibility Analysis
VII. Consideration of Burden on Competition
and Promotion of Efficiency,
Competition and Capital Formation
VIII. Small Business Regulatory Enforcement
Fairness Act
IX. Statutory Authority
X. Text of Proposed Rules and Rule
Amendments
I. Background
A. Statutory Requirements and Current
Regulation S–P Mandates
Subtitle A of Title V of the GLBA
requires every financial institution to
inform its customers about its privacy
policies and practices, and limits the
circumstances in which a financial
institution may disclose nonpublic
personal information about a consumer
to a nonaffiliated third party without
first giving the consumer an opportunity
to opt out of the disclosure.7 In enacting
the legislation, Congress also
specifically directed the Commission
and other federal financial regulators to
establish and implement information
safeguarding standards requiring
financial institutions subject to their
jurisdiction to adopt administrative,
technical and physical information
safeguards.8 The GLBA specified that
these standards were to ‘‘insure the
SUPPLEMENTARY INFORMATION:
Table of Contents
I. Background
A. Statutory Requirements and Current
Regulation S–P Mandates
B. Challenges Posed by Information
Security Breaches
II. Discussion
A. Information Security and Security
Breach Response Requirements
B. Scope of the Safeguards and Disposal
Rules
C. Records of Compliance
1 17 CFR part 248. Unless otherwise noted, all
references to rules under Regulation S–P will be to
Part 248 of the Code of Federal Regulations (17 CFR
248).
2 15 U.S.C. 6801–6827.
3 15 U.S.C. 1681w.
4 15 U.S.C. 78a.
5 15 U.S.C. 80a.
6 15 U.S.C. 80b.
PO 00000
Frm 00002
Fmt 4701
Sfmt 4702
7 See 15 U.S.C. 6802(a) and (b). The GLBA and
Regulation S–P draw a distinction between
‘‘consumers’’ and ‘‘customers.’’ A ‘‘consumer’’ is
defined in Section 3(g)(1) of Regulation S–P to
mean an individual who obtains a financial product
or service that is to be used primarily for personal,
family, or household purposes. See 17 CFR
248.3(g)(1). A ‘‘customer’’ is defined in Section 3(j)
of Regulation S–P as a consumer who has a
continuing relationship with the financial
institution. See 17 CFR 248.3(j). The distinction
between customer and consumer determines the
notices that a financial institution must provide.
Pursuant to Sections 4 and 5 of Regulation S–P, a
financial institution must provide customers with
an initial notice describing the institution’s privacy
policies when a customer relationship is formed
and at least annually throughout the customer
relationship. In contrast, if a consumer is not a
customer, a financial institution must only provide
a notice if it intends to share nonpublic personal
information about the consumer with a
nonaffiliated third party (outside of certain
exceptions). See 17 CFR 248.4 and 248.5.
8 The GLBA directed the Commission, the Federal
Trade Commission (‘‘FTC’’) and state insurance
authorities to implement the safeguarding standards
by rule. See 15 U.S.C. 6805(b)(2). The GLBA
directed the Office of the Comptroller of the
Currency, the Board of Governors of the Federal
Reserve System, the Federal Deposit Insurance
Corporation (‘‘FDIC’’) and the Office of Thrift
Supervision (collectively, the ‘‘Banking Agencies’’)
and the National Credit Union Administration
(‘‘NCUA’’) to implement the safeguarding standards
by regulation or by guidelines. See 15 U.S.C.
6805(b)(1).
E:\FR\FM\13MRP3.SGM
13MRP3
Federal Register / Vol. 73, No. 50 / Thursday, March 13, 2008 / Proposed Rules
security and confidentiality of customer
records and information,’’ ‘‘protect
against any anticipated threats or
hazards to the security or integrity’’ of
those records, and protect against
unauthorized access to or use of those
records or information, which ‘‘could
result in substantial harm or
inconvenience to any customer.’’ 9
In response to these directives, we
adopted Regulation S–P in 2000.10
Section 30(a) of Regulation S–P (the
‘‘safeguards rule’’) requires institutions
to safeguard customer records and
information,11 while other sections of
the regulation implement the notice and
opt out provisions of the GLBA.12 The
9 15
U.S.C. 6801(b).
Privacy of Consumer Financial Information
(Regulation S–P), Exchange Act Release No. 42974,
Investment Company Act (‘‘ICA’’) Release No.
24543, Investment Advisers Act (‘‘IAA’’) Release
No. 1883 (June 22, 2000), 65 FR 40334 (June 29,
2000). Pursuant to the GLBA directive, Regulation
S–P is consistent with and comparable to the
financial privacy rules adopted by other federal
financial regulators in 2000. See FTC, Privacy of
Consumer Financial Information, 65 FR 33646 (May
24, 2000); Banking Agencies, Privacy of Consumer
Financial Information, 65 FR 35162 (June 1, 2000);
and NCUA, Privacy of Consumer Financial
Information; Requirements for Insurance, 65 FR
31722 (May 18, 2000). See also 15 U.S.C. 6804(a)(2)
(directing federal financial regulators to consult and
coordinate to assure, to the extent possible, that
each agency’s regulations are consistent and
comparable with the regulations prescribed by the
other agencies).
In 2001, we amended Regulation S–P to permit
futures commission merchants and introducing
brokers that are registered by notice as brokerdealers in order to conduct business in security
futures products under Section 15(b)(11)(A) of the
Exchange Act (‘‘notice-registered broker-dealers’’) to
comply with Regulation S–P by complying with
financial privacy rules that the Commodity Futures
Trading Commission (‘‘CFTC’’) adopted that year.
See 17 CFR 248.2(b); Registration of Broker-Dealers
Pursuant to Section 15(b)(11) of the Securities
Exchange Act of 1934, Exchange Act Release No.
44730 (Aug. 21, 2001), 66 FR 45138 (Aug. 27, 2001);
see also CFTC, Privacy of Consumer Financial
Information, 66 FR 21236 (Apr. 27, 2001).
11 17 CFR 248.30(a).
12 See 17 CFR 248.1–248.18. As described above,
the GLBA and Regulation S–P require brokers,
dealers, investment advisers registered with the
Commission, and investment companies to provide
an annual notice of their privacy policies and
practices to their customers (and notice to
consumers before sharing their nonpublic personal
information with nonaffiliated third parties outside
certain exceptions). See supra note 7; 15 U.S.C.
6803(a); 17 CFR 248.4; 17 CFR 248.5. In general, the
privacy notices must describe the institutions’
policies and practices with respect to disclosing
nonpublic personal information about a consumer
to both affiliated and nonaffiliated third parties. 15
U.S.C. 6803; 17 CFR 248.6. The notices also must
provide a consumer a reasonable opportunity to
direct the institution generally not to share
nonpublic personal information about the consumer
(that is, to ‘‘opt out’’) with nonaffiliated third
parties. 15 U.S.C. 6802(b); 17 CFR 248.7. (The
privacy notice also must provide, where applicable
under the FCRA, a notice and an opportunity for
a consumer to opt out of certain information sharing
among affiliates.) Sections 13, 14, and 15 of
Regulation S–P (17 CFR 248.13, 17 CFR 248.14, and
17 CFR 248.15) set out exceptions from these
mstockstill on PROD1PC66 with PROPOSALS3
10 See
VerDate Aug<31>2005
17:19 Mar 12, 2008
Jkt 214001
safeguards rule currently requires
institutions to adopt written policies
and procedures for administrative,
technical, and physical safeguards to
protect customer records and
information. The safeguards must be
reasonably designed to meet the GLBA’s
objectives.13 This approach provides
flexibility for institutions to safeguard
customer records and information in
accordance with their own privacy
policies and practices and business
models. The safeguards rule and the
notice and opt out provisions currently
apply to brokers, dealers, registered
investment advisers, and investment
companies.14
Pursuant to the Fair and Accurate
Credit Transactions Act of 2003 (‘‘FACT
Act’’), the Commission amended
Regulation S–P in 2004 to protect
against the improper disposal of
consumer report information.15 Section
general notice and opt out requirements under the
GLBA. Section 13 includes exceptions for sharing
information with other financial institutions under
joint marketing agreements and with certain service
providers. Section 14 includes exceptions for
sharing information for everyday business
purposes, such as maintaining or servicing
accounts. Section 15 includes exceptions for
disclosures made with the consent or at the
direction of a consumer, disclosures for particular
purposes such as protecting against fraud,
disclosures to consumer reporting agencies, and
disclosures to law enforcement agencies. In March
2007, the Commission, together with the Banking
Agencies, the CFTC, the FTC, and the NCUA,
published for public comment in the Federal
Register a proposed model privacy form that
financial institutions could use for their privacy
notices to consumers required by the GLBA. See
Interagency Proposal for Model Privacy Form Under
the Gramm-Leach-Bliley Act, Exchange Act Release
No. 55497, IAA Release No. 2598, ICA Release No.
27755 (Mar. 20, 2007), 72 FR 14940 (Mar. 29, 2007)
(‘‘Interagency Model Privacy Form Proposal’’).
13 Specifically, the safeguards must be reasonably
designed to insure the security and confidentiality
of customer records and information, protect
against anticipated threats to the security or
integrity of those records and information, and
protect against unauthorized access to or use of
such records or information that could result in
substantial harm or inconvenience to any customer.
See supra note 9 and accompanying text.
14 Regulation S–P applies to investment
companies as the term is defined in Section 3 of the
Investment Company Act (15 U.S.C. 80a–3),
whether or not the investment company is
registered with the Commission. See 17 CFR
248.3(r). Thus, a business development company,
which is an investment company but is not required
to register as such with the Commission, is subject
to Regulation S–P. In this release, institutions to
which Regulation S–P currently applies, or to
which the proposed amendments would apply, are
sometimes referred to as ‘‘covered institutions.’’
15 17 CFR 248.30(b). Section 216 of the FACT Act
amended the FCRA by adding Section 628 (codified
at 15 U.S.C. 1681w), which directed the
Commission and other federal financial regulators
to adopt regulations for the proper disposal of
consumer information, and provides that any
person who maintains or possesses consumer
information or any compilation of consumer
information derived from a consumer report for a
business purpose must properly dispose of the
PO 00000
Frm 00003
Fmt 4701
Sfmt 4702
13693
30(b) of Regulation S–P (the ‘‘disposal
rule’’) currently applies to the
institutions subject to the other
provisions of Regulation S–P, except
that it excludes notice-registered brokerdealers and includes registered transfer
agents.
B. Challenges Posed by Information
Security Breaches
In recent years, we have become
concerned with the increasing number
of information security breaches that
have come to light and the potential for
identity theft and other misuse of
personal financial information. Once
seemingly confined mainly to
commercial banks and retailers, this
problem has spread throughout the
business community, including the
securities industry.16
In the last two years, we have seen a
significant increase in information
security breaches involving institutions
we regulate. Perhaps most disturbing is
the increase in incidents involving the
takeover of online brokerage accounts,
including the use of the accounts by
foreign nationals as part of ‘‘pump-anddump’’ schemes.17 The financial
information. See Disposal of Consumer Report
Information, Exchange Act Release No. 50781, IAA
Release No. 2332, ICA Release No. 26685 (Dec. 2,
2004), 69 FR 71322 (Dec. 8, 2004) (‘‘Disposal Rule
Adopting Release’’). When we adopted the disposal
rule, we also amended Regulation S–P to require
that the policies and procedures institutions must
adopt under the safeguards rule be in writing.
The disposal rule requires transfer agents
registered with the Commission, as well as brokers
and dealers other than notice-registered brokerdealers, investment advisers registered with the
Commission, and investment companies that
maintain or possess ‘‘consumer report information’’
for a business purpose, to take ‘‘reasonable
measures to protect against unauthorized access to
or use of the information in connection with its
disposal.’’
In order to provide clarity, the Disposal Rule
Adopting Release included five examples intended
to provide guidance on disposal measures that
would be deemed reasonable under the disposal
rule. See Disposal Rule Adopting Release at section
II.A.2.
16 See Press Release, NASD, NASD Warns
Investors to Protect Online Account Information,
Brokerages Also Reminded of Obligation to Protect
Customer Information from New Threats (July 28,
2005), https://www.finra.org/PressRoom/
NewsReleases/2005NewsReleases/P014775 (last
visited Nov. 6, 2007). See also In re NEXT Financial
Group, Inc., Exchange Act Release No. 56316 (Aug.
24, 2007), https://www.sec.gov/litigation/admin/
2007/34-56316.pdf, and Order Instituting
Administrative and Cease-and-Desist Proceedings
Pursuant to Sections 15(b) and 21C of the Securities
Exchange Act of 1934 (Aug. 24, 2007) (alleging
violations of the notice and opt out provisions of
Regulation S–P and the safeguards rule in
connection with recruiting registered
representatives), https://www.sec.gov/litigation/
admin/2007/34-56316-o.pdf.
17 While some account takeovers may have been
facilitated by investors failing to take adequate
precautions against security threats such as
E:\FR\FM\13MRP3.SGM
Continued
13MRP3
13694
Federal Register / Vol. 73, No. 50 / Thursday, March 13, 2008 / Proposed Rules
mstockstill on PROD1PC66 with PROPOSALS3
services sector also is a popular target
for online targeted attacks, and
‘‘phishing’’ attacks in which fraudsters
set up an Internet site designed to
mimic a legitimate site and induce
random Internet users to disclose
personal information.18 In other recent
incidents, registered representatives of
broker-dealers disposed of information
and records about clients or prospective
clients in accessible areas, from which
journalists were able to remove them.
Sensitive securities-related data also has
been lost or stolen as a result of other
incidents.19
‘‘keylogger’’ programs and ‘‘phishing’’ attacks,
many online brokerage firms have successfully
reduced their exposure to account takeovers by
improving their authentication and monitoring
procedures. The Commission has been active in this
area, and has brought several enforcement cases
involving defendants in foreign jurisdictions. See,
e.g., Litigation Release No. 20037 (Mar. 12, 2007),
available at https://www.sec.gov/litigation/
litreleases/2007/lr20037.htm (three Indian nationals
charged with participating in an alleged fraudulent
scheme to manipulate the prices of at least fourteen
securities through the unauthorized use of other
people’s online brokerage accounts); and Litigation
Release No. 19949 (Dec. 19, 2006), available at
https://www.sec.gov/litigation/litreleases/2006/
lr19949.htm (emergency asset freeze obtained;
complaint alleged an alleged Estonia-based account
intrusion scheme that targeted online brokerage
accounts in the U.S. to manipulate the markets).
18 In 2006, Symantec Corporation, a seller of
information security and information management
software, reported that in the first half of 2006, 84
percent of tracked phishing sites targeted the
financial sector and 9 of the top 10 brands phished
this period were from the financial sector. Because
the financial services sector is a logical target for
attackers increasingly motivated by financial gain,
that sector was also the second most frequent target
of Internet-based attacks (after home users). See
Symantec, Symantec Internet Security Threat
Report, Trends for January 06–June 06, at 9, 23
(Sept. 2006), https://www.symantec.com/specprog/
threatreport/ent-whitepaper_symantec_internet
_security_threat_report_x_09_2006.en-us.pdf (last
visited Nov. 6, 2007) (‘‘Symantec September 2006
Internet Security Threat Report’’). Reportedly,
employees of financial services firms ‘‘are
increasingly being invited to visit Web sites or
download programs by people pretending to be
colleagues or peers,’’ followed by attack programs
on the sites or in downloads that ‘‘then open
tunnels into the corporate network.’’ More recently,
although financial services-related spam reportedly
‘‘made up 21 percent of all spam in the first six
months of 2007, making it the second most common
type of spam during this period,’’ there was a 30percent decline in stock market ‘‘pump and dump’’
spam ‘‘due to a decline in spam touting penny
stocks that was triggered by actions taken by the
United States Securities and Exchange Commission,
which limited the profitability of this type of spam
by suspending trading of the stocks that are touted.’’
See Symantec, Symantec Internet Security Threat
Report, Trends for January–June 07, Volume XII, at
107 (Sept. 2007), https://eval.symantec.com/
mktginfo/enterprise/white_papers/ent-whitepaper
_internet_security_threat_report_xii_09_2007.enus.pdf (last visited Nov. 6, 2007) (citing
Commission Press Release 2007–34, SEC Suspends
Trading Of 35 Companies Touted In Spam E-mail
Campaigns (Mar. 8, 2007), available at https://
www.sec.gov/news/press/2007/2007-34.htm).
19 For example, in April 2005, a shipping
company lost a computer backup tape containing
VerDate Aug<31>2005
19:21 Mar 12, 2008
Jkt 214001
Many firms in the securities industry
are aware of these problems and have
appropriate safeguards in place to
address them.20 We are concerned,
however, that some firms do not
regularly reevaluate and update their
safeguarding programs to deal with
these increasingly sophisticated
methods of attack.21 For this reason, and
in light of the increase in reported
security breaches and the potential for
identity theft among the institutions we
regulate, we believe that our previous
approach, requiring safeguards that
must be reasonably designed to meet the
GLBA’s objectives, merits revisiting.22
account information for more than 200,000 brokerdealer customers. The broker-dealer voluntarily
notified its affected customers, although the data
was compressed and the tape was thought to have
been destroyed. In December 2005, a laptop
computer containing unencrypted information that
included names and account numbers of 158,000
customers and the names and Social Security
numbers of 68,000 adviser personnel was stolen
from a registered investment adviser, and in March
2006, a laptop computer containing the names,
addresses, Social Security numbers, dates of birth,
and other employment-related information of as
many as 196,000 retirement plan participants was
stolen from a benefits plan administration
subsidiary of a registered investment adviser. In
both cases, the laptops were taken from vehicles by
thieves who appear to have stolen them for their
value as computer hardware rather than for the
information contained on them. The registered
investment adviser voluntarily notified the more
than 200,000 clients and financial advisers whose
information was compromised, while the benefits
plan administrator voluntarily notified the nearly
200,000 retirement plan participants whose
information was compromised, and offered to pay
for a year of credit monitoring for each of them.
20 Some institutions regulated by the Commission
have already taken steps to strengthen their policies
and procedures for safeguarding investors’
information, such as by offering investors the use
of password-generating tokens for online brokerage
accounts. We also note that some firms have been
sharing information about suspicious activity with
one another for the purpose of combating identity
theft. To the extent it might involve sharing
nonpublic personal information about consumers of
the firms, Regulation S–P does not prohibit such
information sharing because Section 15(a)(2)(ii) of
Regulation S–P permits firms to disclose nonpublic
personal information to a nonaffiliated third party
for the purpose of protecting against fraud without
first giving consumers notice of and an opportunity
to opt out of the disclosures.
21 According to a September 2007 report from
Deloitte Touche Tohmatsu, for example, 37 percent
of 169 surveyed financial institutions do not have
an information security strategy in place, and 33
percent of these institutions do not conduct
vulnerability testing, or only do so on an ad hoc
basis. See Deloitte Touche Tohmatsu, 2007 Global
Security Survey, at 12, 36 (Sept. 2007), https://
www.deloitte.com/dtt/cda/doc/content/dtt_gfsi
_GlobalSecuritySurvey_20070901%281%29.pdf
(last visited Nov. 6, 2007).
22 In 2004 we sought comment on whether to
revise our safeguards rule to require institutions to
address certain elements in designating their
safeguarding policies and procedures. See Disposal
of Consumer Report Information, Exchange Act
Release No. 50361, IAA Release No. 2293, ICA
Release No. 20596 (Sept. 14, 2004), 69 FR 56304
(Sept. 20, 2004) (‘‘Disposal Rule Proposing
Release’’), at section II.B. At that time we decided
PO 00000
Frm 00004
Fmt 4701
Sfmt 4702
We also are concerned that while the
information protected under the
safeguards rule and the disposal rule
includes certain personal information, it
does not include other information that
could be used to access investors’
financial information if obtained by an
unauthorized user. Finally we want to
address other issues under Regulation
S–P that have come to our attention,
including the application of the
regulation to situations in which a
representative of one broker-dealer or
registered investment adviser moves to
another firm. Accordingly, today we are
proposing amendments to the
safeguards and disposal rules that are
designed to address these concerns.
II. Discussion
To help prevent and address security
breaches in the securities industry and
thereby better protect investor
information, we propose to amend
Regulation S–P in four principal ways.
First, we propose to require more
specific standards under the safeguards
rule, including standards that would
apply to data security breach incidents.
Second, we propose to amend the scope
of the information covered by the
safeguards and disposal rules and to
broaden the types of institutions and
persons covered by the rules. Third, we
propose to require institutions subject to
the safeguards and disposal rules to
maintain written records of their
policies and procedures and their
compliance with those policies and
procedures. Finally, we are taking this
opportunity to propose a new exception
from Regulation S–P’s notice and optout requirements to allow investors
more easily to follow a representative
who moves from one brokerage or
advisory firm to another.
A. Information Security and Security
Breach Response Requirements
To help prevent and address security
breaches at the institutions we regulate,
we propose to require more specific
standards for safeguarding personal
information, including standards for
responding to data security breaches.
When we adopted Regulation S–P in
2001, the safeguards rule simply
required institutions to adopt policies
and procedures to address the
safeguarding objectives stated in the
GLBA. Following our adoption of the
rule, the FTC and the Banking Agencies
issued regulations with more detailed
standards for safeguarding customer
not to revise the safeguards rule, but noted we
would consider the comments we received in the
event we proposed any amendment to the rule. See
Disposal Rule Adopting Release, supra note 15, at
section II.B. See also infra note 31.
E:\FR\FM\13MRP3.SGM
13MRP3
Federal Register / Vol. 73, No. 50 / Thursday, March 13, 2008 / Proposed Rules
records and information applicable to
the institutions they regulate.23 We
believe these standards include
necessary elements that institutions
should address when adopting and
implementing safeguarding policies and
procedures. We have therefore looked to
the other agencies’ standards in
developing our proposal and tailored
them, where appropriate, to develop
proposed standards for the institutions
we regulate.
mstockstill on PROD1PC66 with PROPOSALS3
1. Revised Safeguarding Policies and
Procedures
As noted above, the safeguards rule
requires institutions to adopt written
policies and procedures that address
administrative, technical and physical
safeguards to protect customer records
and information. The proposed
amendments would further develop this
requirement by requiring each
institution subject to the safeguards rule
to develop, implement, and maintain a
comprehensive ‘‘information security
program,’’ including written policies
and procedures that provide
administrative, technical, and physical
safeguards for protecting personal
information, and for responding to
23 The Banking Agencies issued their guidelines
for safeguarding customer records and information
in 2001. See Interagency Guidelines Establishing
Standards for Safeguarding Customer Information
and Rescission of Year 2000 Standards for Safety
and Soundness, 66 FR 8616 (Feb. 1, 2001)
(‘‘Banking Agencies’’ Security Guidelines’’). The
FTC adopted its safeguards rule in 2002. See
Standards for Safeguarding Customer Information,
67 FR 36484 (May 23, 2002) (‘‘FTC Safeguards
Rule’’). The Banking Agencies also have jointly
issued guidance on responding to incidents of
unauthorized access or use of customer
information. See Interagency Guidance on Response
Programs for Unauthorized Access to Customer
Information and Customer Notice, 70 FR 15736
(Mar. 29, 2005) (‘‘Banking Agencies’’ Incident
Response Guidance’’). More recently, through the
Federal Financial Institutions Examination Council
(‘‘FFIEC’’), the Banking Agencies jointly issued
guidance on the authentication of customers in an
Internet banking environment, and the Banking
Agencies and the FTC jointly issued final rules and
guidelines for identity theft ‘‘red flags’’ programs to
detect, prevent, and mitigate identity theft in
connection with the opening of certain accounts or
certain existing accounts. See FFIEC,
Authentication in an Internet Banking Environment
(July 27, 2006), available at www.ffiec.gov/pdf/
authentication_guidance.pdf (‘‘Authentication
Guidance’’); Banking Agencies and FTC, Identity
Theft Red Flags and Address Discrepancies under
the Fair and Accurate Credit Transactions Act of
2003, 72 FR 63718 (Nov. 9, 2007) (‘‘Final Red Flag
Rules’’). See also Banking Agencies and FTC,
Identity Theft Red Flags and Address Discrepancies
Under the Fair and Accurate Credit Transactions
Act of 2003, 71 FR 40785 (July 18, 2006) (‘‘Proposed
Red Flag Guidelines’’). In March of this year, the
FTC also published a brochure on data security,
Protecting Personal Information: A Guide for
Business (available at https://www.ftc.gov/
infosecurity/), and the FDIC issued a Supervisory
Policy on Identity Theft, FIL–32–2007 (Apr. 11,
2007), available at https://www.fdic.gov/news/news/
financial/2007/fil07032a.html.
VerDate Aug<31>2005
17:19 Mar 12, 2008
Jkt 214001
unauthorized access to or use of
personal information.24 This program
would have to be appropriate to the
institution’s size and complexity, the
nature and scope of its activities, and
the sensitivity of any personal
information at issue.25 Consistent with
current requirements for safeguarding
policies and procedures, the
information security program also
would have to be reasonably designed
to: (i) Ensure the security and
confidentiality of personal information;
(ii) protect against any anticipated
threats or hazards to the security or
integrity of personal information; and
(iii) protect against unauthorized access
to or use of personal information that
could result in substantial harm or
inconvenience to any consumer,
employee, investor or securityholder
who is a natural person.26 Although the
term ‘‘substantial harm or
inconvenience’’ is currently used in the
safeguards rule, it is not defined. We
propose to define the term to mean
‘‘personal injury, or more than trivial
financial loss, expenditure of effort or
loss of time.’’ 27 This definition is
intended to include harms other than
identity theft that may result from
failure to safeguard sensitive
information about an individual. For
example, a hacker could use
confidential information about an
individual for extortion by threatening
to make the information public unless
the individual agrees to the hacker’s
demands. ‘‘Substantial harm or
inconvenience’’ would not include
‘‘unintentional access to personal
information by an unauthorized person
that results only in trivial financial loss,
expenditure of effort or loss of time,’’
such as if use of the information results
in an institution deciding to change the
individual’s account number or
password.28 The rule would provide an
24 As amended, Section 30 would be titled,
‘‘Information security programs for personal
information; records of compliance.’’
25 See proposed paragraph (a)(1) of Section 30.
The term ‘‘information security program’’ would
mean the administrative, technical, or physical
safeguards used to access, collect, distribute,
process, protect, store, use, transmit, dispose of, or
otherwise handle personal information. See
proposed paragraph (d)(6) of Section 30.
26 See proposed paragraph (a)(2) of Section 30.
Compare 17 CFR 248.30(a)(1)–(3).
27 See proposed paragraph (d)(12) of Section 30.
‘‘Substantial harm or inconvenience’’ would
include theft, fraud, harassment, impersonation,
intimidation, damaged reputation, impaired
eligibility for credit, or the unauthorized use of the
information identified with an individual to obtain
a financial product or service, or to access, log into,
effect a transaction in, or otherwise use the
individual’s account.
28 See proposed paragraph (d)(12)(ii) of Section
30. Thus, for example the proposed definition
would not encompass a firm’s occasional,
PO 00000
Frm 00005
Fmt 4701
Sfmt 4702
13695
example of what would not constitute
harm or inconvenience that rises to the
level of ‘‘substantial,’’ which should
help clarify the scope of what would
constitute ‘‘substantial harm or
inconvenience.’’
The proposed amendments also
would specify particular elements that a
program meeting the requirements of
Regulation S–P must include.29 These
elements are intended to provide firms
in the securities industry with detailed
standards for the policies and
procedures that a well-designed
information security program should
include to address recent identity theftrelated incidents such as firms in the
securities industry losing data tapes and
laptop computers and failing to dispose
properly of sensitive personal
information, and hackers hijacking
online brokerage accounts.30 These
elements also are intended to maintain
consistency with information
safeguarding guidelines and rules
adopted by the Banking Agencies and
unintentional delivery of an individual’s account
statement to an incorrect address if the institution
determined that the information was highly
unlikely to be misused. This determination would
have to be made promptly after the institution
becomes aware of an incident of unauthorized
access to sensitive personal information, and
documented in writing. See proposed paragraph
(a)(4)(iii) of Section 30.
29 Many of these elements are addressed by
widely accepted information security standards.
See, e.g., National Institute of Standards and
Technology (‘‘NIST’’), Special Publication 800
series (Computer Security), for example Generally
Accepted Principals and Practices for Securing
Information Technology Systems (SP 800–14) (Sept.
1996), Guide to Intrusion Detection and Prevention
Systems (IDPS) (SP 800–94) (Feb. 2007), and Guide
to Secure Web Services (SP 800–95) (Aug. 2007) (all
available at https://csrc.nist.gov/publications/
PubsSPs.html), and bulletins dealing with computer
security published by the NIST’s Information
Technology Laboratory (ITL), for example Secure
Web Servers: Protecting Web Sites That Are
Accessed By The Public (ITL January 2008)
(available at https://csrc.nist.gov/publications/
PubsITLSB.html); Federal Information System
Controls Audit Manual, General Accounting Office,
Accounting and Information Management Division,
Federal Information System Controls Audit Manual,
GAO/AIMD–12.19.6 (known as ‘‘FISCAM’’) (Jan.
1999) (available at https://www.gao.gov/
special.pubs/ai12.19.6.pdf); International
Organization for Standardization, Code of Practice
for Information Security Management (ISO/IEC
27002:2005) (known among information security
professionals as the ‘‘British Standard,’’ and
formerly designated BS ISO/IEC 17799:2005 and BS
7799–1:2005) (available for purchase at https://
www.standardsdirect.org/iso17799.htm and at
https://www.bsi-global.com/en/Shop/PublicationDetail/?pid=000000000030166440); and
Information Systems Audit and Control
Association/IT Governance Institute, Control
Objectives for Information and Related Technology
(known as ‘‘COBIT’’) (last updated, and published
as version 4.1, May 2007) (available at https://
www.isaca.org).
30 See supra notes 16–19 and accompanying text.
E:\FR\FM\13MRP3.SGM
13MRP3
13696
Federal Register / Vol. 73, No. 50 / Thursday, March 13, 2008 / Proposed Rules
mstockstill on PROD1PC66 with PROPOSALS3
FTC.31 In addition, these elements are
consistent with policies and procedures
we understand many institutions in the
securities industry have already
adopted. We understand that large and
complex organizations generally have
written policies that address
information safeguarding procedures at
several layers, from an organizationwide policy statement to detailed
procedures that address particular
controls.32
Institutions subject to the rule would
be required to:
(i) Designate in writing an employee
or employees to coordinate the
information security program; 33
(ii) Identify in writing reasonably
foreseeable security risks that could
result in the unauthorized disclosure,
misuse, alteration, destruction or other
compromise of personal information or
personal information systems; 34
(iii) Design and document in writing
and implement information safeguards
to control the identified risks; 35
(iv) Regularly test or otherwise
monitor and document in writing the
effectiveness of the safeguards’ key
controls, systems, and procedures,
including the effectiveness of access
controls on personal information
systems, controls to detect, prevent and
respond to attacks, or intrusions by
unauthorized persons, and employee
training and supervision; 36
31 See Banking Agencies’ Security Guidelines and
FTC Safeguards Rule, supra note 23. As noted
above, we sought comment on whether to revise our
safeguards rule in 2004. See supra note 22. At that
time, several commenters noted that Rule 206(4)–
7 under the Investment Advisers Act (17 CFR
275.206(4)–7) and Rule 38a–1 under the Investment
Company Act (17 CFR 270.38a–1) require registered
investment advisers and registered investment
companies to have written policies and procedures
reasonably designed to prevent violation of the
federal securities laws, including safeguards for the
protection of customer records and information
under Regulation S–P. These rules also require
registered investment advisers and funds to review,
no less frequently than annually, the adequacy of
these policies and procedures. See Comment Letter
of the Investment Counsel Association of America
(Oct. 20, 2004), at p. 3; Comment Letter of the
Investment Company Institute (Oct. 20, 2004) at p.
2. Each of these letters is available at https://
www.sec.gov/comments/s73304.shtml. We do not
intend for the proposed amendments to alter or
conflict with these requirements.
32 See Disposal Rule Proposing Release, supra
note 22, at 69 FR 56308 & n.29.
33 See proposed paragraph (a)(3)(i) of Section 30.
Of course, the employee or employees designated
to coordinate an institution’s information security
program would need to have sufficient authority
and access to the institution’s managers, officers
and directors to effectively implement the program
and modify it as necessary.
34 See proposed paragraph (a)(3)(ii) of Section 30.
The term ‘‘personal information system’’ would
mean any method used to access, collect, store, use,
transmit, protect or dispose of personal information.
See proposed paragraph (d)(9) of Section 30.
35 See proposed paragraph (a)(3)(iii) of Section 30.
36 See proposed paragraph (a)(3)(iv) of Section 30.
VerDate Aug<31>2005
17:19 Mar 12, 2008
Jkt 214001
(v) Train staff to implement the
information security program; 37
(vi) Oversee service providers by
taking reasonable steps to select and
retain service providers capable of
maintaining appropriate safeguards for
the personal information at issue, and
require service providers by contract to
implement and maintain appropriate
safeguards (and document such
oversight in writing); 38 and
(vii) Evaluate and adjust their
information security programs to reflect
the results of the testing and monitoring,
relevant technology changes, material
changes to operations or business
arrangements, and any other
circumstances that the institution
knows or reasonably believes may have
a material impact on the program.39
The term ‘‘service provider’’ would
mean any person or entity that receives,
maintains, processes, or otherwise is
permitted access to personal
information through its provision of
services directly to a person subject to
the rule.40 We understand that in large
financial complexes, a particular
affiliate may be responsible for
providing a particular service for all
affiliates in the complex. In that
circumstance, each financial institution
subject to Regulation S–P would be
responsible for taking reasonable steps
to ensure that the service provider is
capable of maintaining appropriate
safeguards and of overseeing the service
provider’s implementation,
maintenance, evaluation, and
modifications of appropriate safeguards
for the institution’s personal
information. Under the proposed
amendments, we anticipate that a
covered institution’s reasonable steps to
evaluate the information safeguards of
service providers could include the use
of a third-party review of those
safeguards such as a Statement of
37 See
proposed paragraph (a)(3)(v) of Section 30.
proposed paragraph (a)(3)(vi) of Section 30.
39 See proposed paragraph (a)(3)(vii) of Section
30. This requirement is similar to the requirement
in the Banking Agencies’ Security Guidelines that
institutions covered by those guidelines monitor,
evaluate, and adjust, as appropriate, their
information security program in light of any
relevant changes in technology, the sensitivity of
their customer information, internal or external
threats to information, and their own changing
business arrangements, such as mergers and
acquisitions, alliances and joint ventures,
outsourcing arrangements, and changes to customer
information systems. See supra note 23, Banking
Agencies’ Security Guidelines, 66 FR at 8634, 8635–
36, 8637, 8639, 8641. The ‘‘material impact’’
standard in proposed paragraph (a)(3)(iii) is
intended to require adjustment of a covered
institution’s information security program only
when a reasonable coordinator of the program
would consider adjusting the program important in
light of changing circumstances.
40 See proposed paragraph (d)(11) of Section 30.
38 See
PO 00000
Frm 00006
Fmt 4701
Sfmt 4702
Auditing Standards No. 70 (‘‘SAS 70’’)
report, a SysTrust report, or a WebTrust
report.41
We request comment on the proposed
specific standards for safeguarding
personal information.
• Would these standards provide
sufficient direction to institutions? Are
there particular standards that should be
more or less prescriptive? For example,
should institutions be required to
designate an employee or employees to
coordinate the information security
program by name, or should institutions
be permitted to make these designations
by position or office?
• Would additional standards be
appropriate or are certain standards
unnecessary? Should the proposed
standards be modified to more closely
or less closely resemble standards
prescribed by the Banking Agencies or
the FTC? For the securities industry, are
there any other standards that a welldesigned information security program
should address? Are there any other
standards that would provide more
flexibility to covered institutions?
• We also invite comment on the
proposed requirement that entities
assess the sufficiency of safeguards in
place, to control reasonably foreseeable
risks. Should the rules include more
detailed standards and specifications for
access controls? Should the requirement
specify factors such as those identified
in the Banking Agencies’ guidance
regarding authentication in an Internet
banking environment or include
policies and procedures such as those in
the Banking Agencies and the FTC’s
proposed or final ‘‘red flag’’
requirements? 42 For example, should
we require that covered institutions
implement multifactor authentication,
layered security, or other controls for
high-risk transactions involving access
to customer information or the
movement of funds to third parties?
Should we require that covered
institutions include in their information
security programs ‘‘red flag’’ elements
41 See Codification of Accounting Standards and
Procedures, Statement on Auditing Standards No.
70, Reports on Processing of Transactions by
Service Organizations (American Inst. of Certified
Public Accountants). See also description and
comparison of these reports at https://infotech.
aicpa.org/Resources/System+Security+and+
Reliability/System+Reliability/Principles+
of+a+Reliable+System/SAS+No+70+SysTrust+
and+WebTrust+A+Comparison.htm.
42 See Authentication Guidance, Proposed Red
Flag Guidance, and Final Red Flag Rules, supra
note 23. The Authentication Guidance has been
credited with helping to curtail online banking
fraud, but has been characterized as not adequately
addressing authentication in the context of
telephone banking. See Daniel Wolfe, How New
Authentication Systems are Altering Fraud Picture,
Amer. Banker (Dec. 26, 2007).
E:\FR\FM\13MRP3.SGM
13MRP3
Federal Register / Vol. 73, No. 50 / Thursday, March 13, 2008 / Proposed Rules
mstockstill on PROD1PC66 with PROPOSALS3
that would be relevant to detecting,
preventing and mitigating identity theft
in connection with the opening of
accounts or existing accounts, or in
connection with particular types of
accounts associated with a reasonably
foreseeable risk of identity theft? Should
we require that covered institutions
adopt policies and procedures for
evaluating changes of address followed
closely by an account change or
transaction, or for processing address
discrepancy notices from consumer
reporting agencies? If the rule were to
include more detailed standards and
specifications for access controls, how
should these apply to business
conducted by telephone?
• Commenters are invited to discuss
the proposed definition of ‘‘substantial
harm or inconvenience.’’ Are there
circumstances that commenters believe
would create substantial harm or
inconvenience to individuals that
would not meet the proposed
definition? If so, how should the
definition be revised to address these
circumstances?
• Commenters are invited to discuss
the proposed requirements for written
documentation of compliance with the
proposed safeguarding provisions.
• Commenters are invited to discuss
the proposed definition of ‘‘service
provider.’’ They also are invited to
discuss whether, if the proposed
amendments are adopted, they should
include or be accompanied by guidance
on the use of outside evaluations of
third-party service providers. For
example, should the Commission
provide guidance similar to that
provided by the FFIEC on the
appropriate use of SAS 70 reports in
evaluating the information safeguards of
service providers? 43
43 The FFIEC provided the following guidance on
the use of SAS 70 reports in the oversight of thirdparty service providers (‘‘TSPs’’) by financial
institutions regulated by FFIEC member agencies:
Financial institutions should ensure TSPs
implement and maintain controls sufficient to
appropriately mitigate risk. In higher-risk
relationships the institution by contract may
prescribe minimum control and reporting
standards, obtain the right to require changes to
standards as external and internal environments
change, and obtain access to the TSP for institution
or independent third-party evaluations of the TSP’s
performance against the standard. In lower risk
relationships the institution may prescribe the use
of standardized reports, such as trust services
reports or a Statement of Auditing Standards 70
(SAS 70) report.
*
*
*
*
*
Financial institutions should carefully and
critically evaluate whether a SAS 70 report
adequately supports their oversight responsibilities.
The report may not provide a thorough test of
security controls and security monitoring unless
requested by the TSP. It may not address the
effectiveness of the security process in continually
VerDate Aug<31>2005
17:19 Mar 12, 2008
Jkt 214001
13697
2. Data Security Breach Response
Because of the potential for harm or
inconvenience to individuals when a
data security breach occurs, we are
proposing that information security
programs include procedures for
responding to incidents of unauthorized
access to or use of personal information.
These procedures would include notice
to affected individuals if misuse of
sensitive personal information has
occurred or is reasonably possible. The
procedures would also include notice to
the Commission (or for certain brokerdealers, their designated examining
authority 44) under circumstances in
which an individual identified with the
information has suffered substantial
harm or inconvenience or an
unauthorized person has intentionally
obtained access to or used sensitive
personal information. The proposed
rules that would require prompt notice
of information security breach incidents
to individuals, as well as the
Commission or designated examining
authorities, are intended to facilitate
swift and appropriate action to
minimize the impact of the security
breach.
The data security breach response
provisions of the proposed amendments
include elements intended to provide
firms in the securities industry with
detailed standards for responding to a
breach so as to protect against
unauthorized use of compromised data.
The proposed standards would specify
procedures a covered institution’s
information security program would
need to include. These procedures
would be required to be written to
provide clarity for firm personnel and to
facilitate Commission and SRO
examination and inspection. The
proposed standards are intended to
ensure that covered institutions adopt
plans for responding to an information
security breach incident so as to
minimize the risk of identity theft or
other significant investor harm or
inconvenience from the incident. These
proposed procedures also are intended
to be consistent with security breach
notification guidelines adopted by the
Banking Agencies.45
Under the proposed amendments,
institutions subject to the rule would be
required to have written procedures to:
(i) Assess any incident involving
unauthorized access or use, and identify
in writing what personal information
systems and what types of personal
information may have been
compromised; 46
(ii) Take steps to contain and control
the incident to prevent further
unauthorized access or use and
document all such steps taken in
writing; 47
(iii) Promptly conduct a reasonable
investigation and determine in writing
the likelihood that the information has
been or will be misused after the
institution becomes aware of any
unauthorized access to sensitive
personal information; 48 and
(iv) Notify individuals with whom the
information is identified as soon as
possible (and document the provision of
such notification in writing) if the
institution determines that misuse of the
information has occurred or is
reasonably possible.49
We propose to define the term,
‘‘sensitive personal information,’’ to
mean ‘‘any personal information, or any
combination of components of personal
information, that would allow an
unauthorized person to use, log into, or
access an individual’s account, or to
establish a new account using the
individual’s identifying information,’’
including the individual’s Social
Security number, or any one of the
individual’s name, telephone number,
street address, e-mail address, or online
user name, in combination with any one
mitigating changing risks. Additionally, the SAS 70
report may not address whether the TSP is meeting
the institution’s specific risk mitigation
requirements. Therefore, the contracting oversight
exercised by financial institutions may require
additional tests, evaluations, and reports to
appropriately oversee the security program of the
service provider.
FFIEC, FFIEC IT Examination Handbook,
Information Security Booklet—July 2006, at 77, 78
(available at https://www.ffiec.gov/ffiecinfobase/
booklets/information_security/information_
security.pdf).
44 A broker-dealer’s designated examining
authority is the self-regulatory organization (‘‘SRO’’)
of which the broker-dealer is a member, or, if the
broker-dealer is a member of more than one SRO,
the SRO designated by the Commission pursuant to
17 CFR 240.17d–1 as responsible for examination
of the member for compliance with applicable
financial responsibility rules (including the
Commission’s customer account protection rules at
17 CFR 240.15c3–3).
45 See Banking Agencies’ Incident Response
Guidance, supra note 23.
46 See proposed paragraph (a)(4)(i) of Section 30.
47 See proposed paragraph (a)(4)(ii) of Section 30.
48 See proposed paragraph (a)(4)(iii) of Section 30.
49 See proposed paragraph (a)(4)(iv) of Section 30.
Notification could be delayed, however, if an
appropriate law enforcement agency determines
that notification will interfere with a criminal
investigation and requests in writing a delay in
notification. We propose to require notification of
individuals only if misuse of the compromised
information has occurred or is reasonably possible
to avoid requiring notification in circumstances in
which there is no significant risk of substantial
harm or inconvenience. If covered institutions were
required to notify individuals of every instance of
unauthorized access or use, such as if an employee
accidentally opened and quickly closed an
electronic account record, individuals could receive
an excessive number of data breach notifications
and become desensitized to incidents that pose a
real risk of identity theft.
PO 00000
Frm 00007
Fmt 4701
Sfmt 4702
E:\FR\FM\13MRP3.SGM
13MRP3
13698
Federal Register / Vol. 73, No. 50 / Thursday, March 13, 2008 / Proposed Rules
of the individual’s account number,
credit or debit card number, driver’s
license number, credit card expiration
date or security code, mother’s maiden
name, password, personal identification
number, biometric authentication
record, or other authenticating
information.50 This definition is
intended to cover the types of
information that would be most useful
to an identity thief, and to which
unauthorized access would create a
reasonable possibility of substantial
harm or inconvenience to an affected
individual.
The amendments also would require
an institution to provide notice to the
Commission as soon as possible after
the institution becomes aware of any
incident of unauthorized access to or
use of personal information in which
there is a significant risk that an
individual identified with the
information might suffer substantial
harm or inconvenience, or in which an
unauthorized person has intentionally
obtained access to or used sensitive
personal information.51 This
requirement would allow Commission
and SRO investigators or examiners to
review the notices to determine if an
immediate investigative or examination
response would be appropriate. In this
regard, it is crucial that institutions
respond promptly to any follow-up
requests for records or information from
our staff or the staff of the designated
examining authority.52 Under the
proposed amendments, a prompt
response in accordance with existing
Commission guidance on the timely
production of records would be
particularly important in circumstances
involving ongoing misuse of sensitive
personal information.
The regulatory notification
requirement in the Banking Agencies’
guidance requires a report to the
appropriate regulator as soon as possible
after the institution becomes aware of an
incident involving unauthorized access
to or use of sensitive customer
information.53 Our proposed notice
requirement differs from the Banking
Agencies’ approach in that it would
50 See
proposed paragraph (d)(10) of Section 30.
proposed paragraph (a)(4)(v) of Section 30.
52 See generally 15 U.S.C. 21(a) (investigative
requests); 17 CFR 240.17a 4(j) (examinations of
broker-dealers); 17 CFR 275.204–2(g) (examinations
of investment advisers).
53 See Banking Agencies’ Incident Response
Guidance, supra note 23, at 70 FR 15740–15741
(concluding that the Banking Agencies’ standard for
notification to regulators should provide an early
warning to allow an institution’s regulator to assess
the effectiveness of an institution’s response plan,
and, where appropriate, to direct that notice be
given to customers if the institution has not already
done so).
mstockstill on PROD1PC66 with PROPOSALS3
51 See
VerDate Aug<31>2005
17:19 Mar 12, 2008
Jkt 214001
require notice to the Commission (or a
designated examining authority) when
an incident of unauthorized access to or
use of personal information poses a
significant risk that an individual
identified with the information might
suffer substantial harm or
inconvenience, or in which an
unauthorized person has intentionally
obtained access to or used sensitive
personal information. The proposed
notice requirement is intended to avoid
notice to the Commission in every case
of unauthorized access, and to focus
scrutiny on information security
breaches that present a greater potential
likelihood for harm. We believe that this
approach would help conserve
institutions’, as well as the
Commission’s, administrative resources
by allowing minor incidents to be
addressed in a way that is
commensurate with the risk they
present. The information to be included
in the notice would allow the
Commission or a broker-dealer’s
designated examining authority to
evaluate whether any legal action
against a would-be identity thief or
other action is warranted in light of the
circumstances. A broker-dealer, other
than a notice-registered broker dealer,
would be required to notify the
appropriate designated examining
authority on proposed Form SP–30. An
investment company or registered
investment adviser or transfer agent
would be required to notify the
Commission on proposed Form SP–
30.54
Proposed Form SP–30 would require
the institution to disclose information
that the Commission (or the designated
examining authority) needs to
understand the nature of the
unauthorized access or misuse of
personal information and the
institution’s intended response to the
incident.55 Accordingly, in addition to
identifying and contact information for
the covered institution, the form would
54 We anticipate that this form could be
downloaded from our Web site and would be
required to be filed electronically with the
Registrations Branch in the Office of Compliance
Inspections and Examinations. While broker-dealers
generally would file the form with their designated
examining authority rather than the Commission,
investment advisers that are dually registered with
the Commission as broker-dealers also would file
with the Commission and indicate their dualregistrant status on the form.
55 See proposed Form SP–30. Information
submitted to the Commission on the form would be
accorded confidential treatment to the extent
permitted by law. See, e.g., 17 CFR 200.83. We
realize that the full amount of losses may not be
known at the time an information security breach
is discovered, but we would expect covered
institutions to make a good faith effort to complete
the proposed form to the extent possible.
PO 00000
Frm 00008
Fmt 4701
Sfmt 4702
request a description of the incident,
when it occurred and what offices or
parts of the registrant’s business were
affected. The form also would require
disclosure of any third-party service
providers that were involved, the type
of services provided and, if the service
provider is an affiliate, the nature of the
affiliation. This information would help
examiners to assess the information
security policies and procedures of the
service provider. In addition, the form
would require a description of any
customer account losses.
Under the proposed amendments, if a
covered institution determined that an
unauthorized person had obtained
access to or used sensitive personal
information, and that misuse of the
information had occurred or was
reasonably possible, the institution also
would be required to provide
notification, in a clear and conspicuous
manner, to each individual identified
with the information.56 The proposed
requirements for notices to individuals
are intended to give investors
information that would help them
protect themselves against identity theft.
They also are intended to be consistent
with similar requirements in the
Banking Agencies’ Incident Response
Guidance.57
The notices to affected individuals
that would be required by the proposed
amendments would have to:
(i) Describe the incident and the type
of information that was compromised,
and what was done to protect the
individual’s information from further
unauthorized access or use; 58
(ii) Include a toll-free telephone
number or other contact information for
further information and assistance from
the institution; 59
(iii) Recommend that the individual
review account statements and
immediately report any suspicious
activity to the institution; 60 and
(iv) Include information about FTC
guidance regarding the steps an
individual can take to protect against
identity theft, a statement encouraging
the individual to report any incidents of
identity theft to the FTC, and the FTC’s
Web site address and toll-free telephone
number for obtaining identity theft
guidance and reporting suspected
incidents of identity theft.61
56 See
proposed paragraph (a)(5) of Section 30.
Banking Agencies’ Incident Response
Guidance, supra note 23.
58 See proposed paragraphs (a)(5)(i) and (a)(5)(ii)
of Section 30.
59 See proposed paragraph (a)(5)(iii) of Section 30.
60 See proposed paragraphs (a)(5)(iv) and (a)(5)(v)
of Section 30.
61 See proposed paragraph (a)(5)(vi) of Section 30.
57 See
E:\FR\FM\13MRP3.SGM
13MRP3
mstockstill on PROD1PC66 with PROPOSALS3
Federal Register / Vol. 73, No. 50 / Thursday, March 13, 2008 / Proposed Rules
We request comment on the proposed
specific standards relating to incidents
of unauthorized access to or misuse of
personal information.
• Commenters are invited to discuss
the proposed requirements for
procedures for responding to incidents
of unauthorized access to or use of
personal information. Are there any
particular steps that may not be
necessary, or not necessary in all
situations? Are there any other steps
that could be taken in response to a
security breach that also should be
required in some or all situations?
• We request comment on the
proposed provisions regarding
procedures for notifying the
Commission (or a broker-dealer’s
designated examining authority) of
incidents in which an individual
identified with compromised
information has suffered substantial
harm or inconvenience, or an
unauthorized person has intentionally
obtained access to or used sensitive
personal information.
• For example, should firms be
required to provide notice only if the
information compromised in an
incident is identified with a certain
number of individuals? Should the rule
include a numerical or other threshold
for when notice to the Commission (or
to a broker-dealer’s designated
examining authority) is required? If so,
how would a threshold work for smaller
institutions that may be far more likely
than larger institutions to meet the
threshold? Will the proposed standard
provide a sufficient early warning to the
Commission, or should the Commission
broaden the circumstances under which
notices would be required to be
provided to the Commission (or to a
broker-dealer’s designated examining
authority), such as the standard adopted
by the Banking Agencies? Commenters
should explain their views.
• Is the proposed definition of
‘‘sensitive personal information’’
sufficient? Are there particular types of
information that should or should not
be included?
• We request comment on proposed
Form SP–30. Is the form easy to
understand and use? For example, is the
form clear, or would additional
guidance, such as instructions or further
explanation of particular questions or
terms be helpful? Would it be easier or
more cost-effective for firms if the rule
specified the information they are
required to provide rather than provide
a form? Would the form be more useful
if it were in a tabular format?
Commenters should be specific
regarding changes they believe should
VerDate Aug<31>2005
17:19 Mar 12, 2008
Jkt 214001
be made to the content or format of the
proposed form.
• Similarly, we invite comment on
the proposed provisions regarding
procedures for notifying individuals of
incidents of unauthorized use or access
if an institution determines that an
unauthorized person has obtained
access to or used the information and
that misuse of sensitive personal
information has occurred or is
reasonably possible. Is the information
in the proposed notice to individuals
appropriate? Is there additional
information that institutions should
include, or information, proposed to be
included, that should be eliminated? Is
the proposed threshold for notice
appropriate? If not, are there alternative
thresholds for notice to individuals that
would be more appropriate? If so,
commenters should explain their views.
• Commenters are invited to discuss
the proposed requirements for written
documentation of compliance with the
proposed incident response provisions.
B. Scope of the Safeguards and Disposal
Rules
1. Information Covered by the
Safeguards and Disposal Rules
The Commission adopted the
safeguards and disposal rules at
different times under different
statutes—respectively, the GLBA and
the FACT Act—that differ in the scope
of information they cover. As noted
above, Regulation S–P implements the
GLBA privacy provisions governing
requirements for notice and opt out
before an institution can share certain
information with nonaffiliates and for
safeguarding information. The
regulation’s notice and opt out
provisions limit institutions from
sharing ‘‘nonpublic personal
information’’ about consumers and
customers as defined in the GLBA and
in Regulation S–P, with nonaffiliated
third parties.62 As required under the
GLBA, the safeguards rule requires
covered institutions to maintain written
policies and procedures to protect
‘‘customer records and information,’’ 63
which is not defined in the GLBA or in
Regulation S–P. The disposal rule
requires institutions to properly dispose
62 See 15 U.S.C. 6802(a), (b). ‘‘Nonpublic personal
information’’ is generally defined in the GLBA and
Regulation S–P as encompassing personally
identifiable financial information, as well as any
list, description, or other grouping of consumers
(and publicly available information pertaining to
them) derived using any personally identifiable
financial information that is not publicly available,
subject to certain exceptions. See 15 U.S.C. 6809(4);
17 CFR 248.3(t) and 248.3(u). See supra note 12 for
a discussion of the notice and opt out provisions.
63 See 17 CFR 248.30; 15 U.S.C. 6801(b)(1).
PO 00000
Frm 00009
Fmt 4701
Sfmt 4702
13699
of ‘‘consumer report information,’’ a
third term, which Regulation S–P
defines consistent with the FACT Act
provisions.64 Each of these terms
includes a different set of information,
although the terms include some of the
same information.65 Each term also does
not include some information that, if
obtained by an unauthorized user, could
permit access to personal financial
information about an institution’s
customers. We preliminarily believe
that in order to provide better protection
against the unauthorized disclosure of
this personal financial information, the
scope of information protected by both
the safeguards rule and the disposal rule
should be broader. Broadening the
scope of information covered by the
safeguards and disposal rules would
more appropriately implement Section
525 of the GLBA. Section 525 directs the
Commission to revise its regulations as
necessary to ensure that covered
institutions have policies, procedures,
and controls in place to prevent the
unauthorized disclosure of ‘‘customer
financial information.’’ Section 521 of
Title V of the GLBA prohibits persons
from obtaining or requesting a person to
obtain, customer information by making
false or fraudulent statements to an
officer, employee, agent, or customer of
a financial institution.66 In furtherance
of these prohibitions, the GLBA directs
the Commission and the other federal
financial regulators to review their
regulations and to revise them as
necessary to ensure that financial
institutions have policies, procedures
and controls in place to prevent the
unauthorized disclosure of ‘‘customer
financial information’’ and to deter and
detect the activity described in Section
521.67 Applying both the safeguards and
disposal rules to a consistent set of
information also could reduce any
burden that may have been created by
the application of the safeguards and
disposal rules to different information.68
64 17 CFR 248.30(b)(2). Section 628(a)(1) of the
FCRA directed the Commission to adopt rules
requiring the proper disposal of ‘‘consumer
information, or any compilation of consumer
information, derived from consumer reports for a
business purpose.’’ 15 U.S.C. 1681w(a)(1).
Regulation S–P uses the term ‘‘consumer report
information’’ and defines it to mean a record in any
form about an individual ‘‘that is a consumer report
or is derived from a consumer report.’’ 17 CFR
248.30(b)(1)(ii). ‘‘Consumer report’’ has the same
meaning as in Section 603(d) of the Fair Credit
Reporting Act (15 U.S.C. 1681(d)). 17 CFR
248.30(b)(1)(i).
65 See Disposal Rule Adopting Release, supra note
15, at 69 FR 71323 n.13.
66 See 15 U.S.C. 6821(a), (b).
67 See 15 U.S.C. 6825.
68 See David Annecharico, Note, Online
Transactions: Squaring the Gramm-Leach-Bliley Act
E:\FR\FM\13MRP3.SGM
Continued
13MRP3
13700
Federal Register / Vol. 73, No. 50 / Thursday, March 13, 2008 / Proposed Rules
mstockstill on PROD1PC66 with PROPOSALS3
Accordingly, we propose to amend
the safeguards and disposal rules so that
both protect ‘‘personal information,’’
and to define that term to encompass
any record containing either ‘‘nonpublic
personal information’’ or ‘‘consumer
report information.’’ 69 As noted above,
each of these terms is defined in
Regulation S–P.70 The term ‘‘consumer
report information’’ would continue to
mean any record about an individual,
whether in paper, electronic or other
form, that is a consumer report or is
derived from a consumer report, as well
as a compilation of such records, but not
including information that does not
identify individuals, such as aggregate
information or blind data.71 The
proposed amendments would leave the
meaning of the term ‘‘consumer report’’
unchanged from the definition set forth
in Section 603(d) of the FCRA.72 Section
603(d) defines ‘‘consumer report’’ in
general as encompassing
communications of information by a
consumer reporting agency bearing on a
consumer’s creditworthiness, credit
standing, reputation or particular other
factors used in connection with
establishing the consumer’s eligibility
for credit or insurance, or for
employment purposes or other
authorized purposes, subject to certain
exclusions.73
In addition to nonpublic personal
information and consumer report
information, ‘‘personal information’’
also would include information
identified with any consumer, or with
any employee, investor, or
securityholder who is a natural
person,74 in paper, electronic or other
Privacy Provisions With the FTC Fair Information
Practice Principles, 6 N.C. Banking Inst. 637, 662
(2002), available at https://www.unc.edu/ncbank/
Articles%20and%20Notes%20PDFs/Volume%206/
DavidAnnecharico%5Bpp637-664%5D.pdf (‘‘To
require financial institutions to treat the security of
consumer information on par with customer
information may be cost effective and efficient. It
could merely mean storing consumer information
within the already mandated secure storage systems
that are being used to store customer information.’’).
69 Proposed paragraph (d)(8) of Section 30.
70 See 17 CFR 248.3(t)(1) (definition of
‘‘nonpublic personal information’’); 17 CFR
248.30(b)(ii) (definition of ‘‘consumer report
information’’).
71 See proposed paragraph (c)(4) of Section 30 and
current paragraph (b)(ii) of Section 30 (definition
governing current disposal requirements).
72 See proposed paragraph (d)(3) of Section 30.
73 See 15 U.S.C. 1681a(d).
74 This element of the definition would exclude
information identified only with persons other than
natural persons, such as corporations. The GLBA
limits the protections provided under subtitle A of
the privacy provisions to ‘‘consumers,’’ who are
individuals who obtain from a financial institution
financial products or services to be used for
personal, family or household purposes. 15 U.S.C.
6809(9). The FACT Act defines a ‘‘consumer’’ to
mean an individual. 15 U.S.C. 1681a(c).
VerDate Aug<31>2005
17:19 Mar 12, 2008
Jkt 214001
form, that is handled by the institution
or maintained on the institution’s
behalf.75 Thus, for example, the
definition would include records of
employee user names and passwords
maintained by a brokerage firm, and
records about securityholders
maintained by a transfer agent. We
believe safeguarding employee user
names and passwords promotes
information security because
unauthorized access to this information
could facilitate unauthorized access to a
firm’s network and its clients’ personal
information.76 Safeguarding information
about investors and securityholders,
such as maintained by registered
transfer agents, is necessary to protect
investors who may, directly or
indirectly, do business with the
Commission’s regulated entities even
though they may not be ‘‘consumers’’ or
‘‘customers’’ of those entities as those
terms are defined for purposes of
Regulation S–P.77 We also propose to
make a conforming change to the
definition of ‘‘personally identifiable
financial information’’ by including
within the definition information that is
handled or maintained by a covered
institution or on its behalf, and that is
identified with any consumer, or with
any employee, investor, or
securityholder who is a natural
person.78 We preliminarily believe that
this change would be appropriate in the
public interest and for the protection of
investors because it would help protect
information identified with an investor
who may not be a ‘‘consumer’’ or
‘‘customer’’ of a covered institution.
To better protect investors’’ and
securityholders’ information from
unauthorized disclosure, the proposed
amendments would apply the
safeguards and disposal rules to
nonpublic personal information or
consumer report information that is
identified with any individual
consumer, employee, investor or
securityholder and handled or
maintained by or on behalf of the
institution. The proposal to include
personal information and consumer
report information about employees of
covered institutions is intended to
reduce the risk that a would-be identity
thief could access investor information
by impersonating an employee or
75 See
proposed paragraph (d)(8) of Section 30.
supra note 17 and accompanying text.
77 As discussed supra at note 7, Regulation S–P
defines the terms ‘‘consumer’’ and ‘‘customer’’ at 17
CFR 248.3(g) and 248.3(j), respectively.
78 See proposed new paragraph (u)(1)(iv) of
Section 3. The proposed amendments also would
include technical, conforming changes to references
to Section 30 in Sections 1(b) and 2(b) of Regulation
S–P.
76 See
PO 00000
Frm 00010
Fmt 4701
Sfmt 4702
employing ‘‘social engineering’’
techniques or bribery.
Including consumer report
information within the definition of
‘‘personal information’’ (to which the
safeguards rule would apply) would be
consistent with the congressional intent
behind making consumer report
information subject to the disposal
requirements set forth in the FACT
Act.79 Furthermore, the proposed scope
of protection appears to be consistent
with the practices of many covered
institutions that currently protect
employee information, consumer report
information, and nonpublic personal
information about consumers and
customers in the same manner.80
We invite comment on the proposed
definition of ‘‘personal information.’’
• Should the safeguards rule extend
to consumer report information that is
not nonpublic personal information?
• Should the disposal rule extend to
nonpublic personal information that is
not consumer report information?
• To what extent do institutions
currently take the same measures in
disposing of consumer report
information, customer records and
information, nonpublic personal
information about consumers and
customers, and information other than
consumer report information that is
identified with employees, investors, or
securityholders who are not consumers
or customers? To the extent that
measures are different, what is the basis
for those differences?
• Is the proposed definition of
‘‘personal information,’’ which includes
all records containing either consumer
report information or nonpublic
personal information, broad enough to
encompass the information that needs to
be protected? If not, how should we
expand the definition? Are there any
aspects of the proposed definition that,
in the context of the information
security requirements discussed below,
may be over-inclusive with regard to
particular types of entities? If so, how
should we tailor the definition?
• The proposed definition of
‘‘personal information’’ encompasses
79 The disposal rule was intended to reduce the
risk of fraud or related crimes, including identity
theft, by ensuring that records containing sensitive
financial or personal information are appropriately
redacted or destroyed before being discarded. See
108 Cong. Rec. S13,889 (Nov. 4, 2003) (statement
of Sen. Nelson).
80 Based on our staff’s informal discussions with
industry representatives about Regulation S–P
issues, as well as the estimated costs and benefits
of the proposed amendments we believe that many
covered institutions currently protect both kinds of
information in the same way out of prudence and
for reasons of operational efficiency. See infra
section V.B.
E:\FR\FM\13MRP3.SGM
13MRP3
Federal Register / Vol. 73, No. 50 / Thursday, March 13, 2008 / Proposed Rules
information identified with any
consumer, or with any employee,
investor, or securityholder who is a
natural person. Are there any other
persons whose information should be
protected under the safeguards rule, or
should the safeguards rule cover only
information identified with individuals
who are customers of a financial
institution?
• Should the proposed definition of
‘‘personal information’’ be expanded to
include information identified with
non-natural persons, such as corporate
clients? Commenters should explain
their views.
mstockstill on PROD1PC66 with PROPOSALS3
2. Institutions Covered by the
Safeguards Rule
As discussed above, the safeguards
rule currently applies to brokers,
dealers, registered investment advisers,
and investment companies. The
disposal rule currently applies to those
entities as well as to registered transfer
agents. We propose to extend the
safeguards rule to apply to registered
transfer agents.81 These institutions, like
those currently subject to both the
safeguards and disposal rules, may
maintain personal information such as
Social Security numbers, account
numbers, passwords, account balances,
and records of securities transactions
and positions. Unauthorized access to or
misuse of such information could result
in substantial harm and inconvenience
to the individuals identified with the
information. The proposed amendments
thus would require that covered
institutions that may receive personal
information in the course of effecting,
processing or otherwise supporting
securities transactions must protect that
information by maintaining appropriate
safeguards in addition to taking
measures to properly dispose of the
information.82 Registered transfer agents
may maintain sensitive personal
information about investors, the
unauthorized access to or use of which
could cause investors substantial
inconvenience or harm. Therefore, we
preliminarily believe that extending the
81 The term ‘‘transfer agent’’ would be defined by
proposed paragraph (d)(14) of Section 30 to have
the same meaning as in Section 3(a)(25) of the
Exchange Act (15 U.S.C. 78c(a)(25)).
As discussed below, we also propose to extend
the disposal rule to associated persons of brokerdealers, supervised persons of registered investment
advisers, and associated persons of registered
transfer agents.
82 The proposed definition of ‘‘personal
information’’ would include information about
individual investors maintained by registered
transfer agents even though transfer agents typically
do not have consumers or customers for purposes
of Regulation S–P because their clients generally are
not individuals, but are the companies in which
investors, including individuals, hold shares.
VerDate Aug<31>2005
17:19 Mar 12, 2008
Jkt 214001
safeguards rule to registered transfer
agents would be appropriate in the
public interest and for the protection of
investors.83
The proposed amendments also
would limit the scope of broker-dealers
covered by the safeguards rule to
brokers or dealers other than those
registered by notice with the
Commission under Section 15(b)(11) of
the Exchange Act.84 Notice-registered
broker-dealers must comply with the
privacy rules, including rules requiring
the safeguarding of customer records
and information, adopted by the
CFTC.85 Excluding notice-registered
broker-dealers from the scope of the
Commission’s safeguards rule would
clarify that both sets of rules do not
apply to notice-registered brokerdealers, and that the CFTC would have
primary responsibility for oversight of
those broker-dealers in this area.
We seek comment on the proposed
scope of the safeguards rule.
• Should registered transfer agents be
subject to the safeguards rule? To what
extent are registered transfer agents
expected to possess, or lack, the type of
information that could be used to
commit identity theft or otherwise cause
individuals substantial harm or
inconvenience? 86 Are there special
issues that registered transfer agents
might have in implementing or meeting
the requirements of the safeguards rule?
• Should the Commission propose to
extend the safeguards and disposal rules
83 Under Section 17A of the Exchange Act (15
U.S.C. 78q–1) the Commission has authority to
prescribe rules and regulations for transfer agents as
necessary or appropriate in the public interest, for
the protection of investors, or otherwise in
furtherance of the purposes of Title I of the
Exchange Act.
84 Proposed paragraph (a)(1) of Section 30. See 15
U.S.C. 78o(b)(11). The Commodity Futures
Modernization Act of 2000 established a system of
notice registration under which trading facilities
and intermediaries that are already registered with
either the Commission or the CFTC may register
with the other agency on an expedited basis for the
limited purpose of trading security futures
products. Under the substituted compliance
provision in Section 2(b) of Regulation
S–P (17 CFR 248.2(b)), CFTC-regulated futures
commission merchants and introducing brokers that
are registered by notice with the Commission and
in compliance with the financial privacy rules of
the CFTC are deemed to be in compliance with
Regulation S–P, except with respect to Regulation
S–P’s disposal rule (currently 17 CFR 248.30(b)).
Notice-registered broker-dealers are already
excluded from the scope of the disposal rule.
85 See 17 CFR 160.30.
86 Such information could include address and
account information used to disseminate
shareholder communications and dividend and
interest payments, as well as information collected
pursuant to Rule 17Ad–17 under the Exchange Act
(17 CFR 240.17Ad–17), which requires transfer
agents registered with the Commission to use
taxpayer identification numbers or names to search
databases for addresses of lost securityholders.
PO 00000
Frm 00011
Fmt 4701
Sfmt 4702
13701
to self-regulatory organizations or other
types of institutions in the securities
industry? If so, which ones?
• Should notice-registered brokerdealers be excluded from the scope of
the proposed amended safeguards rule?
If not, why not?
3. Persons Covered by the Disposal Rule
As noted above, the disposal rule
currently applies to broker-dealers,
investment companies, registered
investment advisers and registered
transfer agents. We propose to extend
the disposal rule to apply to natural
persons who are associated persons of a
broker or dealer, supervised persons of
a registered investment adviser, and
associated persons of a registered
transfer agent.87 As noted above, we
have become concerned that some of
these persons, who may work in
branches far from the registered entity’s
main office, may not dispose of
sensitive personal financial information
consistent with the registered entity’s
disposal policies. The proposal is
intended to make persons associated
with a covered institution directly
responsible for properly disposing of
personal information consistent with
the institution’s policies.
• We request comment on the
proposed extension of the scope of the
disposal rule to apply to natural persons
who are associated with broker-dealers,
supervised persons of registered
investment advisers, or who are
associated persons of registered transfer
agents.
• Are there alternative ways of
helping to ensure that these persons
would follow the covered institution’s
disposal policies and properly dispose
of personal information?
87 See proposed paragraph (b)(1) of Section 30.
The term ‘‘associated person of a broker or dealer’’
would be defined by proposed paragraph (d)(1) of
Section 30 to have the same meaning as in Section
3(a)(18) of the Exchange Act (15 U.S.C. 78c(a)(18)).
The term ‘‘supervised person of an investment
adviser’’ would be defined by proposed paragraph
(d)(13) of Section 30 to have the same meaning as
in Section 202(a)(25) of the Investment Advisers
Act of (15 U.S.C. 80b–2(a)(25)). We are proposing
to include ‘‘supervised’’ persons of an investment
adviser, rather than ‘‘associated’’ persons in order
to include all employees, including clerical
employees, of an investment adviser who may be
responsible for disposing of personal information.
See 15 U.S.C. 80b–2(a)(17) (defining term ‘‘person
associated with an investment adviser’’ not to
include associated persons whose functions are
clerical or ministerial). This approach is intended
to cover the same range of employees as investment
advisers, broker-dealers, and registered transfer
agents. The term ‘‘associated person of a transfer
agent’’ would be defined by proposed paragraph
(d)(2) of Section 30 to have the same meaning as
in Section 3(a)(49) of the Exchange Act (15 U.S.C.
78c(a)(49).
An additional proposed extension to the scope of
the disposal rule is discussed below. See infra
section II.B.
E:\FR\FM\13MRP3.SGM
13MRP3
mstockstill on PROD1PC66 with PROPOSALS3
13702
Federal Register / Vol. 73, No. 50 / Thursday, March 13, 2008 / Proposed Rules
C. Records of Compliance
We further propose to amend
Regulation S–P to require institutions
subject to the safeguards and disposal
rules to make and preserve written
records of their safeguards and disposal
policies and procedures. We also
propose to require that institutions
document that they have complied with
the elements required to develop,
maintain and implement these policies
and procedures for protecting and
disposing of personal information,
including procedures relating to
incidents of unauthorized access to or
misuse of personal information. These
records would help institutions assess
their policies and procedures internally,
and help examiners to monitor
compliance with the requirements of the
amended rules. The periods of time for
which the records would have to be
preserved would vary by institution,
because the requirements would be
consistent with existing recordkeeping
rules, beginning with when the records
were made, and, for records of written
policies and procedures, after any
change in the policies or procedures
they document.88 Broker-dealers would
have to preserve the records for a period
of not less than three years, the first two
years in an easily accessible place.
Registered transfer agents would have to
preserve the records for a period of not
less than two years, the first year in an
easily accessible place. Investment
companies would have to preserve the
records for a period not less than six
years, the first two years in an easily
accessible place. Registered investment
advisers would have to preserve the
records for five years, the first two years
in an appropriate office of the
investment adviser. We believe that
these proposed recordkeeping
provisions, while varying among
covered institutions, would all result in
the maintenance of the proposed
records for sufficiently long periods of
time and in locations in which they
would be useful to examiners.
Moreover, we do not believe that shorter
or longer maintenance periods would be
warranted by any difference between
the proposed records and other records
that covered institutions currently must
maintain for these lengths of time. We
also believe that conforming the
proposed retention periods to existing
requirements would allow covered
institutions to minimize their
compliance costs by integrating the
proposed requirements into their
existing recordkeeping systems.89
88 See
proposed paragraph (c) of Section 30.
17 CFR 240.17a–4(b); 240.17Ad–7(b);
270.31a–2(a)(4)–(6); 275.204–2(e)(1).
89 See
VerDate Aug<31>2005
17:19 Mar 12, 2008
Jkt 214001
We request comment on the proposed
requirements for making and retaining
records.
• Are the proposed periods of time
for preserving the records appropriate,
or should certain records be preserved
for different periods of time?
• Would the costs associated with
preserving records for periods of time
consistent with covered institutions’
other recordkeeping requirements be
less than they would be if all
institutions were required to keep these
records for the same period of time?
D. Exception for Limited Information
Disclosure When Personnel Leave Their
Firms
Finally, we propose to amend
Regulation S–P to add a new exception
from the notice and opt out
requirements to permit limited
disclosures of investor information
when a registered representative of a
broker-dealer or a supervised person of
a registered investment adviser moves
from one brokerage or advisory firm to
another. The proposed exception is
intended to allow firms with departing
representatives to share limited
customer information with the
representatives’ new firms that could be
used to contact clients and offer them a
choice about whether to follow a
representative to the new firm. At many
firms, representatives develop close
professional and personal relationships
with investors over time.
Representatives at such firms likely
remember the basic contact information
for their clients or have recorded it in
their own personal records. Some firms
discourage departing representatives
from soliciting clients to move to
another firm, while others do not. At
any firm, departing representatives may
have a strong incentive to transfer as
much customer information as possible
to their new firms, and it has been
brought to our attention that, at some
firms, information may have been
transferred without adequate
supervision, in contradiction of privacy
notices provided to customers, or
potentially in violation of Regulation
S–P.90
The proposed exception is designed
to provide an orderly framework under
which firms with departing
representatives could share certain
limited customer contact information
and could supervise the information
transfer.91 The proposed exception
90 See, e.g., In re NEXT Financial Group, Inc.,
supra note 16.
91 In 2004, certain large broker-dealers entered
into a protocol under which signatories agreed not
to sue one another for recruiting one another’s
registered representatives, if the representatives
PO 00000
Frm 00012
Fmt 4701
Sfmt 4702
would permit one firm to disclose to
another only the following information:
the customer’s name, a general
description of the type of account and
products held by the customer, and
contact information, including address,
telephone number and e-mail
information.92 We propose to include
this particular information as it would
be useful for a representative seeking to
maintain contact with investors, but
appears unlikely to put an investor at
serious risk of identity theft. It also is
the type of information an investor
would expect a representative to
remember. Broker-dealers and registered
investment advisers seeking to rely on
the exception would have to require
their departing representatives to
provide to them, not later than the
representative’s separation from
employment, a written record of the
information that would be disclosed
pursuant to the exception, and brokerdealers and registered investment
advisers would be required to preserve
such records consistent with the
proposed recordkeeping provisions of
Section 30.93 This condition is intended
take only limited client information to another
participating firm. The initial signatories, Citigroup
Global Markets/Smith Barney, Merrill Lynch, and
UBS Financial Services, were joined more recently
by Raymond James, Wachovia Securities and
others.
We understand that, under the protocol, the
information that a departing representative may
take to another firm is limited to each client’s name,
address, a general description of the type of account
and products held by the client, and the client’s
phone number and e-mail address. This information
may be used at the representative’s new firm only
by the representative, and only for the purpose of
soliciting the representative’s former clients.
We further understand that there may be some
confusion in the securities industry regarding what
information may be disclosed to a departing
representative’s new firm consistent with the
limitations in Regulation S–P, and that at times
these limitations may cause inconvenience to
investors. NASD (now consolidated into FINRA)
issued guidance to its member firms regarding the
permissible and impermissible use of ‘‘negative
response letters’’ for bulk transfers of customer
accounts and changes in the broker-dealer of record
on certain types of accounts (see NASD NtM 04–
72 (Oct. 2004); NtM 02–57 (Sept. 2002)). More
recently, FINRA issued guidance relating to
Regulation S–P in the context special
considerations firms should use to supervise
recommendations of newly associated registered
representatives to replace mutual funds and
variable products). See FINRA, Regulatory Notice
07–36, available at https://www.finra.org/web/
groups/rules_regs/documents/notice_to_members/
p036445.pdf. However, our staff reports that
scenarios involving representatives moving from
one firm to another continue to create uncertainty
regarding firms’ obligations under Regulation S–P.
92 See proposed paragraph (a)(8)(i) of Section 15.
93 See proposed paragraph (a)(8)(iii) of Section 15
and proposed paragraph (c) of Section 30. For
purposes of the proposed exception, the term
‘‘representative’’ would be defined to mean a
natural person associated with a broker or dealer
registered with the Commission, who is registered
or approved in compliance with 17 CFR 240.15b7–
E:\FR\FM\13MRP3.SGM
13MRP3
Federal Register / Vol. 73, No. 50 / Thursday, March 13, 2008 / Proposed Rules
mstockstill on PROD1PC66 with PROPOSALS3
to help ensure that firms relying on the
exception are appropriately accounting
for the information they are disclosing
in connection with departures of their
representatives.94
The exception would be subject to
conditions that are designed to limit the
potential that the information would
result in identity theft or other abuses.
The shared information could not
include any customer’s account number,
Social Security number, or securities
positions.95 A representative would not
need this type of information to contact
investors, although it would be useful to
an identity thief, and an investor
probably would not expect a
representative to remember it. In
addition, a representative could solicit
only an institution’s customers that
were the representative’s clients. This
condition recognizes that an investor
might expect to be contacted by a
representative with whom the investor
has done business before, but not by
another person at the representative’s
new firm.96
As noted above, the proposed
exception is designed to facilitate the
transfer of client contact information
that would help broker-dealers and
registered investment advisers offer
clients the choice of following a
departing representative to a new firm.
At firms that choose to rely on it, the
proposed exception also should reduce
potential incentives some
representatives may have to take
information with them secretly when
they leave. By specifically limiting the
types of information that could be
disclosed to the representative’s new
firm, the proposed amendments are
designed to help firms safeguard more
sensitive client information. This
limitation also would clarify that a firm
may not require or expect a
representative from another firm to
bring more information than necessary
for the representative to solicit former
clients. Because the proposed exception
is designed to promote investor choice,
1, or a supervised person of an investment adviser
as defined in Section 202(a)(25) of the Investment
Advisers Act. See proposed paragraph (a)(8)(iv) of
Section 15.
94 Most firms seeking to rely on the proposed
exception would not need to revise their GLBA
privacy notices because they already state in the
notices that their disclosures of information not
specifically described include disclosures permitted
by law, which would include disclosures made
pursuant to the proposed exception and the other
exceptions provided in Section 15 of Regulation S–
P.
95 See proposed paragraph (a)(8)(ii) of Section 15.
96 See proposed paragraph (a)(8)(i) of Section 15
(permitting a representative to solicit customers to
whom the representative personally provided a
financial product or service on behalf of the
institution).
VerDate Aug<31>2005
17:19 Mar 12, 2008
Jkt 214001
provide legal certainty, and reduce
potential incentives for improper
disclosures, we preliminarily believe
that it would be necessary or
appropriate in the public interest, and is
consistent with the protection of
investors.
The proposed exception would not
limit the disclosure of additional
information to a new firm pursuant to
a customer’s consent or direction.97 It
also would not preclude the disclosure
of additional information required in
connection with the transfer of a
customer’s account.98 Depending on its
business organization, its policies
regarding departing representatives and
the circumstances of a representative’s
departure, a firm could choose to rely
on existing exceptions rather than the
proposed new exception.99 The
proposed exception is designed to allow
firms that choose to share limited
contact information to do so. The
proposed exception would not,
however, affect firm policies that
prohibit the transfer of any customer
information other than at the customer’s
specific direction.
We have chosen to propose this
approach as opposed to an alternative
approach that would require all firms to
include specific notice and opportunity
to opt out of this information sharing in
their initial and annual privacy notices.
Under this alternative, a broker-dealer
or registered investment adviser’s
privacy notice would have to provide
specific disclosure regarding the
circumstances under which the brokerdealer or adviser would share customer
information with another firm when a
registered representative or supervised
97 For example, if an investor chooses to move his
or her business to the representative’s new firm, he
or she may consent to having the original firm
disclose additional information about the
customer’s account to the representative’s new firm
without the firm first having to provide the
customer with an opt out. See 17 CFR 248.15(a)(1).
98 If an investor requests or authorizes the transfer
of his or her account from the representative’s old
firm to the representative’s new firm, the old firm
may disclose additional information as necessary to
effect the account transfer. See 17 CFR 248.14(a)(1)
and 248.14(b)(2)(vi)(B). The exception also would
not preclude the disclosure of additional
information about the investor if the firm has
provided the investor with a privacy notice
describing the disclosure and given the investor a
reasonable opportunity to opt out of the disclosure,
and the customer has not opted out. See 17 CFR
248.10. Thus, covered institutions that wish to
disclose an investor’s nonpublic personal
information to a departing representative’s new firm
without relying on the proposed new exception or
without first obtaining consent from the investor to
the disclosure or to an account transfer could revise
their privacy notices to describe disclosures the
firm would make in the context of a representative’s
move to another broker-dealer or registered
investment adviser.
99 See 17 CFR 248.14, 248.15.
PO 00000
Frm 00013
Fmt 4701
Sfmt 4702
13703
person leaves. We have chosen this
approach because, as indicated earlier,
many representatives develop close
professional and personal relationships
with investors. They are likely to
remember basic contact information for
their clients or have recorded it in their
own personal records, and investors
would expect representatives to have
this information. This type of limited
contact information is unlikely to put
investors at serious risk of identity theft.
Also, we believe that a description of
disclosures to a departing
representative’s new firm would be
difficult to distinguish from the
description of disclosures made for the
purpose of third-party marketing and
would further complicate already
complex privacy notices.
• Commenters are invited to discuss
the proposed new exception. Would it
permit the transfer of contact
information so as to promote investor
choice and convenience? Would it
foreclose the transfer of particularly
sensitive information that, if misused,
could lead to identity theft? Should the
transfer of customer contact information
be conditioned on the broker-dealer or
registered investment adviser receiving
the information certifying to the sharing
institution that it complies with the
safeguards and disposal rules?
• We also invite commenters to share
their views on the likely effect of the
proposed new exception on competition
in recruiting broker-dealer and
investment adviser representatives. Are
there alternative approaches that would
both protect investor information and
not unduly restrict the transfer of
representatives from one firm to
another?
• We seek comment on potential
alternative approaches, including
requiring specific disclosure. Are
investors, particularly new clients to a
firm, likely to understand disclosures
about information that would be given
to a departing representative’s new firm
in initial or annual privacy notices? 100
Should the availability of the proposed
exemption be conditioned on providing
investors with specific disclosure
regarding whether a covered institution
would disclose personal information in
connection with a representative’s
departure?
• The proposed exception would
permit broker-dealers and registered
investment advisers to transfer limited
100 We expect that if the Banking Agencies, the
FTC and the Commission were to adopt the
proposed model privacy form, see Interagency
Model Privacy Form Proposal, supra note 12, the
description of the disclosure to a nonaffiliated firm
could be included on page 2 of the proposed form
in the section defining nonaffiliates.
E:\FR\FM\13MRP3.SGM
13MRP3
13704
Federal Register / Vol. 73, No. 50 / Thursday, March 13, 2008 / Proposed Rules
information to other broker-dealers and
registered investment advisers without
first providing notice and opt out.
Should we make the proposed
exception available for information
transferred to other types of financial
institutions where a departing
representative may go? For example,
should we permit broker-dealers and
registered investment advisers to rely on
the exception to share information with
investment advisers that are not
registered with the Commission?
• Commenters are invited to express
their views on the proposed
exemption’s condition that a departing
representative of a covered institution
relying on this exemption could solicit
only the institution’s customers that
were the representative’s clients.
III. General Request for Comments
We request comment on all aspects of
the proposed amendments to Regulation
S–P. We particularly urge commenters
to suggest other provisions or changes
that could enhance the ways in which
securities industry participants protect
personal information. We encourage
commenters to provide empirical data,
if available, to support their views.
IV. Paperwork Reduction Act
mstockstill on PROD1PC66 with PROPOSALS3
Certain provisions of the proposed
amendments contain ‘‘collections of
information’’ requirements within the
meaning of the Paperwork Reduction
Act of 1995 (‘‘PRA’’).101 The
Commission is submitting these
amendments to the Office of
Management and Budget (‘‘OMB’’) for
review and approval in accordance with
the PRA.102 The title for the collections
of information is ‘‘Information security
programs for personal information;
records of compliance.’’ The safeguards
and disposal rules we propose to amend
contain currently approved collections
of information under OMB Control No.
3235–0610, the title of which is, ‘‘Rule
248.30, Procedures to safeguard
customer records and information;
disposal of consumer report
information.’’ 103 The Commission is
proposing to amend Regulation S–P’s
safeguards and disposal rules, 17 CFR
248.30(a) and (b), pursuant to Sections
501, 504, 505, and 504 of the GLBA,104
Sections 17, 17A, 23, and 36 of the
101 44
U.S.C. 3501–3520.
U.S.C. 3507(d) and 5 CFR 1320.11.
103 The paperwork burden imposed by Regulation
S–P’s notice and opt-out requirements, 17 CFR
248.1 to 248.18, is currently approved under a
separate OMB control number, OMB Control No.
3235–0537. The proposed amendments would not
affect this collection of information.
104 15 U.S.C. 6801, 6804, 6805 and 6825.
102 44
VerDate Aug<31>2005
17:19 Mar 12, 2008
Jkt 214001
Exchange Act,105 Sections 31(a) and 38
of the Investment Company Act,106 and
Sections 204 and 211 of the Investment
Advisers Act.107 Regulation S–P sets
forth the Commission’s safeguards rule
for institutions covered by the
regulation. Among other things, the
safeguards rule requires covered
institutions to adopt administrative,
technical, and physical information
safeguards to protect customer records
and information. Regulation S–P also
contains the Commission’s disposal
rule, which requires institutions to
properly dispose of consumer report
information possessed for a business
purpose by taking reasonable measures
to protect against unauthorized access to
or use of the information in connection
with its disposal.
The proposed amendments are
designed to ensure that covered
institutions maintain a reasonable
information security program that
includes safeguarding policies and
procedures that are more specific than
those currently required, including
policies and procedures for responding
to data security breach incidents, for
notifying individuals for whom the
incidents pose a risk of identity theft,
and for reporting certain incidents to the
Commission (or to a broker-dealer’s
designated examining authority) on
proposed Form SP–30. The amendments
also would broaden the scope of
information and the types of institutions
and persons covered by the safeguards
and disposal rules. Finally, the
amendments would create a new
exception from Regulation S–P’s notice
and opt-out requirements for disclosures
of limited information in connection
with the departure of a representative of
a broker-dealer or registered investment
adviser. Firms choosing to rely on the
exception would be required to keep
records of the information disclosed
pursuant to it.
The hours and costs associated with
these collections of information would
consist of reviewing the proposed
amendments, collecting and searching
for existing policies and procedures,
conducting a risk assessment,
developing and recording information
safeguards appropriate to address risks,
training personnel, and adjusting
written safeguards on an ongoing basis.
Institutions would also have to respond
appropriately to incidents of data
security breach as may occur on an
ongoing basis. If misuse of information
has occurred or is reasonably possible,
this would include notifying affected
105 15
U.S.C. 78q, 78q–1, 78w, and 78mm.
U.S.C. 80a–30(a), 80a–37.
107 15 U.S.C. 80b–4, 80b–11.
106 15
PO 00000
Frm 00014
Fmt 4701
Sfmt 4702
individuals. If there is a significant risk
that an individual identified with the
information might suffer substantial
harm or inconvenience, or any
unauthorized person has intentionally
obtained access to or used sensitive
personal information, this would also
include notifying the Commission or an
appropriate designated examining
authority as soon as possible on
proposed Form SP–30. Certain of these
collections of information also would
require disclosure, reporting, and
recordkeeping burdens, as analyzed
below.
An agency may not conduct or
sponsor, and a person is not required to
respond to a collection of information
unless a currently valid OMB control
number is displayed. Responses to these
collections of information would not be
kept confidential.108 The collections of
information would be mandatory, and
would have to be maintained by brokerdealers for not less than three years, the
first two years in an easily accessible
place, by registered transfer agents for a
period of not less than two years, the
first year in an easily accessible place,
by investment companies for a period
not less than six years, the first two
years in an easily accessible place, and
registered investment advisers would
have to preserve the records for five
years, the first two years in an
appropriate office of the investment
adviser.
Information Security and Security
Breach Response Requirements
The proposed amendments contain
collections of information requirements
related to the more specific standards
we are proposing for safeguarding
personal information, including
standards for responding to data
security breaches. We believe these
proposed collections of information are
necessary to help prevent and address
security breaches and designed to
ensure that covered institutions
maintain a reasonable information
security program pursuant to the
statutory requirements. Covered
institutions would have to document in
writing steps they would be required to
take to develop, implement, and
maintain a comprehensive information
security program. We estimate that there
would be 12,432 respondents to this
information collection.109 Of these
108 Information submitted to the Commission on
proposed Form SP–30 would be kept confidential
to the extent permitted by law. See supra note 55.
109 This estimate includes 6,016 broker-dealers,
4,733 investment companies representing portions
of 813 fund complexes, 77 business development
companies, 9,860 registered investment advisers,
and 501 registered transfer agents. As discussed in
E:\FR\FM\13MRP3.SGM
13MRP3
Federal Register / Vol. 73, No. 50 / Thursday, March 13, 2008 / Proposed Rules
mstockstill on PROD1PC66 with PROPOSALS3
covered institutions, we estimate that
5,862 are smaller institutions and 6,570
are larger institutions. 110
Based on limited inquiries of covered
institutions, the staff estimates that the
amount of time smaller institutions
would devote to initial compliance with
the proposed amendments would range
from 2 to 80 hours with a midpoint of
41 hours.111 This estimate reflects the
following burden hours: 1 hour for the
board of directors to designate an
information security program
coordinator; 1 hour for the program
coordinator to review the amendments;
4 hours to assess risks and review
procedures; 10 hours to review, revise
and implement new safeguards
(including any data breach notification
procedures); 8 hours to test the
effectiveness of the safeguards controls
and procedures; 7 hours to train staff;
and 10 hours to review service
providers’ policies and procedures and
revise contracts as necessary to require
them to maintain appropriate
safeguards. The staff estimates that
initially it would cost smaller
institutions approximately $18,560 to
comply with the proposed
amendments.112 Amortized over three
more detail in the cost-benefit analysis below, the
staff estimates that 56 percent of these 17,267
institutions, or 9,670 institutions, have one or more
affiliates. The staff estimates, for purposes of this
analysis, that each of the affiliated institutions has
one corporate affiliate. The staff estimates that these
affiliated institutions are likely to bear these
paperwork burdens on an organization-wide basis,
rather than being incurred by each institution.
Based on these estimates, the staff estimates there
would be 12,432 respondents to this information
collection. (17,267 ¥ (9,670 ÷ 2) = 12,432) These
estimates are discussed in more detail in the costbenefit analysis, see infra note 149 and
accompanying text.
110 See infra note 154 and accompanying text.
111 The staff estimate uses the midpoint of the
range of hours, although the average number of
burden hours could be higher or lower. Our
estimates are based on staff contacts with several
institutions regarding their current safeguarding
and disposal policies and procedures as well as the
potential costs of the proposed amendments.
Because the staff was able to discuss these issues
with only a small number of very large institutions,
and our estimates in this analysis are based largely
on this information, our estimates may be much
higher or lower than the range of actual current
costs related to compliance with Regulation S–P
and the range of potential costs associated with the
proposed amendments.
112 This estimate is based on a cost of $2,000 for
one hour of the board of directors’ time (at $2,000/
hour) and $16,560 for 40 hours of a program
coordinators’ time (at $414/hour). Staff believes that
the program coordinator would be a senior
executive of the institution, such as a chief
compliance officer of an investment adviser. For
purposes of this PRA analysis, the staff is using
salaries for New York-based employees which tend
to be higher than the salaries for comparable
positions located outside of New York. This
conservative approach is intended to capture
unforeseen costs and to account for the possibility
that a substantial portion of the work would be
VerDate Aug<31>2005
17:19 Mar 12, 2008
Jkt 214001
years, the estimated annual hourly
burden would be 14 hours at a cost of
approximately $6,187.
The staff estimates that the amount of
time larger institutions would devote to
initial compliance with the proposed
amendments would range from 40 hours
to 400 hours with a midpoint of 220
hours.113 This estimate reflects the
following burden hours: 2 hours for the
board of directors to designate an
information security program
coordinator; 2 hours for the program
coordinator to review the amendments;
42 hours to assess risks and review
procedures; 60 hours to review, revise
and implement new safeguards
(including any data breach notification
procedures); 60 hours to test the
effectiveness of the safeguards controls
and procedures; 34 hours to train staff;
and 20 hours to review service
providers policies and procedures and
revise contracts as necessary to require
them to maintain appropriate
safeguards. The staff estimates that
larger institutions would spend
approximately $172,732 to comply with
the proposed amendments initially.114
Amortized over three years, the
estimated annual hourly burden would
be 73 hours at a cost of approximately
$57,577.
On an annual, ongoing basis the staff
estimates that the amount of time
smaller institutions would devote to
ongoing compliance with the safeguards
and disposal rules, as they are proposed
to be amended, would range from 12
hours to 40 hours per year with a
midpoint of 26 hours per year. This
estimate reflects the following burden
hour estimates: 5 hours to regularly test
or monitor the safeguards’ key controls,
undertaken in New York. The salary information is
derived from data compiled by the Securities
Industry and Financial Markets Association. The
Commission staff has modified this information to
account for an 1,800-hour work year and multiplied
by 5.35 to account for bonuses, firm size, employee
benefits, and overhead. See Securities Industry and
Financial Markets Association, Report on
Management and Professional Earnings in the
Securities Industry (2007); Securities Industry and
Financial Markets Association, Report on Office
Salaries in the Securities Industry (‘‘SIFMA
Earnings Reports’’).
113 The staff estimate uses the midpoint of the
range of hours, although the average number of
burden hours could be higher or lower.
114 This estimate is based on a cost of $4,000 for
2 hours of board of directors’ time (at $2,000/hour)
and $168,732 for 218 hours of a group of
compliance professionals’ time (at $774/hour). The
staff believes that this group of compliance
professionals would include the program
coordinator at a rate of $414 per hour, an in-house
attorney at a rate of $295 per hour, and an
administrative assistant at a rate of $65 per hour.
See SIFMA Earnings Reports, supra note 112. In
total, we estimate that this group of compliance
professionals would cost the larger institution $758
per hour. $414 + $295 + $65 = $774.
PO 00000
Frm 00015
Fmt 4701
Sfmt 4702
13705
systems, and procedures; 3 hours to
augment staff training; 3 hours to
provide continued oversight of service
providers; 3 hours to evaluate and
adjust safeguards; 10 hours to respond
appropriately to potential incidents of
data security breach, including
investigating the breach and, as
necessary, notifying affected
individuals; and 2 hours to notify the
Commission or a designated examining
authority as soon as possible on
proposed Form SP–30, in the event
there is a significant risk that an
individual identified with the
information might suffer substantial
harm or inconvenience or an
unauthorized person has intentionally
obtained access to or used sensitive
personal information.115 We believe that
most institutions investigate data
security breaches as a matter of good
business practice to protect their
business operations and the sensitive
information they have about employees
and clients. Nevertheless, we have
estimated additional burden hours
because the proposed rule specifies
certain elements of the investigation and
the notice to affected individuals. We
also believe that an institution would
have gathered all the information that
would have to be disclosed in Form SP–
30 in the course of these investigations
of data security breaches. Thus, staff
estimates for the Form SP–30 collection
of information burden reflect only the
time it would take to draft the
information on the form. Staff estimates
that smaller institutions would spend an
additional $10,764 per institution per
year in connection with these
burdens.116
The staff also estimates that the
amount of time larger institutions would
115 We estimate that each covered institution that
has developed and adopted and is maintaining
safeguarding policies and procedures will
experience some form of breach of data security
each year. See, e.g., Deloitte & Touche LLP and
Ponemon Institute LLC, Enterprise@Risk: 2007
Privacy & Data Protection Survey (Dec. 2007),
https://www.deloitte.com/dtt/cda/doc/content/us_
risk_s%26P_2007%20Privacy10Dec2007final.pdf
(last visited Dec. 19, 2007) (85% of surveyed
privacy and security professionals experienced a
reportable breach within the past 12 months). These
data security breaches may range from minor
breaches (such as an individual who accidentally
sees data that he or she does not have authority to
view) to more serious breaches. Accordingly, we
have estimated that each of these institutions would
experience a data security breach that would
require notice to the Commission (or a designated
examining authority) each year. We understand that
the nature of security breaches will vary widely
within and among institutions, and that this
estimate may be much higher than the actual
reporting that would be required under the
proposed rule.
116 This estimate is based on the following
calculation: 26 hours per smaller institution per
year × $414 per hour = $10,764.
E:\FR\FM\13MRP3.SGM
13MRP3
13706
Federal Register / Vol. 73, No. 50 / Thursday, March 13, 2008 / Proposed Rules
devote to ongoing compliance with the
proposed amendments would range
from 32 hours to 100 hours with a
midpoint of 66 hours per year. This
estimate reflects the following burden
hour estimates: 12 hours to regularly
test or monitor the safeguards’ key
controls, systems, and procedures; 9
hours to augment staff training; 9 hours
to provide continued oversight of
service providers; 10 hours to evaluate
and adjust safeguards; 20 hours to
respond appropriately to potential
incidents of data security breach,
including investigating the breach and,
as necessary, notifying affected
individuals; and 6 hours to notify the
Commission or a designated examining
authority as soon as possible on
proposed Form SP–30, in the event
there is a significant risk that an
individual identified with the
information might suffer substantial
harm or inconvenience or an
unauthorized person has intentionally
obtained access to or used sensitive
personal information.117 Staff believes
that larger institutions are likely to have
more complex business operations and
data systems and may experience more
sophisticated security attacks than
smaller institutions. As a result, staff
anticipates that larger institutions are
more likely to conduct more
complicated investigations that require
more detailed explanations on proposed
Form SP–30. Staff estimates therefore
that larger institutions would take more
time to perform investigations and to
complete the questions on proposed
Form SP–30.118 The staff estimates that
larger institutions would spend
approximately an additional $51,084
per institution per year.119
Given the estimates set forth above,
we estimate that the weighted average
initial burden for each respondent
would be approximately 136 hours 120
and $100,036.121 We also estimate that
the weighted average ongoing burden
for each respondent would be
117 See
supra note 115.
recognize that the time it takes to perform
an investigation of a data security breach and to
complete Form SP–30 may vary significantly
depending on the nature, size and complexity of an
institution’s business operations as well as the
nature and size of the security breach. Accordingly,
the actual time it may take a particular institution
to investigate the breach and complete Form SP–30
may vary significantly from staff estimates.
119 This estimate is based on the following
calculation: 66 hours × $774 = $51,084.
120 This estimate is based on the following
calculation: ((5,862 smaller institutions × 41 hours)
+ (6,570 larger institutions × 220 hours) ÷ 12,432
total institutions = 135.60 hours.
121 This estimate is based on the following
calculation: ((5,862 smaller institutions × $18,560)
+ (6,570 larger institutions × $172,732)) ÷ 12,432
total institutions = $100,036.03.
mstockstill on PROD1PC66 with PROPOSALS3
118 We
VerDate Aug<31>2005
17:19 Mar 12, 2008
Jkt 214001
approximately 47 hours 122 and
$32,072.123
Scope of the Safeguards and Disposal
Rules
The amendments also would broaden
the scope of information and of the
entities covered by the safeguards and
disposal rules. These amendments do
not contain collections of information
beyond those related to the information
security and security breach response
requirements, analyzed above.
Records of Compliance
The proposed amendments would
require that written records required
under the disposal and safeguards rules
be maintained and preserved by brokerdealers for not less than three years, the
first two years in an easily accessible
place, by registered transfer agents for a
period of not less than two years, the
first year in an easily accessible place,
by investment companies for a period
not less than six years, the first two
years in an easily accessible place, and
registered investment advisers would
have to preserve the records for five
years, the first two years in an
appropriate office of the investment
adviser. Covered institutions are already
required pursuant to other Commission
rules to maintain and preserve similar
records in the same manner, and we do
not believe that the currently approved
collections of information for these rules
would change based on the proposed
amendments.124
Exception for Limited Information
Disclosure When Personnel Leave Their
Firms
The proposed amendments would
create a new exception from Regulation
S–P’s notice and opt out requirements
that would permit limited disclosures of
investor information when a registered
representative of a broker-dealer or
supervised person of a registered
investment adviser moves from one
brokerage or advisory firm to another.
This exception would require that the
departing representative provide the
broker, dealer, or registered investment
adviser he or she is leaving with a
written record of the permissible
information that would be disclosed
under this exception. Broker-dealers
and registered investment advisers also
122 This estimate is based on the following
calculation: ((5,862 smaller institutions × 26 hours)
+ (6,570 larger institutions × 66 hours)) ÷ 12,432
total institutions = 47.14 hours.
123 This estimate is based on the following
calculation: ((5,862 smaller institutions × $10,764)
+ (6,570 larger institutions × $51,084)) ÷ 12,432
total institutions = $32,072.12.
124 See 17 CFR 240.17a–4(b); 240.17Ad–7(b);
270.31a–2(a)(4)–(6); 275.204–2(e)(1).
PO 00000
Frm 00016
Fmt 4701
Sfmt 4702
would be required to retain a record of
that information consistent with
existing record retention requirements.
All broker-dealers and registered
investment advisers maintain records of
their customers and clients, including
relevant contact information and type of
account. Thus, we estimate that
allowing a departing representative to
make a copy of this information and
requiring the broker-dealer or registered
investment adviser to retain a record of
that information would not result in an
additional measurable burden to the
firm.
We request comment on whether
these estimates are reasonable. Pursuant
to 44 U.S.C. 3506(c)(2)(B), the
Commission solicits comments in order
to: (i) Evaluate whether the proposed
collections of information are necessary
for the proper performance of the
functions of the Commission, including
whether the information will have
practical utility; (ii) evaluate the
accuracy of the Commission’s estimate
of the burden of the proposed
collections of information; (iii)
determine whether there are ways to
enhance the quality, utility, and clarity
of the information to be collected; and
(iv) minimize the burden of the
collections of information on those who
are to respond, including through the
use of automated collection techniques
or other forms of information
technology.
Members of the public may direct to
us any comments concerning the
accuracy of these burden estimates and
any suggestions for reducing these
burden hours. Persons wishing to
submit comments on the collection of
information requirements of the
proposed amendments should direct
them to the Office of Management and
Budget, Attention Desk Officer of the
Securities and Exchange Commission,
Office of Information and Regulatory
Affairs, Room 10102, New Executive
Office Building, Washington, DC 20523,
and should send a copy to Nancy M.
Morris, Secretary, Securities and
Exchange Commission, 100 F Street,
NE., Washington, DC 20549–1090 with
reference to File No. S7–06–08. OMB is
required to make a decision concerning
the collections of information between
30 and 60 days after publication of this
release; therefore a comment to OMB is
best assured of having its full effect if
OMB receives it within 30 days after the
publication of this release. Requests for
materials submitted to OMB by the
Commission with regard to these
collections of information should be in
writing, refer to File No. S7–06–08, and
be submitted to the Securities and
Exchange Commission, Public Reference
E:\FR\FM\13MRP3.SGM
13MRP3
Federal Register / Vol. 73, No. 50 / Thursday, March 13, 2008 / Proposed Rules
Room, 100 F Street, NE., Washington,
DC 20549.
mstockstill on PROD1PC66 with PROPOSALS3
V. Cost-Benefit Analysis
The Commission is sensitive to the
costs and benefits imposed by its rules.
We have identified certain costs and
benefits of the proposed amendments
and request comment on all aspects of
this cost-benefit analysis, including
identification and assessment of any
costs and benefits not discussed in this
analysis. We seek comment and data on
the value of the benefits identified. We
also welcome comments on the
accuracy of the cost estimates in each
section of this analysis, and request that
commenters provide data so we can
improve these cost estimates. In
addition, we seek estimates and views
regarding these costs and benefits for
particular covered institutions,
including registered transfer agents, as
well as any other costs or benefits that
may result from the adoption of these
proposed amendments.
As discussed above, the proposed rule
amendments are designed to enhance
covered institutions’ information
security policies and procedures as well
as their ability to protect personal
information. Under Regulation S–P,
covered institutions have been required
to safeguard customer records and
information since 2001 and to dispose
properly of consumer report information
since 2005. The proposed amendments
would modify Regulation S–P’s current
safeguards and disposal rules to: (i)
Require more specific standards under
the safeguards rule, including standards
that would apply to data security breach
incidents; (ii) broaden the scope of
information and the types of institutions
and persons covered by the rules; and
(iii) require covered institutions to
maintain written records of their
policies and procedures and their
compliance with those policies and
procedures. The proposed amendments
also would create a new exception from
Regulation S–P’s notice and opt-out
requirements that would not unduly
restrict the transfer of representatives
from one broker-dealer or registered
investment adviser to another while
protecting customer information.
A. Costs and Benefits of More Specific
Information Security and Security
Breach Standards
As noted, since 2001 broker-dealers,
investment companies, and registered
investment advisers have been required
to adopt policies and procedures
reasonably designed to insure the
security and confidentiality of customer
records and information, protect against
anticipated threats or hazards, and
VerDate Aug<31>2005
17:19 Mar 12, 2008
Jkt 214001
protect against unauthorized access to
or use of customer records and
information.125 The proposed rule
amendments would require more
specific standards for safeguarding
personal information, including
standards for responding to data
security breaches. The amendments
would require covered institutions to
develop, implement, and maintain a
comprehensive ‘‘information security
program’’ for protecting personal
information and for responding to
unauthorized access to or use of
personal information that would have to
be appropriate to the institution’s size
and complexity, the nature and scope of
its activities, and the sensitivity of the
personal information involved. The
information security program would
have to include seven safeguarding
elements, as described above in section
II.A. Our proposed amendments also
would specifically require that
institutions’ information security
programs include procedures for
responding to incidents of unauthorized
access to or use of personal information.
We believe that these proposed
amendments would be consistent with
safeguarding guidance and rules issued
by the Banking Agencies and the
FTC.126
1. Benefits of More Specific Information
Security and Security Breach Standards
We anticipate that the proposed
amendments would benefit covered
institutions and investors by providing
specific standards for policies and
procedures to safeguard investor
information, boosting investor
confidence and mitigating losses due to
security breach incidents, helping to
ensure that information security
programs are actively managed and
regularly updated, and reducing the
compliance burden for institutions in
the event of a data security breach
incident.
One benefit of the proposed
information security and security breach
standards would be to provide firms in
the securities industry with detailed
standards for the policies and
procedures that a well-designed
information security program should
include. As already noted, a significant
increase in reported information
security breaches involving covered
institutions, including increasingly
sophisticated identity theft attacks
directed at the securities industry, have
125 See 15 U.S.C. 6801; 17 CFR 248.30(a). The
Commission also required that safeguarding
policies and procedures be in writing by July 1,
2005. See Disposal Rule Adopting Release, supra
note 15.
126 See supra note 23 and accompanying text.
PO 00000
Frm 00017
Fmt 4701
Sfmt 4702
13707
altered the risk environment and
brought to our attention the
vulnerability of certain of our
institutions’ information security
policies and procedures.127 We are
concerned that some Commissionregulated institutions may not regularly
reevaluate and update their
safeguarding programs to deal with
these increasingly sophisticated
methods of attack. As a result, our staff
has devoted increased attention to this
area.
The current rule’s reasonable design
standard has permitted institutions
flexibility to implement safeguarding
policies and procedures tailored to their
own privacy policies and practices and
their varying business operations. While
many institutions have appropriate
safeguards in place, some institutions,
including some smaller institutions,
may have had difficulty keeping up
with the changes in the threat
environment. Setting out a more specific
framework for institutions’ continuing
obligation to protect customer
information, may ease institutions’
burden in interpreting our expectations
of safeguarding policies and procedures
that are ‘‘reasonably designed,’’ while
retaining much of the current rule’s
flexibility.
We believe the proposed amendments
would be consistent with the
Commission’s initial statutory mandate
under the GLBA to adopt, in 2000, final
financial privacy regulations that are
consistent and comparable with those
adopted by other federal financial
regulators.128 As noted above, after our
adoption of Regulation S–P’s safeguards
rule, the FTC and the Banking Agencies
issued regulations with more detailed
standards applicable to the institutions
they regulate.129 The Banking Agencies
also issued guidance for their
institutions on responding to incidents
of unauthorized access to or use of
customer information.130 Our proposed
amendments include safeguarding
elements consistent with the regulatory
provisions of these other agencies that
Commission-regulated institutions
would have to address in their
safeguarding policies and procedures.131
127 See
128 See
supra notes 16–19 and accompanying text.
Section 504(a) of the GLBA (15 U.S.C.
6804(a)).
129 See supra note 23 and accompanying text.
130 Id.
131 When the FTC adopted its safeguards rule, it
stated that an entity that demonstrated compliance
with the Banking Agencies’ or NCUA’s safeguarding
standards also would satisfy the FTC rule. The FTC
stated, however, that it would not automatically
recognize an institution’s compliance with other
safeguards rules (including Regulation S–P) as
satisfying the FTC Safeguards Rule. The FTC stated
E:\FR\FM\13MRP3.SGM
Continued
13MRP3
13708
Federal Register / Vol. 73, No. 50 / Thursday, March 13, 2008 / Proposed Rules
mstockstill on PROD1PC66 with PROPOSALS3
Covered institutions would benefit
from having specific standards that are
consistent and comparable to those
already adopted by the Banking
Agencies and the FTC in other ways.
For example, covered institutions that
have banking affiliates may have already
developed policies and procedures
consistent with the Banking Agencies’
guidance that are applied to all affiliates
of the bank. If they do not have the same
policies and procedures, these covered
institutions would be able to apply the
banking affiliate’s policies and
procedures to the securities businesses
with few changes. More specific
safeguarding standards also could
increase investor confidence in
institutions and help mitigate losses that
can result from lax safeguarding policies
and procedures. Incidents of identity
theft have affected a large number of
Americans and are difficult and
expensive for victims to deal with and
correct.132 Moreover, there is at least
anecdotal evidence that the wave of
widely-reported incidents of data
security breaches have played a role in
discouraging a significant number of
individuals from conducting business
online.133 The proposed amendments
could benefit investors and increase
their confidence by providing firms
with detailed standards for the
processes that a well-designed
information security program should
include. This could result in enhanced
protection for the privacy of investor
information, and could decrease
incidents of identity theft, thereby
mitigating losses due to identity theft
and other misuses of sensitive
that it made this decision because ‘‘such other rules
and law do not necessarily provide comparable
protection in terms of the safeguards mandated,
data covered, and range of circumstances to which
protection apply.’’ See Standards for Safeguarding
Customer Information, 67 FR 36484 (May 23, 2003),
at text accompanying and following nn.28–33.
Compliance with other Regulation S–P provisions,
however, currently satisfies other FTC privacy
requirements. Thus, we expect that making the
safeguarding provisions of Regulation S–P
comparable to the FTC’s requirements would
benefit institutions by, for example, permitting
state-registered investment advisers to satisfy the
FTC standards by complying with the
Commission’s safeguards rule, which was drafted to
address investment advisory business models.
132 In 2003 the FTC reported that up to 10 million
Americans had been victimized by identity theft
over a 12-month period and that these thefts cost
businesses and consumers over $52 billion. See
FTC, Identity Theft Survey Report (Sept. 2003),
available at https://www.ftc.gov/os/2003/09/
synovatereport.pdf.
133 A July 2005 study found that 48 percent of
consumers avoided making purchases on the
Internet because they feared their personal
information may be stolen. See Cyber Security
Industry Alliance, Internet Voter Survey, at 9 (June
2005), https://www.csialliance.org/publications/
surveys_and_polls/CSIA_Internet_Security_Survey_
June_2005.pdf (last visited Nov. 6, 2007).
VerDate Aug<31>2005
17:19 Mar 12, 2008
Jkt 214001
information. We also believe that the
increased protection that could result
from the proposed amendments could
benefit institutions, which frequently
incur the costs of fraudulent activity.134
Thus, if only a small number of security
breach incidents were averted because
the proposed amendments were
adopted, there still could be a
significant cost savings to individuals
and institutions.135
As noted above, we are concerned
that some institutions do not regularly
reevaluate and update their
safeguarding programs. Requiring
covered institutions to designate in
writing an employee or employees to
coordinate their information security
programs should foster clearer
delegations of authority and
responsibility, making it more likely
that an institution’s programs are
regularly reevaluated and updated.
Having an information security program
coordinator also could contribute to an
institution’s ability to meet its
affirmative and continuing obligation
under the GLBA to safeguard customer
information.136 If, for example, elements
of a covered institution’s information
security program were not maintained
on a consolidated basis, but were
dispersed throughout an institution, we
believe having a responsible program
coordinator or coordinators should
facilitate the institution’s awareness of
these elements, as well as enable it to
better manage and control risks and
conduct ongoing evaluations.
We expect that the proposed
framework for the initial and ongoing
oversight of institutions’ information
security programs—in the form of
formal risk assessments, periodic testing
or monitoring of key controls, systems,
and procedures, staff training, and
relevant evaluations and adjustments—
would help to ensure that information
security programs are appropriately
updated along with relevant changes in
134 In most cases, financial institutions do not
impose the losses associated with fraudulent
activity on consumers. See, e.g., Testimony of
Oliver I. Ireland, on Behalf of the Financial Services
Coordinating Council, H.R. 3997, the ‘‘Financial
Data Protection Act of 2005,’’ Before the Subcomm.
on Financial Institutions and Consumer Credit,
House Comm. on Financial Services (Nov. 9, 2005),
available at https://www.sia.com/testimony/2005/
ireland11-9-05.html.
135 One research institution has estimated that the
average cost of a data security breach incident per
institution is $1.4 million. See Ponemon Institute,
LLC, 2006 Annual Study: Cost of a Data Breach
(Oct. 2006), https://download.pgp.com/pdfs/
Ponemon2-Breach-Survey_061020_F.pdf (last
visited Nov. 6, 2007). In addition, some
investigations into data breach incidents have been
reported to cost as much as $5 million. See Daniel
Wolfe, Security Watch, Amer. Banker (Apr. 4,
2007).
136 See 15 U.S.C. 6801(a).
PO 00000
Frm 00018
Fmt 4701
Sfmt 4702
technology, new business arrangements,
changes in the threat environment, and
other circumstances. Finally, the
proposed amendment that would
require covered institutions to take
reasonable steps to select and retain
service providers that are capable of
maintaining appropriate safeguards and
would require service providers by
contract to implement and maintain
appropriate safeguards should help to
ensure that sensitive personal
information is protected when it leaves
the institution’s custody, while still
permitting institutions the flexibility to
select appropriate service providers.
The proposed requirement that
information security programs include
specific procedures for responding to
incidents of unauthorized access to or
use of personal information is designed
to benefit investors and institutions. The
requirement would benefit investors
who receive notice of an information
security breach pursuant to an
institution’s incident response
procedures by allowing those investors
to take precautions to the extent they
believe necessary.137 The procedures
also would benefit institutions by
establishing a national data breach
notification requirement for covered
institutions.138 Currently at least 39
states have enacted statutes requiring
notification of individuals in the event
of a data security breach.139 This
patchwork of overlapping and
sometimes inconsistent regulation has
created a difficult environment for
financial institutions’ compliance
programs. However, many of the state
statutes contain exemptions for entities
regulated by federal data security breach
regulations.140 Accordingly, the
proposed amendments could benefit
covered institutions by significantly
reducing the number of requirements
with which covered institutions must
137 Often victims of identity theft are unaware of
the crime until they are denied credit or
employment, or are contacted by a debt collector for
payment on a debt they did not incur. See Identity
Theft Task Force, Combating Identity Theft, A
Strategic Plan, p. 3 (Apr. 2007), available at https://
www.idtheft.gov/reports/StrategicPlan.pdf.
138 Establishing national standards for data breach
notification requirements was a recommendation of
the Identity Theft Task Force. Id. at p. 35.
139 See Government Accountability Office,
Personal Information: Data Breaches Are Frequent,
but Evidence of Resulting Identity Theft Is Limited;
However, the Full Extent Is Unknown (Jun. 4, 2007)
at p. 2, and National Conference of State
Legislatures, State Security Breach Notification
Laws (as of Dec. 1, 2007), https://www.ncsl.org/
programs/lis/cip/priv/breachlaws.htm (last visited
Dec. 10, 2007).
140 See, e.g., Crowell & Moring LLP, State Laws
Governing Security Breach Notification (last
updated Apr. 2007), https://www.crowell.com/pdf/
SecurityBreachTable.pdf (last visited Dec. 10,
2007).
E:\FR\FM\13MRP3.SGM
13MRP3
Federal Register / Vol. 73, No. 50 / Thursday, March 13, 2008 / Proposed Rules
comply.141 As noted, the banking
regulators published similar data breach
notification guidance in 2005.142
We request comment on available
metrics to quantify these benefits and
any other benefits the commenter may
identify. In particular, we request
comment reflecting institutions’
experiences in safeguarding customer
information and addressing the security
breach incidents discussed above.
Commenters are also requested to
identify sources of empirical data that
could be used for the metrics they
propose.
mstockstill on PROD1PC66 with PROPOSALS3
2. Costs of More Specific Information
Security and Security Breach Standards
Some institutions would likely incur
additional costs in reviewing,
implementing, and maintaining more
specific information security and
security breach standards. Institutions
could incur additional costs in
reviewing current safeguarding policies
and procedures and designing and
implementing new ones, if necessary,
on an initial basis. Institutions also
could incur additional costs on an
ongoing basis to maintain up-to-date
information security programs and to
respond appropriately to any data
security breach incidents.
According to Commission filings,
approximately 6,016 broker-dealers,
4,733 investment companies comprising
portions of 813 fund complexes,143 77
141 Under the proposed amendments, for
example, using proposed Form SP–30 would satisfy
an institution’s obligations to notify the
Commission or the appropriate designated
examining authority. Because many state laws have
exceptions from breach notification requirements
for institutions subject to federal breach notification
requirements, this would streamline institutions’
current reporting obligations to numerous state
authorities.
142 See Interagency Guidance on Response
Programs for Unauthorized Access to Customer
Information and Customer Notice, 70 FR 15736
(Mar. 29, 2005), available at https://
www.occ.treas.gov/consumer/
Customernoticeguidance.pdf. The guidance
supplements the Interagency Guidelines
Establishing Standards for Safeguarding
Information which was renamed the Interagency
Guidelines Establishing Information Security
Standards.
143 Although the circumstances for every
investment company vary, we believe that in
general the costs of complying with the proposed
rule amendments would be incurred on a per fund
complex basis and not on a per fund basis because
almost all investment companies are externally
managed by affiliated organizations and
independent contractors, who, if the proposals are
adopted, are likely to review and implement the
amended rules on behalf of all of the investment
companies they manage. See, e.g., Investment
Company Institute, A Guide to Understanding
Mutual Funds, at 16, Sept. 2006, available at
https://www.ici.org/pdf/bro_understanding_mfs_
p.pdf (last visited Dec. 3, 2007). Thus, throughout
this cost-benefit analysis we estimate the costs of
compliance on a per fund complex basis.
VerDate Aug<31>2005
17:19 Mar 12, 2008
Jkt 214001
business development companies, 9,860
registered investment advisers, and 501
registered transfer agents, or 17,267
covered institutions, would be required
to comply with the proposed
amendments’ more specific information
security and security breach
standards.144 As noted, broker-dealers,
investment companies, and registered
investment advisers have been required
to have reasonably designed
safeguarding policies and procedures
since 2001. In addition, transfer agents
have been required to have information
security safeguards since 2003, in
accordance with the FTC Safeguards
Rule.145 We estimate that 56 percent of
all covered institutions, or 9,670
institutions, have one or more financial
affiliates (whether these institutions are
regulated by the Commission or other
federal financial regulators).146 We
estimate that each of the affiliated
institutions has one corporate affiliate.
Based on limited inquiries of covered
institutions, we believe that these
affiliated institutions are likely to have
developed safeguarding policies and
procedures on an organization-wide
basis, rather than each affiliate
developing policies and procedures on
its own.147 We also believe that the
affiliate that developed the affiliated
organization’s safeguarding policies and
procedures is also responsible for
maintaining these policies and
procedures. We therefore estimate that
one-half of the covered affiliated
institutions, or 4,835 institutions, have
developed, documented, and are
maintaining safeguarding policies and
procedures, while the other half instead
use the policies and procedures
developed, documented, and
maintained by their affiliate.148
Accordingly, we estimate that 12,432
covered institutions have developed and
adopted safeguarding policies and
procedures and are maintaining these
144 This estimate is based on the following
calculation: 6,016 + 813 + 77 + 9,860 + 501 =
17,267.
145 See supra note 23.
146 The estimate that 56 percent of registrants
have an affiliate is based upon statistics reported as
of December 3, 2007 on Form ADV, the Universal
Application for Investment Adviser Regulation,
which contains specific questions regarding
affiliations between investment advisers and other
persons in the financial industry. We estimate that
other institutions subject to the safeguards rule
would report a rate of affiliation similar to that
reported by registered investment advisers. The
estimate that 9,670 institutions have an affiliate is
based on the following calculation: 17,267 × 0.56
= 9,669.52.
147 See supra note 109.
148 This estimate is based on the following
calculation: 9,670 ÷ 2 = 4,835.
PO 00000
Frm 00019
Fmt 4701
Sfmt 4702
13709
policies and procedures in accordance
with the current rule.149
We expect that these institutions’
current costs to maintain safeguarding
policies and procedures in compliance
with the Commission’s safeguards rule
vary greatly depending upon the size of
the institution, its customer base, the
complexity of its business operations,
and the extent to which the institution
engages in information sharing. Thus,
for example, we estimate that small
investment advisers with fewer than 10
employees require more limited
safeguarding policies and procedures to
address a limited scope of information
transfer, storage, and disposal. We
believe that larger broker-dealers or
fund complexes, by contrast, are more
likely to have and maintain a more
extensive set of information
safeguarding policies and procedures,
corresponding to these institutions’
more complex business activities and
information sharing practices.
Of the covered institutions, we
estimate that 7,030 registered
investment advisers have 10 or fewer
employees.150 We estimate that 942
broker-dealers and investment company
complexes are small institutions, and
are likely to have no more than 10
employees.151 Based on Commission
filings, we also estimate that 170
transfer agents are smaller institutions
that are likely to have no more than 10
employees. We therefore estimate that
8,142 institutions, out of 17,267 covered
institutions, are smaller institutions that
are likely to have no more than 10
employees.152 We believe that the
institutions that have developed and
adopted safeguarding policies and
procedures are as likely to be smaller
institutions with no more than 10
employees as the total population of
covered institutions.153 Therefore, of
12,432 covered institutions that we
estimate have developed and adopted
and are maintaining safeguarding
policies and procedures, we estimate for
purposes of this analysis that 5,862
institutions are smaller institutions,
149 This estimate is based on the following
calculation: (17,267 ¥ 9,670) + 4,835 = 12,432.
150 See Investment Adviser Association,
Evolution Revolution, A Profile of the Investment
Adviser Profession (2006), available at https://
www.nrs-inc.com/ICAA/EvRev06.pdf.
151 As noted below, 915 broker-dealers and 238
investment companies, representing 27 fund
complexes, are small entities.
152 This estimate is based on the following
calculation: 7,030 + 942 + 170 = 8,142 smaller
institutions.
153 8,142 ÷ 17,267 = 0.4715.
E:\FR\FM\13MRP3.SGM
13MRP3
13710
Federal Register / Vol. 73, No. 50 / Thursday, March 13, 2008 / Proposed Rules
mstockstill on PROD1PC66 with PROPOSALS3
while 6,570 institutions are larger
institutions.154
Based on conversations with
representatives of covered institutions,
and information collected from limited
inquiries of covered institutions, we
estimate that smaller institutions are
currently spending between $5,000 and
$1,000,000 per year to comply with the
safeguards and disposal rules.155 We
also estimate that larger institutions are
spending between $200,000 and
$10,000,000 per year to comply with the
safeguards and disposal rules. These
estimates include costs for dedicated
personnel, maintaining up-to-date
policies and procedures, enforcing
various safeguarding requirements (such
as ‘‘clean desk’’ requirements), hiring
contractors to properly dispose of
sensitive information, developing and
enforcing access procedures, ongoing
staff training, monitoring and reviewing
compliance with safeguarding
standards, and computer encryption.
These estimates also include current
spending to comply with state data
security breach statutes.156
We expect that most covered
institutions have information security
programs in place that would be
consistent with the proposed
amendments.157 We do not have a
reliable basis for estimating the number
of institutions that would incur
additional costs or the extent to which
those institutions would have to
enhance their policies and procedures,
including documentation of the
154 12,432 × 0.4715 = 5,861.88; 12,432 ¥ 5,862 =
6,570.
155 See supra note 111.
156 These estimates also include transfer agents’
current spending to comply with the FTC
Safeguards Rule. As noted, the proposed
amendments would apply to every broker or dealer
other than a notice-registered broker or dealer,
every investment company, and every investment
adviser or transfer agent registered with the
Commission. See proposed paragraph (a)(1) of
Section 30.
157 This belief is consistent with the analysis of
the Office of the Comptroller of the Currency and
Office of Thrift Supervision when they adopted the
Banking Agencies Safeguard Guidelines in 2001. At
that time they stated with respect to the institutions
they regulated, that ‘‘most if not all institutions
already have information security programs in place
that are consistent with the Banking Agencies’
Security Guidelines. In such cases, little or no
modification to an institution’s program will be
required.’’ See Banking Agencies’ Security
Guidelines, supra note 23. The statement was made
in the analysis of whether the Guidelines would
constitute ‘‘a significant regulatory action’’ for
purposes of Executive Order 12866, which includes
an action that would have an annual effect on the
economy of $100 million or more or adversely affect
in a material way the economy, a sector of the
economy, productivity, competition, jobs, the
environment, public health or safety, or State, local,
or tribal governments or communities. The Board
and the FDIC did not prepare an analysis under
Executive Order 12866.
VerDate Aug<31>2005
17:19 Mar 12, 2008
Jkt 214001
information safeguard program and its
elements. Accordingly, we have
estimated the range of additional costs
that individual firms could incur. We
seek comment on the number of firms
that have information safeguard
programs that would satisfy the
proposed amendments, the number of
firms that would have to enhance their
programs, the extent of those
enhancements, and the costs of
enhancement.
If the proposed amendments were
adopted, covered institutions could
incur costs to supplement their current
information security programs in some
or all of the following ways. First, the
institution would be required to review
and, as appropriate, revise its current
safeguarding policies and procedures,
including their data security breach
procedures and disposal rule
procedures, to comply with the more
specific requirements of the proposed
amendments. Initially this would
require the institutions to: (i) Designate
an employee or employees as
coordinator for the information security
program; (ii) identify in writing
reasonably foreseeable security risks
that could result in the unauthorized
access or compromise of personal
information or personal information
systems; (iii) review existing or design
new safeguards to control these risks;
(iv) train staff to implement the
safeguards; and (v) test the effectiveness
of the safeguards’ key controls,
including access controls, controls to
detect, prevent and respond to incidents
of unauthorized access to or use of
personal information. Second, an
institution also would be required to
review its service providers’ information
safeguards and determine whether its
service providers are capable of
maintaining appropriate safeguards for
personal information, document this
finding, and enter into contracts with
the service providers to implement and
maintain appropriate safeguards.
Third, an institution would be
required to review existing safeguarding
procedures relating to data security
breach incidents. Initially, this could
include: (i) Assessing current policies
and procedures for responding to data
breach incidents; and (ii) designing and
implementing written policies and
procedures to assess, control, and
investigate incidents of unauthorized
access or use of sensitive personal
information, as well as policies and
procedures to notify individuals and the
Commission or a broker-dealer’s
designated examining authority, if
necessary.
Fourth, to comply with these
amendments on an ongoing basis,
PO 00000
Frm 00020
Fmt 4701
Sfmt 4702
institutions would be required to: (i)
Regularly test or monitor, and maintain
a written record of the effectiveness of
their safeguards’ key controls, systems
and procedures (including an
assessment of personal information
system access controls, controls
designed to detect, prevent and respond
to data security breach incidents, and
controls related to employee training or
supervision); (ii) train staff to
implement their information security
program; (iii) continue and document
their oversight of service providers; and
(iv) evaluate and adjust their
information security programs in light
of testing and monitoring, and changes
in technology, business operations or
arrangements, and other material
circumstances.
Finally, an institution would be
required to begin to respond to any data
security breach incidents as may occur
on an ongoing basis. This would include
implementing and following written
procedures to: (i) Assess the nature and
scope of the incident; (ii) take
appropriate steps to contain and control
it, and document those steps in writing;
(iii) promptly conduct a reasonable
investigation and make a written
determination of the likelihood that
sensitive personal information had been
or would be misused; (iv) if misuse of
information had occurred or were
reasonably likely, notify affected
individuals; and (v) if an individual
identified with the information had
suffered substantial harm or
inconvenience, or any unauthorized
person had intentionally obtained
access to or used sensitive personal
information, notify the Commission, or
the appropriate designated examining
authority as soon as possible on
proposed Form SP–30.
We expect these estimated costs
would vary significantly depending on
the size of the institution, the adequacy
of its existing safeguarding policies and
procedures, and the nature of the
institution’s operations. The
‘‘reasonably designed’’ standard for
information security programs in the
proposed rule amendments is consistent
with the current safeguards and disposal
rules. Thus, we believe it should be
relatively straightforward for an
institution that does not currently have
policies and procedures that apply to
specific elements of the proposed
amendments to incorporate these
elements into its current system of
safeguarding policies and procedures. In
addition, we estimate that little or no
modification to an institution’s
safeguarding policies and procedures
would be required in situations where a
covered institution’s affiliate developed
E:\FR\FM\13MRP3.SGM
13MRP3
Federal Register / Vol. 73, No. 50 / Thursday, March 13, 2008 / Proposed Rules
mstockstill on PROD1PC66 with PROPOSALS3
its existing safeguarding policies and
procedures in compliance with the
Banking Agencies’ safeguarding
guidance or the FTC’s rules.
In addition to an institution’s size, the
adequacy of its safeguards, and its
operations, we expect that institutions’
information security programs would
vary considerably depending on the way
in which each collects information, the
number and types of entities to which
each transfers information, and the ways
in which each stores, transfers, and
disposes of personal information. Based
on conversations with representatives of
covered institutions and information
collected from limited inquiries of
institutions, our staff estimates that the
additional initial costs that an
institution could incur to comply with
the proposed amendments could range
from 0 to 10 percent of its current costs
of maintaining an information security
program. Our staff also estimates that
the additional costs an institution could
incur for ongoing compliance with the
proposed amendments could range from
0 to 5 percent of its current costs.158 For
purposes of the PRA, staff estimates that
for a smaller institution, the initial costs
could range from between $500 and
$100,000, with an approximate cost of
$18,560 per smaller institution.159 Staff
also estimates that for a smaller
institution, additional ongoing costs
could range from between $250 and
$50,000, with an approximate cost of
$10,764 per smaller institution per
year.160 With respect to a larger
institution, again for purposes of the
PRA, staff estimates that initial costs
could range from between $20,000 and
$1 million, with an approximate cost of
$172,732 per larger institution.161 Staff
further estimates that for a larger
institution, additional ongoing costs
could range from between $10,000 and
$500,000 per year, with an approximate
cost of $51,084 per larger institution per
year.162 We note that an institution that
currently incurs the highest estimated
costs for its information security
program seems likely already to have a
comprehensive information security
program and therefore would be less
likely to require program enhancements
158 While we estimate that additional initial and
ongoing costs would vary significantly across wide
ranges, we estimate that the average cost per
institution would be concentrated in the lower end
of those ranges because, as noted, we believe that
most institutions have already developed and
adopted safeguarding and disposal polices and
procedures, and are maintaining these policies and
procedures, in accordance (or substantially in
accordance) with the proposed rule amendments.
159 See supra note 112 and accompanying text.
160 See supra note 116 and accompanying text.
161 See supra note 114 and accompanying text.
162 See supra note 119 and accompanying text.
VerDate Aug<31>2005
17:19 Mar 12, 2008
Jkt 214001
to comply with the rule. Accordingly,
the high end of the range of estimated
costs for institutions may be excessive.
We request comment on our estimated
costs and our rationale underlying them,
and any aspect of the estimates or other
costs that we have not considered. We
seek information about particular costs
of compliance as well as information as
to any overall percentage increase in
costs that firms would likely incur as a
result of the proposed amendments. We
request comment accompanied with
statistical or other quantitative
information, and comment on the
experiences of institutions in addressing
the circumstances addressed above.
Commenters should identify the metrics
of any empirical data that support their
cost estimates.
B. Costs and Benefits of Broadened
Scope of Information and of Covered
Institutions
The proposed rule amendments
would broaden the scope of information
covered by the safeguards and disposal
rules. From the perspective of ease of
compliance, we anticipate that
institutions would benefit from having a
common set of rules that apply to both
nonpublic personal information about
customers and consumer report
information. We also expect that
investors would benefit from expanding
the scope of information covered by the
safeguards and disposal rules because
both terms exclude some information
that without protections could more
easily be used to obtain unauthorized
access to investors’ personal financial
information. Because we expect that this
expansion of the scope of information
covered by the safeguards and disposal
rules would not require modification of
institutions’ current policies and
procedures, or their systems and
databases for implementing these
policies and procedures, and because
many firms currently protect nonpublic
personal information about customers
and consumer report information in the
same way, we expect that the proposal
would result in no significant, if any,
additional costs to institutions.
The amendments also would expand
the scope of the safeguards rule to
include registered transfer agents, limit
the scope of the safeguards rule to
exclude notice-registered broker-dealers,
and extend the disposal rule to apply to
natural persons. As noted above,
bringing registered transfer agents
within the scope of our safeguards rule
should benefit investors because these
institutions maintain sensitive personal
information. We included registered
transfer agents in our estimate of the
costs of the proposed information
PO 00000
Frm 00021
Fmt 4701
Sfmt 4702
13711
security and security breach procedures
above.163 Because transfer agents are
currently subject to the FTC Safeguards
Rule, which, if the proposed
amendments were adopted, would be
substantially similar to the
Commission’s safeguards and disposal
rules, we do not anticipate that there
would be any unique or unusual costs
to transfer agents, beyond those
discussed above. Similarly, we do not
anticipate any costs or benefits resulting
from the proposal to exclude noticeregistered broker-dealers from
Regulation S–P because they would be
subject to the CFTC’s substantially
similar safeguards rules. This proposal
would simply clarify that noticeregistered broker-dealers need not
comply with both Regulation S–P and
the CFTC’s rules.
We expect that the proposal to
include natural persons within the
scope of the disposal rule would benefit
investors by establishing a system
designed to ensure that personal
information is disposed of properly by
employees, particularly those who may
work in branches far from a covered
institution’s main office. We also
believe that this proposal would benefit
investors by requiring compliance by
natural persons, associated with a
covered institution, who are directly
responsible for properly disposing of
personal information consistent with
the institution’s policies. We do not
expect that this proposal would result in
costs to institutions beyond those that
would be imposed by the more specific
standards analyzed above in section
V.A.2. Specifically, we believe that any
changes that would be required to
covered institutions’ policies and
procedures or training programs to make
it clear that individuals (not just firms)
would have responsibility for
complying with the disposal rule are
captured in our estimates above.
We request comment on these
estimates of benefits and costs and our
rationale underlying them, and any
aspect of the estimates or other benefits
or costs that we have not considered. In
particular, we request comment
accompanied with statistical or other
quantitative evidence, and comment on
the experiences of institutions in
addressing the circumstances addressed
above. Commenters should identify the
metrics and sources of any empirical
data that support their cost estimates.
C. Costs and Benefits of Maintaining
Written Records
The proposed amendments would
require covered institutions to maintain
163 See
E:\FR\FM\13MRP3.SGM
supra section V.A.2.
13MRP3
13712
Federal Register / Vol. 73, No. 50 / Thursday, March 13, 2008 / Proposed Rules
mstockstill on PROD1PC66 with PROPOSALS3
and preserve, in an easily accessible
place, written records of the safeguards
and disposal policies and procedures.
The amendments also would require
that institutions document compliance
with their policies and procedures, and
that records would have to be
maintained for a period consistent with
current requirements for similar records.
We expect that this proposal would
benefit investors by enabling the
Commission’s examination staff to
evaluate whether institutions are in
compliance with the requirements of the
proposed amendments to the safeguards
and disposal rules. We anticipate that
institutions are unlikely to incur
significant costs in maintaining records
or documenting compliance to meet the
requirements of this proposal because
we would expect to establish a date for
compliance with these amendments that
would permit institutions to document
and maintain these records in the
normal course of ordinary business.
Thus, we do not expect that this
proposal would result in costs to
institutions beyond those that would be
imposed by the more specific standards
analyzed above in section V.A.2.
We request comment on these
estimates of benefits and costs and our
rationale underlying them, and any
aspect of the estimates or other benefits
or costs that we have not considered. In
particular, we request comment
accompanied with statistical or other
quantitative evidence, and comment on
the experiences of institutions in
addressing the circumstances addressed
above. Commenters should identify the
metrics and sources of any empirical
data that support their cost estimates.
D. Costs and Benefits of Proposed New
Exception
Our proposed amendments would
create a new exception from Regulation
S–P’s notice and opt out requirements
for disclosures of limited information in
connection with the departure of a
representative of a broker-dealer or
investment adviser. The proposal
should enhance information security by
providing a clear framework for
transferring limited information from
one firm to another in this context. At
firms that choose to rely on it, the
proposed exception also should reduce
potential incentives some
representatives may have to take
information with them secretly when
they leave. In addition, the amendment
should promote investor choice
regarding whether to follow a departing
representative to another firm.
Institutions that choose to rely on the
proposed exception also should benefit
from the greater legal certainty that it
VerDate Aug<31>2005
17:19 Mar 12, 2008
Jkt 214001
would provide. We expect that
institutions would incur minimal costs
in retaining a written record of the
information that would be disclosed in
connection with a representative’s
departure, and expect that for a number
of firms such costs are incurred already
in the ordinary course of business.164
Institutions need not provide these
disclosures. Thus we anticipate that
only those that expect the potential
benefits from the disclosure would
justify any associated costs would make
the disclosures.
We request comment on this cost
estimate and our rationale underlying it,
and any aspect of the estimates or other
costs that we have not considered. In
particular, we request comment
accompanied with statistical or other
quantitative evidence, and the
experiences of institutions in addressing
the circumstances addressed above.
Commenters should identify the metrics
and sources of any empirical data that
support their cost estimates.
E. Request for Comment
We request comment on all aspects of
this cost-benefit analysis, including
comment as to whether the estimates we
have used in our analysis are
reasonable. We welcome comment on
any aspect of our analysis, the estimates
we have made, and the assumptions we
have described. In particular, we request
comment as to any costs or benefits we
may not have considered here that
could result from the adoption of the
proposed amendments. We also request
comment on the numerical estimates we
have made here, and request comment
and specific costs and benefits from
covered institutions that have
experienced any of the situations
analyzed above.
VI. Initial Regulatory Flexibility
Analysis
This Initial Regulatory Flexibility
Analysis (‘‘IRFA’’) has been prepared in
accordance with 5 U.S.C. 603. It relates
to proposed amendments to Regulation
S–P that seek to strengthen the
protections for safeguarding and
disposing of sensitive personal
information and provide a limited
exception to notice and opt out
requirements intended to augment
investors’ ability to choose whether to
follow personnel who move from one
broker-dealer or registered investment
adviser to another. The proposed
amendments would: (i) Require covered
institutions to adopt more specific
standards under the safeguards rule,
including standards that would apply to
164 See
PO 00000
supra note 91 and accompanying text.
Frm 00022
Fmt 4701
Sfmt 4702
security breach incidents; (ii) broaden
the scope of information and the types
of institutions and persons covered by
the rules; and (iii) require covered
institutions to maintain written records
of the policies and procedures and their
ongoing compliance with those polices
and procedures. The proposed
amendments also would require covered
institutions seeking to rely on the new
exception related to departing
representatives to maintain a record of
the information disclosed under the
exception to a representative’s new firm.
A. Reasons for the Proposed Action
We have become concerned with the
significant increase in the number of
information security breaches that have
come to light in recent years and the
potential created by such breaches for
misuse of personal financial
information, including identity theft.
We are concerned that some firms do
not regularly reevaluate and update
their safeguarding programs to deal with
increasingly sophisticated methods of
attack. To help prevent and address
security breaches at covered
institutions, we propose to require more
specific standards for safeguarding
personal information, including
standards for responding to data
security breaches. In order to provide
better protection against unauthorized
disclosure of personal financial
information, we believe that the scope
of information covered by the current
safeguards and disposal rules should be
broader.
We also propose a new exception to
Regulation S–P’s notice and opt out
requirements to permit limited
disclosures of investor information
when a registered representative of a
broker-dealer or a supervised person of
an investment adviser moves from one
brokerage or advisory firm to another.
The proposed exception should provide
legal certainty to firms that choose to
rely on it and reduce incentives some
representatives may have to take
information with them secretly when
they leave. We believe this amendment
also would help to augment investors’
ability to choose whether or not to
follow a departing representative to
another firm.
B. Objectives of the Proposed Action
The overall objectives of the proposed
amendments are to: (i) Strengthen the
protections for safeguarding and
disposing of sensitive personal
information; and (ii) provide a limited
exception to Regulation S–P’s notice
and opt out requirements that would
preserve investors’ ability to choose
whether to follow personnel who move
E:\FR\FM\13MRP3.SGM
13MRP3
Federal Register / Vol. 73, No. 50 / Thursday, March 13, 2008 / Proposed Rules
from one broker-dealer or investment
adviser to another. We believe that the
proposed amendments would help to:
• Prevent and mitigate information
security breach incidents;
• Ensure that sensitive financial
information is not disposed of
improperly;
• Ensure that firms regularly review
and update their safeguarding policies
and procedures;
• Ensure that the full range of
appropriate information and all relevant
types of institutions regulated by the
Commission are covered by Regulation
S–P’s requirements; and
• Enhance information security at
firms choosing to rely on a new
exemption for disclosures of limited
information when representatives move
from one firm to another by providing
a clear framework for such disclosures
and promote investor choice regarding
whether or not to follow a departing
representative to another firm.
mstockstill on PROD1PC66 with PROPOSALS3
C. Legal Basis
The amendments to Regulation S–P
are proposed pursuant to the authority
set forth in Sections 501, 504, 505, and
525 of the GLBA, Section 628(a)(1) of
the FCRA, Sections 17, 17A, 23, and 36
of the Exchange Act, Sections 31(a) and
38 of the Investment Company Act, and
Sections 204 and 211 of the Investment
Advisers Act.165
D. Small Entities Subject to the
Proposed Rule Amendments
The proposed amendments to
Regulation S–P would affect brokers,
dealers, registered investment advisers,
investment companies, and registered
transfer agents, including entities that
are considered to be a small business or
small organization (collectively, ‘‘small
entity’’) for purposes of the Regulatory
Flexibility Act. For purposes of the
Regulatory Flexibility Act, under the
Exchange Act a broker or dealer is a
small entity if it: (i) Had total capital of
less than $500,000 on the date in its
prior fiscal year as of which its audited
financial statements were prepared or, if
not required to file audited financial
statements, on the last business day of
its prior fiscal year; and (ii) is not
affiliated with any person that is not a
small entity.166 A registered transfer
agent is a small entity if it: (i) Received
less than 500 items for transfer and less
than 500 items for processing during the
preceding six months; (ii) transferred
items only of issuers that are small
165 15 U.S.C. 6801, 6804, 6805, and 6825; 15
U.S.C. 1681w(a)(1); 15 U.S.C. 78q, 78q–1, 78w, and
78mm; 15 U.S.C. 80a–30(a), 80a–37; and 15 U.S.C.
80b–4, 80b–11.
166 17 CFR 240.0–10.
VerDate Aug<31>2005
17:19 Mar 12, 2008
Jkt 214001
entities; (iii) maintained master
shareholder files that in the aggregate
contained less than 1,000 shareholder
accounts or was the named transfer
agent for less than 1,000 shareholder
accounts at all times during the
preceding fiscal year; and (iv) is not
affiliated with any person that is not a
small entity.167 Under the Investment
Company Act, investment companies
are considered small entities if they,
together with other funds in the same
group of related funds, have net assets
of $50 million or less as of the end of
its most recent fiscal year.168 Under the
Investment Advisers Act, a small entity
is an investment adviser that: (i)
Manages less than $25 million in assets;
(ii) has total assets of less than $5
million on the last day of its most recent
fiscal year; and (iii) does not control, is
not controlled by, and is not under
common control with another
investment adviser that manages $25
million or more in assets, or any person
that has had total assets of $5 million or
more on the last day of the most recent
fiscal year.169
Based on Commission filings, we
estimate that 894 broker-dealers, 153
registered transfer agents, 203
investment companies, and 760
registered investment advisers may be
considered small entities.
E. Reporting, Recordkeeping, and Other
Compliance Requirements
The proposed amendments to
Regulation S–P would require more
specific compliance requirements and
create new reporting requirements for
institutions that experience a breach of
information security. The proposed
amendments also would introduce new
mandatory recordkeeping requirements.
Under the proposed amendments to
Regulation S–P, covered institutions
would have to develop, implement, and
maintain a comprehensive ‘‘information
security program’’ for protecting
personal information and responding to
unauthorized access to or use of
personal information. We expect that
some covered institutions, including
covered institutions that are small
entities, would be required to
supplement their current costs by the
costs involved in reviewing and, as
appropriate, revising their current
safeguarding policies and procedures,
including their data security breach
response procedures and disposal rule
procedures, to comply with the more
specific requirements of the proposed
amendments. Initially this would
167 Id.
168 17
169 17
PO 00000
CFR 270.0–10.
CFR 275.0–7.
Frm 00023
Fmt 4701
Sfmt 4702
13713
require institutions to: (i) Designate an
employee or employees as coordinator
for their information security program;
(ii) identify in writing reasonably
foreseeable security risks that could
result in the unauthorized or
compromise of personal information or
personal information systems; (iii)
create a written record of their design
and implementation of their safeguards
to control identified risks; (iv) train staff
to implement their information security
program; and (v) oversee service
providers and document that oversight
in writing.
Institutions also would have to review
existing safeguarding procedures
relating to data security breach
incidents. This would include: (i)
Assessing current policies and
procedures for responding to data
breach incidents; and (ii) designing and
implementing written policies and
procedures to assess, control, and
investigate incidents of unauthorized
access or use of sensitive personal
information, as well as policies and
procedures for, under certain
conditions, notifying individuals and
the Commission or, in the case of a
broker-dealer, the appropriate
designated examining authority.
To comply with these amendments on
an ongoing basis, institutions would
have to implement procedures to: (i)
Regularly test or monitor, and maintain
a written record of the effectiveness of
their safeguards’ key controls, systems
and procedures (including access
controls, controls related to data
security breach incidents, and controls
related to employee training and
supervision); (ii) augment staff training
as necessary; (iii) provide continued
oversight of service providers; and (iv)
regularly evaluate and adjust their
information security program in light of
their regular testing and monitoring,
changes in technology, their business
operations or arrangements, and other
material circumstances.
Institutions also would have to
respond appropriately to incidents of
data security breach as may occur on an
ongoing basis. This would include
following their written procedures to: (i)
Assess the nature and scope of the
incident; (ii) take appropriate steps to
contain and control the incident; (iii)
promptly conduct a reasonable
investigation and make a written
determination of the likelihood that
sensitive personal information has been
or will be misused; (iv) if misuse of
information has occurred or is
reasonably likely, notify affected
individuals as soon as possible; and (v)
if an individual identified with the
information has suffered substantial
E:\FR\FM\13MRP3.SGM
13MRP3
13714
Federal Register / Vol. 73, No. 50 / Thursday, March 13, 2008 / Proposed Rules
harm or inconvenience, or any
unauthorized person has intentionally
obtained access to or used sensitive
personal information, notify the
Commission or an appropriate
designated examining authority as soon
as possible on proposed Form SP–30.
Overall, we expect there would be
incremental costs associated with the
proposed amendments to Regulation S–
P. Some proportion of large or small
institutions would be likely to
experience some increase in costs to
comply with the proposed amendments
if they are adopted.
More specifically, we estimate that
with respect to the more specific
safeguarding elements, covered
institutions would incur one-time costs
that could include the costs of
assessment and revision of safeguarding
standards, staff training, and reviewing
and entering into contracts with service
providers.170 We also estimate that the
ongoing, long-term costs associated with
the proposed amendments could
include costs of regularly testing or
monitoring the safeguards, augmenting
staff training, providing continued
oversight of service providers,
evaluating and adjusting safeguards, and
responding appropriately to incidents of
data security breach.171
We encourage written comments
regarding this analysis. We solicit
comments as to whether the proposed
amendments could have an effect that
we have not considered. We also request
that commenters describe the nature of
any impact on small entities and
provide empirical data to support the
extent of the impact.
mstockstill on PROD1PC66 with PROPOSALS3
F. Duplicative, Overlapping, or
Conflicting Federal Rules
As discussed above, the proposed
amendments would impose
requirements that covered institutions
maintain and document a written
information security program. The
proposed amendments also would
require reporting to individuals and
appropriate regulators after certain
serious data breach incidents. Covered
institutions are subject to requirements
elsewhere under the federal securities
laws and rules of the self-regulatory
organizations that require them to adopt
written policies and procedures that
may relate to some similar issues.172
170 See
supra section IV.A.3.
171 Id.
172 See, e.g., 15 U.S.C. 80b–4a (requiring each
adviser registered with the Commission to have
written policies and procedures reasonably
designed to prevent misuse of material non-public
information by the adviser or persons associated
with the adviser); and NASD Rule 3010 (requiring
each broker-dealer to establish and maintain written
VerDate Aug<31>2005
17:19 Mar 12, 2008
Jkt 214001
The proposed amendments to
Regulation S–P, however, would not
require covered institutions to maintain
duplicate copies of records covered by
the rule, and an institution’s
information security program would not
have to be maintained in a single
location. Moreover, although the
proposed amendments would require
covered institutions to keep certain
records that may be required under
existing recordkeeping rules, the
purposes of the requirements are
different, and institutions need not
maintain duplicates of the records
themselves.173 We believe, therefore,
that any duplication of regulatory
requirements would be limited and
would not impose significant additional
costs on covered institutions including
small entities. We believe there are no
other federal rules that duplicate,
overlap, or conflict with the proposed
reporting requirements.
G. Significant Alternatives
The Regulatory Flexibility Act directs
us to consider significant alternatives
that would accomplish the stated
objectives, while minimizing any
significant adverse impact on small
entities. In connection with the
proposed amendments, we considered
the following alternatives:
(i) Establishing different compliance
or reporting standards that take into
account the resources available to small
entities;
(ii) The clarification, consolidation, or
simplification of the reporting and
compliance requirements under the rule
for small entities;
(iii) Use of performance rather than
design standards; and
(iv) Exempting small entities from
coverage of the rule, or any part of the
rule.
With regard to the first alternative, we
have proposed amendments to
Regulation S–P that would continue to
permit institutions substantial flexibility
to design safeguarding policies and
procedures appropriate for their size
and complexity, the nature and scope of
their activities, and the sensitivity of the
personal information at issue. We
nevertheless believe it necessary to
procedures to supervise the types of business it is
engaged in and to supervise the activities of
registered representatives and associated persons,
which could include registered investment
advisers).
173 See, e.g., 17 CFR 240.17a–3 (requiring brokerdealers to make and keep, among other things,
blotters or other records of original entry, securities
position records, and order tickets) and 17 CFR
270.31a–1(b)(11) (requiring investment companies
to maintain, among other things, minute books of
directors’ meetings and ‘‘files of all advisory
material received from the investment adviser’’).
PO 00000
Frm 00024
Fmt 4701
Sfmt 4702
provide a more specific framework of
elements that every institution should
consider and address, regardless of its
size. The proposed amendments to
Regulation S–P arise from our concern
with the increasing number of
information security breaches that have
come to light in recent years,
particularly those involving institutions
regulated by the Commission.
Establishing different compliance or
reporting requirements for small entities
could lead to less favorable protections
for these entities’ customers and
compromise the effectiveness of the
proposed amendments.
With regard to the second alternative,
we believe that the proposed
amendments should, by their operation,
simplify reporting and compliance
requirements for small entities. Small
covered institutions are likely to
maintain personal information on fewer
individuals than large covered
institutions, and they are likely to have
relatively simple personal information
systems. Under proposed paragraph
(a)(1) of Section 30, the information
security programs that would be
required by the proposed amendments
would have to be appropriate to a
covered institution’s size and
complexity, and the nature and scope of
its activities. Accordingly, we believe
that the requirements of the proposed
amendment already would be simplified
for small entities. We also believe that
the requirements of the proposed
amendments could not be further
simplified, or clarified or consolidated,
without compromising the investor
protection objectives the proposed
amendments are designed to achieve.
With regard to the third alternative,
the proposed amendments are for the
most part performance based. Rather
than specifying the types of policies and
procedures or the technologies that an
institution would be required to use to
safeguard personal information, the
proposed amendments would require
the institution to assess the types of
risks that it is likely to face and to
address those in the manner the
institution believes most appropriate.
With respect to the specific
requirements regarding notifications in
the event of a data security breach, we
have proposed that institutions provide
only the information that seems most
relevant for the Commission, a selfregulatory organization, or a consumer
to know in order to adequately assess
the potential damage that could result
from the breach and to develop an
appropriate response.
Finally, with regard to alternative
four, we believe that an exemption for
small entities would not be appropriate.
E:\FR\FM\13MRP3.SGM
13MRP3
Federal Register / Vol. 73, No. 50 / Thursday, March 13, 2008 / Proposed Rules
mstockstill on PROD1PC66 with PROPOSALS3
Small entities are as vulnerable as large
ones to the types of data security breach
incidents we are trying to address. We
believe that the specific elements we
have proposed must be considered and
incorporated into the policies and
procedures of all covered institutions,
regardless of their size, to mitigate the
potential for fraud or other substantial
harm or inconvenience to investors.
Exempting small entities from coverage
of the proposed amendments or any part
of the proposed amendments could
compromise the effectiveness of the
proposed amendments and harm
investors by lowering standards for
safeguarding investor information
maintained by small covered
institutions. Excluding small entities
from requirements that would be
applicable to larger covered institutions
also could create competitive disparities
between large and small entities, for
example by undermining investor
confidence in the security of
information maintained by small
covered institutions.
We request comment on whether it is
feasible or necessary for small entities to
have special requirements or timetables
for, or exemptions from, compliance
with the proposed amendments. In
particular, could any of the proposed
amendments be altered in order to ease
the regulatory burden on small entities,
without sacrificing the effectiveness of
the proposed amendments?
H. Request for Comments
We encourage the submission of
comments with respect to any aspect of
this IRFA. In particular, we request
comments regarding: (i) The number of
small entities that may be affected by
the proposed amendments; (ii) the
existence or nature of the potential
impact of the proposed amendments on
small entities discussed in the analysis;
and (iii) how to quantify the impact of
the proposed amendments. Commenters
are asked to describe the nature of any
impact and provide empirical data
supporting the extent of the impact.
Such comments will be considered in
the preparation of the Final Regulatory
Flexibility Analysis, if the proposed
amendments are adopted, and will be
placed in the same public file as
comments on the proposed
amendments. Comments should be
submitted to the Commission at the
addresses previously indicated.
VII. Consideration of Burden on
Competition and Promotion of
Efficiency, Competition and Capital
Formation
Exchange Act Section 23(a)(2)
requires us, when adopting rules under
VerDate Aug<31>2005
17:19 Mar 12, 2008
Jkt 214001
the Exchange Act, to consider the
impact any new rule would have on
competition.174 In addition, Section
23(a)(2) prohibits us from adopting any
rule that would impose a burden on
competition not necessary or
appropriate in furtherance of the
purposes of Title I of the Exchange Act.
The proposed amendments to
Regulation S–P would: (i) Require more
specific standards under the safeguards
rule, including standards that would
apply to data security breach incidents;
(ii) broaden the scope of information
and the types of institutions and
persons covered by the safeguards and
disposal rules; and (iii) require covered
institutions to maintain written records
of their policies and procedures and
their compliance with those policies
and procedures. The proposed
amendments also would create a new
exception from Regulation S–P’s notice
and opt-out requirements for firms to
transfer limited investor information
regarding clients of departing
representatives to those representatives’
new firms.
Other financial institutions are
currently subject to substantially similar
safeguarding and data breach response
requirements under rules adopted by
the Banking Agencies and the FTC.
Under the proposed amendments, all
financial institutions would have to bear
similar costs in implementing
substantially similar rules thus
enhancing competition. We expect that
the proposed amendment to create the
new exception for firms to transfer
limited investor information regarding
clients of departing representatives to
those representatives’ new firms would
not limit and might promote
competition in the securities industry
by providing legal certainty for firms
that choose to rely on it and by
facilitating the transition for customers
who choose to follow a departing
representative to a new firm.
In addition, Exchange Act Section
3(f), Investment Company Act Section
2(c), and Investment Advisers Act
Section 202(c) require us, when
engaging in rulemaking where we are
required to consider or determine
whether an action is necessary or
appropriate in the public interest, to
consider, in addition to the protection of
investors, whether the action will
promote efficiency, competition, and
capital formation.175 Our analysis on
competition is discussed above. As
discussed above, the proposed
amendments could result in additional
174 15
U.S.C. 78w(a)(2).
175 15 U.S.C. 78c(f); 15 U.S.C. 80a–2(c); and 15
U.S.C. 80b–2(c).
PO 00000
Frm 00025
Fmt 4701
Sfmt 4702
13715
costs for covered institutions, which
could affect the efficiency of these
institutions. On the other hand, the
amendments could promote investor
confidence and bring new investors to
these institutions. In the long term, the
proposed amendments also could help
reduce covered institutions’ costs by
mitigating the frequency and
consequences of information security
breaches. We do not believe the
proposed amendments would have a
significant effect on capital formation,
although if the proposals lead to better
information security practices at
covered institutions, potential investors
could feel more comfortable investing
money in the capital markets. As a
result, we expect that the potential
additional expense of compliance with
these proposed rule amendments would
have little, if any, adverse effect on
efficiency, competition, and capital
formation.
We request comment as to whether
our estimates of the burdens the
proposed amendments would have on
covered institutions are reasonable. We
welcome comment on any aspect of this
analysis, and specifically request
comment on any effect the proposed
amendments might have on the
promotion of efficiency, competition,
and capital formation that we have not
considered. Would the proposed
amendments or their resulting costs
affect the efficiency, competition, and
capital formation of covered institutions
and their businesses? Commenters are
requested to provide empirical data and
other factual support for their views to
the extent possible.
VIII. Small Business Regulatory
Enforcement Fairness Act
For purposes of the Small Business
Regulatory Enforcement Fairness Act of
1996, or ‘‘SBREFA,’’ 176 we must advise
OMB as to whether the proposed
regulation constitutes a ‘‘major’’ rule.
Under SBREFA, a rule is considered
‘‘major’’ if, upon adoption, it results or
is likely to result in:
• An annual effect on the economy of
$100 million or more (either in the form
of an increase or a decrease);
• A major increase in costs or prices
for consumers or individual industries;
or
• Significant adverse effect on
competition, investment or innovation.
If a rule is ‘‘major,’’ its effectiveness
will generally be delayed for 60 days
pending Congressional review. We
176 Pub. L. No. 104–121, Title II, 110 Stat. 857
(1996) (codified in various sections of titles 5 and
15 of the United States Code, and as a note to 5
U.S.C. 601).
E:\FR\FM\13MRP3.SGM
13MRP3
13716
Federal Register / Vol. 73, No. 50 / Thursday, March 13, 2008 / Proposed Rules
request comment on the potential
impact of the proposed regulation on
the economy on an annual basis.
Commenters are requested to provide
empirical data and other factual support
for their view to the extent possible.
IX. Statutory Authority
The Commission is proposing to
amend Regulation S–P pursuant to
authority set forth in Sections 501, 504,
505 and 525 of the GLBA (15 U.S.C.
6801, 6804, 6805 and 6825), Section
628(a)(1) of the FCRA (15 U.S.C.
1681w(a)(1)), Sections 17, 17A, 23, and
36 of the Exchange Act (15 U.S.C. 78q,
78q–1, 78w, and 78mm), Sections 31(a)
and 38 of the Investment Company Act
(15 U.S.C. 80a–30(a) and 80a–37), and
Sections 204 and 211 of the Investment
Advisers Act (15 U.S.C. 80b–4 and 80b–
11).
X. Text of Proposed Rules and Rule
Amendments
§ 248.15 Other exceptions to notice and
opt out requirements.
List of Subjects in 17 CFR Part 248
Brokers, Dealers, Investment advisers,
Investment companies, Privacy,
Reporting and recordkeeping
requirements, Transfer agents.
For the reasons set out in the
preamble, the Commission proposes to
amend 17 CFR part 248 as follows.
1. Revise the heading of part 248 to
read as follows:
PART 248—REGULATION S–P:
PRIVACY OF CONSUMER FINANCIAL
INFORMATION AND SAFEGUARDING
PERSONAL INFORMATION
2. Revise the authority citation for
part 248 to read as follows:
mstockstill on PROD1PC66 with PROPOSALS3
Authority: 15 U.S.C. 78q, 78q–1, 78w,
78mm, 80a–30(a), 80a–37, 80b–4, 80b–11,
1681w(a)(1), 6801–6809, and 6825.
3. Section 248.1(b) is amended by
removing ‘‘(b)’’ from the reference to
‘‘§ 248.30(b)’’ in the first sentence of the
paragraph.
4. Section 248.2(b) is amended by
removing ‘‘(b)’’ from the reference to
‘‘§ 248.30(b)’’ in the first sentence.
5. Section 248.3(u) is amended by:
a. Removing ‘‘or’’ at the end of
paragraph (u)(1)(ii);
b. Removing the period at the end of
paragraph (u)(1)(iii) and in its place
adding ‘‘; or’’; and
d. Adding paragraph (u)(1)(iv) to read
as follows:
§ 248.3
Definitions.
*
*
*
*
*
(u) * * *
(1) * * *
(iv) Handled or maintained by you or
on your behalf that is identified with
VerDate Aug<31>2005
17:19 Mar 12, 2008
Jkt 214001
any consumer, or with any employee,
investor, or securityholder who is a
natural person.
*
*
*
*
*
6. Remove the heading of subpart A
of part 248 and add in its place the
following undesignated center heading:
‘‘Privacy and Opt Out Notices’’.
7. Remove the heading of subpart B of
part 248 and add in its place the
following undesignated center heading:
‘‘Limits on Disclosures’’.
8. Remove the heading of subpart C of
part 248 and add in its place the
following undesignated center heading:
‘‘Exceptions’’.
9. Section 248.15 is amended by:
a. Removing the word ‘‘or’’ at the end
of paragraph (a)(6);
b. Removing the period at the end of
paragraph (a)(7)(iii) and in its place
adding ‘‘; or’’; and
c. Adding paragraph (a)(8).
The addition reads as follows:
(a) * * *
(8) To a broker, dealer, or investment
adviser registered with the Commission
in order to allow one of your
representatives who leaves you to
become the representative of another
broker, dealer, or registered investment
adviser to solicit customers to whom the
representative personally provided a
financial product or service on your
behalf, provided:
(i) The information is limited to a
customer’s name, a general description
of the type of account and products held
by the customer, and the customer’s
contact information, including the
customer’s address, telephone number,
and email information;
(ii) The information does not include
any customer’s account number, Social
Security number, or securities positions;
and
(iii) You require your departing
representative to provide to you, not
later than the representative’s separation
from employment with you, a written
record of the information that will be
disclosed pursuant to this exception,
and you maintain and preserve such
records under § 248.30(c).
(iv) For purposes of this section,
representative means:
(A) A natural person associated with
a broker or dealer registered with the
Commission, who is registered or
approved in compliance with
§ 240.15b7–1 of this chapter; or
(B) A supervised person of an
investment adviser as defined in section
202(a)(25) of the Investment Advisers
Act of 1940 (15 U.S.C. 80b–2(a)(25)).
10. Remove the heading of subpart D
of part 248 and add in its place the
PO 00000
Frm 00026
Fmt 4701
Sfmt 4702
following undesignated center heading:
‘‘Relation to Other Laws; Effective
Date’’.
11. Amend part 248 by adding the
undesignated center heading,
‘‘Information Security Programs’’ before
§ 248.30, and revising § 248.30 to read
as follows:
INFORMATION SECURITY
PROGRAMS
§ 248.30 Information security programs for
personal information; records of
compliance.
(a) Information security programs.—
(1) General requirements. Every broker
or dealer other than a notice-registered
broker or dealer, every investment
company, and every investment adviser
or transfer agent registered with the
Commission, must develop, implement,
and maintain a comprehensive
information security program. Your
program must include written policies
and procedures that provide
administrative, technical, and physical
safeguards for protecting personal
information, and for responding to
unauthorized access to or use of
personal information. Your program
also must be appropriate to your size
and complexity, the nature and scope of
your activities, and the sensitivity of
any personal information at issue.
(2) Objectives. Your information
security program must be reasonably
designed to:
(i) Ensure the security and
confidentiality of personal information;
(ii) Protect against any anticipated
threats or hazards to the security or
integrity of personal information; and
(iii) Protect against unauthorized
access to or use of personal information
that could result in substantial harm or
inconvenience to any consumer,
employee, investor or securityholder
who is a natural person.
(3) Safeguards. In order to develop,
implement, and maintain your
information security program, you must:
(i) Designate in writing an employee
or employees to coordinate your
information security program;
(ii) Identify in writing reasonably
foreseeable internal and external risks to
the security, confidentiality, and
integrity of personal information and
personal information systems that could
result in the unauthorized disclosure,
misuse, alteration, destruction or other
compromise of such information or
systems;
(iii) Design and implement safeguards
to control the risks you identify, and
maintain a written record of your
design;
(iv) Regularly test or otherwise
monitor, and maintain a written record
E:\FR\FM\13MRP3.SGM
13MRP3
mstockstill on PROD1PC66 with PROPOSALS3
Federal Register / Vol. 73, No. 50 / Thursday, March 13, 2008 / Proposed Rules
of the effectiveness of the safeguards’
key controls, systems, and procedures,
including the effectiveness of:
(A) Access controls on personal
information systems;
(B) Controls to detect, prevent and
respond to incidents of unauthorized
access to or use of personal information;
and
(C) Employee training and
supervision relating to your information
security program.
(v) Train staff to implement your
information security program;
(vi) Oversee service providers, and
document in writing that in your
oversight you are:
(A) Taking reasonable steps to select
and retain service providers that are
capable of maintaining appropriate
safeguards for the personal information
at issue; and
(B) Requiring your service providers
by contract to implement and maintain
appropriate safeguards; and
(vii) Evaluate and adjust your
information security program
accordingly in light of:
(A) The results of the testing and
monitoring required by paragraph
(a)(3)(iv) of this section;
(B) Relevant changes in technology;
(C) Any material changes to your
operations or business arrangements;
and
(D) Any other circumstances that you
know or reasonably believe may have a
material impact on your information
security program.
(4) Procedures for responding to
unauthorized access or use. At a
minimum, your information security
program must include written
procedures to:
(i) Assess the nature and scope of any
incident involving unauthorized access
to or use of personal information, and
maintain a written record of the
personal information systems and types
of personal information that may have
been accessed or misused;
(ii) Take appropriate steps to contain
and control the incident to prevent
further unauthorized access to or use of
personal information and maintain a
written record of the steps you take;
(iii) After becoming aware of an
incident of unauthorized access to
sensitive personal information,
promptly conduct a reasonable
investigation, determine the likelihood
that the information has been or will be
misused, and maintain a written record
of your determination;
(iv) If you determine that misuse of
the information has occurred or is
reasonably possible, notify each
individual with whom the information
is identified as soon as possible in
VerDate Aug<31>2005
17:19 Mar 12, 2008
Jkt 214001
accordance with paragraph (a)(5) of this
section and maintain a written record
that you provided notification; provided
however that if an appropriate law
enforcement agency determines that
notification will interfere with a
criminal investigation and requests in
writing that you delay notification, you
may delay notification until it no longer
interferes with the criminal
investigation; and
(v) If you are a broker or dealer other
than a notice-registered broker or dealer,
provide written notice on Form SP–30
to your designated examining authority
(see 17 CFR 240.17d–1), and, if you are
an investment company or an
investment adviser or transfer agent
registered with the Commission,
provide written notice on Form SP–30
to the principal office of the
Commission, as soon as possible after
you become aware of any incident of
unauthorized access to or use of
personal information in which:
(A) There is a significant risk that an
individual identified with the
information might suffer substantial
harm or inconvenience; or
(B) An unauthorized person has
intentionally obtained access to or used
sensitive personal information.
(5) Notifying individuals of
unauthorized access or use. If you
determine that an unauthorized person
has obtained access to or used sensitive
personal information, and you
determine that misuse of the
information has occurred or is
reasonably possible, you must notify
each individual with whom the
information is identified in a clear and
conspicuous manner and by a means
designed to ensure that the individual
can reasonably be expected to receive it.
The notice must:
(i) Describe in general terms the
incident and the type of sensitive
personal information that was the
subject of unauthorized access or use;
(ii) Describe what you have done to
protect the individual’s information
from further unauthorized access or use;
(iii) Include a toll-free telephone
number to call, or if you do not have
any toll-free number, include a
telephone number to call and the
address and the name of a specific office
to write for further information and
assistance;
(iv) If the individual has an account
with you, recommend that the
individual review account statements
and immediately report any suspicious
activity to you; and
(v) Include information about the
availability of online guidance from the
FTC regarding steps an individual can
take to protect against identity theft, a
PO 00000
Frm 00027
Fmt 4701
Sfmt 4702
13717
statement encouraging the individual to
report any incidents of identity theft to
the FTC, and the FTC’s Web site address
and toll-free telephone number that
individuals may use to obtain the
identity theft guidance and report
suspected incidents of identity theft.
(b) Disposal of personal
information.—(1) Standard. Every
broker or dealer other than a noticeregistered broker or dealer, every
investment company, every investment
adviser or transfer agent registered with
the Commission, and every natural
person who is an associated person of
a broker or dealer, a supervised person
of an investment adviser registered with
the Commission, or an associated
person of a transfer agent registered
with the Commission, that maintains or
otherwise possesses personal
information for a business purpose must
properly dispose of the information by
taking reasonable measures to protect
against unauthorized access to or use of
the information in connection with its
disposal.
(2) Written policies, procedures and
records. Every broker or dealer, other
than a notice-registered broker or dealer,
every investment company, and every
investment adviser and transfer agent
registered with the Commission must:
(i) Adopt written policies and
procedures that address the proper
disposal of personal information
according to the requirements of
paragraph (b)(1) of this section; and
(ii) Document in writing its proper
disposal of personal information in
compliance with paragraph (b)(1) of this
section.
(3) Relation to other laws. Nothing in
this paragraph (b) shall be construed:
(i) To require any broker, dealer,
investment company, investment
adviser, transfer agent, associated
person of a broker or dealer, supervised
person of an investment adviser, or
associated person of a transfer agent, to
maintain or destroy any record
pertaining to an individual that is not
imposed under other law; or
(ii) To alter or affect any requirement
imposed under any other provision of
law to maintain or destroy records.
(c) Recordkeeping. (1) Every broker or
dealer other than a notice-registered
broker or dealer, every investment
company, and every investment adviser
or transfer agent registered with the
Commission, must make and maintain
the records and written policies and
procedures required under paragraphs
(a) and (b)(2) of this section. Every
broker or dealer other than a noticeregistered broker or dealer, and every
investment adviser registered with the
Commission seeking to rely on the
E:\FR\FM\13MRP3.SGM
13MRP3
mstockstill on PROD1PC66 with PROPOSALS3
13718
Federal Register / Vol. 73, No. 50 / Thursday, March 13, 2008 / Proposed Rules
exception in § 248.15(a)(8) must make
and maintain the records required by
§ 248.15(a)(8)(iii).
(2) Starting from when the record was
made, or from when the written policy
or procedure was last modified, the
records and written policies and
procedures required under paragraphs
(a) and (b)(2) of this section, and the
records made pursuant to
§ 248.15(a)(8)(iii), must be preserved in
accordance with:
(i) 17 CFR 240.17a–4(b) by a broker or
dealer other than a notice-registered
broker or dealer;
(ii) 240.17Ad–7(b) by a transfer agent
registered with the Commission;
(iii) 270.31a–2(a)(4)–(6) by an
investment company; and
(iv) 275.204–2(e)(1) by an investment
adviser registered with the Commission.
(d) Definitions. As used in this
§ 248.30, unless the context otherwise
requires:
(1) Associated person of a broker or
dealer has the same meaning as in
section 3(a)(18) of the Securities
Exchange Act of 1934 (15 U.S.C.
78c(a)(18)).
(2) Associated person of a transfer
agent has the same meaning as in
section 3(a)(49) of the Securities
Exchange Act of 1934 (15 U.S.C.
78c(a)(49)).
(3) Consumer report has the same
meaning as in section 603(d) of the Fair
Credit Reporting Act (15 U.S.C.
1681a(d)).
(4) Consumer report information
means any record about an individual,
whether in paper, electronic or other
form, that is a consumer report or is
derived from a consumer report.
Consumer report information also
means a compilation of such records.
Consumer report information does not
include information that does not
identify individuals, such as aggregate
information or blind data.
(5) Disposal means:
(i) The discarding or abandonment of
personal information; or
(ii) The sale, donation, or transfer of
any medium, including computer
equipment, on which personal
information is stored.
(6) Information security program
means the administrative, technical, or
physical safeguards you use to access,
collect, distribute, process, protect,
store, use, transmit, dispose of, or
otherwise handle personal information.
(7) Notice-registered broker or dealer
means a broker or dealer registered by
notice with the Commission under
section 15(b)(11) of the Securities
Exchange Act of 1934 (15 U.S.C.
78o(b)(11)).
(8) Personal information means any
record containing consumer report
VerDate Aug<31>2005
17:19 Mar 12, 2008
Jkt 214001
information, or nonpublic personal
information as defined in § 248.3(t), that
is identified with any consumer, or with
any employee, investor, or
securityholder who is a natural person,
whether in paper, electronic, or other
form, that is handled or maintained by
you or on your behalf.
(9) Personal information system
means any method used to access,
collect, store, use, transmit, protect, or
dispose of personal information.
(10) Sensitive personal information
means personal information, or any
combination of components of personal
information, that would allow an
unauthorized person to use, log into, or
access an individual’s account, or to
establish a new account using the
individual’s identifying information,
including the individual’s:
(i) Social Security number; or
(ii) Name, telephone number, street
address, e-mail address, or online user
name, in combination with the
individual’s account number, credit or
debit card number, driver’s license
number, credit card expiration date or
security code, mother’s maiden name,
password, personal identification
number, biometric record, or other
authenticating information.
(11) Service provider means any
person or entity that receives,
maintains, processes, or otherwise is
permitted access to personal
information through its provision of
services directly to a broker, dealer,
investment company, or investment
adviser or transfer agent registered with
the Commission.
(12) (i) Substantial harm or
inconvenience means personal injury, or
more than trivial financial loss,
expenditure of effort or loss of time,
including theft, fraud, harassment,
impersonation, intimidation, damaged
reputation, impaired eligibility for
credit, or the unauthorized use of
information identified with an
individual to obtain a financial product
or service, or to access, log into, effect
a transaction in, or otherwise use the
individual’s account.
(ii) Substantial harm or inconvenience
does not include unintentional access to
personal information by an
unauthorized person that results only in
trivial financial loss, expenditure of
effort or loss of time, such as if use of
the information results only in your
deciding to change the individual’s
account number or password.
(13) Supervised person of an
investment adviser has the same
meaning as in section 202(a)(25) of the
Investment Advisers Act of 1940 (15
U.S.C. 80b–2(a)(25)).
PO 00000
Frm 00028
Fmt 4701
Sfmt 4700
(14) Transfer agent has the same
meaning as in section 3(a)(25) of the
Securities Exchange Act of 1934 (15
U.S.C. 78c(a)(25)).
12. Redesignate Appendix A to part
248 as Appendix B to part 248, and
revise its heading to read as follows:
Appendix B to part 248—Sample
Clauses
13. Add new Appendix A to part 248
to read as follows:
Appendix A to Part 248—Forms
(1) Availability of Forms. Any person may
obtain a copy of Form S–P or Form SP–30
prescribed for use in this part by written
request to the Securities and Exchange
Commission, 100 F Street, NE., Washington,
DC 20549. Any person also may view the
forms on the Commission Web site as
follows:
(a) Form S–P at: [Web site URL];
(b) Form SP–30 at: [Web site URL].
(2) Form S–P. Use of Form S–P by brokers,
dealers, and investment companies, and by
investment advisers registered with the
Commission, constitutes compliance with the
notice content requirements of §§ 248.6 and
248.7.
(3) Form SP–30. Form SP–30 must be used
pursuant to § 248.30(a)(4)(v) as the notice of
an incident of unauthorized access to or use
of personal information to be filed with the
appropriate designated examining authority
by brokers or dealers other than noticeregistered brokers or dealers, and to be filed
with the Commission by investment
companies, and by investment advisers and
transfer agents registered with the
Commission.
14. Add Form SP–30 (referenced in
paragraph (3) of Appendix A to part 248) to
read as follows:
Note: The text of Form SP–30 does not, and
this amendment will not, appear in the Code
of Federal Regulations.
UNITED STATES SECURITIES AND
EXCHANGE COMMISSION
Washington, DC 20549
FORM SP–30
SECURITY INCIDENT REPORTING FORM
(Pursuant to § 248.30(a)(4)(v) of Regulation
S–P (17 CFR 248.30(a)(4)(v)))
1. Provide identifying information (IARD/
CRD number, CIK,* business name, principal
business and mailing addresses, and
telephone number).
* CIK stands for ‘‘Central Index Key,’’
which is the unique number the Commission
assigns to each entity that submits filings to
it.
2. Provide contact employee (name, title,
address, and telephone number).
3. Type of Institution:
llBroker-Dealer
llInvestment Adviser
llInvestment Adviser/Broker-Dealer (Dual
Registrant)
llInvestment Company
llTransfer Agent
E:\FR\FM\13MRP3.SGM
13MRP3
Federal Register / Vol. 73, No. 50 / Thursday, March 13, 2008 / Proposed Rules
mstockstill on PROD1PC66 with PROPOSALS3
4. Describe the security incident (e.g.,
unauthorized use of your customers’ online
trading accounts, unauthorized use of your
employee’s password to access sensitive
personal information maintained on one of
your databases, or unauthorized access to
your files on an investment company’s
shareholders):
(a) Provide the date(s) of the incident;
(b) List Registrant’s offices, divisions or
branches involved;
(c) Describe personal information system(s)
compromised;
(d) Describe the incident and identify
anyone you reasonably believe accessed or
used personal information without
authorization or compromised the personal
information system(s).
5. Provide information on third-party
service provider(s) involved:
(a) Identify any third-party service provider
involved;
(b) Describe the services provided;
(c) If the service provider is an affiliate,
describe the affiliation;
(d) Describe the involvement of the service
provider(s) in the incident.
VerDate Aug<31>2005
17:19 Mar 12, 2008
Jkt 214001
6. Describe steps taken or that you plan to
take to assess the incident.
7. Provide the number of individuals
whose information appears to have been
compromised:lllll
8. Describe steps you have taken or plan to
take to prevent improper use of any personal
information that was or may be compromised
by the incident.
9. Do you intend to notify affected
individuals?
(a) If yes, when?
(b) If no, why not?
10. Describe any steps you have taken or
any plan to review your policies and
procedures in light of this incident.
11. Describe Customer account losses (to
the extent known).
(a) Number of Customer Accounts
Accessed: lllll
(b) Unauthorized Money Transfers
(i) Initial Customer Losses from Actual or
Attempted Unauthorized Transfers:
$lllll
(ii) Mitigation of Customer Losses from
Firm’s Efforts
(A) Surveillance/Investigative Intervention:
$lllll
PO 00000
Frm 00029
Fmt 4701
Sfmt 4700
13719
(B) Recoveries from Receiving Parties:
$lllll
(C) Firm Compensation to Customers:
$lllll
(iii) Net Customer Losses: $lllll
(c) Unauthorized Changes to Securities
Portfolio (e.g., Pump and Dump Schemes)
(i) Initial Customer Losses from Actual or
Attempted Unauthorized Trading
(A) Value of Accounts Before the
Unauthorized Trading: $lllll
(B) Value of Accounts After the
Unauthorized Trading: $lllll
(C) Initial Customer Losses/Gains:
$lllll
(ii) Did the firm return the affected
customer accounts to their positions before
the unauthorized trading? Yes/No
(iii) Net Customer Losses/Gains:
$lllll
Dated: March 4, 2008.
By the Commission.
Nancy M. Morris,
Secretary.
[FR Doc. E8–4612 Filed 3–12–08; 8:45 am]
BILLING CODE 8011–01–P
E:\FR\FM\13MRP3.SGM
13MRP3
Agencies
[Federal Register Volume 73, Number 50 (Thursday, March 13, 2008)]
[Proposed Rules]
[Pages 13692-13719]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: E8-4612]
[[Page 13691]]
-----------------------------------------------------------------------
Part III
Securities and Exchange Commission
-----------------------------------------------------------------------
17 CFR Part 248
Part 248--Regulation S-P: Privacy of Consumer Financial Information and
Safeguarding Personal Information; Proposed Rule
Federal Register / Vol. 73, No. 50 / Thursday, March 13, 2008 /
Proposed Rules
[[Page 13692]]
-----------------------------------------------------------------------
SECURITIES AND EXCHANGE COMMISSION
17 CFR Part 248
[Release Nos. 34-57427; IC-28178; IA-2712; File No. S7-06-08]
RIN 3235-AK08
Part 248--Regulation S-P: Privacy of Consumer Financial
Information and Safeguarding Personal Information
AGENCY: Securities and Exchange Commission.
ACTION: Proposed rule.
-----------------------------------------------------------------------
SUMMARY: The Securities and Exchange Commission (``Commission'') is
proposing amendments to Regulation S-P, which implements certain
provisions of the Gramm-Leach-Bliley Act (``GLBA'') and the Fair Credit
Reporting Act (``FCRA'') for entities regulated by the Commission. The
proposed amendments would set forth more specific requirements for
safeguarding information and responding to information security
breaches, and broaden the scope of the information covered by
Regulation S-P's safeguarding and disposal provisions. They also would
extend the application of the disposal provisions to natural persons
associated with brokers, dealers, investment advisers registered with
the Commission (``registered investment advisers'') and transfer agents
registered with the Commission (``registered transfer agents''), and
would extend the application of the safeguarding provisions to
registered transfer agents. Finally, the proposed amendments would
permit a limited transfer of information to a nonaffiliated third party
without the required notice and opt out when personnel move from one
broker-dealer or registered investment adviser to another.
DATES: Comments must be received on or before May 12, 2008.
ADDRESSES: Comments may be submitted by any of the following methods:
Electronic Comments
Use the Commission's Internet comment form (https://
www.sec.gov/rules/proposed.shtml); or
Send an e-mail to rule-comments@sec.gov. Please include
File Number S7-06-08 on the subject line; or
Use the Federal eRulemaking Portal (https://
www.regulations.gov). Follow the instructions for submitting comments.
Paper Comments
Send paper comments in triplicate to Nancy M. Morris,
Secretary, Securities and Exchange Commission, 100 F Street, NE.,
Washington, DC 20549-1090.
All submissions should refer to File Number S7-06-08. This file number
should be included on the subject line if e-mail is used. To help us
process and review your comments more efficiently, please use only one
method. The Commission will post all comments on the Commission's
Internet Web site (https://www.sec.gov/rules/proposed.shtml). Comments
are also available for public inspection and copying in the
Commission's Public Reference Room, 100 F Street, NE., Washington, DC
20549, on official business days between the hours of 10 a.m. and 3
p.m. All comments received will be posted without change; we do not
edit personal identifying information from submissions. You should
submit only information that you wish to make available publicly.
FOR FURTHER INFORMATION CONTACT: Catherine McGuire, Chief Counsel, or
Brice Prince, Special Counsel, Office of the Chief Counsel, Division of
Trading and Markets, (202) 551-5550; or Penelope Saltzman, Acting
Assistant Director, or Vincent Meehan, Senior Counsel, Office of
Regulatory Policy, Division of Investment Management, (202) 551-6792,
Securities and Exchange Commission, 100 F Street, NE., Washington, DC
20549.
SUPPLEMENTARY INFORMATION: The Commission today is proposing amendments
to Regulation S-P \1\ under Title V of the GLBA,\2\ the FCRA,\3\ the
Securities Exchange Act of 1934 (the ``Exchange Act''),\4\ the
Investment Company Act of 1940 (the ``Investment Company Act''),\5\ and
the Investment Advisers Act of 1940 (the ``Investment Advisers
Act'').\6\
---------------------------------------------------------------------------
\1\ 17 CFR part 248. Unless otherwise noted, all references to
rules under Regulation S-P will be to Part 248 of the Code of
Federal Regulations (17 CFR 248).
\2\ 15 U.S.C. 6801-6827.
\3\ 15 U.S.C. 1681w.
\4\ 15 U.S.C. 78a.
\5\ 15 U.S.C. 80a.
\6\ 15 U.S.C. 80b.
---------------------------------------------------------------------------
Table of Contents
I. Background
A. Statutory Requirements and Current Regulation S-P Mandates
B. Challenges Posed by Information Security Breaches
II. Discussion
A. Information Security and Security Breach Response
Requirements
B. Scope of the Safeguards and Disposal Rules
C. Records of Compliance
D. Exception for Limited Information Disclosure When Personnel
Leave Their Firms
III. General Request for Comments
IV. Paperwork Reduction Act
V. Cost-Benefit Analysis
VI. Initial Regulatory Flexibility Analysis
VII. Consideration of Burden on Competition and Promotion of
Efficiency, Competition and Capital Formation
VIII. Small Business Regulatory Enforcement Fairness Act
IX. Statutory Authority
X. Text of Proposed Rules and Rule Amendments
I. Background
A. Statutory Requirements and Current Regulation S-P Mandates
Subtitle A of Title V of the GLBA requires every financial
institution to inform its customers about its privacy policies and
practices, and limits the circumstances in which a financial
institution may disclose nonpublic personal information about a
consumer to a nonaffiliated third party without first giving the
consumer an opportunity to opt out of the disclosure.\7\ In enacting
the legislation, Congress also specifically directed the Commission and
other federal financial regulators to establish and implement
information safeguarding standards requiring financial institutions
subject to their jurisdiction to adopt administrative, technical and
physical information safeguards.\8\ The GLBA specified that these
standards were to ``insure the
[[Page 13693]]
security and confidentiality of customer records and information,''
``protect against any anticipated threats or hazards to the security or
integrity'' of those records, and protect against unauthorized access
to or use of those records or information, which ``could result in
substantial harm or inconvenience to any customer.'' \9\
---------------------------------------------------------------------------
\7\ See 15 U.S.C. 6802(a) and (b). The GLBA and Regulation S-P
draw a distinction between ``consumers'' and ``customers.'' A
``consumer'' is defined in Section 3(g)(1) of Regulation S-P to mean
an individual who obtains a financial product or service that is to
be used primarily for personal, family, or household purposes. See
17 CFR 248.3(g)(1). A ``customer'' is defined in Section 3(j) of
Regulation S-P as a consumer who has a continuing relationship with
the financial institution. See 17 CFR 248.3(j). The distinction
between customer and consumer determines the notices that a
financial institution must provide. Pursuant to Sections 4 and 5 of
Regulation S-P, a financial institution must provide customers with
an initial notice describing the institution's privacy policies when
a customer relationship is formed and at least annually throughout
the customer relationship. In contrast, if a consumer is not a
customer, a financial institution must only provide a notice if it
intends to share nonpublic personal information about the consumer
with a nonaffiliated third party (outside of certain exceptions).
See 17 CFR 248.4 and 248.5.
\8\ The GLBA directed the Commission, the Federal Trade
Commission (``FTC'') and state insurance authorities to implement
the safeguarding standards by rule. See 15 U.S.C. 6805(b)(2). The
GLBA directed the Office of the Comptroller of the Currency, the
Board of Governors of the Federal Reserve System, the Federal
Deposit Insurance Corporation (``FDIC'') and the Office of Thrift
Supervision (collectively, the ``Banking Agencies'') and the
National Credit Union Administration (``NCUA'') to implement the
safeguarding standards by regulation or by guidelines. See 15 U.S.C.
6805(b)(1).
\9\ 15 U.S.C. 6801(b).
---------------------------------------------------------------------------
In response to these directives, we adopted Regulation S-P in
2000.\10\ Section 30(a) of Regulation S-P (the ``safeguards rule'')
requires institutions to safeguard customer records and
information,\11\ while other sections of the regulation implement the
notice and opt out provisions of the GLBA.\12\ The safeguards rule
currently requires institutions to adopt written policies and
procedures for administrative, technical, and physical safeguards to
protect customer records and information. The safeguards must be
reasonably designed to meet the GLBA's objectives.\13\ This approach
provides flexibility for institutions to safeguard customer records and
information in accordance with their own privacy policies and practices
and business models. The safeguards rule and the notice and opt out
provisions currently apply to brokers, dealers, registered investment
advisers, and investment companies.\14\
---------------------------------------------------------------------------
\10\ See Privacy of Consumer Financial Information (Regulation
S-P), Exchange Act Release No. 42974, Investment Company Act
(``ICA'') Release No. 24543, Investment Advisers Act (``IAA'')
Release No. 1883 (June 22, 2000), 65 FR 40334 (June 29, 2000).
Pursuant to the GLBA directive, Regulation S-P is consistent with
and comparable to the financial privacy rules adopted by other
federal financial regulators in 2000. See FTC, Privacy of Consumer
Financial Information, 65 FR 33646 (May 24, 2000); Banking Agencies,
Privacy of Consumer Financial Information, 65 FR 35162 (June 1,
2000); and NCUA, Privacy of Consumer Financial Information;
Requirements for Insurance, 65 FR 31722 (May 18, 2000). See also 15
U.S.C. 6804(a)(2) (directing federal financial regulators to consult
and coordinate to assure, to the extent possible, that each agency's
regulations are consistent and comparable with the regulations
prescribed by the other agencies).
In 2001, we amended Regulation S-P to permit futures commission
merchants and introducing brokers that are registered by notice as
broker-dealers in order to conduct business in security futures
products under Section 15(b)(11)(A) of the Exchange Act (``notice-
registered broker-dealers'') to comply with Regulation S-P by
complying with financial privacy rules that the Commodity Futures
Trading Commission (``CFTC'') adopted that year. See 17 CFR
248.2(b); Registration of Broker-Dealers Pursuant to Section
15(b)(11) of the Securities Exchange Act of 1934, Exchange Act
Release No. 44730 (Aug. 21, 2001), 66 FR 45138 (Aug. 27, 2001); see
also CFTC, Privacy of Consumer Financial Information, 66 FR 21236
(Apr. 27, 2001).
\11\ 17 CFR 248.30(a).
\12\ See 17 CFR 248.1-248.18. As described above, the GLBA and
Regulation S-P require brokers, dealers, investment advisers
registered with the Commission, and investment companies to provide
an annual notice of their privacy policies and practices to their
customers (and notice to consumers before sharing their nonpublic
personal information with nonaffiliated third parties outside
certain exceptions). See supra note 7; 15 U.S.C. 6803(a); 17 CFR
248.4; 17 CFR 248.5. In general, the privacy notices must describe
the institutions' policies and practices with respect to disclosing
nonpublic personal information about a consumer to both affiliated
and nonaffiliated third parties. 15 U.S.C. 6803; 17 CFR 248.6. The
notices also must provide a consumer a reasonable opportunity to
direct the institution generally not to share nonpublic personal
information about the consumer (that is, to ``opt out'') with
nonaffiliated third parties. 15 U.S.C. 6802(b); 17 CFR 248.7. (The
privacy notice also must provide, where applicable under the FCRA, a
notice and an opportunity for a consumer to opt out of certain
information sharing among affiliates.) Sections 13, 14, and 15 of
Regulation S-P (17 CFR 248.13, 17 CFR 248.14, and 17 CFR 248.15) set
out exceptions from these general notice and opt out requirements
under the GLBA. Section 13 includes exceptions for sharing
information with other financial institutions under joint marketing
agreements and with certain service providers. Section 14 includes
exceptions for sharing information for everyday business purposes,
such as maintaining or servicing accounts. Section 15 includes
exceptions for disclosures made with the consent or at the direction
of a consumer, disclosures for particular purposes such as
protecting against fraud, disclosures to consumer reporting
agencies, and disclosures to law enforcement agencies. In March
2007, the Commission, together with the Banking Agencies, the CFTC,
the FTC, and the NCUA, published for public comment in the Federal
Register a proposed model privacy form that financial institutions
could use for their privacy notices to consumers required by the
GLBA. See Interagency Proposal for Model Privacy Form Under the
Gramm-Leach-Bliley Act, Exchange Act Release No. 55497, IAA Release
No. 2598, ICA Release No. 27755 (Mar. 20, 2007), 72 FR 14940 (Mar.
29, 2007) (``Interagency Model Privacy Form Proposal'').
\13\ Specifically, the safeguards must be reasonably designed to
insure the security and confidentiality of customer records and
information, protect against anticipated threats to the security or
integrity of those records and information, and protect against
unauthorized access to or use of such records or information that
could result in substantial harm or inconvenience to any customer.
See supra note 9 and accompanying text.
\14\ Regulation S-P applies to investment companies as the term
is defined in Section 3 of the Investment Company Act (15 U.S.C.
80a-3), whether or not the investment company is registered with the
Commission. See 17 CFR 248.3(r). Thus, a business development
company, which is an investment company but is not required to
register as such with the Commission, is subject to Regulation S-P.
In this release, institutions to which Regulation S-P currently
applies, or to which the proposed amendments would apply, are
sometimes referred to as ``covered institutions.''
---------------------------------------------------------------------------
Pursuant to the Fair and Accurate Credit Transactions Act of 2003
(``FACT Act''), the Commission amended Regulation S-P in 2004 to
protect against the improper disposal of consumer report
information.\15\ Section 30(b) of Regulation S-P (the ``disposal
rule'') currently applies to the institutions subject to the other
provisions of Regulation S-P, except that it excludes notice-registered
broker-dealers and includes registered transfer agents.
---------------------------------------------------------------------------
\15\ 17 CFR 248.30(b). Section 216 of the FACT Act amended the
FCRA by adding Section 628 (codified at 15 U.S.C. 1681w), which
directed the Commission and other federal financial regulators to
adopt regulations for the proper disposal of consumer information,
and provides that any person who maintains or possesses consumer
information or any compilation of consumer information derived from
a consumer report for a business purpose must properly dispose of
the information. See Disposal of Consumer Report Information,
Exchange Act Release No. 50781, IAA Release No. 2332, ICA Release
No. 26685 (Dec. 2, 2004), 69 FR 71322 (Dec. 8, 2004) (``Disposal
Rule Adopting Release''). When we adopted the disposal rule, we also
amended Regulation S-P to require that the policies and procedures
institutions must adopt under the safeguards rule be in writing.
The disposal rule requires transfer agents registered with the
Commission, as well as brokers and dealers other than notice-
registered broker-dealers, investment advisers registered with the
Commission, and investment companies that maintain or possess
``consumer report information'' for a business purpose, to take
``reasonable measures to protect against unauthorized access to or
use of the information in connection with its disposal.''
In order to provide clarity, the Disposal Rule Adopting Release
included five examples intended to provide guidance on disposal
measures that would be deemed reasonable under the disposal rule.
See Disposal Rule Adopting Release at section II.A.2.
---------------------------------------------------------------------------
B. Challenges Posed by Information Security Breaches
In recent years, we have become concerned with the increasing
number of information security breaches that have come to light and the
potential for identity theft and other misuse of personal financial
information. Once seemingly confined mainly to commercial banks and
retailers, this problem has spread throughout the business community,
including the securities industry.\16\
---------------------------------------------------------------------------
\16\ See Press Release, NASD, NASD Warns Investors to Protect
Online Account Information, Brokerages Also Reminded of Obligation
to Protect Customer Information from New Threats (July 28, 2005),
https://www.finra.org/PressRoom/NewsReleases/2005NewsReleases/P014775
(last visited Nov. 6, 2007). See also In re NEXT Financial Group,
Inc., Exchange Act Release No. 56316 (Aug. 24, 2007), https://
www.sec.gov/litigation/admin/2007/34-56316.pdf, and Order
Instituting Administrative and Cease-and-Desist Proceedings Pursuant
to Sections 15(b) and 21C of the Securities Exchange Act of 1934
(Aug. 24, 2007) (alleging violations of the notice and opt out
provisions of Regulation S-P and the safeguards rule in connection
with recruiting registered representatives), https://www.sec.gov/
litigation/admin/2007/34-56316-o.pdf.
---------------------------------------------------------------------------
In the last two years, we have seen a significant increase in
information security breaches involving institutions we regulate.
Perhaps most disturbing is the increase in incidents involving the
takeover of online brokerage accounts, including the use of the
accounts by foreign nationals as part of ``pump-and-dump'' schemes.\17\
The financial
[[Page 13694]]
services sector also is a popular target for online targeted attacks,
and ``phishing'' attacks in which fraudsters set up an Internet site
designed to mimic a legitimate site and induce random Internet users to
disclose personal information.\18\ In other recent incidents,
registered representatives of broker-dealers disposed of information
and records about clients or prospective clients in accessible areas,
from which journalists were able to remove them. Sensitive securities-
related data also has been lost or stolen as a result of other
incidents.\19\
---------------------------------------------------------------------------
\17\ While some account takeovers may have been facilitated by
investors failing to take adequate precautions against security
threats such as ``keylogger'' programs and ``phishing'' attacks,
many online brokerage firms have successfully reduced their exposure
to account takeovers by improving their authentication and
monitoring procedures. The Commission has been active in this area,
and has brought several enforcement cases involving defendants in
foreign jurisdictions. See, e.g., Litigation Release No. 20037 (Mar.
12, 2007), available at https://www.sec.gov/litigation/litreleases/
2007/lr20037.htm (three Indian nationals charged with participating
in an alleged fraudulent scheme to manipulate the prices of at least
fourteen securities through the unauthorized use of other people's
online brokerage accounts); and Litigation Release No. 19949 (Dec.
19, 2006), available at https://www.sec.gov/litigation/litreleases/
2006/lr19949.htm (emergency asset freeze obtained; complaint alleged
an alleged Estonia-based account intrusion scheme that targeted
online brokerage accounts in the U.S. to manipulate the markets).
\18\ In 2006, Symantec Corporation, a seller of information
security and information management software, reported that in the
first half of 2006, 84 percent of tracked phishing sites targeted
the financial sector and 9 of the top 10 brands phished this period
were from the financial sector. Because the financial services
sector is a logical target for attackers increasingly motivated by
financial gain, that sector was also the second most frequent target
of Internet-based attacks (after home users). See Symantec, Symantec
Internet Security Threat Report, Trends for January 06-June 06, at
9, 23 (Sept. 2006), https://www.symantec.com/specprog/threatreport/
ent-whitepaper_symantec_internet_security_threat_report_x_
09_2006.en-us.pdf (last visited Nov. 6, 2007) (``Symantec September
2006 Internet Security Threat Report''). Reportedly, employees of
financial services firms ``are increasingly being invited to visit
Web sites or download programs by people pretending to be colleagues
or peers,'' followed by attack programs on the sites or in downloads
that ``then open tunnels into the corporate network.'' More
recently, although financial services-related spam reportedly ``made
up 21 percent of all spam in the first six months of 2007, making it
the second most common type of spam during this period,'' there was
a 30-percent decline in stock market ``pump and dump'' spam ``due to
a decline in spam touting penny stocks that was triggered by actions
taken by the United States Securities and Exchange Commission, which
limited the profitability of this type of spam by suspending trading
of the stocks that are touted.'' See Symantec, Symantec Internet
Security Threat Report, Trends for January-June 07, Volume XII, at
107 (Sept. 2007), https://eval.symantec.com/mktginfo/enterprise/
white_papers/ent-whitepaper_internet_security_threat_report_
xii_09_2007.en-us.pdf (last visited Nov. 6, 2007) (citing
Commission Press Release 2007-34, SEC Suspends Trading Of 35
Companies Touted In Spam E-mail Campaigns (Mar. 8, 2007), available
at https://www.sec.gov/news/press/2007/2007-34.htm).
\19\ For example, in April 2005, a shipping company lost a
computer backup tape containing account information for more than
200,000 broker-dealer customers. The broker-dealer voluntarily
notified its affected customers, although the data was compressed
and the tape was thought to have been destroyed. In December 2005, a
laptop computer containing unencrypted information that included
names and account numbers of 158,000 customers and the names and
Social Security numbers of 68,000 adviser personnel was stolen from
a registered investment adviser, and in March 2006, a laptop
computer containing the names, addresses, Social Security numbers,
dates of birth, and other employment-related information of as many
as 196,000 retirement plan participants was stolen from a benefits
plan administration subsidiary of a registered investment adviser.
In both cases, the laptops were taken from vehicles by thieves who
appear to have stolen them for their value as computer hardware
rather than for the information contained on them. The registered
investment adviser voluntarily notified the more than 200,000
clients and financial advisers whose information was compromised,
while the benefits plan administrator voluntarily notified the
nearly 200,000 retirement plan participants whose information was
compromised, and offered to pay for a year of credit monitoring for
each of them.
---------------------------------------------------------------------------
Many firms in the securities industry are aware of these problems
and have appropriate safeguards in place to address them.\20\ We are
concerned, however, that some firms do not regularly reevaluate and
update their safeguarding programs to deal with these increasingly
sophisticated methods of attack.\21\ For this reason, and in light of
the increase in reported security breaches and the potential for
identity theft among the institutions we regulate, we believe that our
previous approach, requiring safeguards that must be reasonably
designed to meet the GLBA's objectives, merits revisiting.\22\
---------------------------------------------------------------------------
\20\ Some institutions regulated by the Commission have already
taken steps to strengthen their policies and procedures for
safeguarding investors' information, such as by offering investors
the use of password-generating tokens for online brokerage accounts.
We also note that some firms have been sharing information about
suspicious activity with one another for the purpose of combating
identity theft. To the extent it might involve sharing nonpublic
personal information about consumers of the firms, Regulation S-P
does not prohibit such information sharing because Section
15(a)(2)(ii) of Regulation S-P permits firms to disclose nonpublic
personal information to a nonaffiliated third party for the purpose
of protecting against fraud without first giving consumers notice of
and an opportunity to opt out of the disclosures.
\21\ According to a September 2007 report from Deloitte Touche
Tohmatsu, for example, 37 percent of 169 surveyed financial
institutions do not have an information security strategy in place,
and 33 percent of these institutions do not conduct vulnerability
testing, or only do so on an ad hoc basis. See Deloitte Touche
Tohmatsu, 2007 Global Security Survey, at 12, 36 (Sept. 2007),
https://www.deloitte.com/dtt/cda/doc/content/dtt_gfsi_
GlobalSecuritySurvey_20070901%281%29.pdf (last visited Nov. 6,
2007).
\22\ In 2004 we sought comment on whether to revise our
safeguards rule to require institutions to address certain elements
in designating their safeguarding policies and procedures. See
Disposal of Consumer Report Information, Exchange Act Release No.
50361, IAA Release No. 2293, ICA Release No. 20596 (Sept. 14, 2004),
69 FR 56304 (Sept. 20, 2004) (``Disposal Rule Proposing Release''),
at section II.B. At that time we decided not to revise the
safeguards rule, but noted we would consider the comments we
received in the event we proposed any amendment to the rule. See
Disposal Rule Adopting Release, supra note 15, at section II.B. See
also infra note 31.
---------------------------------------------------------------------------
We also are concerned that while the information protected under
the safeguards rule and the disposal rule includes certain personal
information, it does not include other information that could be used
to access investors' financial information if obtained by an
unauthorized user. Finally we want to address other issues under
Regulation S-P that have come to our attention, including the
application of the regulation to situations in which a representative
of one broker-dealer or registered investment adviser moves to another
firm. Accordingly, today we are proposing amendments to the safeguards
and disposal rules that are designed to address these concerns.
II. Discussion
To help prevent and address security breaches in the securities
industry and thereby better protect investor information, we propose to
amend Regulation S-P in four principal ways. First, we propose to
require more specific standards under the safeguards rule, including
standards that would apply to data security breach incidents. Second,
we propose to amend the scope of the information covered by the
safeguards and disposal rules and to broaden the types of institutions
and persons covered by the rules. Third, we propose to require
institutions subject to the safeguards and disposal rules to maintain
written records of their policies and procedures and their compliance
with those policies and procedures. Finally, we are taking this
opportunity to propose a new exception from Regulation S-P's notice and
opt-out requirements to allow investors more easily to follow a
representative who moves from one brokerage or advisory firm to
another.
A. Information Security and Security Breach Response Requirements
To help prevent and address security breaches at the institutions
we regulate, we propose to require more specific standards for
safeguarding personal information, including standards for responding
to data security breaches. When we adopted Regulation S-P in 2001, the
safeguards rule simply required institutions to adopt policies and
procedures to address the safeguarding objectives stated in the GLBA.
Following our adoption of the rule, the FTC and the Banking Agencies
issued regulations with more detailed standards for safeguarding
customer
[[Page 13695]]
records and information applicable to the institutions they
regulate.\23\ We believe these standards include necessary elements
that institutions should address when adopting and implementing
safeguarding policies and procedures. We have therefore looked to the
other agencies' standards in developing our proposal and tailored them,
where appropriate, to develop proposed standards for the institutions
we regulate.
---------------------------------------------------------------------------
\23\ The Banking Agencies issued their guidelines for
safeguarding customer records and information in 2001. See
Interagency Guidelines Establishing Standards for Safeguarding
Customer Information and Rescission of Year 2000 Standards for
Safety and Soundness, 66 FR 8616 (Feb. 1, 2001) (``Banking
Agencies'' Security Guidelines''). The FTC adopted its safeguards
rule in 2002. See Standards for Safeguarding Customer Information,
67 FR 36484 (May 23, 2002) (``FTC Safeguards Rule''). The Banking
Agencies also have jointly issued guidance on responding to
incidents of unauthorized access or use of customer information. See
Interagency Guidance on Response Programs for Unauthorized Access to
Customer Information and Customer Notice, 70 FR 15736 (Mar. 29,
2005) (``Banking Agencies'' Incident Response Guidance''). More
recently, through the Federal Financial Institutions Examination
Council (``FFIEC''), the Banking Agencies jointly issued guidance on
the authentication of customers in an Internet banking environment,
and the Banking Agencies and the FTC jointly issued final rules and
guidelines for identity theft ``red flags'' programs to detect,
prevent, and mitigate identity theft in connection with the opening
of certain accounts or certain existing accounts. See FFIEC,
Authentication in an Internet Banking Environment (July 27, 2006),
available at www.ffiec.gov/pdf/authentication_guidance.pdf
(``Authentication Guidance''); Banking Agencies and FTC, Identity
Theft Red Flags and Address Discrepancies under the Fair and
Accurate Credit Transactions Act of 2003, 72 FR 63718 (Nov. 9, 2007)
(``Final Red Flag Rules''). See also Banking Agencies and FTC,
Identity Theft Red Flags and Address Discrepancies Under the Fair
and Accurate Credit Transactions Act of 2003, 71 FR 40785 (July 18,
2006) (``Proposed Red Flag Guidelines''). In March of this year, the
FTC also published a brochure on data security, Protecting Personal
Information: A Guide for Business (available at https://www.ftc.gov/
infosecurity/), and the FDIC issued a Supervisory Policy on Identity
Theft, FIL-32-2007 (Apr. 11, 2007), available at https://
www.fdic.gov/news/news/financial/2007/fil07032a.html.
---------------------------------------------------------------------------
1. Revised Safeguarding Policies and Procedures
As noted above, the safeguards rule requires institutions to adopt
written policies and procedures that address administrative, technical
and physical safeguards to protect customer records and information.
The proposed amendments would further develop this requirement by
requiring each institution subject to the safeguards rule to develop,
implement, and maintain a comprehensive ``information security
program,'' including written policies and procedures that provide
administrative, technical, and physical safeguards for protecting
personal information, and for responding to unauthorized access to or
use of personal information.\24\ This program would have to be
appropriate to the institution's size and complexity, the nature and
scope of its activities, and the sensitivity of any personal
information at issue.\25\ Consistent with current requirements for
safeguarding policies and procedures, the information security program
also would have to be reasonably designed to: (i) Ensure the security
and confidentiality of personal information; (ii) protect against any
anticipated threats or hazards to the security or integrity of personal
information; and (iii) protect against unauthorized access to or use of
personal information that could result in substantial harm or
inconvenience to any consumer, employee, investor or securityholder who
is a natural person.\26\ Although the term ``substantial harm or
inconvenience'' is currently used in the safeguards rule, it is not
defined. We propose to define the term to mean ``personal injury, or
more than trivial financial loss, expenditure of effort or loss of
time.'' \27\ This definition is intended to include harms other than
identity theft that may result from failure to safeguard sensitive
information about an individual. For example, a hacker could use
confidential information about an individual for extortion by
threatening to make the information public unless the individual agrees
to the hacker's demands. ``Substantial harm or inconvenience'' would
not include ``unintentional access to personal information by an
unauthorized person that results only in trivial financial loss,
expenditure of effort or loss of time,'' such as if use of the
information results in an institution deciding to change the
individual's account number or password.\28\ The rule would provide an
example of what would not constitute harm or inconvenience that rises
to the level of ``substantial,'' which should help clarify the scope of
what would constitute ``substantial harm or inconvenience.''
---------------------------------------------------------------------------
\24\ As amended, Section 30 would be titled, ``Information
security programs for personal information; records of compliance.''
\25\ See proposed paragraph (a)(1) of Section 30. The term
``information security program'' would mean the administrative,
technical, or physical safeguards used to access, collect,
distribute, process, protect, store, use, transmit, dispose of, or
otherwise handle personal information. See proposed paragraph (d)(6)
of Section 30.
\26\ See proposed paragraph (a)(2) of Section 30. Compare 17 CFR
248.30(a)(1)-(3).
\27\ See proposed paragraph (d)(12) of Section 30. ``Substantial
harm or inconvenience'' would include theft, fraud, harassment,
impersonation, intimidation, damaged reputation, impaired
eligibility for credit, or the unauthorized use of the information
identified with an individual to obtain a financial product or
service, or to access, log into, effect a transaction in, or
otherwise use the individual's account.
\28\ See proposed paragraph (d)(12)(ii) of Section 30. Thus, for
example the proposed definition would not encompass a firm's
occasional, unintentional delivery of an individual's account
statement to an incorrect address if the institution determined that
the information was highly unlikely to be misused. This
determination would have to be made promptly after the institution
becomes aware of an incident of unauthorized access to sensitive
personal information, and documented in writing. See proposed
paragraph (a)(4)(iii) of Section 30.
---------------------------------------------------------------------------
The proposed amendments also would specify particular elements that
a program meeting the requirements of Regulation S-P must include.\29\
These elements are intended to provide firms in the securities industry
with detailed standards for the policies and procedures that a well-
designed information security program should include to address recent
identity theft-related incidents such as firms in the securities
industry losing data tapes and laptop computers and failing to dispose
properly of sensitive personal information, and hackers hijacking
online brokerage accounts.\30\ These elements also are intended to
maintain consistency with information safeguarding guidelines and rules
adopted by the Banking Agencies and
[[Page 13696]]
FTC.\31\ In addition, these elements are consistent with policies and
procedures we understand many institutions in the securities industry
have already adopted. We understand that large and complex
organizations generally have written policies that address information
safeguarding procedures at several layers, from an organization-wide
policy statement to detailed procedures that address particular
controls.\32\
---------------------------------------------------------------------------
\29\ Many of these elements are addressed by widely accepted
information security standards. See, e.g., National Institute of
Standards and Technology (``NIST''), Special Publication 800 series
(Computer Security), for example Generally Accepted Principals and
Practices for Securing Information Technology Systems (SP 800-14)
(Sept. 1996), Guide to Intrusion Detection and Prevention Systems
(IDPS) (SP 800-94) (Feb. 2007), and Guide to Secure Web Services (SP
800-95) (Aug. 2007) (all available at https://csrc.nist.gov/
publications/PubsSPs.html), and bulletins dealing with computer
security published by the NIST's Information Technology Laboratory
(ITL), for example Secure Web Servers: Protecting Web Sites That Are
Accessed By The Public (ITL January 2008) (available at https://
csrc.nist.gov/publications/PubsITLSB.html); Federal Information
System Controls Audit Manual, General Accounting Office, Accounting
and Information Management Division, Federal Information System
Controls Audit Manual, GAO/AIMD-12.19.6 (known as ``FISCAM'') (Jan.
1999) (available at https://www.gao.gov/special.pubs/ai12.19.6.pdf);
International Organization for Standardization, Code of Practice for
Information Security Management (ISO/IEC 27002:2005) (known among
information security professionals as the ``British Standard,'' and
formerly designated BS ISO/IEC 17799:2005 and BS 7799-1:2005)
(available for purchase at https://www.standardsdirect.org/
iso17799.htm and at https://www.bsi-global.com/en/Shop/Publication-
Detail/?pid=000000000030166440); and Information Systems Audit and
Control Association/IT Governance Institute, Control Objectives for
Information and Related Technology (known as ``COBIT'') (last
updated, and published as version 4.1, May 2007) (available at
https://www.isaca.org).
\30\ See supra notes 16-19 and accompanying text.
\31\ See Banking Agencies' Security Guidelines and FTC
Safeguards Rule, supra note 23. As noted above, we sought comment on
whether to revise our safeguards rule in 2004. See supra note 22. At
that time, several commenters noted that Rule 206(4)-7 under the
Investment Advisers Act (17 CFR 275.206(4)-7) and Rule 38a-1 under
the Investment Company Act (17 CFR 270.38a-1) require registered
investment advisers and registered investment companies to have
written policies and procedures reasonably designed to prevent
violation of the federal securities laws, including safeguards for
the protection of customer records and information under Regulation
S-P. These rules also require registered investment advisers and
funds to review, no less frequently than annually, the adequacy of
these policies and procedures. See Comment Letter of the Investment
Counsel Association of America (Oct. 20, 2004), at p. 3; Comment
Letter of the Investment Company Institute (Oct. 20, 2004) at p. 2.
Each of these letters is available at https://www.sec.gov/comments/
s73304.shtml. We do not intend for the proposed amendments to alter
or conflict with these requirements.
\32\ See Disposal Rule Proposing Release, supra note 22, at 69
FR 56308 & n.29.
---------------------------------------------------------------------------
Institutions subject to the rule would be required to:
(i) Designate in writing an employee or employees to coordinate the
information security program; \33\
---------------------------------------------------------------------------
\33\ See proposed paragraph (a)(3)(i) of Section 30. Of course,
the employee or employees designated to coordinate an institution's
information security program would need to have sufficient authority
and access to the institution's managers, officers and directors to
effectively implement the program and modify it as necessary.
---------------------------------------------------------------------------
(ii) Identify in writing reasonably foreseeable security risks that
could result in the unauthorized disclosure, misuse, alteration,
destruction or other compromise of personal information or personal
information systems; \34\
---------------------------------------------------------------------------
\34\ See proposed paragraph (a)(3)(ii) of Section 30. The term
``personal information system'' would mean any method used to
access, collect, store, use, transmit, protect or dispose of
personal information. See proposed paragraph (d)(9) of Section 30.
---------------------------------------------------------------------------
(iii) Design and document in writing and implement information
safeguards to control the identified risks; \35\
---------------------------------------------------------------------------
\35\ See proposed paragraph (a)(3)(iii) of Section 30.
---------------------------------------------------------------------------
(iv) Regularly test or otherwise monitor and document in writing
the effectiveness of the safeguards' key controls, systems, and
procedures, including the effectiveness of access controls on personal
information systems, controls to detect, prevent and respond to
attacks, or intrusions by unauthorized persons, and employee training
and supervision; \36\
---------------------------------------------------------------------------
\36\ See proposed paragraph (a)(3)(iv) of Section 30.
---------------------------------------------------------------------------
(v) Train staff to implement the information security program; \37\
---------------------------------------------------------------------------
\37\ See proposed paragraph (a)(3)(v) of Section 30.
---------------------------------------------------------------------------
(vi) Oversee service providers by taking reasonable steps to select
and retain service providers capable of maintaining appropriate
safeguards for the personal information at issue, and require service
providers by contract to implement and maintain appropriate safeguards
(and document such oversight in writing); \38\ and
---------------------------------------------------------------------------
\38\ See proposed paragraph (a)(3)(vi) of Section 30.
---------------------------------------------------------------------------
(vii) Evaluate and adjust their information security programs to
reflect the results of the testing and monitoring, relevant technology
changes, material changes to operations or business arrangements, and
any other circumstances that the institution knows or reasonably
believes may have a material impact on the program.\39\
---------------------------------------------------------------------------
\39\ See proposed paragraph (a)(3)(vii) of Section 30. This
requirement is similar to the requirement in the Banking Agencies'
Security Guidelines that institutions covered by those guidelines
monitor, evaluate, and adjust, as appropriate, their information
security program in light of any relevant changes in technology, the
sensitivity of their customer information, internal or external
threats to information, and their own changing business
arrangements, such as mergers and acquisitions, alliances and joint
ventures, outsourcing arrangements, and changes to customer
information systems. See supra note 23, Banking Agencies' Security
Guidelines, 66 FR at 8634, 8635-36, 8637, 8639, 8641. The ``material
impact'' standard in proposed paragraph (a)(3)(iii) is intended to
require adjustment of a covered institution's information security
program only when a reasonable coordinator of the program would
consider adjusting the program important in light of changing
circumstances.
---------------------------------------------------------------------------
The term ``service provider'' would mean any person or entity that
receives, maintains, processes, or otherwise is permitted access to
personal information through its provision of services directly to a
person subject to the rule.\40\ We understand that in large financial
complexes, a particular affiliate may be responsible for providing a
particular service for all affiliates in the complex. In that
circumstance, each financial institution subject to Regulation S-P
would be responsible for taking reasonable steps to ensure that the
service provider is capable of maintaining appropriate safeguards and
of overseeing the service provider's implementation, maintenance,
evaluation, and modifications of appropriate safeguards for the
institution's personal information. Under the proposed amendments, we
anticipate that a covered institution's reasonable steps to evaluate
the information safeguards of service providers could include the use
of a third-party review of those safeguards such as a Statement of
Auditing Standards No. 70 (``SAS 70'') report, a SysTrust report, or a
WebTrust report.\41\
---------------------------------------------------------------------------
\40\ See proposed paragraph (d)(11) of Section 30.
\41\ See Codification of Accounting Standards and Procedures,
Statement on Auditing Standards No. 70, Reports on Processing of
Transactions by Service Organizations (American Inst. of Certified
Public Accountants). See also description and comparison of these
reports at https://infotech.aicpa.org/Resources/
System+Security+and+Reliability/System+Reliability/
Principles+of+a+Reliable+System/
SAS+No+70+SysTrust+and+WebTrust+A+Comparison.htm.
---------------------------------------------------------------------------
We request comment on the proposed specific standards for
safeguarding personal information.
Would these standards provide sufficient direction to
institutions? Are there particular standards that should be more or
less prescriptive? For example, should institutions be required to
designate an employee or employees to coordinate the information
security program by name, or should institutions be permitted to make
these designations by position or office?
Would additional standards be appropriate or are certain
standards unnecessary? Should the proposed standards be modified to
more closely or less closely resemble standards prescribed by the
Banking Agencies or the FTC? For the securities industry, are there any
other standards that a well-designed information security program
should address? Are there any other standards that would provide more
flexibility to covered institutions?
We also invite comment on the proposed requirement that
entities assess the sufficiency of safeguards in place, to control
reasonably foreseeable risks. Should the rules include more detailed
standards and specifications for access controls? Should the
requirement specify factors such as those identified in the Banking
Agencies' guidance regarding authentication in an Internet banking
environment or include policies and procedures such as those in the
Banking Agencies and the FTC's proposed or final ``red flag''
requirements? \42\ For example, should we require that covered
institutions implement multifactor authentication, layered security, or
other controls for high-risk transactions involving access to customer
information or the movement of funds to third parties? Should we
require that covered institutions include in their information security
programs ``red flag'' elements
[[Page 13697]]
that would be relevant to detecting, preventing and mitigating identity
theft in connection with the opening of accounts or existing accounts,
or in connection with particular types of accounts associated with a
reasonably foreseeable risk of identity theft? Should we require that
covered institutions adopt policies and procedures for evaluating
changes of address followed closely by an account change or
transaction, or for processing address discrepancy notices from
consumer reporting agencies? If the rule were to include more detailed
standards and specifications for access controls, how should these
apply to business conducted by telephone?
---------------------------------------------------------------------------
\42\ See Authentication Guidance, Proposed Red Flag Guidance,
and Final Red Flag Rules, supra note 23. The Authentication Guidance
has been credited with helping to curtail online banking fraud, but
has been characterized as not adequately addressing authentication
in the context of telephone banking. See Daniel Wolfe, How New
Authentication Systems are Altering Fraud Picture, Amer. Banker
(Dec. 26, 2007).
---------------------------------------------------------------------------
Commenters are invited to discuss the proposed definition
of ``substantial harm or inconvenience.'' Are there circumstances that
commenters believe would create substantial harm or inconvenience to
individuals that would not meet the proposed definition? If so, how
should the definition be revised to address these circumstances?
Commenters are invited to discuss the proposed
requirements for written documentation of compliance with the proposed
safeguarding provisions.
Commenters are invited to discuss the proposed definition
of ``service provider.'' They also are invited to discuss whether, if
the proposed amendments are adopted, they should include or be
accompanied by guidance on the use of outside evaluations of third-
party service providers. For example, should the Commission provide
guidance similar to that provided by the FFIEC on the appropriate use
of SAS 70 reports in evaluating the information safeguards of service
providers? \43\
---------------------------------------------------------------------------
\43\ The FFIEC provided the following guidance on the use of SAS
70 reports in the oversight of third-party service providers
(``TSPs'') by financial institutions regulated by FFIEC member
agencies:
Financial institutions should ensure TSPs implement and maintain
controls sufficient to appropriately mitigate risk. In higher-risk
relationships the institution by contract may prescribe minimum
control and reporting standards, obtain the right to require changes
to standards as external and internal environments change, and
obtain access to the TSP for institution or independent third-party
evaluations of the TSP's performance against the standard. In lower
risk relationships the institution may prescribe the use of
standardized reports, such as trust services reports or a Statement
of Auditing Standards 70 (SAS 70) report.
* * * * *
Financial institutions should carefully and critically evaluate
whether a SAS 70 report adequately supports their oversight
responsibilities. The report may not provide a thorough test of
security controls and security monitoring unless requested by the
TSP. It may not address the effectiveness of the security process in
continually mitigating changing risks. Additionally, the SAS 70
report may not address whether the TSP is meeting the institution's
specific risk mitigation requirements. Therefore, the contracting
oversight exercised by financial institutions may require additional
tests, evaluations, and reports to appropriately oversee the
security program of the service provider.
FFIEC, FFIEC IT Examination Handbook, Information Security
Booklet--July 2006, at 77, 78 (available at https://www.ffiec.gov/
ffiecinfobase/booklets/information_security/information_
security.pdf).
---------------------------------------------------------------------------
2. Data Security Breach Response
Because of the potential for harm or inconvenience to individuals
when a data security breach occurs, we are proposing that information
security programs include procedures for responding to incidents of
unauthorized access to or use of personal information. These procedures
would include notice to affected individuals if misuse of sensitive
personal information has occurred or is reasonably possible. The
procedures would also include notice to the Commission (or for certain
broker-dealers, their designated examining authority \44\) under
circumstances in which an individual identified with the information
has suffered substantial harm or inconvenience or an unauthorized
person has intentionally obtained access to or used sensitive personal
information. The proposed rules that would require prompt notice of
information security breach incidents to individuals, as well as the
Commission or designated examining authorities, are intended to
facilitate swift and appropriate action to minimize the impact of the
security breach.
---------------------------------------------------------------------------
\44\ A broker-dealer's designated examining authority is the
self-regulatory organization (``SRO'') of which the broker-dealer is
a member, or, if the broker-dealer is a member of more than one SRO,
the SRO designated by the Commission pursuant to 17 CFR 240.17d-1 as
responsible for examination of the member for compliance with
applicable financial responsibility rules (including the
Commission's customer account protection rules at 17 CFR 240.15c3-
3).
---------------------------------------------------------------------------
The data security breach response provisions of the proposed
amendments include elements intended to provide firms in the securities
industry with detailed standards for responding to a breach so as to
protect against unauthorized use of compromised data. The proposed
standards would specify procedures a covered institution's information
security program would need to include. These procedures would be
required to be written to provide clarity for firm personnel and to
facilitate Commission and SRO examination and inspection. The proposed
standards are intended to ensure that covered institutions adopt plans
for responding to an information security breach incident so as to
minimize the risk of identity theft or other significant investor harm
or inconvenience from the incident. These proposed procedures also are
intended to be consistent with security breach notification guidelines
adopted by the Banking Agencies.\45\
---------------------------------------------------------------------------
\45\ See Banking Agencies' Incident Response Guidance, supra
note 23.
---------------------------------------------------------------------------
Under the proposed amendments, institutions subject to the rule
would be required to have written procedures to:
(i) Assess any incident involving unauthorized access or use, and
identify in writing what personal information systems and what types of
personal information may have been compromised; \46\
---------------------------------------------------------------------------
\46\ See proposed paragraph (a)(4)(i) of Section 30.
---------------------------------------------------------------------------
(ii) Take steps to contain and control the incident to prevent
further unauthorized access or use and document all such steps taken in
writing; \47\
---------------------------------------------------------------------------
\47\ See proposed paragraph (a)(4)(ii) of Section 30.
---------------------------------------------------------------------------
(iii) Promptly conduct a reasonable investigation and determine in
writing the likelihood that the information has been or will be misused
after the institution becomes aware of any unauthorized access to
sensitive personal information; \48\ and
---------------------------------------------------------------------------
\48\ See proposed paragraph (a)(4)(iii) of Section 30.
---------------------------------------------------------------------------
(iv) Notify individuals with whom the information is identified as
soon as possible (and document the provision of such notification in
writing) if the institution determines that misuse of the information
has occurred or is reasonably possible.\49\
---------------------------------------------------------------------------
\49\ See proposed paragraph (a)(4)(iv) of Section 30.
Notification could be delayed, however, if an appropriate law
enforcement agency determines that notification will interfere with
a criminal investigation and requests in writing a delay in
notification. We propose to require notification of individuals only
if misuse of the compromised information has occurred or is
reasonably possible to avoid requiring notification in circumstances
in which there is no significant risk of substantial harm or
inconvenience. If covered institutions were required to notify
individuals of every instance of unauthorized access or use, such as
if an employee accidentally opened and quickly closed an electronic
account record, individuals could receive an excessive number of
data breach notifications and become desensitized to incidents that
pose a real risk of identity theft.
---------------------------------------------------------------------------
We propose to define the term, ``sensitive personal information,''
to mean ``any personal information, or any combination of components of
personal information, that would allow an unauthorized person to use,
log into, or access an individual's account, or to establish a new
account using the individual's identifying information,'' including the
individual's Social Security number, or any one of the individual's
name, telephone number, street address, e-mail address, or online user
name, in combination with any one
[[Page 13698]]
of the individual's account number, credit or debit card number,
driver's license number, credit card expiration date or security code,
mother's maiden name, password, personal identification number,
biometric authentication record, or other authenticating
information.\50\ This definition is intended to cover the types of
information that would be most useful to an identity thief, and to
which unauthorized access would create a reasonable possibility of
substantial harm or inconvenience to an affected individual.
---------------------------------------------------------------------------
\50\ See proposed paragraph (d)(10) of Section 30.
---------------------------------------------------------------------------
The amendments also would require an institution to provide notice
to the Commission as soon as possible after the institution becomes
aware of any incident of unauthorized access to or use of personal
information in which there is a significant risk that an individual
identified with the information might suffer substantial harm or
inconvenience, or in which an unauthorized person has intentionally
obtained access to or used sensitive personal information.\51\ This
requirement would allow Commission and SRO investigators or examiners
to review the notices to determine if an immediate investigative or
examination response would be appropriate. In this regard, it is
crucial that institutions respond promptly to any follow-up requests
for records or information from our staff or the staff of the
designated examining authority.\52\ Under the proposed amendments, a
prompt response in accordance with existing Commission guidance on the
timely production of records would be particularly important in
circumstances involving ongoing misuse of sensitive personal
information.
---------------------------------------------------------------------------
\51\ See proposed paragraph (a)(4)(v) of Section 30.
\52\ See generally 15 U.S.C. 21(a) (investigative requests); 17
CFR 240.17a 4(j) (examinations of broker-dealers); 17 CFR 275.204-
2(g) (examinations of investment advisers).
---------------------------------------------------------------------------
The regulatory notification requirement in the Banking Agencies'
guidance requires a report to the appropriate regulator as soon as
possible after the institution becomes aware of an incident involving
unauthorized access to or use of sensitive customer information.\53\
Our proposed notice requirement differs from the Banking Agencies'
approach in that it would require notice to the Commission (or a
designated examining authority) when an incident of unauthorized access
to or use of personal information poses a significant risk that an
individual identified with the information might suffer substantial
harm or inconvenience, or in which an unauthorized person has
intentionally obtained access to or used sensitive personal
information. The proposed notice requirement is intended to avoid
notice to the Commission in every case of unauthorized access, and to
focus scrutiny on information security breaches that present a greater
potential likelihood for harm. We believe that this approach would help
conserve institutions', as well as the Commission's, administrative
resources by allowing minor incidents to be addressed in a way that is
commensurate with the risk they present. The information to be included
in the notice would allow the Commission or a broker-dealer's
designated examining authority to evaluate whether any legal action
against a would-be identity thief or other action is warranted in light
of the circumstances. A broker-dealer, other than a notice-registered
broker dealer, w