Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure, 51896-51945 [2023-16194]
Download as PDF
51896
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
SECURITIES AND EXCHANGE
COMMISSION
17 CFR Parts 229, 232, 239, 240, and
249
[Release Nos. 33–11216; 34–97989; File No.
S7–09–22]
RIN 3235–AM89
Cybersecurity Risk Management,
Strategy, Governance, and Incident
Disclosure
Securities and Exchange
Commission.
ACTION: Final rule.
AGENCY:
The Securities and Exchange
Commission (‘‘Commission’’) is
adopting new rules to enhance and
standardize disclosures regarding
SUMMARY:
cybersecurity risk management, strategy,
governance, and incidents by public
companies that are subject to the
reporting requirements of the Securities
Exchange Act of 1934. Specifically, we
are adopting amendments to require
current disclosure about material
cybersecurity incidents. We are also
adopting rules requiring periodic
disclosures about a registrant’s
processes to assess, identify, and
manage material cybersecurity risks,
management’s role in assessing and
managing material cybersecurity risks,
and the board of directors’ oversight of
cybersecurity risks. Lastly, the final
rules require the cybersecurity
disclosures to be presented in Inline
eXtensible Business Reporting Language
(‘‘Inline XBRL’’).
DATES:
Effective date: The amendments are
effective September 5, 2023.
Compliance dates: See Section II.I
(Compliance Dates).
FOR FURTHER INFORMATION CONTACT:
Nabeel Cheema, Special Counsel, at
(202) 551–3430, in the Office of
Rulemaking, Division of Corporation
Finance; and, with respect to the
application of the rules to business
development companies, David Joire,
Senior Special Counsel, at (202) 551–
6825 or IMOCC@sec.gov, Chief
Counsel’s Office, Division of Investment
Management, U.S. Securities and
Exchange Commission, 100 F Street NE,
Washington, DC 20549.
SUPPLEMENTARY INFORMATION: We are
adopting amendments to:
Commission reference
CFR citation (17 CFR)
Regulation S–K ..................................................................................
Regulation S–T ...................................................................................
Securities Act of 1933 (‘‘Securities Act’’) 1 .........................................
Securities Exchange Act of 1934 (‘‘Exchange Act’’) 2 .......................
ddrumheller on DSK120RN23PROD with RULES2
Table of Contents
I. Introduction and Background
II. Discussion of Final Amendments
A. Disclosure of Cybersecurity Incidents on
Current Reports
1. Proposed Amendments
2. Comments
3. Final Amendments
B. Disclosures About Cybersecurity
Incidents in Periodic Reports
1. Proposed Amendments
2. Comments
3. Final Amendments
C. Disclosure of a Registrant’s Risk
Management, Strategy and Governance
Regarding Cybersecurity Risks
1. Risk Management and Strategy
a. Proposed Amendments
b. Comments
c. Final Amendments
2. Governance
a. Proposed Amendments
b. Comments
c. Final Amendments
3. Definitions
a. Proposed Definitions
b. Comments
c. Final Definitions
D. Disclosure Regarding the Board of
Directors’ Cybersecurity Expertise
1. Proposed Amendments
1 15
2 15
U.S.C. 77a et seq.
U.S.C. 78a et seq.
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
......................................................
Items 106 and 601 .......................
......................................................
Rule 405 ......................................
Form S–3 .....................................
Rule 13a–11 ................................
Rule 15d–11 ................................
Form 20–F ...................................
Form 6–K .....................................
Form 8–K .....................................
Form 10–K ...................................
2. Comments
3. Final Amendments
E. Disclosure by Foreign Private Issuers
1. Proposed Amendments
2. Comments
3. Final Amendments
F. Structured Data Requirements
1. Proposed Amendments
2. Comments
3. Final Amendments
G. Applicability to Certain Issuers
1. Asset-Backed Issuers
2. Smaller Reporting Companies
H. Need for New Rules and Commission
Authority
I. Compliance Dates
III. Other Matters
IV. Economic Analysis
A. Introduction
B. Economic Baseline
1. Current Regulatory Framework
2. Affected Parties
C. Benefits and Costs of the Final Rules
1. Benefits
a. More Timely and Informative Disclosure
b. Greater Uniformity and Comparability
2. Costs
3. Indirect Economic Effects
D. Effects on Efficiency, Competition, and
Capital Formation
E. Reasonable Alternatives
1. Website Disclosure
2. Disclosure Through Periodic Reports
3. Exempt Smaller Reporting Companies
V. Paperwork Reduction Act
PO 00000
Frm 00002
Fmt 4701
Sfmt 4700
§§ 229.10 through 229.1305.
§§ 229.106 and 229.601.
§§ 232.10 through 232.903.
§ 232.405.
§ 239.13.
§ 240.13a–11.
§ 240.15d–11.
§ 249.220f.
§ 249.306.
§ 249.308.
§ 249.310.
A. Summary of the Collections of
Information
B. Summary of Comment Letters and
Revisions to PRA Estimates
C. Effects of the Amendments on the
Collections of Information
D. Incremental and Aggregate Burden and
Cost Estimates for the Final
Amendments
VI. Final Regulatory Flexibility Analysis
A. Need for, and Objectives of, the Final
Amendments
B. Significant Issues Raised by Public
Comments
1. Estimate of Affected Small Entities and
Impact to Those Entities
2. Consideration of Alternatives
C. Small Entities Subject to the Final
Amendments
D. Projected Reporting, Recordkeeping, and
other Compliance Requirements
E. Agency Action To Minimize Effect on
Small Entities
Statutory Authority
I. Introduction and Background
On March 9, 2022, the Commission
proposed new rules, and rule and form
amendments, to enhance and
standardize disclosures regarding
cybersecurity risk management, strategy,
governance, and cybersecurity incidents
by public companies that are subject to
the reporting requirements of the
E:\FR\FM\04AUR2.SGM
04AUR2
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
ddrumheller on DSK120RN23PROD with RULES2
Exchange Act.3 The proposal followed
on interpretive guidance on the
application of existing disclosure
requirements to cybersecurity risk and
incidents that the Commission and staff
had issued in prior years.
In particular, in 2011, the Division of
Corporation Finance issued interpretive
guidance providing the Division’s views
concerning operating companies’
disclosure obligations relating to
cybersecurity (‘‘2011 Staff Guidance’’).4
In that guidance, the staff observed that
‘‘[a]lthough no existing disclosure
requirement explicitly refers to
cybersecurity risks and cyber incidents,
a number of disclosure requirements
may impose an obligation on registrants
to disclose such risks and incidents,’’
and further that ‘‘material information
regarding cybersecurity risks and cyber
incidents is required to be disclosed
when necessary in order to make other
required disclosures, in light of the
circumstances under which they are
made, not misleading.’’ 5 The guidance
pointed specifically to disclosure
obligations under 17 CFR 229.503
(Regulation S–K ‘‘Item 503(c)’’) (Risk
factors) (since moved to 17 CFR 229.105
(Regulation S–K ‘‘Item 105’’)), 17 CFR
229.303 (Regulation S–K ‘‘Item 303’’)
(Management’s discussion and analysis
of financial condition and results of
operations), 17 CFR 229.101 (Regulation
S–K ‘‘Item 101’’) (Description of
business), 17 CFR 229.103 (Regulation
S–K ‘‘Item 103’’) (Legal proceedings),
and 17 CFR 229.307 (Disclosure controls
and procedures), as well as to
Accounting Standards Codifications
350–40 (Internal-Use Software), 605–50
(Customer Payments and Incentives),
450–20 (Loss Contingencies), 275–10
(Risks and Uncertainties), and 855–10
(Subsequent Events).6
In 2018, ‘‘[i]n light of the increasing
significance of cybersecurity incidents,’’
the Commission issued interpretive
guidance to reinforce and expand upon
the 2011 Staff Guidance and also
address the importance of cybersecurity
policies and procedures, as well as the
application of insider trading
prohibitions in the context of
cybersecurity (‘‘2018 Interpretive
Release’’).7 In addition to discussing the
3 See Cybersecurity Risk Management, Strategy,
Governance, and Incident Disclosure, Release No.
33–11038 (Mar. 9, 2022) [87 FR 16590 (Mar. 23,
2022)] (‘‘Proposing Release’’).
4 See CF Disclosure Guidance: Topic No. 2—
Cybersecurity (Oct. 13, 2011), available at https://
www.sec.gov/divisions/corpfin/guidance/
cfguidance-topic2.htm.
5 Id.
6 Id.
7 See Commission Statement and Guidance on
Public Company Cybersecurity Disclosures, Release
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
provisions previously covered in the
2011 Staff Guidance, the new guidance
addressed 17 CFR 229.407 (Regulation
S–K ‘‘Item 407’’) (Corporate
Governance), 17 CFR part 210
(‘‘Regulation S–X’’), and 17 CFR part
243 (‘‘Regulation FD’’).8 The 2018
Interpretive Release noted that
companies can provide current reports
on Form 8–K and Form 6–K to maintain
the accuracy and completeness of
effective shelf registration statements,
and it also advised companies to
consider whether it may be appropriate
to implement restrictions on insider
trading during the period following an
incident and prior to disclosure.9
As noted in the Proposing Release,
current disclosure practices are varied.
For example, while some registrants do
report material cybersecurity incidents,
most typically on Form 10–K, review of
Form 8–K, Form 10–K, and Form 20–F
filings by staff in the Division of
Corporation Finance has shown that
companies provide different levels of
specificity regarding the cause, scope,
impact, and materiality of cybersecurity
incidents. Likewise, staff has also
observed that, while the majority of
registrants that are disclosing
cybersecurity risks appear to be
providing such disclosures in the risk
factor section of their annual reports on
Form 10–K, the disclosures are
sometimes included with other
unrelated disclosures, which makes it
more difficult for investors to locate,
interpret, and analyze the information
provided.10
In the Proposing Release, the
Commission explained that a number of
trends underpinned investors’ and other
capital markets participants’ need for
more timely and reliable information
related to registrants’ cybersecurity than
was produced following the 2011 Staff
Guidance and the 2018 Interpretive
Release. First, an ever-increasing share
of economic activity is dependent on
electronic systems, such that
disruptions to those systems can have
significant effects on registrants and, in
the case of large-scale attacks, systemic
effects on the economy as a whole.11
No. 33–10459 (Feb. 21, 2018) [83 FR 8166 (Feb. 26,
2018)], at 8167.
8 Id.
9 Id.
10 See infra Section IV.A (noting that current
cybersecurity disclosures appear in varying sections
of companies’ periodic and current reports and are
sometimes included with other unrelated
disclosures).
11 Proposing Release at 16591–16592. See also
U.S. Financial Stability Oversight Council, Annual
Report (2021), at 168, available at https://
home.treasury.gov/system/files/261/
FSOC2021AnnualReport.pdf (finding that ‘‘a
destabilizing cybersecurity incident could
PO 00000
Frm 00003
Fmt 4701
Sfmt 4700
51897
Second, there has been a substantial rise
in the prevalence of cybersecurity
incidents, propelled by several factors:
the increase in remote work spurred by
the COVID–19 pandemic; the increasing
reliance on third-party service providers
for information technology services; and
the rapid monetization of cyberattacks
facilitated by ransomware, black
markets for stolen data, and crypto-asset
technology.12 Third, the costs and
adverse consequences of cybersecurity
incidents to companies are increasing;
such costs include business
interruption, lost revenue, ransom
payments, remediation costs, liabilities
to affected parties, cybersecurity
protection costs, lost assets, litigation
risks, and reputational damage.13
Since publication of the Proposing
Release, these trends have continued
apace, with significant cybersecurity
incidents occurring across companies
and industries. For example, threat
actors repeatedly and successfully
executed attacks on high-profile
companies across multiple critical
industries over the course of 2022 and
the first quarter of 2023, causing the
Department of Homeland Security’s
Cyber Safety Review Board to initiate
multiple reviews.14 Likewise, state
actors have perpetrated multiple highprofile attacks, and recent geopolitical
instability has elevated such threats.15 A
recent study by two cybersecurity firms
found that 98 percent of organizations
use at least one third-party vendor that
potentially threaten the stability of the U.S.
financial system’’).
12 Proposing Release at 16591–16592.
13 Id.
14 See Department of Homeland Security, Cyber
Safety Review Board to Conduct Second Review on
Lapsus$ (Dec. 2, 2022), available at https://
www.dhs.gov/news/2022/12/02/cyber-safety-reviewboard-conduct-second-review-lapsus; see also Tim
Starks, The Latest Mass Ransomware Attack Has
Been Unfolding For Nearly Two Months, Wash. Post
(Mar. 27, 2023), available at https://
www.washingtonpost.com/politics/2023/03/27/
latest-mass-ransomware-attack-has-been-unfoldingnearly-two-months/.
15 See, e.g., Press Release, Federal Bureau of
Investigation, FBI Confirms Lazarus Group Cyber
Actors Responsible for Harmony’s Horizon Bridge
Currency Theft (Jan. 23, 2023), available at https://
www.fbi.gov/news/press-releases/fbi-confirmslazarus-group-cyber-actors-responsible-forharmonys-horizon-bridge-currency-theft; Alert
(AA22–257A), Cybersecurity & Infrastructure
Security Agency, Iranian Islamic Revolutionary
Guard Corps-Affiliated Cyber Actors Exploiting
Vulnerabilities for Data Extortion and Disk
Encryption for Ransom Operations (Sep. 14, 2022),
available at https://www.cisa.gov/uscert/ncas/
alerts/aa22-257a; National Security Agency et al.,
Joint Cybersecurity Advisory: Russian StateSponsored and Criminal Cyber Threats to Critical
Infrastructure (Apr. 20, 2022), available at https://
media.defense.gov/2022/Apr/20/2002980529/-1/-1/
1/joint_csa_russian_state-sponsored_and_criminal_
cyber_threats_to_critical_infrastructure_
20220420.pdf.
E:\FR\FM\04AUR2.SGM
04AUR2
51898
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
ddrumheller on DSK120RN23PROD with RULES2
has experienced a breach in the last two
years.16 In addition, recent
developments in artificial intelligence
may exacerbate cybersecurity threats, as
researchers have shown that artificial
intelligence systems can be leveraged to
create code used in cyberattacks,
including by actors not versed in
programming.17 Overall, evidence
suggests companies may be
underreporting cybersecurity
incidents.18
Legislatively, we note two significant
developments occurred following
publication of the Proposing Release.
First, the President signed into law the
Cyber Incident Reporting for Critical
Infrastructure Act of 2022 (‘‘CIRCIA’’) 19
on March 15, 2022, as part of the
Consolidated Appropriations Act of
2022.20 The centerpiece of CIRCIA is the
reporting obligation placed on
companies in defined critical
infrastructure sectors.21 Once rules are
adopted by the Cybersecurity &
Infrastructure Security Agency
(‘‘CISA’’), these companies will be
required to report covered cyber
incidents to CISA within 72 hours of
discovery, and report ransom payments
within 24 hours.22 Importantly, reports
made to CISA pursuant to CIRCIA will
remain confidential; while the
information contained therein may be
shared across Federal agencies for
cybersecurity, investigatory, and law
enforcement purposes, the information
may not be disclosed publicly, except in
16 SecurityScorecard, Cyentia Institute and
SecurityScorecard Research Report: Close
Encounters of the Third (and Fourth) Party Kind
(Feb 1, 2023), available at https://
securityscorecard.com/research/cyentia-closeencounters-of-the-third-and-fourth-party-kind/.
17 Check Point Research, OPWNAI: AI that Can
Save the Day or Hack it Away (Dec. 19, 2022),
available at https://research.checkpoint.com/2022/
opwnai-ai-that-can-save-the-day-or-hack-it-away.
18 Bitdefender, Whitepaper: Bitdefender 2023
Cybersecurity Assessment (Apr. 2023), available at
https://businessresources.bitdefender.com/
bitdefender-2023-cybersecurity-assessment.
19 Cyber Incident Reporting for Critical
Infrastructure Act of 2022, Public Law 117–103, 136
Stat. 1038 (2022).
20 Consolidated Appropriations Act of 2022, H.R.
2471, 117th Cong. (2022).
21 The sectors are defined in Presidential Policy
Directive/PPD–21, Critical Infrastructure Security
and Resilience (Feb. 12, 2013), as: Chemical;
Commercial Facilities; Communications; Critical
Manufacturing; Dams; Defense Industrial Base;
Emergency Services; Energy; Financial Services;
Food and Agriculture; Government Facilities;
Healthcare and Public Health; Information
Technology; Nuclear Reactors, Materials, and
Waste; Transportation Systems; Water and
Wastewater Systems. Because these sectors
encompass some private companies and do not
encompass all public companies, CIRCIA’s reach is
both broader and narrower than the set of
companies subject to the rules we are adopting.
22 6 U.S.C. 681b(a)(1).
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
anonymized form.23 We note that
CIRCIA also mandated the creation of a
‘‘Cyber Incident Reporting Council . . .
to coordinate, deconflict, and harmonize
Federal incident reporting
requirements’’ (the ‘‘CIRC’’), of which
the Commission is a member.24 Second,
on December 21, 2022, the President
signed into law the Quantum
Computing Cybersecurity Preparedness
Act, which directs the Federal
Government to adopt technology that is
protected from decryption by quantum
computing, a developing technology
that may increase computer processing
capacity considerably and thereby
render existing computer encryption
vulnerable to decryption.25
We received over 150 comment letters
in response to the Proposing Release.26
The majority of comments focused on
the proposed incident disclosure
23 6 U.S.C. 681e. See infra Section II.A.3 for a
discussion of why our final rules serve a different
purpose and are not at odds with the goals of
CIRCIA.
24 6 U.S.C. 681f.
25 Quantum Computing Cybersecurity
Preparedness Act, H.R. 7535, 117th Cong. (2022).
More recently, the White House released a National
Cybersecurity Strategy to combat the ongoing risks
associated with cyberattacks. The National
Cybersecurity Strategy seeks to rebalance the
responsibility for defending against cyber threats
toward companies instead of the general public,
and looks to realign incentives to favor long-term
investments in cybersecurity. See Press Release,
White House, FACT SHEET: Biden-Harris
Administration Announces National Cybersecurity
Strategy (Mar. 2, 2023), available at https://
www.whitehouse.gov/briefing-room/statementsreleases/2023/03/02/fact-sheet-biden-harrisadministration-announces-national-cybersecuritystrategy/.
26 The public comments we received are available
at https://www.sec.gov/comments/s7-09-22/
s70922.htm. On Mar. 9, 2022, the Commission
published the Proposing Release on its website. The
comment period for the Proposing Release was
open for 60 days from issuance and publication on
SEC.gov and ended on May 9, 2022. One
commenter asserted that the comment period was
not sufficient and asked the Commission to extend
it by 30 days. See letter from American Chemistry
Council (‘‘ACC’’). In Oct. 2022, the Commission
reopened the comment period for the Proposing
Release and other rulemakings because certain
comments on the Proposing Release and other
rulemakings were potentially affected by a
technological error in the Commission’s internet
comment form. See Resubmission of Comments and
Reopening of Comment Periods for Several
Rulemaking Releases Due to a Technological Error
in Receiving Certain Comments, Release No. 33–
11117 (Oct. 7, 2022) [87 FR 63016 (Oct. 18, 2022)]
(‘‘Reopening Release’’). The Reopening Release was
published on the Commission’s website on Oct. 7,
2022 and in the Federal Register on Oct. 18, 2022,
and the comment period ended on Nov. 1, 2022. A
few commenters asserted that the comment period
for the reopened rulemakings was not sufficient and
asked the Commission to extend the comment
period for those rulemakings. See, e.g., letters from
Attorneys General of the states of Montana et al.
(Oct. 24, 2022) and U.S. Chamber of Commerce
(Nov. 1, 2022). We have considered all comments
received since Mar. 9, 2022 and do not believe an
additional extension of the comment period is
necessary.
PO 00000
Frm 00004
Fmt 4701
Sfmt 4700
requirement, although we also received
substantial comment on the proposed
risk management, strategy, governance,
and board expertise requirements. In
addition, the Commission’s Investor
Advisory Committee adopted
recommendations (‘‘IAC
Recommendation’’) with respect to the
proposal, stating that it: supports the
proposed incident disclosure
requirement; supports the proposed risk
management, strategy, and governance
disclosure requirements; recommends
the Commission reconsider the
proposed board of directors’
cybersecurity expertise disclosure
requirement; suggests requiring
companies to disclose the key factors
they used to determine the materiality
of a reported cybersecurity incident; and
suggests extending the proposed 17 CFR
229.106 (Regulation S–K ‘‘Item 106’’)
disclosure requirements to registration
statements.27
We are making a number of important
changes from the Proposing Release in
response to comments received. With
respect to incident disclosure, we are
narrowing the scope of disclosure,
adding a limited delay for disclosures
that would pose a substantial risk to
national security or public safety,
requiring certain updated incident
disclosure on an amended Form 8–K
instead of Forms 10–Q and 10–K for
domestic registrants, and on Form 6–K
instead of Form 20–F for foreign private
issuers (‘‘FPIs’’),28 and omitting the
proposed aggregation of immaterial
incidents for materiality analyses. We
are streamlining the proposed
disclosure elements related to risk
management, strategy, and governance,
and we are not adopting the proposed
requirement to disclose board
cybersecurity expertise. The following
27 See U.S. Securities and Exchange Commission
Investor Advisory Committee, Recommendation of
the Investor as Owner Subcommittee and
Disclosure Subcommittee of the SEC Investor
Advisory Committee Regarding Cybersecurity Risk
Management, Strategy, Governance, and Incident
Disclosure (Sept. 21, 2022), available at https://
www.sec.gov/spotlight/investor-advisorycommittee-2012/20220921-cybersecurity-disclosurerecommendation.pdf. The Investor Advisory
Committee also held a panel discussion on
cybersecurity at its Mar. 10, 2022 meeting. See U.S.
Securities and Exchange Commission Investor
Advisory Committee, Meeting Agenda (Mar. 10,
2022), available at https://www.sec.gov/spotlight/
investor-advisory-committee/iac031022agenda.htm.
28 An FPI is any foreign issuer other than a foreign
government, except for an issuer that (1) has more
than 50 percent of its outstanding voting securities
held of record by U.S. residents; and (2) any of the
following: (i) a majority of its executive officers or
directors are citizens or residents of the United
States; (ii) more than 50 percent of its assets are
located in the United States; or (iii) its business is
principally administered in the United States. 17
CFR 230.405. See also 17 CFR 240.3b–4(c).
E:\FR\FM\04AUR2.SGM
04AUR2
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
table summarizes the requirements we
are adopting, including changes from
the Proposing Release, as described
more fully in Section II below: 29
Item
Summary description of the disclosure requirement 30
Regulation S–K Item 106(b)—Risk management
and strategy.
Registrants must describe their processes, if any, for the assessment, identification, and management of material risks from cybersecurity threats, and describe whether any risks from
cybersecurity threats have materially affected or are reasonably likely to materially affect
their business strategy, results of operations, or financial condition.
Registrants must:
—Describe the board’s oversight of risks from cybersecurity threats.
—Describe management’s role in assessing and managing material risks from cybersecurity
threats.
Registrants must disclose any cybersecurity incident they experience that is determined to be
material, and describe the material aspects of its:
—Nature, scope, and timing; and
—Impact or reasonably likely impact.
An Item 1.05 Form 8–K must be filed within four business days of determining an incident was
material. A registrant may delay filing as described below, if the United States Attorney General (‘‘Attorney General’’) determines immediate disclosure would pose a substantial risk to
national security or public safety.
Registrants must amend a prior Item 1.05 Form 8–K to disclose any information called for in
Item 1.05(a) that was not determined or was unavailable at the time of the initial Form 8–K
filing.
FPIs must:
—Describe the board’s oversight of risks from cybersecurity threats.
—Describe management’s role in assessing and managing material risks from cybersecurity
threats.
FPIs must furnish on Form 6–K information on material cybersecurity incidents that they disclose or otherwise publicize in a foreign jurisdiction, to any stock exchange, or to security
holders.
Regulation S–K Item 106(c)—Governance ........
Form 8–K Item 1.05—Material Cybersecurity Incidents.
Form 20–F ..........................................................
Form 6–K ............................................................
Overall, we remain persuaded that, as
detailed in the Proposing Release:
under-disclosure regarding
cybersecurity persists despite the
Commission’s prior guidance; investors
need more timely and consistent
cybersecurity disclosure to make
informed investment decisions; and
recent legislative and regulatory
developments elsewhere in the Federal
Government, including those
developments subsequent to the
issuance of the Proposing Release such
as CIRCIA 31 and the Quantum
Computing Cybersecurity Preparedness
Act,32 while serving related purposes,
will not effectuate the level of public
cybersecurity disclosure needed by
investors in public companies.
II. Discussion of Final Amendments
A. Disclosure of Cybersecurity Incidents
on Current Reports
1. Proposed Amendments
The Commission proposed to amend
Form 8–K by adding new Item 1.05 that
would require a registrant to disclose
ddrumheller on DSK120RN23PROD with RULES2
51899
29 The information in this table is not
comprehensive and is intended only to highlight
some of the more significant aspects of the final
amendments. It does not reflect all of the
amendments or all of the rules and forms that are
affected by the final amendments, which are
discussed in detail below. As such, this table
should be read together with the entire release,
including the regulatory text.
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
the following information regarding a
material cybersecurity incident, to the
extent known at the time of filing:
• When the incident was discovered
and whether it is ongoing;
• A brief description of the nature
and scope of the incident;
• Whether any data were stolen,
altered, accessed, or used for any other
unauthorized purpose;
• The effect of the incident on the
registrant’s operations; and
• Whether the registrant has
remediated or is currently remediating
the incident.33
The Commission clarified in the
Proposing Release that this requirement
would not extend to specific, technical
information about the registrant’s
planned response to the incident or its
cybersecurity systems, related networks
and devices, or potential system
vulnerabilities in such detail as would
impede the registrant’s response or
remediation of the incident.34
The Commission proposed to set the
filing trigger for Item 1.05 as the date the
registrant determines that a
30 For purposes of this release, the terms ‘‘public
companies,’’ ‘‘companies,’’ and ‘‘registrants’’
include issuers that are business development
companies as defined in section 2(a)(48) of the
Investment Company Act of 1940, which are a type
of closed-end investment company that is not
registered under the Investment Company Act, but
do not include investment companies registered
under that Act.
31 Supra note 19.
PO 00000
Frm 00005
Fmt 4701
Sfmt 4700
cybersecurity incident is material; as
with all other Form 8–K items, the
proposed filing deadline would be four
business days after the trigger.35 To
protect against any inclination on the
part of a registrant to delay making a
materiality determination with a view
toward prolonging the filing deadline,
the Commission proposed adding
Instruction 1 to Item 1.05 requiring that
‘‘a registrant shall make a materiality
determination regarding a cybersecurity
incident as soon as reasonably
practicable after discovery of the
incident.’’ 36
The Commission affirmed in the
Proposing Release that the materiality
standard registrants should apply in
evaluating whether a Form 8–K would
be triggered under proposed Item 1.05
would be consistent with that set out in
the numerous cases addressing
materiality in the securities laws,
including TSC Industries, Inc. v.
Northway, Inc.,37 Basic, Inc. v.
Levinson,38 and Matrixx Initiatives, Inc.
v. Siracusano,39 and likewise with that
set forth in 17 CFR 230.405 (‘‘Securities
33 Proposing
Release at 16595.
34 Id.
35 Id.
36 Id.
at 16596.
Indus. v. Northway, 426 U.S. 438, 449
37 TSC
(1976).
38 Basic Inc. v. Levinson, 485 U.S. 224, 232
(1988).
39 Matrixx Initiatives v. Siracusano, 563 U.S. 27
(2011).
E:\FR\FM\04AUR2.SGM
04AUR2
51900
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
Act Rule 405’’) and 17 CFR 240.12b–2
(‘‘Exchange Act Rule 12b–2’’). That is,
information is material if ‘‘there is a
substantial likelihood that a reasonable
shareholder would consider it
important’’ 40 in making an investment
decision, or if it would have
‘‘significantly altered the ‘total mix’ of
information made available.’’ 41 ‘‘Doubts
as to the critical nature’’ of the relevant
information should be ‘‘resolved in
favor of those the statute is designed to
protect,’’ namely investors.42
The Commission explained that the
timely disclosure of the information
required by proposed Item 1.05 would
enable investors and other market
participants to assess the possible
effects of a material cybersecurity
incident on the registrant, including any
short- and long-term financial effects or
operational effects, resulting in
information useful for their investment
decisions.43 Aligning the deadline for
Item 1.05 with that of the other Form 8–
K items would, the Commission
maintained, significantly improve the
timeliness of cybersecurity incident
disclosures as well as standardize those
disclosures.44 The Commission did not
propose to provide a reporting delay in
cases of ongoing internal or external
investigations of cybersecurity
incidents.45 Nevertheless, the Proposing
Release requested comment on whether
to allow a delay in reporting where the
Attorney General determines that a
delay is in the interest of national
security.46
2. Comments
Proposed Item 1.05 received a
significant amount of feedback from
commenters. Some commenters
supported Item 1.05 as proposed,47
saying that the current level of
disclosure on cybersecurity incidents is
inadequate to meet investor needs, and
Item 1.05 would remedy this
inadequacy by effectuating the
disclosure of decision-useful
40 TSC
Indus., 426 U.S. at 449.
41 Id.
42 Id.
at 448.
43 Proposing
Release at 16595.
44 Id.
45 Id.
at 16596.
at 16598.
47 See letters from American Institute of CPAs
(‘‘AICPA’’); Better Markets (‘‘Better Markets’’);
BitSight Technologies, Inc. (‘‘BitSight’’); California
Public Employees’ Retirement System (‘‘CalPERS’’);
Crindata, LLC (‘‘Crindata’’); Council of Institutional
Investors (‘‘CII’’); Information Technology and
Innovation Foundation (‘‘ITIF’’); North American
Securities Administrators Association Inc.
(‘‘NASAA’’); Professor Jerry Perullo (‘‘Prof.
Perullo’’); Professor Preeti Choudhary (‘‘Prof.
Choudhary’’); Tessa Mishoe (‘‘T. Mishoe’’). See also
IAC Recommendation.
ddrumheller on DSK120RN23PROD with RULES2
46 Id.
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
information.48 One commenter also
anticipated that Item 1.05 would reduce
the risk of insider trading by shortening
the time between discovery of an
incident and public disclosure.49
Other commenters opposed proposed
Item 1.05, for several reasons. Some
commenters said that if proposed Item
1.05 were to result in disclosure while
an incident is still ongoing, it would tip
off the threat actor and thus make
successful neutralization of the incident
more difficult.50 Commenters also
expressed concern that public notice of
a vulnerability could draw attacks from
other threat actors who were previously
unaware of the vulnerability; and such
attacks could target the disclosing
registrant or other companies with the
same vulnerability, particularly if the
vulnerability is with a third-party
service provider used by multiple
companies.51 Some of these commenters
objected specifically to the requirement
in Item 1.05 to disclose whether
remediation has occurred, stating that
this information could assist threat
actors in their targeting or invite further
targeted attacks,52 while others more
generally stated that the Item 1.05
disclosure would be overly detailed,
such that it would give a road map to
48 Id.
49 See
letter from Better Markets.
letters from ACC; American Gas
Association and Interstate Natural Gas Association
of America (‘‘AGA/INGAA’’); BioTechnology
Innovation Organization (‘‘BIO’’); Bank Policy
Institute, American Bankers Association, and MidSize Bank Coalition of America (‘‘BPI et al.’’); BSA/
The Software Alliance (‘‘BSA’’); Business
Roundtable (‘‘Business Roundtable’’); Canadian
Bankers Association (‘‘CBA’’); Edison Electric
Institute (‘‘EEI’’); Energy Infrastructure Council
(‘‘EIC’’); Federation of American Hospitals (‘‘FAH’’);
Financial Services Sector Coordinating Council
(‘‘FSSCC’’); Information Technology Industry
Council (‘‘ITI’’); LTSE Services, Inc. (‘‘LTSE’’);
National Association of Manufacturers (‘‘NAM’’);
National Defense Industrial Association (‘‘NDIA’’);
Quest Diagnostics Incorporated (‘‘Quest’’); Rapid7,
Inc. (‘‘Rapid7’’); Society for Corporate Governance
(‘‘SCG’’); Securities Industry and Financial Markets
Association (‘‘SIFMA’’); TransUnion; R Street
Institute (‘‘R Street’’); U.S. Chamber of Commerce
(‘‘Chamber’’).
51 See letters from ABA Committee on Federal
Regulation of Securities (‘‘ABA’’); Aerospace
Industries Association of America (‘‘AIA’’); Alliance
for Automotive Innovation (‘‘Auto Innovators’’);
AGA/INGAA; American Property Casualty
Insurance Association (‘‘APCIA’’); BPI et al.; BSA;
Business Roundtable; CBA; Chamber; Cellular
Telecommunications and internet Assoc. (‘‘CTIA’’);
Cybersecurity Coalition; EEI; EIC; Empire State
Realty Trust, Inc. (‘‘Empire’’); Enbridge Inc.
(‘‘Enbridge’’); FSSCC; internet Security Alliance;
ITI; Microsoft Corporation (‘‘Microsoft’’); NDIA;
PPG Industries, Inc. (‘‘PPG’’);
PricewaterhouseCoopers LLP (‘‘PWC’’); Rapid7; R
Street; SCG; SIFMA; U.S. Senator Rob Portman
(‘‘Sen. Portman’’); Virtu Financial (‘‘Virtu’’).
52 See letters from ABA; AGA/INGAA; BPI et al.;
Cybersecurity Coalition; Empire; Enbridge; PWC;
SIFMA; SCG; Virtu.
50 See
PO 00000
Frm 00006
Fmt 4701
Sfmt 4700
threat actors for planning attacks.53 One
commenter argued that the prospect of
possibly having to file an Item 1.05
Form 8–K could chill threat information
sharing within industries, because
companies would fear that any
cybersecurity risk information they
share could later be used to question
their disclosure decisions.54
Some of the commenters that
disagreed with the level of disclosure
required by proposed Item 1.05
recommended that the Commission
narrow the disclosure requirements of
the rule. For example, one such
commenter advised dropping the
proposed requirement to disclose
‘‘when the incident was discovered,’’
arguing that this detail may cause
confusion, particularly where an
incident was detected some time ago but
a significant aspect rendering it material
surfaced only recently.55 Another
commenter opined that ‘‘whether the
registrant has remediated or is currently
remediating the incident’’ is duplicative
of ‘‘whether it is ongoing,’’ so either of
the two could be eliminated.56 One
commenter contended that a materiality
filter should be added to the details
required by Item 1.05, such that
companies would have to disclose only
details that themselves are material,
rather than immaterial details of a
material incident.57
By contrast, there were also
commenters that recommended
expanding the disclosure requirements
in the proposed rule. In this regard,
some commenters recommended
requiring that registrants disclose asset
losses, intellectual property losses, and
the value of business lost due to the
incident.58 Other suggestions included
requiring that incidents be quantified as
to their severity and impact via
standardized rating systems, and that
registrants disclose how they became
aware of the incident, as this may shed
light on the effectiveness of a company’s
cybersecurity policies and procedures.59
Additionally, commenters suggested
banning trading by insiders during the
time between the materiality
determination and disclosure of the
incident.60
Commenters provided reactions to the
application of Item 1.05 to incidents
53 See letters from AGA/INGAA; BSA; EIC; ITI;
PPG.
54 See letter from Consumer Technology
Association (‘‘CTA’’).
55 See letter from Prof. Perullo.
56 See letter from ABA.
57 See letter from ITI.
58 See letters from Profs. Rajgopal & Sharpe; PWC.
59 See letters from BitSight; Cloud Security
Alliance (‘‘CSA’’).
60 See letter from Prof. Mitts.
E:\FR\FM\04AUR2.SGM
04AUR2
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
ddrumheller on DSK120RN23PROD with RULES2
connected with third-party systems. A
number of commenters contended that
registrants should be exempt from
having to disclose cybersecurity
incidents in third-party systems they
use because of their reduced control
over such systems.61 Similarly, several
commenters advocated for a safe harbor
for information disclosed about thirdparty systems, given registrants’ reduced
visibility into such systems.62 A few
commenters suggested a longer
reporting timeframe for third-party
incidents, because the registrant may be
dependent on the third party for
information (which may not be
provided in a timely manner), and to
avoid harm to other companies reliant
on the same third party.63 Commenters
also recommended that Item 1.05 be
phased in over a longer period of time
with respect to third-party incidents, to
give registrants time to develop
information sharing processes with their
third-party service providers.64
Commenters also requested guidance
or otherwise raised concerns where the
proposed requirements might trigger
disclosures by third-party service
providers. A commenter requested
clarity on whether an incident should
be disclosed by the third-party service
provider registrant that owns the
affected system or the customer
registrant that owns the affected
information, or both.65 And two
commenters argued that third-party
service providers should simply pass
along information to their end
customers, who would then make their
own materiality determination and
disclose accordingly; this should
particularly be the case, a commenter
said, where an attack on a third-party
data center results in a data breach for
an end customer but does not affect the
services the data center provides.66
The proposed timing of incident
disclosure also received a significant
level of public comment. For example,
a few commenters said the level of
detail required by Item 1.05 is
impractical to produce in the allotted
time.67 Other commenters said that the
proposed deadline would lead to the
61 See letters from ABA; AIA; APCIA; Business
Roundtable; Cybersecurity Coalition; Chamber; EIC;
FAH; ISA; ITI; NAM; NDIA; National Multifamily
Housing Council and National Apartment
Association (‘‘NMHC’’); Paylocity; SIFMA.
62 See letters from Chevron Corporation
(‘‘Chevron’’); APCIA; BPI et al.; BIO; CSA; Financial
Executive International’s Committee on Corporate
Reporting (‘‘FEI’’); ITI; ISA; NMHC; SIFMA.
63 See letters from ABA; R Street.
64 See letters from Business Roundtable; Deloitte
& Touche LLP (‘‘Deloitte’’).
65 See letter from Business Roundtable.
66 See letters from BSA; ITI.
67 See letters from ABA; NMHC; Quest.
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
disclosure of tentative, unclear, or
potentially inaccurate information that
is not decision-useful to investors,68
resulting in the market mispricing the
underlying securities.69 Commenters
also argued that Item 1.05 is
qualitatively different from all other
Form 8–K items in that the trigger for
Item 1.05 is largely outside the
company’s control.70 Some commenters
worried the proposed deadline would
lead to disclosure of ‘‘false positives,’’
that is, incidents that appear material at
first but later on with the emergence of
more information turn out not to be
material.71
Commenters suggested a range of
alternative reporting deadlines for Item
1.05. A common suggestion was to
modify the measurement date from the
determination of materiality to another
point in the lifecycle of the incident
when the incident is no longer a threat
to the registrant—commenters variously
termed this as ‘‘containment,’’
‘‘remediation,’’ ‘‘mitigation,’’ and
comparable terms.72 One commenter
recommended conditioning a reporting
delay on the registrant being actively
engaged in containing the incident and
reasonably believing that containment
can be completed in a timely manner.73
Similarly, several commenters
recommended that the rule allow for a
delay in providing Item 1.05 disclosure
based on a registrant’s assessment of the
potential negative consequences of
public disclosure, using a variety of
measures they suggested.74 Another
68 See letters from ABA; ACC; AIA; Auto
Innovators; American Investment Council (‘‘AIC’’);
BIO; Business Roundtable; CBA; Chamber;
Confidentiality Coalition; CTIA; Davis Polk &
Wardwell LLP (‘‘Davis Polk’’); Debevoise &
Plimpton (‘‘Debevoise’’); Federated Hermes; FSSCC;
Microsoft; NAM; Nasdaq Stock Market, LLC
(‘‘Nasdaq’’); NDIA; Quest; SCG; TransUnion; Wilson
Sonsini Goodrich & Rosati (‘‘Wilson Sonsini’’);
Virtu.
69 See letters from ABA; ACC; AIA; AIC; BIO; BPI
et al.; Business Roundtable; Confidentiality
Coalition; Davis Polk; ISA; Nasdaq; PPG; Quest;
Rapid7; SCG; Sen. Portman; SIFMA; Virtu.
70 See letters from CTIA; Debevoise; EIC; LTSE;
New York City Bar Association (‘‘NYC Bar’’); Quest.
71 See letters from LTSE; PPG; SCG.
72 See letters from American Council of Life
Insurers (‘‘ACLI’’); BCE Inc., Rogers
Communications Inc., TELUS Corporation (‘‘BCE’’);
BPI et al.; Business Roundtable; Chamber; CTA;
Cybersecurity Coalition; Empire; FAH; Federated
Hermes; FSSCC; ISA; ITI; NAM; Nasdaq; NDIA;
NMHC; NYSE Group (‘‘NYSE’’); Quest; Rapid7; Sen.
Portman; SCG; SIFMA; SM4RT Secure LLC
(‘‘SM4RT Secure’’); TransUnion.
73 See letter from Rapid7.
74 See letters from BSA (suggesting a ‘‘tailored,
balancing test’’); EEI (advocating delay ‘‘to the
extent . . . the registrant in good faith concludes
that its disclosure will expose it or others to
ongoing or additional risks of a cybersecurity
incident’’); EIC; Microsoft (requesting that
companies be allowed to ‘‘manage the timing’’ of
disclosure ‘‘when compelling conditions exist such
PO 00000
Frm 00007
Fmt 4701
Sfmt 4700
51901
suggestion was to replace the proposed
deadline with an instruction to disclose
material incidents ‘‘without
unreasonable delay.’’ 75
Some commenters recommended
instead increasing the number of days
between the reporting trigger and the
reporting deadline. A few commenters
recommended adding one business day
to make the deadline five business
days; 76 one noted this would result in
every registrant having at least a full
calendar week to gather information and
prepare the Form 8–K.77 Another
commenter recommended a deadline of
15 business days, along with a cure
period to allow registrants a defined
period of time to fix potential reporting
mistakes.78 A few commenters
recommended a 30-day deadline,79 with
their choice of 30 days tending to be a
proxy for some other factor, such as
containment or remediation,80 or state
notification requirements.81
Several commenters recommended
addressing the timing concerns by
replacing current reporting on Form 8–
K with periodic reporting on Forms 10–
Q and 10–K, to allow additional time to
assess an incident’s impact before
reporting to markets.82 In this vein, one
commenter likened cybersecurity
incident disclosure to the disclosure of
that premature disclosure would result in greater
harm to the company, its investors, or the national
digital ecosystem’’); Nareit and The Real Estate
Roundtable (‘‘Nareit’’) (stating delay should be
permitted where disclosure ‘‘would exacerbate
injury to the company and/or its shareholders’’);
SIFMA (advocating a ‘‘‘responsible disclosure’
exception’’ that applies ‘‘where disclosure of a
cyber incident or vulnerability could have a more
damaging effect than delayed disclosure’’); Wilson
Sonsini (stating ‘‘the Commission should allow
board members to decide to delay reporting if doing
so could cause material harm to the company’’).
75 See letters from CTIA; National Restaurant
Association (‘‘NRA’’).
76 See letters from AIC; Debevoise; NYC Bar.
77 See letter from AIC.
78 See letter from R Street.
79 See letters from APCIA; Hunton Andrews
Kurth, LLP (‘‘Hunton’’); Rapid7.
80 See letters from APCIA (‘‘[w]e believe that
permitting a registrant to delay the filing for a short
period of time strikes an appropriate balance
between timely disclosure to shareholders and an
opportunity for a registrant to achieve the best
resolution for itself and its shareholders’’); Rapid7
(‘‘[i]n Rapid7’s experience, the vast majority of
incidents can be contained and mitigated within
that time frame [30 days]’’).
81 See letters from APCIA (‘‘[a]llowing up to 30
days for disclosure would also bring the SEC’s
proposal in line with data breach disclosure
requirements at the state level’’); Hunton (‘‘[w]hile
state data breach notification laws vary from state
to state, 30 days from the cybersecurity incident is
the earliest date any state requires that notification
to affected persons be made’’).
82 See letters from ABA; Davis Polk; Debevoise;
LTSE; NYC Bar; Quest; SCG.
E:\FR\FM\04AUR2.SGM
04AUR2
51902
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
legal proceedings under Regulation S–K
Item 103.83
A few commenters recommended
instead that the materiality trigger be
replaced with a quantifiable trigger; for
example, an incident implicating a
specified percentage of revenue, or the
costs of an incident exceeding a
specified benchmark, could trigger
disclosure.84 Other commenters
advocated for the disclosure trigger to be
tied to any legal obligation that forces a
registrant to notify persons outside the
company.85
Commenters also recommended a
number of exceptions to the filing
deadline. The most common
recommendation was to include a
provision allowing for delayed filing
where there is an active law
enforcement investigation or the
disclosure otherwise implicates national
security or public safety.86 A
representative comment in this vein
advanced a provision whereby
registrants may ‘‘delay reporting of a
cybersecurity incident that is the subject
of a bona fide investigation by law
enforcement,’’ because such ‘‘delay in
reporting may not only facilitate such an
investigation, it may be critical to its
success.’’ 87
In calling for a law enforcement delay,
associations for industries in critical
sectors emphasized the national security
implications of public cybersecurity
incident disclosure. For example, one
association explained that disclosure
‘‘may alert malicious actors that we
have uncovered their illegal activities in
circumstances where our defense and
intelligence agencies wish to keep that
information secret.’’ 88 Likewise,
another association pointed out that, in
its industry, companies ‘‘are likely to
possess some of the nation’s most
critical confidential information,
including cybersecurity threat
information furnished by government
entities, such as the Federal Bureau of
Investigation (FBI), the Department of
83 See
letter from Quest.
letters from BIO; Bitsight; EIC; Paylocity.
85 See letters from ABA; Business Roundtable.
86 See letters from ABA; ACC; ACLI; AGA/
INGAA; AIA; AICPA; APCIA; Auto Innovators; Rep.
Banks; BPI et al.; BIO; BSA; Business Roundtable;
CBA; Chamber; Chevron; CII; CSA; CTA; CTIA;
Cybersecurity Coalition; Debevoise; EEI; EIC;
Empire; Enbridge; FAH; FedEx Corporation
(‘‘FedEx’’); FEI; FSSCC; Global Privacy Alliance
(‘‘GPA’’); Hunton; ISA; ITI; ITIF; Microsoft; NAM;
Nareit; NASAA; NDIA; NMHC; NRA; NYC Bar;
Prof. Perullo; Sen. Portman; PPG; PWC; Quest; R
Street; Profs. Rajgopal & Sharpe; Rapid7; SCG;
SIFMA; TransUnion; Virtu; USTelecom—The
Broadband Association (‘‘USTelecom’’); U.S.
Chamber of Commerce & various associations
(‘‘Chamber et al.’’).
87 See letter from Debevoise.
88 See letter from AIA.
ddrumheller on DSK120RN23PROD with RULES2
84 See
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
Homeland Security (DHS), and the
National Security Agency (NSA),’’ and
therefore, disclosure may not be
possible.89
Commenters largely advocated for ‘‘a
broad law enforcement exception that
applies not only in the interest of
national security but also when law
enforcement believes disclosure will
hinder their efforts to identify or capture
the threat actor.’’ 90 Many commenters
that responded to the Commission’s
request for comment regarding a
provision whereby the Attorney General
determines that a delay is in the interest
of national security indicated that such
a provision should be more expansive
and extend to other law enforcement
authorities.91 One of these commenters
questioned whether the Attorney
General would opine on matters ‘‘that
are under the ambit of other Federal
agencies, such as the Department of
Homeland Security, Department of State
and the Department of Defense.’’ 92
Another commenter pointed out that
‘‘the Department of Justice is not the
primary, or even the lead, organization
in the Federal Government for
cybersecurity response, rather the
Department of Homeland Security’s
Cybersecurity and Infrastructure
Security Agency is often the first call
that companies make,’’ while ‘‘[f]or
defense contractors, the Department of
Defense is likely to have the highest
interest in the timing of an
announcement.’’ 93 For the financial
industry specifically, one suggestion
was to permit a delay if the Federal
Reserve, Federal Deposit Insurance
Corporation, or Office of the
Comptroller of the Currency finds that
disclosure would compromise the safety
or soundness of the financial institution
or of the financial system as a whole.94
Some commenters specifically urged
that state law enforcement be included
within any delay provision,95 and one
commenter appeared to contemplate
inclusion of foreign law enforcement.96
89 See
letter from EEI.
letter from ABA.
91 See letters from BPI et al.; CBA; CSA; Hunton;
ITIF; SCG; Wilson Sonsini.
92 See letter from Hunton. This commenter also
questioned whether law enforcement would be
inclined to provide a written determination,
particularly within four business days, because in
its experience with State data breach laws, ‘‘the
relevant state and federal law enforcement agencies
seldom (if ever) provide written instructions when
the relevant exception comes into play.’’
93 See letter from Wilson Sonsini.
94 See letter from BPI et al. Cf. letter from FSSCC.
95 See, e.g., letter from ITIF.
96 See letter from CBA (stating ‘‘the scope of the
contemplated exemption is indefensibly narrow,
particularly for registrants with operations outside
of the United States . . . there should be an
exemption to permit delayed disclosure upon the
90 See
PO 00000
Frm 00008
Fmt 4701
Sfmt 4700
A few commenters advocated for a
confidential reporting system, whereby
a registrant would initially file a
nonpublic report with the Commission
while a law enforcement investigation is
ongoing, and then unseal the report
upon the investigation’s completion.97
A number of commenters provided
feedback regarding proposed Instruction
1, which would have directed
registrants to make their materiality
determination regarding an incident ‘‘as
soon as reasonably practicable after
discovery of the incident.’’ Several
commenters recommended removing
the instruction altogether as, in their
view, it would place unnecessary
pressure on companies to make
premature determinations before they
have sufficient information.98 Other
commenters stated that the instruction
is too ambiguous for registrants to
ascertain whether they have complied
with it.99 Conversely, one commenter
advised the Commission not to provide
further guidance on the meaning of ‘‘as
soon as reasonably practicable,’’
explaining that doing so would interfere
with each registrant’s individual
assessment of what is practicable given
its specific context, resulting in pressure
to move more quickly than may be
appropriate.100 Another commenter
likewise found that ‘‘as soon as
reasonably practicable’’ is a ‘‘reasonable
approach’’ that ‘‘provides public
companies with the appropriate degree
of flexibility to conduct a thorough
assessment while ensuring that the
markets get timely and relevant
information.’’ 101 One commenter
recommended a safe harbor for actions
and determinations made in good faith
to satisfy Instruction 1 that later turn out
to be mistaken.102
In response to a request for comment
in the Proposing Release, several
commenters recommended registrants
be permitted to furnish rather than file
an Item 1.05 Form 8–K, so that filers of
an Item 1.05 Form 8–K would not be
subject to liability under Section 18 of
the Exchange Act.103 A significant
number of commenters also endorsed
the proposal to amend 17 CFR 240.13a–
request of any competent national, state or local law
enforcement authority’’).
97 See letters from CSA; Hunton; SCG. See also
letter from LTSE (positing the Regulation SCI
disclosure framework as a model for Item 1.05).
98 See letters from ABA; AGA/INGAA; Federated
Hermes; ISA; Paylocity; Quest; SCG.
99 See letter from Center for Audit Quality
(‘‘CAQ’’); CSA; Institute of Internal Auditors
(‘‘IIA’’); LTSE; NYC Bar.
100 See letter from Cybersecurity Coalition.
101 See letter from NASAA.
102 See letter from Nasdaq.
103 See letters from BPI et al.; Business
Roundtable; Chevron; CSA; EEI; LTSE; NAM; SCG.
E:\FR\FM\04AUR2.SGM
04AUR2
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
ddrumheller on DSK120RN23PROD with RULES2
11(c) (‘‘Rule 13a–11(c)’’) and 17 CFR
240.15d–11(c) (‘‘Rule 15d–11(c)’’) under
the Exchange Act to include Item 1.05
in the list of Form 8–K items eligible for
a limited safe harbor from liability
under Section 10(b) or 17 CFR 240.10b–
5 (‘‘Rule 10b–5’’) under the Exchange
Act.104 Likewise, the proposal to amend
General Instruction I.A.3.(b) of Form S–
3 and General Instruction I.A.2 of Form
SF–3 to provide that an untimely filing
on Form 8–K regarding new Item 1.05
would not result in loss of Form S–3 or
Form SF–3 eligibility received much
support.105
Finally, a number of commenters
averred that Item 1.05 would conflict
with other Federal and state
cybersecurity reporting or other
regulatory regimes. For example, one
commenter stated Item 1.05 would
counteract the goals of CIRCIA by
requiring public disclosure of
information the act would keep
confidential, and went on to assert that
CIRCIA was intended as the primary
means for reporting incidents to the
Federal Government.106 Also related to
CIRCIA, a number of commenters urged
harmonization of the Commission’s
proposal with forthcoming regulations
expected from CISA pursuant to
CIRCIA.107 Several commenters alleged
Item 1.05 would conflict with rules the
Department of Health and Human
Services (‘‘HHS’’) has adopted pursuant
to the Health Insurance Portability and
Accountability Act (‘‘HIPAA’’) regarding
the reporting of private health
information breaches.108 A few
commenters likewise said Item 1.05
would conflict with the reporting
regime set forth in Federal
Communications Commission (‘‘FCC’’)
regulations for breaches of customer
proprietary network information.109
Conflicts were also alleged with
regulations and programs of the
Department of Defense (‘‘DOD’’),110
Department of Energy (‘‘DOE’’),111 and
Department of Homeland Security
104 See letters from ABA; APCIA; BIO; Business
Roundtable; Chevron; CTIA; Cybersecurity
Coalition; Debevoise; EEI; LTSE; NYC Bar; PWC;
SCG.
105 See letters from ABA; APCIA; BIO; Business
Roundtable; Chevron; CTIA; Cybersecurity
Coalition; Debevoise; EEI; LTSE; NYC Bar; PWC;
SCG.
106 See letter from Sen. Portman.
107 See letters from ACC; ACLI; APCIA; BPI et al.;
BIO; Confidentiality Coalition; Chamber; CTA;
CTIA; Cybersecurity Coalition; EIC; FEI; FSSCC;
Insurance Coalition (‘‘IC’’); ISA; ITI; ITIF; Nareit;
NAM; NRA; R Street; SCG; SIFMA; USTelecom.
108 See letters from Chamber; Confidentiality
Coalition; FAH; R Street.
109 See letters from Chamber; CTIA; USTelecom.
110 See letter from Chamber et al.
111 See letter from EEI.
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
(‘‘DHS’’).112 Commenters called for
harmonization of Item 1.05 with
regulations issued by Federal banking
regulators,113 as well as with regulations
of the Federal Trade Commission
(‘‘FTC’’).114 Some commenters noted the
potential interaction between the
proposed rules and state laws.115 One
commenter noted the McCarranFerguson Act, which provides that a
state law preempts a Federal statute if
the state law was enacted for the
purpose of regulating the business of
insurance and the Federal statute does
not specifically relate to the business of
insurance.116
3. Final Amendments
Having considered the comments, we
remain convinced that investors need
timely, standardized disclosure
regarding cybersecurity incidents
materially affecting registrants’
businesses, and that the existing
regulatory landscape is not yielding
consistent and informative disclosure of
cybersecurity incidents from
registrants.117 However, we are revising
the proposal in two important respects
in response to concerns raised by
commenters. First, we are narrowing the
amount of information required to be
disclosed, to better balance investors’
needs and registrants’ cybersecurity
posture. And second, we are providing
112 See letter from ACC. This letter additionally
alleged conflicts with regulations of the Department
of Energy, Transportation Security Agency,
Department of Defense, and Environmental
Protection Agency, but did not explain specifically
where those conflicts lie.
113 See letters from FSSCC; Structured Finance
Association (‘‘SFA’’); SIFMA.
114 See letters from BIO; CTIA.
115 See letters from IC (noting ‘‘[a]n important
issue will be to ensure harmonized regulation
between the federal government and the several
states with proposed or preexisting cybersecurity
regulations’’); R Street (noting that state privacy
laws ‘‘mandate reporting of incidents across very
different timelines’’); SIFMA (noting that ‘‘many
state financial services and/or insurance regulators
already require regulated entities certify
cybersecurity compliance’’).
116 See letter from IC.
117 As the Commission has previously stated,
markets rely on timely dissemination of information
to accurately and quickly value securities.
Additional Form 8–K Disclosure Requirements and
Acceleration of Filing Date, Release No. 33–8400
(Mar. 16, 2004) [69 FR 15593 (Mar. 25, 2004)]
(‘‘Additional Form 8–K Disclosure Release’’).
Congress recognized that the ongoing dissemination
of accurate information by issuers about themselves
and their securities is essential to the effective
operation of the markets, and specifically
recognized the importance of current reporting in
this regard by requiring that ‘‘[e]ach issuer reporting
under Section 13(a) or 15(d) . . . disclose to the
public on a rapid and current basis such additional
information concerning material changes in the
financial condition or operations of the issuer . . .
as the Commission determines . . . is necessary or
useful for the protection of investors and in the
public interest.’’ 15 U.S.C. 78m(l).
PO 00000
Frm 00009
Fmt 4701
Sfmt 4700
51903
for a delay for disclosures that would
pose a substantial risk to national
security or public safety, contingent on
a written notification by the Attorney
General, who may take into
consideration other Federal or other law
enforcement agencies’ findings.
As described above, commenters’
criticisms of Item 1.05 generally arose
from two aspects of the proposal: (1) the
scope of disclosure; and (2) the timing
of disclosure. With respect to disclosure
scope, we note in particular commenter
concerns that the disclosure of certain
details required by proposed Item 1.05
could exacerbate security threats, both
for the registrants’ systems and for
systems in the same industry or beyond,
and could chill threat information
sharing within industries. We agree that
a balancing of concerns consistent with
our statutory authority is necessary in
crafting Item 1.05 to avoid empowering
threat actors with actionable
information that could harm a registrant
and its investors. However, we are not
persuaded, as some commenters
suggested,118 that we should forgo
requiring disclosure of the existence of
an incident while it is ongoing to avoid
risks, such as the risk of tipping off
threat actors. Some companies already
disclose material cybersecurity
incidents while they are ongoing and
before they are fully remediated, but the
timing, form, and substance of those
disclosures are inconsistent. Several
commenters indicated both that
investors look for information regarding
registrants’ cybersecurity incidents and
that current disclosure levels are
inadequate to their needs in making
investment decisions.119 In addition, we
note below in Section IV evidence
showing that delayed reporting of
cybersecurity incidents can result in
mispricing of securities, and that such
mispricing can be exploited by threat
actors, employees, related third parties,
and others through trades made before
an incident becomes public.120
Accordingly, we believe it is necessary
to adopt a requirement for uniform
current reporting of material
cybersecurity incidents.
To that end, and to balance investors’
needs with the concerns raised by
commenters, we are streamlining Item
1.05 to focus the disclosure primarily on
the impacts of a material cybersecurity
incident, rather than on requiring
details regarding the incident itself. The
final rules will require the registrant to
‘‘describe the material aspects of the
nature, scope, and timing of the
118 See
supra note 50.
letters from Better Markets; CalPERS; CII.
120 See infra notes 413 and 462.
119 See
E:\FR\FM\04AUR2.SGM
04AUR2
ddrumheller on DSK120RN23PROD with RULES2
51904
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
incident, and the material impact or
reasonably likely material impact on the
registrant, including its financial
condition and results of operations.’’ We
believe this formulation more precisely
focuses the disclosure on what the
company determines is the material
impact of the incident, which may vary
from incident to incident. The rule’s
inclusion of ‘‘financial condition and
results of operations’’ is not exclusive;
companies should consider qualitative
factors alongside quantitative factors in
assessing the material impact of an
incident.121 By way of illustration, harm
to a company’s reputation, customer or
vendor relationships, or
competitiveness may be examples of a
material impact on the company.
Similarly, the possibility of litigation or
regulatory investigations or actions,
including regulatory actions by state
and Federal Governmental authorities
and non-U.S. authorities, may constitute
a reasonably likely material impact on
the registrant.
We are not adopting, as proposed, a
requirement for disclosure regarding the
incident’s remediation status, whether it
is ongoing, and whether data were
compromised. While some incidents
may still necessitate, for example,
discussion of data theft, asset loss,
intellectual property loss, reputational
damage, or business value loss,
registrants will make those
determinations as part of their
materiality analyses. Further, we are
adding an Instruction 4 to Item 1.05 to
provide that a ‘‘registrant need not
disclose specific or technical
information about its planned response
to the incident or its cybersecurity
systems, related networks and devices,
or potential system vulnerabilities in
such detail as would impede the
registrant’s response or remediation of
the incident.’’ While the Commission
provided this assurance in the
Proposing Release,122 we agree with
some commenters that codifying it in
the Item 1.05 instructions should
provide added clarity to registrants on
the type of disclosure required by Item
1.05.
With respect to commenters’
questions concerning the application of
Item 1.05 to incidents occurring on
third-party systems, we are not
exempting registrants from providing
disclosures regarding cybersecurity
121 See also Proposing Release at 16596 (stating
that ‘‘[a] materiality analysis is not a mechanical
exercise’’ and not solely quantitative, but rather
should take into consideration ‘‘all relevant facts
and circumstances surrounding the cybersecurity
incident, including both quantitative and
qualitative factors’’).
122 Id. at 16595.
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
incidents on third-party systems they
use, nor are we providing a safe harbor
for information disclosed about thirdparty systems. While we appreciate the
commenters’ concerns about a
registrant’s reduced control over such
systems, we note the centrality of the
materiality determination: whether an
incident is material is not contingent on
where the relevant electronic systems
reside or who owns them. In other
words, we do not believe a reasonable
investor would view a significant breach
of a registrant’s data as immaterial
merely because the data were housed on
a third-party system, especially as
companies increasingly rely on thirdparty cloud services that may place their
data out of their immediate control.123
Instead, as discussed above, materiality
turns on how a reasonable investor
would consider the incident’s impact on
the registrant.
Depending on the circumstances of an
incident that occurs on a third-party
system, disclosure may be required by
both the service provider and the
customer, or by one but not the other,
or by neither. We appreciate that
companies may have reduced visibility
into third-party systems; registrants
should disclose based on the
information available to them. The final
rules generally do not require that
registrants conduct additional inquiries
outside of their regular channels of
communication with third-party service
providers pursuant to those contracts
and in accordance with registrants’
disclosure controls and procedures.
This is consistent with the
Commission’s general rules regarding
the disclosure of information that is
difficult to obtain.124
Turning to disclosure timing, we
believe that the modifications from the
proposed rules regarding the disclosures
called for by Item 1.05 alleviate many of
the concerns some commenters had
regarding the proposed disclosure
deadline of four business days from the
materiality determination. Because the
streamlined disclosure requirements we
123 See Deloitte, Global Third-Party Risk
Management Survey 2022, at 15, available at
https://www2.deloitte.com/content/dam/Deloitte/
uk/Documents/risk/deloitte-uk-global-tprm-surveyreport-2022.pdf (discussing results of a global
survey of 1,309 ‘‘senior leaders from a variety of
organizations’’ indicating that ‘‘73% of respondents
currently have a moderate to high level of
dependence on [cloud-service providers]’’ and
‘‘[t]hat is expected to increase to 88% in the years
ahead’’).
124 See 17 CFR 230.409 and 17 CFR 240.12b–21,
which provide that information need only be
disclosed insofar as it is known or reasonably
available to the registrant. Accordingly, we are not
providing additional time to comply with Item 1.05
as it relates to third-party incidents, as requested by
some commenters.
PO 00000
Frm 00010
Fmt 4701
Sfmt 4700
are adopting are focused on an
incident’s basic identifying details and
its material impact or reasonably likely
material impact, the registrant should
have the information required to be
disclosed under this rule as part of
conducting the materiality
determination. For example, most
organizations’ materiality analyses will
include consideration of the financial
impact of a cybersecurity incident, so
information regarding the incident’s
impact on the registrant’s financial
condition and results of operations will
likely have already been developed
when Item 1.05 is triggered.125 Thus, we
believe that the four business day
timeframe from the date of a materiality
determination will be workable.
The reformulation of Item 1.05 also
addresses the concern among
commenters that the disclosure may be
tentative and unclear, resulting in false
positives and mispricing in the market.
In the majority of cases, the registrant
will likely be unable to determine
materiality the same day the incident is
discovered. The registrant will develop
information after discovery until it is
sufficient to facilitate a materiality
analysis.126 At that point, we believe
investors are best served knowing,
within four business days after the
materiality determination, that the
incident occurred and what led
management to conclude the incident is
material. While it is possible that
occasionally there may be incidents that
initially appear material but
developments after the filing of the Item
1.05 Form 8–K reveal to be not material,
the alternative of delaying disclosure
beyond the four business day period
after a materiality determination has the
potential to lead to far more mispricing
and will negatively impact investors
making investment and voting decisions
without the benefit of knowing that
there is a material cybersecurity
incident.
Commenters posited an array of
alternative deadlines for the Item 1.05
Form 8–K, as recounted above. We are
not persuaded by commenters’
arguments that disclosure should be
delayed until companies mitigate,
125 To the extent any required information is not
determined or is unavailable at the time of the
required filing, Instruction 2 to Item 1.05, as
adopted, directs the registrant to include a
statement to this effect in the Form 8–K and then
file a Form 8–K amendment containing such
information within four business days after the
registrant, without unreasonable delay, determines
such information or within four business days after
such information becomes available. See infra
Section II.B.3.
126 As discussed below, registrants should
develop such information without unreasonable
delay.
E:\FR\FM\04AUR2.SGM
04AUR2
ddrumheller on DSK120RN23PROD with RULES2
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
contain, remediate, or otherwise
diminish the harm of the incident,
because, as discussed above, Item 1.05
does not require disclosure of the types
of details that have the potential to be
exploited by threat actors, but rather
focuses on the incident’s material
impact or reasonably likely material
impact on the registrant. While there
may be, as commenters noted, some
residual risk of the disclosure of an
incident’s existence tipping off threat
actors, such risk is justified, in our view,
by investors’ need for timely
information, and similar risk already
exists today with some companies’
current cybersecurity incident
disclosure practices. We are also not
persuaded that Item 1.05 is sufficiently
different from other Form 8–K items
such that deviating from the form’s four
business day deadline following the
relevant trigger would be indicated.
While some commenters argued that
Item 1.05 is qualitatively different from
all other Form 8–K filings in that its
trigger is largely outside the company’s
control, we disagree because other Form
8–K items may also be triggered
unexpectedly, such as Item 4.01
(Changes in Registrant’s Certifying
Accountants) and Item 5.02 (Departure
of Directors or Principal Officers). And
as compared to those items, the
information needed for Item 1.05 may
be further along in development when
the filing is triggered, whereas, for
example, a company may have no
advance warning that a principal officer
is departing.
With respect to the five business day
deadline suggested by a few
commenters to allow registrants a full
calendar week from the materiality
determination to the disclosure, we note
that in the majority of cases registrants
will have had additional time leading
up to the materiality determination,
such that disclosure becoming due less
than a week after discovery should be
uncommon. More generally with respect
to the various alternative timing
suggestions, we observe that the
Commission adopted the uniform four
business day deadline in 2004 to
simplify the previous bifurcated
deadlines, and we find commenters
have not offered any compelling
rationale to return to bifurcated
deadlines.127 Form 8–K provides for
current reporting of events that tend to
be material to investor decision-making,
and we see no reason to render the
127 See Additional Form 8–K Disclosure Release.
See also Proposed Rule: Additional Form 8–K
Disclosure Requirements and Acceleration of Filing
Date, Release No. 33–8106 (June 17, 2002) [67 FR
42914 (June 25, 2002)].
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
reporting of Item 1.05 less current than
other Form 8–K items.
In the Proposing Release, the
Commission requested comment on
whether to allow registrants to delay
filing an Item 1.05 Form 8–K where the
Attorney General determines that a
delay is in the interest of national
security.128 In response to comments,
we are adopting a delay provision in
cases where disclosure poses a
substantial risk to national security or
public safety. Pursuant to Item 1.05(c),
a registrant may delay making an Item
1.05 Form 8–K filing if the Attorney
General determines that the disclosure
poses a substantial risk to national
security or public safety and notifies the
Commission of such determination in
writing.129 Initially, disclosure may be
delayed for a time period specified by
the Attorney General, up to 30 days
following the date when the disclosure
was otherwise required to be provided.
The delay may be extended for an
additional period of up to 30 days if the
Attorney General determines that
disclosure continues to pose a
substantial risk to national security or
public safety and notifies the
Commission of such determination in
writing.
In extraordinary circumstances,
disclosure may be delayed for a final
additional period of up to 60 days if the
Attorney General determines that
disclosure continues to pose a
substantial risk to national security and
notifies the Commission of such
determination in writing. We are
providing for the final additional delay
period in recognition that, in
extraordinary circumstances, national
security concerns may justify additional
delay beyond that warranted by public
safety concerns, due to the relatively
more critical nature of national security
concerns. Beyond the final 60-day
delay, if the Attorney General indicates
that further delay is necessary, the
Commission will consider additional
requests for delay and may grant such
relief through Commission exemptive
order.130
128 Proposing
Release at 16598.
note that the delay provision we are
adopting does not relieve a company’s obligations
under Regulation FD or with respect to the
securities laws’ antifraud prohibitions that
proscribe certain insider trading, including
Exchange Act Section 10(b). Under Regulation FD,
material nonpublic information disclosed to any
investor, for example, through investor outreach
activities, would be required to be disclosed
publicly, subject to limited exceptions. See 17 CFR
243.100 et seq.
130 Any exercise of exemptive authority in these
circumstances would need to meet all of the
standards of Section 36 of the Exchange Act.
Furthermore, Item 1.05 of Form 8–K in no way
51905
We have consulted with the
Department of Justice to establish an
interagency communication process to
allow for the Attorney General’s
determination to be communicated to
the Commission in a timely manner.
The Department of Justice will notify
the affected registrant that
communication to the Commission has
been made, so that the registrant may
delay filing its Form 8–K.
We agree with commenters that a
delay is appropriate for the limited
instances in which public disclosure of
a cybersecurity incident may cause
harm to national security or public
safety. The final rules appropriately
balance such security concerns against
investors’ informational needs. In
particular, the provision’s ‘‘substantial
risk to national security or public
safety’’ bases are sufficiently expansive
to ensure that significant risks of harm
from disclosure may be protected
against, while also ensuring that
investors are not denied timely access to
material information.131 With respect to
commenters who recommended that
other Federal agencies and non-Federal
law enforcement agencies also be
permitted to trigger a delay or who
argued that other agencies may be the
primary organization in the Federal
Government for the response, we note
that the rule does not preclude any such
agency from requesting that the
Attorney General determine that the
disclosure poses a substantial risk to
national security or public safety and
communicate that determination to the
Commission. However, we believe that
designating a single law enforcement
agency as the Commission’s point of
contact on such delays is critical to
ensuring that the rule is administrable.
Turning to other timing-related issues
raised by commenters, we are not
adopting commenters’ suggestion to
replace Item 1.05 with periodic
reporting of material cybersecurity
incidents on Forms 10–Q and 10–K
because such an approach may result in
significant variance as to when investors
learn of material cybersecurity
incidents. Based on when an incident
occurs during a company’s reporting
129 We
PO 00000
Frm 00011
Fmt 4701
Sfmt 4700
limits the Commission’s general exemptive
authority under Section 36.
131 The delay provision for substantial risk to
national security or public safety is separate from
Exchange Act Rule 0–6, which provides for the
omission of information that has been classified by
an appropriate department or agency of the Federal
Government for the protection of the interest of
national defense or foreign policy. If the
information a registrant would otherwise disclose
on an Item 1.05 Form 8–K or pursuant to Item 106
of Regulation S–K or Item 16K of Form 20–F is
classified, the registrant should comply with
Exchange Act Rule 0–6.
E:\FR\FM\04AUR2.SGM
04AUR2
ddrumheller on DSK120RN23PROD with RULES2
51906
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
cycle, the timing between the
materiality determination and reporting
on the next Form 10–Q or Form 10–K
could vary from a matter of months to
a matter of weeks or less. For example,
if two companies experience a similar
cybersecurity incident, but one
determines the incident is material early
during a quarterly period and the other
makes such determination at the end of
the quarterly period, commenters’
suggested approach would have both
companies report the incident around
the same time despite the first company
having determined the incident was
material weeks or months sooner, which
would result in a significant delay in
this information being provided to
investors. Such variance would
therefore reduce comparability across
registrants and may put certain
registrants at a competitive
disadvantage.
We also decline to use a quantifiable
trigger for Item 1.05 because some
cybersecurity incidents may be material
yet not cross a particular financial
threshold. We note above that the
material impact of an incident may
encompass a range of harms, some
quantitative and others qualitative. A
lack of quantifiable harm does not
necessarily mean an incident is not
material. For example, an incident that
results in significant reputational harm
to a registrant may not be readily
quantifiable and therefore may not cross
a particular quantitative threshold, but
it should nonetheless be reported if the
reputational harm is material. Similarly,
whereas a cybersecurity incident that
results in the theft of information may
not be deemed material based on
quantitative financial measures alone, it
may in fact be material given the impact
to the registrant that results from the
scope or nature of harm to individuals,
customers, or others, and therefore may
need to be disclosed.
In another change from the proposal,
and to respond to commenters’ concerns
that the proposed ‘‘as soon as
reasonably practicable’’ language in
Instruction 1 could pressure companies
to draw conclusions about incidents
with insufficient information, we are
revising the instruction to state that
companies must make their materiality
determinations ‘‘without unreasonable
delay.’’ As explained in the Proposing
Release, the instruction was intended to
address any concern that some
registrants may delay making such a
determination to avoid a disclosure
obligation.132 We understand
commenter concerns that the proposed
instruction could result in undue
132 Proposing
VerDate Sep<11>2014
Release at 16596.
19:26 Aug 03, 2023
Jkt 259001
pressure to make a materiality
determination before a registrant has
sufficient information to do so, and we
recognize that a materiality
determination necessitates an informed
and deliberative process. We believe the
revised language should alleviate this
unintended consequence, while
providing registrants notice that, though
the determination need not be rushed
prematurely, it also cannot be
unreasonably delayed in an effort to
avoid timely disclosure. For example,
for incidents that impact key systems
and information, such as those the
company considers its ‘‘crown
jewels,’’ 133 as well as incidents
involving unauthorized access to or
exfiltration of large quantities of
particularly important data, a company
may not have complete information
about the incident but may know
enough about the incident to determine
whether the incident was material. In
other words, a company being unable to
determine the full extent of an incident
because of the nature of the incident or
the company’s systems, or otherwise the
need for continued investigation
regarding the incident, should not delay
the company from determining
materiality. Similarly, if the materiality
determination is to be made by a board
committee, intentionally deferring the
committee’s meeting on the materiality
determination past the normal time it
takes to convene its members would
constitute unreasonable delay.134 As
another example, if a company were to
revise existing incident response
policies and procedures in order to
support a delayed materiality
determination for or delayed disclosure
of an ongoing cybersecurity event, such
as by extending the incident severity
assessment deadlines, changing the
criteria that would require reporting an
incident to management or committees
with responsibility for public
disclosures, or introducing other steps
to delay the determination or disclosure,
that would constitute unreasonable
delay. In light of the revision to
Instruction 1, we find that a safe harbor,
133 See National Cybersecurity Alliance, Identify
Your ‘‘Crown Jewels’’ (July 1, 2022), available at
https://staysafeonline.org/cybersecurity-forbusiness/identify-your-crown-jewels/ (explaining
that ‘‘[c]rown jewels are the data without which
your business would have difficulty operating and/
or the information that could be a high-value target
for cybercriminals’’).
134 We note that Form 8–K Item 1.05 does not
specify whether the materiality determination
should be performed by the board, a board
committee, or one or more officers. The company
may establish a policy tasking one or more persons
to make the materiality determination. Companies
should seek to provide those tasked with the
materiality determination information sufficient to
make disclosure decisions.
PO 00000
Frm 00012
Fmt 4701
Sfmt 4700
as suggested by some commenters, is
unnecessary; adhering to normal
internal practices and disclosure
controls and procedures will suffice to
demonstrate good faith compliance.
Importantly, we remind registrants, as
the Commission did in the Proposing
Release, that ‘‘[d]oubts as to the critical
nature’’ of the relevant information
‘‘will be commonplace’’ and should ‘‘be
resolved in favor of those the statute is
designed to protect,’’ namely
investors.135
Revised Instruction 1 should also
reassure registrants that they should
continue sharing information with other
companies or government actors about
emerging threats. Such information
sharing may not necessarily result in an
Item 1.05 disclosure obligation. The
obligation to file the Item 1.05
disclosure is triggered once a company
has developed information regarding an
incident sufficient to make a materiality
determination, and a decision to share
information with other companies or
government actors does not in itself
necessarily constitute a determination of
materiality. A registrant may alert
similarly situated companies as well as
government actors immediately after
discovering an incident and before
determining materiality, so long as it
does not unreasonably delay its internal
processes for determining materiality.
As proposed, we are adding Item 1.05
to the list of Form 8–K items in General
Instruction I.A.3.(b) of Form S–3, so that
the untimely filing of an Item 1.05 Form
8–K will not result in the loss of Form
S–3 eligibility.136 We note the
significant support from commenters
regarding this proposal, and as noted in
the Proposing Release, continue to
believe that the consequences of the loss
of Form S–3 eligibility would be unduly
severe given the circumstances that will
surround Item 1.05 disclosures.
Likewise, as supported by many
commenters, we are adopting as
proposed amendments to Rules 13a–
11(c) and 15d–11(c) under the Exchange
Act to include new Item 1.05 in the list
of Form 8–K items eligible for a limited
safe harbor from liability under Section
10(b) or Rule 10b–5 under the Exchange
Act. This accords with the view the
Commission articulated in 2004 that the
safe harbor is appropriate if the
triggering event for the Form 8–K
135 Proposing Release at 16596 (quoting TSC
Indus. v. Northway, 426 U.S. at 448). The Court’s
opinion in TSC Indus. has a nuanced discussion of
the balance of considerations in setting a materiality
standard. 426 U.S. at 448–450.
136 Because of our decision to exempt assetbacked issuers from the new rules (see infra Section
II.G.1), we are not amending Form SF–3.
E:\FR\FM\04AUR2.SGM
04AUR2
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
ddrumheller on DSK120RN23PROD with RULES2
requires management to make a rapid
materiality determination.137
We decline to permit registrants to
furnish rather than file the Item 1.05
Form 8–K, as suggested by some
commenters. While we understand
commenters’ points that reducing
liability may ease the burden on
registrants, we believe that treating Item
1.05 disclosures as filed will help
promote the accuracy and reliability of
such disclosures for the benefit of
investors. Of the existing Form 8–K
items, only Items 2.02 (Results of
Operations and Financial Condition)
and 7.01 (Regulation FD Disclosure) are
permitted to be furnished rather than
filed. The Commission created
exceptions for those two items to allay
concerns that do not pertain here.
Specifically, with respect to Item 2.02,
the Commission was motivated by
concerns that requiring the information
to be filed would discourage registrants
from proactively issuing earnings
releases and similar disclosures.138
Similarly, with respect to Item 7.01, the
Commission decided to allow the
disclosure to be furnished to address
concerns that, if required to be filed, the
disclosure could be construed as an
admission of materiality, which might
lead some registrants to avoid making
proactive disclosure.139 By contrast,
Item 1.05 is not a voluntary disclosure,
and it is by definition material because
it is not triggered until the registrant
determines the materiality of an
incident. It is thus more akin to the
Form 8–K items other than Items 2.02
and 7.01, in that it is a description of a
material event that has occurred about
which investors need adequate
information. Therefore, the final rules
require an Item 1.05 Form 8–K to be
filed.
We are not including a new rule to
ban trading by insiders during the
materiality determination time period,
as suggested by some commenters.
Those with a fiduciary duty or other
relationship of trust and confidence are
already prohibited from trading while in
possession of material, nonpublic
information.140 And because we are
adopting the four business days from
materiality determination deadline, we
agree with the point raised by some
commenters that the risk of insider
trading is low given the limited time
137 Additional Form 8–K Disclosure Release at
15607.
138 See Conditions for Use of Non-GAAP
Financial Measures, Release No. 33–8176 (Jan. 22,
2003) [68 FR 4819 (Jan. 30, 2003)].
139 See Selective Disclosure and Insider Trading,
Release No. 33–7881 (Aug. 15, 2000) [65 FR 51715
(Aug. 24, 2000)].
140 United States v. O’Hagan, 521 U.S. 642 (1997).
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
period between experiencing a material
incident and public disclosure. We also
note that we recently adopted
amendments to 17 CFR 240.10b5–1
(‘‘Rule 10b5–1’’) that added a
certification condition for directors and
officers wishing to avail themselves of
the rule’s affirmative defense;
specifically, if relying on the amended
affirmative defense, directors and
officers need to certify in writing, at the
time they adopt the trading plan, that
they are unaware of material nonpublic
information about the issuer or its
securities, and are adopting the plan in
good faith and not as part of a plan or
scheme to evade the insider trading
prohibitions.141 Therefore, given the
timing of the incident disclosure
requirement as well as the recently
adopted amendments to Rule 10b5–1,
we do not find need for a new rule
banning trading by insiders during the
time period between the materiality
determination and disclosure.
A number of commenters raised
concerns about conflicts with other
Federal laws and regulations. Of the
Federal laws and regulations that we
reviewed and commenters raised
concerns with, we have identified one
conflict, with the FCC’s notification rule
for breaches of customer proprietary
network information (‘‘CPNI’’).142 Of the
remaining Federal laws and regulations
noted by commenters as presenting
conflicts, our view is that Item 1.05
neither directly conflicts with nor
impedes the purposes of other such
laws and regulations.
The FCC’s rule for notification in the
event of breaches of CPNI requires
covered entities to notify the United
States Secret Service (‘‘USSS’’) and the
Federal Bureau of Investigation (‘‘FBI’’)
no later than seven business days after
reasonable determination of a CPNI
breach, and further directs the entities
to refrain from notifying customers or
disclosing the breach publicly until
seven business days have passed
following the notification to the USSS
and FBI.143 To accommodate registrants
141 See Insider Trading Arrangements and
Related Disclosures, Release No. 33–11138 (Dec. 14,
2022) [87 FR 80362 (Dec. 29, 2022)].
142 47 CFR 64.2011. CPNI is defined in 47 CFR
222(h)(1) as: ‘‘(A) information that relates to the
quantity, technical configuration, type, destination,
location, and amount of use of a
telecommunications service subscribed to by any
customer of a telecommunications carrier, and that
is made available to the carrier by the customer
solely by virtue of the carrier-customer relationship;
and (B) information contained in the bills
pertaining to telephone exchange service or
telephone toll service received by a customer of a
carrier; except that such term does not include
subscriber list information.’’
143 We note that the FCC recently proposed
amending its rule; among other things, the proposal
PO 00000
Frm 00013
Fmt 4701
Sfmt 4700
51907
who are subject to this rule and may as
a result face conflicting disclosure
timelines,144 we are adding paragraph
(d) to Item 1.05 providing that such
registrants may delay making a Form 8–
K disclosure up to the seven business
day period following notification to the
USSS and FBI specified in the FCC
rule,145 with written notification to the
Commission.146
We also considered the conflicts
commenters alleged with CIRCIA.
Specifically, they stated that Item 1.05
is at odds with the goals of CIRCIA, and
that it may conflict with forthcoming
regulations from CISA. The confidential
reporting system established by CIRCIA
serves a different purpose from Item
1.05 and through different means; the
former focuses on facilitating the
Federal Government’s preparation for
and rapid response to cybersecurity
threats, while the latter focuses on
providing material information about
public companies to investors in a
timely manner. While CISA has yet to
propose regulations to implement
CIRCIA, given the statutory authority,
text, and legislative history of CIRCIA,
it appears unlikely the regulations
would affect the balance of material
information available to investors about
public companies, because the reporting
regime CIRCIA establishes is
confidential.147 Nonetheless, the
Commission participates in interagency
working groups on cybersecurity
regulatory implementation, and will
continue to monitor developments in
this area to determine if modification to
Item 1.05 becomes appropriate in light
of future developments.148
We also considered the HIPAArelated conflict alleged by commenters,
would eliminate the seven-business day waiting
period, potentially eliminating the conflict. Federal
Communications Commission, Data Breach
Reporting Requirements, 88 FR 3953 (Jan. 23, 2023).
144 Commission staff consulted with FCC staff
about a potential delay provision to address any
conflict between the FCC rule and the Form 8–K
reporting requirements.
145 The exception we are creating does not apply
to 47 CFR 64.2011(b)(3), which provides that the
USSS or FBI may direct the entity to further delay
notification to customers or public disclosure
beyond seven business days if such disclosure
‘‘would impede or compromise an ongoing or
potential criminal investigation or national
security.’’ If the USSS or FBI believes that
disclosure would result in a substantial risk to
national security or public safety, it may, as
explained above, work with the Department of
Justice to seek a delay of disclosure.
146 Such notice should be provided through
correspondence on EDGAR no later than the date
when the disclosure required by Item 1.05 was
otherwise required to be provided.
147 6 U.S.C. 681e.
148 Should a conflict arise in the future with CISA
regulations or regulations of another Federal
agency, the Commission can address such conflict
via rulemaking or other action at that time.
E:\FR\FM\04AUR2.SGM
04AUR2
51908
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
ddrumheller on DSK120RN23PROD with RULES2
specifically with respect to HHS’s rule
on Notification in the Case of Breach of
Unsecured Protected Health
Information. That rule provides, in the
event of a breach of unsecured protected
health information, for the covered
entity to provide notification to affected
individuals ‘‘without unreasonable
delay and in no case later than 60
calendar days after discovery of a
breach.’’ 149 If the breach involves more
than 500 residents of a state or
jurisdiction, the rule directs the covered
entity to also notify prominent media
outlets within the same timeframe.150
The rule further provides that if a
company receives written notice from
‘‘a law enforcement official’’ requesting
a delay and specifying the length of the
delay, then the company ‘‘shall . . .
delay such notification, notice, or
posting for the time period specified by
the official.’’ 151
We do not view Form 8–K Item 1.05
as implicated by the HHS rule.
Importantly, the HHS rule’s delay
provision applies specifically to any
‘‘notification, notice, or posting required
under this subpart,’’ or in other words
notice to affected individuals, media,
and the Secretary of HHS.152 Such
notification focuses on the
consequences of the breach for the
affected individuals; for example,
individuals must be told what types of
protected health information were
accessed, and what steps they should
take to protect themselves from harm.153
This is different from the disclosure
required by Item 1.05, which focuses on
the consequences for the company that
are material to investors, and whose
timing is tied not to discovery but to a
materiality determination. The HHS rule
does not expressly preclude the latter
type of public disclosure, or other
potential communications companies
experiencing a breach may make.
Therefore, we believe that a registrant
subject to the HHS rule will not face a
conflict in complying with Item 1.05.154
We also considered the conflicts
commenters alleged with regulations
and programs of DOD, DOE, DHS, the
Federal banking regulatory agencies,
149 45 CFR 164.404(b). The notification must
describe the breach, the types of unsecured
protected health information involved, steps the
individuals should take to protect themselves, what
the entity is doing to mitigate harm and remediate,
and where the individuals can seek additional
information. Id.
150 45 CFR 164.406.
151 45 CFR 164.412.
152 Id.
153 45 CFR 164.404(c).
154 For the same reason, the Federal Trade
Commission’s Health Breach Notification rule,
which is similar to HHS’s rule, does not present a
conflict either. See 16 CFR part 318.
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
state insurance laws, and miscellaneous
other Federal agencies or laws. We find
that, while there may be some overlap
of subject matter, Item 1.05 neither
conflicts with nor impedes the purpose
of those regulations and programs.155
We disagree with one commenter’s
assertion that cybersecurity incident
disclosure ‘‘falls squarely within the
jurisdiction of state insurance
commissioners’’ as state cybersecurity
incident reporting regulations would
not pertain to the ‘‘business of
insurance’’ as courts have interpreted
the McCarran-Ferguson Act, and the
commenter did not note any particular
state insurance laws that would present
a conflict.156 With respect to Federal
banking regulatory agencies specifically,
we note that, in the event they believe
that the disclosure of a material
cybersecurity incident would threaten
the health of the financial system in
such a way that results in a substantial
risk to national security or public safety,
they may, as explained above, work
with the Department of Justice to seek
to delay disclosure.
It would not be practical to further
harmonize Item 1.05 with other
agencies’ cybersecurity incident
reporting regulations, as one commenter
suggested,157 because Item 1.05 serves a
different purpose—it is focused on the
needs of investors, rather than the needs
of regulatory agencies, affected
individuals, or the like. With respect to
state insurance and privacy laws,
commenters did not provide any
evidence sufficient to alter the
Commission’s finding in the Proposing
Release that, to the extent that Item 1.05
would require disclosure in a situation
where state law would excuse or delay
notification, we consider prompt
reporting of material cybersecurity
incidents to investors critical to investor
protection and well-functioning,
orderly, and efficient markets.
B. Disclosures About Cybersecurity
Incidents in Periodic Reports
1. Proposed Amendments
The Commission proposed to add
new Item 106 to Regulation S–K to,
among other things, require updated
cybersecurity disclosure in periodic
155 For example, one commenter alleged conflicts
with DHS’s Chemical Facilities Anti-Terrorism
Standards program (‘‘CFATS’’) and with the
Maritime Transportation Security Act (‘‘MTSA’’).
See letter from American Chemistry Council. Both
CFATS and MTSA provide for the protection of
certain sensitive information, but neither is
implicated by cybersecurity incident disclosure to
the Commission.
156 See, e.g., SEC v. National Sec., Inc., 393 U.S.
453 (1969).
157 See letter from BIO.
PO 00000
Frm 00014
Fmt 4701
Sfmt 4700
reports. If a registrant previously
provided disclosure regarding one or
more cybersecurity incidents pursuant
to Item 1.05 of Form 8–K, proposed 17
CFR 229.106(d)(1) (Regulation S–K
‘‘Item 106(d)(1)’’) would require such
registrant to disclose ‘‘any material
changes, additions, or updates’’ on the
registrant’s quarterly report on Form 10–
Q or annual report on Form 10–K.158 In
addition, proposed Item 106(d)(1)
would require disclosure of the
following information:
• Any material effect of the incident
on the registrant’s operations and
financial condition;
• Any potential material future
impacts on the registrant’s operations
and financial condition;
• Whether the registrant has
remediated or is currently remediating
the incident; and
• Any changes in the registrant’s
policies and procedures as a result of
the cybersecurity incident, and how the
incident may have informed such
changes.159
The Commission explained that it
paired current reporting under Item 1.05
of Form 8–K with periodic reporting
under 17 CFR 229.106(d) (Regulation S–
K ‘‘Item 106(d)’’) to balance investors’
need for timely disclosure with their
need for complete disclosure.160 When
an Item 1.05 Form 8–K becomes due,
the Commission noted, a registrant may
not possess complete information about
the material cybersecurity incident.
Accordingly, under the proposed rules,
a registrant would provide the
information known at the time of the
Form 8–K filing and follow up in its
periodic reports with more complete
information as it becomes available,
along with any updates to previously
disclosed information.
The Commission also proposed 17
CFR 229.106(d)(2) (Regulation S–K
‘‘Item 106(d)(2)’’) to require disclosure
in a registrant’s next periodic report
when, to the extent known to
management, a series of previously
undisclosed individually immaterial
cybersecurity incidents become material
in the aggregate.161 The Proposing
Release explained that this requirement
may be triggered where, for example, a
threat actor engages in a number of
smaller but continuous related
cyberattacks against the same company
and collectively they become
material.162 Item 106(d)(2) would
require disclosure of essentially the
158 Proposing
Release at 16598.
159 Id.
160 Id.
161 Id.
at 16599.
162 Id.
E:\FR\FM\04AUR2.SGM
04AUR2
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
same information required in proposed
Item 1.05 of Form 8–K, as follows:
• A general description of when the
incidents were discovered and whether
they are ongoing;
• A brief description of the nature
and scope of the incidents;
• Whether any data were stolen or
altered in connection with the
incidents;
• The effect of the incidents on the
registrant’s operations; and
• Whether the registrant has
remediated or is currently remediating
the incidents.163
2. Comments
Reaction among commenters to
proposed Item 106(d)(1) was mixed.
Some wrote in support, noting that
updated incident disclosure is needed
to avoid previously disclosed
information becoming stale and
misleading as more information
becomes available, and saying that
updates help investors assess the
efficacy of companies’ cybersecurity
procedures.164 Others took issue with
specific aspects of the proposed rule.
For example, some commenters stated
that the proposed requirement to
disclose ‘‘any potential material future
impacts’’ is vague and difficult to apply,
and urged removing or revising it.165
Similarly, other commenters said that
registrants should not be required to
describe progress on remediation,
noting that such information could open
them up to more attacks.166 In the same
vein, one commenter suggested that no
updates be required until remediation is
sufficiently complete.167 One
commenter said the requirement to
disclose changes in policies and
procedures is unnecessary and overly
broad,168 and another commenter said
the requirement should be narrowed to
‘‘material changes.’’ 169
More generally, commenters sought
clarification on how to differentiate
instances where updates should be
included in periodic reports from
instances where updates should be filed
on Form 8–K; they found the guidance
in the Proposing Release on this point
‘‘unclear.’’ 170 And one commenter
163 Id.
at 16619–16620.
letters from AICPA; Crindata; R Street. See
also IAC Recommendation.
165 See letters from EEI; Prof. Perullo; PWC; SCG.
166 See letters from BCE; BPI et al.; Enbridge. See
also letter from EEI (suggesting narrowing the rule
to ‘‘material remediation,’’ and delaying such
disclosure until remediation is complete).
167 See letter from EEI.
168 See letter from Prof. Perullo.
169 See letter from EEI.
170 See letter from PWC; accord letter from
Deloitte. The Proposing Release stated:
‘‘Notwithstanding proposed Item 106(d)(1), there
ddrumheller on DSK120RN23PROD with RULES2
164 See
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
argued that, regardless of where the
update is filed, the incremental
availability of information would make
it difficult for companies to determine
when the update requirement is
triggered.171
With respect to proposed Item
106(d)(2), a large number of commenters
expressed concern about the aggregation
requirement, saying, for example, that
companies experience too many events
to realistically communicate internally
upward to senior management, and that
retaining and analyzing data on past
events would be too costly.172 A number
of other commenters relatedly said that,
for the aggregation requirement to be
workable, companies need more
guidance on the nature, timeframe, and
breadth of incidents that should be
collated.173 In this regard, one supporter
of the requirement explained in its
request for additional guidance that
‘‘cybersecurity incidents are so
unfortunately common that a strict
reading of this section could cause
overreporting to the point that it is
meaningless for shareholders.’’ 174
Some commenters suggested revising
the rule to cover only ‘‘related’’
incidents.175 Possible definitions offered
for ‘‘related’’ incidents included those
‘‘performed by the same malicious actor
or that exploited the same
vulnerability,’’ 176 and those resulting
from ‘‘attacks on the same systems,
processes or controls of a registrant over
a specified period of time.’’ 177
Suggestions for limiting the time period
over which aggregation should occur
included the preceding one year,178 and
the preceding two years.179 One
commenter requested the Commission
clarify that a company’s Item 106(d)(2)
may be situations where a registrant would need to
file an amended Form 8–K to correct disclosure
from the initial Item 1.05 Form 8–K, such as where
that disclosure becomes inaccurate or materially
misleading as a result of subsequent developments
regarding the incident. For example, if the impact
of the incident is determined after the initial Item
1.05 Form 8–K filing to be significantly more severe
than previously disclosed, an amended Form 8–K
may be required.’’ Proposing Release at 16598.
171 See letter from Quest.
172 See letters from ABA; ACLI; AIA; Business
Roundtable; EEI; Enbridge; Ernst & Young LLP
(‘‘E&Y’’); FAH; FedEx; Center on Cyber and
Technology Innovation at the Foundation for
Defense of Democracies (‘‘FDD’’); GPA; Hunton; ITI;
ISA; LTSE; Microsoft; Nareit; NAM; NDIA; NRA;
Prof. Perullo; SCG; SIFMA.
173 See letters from ACC; APCIA; BDO USA, LLP
(‘‘BDO’’); BPI et al.; CAQ; Chamber; Chevron;
Deloitte; EIC; FEI; M. Barragan; PWC; R Street.;
TransUnion.
174 See letter from R Street.
175 See letters from ABA; APCIA; EEI; E&Y; PWC.
176 See letter from ABA.
177 See letter from E&Y.
178 See letter from APCIA.
179 See letter from EEI.
PO 00000
Frm 00015
Fmt 4701
Sfmt 4700
51909
disclosure need describe only the
aggregate material impact of the
incidents, rather than describing each
incident individually; the commenter
was concerned with threat actors
becoming informed of a company’s
vulnerabilities through overly detailed
disclosure.180 Another commenter
suggested granting registrants additional
time to come into compliance with Item
106(d)(2) after Commission adoption, so
that they can develop system
functionality to retain details about
immaterial incidents.181
Commenters also wrote in support of
the aggregation requirement.182 One of
these commenters stated that
aggregation is needed especially where
an advanced persistent threat actor 183
seeks to exfiltrate data or intellectual
property over time.184
3. Final Amendments
In response to comments, we are not
adopting proposed Item 106(d)(1) and
instead are adopting a new instruction
to clarify that updated incident
disclosure must be provided in a Form
8–K amendment. Specifically, we are
revising proposed Instruction 2 to Item
1.05 of Form 8–K to direct the registrant
to include in its Item 1.05 Form 8–K a
statement identifying any information
called for in Item 1.05(a) that is not
determined or is unavailable at the time
of the required filing and then file an
amendment to its Form 8–K containing
such information within four business
days after the registrant, without
unreasonable delay, determines such
information or within four business
days after such information becomes
available. This change mitigates
commenters’ concerns with Item
106(d)(1). In particular, under the final
rules, companies will not have to
distinguish whether information
180 See
letter from AGA/INGAA.
letter from Deloitte.
182 See letters from CII; CSA; R Street; NASAA.
183 The National Institute of Standards and
Technology explains that an advanced persistent
threat ‘‘is an adversary or adversarial group that
possesses the expertise and resources that allow it
to create opportunities to achieve its objectives by
using multiple attack vectors, including cyber,
physical, and deception. The APT objectives
include establishing a foothold within the
infrastructure of targeted organizations for purposes
of exfiltrating information; undermining or
impeding critical aspects of a mission, function,
program, or organization; or positioning itself to
carry out these objectives in the future. The APT
pursues its objectives repeatedly over an extended
period, adapts to defenders’ efforts to resist it, and
is determined to maintain the level of interaction
needed to execute its objectives.’’ National Institute
of Standards and Technology, NIST Special
Publication 800–172, Enhanced Security
Requirements for Protecting Controlled Unclassified
Information (Feb. 2021), at 2.
184 See letter from CSA.
181 See
E:\FR\FM\04AUR2.SGM
04AUR2
51910
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
ddrumheller on DSK120RN23PROD with RULES2
regarding a material cybersecurity
incident that was not determined or was
unavailable at the time of the initial
Form 8–K filing should be included on
current reports or periodic reports, as
the reporting would be in an amended
Form 8–K; details that commenters
suggested raised security concerns, such
as remediation status, are not required;
and concerns that the proposed rule was
vague or overbroad have been addressed
by narrowing the required disclosure to
the information required by Item
1.05(a). We also believe that use of a
Form 8–K amendment rather than a
periodic report will allow investors to
more quickly identify updates regarding
incidents that previously were
disclosed.
We appreciate that new information
on a reported cybersecurity incident
may surface only in pieces; the final
rules, however, do not require updated
reporting for all new information.
Rather, Instruction 2 to Item 1.05 directs
companies to file an amended Form 8–
K with respect to any information called
for in Item 1.05(a) that was not
determined or was unavailable at the
time of the initial Form 8–K filing.
Other than with respect to such
previously undetermined or unavailable
information, the final rules do not
separately create or otherwise affect a
registrant’s duty to update its prior
statements. We remind registrants,
however, that they may have a duty to
correct prior disclosure that the
registrant determines was untrue (or
omitted a material fact necessary to
make the disclosure not misleading) at
the time it was made 185 (for example, if
the registrant subsequently discovers
contradictory information that existed at
the time of the initial disclosure), or a
duty to update disclosure that becomes
materially inaccurate after it is made 186
(for example, when the original
statement is still being relied on by
reasonable investors). Registrants
should consider whether they need to
revisit or refresh previous disclosure,
including during the process of
185 See Backman v. Polaroid Corp., 910 F.2d 10,
16–17 (1st Cir. 1990) (en banc) (finding that the
duty to correct applies ‘‘if a disclosure is in fact
misleading when made, and the speaker thereafter
learns of this’’).
186 See id. at 17 (describing the duty to update as
potentially applying ‘‘if a prior disclosure ‘becomes
materially misleading in light of subsequent
events’’’ (quoting Greenfield v. Heublein, Inc., 742
F.2d 751, 758 (3d Cir. 1984))). But see
Higginbotham v. Baxter Intern., Inc., 495 F.3d 753,
760 (7th Cir. 2007) (rejecting duty to update before
next quarterly report); Gallagher v. Abbott
Laboratories, 269 F.3d 806, 808–11 (7th Cir. 2001)
(explaining that securities laws do not require
continuous disclosure).
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
investigating a cybersecurity
incident.187
We are not adopting proposed Item
106(d)(2), in response to concerns that
the proposed aggregation requirement
was vague or difficult to apply. We are
persuaded by commenters that the
proposed requirement might be difficult
to differentiate from Item 1.05
disclosure, or by contrast, could result
in the need for extensive internal
controls and procedures to monitor all
immaterial events to determine whether
they have become collectively material.
The intent of the proposed requirement
was to capture the material impacts of
related incidents, and prevent the
avoidance of incident disclosure
through disaggregation of such related
events. However, upon further
reflection, and after review of
comments, we believe that the proposed
requirement is not necessary based on
the scope of Item 1.05.
To that end, we emphasize that the
term ‘‘cybersecurity incident’’ as used in
the final rules is to be construed
broadly, as the Commission stated in the
Proposing Release.188 The definition of
‘‘cybersecurity incident’’ we are
adopting extends to ‘‘a series of related
unauthorized occurrences.’’ 189 This
reflects that cyberattacks sometimes
compound over time, rather than
present as a discrete event. Accordingly,
when a company finds that it has been
materially affected by what may appear
as a series of related cyber intrusions,
Item 1.05 may be triggered even if the
material impact or reasonably likely
material impact could be parceled
among the multiple intrusions to render
each by itself immaterial. One example
was provided in the Proposing Release:
the same malicious actor engages in a
number of smaller but continuous
cyberattacks related in time and form
against the same company and
collectively, they are either
quantitatively or qualitatively
material.190 Another example is a series
of related attacks from multiple actors
exploiting the same vulnerability and
collectively impeding the company’s
business materially.
187 Relatedly, registrants should be aware of the
requirement under Item 106(b)(2) of Regulation S–
K to describe ‘‘[w]hether any risks from
cybersecurity threats, including as a result of any
previous cybersecurity incidents, have materially
affected or are reasonably likely to materially affect
the registrant’’ (emphasis added). See infra Section
II.C.1.c.
188 Proposing Release at 16601.
189 See infra Section II.C.3.
190 Proposing Release at 16599.
PO 00000
Frm 00016
Fmt 4701
Sfmt 4700
C. Disclosure of a Registrant’s Risk
Management, Strategy and Governance
Regarding Cybersecurity Risks
1. Risk Management and Strategy
a. Proposed Amendments
The Commission proposed to add 17
CFR 229.106(b) (Regulation S–K ‘‘Item
106(b)’’) to require registrants to provide
more consistent and informative
disclosure regarding their cybersecurity
risk management and strategy in their
annual reports. The Commission noted
the Division of Corporation Finance
staff’s experience that most registrants
disclosing a cybersecurity incident do
not describe their cybersecurity risk
oversight or any related policies and
procedures, even though companies
typically address significant risks by
developing risk management systems
that often include written policies and
procedures.191
Proposed Item 106(b) would require a
description of the registrant’s policies
and procedures, if any, for the
identification and management of
cybersecurity threats, including, but not
limited to: operational risk (i.e.,
disruption of business operations);
intellectual property theft; fraud;
extortion; harm to employees or
customers; violation of privacy laws and
other litigation and legal risk; and
reputational risk. As proposed,
registrants would be required to include
a discussion, as applicable, of:
• Whether the registrant has a
cybersecurity risk assessment program
and if so, a description of the program
((b)(1));
• Whether the registrant engages
assessors, consultants, auditors, or other
third parties in connection with any
cybersecurity risk assessment program
((b)(2));
• Whether the registrant has policies
and procedures to oversee, identify, and
mitigate the cybersecurity risks
associated with its use of any thirdparty service provider (including, but
not limited to, those providers that have
access to the registrant’s customer and
employee data), including whether and
how cybersecurity considerations affect
the selection and oversight of these
providers and contractual and other
mechanisms the company uses to
mitigate cybersecurity risks related to
these providers ((b)(3));
• Whether the registrant undertakes
activities to prevent, detect, and
minimize effects of cybersecurity
incidents ((b)(4));
• Whether the registrant has business
continuity, contingency, and recovery
191 Id.
E:\FR\FM\04AUR2.SGM
04AUR2
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
plans in the event of a cybersecurity
incident ((b)(5));
• Whether previous cybersecurity
incidents have informed changes in the
registrant’s governance, policies and
procedures, or technologies ((b)(6));
• Whether cybersecurity related risk
and incidents have affected or are
reasonably likely to affect the
registrant’s results of operations or
financial condition and if so, how
((b)(7)); and
• Whether cybersecurity risks are
considered as part of the registrant’s
business strategy, financial planning,
and capital allocation and if so, how
((b)(8)).192
The Commission anticipated that
proposed Item 106(b) would benefit
investors by requiring more consistent
disclosure of registrants’ strategies and
actions to manage cybersecurity risks.193
Such risks, the Commission observed,
can affect registrants’ business strategy,
financial outlook, and financial
planning, as companies increasingly
rely on information technology,
collection of data, and use of digital
payments as critical components of their
businesses.194
The Commission noted that the
significant number of cybersecurity
incidents pertaining to third-party
service providers prompted the proposal
to require disclosure of registrants’
selection and oversight of third-party
entities.195 The Commission also
proposed requiring discussion of how
prior cybersecurity incidents have
affected or are reasonably likely to affect
the registrant, because such disclosure
would equip investors to better
comprehend the level of cybersecurity
risk the company faces and assess the
company’s preparedness regarding such
risk.196
b. Comments
Many commenters supported
proposed Item 106(b) for requiring
information that is vital to investors as
they assess companies’ risk profiles and
make investment decisions.197 One said
cybersecurity disclosures now are
‘‘scattered and unpredictable’’ rather
than ‘‘uniform,’’ which ‘‘diminishes
their effectiveness.’’ 198 Similarly,
192 Id.
193 Id.
ddrumheller on DSK120RN23PROD with RULES2
194 Id.
195 Id.
196 Id.
197 See letters of AICPA;
BuildingCyberSecurity.org (‘‘BCS’’); Better Markets;
Bitsight; Blue Lava, Inc. (‘‘Blue Lava’’); CalPERS;
ITIF; National Association of Corporate Directors
(‘‘NACD’’); NASAA; PWC; PRI; R Street;
SecurityScorecard; Tenable Holdings Inc.
(‘‘Tenable’’). See also IAC Recommendation.
198 See letter from Better Markets.
19:26 Aug 03, 2023
199 See
letter from PRI.
IAC Recommendation.
201 See letters from ABA; ACLI; APCIA; BIO; BPI
et al.; Business Roundtable; Chamber; CSA; CTIA;
EIC; Enbridge; FAH; Federated Hermes; GPA; ITI;
ISA; Nareit; NAM; NMHC; NRA; National Retail
Federation (‘‘NRF’’); SIFMA; Sen. Portman;
TechNet; TransUnion; USTelecom; Virtu.
202 See letters from BPI et al.; Chamber; EIC;
Nareit; NRF; NYSE; SCG; SIFMA; Virtu.
203 See letter from Nasdaq (citing Modernization
of Regulation S–K Items 101, 103, and 105, Release
No. 33–10825 (Aug. 26, 2020) [85 FR 63726 (Oct.
8, 2020)]).
204 See letter from Cybersecurity Coalition.
200 See
at 16599–16600.
at 16599.
VerDate Sep<11>2014
another found that current disclosures
‘‘do not provide investors with the
information necessary to evaluate
whether companies have adequate
governance structures and measures in
place to deal with cybersecurity
challenges.’’ 199 The IAC recommended
extending the proposed Item 106(b)
disclosure requirements (as well as the
proposed Item 106(c) disclosure
requirements) to registration statements,
stating that ‘‘pre-IPO companies may
face heightened [cybersecurity]
risks.’’ 200
By contrast, a number of commenters
opposed proposed Item 106(b). In
particular, they commented that much
of the proposed Item 106(b) disclosure
could increase a company’s
vulnerability to cyberattacks; they
expressed particular concern regarding
the potential harms from disclosures
about whether cybersecurity policies are
in place, incident response processes
and techniques, previous incidents and
what changes they spurred, and thirdparty service providers.201 Another
criticism was that proposed Item 106(b)
would effectively force companies to
model their cybersecurity policies on
the rule’s disclosure elements, rather
than the practices best suited to each
company’s context.202 One commenter
saw proposed Item 106(b) as
counteracting the streamlining
accomplished in the Commission’s 2020
release modernizing Regulation S–K.203
Some commenters offered suggestions
to narrow proposed Item 106(b) to
address their concerns. On proposed
paragraph (b)(1), one commenter
recommended allowing a registrant to
forgo describing its risk assessment
program if it confirms that it ‘‘uses best
practices and standards’’ to identify and
protect against cybersecurity risks and
detect and respond to such events.204
On proposed paragraph (b)(3), a few
commenters said that registrants should
be required to disclose only high-level
information relating to third parties,
such as confirmation that policies and
procedures are appropriately applied to
third-party selection and oversight, and
should not have to identify the third
Jkt 259001
PO 00000
Frm 00017
Fmt 4701
Sfmt 4700
51911
parties or discuss the underlying
mechanisms, controls, and contractual
requirements.205
Some commenters opposed proposed
paragraph (b)(6)’s requirement to
discuss whether ‘‘previous
cybersecurity incidents informed
changes in the registrant’s governance,
policies and procedures, or
technologies’’ entirely, stating it would
undermine a registrant’s
cybersecurity.206 One commenter
recommended the proposed (b)(6)
disclosure be required only at a high
level, without specific details,207 while
two commenters appeared to propose
only requiring disclosure as it pertains
to previous material incidents.208
Commenters suggested a materiality
filter for proposed paragraph (b)(7)’s
requirement to discuss whether
‘‘cybersecurity-related risks and
previous cybersecurity-related incidents
have affected or are reasonably likely to
affect the registrant’s strategy, business
model, results of operations, or financial
condition and if so, how,’’ so that the
requirement would apply only where a
registrant has been materially affected or
is reasonably likely to be materially
affected.209
More broadly, one commenter
recommended replacing the rule’s
references to ‘‘policies and procedures’’
with ‘‘strategy and programs,’’ because
in the commenter’s experience
companies may not codify their
cybersecurity strategy in the same way
they codify other compliance policies
and procedures.210 One commenter also
suggested offering companies the choice
to place the proposed Item 106(b)
disclosures in either the Form 10–K or
the proxy statement.211
Several commenters supported
requiring registrants that lack
cybersecurity policies and procedures to
explicitly say so, commenting, for
example, that ‘‘investors should not be
left to intuit the meaning of a company’s
silence in its disclosures.’’ 212 One
205 See letters from BPI et al.; Chamber; SIFMA.
Other commenters supported the level of detail
required in (b)(3). See letters from AICPA; PRI.
206 See letters from ITI; SCG; Tenable.
207 See letter from Cybersecurity Coalition.
208 See letters from AGA/INGA; American Public
Gas Association (‘‘APGA’’).
209 See letter from PWC.
210 See letter from Prof. Perullo.
211 See letter from Nasdaq.
212 See letters from Blue Lava; CSA; Cybersecurity
Coalition; ITI; NASAA; Prof. Perullo; Tenable. The
quoted language is from NASAA’s letter. See also
IAC Recommendation (recommending ‘‘that issuers
that have not developed any cybersecurity policies
or procedures be required to make a statement to
that effect’’ because ‘‘the vast majority of investors
. . . would view the complete absence of
E:\FR\FM\04AUR2.SGM
Continued
04AUR2
51912
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
ddrumheller on DSK120RN23PROD with RULES2
commenter further stated that
registrants should be required to explain
why they have not adopted
cybersecurity policies and
procedures.213 By contrast, two
commenters opposed requiring
registrants that lack cybersecurity
policies and procedures to explicitly say
so,214 with one commenter saying that
‘‘a threat actor may target registrants
they perceive to have unsophisticated
cybersecurity programs,’’ 215 and the
other commenter saying ‘‘it is highly
unlikely that any SEC registrants would
not have ‘established any cybersecurity
policies and procedures.’’ 216
In response to the Commission’s
request for comment about whether to
require a registrant to specify whether
any cybersecurity assessor, consultant,
auditor, or other service provider that it
relies on is through an internal function
or through an external third-party
service provider, several commenters
opposed the idea as not useful, with one
saying that ‘‘a significant majority—
possibly the entirety—of SEC
registrants’’ rely on third-party service
providers for some portion of their
cybersecurity.217 Conversely, another
commenter supported the third-party
specification, and suggested requiring
registrants to name the third parties, as
over time, this would create more
transparency in whether breaches
correlate with specific third parties.218
Commenters also offered a range of
recommended additions to the rule. One
commenter recommended modifying
proposed paragraph (b)(1) to require
registrants to specify whether their
cybersecurity programs assess risks
continuously or periodically, arguing
the latter approach leaves companies
more exposed.219 The same commenter
suggested paragraph (b)(2) require ‘‘a
description of the class of services and
solutions’’ provided by third parties.220
A few commenters recommended that
we direct registrants to quantify their
cybersecurity risk exposure through
independent risk assessments.221
Similarly, one commenter urged us to
require registrants to explain how they
quantify their cybersecurity risk,222
cybersecurity risk governance as overwhelmingly
material to investment decision-making’’).
213 See letter from NASAA.
214 See letters from EIC; IIA.
215 See letter from EIC.
216 See letter from IIA.
217 See letters from BCS; Chevron; EIC; IIA; Prof.
Perullo. The quoted language is from the letter of
IIA.
218 See letter from Blue Lava.
219 See letter from Tenable.
220 Id.
221 See letters from BitSight; Kovrr Risk Modeling
Ltd.; SecurityScorecard.
222 See letter from Safe Security.
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
while another said we should set out
quantifiable metrics against which
companies measure their cybersecurity
systems, though it did not specify what
these metrics should be.223 Two
commenters suggested that we require
companies to disclose whether their
cybersecurity programs have been
audited by a third party.224 And one
commenter recommended that we
require registrants to disclose whether
they use the cybersecurity framework of
the National Institute of Standards and
Technology (‘‘NIST’’), to ease
comparison of registrant risk profiles.225
c. Final Amendments
We continue to believe that investors
need information on registrants’
cybersecurity risk management and
strategy, and that uniform, comparable,
easy to locate disclosure will not emerge
absent new rules. Commenters raised
concerns with proposed Item 106(b)’s
security implications and what they saw
as its prescriptiveness. We agree that
extensive public disclosure on how a
company plans for, defends against, and
responds to cyberattacks has the
potential to advantage threat actors.
Similarly, we acknowledge commenters’
concerns that the final rule could
unintentionally affect a registrant’s risk
management and strategy decisionmaking. In response to those comments,
we confirm that the purpose of the rules
is, and was at proposal, to inform
investors, not to influence whether and
how companies manage their
cybersecurity risk. Additionally, to
respond to commenters’ concerns about
security, the final rules eliminate or
narrow certain elements from proposed
Item 106(b). We believe the resulting
rule requires disclosure of information
material to the investment decisions of
investors, in a way that is comparable
and easy to locate, while steering clear
of security sensitive details.
As adopted, 17 CFR 229.106(b)(1)
(Regulation S–K ‘‘Item 106(b)(1)’’)
requires a description of ‘‘the
registrant’s processes, if any, for
assessing, identifying, and managing
material risks from cybersecurity threats
in sufficient detail for a reasonable
investor to understand those processes.’’
We believe this revised formulation of
the rule should help avoid levels of
detail that may go beyond information
that is material to investors and address
commenters’ concerns that those details
could increase a company’s
223 See
letter from FDD.
letters from BCS; Better Markets.
225 See letter from SandboxAQ. This commenter
also recommended registrants be required to
disclose whether they use post-quantum
cryptography as part of their risk mitigation efforts.
224 See
PO 00000
Frm 00018
Fmt 4701
Sfmt 4700
vulnerability to cyberattack. We have
also substituted the term ‘‘processes’’ for
the proposed ‘‘policies and procedures’’
to avoid requiring disclosure of the
kinds of operational details that could
be weaponized by threat actors, and
because the term ‘‘processes’’ more fully
compasses registrants’ cybersecurity
practices than ‘‘policies and
procedures,’’ which suggest formal
codification.226 We still expect the
disclosure to allow investors to
ascertain a registrant’s cybersecurity
practices, such as whether they have a
risk assessment program in place, with
sufficient detail for investors to
understand the registrant’s
cybersecurity risk profile. The shift to
‘‘processes’’ also obviates the question
of whether to require companies that do
not have written policies and
procedures to disclose that fact. We
believe that, to the extent a company
discloses that it faces a material
cybersecurity risk in connection with its
overall disclosures of material risks,227
an investor can ascertain whether such
risks have resulted in the adoption of
processes to assess, identify, and
manage material cybersecurity risks
based on whether the company also
makes such disclosures under the final
rules.
We have also added a materiality
qualifier to the proposed requirement to
disclose ‘‘risks from cybersecurity
threats,’’ and have removed the
proposed list of risk types (i.e.,
‘‘intellectual property theft; fraud;
extortion; harm to employees or
customers; violation of privacy laws and
other litigation and legal risk; and
reputational risk’’), to foreclose any
perception that the rule prescribes
cybersecurity policy. We continue to
believe these are the types of risks that
registrants may face in this context, and
enumerate them here as guidance. We
note that registrants will continue to
tailor their cybersecurity processes to
threats as they perceive them. The rule
requires registrants to describe those
processes insofar as they relate to
material cybersecurity risks.
We have also revised Item 106(b)’s
enumerated disclosure elements in
226 See letter from Prof. Perullo (distinguishing
the formality of ‘‘policies and procedures’’ from the
informality of ‘‘strategy or program’’). We have
adopted ‘‘processes’’ in place of the commenter’s
suggestion of ‘‘strategy or program’’ because
‘‘processes’’ is broader and commonly understood.
We decline the suggestion from another commenter
to allow registrants to avoid this disclosure
altogether by confirming they adhere to ‘‘best
practices and standards,’’ because there is no single
set of widely accepted best practices and standards,
and industry practices may evolve. See letter from
Cybersecurity Coalition.
227 See Item 105 of Regulation S–K.
E:\FR\FM\04AUR2.SGM
04AUR2
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
response to commenters that raised
concerns regarding the level of detail
required by some elements of the
proposal. Specifically, we are not
adopting proposed paragraphs (4)
(prevention and detection activities), (5)
(continuity and recovery plans), and (6)
(previous incidents). We have similarly
revised proposed paragraph (3) to
eliminate some of the detail it required,
consistent with commenter suggestions
to require only high-level disclosure
regarding third-party service providers.
The enumerated elements that a
registrant should address in its Item
106(b) disclosure, as applicable, are:
• Whether and how the described
cybersecurity processes in Item 106(b)
have been integrated into the registrant’s
overall risk management system or
processes;
• Whether the registrant engages
assessors, consultants, auditors, or other
third parties in connection with any
such processes; and
• Whether the registrant has
processes to oversee and identify
material risks from cybersecurity threats
associated with its use of any thirdparty service provider.
We have also revised the rule text to
clarify that the above elements compose
a non-exclusive list of disclosures;
registrants should additionally disclose
whatever information is necessary,
based on their facts and circumstances,
for a reasonable investor to understand
their cybersecurity processes.
We have moved proposed paragraph
(7) into a separate paragraph, at 17 CFR
229.106(b)(2) (Regulation S–K ‘‘Item
106(b)(2)’’), instead of including it in the
enumerated list in Item 106(b)(1), and
have added a materiality qualifier in
response to a comment.228 Item
106(b)(2) requires a description of
‘‘[w]hether any risks from cybersecurity
threats, including as a result of any
previous cybersecurity incidents, have
materially affected or are reasonably
likely to materially affect the registrant,
including its business strategy, results of
operations, or financial condition and if
so, how.’’ 229
The final rules will require disclosure
of whether a registrant engages
assessors, consultants, auditors, or other
third parties in connection with their
cybersecurity because we believe it is
ddrumheller on DSK120RN23PROD with RULES2
228 See
letter from PWC.
respect to the Item 106(b)(2)’s
requirement to describe any risks as a result of any
previous cybersecurity incidents, see supra Section
II.B.3 for a discussion of the duties to correct or
update prior disclosure that registrants may have in
certain circumstances. As we note in that section,
registrants should consider whether they need to
revisit or refresh previous disclosure, including
during the process of investigating a cybersecurity
incident.
229 With
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
important for investors to know a
registrant’s level of in-house versus
outsourced cybersecurity capacity. We
understand that many registrants rely on
third-party service providers for some
portion of their cybersecurity, and we
believe this information is accordingly
necessary for investors to assess a
company’s cybersecurity risk profile in
making investment decisions. However,
we are not persuaded, as one
commenter contended, that registrants
should be required to name the third
parties (though they may choose to do
so), because we believe this may
magnify concerns about increasing a
company’s cybersecurity vulnerabilities.
For the same reason, we decline the
commenter suggestion to require a
description of the services provided by
third parties.
We are also not persuaded that risk
quantification or other quantifiable
metrics are appropriate as mandatory
elements of a cybersecurity disclosure
framework. While such metrics may be
used by registrants and investors in the
future, commenters did not identify any
such metrics that would be appropriate
to mandate at this time. Additionally, to
the extent that a registrant uses any
quantitative metrics in assessing or
managing cybersecurity risks, it may
disclose such information voluntarily.
For similar reasons, we decline
commenters’ recommendations to
require disclosure of independent
assessments and audits, as well as
commenters’ recommendations on
disclosure of use of the NIST
framework, and on distinguishing
between continuous and periodic risk
assessment.
We decline the commenter suggestion
to allow Item 106(b) disclosure to be
provided in the proxy statement, as the
proxy statement is generally confined to
information pertaining to the election of
directors. We are also not requiring Item
106 disclosures in registration
statements as recommended by the IAC,
consistent with our efforts to reduce the
burdens associated with the final rule.
However, as discussed further below,230
we reiterate the Commission’s guidance
from the 2018 Interpretive Release that
‘‘[c]ompanies should consider the
materiality of cybersecurity risks and
incidents when preparing the disclosure
that is required in registration
statements.’’ 231 Finally, we note that
registrants may satisfy the Item 106
disclosure requirements through
230 See
infra text accompanying notes 355 and
356.
231 2018
PO 00000
Interpretive Release at 8168.
Frm 00019
Fmt 4701
Sfmt 4700
51913
incorporation by reference pursuant to
17 CFR 240.12b–23 (‘‘Rule 12b–23’’).232
2. Governance
a. Proposed Amendments
The Commission proposed to add 17
CFR 229.106(c) (Regulation S–K ‘‘Item
106(c)’’) to require a description of
management and the board’s oversight
of a registrant’s cybersecurity risk. This
information would complement the
proposed risk management and strategy
disclosure by clarifying for investors
how a registrant’s leadership oversees
and implements its cybersecurity
processes.233 Proposed 17 CFR
229.106(c)(1) (Regulation S–K ‘‘Item
106(c)(1)’’) would focus on the board’s
role, requiring discussion, as applicable,
of:
• Whether the entire board, specific
board members, or a board committee is
responsible for the oversight of
cybersecurity risks;
• The processes by which the board
is informed about cybersecurity risks,
and the frequency of its discussions on
this topic; and
• Whether and how the board or
board committee considers
cybersecurity risks as part of its
business strategy, risk management, and
financial oversight.
Proposed 17 CFR 229.106(c)(2)
(Regulation S–K ‘‘Item 106(c)(2)’’)
meanwhile would require a description
of management’s role in assessing and
managing cybersecurity-related risks, as
well as its role in implementing the
registrant’s cybersecurity policies,
procedures, and strategies, including at
a minimum discussion of:
• Whether certain management
positions or committees are responsible
for measuring and managing
cybersecurity risk, specifically the
prevention, mitigation, detection, and
remediation of cybersecurity incidents,
and the relevant expertise of such
persons or members;
• Whether the registrant has a
designated chief information security
officer, or someone in a comparable
position, and if so, to whom that
individual reports within the
registrant’s organizational chart, and the
relevant expertise of any such persons;
• The processes by which such
persons or committees are informed
about and monitor the prevention,
mitigation, detection, and remediation
of cybersecurity incidents; and
232 As required by Rule 12b–23, in order to
incorporate information by reference in answer, or
partial answer, to Item 106, a registrant must,
among other things, include an active hyperlink if
the information is publicly available on EDGAR.
233 Proposing Release at 16600.
E:\FR\FM\04AUR2.SGM
04AUR2
51914
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
• Whether and how frequently such
persons or committees report to the
board of directors or a committee of the
board of directors on cybersecurity risk.
The Proposing Release explained that
proposed Item 106(c)(1) would reinforce
the Commission’s 2018 Interpretive
Release,234 which said that disclosure
on how a board engages management on
cybersecurity helps investors assess the
board’s exercise of its oversight
responsibility.235 The Proposing Release
noted that proposed Item 106(c)(2)
would be of importance to investors in
that it would help investors understand
how registrants are planning for
cybersecurity risks and inform their
decisions on how best to allocate their
capital.236
b. Comments
A few commenters supported
proposed Item 106(c) as providing
investors with more uniform and
informed understanding of registrants’
governance of cybersecurity risks.237 A
number of commenters opposed
proposed Item 106(c). They contended
that the proposed Item 106(c)
disclosures would be too granular to be
decision-useful; instead, some of these
commenters recommended that we limit
the rule to a high-level explanation of
management and the board’s role in
cybersecurity risk oversight.238
One commenter said proposed Item
106(c)(1) should be dropped because it
duplicates existing 17 CFR 229.407(h)
(Regulation S–K ‘‘Item 407(h)’’), which
requires reporting of material
information regarding a board’s
leadership structure and role in risk
oversight, including how it administers
its oversight function.239 Others saw
similarities with Item 407(h) as well and
suggested instead that proposed Item
106(c) be subsumed into Item 407, thus
co-locating governance disclosures.240
In response to a request for comment
in the Proposing Release on whether the
Commission should expressly provide
for the use of hyperlinks or crossreferences in Item 106, one commenter
supported the use of hyperlinks and
cross-references, but sought clarification
of whether the practice is already
permitted under Commission rules.241
234 Id.
(citing 2018 Interpretive Release at 8170).
Interpretive Release at 8170.
236 Proposing Release at 16600.
237 See, e.g., letters from Better Markets; CalPERS.
238 See letters from ABA; AGA/INGAA; EEI;
Nareit; NYSE.
239 See letter from Davis Polk. The commenter
went on to say that, to the extent Item 106(c)
requires disclosure of immaterial information
regarding the board, it should be dropped.
240 See letters from ABA; BDO; PWC.
241 See letter from E&Y.
ddrumheller on DSK120RN23PROD with RULES2
235 2018
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
Another commenter opposed, saying
Item 407(h)’s more general discussion of
board governance is distinct from Item
106(c)(1)’s specific focus on
cybersecurity.242 The commenter
cautioned that allowing registrants to
employ hyperlinks and cross-references
in Item 106 would lead to ‘‘less detail,’’
resulting in disclosure insufficient to
investor needs.243
One commenter recommended that
we move proposed Item 106(c)(2) to the
enumerated list of topics called for in
proposed Item 106(b).244 Another
commenter suggested expanding the
rule to include disclosure of
management and staff training on
cybersecurity, asserting that the
information is useful to investors
because policies depend on staff for
successful implementation.245 Two
commenters suggested allowing the Item
106(c) disclosures to be made in the
proxy statement.246
c. Final Amendments
In response to comments, and aligned
with our changes to Item 106(b), we
have streamlined Item 106(c) to require
disclosure that is less granular than
proposed. Under Item 106(c)(1) as
adopted, registrants must ‘‘[d]escribe the
board’s oversight of risks from
cybersecurity threats,’’ and, if
applicable, ‘‘identify any board
committee or subcommittee
responsible’’ for such oversight ‘‘and
describe the processes by which the
board or such committee is informed
about such risks.’’ We have removed
proposed Item 106(c)(1)(iii), which had
covered whether and how the board
integrates cybersecurity into its business
strategy, risk management, and financial
oversight. While we have also removed
the proposed Item 106(c)(1)(ii)
requirement to disclose ‘‘the frequency
of [the board or committee’s]
discussions’’ on cybersecurity, we note
that, depending on context, some
registrants’ descriptions of the processes
by which their board or relevant
committee is informed about
cybersecurity risks may include
discussion of frequency.247
Given these changes, we find that
Item 407(h) and Item 106(c)(1) as
adopted serve distinct purposes and
242 See
letter from Tenable.
243 Id.
244 See
letter from Davis Polk.
245 See letter from PRI.
246 See letters from Business Roundtable; Nasdaq.
247 For example, if the board or committee relies
on periodic (e.g., quarterly) presentations by the
registrant’s chief information security officer to
inform its consideration of risks from cybersecurity
threats, the registrant may, in the course of
describing those presentations, also note their
frequency.
PO 00000
should not be combined, as suggested
by some commenters—the former
requires description of the board’s
leadership structure and administration
of risk oversight generally, while the
latter requires detail of the board’s
oversight of specific cybersecurity risk.
As noted by one commenter,248 to the
extent these disclosures are duplicative,
a registrant would be able to incorporate
such information by reference.249
We have also modified Item 106(c)(2)
to add a materiality qualifier, to make
clear that registrants must ‘‘[d]escribe
management’s role in assessing and
managing the registrant’s material risks
from cybersecurity threats’’ (emphasis
added).250 The enumerated disclosure
elements now constitute a ‘‘nonexclusive list’’ registrants should
consider including. We have revised the
first element to require the disclosure of
management positions or committees
‘‘responsible for assessing and managing
such risks, and the relevant expertise of
such persons or members in such detail
as necessary to fully describe the nature
of the expertise.’’ Because this
requirement would typically encompass
identification of whether a registrant has
a chief information security officer, or
someone in a comparable position, we
are not adopting the proposed second
element that would have specifically
called for disclosure of whether the
registrant has a designated chief
information security officer. Given our
purpose of streamlining the disclosure
requirements, we also are not adopting
the proposed requirement to disclose
the frequency of management-board
discussions on cybersecurity, though, as
noted above, discussion of frequency
may in some cases be included as part
of describing the processes by which the
board or relevant committee is informed
about cybersecurity risks in compliance
with Item 106(c)(1), to the extent it is
relevant to an understanding of the
board’s oversight of risks from
cybersecurity threats.
Thus, as adopted, Item 106(c)(2)
directs registrants to consider disclosing
the following as part of a description of
management’s role in assessing and
managing the registrant’s material risks
from cybersecurity threats:
• Whether and which management
positions or committees are responsible
Frm 00020
Fmt 4701
Sfmt 4700
248 See
letter from E&Y.
12b–23.
250 We have not added a materiality qualifier to
Item 106(c)(1) because, if a board of directors
determines to oversee a particular risk, the fact of
such oversight being exercised by the board is
material to investors. By contrast, management
oversees many more matters and management’s
oversight of non-material matters is likely not
material to investors, so a materiality qualifier is
appropriate for Item 106(c)(2).
249 Rule
E:\FR\FM\04AUR2.SGM
04AUR2
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
for assessing and managing such risks,
and the relevant expertise of such
persons or members in such detail as
necessary to fully describe the nature of
the expertise;
• The processes by which such
persons or committees are informed
about and monitor the prevention,
detection, mitigation, and remediation
of cybersecurity incidents; and
• Whether such persons or
committees report information about
such risks to the board of directors or a
committee or subcommittee of the board
of directors.
As many commenters recommended,
these elements are limited to disclosure
that we believe balances investors’
needs to understand a registrant’s
governance of risks from cybersecurity
threats in sufficient detail to inform an
investment or voting decision with
concerns that the proposal could
inadvertently pressure registrants to
adopt specific or inflexible
cybersecurity-risk governance practices
or organizational structures. We do not
believe these disclosures should be
subsumed into Item 106(b), as one
commenter recommended, because
identifying the management committees
and positions responsible for risks from
cybersecurity threats is distinct from
describing the cybersecurity practices
management has deployed. We also
decline the commenter suggestion to
require disclosure of management and
staff training on cybersecurity;
registrants may choose to make such
disclosure voluntarily. Finally, we
decline the commenter suggestion to
allow Item 106(c) disclosure to be
provided in the proxy statement;
governance information in the proxy
statement is generally meant to inform
shareholders’ voting decisions, whereas
Item 106(c) disclosure informs
investors’ assessment of investment risk.
3. Definitions
ddrumheller on DSK120RN23PROD with RULES2
a. Proposed Definitions
The Commission proposed to define
three terms to delineate the scope of the
amendments: ‘‘cybersecurity incident,’’
‘‘cybersecurity threat,’’ and
‘‘information systems.’’ 251 Proposed
229 CFR 229.106(a) (Regulation S–K
‘‘Item 106(a)’’) would define them as
follows:
• Cybersecurity incident means an
unauthorized occurrence on or
conducted through a registrant’s
information systems that jeopardizes the
confidentiality, integrity, or availability
of a registrant’s information systems or
any information residing therein.
251 Proposing
VerDate Sep<11>2014
Release at 16600–16601.
19:26 Aug 03, 2023
Jkt 259001
• Cybersecurity threat means any
potential occurrence that may result in
an unauthorized effort to adversely
affect the confidentiality, integrity or
availability of a registrant’s information
systems or any information residing
therein.
• Information systems means
information resources, owned, or used
by the registrant, including physical or
virtual infrastructure controlled by such
information resources, or components
thereof, organized for the collection,
processing, maintenance, use, sharing,
dissemination, or disposition of the
registrant’s information to maintain or
support the registrant’s operations.
As noted above, the Commission
explained that what constitutes a
‘‘cybersecurity incident’’ should be
construed broadly, encompassing a
range of event types.252
b. Comments
Most commenters that offered
feedback on the proposed definitions
suggested narrowing them in some
fashion. On ‘‘cybersecurity incident,’’
many commenters urged limiting the
definition to cases of actual harm,
thereby excluding incidents that had
only the potential to cause harm.253
They suggested accomplishing this by
replacing ‘‘jeopardizes’’ with phrases
such as ‘‘adversely affects’’ or ‘‘results
in substantial loss of.’’ 254 One of these
commenters noted that such a change
would more closely align the definition
with that in CIRCIA.255 Other
commenters objected to the definition’s
use of ‘‘any information’’ as overbroad,
saying it would lead to inconsistent
application.256 One commenter sought
clarification of whether the definition
encompasses accidental incidents, such
as chance technology outages, that do
not involve a malicious actor,257 while
another commenter advocated
broadening the definition to any
incident materially disrupting
operations, regardless of what
precipitated it.258
On ‘‘cybersecurity threat,’’
commenters urged narrowing the rule
by replacing the language ‘‘may result
in’’ with ‘‘could reasonably be expected
252 Id.
at 16601.
letters from ABA; BPI et al.; Chamber et
al.; Davis Polk; Enbridge; FDD; FEI; Hunton; PWC;
SCG; SIFMA.
254 See letters from BPI et al.; Hunton.
255 See letter from BPI et al. (‘‘The word
‘jeopardizes’ should be replaced with ‘results in
substantial loss of’ to capture incidents that are
causing some actual harm, and to better harmonize
the definition with the reporting standard set forth
by Congress in CIRCIA.’’).
256 See letters from Deloitte; SIFMA.
257 See letter from CSA.
258 See letter from Crindata.
253 See
PO 00000
Frm 00021
Fmt 4701
Sfmt 4700
51915
to result in’’ or some other probability
threshold.259 One stated that ‘‘the use of
a ‘may’ standard establishes an
unhelpfully low standard that would
require registrants to establish policies
and procedures to identify threats that
are potentially overbroad and not
appropriately tailored to those threats
that are reasonably foreseeable.’’ 260 In a
similar vein, two commenters objected
to the language ‘‘any potential
occurrence’’ as over-inclusive and
lacking ‘‘instructive boundaries.’’ 261
On ‘‘information systems,’’ many
commenters favored replacing ‘‘owned
or used by’’ with ‘‘owned or operated
by,’’ ‘‘owned or controlled by,’’ or like
terms, so that registrants’ reporting
obligations stop short of incidents on
third-party information systems.262 A
few commenters said the definition
could be construed to cover hard-copy
information and should be revised to
foreclose such a reading.263
More broadly, many commenters
advised the Commission to align these
definitions with comparable definitions
in other Federal laws and regulations,
such as CIRCIA and NIST.264 One
commenter explained that ‘‘[a]ligning
definitions with those in existing federal
laws and regulations would help ensure
that the defined terms are consistently
understood, interpreted and applied in
the relevant disclosure.’’ 265 However,
another commenter cautioned against
aligning with definitions, such as those
of NIST, that were developed with a
view toward internal risk management
and response rather than external
reporting; the commenter identified
CIRCIA and the Federal banking
regulators’ definitions as more
apposite.266 One commenter noted that
additional proposed defined terms were
included in the Commission’s
rulemaking release Cybersecurity Risk
Management for Investment Advisers,
Registered Investment Companies, and
Business Development Companies 267
that were not included in the Proposing
Release and recommended that we
259 See
letters from Chevron; Debevoise; NYC Bar.
letter from Debevoise.
261 See letters from Chevron; Deloitte.
262 See letters from ABA; APCIA; Business
Roundtable; Chamber; Cybersecurity Coalition; ISA;
ITI; NAM; NDIA; Paylocity. Other commenters
made similar arguments about third party systems
without speaking specifically to the definition,
saying, for example, that registrants may not have
sufficient visibility into third-party systems and
may be bound by confidentiality agreements. See
letters from AIA; EIC; FAH; NMHC; SIFMA.
263 See letters from ABA; BPI et al.; Enbridge.
264 See letters from ABA; CAQ; Chevron; FEI; IC;
IIA; Microsoft; PWC; SandboxAQ; SIFMA.
265 See letter from ABA.
266 See letter from SCG.
267 Release No. 33–11028 (Feb. 9, 2022) [87 FR
13524 (Mar. 9, 2022)].
260 See
E:\FR\FM\04AUR2.SGM
04AUR2
51916
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
‘‘consider whether the defined terms
should be consistent.’’ 268
In the Proposing Release, the
Commission asked whether to define
other terms used in the proposed
amendments, and specifically sought
comment on whether a definition of
‘‘cybersecurity’’ would be useful.269
Several commenters supported defining
‘‘cybersecurity,’’ 270 reasoning, for
example, that any rulemaking on
cybersecurity should define that
baseline term; 271 that, left undefined,
the term would be open to varying
interpretations; 272 and that details such
as whether hardware is covered should
be resolved.273 Separately, two
commenters recommended the
Commission define ‘‘operational
technology,’’ 274 with one explaining
that the ‘‘proposed definitions
understandably focus on data breaches,
which are a major cybersecurity threat,
but we believe an operational
technology breach could have even
more detrimental effects in certain cases
(such as for ransomware attacks that
have impacted critical infrastructure)
and warrants disclosure guidance from
the Commission.’’ 275
Several commenters also sought either
a formal definition or more guidance on
the term ‘‘material’’ specific to the
cybersecurity space.276 Some read the
proposal, particularly the incident
examples provided in the Proposing
Release, as lowering the bar for
materiality and being overly subjective,
which they indicated may result in
over-reporting of cybersecurity
incidents or introduce uncertainty, and
they urged the Commission to affirm the
standard materiality definition.277
Another commenter sought
cybersecurity-specific guidance on
materiality, including ‘‘concrete
thresholds to assist registrants in
determining materiality.’’ 278 A few
commenters recommended conditioning
the materiality determination on the
underlying information being verified to
‘‘a high degree of confidence’’ and
268 See
letter from Deloitte.
Release at 16601.
270 See letters from BCS; Blue Lava; EIC; R.
Hackman; R Street.
271 See letter from R Street.
272 See letter from Blue Lava.
273 See letter from BCS.
274 See letters from Chevron; EIC.
275 See letter from Chevron.
276 See letters from ACLI; AIC; AICPA; APCIA;
Bitsight; Harry Broadman, Eric Matrejek, and Brad
Wilson (‘‘Broadman et al.’’); Debevoise; EIC;
International Information System Security
Certification Consortium (‘‘ISC2’’); M. Barragan;
NYC Bar; Prof. Perullo; R Street; SIFMA;
TransUnion; Virtu.
277 See letters from APCIA; ACLI; EIC; Virtu.
278 See letter from SIFMA.
ddrumheller on DSK120RN23PROD with RULES2
269 Proposing
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
‘‘unlikely to materially change,’’ 279
while one commenter looked to replace
materiality altogether with a
significance standard like that in
CIRCIA.280
c. Final Definitions
We are adopting definitions for
‘‘cybersecurity incident,’’ ‘‘cybersecurity
threat,’’ and ‘‘information systems’’
largely as proposed, with three
modifications.
First, on ‘‘cybersecurity incident,’’ we
are adding the phrase ‘‘or a series of
related unauthorized occurrences’’ to
the ‘‘cybersecurity incident’’ definition.
This reflects our guidance in Section
II.B.3 above that a series of related
occurrences may collectively have a
material impact or reasonably likely
material impact and therefore trigger
Form 8–K Item 1.05, even if each
individual occurrence on its own would
not rise to the level of materiality.
Second, we are making a clarifying edit
to ‘‘information systems.’’ Some
commenters said the definition could be
construed to cover hard-copy
resources.281 We recognize that reading
is possible, if unlikely and unintended,
and we are therefore inserting
‘‘electronic’’ before ‘‘information
resources,’’ to ensure the rules pertain
only to electronic resources. Third, we
are making minor revisions to the
‘‘cybersecurity threat’’ definition for
clarity and to better align it with the
‘‘cybersecurity incident’’ definition.
Accordingly, the definitions are as
follows:
• Cybersecurity incident means an
unauthorized occurrence, or a series of
related unauthorized occurrences, on or
conducted through a registrant’s
information systems that jeopardizes the
confidentiality, integrity, or availability
of a registrant’s information systems or
any information residing therein.
• Cybersecurity threat means any
potential unauthorized occurrence on or
conducted through a registrant’s
information systems that may result in
adverse effects on the confidentiality,
integrity or availability of a registrant’s
information systems or any information
residing therein.
• Information systems means
electronic information resources, owned
or used by the registrant, including
physical or virtual infrastructure
controlled by such information
resources, or components thereof,
organized for the collection, processing,
279 See letters from Debevoise; NYC Bar. See also
letter from AIC (suggesting ‘‘unlikely to change,’’
without ‘‘materially’’).
280 See letter from National Electrical
Manufacturers Association (‘‘NEMA’’).
281 See letters from ABA; BPI et al.; Enbridge.
PO 00000
Frm 00022
Fmt 4701
Sfmt 4700
maintenance, use, sharing,
dissemination, or disposition of the
registrant’s information to maintain or
support the registrant’s operations.
We recognize commenters’ concern
regarding the term ‘‘jeopardizes’’ in the
proposed ‘‘cybersecurity incident’’
definition and the resulting scope of the
definition. Nonetheless, we note that the
definition is not self-executing; rather it
is operationalized by Item 1.05, which
is conditioned on the incident having
been material to the registrant. Typically
that would entail actual harm, though
the harm may sometimes be delayed,
and a material cybersecurity incident
may not result in actual harm in all
instances. For example, a company
whose intellectual property is stolen
may not suffer harm immediately, but it
may foresee that harm will likely occur
over time as that information is sold to
other parties, such that it can determine
materiality before the harm occurs. The
reputational harm from a breach may
similarly increase over time in a
foreseeable manner. There may also be
cases, even if uncommon, where the
jeopardy caused by a cybersecurity
incident materially affects the company,
even if the incident has not yet caused
actual harm. In such circumstances, we
believe investors should be apprised of
the material effects of the incident. We
are therefore retaining the word
‘‘jeopardizes’’ in the definition.
We are not persuaded that the
proposed ‘‘cybersecurity incident’’
definition’s use of ‘‘any information’’
would lead to inconsistent application
of the definition among issuers or cause
a risk of over-reporting, as suggested by
some commenters. As noted above, the
‘‘cybersecurity incident’’ definition is
operationalized by Item 1.05. Item 1.05
does not require disclosure whenever
‘‘any information’’ is affected by an
intruder. Disclosure is triggered only
when the resulting effect of an incident
on the registrant is material.
We are also retaining ‘‘unauthorized’’
in the incident definition as proposed.
In general, we believe that an accidental
occurrence is an unauthorized
occurrence. Therefore, we note that an
accidental occurrence may be a
cybersecurity incident under our
definition, even if there is no confirmed
malicious activity. For example, if a
company’s customer data are
accidentally exposed, allowing
unauthorized access to such data, the
data breach would constitute a
‘‘cybersecurity incident’’ that would
necessitate a materiality analysis to
determine whether disclosure under
Item 1.05 of Form 8–K is required.
On ‘‘cybersecurity threat,’’ we
appreciate commenters’ concerns with
E:\FR\FM\04AUR2.SGM
04AUR2
ddrumheller on DSK120RN23PROD with RULES2
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
the proposed definition’s use of ‘‘may
result in’’ and ‘‘any potential
occurrence.’’ Unlike with ‘‘cybersecurity
incident,’’ where the interplay of the
proposed definition with proposed Item
1.05 ensured only material incidents
would become reportable, proposed
Item 106(b)’s reference to ‘‘the
identification and management of risks
from cybersecurity threats’’ was not
qualified by materiality. We are
therefore adding a materiality condition
to Item 106(b). As adopted, Item 106(b)
will require disclosure of registrants’
processes to address the material risks
of potential occurrences that could
reasonably result in an unauthorized
effort to adversely affect the
confidentiality, integrity, or availability
of a registrant’s information systems.
Given the addition of a materiality
condition to Item 106(b), we do not
believe that further revision to the
‘‘cybersecurity threat’’ definition is
warranted.
On ‘‘information systems,’’ we decline
to change ‘‘owned or used by’’ to
‘‘owned or operated by,’’ ‘‘owned or
controlled by,’’ or similar terms
advanced by commenters. Commenters
recognized that ‘‘used by’’ covers
information resources owned by third
parties. That is by design: covering third
party systems is essential to the working
of Item 106 of Regulation S–K and Item
1.05 of Form 8–K. As we explain above,
in Section II.A.3, the materiality of a
cybersecurity incident is contingent
neither on where the relevant electronic
systems reside nor on who owns them,
but rather on the impact to the
registrant. We do not believe that a
reasonable investor would view a
significant data breach as immaterial
merely because the data are housed on
a cloud service. If we were to remove
‘‘used by,’’ a registrant could evade the
disclosure requirements of the final
rules by contracting out all of its
information technology needs to third
parties. Accordingly, the definition of
‘‘information systems’’ contemplates
those resources owned by third parties
and used by the registrant, as proposed.
In considering commenters’
suggestion to align our definitions with
CIRCIA, NIST, and other Federal
regulations, we observe that there is no
one standard definition for these terms,
and that regulators have adopted
definitions based on the specific
contexts applicable to their regulations.
Nonetheless, we also observe that the
final ‘‘cybersecurity incident’’ definition
is already similar to the CIRCIA and
NIST incident definitions, in that all
three focus on the confidentiality,
integrity, and availability of information
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
systems.282 Our definition of
‘‘information systems’’ also tracks
CIRCIA and NIST, as all three cover
‘‘information resources’’ that are
‘‘organized for the collection,
processing, maintenance, use, sharing,
dissemination, or disposition’’ of
information.283 Of course, the
definitions do not match precisely, but
some variation is inevitable where
various Federal laws and regulations
have different purposes, contexts, and
goals. We therefore find that further
alignment is not needed.
We decline to define any other terms.
We acknowledge commenters who
asked for additional guidance regarding
the application of a materiality
determination to cybersecurity or sought
to replace materiality with a
significance standard. As noted in the
Proposing Release, however, we expect
that registrants will apply materiality
considerations as would be applied
regarding any other risk or event that a
registrant faces. Carving out a
cybersecurity-specific materiality
definition would mark a significant
departure from current practice, and
would not be consistent with the intent
of the final rules.284 Accordingly, we
reiterate, consistent with the standard
set out in the cases addressing
materiality in the securities laws, that
information is material if ‘‘there is a
substantial likelihood that a reasonable
shareholder would consider it
important’’ 285 in making an investment
decision, or if it would have
‘‘significantly altered the ‘total mix’ of
information made available.’’ 286
Because materiality’s focus on the total
mix of information is from the
perspective of a reasonable investor,
companies assessing the materiality of
cybersecurity incidents, risks, and
related issues should do so through the
lens of the reasonable investor. Their
evaluation should take into
consideration all relevant facts and
282 For CIRCIA, see supra note 19, at sec. 103, 136
Stat. 1039; and 6 U.S.C. 681b(c)(2)(A)(i). For NIST,
see Incident, Glossary, NIST Computer Security
Resource Center, available at https://csrc.nist.gov/
glossary/term/incident.
283 For CIRCIA, see supra note 19, at sec. 103, 136
Stat. 1039; and 44 U.S.C. 3502(8). For NIST, see
Information System, Glossary, NIST Computer
Security Resource Center, available at https://
csrc.nist.gov/glossary/term/information_system.
284 See, e.g., Basic Inc. v. Levinson, 485 U.S. 224,
236 (1988) (‘‘[a]ny approach that designates a single
fact or occurrence as always determinative of an
inherently fact-specific finding such as materiality,
must necessarily be overinclusive or
underinclusive’’).
285 TSC Indus. v. Northway, 426 U.S. 438, 449
(1976); Matrixx Initiatives v. Siracusano, 563 U.S.
27, 38–40 (2011); Basic, 485 U.S. at 240.
286 Id. See also the definition of ‘‘material’’ in 17
CFR 230.405 [Securities Act Rule 405]; 17 CFR
240.12b–2 [Exchange Act Rule 12b–2].
PO 00000
Frm 00023
Fmt 4701
Sfmt 4700
51917
circumstances, which may involve
consideration of both quantitative and
qualitative factors. Thus, for example,
when a registrant experiences a data
breach, it should consider both the
immediate fallout and any longer term
effects on its operations, finances, brand
perception, customer relationships, and
so on, as part of its materiality analysis.
We also note that, given the fact-specific
nature of the materiality determination,
the same incident that affects multiple
registrants may not become reportable at
the same time, and it may be reportable
for some registrants but not others.
We also decline to separately define
‘‘cybersecurity,’’ as suggested by some
commenters. We do not believe such
further definition is necessary, given the
broad understanding of this term. To
that end, we note that the cybersecurity
industry itself appears not to have
settled on an exact definition, and
because the field is quickly evolving
and is expected to continue to evolve
over time, any definition codified in
regulation could soon become stale as
technology develops. Likewise, the final
rules provide flexibility by not defining
‘‘cybersecurity,’’ allowing a registrant to
determine meaning based on how it
considers and views such matters in
practice, and on how the field itself
evolves over time.
We decline to define ‘‘operational
technology’’ as suggested by some
commenters because the term does not
appear in the rules we are adopting.
D. Disclosure Regarding the Board of
Directors’ Cybersecurity Expertise
1. Proposed Amendments
Congruent with proposed Item
106(c)(2) on the board’s oversight of
cybersecurity risk, the Commission
proposed adding 17 CFR 229.407(j)
(Regulation S–K ‘‘Item 407(j)’’) to
require disclosure about the
cybersecurity expertise, if any, of a
registrant’s board members.287 The
proposed rule did not define what
constitutes expertise, given the wideranging nature of cybersecurity skills,
but included a non-exclusive list of
criteria to consider, such as prior work
experience, certifications, and the like.
As proposed, paragraph (j) would build
on existing 17 CFR 229.401(e)
(Regulation S–K ‘‘Item 401(e)’’)
(business experience of directors) and
Item 407(h) (board risk oversight), and
would be required in the annual report
on Form 10–K and in the proxy or
information statement when action is to
be taken on the election of directors.
Thus, the Proposing Release said,
287 Proposing
E:\FR\FM\04AUR2.SGM
Release at 16601.
04AUR2
51918
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
proposed Item 407(j) would help
investors in making both investment
and voting decisions.288
The Commission also proposed to
include a safe harbor in 17 CFR
229.407(j)(2) (Regulation S–K ‘‘Item
407(j)(2)’’) providing that any directors
identified as cybersecurity experts
would not be deemed experts for
liability purposes, including under
Section 11 of the Securities Act.289 This
was intended to clarify that identified
directors do not assume any duties,
obligations, or liabilities greater than
those assumed by non-expert
directors.290 Nor would such
identification decrease the duties,
obligations, and liabilities of non-expert
directors relative to identified
directors.291
2. Comments
Proposed Item 407(j) garnered
significant comment. Supporters wrote
that understanding a board’s level of
cybersecurity expertise is important to
assessing a company’s ability to manage
cybersecurity risk.292 For example, one
commenter said ‘‘[b]oard cybersecurity
expertise serves as a useful starting
point for investors to assess a company’s
approach to cybersecurity;’’ 293 while
another commenter said investors need
the Item 407(j) disclosure ‘‘[t]o cast
informed votes on directors.’’ 294 One
comment letter submitted an academic
study by the authors of the letter and
noted that its findings ‘‘underscore the
importance of understanding the role of
boards in cybersecurity oversight.’’ 295
By contrast, many commenters argued
cybersecurity risk is not intrinsically
different from other risks that directors
assess with or without specific technical
expertise.296 For example, one reasoned
that, given the ‘‘ever-changing range of
risks confronting a company,’’ directors
require ‘‘broad-based skills in risk and
management oversight, rather than
subject matter expertise in one
particular type of risk.’’ 297 Commenters
288 Id.
289 Id.
at 16602.
290 Id.
ddrumheller on DSK120RN23PROD with RULES2
291 Id.
292 See letters from O. Borges; CalPERS; Prof.
Choudhary; CII; Digital Directors Network (‘‘DDN’’);
ISC2; Prof. Lowry et al.; NACD; PRI; SANS Institute;
SM4RT Secure.
293 See letter from PRI.
294 See letter from CII.
295 See letter from Prof. Lowry et al.
296 See letters from ABA; ACC; AGA/INGAA;
AICPA; Auto Innovators; BDO; BPI et al.; Business
Roundtable; CAQ; CBA; Chamber; CTA; CTIA;
Davis Polk; Deloitte; EEI; EIC; Hunton; ITI; IC;
LTSE; Microsoft; Nareit; NAM; NDIA; NRA; NYSE;
PPG; Safe Security; SCG; SIFMA; TechNet;
USTelecom; Virtu; Wilson Sonsini. See also IAC
Recommendation.
297 See letter from ABA.
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
also predicted the disclosure
requirement would pressure companies
to retain cybersecurity experts on their
board, and submitted there is not
enough cybersecurity talent in the
marketplace at this time for all or most
companies to do so.298 One of these
commenters further contended that
finding such expertise will be harder for
smaller reporting companies.299
Another commenter warned that, given
the current cybersecurity talent pool,
the end result may be lower diversity on
boards; 300 and one said hiring
cybersecurity experts to the board may
come at the expense of spending on a
company’s cybersecurity defenses.301
Commenters also expressed concern
that the identified expert directors
would face elevated risks, such as being
targeted by nation states for surveillance
or hackers attempting to embarrass
them, thus creating a disincentive to
board service.302
More generally, sentiment among
those opposed to Item 407(j) was that
the rule is overly prescriptive and in
effect would direct how companies
operate their cybersecurity programs.303
As an alternative, some commenters
pushed for other ways to show
competency, such as identifying outside
experts the board relies on for
cybersecurity expertise, disclosing how
frequently the board meets with the
chief information security officer, listing
relevant director training, and relying
on adjacent technology skills.304
Whether they supported or opposed
the proposed disclosure requirement,
commenters largely endorsed the
proposed Item 407(j)(2) safe harbor; its
absence, they said, could make
candidates with cybersecurity expertise
reluctant to serve on boards.305 Two
298 See letters from ACC; APCIA; BIO; Blue Lava;
Chamber; FDD; ITI (May 9, 2022); NDIA; NYSE;
SCG (May 9, 2022). In this vein, a commenter
requested the Commission affirm Item 407(j) is only
a disclosure provision and is not intended to
mandate cybersecurity expertise on the board. See
letter from Federated Hermes.
299 See letter from BIO.
300 See letter from Chamber (‘‘An unintended
consequence of the SEC proposal is likely to create
new barriers for underrepresented groups to move
into cybersecurity leadership roles largely due to
the expense of obtaining credentials and other
formal certifications. The costs associated with
obtaining cybersecurity-related degrees and other
credentials could hinder the advancement of
individuals who could otherwise rise through the
ranks within the field of cybersecurity.’’).
301 See letter from Wilson Sonsini.
302 See letters from BIO; Chevron; EEI; EIC;
Hunton; Profs. Rajgopal & Sharp.
303 See, e.g., letter from ACC.
304 See letters from AGA/INGAA; BPI et al.;
Business Roundtable; DDN; LTSE; PRI; Wilson
Sonsini.
305 See letters from ABA; BIO; CII; CSA; A.
Heighington; NACD; Paylocity; Prof. Perullo.
PO 00000
Frm 00024
Fmt 4701
Sfmt 4700
commenters requested the Commission
define ‘‘cybersecurity expertise;’’ 306 one
of them said being ‘‘duly accredited and
certified as a cybersecurity
professional’’ should be a prerequisite,
and posited specific industry
certifications to establish expertise.307
Another commenter suggested adding
participation in continuing education to
the 17 CFR 229.407(j)(1)(i) factors
considered in assessing expertise.308
3. Final Amendments
After considering the comments, we
are not adopting proposed Item 407(j).
We are persuaded that effective
cybersecurity processes are designed
and administered largely at the
management level, and that directors
with broad-based skills in risk
management and strategy often
effectively oversee management’s efforts
without specific subject matter
expertise, as they do with other
sophisticated technical matters. While
we acknowledge that some commenters
indicated that the proposed Item 407(j)
information would be helpful to
investors, we nonetheless agree that it
may not be material information for all
registrants. We believe investors can
form sound investment decisions based
on the information required by Items
106(b) and (c) without the need for
specific information regarding boardlevel expertise. And to that end, a
registrant that has determined that
board-level expertise is a necessary
component to the registrant’s cyber-risk
management would likely provide that
disclosure pursuant to Items 106(b) and
(c).
E. Disclosure by Foreign Private Issuers
1. Proposed Amendments
The Commission proposed to
establish disclosure requirements for
FPIs parallel to those proposed for
domestic issuers in Regulation S–K
Items 106 and 407(j) and Form 8–K Item
1.05.309 Specifically, the Commission
proposed to amend Form 20–F to
incorporate the requirements of
proposed Item 106 and 407(j) to disclose
information regarding an FPI’s
cybersecurity risk management, strategy,
and governance.310 With respect to
306 See
letters from Federated Hermes; ISC2.
letter from ISC2.
308 See letter from SandboxAQ.
309 Proposing Release at 16602. The Commission
did not propose to amend Form 40–F, choosing
rather to maintain the multijurisdictional disclosure
system (‘‘MJDS’’) whereby eligible Canadian FPIs
use Canadian disclosure standards and documents
to satisfy SEC registration and disclosure
requirements.
310 As noted in the Proposing Release, FPIs would
include the expertise disclosure only in their
307 See
E:\FR\FM\04AUR2.SGM
04AUR2
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
incident disclosure, the Commission
proposed to: (1) amend General
Instruction B of Form 6–K to reference
material cybersecurity incidents among
the items that may trigger a current
report on Form 6–K,311 and (2) amend
Form 20–F to require updated
disclosure regarding incidents
previously disclosed on Form 6–K.
2. Comments
A few commenters agreed that the
Commission should not exempt FPIs
from the proposed disclosure
requirements, given they face the same
threats as domestic issuers.312 Another
commenter said the Commission should
not delay compliance for FPIs, for
similar reasons.313 On the other hand,
one commenter said the proposal would
disproportionately burden FPIs because,
under its reading of the proposed
amendment to General Instruction B,
Form 6–K would require disclosure of
all cybersecurity incidents, not just
those that are material.314 The
commenter went on to say that the
interplay of the European Union’s
Market Abuse Regulation (‘‘MAR’’)
would render the proposed Form 6–K
amendment particularly taxing, because
MAR requires immediate announcement
of non-public price sensitive
information.315
On MJDS filers, commenters endorsed
the Commission’s determination not to
propose to amend Form 40–F,
maintaining that Canadian issuers
eligible to use MJDS should be
permitted to follow their domestic
disclosure standards, consistent with
other disclosure requirements for those
registrants.316
ddrumheller on DSK120RN23PROD with RULES2
3. Final Amendments
We are adopting the Form 20–F and
Form 6–K amendments as proposed,
with modifications that are consistent
with those being applied to Item 106 of
Regulation S–K and Item 1.05 of Form
8–K. We continue to believe that FPIs’
cybersecurity incidents and risks are not
any less important to investors’ capital
allocation than those of domestic
annual reports, as they are not subject to
Commission rules for proxies and information
statements.
311 A registrant is required under Form 6–K to
furnish copies of all information that it: (i) makes
or is required to make public under the laws of its
jurisdiction of incorporation, (ii) files, or is required
to file under the rules of any stock exchange, or (iii)
otherwise distributes to its security holders.
312 See letters from CSA; Cybersecurity Coalition;
Prof. Perullo; Tenable.
313 See letter from Crindata.
314 See letter from SIFMA.
315 Id.
316 See letters from ACLI; BCE; Cameco
Corporation; CBA; Sun Life Financial Inc.
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
registrants. We also do not find that the
Form 6–K amendments unduly burden
FPIs. Importantly, the language the
Commission proposed to add to General
Instruction B (‘‘cybersecurity incident’’)
of Form 6–K would be modified by the
existing language ‘‘that which is
material with respect to the issuer and
its subsidiaries concerning.’’
Nonetheless, for added clarity, we are
including the word ‘‘material’’ before
‘‘cybersecurity incident.’’ Thus, for a
cybersecurity incident to trigger a
disclosure obligation on Form 6–K, the
registrant must determine that the
incident is material, in addition to
meeting the other criteria for required
submission of the Form.317 Even
registrants subject to the European
Union’s MAR will first have developed
the relevant information for foreign
disclosure or publication under MAR,
so any added burden for preparing and
furnishing the Form 6–K should be
minor. As the Commission stated in the
Proposing Release, we do not find
reason to adopt prescriptive
cybersecurity disclosure requirements
for Form 40–F filers, given that the
MJDS generally permits eligible
Canadian FPIs to use Canadian
disclosure standards and documents to
satisfy the Commission’s registration
and disclosure requirements.318 We note
that such filers are already subject to the
Canadian Securities Administrators’
2017 guidance on the disclosure of
cybersecurity risks and incidents.319
F. Structured Data Requirements
1. Proposed Amendments
The Commission proposed to
mandate that registrants tag the new
disclosures in Inline XBRL, including
by block text tagging narrative
disclosures and detail tagging
quantitative amounts.320 The Proposing
Release explained that the structured
data requirements would make the
disclosures more accessible to investors
and other market participants and
facilitate more efficient analysis.321 The
proposed requirements would not be
unduly burdensome to registrants, the
release posited, because they are similar
to the Inline XBRL requirements for
other disclosures.322
317 See
supra note 311 for the other criteria.
Release at 16603.
319 Canadian Securities Administrators, CSA
Multilateral Staff Notice 51–347—Disclosure of
cyber security risks and incidents (Jan. 19, 2017).
320 Proposing Release at 16603.
321 Id.
322 Id.
318 Proposing
PO 00000
Frm 00025
Fmt 4701
Sfmt 4700
51919
2. Comments
Commenters largely supported the
proposal to require Inline XBRL tagging
of the new disclosures, as structured
data would enable automated extraction
and analysis.323 Opposition to the
requirement centered on filer burden,
including an argument that, given the
time-sensitive nature of the Item 1.05
Form 8–K disclosure, mandating
structured data tagging would unduly
add to companies’ burden in completing
timely reporting.324
3. Final Amendments
After considering comments, we are
adopting the structured data
requirements as proposed, with a
staggered compliance date of one
year.325 We are not persuaded that
Inline XBRL tagging will unduly add to
companies’ burden in preparing and
filing Item 1.05 Form 8–K in a timely
fashion, and we believe such
incremental costs are appropriate given
the significant benefits to investors.
Compared to the Inline XBRL tagging
companies will already be performing
for their financial statements, the
tagging requirements here are less
extensive and complex. Inline XBRL
tagging will enable automated extraction
and analysis of the information required
by the final rules, allowing investors
and other market participants to more
efficiently identify responsive
disclosure, as well as perform largescale analysis and comparison of this
information across registrants.326 The
Inline XBRL requirement will also
enable automatic comparison of tagged
disclosures against prior periods. If we
were not to adopt the Inline XBRL
requirement as suggested by some
commenters, some of the benefit of the
new rules would be diminished.
However, we are delaying compliance
with the structured data requirements
for one year beyond initial compliance
with the disclosure requirements. This
323 See letters from AICPA; CAQ; Crowe LLP;
E&Y; FDD; K. Fuller; NACD; PWC; Professors
Lawrence Trautman & Neal Newman; XBRL US.
324 See letters from NYC Bar; SFA.
325 We have incorporated modifications of a
technical nature to the regulatory text.
326 These considerations are generally consistent
with objectives of the recently enacted Financial
Data Transparency Act of 2022, which directs the
establishment by the Commission and other
financial regulators of data standards for collections
of information, including with respect to periodic
and current reports required to be filed or furnished
under Exchange Act Sections 13 and 15(d). Such
data standards must meet specified criteria relating
to openness and machine-readability and promote
interoperability of financial regulatory data across
members of the Financial Stability Oversight
Council. See James M. Inhofe National Defense
Authorization Act for Fiscal Year 2023, Public Law
117–263, tit. LVIII, 136 Stat. 2395, 3421–39 (2022).
E:\FR\FM\04AUR2.SGM
04AUR2
51920
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
approach should both help lessen any
compliance burden and improve data.
G. Applicability to Certain Issuers
ddrumheller on DSK120RN23PROD with RULES2
1. Asset-Backed Issuers
The Commission proposed to amend
Form 10–K to clarify that an assetbacked issuer, as defined in 17 CFR
229.1101 (Regulation AB ‘‘Item 1101’’),
that does not have any executive officers
or directors may omit the information
required by proposed Item 106(c).327
The Commission noted that assetbacked issuers would likewise be
exempt from proposed Item 407(j)
pursuant to existing Instruction J to
Form 10–K.328 The Commission further
requested comment on whether to
generally exempt asset-backed issuers
from the proposed rules.
One commenter stated that the
proposed rules should not apply to
issuers of asset-backed securities, given
that they are limited purpose or passive
special purpose vehicles with limited
activities, no operations or businesses,
and no information systems.329 The
commenter also opposed applying the
proposed rules to other transaction
parties (such as the sponsor, servicer,
originator, and trustee), because such
parties are neither issuers of nor
obligors on an asset-backed security,
and ‘‘it is extraordinarily unlikely that
a transaction party’s financial
performance or position would be
impacted by a cybersecurity incident to
such an extent as to impede its ability
to perform its duties and responsibilities
to the securitization transaction.’’ 330
The commenter acknowledged that
cybersecurity disclosure rules may make
sense for servicers of asset-backed
securities, but counseled that any new
rules should be tailored to such entities,
rather than applying the proposed
rules.331
We are exempting asset-backed
securities issuers from the final rules.332
We agree with the commenter that the
final rules would not result in
meaningful disclosure by asset-backed
issuers. In particular, we are persuaded
by the fact that asset-backed issuers are
typically special purpose vehicles
whose activities are limited to receiving
or purchasing, and transferring or
selling, assets to an issuing entity 333
and, accordingly, do not own or use
327 Proposing
Release at 16600.
at 16601.
329 See letter from SFA.
330 Id.
331 Id.
332 See General Instruction G to Form 8–K, and
General Instruction J to Form 10–K.
333 See letter from SFA (citing the definitions
contained in 17 CFR 229.1101(b), 17 CFR 230.191,
and 17 CFR 240.3b–19).
328 Id.
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
information systems, whereas the final
rules are premised on an issuer’s
ownership or use of information
systems.334 To the extent that a servicer
or other party to an asset-backed
security transaction is a public
company, it will be required to comply
with the final rules with respect to
information systems it owns or uses.
Therefore, an investor in an assetbacked security who wants to assess the
cybersecurity of transaction parties will
be able to do so for those that are public
companies. The Commission may
consider cybersecurity disclosure rules
specific to asset-backed securities at a
later date.
2. Smaller Reporting Companies
In the Proposing Release, the
Commission did not include an
exemption or alternative compliance
dates or transition accommodations for
smaller reporting companies, but it did
request comment on whether to do
so.335 The Commission noted that
smaller companies may face equal or
greater cybersecurity risk than larger
companies, such that cybersecurity
disclosures may be particularly
important for their investors.336
A few commenters advocated an
exemption for smaller reporting
companies, asserting that they face
outsized costs from the proposal and
lower cybersecurity risk.337 And some
commenters called for a longer
compliance phase-in period for smaller
reporting companies, to help them
mitigate their cost burdens and benefit
from the compliance and disclosure
experience of larger companies.338
334 The definition of ‘‘cybersecurity incident’’
focuses on ‘‘a registrant’s information systems.’’
Likewise, the definition of ‘‘cybersecurity threat’’
concerns ‘‘a registrant’s information systems or any
information residing therein.’’
335 Proposing Release at 16601.
336 Id. at 16613.
337 See letters from BIO; NDIA.
338 See letters from BIO; BDO; NACD; Nasdaq. In
addition, the Commission’s Small Business Capital
Formation Advisory Committee highlights generally
in its parting perspectives letter that ‘‘exemptions,
scaling, and phase-ins for new requirements where
appropriate, allows smaller companies to build
their businesses and balance the needs of
companies and investors while promoting strong
and effective U.S. public markets.’’ See Parting
Perspectives Letter, U.S. Securities and Exchange
Commission Small Business Capital Formation
Advisory Committee (Feb. 28, 2023), available at
https://www.sec.gov/files/committee-perspectivesletter-022823.pdf. See also U.S. Securities and
Exchange Commission Office of the Advocate for
Small Business Capital Formation, Annual Report
Fiscal Year 2022 (‘‘2022 OASB Annual Report’’),
available at https://www.sec.gov/files/2022-oasbannual-report.pdf, at 83 (recommending generally
that in engaging in rulemaking that affects small
businesses, the Commission tailor the disclosure
and reporting framework to the complexity and size
of operations of companies, either by scaling
PO 00000
Frm 00026
Fmt 4701
Sfmt 4700
Other commenters opposed an
exemption for smaller reporting
companies,339 in part because they may
face equal 340 or greater 341 cybersecurity
risk than larger companies, or because
investors’ relative share in a smaller
company may be higher, such that small
companies’ cybersecurity risk ‘‘may
actually embody the most pressing
cybersecurity risk to an investor.’’ 342
Consistent with the proposal, we
decline to exempt smaller reporting
companies. We believe the streamlined
requirements of the final rules will help
reduce some of the costs associated with
the proposal for all registrants,
including smaller reporting companies.
Also, we do not believe that an
additional compliance period is needed
for smaller reporting companies with
respect to Item 106, as this information
is factual in nature regarding a
registrant’s existing cybersecurity
strategy, risk management, and
governance, and so should be readily
available to those companies to assess
for purposes of preparing disclosure.
Finally, given the significant
cybersecurity risks smaller reporting
companies face and the outsized
impacts that cybersecurity incidents
may have on their businesses, their
investors need access to timely
disclosure on material cybersecurity
incidents and the material aspects of
their cybersecurity risk management
and governance. However, we agree
with commenters that stated smaller
reporting companies would likely
benefit from additional time to comply
with the incident disclosure
requirements. Accordingly, as discussed
below, we are providing smaller
reporting companies an additional 180
days from the non-smaller reporting
company compliance date before they
must begin complying with Item 1.05 of
Form 8–K.
H. Need for New Rules and Commission
Authority
Some commenters argued that the
2011 Staff Guidance and 2018
Interpretive Release are sufficient to
compel adequate cybersecurity
disclosure, obviating the need for new
rules.343 In this regard, two commenters
highlighted the Proposing Release’s
statement that cybersecurity disclosures
‘‘have improved since the issuance of
obligations or delaying compliance for the smallest
of the public companies).
339 See letters from CSA; Cybersecurity Coalition;
NASAA; Prof. Perullo; Tenable.
340 See letter from Cybersecurity Coalition.
341 See letters from NASAA and Tenable.
342 See letter from Prof. Perullo.
343 See letters from BPI et al.; CTIA; ISA; ITI; SCG;
SIFMA; Virtu.
E:\FR\FM\04AUR2.SGM
04AUR2
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
the 2011 Staff Guidance and the 2018
Interpretive Release.’’ 344 Another
commenter said that Commission staff’s
findings that certain cybersecurity
incidents were reported in the media
but not disclosed in a registrant’s filings
and that registrants’ disclosures provide
different levels of specificity suggested
that ‘‘existing guidance is working,
because each registrant should always
be conducting an individualized, caseby-case analysis’’ and therefore
disclosures ‘‘should expectedly vary
significantly.’’ 345 One commenter
questioned whether the materials cited
in the Proposing Release support the
Commission’s conclusion there that
current cybersecurity reporting may be
inconsistent, not timely, difficult to
locate, and contain insufficient
detail.346 Two commenters
recommended that the Commission
‘‘reemphasize’’ the prior guidance and
‘‘utilize its enforcement powers to
ensure public companies continue to
report material cyber incidents.’’ 347 One
commenter provided the results from a
survey it conducted of its members,
finding that ‘‘only 10–20% of the 192
respondents reported that their
shareholders have requested
information or asked a question on’’
various cybersecurity topics, while
‘‘64.3% of the respondents indicated
that their investors had not engaged
with them’’ on those topics.348 Another
commenter pointed to a 2022 study
finding that less than 1% of
cybersecurity breaches are ‘‘material,’’
and asserted that current disclosures
adequately reflect such a level of
material breaches.349 Some commenters
also stated that the Commission should
forgo regulation of cybersecurity
disclosure because other agencies’
regulations are sufficient.350
ddrumheller on DSK120RN23PROD with RULES2
344 See
letters from Virtu (citing Proposing
Release at 16594); BPI et al. (pointing to the
Proposing Release’s citation of Stephen Klemash
and Jamie Smith, What companies are disclosing
about cybersecurity risk and oversight, EY (Aug. 10,
2020), available at https://www.ey.com/en_us/
board-matters/whatcompanies-are-disclosingabout-cybersecurity-riskand-oversight).
345 See letter from ITI.
346 See letter from BPI et al. (discussing Moody’s
Investors Service, Research Announcement,
Cybersecurity disclosures vary greatly in high-risk
industries (Oct. 3, 2019); NACD et al., The State of
Cyber-Risk Disclosures of Public Companies (Mar.
2021), at 3).
347 See letters from Virtu; SIFMA.
348 See letter from SCG.
349 See letter from ISA.
350 See, e.g., letters from CTIA (‘‘The wireless
industry is also regulated by the FCC, in several
relevant respects . . . In addition to FCC
requirements, wireless carriers comply with
disclosure obligations under state law, which may
require notices to individual consumers and state
regulators. Providers are also subject to FCC
reporting requirements regarding network
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
Other commenters, by contrast, stated
that the 2011 Staff Guidance and the
2018 Interpretive Release, while helpful,
have not been sufficient to provide
investors with the material information
they need. One such commenter
explained that ‘‘[t]he Commission’s past
guidance, while in line with our views,
does not go far enough. The Proposed
Rule is needed to provide clarity
regarding what, when, and how to
disclose material cybersecurity incident
information . . . The improved
standardization of disclosures included
in the Proposed Rule adds clarity to the
reporting process.’’ 351 Another
commenter stated that ‘‘[t]he lack of
timely, comprehensive disclosure of
material cyber events exposes investors
and the community at large to potential
harm.’’ 352
As the Commission explained in the
Proposing Release, Commission staff has
observed insufficient and inconsistent
cybersecurity disclosure
notwithstanding the prior guidance.353
Here, in response to commenters, we
emphasize that the final rules
supplement the prior guidance but do
not replace it. The final rules are aimed
at remedying the lack of material
cybersecurity incident disclosure, and
the scattered, varying nature of
cybersecurity strategy, risk management,
and governance disclosure, the need for
which some commenters confirmed.354
The final rules therefore add an
affirmative cybersecurity incident
disclosure obligation, and they
centralize cybersecurity risk
management, strategy, and governance
disclosure. While we acknowledge
commenters who noted the
improvements to certain cybersecurityrelated disclosures in response to the
outages.’’); Sen. Portman (‘‘Congress intended that
the Cyber Incident Reporting for Critical
Infrastructure Act be the primary means for
reporting of cyber incidents to the Federal
Government, that such reporting be through CISA,
and that the required rule occupy the space
regarding cyber incident reporting’’); SIFMA
(stating the proposal ‘‘is unwarranted in light of
other, existing regulations and the Commission’s
lack of statutory responsibility for cybersecurity
regulation of public companies’’).
351 See letter from CalPERS. Accord letter from
Better Markets (‘‘Even in instances where a
company discloses relevant cybersecurity incidents,
board and management oversights and abilities, and
policies and procedures in a comprehensive
manner, the information is scattered throughout
various sections of the Form 10–K. While the 2018
guidance adopted by the Commission successfully
identified potential disclosure requirements for
companies to think about when disclosing
cybersecurity risks, governance, and incidents, it
did not solve the problem confronting investors
who must search various sections of the Form 10–
K for the disclosures.’’).
352 See letter from CII.
353 Proposing Release at 16594, 16599, 16603.
354 See supra notes 351 and 352.
PO 00000
Frm 00027
Fmt 4701
Sfmt 4700
51921
2018 Interpretive Release, and we agree
there have been improvements in the
areas that the guidance touched upon,
we note that the guidance does not
mandate consistent or comparable
public disclosure of material incidents
or otherwise address the topics that are
the subject of the final rules. And in
response to commenters who suggested
that other agencies’ rules on
cybersecurity reporting are sufficient,
we note that, unlike the final rules, such
rules are not tailored to the
informational needs of investors;
instead, they focus on the needs of
regulators, customers, and individuals
whose data have been breached.
Accordingly, we believe the final rules
are necessary and appropriate in the
public interest and for the protection of
investors, consistent with the
Commission’s authority.
We also note that the 2018
Interpretive Release remains in place, as
it treats a number of topics not covered
by the new rules. Those topics include,
for instance, incorporating
cybersecurity-related information into
risk factor disclosure under Regulation
S–K Item 105, into management’s
discussion and analysis under
Regulation S–K Item 303, into the
description of business disclosure under
Regulation S–K Item 101, and, if there
is a relevant legal proceeding, into the
Regulation S–K Item 103 disclosure.355
The 2018 Interpretive Release also notes
the Commission’s expectation that,
consistent with Regulation S–X, a
company’s financial reporting and
control systems should be designed to
provide reasonable assurance that
information about the range and
magnitude of the financial impacts of a
cybersecurity incident would be
incorporated into its financial
statements on a timely basis as that
information becomes available.356
With respect to the Commission’s
authority to adopt the final rules, some
commenters asserted that the
Commission does not have the authority
to regulate cybersecurity disclosure.357
These commenters argued that the
Proposing Release did not adequately
explain which statutory provisions the
Commission was relying on to propose
the disclosure requirements, that the
statutory provisions the Commission
did identify do not provide a legal basis
to require the proposed disclosures, that
the release did not show the
requirements were necessary or
appropriate to achieve statutory goals,
355 See
2018 Interpretive Release.
356 Id.
357 See letters from International Association of
Drilling Contractors; NRF; Virtu.
E:\FR\FM\04AUR2.SGM
04AUR2
51922
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
ddrumheller on DSK120RN23PROD with RULES2
and that the requirements implicate the
major questions doctrine and nondelegation principles. Additionally, one
commenter stated that ‘‘Congress
intended that [CIRCIA] be the primary
means for reporting of cyber incidents to
the federal government.’’ 358
We disagree. Disclosure to investors is
a central pillar of the Federal securities
laws. The Securities Act of 1933 ‘‘was
designed to provide investors with full
disclosure of material information
concerning public offerings of
securities.’’ 359 In addition, the
Securities Exchange Act of 1934
imposes ‘‘regular reporting requirements
on companies whose stock is listed on
national securities exchanges.’’ 360
Together, the provisions of the Federal
securities laws mandating release of
information to the market—and
authorizing the Commission to require
additional disclosures—have prompted
the Supreme Court to ‘‘repeatedly’’
describe ‘‘the fundamental purpose’’ of
the securities laws as substituting ‘‘a
philosophy of full disclosure for the
philosophy of caveat emptor.’’ 361 This
bedrock principle of ‘‘[d]isclosure, and
not paternalistic withholding of
accurate information, is the policy
chosen and expressed by Congress.’’ 362
Moreover, ‘‘[u]nderlying the adoption of
extensive disclosure requirements was a
legislative philosophy: ‘There cannot be
honest markets without honest
publicity. Manipulation and dishonest
practices of the market place thrive
upon mystery and secrecy.’’’ 363
358 See letter from Sen. Portman. We address this
comment in Section II.A.3, supra.
359 Ernst & Ernst v. Hochfelder, 425 U.S. 185, 195
(1976); accord Pinter v. Dahl, 486 U.S. 622 (1988)
(‘‘[t]he primary purpose of the Securities Act is to
protect investors by requiring publication of
material information thought necessary to allow
them to make informed investment decisions
concerning public offerings of securities in
interstate commerce’’).
360 Ernst & Ernst, 425 U.S. at 195 (1976); see also
Lawson v. FMR LLC, 571 U.S. 429, 451 (2014)
(referring to the Sarbanes-Oxley Act’s ‘‘endeavor to
‘protect investors by improving the accuracy and
reliability of corporate disclosures made pursuant
to the securities laws’’’ (quoting Sarbanes-Oxley Act
of 2002, Pub. L. 107–204, 116 Stat. 745, 745
(2002))).
361 Lorenzo v. SEC, 139 S. Ct. 1094, 1103 (2019);
accord Santa Fe Indus. v. Green, 430 U.S. 462, 477–
778 (1977); Affiliated Ute Citizens of Utah v. United
States, 406 U.S. 128, 151 (1972); SEC v. Capital
Gains Research Bureau, Inc., 375 U.S. 180, 186
(1963).
362 Basic, 485 U.S. at 234. Congress also legislated
on the core premise that ‘‘public information
generally affects stock prices,’’ Halliburton Co. v.
Erica P. John Fund, Inc., 573 U.S. 258, 272 (2014),
and those prices can significantly affect the
economy, 15 U.S.C. 78b(2) and (3).
363 Basic, 485 U.S. at 230 (quoting H.R. Rep. No.
73–1383, at 11 (1934)); accord SEC v. Zandford, 535
U.S. 813, 819 (2002) (‘‘Among Congress’ objectives
in passing the [Exchange] Act was ‘to insure honest
securities markets and thereby promote investor
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
Several provisions of the Federal
securities laws empower the
Commission to carry out these
fundamental Congressional objectives.
Under the Securities Act, the
Commission has authority to require, in
a publicly filed registration statement,
that issuers offering and selling
securities in the U.S. public capital
markets include information specified
in Schedule A of the Act, including the
general character of the issuer’s
business, the remuneration paid to its
officers and directors, details of its
material contracts and certain financial
information, as well as ‘‘such other
information . . . as the Commission
may by rules or regulations require as
being necessary or appropriate in the
public interest or for the protection of
investors.’’ 364 In addition, under the
Exchange Act, issuers of securities
traded on a national securities exchange
or that otherwise have total assets and
shareholders of record that exceed
certain thresholds must register those
securities with the Commission by filing
a registration statement containing
‘‘[s]uch information, in such detail, as to
the issuer’’ in respect of, among other
things, ‘‘the organization, financial
structure and nature of the [issuer’s]
business’’ as the Commission by rule or
regulation determines to be in the
public interest or for the protection of
investors.365 These same issuers must
also provide ‘‘such information and
documents . . . as the Commission
shall require to keep reasonably current
the information and documents required
to be included in or filed with [a] . . .
registration statement’’ as the
Commission may prescribe as necessary
or appropriate for the proper protection
of investors and to insure fair dealing in
the security.366 Separately, these issuers
also must disclose ‘‘on a rapid and
current basis such additional
information concerning material
changes in the financial condition or
confidence’ after the market crash of 1929’’ (quoting
United States v. O’Hagan, 521 U.S. 642, 658
(1997))); Nat’l Res. Def. Council, Inc. v. SEC, 606
F.2d 1031, 1050 (D.C. Cir. 1979) (the Securities Act
and Exchange Act ‘‘were passed during an
unprecedented economic crisis in which regulation
of the securities markets was seen as an urgent
national concern,’’ and the Commission ‘‘was
necessarily given very broad discretion to
promulgate rules governing corporate disclosure,’’
which is ‘‘evident from the language in the various
statutory grants of rulemaking authority’’).
364 Securities Act Section 7(a)(1) and Schedule A.
365 Exchange Act Sections 12(b) and 12(g).
366 Exchange Act Section 13(a). Other issuers that
are required to comply with the reporting
requirements of Section 13(a) include those that
voluntarily register a class of equity securities
under Exchange Act Section 12(g)(1) and, pursuant
to Exchange Act 15(d), issuers that file a registration
statement under the Securities Act that becomes
effective.
PO 00000
Frm 00028
Fmt 4701
Sfmt 4700
operations of the issuer . . . as the
Commission determines, by rule, is
necessary or useful for the protection of
investors and in the public interest.’’ 367
These grants of authority are
intentionally broad.368 Congress
designed them to give the Commission,
which regulates dynamic aspects of a
market economy, the power and
‘‘flexibility’’ to address problems of
inadequate disclosure as they arose.369
As the United States Court of Appeals
for the District of Columbia Circuit
explained, ‘‘[r]ather than casting
disclosure rules in stone, Congress
opted to rely on the discretion and
expertise of the SEC for a determination
of what types of additional disclosure
would be desirable.’’ 370
The Commission has long relied on
the broad authority in these and other
statutory provisions 371 to prescribe
rules to ensure that the public company
disclosure regime provides investors
with the information they need to make
informed investment and voting
decisions, in each case as necessary or
appropriate in the public interest or for
the protection of investors.372 Indeed,
the Commission’s predecessor
agency,373 immediately upon enactment
of the Securities Act, relied upon such
authority to adopt Form A–1, precursor
367 Exchange
Act Section 13(l).
Natural Resources Defense Council, Inc. v.
SEC, 606 F.2d 1031, 1045 (1979); see also H.R. Rep.
No. 73–1383, at 6–7 (1934).
369 Courts have routinely applied and interpreted
the Commission’s disclosure regulations without
suggesting that the Commission lacked the
authority to promulgate them. See, e.g., SEC v. Life
Partners Holdings, Inc., 854 F.3d 765 (5th Cir. 2017)
(applying regulations regarding disclosure of risks
and revenue recognition); SEC v. Das, 723 F.3d 943
(8th Cir. 2013) (applying Regulation S–K provisions
regarding related-party transactions and executive
compensation); Panther Partners Inc. v. Ikanos
Commc’ns, Inc., 681 F.3d 114 (2d Cir. 2012)
(applying Item 303 of Regulation S–K, which
requires disclosure of management’s discussion and
analysis of financial condition); SEC v. Goldfield
Deep Mines Co., 758 F.2d 459 (9th Cir. 1985)
(applying disclosure requirements for certain legal
proceedings).
370 Natural Resources Defense Council, Inc., 606
F.2d at 1045.
371 Securities Act Section 19(a); Exchange Act
Section 3(b); and Exchange Act Section 23(a).
372 In considering whether a particular item of
disclosure is necessary or appropriate in the public
interest or for the protection of investors, the
Commission considers both the importance of the
information to investors as well as the costs to
provide the disclosure. In addition, when engaged
in rulemaking that requires it to consider or
determine whether an action is necessary or
appropriate in the public interest, the Commission
also must consider, in addition to the protection of
investors, whether the action will promote
efficiency, competition, and capital formation. See
Section 2(b) of the Securities Act and Section 3(f)
of the Exchange Act.
373 Prior to enactment of the Exchange Act, the
Federal Trade Commission was empowered with
administration of the Securities Act.
368 See
E:\FR\FM\04AUR2.SGM
04AUR2
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
ddrumheller on DSK120RN23PROD with RULES2
to today’s Form S–1 registration
statement, to require disclosure of
information including, for example, a
list of states where the issuer owned
property and was qualified to do
business and the length of time the
registrant had been engaged in its
business—topics that are not
specifically enumerated in Schedule A
of the Securities Act.374 Form A–1 also
required disclosures related to legal
proceedings, though there is no direct
corollary in Schedule A.375
Consistent with the statutory scheme
that Congress enacted, the Commission
has continued to amend its disclosure
requirements over time in order to
respond to marketplace developments
and investor needs. Accordingly, over
the last 90 years, the Commission has
eliminated certain disclosure items and
adopted others pursuant to the authority
in Sections 7 and 19(a) of the Securities
Act and Sections 3(b), 12, 13, 15, and
23(a) of the Exchange Act. Those
amendments include the adoption of an
integrated disclosure system in 1982,
which reconciled the various disclosure
items under the Securities Act and the
Exchange Act and was intended to
ensure that ‘‘investors and the
marketplace have been provided with
meaningful, nonduplicative information
upon which to base investment
decisions.’’ 376
In keeping with Congressional intent,
the Commission’s use of its authority
has frequently focused on requiring
disclosures that will give investors
374 Items 3 through 5 of Form A–1; see Release
No. 33–5 (July 6, 1933) [not published in the
Federal Register]. The Commission’s disclosure
requirements no longer explicitly call for this
information.
375 This early requirement called for a statement
of all litigation that may materially affect the value
of the security to be offered, including a description
of the origin, nature, and names of parties to the
litigation. Item 17 of Form A–1. The Commission
has retained a disclosure requirement related to
legal proceedings in both Securities Act registration
statements and in Exchange Act registration
statements and periodic reports. 17 CFR 229.103.
376 See Adoption of Integrated Disclosure System,
Release No. 33–6383 (Mar. 3, 1982) [47 FR 11380
(Mar. 16, 1982)]. Even prior to the adoption of the
integrated disclosure system in 1982, the
Commission addressed anticipated disclosure
issues in particular areas through the use of Guides
for the Preparation and Filing of Registration
Statements. See Proposed Revision of Regulation
S–K and Guides for the Preparation and Filing of
Registration Statements and Reports, Release No.
33–6276 (Dec. 23, 1980) [46 FR 78 (Jan. 2, 1981)]
(discussing the use of Guides); see also Notice of
Adoption of Guide 59 and of Amendments to
Guides 5 and 16 of the Guides for Preparation and
Filing of Registration Statements Under the
Securities Act of 1933, Release No. 33–5396 (Jun.
1, 1973) (discussing, in response to fuel shortages
in 1974, the obligation to disclose any material
impact that potential fuel shortages might have and
adding a new paragraph relating to disclosure by
companies engaged in the gathering, transmission,
or distribution of natural gas).
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
enhanced information about risks facing
registrants. For example, in 1980, the
Commission adopted Item 303 of
Regulation S–K to require registrants to
include in registration statements and
annual reports a management’s
discussion and analysis of financial
condition (‘‘MD&A’’). This discussion is
intended to allow investors to
understand the registrant’s ‘‘financial
condition, changes in its financial
condition and results of operation’’
through the eyes of management.377
Item 303 includes a number of specific
disclosure items, such as requiring the
identification of any known trends or
uncertainties that will result in, or that
are reasonably likely to result in, a
material change to the registrant’s
liquidity,378 a material change in the
mix and relative cost of the registrant’s
capital resources,379 or a material
impact on net sales, revenues, or income
from continuing operations.380 Item 303
also requires registrants to ‘‘provide
such other information that the
registrant believes to be necessary to an
understanding of its financial condition,
changes in financial condition, and
results of operation.’’ 381 The
Commission developed the MD&A
disclosure requirements to supplement
and provide context to the financial
statement disclosures previously
required by the Commission.
A few years later, in 1982, the
Commission codified a requirement that
dated back to the 1940s for registrants
to include a ‘‘discussion of the material
factors that make an investment in the
registrant or offering speculative or
risky,’’ commonly referred to as ‘‘risk
factors.’’ 382 By definition, these
377 See Management’s Discussion and Analysis of
Financial Condition and Results of Operations;
Certain Investment Company Disclosures, Release
No. 33–6231 (Sept. 2, 1980) [45 FR 63630 (Sept. 25,
1980)]; see also 17 CFR 229.303(a).
378 See 17 CFR 229.303(b)(1)(i).
379 See 17 CFR 229.303(b)(1)(ii)(B).
380 See 17 CFR 229.303(b)(2)(ii).
381 17 CFR 229.303(b).
382 See Adoption of Integrated Disclosure System,
Release No. 33–6383 (Mar. 3, 1982) [47 FR 11380
(Mar. 16, 1982)] (‘‘Release No. 33–6383’’) (codifying
the risk factor disclosure requirement as Item 503(c)
of Regulation S–K); see also 17 CFR 229.105(a).
Prior to 1982, the Commission stated in guidance
that, if the securities to be offered are of a highly
speculative nature, the registrant should provide ‘‘a
carefully organized series of short, concise
paragraphs summarizing the principal factors that
make the offering speculative.’’ See Release No. 33–
4666 (Feb. 7, 1964) [29 FR 2490 (Feb. 15, 1964)].
A guideline to disclose a summary of risk factors
relating to an offering was first set forth by the
Commission in 1968 and included consideration of
five factors that may make an offering speculative
or risky, including with respect to risks involving
‘‘a registrant’s business or proposed business.’’ See
Guide 6, in Guides for the Preparation and Filing
of Registration Statements, Release No. 33–4936
PO 00000
Frm 00029
Fmt 4701
Sfmt 4700
51923
disclosures encompass a discussion of
risks, or prospective future events or
losses, that might affect a registrant or
investment. The initial risk factor
disclosure item provided examples of
possible risk factors, such as the absence
of an operating history of the registrant,
an absence of profitable operations in
recent periods, the nature of the
business in which the registrant is
engaged or proposes to engage, or the
absence of a previous market for the
registrant’s common equity.383
In subsequent years, the Commission
expanded both the scope of risks about
which registrants must provide
disclosures and the granularity of those
disclosures. For example, in 1997, the
Commission first required registrants to
disclose quantitative information about
market risk.384 That market risk
disclosure included requirements to
present ‘‘separate quantitative
information . . . to the extent material’’
for different categories of market risk,
such as ‘‘interest rate risk, foreign
currency exchange rate risk, commodity
price risk, and other relevant market
risks, such as equity price risk.’’ 385
Under these market risk requirements,
registrants must also disclose various
metrics such as ‘‘value at risk’’ and
‘‘sensitivity analysis disclosures.’’ In
addition, registrants must provide
certain qualitative disclosures about
market risk, to the extent material.386
Each of these disclosure items reflects
the Commission’s long-standing view
that understanding the material risks
faced by a registrant and how the
registrant manages those risks can be
just as important to assessing its
business operations and financial
condition as knowledge about its
physical assets or material contracts.
Indeed, investors may be unable to
assess the value of those assets or
contracts adequately without
appreciating the material risks to which
they are subject.387
(Dec. 9, 1968) [33 FR 18617 (Dec. 16, 1968)]
(‘‘Release No. 33–4936’’).
383 See Release No. 33–6383.
384 See Disclosure of Accounting Policies for
Derivative Financial Instruments and Derivative
Commodity Instruments and Disclosure of
Quantitative and Qualitative Information About
Market Risk Inherent in Derivative Financial
Instruments, Other Financial Instruments, and
Derivative Commodity Instruments, Release No. 33–
7386 (Jan. 31, 1997) [62 FR 6044 (Feb. 10, 1997)]
(‘‘Release No. 33–7386’’) (‘‘In light of those losses
and the substantial growth in the use of market risk
sensitive instruments, the adequacy of existing
disclosures about market risk emerged as an
important financial reporting issue.’’); see also 17
CFR 229.305.
385 17 CFR 229.305(a)(1).
386 See 17 CFR 229.305(b).
387 As early as the 1940s, the Commission issued
stop order proceedings under Section 8(d) of the
E:\FR\FM\04AUR2.SGM
Continued
04AUR2
51924
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
ddrumheller on DSK120RN23PROD with RULES2
In addition to risk-focused
disclosures, over the decades, the
Commission has also required
registrants to provide information on a
diverse range of topics that emerged as
significant to investment or voting
decisions, such as the extent of the
board’s role in the risk oversight of the
registrant,388 the effectiveness of a
registrant’s disclosure controls and
procedures,389 related-party
transactions,390 corporate
governance,391 and compensation
discussion and analysis,392 among many
other topics, including on topics related
to particular industries,393 offering
structures,394 and types of
transactions.395 In all these instances,
the Commission’s exercise of its
authority was guided by the baseline of
the specific disclosures articulated by
Congress. But, as Congress expressly
authorized,396 the Commission’s
exercise of its disclosure authority has
not been narrowly limited to those
statutorily prescribed disclosures—
instead, it has been informed by both
those disclosures and the need to
protect investors.397 Many of these
disclosures have since become essential
elements of the public company
reporting regime that Congress
established.
To ensure the transparency that
Congress intended when it authorized
the Commission to promulgate
disclosure regulations in the public
interest or to protect investors,398 the
Securities Act in which the Commission suspended
the effectiveness of previously filed registration
statements due, in part, to inadequate disclosure
about speculative aspects of the registrant’s
business. See In the Matter of Doman Helicopters,
Inc., 41 S.E.C. 431 (Mar. 27, 1963); In the Matter of
Universal Camera Corp., 19 S.E.C. 648 (June 28,
1945); see also Release No. 33–4936.
388 See 17 CFR 229.407.
389 See 17 CFR 229.307.
390 17 CFR 229.404.
391 17 CFR 229.407.
392 17 CFR 229.402.
393 See 17 CFR 229.1200–1208 (Disclosure by
Registrants Engaged in Oil and Gas Activities); 17
CFR 1300–1305 (Disclosure by Registrants Engaged
in Mining Operations); 17 CFR 1400–1406
(Disclosure by Bank and Savings and Loan
Registrants).
394 See 17 CFR Subpart 1100 (Asset-Backed
Securities).
395 See 17 CFR subpart 900 (Roll-Up
Transactions); 17 CFR 229.1000–1016 (Mergers and
Acquisitions).
396 See supra notes 364 to 366 and accompanying
text.
397 For example, Item 303(b)(2) of Regulation S–
K calls for information well beyond the basic profit
and loss statement specified in Schedule A by
requiring issuers to disclose any unusual or
infrequent events or transactions or any significant
economic changes that materially affected the
amount of reported income—and the extent to
which income was so affected—so that investors
can better understand the reported results of
operations.
398 See supra notes 368 to 370 and accompanying
text.
VerDate Sep<11>2014
19:53 Aug 03, 2023
Jkt 259001
Commission’s regulations must—as they
have over time—be updated to account
for changing market conditions, new
technologies, new transaction
structures, and emergent risks. In this
regard, we disagree with one
commenter’s assertion that the
Commission’s disclosure authority is
‘‘limited to specific types of information
closely related to the disclosing
company’s value and financial
condition.’’ 399 The commenter
misstates the scope and nature of the
Commission’s authority. There is a
wealth of information about a company
apart from that which appears in the
financial statements that is related to a
company’s value and financial
condition, including the material risks
(cybersecurity and otherwise) a
company faces. Nor did Congress dictate
that the Commission limit disclosures
only to information that is ‘‘closely
related’’ to a company’s ‘‘value and
financial condition.’’ By also
empowering the Commission to require
‘‘such other information . . . as the
Commission may by rules or regulations
require as being necessary or
appropriate in the public interest or for
the protection of investors,’’ 400
Congress recognized that there is
information that is vital for investors to
understand in making informed
investment decisions but does not
directly relate to a company’s value and
financial condition.401
The narrow reading of the
Commission’s authority advocated by
the commenter would foreclose many of
these longstanding elements of
disclosure that market participants have
come to rely upon for investor
protection and fair dealing of
securities.402 Moreover, Congress itself
has amended, or required the
Commission to amend, the Federal
securities laws many times. But
Congress has not restricted the
Commission’s disclosure authority;
rather, Congress has typically sought to
further expand and supplement that
authority with additional mandated
disclosures.
We also reject the commenter’s
suggestion that the final rules are an
attempt to ‘‘usurp the undelegated role
of maintaining cyber safety in
America.’’ 403 The final rules are
399 See
letter from NRF.
Act Section 7(a).
401 For example, Schedule A calls for information
regarding, among other things: the names of the
directors or persons performing similar functions,
the disclosure of owners of record of more than
10% of any class of stock of an issuer; commissions
paid to underwriters; the renumeration paid to
directors and certain officers; and information about
certain material contracts.
402 See letter from NRF.
403 Id.
400 Securities
PO 00000
Frm 00030
Fmt 4701
Sfmt 4700
indifferent as to whether and to what
degree a registrant may have identified
and chosen to manage a cybersecurity
risk. Rather, the final rules reflect the
reality, as acknowledged by the same
commenter, that ‘‘[c]ybersecurity is . . .
an area of growing importance to
companies across the world.’’ 404 When
those companies seek to raise capital
from investors in U.S. public markets,
we believe it is appropriate that they
share information about whether and, if
so, how they are managing material
cybersecurity risks so that investors can
make informed investment and voting
decisions consistent with their risk
tolerance and investment objectives.
Finally, with respect to the
commenter’s contention that a broad
reading of the Commission’s disclosure
authority could raise separation of
powers concerns,405 we note that a
statutory delegation is constitutional as
long as Congress lays down by
legislative act an intelligible principle to
which the person or body authorized to
exercise the delegated authority is
directed to conform.406 In this instance,
Congress has required that any new
disclosure requirements be ‘‘necessary
or appropriate in the public interest or
for the protection of investors,’’ 407
which has guided the Commission’s
rulemaking authority for nearly a
century. We therefore believe that the
final rules are fully consistent with
constitutional principles regarding
separation of powers.
I. Compliance Dates
The final rules are effective
September 5, 2023. With respect to Item
106 of Regulation S–K and item 16K of
Form 20–F, all registrants must provide
such disclosures beginning with annual
reports for fiscal years ending on or after
December 15, 2023. With respect to
compliance with the incident disclosure
requirements in Item 1.05 of Form 8–K
and in Form 6–K, all registrants other
than smaller reporting companies must
begin complying on DECEMBER 18,
2023. As discussed above, smaller
reporting companies are being given an
additional 180 days from the nonsmaller reporting company compliance
date before they must begin complying
with Item 1.05 of Form 8–K, on June 15,
2024.
404 Id.
405 Id.
406 Gundy
v. U.S., 139 S. Ct. 2116, 2123 (plurality
op.).
407 See Securities Act Section 19(a) and Exchange
Act Section 23(a); accord Nat’l Res. Def. Council,
606 F.2d at 1045, 1050–52.
E:\FR\FM\04AUR2.SGM
04AUR2
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
With respect to compliance with the
structured data requirements, as noted
above, all registrants must tag
disclosures required under the final
rules in Inline XBRL beginning one year
after the initial compliance date for any
issuer for the related disclosure
requirement. Specifically:
• For Item 106 of Regulation S–K and
item 16K of Form 20–F, all registrants
must begin tagging responsive
disclosure in Inline XBRL beginning
with annual reports for fiscal years
ending on or after December 15, 2024;
and
• For Item 1.05 of Form 8–K and
Form 6–K all registrants must begin
tagging responsive disclosure in Inline
XBRL beginning on DECEMBER 18,
2024.
III. Other Matters
If any of the provisions of these rules,
or the application thereof to any person
or circumstance, is held to be invalid,
such invalidity shall not affect other
provisions or application of such
provisions to other persons or
circumstances that can be given effect
without the invalid provision or
application.
Pursuant to the Congressional Review
Act, the Office of Information and
Regulatory Affairs has designated these
rules as not a ‘‘major rule,’’ as defined
by 5 U.S.C. 804(2).
ddrumheller on DSK120RN23PROD with RULES2
IV. Economic Analysis
A. Introduction
We are mindful of the costs imposed
by, and the benefits to be obtained from,
our rules. Section 2(b) of the Securities
Act 408 and Section 3(f) of the Exchange
Act 409 direct the Commission, when
engaging in rulemaking where it is
required to consider or determine
whether an action is necessary or
appropriate in the public interest, to
consider, in addition to the protection of
investors, whether the action will
promote efficiency, competition, and
capital formation. Further, Section
23(a)(2) of the Exchange Act 410 requires
the Commission, when making rules
under the Exchange Act, to consider the
impact that the rules would have on
competition, and prohibits the
Commission from adopting any rule that
would impose a burden on competition
not necessary or appropriate in
furtherance of the Exchange Act. The
discussion below addresses the
economic effects of the final rules,
including the likely benefits and costs,
as well as the likely effects on
408 15
U.S.C. 77b(b).
U.S.C. 78c(f).
410 15 U.S.C. 78w(a)(2).
409 15
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
efficiency, competition, and capital
formation.
Where possible, we have attempted to
quantify the benefits, costs, and effects
on efficiency, competition, and capital
formation expected to result from the
final rules. In some cases, however, we
are unable to quantify the potential
economic effects because we lack
information necessary to provide a
reasonable estimate. For example, we
lack the data to estimate any potential
decrease in mispricing that might result
from the rule, because we do not know
how registrants’ disclosures of
cybersecurity risk and governance will
change or which cybersecurity incidents
that would go undisclosed under the
current guidance will be disclosed
under the final rules. Where we are
unable to quantify the economic effects
of the final rules, we provide a
qualitative assessment of the effects, and
of the impacts of the final rule on
efficiency, competition, and capital
formation. To the extent applicable, the
views of commenters relevant to our
analysis of the economic effects, costs,
and benefits of these rules are included
in the discussion below.
While cybersecurity incident
disclosure has become more frequent
since the issuance of the 2011 Staff
Guidance and 2018 Interpretive Release,
there is concern that variation persists
in the timing, content, and format of
registrants’ existing cybersecurity
disclosure, and that such variation may
harm investors (as further discussed
below).411 When disclosures about
cybersecurity breaches are made, they
may not be timely or consistent.
Because of the lack of consistency in
when and how companies currently
disclose incidents, it is difficult to
assess quantitatively the timeliness of
disclosures under current practices.
According to Audit Analytics data, in
2021, it took on average of 42 days for
companies to discover breaches, and
then it took an average of 80 days and
a median of 56 days for companies to
disclose a breach after its discovery.412
These data do not tell us when
411 See supra Section I. See also supra note 18
and accompanying text; Eli Amir, Shai Levi, &
Tsafrir Livne, Do Firms Underreport Information on
Cyber-Attacks? Evidence from Capital Markets, 23
Rev. Acct. Stud. 1177 (2018).
412 Audit Analytics, Trends in Cybersecurity
Breaches (Apr. 2022), available at https://
www.auditanalytics.com/doc/AA_Trends_in_
Cybersecurity_Report_April_2022.pdf (‘‘Audit
Analytics’’) (looking specifically at disclosures by
companies with SEC filing requirements and stating
that: ‘‘[c]ybersecurity breaches can result in a litany
of costs, such as investigations, legal fees, and
remediation. There is also the risk of economic and
reputational costs that can directly impact financial
performance, such as reduced revenue due to lost
sales.’’).
PO 00000
Frm 00031
Fmt 4701
Sfmt 4700
51925
disclosure occurs relative to companies’
materiality determinations. That said,
the report notes that some breaches
were disclosed for the first time to
investors in periodic reports, the timing
of which are unrelated to the timing of
the incident or the company’s
assessment of the materiality of the
incident. This implies at least some
cybersecurity incident disclosures were
not timely with respect to determination
of materiality. Because cybersecurity
incidents can significantly affect
registrants’ stock prices, delayed
disclosure results in mispricing of
securities, harming investors.413
Incident disclosure practices, with
respect to both location and content,
currently vary across registrants. For
example, some registrants disclose
incidents through Form 10–K, others
Form 8–K, and still others on a
company website, or in a press release.
Some disclosures do not discuss
whether the cybersecurity incident had
material impact on the company.414
Additionally, evidence suggests
registrants may be underreporting
cybersecurity incidents.415 More timely,
informative, and standardized
disclosure of material cybersecurity
incidents may help investors to assess
an incident’s impact better.
While disclosures about cybersecurity
risk management, strategy, and
governance have been increasing at least
since the issuance of the 2018
Interpretive Release, they are not
currently provided by all registrants.
Despite the increasing prevalence of
references to cybersecurity risks in
disclosures, however, registrants do not
consistently or uniformly disclose
information related to cybersecurity risk
management, strategy, and
governance.416 Registrants currently
make such disclosures in varying
sections of a company’s periodic and
current reports, such as in risk factors,
in management’s discussion and
analysis, in a description of business
and legal proceedings, or in financial
statement disclosures, and sometimes
include them with other unrelated
disclosures.417 One commenter noted
413 See Shinichi Kamiya, et al., Risk Management,
Firm Reputation, and the Impact of Successful
Cyberattacks on Target Firms, 139 J. Fin. Econ. 721
(2021).
414 Based on staff analysis of the current and
periodic reports in 2022 for companies identified by
having been affected by a cybersecurity incident.
415 See Bitdefender, supra note 18 and
accompanying text.
416 See supra Section II.C.1.b. and c.; see also
letter from Better Markets.
417 See Proposing Release at 16606 (Table 1.
Incidence of Cybersecurity-Related Disclosures by
10–K Location).
E:\FR\FM\04AUR2.SGM
04AUR2
51926
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
that current disclosure is ‘‘piecemeal’’
in nature and that the varying content
and placement make it difficult for
investors and other market participants
to locate and understand the
cybersecurity risks that registrants face
and their preparedness for an attack,
and to make comparisons across
registrants.418
As we discuss in more detail below,
some commenters supported the
proposed rule. Specifically, one
commenter noted that markets
responded negatively to delayed
cybersecurity disclosures, suggesting
that timeliness in disclosing incidents is
valuable to investors.419 Further, some
academic commenters submitted papers
that they authored finding that evidence
suggests that companies experiencing
data breaches subsequently experience
higher borrowing costs.420 On the other
hand, other commenters contended that
the proposed rules would hinder capital
formation, particularly for small
registrants,421 or that a more costeffective alternative to the proposed
rules would be to look to existing rules
to elicit relevant disclosures, as
articulated by the 2011 Staff Guidance
and the 2018 Interpretive Release.422
Several commenters pointed out that the
proposed disclosures on cybersecurity
risk management, strategy, and
governance might be overly prescriptive
and would potentially provide a
roadmap for threat actors, and that these
rules could increase, not decrease
costs.423 In response to those comments,
these provisions have been modified in
the final rule, which should reduce the
perceived risk of providing a roadmap
for threat actors compared with the
proposal.
B. Economic Baseline
1. Current Regulatory Framework
To assess the economic impact of the
final rules, the Commission is using as
its baseline the existing regulatory
framework and market practice for
cybersecurity disclosure. Although a
number of Federal and State rules and
regulations obligate registrants to
disclose cybersecurity risks and
incidents in certain circumstances, the
ddrumheller on DSK120RN23PROD with RULES2
418 See
letter from Better Markets.
letter from Prof. Choudhary.
420 See letters from Profs. Huang & Wang; Prof.
Sheneman.
421 See letter from BIO.
422 See letter from NRF.
423 See letters from ABA; ACLI; APCIA; BIO; BPI
et al.; Business Roundtable; Chamber; CSA; CTIA;
EIC; Enbridge; FAH; Federated Hermes; GPA; ITI;
ISA; Nareit; NAM; NMHC; NRA; NRF; SIFMA; Sen.
Portman; TechNet; TransUnion; USTelecom; Virtu.
419 See
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
Commission’s regulations currently do
not explicitly address cybersecurity.424
As noted in the Proposing Release,
cybersecurity threats and incidents
continue to increase in prevalence and
seriousness, posing an ongoing and
escalating risk to public registrants,
investors, and other market
participants.425 The number of reported
breaches disclosed by public companies
has increased almost 600 percent over
the last decade, from 28 in 2011 to 131
in 2020 and 188 in 2021.426 Although
estimating the total cost of cybersecurity
incidents is difficult, as many events
may be unreported, some estimates put
the economy-wide total costs as high as
trillions of dollars per year in the U.S.
alone.427 The U.S. Council of Economic
Advisers estimated that in 2016 the total
cost of cybersecurity incidents was
between $57 billion and $109 billion, or
between 0.31 and 0.58 percent of U.S.
GDP in that year.428 A more recent
estimate suggests the average cost of a
data breach in the U.S. is $9.44
million.429 Executives, boards of
directors, and investors remain focused
on the emerging risk of cybersecurity. A
2022 survey of bank Chief Risk Officers
found that they identified managing
cybersecurity risk as the top strategic
risk.430 In 2022, a survey of audit
424 See Proposing Release at 16593–94 for a
detailed discussion of the existing regulatory
framework.
425 Unless otherwise noted, when we discuss the
economic effects of the final rules on ‘‘other market
participants,’’ we mean those market participants
that typically provide services for investors and
who rely on the information in companies’ filings
(such as financial analysts, investment advisers,
and portfolio managers).
426 Audit Analytics, supra note 412.
427 See Cybersecurity & Infrastructure Sec.
Agency, Cost of a Cyber Incident: Systemic Review
and Cross-Validation (Oct. 26, 2020), available at
https://www.cisa.gov/sites/default/files/
publications/CISA-OCE_Cost_of_Cyber_Incidents_
Study-FINAL_508.pdf (based on a literature review
of publications discussing incidents that occurred
in the United States or to U.S.-based companies).
428 Council of Econ. Advisers, The Cost of
Malicious Cyber Activity to the U.S. Economy (Feb.
2018), available at https://
trumpwhitehouse.archives.gov/articles/cea-reportcost-malicious-cyber-activity-u-s-economy/
(estimating total costs, rather than costs of only
known and disclosed incidents).
429 Ponemon Institute & IBM Security, Cost of a
Data Breach Report 2022 (July 2022), available at
https://www.ibm.com/downloads/cas/3R8N1DZJ
(estimating based on analysis of 550 organizations
impacted by data breaches that occurred between
Mar. 2021 and Mar. 2022).
430 EY and Institute of International Finance, 12th
Annual EY/IIF Global Bank Risk Management
Survey, at 14 (2022), available at https://
www.iif.com/portals/0/Files/content/32370132_eyiif_global_bank_risk_management_survey_2022_
final.pdf (stating 58% of surveyed banks’ Chief Risk
Officers cite ‘‘inability to manage cybersecurity
risk’’ as the top strategic risk). See also EY, EY CEO
Imperative Study (July 2019), available at https://
assets.ey.com/content/dam/ey-sites/ey-com/en_gl/
PO 00000
Frm 00032
Fmt 4701
Sfmt 4700
committee members again identified
cybersecurity as a top area of focus in
the coming year.431
In 2011, the Division of Corporation
Finance issued interpretive guidance
providing the Division’s views
concerning operating registrants’
disclosure obligations relating to
cybersecurity risks and incidents.432
This 2011 Staff Guidance provided an
overview of existing disclosure
obligations that may require a
discussion of cybersecurity risks and
cybersecurity incidents, along with
examples of potential disclosures.433
Building on the 2011 Staff Guidance,
the Commission issued the 2018
Interpretive Release to assist operating
companies in preparing disclosure
about cybersecurity risks and incidents
under existing disclosure rules.434 In the
2018 Interpretive Release, the
Commission reiterated that registrants
must provide timely and ongoing
information in periodic reports (Form
10–Q, Form 10–K, and Form 20–F)
about material cybersecurity risks and
incidents that trigger disclosure
obligations.435 Additionally, the 2018
Interpretive Release encouraged
registrants to continue to use current
reports (Form 8–K or Form 6–K) to
disclose material information promptly,
including disclosure pertaining to
cybersecurity matters.436 Further, the
2018 Interpretive Release noted that to
the extent cybersecurity risks are
material to a registrant’s business, the
Commission believes that the required
disclosure of the registrant’s risk
oversight should include the nature of
the board’s role in overseeing the
management of that cybersecurity
risk.437 The 2018 Interpretive Release
also stated that a registrant’s controls
and procedures should enable it to,
among other things, identify
cybersecurity risks and incidents and
make timely disclosures regarding such
risks and incidents.438 Finally, the 2018
Interpretive Release highlighted the
importance of insider trading
topics/growth/ey-ceo-imperative-exec-summ-singlespread-final.pdf.
431 Center for Audit Qual. & Deloitte, Audit
Committee Practices Report: Priorities and
Committee Composition (Jan. 2023) available at
https://www.thecaq.org/audit-committee-practicesreport-2023/. See also Center for Audit Qual. &
Deloitte, Audit Committee Practices Report:
Common Threads Across Audit Committees (Jan.
2022), available at https://www.thecaq.org/2022-acpractices-report/.
432 See 2011 Staff Guidance.
433 Id.
434 See 2018 Interpretive Release.
435 Id. at 8168–8170.
436 Id. at 8168.
437 Id. at 8170.
438 Id. at 8171.
E:\FR\FM\04AUR2.SGM
04AUR2
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
prohibitions and the need to refrain
from making selective disclosures of
cybersecurity risks or incidents.439
In keeping with existing obligations,
companies are increasingly
acknowledging cybersecurity risks in
their disclosures. One analysis of
disclosures made by Fortune 100
companies that filed 10-Ks and proxy
statements found 95 percent of those
companies disclosed a focus on
cybersecurity risk in the risk oversight
section of their proxy statements filed in
the period ending in May 2022, up from
89 percent of filings in 2020 and 76
percent in 2018.440 Disclosures of efforts
to mitigate cybersecurity risk were
found in 99 percent of proxy statements
or Forms 10–K, up from 93 percent in
2020 and 85 percent in 2018.441 The
Fortune 100 list is composed of the
highest-revenue companies in the
United States. As discussed later in this
economic analysis, we observed the
overall rate of disclosure across not just
the largest, but all filers, approximately
8,400, to be approximately 73
percent.442 Further, one commenter
noted that current disclosures are
‘‘scattered and unpredictable’’ rather
than ‘‘uniform,’’ which ‘‘diminishes
their effectiveness,’’ and so the final rule
should improve investors’ ability to find
and compare disclosures.443
Registrants currently are and may
continue to be subject to other
cybersecurity incident disclosure
requirements developed by various
industry regulators and contractual
counterparties. As discussed in Section
II, CIRCIA was passed in March 2022
and requires CISA to develop and issue
regulations on cybersecurity reporting.
As set forth in CIRCIA, once those
regulations are adopted, covered entities
will have 72 hours to report covered
cybersecurity incidents to CISA and will
also be required to report a ransom
payment as the result of a ransomware
attack within 24 hours of the payment
being made.444 In addition, Federal
contractors may be required to monitor
and report cybersecurity incidents and
439 Id.
at 8171–8172.
EY Ctr for Bd Matters, How Cyber
Governance and Disclosures are Closing the Gaps
in 2022 (Aug. 2022), available at https://
www.ey.com/en_us/board-matters/how-cybergovernance-and-disclosures-are-closing-the-gaps-in2022.
441 Id.
442 See infra note 456 (describing textual analysis)
and accompanying text.
443 See letter from Better Markets. Although
uniformity should improve investors’ ability to find
and compare disclosures, within that structure the
final rule allows customization to capture
complexity and avoid unnecessarily simplifying
issues for the sake of standardization.
444 6 U.S.C. 681b. See also supra notes 21 to 23
and accompanying text.
ddrumheller on DSK120RN23PROD with RULES2
440 See
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
breaches or face liability under the False
Claims Act.445 An FCC rule directs
covered telecommunications providers
on how and when to disclose breaches
of certain customer data.446 HIPAA
requires covered entities and their
business associates to provide
notification following a breach of
unsecured protected health
information.447 Similar rules require
vendors of personal health records and
related entities to report data breaches
to affected individuals and the FTC.448
All 50 states have data breach laws that
require businesses to notify individuals
of security breaches involving their
personally identifiable information.449
There are other rules that registrants
must follow in international
jurisdictions. For example, in the
European Union, the General Data
Protection Regulation mandates
disclosure of cybersecurity breaches.450
These other cybersecurity incident
disclosure requirements may cover
some of the material incidents that
registrants will need to disclose under
the final rules. However, not all
registrants are subject to each of these
other incident disclosure requirements
and the timeliness and public reporting
elements of these requirements vary,
making it difficult for investors and
other market participants to be alerted
to the breaches and to gain an adequate
understanding of the impact of such
incidents on a registrant.
Some registrants are also subject to
other mandates regarding cybersecurity
445 See Dep’t of Justice, Office of Pub. Affairs,
Justice News: Deputy Attorney General Lisa O.
Monaco Announces New Civil Cyber-Fraud
Initiative, (Oct. 6, 2021), available at https://
www.justice.gov/opa/pr/deputy-attorney-generallisa-o-monaco-announces-new-civil-cyber-fraudinitiative; see, e.g., FAR 52.239–1 (requiring
contractors to ‘‘immediately’’ notify the Federal
Government if they become aware of ‘‘new or
unanticipated threats or hazards . . . or if existing
safeguards have ceased to function’’).
446 See 47 CFR 64.2011; see also supra Section
II.A.3.
447 See 45 CFR 164.400 through 414 (Notification
in the Case of Breach of Unsecured Protected Health
Information).
448 See 16 CFR 318 (Health Breach Notification
Rule).
449 Note that there are carve-outs to these rules,
and not every company may fall under any
particular rule. See Nat’l Conference of State
Legislatures, Security Breach Notification Laws
(updated Jan. 17, 2022), available at https://
www.ncsl.org/technology-and-communication/
security-breach-notification-laws.
450 See Regulation (EU) 2016/679, of the European
Parliament and the Council of 27 Apr. 2016 on the
protection of natural persons with regard to the
processing of personal data and on the free
movement of such data, and repealing Directive 95/
46/EC (General Data Protection Regulation), arts. 33
(Notification of a personal data breach to the
supervisory authority), 34 (Communication of a
personal data breach to the data subject), 2016 O.J.
(L 119) 1 (‘‘GDPR’’).
PO 00000
Frm 00033
Fmt 4701
Sfmt 4700
51927
risk management, strategy, and
governance. For instance, government
contractors may be subject to the
Federal Information Security
Modernization Act, and use the NIST
framework to manage information and
privacy risks.451 Certain financial
institutions may be subject to the FTC’s
Standards for Safeguarding Customer
Information Rule, requiring an
information security program, including
a qualified individual to oversee the
security program, and the provision of
periodic reports on the cybersecurity
program to a company’s board of
directors or equivalent governing
body.452 Under HIPAA regulations,
covered entities are subject to rules that
require protection against reasonably
anticipated threats to electronic
protected health information.453
International jurisdictions also have
cybersecurity risk mitigation measures
and governance requirements (see, for
example, the GDPR).454 These rules and
regulations provide varying standards
and requirements for disclosing
cybersecurity risk management, strategy,
and governance, and may not provide
investors with public or clear and
comparable disclosure regarding how a
particular registrant manages its
cybersecurity risk profile.
2. Affected Parties
The parties that are likely to be
affected by the final rules include
investors, registrants, other market
participants that use the information
provided in company filings (such as
financial analysts, investment advisers,
and portfolio managers), and external
stakeholders such as consumers and
other companies in the same industry as
affected companies.
We expect the final rules to affect all
registrants with relevant disclosure
obligations on Forms 10–K, 20–F, 8–K,
or 6–K. This includes (1) approximately
7,300 operating companies filing on
domestic forms (of which,
approximately 120 are business
development companies) and (2) 1,174
FPIs filing on foreign forms, based on all
companies that filed such forms or an
amendment thereto during calendar
451 See NIST, NIST Risk Management Framework
(updated Jan. 31, 2022), available at https://
csrc.nist.gov/projects/risk-management/fismabackground.
452 See 16 CFR 314.
453 See 45 CFR 164 (Security and Privacy); see
also supra Section II.A.3.
454 See, e.g., GDPR, arts. 32 (Security of
processing), 37 (Designation of the data protection
officer).
E:\FR\FM\04AUR2.SGM
04AUR2
51928
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
year 2022.455 Our textual analysis 456 of
all calendar year 2022 Form 10–K filings
and amendments reveals that
approximately 73 percent of domestic
filers made some kind of cybersecurityrelated disclosures, whether of
incidents, risk, or governance.
We also analyzed calendar year 2022
Form 8–K and Form 6–K filings. There
were 71,505 Form 8–K filings in 2022,
involving 7,416 filers, out of which 35
filings reported material cybersecurity
incidents.457 Similarly, there were
27,296 Form 6–K filings in 2022,
involving 1,161 filers, out of which 22
filings reported material cybersecurity
incidents.
C. Benefits and Costs of the Final Rules
The final rules will benefit investors,
registrants, and other market
participants, such as financial analysts,
investment advisers, and portfolio
managers, by providing more timely and
informative disclosures relating to
cybersecurity incidents and
cybersecurity risk management, strategy,
and governance, facilitating investor
decision-making and reducing
information asymmetry in the market.
The final rules also will entail costs. A
discussion of the anticipated economic
costs and benefits of the final rules is set
forth in more detail below. We first
discuss benefits, including benefits to
investors and other market participants.
We subsequently discuss costs,
including the cost of compliance with
the final rules. We conclude with a
discussion of indirect economic effects
on investors, external stakeholders such
as consumers, and companies in the
same industry with registrants subject to
this rule, or those facing similar
cybersecurity threats.
ddrumheller on DSK120RN23PROD with RULES2
1. Benefits
Existing shareholders, and those
seeking to purchase shares in registrants
subject to the final rules, will be the
main beneficiaries of the enhanced
disclosure of both cybersecurity
incidents and cybersecurity risk
management, strategy, and governance
as a result of the final rules.
455 Estimates of affected companies here are based
on the number of unique CIKs with at least one
periodic report, current report, or an amendment to
one of the two filed in calendar year 2022.
456 In performing this analysis, staff executed
computer program-based keyword (and
combination of key words) searches. This analysis
covered 8,405 Forms 10–K and 10–K/A available in
Intelligize (a division of RELX Inc.) filed in calendar
year 2022 by 7,486 companies as identified by
unique CIK.
457 The number of filers in our sample is larger
than the number of estimated affected parties
because, among other reasons, it includes 8–K
filings by companies that have not yet filed their
first annual report.
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
Specifically, investors will benefit
because: (1) more informative and
timely disclosure will improve investor
decision-making by allowing investors
to better understand a registrant’s
material cybersecurity incidents,
material cybersecurity risks, and ability
to manage such risks, reducing
information asymmetry and the
mispricing of securities in the market;
and (2) more uniform and comparable
disclosures will lower search costs and
information processing costs. Other
market participants that rely on
financial statement information to
provide services to investors, such as
financial analysts, investment advisers,
and portfolio managers, will also
benefit.
a. More Timely and Informative
Disclosure
The final rules provide more timely
and informative disclosures, relative to
the current disclosure environment,
which will allow investors to better
understand registrants’ cybersecurity
incidents, risks, and ability to manage
such risks as well as reduce mispricing
of securities in the market. Timeliness
benefits to investors will result from the
requirement to disclose cybersecurity
incidents within four business days of
determining an incident was material,
as well as the requirement to amend the
disclosure to reflect material changes.
Information benefits to investors will
result from the disclosure of both (1)
cybersecurity incidents and (2)
cybersecurity risk management, strategy,
and governance. Together, the
timeliness and information benefits
created by the final rules will reduce
market mispricing and information
asymmetry and potentially lower firms’
cost of capital.
We anticipate Item 1.05, governing
cybersecurity incident disclosure on
Form 8–K, will lead to more timely
disclosure to investors.458 Currently,
there is not a specific requirement for a
registrant to disclose a cybersecurity
incident to investors in a timely manner
after its discovery and determination of
material impact.459 Item 1.05’s
requirement to disclose a material
cybersecurity incident on Form 8–K
within four business days after
determining the incident is material will
improve the overall timeliness of the
disclosure offered to investors—
disclosure that is relevant to the
valuation of registrants’ securities. It is
well-documented in the academic
literature that the market reacts
458 For foreign issuers, the disclosure is made via
Form 6–K.
459 See supra Sections I and IV.B.1.
PO 00000
Frm 00034
Fmt 4701
Sfmt 4700
negatively to announcements of
cybersecurity incidents. For example,
one study finds a statistically significant
mean cumulative abnormal return of
¥0.84 percent in the three days
following cyberattack announcements,
which, according to the study, translates
into an average value loss of $495
million per attack.460 One commenter
argued that the magnitude of stock
market reaction to cybersecurity
incidents from this study would not be
considered significant by market
participants, stating that ‘‘if a stock had
a historical standard deviation of 1
percent and moved 0.8 percent on news,
most market participants would suggest
that the news was either not significant
or the market had priced in that news
so the reaction was muted.’’ 461 We note,
however, that a cumulative abnormal
return (CAR) of ¥0.84 percent refers not
to the total return but to the return
relative to how stocks in similar
industries and with similar risk profiles
moved; thus, indeed, a statistically
significantly negative CAR represents a
meaningful reaction and change to how
the stock price would have moved that
day absent the announcement of the
cybersecurity incident. By allowing
investors to make decisions based on
more current, material, information,
Item 1.05 will reduce mispricing of
securities and information asymmetry in
the market.
Information asymmetries due to
timing could also be exploited by the
malicious actors who caused a
cybersecurity incident, those who could
access and trade on material
information stolen during a
460 See Shinichi Kamiya, et al., supra note 413,
at 719–749. See also Lawrence A. Gordon, Martin
P. Loeb, & Lei Zhou, The Impact of Information
Security Breaches: Has There Been a Downward
Shift in Costs?, 19 (1) J. of Comput. Sec. 33, 33–56
(2011) (finding ‘‘the impact of the broad class of
information security breaches on stock market
returns of firms is significant’’); Georgios Spanos &
Lefteris Angelis, The Impact of Information
Security Events to the Stock Market: A Systematic
Literature Review, 58 Comput. & Sec. 216–229
(2016) (documenting that the majority (75.6%) of
the studies the paper reviewed report statistical
significance of the impact of security events to the
stock prices of companies). But see Katherine
Campbell, et al., The Economic Cost of Publicly
Announced Information Security Breaches:
Empirical Evidence From the Stock Market, 11 (3)
J. of Comput. Sec. 432, 431–448 (2003) (while
finding limited evidence of an overall negative
stock market reaction to public announcements of
information security breaches, they also find ‘‘the
nature of the breach affects this result,’’ and ‘‘a
highly significant negative market reaction for
information security breaches involving
unauthorized access to confidential data, but no
significant reaction when the breach does not
involve confidential information;’’ they thus
conclude that ‘‘stock market participants appear to
discriminate across types of breaches when
assessing their economic impact on affected firms’’).
461 See letter from BIO.
E:\FR\FM\04AUR2.SGM
04AUR2
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
ddrumheller on DSK120RN23PROD with RULES2
cybersecurity incident, or those who
learn about the incident before public
disclosure, causing further harm to
investors who trade unknowingly
against those with inside
information.462 Malicious actors may
trade ahead of an announcement of a
data breach that they caused or pilfer
material information to trade on ahead
of company announcements. Trading on
undisclosed cybersecurity information
is particularly pernicious, because
profits generated from this type of
trading provide incentives for malicious
actors to ‘‘create’’ more incidents and
proprietary information to trade on,
further harming the shareholders of
impacted companies.463 Employees or
related third-party vendors of a
company experiencing a cybersecurity
incident may also learn of the incident
and trade against investors in the
absence of disclosure. More timely
disclosure as a result of Item 1.05 will
reduce mispricing by reducing windows
of information asymmetry in connection
with a material cybersecurity incident,
thereby reducing opportunities to
exploit the mispricing, enhancing
investor protection.
A commenter noted that there is risk
the rule could, under certain conditions,
aid stock manipulation efforts by
malicious actors, offsetting these
benefits.464 One commenter suggested
that mandated disclosure timing could
make public cybersecurity incident
disclosure dates more predictable, and
thus trading strategies based on the
accompanying negative stock price
reaction more consistent, to the extent
malicious actors can monitor or control
discovery of breaches they cause and
correctly anticipate materiality
determination timing. Their ability to do
this is unclear, but we note that if the
final rules increase the precision of
strategies by attackers that involve
shorting the stock of their targets, that
would reduce the benefit of the final
rules.
Item 1.05 allows registrants to delay
filing for up to 30 days if the Attorney
General determines that the incident
disclosure would pose a substantial risk
to national security or public safety and
462 See Joshua Mitts & Eric Talley, Informed
Trading and Cybersecurity Breaches, 9 Harv. Bus.
L. Rev. 1 (2019) (‘‘In many respects, then, the
cyberhacker plays a role in creating and imposing
a unique harm on the targeted company—one that
(in our view) is qualitatively different from
‘exogenous’ information shocks serendipitously
observed by an information trader. Allowing a
coordinated hacker-trader team to capture these
arbitrage gains would implicitly subsidize the very
harm-creating activity that is being ‘discovered’ in
the first instance.’’).
463 Id.
464 See letter from ISA.
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
notifies the Commission of such
determination in writing. The delay may
be extended up to an additional 30 days
if the Attorney General determines
disclosure continues to pose a
substantial risk to national security or
public safety and notifies the
Commission of such determination in
writing. In extraordinary circumstances,
disclosure may be delayed for a final
additional period of up to 60 days if the
Attorney General determines that
disclosure continues to pose a
substantial risk to national security and
notifies the Commission of such
determination in writing. Beyond the
final 60-day delay, if the Attorney
General indicates that further delay is
necessary, the Commission will
consider additional requests for delay
and may grant such relief through
Commission exemptive order. These
delay periods and possible exemptive
relief would curb the timeliness benefits
discussed above but would reduce the
costs of premature disclosure such as
alerting malicious actors targeting
critical infrastructure that their
activities have been discovered.
By requiring all material cybersecurity
incidents to be disclosed, Item 1.05 will
also provide investors more informative
disclosure by increasing material
cybersecurity incident disclosure.465
There are currently reasons that
registrants do not disclose cybersecurity
incidents. For example, a registrant’s
managers may be reluctant to release
information that they expect or
anticipate will cause their stock price to
suffer.466 Thus an agency problem
prevents investors from receiving this
useful information. In addition,
registrants may consider only the
benefits and costs that accrue to them
when deciding whether to disclose an
incident. As discussed in Section
IV.C.3, incident disclosure can create
indirect economic effects that accrue to
parties other than the company itself.
Companies focused on direct economic
benefits, however, may not factor in this
full range of effects resulting from
disclosing cybersecurity incidents,
resulting in less reporting and less
information released to the market. The
mandatory disclosure in Item 1.05
should thus lead to more incidents
being disclosed, reducing mispricing of
securities and information asymmetry in
the market as stock prices will more
accurately reflect registrants having
experienced a cybersecurity incident.
Item 1.05 will also improve the
informativeness of the content of
465 See
Amir, Levi, & Levine, supra note 411.
e.g., Kamiya, et al., supra note 413, at
466 See,
719–749.
PO 00000
Frm 00035
Fmt 4701
Sfmt 4700
51929
cybersecurity incident disclosures. In
2022, when registrants filed a Form 8–
K to report an incident, the Form 8–K
did not necessarily state whether the
incident was material, and in some
cases, the Form 8–K stated that the
incident was immaterial.467 Item 1.05
will require registrants to describe in an
8–K filing the material aspects of the
nature, scope, and timing of a material
cybersecurity incident and the material
impact or reasonably likely material
impact on the registrant, including on
its financial condition and results of
operations. The disclosure must also
identify any information called for in
Item 1.05(a) that is not determined or is
unavailable at the time of the required
filing. Registrants will then need to
disclose this information in a Form 8–
K amendment containing such
information within four business days
after the information is determined or
becomes available. Item 1.05 is thus
expected to elicit more pertinent
information to aid investor decisionmaking. Additionally, the materiality
requirement should minimize
immaterial incident disclosure that
might divert investor attention, which
should reduce mispricing of securities.
Numerous commenters on the
Proposing Release agreed that more
informative incident disclosure would
be useful for investors.468
Regulation S–K Items 106(b) and (c) of
the final rules provide further benefits
by requiring registrants to disclose, in
their annual reports on Form 10–K,
information about their cybersecurity
risk management, strategy, and
governance. The final rules require
disclosure regarding a registrant’s
processes, if any, for assessing,
identifying, and managing material risks
from cybersecurity threats, as well as
disclosure of the registrant’s board of
directors’ oversight of risks from
cybersecurity threats and management’s
role in assessing and managing material
risks from cybersecurity threats.469
There are currently no disclosure
requirements on Forms 10–K or 10–Q
that explicitly refer to cybersecurity
risks or governance, and thus Item 106
will benefit investors by eliciting
relevant information about how
registrants are managing their material
cybersecurity risks.
467 Based on staff analysis of the 10,941 current
and periodic reports in 2022 for companies
available in Intelligize and identified as having
been affected by a cybersecurity incident using a
keyword search.
468 See, e.g., letters from Better Markets; CalPERS;
PWC; Prof. Perullo.
469 See supra Sections II.B and C. For foreign
issuers, the disclosure is made via Form 20–F.
E:\FR\FM\04AUR2.SGM
04AUR2
51930
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
One commenter took issue with the
usefulness of the proposed disclosures,
arguing, for example, that the particular
requirement to disclose whether a
registrant engages assessors,
consultants, auditors, or other third
parties in connection with any
cybersecurity risk assessment program
was unnecessary because there was no
evidence that such third parties
improved a registrant’s cyber risk
management, and some companies have
internal cybersecurity risk management
capabilities.470 Some, however, have
noted that the use of independent thirdparty advisors may be ‘‘vital to
enhancing cyber resiliency’’ by
validating that the risk management
program is meeting its objectives.471 As
discussed in Section II.C.1.c., it may be
important for investors to know a
registrant’s level of in-house versus
outsourced cybersecurity capacity.
Another commenter suggested that the
requirement to disclose governance and
risk management practices would be of
limited value to investors, while being
administratively burdensome.472 Other
commenters said that the required
disclosures about cybersecurity
governance and risk management were
too granular to be useful and suggested
that the specific disclosures be replaced
with a more high-level explanation of
management’s and the board’s roles in
cybersecurity risk management and
governance.473 One such commenter
stated that the proposed disclosures
would create pressures to provide
boilerplate responses to the specific
items that would need to be disclosed
instead of providing a robust discussion
of the way a registrant would manage
cybersecurity risk management and
governance.474 Another commenter
stated that granular disclosures ‘‘may
result in overly detailed filings that have
little utility to investors.’’ 475 These
commenters suggested that the specific
disclosures should be replaced with a
more high-level explanation of
management’s and the board’s roles in
cybersecurity risk management and
governance.
In response to these comments, the
Commission is not adopting certain
470 See
letter from NRF.
Harvard Law School Forum on Corporate
Governance Blog, posted by Steve W. Klemash,
Jamie C. Smith, and Chuck Seets, What Companies
are Disclosing About Cybersecurity Risk and
Oversight, (posted Aug. 25, 2020), available at
https://corpgov.law.harvard.edu/2020/08/25/whatcompanies-are-disclosing-about-cybersecurity-riskand-oversight/.
472 See letter from SIMFA.
473 See letters from ABA; AGA/INGAA; EEI;
Nareit; NYSE.
474 See letter from ABA.
475 See letter from NYSE.
ddrumheller on DSK120RN23PROD with RULES2
471 See
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
proposed disclosure requirements, such
as disclosure of whether the registrant
has a designated chief information
security officer. However, Items 106(b)
and (c) still require risk, strategy and
governance disclosures as we continue
to believe disclosures of cybersecurity
risk oversight and processes, as well as
management’s role and relevant
expertise, are important to investors.
Improved timeliness and
informativeness of cybersecurity
disclosures may provide further benefit
by lowering companies’ cost of
capital.476 As detailed above, the final
rules should reduce information
asymmetry and mispricing of securities.
In an asymmetric information
environment, investors are less willing
to hold shares, reducing liquidity.
Registrants may respond by issuing
shares at a discount, increasing their
cost of capital. By providing more and
more credible disclosure, however,
companies can reduce the risk of
adverse selection faced by investors and
the discount they demand, ultimately
increasing liquidity and decreasing the
company’s cost of capital.477 Investors
476 See Leuz & Verrecchia, The Economic
Consequences of Increased Disclosure, 38 J. Acct.
Res. 91 (2000) (‘‘A brief sketch of the economic
theory is as follows. Information asymmetries create
costs by introducing adverse selection into
transactions between buyers and sellers of firm
shares. In real institutional settings, adverse
selection is typically manifest in reduced levels of
liquidity for firm shares (e.g., Copeland and Galai
[1983], Kyle [1985], and Glosten and Milgrom
[1985]). To overcome the reluctance of potential
investors to hold firm shares in illiquid markets,
firms must issue capital at a discount. Discounting
results in fewer proceeds to the firm and hence
higher costs of capital. A commitment to increased
levels of disclosure reduces the possibility of
information asymmetries arising either between the
firm and its shareholders or among potential buyers
and sellers of firm shares. This, in turn, should
reduce the discount at which firm shares are sold,
and hence lower the costs of issuing capital (e.g.,
Diamond and Verrecchia [1991] and Baiman and
Verrecchia [1996]).’’).
477 See Douglas W. Diamond & Robert E.
Verrecchia, Disclosure, Liquidity, and the Cost of
Capital, 46 J. Fin. 1325, 1325–1359 (1991) (finding
that revealing public information to reduce
information asymmetry can reduce a company’s
cost of capital through increased liquidity). See also
Christian Leuz & Robert E. Verrecchia, The
Economic Consequences of Increased Disclosure, 38
J. Acct. Res. 91 (2000) (providing empirical
evidence that increased disclosure lowers the
information asymmetry component of the cost of
capital in a sample of German companies); see also
Christian Leuz & Peter D. Wysocki, The Economics
of Disclosure and Financial Reporting Regulation:
Evidence and Suggestions for Future Research, 54
J. Acct. Res. 525 (2016) (providing a comprehensive
survey of the literature on the economic effect of
disclosure). Although disclosure could be beneficial
for the company, several conditions must be met for
companies to voluntarily disclose all their private
information. See Anne Beyer, et al., The Financial
Reporting Environment: Review Of The Recent
Literature, 50 J. Acct. & Econ. 296, 296–343 (2010)
(discussing conditions under which companies
voluntarily disclose all their private information,
PO 00000
Frm 00036
Fmt 4701
Sfmt 4700
benefit when the companies they are
invested in enjoy higher liquidity. Item
1.05 enables companies to provide more
credible disclosure because currently,
investors do not know whether an
absence of incident disclosure means no
incidents have occurred, or one has but
the company has not yet chosen to
reveal it. By requiring all material
incidents to be reported, Item 1.05
supplies investors greater assurance
that, indeed, barring extraordinary
circumstances, no disclosure means the
company has not been aware for more
than four business days of a material
incident having occurred. Similarly,
Item 106 should also generate more
credible disclosure. Currently, voluntary
cybersecurity risk management, strategy,
and governance disclosures lack
standardization and consistency,
reducing their comparability and
usefulness for investors. Without set
topics that must be addressed,
companies may disclose only the
strongest aspects of their cybersecurity
processes, if they disclose at all. By
clarifying what registrants must disclose
with respect to their cybersecurity risk
management, strategy, and governance,
Item 106 will reduce information
asymmetry and provide investors and
other market participants more certainty
and easier comparability of registrants’
vulnerability to and ability to manage
cybersecurity breaches, reducing
adverse selection and increasing
liquidity. Thus, the final rules could
decrease cost of capital across
registrants and increase company value,
benefiting investors.
One commenter argued that smaller
registrants are less likely than larger
registrants to experience cybersecurity
incidents and that cyberattacks are not
material for smaller registrants.478 This
and these conditions include ‘‘(1) disclosures are
costless; (2) investors know that companies have, in
fact, private information; (3) all investors interpret
the companies’ disclosure in the same way and
companies know how investors will interpret that
disclosure; (4) managers want to maximize their
companies’ share prices; (5) companies can credibly
disclose their private information; and (6)
companies cannot commit ex-ante to a specific
disclosure policy’’). Increased reporting could also
help determine the effect of investment on company
value. See Lawrence A. Gordon, et al., The Impact
of Information Sharing on Cybersecurity
Underinvestment: A Real Options Perspective, 34
(5) J. Acct. & Pub. Policy 509, 509–519 (2015)
(arguing that ‘‘information sharing could reduce the
tendency by firms to defer cybersecurity
investments’’).
478 See comment letter from BIO. The letter argues
that the Commission, when citing the study by
Kamiya, et al. (2021) in the Proposing Release,
‘‘ignored and omitted’’ the fact that the mean
market capitalization of impacted companies in this
study was $58.9 billion, much higher than the
average for small companies, and thus
‘‘cyberattacks mainly affect large companies and are
not material for smaller companies.’’ We observe
E:\FR\FM\04AUR2.SGM
04AUR2
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
ddrumheller on DSK120RN23PROD with RULES2
could imply that the degree of
cybersecurity-driven adverse selection
faced by investors in small registrants
might be less severe. If so, the potential
benefit from improvement in liquidity
and cost of capital due to the timeliness
and information benefits from the final
rules might be smaller for small
registrants and their investors. The
research this commenter cited to
support this assertion found larger
companies were more susceptible than
smaller companies to a particular
category of cybersecurity incidents—
those involving personal information
lost through hacking by an outside
party—which composed less than onequarter of all cyber incidents in the
sample (1,580 out of 6,382).479 It is
possible that malicious strategies that
target personal information are
particularly suited to larger, well-known
companies, and thus the research may
overstate the degree to which large
companies are more susceptible to
cybersecurity incidents generally. These
strategies explicitly harm companies’
customers, and customer ill will is
potentially more newsworthy and
consequential for a larger, well-known
company as compared to a smaller one.
In contrast, ransomware attacks that
target non-personal, internal company
operations such as an information
technology network, for example, are
less concerned with causing
reputational loss and thus may have an
optimal target profile that favors smaller
firms as much as larger firms.
Additionally, smaller companies may
have fewer resources and weaker
processes in place to prevent
cybersecurity attacks.480 Hence, it is not
clear that smaller companies experience
fewer material cybersecurity incidents
generally. Others have noted that small
companies are frequently targeted
victims of cyberattacks, potentially
leading to dissolution of the business.481
Thus, overall, we maintain that
cybersecurity attacks are material for
smaller reporting companies and that
that an average market capitalization of impacted
companies of $58.9 billion would generally indicate
that companies both larger and smaller than that
size were impacted by cyberattacks.
479 See Kamiya, et al., supra note 413.
480 See letter from Tenable.
481 See Testimony of Dr. Jane LeClair, Chief
Operating Officer, National Cybersecurity Institute
at Excelsior College, before the U.S. House of
Representatives Committee on Small Business (Apr.
22, 2015), available at https://docs.house.gov/
meetings/SM/SM00/20150422/103276/HHRG-114SM00-20150422-SD003-U4.pdf (describing the
cybersecurity risks small businesses face and noting
‘‘fifty percent of SMB’s have been the victims of
cyberattack and over 60 percent of those attacked
go out of business’’).
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
the final rules will serve to benefit them
and their investors.
Overall, Form 8–K Item 1.05 and
Regulation S–K Item 106 provide for
timely, informative, and up-to-date
disclosure of cybersecurity incidents, as
well as disclosure that may provide
insight into whether a registrant is
prepared for risks from cybersecurity
threats and has adequate cybersecurity
risk management, strategy, and
governance measures in place to reduce
the likelihood of future incidents,
reducing the likelihood of delayed or
incomplete disclosure and benefiting
investors and the market.
We believe enhanced information,
timing, and completeness of disclosures
as a result of Form 8–K Item 1.05 and
Regulation S–K Item 106 will benefit
not only investors but also other market
participants that rely on registrant
disclosures to provide services to
investors. They, too, will be able to
better evaluate registrants’ cybersecurity
preparations and risks and thus provide
better recommendations. We note that
the potential benefit of these
amendments could be reduced because
some registrants already provide
relevant disclosures. That said, we
expect this same information will
become more useful due to added
context from, and easier comparisons
with, the increased number of other
registrants now providing these
disclosures.
We are unable to quantify the
potential benefit to investors and other
market participants as a result of the
increase in disclosure and improvement
in pricing under the final rules. Such
estimation requires information about
the fundamental value of securities and
the extent of the mispricing. We do not
have access to such information and
therefore cannot provide a reasonable
estimate. One commenter suggested we
use existing cyber disclosure models to
‘‘empirically determine’’ the current
degree of market mispricing, but did not
suggest what data the Commission
could use to do so.482 The Commission
cannot estimate the effects of
undisclosed cybersecurity incidents that
are creating market mispricing, as the
relevant information was never released
and the market was unable to react.
b. Greater Uniformity and Comparability
The final rules requiring disclosure
about cybersecurity incidents and
cybersecurity risk management, strategy,
and governance should also lead to
more uniform and comparable
disclosures, in terms of both content
and location, benefiting investors by
482 See
PO 00000
lowering their search and information
processing costs. Currently, registrants
do not always use Form 8–K to report
cybersecurity incidents. Even among
registrants that do, reporting practices
vary widely.483 Some provide a
discussion of materiality, the estimated
costs of an incident, or the remedial
steps taken as a result of an incident,
while others do not provide such
disclosure or provide much less detail.
Disclosures related to risk management,
strategy, and governance also vary
significantly across registrants—such
information could be disclosed in places
such as the risk factors section, the
management’s discussion and analysis
section, or not at all. For both types of
disclosures, the final rules specify the
topics that registrants should disclose.
As a result, both incident disclosure and
risk management, strategy, and
governance disclosure should become
more uniform across registrants, making
them easier for investors and other
market participants to compare. The
final rules also specify the disclosure
locations (e.g., Item 1C of Form 10–K),
benefiting investors and other market
participants further by reducing the
time, cost, and effort it takes them to
search for and retrieve information (as
pointed out by commenters 484).
We note that to the extent that the
disclosures related to cybersecurity risk
management, strategy, and governance
become too uniform or ‘‘boilerplate,’’
the benefit of comparability may be
diminished. However, we believe that
Item 106 requires sufficient specificity,
tailored to the registrant’s facts and
circumstances, to help mitigate any
tendency towards boilerplate
disclosures. Item 106 also provides a
non-exclusive list of information that
registrants should disclose, as
applicable, which should help in this
regard.
The requirement to tag the
cybersecurity disclosure in Inline XBRL
will likely augment the informational
and comparability benefits by making
the disclosures more easily retrievable
and usable for aggregation, comparison,
filtering, and other analysis. XBRL
requirements for public operating
company financial statement
disclosures have been observed to
mitigate information asymmetry by
reducing information processing costs,
thereby making the disclosures easier to
access and analyze.485 While these
483 See
Proposing Release at 16594.
e.g., letters from Better Markets; CalPERS.
485 See, e.g., J.Z. Chen, et al., Information
processing costs and corporate tax avoidance:
Evidence from the SEC’s XBRL mandate, 40 J. of
Acct. and Pub. Pol’y 2 (finding XBRL reporting
484 See,
letter from ISA.
Frm 00037
Fmt 4701
51931
Continued
Sfmt 4700
E:\FR\FM\04AUR2.SGM
04AUR2
51932
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
ddrumheller on DSK120RN23PROD with RULES2
observations are specific to operating
company financial statement
disclosures and not to disclosures
outside the financial statements, such as
the cybersecurity disclosures, they
suggest that the Inline XBRL
requirements should directly or
indirectly (i.e., through information
intermediaries such as financial media,
data aggregators, and academic
researchers) provide investors with
increased insight into cybersecurityrelated information at specific
companies and across companies,
industries, and time periods.486 Also,
unlike XBRL financial statements
(including footnotes), which consist of
tagged quantitative and narrative
disclosures, the cybersecurity
disclosures consist largely of tagged
narrative disclosures.487 Tagging
narrative disclosures can facilitate
analytical benefits such as automatic
comparison or redlining of these
disclosures against prior periods and the
performance of targeted artificial
intelligence or machine learning
assessments (tonality, sentiment, risk
words, etc.) of specific cybersecurity
disclosures rather than the entire
unstructured document.488
decreases likelihood of company tax avoidance
because ‘‘XBRL reporting reduces the cost of IRS
monitoring in terms of information processing,
which dampens managerial incentives to engage in
tax avoidance behavior’’). See also P.A. Griffin, et
al., The SEC’s XBRL Mandate and Credit Risk:
Evidence on a Link between Credit Default Swap
Pricing and XBRL Disclosure, 2014 American
Accounting Association Annual Meeting (2014)
(finding XBRL reporting enables better outside
monitoring of companies by creditors, leading to a
reduction in company default risk); E. Blankespoor,
The Impact of Information Processing Costs on Firm
Disclosure Choice: Evidence from the XBRL
Mandate, 57 J. of Acc. Res. 919, 919–967 (2019)
(finding ‘‘firms increase their quantitative footnote
disclosures upon implementation of XBRL detailed
tagging requirements designed to reduce
information users’ processing costs,’’ and ‘‘both
regulatory and non-regulatory market participants
play a role in monitoring firm disclosures,’’
suggesting ‘‘that the processing costs of market
participants can be significant enough to impact
firms’ disclosure decisions’’).
486 See, e.g., N. Trentmann, Companies Adjust
Earnings for Covid–19 Costs, but Are They Still a
One-Time Expense?, Wall St. J. (2020) (citing an
XBRL research software provider as a source for the
analysis described in the article). See also
Bloomberg Lists BSE XBRL Data, XBRL.org (2018);
R. Hoitash, and U. Hoitash, Measuring Accounting
Reporting Complexity with XBRL, 93 Account. Rev.
259 (2018).
487 The cybersecurity disclosure requirements do
not expressly require the disclosure of any
quantitative values; if a company includes any
quantitative values that are nested within the
required discussion (e.g., disclosing the number of
days until containment of a cybersecurity incident),
those values will be individually detail tagged, in
addition to the block text tagging of the narrative
disclosures.
488 To illustrate, without Inline XBRL, using the
search term ‘‘remediation’’ to search through the
text of all companies’ filings over a certain period
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
In addition, by formalizing the
disclosure requirements related to
cybersecurity incidents and
cybersecurity risk management, strategy,
and governance, the final rules could
reduce compliance costs for those
registrants that are currently providing
disclosure about these topics. The
compliance costs would be reduced to
the extent that those registrants may be
currently over-disclosing information
out of caution, to increase the perceived
credibility of their disclosures, or to
signal to investors that they are diligent
with regard to cybersecurity. For
instance, the staff has observed that
some registrants provide Form 8–K
filings even when they do not anticipate
the incident will have a material impact
on their business operations or financial
results.489 By specifying that only
material incidents require disclosure,
the final rules should ease some of these
concerns and reduce costs to the extent
those costs currently exist.490 Investors
will benefit to the extent the registrants
they invest in enjoy lower compliance
costs.
2. Costs
We also recognize that enhanced
cybersecurity disclosure would result in
costs to registrants, borne by investors.
These costs include potential increases
in registrants’ vulnerability to
cybersecurity incidents and compliance
costs. We discuss these costs below.
First, the disclosure about
cybersecurity incidents and
cybersecurity risk management, strategy,
and governance could potentially
increase the vulnerability of registrants.
Since the issuance of the 2011 Staff
Guidance, concerns have been raised
that providing detailed disclosures of
cybersecurity incidents could,
potentially, provide a road map for
future attacks, and, if the underlying
security issues are not completely
resolved, could exacerbate the ongoing
of time, so as to analyze the trends in companies’
disclosures related to cybersecurity incident
remediation efforts during that period, could return
many narrative disclosures outside of the
cybersecurity incident discussion (e.g., disclosures
related to potential environmental liabilities in the
risk factors section). Inline XBRL, however, enables
a user to search for the term ‘‘remediation’’
exclusively within the required cybersecurity
disclosures, thereby likely reducing the number of
irrelevant results.
489 Based on staff analysis of the 10,941 current
and periodic reports in 2022 for companies
available in Intelligize and identified as having
been affected by a cybersecurity incident using a
keyword search.
490 We note that registrants may still over-disclose
due to uncertainty over when a cybersecurity
incident crosses the threshold of materiality. This
may impact how fully costs from immaterial
incident disclosure are reduced.
PO 00000
Frm 00038
Fmt 4701
Sfmt 4700
attack.491 The concern is that malicious
actors could use the disclosures to
potentially gain insights into a
registrant’s practices on cybersecurity.
As a result, the final incident disclosure
rules could potentially impose costs on
registrants and their investors, if, for
example, additional threat actors steal
more data or hamper breach resolution.
The final rules have been modified
from the Proposing Release to mitigate
disclosure of details that could aid
threat actors, while remaining
informative for investors. Form 8–K
Item 1.05 will require registrants to
timely disclose material cybersecurity
incidents, describe the material aspects
of the nature, scope, and timing of the
incident, and, importantly, describe the
material impact or reasonably likely
material impact of the incident on the
registrant. Focusing on the material
impact or reasonably likely material
impact of the incident rather than the
specific or technical details of the
incident should reduce the likelihood of
providing a road map that threat actors
can exploit for future attacks, and
should reduce the risks and costs
stemming from threat actors acting in
this manner.492
Similar concerns were raised by
commenters about the required risk
management, strategy, and governance
disclosure.493 Items 106(b) and (c)
require registrants to provide specified
disclosure regarding their cybersecurity
risk management processes and
cybersecurity governance by the
management and board. The required
disclosure could provide malicious
actors information about which
registrants have weak processes related
to cybersecurity risk management and
allow such malicious actors to
determine their targets accordingly.
However, academic research so far
has not provided evidence that more
detailed cybersecurity risk disclosures
necessarily lead to more attacks. For
example, one study finds that measures
for specificity (e.g., the uniqueness of
the disclosure) do not have a
491 See, e.g., Roland L. Trope & Sarah Jane
Hughes, The SEC Staff’s Cybersecurity Disclosure
Guidance: Will It Help Investors or Cyber-Thieves
More, 2011 Bus. L. Today 2, 1–4 (2011).
492 Instruction 4 to Item 1.05 provides that a
‘‘registrant need not disclose specific or technical
information about its planned response to the
incident or its cybersecurity systems, related
networks and devices, or potential system
vulnerabilities in such detail as would impede the
registrant’s response or remediation of the
incident.’’
493 See letters from ABA; ACLI; APCIA; BIO; BPI
et al.; Business Roundtable; Chamber; CSA; CTIA;
EIC; Enbridge; FAH; Federated Hermes; GPA; ITI;
ISA; Nareit; NAM; NMHC; NRA; NRF; SIFMA; Sen.
Portman; TechNet; TransUnion; USTelecom; Virtu;
see also supra note 201 and accompanying text.
E:\FR\FM\04AUR2.SGM
04AUR2
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
ddrumheller on DSK120RN23PROD with RULES2
statistically significant relation with
subsequent cybersecurity incidents.494
Another study finds that cybersecurity
risk factor disclosures that involve terms
about processes are less likely to be
related to future breach announcements
than disclosures that employ more
general language.495 On the other hand,
we note that the final rules will require
more details of cybersecurity processes
than what is explicitly required under
the current rules, and the uniformity of
the final rules might also make it easier
for malicious actors to identify
registrants with relatively weaker
processes. Therefore, these academic
findings might not be generalizable to
the effects of the final rules.496
However, we also note that we have
streamlined the disclosure obligations
for Items 106 (b) and (c), in response to
commenters’ concerns, to require a more
principles-based discussion of a
registrant’s processes instead of detailed
disclosures on a specific set of items.
This change should help ease concerns
that the required cybersecurity risk
management, strategy, and governance
disclosures will help malicious actors
choose targets. In addition, the potential
costs resulting from the disclosure
requirements might be partially
mitigated to the extent that registrants
decide to enhance their cybersecurity
risk management in anticipation of the
increased disclosure. This possibility is
discussed below under Indirect
Economic Effects.
The final rules will also impose
compliance costs. Registrants, and thus
their investors, will incur one-time and
ongoing costs to fulfill the new
disclosure requirements under Item 106
of Regulation S–K. These costs will
include costs to gather the information
and prepare the disclosures. Registrants
will also incur compliance costs to
fulfill the disclosure requirements
related to Form 8–K (Form 6–K for FPIs)
incident disclosure.497 These costs
494 See He Li, Won Gyun No, & Tawei Wang,
SEC’s Cybersecurity Disclosure Guidance and
Disclosed Cybersecurity Risk Factors, 30 Int’l. J. of
Acct. Info. Sys. 40–55 (2018) (‘‘while Ferraro (2013)
criticizes that the SEC did little to resolve the
concern about publicly revealing too much
information [that] could provide potential hackers
with a roadmap for successful attacks, we find no
evidence supporting such claim’’).
495 See Tawei Wang, Karthik N. Kannan, & Jackie
Rees Ulmer, The Association Between the
Disclosure and the Realization of Information
Security Risk Factors, 24.2 Info. Sys. Res. 201, 201–
218 (2013).
496 We note that the papers we cited above study
the effect of voluntary disclosure and the 2011 Staff
Guidance, which could also reduce the
generalizability of these studies to the mandatory
disclosures under the final rules.
497 We note that the compliance costs related to
Form 6–K filings will be mitigated, because a
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
include one-time costs to implement or
revise their incident disclosure
practices, so that any registrant that
determines it has experienced a material
cybersecurity incident will disclose
such incident with the required
information within four business days.
Registrants may also incur ongoing costs
to disclose in a Form 8–K report any
material changes or updates relating to
previously disclosed incidents, and we
expect these costs to be higher for
registrants with more incidents to
disclose. The costs will be mitigated for
registrants whose current disclosure
practices match or are similar to those
that are in the final rules. One
commenter suggested that companies
could incur costs to reconcile their
existing cybersecurity activities and
NIST-based best practices with the
requirements of the final rules 498 but, as
discussed in Section II.C.3.c, the final
rules are not in conflict with NIST and
we do not anticipate that significant
reconciliation will be needed.
The compliance costs will also
include costs attributable to the Inline
XBRL tagging requirements. Many
commenters supported the XBRL
tagging requirement,499 while one
commenter suggested that it would be
burdensome to add tagging given the
time-sensitive nature of the disclosure
requirements.500 Various preparation
solutions have been developed and used
by operating companies to fulfill XBRL
requirements, and some evidence
suggests that, for smaller companies,
XBRL compliance costs have decreased
over time.501 The incremental
compliance costs associated with Inline
XBRL tagging of cybersecurity
disclosures will also be mitigated by the
condition of the form is that the information is
disclosed or required to be disclosed elsewhere.
498 See letter from SIFMA.
499 See letters from E&Y; CAQ; PWC; NACD;
AICPA; XBRL.
500 See letter from NYC Bar.
501 An AICPA survey of 1,032 reporting
companies with $75 million or less in market
capitalization in 2018 found an average cost of
$5,850 per year, a median cost of $2,500 per year,
and a maximum cost of $51,500 per year for fully
outsourced XBRL creation and filing, representing
a 45% decline in average cost and a 69% decline
in median cost since 2014. See AICPA, XBRL Costs
for Small Companies Have Declined 45% since
2014 (2018), available at https://us.aicpa.org/
content/dam/aicpa/interestareas/frc/
accountingfinancialreporting/xbrl/
downloadabledocuments/xbrl-costs-for-smallcompanies.pdf. See also Letter from Nasdaq, Inc.
(Mar. 21, 2019) (responding to Request for
Comment on Earnings Releases and Quarterly
Reports, Release No. 33–10588 (Dec. 18, 2018) [83
FR 65601 (Dec. 21, 2018)]) (stating that a 2018
NASDAQ survey of 151 listed companies found an
average XBRL compliance cost of $20,000 per
quarter, a median XBRL compliance cost of $7,500
per quarter, and a maximum XBRL compliance cost
of $350,000 per quarter).
PO 00000
Frm 00039
Fmt 4701
Sfmt 4700
51933
fact that most companies that will be
subject to the requirements are already
subject to other Inline XBRL
requirements for other disclosures in
Commission filings, including financial
statement and cover page disclosures in
certain periodic reports and registration
statements.502 Such companies may be
able to leverage existing Inline XBRL
preparation processes and expertise in
complying with the cybersecurity
disclosure tagging requirements.
Moreover, the one-year XBRL
compliance period extension could
further assuage concerns about the
transition for registrants to comply with
the new requirements.503
Some commenters contended that the
Proposing Release failed to consider the
costs of the proposed rules
adequately.504 We are generally unable
to quantify costs related to the final
rules due to a lack of data. For example,
we are unable to quantify the impact of
any increased vulnerability to existing
or new threat actors arising from the
required incident or risk management,
strategy, or governance disclosures.
Moreover, costs related to preparing
cyber-related disclosures are generally
private information known only to the
issuing firm, hence such data are not
readily available to the Commission.
There is also likely considerable
variation in these costs depending on a
given firm’s size, industry, complexity
of operations, and other characteristics,
which makes comprehensive estimates
difficult to obtain. We note that the
Commission has provided certain
estimates for purposes of compliance
with the Paperwork Reduction Act of
1995, as further discussed in Section V
below. Those estimates, while useful to
understanding the collection of
information burden associated with the
final rules, do not purport to reflect the
full costs associated with making the
required disclosures.
One commenter provided a numerical
cost estimate, stating the initial costs of
complying with the proposed rules
would be $317.5 million to $523.4
million ($38,690 to $69,151 per
regulated company), and future annual
costs would be $184.8 million to $308.1
million ($22,300 to $37,500 per
regulated company).505 We cannot
directly evaluate the accuracy of these
502 See 17 CFR 229.601(b)(101) and 17 CFR
232.405 (for requirements related to tagging
financial statements, including footnotes and
schedules in Inline XBRL). See 17 CFR
229.601(b)(104) and 17 CFR 232.406 (for
requirements related to tagging cover page
disclosures in Inline XBRL).
503 See supra Section II.I.
504 See, e.g., letters from Chamber and SIFMA.
505 See letter from Chamber.
E:\FR\FM\04AUR2.SGM
04AUR2
51934
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
estimates because the commenter did
not provide any explanation for how
they were derived. We believe, however,
these estimates likely significantly
overstate the costs of the final rules.
First, the commenter overestimates
the number of registrants who are likely
to bear the full costs of new disclosures.
Converting the total and per company
cost estimates to registrant counts
implies the commenter assumed these
costs would be borne by approximately
8,000 companies, which would be
nearly every registrant.506 As stated in
Section IV.B.2 above, however, 73
percent of domestic filers in 2022
already made cybersecurity-related
disclosures in Form 10–K filings and
amendments, and 35 Form 8–K filings
disclosed material cybersecurity
incidents.507 While the degree to which
registrants’ existing disclosures already
may be in line with the requirements of
the final rules varies—some registrants
may need to make significant changes
while others may not, especially given
the guidance from the 2018 Interpretive
Release—most registrants should not
bear the full costs of compliance. In
addition, while cybersecurity incident
disclosure is expected to increase as a
result of Item 1.05, we do not expect
that most companies will need to report
in any given year. Extrapolating from
the current numbers of incidents
reported—for example, public
companies disclosed 188 reported
breaches in 2021 508—we expect that the
overwhelming majority of registrants
will not experience a material breach
and will not need to disclose
cybersecurity incidents and incur the
ongoing associated costs.509 They may,
however, revisit their disclosure
controls initially, to ensure they are
capturing what the rule requires.
Second, we have made changes from
the proposed rules that would also
reduce costs as compared with the
proposal. Some of these changes
concerned aspects of the proposed rules
that the commenter noted would be
burdensome. For example, the
commenter states that ‘‘potential
ddrumheller on DSK120RN23PROD with RULES2
506 $317.5
million divided by $38,690 per
registrant equals 8,206 registrants; $523.4 million
divided by $69,151 per registrant equals 7,569
registrants; $184.8 million divided by $22,300 per
registrant equals 8,287 registrants; $308.1 million
divided by $37,500 per registrant equals 8,216
registrants. In Section IV.B.2, supra, we find the
number of affected parties to include approximately
7,300 operating companies filing on domestic forms
and 1,174 FPIs filing on foreign forms.
507 See supra notes 456 and 457 and
accompanying text.
508 See supra note 426 and accompanying text.
509 This conclusion is based on relative
quantities. Note that 188 is very small relative to the
total number of registrants, 8,474, from Section
IV.B.2 (188 divided by 8,474 is roughly 2%).
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
material incidents in the aggregate
would be difficult to identify and
operationally challenging to track.’’ 510
The commenter also states ‘‘the SEC
underestimates the burdens related to
tracking ‘several small but continuous
cyberattacks against a company,’ which
may or may not prove to be
material.’’ 511 These comments refer to
proposed Item 106(d)(2), which would
have required disclosure when a series
of previously undisclosed individually
immaterial cybersecurity incidents
become material in the aggregate. In
response to comments, we are not
adopting this aspect of the proposal and
instead have added ‘‘a series of related
unauthorized occurrences’’ to the
definition of ‘‘cybersecurity incident,’’
which may help address this concern
about the burden of the proposal. The
comment letter also stated that
‘‘cybersecurity talent is scar[c]e globally.
From a personnel standpoint, it’s
unclear where companies would get the
so-called cybersecurity experts that the
proposed regulation would mandate.
There is a well-documented lack of
cybersecurity talent for the public and
private sectors that would
unquestionably affect companies’
recruitment of board cybersecurity
experts.’’ 512 We are not adopting
proposed 407(j) about the cybersecurity
expertise, if any, of a registrant’s board
members, which may have factored into
the commenter’s cost estimates.
Additionally, the proposal would not
have mandated recruitment of
cybersecurity experts, only disclosure of
their presence. Additional streamlining
of requirements in the final rules (e.g.,
reduced granularity of cybersecurity
incident disclosure requirements)
should further reduce costs from what
might have been estimated using the
Proposing Release.
Another commenter stated that the
Commission’s calculation of costs and
benefits does not adequately address the
impact of different but overlapping
disclosure and reporting requirements
that may escalate burdens and costs.513
We acknowledge the possibility that to
the extent different information has to
be reported pursuant to different
regulations, laws, or other requirements,
there could be a greater cost because of
the demands to keep track of and
manage the multiple different disclosure
regimes. However, to the extent that
certain other existing requirements may
involve monitoring cybersecurity
incidents or assessing an incident’s
510 See
letter from Chamber.
511 Id.
512 Id.
513 See
PO 00000
letter from SIFMA.
Frm 00040
Fmt 4701
Sfmt 4700
impact on the registrant, the registrant
may be able to leverage existing
disclosures to reduce the burden of
complying with the final rules.
Additionally, as noted in Section II.A.3
those other regulations generally serve
different purposes than the final rules,
and we believe that the benefits of the
final rules justify the costs.
One commenter raised a concern that
the costs of the rules reached the
threshold of an ‘‘economically
significant rulemaking’’ under the
Unfunded Mandate Reform Act of 1995
(‘‘UMRA’’) and the Small Business
Regulatory Enforcement Fairness Act,
thus requiring an ‘‘enhanced economic
analysis.’’ 514 The requirement to issue
an analysis under the UMRA does not
apply to rules issued by independent
regulatory agencies.515
The compliance costs of the final
rules could be disproportionately
burdensome to smaller registrants, as
some of these costs may have a fixed
component that does not scale with the
size of the registrant.516 Also, smaller
registrants may have fewer resources
with which to implement these
changes.517 One commenter suggested
this could lead some small companies
seeking to conduct an initial public
offering to reconsider.518 Commenters
also noted that smaller companies may
not yet have a mature reporting regime
and organizational structure and would
benefit from an onramp to
compliance.519 We are not adopting
some proposed requirements (e.g.,
disclosing whether the board includes a
cybersecurity expert), and thus the cost
burden of the final rules should not be
as high as initially proposed. We also
are delaying compliance for incident
disclosure for smaller reporting
companies by providing an additional
phase-in period of 180 days after the
non-smaller reporting company
compliance date for smaller reporting
companies, which will delay
compliance with these requirements for
270 days from effectiveness of the
rules.520 To the extent smaller reporting
514 See
letter from Chamber.
2 U.S.C. 658 (‘‘The term ‘agency’ has the
same meaning as defined in section 551(1) of title
5, United States Code, but does not include
independent regulatory agencies.’’). See also
Congressional Research Service, Unfunded
Mandates Reform Act: History, Impact, and Issues
(July 17, 2020), available at https://sgp.fas.org/crs/
misc/R40957.pdf (noting ‘‘[UMRA] does not apply
to duties stemming from participation in voluntary
federal programs [or] rules issued by independent
regulatory agencies’’).
516 See infra Section VI.
517 See, e.g., letter from SBA.
518 See letter from BIO.
519 See, e.g., letter from BIO.
520 See supra Section II.I.
515 See
E:\FR\FM\04AUR2.SGM
04AUR2
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
ddrumheller on DSK120RN23PROD with RULES2
companies are less likely than larger
companies to have incident disclosure
processes in place, they could benefit
from additional time to comply. An
extended compliance date may also
permit smaller reporting companies to
benefit from seeing how larger
companies implement these disclosures.
Investors in these smaller registrants
could benefit from higher disclosure
quality afforded by the delay, although
some benefits, such as the reduction in
asymmetric information and mispricing,
would also be delayed.
3. Indirect Economic Effects
While the final rules only require
disclosures—not changes to risk
management practices—the requirement
to disclose and the disclosures
themselves could result in certain
indirect benefits and costs. In
anticipating investor reactions to the
required disclosures, for example,
registrants might devote more resources
to cybersecurity governance and risk
management in order to be able to
disclose those efforts. Although not the
purpose of this rule, registrants devoting
resources to cybersecurity governance
and risk management could reduce both
their susceptibility to a cybersecurity
attack, reducing the likelihood of future
incidents, as well as the degree of harm
suffered from an incident, benefiting
registrants and investors. The choice to
dedicate these resources would also
represent an indirect cost of the final
rules, to the extent registrants do not
already have governance and risk
management measures in place. As with
compliance costs, the cost of improving
cybersecurity governance and risk
management could be proportionally
higher for smaller companies if these
registrants have fewer resources to
implement these changes, and to the
extent these costs do not scale with
registrant size.
In addition, the requirement to tag the
cybersecurity disclosure in Inline XBRL
could have indirect effects on
registrants. As discussed in Section
III.C.1.a.(ii), XBRL requirements for
public operating company financial
statement disclosures have been
observed to reduce information
processing cost. This reduction in
information processing cost has been
observed to facilitate the monitoring of
registrants by other market participants,
and, as a result, to influence registrants’
behavior, including their disclosure
choices.521
The requirement in Item 1.05 that
registrants timely disclose material
cybersecurity incidents could also
521 See
supra note 485.
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
indirectly affect consumers, and
external stakeholders such as other
registrants in the same industry and
those facing similar cybersecurity
threats. Cybersecurity incidents can
harm not only the company that suffers
the incident but also other businesses
and consumers. For example, a
cybersecurity breach at one company,
such as a gas pipeline, or a power
company, may cause a major disruption
or shutdown of a critical infrastructure
industry, resulting in broad losses
throughout the economy.522 Timely
disclosure of cybersecurity incidents
required by Item 1.05 could increase
awareness by those external
stakeholders and companies in the same
industry that the malicious activities are
occurring, giving them more time to
mitigate any potential damage.
To the extent that Item 1.05 increases
incident disclosure, consumers may
learn about a particular cybersecurity
breach and therefore take appropriate
actions to limit potential economic
harm that they may incur from the
breach. For example, there is evidence
that increased disclosure of
cybersecurity incidents by companies
can reduce the risk of identity theft for
individuals.523 Also, consumers may be
able to make better informed decisions
about which companies to entrust with
their personal information.
As discussed above, to the extent that
registrants may decide to enhance their
cybersecurity risk management in
anticipation of the increased disclosure,
that could reduce registrants’
susceptibility to and damage incurred
from a cybersecurity attack. This
reduced likelihood of and vulnerability
to future incidents could reduce the
negative externalities of those incidents,
leading to positive spillover effects and
a reduction in overall costs to society
from these attacks.
However, the magnitude of this and
the other indirect effects discussed
522 See Lawrence A. Gordon, et al., Externalities
and the Magnitude of Cyber Security
Underinvestment by Private Sector Firms: A
Modification of the Gordon-Loeb Model, 6 J. Info.
Sec. 24, 25 (2015) (‘‘Firms in the private sector of
many countries own a large share of critical
infrastructure assets. Hence, cybersecurity breaches
in private sector firms could cause a major
disruption of a critical infrastructure industry (e.g.,
delivery of electricity), resulting in massive losses
throughout the economy, putting the defense of the
nation at risk.’’). See also Collin Eaton and Dustin
Volz, U.S. Pipeline Cyberattack Forces Closure,
Wall St. J. (May 8, 2021), available at https://
www.wsj.com/articles/cyberattack-forces-closure-oflargest-u-s-refined-fuel-pipeline-11620479737.
523 See Sasha Romanosky, Rahul Telang, and
Alessandro Acquisti, Do Data Breach Disclosure
Laws Reduce Identity Theft?, 30 (2) J. of Pol’y.
Analysis and Mgmt. 272, 256–286 (2011) (finding
that the adoption of State-level data breach
disclosure laws reduced identity theft by 6.1%).
PO 00000
Frm 00041
Fmt 4701
Sfmt 4700
51935
above would depend upon factors
outside of the specific disclosures
provided in response to the final rule,
and therefore it is difficult to assess
with certainty the likelihood or extent of
these effects.
D. Effects on Efficiency, Competition,
and Capital Formation
We believe the final rules should have
positive effects on market efficiency. As
discussed above, the final rules should
improve the timeliness and
informativeness of cybersecurity
incident and risk disclosure. As a result
of the disclosure required by the final
rules, investors and other market
participants should better understand
the cybersecurity threats registrants are
facing, their potential impact, and
registrants’ ability to respond to and
manage risks. Investors and other
market participants should thereby
better evaluate registrants’ securities
and make more informed decisions. As
a result, the required disclosures should
reduce information asymmetry and
mispricing in the market, improving
market efficiency. More efficient prices
should improve capital formation by
increasing overall public trust in
markets, leading to greater investor
participation and market liquidity.
The final rules also could promote
competition among registrants with
respect to improvement in both their
cybersecurity risk management and
transparency in communicating their
cybersecurity processes. To the extent
investors view strong cybersecurity risk
management, strategy, and governance
favorably, registrants disclosing more
robust processes, more clearly, could
benefit from greater interest from
investors, leading to higher market
liquidity relative to companies that do
not. Customers may also be more likely
to entrust their business to companies
that protect their data. Registrants that
to date have invested less in
cybersecurity preparation could thus be
incentivized to invest more, to the
benefit of investors and customers, in
order to become more competitive. To
the extent that increased compliance
costs resulting from the final rules
prevent smaller companies from
entering the market, as a commenter
suggested,524 the final rules could
reduce the ability of smaller companies
to compete and thereby reduce
competition overall.
524 See
E:\FR\FM\04AUR2.SGM
letter from BIO.
04AUR2
51936
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
E. Reasonable Alternatives
ddrumheller on DSK120RN23PROD with RULES2
1. Website Disclosure
As an alternative to Form 8–K
disclosure of material cybersecurity
incidents, we considered providing
registrants with the option of disclosing
this information instead through
company websites, if the company
disclosed its intention to do so in its
most recent annual report, and subject
to information availability and retention
requirements. While this approach may
be less costly for the company because
it may involve fewer compliance costs,
disclosures made on company websites
would not be located in a central
depository, such as the EDGAR
system,525 and would not be in the same
place as other registrants’ disclosures of
material cybersecurity incidents, nor
would they be organized into the
standardized sections found in Form 8–
K and could thus be less uniform. Even
if we required registrants to announce
the disclosure, or to alert the
Commission to it, the information
would still be more difficult for
investors and market participants to
locate and less uniform than Form 8–K.
The lack of a central repository, and
a lack of uniformity of website
disclosures, could increase the costs for
investors and other market participants
to search for and process the
information to compare cybersecurity
risks across registrants. Additionally,
such disclosure might not be preserved
on the company’s website for as long as
it would be on the EDGAR system when
the disclosure is filed with the
Commission, because registrants may
not keep historical information available
on their websites indefinitely and it
could be difficult to determine whether
the website information had moved or
changed. Therefore, this approach
would be less beneficial to investors,
other market participants, and the
overall efficiency of the market.
2. Disclosure Through Periodic Reports
We also considered requiring
disclosure of material cybersecurity
incidents through quarterly or annual
reports, as proposed, instead of Form 8–
K. Reporting material cybersecurity
incidents at the end of the quarter or
year would allow registrants more time
to assess the financial impact of such
incidents. The resulting disclosure
525 EDGAR, the Electronic Data Gathering,
Analysis, and Retrieval system, is the primary
system for companies and others submitting
documents under the Securities Act, the Exchange
Act, the Trust Indenture Act of 1939, and the
Investment Company Act. EDGAR’s public database
can be used to research a public company’s
financial information and operations.
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
might be more specific or informative
for investors and other market
participants to value the securities and
make more informed decisions. The
compliance costs would be less under
this alternative, because registrants
would not have to file as frequently.
And, it might further reduce the risk
that disclosure could provide timely
information to attackers.
However, this alternative also would
lead to less timely reporting on material
cybersecurity incidents. As a result, the
market would not be able to incorporate
the information related to cybersecurity
risk into securities prices in as timely a
manner, and investors and other market
participants would not be able to make
as informed decisions as they could
under the requirements of Item 1.05.
Additionally, as previously discussed,
less timely reporting could adversely
impact external stakeholders, such as
other registrants in the same industry
and those facing similar cybersecurity
threats, and consumers whose data were
compromised.
Relatedly, we proposed requiring
registrants to disclose material changes
and additions to previously reported
cybersecurity incidents on Forms 10–K
and 10–Q instead of on an amended
Form 8–K. However, as discussed
above, we believe using Form 8–K
would be more timely and
consistent; 526 all disclosures concerning
material cybersecurity incidents,
whether new or containing information
not determined or unavailable initially,
will be disclosed on the same form.
3. Exempt Smaller Reporting Companies
We also considered exempting
smaller reporting companies from the
final rules.527 Exempting smaller
reporting companies from the disclosure
requirements of the final rules would
avoid compliance costs for smaller
companies, including those compliance
costs that could disproportionately
affect smaller companies.528 As noted
earlier, however, we are not adopting
some proposed requirements (e.g.,
disclosing whether the board includes a
cybersecurity expert) and modifying
others (e.g., requiring a description of
cybersecurity ‘‘processes’’ instead of
more formal ‘‘policies and procedures’’),
and thus the cost burden of the final
rules should not be as high as initially
proposed. This should mitigate some of
the concerns raised by commenters and
would also reduce the potential value of
an exemption. Moreover, an exemption
would remove the benefit to investors of
informative, timely, uniform, and
comparable disclosure with regard to
smaller companies. And although one
commenter argued for an exemption
based on a perception that smaller
companies are less likely to experience
cybersecurity incidents,529 for the
reasons explained in Section IV.C.1.b,
we believe that smaller companies are
still at risk for material cybersecurity
incidents. This aligns with comments
we received opposing an exemption for
smaller reporting companies.530
Lastly, one commenter that argued for
an exemption cited the Proposing
Release, which noted a potential for
increased cost of capital for registrants
that do not have cybersecurity programs
once disclosures are mandated; the
commenter stated that these would
disproportionately be smaller
registrants.531 We have reconsidered the
argument that registrants without robust
cybersecurity processes in place might
face a higher cost of capital and as a
result would be priced unfavorably, and
no longer believe it to be accurate. It is
indeed possible that companies that
reveal what investors consider to be less
robust cybersecurity risk management,
strategy, and governance processes may
experience a decline in stock price.
However, because the risk of
cybersecurity attacks should be
idiosyncratic, this decline would likely
be due to investors updating their
expectations of future cash flows for this
firm to incorporate higher likelihood of
a future incident—moderating the
decline should future incidents occur—
not an increase in fundamental market
risk and thus cost of capital. In addition,
to the extent investors already rationally
anticipate that smaller registrants or
registrants that have not previously
disclosed such information have less
robust policies, there may be less or no
stock price decline as a result of Item
106, as these disclosures would merely
confirm expectations. Thus, increases in
cost of capital should not be prevalent
in this regard and should not be a
reason to exempt small firms from the
final rules.
V. Paperwork Reduction Act
A. Summary of the Collections of
Information
Certain provisions of our rules and
forms that will be affected by the final
rules contain ‘‘collection of
information’’ requirements within the
meaning of the Paperwork Reduction
529 See
526 See
supra Section II.B.3.
527 See supra Section II.G.2.
528 See supra Section II.G.2.
PO 00000
Frm 00042
Fmt 4701
Sfmt 4700
letter from BIO.
e.g., letters from Cybersecurity Coalition;
530 See,
Tenable.
531 See letter from BIO.
E:\FR\FM\04AUR2.SGM
04AUR2
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
Act (‘‘PRA’’).532 The Commission
published a notice requesting comment
on changes to these collections of
information in the Proposing Release
and submitted these requirements to the
Office of Management and Budget
(‘‘OMB’’) for review in accordance with
the PRA.533
The hours and costs associated with
preparing, filing, and sending the forms
constitute reporting and cost burdens
imposed by each collection of
information. An agency may not
conduct or sponsor, and a person is not
required to comply with, a collection of
information unless it displays a
currently valid OMB control number.
Compliance with the information
collections is mandatory. Responses to
the information collections are not kept
confidential and there is no mandatory
retention period for the information
disclosed. The titles for the affected
collections of information are: 534
• ‘‘Form 8–K’’ (OMB Control No.
3235–0060);
• ‘‘Form 6–K’’ (OMB Control No.
3235–0116);
• ‘‘Form 10–K’’ (OMB Control No.
3235–0063); and
• ‘‘Form 20–F’’ (OMB Control No.
3235–0288).
The Commission adopted all of the
existing regulations and forms pursuant
to the Securities Act and the Exchange
Act. The regulations and forms set forth
disclosure requirements for current
reports and periodic reports filed by
registrants to help shareholders make
informed voting and investment
decisions.
A description of the final
amendments, including the need for the
information and its use, as well as a
description of the likely respondents,
can be found in Section II above, and a
discussion of the economic effects of the
final amendments can be found in
Section IV above.
B. Summary of Comment Letters and
Revisions to PRA Estimates
In the Proposing Release, the
Commission requested comment on the
PRA burden hour and cost estimates
and the analysis used to derive the
estimates.535 While a number of parties
commented on the potential costs of the
proposed rules, only one commenter
spoke specifically to the PRA analysis,
arguing that the proposal ‘‘cannot be
justified under the Paperwork
Reduction Act’’ because of an
‘‘unreasonable’’ number of separate
disclosures and because ‘‘the amount of
information the Proposal would require
to be produced is unwarranted in light
of other, existing regulations.’’ 536 The
commenter further alleged that the
Proposing Release’s ‘‘calculation of
costs and benefits is skewed’’ because
‘‘[d]ifferent but overlapping disclosure
and reporting requirements do not
correlate with lower burdens on
information providers, but rather,
escalated burdens and costs.’’
While we acknowledge the
commenter’s concerns about costs of the
51937
proposal, for the reasons discussed in
Section II.H and elsewhere throughout
this release, we believe the information
required by the final rules is necessary
and appropriate in the public interest
and for the protection of investors.
Further, a discussion of the economic
effects of the final amendments,
including consideration of comments
that expressed concern about the
expected costs associated with the
proposed rules, can be found in Section
IV above. With regard to the calculation
of paperwork burdens, we note that both
the Proposing Release’s PRA analysis
and our PRA analysis of the final
amendments here estimate the
incremental burden of each new or
revised disclosure requirement
individually and fully comport with the
requirements of the PRA. Our estimates
reflect the modifications to the proposed
rules that we are adopting in response
to commenter concerns, including
streamlining some of the proposed
rule’s elements to address concerns
regarding the level of detail required
and the anticipated costs of compliance.
C. Effects of the Amendments on the
Collections of Information
The following PRA Table 1
summarizes the estimated effects of the
final amendments on the paperwork
burdens associated with the affected
collections of information listed in
Section V.A.
PRA TABLE 1—ESTIMATED PAPERWORK BURDEN OF FINAL AMENDMENTS
Final amendments and effects
Form 8–K:
• Add Item 1.05 requiring disclosure of material cybersecurity incidents within four business days following determination of materiality.
Form 6–K:
• Add ‘‘cybersecurity incident’’ to the list in General
Instruction B of information required to be furnished
on Form 6–K.
Regulation S–K Item 106:
• Add Item 106(b) requiring disclosure regarding cybersecurity risk management and strategy.
• Add Item 106(c) requiring disclosure regarding cybersecurity governance.
Number of
estimated affected
responses *
Affected forms
Estimated burden
increase
Form 8–K ................................
9 hour increase in compliance burden
per form.
200 Filings.
Form 6–K ................................
9 hour increase in compliance burden
per form.
20 Filings.
Form 10–K and .......................
Form 10–K: 10 hour increase in compliance burden per form.
Form 20–F: 10 hour increase in compliance burden per form.
8,292 Filings.
Form 20–F ...............................
729 Filings.
ddrumheller on DSK120RN23PROD with RULES2
* The OMB PRA filing inventories represent a three-year average. Averages may not align with the actual number of filings in any given year.
532 44
U.S.C. 3501 et seq.
U.S.C. 3507(d) and 5 CFR 1320.11.
534 The Proposing Release also listed ‘‘Schedule
14A’’ (OMB Control No. 3235–0059), ‘‘Schedule
533 44
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
14C’’ (OMB Control No. 3235–0057), and ‘‘Form
10–Q’’ (OMB Control No. 3235–0070) as affected
collections of information. However, under the final
PO 00000
Frm 00043
Fmt 4701
Sfmt 4700
rules, these schedules and form are no longer
affected.
535 Proposing Release at 16616–16617.
536 See letter from SIFMA.
E:\FR\FM\04AUR2.SGM
04AUR2
51938
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
The estimated burden increases for
Forms 8–K, 10–K, and 20–F reflect
changes from the estimates provided in
the Proposing Release. There, the
Commission estimated that the average
incremental burden for an issuer to
prepare the Form 8–K Item 1.05
disclosure would be 10 hours. The
proposed estimate included the time
and cost of preparing the disclosure, as
well as tagging the data in XBRL. The
changes we are making to Item 1.05 in
the final rules should generally reduce
the associated burden by an incremental
amount in most cases. We therefore
estimate that Form 8–K Item 1.05 will
have a burden of 9 hours, on par with
the average burdens of existing Form 8–
K items, which is 9.21 hours.
In the Proposing Release, the
Commission estimated that the average
incremental burden for preparing Form
10–K stemming from proposed Item 106
would be 15 hours. Similarly, the
Commission estimated that proposed
Item 106 would result in an average
incremental burden for preparing Form
20–F of 16.5 hours. The proposed
estimates included the time and cost of
preparing the disclosure, as well as
tagging the data in XBRL. We estimate
the changes we are making to Item 106
in the final rules should generally
reduce the associated burden by onethird due to the elimination of many of
the proposed disclosure items;
accordingly, we have reduced the
estimated burden to 10 hours from 15
hours for Form 10–K, and to 10 hours
from 16.5 hours for Form 20–F.537
We have not modified the estimated
number of estimated affected responses
for Form 8–K and Form 6–K from what
was proposed. As noted in the
Proposing Release, not every filing of
these forms would include responsive
disclosures. Rather, these disclosures
would be required only when a
registrant has made the determination
that it has experienced a material
cybersecurity incident. Further, in the
case of Form 6–K, the registrant would
only have to provide the disclosure if it
is required to disclose such information
elsewhere.
D. Incremental and Aggregate Burden
and Cost Estimates for the Final
Amendments
Below we estimate the incremental
and aggregate increase in paperwork
burden as a result of the final
amendments. These estimates represent
the average burden for all respondents,
both large and small. In deriving our
estimates, we recognize that the burdens
will likely vary among individual
respondents and from year to year based
on a number of factors, including the
nature of their business.
The burden estimates were calculated
by multiplying the estimated number of
responses by the estimated average
amount of time it would take a
registrant to prepare and review
disclosure required under the final
amendments. For purposes of the PRA,
the burden is to be allocated between
internal burden hours and outside
professional costs. PRA Table 2 below
sets forth the percentage estimates we
typically use for the burden allocation
for each collection of information. We
also estimate that the average cost of
retaining outside professionals is $600
per hour.538
PRA TABLE 2—STANDARD ESTIMATED BURDEN ALLOCATION FOR SPECIFIED COLLECTIONS OF INFORMATION
Form 10–K, Form 6–K, and Form 8–K .......................................................................................................
Form 20–F ...................................................................................................................................................
PRA Table 3 below illustrates the
incremental change to the total annual
Outside
professionals
(percent)
Internal
(percent)
Collection of information
compliance burden of affected
collections of information, in hours and
75
25
25
75
in costs, as a result of the final
amendments.
PRA TABLE 3—CALCULATION OF THE INCREMENTAL CHANGE IN BURDEN ESTIMATES OF CURRENT RESPONSES
RESULTING FROM THE FINAL AMENDMENTS
Collection of information
8–K ....................................................
6–K ....................................................
10–K ..................................................
20–F ..................................................
Number of
estimated
affected
responses
Burden hour
increase per
response
Change in
burden hours
Change in
company hours
Change in
professional hours
Change in
professional
costs
(A) *
(B)
(C) = (A) × (B) **
(D) = (C) × 0.75 or .25
(E) = (C) × 0.25 or .75
(F) = (E) × $600
200
20
8,292
729
9
9
10
10
1,800
180
82,920
7,290
1,350
135
62,190
1,822.50
450
45
20,730
5,467.50
$270,000
27,000
12,438,000
3,280,500
ddrumheller on DSK120RN23PROD with RULES2
* The number of estimated affected responses is based on the number of responses in the Commission’s current OMB PRA filing inventory. The OMB PRA filing inventory represents a three-year average.
** The estimated changes in Columns (C), (D), and (E) are rounded to the nearest whole number.
The following PRA Table 4
summarizes the requested paperwork
burden, including the estimated total
reporting burdens and costs, under the
final amendments.
537 Note that, in the proposal, a portion of the
burden for companies reporting on Form 10–K was
allocated to Schedule 14A, as a result of certain
disclosure items being proposed to be included in
Rule 407 of Regulation S–K. By contrast, since
registrants reporting on Form 20–F do not have an
analogous form to Schedule 14A, the comparable
burden to Schedule 14A was attributable to Form
20–F. Since we are not adopting Item 407 as
proposed, and we do not expect any disclosures on
Schedule 14A, the estimates for Form 10–K and
Form 20–F are now aligned.
538 We recognize that the costs of retaining
outside professionals may vary depending on the
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
PO 00000
Frm 00044
Fmt 4701
Sfmt 4700
nature of the professional services, but for purposes
of this PRA analysis, we estimate that such costs
would be an average of $600 per hour. At the
proposing stage, we used an estimated cost of $400
per hour. We are increasing this cost estimate to
$600 per hour to adjust the estimate for inflation
from Aug. 2006.
E:\FR\FM\04AUR2.SGM
04AUR2
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
51939
PRA TABLE 4—REQUESTED PAPERWORK BURDEN UNDER THE FINAL AMENDMENTS
Current burden
Form
Form
Form
Form
Form
8–K ......................
6–K ......................
10–K ....................
20–F .....................
Program change
Current
annual
responses
Current
burden
hours
Current
cost
burden
Change in
number of
affected
responses
(A)
(B)
(C)
(D)
818,158
227,031
13,988,770
478,983
$108,674,430
30,270,780
1,835,588,919
576,490,625
200
20
..................
..................
118,387
34,794
8,292
729
Revised burden
Change in
company
hours
Change in
professional
costs
Annual
responses
Burden hours
Cost burden
(E) †
(F) ‡
(G) = (A) + (D)
(H) = (B) + (E)
(I) = (C) + (F)
118,587
34,814
8,292
729
819,508
227,166
14,050,960
480,805.50
1,350
135
62,190
1,822.50
$270,000
27,000
12,438,000
3,280,500
$108,944,430
30,297,780
1,848,026,919
579,771,125
† From Column (D) in PRA Table 3.
‡ From Column (F) in PRA Table 3.
VI. Final Regulatory Flexibility
Analysis
The Regulatory Flexibility Act
(‘‘RFA’’) requires the Commission, in
promulgating rules under Section 553 of
the Administrative Procedure Act,539 to
consider the impact of those rules on
small entities. We have prepared this
Final Regulatory Flexibility Analysis
(‘‘FRFA’’) in accordance with Section
604 of the RFA.540 An Initial Regulatory
Flexibility Analysis (‘‘IRFA’’) was
prepared in accordance with the RFA
and was included in the Proposing
Release.541
A. Need for, and Objectives of, the Final
Amendments
The purpose of the final amendments
is to ensure investors and other market
participants receive timely, decisionuseful information about registrants’
material cybersecurity incidents, and
periodic information on registrants’
approaches to cybersecurity risk
management, strategy, and governance
that is standardized and comparable
across registrants. The need for, and
objectives of, the final rules are
described in Sections I and II above. We
discuss the economic impact and
potential alternatives to the
amendments in Section IV, and the
estimated compliance costs and burdens
of the amendments under the PRA in
Section V.
ddrumheller on DSK120RN23PROD with RULES2
B. Significant Issues Raised by Public
Comments
In the Proposing Release, the
Commission requested comment on any
aspect of the IRFA, and particularly on
the number of small entities that would
be affected by the proposed
amendments, the existence or nature of
the potential impact of the proposed
amendments on small entities discussed
in the analysis, how the proposed
amendments could further lower the
539 5
U.S.C. 553.
U.S.C. 604.
541 Proposing Release at 16617.
540 5
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
burden on small entities, and how to
quantify the impact of the proposed
amendments.
We received one comment letter on
the IRFA, from the U.S. Small Business
Administration’s Office of Advocacy
(‘‘Advocacy’’).542 Advocacy’s letter
expressed concern that ‘‘the IRFA does
not adequately describe the regulated
small entities and potential impacts on
those entities.’’ 543 In the Proposing
Release, the Commission estimated that
the proposed amendments would apply
to 660 issuers and 9 business
development companies that may be
considered small entities.544 Advocacy’s
comment letter stated that this estimate
did ‘‘not provide additional
information, such as the North
American Industry Classification
System (‘‘NAICS’’) classifications of the
affected entities’’ and did not ‘‘break
down the affected entities into smaller
size groups (e.g., based on total
assets).’’ 545 It also stated that the IRFA
did not ‘‘adequately analyze the relative
impact of costs to small entities.’’ 546 In
this vein, it suggested that emerging
growth companies (‘‘EGCs’’) may face
particular challenges complying with
the proposed rules.547 In particular,
Advocacy’s comment letter stated that
‘‘[e]merging growth companies may
have little or no revenue to afford the
additional cost burden of the proposed
rules and may not have access to the
542 See letter from U.S. Small Business
Administration Office of Advocacy. We also
received some comments that, while not
specifically addressed to the IRFA, did concern the
impact of the proposed rules on smaller reporting
companies. See letters from BDO; BIO; CSA;
Cybersecurity Coalition; NACD; NASAA; Nasdaq;
NDIA; Prof. Perullo; Tenable. We have addressed
those comments in Section II.G.2, supra, and
incorporate those responses here as applicable to
our RFA analysis. We also note the
recommendations for all Commission rulemakings
from the Office of the Advocate for Small Business
Capital Formation. See 2022 OASB Annual Report.
543 Id.
544 Proposing Release at 16617.
545 See letter from Advocacy.
546 Id.
547 Id.
PO 00000
Frm 00045
Fmt 4701
Sfmt 4700
cybersecurity expertise necessary to
comply with the new disclosure
requirements.’’ 548
The comment letter from Advocacy
also addressed the discussion of
alternatives within the IRFA and the
Commission’s explanation of why it did
not ultimately propose such
alternatives. Advocacy stated that ‘‘[t]he
RFA requires that an IRFA provide
significant, feasible alternatives that
accomplish an agency’s objectives,’’ and
stated that the IRFA did not satisfy this
requirement because it listed ‘‘broad
categories of potential alternatives to the
proposed rules but [did] not analyze any
specific alternative that was considered
by the SEC,’’ and because it did not
‘‘contain a description of significant
alternatives which accomplish the
stated SEC objectives and which
minimize the significant economic
impact of the proposal on small
entities.’’
1. Estimate of Affected Small Entities
and Impact to Those Entities
With respect to the adequacy of the
Proposing Release’s estimate of affected
small entities, the RFA requires ‘‘a
description of and, where feasible, an
estimate of the number of small entities
to which the proposed rule will
apply.’’ 549 Advocacy’s published
guidance recommends agencies use
NAICS classifications to help in
‘‘identifying the industry, governmental
and nonprofit sectors they intend to
regulate.’’ 550 Here, given that the
rulemaking applies to and impacts all
public company registrants, regardless
of industry or sector, we do not believe
that further breakout of such registrants
by industry classification is necessary or
would otherwise be helpful to such
entities understanding the impact of the
548 Id.
549 5
U.S.C. 603(b)(3).
Small Business Administration Office of
Advocacy, A Guide for Government Agencies: How
to Comply with the Regulatory Flexibility Act (Aug.
2017), at 18, available at https://www.sba.gov/sites/
default/files/advocacy/How-to-Comply-with-theRFA-WEB.pdf.
550 U.S.
E:\FR\FM\04AUR2.SGM
04AUR2
51940
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
ddrumheller on DSK120RN23PROD with RULES2
proposed or final rules. This is not a
case in which small entities in certain
industries and sectors would be affected
more than others, as cybersecurity risks
exist across industries.551 For the same
reasons we are not breaking down the
affected entities into smaller size groups
(e.g., based on total assets) as
recommended by Advocacy. Given the
nature of the final rules, we believe that
our estimate of the number of small
entities to which the final rules will
apply adequately describes and
estimates the small entities that will be
affected.552
With respect to Advocacy’s suggestion
that the proposed rule may be
‘‘particularly problematic’’ for EGCs, we
have discussed in Section IV.C.2 above
the anticipated costs of the final rules,
including their impact on EGCs. We also
note that the category of EGC is not the
same as the category of ‘‘small entity’’
for purposes of the RFA, and indeed
EGC status is not a reliable indicator of
whether a registrant is a small entity.553
While EGC status does include a
revenue component, it importantly
considers whether the issuer is
seasoned, meaning, whether it is a new
registrant (rather than a registrant with
a longer public reporting history).
Accordingly, while many EGCs are
small entities, there are many that are
not. Likewise, many small entities are
not EGCs. For purposes of the FRFA,
our focus is on the impact on small
entities, regardless of whether or not
they are EGCs.
We disagree with the statement in the
Advocacy comment letter that ‘‘SEC
expects that the costs associated with
the proposed amendments to be similar
for large and small entities.’’ The
Commission explained in the IRFA that
the proposed amendments would apply
to small entities to the same extent as
other entities, irrespective of size, and
that therefore, the Commission expected
that ‘‘the nature of any benefits and
costs associated with the proposed
amendments to be similar for large and
551 A breakout would be relevant where, for
example, the Commission finds that small entities
generally would not be affected by a rule but small
entities in a particular industry would be affected.
552 See infra Section VI.C.
553 An EGC is defined as a company that has total
annual gross revenues of less than $1.235 billion
during its most recently completed fiscal year and,
as of Dec. 8, 2011, had not sold common equity
securities under a registration statement. A
company continues to be an EGC for the first five
fiscal years after it completes an initial public
offering, unless one of the following occurs: its total
annual gross revenues are $1.235 billion or more;
it has issued more than $1 billion in nonconvertible debt in the past three years; or it
becomes a ‘‘large accelerated filer,’’ as defined in
Exchange Act Rule 12b–2.
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
small entities’’ (emphasis added).554
The analysis with respect to the nature
of the costs (and benefits) of the
proposed rules detailed in the Economic
Analysis of the Proposing Release was
referenced in the IRFA to help small
entities understand such impacts, not to
imply that small entities face the same
degree of costs as large entities. Indeed,
the Commission went on to state in both
the IRFA and the Economic Analysis of
the Proposing Release that, while it was
unable to project the economic impacts
on small entities with precision, it
recognized that ‘‘the costs of the
proposed amendments borne by the
affected entities could have a
proportionally greater effect on small
entities, as they may be less able to bear
such costs relative to larger entities.’’ 555
Additionally, in Section IV, above, we
discuss the economic effects, including
costs, of the final amendments across all
entities. We recognize that to the extent
the costs are generally uniform across
all entities, they would have a relatively
greater burden on smaller entities. That
said, as discussed both above and
below, to help mitigate that relatively
greater burden and to respond to
comment letters including the letter
from Advocacy, we have extended the
compliance date for smaller reporting
companies so as to provide additional
transition time and allow them to
benefit from the experience of larger
companies. Accordingly, we believe that
both this FRFA and our prior IRFA
adequately describe and analyze the
relative impact of costs to small entities.
2. Consideration of Alternatives
The IRFA’s discussion of significant
alternatives, and our discussion of
alternatives below, satisfy the RFA. The
relevant RFA requirement provides that
an IRFA ‘‘shall also contain a
description of any significant
alternatives to the proposed rule which
accomplish the stated objectives of
applicable statutes and which minimize
any significant economic impact of the
proposed rule on small entities.’’ 556 In
the Proposing Release, the Commission
discussed each of the types of
significant alternatives noted in Section
603 of the RFA and concluded that none
of these alternatives would accomplish
the stated objectives of the rulemaking
while minimizing any significant
impact on small entities. In addition,
Section III.E of the Proposing Release
discussed reasonable alternatives to the
554 Proposing
Release at 16617 (emphasis added).
555 Proposing Release at 16617–16618. See also
id. at 16613 (‘‘smaller companies might incur a cost
that is disproportionally high, compared to larger
companies under the proposed rules’’).
556 5 U.S.C. 603(c).
PO 00000
Frm 00046
Fmt 4701
Sfmt 4700
proposed rules and their economic
impacts. Similarly, in addition to the
discussion in Section VI.E below, in
Section IV.E of this release we also
discuss reasonable alternatives of the
final rules and their economic impacts.
While not commenting on the
alternatives raised in the IRFA
specifically, two commenters stated that
the final rules should exempt smaller
businesses. One of these commenters
stated that small companies in the
biotechnology industry ‘‘do not have the
capacity, nor the business need, to have
institutional structures related to the
management, planning, oversight, and
maintenance of cybersecurity related
systems and suppliers. These companies
should not have to hire extra employees
specifically for the purposes of
implementing cybersecurity related
programs.’’ 557 The other commenter
noted that, with respect to the proposed
requirement to require disclosure about
the cybersecurity expertise of board
members, small companies ‘‘have
limited resources to begin with, and
may find it more difficult than large
companies to identify board members
with requisite cyber expertise given that
there already is a lack of talent in this
area.’’ 558
With respect to the first of these
commenters, we note that neither the
proposed nor the final rules require any
company to ‘‘implement new
management structures’’ or otherwise
adopt or change ‘‘institutional structures
related to the management, planning,
oversight, and maintenance of
cybersecurity related systems and
suppliers.’’ 559 The final rules instead
call for disclosure of a registrant’s
processes, if any, for assessing,
identifying, and managing material
cybersecurity risks. To the extent that a
registrant does not have such processes,
the final rules do not impose any
additional costs. With respect to the
second of these commenters, we note
that, consistent with commenter
feedback and for the reasons discussed
above, we have not adopted the
proposed requirement related to
disclosure of board cybersecurity
expertise.
Finally, we note that many
commenters explicitly opposed
exempting smaller businesses from the
proposed rules,560 in part because they
may face equal 561 or greater 562
557 See
letter from BIO.
letter from NDIA.
559 The quoted language is from the BIO letter.
560 See letters from CSA; Cybersecurity Coalition;
NASAA; Prof. Perullo; Tenable.
561 See letter from Cybersecurity Coalition.
562 See letters from NASAA and Tenable.
558 See
E:\FR\FM\04AUR2.SGM
04AUR2
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
cybersecurity risk than larger
companies, or because investors’
relative share in a smaller company may
be higher, such that small companies’
cybersecurity risk ‘‘may actually
embody the most pressing cybersecurity
risk to an investor.’’ 563 We agree with
these analyses,564 and accordingly are
not exempting small entities from the
final rules. However, as discussed
above, in response to concerns about the
impact of the rules on smaller
companies and in order to provide
smaller reporting companies with
additional time to prepare to comply
with the incident disclosure
requirements, we are providing such
registrants with an additional 180 days
from the non-smaller reporting company
compliance date before they must
comply with the new Form 8–K
requirement.
C. Small Entities Subject to the Final
Amendments
The final amendments would apply to
registrants that are small entities. The
RFA defines ‘‘small entity’’ to mean
‘‘small business,’’ ‘‘small organization,’’
or ‘‘small governmental
jurisdiction.’’ 565 For purposes of the
RFA, under our rules, a registrant, other
than an investment company, is a
‘‘small business’’ or ‘‘small
organization’’ if it had total assets of $5
million or less on the last day of its most
recent fiscal year and is engaged or
proposing to engage in an offering of
securities that does not exceed $5
million.566 An investment company,
including a business development
company,567 is considered to be a
563 See
letter from Prof. Perullo.
note that one commenter stated its
conclusion that ‘‘cyberattacks mainly affect larger
companies.’’ See letter from BIO. The basis of the
commenter’s assertion is that mean market
capitalization of impacted companies in the
relevant study cited in the Proposing Release is
$58.9 billion (Kamiya, et al. (2021)), which it notes
is much higher than the average for small
companies, and thus concludes that ‘‘cyberattacks
mainly affect large companies and are not material
for smaller companies.’’ As noted in Section IV,
supra, an average market capitalization of $58.9
billion does not preclude the existence of numerous
companies much smaller (and larger) than that
amount. See supra note 478. The commenter
additionally notes that the relevant study states that
‘‘firms are more likely to experience cyberattacks
when they are larger.’’ To the extent that smaller
entities face fewer cyber incidents, that would
result in a less frequent need to analyze whether
disclosure of such incidents is required under the
final rules. However, even if smaller entities are less
likely to experience a cyberattack, this would not
negate the analysis that such attacks, when they do
occur, are more likely to be material for the reasons
discussed above.
565 5 U.S.C. 601(6).
566 See 17 CFR 240.0–10(a) [Exchange Act Rule 0–
10(a)].
567 Business development companies are a
category of closed-end investment company that are
ddrumheller on DSK120RN23PROD with RULES2
564 We
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
‘‘small business’’ if it, together with
other investment companies in the same
group of related investment companies,
has net assets of $50 million or less as
of the end of its most recent fiscal
year.568 We estimate that, as of
December 31, 2022, there were
approximately 800 issuers and 10
business development companies that
may be considered small entities that
would be subject to the final
amendments.
D. Projected Reporting, Recordkeeping,
and other Compliance Requirements
Per the final rules, registrants will be
required to report material cybersecurity
incidents on Form 8–K and Form 6–K
for FPIs, and will be required to
describe in their annual reports on
Forms 10–K and 20–F certain aspects of
their cybersecurity risk management,
strategy, and governance, if any. The
final amendments are described in more
detail in Section II above. These
requirements generally will apply to
small entities to the same extent as other
entities, irrespective of size or industry
classification, although we are adopting
a later compliance date for smaller
reporting companies in response to
concerns raised by commenters. We
continue to expect that the nature of any
benefits and costs associated with the
amendments to be similar for large and
small entities, and so we refer to the
discussion of the amendments’
economic effects on all affected parties,
including small entities, in Section IV
above. Also consistent with the
discussion in Sections II and IV above,
we acknowledge that, in particular to
the extent that a smaller entity would be
required to provide disclosure under the
final rules, it may face costs that are
proportionally greater as they may be
less able to bear such costs relative to
larger entities. However, as discussed in
in Section IV, we anticipate that the
economic benefits and costs likely could
vary widely among small entities based
on a number of factors, such as the
nature and conduct of their businesses,
including whether the company actively
manages material cybersecurity risks,
which makes it difficult to project the
economic impact on small entities with
precision. To the extent that the
disclosure requirements have a greater
effect on small registrants relative to
large registrants, they could result in
adverse effects on competition. The
fixed component of the legal costs of
preparing the disclosure would be a
primary contributing factor. Compliance
not registered under the Investment Company Act
[15 U.S.C. 80a–2(a)(48) and 80a–53 through 64].
568 17 CFR 270.0–10(a).
PO 00000
Frm 00047
Fmt 4701
Sfmt 4700
51941
with certain provisions of the final
amendments may require the use of
professional skills, including legal,
accounting, and technical skills.
E. Agency Action To Minimize Effect on
Small Entities
The RFA directs us to consider
alternatives that would accomplish our
stated objectives, while minimizing any
significant adverse impact on small
entities. Accordingly, we considered the
following alternatives:
• Exempting small entities from all or
part of the requirements;
• Establishing different compliance or
reporting requirements that take into
account the resources available to small
entities;
• Using performance rather than
design standards; and
• Clarifying, consolidating, or
simplifying compliance and reporting
requirements under the rules for small
entities.
The rules are intended to better
inform investors about cybersecurity
incidents and, if any, the cybersecurity
risk management, strategy, and
governance of registrants of all types
and sizes that are subject to the
Exchange Act reporting requirements.
We explain above in Sections II and IV
that current requirements and guidance
are not yielding uniform, comparable
disclosure sufficient to meet investors’
needs. The disclosure that does exist is
scattered in various parts of registrants’
filings, making it difficult for investors
to locate, analyze, and compare across
registrants. Staff has also observed that
smaller reporting companies generally
provide less cybersecurity disclosure as
compared to larger registrants, and
commenters agreed that there is a need
for cybersecurity disclosure from small
companies.569
Given the current disclosure
landscape, exempting small entities or
otherwise clarifying, consolidating, or
simplifying compliance and reporting
requirements under the rules for small
entities would frustrate the rulemaking’s
goal of providing investors with more
uniform and timely disclosure about
material cybersecurity incidents and
about cybersecurity risk management,
strategy, and governance practices
across all registrants. That said, as
discussed in Section II above, we have
consolidated and simplified the
disclosure requirements for all entities,
which should ease small entities’
compliance as well. Further, as noted
above, smaller companies may face
equal or greater cybersecurity risk than
569 See
supra notes 339 to 342 and accompanying
text.
E:\FR\FM\04AUR2.SGM
04AUR2
51942
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
larger companies, making the
disclosures important for investors in
these companies.
On the other hand, we believe the
rulemaking’s goals can be achieved by
providing smaller reporting companies
with additional time to come into
compliance. Therefore, we are delaying
smaller reporting companies’ required
compliance date with the Form 8–K
incident disclosure requirement by an
additional 180 days from the nonsmaller reporting company compliance
date. This delay will benefit smaller
reporting companies both by giving
them extra time to establish disclosure
controls and procedures and by
allowing them to observe and learn from
best practices as they develop among
larger registrants.
Similarly, the final rules incorporate a
combination of performance and design
standards with respect to all subject
entities, including small entities, in
order to balance the objectives and
compliance burdens of the rules. While
the final rules do use design standards
to promote uniform compliance
requirements for all registrants and to
address the concerns underlying the
amendments, which apply to entities of
all size, they also incorporate elements
of performance standards to give
registrants sufficient flexibility to craft
meaningful disclosure that is tailored to
their particular facts and circumstances.
For example, the final rules require a
registrant to describe its ‘‘processes, if
any, for assessing, identifying, and
managing material risks from
cybersecurity threats in sufficient detail
for a reasonable investor to understand
those processes.’’ The rule also provides
a non-exclusive list of disclosure items
that a registrant should include in
providing responsive disclosure to this
performance standard; this design
element provides registrants with
additional guidance with respect to the
type of disclosure topics that could be
covered and promotes consistency.
Statutory Authority
ddrumheller on DSK120RN23PROD with RULES2
The amendments contained in this
release are being adopted under the
authority set forth in Sections 7 and
19(a) of the Securities Act and Sections
3(b), 12, 13, 15, and 23(a) of the
Exchange Act.
List of Subjects in 17 CFR Parts 229,
232, 239, 240, and 249
Reporting and record keeping
requirements, Securities.
Text of Amendments
For the reasons set forth in the
preamble, the Commission amends title
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
17, chapter II of the Code of Federal
Regulations as follows:
PART 229—STANDARD
INSTRUCTIONS FOR FILING FORMS
UNDER SECURITIES ACT OF 1933,
SECURITIES EXCHANGE ACT OF 1934
AND ENERGY POLICY AND
CONSERVATION ACT OF 1975—
REGULATION S–K
1. The authority citation for part 229
continues to read as follows:
■
Authority: 15 U.S.C. 77e, 77f, 77g, 77h, 77j,
77k, 77s, 77z–2, 77z–3, 77aa(25), 77aa(26),
77ddd, 77eee, 77ggg, 77hhh, 77iii, 77jjj,
77nnn, 77sss, 78c, 78i, 78j, 78j–3, 78l, 78m,
78n, 78n–1, 78o, 78u–5, 78w, 78ll, 78mm,
80a–8, 80a–9, 80a–20, 80a–29, 80a–30, 80a–
31(c), 80a–37, 80a–38(a), 80a–39, 80b–11 and
7201 et seq.; 18 U.S.C. 1350; sec. 953(b), Pub.
L. 111–203, 124 Stat. 1904 (2010); and sec.
102(c), Pub. L. 112–106, 126 Stat. 310 (2012).
■
2. Add § 229.106 to read as follows:
§ 229.106
(Item 106) Cybersecurity.
(a) Definitions. For purposes of this
section:
Cybersecurity incident means an
unauthorized occurrence, or a series of
related unauthorized occurrences, on or
conducted through a registrant’s
information systems that jeopardizes the
confidentiality, integrity, or availability
of a registrant’s information systems or
any information residing therein.
Cybersecurity threat means any
potential unauthorized occurrence on or
conducted through a registrant’s
information systems that may result in
adverse effects on the confidentiality,
integrity, or availability of a registrant’s
information systems or any information
residing therein.
Information systems means electronic
information resources, owned or used
by the registrant, including physical or
virtual infrastructure controlled by such
information resources, or components
thereof, organized for the collection,
processing, maintenance, use, sharing,
dissemination, or disposition of the
registrant’s information to maintain or
support the registrant’s operations.
(b) Risk management and strategy. (1)
Describe the registrant’s processes, if
any, for assessing, identifying, and
managing material risks from
cybersecurity threats in sufficient detail
for a reasonable investor to understand
those processes. In providing such
disclosure, a registrant should address,
as applicable, the following nonexclusive list of disclosure items:
(i) Whether and how any such
processes have been integrated into the
registrant’s overall risk management
system or processes;
(ii) Whether the registrant engages
assessors, consultants, auditors, or other
PO 00000
Frm 00048
Fmt 4701
Sfmt 4700
third parties in connection with any
such processes; and
(iii) Whether the registrant has
processes to oversee and identify such
risks from cybersecurity threats
associated with its use of any thirdparty service provider.
(2) Describe whether any risks from
cybersecurity threats, including as a
result of any previous cybersecurity
incidents, have materially affected or
are reasonably likely to materially affect
the registrant, including its business
strategy, results of operations, or
financial condition and if so, how.
(c) Governance. (1) Describe the board
of directors’ oversight of risks from
cybersecurity threats. If applicable,
identify any board committee or
subcommittee responsible for the
oversight of risks from cybersecurity
threats and describe the processes by
which the board or such committee is
informed about such risks.
(2) Describe management’s role in
assessing and managing the registrant’s
material risks from cybersecurity
threats. In providing such disclosure, a
registrant should address, as applicable,
the following non-exclusive list of
disclosure items:
(i) Whether and which management
positions or committees are responsible
for assessing and managing such risks,
and the relevant expertise of such
persons or members in such detail as
necessary to fully describe the nature of
the expertise;
(ii) The processes by which such
persons or committees are informed
about and monitor the prevention,
detection, mitigation, and remediation
of cybersecurity incidents; and
(iii) Whether such persons or
committees report information about
such risks to the board of directors or a
committee or subcommittee of the board
of directors.
Instruction 1 to Item 106(c): In the
case of a foreign private issuer with a
two-tier board of directors, for purposes
of paragraph (c) of this section, the term
‘‘board of directors’’ means the
supervisory or non-management board.
In the case of a foreign private issuer
meeting the requirements of § 240.10A–
3(c)(3) of this chapter, for purposes of
paragraph (c) of this Item, the term
‘‘board of directors’’ means the issuer’s
board of auditors (or similar body) or
statutory auditors, as applicable.
Instruction 2 to Item 106(c): Relevant
expertise of management in Item
106(c)(2)(i) may include, for example:
Prior work experience in cybersecurity;
any relevant degrees or certifications;
any knowledge, skills, or other
background in cybersecurity.
E:\FR\FM\04AUR2.SGM
04AUR2
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
(d) Structured Data Requirement.
Provide the information required by this
Item in an Interactive Data File in
accordance with Rule 405 of Regulation
S–T and the EDGAR Filer Manual.
3. Amend § 229.601 by revising
paragraph (b)(101)(i)(C)(1) as follows:
■
§ 229.601
(Item 601) Exhibits.
*
*
*
*
*
(b) * * *
(101) * * *
(i) * * *
(C) * * *
(1) Only when:
(i) The Form 8–K contains audited
annual financial statements that are a
revised version of financial statements
that previously were filed with the
Commission and that have been revised
pursuant to applicable accounting
standards to reflect the effects of certain
subsequent events, including a
discontinued operation, a change in
reportable segments or a change in
accounting principle. In such case, the
Interactive Data File will be required
only as to such revised financial
statements regardless of whether the
Form 8–K contains other financial
statements; or
(ii) The Form 8–K includes disclosure
required to be provided in an Interactive
Data File pursuant to Item 1.05(b) of
Form 8–K; and
*
*
*
*
*
PART 232—REGULATION S–T—
GENERAL RULES AND REGULATIONS
FOR ELECTRONIC FILINGS
4. The general authority citation for
part 232 continues to read as follows:
■
Authority: 15 U.S.C. 77c, 77f, 77g, 77h, 77j,
77s(a), 77z–3, 77sss(a), 78c(b), 78l, 78m, 78n,
78o(d), 78w(a), 78ll, 80a–6(c), 80a–8, 80a–29,
80a–30, 80a–37, 80b–4, 80b–6a, 80b–10, 80b–
11, 7201 et seq.; and 18 U.S.C. 1350, unless
otherwise noted.
*
*
*
*
*
5. Amend § 232.405 by adding
paragraph (b)(4)(v) to read as follows:
■
ddrumheller on DSK120RN23PROD with RULES2
*
*
*
*
(b) * * *
(4) * * *
(v) Any disclosure provided in
response to: § 229.106 of this chapter
(Item 106 of Regulation S–K); Item 1.05
of § 249.308 of this chapter (Item 1.05 of
Form 8–K); and Item 16K of § 249.220f
of this chapter (Item 16K of Form 20–
F).
*
*
*
*
*
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
503 and 602, 126 Stat. 326 (2012), unless
otherwise noted.
*
6. The general authority citation for
part 239 continues to read as follows:
■
Authority: 15 U.S.C. 77c, 77f, 77g, 77h, 77j,
77s, 77z–2, 77z–3, 77sss, 78c, 78l, 78m, 78n,
78o(d), 78o–7 note, 78u–5, 78w(a), 78ll,
78mm, 80a–2(a), 80a–3, 80a–8, 80a–9, 80a–
10, 80a–13, 80a–24, 80a–26, 80a–29, 80a–30,
80a–37, and sec. 71003 and sec. 84001, Pub.
L. 114–94, 129 Stat. 1321, unless otherwise
noted.
*
*
*
*
*
■ 7. Amend § 239.13 by revising
paragraph (a)(3)(ii) to read as follows:
§ 239.13 Form S–3, for registration under
the Securities Act of 1933 of securities of
certain issuers offered pursuant to certain
types of transactions.
*
*
*
*
*
(a) * * *
(3) * * *
(ii) Has filed in a timely manner all
reports required to be filed during the
twelve calendar months and any portion
of a month immediately preceding the
filing of the registration statement, other
than a report that is required solely
pursuant to Item 1.01, 1.02, 1.05, 2.03,
2.04, 2.05, 2.06, 4.02(a), 6.01, 6.03, or
6.05 of Form 8–K (§ 249.308 of this
chapter). If the registrant has used
(during the twelve calendar months and
any portion of a month immediately
preceding the filing of the registration
statement) § 240.12b–25(b) of this
chapter with respect to a report or a
portion of a report, that report or portion
thereof has actually been filed within
the time period prescribed by that
section; and
*
*
*
*
*
■ 8. Amend Form S–3 (referenced in
§ 239.13) by adding General Instruction
I.A.3(b).
Note: Form S–3 is attached as Appendix A
to this document. Form S–3 will not appear
in the Code of Federal Regulations.
PART 240—GENERAL RULES AND
REGULATIONS, SECURITIES
EXCHANGE ACT OF 1934
§ 232.405 Interactive Data File
submissions.
*
PART 239—FORMS PRESCRIBED
UNDER THE SECURITIES ACT OF 1933
9. The authority citation for part 240
continues to read, in part, as follows:
■
Authority: 15 U.S.C. 77c, 77d, 77g, 77j,
77s, 77z–2, 77z–3, 77eee, 77ggg, 77nnn,
77sss, 77ttt, 78c, 78c–3, 78c–5, 78d, 78e, 78f,
78g, 78i, 78j, 78j–1, 78j–4, 78k, 78k–1, 78l,
78m, 78n, 78n–1, 78o, 78o–4, 78o–10, 78p,
78q, 78q–1, 78s, 78u–5, 78w, 78x, 78dd, 78ll,
78mm, 80a–20, 80a–23, 80a–29, 80a–37, 80b–
3, 80b–4, 80b–11, 7201 et seq., and 8302; 7
U.S.C. 2(c)(2)(E); 12 U.S.C. 5221(e)(3); 18
U.S.C. 1350; and Pub. L. 111–203, 939A, 124
Stat. 1376 (2010); and Pub. L. 112–106, sec.
PO 00000
Frm 00049
Fmt 4701
Sfmt 4700
51943
*
*
*
*
Section 240.15d–11 is also issued under
secs. 3(a) and 306(a), Pub. L. 107–204, 116
Stat. 745.
*
*
*
*
*
10. Amend § 240.13a–11 by revising
paragraph (c) to read as follows:
■
§ 240.13a–11 Current reports on Form 8–K
(§ 249.308 of this chapter).
*
*
*
*
*
(c) No failure to file a report on Form
8–K that is required solely pursuant to
Item 1.01, 1.02, 1.05, 2.03, 2.04, 2.05,
2.06, 4.02(a), 5.02(e), or 6.03 of Form
8–K shall be deemed to be a violation
of 15 U.S.C. 78j(b) and § 240.10b–5.
11. Amend § 240.15d–11 by revising
paragraph (c) to read as follows:
■
§ 240.15d–11 Current reports on Form 8–K
(§ 249.308 of this chapter).
*
*
*
*
*
(c) No failure to file a report on Form
8–K that is required solely pursuant to
Item 1.01, 1.02, 1.05, 2.03, 2.04, 2.05,
2.06, 4.02(a), 5.02(e), or 6.03 of Form
8–K shall be deemed to be a violation
of 15 U.S.C. 78j(b) and § 240.10b–5.
PART 249—FORMS, SECURITIES
EXCHANGE ACT OF 1934
12. The authority citation for part 249
continues to read, in part, as follows:
■
Authority: 15 U.S.C. 78a et seq. and 7201
et seq.; 12 U.S.C. 5461 et seq.; 18 U.S.C. 1350;
Sec. 953(b) Pub. L. 111–203, 124 Stat. 1904;
Sec. 102(a)(3) Pub. L. 112–106, 126 Stat. 309
(2012), Sec. 107 Pub. L. 112–106, 126 Stat.
313 (2012), Sec. 72001 Pub. L. 114–94, 129
Stat. 1312 (2015), and secs. 2 and 3 Pub. L.
116–222, 134 Stat. 1063 (2020), unless
otherwise noted.
Section 249.220f is also issued under secs.
3(a), 202, 208, 302, 306(a), 401(a), 401(b), 406
and 407, Pub. L. 107–204, 116 Stat. 745, and
secs. 2 and 3, Pub. L. 116–222, 134 Stat. 1063.
*
*
*
*
*
Section 249.308 is also issued under 15
U.S.C. 80a–29 and 80a–37.
*
*
*
*
*
Section 249.310 is also issued under secs.
3(a), 202, 208, 302, 406 and 407, Public Law
107–204, 116 Stat. 745.
*
*
*
*
*
13. Revise Form 20–F (referenced in
§ 249.220f) by adding Item 16K.
■
Note: Form 20–F is attached as Appendix
B to this document. Form 20–F will not
appear in the Code of Federal Regulations.
14. Amend Form 6–K (referenced in
§ 249.306) by adding, in the second
paragraph of General Instruction B, the
phrase ‘‘material cybersecurity
incident;’’ before the phrase ‘‘and any
■
E:\FR\FM\04AUR2.SGM
04AUR2
51944
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
other information which the registrant
deems of material importance to
security holders.’’
■ 15. Revise Form 8–K (referenced in
§ 249.308) by:
■ a. Revising General Instruction B.1.;
■ b. Revising General Instruction G.1.;
and
■ c. Adding Item 1.05.
Note: Form 8–K is attached as Appendix C
to this document. Form 8–K will not appear
in the Code of Federal Regulations.
16. Revise Form 10–K (referenced in
§ 249.310) by:
■ a. Revising General Instruction J(1)(b);
and
■ b. Adding Item 1C to Part I.
■
Note: Form 10–K is attached as Appendix
D to this document. Form 10–K will not
appear in the Code of Federal Regulations.
*
*
*
*
*
By the Commission.
Dated: July 26, 2023.
Vanessa A. Countryman,
Secretary.
Note: The following appendices will not
appear in the Code of Federal Regulations.
Appendix A—Form S–3
FORM S–3
*
*
*
*
*
INFORMATION TO BE INCLUDED IN THE
REPORT
*
*
*
*
*
General Instructions
I. Eligibility Requirements for Use of Form
S–3
*
*
*
*
*
A. Registrant Requirements
ddrumheller on DSK120RN23PROD with RULES2
*
*
*
*
*
3. * * *
(b) has filed in a timely manner all reports
required to be filed during the twelve
calendar months and any portion of a month
immediately preceding the filing of the
registration statement, other than a report
that is required solely pursuant to Item 1.01,
1.02, 1.04, 1.05, 2.03, 2.04, 2.05, 2.06, 4.02(a)
or 5.02(e) of Form 8–K (§ 249.308 of this
chapter). If the registrant has used (during the
twelve calendar months and any portion of
a month immediately preceding the filing of
the registration statement) Rule 12b–25(b)
(§ 240.12b–25(b) of this chapter) under the
Exchange Act with respect to a report or a
portion of a report, that report or portion
thereof has actually been filed within the
time period prescribed by that rule.
*
*
*
*
*
Appendix B—Form 20–F
FORM 20–F
*
*
*
*
*
*
*
*
PART II
*
*
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
Item 16K. Cybersecurity
(a) Definitions. For purposes of this
section:
(1) Cybersecurity incident means an
unauthorized occurrence, or a series of
related unauthorized occurrences, on or
conducted through a registrant’s information
systems that jeopardizes the confidentiality,
integrity, or availability of a registrant’s
information systems or any information
residing therein.
(2) Cybersecurity threat means any
potential unauthorized occurrence on or
conducted through a registrant’s information
systems that may result in adverse effects on
the confidentiality, integrity, or availability
of a registrant’s information systems or any
information residing therein.
(3) Information systems means electronic
information resources, owned or used by the
registrant, including physical or virtual
infrastructure controlled by such information
resources, or components thereof, organized
for the collection, processing, maintenance,
use, sharing, dissemination, or disposition of
the registrant’s information to maintain or
support the registrant’s operations.
(b) Risk management and strategy. (1)
Describe the registrant’s processes, if any, for
assessing, identifying, and managing material
risks from cybersecurity threats in sufficient
detail for a reasonable investor to understand
those processes. In providing such
disclosure, a registrant should address, as
applicable, the following non-exclusive list
of disclosure items:
(i) Whether and how any such processes
have been integrated into the registrant’s
overall risk management system or processes;
(ii) Whether the registrant engages
assessors, consultants, auditors, or other
third parties in connection with any such
processes; and
(iii) Whether the registrant has processes to
oversee and identify such risks from
cybersecurity threats associated with its use
of any third-party service provider.
(2) Describe whether any risks from
cybersecurity threats, including as a result of
any previous cybersecurity incidents, have
materially affected or are reasonably likely to
materially affect the registrant, including its
business strategy, results of operations, or
financial condition and if so, how.
(c) Governance. (1) Describe the board of
directors’ oversight of risks from
cybersecurity threats. If applicable, identify
any board committee or subcommittee
responsible for the oversight of risks from
cybersecurity threats and describe the
processes by which the board or such
committee is informed about such risks.
(2) Describe management’s role in
assessing and managing the registrant’s
material risks from cybersecurity threats. In
providing such disclosure, a registrant
should address, as applicable, the following
non-exclusive list of disclosure items:
(i) Whether and which management
positions or committees are responsible for
assessing and managing such risks, and the
relevant expertise of such persons or
members in such detail as necessary to fully
describe the nature of the expertise;
(ii) The processes by which such persons
or committees are informed about and
PO 00000
Frm 00050
Fmt 4701
Sfmt 4700
monitor the prevention, detection,
mitigation, and remediation of cybersecurity
incidents; and
(iii) Whether such persons or committees
report information about such risks to the
board of directors or a committee or
subcommittee of the board of directors.
Instructions to Item 16K(c)
1. In the case of a foreign private issuer
with a two-tier board of directors, for
purposes of paragraph (c) of this Item, the
term ‘‘board of directors’’ means the
supervisory or non-management board. In the
case of a foreign private issuer meeting the
requirements of § 240.10A–3(c)(3) of this
chapter, for purposes of paragraph (c) of this
Item, the term ‘‘board of directors’’ means the
issuer’s board of auditors (or similar body) or
statutory auditors, as applicable.
2. Relevant expertise of management in
paragraph (c)(2)(i) of this Item may include,
for example: Prior work experience in
cybersecurity; any relevant degrees or
certifications; any knowledge, skills, or other
background in cybersecurity.
(d) Structured Data Requirement. Provide
the information required by this Item in an
Interactive Data File in accordance with Rule
405 of Regulation S–T and the EDGAR Filer
Manual.
Instruction to Item 16K. Item 16K applies
only to annual reports, and does not apply
to registration statements on Form 20–F.
*
*
*
*
*
Appendix C—Form 8–K
FORM 8–K
*
*
*
*
*
GENERAL INSTRUCTIONS
*
*
*
*
*
B. Events To Be Reported and Time for Filing
of Reports
1. A report on this form is required to be
filed or furnished, as applicable, upon the
occurrence of any one or more of the events
specified in the items in Sections 1 through
6 and 9 of this form. Unless otherwise
specified, a report is to be filed or furnished
within four business days after occurrence of
the event. If the event occurs on a Saturday,
Sunday or holiday on which the Commission
is not open for business, then the four
business day period shall begin to run on,
and include, the first business day thereafter.
A registrant either furnishing a report on this
form under Item 7.01 (Regulation FD
Disclosure) or electing to file a report on this
form under Item 8.01 (Other Events) solely to
satisfy its obligations under Regulation FD
(17 CFR 243.100 and 243.101) must furnish
such report or make such filing, as
applicable, in accordance with the
requirements of Rule 100(a) of Regulation FD
(17 CFR 243.100(a)), including the deadline
for furnishing or filing such report. A report
pursuant to Item 5.08 is to be filed within
four business days after the registrant
determines the anticipated meeting date. A
report pursuant to Item 1.05 is to be filed
within four business days after the registrant
determines that it has experienced a material
cybersecurity incident.
*
E:\FR\FM\04AUR2.SGM
*
*
04AUR2
*
*
Federal Register / Vol. 88, No. 149 / Friday, August 4, 2023 / Rules and Regulations
G. Use of This Form by Asset-Backed Issuers
*
*
*
*
*
1. * * *
(a) Item 1.05, Cybersecurity Incidents;
(b) Item 2.01, Completion of Acquisition or
Disposition of Assets;
(c) Item 2.02, Results of Operations and
Financial Condition;
(d) Item 2.03, Creation of a Direct Financial
Obligation or an Obligation under an OffBalance Sheet Arrangement of a Registrant;
(e) Item 2.05, Costs Associated with Exit or
Disposal Activities;
(f) Item 2.06, Material Impairments;
(g) Item 3.01, Notice of Delisting or Failure
to Satisfy a Continued Listing Rule or
Standard; Transfer of Listing;
(h) Item 3.02, Unregistered Sales of Equity
Securities;
(i) Item 4.01, Changes in Registrant’s
Certifying Accountant;
(j) Item 4.02, Non-Reliance on Previously
Issued Financial Statements or a Related
Audit Report or Completed Interim Review;
(k) Item 5.01, Changes in Control of
Registrant;
(l) Item 5.02, Departure of Directors or
Principal Officers; Election of Directors;
Appointment of Principal Officers;
(m) Item 5.04, Temporary Suspension of
Trading Under Registrant’s Employee Benefit
Plans; and
(n) Item 5.05, Amendments to the
Registrant’s Code of Ethics, or Waiver of a
Provision of the Code of Ethics.
*
*
*
*
*
INFORMATION TO BE INCLUDED IN THE
REPORT
Section 1—Registrant’s Business and
Operations
*
*
Item 1.05
*
*
*
Material Cybersecurity Incidents
ddrumheller on DSK120RN23PROD with RULES2
(a) If the registrant experiences a
cybersecurity incident that is determined by
the registrant to be material, describe the
material aspects of the nature, scope, and
timing of the incident, and the material
impact or reasonably likely material impact
on the registrant, including its financial
condition and results of operations.
VerDate Sep<11>2014
19:26 Aug 03, 2023
Jkt 259001
(b) A registrant shall provide the
information required by this Item in an
Interactive Data File in accordance with Rule
405 of Regulation S–T and the EDGAR Filer
Manual.
(c) Notwithstanding General Instruction
B.1. to Form 8–K, if the United States
Attorney General determines that disclosure
required by paragraph (a) of this Item 1.05
poses a substantial risk to national security
or public safety, and notifies the Commission
of such determination in writing, the
registrant may delay providing the disclosure
required by this Item 1.05 for a time period
specified by the Attorney General, up to 30
days following the date when the disclosure
required by this Item 1.05 was otherwise
required to be provided. Disclosure may be
delayed for an additional period of up to 30
days if the Attorney General determines that
disclosure continues to pose a substantial
risk to national security or public safety and
notifies the Commission of such
determination in writing. In extraordinary
circumstances, disclosure may be delayed for
a final additional period of up to 60 days if
the Attorney General determines that
disclosure continues to pose a substantial
risk to national security and notifies the
Commission of such determination in
writing. Beyond the final 60-day delay under
this paragraph, if the Attorney General
indicates that further delay is necessary, the
Commission will consider additional
requests for delay and may grant such relief
through Commission exemptive order.
(d) Notwithstanding General Instruction
B.1. to Form 8–K, if a registrant that is subject
to 47 CFR 64.2011 is required to delay
disclosing a data breach pursuant to such
rule, it may delay providing the disclosure
required by this Item 1.05 for such period
that is applicable under 47 CFR 64.2011(b)(1)
and in no event for more than seven business
days after notification required under such
provision has been made, so long as the
registrant notifies the Commission in
correspondence submitted to the EDGAR
system no later than the date when the
disclosure required by this Item 1.05 was
otherwise required to be provided.
PO 00000
Frm 00051
Fmt 4701
Sfmt 9990
51945
Instructions to Item 1.05
1. A registrant’s materiality determination
regarding a cybersecurity incident must be
made without unreasonable delay after
discovery of the incident.
2. To the extent that the information called
for in Item 1.05(a) is not determined or is
unavailable at the time of the required filing,
the registrant shall include a statement to this
effect in the filing and then must file an
amendment to its Form 8–K filing under this
Item 1.05 containing such information within
four business days after the registrant,
without unreasonable delay, determines such
information or within four business days
after such information becomes available.
3. The definition of the term ‘‘cybersecurity
incident’’ in 229.106(a) [Item 106(a) of
Regulation S–K] applies to this Item.
4. A registrant need not disclose specific or
technical information about its planned
response to the incident or its cybersecurity
systems, related networks and devices, or
potential system vulnerabilities in such
detail as would impede the registrant’s
response or remediation of the incident.
*
*
*
*
*
Appendix D—Form 10–K
FORM 10–K
*
*
*
*
*
GENERAL INSTRUCTIONS
*
*
*
*
*
J. Use of This Form by Asset-Backed Issuers
*
*
*
*
*
(1) * * *
(b) Item 1A, Risk Factors and Item 1C,
Cybersecurity;
*
*
*
*
*
*
*
*
*
Part I
*
Item 1C Cybersecurity
(a) Furnish the information required by
Item 106 of Regulation S–K (229.106 of this
chapter).
*
*
*
*
*
[FR Doc. 2023–16194 Filed 8–3–23; 8:45 am]
BILLING CODE 8011–01–P
E:\FR\FM\04AUR2.SGM
04AUR2
Agencies
[Federal Register Volume 88, Number 149 (Friday, August 4, 2023)]
[Rules and Regulations]
[Pages 51896-51945]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2023-16194]
[[Page 51895]]
Vol. 88
Friday,
No. 149
August 4, 2023
Part II
Securities and Exchange Commission
-----------------------------------------------------------------------
17 CFR Parts 229, 232, 239, et al.
Cybersecurity Risk Management, Strategy, Governance, and Incident
Disclosure; Final Rule
Federal Register / Vol. 88 , No. 149 / Friday, August 4, 2023 / Rules
and Regulations
[[Page 51896]]
-----------------------------------------------------------------------
SECURITIES AND EXCHANGE COMMISSION
17 CFR Parts 229, 232, 239, 240, and 249
[Release Nos. 33-11216; 34-97989; File No. S7-09-22]
RIN 3235-AM89
Cybersecurity Risk Management, Strategy, Governance, and Incident
Disclosure
AGENCY: Securities and Exchange Commission.
ACTION: Final rule.
-----------------------------------------------------------------------
SUMMARY: The Securities and Exchange Commission (``Commission'') is
adopting new rules to enhance and standardize disclosures regarding
cybersecurity risk management, strategy, governance, and incidents by
public companies that are subject to the reporting requirements of the
Securities Exchange Act of 1934. Specifically, we are adopting
amendments to require current disclosure about material cybersecurity
incidents. We are also adopting rules requiring periodic disclosures
about a registrant's processes to assess, identify, and manage material
cybersecurity risks, management's role in assessing and managing
material cybersecurity risks, and the board of directors' oversight of
cybersecurity risks. Lastly, the final rules require the cybersecurity
disclosures to be presented in Inline eXtensible Business Reporting
Language (``Inline XBRL'').
DATES:
Effective date: The amendments are effective September 5, 2023.
Compliance dates: See Section II.I (Compliance Dates).
FOR FURTHER INFORMATION CONTACT: Nabeel Cheema, Special Counsel, at
(202) 551-3430, in the Office of Rulemaking, Division of Corporation
Finance; and, with respect to the application of the rules to business
development companies, David Joire, Senior Special Counsel, at (202)
551-6825 or [email protected], Chief Counsel's Office, Division of
Investment Management, U.S. Securities and Exchange Commission, 100 F
Street NE, Washington, DC 20549.
SUPPLEMENTARY INFORMATION: We are adopting amendments to:
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
Commission reference CFR citation (17 CFR)
----------------------------------------------------------------------------------------------------------------
Regulation S-K..................... ..................... Sec. Sec. 229.10 through 229.1305.
Items 106 and 601.... Sec. Sec. 229.106 and 229.601.
Regulation S-T..................... ..................... Sec. Sec. 232.10 through 232.903.
Rule 405............. Sec. 232.405.
Securities Act of 1933 Form S-3............. Sec. 239.13.
(``Securities Act'') \1\.
Securities Exchange Act of 1934 Rule 13a-11.......... Sec. 240.13a-11.
(``Exchange Act'') \2\.
Rule 15d-11.......... Sec. 240.15d-11.
Form 20-F............ Sec. 249.220f.
Form 6-K............. Sec. 249.306.
Form 8-K............. Sec. 249.308.
Form 10-K............ Sec. 249.310.
----------------------------------------------------------------------------------------------------------------
Table of Contents
---------------------------------------------------------------------------
\1\ 15 U.S.C. 77a et seq.
\2\ 15 U.S.C. 78a et seq.
---------------------------------------------------------------------------
I. Introduction and Background
II. Discussion of Final Amendments
A. Disclosure of Cybersecurity Incidents on Current Reports
1. Proposed Amendments
2. Comments
3. Final Amendments
B. Disclosures About Cybersecurity Incidents in Periodic Reports
1. Proposed Amendments
2. Comments
3. Final Amendments
C. Disclosure of a Registrant's Risk Management, Strategy and
Governance Regarding Cybersecurity Risks
1. Risk Management and Strategy
a. Proposed Amendments
b. Comments
c. Final Amendments
2. Governance
a. Proposed Amendments
b. Comments
c. Final Amendments
3. Definitions
a. Proposed Definitions
b. Comments
c. Final Definitions
D. Disclosure Regarding the Board of Directors' Cybersecurity
Expertise
1. Proposed Amendments
2. Comments
3. Final Amendments
E. Disclosure by Foreign Private Issuers
1. Proposed Amendments
2. Comments
3. Final Amendments
F. Structured Data Requirements
1. Proposed Amendments
2. Comments
3. Final Amendments
G. Applicability to Certain Issuers
1. Asset-Backed Issuers
2. Smaller Reporting Companies
H. Need for New Rules and Commission Authority
I. Compliance Dates
III. Other Matters
IV. Economic Analysis
A. Introduction
B. Economic Baseline
1. Current Regulatory Framework
2. Affected Parties
C. Benefits and Costs of the Final Rules
1. Benefits
a. More Timely and Informative Disclosure
b. Greater Uniformity and Comparability
2. Costs
3. Indirect Economic Effects
D. Effects on Efficiency, Competition, and Capital Formation
E. Reasonable Alternatives
1. Website Disclosure
2. Disclosure Through Periodic Reports
3. Exempt Smaller Reporting Companies
V. Paperwork Reduction Act
A. Summary of the Collections of Information
B. Summary of Comment Letters and Revisions to PRA Estimates
C. Effects of the Amendments on the Collections of Information
D. Incremental and Aggregate Burden and Cost Estimates for the
Final Amendments
VI. Final Regulatory Flexibility Analysis
A. Need for, and Objectives of, the Final Amendments
B. Significant Issues Raised by Public Comments
1. Estimate of Affected Small Entities and Impact to Those
Entities
2. Consideration of Alternatives
C. Small Entities Subject to the Final Amendments
D. Projected Reporting, Recordkeeping, and other Compliance
Requirements
E. Agency Action To Minimize Effect on Small Entities
Statutory Authority
I. Introduction and Background
On March 9, 2022, the Commission proposed new rules, and rule and
form amendments, to enhance and standardize disclosures regarding
cybersecurity risk management, strategy, governance, and cybersecurity
incidents by public companies that are subject to the reporting
requirements of the
[[Page 51897]]
Exchange Act.\3\ The proposal followed on interpretive guidance on the
application of existing disclosure requirements to cybersecurity risk
and incidents that the Commission and staff had issued in prior years.
---------------------------------------------------------------------------
\3\ See Cybersecurity Risk Management, Strategy, Governance, and
Incident Disclosure, Release No. 33-11038 (Mar. 9, 2022) [87 FR
16590 (Mar. 23, 2022)] (``Proposing Release'').
---------------------------------------------------------------------------
In particular, in 2011, the Division of Corporation Finance issued
interpretive guidance providing the Division's views concerning
operating companies' disclosure obligations relating to cybersecurity
(``2011 Staff Guidance'').\4\ In that guidance, the staff observed that
``[a]lthough no existing disclosure requirement explicitly refers to
cybersecurity risks and cyber incidents, a number of disclosure
requirements may impose an obligation on registrants to disclose such
risks and incidents,'' and further that ``material information
regarding cybersecurity risks and cyber incidents is required to be
disclosed when necessary in order to make other required disclosures,
in light of the circumstances under which they are made, not
misleading.'' \5\ The guidance pointed specifically to disclosure
obligations under 17 CFR 229.503 (Regulation S-K ``Item 503(c)'') (Risk
factors) (since moved to 17 CFR 229.105 (Regulation S-K ``Item 105'')),
17 CFR 229.303 (Regulation S-K ``Item 303'') (Management's discussion
and analysis of financial condition and results of operations), 17 CFR
229.101 (Regulation S-K ``Item 101'') (Description of business), 17 CFR
229.103 (Regulation S-K ``Item 103'') (Legal proceedings), and 17 CFR
229.307 (Disclosure controls and procedures), as well as to Accounting
Standards Codifications 350-40 (Internal-Use Software), 605-50
(Customer Payments and Incentives), 450-20 (Loss Contingencies), 275-10
(Risks and Uncertainties), and 855-10 (Subsequent Events).\6\
---------------------------------------------------------------------------
\4\ See CF Disclosure Guidance: Topic No. 2--Cybersecurity (Oct.
13, 2011), available at https://www.sec.gov/divisions/corpfin/guidance/cfguidance-topic2.htm.
\5\ Id.
\6\ Id.
---------------------------------------------------------------------------
In 2018, ``[i]n light of the increasing significance of
cybersecurity incidents,'' the Commission issued interpretive guidance
to reinforce and expand upon the 2011 Staff Guidance and also address
the importance of cybersecurity policies and procedures, as well as the
application of insider trading prohibitions in the context of
cybersecurity (``2018 Interpretive Release'').\7\ In addition to
discussing the provisions previously covered in the 2011 Staff
Guidance, the new guidance addressed 17 CFR 229.407 (Regulation S-K
``Item 407'') (Corporate Governance), 17 CFR part 210 (``Regulation S-
X''), and 17 CFR part 243 (``Regulation FD'').\8\ The 2018 Interpretive
Release noted that companies can provide current reports on Form 8-K
and Form 6-K to maintain the accuracy and completeness of effective
shelf registration statements, and it also advised companies to
consider whether it may be appropriate to implement restrictions on
insider trading during the period following an incident and prior to
disclosure.\9\
---------------------------------------------------------------------------
\7\ See Commission Statement and Guidance on Public Company
Cybersecurity Disclosures, Release No. 33-10459 (Feb. 21, 2018) [83
FR 8166 (Feb. 26, 2018)], at 8167.
\8\ Id.
\9\ Id.
---------------------------------------------------------------------------
As noted in the Proposing Release, current disclosure practices are
varied. For example, while some registrants do report material
cybersecurity incidents, most typically on Form 10-K, review of Form 8-
K, Form 10-K, and Form 20-F filings by staff in the Division of
Corporation Finance has shown that companies provide different levels
of specificity regarding the cause, scope, impact, and materiality of
cybersecurity incidents. Likewise, staff has also observed that, while
the majority of registrants that are disclosing cybersecurity risks
appear to be providing such disclosures in the risk factor section of
their annual reports on Form 10-K, the disclosures are sometimes
included with other unrelated disclosures, which makes it more
difficult for investors to locate, interpret, and analyze the
information provided.\10\
---------------------------------------------------------------------------
\10\ See infra Section IV.A (noting that current cybersecurity
disclosures appear in varying sections of companies' periodic and
current reports and are sometimes included with other unrelated
disclosures).
---------------------------------------------------------------------------
In the Proposing Release, the Commission explained that a number of
trends underpinned investors' and other capital markets participants'
need for more timely and reliable information related to registrants'
cybersecurity than was produced following the 2011 Staff Guidance and
the 2018 Interpretive Release. First, an ever-increasing share of
economic activity is dependent on electronic systems, such that
disruptions to those systems can have significant effects on
registrants and, in the case of large-scale attacks, systemic effects
on the economy as a whole.\11\ Second, there has been a substantial
rise in the prevalence of cybersecurity incidents, propelled by several
factors: the increase in remote work spurred by the COVID-19 pandemic;
the increasing reliance on third-party service providers for
information technology services; and the rapid monetization of
cyberattacks facilitated by ransomware, black markets for stolen data,
and crypto-asset technology.\12\ Third, the costs and adverse
consequences of cybersecurity incidents to companies are increasing;
such costs include business interruption, lost revenue, ransom
payments, remediation costs, liabilities to affected parties,
cybersecurity protection costs, lost assets, litigation risks, and
reputational damage.\13\
---------------------------------------------------------------------------
\11\ Proposing Release at 16591-16592. See also U.S. Financial
Stability Oversight Council, Annual Report (2021), at 168, available
at https://home.treasury.gov/system/files/261/FSOC2021AnnualReport.pdf (finding that ``a destabilizing
cybersecurity incident could potentially threaten the stability of
the U.S. financial system'').
\12\ Proposing Release at 16591-16592.
\13\ Id.
---------------------------------------------------------------------------
Since publication of the Proposing Release, these trends have
continued apace, with significant cybersecurity incidents occurring
across companies and industries. For example, threat actors repeatedly
and successfully executed attacks on high-profile companies across
multiple critical industries over the course of 2022 and the first
quarter of 2023, causing the Department of Homeland Security's Cyber
Safety Review Board to initiate multiple reviews.\14\ Likewise, state
actors have perpetrated multiple high-profile attacks, and recent
geopolitical instability has elevated such threats.\15\ A recent study
by two cybersecurity firms found that 98 percent of organizations use
at least one third-party vendor that
[[Page 51898]]
has experienced a breach in the last two years.\16\ In addition, recent
developments in artificial intelligence may exacerbate cybersecurity
threats, as researchers have shown that artificial intelligence systems
can be leveraged to create code used in cyberattacks, including by
actors not versed in programming.\17\ Overall, evidence suggests
companies may be underreporting cybersecurity incidents.\18\
---------------------------------------------------------------------------
\14\ See Department of Homeland Security, Cyber Safety Review
Board to Conduct Second Review on Lapsus$ (Dec. 2, 2022), available
at https://www.dhs.gov/news/2022/12/02/cyber-safety-review-board-conduct-second-review-lapsus; see also Tim Starks, The Latest Mass
Ransomware Attack Has Been Unfolding For Nearly Two Months, Wash.
Post (Mar. 27, 2023), available at https://www.washingtonpost.com/politics/2023/03/27/latest-mass-ransomware-attack-has-been-unfolding-nearly-two-months/.
\15\ See, e.g., Press Release, Federal Bureau of Investigation,
FBI Confirms Lazarus Group Cyber Actors Responsible for Harmony's
Horizon Bridge Currency Theft (Jan. 23, 2023), available at https://www.fbi.gov/news/press-releases/fbi-confirms-lazarus-group-cyber-actors-responsible-for-harmonys-horizon-bridge-currency-theft; Alert
(AA22-257A), Cybersecurity & Infrastructure Security Agency, Iranian
Islamic Revolutionary Guard Corps-Affiliated Cyber Actors Exploiting
Vulnerabilities for Data Extortion and Disk Encryption for Ransom
Operations (Sep. 14, 2022), available at https://www.cisa.gov/uscert/ncas/alerts/aa22-257a; National Security Agency et al., Joint
Cybersecurity Advisory: Russian State-Sponsored and Criminal Cyber
Threats to Critical Infrastructure (Apr. 20, 2022), available at
https://media.defense.gov/2022/Apr/20/2002980529/-1/-1/1/joint_csa_russian_state-sponsored_and_criminal_cyber_threats_to_critical_infrastructure_20220420.pdf.
\16\ SecurityScorecard, Cyentia Institute and SecurityScorecard
Research Report: Close Encounters of the Third (and Fourth) Party
Kind (Feb 1, 2023), available at https://securityscorecard.com/research/cyentia-close-encounters-of-the-third-and-fourth-party-kind/.
\17\ Check Point Research, OPWNAI: AI that Can Save the Day or
Hack it Away (Dec. 19, 2022), available at https://research.checkpoint.com/2022/opwnai-ai-that-can-save-the-day-or-hack-it-away.
\18\ Bitdefender, Whitepaper: Bitdefender 2023 Cybersecurity
Assessment (Apr. 2023), available at https://businessresources.bitdefender.com/bitdefender-2023-cybersecurity-assessment.
---------------------------------------------------------------------------
Legislatively, we note two significant developments occurred
following publication of the Proposing Release. First, the President
signed into law the Cyber Incident Reporting for Critical
Infrastructure Act of 2022 (``CIRCIA'') \19\ on March 15, 2022, as part
of the Consolidated Appropriations Act of 2022.\20\ The centerpiece of
CIRCIA is the reporting obligation placed on companies in defined
critical infrastructure sectors.\21\ Once rules are adopted by the
Cybersecurity & Infrastructure Security Agency (``CISA''), these
companies will be required to report covered cyber incidents to CISA
within 72 hours of discovery, and report ransom payments within 24
hours.\22\ Importantly, reports made to CISA pursuant to CIRCIA will
remain confidential; while the information contained therein may be
shared across Federal agencies for cybersecurity, investigatory, and
law enforcement purposes, the information may not be disclosed
publicly, except in anonymized form.\23\ We note that CIRCIA also
mandated the creation of a ``Cyber Incident Reporting Council . . . to
coordinate, deconflict, and harmonize Federal incident reporting
requirements'' (the ``CIRC''), of which the Commission is a member.\24\
Second, on December 21, 2022, the President signed into law the Quantum
Computing Cybersecurity Preparedness Act, which directs the Federal
Government to adopt technology that is protected from decryption by
quantum computing, a developing technology that may increase computer
processing capacity considerably and thereby render existing computer
encryption vulnerable to decryption.\25\
---------------------------------------------------------------------------
\19\ Cyber Incident Reporting for Critical Infrastructure Act of
2022, Public Law 117-103, 136 Stat. 1038 (2022).
\20\ Consolidated Appropriations Act of 2022, H.R. 2471, 117th
Cong. (2022).
\21\ The sectors are defined in Presidential Policy Directive/
PPD-21, Critical Infrastructure Security and Resilience (Feb. 12,
2013), as: Chemical; Commercial Facilities; Communications; Critical
Manufacturing; Dams; Defense Industrial Base; Emergency Services;
Energy; Financial Services; Food and Agriculture; Government
Facilities; Healthcare and Public Health; Information Technology;
Nuclear Reactors, Materials, and Waste; Transportation Systems;
Water and Wastewater Systems. Because these sectors encompass some
private companies and do not encompass all public companies,
CIRCIA's reach is both broader and narrower than the set of
companies subject to the rules we are adopting.
\22\ 6 U.S.C. 681b(a)(1).
\23\ 6 U.S.C. 681e. See infra Section II.A.3 for a discussion of
why our final rules serve a different purpose and are not at odds
with the goals of CIRCIA.
\24\ 6 U.S.C. 681f.
\25\ Quantum Computing Cybersecurity Preparedness Act, H.R.
7535, 117th Cong. (2022). More recently, the White House released a
National Cybersecurity Strategy to combat the ongoing risks
associated with cyberattacks. The National Cybersecurity Strategy
seeks to rebalance the responsibility for defending against cyber
threats toward companies instead of the general public, and looks to
realign incentives to favor long-term investments in cybersecurity.
See Press Release, White House, FACT SHEET: Biden-Harris
Administration Announces National Cybersecurity Strategy (Mar. 2,
2023), available at https://www.whitehouse.gov/briefing-room/statements-releases/2023/03/02/fact-sheet-biden-harris-administration-announces-national-cybersecurity-strategy/.
---------------------------------------------------------------------------
We received over 150 comment letters in response to the Proposing
Release.\26\ The majority of comments focused on the proposed incident
disclosure requirement, although we also received substantial comment
on the proposed risk management, strategy, governance, and board
expertise requirements. In addition, the Commission's Investor Advisory
Committee adopted recommendations (``IAC Recommendation'') with respect
to the proposal, stating that it: supports the proposed incident
disclosure requirement; supports the proposed risk management,
strategy, and governance disclosure requirements; recommends the
Commission reconsider the proposed board of directors' cybersecurity
expertise disclosure requirement; suggests requiring companies to
disclose the key factors they used to determine the materiality of a
reported cybersecurity incident; and suggests extending the proposed 17
CFR 229.106 (Regulation S-K ``Item 106'') disclosure requirements to
registration statements.\27\
---------------------------------------------------------------------------
\26\ The public comments we received are available at https://www.sec.gov/comments/s7-09-22/s70922.htm. On Mar. 9, 2022, the
Commission published the Proposing Release on its website. The
comment period for the Proposing Release was open for 60 days from
issuance and publication on SEC.gov and ended on May 9, 2022. One
commenter asserted that the comment period was not sufficient and
asked the Commission to extend it by 30 days. See letter from
American Chemistry Council (``ACC''). In Oct. 2022, the Commission
reopened the comment period for the Proposing Release and other
rulemakings because certain comments on the Proposing Release and
other rulemakings were potentially affected by a technological error
in the Commission's internet comment form. See Resubmission of
Comments and Reopening of Comment Periods for Several Rulemaking
Releases Due to a Technological Error in Receiving Certain Comments,
Release No. 33-11117 (Oct. 7, 2022) [87 FR 63016 (Oct. 18, 2022)]
(``Reopening Release''). The Reopening Release was published on the
Commission's website on Oct. 7, 2022 and in the Federal Register on
Oct. 18, 2022, and the comment period ended on Nov. 1, 2022. A few
commenters asserted that the comment period for the reopened
rulemakings was not sufficient and asked the Commission to extend
the comment period for those rulemakings. See, e.g., letters from
Attorneys General of the states of Montana et al. (Oct. 24, 2022)
and U.S. Chamber of Commerce (Nov. 1, 2022). We have considered all
comments received since Mar. 9, 2022 and do not believe an
additional extension of the comment period is necessary.
\27\ See U.S. Securities and Exchange Commission Investor
Advisory Committee, Recommendation of the Investor as Owner
Subcommittee and Disclosure Subcommittee of the SEC Investor
Advisory Committee Regarding Cybersecurity Risk Management,
Strategy, Governance, and Incident Disclosure (Sept. 21, 2022),
available at https://www.sec.gov/spotlight/investor-advisory-committee-2012/20220921-cybersecurity-disclosure-recommendation.pdf.
The Investor Advisory Committee also held a panel discussion on
cybersecurity at its Mar. 10, 2022 meeting. See U.S. Securities and
Exchange Commission Investor Advisory Committee, Meeting Agenda
(Mar. 10, 2022), available at https://www.sec.gov/spotlight/investor-advisory-committee/iac031022-agenda.htm.
---------------------------------------------------------------------------
We are making a number of important changes from the Proposing
Release in response to comments received. With respect to incident
disclosure, we are narrowing the scope of disclosure, adding a limited
delay for disclosures that would pose a substantial risk to national
security or public safety, requiring certain updated incident
disclosure on an amended Form 8-K instead of Forms 10-Q and 10-K for
domestic registrants, and on Form 6-K instead of Form 20-F for foreign
private issuers (``FPIs''),\28\ and omitting the proposed aggregation
of immaterial incidents for materiality analyses. We are streamlining
the proposed disclosure elements related to risk management, strategy,
and governance, and we are not adopting the proposed requirement to
disclose board cybersecurity expertise. The following
[[Page 51899]]
table summarizes the requirements we are adopting, including changes
from the Proposing Release, as described more fully in Section II
below: \29\
---------------------------------------------------------------------------
\28\ An FPI is any foreign issuer other than a foreign
government, except for an issuer that (1) has more than 50 percent
of its outstanding voting securities held of record by U.S.
residents; and (2) any of the following: (i) a majority of its
executive officers or directors are citizens or residents of the
United States; (ii) more than 50 percent of its assets are located
in the United States; or (iii) its business is principally
administered in the United States. 17 CFR 230.405. See also 17 CFR
240.3b-4(c).
\29\ The information in this table is not comprehensive and is
intended only to highlight some of the more significant aspects of
the final amendments. It does not reflect all of the amendments or
all of the rules and forms that are affected by the final
amendments, which are discussed in detail below. As such, this table
should be read together with the entire release, including the
regulatory text.
------------------------------------------------------------------------
Summary description of the disclosure
Item requirement \30\
------------------------------------------------------------------------
Regulation S-K Item 106(b)-- Registrants must describe their
Risk management and strategy. processes, if any, for the assessment,
identification, and management of
material risks from cybersecurity
threats, and describe whether any risks
from cybersecurity threats have
materially affected or are reasonably
likely to materially affect their
business strategy, results of
operations, or financial condition.
Regulation S-K Item 106(c)-- Registrants must:
Governance. --Describe the board's oversight of risks
from cybersecurity threats.
--Describe management's role in assessing
and managing material risks from
cybersecurity threats.
Form 8-K Item 1.05--Material Registrants must disclose any
Cybersecurity Incidents. cybersecurity incident they experience
that is determined to be material, and
describe the material aspects of its:
--Nature, scope, and timing; and
--Impact or reasonably likely impact.
An Item 1.05 Form 8-K must be filed
within four business days of determining
an incident was material. A registrant
may delay filing as described below, if
the United States Attorney General
(``Attorney General'') determines
immediate disclosure would pose a
substantial risk to national security or
public safety.
Registrants must amend a prior Item 1.05
Form 8-K to disclose any information
called for in Item 1.05(a) that was not
determined or was unavailable at the
time of the initial Form 8-K filing.
Form 20-F.................... FPIs must:
--Describe the board's oversight of risks
from cybersecurity threats.
--Describe management's role in assessing
and managing material risks from
cybersecurity threats.
Form 6-K..................... FPIs must furnish on Form 6-K information
on material cybersecurity incidents that
they disclose or otherwise publicize in
a foreign jurisdiction, to any stock
exchange, or to security holders.
------------------------------------------------------------------------
Overall, we remain persuaded that, as detailed in the Proposing
Release: under-disclosure regarding cybersecurity persists despite the
Commission's prior guidance; investors need more timely and consistent
cybersecurity disclosure to make informed investment decisions; and
recent legislative and regulatory developments elsewhere in the Federal
Government, including those developments subsequent to the issuance of
the Proposing Release such as CIRCIA \31\ and the Quantum Computing
Cybersecurity Preparedness Act,32 while serving related purposes, will
not effectuate the level of public cybersecurity disclosure needed by
investors in public companies.
---------------------------------------------------------------------------
\30\ For purposes of this release, the terms ``public
companies,'' ``companies,'' and ``registrants'' include issuers that
are business development companies as defined in section 2(a)(48) of
the Investment Company Act of 1940, which are a type of closed-end
investment company that is not registered under the Investment
Company Act, but do not include investment companies registered
under that Act.
\31\ Supra note 19.
---------------------------------------------------------------------------
II. Discussion of Final Amendments
A. Disclosure of Cybersecurity Incidents on Current Reports
1. Proposed Amendments
The Commission proposed to amend Form 8-K by adding new Item 1.05
that would require a registrant to disclose the following information
regarding a material cybersecurity incident, to the extent known at the
time of filing:
When the incident was discovered and whether it is
ongoing;
A brief description of the nature and scope of the
incident;
Whether any data were stolen, altered, accessed, or used
for any other unauthorized purpose;
The effect of the incident on the registrant's operations;
and
Whether the registrant has remediated or is currently
remediating the incident.\33\
---------------------------------------------------------------------------
\33\ Proposing Release at 16595.
---------------------------------------------------------------------------
The Commission clarified in the Proposing Release that this
requirement would not extend to specific, technical information about
the registrant's planned response to the incident or its cybersecurity
systems, related networks and devices, or potential system
vulnerabilities in such detail as would impede the registrant's
response or remediation of the incident.\34\
---------------------------------------------------------------------------
\34\ Id.
---------------------------------------------------------------------------
The Commission proposed to set the filing trigger for Item 1.05 as
the date the registrant determines that a cybersecurity incident is
material; as with all other Form 8-K items, the proposed filing
deadline would be four business days after the trigger.\35\ To protect
against any inclination on the part of a registrant to delay making a
materiality determination with a view toward prolonging the filing
deadline, the Commission proposed adding Instruction 1 to Item 1.05
requiring that ``a registrant shall make a materiality determination
regarding a cybersecurity incident as soon as reasonably practicable
after discovery of the incident.'' \36\
---------------------------------------------------------------------------
\35\ Id.
\36\ Id. at 16596.
---------------------------------------------------------------------------
The Commission affirmed in the Proposing Release that the
materiality standard registrants should apply in evaluating whether a
Form 8-K would be triggered under proposed Item 1.05 would be
consistent with that set out in the numerous cases addressing
materiality in the securities laws, including TSC Industries, Inc. v.
Northway, Inc.,\37\ Basic, Inc. v. Levinson,\38\ and Matrixx
Initiatives, Inc. v. Siracusano,\39\ and likewise with that set forth
in 17 CFR 230.405 (``Securities
[[Page 51900]]
Act Rule 405'') and 17 CFR 240.12b-2 (``Exchange Act Rule 12b-2'').
That is, information is material if ``there is a substantial likelihood
that a reasonable shareholder would consider it important'' \40\ in
making an investment decision, or if it would have ``significantly
altered the `total mix' of information made available.'' \41\ ``Doubts
as to the critical nature'' of the relevant information should be
``resolved in favor of those the statute is designed to protect,''
namely investors.\42\
---------------------------------------------------------------------------
\37\ TSC Indus. v. Northway, 426 U.S. 438, 449 (1976).
\38\ Basic Inc. v. Levinson, 485 U.S. 224, 232 (1988).
\39\ Matrixx Initiatives v. Siracusano, 563 U.S. 27 (2011).
\40\ TSC Indus., 426 U.S. at 449.
\41\ Id.
\42\ Id. at 448.
---------------------------------------------------------------------------
The Commission explained that the timely disclosure of the
information required by proposed Item 1.05 would enable investors and
other market participants to assess the possible effects of a material
cybersecurity incident on the registrant, including any short- and
long-term financial effects or operational effects, resulting in
information useful for their investment decisions.\43\ Aligning the
deadline for Item 1.05 with that of the other Form 8-K items would, the
Commission maintained, significantly improve the timeliness of
cybersecurity incident disclosures as well as standardize those
disclosures.\44\ The Commission did not propose to provide a reporting
delay in cases of ongoing internal or external investigations of
cybersecurity incidents.\45\ Nevertheless, the Proposing Release
requested comment on whether to allow a delay in reporting where the
Attorney General determines that a delay is in the interest of national
security.\46\
---------------------------------------------------------------------------
\43\ Proposing Release at 16595.
\44\ Id.
\45\ Id. at 16596.
\46\ Id. at 16598.
---------------------------------------------------------------------------
2. Comments
Proposed Item 1.05 received a significant amount of feedback from
commenters. Some commenters supported Item 1.05 as proposed,\47\ saying
that the current level of disclosure on cybersecurity incidents is
inadequate to meet investor needs, and Item 1.05 would remedy this
inadequacy by effectuating the disclosure of decision-useful
information.\48\ One commenter also anticipated that Item 1.05 would
reduce the risk of insider trading by shortening the time between
discovery of an incident and public disclosure.\49\
---------------------------------------------------------------------------
\47\ See letters from American Institute of CPAs (``AICPA'');
Better Markets (``Better Markets''); BitSight Technologies, Inc.
(``BitSight''); California Public Employees' Retirement System
(``CalPERS''); Crindata, LLC (``Crindata''); Council of
Institutional Investors (``CII''); Information Technology and
Innovation Foundation (``ITIF''); North American Securities
Administrators Association Inc. (``NASAA''); Professor Jerry Perullo
(``Prof. Perullo''); Professor Preeti Choudhary (``Prof.
Choudhary''); Tessa Mishoe (``T. Mishoe''). See also IAC
Recommendation.
\48\ Id.
\49\ See letter from Better Markets.
---------------------------------------------------------------------------
Other commenters opposed proposed Item 1.05, for several reasons.
Some commenters said that if proposed Item 1.05 were to result in
disclosure while an incident is still ongoing, it would tip off the
threat actor and thus make successful neutralization of the incident
more difficult.\50\ Commenters also expressed concern that public
notice of a vulnerability could draw attacks from other threat actors
who were previously unaware of the vulnerability; and such attacks
could target the disclosing registrant or other companies with the same
vulnerability, particularly if the vulnerability is with a third-party
service provider used by multiple companies.\51\ Some of these
commenters objected specifically to the requirement in Item 1.05 to
disclose whether remediation has occurred, stating that this
information could assist threat actors in their targeting or invite
further targeted attacks,\52\ while others more generally stated that
the Item 1.05 disclosure would be overly detailed, such that it would
give a road map to threat actors for planning attacks.\53\ One
commenter argued that the prospect of possibly having to file an Item
1.05 Form 8-K could chill threat information sharing within industries,
because companies would fear that any cybersecurity risk information
they share could later be used to question their disclosure
decisions.\54\
---------------------------------------------------------------------------
\50\ See letters from ACC; American Gas Association and
Interstate Natural Gas Association of America (``AGA/INGAA'');
BioTechnology Innovation Organization (``BIO''); Bank Policy
Institute, American Bankers Association, and Mid-Size Bank Coalition
of America (``BPI et al.''); BSA/The Software Alliance (``BSA'');
Business Roundtable (``Business Roundtable''); Canadian Bankers
Association (``CBA''); Edison Electric Institute (``EEI''); Energy
Infrastructure Council (``EIC''); Federation of American Hospitals
(``FAH''); Financial Services Sector Coordinating Council
(``FSSCC''); Information Technology Industry Council (``ITI''); LTSE
Services, Inc. (``LTSE''); National Association of Manufacturers
(``NAM''); National Defense Industrial Association (``NDIA''); Quest
Diagnostics Incorporated (``Quest''); Rapid7, Inc. (``Rapid7'');
Society for Corporate Governance (``SCG''); Securities Industry and
Financial Markets Association (``SIFMA''); TransUnion; R Street
Institute (``R Street''); U.S. Chamber of Commerce (``Chamber'').
\51\ See letters from ABA Committee on Federal Regulation of
Securities (``ABA''); Aerospace Industries Association of America
(``AIA''); Alliance for Automotive Innovation (``Auto Innovators'');
AGA/INGAA; American Property Casualty Insurance Association
(``APCIA''); BPI et al.; BSA; Business Roundtable; CBA; Chamber;
Cellular Telecommunications and internet Assoc. (``CTIA'');
Cybersecurity Coalition; EEI; EIC; Empire State Realty Trust, Inc.
(``Empire''); Enbridge Inc. (``Enbridge''); FSSCC; internet Security
Alliance; ITI; Microsoft Corporation (``Microsoft''); NDIA; PPG
Industries, Inc. (``PPG''); PricewaterhouseCoopers LLP (``PWC'');
Rapid7; R Street; SCG; SIFMA; U.S. Senator Rob Portman (``Sen.
Portman''); Virtu Financial (``Virtu'').
\52\ See letters from ABA; AGA/INGAA; BPI et al.; Cybersecurity
Coalition; Empire; Enbridge; PWC; SIFMA; SCG; Virtu.
\53\ See letters from AGA/INGAA; BSA; EIC; ITI; PPG.
\54\ See letter from Consumer Technology Association (``CTA'').
---------------------------------------------------------------------------
Some of the commenters that disagreed with the level of disclosure
required by proposed Item 1.05 recommended that the Commission narrow
the disclosure requirements of the rule. For example, one such
commenter advised dropping the proposed requirement to disclose ``when
the incident was discovered,'' arguing that this detail may cause
confusion, particularly where an incident was detected some time ago
but a significant aspect rendering it material surfaced only
recently.\55\ Another commenter opined that ``whether the registrant
has remediated or is currently remediating the incident'' is
duplicative of ``whether it is ongoing,'' so either of the two could be
eliminated.\56\ One commenter contended that a materiality filter
should be added to the details required by Item 1.05, such that
companies would have to disclose only details that themselves are
material, rather than immaterial details of a material incident.\57\
---------------------------------------------------------------------------
\55\ See letter from Prof. Perullo.
\56\ See letter from ABA.
\57\ See letter from ITI.
---------------------------------------------------------------------------
By contrast, there were also commenters that recommended expanding
the disclosure requirements in the proposed rule. In this regard, some
commenters recommended requiring that registrants disclose asset
losses, intellectual property losses, and the value of business lost
due to the incident.\58\ Other suggestions included requiring that
incidents be quantified as to their severity and impact via
standardized rating systems, and that registrants disclose how they
became aware of the incident, as this may shed light on the
effectiveness of a company's cybersecurity policies and procedures.\59\
Additionally, commenters suggested banning trading by insiders during
the time between the materiality determination and disclosure of the
incident.\60\
---------------------------------------------------------------------------
\58\ See letters from Profs. Rajgopal & Sharpe; PWC.
\59\ See letters from BitSight; Cloud Security Alliance
(``CSA'').
\60\ See letter from Prof. Mitts.
---------------------------------------------------------------------------
Commenters provided reactions to the application of Item 1.05 to
incidents
[[Page 51901]]
connected with third-party systems. A number of commenters contended
that registrants should be exempt from having to disclose cybersecurity
incidents in third-party systems they use because of their reduced
control over such systems.\61\ Similarly, several commenters advocated
for a safe harbor for information disclosed about third-party systems,
given registrants' reduced visibility into such systems.\62\ A few
commenters suggested a longer reporting timeframe for third-party
incidents, because the registrant may be dependent on the third party
for information (which may not be provided in a timely manner), and to
avoid harm to other companies reliant on the same third party.\63\
Commenters also recommended that Item 1.05 be phased in over a longer
period of time with respect to third-party incidents, to give
registrants time to develop information sharing processes with their
third-party service providers.\64\
---------------------------------------------------------------------------
\61\ See letters from ABA; AIA; APCIA; Business Roundtable;
Cybersecurity Coalition; Chamber; EIC; FAH; ISA; ITI; NAM; NDIA;
National Multifamily Housing Council and National Apartment
Association (``NMHC''); Paylocity; SIFMA.
\62\ See letters from Chevron Corporation (``Chevron''); APCIA;
BPI et al.; BIO; CSA; Financial Executive International's Committee
on Corporate Reporting (``FEI''); ITI; ISA; NMHC; SIFMA.
\63\ See letters from ABA; R Street.
\64\ See letters from Business Roundtable; Deloitte & Touche LLP
(``Deloitte'').
---------------------------------------------------------------------------
Commenters also requested guidance or otherwise raised concerns
where the proposed requirements might trigger disclosures by third-
party service providers. A commenter requested clarity on whether an
incident should be disclosed by the third-party service provider
registrant that owns the affected system or the customer registrant
that owns the affected information, or both.\65\ And two commenters
argued that third-party service providers should simply pass along
information to their end customers, who would then make their own
materiality determination and disclose accordingly; this should
particularly be the case, a commenter said, where an attack on a third-
party data center results in a data breach for an end customer but does
not affect the services the data center provides.\66\
---------------------------------------------------------------------------
\65\ See letter from Business Roundtable.
\66\ See letters from BSA; ITI.
---------------------------------------------------------------------------
The proposed timing of incident disclosure also received a
significant level of public comment. For example, a few commenters said
the level of detail required by Item 1.05 is impractical to produce in
the allotted time.\67\ Other commenters said that the proposed deadline
would lead to the disclosure of tentative, unclear, or potentially
inaccurate information that is not decision-useful to investors,\68\
resulting in the market mispricing the underlying securities.\69\
Commenters also argued that Item 1.05 is qualitatively different from
all other Form 8-K items in that the trigger for Item 1.05 is largely
outside the company's control.\70\ Some commenters worried the proposed
deadline would lead to disclosure of ``false positives,'' that is,
incidents that appear material at first but later on with the emergence
of more information turn out not to be material.\71\
---------------------------------------------------------------------------
\67\ See letters from ABA; NMHC; Quest.
\68\ See letters from ABA; ACC; AIA; Auto Innovators; American
Investment Council (``AIC''); BIO; Business Roundtable; CBA;
Chamber; Confidentiality Coalition; CTIA; Davis Polk & Wardwell LLP
(``Davis Polk''); Debevoise & Plimpton (``Debevoise''); Federated
Hermes; FSSCC; Microsoft; NAM; Nasdaq Stock Market, LLC
(``Nasdaq''); NDIA; Quest; SCG; TransUnion; Wilson Sonsini Goodrich
& Rosati (``Wilson Sonsini''); Virtu.
\69\ See letters from ABA; ACC; AIA; AIC; BIO; BPI et al.;
Business Roundtable; Confidentiality Coalition; Davis Polk; ISA;
Nasdaq; PPG; Quest; Rapid7; SCG; Sen. Portman; SIFMA; Virtu.
\70\ See letters from CTIA; Debevoise; EIC; LTSE; New York City
Bar Association (``NYC Bar''); Quest.
\71\ See letters from LTSE; PPG; SCG.
---------------------------------------------------------------------------
Commenters suggested a range of alternative reporting deadlines for
Item 1.05. A common suggestion was to modify the measurement date from
the determination of materiality to another point in the lifecycle of
the incident when the incident is no longer a threat to the
registrant--commenters variously termed this as ``containment,''
``remediation,'' ``mitigation,'' and comparable terms.\72\ One
commenter recommended conditioning a reporting delay on the registrant
being actively engaged in containing the incident and reasonably
believing that containment can be completed in a timely manner.\73\
Similarly, several commenters recommended that the rule allow for a
delay in providing Item 1.05 disclosure based on a registrant's
assessment of the potential negative consequences of public disclosure,
using a variety of measures they suggested.\74\ Another suggestion was
to replace the proposed deadline with an instruction to disclose
material incidents ``without unreasonable delay.'' \75\
---------------------------------------------------------------------------
\72\ See letters from American Council of Life Insurers
(``ACLI''); BCE Inc., Rogers Communications Inc., TELUS Corporation
(``BCE''); BPI et al.; Business Roundtable; Chamber; CTA;
Cybersecurity Coalition; Empire; FAH; Federated Hermes; FSSCC; ISA;
ITI; NAM; Nasdaq; NDIA; NMHC; NYSE Group (``NYSE''); Quest; Rapid7;
Sen. Portman; SCG; SIFMA; SM4RT Secure LLC (``SM4RT Secure'');
TransUnion.
\73\ See letter from Rapid7.
\74\ See letters from BSA (suggesting a ``tailored, balancing
test''); EEI (advocating delay ``to the extent . . . the registrant
in good faith concludes that its disclosure will expose it or others
to ongoing or additional risks of a cybersecurity incident''); EIC;
Microsoft (requesting that companies be allowed to ``manage the
timing'' of disclosure ``when compelling conditions exist such that
premature disclosure would result in greater harm to the company,
its investors, or the national digital ecosystem''); Nareit and The
Real Estate Roundtable (``Nareit'') (stating delay should be
permitted where disclosure ``would exacerbate injury to the company
and/or its shareholders''); SIFMA (advocating a ```responsible
disclosure' exception'' that applies ``where disclosure of a cyber
incident or vulnerability could have a more damaging effect than
delayed disclosure''); Wilson Sonsini (stating ``the Commission
should allow board members to decide to delay reporting if doing so
could cause material harm to the company'').
\75\ See letters from CTIA; National Restaurant Association
(``NRA'').
---------------------------------------------------------------------------
Some commenters recommended instead increasing the number of days
between the reporting trigger and the reporting deadline. A few
commenters recommended adding one business day to make the deadline
five business days; \76\ one noted this would result in every
registrant having at least a full calendar week to gather information
and prepare the Form 8-K.\77\ Another commenter recommended a deadline
of 15 business days, along with a cure period to allow registrants a
defined period of time to fix potential reporting mistakes.\78\ A few
commenters recommended a 30-day deadline,\79\ with their choice of 30
days tending to be a proxy for some other factor, such as containment
or remediation,\80\ or state notification requirements.\81\
---------------------------------------------------------------------------
\76\ See letters from AIC; Debevoise; NYC Bar.
\77\ See letter from AIC.
\78\ See letter from R Street.
\79\ See letters from APCIA; Hunton Andrews Kurth, LLP
(``Hunton''); Rapid7.
\80\ See letters from APCIA (``[w]e believe that permitting a
registrant to delay the filing for a short period of time strikes an
appropriate balance between timely disclosure to shareholders and an
opportunity for a registrant to achieve the best resolution for
itself and its shareholders''); Rapid7 (``[i]n Rapid7's experience,
the vast majority of incidents can be contained and mitigated within
that time frame [30 days]'').
\81\ See letters from APCIA (``[a]llowing up to 30 days for
disclosure would also bring the SEC's proposal in line with data
breach disclosure requirements at the state level''); Hunton
(``[w]hile state data breach notification laws vary from state to
state, 30 days from the cybersecurity incident is the earliest date
any state requires that notification to affected persons be made'').
---------------------------------------------------------------------------
Several commenters recommended addressing the timing concerns by
replacing current reporting on Form 8-K with periodic reporting on
Forms 10-Q and 10-K, to allow additional time to assess an incident's
impact before reporting to markets.\82\ In this vein, one commenter
likened cybersecurity incident disclosure to the disclosure of
[[Page 51902]]
legal proceedings under Regulation S-K Item 103.\83\
---------------------------------------------------------------------------
\82\ See letters from ABA; Davis Polk; Debevoise; LTSE; NYC Bar;
Quest; SCG.
\83\ See letter from Quest.
---------------------------------------------------------------------------
A few commenters recommended instead that the materiality trigger
be replaced with a quantifiable trigger; for example, an incident
implicating a specified percentage of revenue, or the costs of an
incident exceeding a specified benchmark, could trigger disclosure.\84\
Other commenters advocated for the disclosure trigger to be tied to any
legal obligation that forces a registrant to notify persons outside the
company.\85\
---------------------------------------------------------------------------
\84\ See letters from BIO; Bitsight; EIC; Paylocity.
\85\ See letters from ABA; Business Roundtable.
---------------------------------------------------------------------------
Commenters also recommended a number of exceptions to the filing
deadline. The most common recommendation was to include a provision
allowing for delayed filing where there is an active law enforcement
investigation or the disclosure otherwise implicates national security
or public safety.\86\ A representative comment in this vein advanced a
provision whereby registrants may ``delay reporting of a cybersecurity
incident that is the subject of a bona fide investigation by law
enforcement,'' because such ``delay in reporting may not only
facilitate such an investigation, it may be critical to its success.''
\87\
---------------------------------------------------------------------------
\86\ See letters from ABA; ACC; ACLI; AGA/INGAA; AIA; AICPA;
APCIA; Auto Innovators; Rep. Banks; BPI et al.; BIO; BSA; Business
Roundtable; CBA; Chamber; Chevron; CII; CSA; CTA; CTIA;
Cybersecurity Coalition; Debevoise; EEI; EIC; Empire; Enbridge; FAH;
FedEx Corporation (``FedEx''); FEI; FSSCC; Global Privacy Alliance
(``GPA''); Hunton; ISA; ITI; ITIF; Microsoft; NAM; Nareit; NASAA;
NDIA; NMHC; NRA; NYC Bar; Prof. Perullo; Sen. Portman; PPG; PWC;
Quest; R Street; Profs. Rajgopal & Sharpe; Rapid7; SCG; SIFMA;
TransUnion; Virtu; USTelecom--The Broadband Association
(``USTelecom''); U.S. Chamber of Commerce & various associations
(``Chamber et al.'').
\87\ See letter from Debevoise.
---------------------------------------------------------------------------
In calling for a law enforcement delay, associations for industries
in critical sectors emphasized the national security implications of
public cybersecurity incident disclosure. For example, one association
explained that disclosure ``may alert malicious actors that we have
uncovered their illegal activities in circumstances where our defense
and intelligence agencies wish to keep that information secret.'' \88\
Likewise, another association pointed out that, in its industry,
companies ``are likely to possess some of the nation's most critical
confidential information, including cybersecurity threat information
furnished by government entities, such as the Federal Bureau of
Investigation (FBI), the Department of Homeland Security (DHS), and the
National Security Agency (NSA),'' and therefore, disclosure may not be
possible.\89\
---------------------------------------------------------------------------
\88\ See letter from AIA.
\89\ See letter from EEI.
---------------------------------------------------------------------------
Commenters largely advocated for ``a broad law enforcement
exception that applies not only in the interest of national security
but also when law enforcement believes disclosure will hinder their
efforts to identify or capture the threat actor.'' \90\ Many commenters
that responded to the Commission's request for comment regarding a
provision whereby the Attorney General determines that a delay is in
the interest of national security indicated that such a provision
should be more expansive and extend to other law enforcement
authorities.\91\ One of these commenters questioned whether the
Attorney General would opine on matters ``that are under the ambit of
other Federal agencies, such as the Department of Homeland Security,
Department of State and the Department of Defense.'' \92\ Another
commenter pointed out that ``the Department of Justice is not the
primary, or even the lead, organization in the Federal Government for
cybersecurity response, rather the Department of Homeland Security's
Cybersecurity and Infrastructure Security Agency is often the first
call that companies make,'' while ``[f]or defense contractors, the
Department of Defense is likely to have the highest interest in the
timing of an announcement.'' \93\ For the financial industry
specifically, one suggestion was to permit a delay if the Federal
Reserve, Federal Deposit Insurance Corporation, or Office of the
Comptroller of the Currency finds that disclosure would compromise the
safety or soundness of the financial institution or of the financial
system as a whole.\94\
---------------------------------------------------------------------------
\90\ See letter from ABA.
\91\ See letters from BPI et al.; CBA; CSA; Hunton; ITIF; SCG;
Wilson Sonsini.
\92\ See letter from Hunton. This commenter also questioned
whether law enforcement would be inclined to provide a written
determination, particularly within four business days, because in
its experience with State data breach laws, ``the relevant state and
federal law enforcement agencies seldom (if ever) provide written
instructions when the relevant exception comes into play.''
\93\ See letter from Wilson Sonsini.
\94\ See letter from BPI et al. Cf. letter from FSSCC.
---------------------------------------------------------------------------
Some commenters specifically urged that state law enforcement be
included within any delay provision,\95\ and one commenter appeared to
contemplate inclusion of foreign law enforcement.\96\ A few commenters
advocated for a confidential reporting system, whereby a registrant
would initially file a nonpublic report with the Commission while a law
enforcement investigation is ongoing, and then unseal the report upon
the investigation's completion.\97\
---------------------------------------------------------------------------
\95\ See, e.g., letter from ITIF.
\96\ See letter from CBA (stating ``the scope of the
contemplated exemption is indefensibly narrow, particularly for
registrants with operations outside of the United States . . . there
should be an exemption to permit delayed disclosure upon the request
of any competent national, state or local law enforcement
authority'').
\97\ See letters from CSA; Hunton; SCG. See also letter from
LTSE (positing the Regulation SCI disclosure framework as a model
for Item 1.05).
---------------------------------------------------------------------------
A number of commenters provided feedback regarding proposed
Instruction 1, which would have directed registrants to make their
materiality determination regarding an incident ``as soon as reasonably
practicable after discovery of the incident.'' Several commenters
recommended removing the instruction altogether as, in their view, it
would place unnecessary pressure on companies to make premature
determinations before they have sufficient information.\98\ Other
commenters stated that the instruction is too ambiguous for registrants
to ascertain whether they have complied with it.\99\ Conversely, one
commenter advised the Commission not to provide further guidance on the
meaning of ``as soon as reasonably practicable,'' explaining that doing
so would interfere with each registrant's individual assessment of what
is practicable given its specific context, resulting in pressure to
move more quickly than may be appropriate.\100\ Another commenter
likewise found that ``as soon as reasonably practicable'' is a
``reasonable approach'' that ``provides public companies with the
appropriate degree of flexibility to conduct a thorough assessment
while ensuring that the markets get timely and relevant information.''
\101\ One commenter recommended a safe harbor for actions and
determinations made in good faith to satisfy Instruction 1 that later
turn out to be mistaken.\102\
---------------------------------------------------------------------------
\98\ See letters from ABA; AGA/INGAA; Federated Hermes; ISA;
Paylocity; Quest; SCG.
\99\ See letter from Center for Audit Quality (``CAQ''); CSA;
Institute of Internal Auditors (``IIA''); LTSE; NYC Bar.
\100\ See letter from Cybersecurity Coalition.
\101\ See letter from NASAA.
\102\ See letter from Nasdaq.
---------------------------------------------------------------------------
In response to a request for comment in the Proposing Release,
several commenters recommended registrants be permitted to furnish
rather than file an Item 1.05 Form 8-K, so that filers of an Item 1.05
Form 8-K would not be subject to liability under Section 18 of the
Exchange Act.\103\ A significant number of commenters also endorsed the
proposal to amend 17 CFR 240.13a-
[[Page 51903]]
11(c) (``Rule 13a-11(c)'') and 17 CFR 240.15d-11(c) (``Rule 15d-
11(c)'') under the Exchange Act to include Item 1.05 in the list of
Form 8-K items eligible for a limited safe harbor from liability under
Section 10(b) or 17 CFR 240.10b-5 (``Rule 10b-5'') under the Exchange
Act.\104\ Likewise, the proposal to amend General Instruction I.A.3.(b)
of Form S-3 and General Instruction I.A.2 of Form SF-3 to provide that
an untimely filing on Form 8-K regarding new Item 1.05 would not result
in loss of Form S-3 or Form SF-3 eligibility received much
support.\105\
---------------------------------------------------------------------------
\103\ See letters from BPI et al.; Business Roundtable; Chevron;
CSA; EEI; LTSE; NAM; SCG.
\104\ See letters from ABA; APCIA; BIO; Business Roundtable;
Chevron; CTIA; Cybersecurity Coalition; Debevoise; EEI; LTSE; NYC
Bar; PWC; SCG.
\105\ See letters from ABA; APCIA; BIO; Business Roundtable;
Chevron; CTIA; Cybersecurity Coalition; Debevoise; EEI; LTSE; NYC
Bar; PWC; SCG.
---------------------------------------------------------------------------
Finally, a number of commenters averred that Item 1.05 would
conflict with other Federal and state cybersecurity reporting or other
regulatory regimes. For example, one commenter stated Item 1.05 would
counteract the goals of CIRCIA by requiring public disclosure of
information the act would keep confidential, and went on to assert that
CIRCIA was intended as the primary means for reporting incidents to the
Federal Government.\106\ Also related to CIRCIA, a number of commenters
urged harmonization of the Commission's proposal with forthcoming
regulations expected from CISA pursuant to CIRCIA.\107\ Several
commenters alleged Item 1.05 would conflict with rules the Department
of Health and Human Services (``HHS'') has adopted pursuant to the
Health Insurance Portability and Accountability Act (``HIPAA'')
regarding the reporting of private health information breaches.\108\ A
few commenters likewise said Item 1.05 would conflict with the
reporting regime set forth in Federal Communications Commission
(``FCC'') regulations for breaches of customer proprietary network
information.\109\ Conflicts were also alleged with regulations and
programs of the Department of Defense (``DOD''),\110\ Department of
Energy (``DOE''),\111\ and Department of Homeland Security
(``DHS'').\112\ Commenters called for harmonization of Item 1.05 with
regulations issued by Federal banking regulators,\113\ as well as with
regulations of the Federal Trade Commission (``FTC'').\114\ Some
commenters noted the potential interaction between the proposed rules
and state laws.\115\ One commenter noted the McCarran-Ferguson Act,
which provides that a state law preempts a Federal statute if the state
law was enacted for the purpose of regulating the business of insurance
and the Federal statute does not specifically relate to the business of
insurance.\116\
---------------------------------------------------------------------------
\106\ See letter from Sen. Portman.
\107\ See letters from ACC; ACLI; APCIA; BPI et al.; BIO;
Confidentiality Coalition; Chamber; CTA; CTIA; Cybersecurity
Coalition; EIC; FEI; FSSCC; Insurance Coalition (``IC''); ISA; ITI;
ITIF; Nareit; NAM; NRA; R Street; SCG; SIFMA; USTelecom.
\108\ See letters from Chamber; Confidentiality Coalition; FAH;
R Street.
\109\ See letters from Chamber; CTIA; USTelecom.
\110\ See letter from Chamber et al.
\111\ See letter from EEI.
\112\ See letter from ACC. This letter additionally alleged
conflicts with regulations of the Department of Energy,
Transportation Security Agency, Department of Defense, and
Environmental Protection Agency, but did not explain specifically
where those conflicts lie.
\113\ See letters from FSSCC; Structured Finance Association
(``SFA''); SIFMA.
\114\ See letters from BIO; CTIA.
\115\ See letters from IC (noting ``[a]n important issue will be
to ensure harmonized regulation between the federal government and
the several states with proposed or preexisting cybersecurity
regulations''); R Street (noting that state privacy laws ``mandate
reporting of incidents across very different timelines''); SIFMA
(noting that ``many state financial services and/or insurance
regulators already require regulated entities certify cybersecurity
compliance'').
\116\ See letter from IC.
---------------------------------------------------------------------------
3. Final Amendments
Having considered the comments, we remain convinced that investors
need timely, standardized disclosure regarding cybersecurity incidents
materially affecting registrants' businesses, and that the existing
regulatory landscape is not yielding consistent and informative
disclosure of cybersecurity incidents from registrants.\117\ However,
we are revising the proposal in two important respects in response to
concerns raised by commenters. First, we are narrowing the amount of
information required to be disclosed, to better balance investors'
needs and registrants' cybersecurity posture. And second, we are
providing for a delay for disclosures that would pose a substantial
risk to national security or public safety, contingent on a written
notification by the Attorney General, who may take into consideration
other Federal or other law enforcement agencies' findings.
---------------------------------------------------------------------------
\117\ As the Commission has previously stated, markets rely on
timely dissemination of information to accurately and quickly value
securities. Additional Form 8-K Disclosure Requirements and
Acceleration of Filing Date, Release No. 33-8400 (Mar. 16, 2004) [69
FR 15593 (Mar. 25, 2004)] (``Additional Form 8-K Disclosure
Release''). Congress recognized that the ongoing dissemination of
accurate information by issuers about themselves and their
securities is essential to the effective operation of the markets,
and specifically recognized the importance of current reporting in
this regard by requiring that ``[e]ach issuer reporting under
Section 13(a) or 15(d) . . . disclose to the public on a rapid and
current basis such additional information concerning material
changes in the financial condition or operations of the issuer . . .
as the Commission determines . . . is necessary or useful for the
protection of investors and in the public interest.'' 15 U.S.C.
78m(l).
---------------------------------------------------------------------------
As described above, commenters' criticisms of Item 1.05 generally
arose from two aspects of the proposal: (1) the scope of disclosure;
and (2) the timing of disclosure. With respect to disclosure scope, we
note in particular commenter concerns that the disclosure of certain
details required by proposed Item 1.05 could exacerbate security
threats, both for the registrants' systems and for systems in the same
industry or beyond, and could chill threat information sharing within
industries. We agree that a balancing of concerns consistent with our
statutory authority is necessary in crafting Item 1.05 to avoid
empowering threat actors with actionable information that could harm a
registrant and its investors. However, we are not persuaded, as some
commenters suggested,\118\ that we should forgo requiring disclosure of
the existence of an incident while it is ongoing to avoid risks, such
as the risk of tipping off threat actors. Some companies already
disclose material cybersecurity incidents while they are ongoing and
before they are fully remediated, but the timing, form, and substance
of those disclosures are inconsistent. Several commenters indicated
both that investors look for information regarding registrants'
cybersecurity incidents and that current disclosure levels are
inadequate to their needs in making investment decisions.\119\ In
addition, we note below in Section IV evidence showing that delayed
reporting of cybersecurity incidents can result in mispricing of
securities, and that such mispricing can be exploited by threat actors,
employees, related third parties, and others through trades made before
an incident becomes public.\120\ Accordingly, we believe it is
necessary to adopt a requirement for uniform current reporting of
material cybersecurity incidents.
---------------------------------------------------------------------------
\118\ See supra note 50.
\119\ See letters from Better Markets; CalPERS; CII.
\120\ See infra notes 413 and 462.
---------------------------------------------------------------------------
To that end, and to balance investors' needs with the concerns
raised by commenters, we are streamlining Item 1.05 to focus the
disclosure primarily on the impacts of a material cybersecurity
incident, rather than on requiring details regarding the incident
itself. The final rules will require the registrant to ``describe the
material aspects of the nature, scope, and timing of the
[[Page 51904]]
incident, and the material impact or reasonably likely material impact
on the registrant, including its financial condition and results of
operations.'' We believe this formulation more precisely focuses the
disclosure on what the company determines is the material impact of the
incident, which may vary from incident to incident. The rule's
inclusion of ``financial condition and results of operations'' is not
exclusive; companies should consider qualitative factors alongside
quantitative factors in assessing the material impact of an
incident.\121\ By way of illustration, harm to a company's reputation,
customer or vendor relationships, or competitiveness may be examples of
a material impact on the company. Similarly, the possibility of
litigation or regulatory investigations or actions, including
regulatory actions by state and Federal Governmental authorities and
non-U.S. authorities, may constitute a reasonably likely material
impact on the registrant.
---------------------------------------------------------------------------
\121\ See also Proposing Release at 16596 (stating that ``[a]
materiality analysis is not a mechanical exercise'' and not solely
quantitative, but rather should take into consideration ``all
relevant facts and circumstances surrounding the cybersecurity
incident, including both quantitative and qualitative factors'').
---------------------------------------------------------------------------
We are not adopting, as proposed, a requirement for disclosure
regarding the incident's remediation status, whether it is ongoing, and
whether data were compromised. While some incidents may still
necessitate, for example, discussion of data theft, asset loss,
intellectual property loss, reputational damage, or business value
loss, registrants will make those determinations as part of their
materiality analyses. Further, we are adding an Instruction 4 to Item
1.05 to provide that a ``registrant need not disclose specific or
technical information about its planned response to the incident or its
cybersecurity systems, related networks and devices, or potential
system vulnerabilities in such detail as would impede the registrant's
response or remediation of the incident.'' While the Commission
provided this assurance in the Proposing Release,\122\ we agree with
some commenters that codifying it in the Item 1.05 instructions should
provide added clarity to registrants on the type of disclosure required
by Item 1.05.
---------------------------------------------------------------------------
\122\ Id. at 16595.
---------------------------------------------------------------------------
With respect to commenters' questions concerning the application of
Item 1.05 to incidents occurring on third-party systems, we are not
exempting registrants from providing disclosures regarding
cybersecurity incidents on third-party systems they use, nor are we
providing a safe harbor for information disclosed about third-party
systems. While we appreciate the commenters' concerns about a
registrant's reduced control over such systems, we note the centrality
of the materiality determination: whether an incident is material is
not contingent on where the relevant electronic systems reside or who
owns them. In other words, we do not believe a reasonable investor
would view a significant breach of a registrant's data as immaterial
merely because the data were housed on a third-party system, especially
as companies increasingly rely on third-party cloud services that may
place their data out of their immediate control.\123\ Instead, as
discussed above, materiality turns on how a reasonable investor would
consider the incident's impact on the registrant.
---------------------------------------------------------------------------
\123\ See Deloitte, Global Third-Party Risk Management Survey
2022, at 15, available at https://www2.deloitte.com/content/dam/Deloitte/uk/Documents/risk/deloitte-uk-global-tprm-survey-report-2022.pdf (discussing results of a global survey of 1,309 ``senior
leaders from a variety of organizations'' indicating that ``73% of
respondents currently have a moderate to high level of dependence on
[cloud-service providers]'' and ``[t]hat is expected to increase to
88% in the years ahead'').
---------------------------------------------------------------------------
Depending on the circumstances of an incident that occurs on a
third-party system, disclosure may be required by both the service
provider and the customer, or by one but not the other, or by neither.
We appreciate that companies may have reduced visibility into third-
party systems; registrants should disclose based on the information
available to them. The final rules generally do not require that
registrants conduct additional inquiries outside of their regular
channels of communication with third-party service providers pursuant
to those contracts and in accordance with registrants' disclosure
controls and procedures. This is consistent with the Commission's
general rules regarding the disclosure of information that is difficult
to obtain.\124\
---------------------------------------------------------------------------
\124\ See 17 CFR 230.409 and 17 CFR 240.12b-21, which provide
that information need only be disclosed insofar as it is known or
reasonably available to the registrant. Accordingly, we are not
providing additional time to comply with Item 1.05 as it relates to
third-party incidents, as requested by some commenters.
---------------------------------------------------------------------------
Turning to disclosure timing, we believe that the modifications
from the proposed rules regarding the disclosures called for by Item
1.05 alleviate many of the concerns some commenters had regarding the
proposed disclosure deadline of four business days from the materiality
determination. Because the streamlined disclosure requirements we are
adopting are focused on an incident's basic identifying details and its
material impact or reasonably likely material impact, the registrant
should have the information required to be disclosed under this rule as
part of conducting the materiality determination. For example, most
organizations' materiality analyses will include consideration of the
financial impact of a cybersecurity incident, so information regarding
the incident's impact on the registrant's financial condition and
results of operations will likely have already been developed when Item
1.05 is triggered.\125\ Thus, we believe that the four business day
timeframe from the date of a materiality determination will be
workable.
---------------------------------------------------------------------------
\125\ To the extent any required information is not determined
or is unavailable at the time of the required filing, Instruction 2
to Item 1.05, as adopted, directs the registrant to include a
statement to this effect in the Form 8-K and then file a Form 8-K
amendment containing such information within four business days
after the registrant, without unreasonable delay, determines such
information or within four business days after such information
becomes available. See infra Section II.B.3.
---------------------------------------------------------------------------
The reformulation of Item 1.05 also addresses the concern among
commenters that the disclosure may be tentative and unclear, resulting
in false positives and mispricing in the market. In the majority of
cases, the registrant will likely be unable to determine materiality
the same day the incident is discovered. The registrant will develop
information after discovery until it is sufficient to facilitate a
materiality analysis.\126\ At that point, we believe investors are best
served knowing, within four business days after the materiality
determination, that the incident occurred and what led management to
conclude the incident is material. While it is possible that
occasionally there may be incidents that initially appear material but
developments after the filing of the Item 1.05 Form 8-K reveal to be
not material, the alternative of delaying disclosure beyond the four
business day period after a materiality determination has the potential
to lead to far more mispricing and will negatively impact investors
making investment and voting decisions without the benefit of knowing
that there is a material cybersecurity incident.
---------------------------------------------------------------------------
\126\ As discussed below, registrants should develop such
information without unreasonable delay.
---------------------------------------------------------------------------
Commenters posited an array of alternative deadlines for the Item
1.05 Form 8-K, as recounted above. We are not persuaded by commenters'
arguments that disclosure should be delayed until companies mitigate,
[[Page 51905]]
contain, remediate, or otherwise diminish the harm of the incident,
because, as discussed above, Item 1.05 does not require disclosure of
the types of details that have the potential to be exploited by threat
actors, but rather focuses on the incident's material impact or
reasonably likely material impact on the registrant. While there may
be, as commenters noted, some residual risk of the disclosure of an
incident's existence tipping off threat actors, such risk is justified,
in our view, by investors' need for timely information, and similar
risk already exists today with some companies' current cybersecurity
incident disclosure practices. We are also not persuaded that Item 1.05
is sufficiently different from other Form 8-K items such that deviating
from the form's four business day deadline following the relevant
trigger would be indicated. While some commenters argued that Item 1.05
is qualitatively different from all other Form 8-K filings in that its
trigger is largely outside the company's control, we disagree because
other Form 8-K items may also be triggered unexpectedly, such as Item
4.01 (Changes in Registrant's Certifying Accountants) and Item 5.02
(Departure of Directors or Principal Officers). And as compared to
those items, the information needed for Item 1.05 may be further along
in development when the filing is triggered, whereas, for example, a
company may have no advance warning that a principal officer is
departing.
With respect to the five business day deadline suggested by a few
commenters to allow registrants a full calendar week from the
materiality determination to the disclosure, we note that in the
majority of cases registrants will have had additional time leading up
to the materiality determination, such that disclosure becoming due
less than a week after discovery should be uncommon. More generally
with respect to the various alternative timing suggestions, we observe
that the Commission adopted the uniform four business day deadline in
2004 to simplify the previous bifurcated deadlines, and we find
commenters have not offered any compelling rationale to return to
bifurcated deadlines.\127\ Form 8-K provides for current reporting of
events that tend to be material to investor decision-making, and we see
no reason to render the reporting of Item 1.05 less current than other
Form 8-K items.
---------------------------------------------------------------------------
\127\ See Additional Form 8-K Disclosure Release. See also
Proposed Rule: Additional Form 8-K Disclosure Requirements and
Acceleration of Filing Date, Release No. 33-8106 (June 17, 2002) [67
FR 42914 (June 25, 2002)].
---------------------------------------------------------------------------
In the Proposing Release, the Commission requested comment on
whether to allow registrants to delay filing an Item 1.05 Form 8-K
where the Attorney General determines that a delay is in the interest
of national security.\128\ In response to comments, we are adopting a
delay provision in cases where disclosure poses a substantial risk to
national security or public safety. Pursuant to Item 1.05(c), a
registrant may delay making an Item 1.05 Form 8-K filing if the
Attorney General determines that the disclosure poses a substantial
risk to national security or public safety and notifies the Commission
of such determination in writing.\129\ Initially, disclosure may be
delayed for a time period specified by the Attorney General, up to 30
days following the date when the disclosure was otherwise required to
be provided. The delay may be extended for an additional period of up
to 30 days if the Attorney General determines that disclosure continues
to pose a substantial risk to national security or public safety and
notifies the Commission of such determination in writing.
---------------------------------------------------------------------------
\128\ Proposing Release at 16598.
\129\ We note that the delay provision we are adopting does not
relieve a company's obligations under Regulation FD or with respect
to the securities laws' antifraud prohibitions that proscribe
certain insider trading, including Exchange Act Section 10(b). Under
Regulation FD, material nonpublic information disclosed to any
investor, for example, through investor outreach activities, would
be required to be disclosed publicly, subject to limited exceptions.
See 17 CFR 243.100 et seq.
---------------------------------------------------------------------------
In extraordinary circumstances, disclosure may be delayed for a
final additional period of up to 60 days if the Attorney General
determines that disclosure continues to pose a substantial risk to
national security and notifies the Commission of such determination in
writing. We are providing for the final additional delay period in
recognition that, in extraordinary circumstances, national security
concerns may justify additional delay beyond that warranted by public
safety concerns, due to the relatively more critical nature of national
security concerns. Beyond the final 60-day delay, if the Attorney
General indicates that further delay is necessary, the Commission will
consider additional requests for delay and may grant such relief
through Commission exemptive order.\130\
---------------------------------------------------------------------------
\130\ Any exercise of exemptive authority in these circumstances
would need to meet all of the standards of Section 36 of the
Exchange Act. Furthermore, Item 1.05 of Form 8-K in no way limits
the Commission's general exemptive authority under Section 36.
---------------------------------------------------------------------------
We have consulted with the Department of Justice to establish an
interagency communication process to allow for the Attorney General's
determination to be communicated to the Commission in a timely manner.
The Department of Justice will notify the affected registrant that
communication to the Commission has been made, so that the registrant
may delay filing its Form 8-K.
We agree with commenters that a delay is appropriate for the
limited instances in which public disclosure of a cybersecurity
incident may cause harm to national security or public safety. The
final rules appropriately balance such security concerns against
investors' informational needs. In particular, the provision's
``substantial risk to national security or public safety'' bases are
sufficiently expansive to ensure that significant risks of harm from
disclosure may be protected against, while also ensuring that investors
are not denied timely access to material information.\131\ With respect
to commenters who recommended that other Federal agencies and non-
Federal law enforcement agencies also be permitted to trigger a delay
or who argued that other agencies may be the primary organization in
the Federal Government for the response, we note that the rule does not
preclude any such agency from requesting that the Attorney General
determine that the disclosure poses a substantial risk to national
security or public safety and communicate that determination to the
Commission. However, we believe that designating a single law
enforcement agency as the Commission's point of contact on such delays
is critical to ensuring that the rule is administrable.
---------------------------------------------------------------------------
\131\ The delay provision for substantial risk to national
security or public safety is separate from Exchange Act Rule 0-6,
which provides for the omission of information that has been
classified by an appropriate department or agency of the Federal
Government for the protection of the interest of national defense or
foreign policy. If the information a registrant would otherwise
disclose on an Item 1.05 Form 8-K or pursuant to Item 106 of
Regulation S-K or Item 16K of Form 20-F is classified, the
registrant should comply with Exchange Act Rule 0-6.
---------------------------------------------------------------------------
Turning to other timing-related issues raised by commenters, we are
not adopting commenters' suggestion to replace Item 1.05 with periodic
reporting of material cybersecurity incidents on Forms 10-Q and 10-K
because such an approach may result in significant variance as to when
investors learn of material cybersecurity incidents. Based on when an
incident occurs during a company's reporting
[[Page 51906]]
cycle, the timing between the materiality determination and reporting
on the next Form 10-Q or Form 10-K could vary from a matter of months
to a matter of weeks or less. For example, if two companies experience
a similar cybersecurity incident, but one determines the incident is
material early during a quarterly period and the other makes such
determination at the end of the quarterly period, commenters' suggested
approach would have both companies report the incident around the same
time despite the first company having determined the incident was
material weeks or months sooner, which would result in a significant
delay in this information being provided to investors. Such variance
would therefore reduce comparability across registrants and may put
certain registrants at a competitive disadvantage.
We also decline to use a quantifiable trigger for Item 1.05 because
some cybersecurity incidents may be material yet not cross a particular
financial threshold. We note above that the material impact of an
incident may encompass a range of harms, some quantitative and others
qualitative. A lack of quantifiable harm does not necessarily mean an
incident is not material. For example, an incident that results in
significant reputational harm to a registrant may not be readily
quantifiable and therefore may not cross a particular quantitative
threshold, but it should nonetheless be reported if the reputational
harm is material. Similarly, whereas a cybersecurity incident that
results in the theft of information may not be deemed material based on
quantitative financial measures alone, it may in fact be material given
the impact to the registrant that results from the scope or nature of
harm to individuals, customers, or others, and therefore may need to be
disclosed.
In another change from the proposal, and to respond to commenters'
concerns that the proposed ``as soon as reasonably practicable''
language in Instruction 1 could pressure companies to draw conclusions
about incidents with insufficient information, we are revising the
instruction to state that companies must make their materiality
determinations ``without unreasonable delay.'' As explained in the
Proposing Release, the instruction was intended to address any concern
that some registrants may delay making such a determination to avoid a
disclosure obligation.\132\ We understand commenter concerns that the
proposed instruction could result in undue pressure to make a
materiality determination before a registrant has sufficient
information to do so, and we recognize that a materiality determination
necessitates an informed and deliberative process. We believe the
revised language should alleviate this unintended consequence, while
providing registrants notice that, though the determination need not be
rushed prematurely, it also cannot be unreasonably delayed in an effort
to avoid timely disclosure. For example, for incidents that impact key
systems and information, such as those the company considers its
``crown jewels,'' \133\ as well as incidents involving unauthorized
access to or exfiltration of large quantities of particularly important
data, a company may not have complete information about the incident
but may know enough about the incident to determine whether the
incident was material. In other words, a company being unable to
determine the full extent of an incident because of the nature of the
incident or the company's systems, or otherwise the need for continued
investigation regarding the incident, should not delay the company from
determining materiality. Similarly, if the materiality determination is
to be made by a board committee, intentionally deferring the
committee's meeting on the materiality determination past the normal
time it takes to convene its members would constitute unreasonable
delay.\134\ As another example, if a company were to revise existing
incident response policies and procedures in order to support a delayed
materiality determination for or delayed disclosure of an ongoing
cybersecurity event, such as by extending the incident severity
assessment deadlines, changing the criteria that would require
reporting an incident to management or committees with responsibility
for public disclosures, or introducing other steps to delay the
determination or disclosure, that would constitute unreasonable delay.
In light of the revision to Instruction 1, we find that a safe harbor,
as suggested by some commenters, is unnecessary; adhering to normal
internal practices and disclosure controls and procedures will suffice
to demonstrate good faith compliance. Importantly, we remind
registrants, as the Commission did in the Proposing Release, that
``[d]oubts as to the critical nature'' of the relevant information
``will be commonplace'' and should ``be resolved in favor of those the
statute is designed to protect,'' namely investors.\135\
---------------------------------------------------------------------------
\132\ Proposing Release at 16596.
\133\ See National Cybersecurity Alliance, Identify Your ``Crown
Jewels'' (July 1, 2022), available at https://staysafeonline.org/cybersecurity-for-business/identify-your-crown-jewels/ (explaining
that ``[c]rown jewels are the data without which your business would
have difficulty operating and/or the information that could be a
high-value target for cybercriminals'').
\134\ We note that Form 8-K Item 1.05 does not specify whether
the materiality determination should be performed by the board, a
board committee, or one or more officers. The company may establish
a policy tasking one or more persons to make the materiality
determination. Companies should seek to provide those tasked with
the materiality determination information sufficient to make
disclosure decisions.
\135\ Proposing Release at 16596 (quoting TSC Indus. v.
Northway, 426 U.S. at 448). The Court's opinion in TSC Indus. has a
nuanced discussion of the balance of considerations in setting a
materiality standard. 426 U.S. at 448-450.
---------------------------------------------------------------------------
Revised Instruction 1 should also reassure registrants that they
should continue sharing information with other companies or government
actors about emerging threats. Such information sharing may not
necessarily result in an Item 1.05 disclosure obligation. The
obligation to file the Item 1.05 disclosure is triggered once a company
has developed information regarding an incident sufficient to make a
materiality determination, and a decision to share information with
other companies or government actors does not in itself necessarily
constitute a determination of materiality. A registrant may alert
similarly situated companies as well as government actors immediately
after discovering an incident and before determining materiality, so
long as it does not unreasonably delay its internal processes for
determining materiality.
As proposed, we are adding Item 1.05 to the list of Form 8-K items
in General Instruction I.A.3.(b) of Form S-3, so that the untimely
filing of an Item 1.05 Form 8-K will not result in the loss of Form S-3
eligibility.\136\ We note the significant support from commenters
regarding this proposal, and as noted in the Proposing Release,
continue to believe that the consequences of the loss of Form S-3
eligibility would be unduly severe given the circumstances that will
surround Item 1.05 disclosures. Likewise, as supported by many
commenters, we are adopting as proposed amendments to Rules 13a-11(c)
and 15d-11(c) under the Exchange Act to include new Item 1.05 in the
list of Form 8-K items eligible for a limited safe harbor from
liability under Section 10(b) or Rule 10b-5 under the Exchange Act.
This accords with the view the Commission articulated in 2004 that the
safe harbor is appropriate if the triggering event for the Form 8-K
[[Page 51907]]
requires management to make a rapid materiality determination.\137\
---------------------------------------------------------------------------
\136\ Because of our decision to exempt asset-backed issuers
from the new rules (see infra Section II.G.1), we are not amending
Form SF-3.
\137\ Additional Form 8-K Disclosure Release at 15607.
---------------------------------------------------------------------------
We decline to permit registrants to furnish rather than file the
Item 1.05 Form 8-K, as suggested by some commenters. While we
understand commenters' points that reducing liability may ease the
burden on registrants, we believe that treating Item 1.05 disclosures
as filed will help promote the accuracy and reliability of such
disclosures for the benefit of investors. Of the existing Form 8-K
items, only Items 2.02 (Results of Operations and Financial Condition)
and 7.01 (Regulation FD Disclosure) are permitted to be furnished
rather than filed. The Commission created exceptions for those two
items to allay concerns that do not pertain here. Specifically, with
respect to Item 2.02, the Commission was motivated by concerns that
requiring the information to be filed would discourage registrants from
proactively issuing earnings releases and similar disclosures.\138\
Similarly, with respect to Item 7.01, the Commission decided to allow
the disclosure to be furnished to address concerns that, if required to
be filed, the disclosure could be construed as an admission of
materiality, which might lead some registrants to avoid making
proactive disclosure.\139\ By contrast, Item 1.05 is not a voluntary
disclosure, and it is by definition material because it is not
triggered until the registrant determines the materiality of an
incident. It is thus more akin to the Form 8-K items other than Items
2.02 and 7.01, in that it is a description of a material event that has
occurred about which investors need adequate information. Therefore,
the final rules require an Item 1.05 Form 8-K to be filed.
---------------------------------------------------------------------------
\138\ See Conditions for Use of Non-GAAP Financial Measures,
Release No. 33-8176 (Jan. 22, 2003) [68 FR 4819 (Jan. 30, 2003)].
\139\ See Selective Disclosure and Insider Trading, Release No.
33-7881 (Aug. 15, 2000) [65 FR 51715 (Aug. 24, 2000)].
---------------------------------------------------------------------------
We are not including a new rule to ban trading by insiders during
the materiality determination time period, as suggested by some
commenters. Those with a fiduciary duty or other relationship of trust
and confidence are already prohibited from trading while in possession
of material, nonpublic information.\140\ And because we are adopting
the four business days from materiality determination deadline, we
agree with the point raised by some commenters that the risk of insider
trading is low given the limited time period between experiencing a
material incident and public disclosure. We also note that we recently
adopted amendments to 17 CFR 240.10b5-1 (``Rule 10b5-1'') that added a
certification condition for directors and officers wishing to avail
themselves of the rule's affirmative defense; specifically, if relying
on the amended affirmative defense, directors and officers need to
certify in writing, at the time they adopt the trading plan, that they
are unaware of material nonpublic information about the issuer or its
securities, and are adopting the plan in good faith and not as part of
a plan or scheme to evade the insider trading prohibitions.\141\
Therefore, given the timing of the incident disclosure requirement as
well as the recently adopted amendments to Rule 10b5-1, we do not find
need for a new rule banning trading by insiders during the time period
between the materiality determination and disclosure.
---------------------------------------------------------------------------
\140\ United States v. O'Hagan, 521 U.S. 642 (1997).
\141\ See Insider Trading Arrangements and Related Disclosures,
Release No. 33-11138 (Dec. 14, 2022) [87 FR 80362 (Dec. 29, 2022)].
---------------------------------------------------------------------------
A number of commenters raised concerns about conflicts with other
Federal laws and regulations. Of the Federal laws and regulations that
we reviewed and commenters raised concerns with, we have identified one
conflict, with the FCC's notification rule for breaches of customer
proprietary network information (``CPNI'').\142\ Of the remaining
Federal laws and regulations noted by commenters as presenting
conflicts, our view is that Item 1.05 neither directly conflicts with
nor impedes the purposes of other such laws and regulations.
---------------------------------------------------------------------------
\142\ 47 CFR 64.2011. CPNI is defined in 47 CFR 222(h)(1) as:
``(A) information that relates to the quantity, technical
configuration, type, destination, location, and amount of use of a
telecommunications service subscribed to by any customer of a
telecommunications carrier, and that is made available to the
carrier by the customer solely by virtue of the carrier-customer
relationship; and (B) information contained in the bills pertaining
to telephone exchange service or telephone toll service received by
a customer of a carrier; except that such term does not include
subscriber list information.''
---------------------------------------------------------------------------
The FCC's rule for notification in the event of breaches of CPNI
requires covered entities to notify the United States Secret Service
(``USSS'') and the Federal Bureau of Investigation (``FBI'') no later
than seven business days after reasonable determination of a CPNI
breach, and further directs the entities to refrain from notifying
customers or disclosing the breach publicly until seven business days
have passed following the notification to the USSS and FBI.\143\ To
accommodate registrants who are subject to this rule and may as a
result face conflicting disclosure timelines,\144\ we are adding
paragraph (d) to Item 1.05 providing that such registrants may delay
making a Form 8-K disclosure up to the seven business day period
following notification to the USSS and FBI specified in the FCC
rule,\145\ with written notification to the Commission.\146\
---------------------------------------------------------------------------
\143\ We note that the FCC recently proposed amending its rule;
among other things, the proposal would eliminate the seven-business
day waiting period, potentially eliminating the conflict. Federal
Communications Commission, Data Breach Reporting Requirements, 88 FR
3953 (Jan. 23, 2023).
\144\ Commission staff consulted with FCC staff about a
potential delay provision to address any conflict between the FCC
rule and the Form 8-K reporting requirements.
\145\ The exception we are creating does not apply to 47 CFR
64.2011(b)(3), which provides that the USSS or FBI may direct the
entity to further delay notification to customers or public
disclosure beyond seven business days if such disclosure ``would
impede or compromise an ongoing or potential criminal investigation
or national security.'' If the USSS or FBI believes that disclosure
would result in a substantial risk to national security or public
safety, it may, as explained above, work with the Department of
Justice to seek a delay of disclosure.
\146\ Such notice should be provided through correspondence on
EDGAR no later than the date when the disclosure required by Item
1.05 was otherwise required to be provided.
---------------------------------------------------------------------------
We also considered the conflicts commenters alleged with CIRCIA.
Specifically, they stated that Item 1.05 is at odds with the goals of
CIRCIA, and that it may conflict with forthcoming regulations from
CISA. The confidential reporting system established by CIRCIA serves a
different purpose from Item 1.05 and through different means; the
former focuses on facilitating the Federal Government's preparation for
and rapid response to cybersecurity threats, while the latter focuses
on providing material information about public companies to investors
in a timely manner. While CISA has yet to propose regulations to
implement CIRCIA, given the statutory authority, text, and legislative
history of CIRCIA, it appears unlikely the regulations would affect the
balance of material information available to investors about public
companies, because the reporting regime CIRCIA establishes is
confidential.\147\ Nonetheless, the Commission participates in
interagency working groups on cybersecurity regulatory implementation,
and will continue to monitor developments in this area to determine if
modification to Item 1.05 becomes appropriate in light of future
developments.\148\
---------------------------------------------------------------------------
\147\ 6 U.S.C. 681e.
\148\ Should a conflict arise in the future with CISA
regulations or regulations of another Federal agency, the Commission
can address such conflict via rulemaking or other action at that
time.
---------------------------------------------------------------------------
We also considered the HIPAA-related conflict alleged by
commenters,
[[Page 51908]]
specifically with respect to HHS's rule on Notification in the Case of
Breach of Unsecured Protected Health Information. That rule provides,
in the event of a breach of unsecured protected health information, for
the covered entity to provide notification to affected individuals
``without unreasonable delay and in no case later than 60 calendar days
after discovery of a breach.'' \149\ If the breach involves more than
500 residents of a state or jurisdiction, the rule directs the covered
entity to also notify prominent media outlets within the same
timeframe.\150\ The rule further provides that if a company receives
written notice from ``a law enforcement official'' requesting a delay
and specifying the length of the delay, then the company ``shall . . .
delay such notification, notice, or posting for the time period
specified by the official.'' \151\
---------------------------------------------------------------------------
\149\ 45 CFR 164.404(b). The notification must describe the
breach, the types of unsecured protected health information
involved, steps the individuals should take to protect themselves,
what the entity is doing to mitigate harm and remediate, and where
the individuals can seek additional information. Id.
\150\ 45 CFR 164.406.
\151\ 45 CFR 164.412.
---------------------------------------------------------------------------
We do not view Form 8-K Item 1.05 as implicated by the HHS rule.
Importantly, the HHS rule's delay provision applies specifically to any
``notification, notice, or posting required under this subpart,'' or in
other words notice to affected individuals, media, and the Secretary of
HHS.\152\ Such notification focuses on the consequences of the breach
for the affected individuals; for example, individuals must be told
what types of protected health information were accessed, and what
steps they should take to protect themselves from harm.\153\ This is
different from the disclosure required by Item 1.05, which focuses on
the consequences for the company that are material to investors, and
whose timing is tied not to discovery but to a materiality
determination. The HHS rule does not expressly preclude the latter type
of public disclosure, or other potential communications companies
experiencing a breach may make. Therefore, we believe that a registrant
subject to the HHS rule will not face a conflict in complying with Item
1.05.\154\
---------------------------------------------------------------------------
\152\ Id.
\153\ 45 CFR 164.404(c).
\154\ For the same reason, the Federal Trade Commission's Health
Breach Notification rule, which is similar to HHS's rule, does not
present a conflict either. See 16 CFR part 318.
---------------------------------------------------------------------------
We also considered the conflicts commenters alleged with
regulations and programs of DOD, DOE, DHS, the Federal banking
regulatory agencies, state insurance laws, and miscellaneous other
Federal agencies or laws. We find that, while there may be some overlap
of subject matter, Item 1.05 neither conflicts with nor impedes the
purpose of those regulations and programs.\155\ We disagree with one
commenter's assertion that cybersecurity incident disclosure ``falls
squarely within the jurisdiction of state insurance commissioners'' as
state cybersecurity incident reporting regulations would not pertain to
the ``business of insurance'' as courts have interpreted the McCarran-
Ferguson Act, and the commenter did not note any particular state
insurance laws that would present a conflict.\156\ With respect to
Federal banking regulatory agencies specifically, we note that, in the
event they believe that the disclosure of a material cybersecurity
incident would threaten the health of the financial system in such a
way that results in a substantial risk to national security or public
safety, they may, as explained above, work with the Department of
Justice to seek to delay disclosure.
---------------------------------------------------------------------------
\155\ For example, one commenter alleged conflicts with DHS's
Chemical Facilities Anti-Terrorism Standards program (``CFATS'') and
with the Maritime Transportation Security Act (``MTSA''). See letter
from American Chemistry Council. Both CFATS and MTSA provide for the
protection of certain sensitive information, but neither is
implicated by cybersecurity incident disclosure to the Commission.
\156\ See, e.g., SEC v. National Sec., Inc., 393 U.S. 453
(1969).
---------------------------------------------------------------------------
It would not be practical to further harmonize Item 1.05 with other
agencies' cybersecurity incident reporting regulations, as one
commenter suggested,\157\ because Item 1.05 serves a different
purpose--it is focused on the needs of investors, rather than the needs
of regulatory agencies, affected individuals, or the like. With respect
to state insurance and privacy laws, commenters did not provide any
evidence sufficient to alter the Commission's finding in the Proposing
Release that, to the extent that Item 1.05 would require disclosure in
a situation where state law would excuse or delay notification, we
consider prompt reporting of material cybersecurity incidents to
investors critical to investor protection and well-functioning,
orderly, and efficient markets.
---------------------------------------------------------------------------
\157\ See letter from BIO.
---------------------------------------------------------------------------
B. Disclosures About Cybersecurity Incidents in Periodic Reports
1. Proposed Amendments
The Commission proposed to add new Item 106 to Regulation S-K to,
among other things, require updated cybersecurity disclosure in
periodic reports. If a registrant previously provided disclosure
regarding one or more cybersecurity incidents pursuant to Item 1.05 of
Form 8-K, proposed 17 CFR 229.106(d)(1) (Regulation S-K ``Item
106(d)(1)'') would require such registrant to disclose ``any material
changes, additions, or updates'' on the registrant's quarterly report
on Form 10-Q or annual report on Form 10-K.\158\ In addition, proposed
Item 106(d)(1) would require disclosure of the following information:
---------------------------------------------------------------------------
\158\ Proposing Release at 16598.
---------------------------------------------------------------------------
Any material effect of the incident on the registrant's
operations and financial condition;
Any potential material future impacts on the registrant's
operations and financial condition;
Whether the registrant has remediated or is currently
remediating the incident; and
Any changes in the registrant's policies and procedures as
a result of the cybersecurity incident, and how the incident may have
informed such changes.\159\
---------------------------------------------------------------------------
\159\ Id.
---------------------------------------------------------------------------
The Commission explained that it paired current reporting under
Item 1.05 of Form 8-K with periodic reporting under 17 CFR 229.106(d)
(Regulation S-K ``Item 106(d)'') to balance investors' need for timely
disclosure with their need for complete disclosure.\160\ When an Item
1.05 Form 8-K becomes due, the Commission noted, a registrant may not
possess complete information about the material cybersecurity incident.
Accordingly, under the proposed rules, a registrant would provide the
information known at the time of the Form 8-K filing and follow up in
its periodic reports with more complete information as it becomes
available, along with any updates to previously disclosed information.
---------------------------------------------------------------------------
\160\ Id.
---------------------------------------------------------------------------
The Commission also proposed 17 CFR 229.106(d)(2) (Regulation S-K
``Item 106(d)(2)'') to require disclosure in a registrant's next
periodic report when, to the extent known to management, a series of
previously undisclosed individually immaterial cybersecurity incidents
become material in the aggregate.\161\ The Proposing Release explained
that this requirement may be triggered where, for example, a threat
actor engages in a number of smaller but continuous related
cyberattacks against the same company and collectively they become
material.\162\ Item 106(d)(2) would require disclosure of essentially
the
[[Page 51909]]
same information required in proposed Item 1.05 of Form 8-K, as
follows:
---------------------------------------------------------------------------
\161\ Id. at 16599.
\162\ Id.
---------------------------------------------------------------------------
A general description of when the incidents were
discovered and whether they are ongoing;
A brief description of the nature and scope of the
incidents;
Whether any data were stolen or altered in connection with
the incidents;
The effect of the incidents on the registrant's
operations; and
Whether the registrant has remediated or is currently
remediating the incidents.\163\
---------------------------------------------------------------------------
\163\ Id. at 16619-16620.
---------------------------------------------------------------------------
2. Comments
Reaction among commenters to proposed Item 106(d)(1) was mixed.
Some wrote in support, noting that updated incident disclosure is
needed to avoid previously disclosed information becoming stale and
misleading as more information becomes available, and saying that
updates help investors assess the efficacy of companies' cybersecurity
procedures.\164\ Others took issue with specific aspects of the
proposed rule. For example, some commenters stated that the proposed
requirement to disclose ``any potential material future impacts'' is
vague and difficult to apply, and urged removing or revising it.\165\
Similarly, other commenters said that registrants should not be
required to describe progress on remediation, noting that such
information could open them up to more attacks.\166\ In the same vein,
one commenter suggested that no updates be required until remediation
is sufficiently complete.\167\ One commenter said the requirement to
disclose changes in policies and procedures is unnecessary and overly
broad,\168\ and another commenter said the requirement should be
narrowed to ``material changes.'' \169\
---------------------------------------------------------------------------
\164\ See letters from AICPA; Crindata; R Street. See also IAC
Recommendation.
\165\ See letters from EEI; Prof. Perullo; PWC; SCG.
\166\ See letters from BCE; BPI et al.; Enbridge. See also
letter from EEI (suggesting narrowing the rule to ``material
remediation,'' and delaying such disclosure until remediation is
complete).
\167\ See letter from EEI.
\168\ See letter from Prof. Perullo.
\169\ See letter from EEI.
---------------------------------------------------------------------------
More generally, commenters sought clarification on how to
differentiate instances where updates should be included in periodic
reports from instances where updates should be filed on Form 8-K; they
found the guidance in the Proposing Release on this point ``unclear.''
\170\ And one commenter argued that, regardless of where the update is
filed, the incremental availability of information would make it
difficult for companies to determine when the update requirement is
triggered.\171\
---------------------------------------------------------------------------
\170\ See letter from PWC; accord letter from Deloitte. The
Proposing Release stated: ``Notwithstanding proposed Item 106(d)(1),
there may be situations where a registrant would need to file an
amended Form 8-K to correct disclosure from the initial Item 1.05
Form 8-K, such as where that disclosure becomes inaccurate or
materially misleading as a result of subsequent developments
regarding the incident. For example, if the impact of the incident
is determined after the initial Item 1.05 Form 8-K filing to be
significantly more severe than previously disclosed, an amended Form
8-K may be required.'' Proposing Release at 16598.
\171\ See letter from Quest.
---------------------------------------------------------------------------
With respect to proposed Item 106(d)(2), a large number of
commenters expressed concern about the aggregation requirement, saying,
for example, that companies experience too many events to realistically
communicate internally upward to senior management, and that retaining
and analyzing data on past events would be too costly.\172\ A number of
other commenters relatedly said that, for the aggregation requirement
to be workable, companies need more guidance on the nature, timeframe,
and breadth of incidents that should be collated.\173\ In this regard,
one supporter of the requirement explained in its request for
additional guidance that ``cybersecurity incidents are so unfortunately
common that a strict reading of this section could cause overreporting
to the point that it is meaningless for shareholders.'' \174\
---------------------------------------------------------------------------
\172\ See letters from ABA; ACLI; AIA; Business Roundtable; EEI;
Enbridge; Ernst & Young LLP (``E&Y''); FAH; FedEx; Center on Cyber
and Technology Innovation at the Foundation for Defense of
Democracies (``FDD''); GPA; Hunton; ITI; ISA; LTSE; Microsoft;
Nareit; NAM; NDIA; NRA; Prof. Perullo; SCG; SIFMA.
\173\ See letters from ACC; APCIA; BDO USA, LLP (``BDO''); BPI
et al.; CAQ; Chamber; Chevron; Deloitte; EIC; FEI; M. Barragan; PWC;
R Street.; TransUnion.
\174\ See letter from R Street.
---------------------------------------------------------------------------
Some commenters suggested revising the rule to cover only
``related'' incidents.\175\ Possible definitions offered for
``related'' incidents included those ``performed by the same malicious
actor or that exploited the same vulnerability,'' \176\ and those
resulting from ``attacks on the same systems, processes or controls of
a registrant over a specified period of time.'' \177\ Suggestions for
limiting the time period over which aggregation should occur included
the preceding one year,\178\ and the preceding two years.\179\ One
commenter requested the Commission clarify that a company's Item
106(d)(2) disclosure need describe only the aggregate material impact
of the incidents, rather than describing each incident individually;
the commenter was concerned with threat actors becoming informed of a
company's vulnerabilities through overly detailed disclosure.\180\
Another commenter suggested granting registrants additional time to
come into compliance with Item 106(d)(2) after Commission adoption, so
that they can develop system functionality to retain details about
immaterial incidents.\181\
---------------------------------------------------------------------------
\175\ See letters from ABA; APCIA; EEI; E&Y; PWC.
\176\ See letter from ABA.
\177\ See letter from E&Y.
\178\ See letter from APCIA.
\179\ See letter from EEI.
\180\ See letter from AGA/INGAA.
\181\ See letter from Deloitte.
---------------------------------------------------------------------------
Commenters also wrote in support of the aggregation
requirement.\182\ One of these commenters stated that aggregation is
needed especially where an advanced persistent threat actor \183\ seeks
to exfiltrate data or intellectual property over time.\184\
---------------------------------------------------------------------------
\182\ See letters from CII; CSA; R Street; NASAA.
\183\ The National Institute of Standards and Technology
explains that an advanced persistent threat ``is an adversary or
adversarial group that possesses the expertise and resources that
allow it to create opportunities to achieve its objectives by using
multiple attack vectors, including cyber, physical, and deception.
The APT objectives include establishing a foothold within the
infrastructure of targeted organizations for purposes of
exfiltrating information; undermining or impeding critical aspects
of a mission, function, program, or organization; or positioning
itself to carry out these objectives in the future. The APT pursues
its objectives repeatedly over an extended period, adapts to
defenders' efforts to resist it, and is determined to maintain the
level of interaction needed to execute its objectives.'' National
Institute of Standards and Technology, NIST Special Publication 800-
172, Enhanced Security Requirements for Protecting Controlled
Unclassified Information (Feb. 2021), at 2.
\184\ See letter from CSA.
---------------------------------------------------------------------------
3. Final Amendments
In response to comments, we are not adopting proposed Item
106(d)(1) and instead are adopting a new instruction to clarify that
updated incident disclosure must be provided in a Form 8-K amendment.
Specifically, we are revising proposed Instruction 2 to Item 1.05 of
Form 8-K to direct the registrant to include in its Item 1.05 Form 8-K
a statement identifying any information called for in Item 1.05(a) that
is not determined or is unavailable at the time of the required filing
and then file an amendment to its Form 8-K containing such information
within four business days after the registrant, without unreasonable
delay, determines such information or within four business days after
such information becomes available. This change mitigates commenters'
concerns with Item 106(d)(1). In particular, under the final rules,
companies will not have to distinguish whether information
[[Page 51910]]
regarding a material cybersecurity incident that was not determined or
was unavailable at the time of the initial Form 8-K filing should be
included on current reports or periodic reports, as the reporting would
be in an amended Form 8-K; details that commenters suggested raised
security concerns, such as remediation status, are not required; and
concerns that the proposed rule was vague or overbroad have been
addressed by narrowing the required disclosure to the information
required by Item 1.05(a). We also believe that use of a Form 8-K
amendment rather than a periodic report will allow investors to more
quickly identify updates regarding incidents that previously were
disclosed.
We appreciate that new information on a reported cybersecurity
incident may surface only in pieces; the final rules, however, do not
require updated reporting for all new information. Rather, Instruction
2 to Item 1.05 directs companies to file an amended Form 8-K with
respect to any information called for in Item 1.05(a) that was not
determined or was unavailable at the time of the initial Form 8-K
filing. Other than with respect to such previously undetermined or
unavailable information, the final rules do not separately create or
otherwise affect a registrant's duty to update its prior statements. We
remind registrants, however, that they may have a duty to correct prior
disclosure that the registrant determines was untrue (or omitted a
material fact necessary to make the disclosure not misleading) at the
time it was made \185\ (for example, if the registrant subsequently
discovers contradictory information that existed at the time of the
initial disclosure), or a duty to update disclosure that becomes
materially inaccurate after it is made \186\ (for example, when the
original statement is still being relied on by reasonable investors).
Registrants should consider whether they need to revisit or refresh
previous disclosure, including during the process of investigating a
cybersecurity incident.\187\
---------------------------------------------------------------------------
\185\ See Backman v. Polaroid Corp., 910 F.2d 10, 16-17 (1st
Cir. 1990) (en banc) (finding that the duty to correct applies ``if
a disclosure is in fact misleading when made, and the speaker
thereafter learns of this'').
\186\ See id. at 17 (describing the duty to update as
potentially applying ``if a prior disclosure `becomes materially
misleading in light of subsequent events''' (quoting Greenfield v.
Heublein, Inc., 742 F.2d 751, 758 (3d Cir. 1984))). But see
Higginbotham v. Baxter Intern., Inc., 495 F.3d 753, 760 (7th Cir.
2007) (rejecting duty to update before next quarterly report);
Gallagher v. Abbott Laboratories, 269 F.3d 806, 808-11 (7th Cir.
2001) (explaining that securities laws do not require continuous
disclosure).
\187\ Relatedly, registrants should be aware of the requirement
under Item 106(b)(2) of Regulation S-K to describe ``[w]hether any
risks from cybersecurity threats, including as a result of any
previous cybersecurity incidents, have materially affected or are
reasonably likely to materially affect the registrant'' (emphasis
added). See infra Section II.C.1.c.
---------------------------------------------------------------------------
We are not adopting proposed Item 106(d)(2), in response to
concerns that the proposed aggregation requirement was vague or
difficult to apply. We are persuaded by commenters that the proposed
requirement might be difficult to differentiate from Item 1.05
disclosure, or by contrast, could result in the need for extensive
internal controls and procedures to monitor all immaterial events to
determine whether they have become collectively material. The intent of
the proposed requirement was to capture the material impacts of related
incidents, and prevent the avoidance of incident disclosure through
disaggregation of such related events. However, upon further
reflection, and after review of comments, we believe that the proposed
requirement is not necessary based on the scope of Item 1.05.
To that end, we emphasize that the term ``cybersecurity incident''
as used in the final rules is to be construed broadly, as the
Commission stated in the Proposing Release.\188\ The definition of
``cybersecurity incident'' we are adopting extends to ``a series of
related unauthorized occurrences.'' \189\ This reflects that
cyberattacks sometimes compound over time, rather than present as a
discrete event. Accordingly, when a company finds that it has been
materially affected by what may appear as a series of related cyber
intrusions, Item 1.05 may be triggered even if the material impact or
reasonably likely material impact could be parceled among the multiple
intrusions to render each by itself immaterial. One example was
provided in the Proposing Release: the same malicious actor engages in
a number of smaller but continuous cyberattacks related in time and
form against the same company and collectively, they are either
quantitatively or qualitatively material.\190\ Another example is a
series of related attacks from multiple actors exploiting the same
vulnerability and collectively impeding the company's business
materially.
---------------------------------------------------------------------------
\188\ Proposing Release at 16601.
\189\ See infra Section II.C.3.
\190\ Proposing Release at 16599.
---------------------------------------------------------------------------
C. Disclosure of a Registrant's Risk Management, Strategy and
Governance Regarding Cybersecurity Risks
1. Risk Management and Strategy
a. Proposed Amendments
The Commission proposed to add 17 CFR 229.106(b) (Regulation S-K
``Item 106(b)'') to require registrants to provide more consistent and
informative disclosure regarding their cybersecurity risk management
and strategy in their annual reports. The Commission noted the Division
of Corporation Finance staff's experience that most registrants
disclosing a cybersecurity incident do not describe their cybersecurity
risk oversight or any related policies and procedures, even though
companies typically address significant risks by developing risk
management systems that often include written policies and
procedures.\191\
---------------------------------------------------------------------------
\191\ Id.
---------------------------------------------------------------------------
Proposed Item 106(b) would require a description of the
registrant's policies and procedures, if any, for the identification
and management of cybersecurity threats, including, but not limited to:
operational risk (i.e., disruption of business operations);
intellectual property theft; fraud; extortion; harm to employees or
customers; violation of privacy laws and other litigation and legal
risk; and reputational risk. As proposed, registrants would be required
to include a discussion, as applicable, of:
Whether the registrant has a cybersecurity risk assessment
program and if so, a description of the program ((b)(1));
Whether the registrant engages assessors, consultants,
auditors, or other third parties in connection with any cybersecurity
risk assessment program ((b)(2));
Whether the registrant has policies and procedures to
oversee, identify, and mitigate the cybersecurity risks associated with
its use of any third-party service provider (including, but not limited
to, those providers that have access to the registrant's customer and
employee data), including whether and how cybersecurity considerations
affect the selection and oversight of these providers and contractual
and other mechanisms the company uses to mitigate cybersecurity risks
related to these providers ((b)(3));
Whether the registrant undertakes activities to prevent,
detect, and minimize effects of cybersecurity incidents ((b)(4));
Whether the registrant has business continuity,
contingency, and recovery
[[Page 51911]]
plans in the event of a cybersecurity incident ((b)(5));
Whether previous cybersecurity incidents have informed
changes in the registrant's governance, policies and procedures, or
technologies ((b)(6));
Whether cybersecurity related risk and incidents have
affected or are reasonably likely to affect the registrant's results of
operations or financial condition and if so, how ((b)(7)); and
Whether cybersecurity risks are considered as part of the
registrant's business strategy, financial planning, and capital
allocation and if so, how ((b)(8)).\192\
---------------------------------------------------------------------------
\192\ Id. at 16599-16600.
---------------------------------------------------------------------------
The Commission anticipated that proposed Item 106(b) would benefit
investors by requiring more consistent disclosure of registrants'
strategies and actions to manage cybersecurity risks.\193\ Such risks,
the Commission observed, can affect registrants' business strategy,
financial outlook, and financial planning, as companies increasingly
rely on information technology, collection of data, and use of digital
payments as critical components of their businesses.\194\
---------------------------------------------------------------------------
\193\ Id. at 16599.
\194\ Id.
---------------------------------------------------------------------------
The Commission noted that the significant number of cybersecurity
incidents pertaining to third-party service providers prompted the
proposal to require disclosure of registrants' selection and oversight
of third-party entities.\195\ The Commission also proposed requiring
discussion of how prior cybersecurity incidents have affected or are
reasonably likely to affect the registrant, because such disclosure
would equip investors to better comprehend the level of cybersecurity
risk the company faces and assess the company's preparedness regarding
such risk.\196\
---------------------------------------------------------------------------
\195\ Id.
\196\ Id.
---------------------------------------------------------------------------
b. Comments
Many commenters supported proposed Item 106(b) for requiring
information that is vital to investors as they assess companies' risk
profiles and make investment decisions.\197\ One said cybersecurity
disclosures now are ``scattered and unpredictable'' rather than
``uniform,'' which ``diminishes their effectiveness.'' \198\ Similarly,
another found that current disclosures ``do not provide investors with
the information necessary to evaluate whether companies have adequate
governance structures and measures in place to deal with cybersecurity
challenges.'' \199\ The IAC recommended extending the proposed Item
106(b) disclosure requirements (as well as the proposed Item 106(c)
disclosure requirements) to registration statements, stating that
``pre-IPO companies may face heightened [cybersecurity] risks.'' \200\
---------------------------------------------------------------------------
\197\ See letters of AICPA; BuildingCyberSecurity.org (``BCS'');
Better Markets; Bitsight; Blue Lava, Inc. (``Blue Lava''); CalPERS;
ITIF; National Association of Corporate Directors (``NACD''); NASAA;
PWC; PRI; R Street; SecurityScorecard; Tenable Holdings Inc.
(``Tenable''). See also IAC Recommendation.
\198\ See letter from Better Markets.
\199\ See letter from PRI.
\200\ See IAC Recommendation.
---------------------------------------------------------------------------
By contrast, a number of commenters opposed proposed Item 106(b).
In particular, they commented that much of the proposed Item 106(b)
disclosure could increase a company's vulnerability to cyberattacks;
they expressed particular concern regarding the potential harms from
disclosures about whether cybersecurity policies are in place, incident
response processes and techniques, previous incidents and what changes
they spurred, and third-party service providers.\201\ Another criticism
was that proposed Item 106(b) would effectively force companies to
model their cybersecurity policies on the rule's disclosure elements,
rather than the practices best suited to each company's context.\202\
One commenter saw proposed Item 106(b) as counteracting the
streamlining accomplished in the Commission's 2020 release modernizing
Regulation S-K.\203\
---------------------------------------------------------------------------
\201\ See letters from ABA; ACLI; APCIA; BIO; BPI et al.;
Business Roundtable; Chamber; CSA; CTIA; EIC; Enbridge; FAH;
Federated Hermes; GPA; ITI; ISA; Nareit; NAM; NMHC; NRA; National
Retail Federation (``NRF''); SIFMA; Sen. Portman; TechNet;
TransUnion; USTelecom; Virtu.
\202\ See letters from BPI et al.; Chamber; EIC; Nareit; NRF;
NYSE; SCG; SIFMA; Virtu.
\203\ See letter from Nasdaq (citing Modernization of Regulation
S-K Items 101, 103, and 105, Release No. 33-10825 (Aug. 26, 2020)
[85 FR 63726 (Oct. 8, 2020)]).
---------------------------------------------------------------------------
Some commenters offered suggestions to narrow proposed Item 106(b)
to address their concerns. On proposed paragraph (b)(1), one commenter
recommended allowing a registrant to forgo describing its risk
assessment program if it confirms that it ``uses best practices and
standards'' to identify and protect against cybersecurity risks and
detect and respond to such events.\204\ On proposed paragraph (b)(3), a
few commenters said that registrants should be required to disclose
only high-level information relating to third parties, such as
confirmation that policies and procedures are appropriately applied to
third-party selection and oversight, and should not have to identify
the third parties or discuss the underlying mechanisms, controls, and
contractual requirements.\205\
---------------------------------------------------------------------------
\204\ See letter from Cybersecurity Coalition.
\205\ See letters from BPI et al.; Chamber; SIFMA. Other
commenters supported the level of detail required in (b)(3). See
letters from AICPA; PRI.
---------------------------------------------------------------------------
Some commenters opposed proposed paragraph (b)(6)'s requirement to
discuss whether ``previous cybersecurity incidents informed changes in
the registrant's governance, policies and procedures, or technologies''
entirely, stating it would undermine a registrant's cybersecurity.\206\
One commenter recommended the proposed (b)(6) disclosure be required
only at a high level, without specific details,\207\ while two
commenters appeared to propose only requiring disclosure as it pertains
to previous material incidents.\208\ Commenters suggested a materiality
filter for proposed paragraph (b)(7)'s requirement to discuss whether
``cybersecurity-related risks and previous cybersecurity-related
incidents have affected or are reasonably likely to affect the
registrant's strategy, business model, results of operations, or
financial condition and if so, how,'' so that the requirement would
apply only where a registrant has been materially affected or is
reasonably likely to be materially affected.\209\
---------------------------------------------------------------------------
\206\ See letters from ITI; SCG; Tenable.
\207\ See letter from Cybersecurity Coalition.
\208\ See letters from AGA/INGA; American Public Gas Association
(``APGA'').
\209\ See letter from PWC.
---------------------------------------------------------------------------
More broadly, one commenter recommended replacing the rule's
references to ``policies and procedures'' with ``strategy and
programs,'' because in the commenter's experience companies may not
codify their cybersecurity strategy in the same way they codify other
compliance policies and procedures.\210\ One commenter also suggested
offering companies the choice to place the proposed Item 106(b)
disclosures in either the Form 10-K or the proxy statement.\211\
---------------------------------------------------------------------------
\210\ See letter from Prof. Perullo.
\211\ See letter from Nasdaq.
---------------------------------------------------------------------------
Several commenters supported requiring registrants that lack
cybersecurity policies and procedures to explicitly say so, commenting,
for example, that ``investors should not be left to intuit the meaning
of a company's silence in its disclosures.'' \212\ One
[[Page 51912]]
commenter further stated that registrants should be required to explain
why they have not adopted cybersecurity policies and procedures.\213\
By contrast, two commenters opposed requiring registrants that lack
cybersecurity policies and procedures to explicitly say so,\214\ with
one commenter saying that ``a threat actor may target registrants they
perceive to have unsophisticated cybersecurity programs,'' \215\ and
the other commenter saying ``it is highly unlikely that any SEC
registrants would not have `established any cybersecurity policies and
procedures.'' \216\
---------------------------------------------------------------------------
\212\ See letters from Blue Lava; CSA; Cybersecurity Coalition;
ITI; NASAA; Prof. Perullo; Tenable. The quoted language is from
NASAA's letter. See also IAC Recommendation (recommending ``that
issuers that have not developed any cybersecurity policies or
procedures be required to make a statement to that effect'' because
``the vast majority of investors . . . would view the complete
absence of cybersecurity risk governance as overwhelmingly material
to investment decision-making'').
\213\ See letter from NASAA.
\214\ See letters from EIC; IIA.
\215\ See letter from EIC.
\216\ See letter from IIA.
---------------------------------------------------------------------------
In response to the Commission's request for comment about whether
to require a registrant to specify whether any cybersecurity assessor,
consultant, auditor, or other service provider that it relies on is
through an internal function or through an external third-party service
provider, several commenters opposed the idea as not useful, with one
saying that ``a significant majority--possibly the entirety--of SEC
registrants'' rely on third-party service providers for some portion of
their cybersecurity.\217\ Conversely, another commenter supported the
third-party specification, and suggested requiring registrants to name
the third parties, as over time, this would create more transparency in
whether breaches correlate with specific third parties.\218\
---------------------------------------------------------------------------
\217\ See letters from BCS; Chevron; EIC; IIA; Prof. Perullo.
The quoted language is from the letter of IIA.
\218\ See letter from Blue Lava.
---------------------------------------------------------------------------
Commenters also offered a range of recommended additions to the
rule. One commenter recommended modifying proposed paragraph (b)(1) to
require registrants to specify whether their cybersecurity programs
assess risks continuously or periodically, arguing the latter approach
leaves companies more exposed.\219\ The same commenter suggested
paragraph (b)(2) require ``a description of the class of services and
solutions'' provided by third parties.\220\
---------------------------------------------------------------------------
\219\ See letter from Tenable.
\220\ Id.
---------------------------------------------------------------------------
A few commenters recommended that we direct registrants to quantify
their cybersecurity risk exposure through independent risk
assessments.\221\ Similarly, one commenter urged us to require
registrants to explain how they quantify their cybersecurity risk,\222\
while another said we should set out quantifiable metrics against which
companies measure their cybersecurity systems, though it did not
specify what these metrics should be.\223\ Two commenters suggested
that we require companies to disclose whether their cybersecurity
programs have been audited by a third party.\224\ And one commenter
recommended that we require registrants to disclose whether they use
the cybersecurity framework of the National Institute of Standards and
Technology (``NIST''), to ease comparison of registrant risk
profiles.\225\
---------------------------------------------------------------------------
\221\ See letters from BitSight; Kovrr Risk Modeling Ltd.;
SecurityScorecard.
\222\ See letter from Safe Security.
\223\ See letter from FDD.
\224\ See letters from BCS; Better Markets.
\225\ See letter from SandboxAQ. This commenter also recommended
registrants be required to disclose whether they use post-quantum
cryptography as part of their risk mitigation efforts.
---------------------------------------------------------------------------
c. Final Amendments
We continue to believe that investors need information on
registrants' cybersecurity risk management and strategy, and that
uniform, comparable, easy to locate disclosure will not emerge absent
new rules. Commenters raised concerns with proposed Item 106(b)'s
security implications and what they saw as its prescriptiveness. We
agree that extensive public disclosure on how a company plans for,
defends against, and responds to cyberattacks has the potential to
advantage threat actors. Similarly, we acknowledge commenters' concerns
that the final rule could unintentionally affect a registrant's risk
management and strategy decision-making. In response to those comments,
we confirm that the purpose of the rules is, and was at proposal, to
inform investors, not to influence whether and how companies manage
their cybersecurity risk. Additionally, to respond to commenters'
concerns about security, the final rules eliminate or narrow certain
elements from proposed Item 106(b). We believe the resulting rule
requires disclosure of information material to the investment decisions
of investors, in a way that is comparable and easy to locate, while
steering clear of security sensitive details.
As adopted, 17 CFR 229.106(b)(1) (Regulation S-K ``Item
106(b)(1)'') requires a description of ``the registrant's processes, if
any, for assessing, identifying, and managing material risks from
cybersecurity threats in sufficient detail for a reasonable investor to
understand those processes.'' We believe this revised formulation of
the rule should help avoid levels of detail that may go beyond
information that is material to investors and address commenters'
concerns that those details could increase a company's vulnerability to
cyberattack. We have also substituted the term ``processes'' for the
proposed ``policies and procedures'' to avoid requiring disclosure of
the kinds of operational details that could be weaponized by threat
actors, and because the term ``processes'' more fully compasses
registrants' cybersecurity practices than ``policies and procedures,''
which suggest formal codification.\226\ We still expect the disclosure
to allow investors to ascertain a registrant's cybersecurity practices,
such as whether they have a risk assessment program in place, with
sufficient detail for investors to understand the registrant's
cybersecurity risk profile. The shift to ``processes'' also obviates
the question of whether to require companies that do not have written
policies and procedures to disclose that fact. We believe that, to the
extent a company discloses that it faces a material cybersecurity risk
in connection with its overall disclosures of material risks,\227\ an
investor can ascertain whether such risks have resulted in the adoption
of processes to assess, identify, and manage material cybersecurity
risks based on whether the company also makes such disclosures under
the final rules.
---------------------------------------------------------------------------
\226\ See letter from Prof. Perullo (distinguishing the
formality of ``policies and procedures'' from the informality of
``strategy or program''). We have adopted ``processes'' in place of
the commenter's suggestion of ``strategy or program'' because
``processes'' is broader and commonly understood. We decline the
suggestion from another commenter to allow registrants to avoid this
disclosure altogether by confirming they adhere to ``best practices
and standards,'' because there is no single set of widely accepted
best practices and standards, and industry practices may evolve. See
letter from Cybersecurity Coalition.
\227\ See Item 105 of Regulation S-K.
---------------------------------------------------------------------------
We have also added a materiality qualifier to the proposed
requirement to disclose ``risks from cybersecurity threats,'' and have
removed the proposed list of risk types (i.e., ``intellectual property
theft; fraud; extortion; harm to employees or customers; violation of
privacy laws and other litigation and legal risk; and reputational
risk''), to foreclose any perception that the rule prescribes
cybersecurity policy. We continue to believe these are the types of
risks that registrants may face in this context, and enumerate them
here as guidance. We note that registrants will continue to tailor
their cybersecurity processes to threats as they perceive them. The
rule requires registrants to describe those processes insofar as they
relate to material cybersecurity risks.
We have also revised Item 106(b)'s enumerated disclosure elements
in
[[Page 51913]]
response to commenters that raised concerns regarding the level of
detail required by some elements of the proposal. Specifically, we are
not adopting proposed paragraphs (4) (prevention and detection
activities), (5) (continuity and recovery plans), and (6) (previous
incidents). We have similarly revised proposed paragraph (3) to
eliminate some of the detail it required, consistent with commenter
suggestions to require only high-level disclosure regarding third-party
service providers. The enumerated elements that a registrant should
address in its Item 106(b) disclosure, as applicable, are:
Whether and how the described cybersecurity processes in
Item 106(b) have been integrated into the registrant's overall risk
management system or processes;
Whether the registrant engages assessors, consultants,
auditors, or other third parties in connection with any such processes;
and
Whether the registrant has processes to oversee and
identify material risks from cybersecurity threats associated with its
use of any third-party service provider.
We have also revised the rule text to clarify that the above
elements compose a non-exclusive list of disclosures; registrants
should additionally disclose whatever information is necessary, based
on their facts and circumstances, for a reasonable investor to
understand their cybersecurity processes.
We have moved proposed paragraph (7) into a separate paragraph, at
17 CFR 229.106(b)(2) (Regulation S-K ``Item 106(b)(2)''), instead of
including it in the enumerated list in Item 106(b)(1), and have added a
materiality qualifier in response to a comment.\228\ Item 106(b)(2)
requires a description of ``[w]hether any risks from cybersecurity
threats, including as a result of any previous cybersecurity incidents,
have materially affected or are reasonably likely to materially affect
the registrant, including its business strategy, results of operations,
or financial condition and if so, how.'' \229\
---------------------------------------------------------------------------
\228\ See letter from PWC.
\229\ With respect to the Item 106(b)(2)'s requirement to
describe any risks as a result of any previous cybersecurity
incidents, see supra Section II.B.3 for a discussion of the duties
to correct or update prior disclosure that registrants may have in
certain circumstances. As we note in that section, registrants
should consider whether they need to revisit or refresh previous
disclosure, including during the process of investigating a
cybersecurity incident.
---------------------------------------------------------------------------
The final rules will require disclosure of whether a registrant
engages assessors, consultants, auditors, or other third parties in
connection with their cybersecurity because we believe it is important
for investors to know a registrant's level of in-house versus
outsourced cybersecurity capacity. We understand that many registrants
rely on third-party service providers for some portion of their
cybersecurity, and we believe this information is accordingly necessary
for investors to assess a company's cybersecurity risk profile in
making investment decisions. However, we are not persuaded, as one
commenter contended, that registrants should be required to name the
third parties (though they may choose to do so), because we believe
this may magnify concerns about increasing a company's cybersecurity
vulnerabilities. For the same reason, we decline the commenter
suggestion to require a description of the services provided by third
parties.
We are also not persuaded that risk quantification or other
quantifiable metrics are appropriate as mandatory elements of a
cybersecurity disclosure framework. While such metrics may be used by
registrants and investors in the future, commenters did not identify
any such metrics that would be appropriate to mandate at this time.
Additionally, to the extent that a registrant uses any quantitative
metrics in assessing or managing cybersecurity risks, it may disclose
such information voluntarily. For similar reasons, we decline
commenters' recommendations to require disclosure of independent
assessments and audits, as well as commenters' recommendations on
disclosure of use of the NIST framework, and on distinguishing between
continuous and periodic risk assessment.
We decline the commenter suggestion to allow Item 106(b) disclosure
to be provided in the proxy statement, as the proxy statement is
generally confined to information pertaining to the election of
directors. We are also not requiring Item 106 disclosures in
registration statements as recommended by the IAC, consistent with our
efforts to reduce the burdens associated with the final rule. However,
as discussed further below,\230\ we reiterate the Commission's guidance
from the 2018 Interpretive Release that ``[c]ompanies should consider
the materiality of cybersecurity risks and incidents when preparing the
disclosure that is required in registration statements.'' \231\
Finally, we note that registrants may satisfy the Item 106 disclosure
requirements through incorporation by reference pursuant to 17 CFR
240.12b-23 (``Rule 12b-23'').\232\
---------------------------------------------------------------------------
\230\ See infra text accompanying notes 355 and 356.
\231\ 2018 Interpretive Release at 8168.
\232\ As required by Rule 12b-23, in order to incorporate
information by reference in answer, or partial answer, to Item 106,
a registrant must, among other things, include an active hyperlink
if the information is publicly available on EDGAR.
---------------------------------------------------------------------------
2. Governance
a. Proposed Amendments
The Commission proposed to add 17 CFR 229.106(c) (Regulation S-K
``Item 106(c)'') to require a description of management and the board's
oversight of a registrant's cybersecurity risk. This information would
complement the proposed risk management and strategy disclosure by
clarifying for investors how a registrant's leadership oversees and
implements its cybersecurity processes.\233\ Proposed 17 CFR
229.106(c)(1) (Regulation S-K ``Item 106(c)(1)'') would focus on the
board's role, requiring discussion, as applicable, of:
---------------------------------------------------------------------------
\233\ Proposing Release at 16600.
---------------------------------------------------------------------------
Whether the entire board, specific board members, or a
board committee is responsible for the oversight of cybersecurity
risks;
The processes by which the board is informed about
cybersecurity risks, and the frequency of its discussions on this
topic; and
Whether and how the board or board committee considers
cybersecurity risks as part of its business strategy, risk management,
and financial oversight.
Proposed 17 CFR 229.106(c)(2) (Regulation S-K ``Item 106(c)(2)'')
meanwhile would require a description of management's role in assessing
and managing cybersecurity-related risks, as well as its role in
implementing the registrant's cybersecurity policies, procedures, and
strategies, including at a minimum discussion of:
Whether certain management positions or committees are
responsible for measuring and managing cybersecurity risk, specifically
the prevention, mitigation, detection, and remediation of cybersecurity
incidents, and the relevant expertise of such persons or members;
Whether the registrant has a designated chief information
security officer, or someone in a comparable position, and if so, to
whom that individual reports within the registrant's organizational
chart, and the relevant expertise of any such persons;
The processes by which such persons or committees are
informed about and monitor the prevention, mitigation, detection, and
remediation of cybersecurity incidents; and
[[Page 51914]]
Whether and how frequently such persons or committees
report to the board of directors or a committee of the board of
directors on cybersecurity risk.
The Proposing Release explained that proposed Item 106(c)(1) would
reinforce the Commission's 2018 Interpretive Release,\234\ which said
that disclosure on how a board engages management on cybersecurity
helps investors assess the board's exercise of its oversight
responsibility.\235\ The Proposing Release noted that proposed Item
106(c)(2) would be of importance to investors in that it would help
investors understand how registrants are planning for cybersecurity
risks and inform their decisions on how best to allocate their
capital.\236\
---------------------------------------------------------------------------
\234\ Id. (citing 2018 Interpretive Release at 8170).
\235\ 2018 Interpretive Release at 8170.
\236\ Proposing Release at 16600.
---------------------------------------------------------------------------
b. Comments
A few commenters supported proposed Item 106(c) as providing
investors with more uniform and informed understanding of registrants'
governance of cybersecurity risks.\237\ A number of commenters opposed
proposed Item 106(c). They contended that the proposed Item 106(c)
disclosures would be too granular to be decision-useful; instead, some
of these commenters recommended that we limit the rule to a high-level
explanation of management and the board's role in cybersecurity risk
oversight.\238\
---------------------------------------------------------------------------
\237\ See, e.g., letters from Better Markets; CalPERS.
\238\ See letters from ABA; AGA/INGAA; EEI; Nareit; NYSE.
---------------------------------------------------------------------------
One commenter said proposed Item 106(c)(1) should be dropped
because it duplicates existing 17 CFR 229.407(h) (Regulation S-K ``Item
407(h)''), which requires reporting of material information regarding a
board's leadership structure and role in risk oversight, including how
it administers its oversight function.\239\ Others saw similarities
with Item 407(h) as well and suggested instead that proposed Item
106(c) be subsumed into Item 407, thus co-locating governance
disclosures.\240\
---------------------------------------------------------------------------
\239\ See letter from Davis Polk. The commenter went on to say
that, to the extent Item 106(c) requires disclosure of immaterial
information regarding the board, it should be dropped.
\240\ See letters from ABA; BDO; PWC.
---------------------------------------------------------------------------
In response to a request for comment in the Proposing Release on
whether the Commission should expressly provide for the use of
hyperlinks or cross-references in Item 106, one commenter supported the
use of hyperlinks and cross-references, but sought clarification of
whether the practice is already permitted under Commission rules.\241\
Another commenter opposed, saying Item 407(h)'s more general discussion
of board governance is distinct from Item 106(c)(1)'s specific focus on
cybersecurity.\242\ The commenter cautioned that allowing registrants
to employ hyperlinks and cross-references in Item 106 would lead to
``less detail,'' resulting in disclosure insufficient to investor
needs.\243\
---------------------------------------------------------------------------
\241\ See letter from E&Y.
\242\ See letter from Tenable.
\243\ Id.
---------------------------------------------------------------------------
One commenter recommended that we move proposed Item 106(c)(2) to
the enumerated list of topics called for in proposed Item 106(b).\244\
Another commenter suggested expanding the rule to include disclosure of
management and staff training on cybersecurity, asserting that the
information is useful to investors because policies depend on staff for
successful implementation.\245\ Two commenters suggested allowing the
Item 106(c) disclosures to be made in the proxy statement.\246\
---------------------------------------------------------------------------
\244\ See letter from Davis Polk.
\245\ See letter from PRI.
\246\ See letters from Business Roundtable; Nasdaq.
---------------------------------------------------------------------------
c. Final Amendments
In response to comments, and aligned with our changes to Item
106(b), we have streamlined Item 106(c) to require disclosure that is
less granular than proposed. Under Item 106(c)(1) as adopted,
registrants must ``[d]escribe the board's oversight of risks from
cybersecurity threats,'' and, if applicable, ``identify any board
committee or subcommittee responsible'' for such oversight ``and
describe the processes by which the board or such committee is informed
about such risks.'' We have removed proposed Item 106(c)(1)(iii), which
had covered whether and how the board integrates cybersecurity into its
business strategy, risk management, and financial oversight. While we
have also removed the proposed Item 106(c)(1)(ii) requirement to
disclose ``the frequency of [the board or committee's] discussions'' on
cybersecurity, we note that, depending on context, some registrants'
descriptions of the processes by which their board or relevant
committee is informed about cybersecurity risks may include discussion
of frequency.\247\
---------------------------------------------------------------------------
\247\ For example, if the board or committee relies on periodic
(e.g., quarterly) presentations by the registrant's chief
information security officer to inform its consideration of risks
from cybersecurity threats, the registrant may, in the course of
describing those presentations, also note their frequency.
---------------------------------------------------------------------------
Given these changes, we find that Item 407(h) and Item 106(c)(1) as
adopted serve distinct purposes and should not be combined, as
suggested by some commenters--the former requires description of the
board's leadership structure and administration of risk oversight
generally, while the latter requires detail of the board's oversight of
specific cybersecurity risk. As noted by one commenter,\248\ to the
extent these disclosures are duplicative, a registrant would be able to
incorporate such information by reference.\249\
---------------------------------------------------------------------------
\248\ See letter from E&Y.
\249\ Rule 12b-23.
---------------------------------------------------------------------------
We have also modified Item 106(c)(2) to add a materiality
qualifier, to make clear that registrants must ``[d]escribe
management's role in assessing and managing the registrant's material
risks from cybersecurity threats'' (emphasis added).\250\ The
enumerated disclosure elements now constitute a ``non-exclusive list''
registrants should consider including. We have revised the first
element to require the disclosure of management positions or committees
``responsible for assessing and managing such risks, and the relevant
expertise of such persons or members in such detail as necessary to
fully describe the nature of the expertise.'' Because this requirement
would typically encompass identification of whether a registrant has a
chief information security officer, or someone in a comparable
position, we are not adopting the proposed second element that would
have specifically called for disclosure of whether the registrant has a
designated chief information security officer. Given our purpose of
streamlining the disclosure requirements, we also are not adopting the
proposed requirement to disclose the frequency of management-board
discussions on cybersecurity, though, as noted above, discussion of
frequency may in some cases be included as part of describing the
processes by which the board or relevant committee is informed about
cybersecurity risks in compliance with Item 106(c)(1), to the extent it
is relevant to an understanding of the board's oversight of risks from
cybersecurity threats.
---------------------------------------------------------------------------
\250\ We have not added a materiality qualifier to Item
106(c)(1) because, if a board of directors determines to oversee a
particular risk, the fact of such oversight being exercised by the
board is material to investors. By contrast, management oversees
many more matters and management's oversight of non-material matters
is likely not material to investors, so a materiality qualifier is
appropriate for Item 106(c)(2).
---------------------------------------------------------------------------
Thus, as adopted, Item 106(c)(2) directs registrants to consider
disclosing the following as part of a description of management's role
in assessing and managing the registrant's material risks from
cybersecurity threats:
Whether and which management positions or committees are
responsible
[[Page 51915]]
for assessing and managing such risks, and the relevant expertise of
such persons or members in such detail as necessary to fully describe
the nature of the expertise;
The processes by which such persons or committees are
informed about and monitor the prevention, detection, mitigation, and
remediation of cybersecurity incidents; and
Whether such persons or committees report information
about such risks to the board of directors or a committee or
subcommittee of the board of directors.
As many commenters recommended, these elements are limited to
disclosure that we believe balances investors' needs to understand a
registrant's governance of risks from cybersecurity threats in
sufficient detail to inform an investment or voting decision with
concerns that the proposal could inadvertently pressure registrants to
adopt specific or inflexible cybersecurity-risk governance practices or
organizational structures. We do not believe these disclosures should
be subsumed into Item 106(b), as one commenter recommended, because
identifying the management committees and positions responsible for
risks from cybersecurity threats is distinct from describing the
cybersecurity practices management has deployed. We also decline the
commenter suggestion to require disclosure of management and staff
training on cybersecurity; registrants may choose to make such
disclosure voluntarily. Finally, we decline the commenter suggestion to
allow Item 106(c) disclosure to be provided in the proxy statement;
governance information in the proxy statement is generally meant to
inform shareholders' voting decisions, whereas Item 106(c) disclosure
informs investors' assessment of investment risk.
3. Definitions
a. Proposed Definitions
The Commission proposed to define three terms to delineate the
scope of the amendments: ``cybersecurity incident,'' ``cybersecurity
threat,'' and ``information systems.'' \251\ Proposed 229 CFR
229.106(a) (Regulation S-K ``Item 106(a)'') would define them as
follows:
---------------------------------------------------------------------------
\251\ Proposing Release at 16600-16601.
---------------------------------------------------------------------------
Cybersecurity incident means an unauthorized occurrence on
or conducted through a registrant's information systems that
jeopardizes the confidentiality, integrity, or availability of a
registrant's information systems or any information residing therein.
Cybersecurity threat means any potential occurrence that
may result in an unauthorized effort to adversely affect the
confidentiality, integrity or availability of a registrant's
information systems or any information residing therein.
Information systems means information resources, owned, or
used by the registrant, including physical or virtual infrastructure
controlled by such information resources, or components thereof,
organized for the collection, processing, maintenance, use, sharing,
dissemination, or disposition of the registrant's information to
maintain or support the registrant's operations.
As noted above, the Commission explained that what constitutes a
``cybersecurity incident'' should be construed broadly, encompassing a
range of event types.\252\
---------------------------------------------------------------------------
\252\ Id. at 16601.
---------------------------------------------------------------------------
b. Comments
Most commenters that offered feedback on the proposed definitions
suggested narrowing them in some fashion. On ``cybersecurity
incident,'' many commenters urged limiting the definition to cases of
actual harm, thereby excluding incidents that had only the potential to
cause harm.\253\ They suggested accomplishing this by replacing
``jeopardizes'' with phrases such as ``adversely affects'' or ``results
in substantial loss of.'' \254\ One of these commenters noted that such
a change would more closely align the definition with that in
CIRCIA.\255\ Other commenters objected to the definition's use of ``any
information'' as overbroad, saying it would lead to inconsistent
application.\256\ One commenter sought clarification of whether the
definition encompasses accidental incidents, such as chance technology
outages, that do not involve a malicious actor,\257\ while another
commenter advocated broadening the definition to any incident
materially disrupting operations, regardless of what precipitated
it.\258\
---------------------------------------------------------------------------
\253\ See letters from ABA; BPI et al.; Chamber et al.; Davis
Polk; Enbridge; FDD; FEI; Hunton; PWC; SCG; SIFMA.
\254\ See letters from BPI et al.; Hunton.
\255\ See letter from BPI et al. (``The word `jeopardizes'
should be replaced with `results in substantial loss of' to capture
incidents that are causing some actual harm, and to better harmonize
the definition with the reporting standard set forth by Congress in
CIRCIA.'').
\256\ See letters from Deloitte; SIFMA.
\257\ See letter from CSA.
\258\ See letter from Crindata.
---------------------------------------------------------------------------
On ``cybersecurity threat,'' commenters urged narrowing the rule by
replacing the language ``may result in'' with ``could reasonably be
expected to result in'' or some other probability threshold.\259\ One
stated that ``the use of a `may' standard establishes an unhelpfully
low standard that would require registrants to establish policies and
procedures to identify threats that are potentially overbroad and not
appropriately tailored to those threats that are reasonably
foreseeable.'' \260\ In a similar vein, two commenters objected to the
language ``any potential occurrence'' as over-inclusive and lacking
``instructive boundaries.'' \261\
---------------------------------------------------------------------------
\259\ See letters from Chevron; Debevoise; NYC Bar.
\260\ See letter from Debevoise.
\261\ See letters from Chevron; Deloitte.
---------------------------------------------------------------------------
On ``information systems,'' many commenters favored replacing
``owned or used by'' with ``owned or operated by,'' ``owned or
controlled by,'' or like terms, so that registrants' reporting
obligations stop short of incidents on third-party information
systems.\262\ A few commenters said the definition could be construed
to cover hard-copy information and should be revised to foreclose such
a reading.\263\
---------------------------------------------------------------------------
\262\ See letters from ABA; APCIA; Business Roundtable; Chamber;
Cybersecurity Coalition; ISA; ITI; NAM; NDIA; Paylocity. Other
commenters made similar arguments about third party systems without
speaking specifically to the definition, saying, for example, that
registrants may not have sufficient visibility into third-party
systems and may be bound by confidentiality agreements. See letters
from AIA; EIC; FAH; NMHC; SIFMA.
\263\ See letters from ABA; BPI et al.; Enbridge.
---------------------------------------------------------------------------
More broadly, many commenters advised the Commission to align these
definitions with comparable definitions in other Federal laws and
regulations, such as CIRCIA and NIST.\264\ One commenter explained that
``[a]ligning definitions with those in existing federal laws and
regulations would help ensure that the defined terms are consistently
understood, interpreted and applied in the relevant disclosure.'' \265\
However, another commenter cautioned against aligning with definitions,
such as those of NIST, that were developed with a view toward internal
risk management and response rather than external reporting; the
commenter identified CIRCIA and the Federal banking regulators'
definitions as more apposite.\266\ One commenter noted that additional
proposed defined terms were included in the Commission's rulemaking
release Cybersecurity Risk Management for Investment Advisers,
Registered Investment Companies, and Business Development Companies
\267\ that were not included in the Proposing Release and recommended
that we
[[Page 51916]]
``consider whether the defined terms should be consistent.'' \268\
---------------------------------------------------------------------------
\264\ See letters from ABA; CAQ; Chevron; FEI; IC; IIA;
Microsoft; PWC; SandboxAQ; SIFMA.
\265\ See letter from ABA.
\266\ See letter from SCG.
\267\ Release No. 33-11028 (Feb. 9, 2022) [87 FR 13524 (Mar. 9,
2022)].
\268\ See letter from Deloitte.
---------------------------------------------------------------------------
In the Proposing Release, the Commission asked whether to define
other terms used in the proposed amendments, and specifically sought
comment on whether a definition of ``cybersecurity'' would be
useful.\269\ Several commenters supported defining ``cybersecurity,''
\270\ reasoning, for example, that any rulemaking on cybersecurity
should define that baseline term; \271\ that, left undefined, the term
would be open to varying interpretations; \272\ and that details such
as whether hardware is covered should be resolved.\273\ Separately, two
commenters recommended the Commission define ``operational
technology,'' \274\ with one explaining that the ``proposed definitions
understandably focus on data breaches, which are a major cybersecurity
threat, but we believe an operational technology breach could have even
more detrimental effects in certain cases (such as for ransomware
attacks that have impacted critical infrastructure) and warrants
disclosure guidance from the Commission.'' \275\
---------------------------------------------------------------------------
\269\ Proposing Release at 16601.
\270\ See letters from BCS; Blue Lava; EIC; R. Hackman; R
Street.
\271\ See letter from R Street.
\272\ See letter from Blue Lava.
\273\ See letter from BCS.
\274\ See letters from Chevron; EIC.
\275\ See letter from Chevron.
---------------------------------------------------------------------------
Several commenters also sought either a formal definition or more
guidance on the term ``material'' specific to the cybersecurity
space.\276\ Some read the proposal, particularly the incident examples
provided in the Proposing Release, as lowering the bar for materiality
and being overly subjective, which they indicated may result in over-
reporting of cybersecurity incidents or introduce uncertainty, and they
urged the Commission to affirm the standard materiality
definition.\277\ Another commenter sought cybersecurity-specific
guidance on materiality, including ``concrete thresholds to assist
registrants in determining materiality.'' \278\ A few commenters
recommended conditioning the materiality determination on the
underlying information being verified to ``a high degree of
confidence'' and ``unlikely to materially change,'' \279\ while one
commenter looked to replace materiality altogether with a significance
standard like that in CIRCIA.\280\
---------------------------------------------------------------------------
\276\ See letters from ACLI; AIC; AICPA; APCIA; Bitsight; Harry
Broadman, Eric Matrejek, and Brad Wilson (``Broadman et al.'');
Debevoise; EIC; International Information System Security
Certification Consortium (``ISC2''); M. Barragan; NYC Bar; Prof.
Perullo; R Street; SIFMA; TransUnion; Virtu.
\277\ See letters from APCIA; ACLI; EIC; Virtu.
\278\ See letter from SIFMA.
\279\ See letters from Debevoise; NYC Bar. See also letter from
AIC (suggesting ``unlikely to change,'' without ``materially'').
\280\ See letter from National Electrical Manufacturers
Association (``NEMA'').
---------------------------------------------------------------------------
c. Final Definitions
We are adopting definitions for ``cybersecurity incident,''
``cybersecurity threat,'' and ``information systems'' largely as
proposed, with three modifications.
First, on ``cybersecurity incident,'' we are adding the phrase ``or
a series of related unauthorized occurrences'' to the ``cybersecurity
incident'' definition. This reflects our guidance in Section II.B.3
above that a series of related occurrences may collectively have a
material impact or reasonably likely material impact and therefore
trigger Form 8-K Item 1.05, even if each individual occurrence on its
own would not rise to the level of materiality. Second, we are making a
clarifying edit to ``information systems.'' Some commenters said the
definition could be construed to cover hard-copy resources.\281\ We
recognize that reading is possible, if unlikely and unintended, and we
are therefore inserting ``electronic'' before ``information
resources,'' to ensure the rules pertain only to electronic resources.
Third, we are making minor revisions to the ``cybersecurity threat''
definition for clarity and to better align it with the ``cybersecurity
incident'' definition.
---------------------------------------------------------------------------
\281\ See letters from ABA; BPI et al.; Enbridge.
---------------------------------------------------------------------------
Accordingly, the definitions are as follows:
Cybersecurity incident means an unauthorized occurrence,
or a series of related unauthorized occurrences, on or conducted
through a registrant's information systems that jeopardizes the
confidentiality, integrity, or availability of a registrant's
information systems or any information residing therein.
Cybersecurity threat means any potential unauthorized
occurrence on or conducted through a registrant's information systems
that may result in adverse effects on the confidentiality, integrity or
availability of a registrant's information systems or any information
residing therein.
Information systems means electronic information
resources, owned or used by the registrant, including physical or
virtual infrastructure controlled by such information resources, or
components thereof, organized for the collection, processing,
maintenance, use, sharing, dissemination, or disposition of the
registrant's information to maintain or support the registrant's
operations.
We recognize commenters' concern regarding the term ``jeopardizes''
in the proposed ``cybersecurity incident'' definition and the resulting
scope of the definition. Nonetheless, we note that the definition is
not self-executing; rather it is operationalized by Item 1.05, which is
conditioned on the incident having been material to the registrant.
Typically that would entail actual harm, though the harm may sometimes
be delayed, and a material cybersecurity incident may not result in
actual harm in all instances. For example, a company whose intellectual
property is stolen may not suffer harm immediately, but it may foresee
that harm will likely occur over time as that information is sold to
other parties, such that it can determine materiality before the harm
occurs. The reputational harm from a breach may similarly increase over
time in a foreseeable manner. There may also be cases, even if
uncommon, where the jeopardy caused by a cybersecurity incident
materially affects the company, even if the incident has not yet caused
actual harm. In such circumstances, we believe investors should be
apprised of the material effects of the incident. We are therefore
retaining the word ``jeopardizes'' in the definition.
We are not persuaded that the proposed ``cybersecurity incident''
definition's use of ``any information'' would lead to inconsistent
application of the definition among issuers or cause a risk of over-
reporting, as suggested by some commenters. As noted above, the
``cybersecurity incident'' definition is operationalized by Item 1.05.
Item 1.05 does not require disclosure whenever ``any information'' is
affected by an intruder. Disclosure is triggered only when the
resulting effect of an incident on the registrant is material.
We are also retaining ``unauthorized'' in the incident definition
as proposed. In general, we believe that an accidental occurrence is an
unauthorized occurrence. Therefore, we note that an accidental
occurrence may be a cybersecurity incident under our definition, even
if there is no confirmed malicious activity. For example, if a
company's customer data are accidentally exposed, allowing unauthorized
access to such data, the data breach would constitute a ``cybersecurity
incident'' that would necessitate a materiality analysis to determine
whether disclosure under Item 1.05 of Form 8-K is required.
On ``cybersecurity threat,'' we appreciate commenters' concerns
with
[[Page 51917]]
the proposed definition's use of ``may result in'' and ``any potential
occurrence.'' Unlike with ``cybersecurity incident,'' where the
interplay of the proposed definition with proposed Item 1.05 ensured
only material incidents would become reportable, proposed Item 106(b)'s
reference to ``the identification and management of risks from
cybersecurity threats'' was not qualified by materiality. We are
therefore adding a materiality condition to Item 106(b). As adopted,
Item 106(b) will require disclosure of registrants' processes to
address the material risks of potential occurrences that could
reasonably result in an unauthorized effort to adversely affect the
confidentiality, integrity, or availability of a registrant's
information systems. Given the addition of a materiality condition to
Item 106(b), we do not believe that further revision to the
``cybersecurity threat'' definition is warranted.
On ``information systems,'' we decline to change ``owned or used
by'' to ``owned or operated by,'' ``owned or controlled by,'' or
similar terms advanced by commenters. Commenters recognized that ``used
by'' covers information resources owned by third parties. That is by
design: covering third party systems is essential to the working of
Item 106 of Regulation S-K and Item 1.05 of Form 8-K. As we explain
above, in Section II.A.3, the materiality of a cybersecurity incident
is contingent neither on where the relevant electronic systems reside
nor on who owns them, but rather on the impact to the registrant. We do
not believe that a reasonable investor would view a significant data
breach as immaterial merely because the data are housed on a cloud
service. If we were to remove ``used by,'' a registrant could evade the
disclosure requirements of the final rules by contracting out all of
its information technology needs to third parties. Accordingly, the
definition of ``information systems'' contemplates those resources
owned by third parties and used by the registrant, as proposed.
In considering commenters' suggestion to align our definitions with
CIRCIA, NIST, and other Federal regulations, we observe that there is
no one standard definition for these terms, and that regulators have
adopted definitions based on the specific contexts applicable to their
regulations. Nonetheless, we also observe that the final
``cybersecurity incident'' definition is already similar to the CIRCIA
and NIST incident definitions, in that all three focus on the
confidentiality, integrity, and availability of information
systems.\282\ Our definition of ``information systems'' also tracks
CIRCIA and NIST, as all three cover ``information resources'' that are
``organized for the collection, processing, maintenance, use, sharing,
dissemination, or disposition'' of information.\283\ Of course, the
definitions do not match precisely, but some variation is inevitable
where various Federal laws and regulations have different purposes,
contexts, and goals. We therefore find that further alignment is not
needed.
---------------------------------------------------------------------------
\282\ For CIRCIA, see supra note 19, at sec. 103, 136 Stat.
1039; and 6 U.S.C. 681b(c)(2)(A)(i). For NIST, see Incident,
Glossary, NIST Computer Security Resource Center, available at
https://csrc.nist.gov/glossary/term/incident.
\283\ For CIRCIA, see supra note 19, at sec. 103, 136 Stat.
1039; and 44 U.S.C. 3502(8). For NIST, see Information System,
Glossary, NIST Computer Security Resource Center, available at
https://csrc.nist.gov/glossary/term/information_system.
---------------------------------------------------------------------------
We decline to define any other terms. We acknowledge commenters who
asked for additional guidance regarding the application of a
materiality determination to cybersecurity or sought to replace
materiality with a significance standard. As noted in the Proposing
Release, however, we expect that registrants will apply materiality
considerations as would be applied regarding any other risk or event
that a registrant faces. Carving out a cybersecurity-specific
materiality definition would mark a significant departure from current
practice, and would not be consistent with the intent of the final
rules.\284\ Accordingly, we reiterate, consistent with the standard set
out in the cases addressing materiality in the securities laws, that
information is material if ``there is a substantial likelihood that a
reasonable shareholder would consider it important'' \285\ in making an
investment decision, or if it would have ``significantly altered the
`total mix' of information made available.'' \286\ Because
materiality's focus on the total mix of information is from the
perspective of a reasonable investor, companies assessing the
materiality of cybersecurity incidents, risks, and related issues
should do so through the lens of the reasonable investor. Their
evaluation should take into consideration all relevant facts and
circumstances, which may involve consideration of both quantitative and
qualitative factors. Thus, for example, when a registrant experiences a
data breach, it should consider both the immediate fallout and any
longer term effects on its operations, finances, brand perception,
customer relationships, and so on, as part of its materiality analysis.
We also note that, given the fact-specific nature of the materiality
determination, the same incident that affects multiple registrants may
not become reportable at the same time, and it may be reportable for
some registrants but not others.
---------------------------------------------------------------------------
\284\ See, e.g., Basic Inc. v. Levinson, 485 U.S. 224, 236
(1988) (``[a]ny approach that designates a single fact or occurrence
as always determinative of an inherently fact-specific finding such
as materiality, must necessarily be overinclusive or
underinclusive'').
\285\ TSC Indus. v. Northway, 426 U.S. 438, 449 (1976); Matrixx
Initiatives v. Siracusano, 563 U.S. 27, 38-40 (2011); Basic, 485
U.S. at 240.
\286\ Id. See also the definition of ``material'' in 17 CFR
230.405 [Securities Act Rule 405]; 17 CFR 240.12b-2 [Exchange Act
Rule 12b-2].
---------------------------------------------------------------------------
We also decline to separately define ``cybersecurity,'' as
suggested by some commenters. We do not believe such further definition
is necessary, given the broad understanding of this term. To that end,
we note that the cybersecurity industry itself appears not to have
settled on an exact definition, and because the field is quickly
evolving and is expected to continue to evolve over time, any
definition codified in regulation could soon become stale as technology
develops. Likewise, the final rules provide flexibility by not defining
``cybersecurity,'' allowing a registrant to determine meaning based on
how it considers and views such matters in practice, and on how the
field itself evolves over time.
We decline to define ``operational technology'' as suggested by
some commenters because the term does not appear in the rules we are
adopting.
D. Disclosure Regarding the Board of Directors' Cybersecurity Expertise
1. Proposed Amendments
Congruent with proposed Item 106(c)(2) on the board's oversight of
cybersecurity risk, the Commission proposed adding 17 CFR 229.407(j)
(Regulation S-K ``Item 407(j)'') to require disclosure about the
cybersecurity expertise, if any, of a registrant's board members.\287\
The proposed rule did not define what constitutes expertise, given the
wide-ranging nature of cybersecurity skills, but included a non-
exclusive list of criteria to consider, such as prior work experience,
certifications, and the like. As proposed, paragraph (j) would build on
existing 17 CFR 229.401(e) (Regulation S-K ``Item 401(e)'') (business
experience of directors) and Item 407(h) (board risk oversight), and
would be required in the annual report on Form 10-K and in the proxy or
information statement when action is to be taken on the election of
directors. Thus, the Proposing Release said,
[[Page 51918]]
proposed Item 407(j) would help investors in making both investment and
voting decisions.\288\
---------------------------------------------------------------------------
\287\ Proposing Release at 16601.
\288\ Id.
---------------------------------------------------------------------------
The Commission also proposed to include a safe harbor in 17 CFR
229.407(j)(2) (Regulation S-K ``Item 407(j)(2)'') providing that any
directors identified as cybersecurity experts would not be deemed
experts for liability purposes, including under Section 11 of the
Securities Act.\289\ This was intended to clarify that identified
directors do not assume any duties, obligations, or liabilities greater
than those assumed by non-expert directors.\290\ Nor would such
identification decrease the duties, obligations, and liabilities of
non-expert directors relative to identified directors.\291\
---------------------------------------------------------------------------
\289\ Id. at 16602.
\290\ Id.
\291\ Id.
---------------------------------------------------------------------------
2. Comments
Proposed Item 407(j) garnered significant comment. Supporters wrote
that understanding a board's level of cybersecurity expertise is
important to assessing a company's ability to manage cybersecurity
risk.\292\ For example, one commenter said ``[b]oard cybersecurity
expertise serves as a useful starting point for investors to assess a
company's approach to cybersecurity;'' \293\ while another commenter
said investors need the Item 407(j) disclosure ``[t]o cast informed
votes on directors.'' \294\ One comment letter submitted an academic
study by the authors of the letter and noted that its findings
``underscore the importance of understanding the role of boards in
cybersecurity oversight.'' \295\
---------------------------------------------------------------------------
\292\ See letters from O. Borges; CalPERS; Prof. Choudhary; CII;
Digital Directors Network (``DDN''); ISC2; Prof. Lowry et al.; NACD;
PRI; SANS Institute; SM4RT Secure.
\293\ See letter from PRI.
\294\ See letter from CII.
\295\ See letter from Prof. Lowry et al.
---------------------------------------------------------------------------
By contrast, many commenters argued cybersecurity risk is not
intrinsically different from other risks that directors assess with or
without specific technical expertise.\296\ For example, one reasoned
that, given the ``ever-changing range of risks confronting a company,''
directors require ``broad-based skills in risk and management
oversight, rather than subject matter expertise in one particular type
of risk.'' \297\ Commenters also predicted the disclosure requirement
would pressure companies to retain cybersecurity experts on their
board, and submitted there is not enough cybersecurity talent in the
marketplace at this time for all or most companies to do so.\298\ One
of these commenters further contended that finding such expertise will
be harder for smaller reporting companies.\299\ Another commenter
warned that, given the current cybersecurity talent pool, the end
result may be lower diversity on boards; \300\ and one said hiring
cybersecurity experts to the board may come at the expense of spending
on a company's cybersecurity defenses.\301\ Commenters also expressed
concern that the identified expert directors would face elevated risks,
such as being targeted by nation states for surveillance or hackers
attempting to embarrass them, thus creating a disincentive to board
service.\302\
---------------------------------------------------------------------------
\296\ See letters from ABA; ACC; AGA/INGAA; AICPA; Auto
Innovators; BDO; BPI et al.; Business Roundtable; CAQ; CBA; Chamber;
CTA; CTIA; Davis Polk; Deloitte; EEI; EIC; Hunton; ITI; IC; LTSE;
Microsoft; Nareit; NAM; NDIA; NRA; NYSE; PPG; Safe Security; SCG;
SIFMA; TechNet; USTelecom; Virtu; Wilson Sonsini. See also IAC
Recommendation.
\297\ See letter from ABA.
\298\ See letters from ACC; APCIA; BIO; Blue Lava; Chamber; FDD;
ITI (May 9, 2022); NDIA; NYSE; SCG (May 9, 2022). In this vein, a
commenter requested the Commission affirm Item 407(j) is only a
disclosure provision and is not intended to mandate cybersecurity
expertise on the board. See letter from Federated Hermes.
\299\ See letter from BIO.
\300\ See letter from Chamber (``An unintended consequence of
the SEC proposal is likely to create new barriers for
underrepresented groups to move into cybersecurity leadership roles
largely due to the expense of obtaining credentials and other formal
certifications. The costs associated with obtaining cybersecurity-
related degrees and other credentials could hinder the advancement
of individuals who could otherwise rise through the ranks within the
field of cybersecurity.'').
\301\ See letter from Wilson Sonsini.
\302\ See letters from BIO; Chevron; EEI; EIC; Hunton; Profs.
Rajgopal & Sharp.
---------------------------------------------------------------------------
More generally, sentiment among those opposed to Item 407(j) was
that the rule is overly prescriptive and in effect would direct how
companies operate their cybersecurity programs.\303\ As an alternative,
some commenters pushed for other ways to show competency, such as
identifying outside experts the board relies on for cybersecurity
expertise, disclosing how frequently the board meets with the chief
information security officer, listing relevant director training, and
relying on adjacent technology skills.\304\
---------------------------------------------------------------------------
\303\ See, e.g., letter from ACC.
\304\ See letters from AGA/INGAA; BPI et al.; Business
Roundtable; DDN; LTSE; PRI; Wilson Sonsini.
---------------------------------------------------------------------------
Whether they supported or opposed the proposed disclosure
requirement, commenters largely endorsed the proposed Item 407(j)(2)
safe harbor; its absence, they said, could make candidates with
cybersecurity expertise reluctant to serve on boards.\305\ Two
commenters requested the Commission define ``cybersecurity expertise;''
\306\ one of them said being ``duly accredited and certified as a
cybersecurity professional'' should be a prerequisite, and posited
specific industry certifications to establish expertise.\307\ Another
commenter suggested adding participation in continuing education to the
17 CFR 229.407(j)(1)(i) factors considered in assessing expertise.\308\
---------------------------------------------------------------------------
\305\ See letters from ABA; BIO; CII; CSA; A. Heighington; NACD;
Paylocity; Prof. Perullo.
\306\ See letters from Federated Hermes; ISC2.
\307\ See letter from ISC2.
\308\ See letter from SandboxAQ.
---------------------------------------------------------------------------
3. Final Amendments
After considering the comments, we are not adopting proposed Item
407(j). We are persuaded that effective cybersecurity processes are
designed and administered largely at the management level, and that
directors with broad-based skills in risk management and strategy often
effectively oversee management's efforts without specific subject
matter expertise, as they do with other sophisticated technical
matters. While we acknowledge that some commenters indicated that the
proposed Item 407(j) information would be helpful to investors, we
nonetheless agree that it may not be material information for all
registrants. We believe investors can form sound investment decisions
based on the information required by Items 106(b) and (c) without the
need for specific information regarding board-level expertise. And to
that end, a registrant that has determined that board-level expertise
is a necessary component to the registrant's cyber-risk management
would likely provide that disclosure pursuant to Items 106(b) and (c).
E. Disclosure by Foreign Private Issuers
1. Proposed Amendments
The Commission proposed to establish disclosure requirements for
FPIs parallel to those proposed for domestic issuers in Regulation S-K
Items 106 and 407(j) and Form 8-K Item 1.05.\309\ Specifically, the
Commission proposed to amend Form 20-F to incorporate the requirements
of proposed Item 106 and 407(j) to disclose information regarding an
FPI's cybersecurity risk management, strategy, and governance.\310\
With respect to
[[Page 51919]]
incident disclosure, the Commission proposed to: (1) amend General
Instruction B of Form 6-K to reference material cybersecurity incidents
among the items that may trigger a current report on Form 6-K,\311\ and
(2) amend Form 20-F to require updated disclosure regarding incidents
previously disclosed on Form 6-K.
---------------------------------------------------------------------------
\309\ Proposing Release at 16602. The Commission did not propose
to amend Form 40-F, choosing rather to maintain the
multijurisdictional disclosure system (``MJDS'') whereby eligible
Canadian FPIs use Canadian disclosure standards and documents to
satisfy SEC registration and disclosure requirements.
\310\ As noted in the Proposing Release, FPIs would include the
expertise disclosure only in their annual reports, as they are not
subject to Commission rules for proxies and information statements.
\311\ A registrant is required under Form 6-K to furnish copies
of all information that it: (i) makes or is required to make public
under the laws of its jurisdiction of incorporation, (ii) files, or
is required to file under the rules of any stock exchange, or (iii)
otherwise distributes to its security holders.
---------------------------------------------------------------------------
2. Comments
A few commenters agreed that the Commission should not exempt FPIs
from the proposed disclosure requirements, given they face the same
threats as domestic issuers.\312\ Another commenter said the Commission
should not delay compliance for FPIs, for similar reasons.\313\ On the
other hand, one commenter said the proposal would disproportionately
burden FPIs because, under its reading of the proposed amendment to
General Instruction B, Form 6-K would require disclosure of all
cybersecurity incidents, not just those that are material.\314\ The
commenter went on to say that the interplay of the European Union's
Market Abuse Regulation (``MAR'') would render the proposed Form 6-K
amendment particularly taxing, because MAR requires immediate
announcement of non-public price sensitive information.\315\
---------------------------------------------------------------------------
\312\ See letters from CSA; Cybersecurity Coalition; Prof.
Perullo; Tenable.
\313\ See letter from Crindata.
\314\ See letter from SIFMA.
\315\ Id.
---------------------------------------------------------------------------
On MJDS filers, commenters endorsed the Commission's determination
not to propose to amend Form 40-F, maintaining that Canadian issuers
eligible to use MJDS should be permitted to follow their domestic
disclosure standards, consistent with other disclosure requirements for
those registrants.\316\
---------------------------------------------------------------------------
\316\ See letters from ACLI; BCE; Cameco Corporation; CBA; Sun
Life Financial Inc.
---------------------------------------------------------------------------
3. Final Amendments
We are adopting the Form 20-F and Form 6-K amendments as proposed,
with modifications that are consistent with those being applied to Item
106 of Regulation S-K and Item 1.05 of Form 8-K. We continue to believe
that FPIs' cybersecurity incidents and risks are not any less important
to investors' capital allocation than those of domestic registrants. We
also do not find that the Form 6-K amendments unduly burden FPIs.
Importantly, the language the Commission proposed to add to General
Instruction B (``cybersecurity incident'') of Form 6-K would be
modified by the existing language ``that which is material with respect
to the issuer and its subsidiaries concerning.'' Nonetheless, for added
clarity, we are including the word ``material'' before ``cybersecurity
incident.'' Thus, for a cybersecurity incident to trigger a disclosure
obligation on Form 6-K, the registrant must determine that the incident
is material, in addition to meeting the other criteria for required
submission of the Form.\317\ Even registrants subject to the European
Union's MAR will first have developed the relevant information for
foreign disclosure or publication under MAR, so any added burden for
preparing and furnishing the Form 6-K should be minor. As the
Commission stated in the Proposing Release, we do not find reason to
adopt prescriptive cybersecurity disclosure requirements for Form 40-F
filers, given that the MJDS generally permits eligible Canadian FPIs to
use Canadian disclosure standards and documents to satisfy the
Commission's registration and disclosure requirements.\318\ We note
that such filers are already subject to the Canadian Securities
Administrators' 2017 guidance on the disclosure of cybersecurity risks
and incidents.\319\
---------------------------------------------------------------------------
\317\ See supra note 311 for the other criteria.
\318\ Proposing Release at 16603.
\319\ Canadian Securities Administrators, CSA Multilateral Staff
Notice 51-347--Disclosure of cyber security risks and incidents
(Jan. 19, 2017).
---------------------------------------------------------------------------
F. Structured Data Requirements
1. Proposed Amendments
The Commission proposed to mandate that registrants tag the new
disclosures in Inline XBRL, including by block text tagging narrative
disclosures and detail tagging quantitative amounts.\320\ The Proposing
Release explained that the structured data requirements would make the
disclosures more accessible to investors and other market participants
and facilitate more efficient analysis.\321\ The proposed requirements
would not be unduly burdensome to registrants, the release posited,
because they are similar to the Inline XBRL requirements for other
disclosures.\322\
---------------------------------------------------------------------------
\320\ Proposing Release at 16603.
\321\ Id.
\322\ Id.
---------------------------------------------------------------------------
2. Comments
Commenters largely supported the proposal to require Inline XBRL
tagging of the new disclosures, as structured data would enable
automated extraction and analysis.\323\ Opposition to the requirement
centered on filer burden, including an argument that, given the time-
sensitive nature of the Item 1.05 Form 8-K disclosure, mandating
structured data tagging would unduly add to companies' burden in
completing timely reporting.\324\
---------------------------------------------------------------------------
\323\ See letters from AICPA; CAQ; Crowe LLP; E&Y; FDD; K.
Fuller; NACD; PWC; Professors Lawrence Trautman & Neal Newman; XBRL
US.
\324\ See letters from NYC Bar; SFA.
---------------------------------------------------------------------------
3. Final Amendments
After considering comments, we are adopting the structured data
requirements as proposed, with a staggered compliance date of one
year.\325\ We are not persuaded that Inline XBRL tagging will unduly
add to companies' burden in preparing and filing Item 1.05 Form 8-K in
a timely fashion, and we believe such incremental costs are appropriate
given the significant benefits to investors. Compared to the Inline
XBRL tagging companies will already be performing for their financial
statements, the tagging requirements here are less extensive and
complex. Inline XBRL tagging will enable automated extraction and
analysis of the information required by the final rules, allowing
investors and other market participants to more efficiently identify
responsive disclosure, as well as perform large-scale analysis and
comparison of this information across registrants.\326\ The Inline XBRL
requirement will also enable automatic comparison of tagged disclosures
against prior periods. If we were not to adopt the Inline XBRL
requirement as suggested by some commenters, some of the benefit of the
new rules would be diminished. However, we are delaying compliance with
the structured data requirements for one year beyond initial compliance
with the disclosure requirements. This
[[Page 51920]]
approach should both help lessen any compliance burden and improve
data.
---------------------------------------------------------------------------
\325\ We have incorporated modifications of a technical nature
to the regulatory text.
\326\ These considerations are generally consistent with
objectives of the recently enacted Financial Data Transparency Act
of 2022, which directs the establishment by the Commission and other
financial regulators of data standards for collections of
information, including with respect to periodic and current reports
required to be filed or furnished under Exchange Act Sections 13 and
15(d). Such data standards must meet specified criteria relating to
openness and machine-readability and promote interoperability of
financial regulatory data across members of the Financial Stability
Oversight Council. See James M. Inhofe National Defense
Authorization Act for Fiscal Year 2023, Public Law 117-263, tit.
LVIII, 136 Stat. 2395, 3421-39 (2022).
---------------------------------------------------------------------------
G. Applicability to Certain Issuers
1. Asset-Backed Issuers
The Commission proposed to amend Form 10-K to clarify that an
asset-backed issuer, as defined in 17 CFR 229.1101 (Regulation AB
``Item 1101''), that does not have any executive officers or directors
may omit the information required by proposed Item 106(c).\327\ The
Commission noted that asset-backed issuers would likewise be exempt
from proposed Item 407(j) pursuant to existing Instruction J to Form
10-K.\328\ The Commission further requested comment on whether to
generally exempt asset-backed issuers from the proposed rules.
---------------------------------------------------------------------------
\327\ Proposing Release at 16600.
\328\ Id. at 16601.
---------------------------------------------------------------------------
One commenter stated that the proposed rules should not apply to
issuers of asset-backed securities, given that they are limited purpose
or passive special purpose vehicles with limited activities, no
operations or businesses, and no information systems.\329\ The
commenter also opposed applying the proposed rules to other transaction
parties (such as the sponsor, servicer, originator, and trustee),
because such parties are neither issuers of nor obligors on an asset-
backed security, and ``it is extraordinarily unlikely that a
transaction party's financial performance or position would be impacted
by a cybersecurity incident to such an extent as to impede its ability
to perform its duties and responsibilities to the securitization
transaction.'' \330\ The commenter acknowledged that cybersecurity
disclosure rules may make sense for servicers of asset-backed
securities, but counseled that any new rules should be tailored to such
entities, rather than applying the proposed rules.\331\
---------------------------------------------------------------------------
\329\ See letter from SFA.
\330\ Id.
\331\ Id.
---------------------------------------------------------------------------
We are exempting asset-backed securities issuers from the final
rules.\332\ We agree with the commenter that the final rules would not
result in meaningful disclosure by asset-backed issuers. In particular,
we are persuaded by the fact that asset-backed issuers are typically
special purpose vehicles whose activities are limited to receiving or
purchasing, and transferring or selling, assets to an issuing entity
\333\ and, accordingly, do not own or use information systems, whereas
the final rules are premised on an issuer's ownership or use of
information systems.\334\ To the extent that a servicer or other party
to an asset-backed security transaction is a public company, it will be
required to comply with the final rules with respect to information
systems it owns or uses. Therefore, an investor in an asset-backed
security who wants to assess the cybersecurity of transaction parties
will be able to do so for those that are public companies. The
Commission may consider cybersecurity disclosure rules specific to
asset-backed securities at a later date.
---------------------------------------------------------------------------
\332\ See General Instruction G to Form 8-K, and General
Instruction J to Form 10-K.
\333\ See letter from SFA (citing the definitions contained in
17 CFR 229.1101(b), 17 CFR 230.191, and 17 CFR 240.3b-19).
\334\ The definition of ``cybersecurity incident'' focuses on
``a registrant's information systems.'' Likewise, the definition of
``cybersecurity threat'' concerns ``a registrant's information
systems or any information residing therein.''
---------------------------------------------------------------------------
2. Smaller Reporting Companies
In the Proposing Release, the Commission did not include an
exemption or alternative compliance dates or transition accommodations
for smaller reporting companies, but it did request comment on whether
to do so.\335\ The Commission noted that smaller companies may face
equal or greater cybersecurity risk than larger companies, such that
cybersecurity disclosures may be particularly important for their
investors.\336\
---------------------------------------------------------------------------
\335\ Proposing Release at 16601.
\336\ Id. at 16613.
---------------------------------------------------------------------------
A few commenters advocated an exemption for smaller reporting
companies, asserting that they face outsized costs from the proposal
and lower cybersecurity risk.\337\ And some commenters called for a
longer compliance phase-in period for smaller reporting companies, to
help them mitigate their cost burdens and benefit from the compliance
and disclosure experience of larger companies.\338\ Other commenters
opposed an exemption for smaller reporting companies,\339\ in part
because they may face equal \340\ or greater \341\ cybersecurity risk
than larger companies, or because investors' relative share in a
smaller company may be higher, such that small companies' cybersecurity
risk ``may actually embody the most pressing cybersecurity risk to an
investor.'' \342\
---------------------------------------------------------------------------
\337\ See letters from BIO; NDIA.
\338\ See letters from BIO; BDO; NACD; Nasdaq. In addition, the
Commission's Small Business Capital Formation Advisory Committee
highlights generally in its parting perspectives letter that
``exemptions, scaling, and phase-ins for new requirements where
appropriate, allows smaller companies to build their businesses and
balance the needs of companies and investors while promoting strong
and effective U.S. public markets.'' See Parting Perspectives
Letter, U.S. Securities and Exchange Commission Small Business
Capital Formation Advisory Committee (Feb. 28, 2023), available at
https://www.sec.gov/files/committee-perspectives-letter-022823.pdf.
See also U.S. Securities and Exchange Commission Office of the
Advocate for Small Business Capital Formation, Annual Report Fiscal
Year 2022 (``2022 OASB Annual Report''), available at https://www.sec.gov/files/2022-oasb-annual-report.pdf, at 83 (recommending
generally that in engaging in rulemaking that affects small
businesses, the Commission tailor the disclosure and reporting
framework to the complexity and size of operations of companies,
either by scaling obligations or delaying compliance for the
smallest of the public companies).
\339\ See letters from CSA; Cybersecurity Coalition; NASAA;
Prof. Perullo; Tenable.
\340\ See letter from Cybersecurity Coalition.
\341\ See letters from NASAA and Tenable.
\342\ See letter from Prof. Perullo.
---------------------------------------------------------------------------
Consistent with the proposal, we decline to exempt smaller
reporting companies. We believe the streamlined requirements of the
final rules will help reduce some of the costs associated with the
proposal for all registrants, including smaller reporting companies.
Also, we do not believe that an additional compliance period is needed
for smaller reporting companies with respect to Item 106, as this
information is factual in nature regarding a registrant's existing
cybersecurity strategy, risk management, and governance, and so should
be readily available to those companies to assess for purposes of
preparing disclosure. Finally, given the significant cybersecurity
risks smaller reporting companies face and the outsized impacts that
cybersecurity incidents may have on their businesses, their investors
need access to timely disclosure on material cybersecurity incidents
and the material aspects of their cybersecurity risk management and
governance. However, we agree with commenters that stated smaller
reporting companies would likely benefit from additional time to comply
with the incident disclosure requirements. Accordingly, as discussed
below, we are providing smaller reporting companies an additional 180
days from the non-smaller reporting company compliance date before they
must begin complying with Item 1.05 of Form 8-K.
H. Need for New Rules and Commission Authority
Some commenters argued that the 2011 Staff Guidance and 2018
Interpretive Release are sufficient to compel adequate cybersecurity
disclosure, obviating the need for new rules.\343\ In this regard, two
commenters highlighted the Proposing Release's statement that
cybersecurity disclosures ``have improved since the issuance of
[[Page 51921]]
the 2011 Staff Guidance and the 2018 Interpretive Release.'' \344\
Another commenter said that Commission staff's findings that certain
cybersecurity incidents were reported in the media but not disclosed in
a registrant's filings and that registrants' disclosures provide
different levels of specificity suggested that ``existing guidance is
working, because each registrant should always be conducting an
individualized, case-by-case analysis'' and therefore disclosures
``should expectedly vary significantly.'' \345\ One commenter
questioned whether the materials cited in the Proposing Release support
the Commission's conclusion there that current cybersecurity reporting
may be inconsistent, not timely, difficult to locate, and contain
insufficient detail.\346\ Two commenters recommended that the
Commission ``reemphasize'' the prior guidance and ``utilize its
enforcement powers to ensure public companies continue to report
material cyber incidents.'' \347\ One commenter provided the results
from a survey it conducted of its members, finding that ``only 10-20%
of the 192 respondents reported that their shareholders have requested
information or asked a question on'' various cybersecurity topics,
while ``64.3% of the respondents indicated that their investors had not
engaged with them'' on those topics.\348\ Another commenter pointed to
a 2022 study finding that less than 1% of cybersecurity breaches are
``material,'' and asserted that current disclosures adequately reflect
such a level of material breaches.\349\ Some commenters also stated
that the Commission should forgo regulation of cybersecurity disclosure
because other agencies' regulations are sufficient.\350\
---------------------------------------------------------------------------
\343\ See letters from BPI et al.; CTIA; ISA; ITI; SCG; SIFMA;
Virtu.
\344\ See letters from Virtu (citing Proposing Release at
16594); BPI et al. (pointing to the Proposing Release's citation of
Stephen Klemash and Jamie Smith, What companies are disclosing about
cybersecurity risk and oversight, EY (Aug. 10, 2020), available at
https://www.ey.com/en_us/board-matters/whatcompanies-are-disclosing-about-cybersecurity-riskand-oversight).
\345\ See letter from ITI.
\346\ See letter from BPI et al. (discussing Moody's Investors
Service, Research Announcement, Cybersecurity disclosures vary
greatly in high-risk industries (Oct. 3, 2019); NACD et al., The
State of Cyber-Risk Disclosures of Public Companies (Mar. 2021), at
3).
\347\ See letters from Virtu; SIFMA.
\348\ See letter from SCG.
\349\ See letter from ISA.
\350\ See, e.g., letters from CTIA (``The wireless industry is
also regulated by the FCC, in several relevant respects . . . In
addition to FCC requirements, wireless carriers comply with
disclosure obligations under state law, which may require notices to
individual consumers and state regulators. Providers are also
subject to FCC reporting requirements regarding network outages.'');
Sen. Portman (``Congress intended that the Cyber Incident Reporting
for Critical Infrastructure Act be the primary means for reporting
of cyber incidents to the Federal Government, that such reporting be
through CISA, and that the required rule occupy the space regarding
cyber incident reporting''); SIFMA (stating the proposal ``is
unwarranted in light of other, existing regulations and the
Commission's lack of statutory responsibility for cybersecurity
regulation of public companies'').
---------------------------------------------------------------------------
Other commenters, by contrast, stated that the 2011 Staff Guidance
and the 2018 Interpretive Release, while helpful, have not been
sufficient to provide investors with the material information they
need. One such commenter explained that ``[t]he Commission's past
guidance, while in line with our views, does not go far enough. The
Proposed Rule is needed to provide clarity regarding what, when, and
how to disclose material cybersecurity incident information . . . The
improved standardization of disclosures included in the Proposed Rule
adds clarity to the reporting process.'' \351\ Another commenter stated
that ``[t]he lack of timely, comprehensive disclosure of material cyber
events exposes investors and the community at large to potential
harm.'' \352\
---------------------------------------------------------------------------
\351\ See letter from CalPERS. Accord letter from Better Markets
(``Even in instances where a company discloses relevant
cybersecurity incidents, board and management oversights and
abilities, and policies and procedures in a comprehensive manner,
the information is scattered throughout various sections of the Form
10-K. While the 2018 guidance adopted by the Commission successfully
identified potential disclosure requirements for companies to think
about when disclosing cybersecurity risks, governance, and
incidents, it did not solve the problem confronting investors who
must search various sections of the Form 10-K for the
disclosures.'').
\352\ See letter from CII.
---------------------------------------------------------------------------
As the Commission explained in the Proposing Release, Commission
staff has observed insufficient and inconsistent cybersecurity
disclosure notwithstanding the prior guidance.\353\ Here, in response
to commenters, we emphasize that the final rules supplement the prior
guidance but do not replace it. The final rules are aimed at remedying
the lack of material cybersecurity incident disclosure, and the
scattered, varying nature of cybersecurity strategy, risk management,
and governance disclosure, the need for which some commenters
confirmed.\354\ The final rules therefore add an affirmative
cybersecurity incident disclosure obligation, and they centralize
cybersecurity risk management, strategy, and governance disclosure.
While we acknowledge commenters who noted the improvements to certain
cybersecurity-related disclosures in response to the 2018 Interpretive
Release, and we agree there have been improvements in the areas that
the guidance touched upon, we note that the guidance does not mandate
consistent or comparable public disclosure of material incidents or
otherwise address the topics that are the subject of the final rules.
And in response to commenters who suggested that other agencies' rules
on cybersecurity reporting are sufficient, we note that, unlike the
final rules, such rules are not tailored to the informational needs of
investors; instead, they focus on the needs of regulators, customers,
and individuals whose data have been breached. Accordingly, we believe
the final rules are necessary and appropriate in the public interest
and for the protection of investors, consistent with the Commission's
authority.
---------------------------------------------------------------------------
\353\ Proposing Release at 16594, 16599, 16603.
\354\ See supra notes 351 and 352.
---------------------------------------------------------------------------
We also note that the 2018 Interpretive Release remains in place,
as it treats a number of topics not covered by the new rules. Those
topics include, for instance, incorporating cybersecurity-related
information into risk factor disclosure under Regulation S-K Item 105,
into management's discussion and analysis under Regulation S-K Item
303, into the description of business disclosure under Regulation S-K
Item 101, and, if there is a relevant legal proceeding, into the
Regulation S-K Item 103 disclosure.\355\ The 2018 Interpretive Release
also notes the Commission's expectation that, consistent with
Regulation S-X, a company's financial reporting and control systems
should be designed to provide reasonable assurance that information
about the range and magnitude of the financial impacts of a
cybersecurity incident would be incorporated into its financial
statements on a timely basis as that information becomes
available.\356\
---------------------------------------------------------------------------
\355\ See 2018 Interpretive Release.
\356\ Id.
---------------------------------------------------------------------------
With respect to the Commission's authority to adopt the final
rules, some commenters asserted that the Commission does not have the
authority to regulate cybersecurity disclosure.\357\ These commenters
argued that the Proposing Release did not adequately explain which
statutory provisions the Commission was relying on to propose the
disclosure requirements, that the statutory provisions the Commission
did identify do not provide a legal basis to require the proposed
disclosures, that the release did not show the requirements were
necessary or appropriate to achieve statutory goals,
[[Page 51922]]
and that the requirements implicate the major questions doctrine and
non-delegation principles. Additionally, one commenter stated that
``Congress intended that [CIRCIA] be the primary means for reporting of
cyber incidents to the federal government.'' \358\
---------------------------------------------------------------------------
\357\ See letters from International Association of Drilling
Contractors; NRF; Virtu.
\358\ See letter from Sen. Portman. We address this comment in
Section II.A.3, supra.
---------------------------------------------------------------------------
We disagree. Disclosure to investors is a central pillar of the
Federal securities laws. The Securities Act of 1933 ``was designed to
provide investors with full disclosure of material information
concerning public offerings of securities.'' \359\ In addition, the
Securities Exchange Act of 1934 imposes ``regular reporting
requirements on companies whose stock is listed on national securities
exchanges.'' \360\ Together, the provisions of the Federal securities
laws mandating release of information to the market--and authorizing
the Commission to require additional disclosures--have prompted the
Supreme Court to ``repeatedly'' describe ``the fundamental purpose'' of
the securities laws as substituting ``a philosophy of full disclosure
for the philosophy of caveat emptor.'' \361\ This bedrock principle of
``[d]isclosure, and not paternalistic withholding of accurate
information, is the policy chosen and expressed by Congress.'' \362\
Moreover, ``[u]nderlying the adoption of extensive disclosure
requirements was a legislative philosophy: `There cannot be honest
markets without honest publicity. Manipulation and dishonest practices
of the market place thrive upon mystery and secrecy.''' \363\
---------------------------------------------------------------------------
\359\ Ernst & Ernst v. Hochfelder, 425 U.S. 185, 195 (1976);
accord Pinter v. Dahl, 486 U.S. 622 (1988) (``[t]he primary purpose
of the Securities Act is to protect investors by requiring
publication of material information thought necessary to allow them
to make informed investment decisions concerning public offerings of
securities in interstate commerce'').
\360\ Ernst & Ernst, 425 U.S. at 195 (1976); see also Lawson v.
FMR LLC, 571 U.S. 429, 451 (2014) (referring to the Sarbanes-Oxley
Act's ``endeavor to `protect investors by improving the accuracy and
reliability of corporate disclosures made pursuant to the securities
laws''' (quoting Sarbanes-Oxley Act of 2002, Pub. L. 107-204, 116
Stat. 745, 745 (2002))).
\361\ Lorenzo v. SEC, 139 S. Ct. 1094, 1103 (2019); accord Santa
Fe Indus. v. Green, 430 U.S. 462, 477-778 (1977); Affiliated Ute
Citizens of Utah v. United States, 406 U.S. 128, 151 (1972); SEC v.
Capital Gains Research Bureau, Inc., 375 U.S. 180, 186 (1963).
\362\ Basic, 485 U.S. at 234. Congress also legislated on the
core premise that ``public information generally affects stock
prices,'' Halliburton Co. v. Erica P. John Fund, Inc., 573 U.S. 258,
272 (2014), and those prices can significantly affect the economy,
15 U.S.C. 78b(2) and (3).
\363\ Basic, 485 U.S. at 230 (quoting H.R. Rep. No. 73-1383, at
11 (1934)); accord SEC v. Zandford, 535 U.S. 813, 819 (2002)
(``Among Congress' objectives in passing the [Exchange] Act was `to
insure honest securities markets and thereby promote investor
confidence' after the market crash of 1929'' (quoting United States
v. O'Hagan, 521 U.S. 642, 658 (1997))); Nat'l Res. Def. Council,
Inc. v. SEC, 606 F.2d 1031, 1050 (D.C. Cir. 1979) (the Securities
Act and Exchange Act ``were passed during an unprecedented economic
crisis in which regulation of the securities markets was seen as an
urgent national concern,'' and the Commission ``was necessarily
given very broad discretion to promulgate rules governing corporate
disclosure,'' which is ``evident from the language in the various
statutory grants of rulemaking authority'').
---------------------------------------------------------------------------
Several provisions of the Federal securities laws empower the
Commission to carry out these fundamental Congressional objectives.
Under the Securities Act, the Commission has authority to require, in a
publicly filed registration statement, that issuers offering and
selling securities in the U.S. public capital markets include
information specified in Schedule A of the Act, including the general
character of the issuer's business, the remuneration paid to its
officers and directors, details of its material contracts and certain
financial information, as well as ``such other information . . . as the
Commission may by rules or regulations require as being necessary or
appropriate in the public interest or for the protection of
investors.'' \364\ In addition, under the Exchange Act, issuers of
securities traded on a national securities exchange or that otherwise
have total assets and shareholders of record that exceed certain
thresholds must register those securities with the Commission by filing
a registration statement containing ``[s]uch information, in such
detail, as to the issuer'' in respect of, among other things, ``the
organization, financial structure and nature of the [issuer's]
business'' as the Commission by rule or regulation determines to be in
the public interest or for the protection of investors.\365\ These same
issuers must also provide ``such information and documents . . . as the
Commission shall require to keep reasonably current the information and
documents required to be included in or filed with [a] . . .
registration statement'' as the Commission may prescribe as necessary
or appropriate for the proper protection of investors and to insure
fair dealing in the security.\366\ Separately, these issuers also must
disclose ``on a rapid and current basis such additional information
concerning material changes in the financial condition or operations of
the issuer . . . as the Commission determines, by rule, is necessary or
useful for the protection of investors and in the public interest.''
\367\
---------------------------------------------------------------------------
\364\ Securities Act Section 7(a)(1) and Schedule A.
\365\ Exchange Act Sections 12(b) and 12(g).
\366\ Exchange Act Section 13(a). Other issuers that are
required to comply with the reporting requirements of Section 13(a)
include those that voluntarily register a class of equity securities
under Exchange Act Section 12(g)(1) and, pursuant to Exchange Act
15(d), issuers that file a registration statement under the
Securities Act that becomes effective.
\367\ Exchange Act Section 13(l).
---------------------------------------------------------------------------
These grants of authority are intentionally broad.\368\ Congress
designed them to give the Commission, which regulates dynamic aspects
of a market economy, the power and ``flexibility'' to address problems
of inadequate disclosure as they arose.\369\ As the United States Court
of Appeals for the District of Columbia Circuit explained, ``[r]ather
than casting disclosure rules in stone, Congress opted to rely on the
discretion and expertise of the SEC for a determination of what types
of additional disclosure would be desirable.'' \370\
---------------------------------------------------------------------------
\368\ See Natural Resources Defense Council, Inc. v. SEC, 606
F.2d 1031, 1045 (1979); see also H.R. Rep. No. 73-1383, at 6-7
(1934).
\369\ Courts have routinely applied and interpreted the
Commission's disclosure regulations without suggesting that the
Commission lacked the authority to promulgate them. See, e.g., SEC
v. Life Partners Holdings, Inc., 854 F.3d 765 (5th Cir. 2017)
(applying regulations regarding disclosure of risks and revenue
recognition); SEC v. Das, 723 F.3d 943 (8th Cir. 2013) (applying
Regulation S-K provisions regarding related-party transactions and
executive compensation); Panther Partners Inc. v. Ikanos Commc'ns,
Inc., 681 F.3d 114 (2d Cir. 2012) (applying Item 303 of Regulation
S-K, which requires disclosure of management's discussion and
analysis of financial condition); SEC v. Goldfield Deep Mines Co.,
758 F.2d 459 (9th Cir. 1985) (applying disclosure requirements for
certain legal proceedings).
\370\ Natural Resources Defense Council, Inc., 606 F.2d at 1045.
---------------------------------------------------------------------------
The Commission has long relied on the broad authority in these and
other statutory provisions \371\ to prescribe rules to ensure that the
public company disclosure regime provides investors with the
information they need to make informed investment and voting decisions,
in each case as necessary or appropriate in the public interest or for
the protection of investors.\372\ Indeed, the Commission's predecessor
agency,\373\ immediately upon enactment of the Securities Act, relied
upon such authority to adopt Form A-1, precursor
[[Page 51923]]
to today's Form S-1 registration statement, to require disclosure of
information including, for example, a list of states where the issuer
owned property and was qualified to do business and the length of time
the registrant had been engaged in its business--topics that are not
specifically enumerated in Schedule A of the Securities Act.\374\ Form
A-1 also required disclosures related to legal proceedings, though
there is no direct corollary in Schedule A.\375\
---------------------------------------------------------------------------
\371\ Securities Act Section 19(a); Exchange Act Section 3(b);
and Exchange Act Section 23(a).
\372\ In considering whether a particular item of disclosure is
necessary or appropriate in the public interest or for the
protection of investors, the Commission considers both the
importance of the information to investors as well as the costs to
provide the disclosure. In addition, when engaged in rulemaking that
requires it to consider or determine whether an action is necessary
or appropriate in the public interest, the Commission also must
consider, in addition to the protection of investors, whether the
action will promote efficiency, competition, and capital formation.
See Section 2(b) of the Securities Act and Section 3(f) of the
Exchange Act.
\373\ Prior to enactment of the Exchange Act, the Federal Trade
Commission was empowered with administration of the Securities Act.
\374\ Items 3 through 5 of Form A-1; see Release No. 33-5 (July
6, 1933) [not published in the Federal Register]. The Commission's
disclosure requirements no longer explicitly call for this
information.
\375\ This early requirement called for a statement of all
litigation that may materially affect the value of the security to
be offered, including a description of the origin, nature, and names
of parties to the litigation. Item 17 of Form A-1. The Commission
has retained a disclosure requirement related to legal proceedings
in both Securities Act registration statements and in Exchange Act
registration statements and periodic reports. 17 CFR 229.103.
---------------------------------------------------------------------------
Consistent with the statutory scheme that Congress enacted, the
Commission has continued to amend its disclosure requirements over time
in order to respond to marketplace developments and investor needs.
Accordingly, over the last 90 years, the Commission has eliminated
certain disclosure items and adopted others pursuant to the authority
in Sections 7 and 19(a) of the Securities Act and Sections 3(b), 12,
13, 15, and 23(a) of the Exchange Act. Those amendments include the
adoption of an integrated disclosure system in 1982, which reconciled
the various disclosure items under the Securities Act and the Exchange
Act and was intended to ensure that ``investors and the marketplace
have been provided with meaningful, nonduplicative information upon
which to base investment decisions.'' \376\
---------------------------------------------------------------------------
\376\ See Adoption of Integrated Disclosure System, Release No.
33-6383 (Mar. 3, 1982) [47 FR 11380 (Mar. 16, 1982)]. Even prior to
the adoption of the integrated disclosure system in 1982, the
Commission addressed anticipated disclosure issues in particular
areas through the use of Guides for the Preparation and Filing of
Registration Statements. See Proposed Revision of Regulation S-K and
Guides for the Preparation and Filing of Registration Statements and
Reports, Release No. 33-6276 (Dec. 23, 1980) [46 FR 78 (Jan. 2,
1981)] (discussing the use of Guides); see also Notice of Adoption
of Guide 59 and of Amendments to Guides 5 and 16 of the Guides for
Preparation and Filing of Registration Statements Under the
Securities Act of 1933, Release No. 33-5396 (Jun. 1, 1973)
(discussing, in response to fuel shortages in 1974, the obligation
to disclose any material impact that potential fuel shortages might
have and adding a new paragraph relating to disclosure by companies
engaged in the gathering, transmission, or distribution of natural
gas).
---------------------------------------------------------------------------
In keeping with Congressional intent, the Commission's use of its
authority has frequently focused on requiring disclosures that will
give investors enhanced information about risks facing registrants. For
example, in 1980, the Commission adopted Item 303 of Regulation S-K to
require registrants to include in registration statements and annual
reports a management's discussion and analysis of financial condition
(``MD&A''). This discussion is intended to allow investors to
understand the registrant's ``financial condition, changes in its
financial condition and results of operation'' through the eyes of
management.\377\ Item 303 includes a number of specific disclosure
items, such as requiring the identification of any known trends or
uncertainties that will result in, or that are reasonably likely to
result in, a material change to the registrant's liquidity,\378\ a
material change in the mix and relative cost of the registrant's
capital resources,\379\ or a material impact on net sales, revenues, or
income from continuing operations.\380\ Item 303 also requires
registrants to ``provide such other information that the registrant
believes to be necessary to an understanding of its financial
condition, changes in financial condition, and results of operation.''
\381\ The Commission developed the MD&A disclosure requirements to
supplement and provide context to the financial statement disclosures
previously required by the Commission.
---------------------------------------------------------------------------
\377\ See Management's Discussion and Analysis of Financial
Condition and Results of Operations; Certain Investment Company
Disclosures, Release No. 33-6231 (Sept. 2, 1980) [45 FR 63630 (Sept.
25, 1980)]; see also 17 CFR 229.303(a).
\378\ See 17 CFR 229.303(b)(1)(i).
\379\ See 17 CFR 229.303(b)(1)(ii)(B).
\380\ See 17 CFR 229.303(b)(2)(ii).
\381\ 17 CFR 229.303(b).
---------------------------------------------------------------------------
A few years later, in 1982, the Commission codified a requirement
that dated back to the 1940s for registrants to include a ``discussion
of the material factors that make an investment in the registrant or
offering speculative or risky,'' commonly referred to as ``risk
factors.'' \382\ By definition, these disclosures encompass a
discussion of risks, or prospective future events or losses, that might
affect a registrant or investment. The initial risk factor disclosure
item provided examples of possible risk factors, such as the absence of
an operating history of the registrant, an absence of profitable
operations in recent periods, the nature of the business in which the
registrant is engaged or proposes to engage, or the absence of a
previous market for the registrant's common equity.\383\
---------------------------------------------------------------------------
\382\ See Adoption of Integrated Disclosure System, Release No.
33-6383 (Mar. 3, 1982) [47 FR 11380 (Mar. 16, 1982)] (``Release No.
33-6383'') (codifying the risk factor disclosure requirement as Item
503(c) of Regulation S-K); see also 17 CFR 229.105(a). Prior to
1982, the Commission stated in guidance that, if the securities to
be offered are of a highly speculative nature, the registrant should
provide ``a carefully organized series of short, concise paragraphs
summarizing the principal factors that make the offering
speculative.'' See Release No. 33-4666 (Feb. 7, 1964) [29 FR 2490
(Feb. 15, 1964)]. A guideline to disclose a summary of risk factors
relating to an offering was first set forth by the Commission in
1968 and included consideration of five factors that may make an
offering speculative or risky, including with respect to risks
involving ``a registrant's business or proposed business.'' See
Guide 6, in Guides for the Preparation and Filing of Registration
Statements, Release No. 33-4936 (Dec. 9, 1968) [33 FR 18617 (Dec.
16, 1968)] (``Release No. 33-4936'').
\383\ See Release No. 33-6383.
---------------------------------------------------------------------------
In subsequent years, the Commission expanded both the scope of
risks about which registrants must provide disclosures and the
granularity of those disclosures. For example, in 1997, the Commission
first required registrants to disclose quantitative information about
market risk.\384\ That market risk disclosure included requirements to
present ``separate quantitative information . . . to the extent
material'' for different categories of market risk, such as ``interest
rate risk, foreign currency exchange rate risk, commodity price risk,
and other relevant market risks, such as equity price risk.'' \385\
Under these market risk requirements, registrants must also disclose
various metrics such as ``value at risk'' and ``sensitivity analysis
disclosures.'' In addition, registrants must provide certain
qualitative disclosures about market risk, to the extent material.\386\
---------------------------------------------------------------------------
\384\ See Disclosure of Accounting Policies for Derivative
Financial Instruments and Derivative Commodity Instruments and
Disclosure of Quantitative and Qualitative Information About Market
Risk Inherent in Derivative Financial Instruments, Other Financial
Instruments, and Derivative Commodity Instruments, Release No. 33-
7386 (Jan. 31, 1997) [62 FR 6044 (Feb. 10, 1997)] (``Release No. 33-
7386'') (``In light of those losses and the substantial growth in
the use of market risk sensitive instruments, the adequacy of
existing disclosures about market risk emerged as an important
financial reporting issue.''); see also 17 CFR 229.305.
\385\ 17 CFR 229.305(a)(1).
\386\ See 17 CFR 229.305(b).
---------------------------------------------------------------------------
Each of these disclosure items reflects the Commission's long-
standing view that understanding the material risks faced by a
registrant and how the registrant manages those risks can be just as
important to assessing its business operations and financial condition
as knowledge about its physical assets or material contracts. Indeed,
investors may be unable to assess the value of those assets or
contracts adequately without appreciating the material risks to which
they are subject.\387\
---------------------------------------------------------------------------
\387\ As early as the 1940s, the Commission issued stop order
proceedings under Section 8(d) of the Securities Act in which the
Commission suspended the effectiveness of previously filed
registration statements due, in part, to inadequate disclosure about
speculative aspects of the registrant's business. See In the Matter
of Doman Helicopters, Inc., 41 S.E.C. 431 (Mar. 27, 1963); In the
Matter of Universal Camera Corp., 19 S.E.C. 648 (June 28, 1945); see
also Release No. 33-4936.
---------------------------------------------------------------------------
[[Page 51924]]
In addition to risk-focused disclosures, over the decades, the
Commission has also required registrants to provide information on a
diverse range of topics that emerged as significant to investment or
voting decisions, such as the extent of the board's role in the risk
oversight of the registrant,\388\ the effectiveness of a registrant's
disclosure controls and procedures,\389\ related-party
transactions,\390\ corporate governance,\391\ and compensation
discussion and analysis,\392\ among many other topics, including on
topics related to particular industries,\393\ offering structures,\394\
and types of transactions.\395\ In all these instances, the
Commission's exercise of its authority was guided by the baseline of
the specific disclosures articulated by Congress. But, as Congress
expressly authorized,\396\ the Commission's exercise of its disclosure
authority has not been narrowly limited to those statutorily prescribed
disclosures--instead, it has been informed by both those disclosures
and the need to protect investors.\397\ Many of these disclosures have
since become essential elements of the public company reporting regime
that Congress established.
---------------------------------------------------------------------------
\388\ See 17 CFR 229.407.
\389\ See 17 CFR 229.307.
\390\ 17 CFR 229.404.
\391\ 17 CFR 229.407.
\392\ 17 CFR 229.402.
\393\ See 17 CFR 229.1200-1208 (Disclosure by Registrants
Engaged in Oil and Gas Activities); 17 CFR 1300-1305 (Disclosure by
Registrants Engaged in Mining Operations); 17 CFR 1400-1406
(Disclosure by Bank and Savings and Loan Registrants).
\394\ See 17 CFR Subpart 1100 (Asset-Backed Securities).
\395\ See 17 CFR subpart 900 (Roll-Up Transactions); 17 CFR
229.1000-1016 (Mergers and Acquisitions).
\396\ See supra notes 364 to 366 and accompanying text.
\397\ For example, Item 303(b)(2) of Regulation S-K calls for
information well beyond the basic profit and loss statement
specified in Schedule A by requiring issuers to disclose any unusual
or infrequent events or transactions or any significant economic
changes that materially affected the amount of reported income--and
the extent to which income was so affected--so that investors can
better understand the reported results of operations.
---------------------------------------------------------------------------
To ensure the transparency that Congress intended when it
authorized the Commission to promulgate disclosure regulations in the
public interest or to protect investors,\398\ the Commission's
regulations must--as they have over time--be updated to account for
changing market conditions, new technologies, new transaction
structures, and emergent risks. In this regard, we disagree with one
commenter's assertion that the Commission's disclosure authority is
``limited to specific types of information closely related to the
disclosing company's value and financial condition.'' \399\ The
commenter misstates the scope and nature of the Commission's authority.
There is a wealth of information about a company apart from that which
appears in the financial statements that is related to a company's
value and financial condition, including the material risks
(cybersecurity and otherwise) a company faces. Nor did Congress dictate
that the Commission limit disclosures only to information that is
``closely related'' to a company's ``value and financial condition.''
By also empowering the Commission to require ``such other information .
. . as the Commission may by rules or regulations require as being
necessary or appropriate in the public interest or for the protection
of investors,'' \400\ Congress recognized that there is information
that is vital for investors to understand in making informed investment
decisions but does not directly relate to a company's value and
financial condition.\401\
---------------------------------------------------------------------------
\398\ See supra notes 368 to 370 and accompanying text.
\399\ See letter from NRF.
\400\ Securities Act Section 7(a).
\401\ For example, Schedule A calls for information regarding,
among other things: the names of the directors or persons performing
similar functions, the disclosure of owners of record of more than
10% of any class of stock of an issuer; commissions paid to
underwriters; the renumeration paid to directors and certain
officers; and information about certain material contracts.
---------------------------------------------------------------------------
The narrow reading of the Commission's authority advocated by the
commenter would foreclose many of these longstanding elements of
disclosure that market participants have come to rely upon for investor
protection and fair dealing of securities.\402\ Moreover, Congress
itself has amended, or required the Commission to amend, the Federal
securities laws many times. But Congress has not restricted the
Commission's disclosure authority; rather, Congress has typically
sought to further expand and supplement that authority with additional
mandated disclosures.
---------------------------------------------------------------------------
\402\ See letter from NRF.
---------------------------------------------------------------------------
We also reject the commenter's suggestion that the final rules are
an attempt to ``usurp the undelegated role of maintaining cyber safety
in America.'' \403\ The final rules are indifferent as to whether and
to what degree a registrant may have identified and chosen to manage a
cybersecurity risk. Rather, the final rules reflect the reality, as
acknowledged by the same commenter, that ``[c]ybersecurity is . . . an
area of growing importance to companies across the world.'' \404\ When
those companies seek to raise capital from investors in U.S. public
markets, we believe it is appropriate that they share information about
whether and, if so, how they are managing material cybersecurity risks
so that investors can make informed investment and voting decisions
consistent with their risk tolerance and investment objectives.
---------------------------------------------------------------------------
\403\ Id.
\404\ Id.
---------------------------------------------------------------------------
Finally, with respect to the commenter's contention that a broad
reading of the Commission's disclosure authority could raise separation
of powers concerns,\405\ we note that a statutory delegation is
constitutional as long as Congress lays down by legislative act an
intelligible principle to which the person or body authorized to
exercise the delegated authority is directed to conform.\406\ In this
instance, Congress has required that any new disclosure requirements be
``necessary or appropriate in the public interest or for the protection
of investors,'' \407\ which has guided the Commission's rulemaking
authority for nearly a century. We therefore believe that the final
rules are fully consistent with constitutional principles regarding
separation of powers.
---------------------------------------------------------------------------
\405\ Id.
\406\ Gundy v. U.S., 139 S. Ct. 2116, 2123 (plurality op.).
\407\ See Securities Act Section 19(a) and Exchange Act Section
23(a); accord Nat'l Res. Def. Council, 606 F.2d at 1045, 1050-52.
---------------------------------------------------------------------------
I. Compliance Dates
The final rules are effective September 5, 2023. With respect to
Item 106 of Regulation S-K and item 16K of Form 20-F, all registrants
must provide such disclosures beginning with annual reports for fiscal
years ending on or after December 15, 2023. With respect to compliance
with the incident disclosure requirements in Item 1.05 of Form 8-K and
in Form 6-K, all registrants other than smaller reporting companies
must begin complying on DECEMBER 18, 2023. As discussed above, smaller
reporting companies are being given an additional 180 days from the
non-smaller reporting company compliance date before they must begin
complying with Item 1.05 of Form 8-K, on June 15, 2024.
[[Page 51925]]
With respect to compliance with the structured data requirements,
as noted above, all registrants must tag disclosures required under the
final rules in Inline XBRL beginning one year after the initial
compliance date for any issuer for the related disclosure requirement.
Specifically:
For Item 106 of Regulation S-K and item 16K of Form 20-F,
all registrants must begin tagging responsive disclosure in Inline XBRL
beginning with annual reports for fiscal years ending on or after
December 15, 2024; and
For Item 1.05 of Form 8-K and Form 6-K all registrants
must begin tagging responsive disclosure in Inline XBRL beginning on
DECEMBER 18, 2024.
III. Other Matters
If any of the provisions of these rules, or the application thereof
to any person or circumstance, is held to be invalid, such invalidity
shall not affect other provisions or application of such provisions to
other persons or circumstances that can be given effect without the
invalid provision or application.
Pursuant to the Congressional Review Act, the Office of Information
and Regulatory Affairs has designated these rules as not a ``major
rule,'' as defined by 5 U.S.C. 804(2).
IV. Economic Analysis
A. Introduction
We are mindful of the costs imposed by, and the benefits to be
obtained from, our rules. Section 2(b) of the Securities Act \408\ and
Section 3(f) of the Exchange Act \409\ direct the Commission, when
engaging in rulemaking where it is required to consider or determine
whether an action is necessary or appropriate in the public interest,
to consider, in addition to the protection of investors, whether the
action will promote efficiency, competition, and capital formation.
Further, Section 23(a)(2) of the Exchange Act \410\ requires the
Commission, when making rules under the Exchange Act, to consider the
impact that the rules would have on competition, and prohibits the
Commission from adopting any rule that would impose a burden on
competition not necessary or appropriate in furtherance of the Exchange
Act. The discussion below addresses the economic effects of the final
rules, including the likely benefits and costs, as well as the likely
effects on efficiency, competition, and capital formation.
---------------------------------------------------------------------------
\408\ 15 U.S.C. 77b(b).
\409\ 15 U.S.C. 78c(f).
\410\ 15 U.S.C. 78w(a)(2).
---------------------------------------------------------------------------
Where possible, we have attempted to quantify the benefits, costs,
and effects on efficiency, competition, and capital formation expected
to result from the final rules. In some cases, however, we are unable
to quantify the potential economic effects because we lack information
necessary to provide a reasonable estimate. For example, we lack the
data to estimate any potential decrease in mispricing that might result
from the rule, because we do not know how registrants' disclosures of
cybersecurity risk and governance will change or which cybersecurity
incidents that would go undisclosed under the current guidance will be
disclosed under the final rules. Where we are unable to quantify the
economic effects of the final rules, we provide a qualitative
assessment of the effects, and of the impacts of the final rule on
efficiency, competition, and capital formation. To the extent
applicable, the views of commenters relevant to our analysis of the
economic effects, costs, and benefits of these rules are included in
the discussion below.
While cybersecurity incident disclosure has become more frequent
since the issuance of the 2011 Staff Guidance and 2018 Interpretive
Release, there is concern that variation persists in the timing,
content, and format of registrants' existing cybersecurity disclosure,
and that such variation may harm investors (as further discussed
below).\411\ When disclosures about cybersecurity breaches are made,
they may not be timely or consistent. Because of the lack of
consistency in when and how companies currently disclose incidents, it
is difficult to assess quantitatively the timeliness of disclosures
under current practices. According to Audit Analytics data, in 2021, it
took on average of 42 days for companies to discover breaches, and then
it took an average of 80 days and a median of 56 days for companies to
disclose a breach after its discovery.\412\ These data do not tell us
when disclosure occurs relative to companies' materiality
determinations. That said, the report notes that some breaches were
disclosed for the first time to investors in periodic reports, the
timing of which are unrelated to the timing of the incident or the
company's assessment of the materiality of the incident. This implies
at least some cybersecurity incident disclosures were not timely with
respect to determination of materiality. Because cybersecurity
incidents can significantly affect registrants' stock prices, delayed
disclosure results in mispricing of securities, harming investors.\413\
Incident disclosure practices, with respect to both location and
content, currently vary across registrants. For example, some
registrants disclose incidents through Form 10-K, others Form 8-K, and
still others on a company website, or in a press release. Some
disclosures do not discuss whether the cybersecurity incident had
material impact on the company.\414\ Additionally, evidence suggests
registrants may be underreporting cybersecurity incidents.\415\ More
timely, informative, and standardized disclosure of material
cybersecurity incidents may help investors to assess an incident's
impact better.
---------------------------------------------------------------------------
\411\ See supra Section I. See also supra note 18 and
accompanying text; Eli Amir, Shai Levi, & Tsafrir Livne, Do Firms
Underreport Information on Cyber-Attacks? Evidence from Capital
Markets, 23 Rev. Acct. Stud. 1177 (2018).
\412\ Audit Analytics, Trends in Cybersecurity Breaches (Apr.
2022), available at https://www.auditanalytics.com/doc/AA_Trends_in_Cybersecurity_Report_April_2022.pdf (``Audit
Analytics'') (looking specifically at disclosures by companies with
SEC filing requirements and stating that: ``[c]ybersecurity breaches
can result in a litany of costs, such as investigations, legal fees,
and remediation. There is also the risk of economic and reputational
costs that can directly impact financial performance, such as
reduced revenue due to lost sales.'').
\413\ See Shinichi Kamiya, et al., Risk Management, Firm
Reputation, and the Impact of Successful Cyberattacks on Target
Firms, 139 J. Fin. Econ. 721 (2021).
\414\ Based on staff analysis of the current and periodic
reports in 2022 for companies identified by having been affected by
a cybersecurity incident.
\415\ See Bitdefender, supra note 18 and accompanying text.
---------------------------------------------------------------------------
While disclosures about cybersecurity risk management, strategy,
and governance have been increasing at least since the issuance of the
2018 Interpretive Release, they are not currently provided by all
registrants. Despite the increasing prevalence of references to
cybersecurity risks in disclosures, however, registrants do not
consistently or uniformly disclose information related to cybersecurity
risk management, strategy, and governance.\416\ Registrants currently
make such disclosures in varying sections of a company's periodic and
current reports, such as in risk factors, in management's discussion
and analysis, in a description of business and legal proceedings, or in
financial statement disclosures, and sometimes include them with other
unrelated disclosures.\417\ One commenter noted
[[Page 51926]]
that current disclosure is ``piecemeal'' in nature and that the varying
content and placement make it difficult for investors and other market
participants to locate and understand the cybersecurity risks that
registrants face and their preparedness for an attack, and to make
comparisons across registrants.\418\
---------------------------------------------------------------------------
\416\ See supra Section II.C.1.b. and c.; see also letter from
Better Markets.
\417\ See Proposing Release at 16606 (Table 1. Incidence of
Cybersecurity-Related Disclosures by 10-K Location).
\418\ See letter from Better Markets.
---------------------------------------------------------------------------
As we discuss in more detail below, some commenters supported the
proposed rule. Specifically, one commenter noted that markets responded
negatively to delayed cybersecurity disclosures, suggesting that
timeliness in disclosing incidents is valuable to investors.\419\
Further, some academic commenters submitted papers that they authored
finding that evidence suggests that companies experiencing data
breaches subsequently experience higher borrowing costs.\420\ On the
other hand, other commenters contended that the proposed rules would
hinder capital formation, particularly for small registrants,\421\ or
that a more cost-effective alternative to the proposed rules would be
to look to existing rules to elicit relevant disclosures, as
articulated by the 2011 Staff Guidance and the 2018 Interpretive
Release.\422\ Several commenters pointed out that the proposed
disclosures on cybersecurity risk management, strategy, and governance
might be overly prescriptive and would potentially provide a roadmap
for threat actors, and that these rules could increase, not decrease
costs.\423\ In response to those comments, these provisions have been
modified in the final rule, which should reduce the perceived risk of
providing a roadmap for threat actors compared with the proposal.
---------------------------------------------------------------------------
\419\ See letter from Prof. Choudhary.
\420\ See letters from Profs. Huang & Wang; Prof. Sheneman.
\421\ See letter from BIO.
\422\ See letter from NRF.
\423\ See letters from ABA; ACLI; APCIA; BIO; BPI et al.;
Business Roundtable; Chamber; CSA; CTIA; EIC; Enbridge; FAH;
Federated Hermes; GPA; ITI; ISA; Nareit; NAM; NMHC; NRA; NRF; SIFMA;
Sen. Portman; TechNet; TransUnion; USTelecom; Virtu.
---------------------------------------------------------------------------
B. Economic Baseline
1. Current Regulatory Framework
To assess the economic impact of the final rules, the Commission is
using as its baseline the existing regulatory framework and market
practice for cybersecurity disclosure. Although a number of Federal and
State rules and regulations obligate registrants to disclose
cybersecurity risks and incidents in certain circumstances, the
Commission's regulations currently do not explicitly address
cybersecurity.\424\
---------------------------------------------------------------------------
\424\ See Proposing Release at 16593-94 for a detailed
discussion of the existing regulatory framework.
---------------------------------------------------------------------------
As noted in the Proposing Release, cybersecurity threats and
incidents continue to increase in prevalence and seriousness, posing an
ongoing and escalating risk to public registrants, investors, and other
market participants.\425\ The number of reported breaches disclosed by
public companies has increased almost 600 percent over the last decade,
from 28 in 2011 to 131 in 2020 and 188 in 2021.\426\ Although
estimating the total cost of cybersecurity incidents is difficult, as
many events may be unreported, some estimates put the economy-wide
total costs as high as trillions of dollars per year in the U.S.
alone.\427\ The U.S. Council of Economic Advisers estimated that in
2016 the total cost of cybersecurity incidents was between $57 billion
and $109 billion, or between 0.31 and 0.58 percent of U.S. GDP in that
year.\428\ A more recent estimate suggests the average cost of a data
breach in the U.S. is $9.44 million.\429\ Executives, boards of
directors, and investors remain focused on the emerging risk of
cybersecurity. A 2022 survey of bank Chief Risk Officers found that
they identified managing cybersecurity risk as the top strategic
risk.\430\ In 2022, a survey of audit committee members again
identified cybersecurity as a top area of focus in the coming
year.\431\
---------------------------------------------------------------------------
\425\ Unless otherwise noted, when we discuss the economic
effects of the final rules on ``other market participants,'' we mean
those market participants that typically provide services for
investors and who rely on the information in companies' filings
(such as financial analysts, investment advisers, and portfolio
managers).
\426\ Audit Analytics, supra note 412.
\427\ See Cybersecurity & Infrastructure Sec. Agency, Cost of a
Cyber Incident: Systemic Review and Cross-Validation (Oct. 26,
2020), available at https://www.cisa.gov/sites/default/files/publications/CISA-OCE_Cost_of_Cyber_Incidents_Study-FINAL_508.pdf
(based on a literature review of publications discussing incidents
that occurred in the United States or to U.S.-based companies).
\428\ Council of Econ. Advisers, The Cost of Malicious Cyber
Activity to the U.S. Economy (Feb. 2018), available at https://trumpwhitehouse.archives.gov/articles/cea-report-cost-malicious-cyber-activity-u-s-economy/ (estimating total costs, rather than
costs of only known and disclosed incidents).
\429\ Ponemon Institute & IBM Security, Cost of a Data Breach
Report 2022 (July 2022), available at https://www.ibm.com/downloads/cas/3R8N1DZJ (estimating based on analysis of 550 organizations
impacted by data breaches that occurred between Mar. 2021 and Mar.
2022).
\430\ EY and Institute of International Finance, 12th Annual EY/
IIF Global Bank Risk Management Survey, at 14 (2022), available at
https://www.iif.com/portals/0/Files/content/32370132_ey-iif_global_bank_risk_management_survey_2022_final.pdf (stating 58%
of surveyed banks' Chief Risk Officers cite ``inability to manage
cybersecurity risk'' as the top strategic risk). See also EY, EY CEO
Imperative Study (July 2019), available at https://assets.ey.com/content/dam/ey-sites/ey-com/en_gl/topics/growth/ey-ceo-imperative-exec-summ-single-spread-final.pdf.
\431\ Center for Audit Qual. & Deloitte, Audit Committee
Practices Report: Priorities and Committee Composition (Jan. 2023)
available at https://www.thecaq.org/audit-committee-practices-report-2023/. See also Center for Audit Qual. & Deloitte, Audit
Committee Practices Report: Common Threads Across Audit Committees
(Jan. 2022), available at https://www.thecaq.org/2022-ac-practices-report/.
---------------------------------------------------------------------------
In 2011, the Division of Corporation Finance issued interpretive
guidance providing the Division's views concerning operating
registrants' disclosure obligations relating to cybersecurity risks and
incidents.\432\ This 2011 Staff Guidance provided an overview of
existing disclosure obligations that may require a discussion of
cybersecurity risks and cybersecurity incidents, along with examples of
potential disclosures.\433\ Building on the 2011 Staff Guidance, the
Commission issued the 2018 Interpretive Release to assist operating
companies in preparing disclosure about cybersecurity risks and
incidents under existing disclosure rules.\434\ In the 2018
Interpretive Release, the Commission reiterated that registrants must
provide timely and ongoing information in periodic reports (Form 10-Q,
Form 10-K, and Form 20-F) about material cybersecurity risks and
incidents that trigger disclosure obligations.\435\ Additionally, the
2018 Interpretive Release encouraged registrants to continue to use
current reports (Form 8-K or Form 6-K) to disclose material information
promptly, including disclosure pertaining to cybersecurity
matters.\436\ Further, the 2018 Interpretive Release noted that to the
extent cybersecurity risks are material to a registrant's business, the
Commission believes that the required disclosure of the registrant's
risk oversight should include the nature of the board's role in
overseeing the management of that cybersecurity risk.\437\ The 2018
Interpretive Release also stated that a registrant's controls and
procedures should enable it to, among other things, identify
cybersecurity risks and incidents and make timely disclosures regarding
such risks and incidents.\438\ Finally, the 2018 Interpretive Release
highlighted the importance of insider trading
[[Page 51927]]
prohibitions and the need to refrain from making selective disclosures
of cybersecurity risks or incidents.\439\
---------------------------------------------------------------------------
\432\ See 2011 Staff Guidance.
\433\ Id.
\434\ See 2018 Interpretive Release.
\435\ Id. at 8168-8170.
\436\ Id. at 8168.
\437\ Id. at 8170.
\438\ Id. at 8171.
\439\ Id. at 8171-8172.
---------------------------------------------------------------------------
In keeping with existing obligations, companies are increasingly
acknowledging cybersecurity risks in their disclosures. One analysis of
disclosures made by Fortune 100 companies that filed 10-Ks and proxy
statements found 95 percent of those companies disclosed a focus on
cybersecurity risk in the risk oversight section of their proxy
statements filed in the period ending in May 2022, up from 89 percent
of filings in 2020 and 76 percent in 2018.\440\ Disclosures of efforts
to mitigate cybersecurity risk were found in 99 percent of proxy
statements or Forms 10-K, up from 93 percent in 2020 and 85 percent in
2018.\441\ The Fortune 100 list is composed of the highest-revenue
companies in the United States. As discussed later in this economic
analysis, we observed the overall rate of disclosure across not just
the largest, but all filers, approximately 8,400, to be approximately
73 percent.\442\ Further, one commenter noted that current disclosures
are ``scattered and unpredictable'' rather than ``uniform,'' which
``diminishes their effectiveness,'' and so the final rule should
improve investors' ability to find and compare disclosures.\443\
---------------------------------------------------------------------------
\440\ See EY Ctr for Bd Matters, How Cyber Governance and
Disclosures are Closing the Gaps in 2022 (Aug. 2022), available at
https://www.ey.com/en_us/board-matters/how-cyber-governance-and-disclosures-are-closing-the-gaps-in-2022.
\441\ Id.
\442\ See infra note 456 (describing textual analysis) and
accompanying text.
\443\ See letter from Better Markets. Although uniformity should
improve investors' ability to find and compare disclosures, within
that structure the final rule allows customization to capture
complexity and avoid unnecessarily simplifying issues for the sake
of standardization.
---------------------------------------------------------------------------
Registrants currently are and may continue to be subject to other
cybersecurity incident disclosure requirements developed by various
industry regulators and contractual counterparties. As discussed in
Section II, CIRCIA was passed in March 2022 and requires CISA to
develop and issue regulations on cybersecurity reporting. As set forth
in CIRCIA, once those regulations are adopted, covered entities will
have 72 hours to report covered cybersecurity incidents to CISA and
will also be required to report a ransom payment as the result of a
ransomware attack within 24 hours of the payment being made.\444\ In
addition, Federal contractors may be required to monitor and report
cybersecurity incidents and breaches or face liability under the False
Claims Act.\445\ An FCC rule directs covered telecommunications
providers on how and when to disclose breaches of certain customer
data.\446\ HIPAA requires covered entities and their business
associates to provide notification following a breach of unsecured
protected health information.\447\ Similar rules require vendors of
personal health records and related entities to report data breaches to
affected individuals and the FTC.\448\ All 50 states have data breach
laws that require businesses to notify individuals of security breaches
involving their personally identifiable information.\449\ There are
other rules that registrants must follow in international
jurisdictions. For example, in the European Union, the General Data
Protection Regulation mandates disclosure of cybersecurity
breaches.\450\
---------------------------------------------------------------------------
\444\ 6 U.S.C. 681b. See also supra notes 21 to 23 and
accompanying text.
\445\ See Dep't of Justice, Office of Pub. Affairs, Justice
News: Deputy Attorney General Lisa O. Monaco Announces New Civil
Cyber-Fraud Initiative, (Oct. 6, 2021), available at https://www.justice.gov/opa/pr/deputy-attorney-general-lisa-o-monaco-announces-new-civil-cyber-fraud-initiative; see, e.g., FAR 52.239-1
(requiring contractors to ``immediately'' notify the Federal
Government if they become aware of ``new or unanticipated threats or
hazards . . . or if existing safeguards have ceased to function'').
\446\ See 47 CFR 64.2011; see also supra Section II.A.3.
\447\ See 45 CFR 164.400 through 414 (Notification in the Case
of Breach of Unsecured Protected Health Information).
\448\ See 16 CFR 318 (Health Breach Notification Rule).
\449\ Note that there are carve-outs to these rules, and not
every company may fall under any particular rule. See Nat'l
Conference of State Legislatures, Security Breach Notification Laws
(updated Jan. 17, 2022), available at https://www.ncsl.org/technology-and-communication/security-breach-notification-laws.
\450\ See Regulation (EU) 2016/679, of the European Parliament
and the Council of 27 Apr. 2016 on the protection of natural persons
with regard to the processing of personal data and on the free
movement of such data, and repealing Directive 95/46/EC (General
Data Protection Regulation), arts. 33 (Notification of a personal
data breach to the supervisory authority), 34 (Communication of a
personal data breach to the data subject), 2016 O.J. (L 119) 1
(``GDPR'').
---------------------------------------------------------------------------
These other cybersecurity incident disclosure requirements may
cover some of the material incidents that registrants will need to
disclose under the final rules. However, not all registrants are
subject to each of these other incident disclosure requirements and the
timeliness and public reporting elements of these requirements vary,
making it difficult for investors and other market participants to be
alerted to the breaches and to gain an adequate understanding of the
impact of such incidents on a registrant.
Some registrants are also subject to other mandates regarding
cybersecurity risk management, strategy, and governance. For instance,
government contractors may be subject to the Federal Information
Security Modernization Act, and use the NIST framework to manage
information and privacy risks.\451\ Certain financial institutions may
be subject to the FTC's Standards for Safeguarding Customer Information
Rule, requiring an information security program, including a qualified
individual to oversee the security program, and the provision of
periodic reports on the cybersecurity program to a company's board of
directors or equivalent governing body.\452\ Under HIPAA regulations,
covered entities are subject to rules that require protection against
reasonably anticipated threats to electronic protected health
information.\453\ International jurisdictions also have cybersecurity
risk mitigation measures and governance requirements (see, for example,
the GDPR).\454\ These rules and regulations provide varying standards
and requirements for disclosing cybersecurity risk management,
strategy, and governance, and may not provide investors with public or
clear and comparable disclosure regarding how a particular registrant
manages its cybersecurity risk profile.
---------------------------------------------------------------------------
\451\ See NIST, NIST Risk Management Framework (updated Jan. 31,
2022), available at https://csrc.nist.gov/projects/risk-management/fisma-background.
\452\ See 16 CFR 314.
\453\ See 45 CFR 164 (Security and Privacy); see also supra
Section II.A.3.
\454\ See, e.g., GDPR, arts. 32 (Security of processing), 37
(Designation of the data protection officer).
---------------------------------------------------------------------------
2. Affected Parties
The parties that are likely to be affected by the final rules
include investors, registrants, other market participants that use the
information provided in company filings (such as financial analysts,
investment advisers, and portfolio managers), and external stakeholders
such as consumers and other companies in the same industry as affected
companies.
We expect the final rules to affect all registrants with relevant
disclosure obligations on Forms 10-K, 20-F, 8-K, or 6-K. This includes
(1) approximately 7,300 operating companies filing on domestic forms
(of which, approximately 120 are business development companies) and
(2) 1,174 FPIs filing on foreign forms, based on all companies that
filed such forms or an amendment thereto during calendar
[[Page 51928]]
year 2022.\455\ Our textual analysis \456\ of all calendar year 2022
Form 10-K filings and amendments reveals that approximately 73 percent
of domestic filers made some kind of cybersecurity-related disclosures,
whether of incidents, risk, or governance.
---------------------------------------------------------------------------
\455\ Estimates of affected companies here are based on the
number of unique CIKs with at least one periodic report, current
report, or an amendment to one of the two filed in calendar year
2022.
\456\ In performing this analysis, staff executed computer
program-based keyword (and combination of key words) searches. This
analysis covered 8,405 Forms 10-K and 10-K/A available in
Intelligize (a division of RELX Inc.) filed in calendar year 2022 by
7,486 companies as identified by unique CIK.
---------------------------------------------------------------------------
We also analyzed calendar year 2022 Form 8-K and Form 6-K filings.
There were 71,505 Form 8-K filings in 2022, involving 7,416 filers, out
of which 35 filings reported material cybersecurity incidents.\457\
Similarly, there were 27,296 Form 6-K filings in 2022, involving 1,161
filers, out of which 22 filings reported material cybersecurity
incidents.
---------------------------------------------------------------------------
\457\ The number of filers in our sample is larger than the
number of estimated affected parties because, among other reasons,
it includes 8-K filings by companies that have not yet filed their
first annual report.
---------------------------------------------------------------------------
C. Benefits and Costs of the Final Rules
The final rules will benefit investors, registrants, and other
market participants, such as financial analysts, investment advisers,
and portfolio managers, by providing more timely and informative
disclosures relating to cybersecurity incidents and cybersecurity risk
management, strategy, and governance, facilitating investor decision-
making and reducing information asymmetry in the market. The final
rules also will entail costs. A discussion of the anticipated economic
costs and benefits of the final rules is set forth in more detail
below. We first discuss benefits, including benefits to investors and
other market participants. We subsequently discuss costs, including the
cost of compliance with the final rules. We conclude with a discussion
of indirect economic effects on investors, external stakeholders such
as consumers, and companies in the same industry with registrants
subject to this rule, or those facing similar cybersecurity threats.
1. Benefits
Existing shareholders, and those seeking to purchase shares in
registrants subject to the final rules, will be the main beneficiaries
of the enhanced disclosure of both cybersecurity incidents and
cybersecurity risk management, strategy, and governance as a result of
the final rules. Specifically, investors will benefit because: (1) more
informative and timely disclosure will improve investor decision-making
by allowing investors to better understand a registrant's material
cybersecurity incidents, material cybersecurity risks, and ability to
manage such risks, reducing information asymmetry and the mispricing of
securities in the market; and (2) more uniform and comparable
disclosures will lower search costs and information processing costs.
Other market participants that rely on financial statement information
to provide services to investors, such as financial analysts,
investment advisers, and portfolio managers, will also benefit.
a. More Timely and Informative Disclosure
The final rules provide more timely and informative disclosures,
relative to the current disclosure environment, which will allow
investors to better understand registrants' cybersecurity incidents,
risks, and ability to manage such risks as well as reduce mispricing of
securities in the market. Timeliness benefits to investors will result
from the requirement to disclose cybersecurity incidents within four
business days of determining an incident was material, as well as the
requirement to amend the disclosure to reflect material changes.
Information benefits to investors will result from the disclosure of
both (1) cybersecurity incidents and (2) cybersecurity risk management,
strategy, and governance. Together, the timeliness and information
benefits created by the final rules will reduce market mispricing and
information asymmetry and potentially lower firms' cost of capital.
We anticipate Item 1.05, governing cybersecurity incident
disclosure on Form 8-K, will lead to more timely disclosure to
investors.\458\ Currently, there is not a specific requirement for a
registrant to disclose a cybersecurity incident to investors in a
timely manner after its discovery and determination of material
impact.\459\ Item 1.05's requirement to disclose a material
cybersecurity incident on Form 8-K within four business days after
determining the incident is material will improve the overall
timeliness of the disclosure offered to investors--disclosure that is
relevant to the valuation of registrants' securities. It is well-
documented in the academic literature that the market reacts negatively
to announcements of cybersecurity incidents. For example, one study
finds a statistically significant mean cumulative abnormal return of -
0.84 percent in the three days following cyberattack announcements,
which, according to the study, translates into an average value loss of
$495 million per attack.\460\ One commenter argued that the magnitude
of stock market reaction to cybersecurity incidents from this study
would not be considered significant by market participants, stating
that ``if a stock had a historical standard deviation of 1 percent and
moved 0.8 percent on news, most market participants would suggest that
the news was either not significant or the market had priced in that
news so the reaction was muted.'' \461\ We note, however, that a
cumulative abnormal return (CAR) of -0.84 percent refers not to the
total return but to the return relative to how stocks in similar
industries and with similar risk profiles moved; thus, indeed, a
statistically significantly negative CAR represents a meaningful
reaction and change to how the stock price would have moved that day
absent the announcement of the cybersecurity incident. By allowing
investors to make decisions based on more current, material,
information, Item 1.05 will reduce mispricing of securities and
information asymmetry in the market.
---------------------------------------------------------------------------
\458\ For foreign issuers, the disclosure is made via Form 6-K.
\459\ See supra Sections I and IV.B.1.
\460\ See Shinichi Kamiya, et al., supra note 413, at 719-749.
See also Lawrence A. Gordon, Martin P. Loeb, & Lei Zhou, The Impact
of Information Security Breaches: Has There Been a Downward Shift in
Costs?, 19 (1) J. of Comput. Sec. 33, 33-56 (2011) (finding ``the
impact of the broad class of information security breaches on stock
market returns of firms is significant''); Georgios Spanos &
Lefteris Angelis, The Impact of Information Security Events to the
Stock Market: A Systematic Literature Review, 58 Comput. & Sec. 216-
229 (2016) (documenting that the majority (75.6%) of the studies the
paper reviewed report statistical significance of the impact of
security events to the stock prices of companies). But see Katherine
Campbell, et al., The Economic Cost of Publicly Announced
Information Security Breaches: Empirical Evidence From the Stock
Market, 11 (3) J. of Comput. Sec. 432, 431-448 (2003) (while finding
limited evidence of an overall negative stock market reaction to
public announcements of information security breaches, they also
find ``the nature of the breach affects this result,'' and ``a
highly significant negative market reaction for information security
breaches involving unauthorized access to confidential data, but no
significant reaction when the breach does not involve confidential
information;'' they thus conclude that ``stock market participants
appear to discriminate across types of breaches when assessing their
economic impact on affected firms'').
\461\ See letter from BIO.
---------------------------------------------------------------------------
Information asymmetries due to timing could also be exploited by
the malicious actors who caused a cybersecurity incident, those who
could access and trade on material information stolen during a
[[Page 51929]]
cybersecurity incident, or those who learn about the incident before
public disclosure, causing further harm to investors who trade
unknowingly against those with inside information.\462\ Malicious
actors may trade ahead of an announcement of a data breach that they
caused or pilfer material information to trade on ahead of company
announcements. Trading on undisclosed cybersecurity information is
particularly pernicious, because profits generated from this type of
trading provide incentives for malicious actors to ``create'' more
incidents and proprietary information to trade on, further harming the
shareholders of impacted companies.\463\ Employees or related third-
party vendors of a company experiencing a cybersecurity incident may
also learn of the incident and trade against investors in the absence
of disclosure. More timely disclosure as a result of Item 1.05 will
reduce mispricing by reducing windows of information asymmetry in
connection with a material cybersecurity incident, thereby reducing
opportunities to exploit the mispricing, enhancing investor protection.
---------------------------------------------------------------------------
\462\ See Joshua Mitts & Eric Talley, Informed Trading and
Cybersecurity Breaches, 9 Harv. Bus. L. Rev. 1 (2019) (``In many
respects, then, the cyberhacker plays a role in creating and
imposing a unique harm on the targeted company--one that (in our
view) is qualitatively different from `exogenous' information shocks
serendipitously observed by an information trader. Allowing a
coordinated hacker-trader team to capture these arbitrage gains
would implicitly subsidize the very harm-creating activity that is
being `discovered' in the first instance.'').
\463\ Id.
---------------------------------------------------------------------------
A commenter noted that there is risk the rule could, under certain
conditions, aid stock manipulation efforts by malicious actors,
offsetting these benefits.\464\ One commenter suggested that mandated
disclosure timing could make public cybersecurity incident disclosure
dates more predictable, and thus trading strategies based on the
accompanying negative stock price reaction more consistent, to the
extent malicious actors can monitor or control discovery of breaches
they cause and correctly anticipate materiality determination timing.
Their ability to do this is unclear, but we note that if the final
rules increase the precision of strategies by attackers that involve
shorting the stock of their targets, that would reduce the benefit of
the final rules.
---------------------------------------------------------------------------
\464\ See letter from ISA.
---------------------------------------------------------------------------
Item 1.05 allows registrants to delay filing for up to 30 days if
the Attorney General determines that the incident disclosure would pose
a substantial risk to national security or public safety and notifies
the Commission of such determination in writing. The delay may be
extended up to an additional 30 days if the Attorney General determines
disclosure continues to pose a substantial risk to national security or
public safety and notifies the Commission of such determination in
writing. In extraordinary circumstances, disclosure may be delayed for
a final additional period of up to 60 days if the Attorney General
determines that disclosure continues to pose a substantial risk to
national security and notifies the Commission of such determination in
writing. Beyond the final 60-day delay, if the Attorney General
indicates that further delay is necessary, the Commission will consider
additional requests for delay and may grant such relief through
Commission exemptive order. These delay periods and possible exemptive
relief would curb the timeliness benefits discussed above but would
reduce the costs of premature disclosure such as alerting malicious
actors targeting critical infrastructure that their activities have
been discovered.
By requiring all material cybersecurity incidents to be disclosed,
Item 1.05 will also provide investors more informative disclosure by
increasing material cybersecurity incident disclosure.\465\ There are
currently reasons that registrants do not disclose cybersecurity
incidents. For example, a registrant's managers may be reluctant to
release information that they expect or anticipate will cause their
stock price to suffer.\466\ Thus an agency problem prevents investors
from receiving this useful information. In addition, registrants may
consider only the benefits and costs that accrue to them when deciding
whether to disclose an incident. As discussed in Section IV.C.3,
incident disclosure can create indirect economic effects that accrue to
parties other than the company itself. Companies focused on direct
economic benefits, however, may not factor in this full range of
effects resulting from disclosing cybersecurity incidents, resulting in
less reporting and less information released to the market. The
mandatory disclosure in Item 1.05 should thus lead to more incidents
being disclosed, reducing mispricing of securities and information
asymmetry in the market as stock prices will more accurately reflect
registrants having experienced a cybersecurity incident.
---------------------------------------------------------------------------
\465\ See Amir, Levi, & Levine, supra note 411.
\466\ See, e.g., Kamiya, et al., supra note 413, at 719-749.
---------------------------------------------------------------------------
Item 1.05 will also improve the informativeness of the content of
cybersecurity incident disclosures. In 2022, when registrants filed a
Form 8-K to report an incident, the Form 8-K did not necessarily state
whether the incident was material, and in some cases, the Form 8-K
stated that the incident was immaterial.\467\ Item 1.05 will require
registrants to describe in an 8-K filing the material aspects of the
nature, scope, and timing of a material cybersecurity incident and the
material impact or reasonably likely material impact on the registrant,
including on its financial condition and results of operations. The
disclosure must also identify any information called for in Item
1.05(a) that is not determined or is unavailable at the time of the
required filing. Registrants will then need to disclose this
information in a Form 8-K amendment containing such information within
four business days after the information is determined or becomes
available. Item 1.05 is thus expected to elicit more pertinent
information to aid investor decision-making. Additionally, the
materiality requirement should minimize immaterial incident disclosure
that might divert investor attention, which should reduce mispricing of
securities. Numerous commenters on the Proposing Release agreed that
more informative incident disclosure would be useful for
investors.\468\
---------------------------------------------------------------------------
\467\ Based on staff analysis of the 10,941 current and periodic
reports in 2022 for companies available in Intelligize and
identified as having been affected by a cybersecurity incident using
a keyword search.
\468\ See, e.g., letters from Better Markets; CalPERS; PWC;
Prof. Perullo.
---------------------------------------------------------------------------
Regulation S-K Items 106(b) and (c) of the final rules provide
further benefits by requiring registrants to disclose, in their annual
reports on Form 10-K, information about their cybersecurity risk
management, strategy, and governance. The final rules require
disclosure regarding a registrant's processes, if any, for assessing,
identifying, and managing material risks from cybersecurity threats, as
well as disclosure of the registrant's board of directors' oversight of
risks from cybersecurity threats and management's role in assessing and
managing material risks from cybersecurity threats.\469\ There are
currently no disclosure requirements on Forms 10-K or 10-Q that
explicitly refer to cybersecurity risks or governance, and thus Item
106 will benefit investors by eliciting relevant information about how
registrants are managing their material cybersecurity risks.
---------------------------------------------------------------------------
\469\ See supra Sections II.B and C. For foreign issuers, the
disclosure is made via Form 20-F.
---------------------------------------------------------------------------
[[Page 51930]]
One commenter took issue with the usefulness of the proposed
disclosures, arguing, for example, that the particular requirement to
disclose whether a registrant engages assessors, consultants, auditors,
or other third parties in connection with any cybersecurity risk
assessment program was unnecessary because there was no evidence that
such third parties improved a registrant's cyber risk management, and
some companies have internal cybersecurity risk management
capabilities.\470\ Some, however, have noted that the use of
independent third-party advisors may be ``vital to enhancing cyber
resiliency'' by validating that the risk management program is meeting
its objectives.\471\ As discussed in Section II.C.1.c., it may be
important for investors to know a registrant's level of in-house versus
outsourced cybersecurity capacity. Another commenter suggested that the
requirement to disclose governance and risk management practices would
be of limited value to investors, while being administratively
burdensome.\472\ Other commenters said that the required disclosures
about cybersecurity governance and risk management were too granular to
be useful and suggested that the specific disclosures be replaced with
a more high-level explanation of management's and the board's roles in
cybersecurity risk management and governance.\473\ One such commenter
stated that the proposed disclosures would create pressures to provide
boilerplate responses to the specific items that would need to be
disclosed instead of providing a robust discussion of the way a
registrant would manage cybersecurity risk management and
governance.\474\ Another commenter stated that granular disclosures
``may result in overly detailed filings that have little utility to
investors.'' \475\ These commenters suggested that the specific
disclosures should be replaced with a more high-level explanation of
management's and the board's roles in cybersecurity risk management and
governance.
---------------------------------------------------------------------------
\470\ See letter from NRF.
\471\ See Harvard Law School Forum on Corporate Governance Blog,
posted by Steve W. Klemash, Jamie C. Smith, and Chuck Seets, What
Companies are Disclosing About Cybersecurity Risk and Oversight,
(posted Aug. 25, 2020), available at https://corpgov.law.harvard.edu/2020/08/25/what-companies-are-disclosing-about-cybersecurity-risk-and-oversight/.
\472\ See letter from SIMFA.
\473\ See letters from ABA; AGA/INGAA; EEI; Nareit; NYSE.
\474\ See letter from ABA.
\475\ See letter from NYSE.
---------------------------------------------------------------------------
In response to these comments, the Commission is not adopting
certain proposed disclosure requirements, such as disclosure of whether
the registrant has a designated chief information security officer.
However, Items 106(b) and (c) still require risk, strategy and
governance disclosures as we continue to believe disclosures of
cybersecurity risk oversight and processes, as well as management's
role and relevant expertise, are important to investors.
Improved timeliness and informativeness of cybersecurity
disclosures may provide further benefit by lowering companies' cost of
capital.\476\ As detailed above, the final rules should reduce
information asymmetry and mispricing of securities. In an asymmetric
information environment, investors are less willing to hold shares,
reducing liquidity. Registrants may respond by issuing shares at a
discount, increasing their cost of capital. By providing more and more
credible disclosure, however, companies can reduce the risk of adverse
selection faced by investors and the discount they demand, ultimately
increasing liquidity and decreasing the company's cost of capital.\477\
Investors benefit when the companies they are invested in enjoy higher
liquidity. Item 1.05 enables companies to provide more credible
disclosure because currently, investors do not know whether an absence
of incident disclosure means no incidents have occurred, or one has but
the company has not yet chosen to reveal it. By requiring all material
incidents to be reported, Item 1.05 supplies investors greater
assurance that, indeed, barring extraordinary circumstances, no
disclosure means the company has not been aware for more than four
business days of a material incident having occurred. Similarly, Item
106 should also generate more credible disclosure. Currently, voluntary
cybersecurity risk management, strategy, and governance disclosures
lack standardization and consistency, reducing their comparability and
usefulness for investors. Without set topics that must be addressed,
companies may disclose only the strongest aspects of their
cybersecurity processes, if they disclose at all. By clarifying what
registrants must disclose with respect to their cybersecurity risk
management, strategy, and governance, Item 106 will reduce information
asymmetry and provide investors and other market participants more
certainty and easier comparability of registrants' vulnerability to and
ability to manage cybersecurity breaches, reducing adverse selection
and increasing liquidity. Thus, the final rules could decrease cost of
capital across registrants and increase company value, benefiting
investors.
---------------------------------------------------------------------------
\476\ See Leuz & Verrecchia, The Economic Consequences of
Increased Disclosure, 38 J. Acct. Res. 91 (2000) (``A brief sketch
of the economic theory is as follows. Information asymmetries create
costs by introducing adverse selection into transactions between
buyers and sellers of firm shares. In real institutional settings,
adverse selection is typically manifest in reduced levels of
liquidity for firm shares (e.g., Copeland and Galai [1983], Kyle
[1985], and Glosten and Milgrom [1985]). To overcome the reluctance
of potential investors to hold firm shares in illiquid markets,
firms must issue capital at a discount. Discounting results in fewer
proceeds to the firm and hence higher costs of capital. A commitment
to increased levels of disclosure reduces the possibility of
information asymmetries arising either between the firm and its
shareholders or among potential buyers and sellers of firm shares.
This, in turn, should reduce the discount at which firm shares are
sold, and hence lower the costs of issuing capital (e.g., Diamond
and Verrecchia [1991] and Baiman and Verrecchia [1996]).'').
\477\ See Douglas W. Diamond & Robert E. Verrecchia, Disclosure,
Liquidity, and the Cost of Capital, 46 J. Fin. 1325, 1325-1359
(1991) (finding that revealing public information to reduce
information asymmetry can reduce a company's cost of capital through
increased liquidity). See also Christian Leuz & Robert E.
Verrecchia, The Economic Consequences of Increased Disclosure, 38 J.
Acct. Res. 91 (2000) (providing empirical evidence that increased
disclosure lowers the information asymmetry component of the cost of
capital in a sample of German companies); see also Christian Leuz &
Peter D. Wysocki, The Economics of Disclosure and Financial
Reporting Regulation: Evidence and Suggestions for Future Research,
54 J. Acct. Res. 525 (2016) (providing a comprehensive survey of the
literature on the economic effect of disclosure). Although
disclosure could be beneficial for the company, several conditions
must be met for companies to voluntarily disclose all their private
information. See Anne Beyer, et al., The Financial Reporting
Environment: Review Of The Recent Literature, 50 J. Acct. & Econ.
296, 296-343 (2010) (discussing conditions under which companies
voluntarily disclose all their private information, and these
conditions include ``(1) disclosures are costless; (2) investors
know that companies have, in fact, private information; (3) all
investors interpret the companies' disclosure in the same way and
companies know how investors will interpret that disclosure; (4)
managers want to maximize their companies' share prices; (5)
companies can credibly disclose their private information; and (6)
companies cannot commit ex-ante to a specific disclosure policy'').
Increased reporting could also help determine the effect of
investment on company value. See Lawrence A. Gordon, et al., The
Impact of Information Sharing on Cybersecurity Underinvestment: A
Real Options Perspective, 34 (5) J. Acct. & Pub. Policy 509, 509-519
(2015) (arguing that ``information sharing could reduce the tendency
by firms to defer cybersecurity investments'').
---------------------------------------------------------------------------
One commenter argued that smaller registrants are less likely than
larger registrants to experience cybersecurity incidents and that
cyberattacks are not material for smaller registrants.\478\ This
[[Page 51931]]
could imply that the degree of cybersecurity-driven adverse selection
faced by investors in small registrants might be less severe. If so,
the potential benefit from improvement in liquidity and cost of capital
due to the timeliness and information benefits from the final rules
might be smaller for small registrants and their investors. The
research this commenter cited to support this assertion found larger
companies were more susceptible than smaller companies to a particular
category of cybersecurity incidents--those involving personal
information lost through hacking by an outside party--which composed
less than one-quarter of all cyber incidents in the sample (1,580 out
of 6,382).\479\ It is possible that malicious strategies that target
personal information are particularly suited to larger, well-known
companies, and thus the research may overstate the degree to which
large companies are more susceptible to cybersecurity incidents
generally. These strategies explicitly harm companies' customers, and
customer ill will is potentially more newsworthy and consequential for
a larger, well-known company as compared to a smaller one. In contrast,
ransomware attacks that target non-personal, internal company
operations such as an information technology network, for example, are
less concerned with causing reputational loss and thus may have an
optimal target profile that favors smaller firms as much as larger
firms. Additionally, smaller companies may have fewer resources and
weaker processes in place to prevent cybersecurity attacks.\480\ Hence,
it is not clear that smaller companies experience fewer material
cybersecurity incidents generally. Others have noted that small
companies are frequently targeted victims of cyberattacks, potentially
leading to dissolution of the business.\481\ Thus, overall, we maintain
that cybersecurity attacks are material for smaller reporting companies
and that the final rules will serve to benefit them and their
investors.
---------------------------------------------------------------------------
\478\ See comment letter from BIO. The letter argues that the
Commission, when citing the study by Kamiya, et al. (2021) in the
Proposing Release, ``ignored and omitted'' the fact that the mean
market capitalization of impacted companies in this study was $58.9
billion, much higher than the average for small companies, and thus
``cyberattacks mainly affect large companies and are not material
for smaller companies.'' We observe that an average market
capitalization of impacted companies of $58.9 billion would
generally indicate that companies both larger and smaller than that
size were impacted by cyberattacks.
\479\ See Kamiya, et al., supra note 413.
\480\ See letter from Tenable.
\481\ See Testimony of Dr. Jane LeClair, Chief Operating
Officer, National Cybersecurity Institute at Excelsior College,
before the U.S. House of Representatives Committee on Small Business
(Apr. 22, 2015), available at https://docs.house.gov/meetings/SM/SM00/20150422/103276/HHRG-114-SM00-20150422-SD003-U4.pdf (describing
the cybersecurity risks small businesses face and noting ``fifty
percent of SMB's have been the victims of cyberattack and over 60
percent of those attacked go out of business'').
---------------------------------------------------------------------------
Overall, Form 8-K Item 1.05 and Regulation S-K Item 106 provide for
timely, informative, and up-to-date disclosure of cybersecurity
incidents, as well as disclosure that may provide insight into whether
a registrant is prepared for risks from cybersecurity threats and has
adequate cybersecurity risk management, strategy, and governance
measures in place to reduce the likelihood of future incidents,
reducing the likelihood of delayed or incomplete disclosure and
benefiting investors and the market.
We believe enhanced information, timing, and completeness of
disclosures as a result of Form 8-K Item 1.05 and Regulation S-K Item
106 will benefit not only investors but also other market participants
that rely on registrant disclosures to provide services to investors.
They, too, will be able to better evaluate registrants' cybersecurity
preparations and risks and thus provide better recommendations. We note
that the potential benefit of these amendments could be reduced because
some registrants already provide relevant disclosures. That said, we
expect this same information will become more useful due to added
context from, and easier comparisons with, the increased number of
other registrants now providing these disclosures.
We are unable to quantify the potential benefit to investors and
other market participants as a result of the increase in disclosure and
improvement in pricing under the final rules. Such estimation requires
information about the fundamental value of securities and the extent of
the mispricing. We do not have access to such information and therefore
cannot provide a reasonable estimate. One commenter suggested we use
existing cyber disclosure models to ``empirically determine'' the
current degree of market mispricing, but did not suggest what data the
Commission could use to do so.\482\ The Commission cannot estimate the
effects of undisclosed cybersecurity incidents that are creating market
mispricing, as the relevant information was never released and the
market was unable to react.
---------------------------------------------------------------------------
\482\ See letter from ISA.
---------------------------------------------------------------------------
b. Greater Uniformity and Comparability
The final rules requiring disclosure about cybersecurity incidents
and cybersecurity risk management, strategy, and governance should also
lead to more uniform and comparable disclosures, in terms of both
content and location, benefiting investors by lowering their search and
information processing costs. Currently, registrants do not always use
Form 8-K to report cybersecurity incidents. Even among registrants that
do, reporting practices vary widely.\483\ Some provide a discussion of
materiality, the estimated costs of an incident, or the remedial steps
taken as a result of an incident, while others do not provide such
disclosure or provide much less detail. Disclosures related to risk
management, strategy, and governance also vary significantly across
registrants--such information could be disclosed in places such as the
risk factors section, the management's discussion and analysis section,
or not at all. For both types of disclosures, the final rules specify
the topics that registrants should disclose. As a result, both incident
disclosure and risk management, strategy, and governance disclosure
should become more uniform across registrants, making them easier for
investors and other market participants to compare. The final rules
also specify the disclosure locations (e.g., Item 1C of Form 10-K),
benefiting investors and other market participants further by reducing
the time, cost, and effort it takes them to search for and retrieve
information (as pointed out by commenters \484\).
---------------------------------------------------------------------------
\483\ See Proposing Release at 16594.
\484\ See, e.g., letters from Better Markets; CalPERS.
---------------------------------------------------------------------------
We note that to the extent that the disclosures related to
cybersecurity risk management, strategy, and governance become too
uniform or ``boilerplate,'' the benefit of comparability may be
diminished. However, we believe that Item 106 requires sufficient
specificity, tailored to the registrant's facts and circumstances, to
help mitigate any tendency towards boilerplate disclosures. Item 106
also provides a non-exclusive list of information that registrants
should disclose, as applicable, which should help in this regard.
The requirement to tag the cybersecurity disclosure in Inline XBRL
will likely augment the informational and comparability benefits by
making the disclosures more easily retrievable and usable for
aggregation, comparison, filtering, and other analysis. XBRL
requirements for public operating company financial statement
disclosures have been observed to mitigate information asymmetry by
reducing information processing costs, thereby making the disclosures
easier to access and analyze.\485\ While these
[[Page 51932]]
observations are specific to operating company financial statement
disclosures and not to disclosures outside the financial statements,
such as the cybersecurity disclosures, they suggest that the Inline
XBRL requirements should directly or indirectly (i.e., through
information intermediaries such as financial media, data aggregators,
and academic researchers) provide investors with increased insight into
cybersecurity-related information at specific companies and across
companies, industries, and time periods.\486\ Also, unlike XBRL
financial statements (including footnotes), which consist of tagged
quantitative and narrative disclosures, the cybersecurity disclosures
consist largely of tagged narrative disclosures.\487\ Tagging narrative
disclosures can facilitate analytical benefits such as automatic
comparison or redlining of these disclosures against prior periods and
the performance of targeted artificial intelligence or machine learning
assessments (tonality, sentiment, risk words, etc.) of specific
cybersecurity disclosures rather than the entire unstructured
document.\488\
---------------------------------------------------------------------------
\485\ See, e.g., J.Z. Chen, et al., Information processing costs
and corporate tax avoidance: Evidence from the SEC's XBRL mandate,
40 J. of Acct. and Pub. Pol'y 2 (finding XBRL reporting decreases
likelihood of company tax avoidance because ``XBRL reporting reduces
the cost of IRS monitoring in terms of information processing, which
dampens managerial incentives to engage in tax avoidance
behavior''). See also P.A. Griffin, et al., The SEC's XBRL Mandate
and Credit Risk: Evidence on a Link between Credit Default Swap
Pricing and XBRL Disclosure, 2014 American Accounting Association
Annual Meeting (2014) (finding XBRL reporting enables better outside
monitoring of companies by creditors, leading to a reduction in
company default risk); E. Blankespoor, The Impact of Information
Processing Costs on Firm Disclosure Choice: Evidence from the XBRL
Mandate, 57 J. of Acc. Res. 919, 919-967 (2019) (finding ``firms
increase their quantitative footnote disclosures upon implementation
of XBRL detailed tagging requirements designed to reduce information
users' processing costs,'' and ``both regulatory and non-regulatory
market participants play a role in monitoring firm disclosures,''
suggesting ``that the processing costs of market participants can be
significant enough to impact firms' disclosure decisions'').
\486\ See, e.g., N. Trentmann, Companies Adjust Earnings for
Covid-19 Costs, but Are They Still a One-Time Expense?, Wall St. J.
(2020) (citing an XBRL research software provider as a source for
the analysis described in the article). See also Bloomberg Lists BSE
XBRL Data, XBRL.org (2018); R. Hoitash, and U. Hoitash, Measuring
Accounting Reporting Complexity with XBRL, 93 Account. Rev. 259
(2018).
\487\ The cybersecurity disclosure requirements do not expressly
require the disclosure of any quantitative values; if a company
includes any quantitative values that are nested within the required
discussion (e.g., disclosing the number of days until containment of
a cybersecurity incident), those values will be individually detail
tagged, in addition to the block text tagging of the narrative
disclosures.
\488\ To illustrate, without Inline XBRL, using the search term
``remediation'' to search through the text of all companies' filings
over a certain period of time, so as to analyze the trends in
companies' disclosures related to cybersecurity incident remediation
efforts during that period, could return many narrative disclosures
outside of the cybersecurity incident discussion (e.g., disclosures
related to potential environmental liabilities in the risk factors
section). Inline XBRL, however, enables a user to search for the
term ``remediation'' exclusively within the required cybersecurity
disclosures, thereby likely reducing the number of irrelevant
results.
---------------------------------------------------------------------------
In addition, by formalizing the disclosure requirements related to
cybersecurity incidents and cybersecurity risk management, strategy,
and governance, the final rules could reduce compliance costs for those
registrants that are currently providing disclosure about these topics.
The compliance costs would be reduced to the extent that those
registrants may be currently over-disclosing information out of
caution, to increase the perceived credibility of their disclosures, or
to signal to investors that they are diligent with regard to
cybersecurity. For instance, the staff has observed that some
registrants provide Form 8-K filings even when they do not anticipate
the incident will have a material impact on their business operations
or financial results.\489\ By specifying that only material incidents
require disclosure, the final rules should ease some of these concerns
and reduce costs to the extent those costs currently exist.\490\
Investors will benefit to the extent the registrants they invest in
enjoy lower compliance costs.
---------------------------------------------------------------------------
\489\ Based on staff analysis of the 10,941 current and periodic
reports in 2022 for companies available in Intelligize and
identified as having been affected by a cybersecurity incident using
a keyword search.
\490\ We note that registrants may still over-disclose due to
uncertainty over when a cybersecurity incident crosses the threshold
of materiality. This may impact how fully costs from immaterial
incident disclosure are reduced.
---------------------------------------------------------------------------
2. Costs
We also recognize that enhanced cybersecurity disclosure would
result in costs to registrants, borne by investors. These costs include
potential increases in registrants' vulnerability to cybersecurity
incidents and compliance costs. We discuss these costs below.
First, the disclosure about cybersecurity incidents and
cybersecurity risk management, strategy, and governance could
potentially increase the vulnerability of registrants. Since the
issuance of the 2011 Staff Guidance, concerns have been raised that
providing detailed disclosures of cybersecurity incidents could,
potentially, provide a road map for future attacks, and, if the
underlying security issues are not completely resolved, could
exacerbate the ongoing attack.\491\ The concern is that malicious
actors could use the disclosures to potentially gain insights into a
registrant's practices on cybersecurity. As a result, the final
incident disclosure rules could potentially impose costs on registrants
and their investors, if, for example, additional threat actors steal
more data or hamper breach resolution.
---------------------------------------------------------------------------
\491\ See, e.g., Roland L. Trope & Sarah Jane Hughes, The SEC
Staff's Cybersecurity Disclosure Guidance: Will It Help Investors or
Cyber-Thieves More, 2011 Bus. L. Today 2, 1-4 (2011).
---------------------------------------------------------------------------
The final rules have been modified from the Proposing Release to
mitigate disclosure of details that could aid threat actors, while
remaining informative for investors. Form 8-K Item 1.05 will require
registrants to timely disclose material cybersecurity incidents,
describe the material aspects of the nature, scope, and timing of the
incident, and, importantly, describe the material impact or reasonably
likely material impact of the incident on the registrant. Focusing on
the material impact or reasonably likely material impact of the
incident rather than the specific or technical details of the incident
should reduce the likelihood of providing a road map that threat actors
can exploit for future attacks, and should reduce the risks and costs
stemming from threat actors acting in this manner.\492\
---------------------------------------------------------------------------
\492\ Instruction 4 to Item 1.05 provides that a ``registrant
need not disclose specific or technical information about its
planned response to the incident or its cybersecurity systems,
related networks and devices, or potential system vulnerabilities in
such detail as would impede the registrant's response or remediation
of the incident.''
---------------------------------------------------------------------------
Similar concerns were raised by commenters about the required risk
management, strategy, and governance disclosure.\493\ Items 106(b) and
(c) require registrants to provide specified disclosure regarding their
cybersecurity risk management processes and cybersecurity governance by
the management and board. The required disclosure could provide
malicious actors information about which registrants have weak
processes related to cybersecurity risk management and allow such
malicious actors to determine their targets accordingly.
---------------------------------------------------------------------------
\493\ See letters from ABA; ACLI; APCIA; BIO; BPI et al.;
Business Roundtable; Chamber; CSA; CTIA; EIC; Enbridge; FAH;
Federated Hermes; GPA; ITI; ISA; Nareit; NAM; NMHC; NRA; NRF; SIFMA;
Sen. Portman; TechNet; TransUnion; USTelecom; Virtu; see also supra
note 201 and accompanying text.
---------------------------------------------------------------------------
However, academic research so far has not provided evidence that
more detailed cybersecurity risk disclosures necessarily lead to more
attacks. For example, one study finds that measures for specificity
(e.g., the uniqueness of the disclosure) do not have a
[[Page 51933]]
statistically significant relation with subsequent cybersecurity
incidents.\494\ Another study finds that cybersecurity risk factor
disclosures that involve terms about processes are less likely to be
related to future breach announcements than disclosures that employ
more general language.\495\ On the other hand, we note that the final
rules will require more details of cybersecurity processes than what is
explicitly required under the current rules, and the uniformity of the
final rules might also make it easier for malicious actors to identify
registrants with relatively weaker processes. Therefore, these academic
findings might not be generalizable to the effects of the final
rules.\496\ However, we also note that we have streamlined the
disclosure obligations for Items 106 (b) and (c), in response to
commenters' concerns, to require a more principles-based discussion of
a registrant's processes instead of detailed disclosures on a specific
set of items. This change should help ease concerns that the required
cybersecurity risk management, strategy, and governance disclosures
will help malicious actors choose targets. In addition, the potential
costs resulting from the disclosure requirements might be partially
mitigated to the extent that registrants decide to enhance their
cybersecurity risk management in anticipation of the increased
disclosure. This possibility is discussed below under Indirect Economic
Effects.
---------------------------------------------------------------------------
\494\ See He Li, Won Gyun No, & Tawei Wang, SEC's Cybersecurity
Disclosure Guidance and Disclosed Cybersecurity Risk Factors, 30
Int'l. J. of Acct. Info. Sys. 40-55 (2018) (``while Ferraro (2013)
criticizes that the SEC did little to resolve the concern about
publicly revealing too much information [that] could provide
potential hackers with a roadmap for successful attacks, we find no
evidence supporting such claim'').
\495\ See Tawei Wang, Karthik N. Kannan, & Jackie Rees Ulmer,
The Association Between the Disclosure and the Realization of
Information Security Risk Factors, 24.2 Info. Sys. Res. 201, 201-218
(2013).
\496\ We note that the papers we cited above study the effect of
voluntary disclosure and the 2011 Staff Guidance, which could also
reduce the generalizability of these studies to the mandatory
disclosures under the final rules.
---------------------------------------------------------------------------
The final rules will also impose compliance costs. Registrants, and
thus their investors, will incur one-time and ongoing costs to fulfill
the new disclosure requirements under Item 106 of Regulation S-K. These
costs will include costs to gather the information and prepare the
disclosures. Registrants will also incur compliance costs to fulfill
the disclosure requirements related to Form 8-K (Form 6-K for FPIs)
incident disclosure.\497\ These costs include one-time costs to
implement or revise their incident disclosure practices, so that any
registrant that determines it has experienced a material cybersecurity
incident will disclose such incident with the required information
within four business days. Registrants may also incur ongoing costs to
disclose in a Form 8-K report any material changes or updates relating
to previously disclosed incidents, and we expect these costs to be
higher for registrants with more incidents to disclose. The costs will
be mitigated for registrants whose current disclosure practices match
or are similar to those that are in the final rules. One commenter
suggested that companies could incur costs to reconcile their existing
cybersecurity activities and NIST-based best practices with the
requirements of the final rules \498\ but, as discussed in Section
II.C.3.c, the final rules are not in conflict with NIST and we do not
anticipate that significant reconciliation will be needed.
---------------------------------------------------------------------------
\497\ We note that the compliance costs related to Form 6-K
filings will be mitigated, because a condition of the form is that
the information is disclosed or required to be disclosed elsewhere.
\498\ See letter from SIFMA.
---------------------------------------------------------------------------
The compliance costs will also include costs attributable to the
Inline XBRL tagging requirements. Many commenters supported the XBRL
tagging requirement,\499\ while one commenter suggested that it would
be burdensome to add tagging given the time-sensitive nature of the
disclosure requirements.\500\ Various preparation solutions have been
developed and used by operating companies to fulfill XBRL requirements,
and some evidence suggests that, for smaller companies, XBRL compliance
costs have decreased over time.\501\ The incremental compliance costs
associated with Inline XBRL tagging of cybersecurity disclosures will
also be mitigated by the fact that most companies that will be subject
to the requirements are already subject to other Inline XBRL
requirements for other disclosures in Commission filings, including
financial statement and cover page disclosures in certain periodic
reports and registration statements.\502\ Such companies may be able to
leverage existing Inline XBRL preparation processes and expertise in
complying with the cybersecurity disclosure tagging requirements.
Moreover, the one-year XBRL compliance period extension could further
assuage concerns about the transition for registrants to comply with
the new requirements.\503\
---------------------------------------------------------------------------
\499\ See letters from E&Y; CAQ; PWC; NACD; AICPA; XBRL.
\500\ See letter from NYC Bar.
\501\ An AICPA survey of 1,032 reporting companies with $75
million or less in market capitalization in 2018 found an average
cost of $5,850 per year, a median cost of $2,500 per year, and a
maximum cost of $51,500 per year for fully outsourced XBRL creation
and filing, representing a 45% decline in average cost and a 69%
decline in median cost since 2014. See AICPA, XBRL Costs for Small
Companies Have Declined 45% since 2014 (2018), available at https://us.aicpa.org/content/dam/aicpa/interestareas/frc/accountingfinancialreporting/xbrl/downloadabledocuments/xbrl-costs-for-small-companies.pdf. See also Letter from Nasdaq, Inc. (Mar. 21,
2019) (responding to Request for Comment on Earnings Releases and
Quarterly Reports, Release No. 33-10588 (Dec. 18, 2018) [83 FR 65601
(Dec. 21, 2018)]) (stating that a 2018 NASDAQ survey of 151 listed
companies found an average XBRL compliance cost of $20,000 per
quarter, a median XBRL compliance cost of $7,500 per quarter, and a
maximum XBRL compliance cost of $350,000 per quarter).
\502\ See 17 CFR 229.601(b)(101) and 17 CFR 232.405 (for
requirements related to tagging financial statements, including
footnotes and schedules in Inline XBRL). See 17 CFR 229.601(b)(104)
and 17 CFR 232.406 (for requirements related to tagging cover page
disclosures in Inline XBRL).
\503\ See supra Section II.I.
---------------------------------------------------------------------------
Some commenters contended that the Proposing Release failed to
consider the costs of the proposed rules adequately.\504\ We are
generally unable to quantify costs related to the final rules due to a
lack of data. For example, we are unable to quantify the impact of any
increased vulnerability to existing or new threat actors arising from
the required incident or risk management, strategy, or governance
disclosures. Moreover, costs related to preparing cyber-related
disclosures are generally private information known only to the issuing
firm, hence such data are not readily available to the Commission.
There is also likely considerable variation in these costs depending on
a given firm's size, industry, complexity of operations, and other
characteristics, which makes comprehensive estimates difficult to
obtain. We note that the Commission has provided certain estimates for
purposes of compliance with the Paperwork Reduction Act of 1995, as
further discussed in Section V below. Those estimates, while useful to
understanding the collection of information burden associated with the
final rules, do not purport to reflect the full costs associated with
making the required disclosures.
---------------------------------------------------------------------------
\504\ See, e.g., letters from Chamber and SIFMA.
---------------------------------------------------------------------------
One commenter provided a numerical cost estimate, stating the
initial costs of complying with the proposed rules would be $317.5
million to $523.4 million ($38,690 to $69,151 per regulated company),
and future annual costs would be $184.8 million to $308.1 million
($22,300 to $37,500 per regulated company).\505\ We cannot directly
evaluate the accuracy of these
[[Page 51934]]
estimates because the commenter did not provide any explanation for how
they were derived. We believe, however, these estimates likely
significantly overstate the costs of the final rules.
---------------------------------------------------------------------------
\505\ See letter from Chamber.
---------------------------------------------------------------------------
First, the commenter overestimates the number of registrants who
are likely to bear the full costs of new disclosures. Converting the
total and per company cost estimates to registrant counts implies the
commenter assumed these costs would be borne by approximately 8,000
companies, which would be nearly every registrant.\506\ As stated in
Section IV.B.2 above, however, 73 percent of domestic filers in 2022
already made cybersecurity-related disclosures in Form 10-K filings and
amendments, and 35 Form 8-K filings disclosed material cybersecurity
incidents.\507\ While the degree to which registrants' existing
disclosures already may be in line with the requirements of the final
rules varies--some registrants may need to make significant changes
while others may not, especially given the guidance from the 2018
Interpretive Release--most registrants should not bear the full costs
of compliance. In addition, while cybersecurity incident disclosure is
expected to increase as a result of Item 1.05, we do not expect that
most companies will need to report in any given year. Extrapolating
from the current numbers of incidents reported--for example, public
companies disclosed 188 reported breaches in 2021 \508\--we expect that
the overwhelming majority of registrants will not experience a material
breach and will not need to disclose cybersecurity incidents and incur
the ongoing associated costs.\509\ They may, however, revisit their
disclosure controls initially, to ensure they are capturing what the
rule requires.
---------------------------------------------------------------------------
\506\ $317.5 million divided by $38,690 per registrant equals
8,206 registrants; $523.4 million divided by $69,151 per registrant
equals 7,569 registrants; $184.8 million divided by $22,300 per
registrant equals 8,287 registrants; $308.1 million divided by
$37,500 per registrant equals 8,216 registrants. In Section IV.B.2,
supra, we find the number of affected parties to include
approximately 7,300 operating companies filing on domestic forms and
1,174 FPIs filing on foreign forms.
\507\ See supra notes 456 and 457 and accompanying text.
\508\ See supra note 426 and accompanying text.
\509\ This conclusion is based on relative quantities. Note that
188 is very small relative to the total number of registrants,
8,474, from Section IV.B.2 (188 divided by 8,474 is roughly 2%).
---------------------------------------------------------------------------
Second, we have made changes from the proposed rules that would
also reduce costs as compared with the proposal. Some of these changes
concerned aspects of the proposed rules that the commenter noted would
be burdensome. For example, the commenter states that ``potential
material incidents in the aggregate would be difficult to identify and
operationally challenging to track.'' \510\ The commenter also states
``the SEC underestimates the burdens related to tracking `several small
but continuous cyberattacks against a company,' which may or may not
prove to be material.'' \511\ These comments refer to proposed Item
106(d)(2), which would have required disclosure when a series of
previously undisclosed individually immaterial cybersecurity incidents
become material in the aggregate. In response to comments, we are not
adopting this aspect of the proposal and instead have added ``a series
of related unauthorized occurrences'' to the definition of
``cybersecurity incident,'' which may help address this concern about
the burden of the proposal. The comment letter also stated that
``cybersecurity talent is scar[c]e globally. From a personnel
standpoint, it's unclear where companies would get the so-called
cybersecurity experts that the proposed regulation would mandate. There
is a well-documented lack of cybersecurity talent for the public and
private sectors that would unquestionably affect companies' recruitment
of board cybersecurity experts.'' \512\ We are not adopting proposed
407(j) about the cybersecurity expertise, if any, of a registrant's
board members, which may have factored into the commenter's cost
estimates. Additionally, the proposal would not have mandated
recruitment of cybersecurity experts, only disclosure of their
presence. Additional streamlining of requirements in the final rules
(e.g., reduced granularity of cybersecurity incident disclosure
requirements) should further reduce costs from what might have been
estimated using the Proposing Release.
---------------------------------------------------------------------------
\510\ See letter from Chamber.
\511\ Id.
\512\ Id.
---------------------------------------------------------------------------
Another commenter stated that the Commission's calculation of costs
and benefits does not adequately address the impact of different but
overlapping disclosure and reporting requirements that may escalate
burdens and costs.\513\ We acknowledge the possibility that to the
extent different information has to be reported pursuant to different
regulations, laws, or other requirements, there could be a greater cost
because of the demands to keep track of and manage the multiple
different disclosure regimes. However, to the extent that certain other
existing requirements may involve monitoring cybersecurity incidents or
assessing an incident's impact on the registrant, the registrant may be
able to leverage existing disclosures to reduce the burden of complying
with the final rules. Additionally, as noted in Section II.A.3 those
other regulations generally serve different purposes than the final
rules, and we believe that the benefits of the final rules justify the
costs.
---------------------------------------------------------------------------
\513\ See letter from SIFMA.
---------------------------------------------------------------------------
One commenter raised a concern that the costs of the rules reached
the threshold of an ``economically significant rulemaking'' under the
Unfunded Mandate Reform Act of 1995 (``UMRA'') and the Small Business
Regulatory Enforcement Fairness Act, thus requiring an ``enhanced
economic analysis.'' \514\ The requirement to issue an analysis under
the UMRA does not apply to rules issued by independent regulatory
agencies.\515\
---------------------------------------------------------------------------
\514\ See letter from Chamber.
\515\ See 2 U.S.C. 658 (``The term `agency' has the same meaning
as defined in section 551(1) of title 5, United States Code, but
does not include independent regulatory agencies.''). See also
Congressional Research Service, Unfunded Mandates Reform Act:
History, Impact, and Issues (July 17, 2020), available at https://sgp.fas.org/crs/misc/R40957.pdf (noting ``[UMRA] does not apply to
duties stemming from participation in voluntary federal programs
[or] rules issued by independent regulatory agencies'').
---------------------------------------------------------------------------
The compliance costs of the final rules could be disproportionately
burdensome to smaller registrants, as some of these costs may have a
fixed component that does not scale with the size of the
registrant.\516\ Also, smaller registrants may have fewer resources
with which to implement these changes.\517\ One commenter suggested
this could lead some small companies seeking to conduct an initial
public offering to reconsider.\518\ Commenters also noted that smaller
companies may not yet have a mature reporting regime and organizational
structure and would benefit from an onramp to compliance.\519\ We are
not adopting some proposed requirements (e.g., disclosing whether the
board includes a cybersecurity expert), and thus the cost burden of the
final rules should not be as high as initially proposed. We also are
delaying compliance for incident disclosure for smaller reporting
companies by providing an additional phase-in period of 180 days after
the non-smaller reporting company compliance date for smaller reporting
companies, which will delay compliance with these requirements for 270
days from effectiveness of the rules.\520\ To the extent smaller
reporting
[[Page 51935]]
companies are less likely than larger companies to have incident
disclosure processes in place, they could benefit from additional time
to comply. An extended compliance date may also permit smaller
reporting companies to benefit from seeing how larger companies
implement these disclosures. Investors in these smaller registrants
could benefit from higher disclosure quality afforded by the delay,
although some benefits, such as the reduction in asymmetric information
and mispricing, would also be delayed.
---------------------------------------------------------------------------
\516\ See infra Section VI.
\517\ See, e.g., letter from SBA.
\518\ See letter from BIO.
\519\ See, e.g., letter from BIO.
\520\ See supra Section II.I.
---------------------------------------------------------------------------
3. Indirect Economic Effects
While the final rules only require disclosures--not changes to risk
management practices--the requirement to disclose and the disclosures
themselves could result in certain indirect benefits and costs. In
anticipating investor reactions to the required disclosures, for
example, registrants might devote more resources to cybersecurity
governance and risk management in order to be able to disclose those
efforts. Although not the purpose of this rule, registrants devoting
resources to cybersecurity governance and risk management could reduce
both their susceptibility to a cybersecurity attack, reducing the
likelihood of future incidents, as well as the degree of harm suffered
from an incident, benefiting registrants and investors. The choice to
dedicate these resources would also represent an indirect cost of the
final rules, to the extent registrants do not already have governance
and risk management measures in place. As with compliance costs, the
cost of improving cybersecurity governance and risk management could be
proportionally higher for smaller companies if these registrants have
fewer resources to implement these changes, and to the extent these
costs do not scale with registrant size.
In addition, the requirement to tag the cybersecurity disclosure in
Inline XBRL could have indirect effects on registrants. As discussed in
Section III.C.1.a.(ii), XBRL requirements for public operating company
financial statement disclosures have been observed to reduce
information processing cost. This reduction in information processing
cost has been observed to facilitate the monitoring of registrants by
other market participants, and, as a result, to influence registrants'
behavior, including their disclosure choices.\521\
---------------------------------------------------------------------------
\521\ See supra note 485.
---------------------------------------------------------------------------
The requirement in Item 1.05 that registrants timely disclose
material cybersecurity incidents could also indirectly affect
consumers, and external stakeholders such as other registrants in the
same industry and those facing similar cybersecurity threats.
Cybersecurity incidents can harm not only the company that suffers the
incident but also other businesses and consumers. For example, a
cybersecurity breach at one company, such as a gas pipeline, or a power
company, may cause a major disruption or shutdown of a critical
infrastructure industry, resulting in broad losses throughout the
economy.\522\ Timely disclosure of cybersecurity incidents required by
Item 1.05 could increase awareness by those external stakeholders and
companies in the same industry that the malicious activities are
occurring, giving them more time to mitigate any potential damage.
---------------------------------------------------------------------------
\522\ See Lawrence A. Gordon, et al., Externalities and the
Magnitude of Cyber Security Underinvestment by Private Sector Firms:
A Modification of the Gordon-Loeb Model, 6 J. Info. Sec. 24, 25
(2015) (``Firms in the private sector of many countries own a large
share of critical infrastructure assets. Hence, cybersecurity
breaches in private sector firms could cause a major disruption of a
critical infrastructure industry (e.g., delivery of electricity),
resulting in massive losses throughout the economy, putting the
defense of the nation at risk.''). See also Collin Eaton and Dustin
Volz, U.S. Pipeline Cyberattack Forces Closure, Wall St. J. (May 8,
2021), available at https://www.wsj.com/articles/cyberattack-forces-closure-of-largest-u-s-refined-fuel-pipeline-11620479737.
---------------------------------------------------------------------------
To the extent that Item 1.05 increases incident disclosure,
consumers may learn about a particular cybersecurity breach and
therefore take appropriate actions to limit potential economic harm
that they may incur from the breach. For example, there is evidence
that increased disclosure of cybersecurity incidents by companies can
reduce the risk of identity theft for individuals.\523\ Also, consumers
may be able to make better informed decisions about which companies to
entrust with their personal information.
---------------------------------------------------------------------------
\523\ See Sasha Romanosky, Rahul Telang, and Alessandro
Acquisti, Do Data Breach Disclosure Laws Reduce Identity Theft?, 30
(2) J. of Pol'y. Analysis and Mgmt. 272, 256-286 (2011) (finding
that the adoption of State-level data breach disclosure laws reduced
identity theft by 6.1%).
---------------------------------------------------------------------------
As discussed above, to the extent that registrants may decide to
enhance their cybersecurity risk management in anticipation of the
increased disclosure, that could reduce registrants' susceptibility to
and damage incurred from a cybersecurity attack. This reduced
likelihood of and vulnerability to future incidents could reduce the
negative externalities of those incidents, leading to positive
spillover effects and a reduction in overall costs to society from
these attacks.
However, the magnitude of this and the other indirect effects
discussed above would depend upon factors outside of the specific
disclosures provided in response to the final rule, and therefore it is
difficult to assess with certainty the likelihood or extent of these
effects.
D. Effects on Efficiency, Competition, and Capital Formation
We believe the final rules should have positive effects on market
efficiency. As discussed above, the final rules should improve the
timeliness and informativeness of cybersecurity incident and risk
disclosure. As a result of the disclosure required by the final rules,
investors and other market participants should better understand the
cybersecurity threats registrants are facing, their potential impact,
and registrants' ability to respond to and manage risks. Investors and
other market participants should thereby better evaluate registrants'
securities and make more informed decisions. As a result, the required
disclosures should reduce information asymmetry and mispricing in the
market, improving market efficiency. More efficient prices should
improve capital formation by increasing overall public trust in
markets, leading to greater investor participation and market
liquidity.
The final rules also could promote competition among registrants
with respect to improvement in both their cybersecurity risk management
and transparency in communicating their cybersecurity processes. To the
extent investors view strong cybersecurity risk management, strategy,
and governance favorably, registrants disclosing more robust processes,
more clearly, could benefit from greater interest from investors,
leading to higher market liquidity relative to companies that do not.
Customers may also be more likely to entrust their business to
companies that protect their data. Registrants that to date have
invested less in cybersecurity preparation could thus be incentivized
to invest more, to the benefit of investors and customers, in order to
become more competitive. To the extent that increased compliance costs
resulting from the final rules prevent smaller companies from entering
the market, as a commenter suggested,\524\ the final rules could reduce
the ability of smaller companies to compete and thereby reduce
competition overall.
---------------------------------------------------------------------------
\524\ See letter from BIO.
---------------------------------------------------------------------------
[[Page 51936]]
E. Reasonable Alternatives
1. Website Disclosure
As an alternative to Form 8-K disclosure of material cybersecurity
incidents, we considered providing registrants with the option of
disclosing this information instead through company websites, if the
company disclosed its intention to do so in its most recent annual
report, and subject to information availability and retention
requirements. While this approach may be less costly for the company
because it may involve fewer compliance costs, disclosures made on
company websites would not be located in a central depository, such as
the EDGAR system,\525\ and would not be in the same place as other
registrants' disclosures of material cybersecurity incidents, nor would
they be organized into the standardized sections found in Form 8-K and
could thus be less uniform. Even if we required registrants to announce
the disclosure, or to alert the Commission to it, the information would
still be more difficult for investors and market participants to locate
and less uniform than Form 8-K.
---------------------------------------------------------------------------
\525\ EDGAR, the Electronic Data Gathering, Analysis, and
Retrieval system, is the primary system for companies and others
submitting documents under the Securities Act, the Exchange Act, the
Trust Indenture Act of 1939, and the Investment Company Act. EDGAR's
public database can be used to research a public company's financial
information and operations.
---------------------------------------------------------------------------
The lack of a central repository, and a lack of uniformity of
website disclosures, could increase the costs for investors and other
market participants to search for and process the information to
compare cybersecurity risks across registrants. Additionally, such
disclosure might not be preserved on the company's website for as long
as it would be on the EDGAR system when the disclosure is filed with
the Commission, because registrants may not keep historical information
available on their websites indefinitely and it could be difficult to
determine whether the website information had moved or changed.
Therefore, this approach would be less beneficial to investors, other
market participants, and the overall efficiency of the market.
2. Disclosure Through Periodic Reports
We also considered requiring disclosure of material cybersecurity
incidents through quarterly or annual reports, as proposed, instead of
Form 8-K. Reporting material cybersecurity incidents at the end of the
quarter or year would allow registrants more time to assess the
financial impact of such incidents. The resulting disclosure might be
more specific or informative for investors and other market
participants to value the securities and make more informed decisions.
The compliance costs would be less under this alternative, because
registrants would not have to file as frequently. And, it might further
reduce the risk that disclosure could provide timely information to
attackers.
However, this alternative also would lead to less timely reporting
on material cybersecurity incidents. As a result, the market would not
be able to incorporate the information related to cybersecurity risk
into securities prices in as timely a manner, and investors and other
market participants would not be able to make as informed decisions as
they could under the requirements of Item 1.05. Additionally, as
previously discussed, less timely reporting could adversely impact
external stakeholders, such as other registrants in the same industry
and those facing similar cybersecurity threats, and consumers whose
data were compromised.
Relatedly, we proposed requiring registrants to disclose material
changes and additions to previously reported cybersecurity incidents on
Forms 10-K and 10-Q instead of on an amended Form 8-K. However, as
discussed above, we believe using Form 8-K would be more timely and
consistent; \526\ all disclosures concerning material cybersecurity
incidents, whether new or containing information not determined or
unavailable initially, will be disclosed on the same form.
---------------------------------------------------------------------------
\526\ See supra Section II.B.3.
---------------------------------------------------------------------------
3. Exempt Smaller Reporting Companies
We also considered exempting smaller reporting companies from the
final rules.\527\ Exempting smaller reporting companies from the
disclosure requirements of the final rules would avoid compliance costs
for smaller companies, including those compliance costs that could
disproportionately affect smaller companies.\528\ As noted earlier,
however, we are not adopting some proposed requirements (e.g.,
disclosing whether the board includes a cybersecurity expert) and
modifying others (e.g., requiring a description of cybersecurity
``processes'' instead of more formal ``policies and procedures''), and
thus the cost burden of the final rules should not be as high as
initially proposed. This should mitigate some of the concerns raised by
commenters and would also reduce the potential value of an exemption.
Moreover, an exemption would remove the benefit to investors of
informative, timely, uniform, and comparable disclosure with regard to
smaller companies. And although one commenter argued for an exemption
based on a perception that smaller companies are less likely to
experience cybersecurity incidents,\529\ for the reasons explained in
Section IV.C.1.b, we believe that smaller companies are still at risk
for material cybersecurity incidents. This aligns with comments we
received opposing an exemption for smaller reporting companies.\530\
---------------------------------------------------------------------------
\527\ See supra Section II.G.2.
\528\ See supra Section II.G.2.
\529\ See letter from BIO.
\530\ See, e.g., letters from Cybersecurity Coalition; Tenable.
---------------------------------------------------------------------------
Lastly, one commenter that argued for an exemption cited the
Proposing Release, which noted a potential for increased cost of
capital for registrants that do not have cybersecurity programs once
disclosures are mandated; the commenter stated that these would
disproportionately be smaller registrants.\531\ We have reconsidered
the argument that registrants without robust cybersecurity processes in
place might face a higher cost of capital and as a result would be
priced unfavorably, and no longer believe it to be accurate. It is
indeed possible that companies that reveal what investors consider to
be less robust cybersecurity risk management, strategy, and governance
processes may experience a decline in stock price. However, because the
risk of cybersecurity attacks should be idiosyncratic, this decline
would likely be due to investors updating their expectations of future
cash flows for this firm to incorporate higher likelihood of a future
incident--moderating the decline should future incidents occur--not an
increase in fundamental market risk and thus cost of capital. In
addition, to the extent investors already rationally anticipate that
smaller registrants or registrants that have not previously disclosed
such information have less robust policies, there may be less or no
stock price decline as a result of Item 106, as these disclosures would
merely confirm expectations. Thus, increases in cost of capital should
not be prevalent in this regard and should not be a reason to exempt
small firms from the final rules.
---------------------------------------------------------------------------
\531\ See letter from BIO.
---------------------------------------------------------------------------
V. Paperwork Reduction Act
A. Summary of the Collections of Information
Certain provisions of our rules and forms that will be affected by
the final rules contain ``collection of information'' requirements
within the meaning of the Paperwork Reduction
[[Page 51937]]
Act (``PRA'').\532\ The Commission published a notice requesting
comment on changes to these collections of information in the Proposing
Release and submitted these requirements to the Office of Management
and Budget (``OMB'') for review in accordance with the PRA.\533\
---------------------------------------------------------------------------
\532\ 44 U.S.C. 3501 et seq.
\533\ 44 U.S.C. 3507(d) and 5 CFR 1320.11.
---------------------------------------------------------------------------
The hours and costs associated with preparing, filing, and sending
the forms constitute reporting and cost burdens imposed by each
collection of information. An agency may not conduct or sponsor, and a
person is not required to comply with, a collection of information
unless it displays a currently valid OMB control number. Compliance
with the information collections is mandatory. Responses to the
information collections are not kept confidential and there is no
mandatory retention period for the information disclosed. The titles
for the affected collections of information are: \534\
---------------------------------------------------------------------------
\534\ The Proposing Release also listed ``Schedule 14A'' (OMB
Control No. 3235-0059), ``Schedule 14C'' (OMB Control No. 3235-
0057), and ``Form 10-Q'' (OMB Control No. 3235-0070) as affected
collections of information. However, under the final rules, these
schedules and form are no longer affected.
---------------------------------------------------------------------------
``Form 8-K'' (OMB Control No. 3235-0060);
``Form 6-K'' (OMB Control No. 3235-0116);
``Form 10-K'' (OMB Control No. 3235-0063); and
``Form 20-F'' (OMB Control No. 3235-0288).
The Commission adopted all of the existing regulations and forms
pursuant to the Securities Act and the Exchange Act. The regulations
and forms set forth disclosure requirements for current reports and
periodic reports filed by registrants to help shareholders make
informed voting and investment decisions.
A description of the final amendments, including the need for the
information and its use, as well as a description of the likely
respondents, can be found in Section II above, and a discussion of the
economic effects of the final amendments can be found in Section IV
above.
B. Summary of Comment Letters and Revisions to PRA Estimates
In the Proposing Release, the Commission requested comment on the
PRA burden hour and cost estimates and the analysis used to derive the
estimates.\535\ While a number of parties commented on the potential
costs of the proposed rules, only one commenter spoke specifically to
the PRA analysis, arguing that the proposal ``cannot be justified under
the Paperwork Reduction Act'' because of an ``unreasonable'' number of
separate disclosures and because ``the amount of information the
Proposal would require to be produced is unwarranted in light of other,
existing regulations.'' \536\ The commenter further alleged that the
Proposing Release's ``calculation of costs and benefits is skewed''
because ``[d]ifferent but overlapping disclosure and reporting
requirements do not correlate with lower burdens on information
providers, but rather, escalated burdens and costs.''
---------------------------------------------------------------------------
\535\ Proposing Release at 16616-16617.
\536\ See letter from SIFMA.
---------------------------------------------------------------------------
While we acknowledge the commenter's concerns about costs of the
proposal, for the reasons discussed in Section II.H and elsewhere
throughout this release, we believe the information required by the
final rules is necessary and appropriate in the public interest and for
the protection of investors. Further, a discussion of the economic
effects of the final amendments, including consideration of comments
that expressed concern about the expected costs associated with the
proposed rules, can be found in Section IV above. With regard to the
calculation of paperwork burdens, we note that both the Proposing
Release's PRA analysis and our PRA analysis of the final amendments
here estimate the incremental burden of each new or revised disclosure
requirement individually and fully comport with the requirements of the
PRA. Our estimates reflect the modifications to the proposed rules that
we are adopting in response to commenter concerns, including
streamlining some of the proposed rule's elements to address concerns
regarding the level of detail required and the anticipated costs of
compliance.
C. Effects of the Amendments on the Collections of Information
The following PRA Table 1 summarizes the estimated effects of the
final amendments on the paperwork burdens associated with the affected
collections of information listed in Section V.A.
PRA Table 1--Estimated Paperwork Burden of Final Amendments
----------------------------------------------------------------------------------------------------------------
Estimated burden Number of estimated
Final amendments and effects Affected forms increase affected responses *
----------------------------------------------------------------------------------------------------------------
Form 8-K:
Add Item 1.05 requiring Form 8-K............... 9 hour increase in 200 Filings.
disclosure of material compliance burden per
cybersecurity incidents within form.
four business days following
determination of materiality.
Form 6-K:
Add ``cybersecurity Form 6-K............... 9 hour increase in 20 Filings.
incident'' to the list in compliance burden per
General Instruction B of form.
information required to be
furnished on Form 6-K.
Regulation S-K Item 106:
Add Item 106(b) Form 10-K and.......... Form 10-K: 10 hour 8,292 Filings.
requiring disclosure regarding increase in compliance
cybersecurity risk management burden per form.
and strategy.
Add Item 106(c) Form 20-F.............. Form 20-F: 10 hour 729 Filings.
requiring disclosure regarding increase in compliance
cybersecurity governance. burden per form.
----------------------------------------------------------------------------------------------------------------
* The OMB PRA filing inventories represent a three-year average. Averages may not align with the actual number
of filings in any given year.
[[Page 51938]]
The estimated burden increases for Forms 8-K, 10-K, and 20-F
reflect changes from the estimates provided in the Proposing Release.
There, the Commission estimated that the average incremental burden for
an issuer to prepare the Form 8-K Item 1.05 disclosure would be 10
hours. The proposed estimate included the time and cost of preparing
the disclosure, as well as tagging the data in XBRL. The changes we are
making to Item 1.05 in the final rules should generally reduce the
associated burden by an incremental amount in most cases. We therefore
estimate that Form 8-K Item 1.05 will have a burden of 9 hours, on par
with the average burdens of existing Form 8-K items, which is 9.21
hours.
In the Proposing Release, the Commission estimated that the average
incremental burden for preparing Form 10-K stemming from proposed Item
106 would be 15 hours. Similarly, the Commission estimated that
proposed Item 106 would result in an average incremental burden for
preparing Form 20-F of 16.5 hours. The proposed estimates included the
time and cost of preparing the disclosure, as well as tagging the data
in XBRL. We estimate the changes we are making to Item 106 in the final
rules should generally reduce the associated burden by one-third due to
the elimination of many of the proposed disclosure items; accordingly,
we have reduced the estimated burden to 10 hours from 15 hours for Form
10-K, and to 10 hours from 16.5 hours for Form 20-F.\537\
---------------------------------------------------------------------------
\537\ Note that, in the proposal, a portion of the burden for
companies reporting on Form 10-K was allocated to Schedule 14A, as a
result of certain disclosure items being proposed to be included in
Rule 407 of Regulation S-K. By contrast, since registrants reporting
on Form 20-F do not have an analogous form to Schedule 14A, the
comparable burden to Schedule 14A was attributable to Form 20-F.
Since we are not adopting Item 407 as proposed, and we do not expect
any disclosures on Schedule 14A, the estimates for Form 10-K and
Form 20-F are now aligned.
---------------------------------------------------------------------------
We have not modified the estimated number of estimated affected
responses for Form 8-K and Form 6-K from what was proposed. As noted in
the Proposing Release, not every filing of these forms would include
responsive disclosures. Rather, these disclosures would be required
only when a registrant has made the determination that it has
experienced a material cybersecurity incident. Further, in the case of
Form 6-K, the registrant would only have to provide the disclosure if
it is required to disclose such information elsewhere.
D. Incremental and Aggregate Burden and Cost Estimates for the Final
Amendments
Below we estimate the incremental and aggregate increase in
paperwork burden as a result of the final amendments. These estimates
represent the average burden for all respondents, both large and small.
In deriving our estimates, we recognize that the burdens will likely
vary among individual respondents and from year to year based on a
number of factors, including the nature of their business.
The burden estimates were calculated by multiplying the estimated
number of responses by the estimated average amount of time it would
take a registrant to prepare and review disclosure required under the
final amendments. For purposes of the PRA, the burden is to be
allocated between internal burden hours and outside professional costs.
PRA Table 2 below sets forth the percentage estimates we typically use
for the burden allocation for each collection of information. We also
estimate that the average cost of retaining outside professionals is
$600 per hour.\538\
---------------------------------------------------------------------------
\538\ We recognize that the costs of retaining outside
professionals may vary depending on the nature of the professional
services, but for purposes of this PRA analysis, we estimate that
such costs would be an average of $600 per hour. At the proposing
stage, we used an estimated cost of $400 per hour. We are increasing
this cost estimate to $600 per hour to adjust the estimate for
inflation from Aug. 2006.
PRA Table 2--Standard Estimated Burden Allocation for Specified
Collections of Information
------------------------------------------------------------------------
Outside
Collection of information Internal professionals
(percent) (percent)
------------------------------------------------------------------------
Form 10-K, Form 6-K, and Form 8-K. 75 25
Form 20-F......................... 25 75
------------------------------------------------------------------------
PRA Table 3 below illustrates the incremental change to the total
annual compliance burden of affected collections of information, in
hours and in costs, as a result of the final amendments.
PRA Table 3--Calculation of the Incremental Change in Burden Estimates of Current Responses Resulting From the Final Amendments
--------------------------------------------------------------------------------------------------------------------------------------------------------
Number of
estimated Burden hour Change in burden Change in professional Change in
Collection of information affected increase per hours Change in company hours hours professional
responses response costs
(A) * (B) (C) = (A) x (B) ** (D) = (C) x 0.75 or .25 (E) = (C) x 0.25 or .75 (F) = (E) x $600
--------------------------------------------------------------------------------------------------------------------------------------------------------
8-K................................. 200 9 1,800 1,350 450 $270,000
6-K................................. 20 9 180 135 45 27,000
10-K................................ 8,292 10 82,920 62,190 20,730 12,438,000
20-F................................ 729 10 7,290 1,822.50 5,467.50 3,280,500
--------------------------------------------------------------------------------------------------------------------------------------------------------
* The number of estimated affected responses is based on the number of responses in the Commission's current OMB PRA filing inventory. The OMB PRA
filing inventory represents a three-year average.
** The estimated changes in Columns (C), (D), and (E) are rounded to the nearest whole number.
The following PRA Table 4 summarizes the requested paperwork
burden, including the estimated total reporting burdens and costs,
under the final amendments.
[[Page 51939]]
PRA Table 4--Requested Paperwork Burden Under the Final Amendments
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Current burden Program change Revised burden
-------------------------------------------------------------------------------------------------------------------------------
Change in
Form Current Current Current cost number of Change in Change in Annual
annual burden burden affected company professional responses Burden hours Cost burden
responses hours responses hours costs
(A) (B) (C) (D) (E) (F) [Dagger] (G) = (A) + (H) = (B) + (I) = (C) +
[dagger] (D) (E) (F)
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Form 8-K........................................................ 118,387 818,158 $108,674,430 200 1,350 $270,000 118,587 819,508 $108,944,430
Form 6-K........................................................ 34,794 227,031 30,270,780 20 135 27,000 34,814 227,166 30,297,780
Form 10-K....................................................... 8,292 13,988,770 1,835,588,919 .......... 62,190 12,438,000 8,292 14,050,960 1,848,026,919
Form 20-F....................................................... 729 478,983 576,490,625 .......... 1,822.50 3,280,500 729 480,805.50 579,771,125
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
[dagger] From Column (D) in PRA Table 3.
[Dagger] From Column (F) in PRA Table 3.
VI. Final Regulatory Flexibility Analysis
The Regulatory Flexibility Act (``RFA'') requires the Commission,
in promulgating rules under Section 553 of the Administrative Procedure
Act,\539\ to consider the impact of those rules on small entities. We
have prepared this Final Regulatory Flexibility Analysis (``FRFA'') in
accordance with Section 604 of the RFA.\540\ An Initial Regulatory
Flexibility Analysis (``IRFA'') was prepared in accordance with the RFA
and was included in the Proposing Release.\541\
---------------------------------------------------------------------------
\539\ 5 U.S.C. 553.
\540\ 5 U.S.C. 604.
\541\ Proposing Release at 16617.
---------------------------------------------------------------------------
A. Need for, and Objectives of, the Final Amendments
The purpose of the final amendments is to ensure investors and
other market participants receive timely, decision-useful information
about registrants' material cybersecurity incidents, and periodic
information on registrants' approaches to cybersecurity risk
management, strategy, and governance that is standardized and
comparable across registrants. The need for, and objectives of, the
final rules are described in Sections I and II above. We discuss the
economic impact and potential alternatives to the amendments in Section
IV, and the estimated compliance costs and burdens of the amendments
under the PRA in Section V.
B. Significant Issues Raised by Public Comments
In the Proposing Release, the Commission requested comment on any
aspect of the IRFA, and particularly on the number of small entities
that would be affected by the proposed amendments, the existence or
nature of the potential impact of the proposed amendments on small
entities discussed in the analysis, how the proposed amendments could
further lower the burden on small entities, and how to quantify the
impact of the proposed amendments.
We received one comment letter on the IRFA, from the U.S. Small
Business Administration's Office of Advocacy (``Advocacy'').\542\
Advocacy's letter expressed concern that ``the IRFA does not adequately
describe the regulated small entities and potential impacts on those
entities.'' \543\ In the Proposing Release, the Commission estimated
that the proposed amendments would apply to 660 issuers and 9 business
development companies that may be considered small entities.\544\
Advocacy's comment letter stated that this estimate did ``not provide
additional information, such as the North American Industry
Classification System (``NAICS'') classifications of the affected
entities'' and did not ``break down the affected entities into smaller
size groups (e.g., based on total assets).'' \545\ It also stated that
the IRFA did not ``adequately analyze the relative impact of costs to
small entities.'' \546\ In this vein, it suggested that emerging growth
companies (``EGCs'') may face particular challenges complying with the
proposed rules.\547\ In particular, Advocacy's comment letter stated
that ``[e]merging growth companies may have little or no revenue to
afford the additional cost burden of the proposed rules and may not
have access to the cybersecurity expertise necessary to comply with the
new disclosure requirements.'' \548\
---------------------------------------------------------------------------
\542\ See letter from U.S. Small Business Administration Office
of Advocacy. We also received some comments that, while not
specifically addressed to the IRFA, did concern the impact of the
proposed rules on smaller reporting companies. See letters from BDO;
BIO; CSA; Cybersecurity Coalition; NACD; NASAA; Nasdaq; NDIA; Prof.
Perullo; Tenable. We have addressed those comments in Section
II.G.2, supra, and incorporate those responses here as applicable to
our RFA analysis. We also note the recommendations for all
Commission rulemakings from the Office of the Advocate for Small
Business Capital Formation. See 2022 OASB Annual Report.
\543\ Id.
\544\ Proposing Release at 16617.
\545\ See letter from Advocacy.
\546\ Id.
\547\ Id.
\548\ Id.
---------------------------------------------------------------------------
The comment letter from Advocacy also addressed the discussion of
alternatives within the IRFA and the Commission's explanation of why it
did not ultimately propose such alternatives. Advocacy stated that
``[t]he RFA requires that an IRFA provide significant, feasible
alternatives that accomplish an agency's objectives,'' and stated that
the IRFA did not satisfy this requirement because it listed ``broad
categories of potential alternatives to the proposed rules but [did]
not analyze any specific alternative that was considered by the SEC,''
and because it did not ``contain a description of significant
alternatives which accomplish the stated SEC objectives and which
minimize the significant economic impact of the proposal on small
entities.''
1. Estimate of Affected Small Entities and Impact to Those Entities
With respect to the adequacy of the Proposing Release's estimate of
affected small entities, the RFA requires ``a description of and, where
feasible, an estimate of the number of small entities to which the
proposed rule will apply.'' \549\ Advocacy's published guidance
recommends agencies use NAICS classifications to help in ``identifying
the industry, governmental and nonprofit sectors they intend to
regulate.'' \550\ Here, given that the rulemaking applies to and
impacts all public company registrants, regardless of industry or
sector, we do not believe that further breakout of such registrants by
industry classification is necessary or would otherwise be helpful to
such entities understanding the impact of the
[[Page 51940]]
proposed or final rules. This is not a case in which small entities in
certain industries and sectors would be affected more than others, as
cybersecurity risks exist across industries.\551\ For the same reasons
we are not breaking down the affected entities into smaller size groups
(e.g., based on total assets) as recommended by Advocacy. Given the
nature of the final rules, we believe that our estimate of the number
of small entities to which the final rules will apply adequately
describes and estimates the small entities that will be affected.\552\
---------------------------------------------------------------------------
\549\ 5 U.S.C. 603(b)(3).
\550\ U.S. Small Business Administration Office of Advocacy, A
Guide for Government Agencies: How to Comply with the Regulatory
Flexibility Act (Aug. 2017), at 18, available at https://www.sba.gov/sites/default/files/advocacy/How-to-Comply-with-the-RFA-WEB.pdf.
\551\ A breakout would be relevant where, for example, the
Commission finds that small entities generally would not be affected
by a rule but small entities in a particular industry would be
affected.
\552\ See infra Section VI.C.
---------------------------------------------------------------------------
With respect to Advocacy's suggestion that the proposed rule may be
``particularly problematic'' for EGCs, we have discussed in Section
IV.C.2 above the anticipated costs of the final rules, including their
impact on EGCs. We also note that the category of EGC is not the same
as the category of ``small entity'' for purposes of the RFA, and indeed
EGC status is not a reliable indicator of whether a registrant is a
small entity.\553\ While EGC status does include a revenue component,
it importantly considers whether the issuer is seasoned, meaning,
whether it is a new registrant (rather than a registrant with a longer
public reporting history). Accordingly, while many EGCs are small
entities, there are many that are not. Likewise, many small entities
are not EGCs. For purposes of the FRFA, our focus is on the impact on
small entities, regardless of whether or not they are EGCs.
---------------------------------------------------------------------------
\553\ An EGC is defined as a company that has total annual gross
revenues of less than $1.235 billion during its most recently
completed fiscal year and, as of Dec. 8, 2011, had not sold common
equity securities under a registration statement. A company
continues to be an EGC for the first five fiscal years after it
completes an initial public offering, unless one of the following
occurs: its total annual gross revenues are $1.235 billion or more;
it has issued more than $1 billion in non-convertible debt in the
past three years; or it becomes a ``large accelerated filer,'' as
defined in Exchange Act Rule 12b-2.
---------------------------------------------------------------------------
We disagree with the statement in the Advocacy comment letter that
``SEC expects that the costs associated with the proposed amendments to
be similar for large and small entities.'' The Commission explained in
the IRFA that the proposed amendments would apply to small entities to
the same extent as other entities, irrespective of size, and that
therefore, the Commission expected that ``the nature of any benefits
and costs associated with the proposed amendments to be similar for
large and small entities'' (emphasis added).\554\ The analysis with
respect to the nature of the costs (and benefits) of the proposed rules
detailed in the Economic Analysis of the Proposing Release was
referenced in the IRFA to help small entities understand such impacts,
not to imply that small entities face the same degree of costs as large
entities. Indeed, the Commission went on to state in both the IRFA and
the Economic Analysis of the Proposing Release that, while it was
unable to project the economic impacts on small entities with
precision, it recognized that ``the costs of the proposed amendments
borne by the affected entities could have a proportionally greater
effect on small entities, as they may be less able to bear such costs
relative to larger entities.'' \555\ Additionally, in Section IV,
above, we discuss the economic effects, including costs, of the final
amendments across all entities. We recognize that to the extent the
costs are generally uniform across all entities, they would have a
relatively greater burden on smaller entities. That said, as discussed
both above and below, to help mitigate that relatively greater burden
and to respond to comment letters including the letter from Advocacy,
we have extended the compliance date for smaller reporting companies so
as to provide additional transition time and allow them to benefit from
the experience of larger companies. Accordingly, we believe that both
this FRFA and our prior IRFA adequately describe and analyze the
relative impact of costs to small entities.
---------------------------------------------------------------------------
\554\ Proposing Release at 16617 (emphasis added).
\555\ Proposing Release at 16617-16618. See also id. at 16613
(``smaller companies might incur a cost that is disproportionally
high, compared to larger companies under the proposed rules'').
---------------------------------------------------------------------------
2. Consideration of Alternatives
The IRFA's discussion of significant alternatives, and our
discussion of alternatives below, satisfy the RFA. The relevant RFA
requirement provides that an IRFA ``shall also contain a description of
any significant alternatives to the proposed rule which accomplish the
stated objectives of applicable statutes and which minimize any
significant economic impact of the proposed rule on small entities.''
\556\ In the Proposing Release, the Commission discussed each of the
types of significant alternatives noted in Section 603 of the RFA and
concluded that none of these alternatives would accomplish the stated
objectives of the rulemaking while minimizing any significant impact on
small entities. In addition, Section III.E of the Proposing Release
discussed reasonable alternatives to the proposed rules and their
economic impacts. Similarly, in addition to the discussion in Section
VI.E below, in Section IV.E of this release we also discuss reasonable
alternatives of the final rules and their economic impacts.
---------------------------------------------------------------------------
\556\ 5 U.S.C. 603(c).
---------------------------------------------------------------------------
While not commenting on the alternatives raised in the IRFA
specifically, two commenters stated that the final rules should exempt
smaller businesses. One of these commenters stated that small companies
in the biotechnology industry ``do not have the capacity, nor the
business need, to have institutional structures related to the
management, planning, oversight, and maintenance of cybersecurity
related systems and suppliers. These companies should not have to hire
extra employees specifically for the purposes of implementing
cybersecurity related programs.'' \557\ The other commenter noted that,
with respect to the proposed requirement to require disclosure about
the cybersecurity expertise of board members, small companies ``have
limited resources to begin with, and may find it more difficult than
large companies to identify board members with requisite cyber
expertise given that there already is a lack of talent in this area.''
\558\
---------------------------------------------------------------------------
\557\ See letter from BIO.
\558\ See letter from NDIA.
---------------------------------------------------------------------------
With respect to the first of these commenters, we note that neither
the proposed nor the final rules require any company to ``implement new
management structures'' or otherwise adopt or change ``institutional
structures related to the management, planning, oversight, and
maintenance of cybersecurity related systems and suppliers.'' \559\ The
final rules instead call for disclosure of a registrant's processes, if
any, for assessing, identifying, and managing material cybersecurity
risks. To the extent that a registrant does not have such processes,
the final rules do not impose any additional costs. With respect to the
second of these commenters, we note that, consistent with commenter
feedback and for the reasons discussed above, we have not adopted the
proposed requirement related to disclosure of board cybersecurity
expertise.
---------------------------------------------------------------------------
\559\ The quoted language is from the BIO letter.
---------------------------------------------------------------------------
Finally, we note that many commenters explicitly opposed exempting
smaller businesses from the proposed rules,\560\ in part because they
may face equal \561\ or greater \562\
[[Page 51941]]
cybersecurity risk than larger companies, or because investors'
relative share in a smaller company may be higher, such that small
companies' cybersecurity risk ``may actually embody the most pressing
cybersecurity risk to an investor.'' \563\ We agree with these
analyses,\564\ and accordingly are not exempting small entities from
the final rules. However, as discussed above, in response to concerns
about the impact of the rules on smaller companies and in order to
provide smaller reporting companies with additional time to prepare to
comply with the incident disclosure requirements, we are providing such
registrants with an additional 180 days from the non-smaller reporting
company compliance date before they must comply with the new Form 8-K
requirement.
---------------------------------------------------------------------------
\560\ See letters from CSA; Cybersecurity Coalition; NASAA;
Prof. Perullo; Tenable.
\561\ See letter from Cybersecurity Coalition.
\562\ See letters from NASAA and Tenable.
\563\ See letter from Prof. Perullo.
\564\ We note that one commenter stated its conclusion that
``cyberattacks mainly affect larger companies.'' See letter from
BIO. The basis of the commenter's assertion is that mean market
capitalization of impacted companies in the relevant study cited in
the Proposing Release is $58.9 billion (Kamiya, et al. (2021)),
which it notes is much higher than the average for small companies,
and thus concludes that ``cyberattacks mainly affect large companies
and are not material for smaller companies.'' As noted in Section
IV, supra, an average market capitalization of $58.9 billion does
not preclude the existence of numerous companies much smaller (and
larger) than that amount. See supra note 478. The commenter
additionally notes that the relevant study states that ``firms are
more likely to experience cyberattacks when they are larger.'' To
the extent that smaller entities face fewer cyber incidents, that
would result in a less frequent need to analyze whether disclosure
of such incidents is required under the final rules. However, even
if smaller entities are less likely to experience a cyberattack,
this would not negate the analysis that such attacks, when they do
occur, are more likely to be material for the reasons discussed
above.
---------------------------------------------------------------------------
C. Small Entities Subject to the Final Amendments
The final amendments would apply to registrants that are small
entities. The RFA defines ``small entity'' to mean ``small business,''
``small organization,'' or ``small governmental jurisdiction.'' \565\
For purposes of the RFA, under our rules, a registrant, other than an
investment company, is a ``small business'' or ``small organization''
if it had total assets of $5 million or less on the last day of its
most recent fiscal year and is engaged or proposing to engage in an
offering of securities that does not exceed $5 million.\566\ An
investment company, including a business development company,\567\ is
considered to be a ``small business'' if it, together with other
investment companies in the same group of related investment companies,
has net assets of $50 million or less as of the end of its most recent
fiscal year.\568\ We estimate that, as of December 31, 2022, there were
approximately 800 issuers and 10 business development companies that
may be considered small entities that would be subject to the final
amendments.
---------------------------------------------------------------------------
\565\ 5 U.S.C. 601(6).
\566\ See 17 CFR 240.0-10(a) [Exchange Act Rule 0-10(a)].
\567\ Business development companies are a category of closed-
end investment company that are not registered under the Investment
Company Act [15 U.S.C. 80a-2(a)(48) and 80a-53 through 64].
\568\ 17 CFR 270.0-10(a).
---------------------------------------------------------------------------
D. Projected Reporting, Recordkeeping, and other Compliance
Requirements
Per the final rules, registrants will be required to report
material cybersecurity incidents on Form 8-K and Form 6-K for FPIs, and
will be required to describe in their annual reports on Forms 10-K and
20-F certain aspects of their cybersecurity risk management, strategy,
and governance, if any. The final amendments are described in more
detail in Section II above. These requirements generally will apply to
small entities to the same extent as other entities, irrespective of
size or industry classification, although we are adopting a later
compliance date for smaller reporting companies in response to concerns
raised by commenters. We continue to expect that the nature of any
benefits and costs associated with the amendments to be similar for
large and small entities, and so we refer to the discussion of the
amendments' economic effects on all affected parties, including small
entities, in Section IV above. Also consistent with the discussion in
Sections II and IV above, we acknowledge that, in particular to the
extent that a smaller entity would be required to provide disclosure
under the final rules, it may face costs that are proportionally
greater as they may be less able to bear such costs relative to larger
entities. However, as discussed in in Section IV, we anticipate that
the economic benefits and costs likely could vary widely among small
entities based on a number of factors, such as the nature and conduct
of their businesses, including whether the company actively manages
material cybersecurity risks, which makes it difficult to project the
economic impact on small entities with precision. To the extent that
the disclosure requirements have a greater effect on small registrants
relative to large registrants, they could result in adverse effects on
competition. The fixed component of the legal costs of preparing the
disclosure would be a primary contributing factor. Compliance with
certain provisions of the final amendments may require the use of
professional skills, including legal, accounting, and technical skills.
E. Agency Action To Minimize Effect on Small Entities
The RFA directs us to consider alternatives that would accomplish
our stated objectives, while minimizing any significant adverse impact
on small entities. Accordingly, we considered the following
alternatives:
Exempting small entities from all or part of the
requirements;
Establishing different compliance or reporting
requirements that take into account the resources available to small
entities;
Using performance rather than design standards; and
Clarifying, consolidating, or simplifying compliance and
reporting requirements under the rules for small entities.
The rules are intended to better inform investors about
cybersecurity incidents and, if any, the cybersecurity risk management,
strategy, and governance of registrants of all types and sizes that are
subject to the Exchange Act reporting requirements. We explain above in
Sections II and IV that current requirements and guidance are not
yielding uniform, comparable disclosure sufficient to meet investors'
needs. The disclosure that does exist is scattered in various parts of
registrants' filings, making it difficult for investors to locate,
analyze, and compare across registrants. Staff has also observed that
smaller reporting companies generally provide less cybersecurity
disclosure as compared to larger registrants, and commenters agreed
that there is a need for cybersecurity disclosure from small
companies.\569\
---------------------------------------------------------------------------
\569\ See supra notes 339 to 342 and accompanying text.
---------------------------------------------------------------------------
Given the current disclosure landscape, exempting small entities or
otherwise clarifying, consolidating, or simplifying compliance and
reporting requirements under the rules for small entities would
frustrate the rulemaking's goal of providing investors with more
uniform and timely disclosure about material cybersecurity incidents
and about cybersecurity risk management, strategy, and governance
practices across all registrants. That said, as discussed in Section II
above, we have consolidated and simplified the disclosure requirements
for all entities, which should ease small entities' compliance as well.
Further, as noted above, smaller companies may face equal or greater
cybersecurity risk than
[[Page 51942]]
larger companies, making the disclosures important for investors in
these companies.
On the other hand, we believe the rulemaking's goals can be
achieved by providing smaller reporting companies with additional time
to come into compliance. Therefore, we are delaying smaller reporting
companies' required compliance date with the Form 8-K incident
disclosure requirement by an additional 180 days from the non-smaller
reporting company compliance date. This delay will benefit smaller
reporting companies both by giving them extra time to establish
disclosure controls and procedures and by allowing them to observe and
learn from best practices as they develop among larger registrants.
Similarly, the final rules incorporate a combination of performance
and design standards with respect to all subject entities, including
small entities, in order to balance the objectives and compliance
burdens of the rules. While the final rules do use design standards to
promote uniform compliance requirements for all registrants and to
address the concerns underlying the amendments, which apply to entities
of all size, they also incorporate elements of performance standards to
give registrants sufficient flexibility to craft meaningful disclosure
that is tailored to their particular facts and circumstances. For
example, the final rules require a registrant to describe its
``processes, if any, for assessing, identifying, and managing material
risks from cybersecurity threats in sufficient detail for a reasonable
investor to understand those processes.'' The rule also provides a non-
exclusive list of disclosure items that a registrant should include in
providing responsive disclosure to this performance standard; this
design element provides registrants with additional guidance with
respect to the type of disclosure topics that could be covered and
promotes consistency.
Statutory Authority
The amendments contained in this release are being adopted under
the authority set forth in Sections 7 and 19(a) of the Securities Act
and Sections 3(b), 12, 13, 15, and 23(a) of the Exchange Act.
List of Subjects in 17 CFR Parts 229, 232, 239, 240, and 249
Reporting and record keeping requirements, Securities.
Text of Amendments
For the reasons set forth in the preamble, the Commission amends
title 17, chapter II of the Code of Federal Regulations as follows:
PART 229--STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES
ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND
CONSERVATION ACT OF 1975--REGULATION S-K
0
1. The authority citation for part 229 continues to read as follows:
Authority: 15 U.S.C. 77e, 77f, 77g, 77h, 77j, 77k, 77s, 77z-2,
77z-3, 77aa(25), 77aa(26), 77ddd, 77eee, 77ggg, 77hhh, 77iii, 77jjj,
77nnn, 77sss, 78c, 78i, 78j, 78j-3, 78l, 78m, 78n, 78n-1, 78o, 78u-
5, 78w, 78ll, 78mm, 80a-8, 80a-9, 80a-20, 80a-29, 80a-30, 80a-31(c),
80a-37, 80a-38(a), 80a-39, 80b-11 and 7201 et seq.; 18 U.S.C. 1350;
sec. 953(b), Pub. L. 111-203, 124 Stat. 1904 (2010); and sec.
102(c), Pub. L. 112-106, 126 Stat. 310 (2012).
0
2. Add Sec. 229.106 to read as follows:
Sec. 229.106 (Item 106) Cybersecurity.
(a) Definitions. For purposes of this section:
Cybersecurity incident means an unauthorized occurrence, or a
series of related unauthorized occurrences, on or conducted through a
registrant's information systems that jeopardizes the confidentiality,
integrity, or availability of a registrant's information systems or any
information residing therein.
Cybersecurity threat means any potential unauthorized occurrence on
or conducted through a registrant's information systems that may result
in adverse effects on the confidentiality, integrity, or availability
of a registrant's information systems or any information residing
therein.
Information systems means electronic information resources, owned
or used by the registrant, including physical or virtual infrastructure
controlled by such information resources, or components thereof,
organized for the collection, processing, maintenance, use, sharing,
dissemination, or disposition of the registrant's information to
maintain or support the registrant's operations.
(b) Risk management and strategy. (1) Describe the registrant's
processes, if any, for assessing, identifying, and managing material
risks from cybersecurity threats in sufficient detail for a reasonable
investor to understand those processes. In providing such disclosure, a
registrant should address, as applicable, the following non-exclusive
list of disclosure items:
(i) Whether and how any such processes have been integrated into
the registrant's overall risk management system or processes;
(ii) Whether the registrant engages assessors, consultants,
auditors, or other third parties in connection with any such processes;
and
(iii) Whether the registrant has processes to oversee and identify
such risks from cybersecurity threats associated with its use of any
third-party service provider.
(2) Describe whether any risks from cybersecurity threats,
including as a result of any previous cybersecurity incidents, have
materially affected or are reasonably likely to materially affect the
registrant, including its business strategy, results of operations, or
financial condition and if so, how.
(c) Governance. (1) Describe the board of directors' oversight of
risks from cybersecurity threats. If applicable, identify any board
committee or subcommittee responsible for the oversight of risks from
cybersecurity threats and describe the processes by which the board or
such committee is informed about such risks.
(2) Describe management's role in assessing and managing the
registrant's material risks from cybersecurity threats. In providing
such disclosure, a registrant should address, as applicable, the
following non-exclusive list of disclosure items:
(i) Whether and which management positions or committees are
responsible for assessing and managing such risks, and the relevant
expertise of such persons or members in such detail as necessary to
fully describe the nature of the expertise;
(ii) The processes by which such persons or committees are informed
about and monitor the prevention, detection, mitigation, and
remediation of cybersecurity incidents; and
(iii) Whether such persons or committees report information about
such risks to the board of directors or a committee or subcommittee of
the board of directors.
Instruction 1 to Item 106(c): In the case of a foreign private
issuer with a two-tier board of directors, for purposes of paragraph
(c) of this section, the term ``board of directors'' means the
supervisory or non-management board. In the case of a foreign private
issuer meeting the requirements of Sec. 240.10A-3(c)(3) of this
chapter, for purposes of paragraph (c) of this Item, the term ``board
of directors'' means the issuer's board of auditors (or similar body)
or statutory auditors, as applicable.
Instruction 2 to Item 106(c): Relevant expertise of management in
Item 106(c)(2)(i) may include, for example: Prior work experience in
cybersecurity; any relevant degrees or certifications; any knowledge,
skills, or other background in cybersecurity.
[[Page 51943]]
(d) Structured Data Requirement. Provide the information required
by this Item in an Interactive Data File in accordance with Rule 405 of
Regulation S-T and the EDGAR Filer Manual.
0
3. Amend Sec. 229.601 by revising paragraph (b)(101)(i)(C)(1) as
follows:
Sec. 229.601 (Item 601) Exhibits.
* * * * *
(b) * * *
(101) * * *
(i) * * *
(C) * * *
(1) Only when:
(i) The Form 8-K contains audited annual financial statements that
are a revised version of financial statements that previously were
filed with the Commission and that have been revised pursuant to
applicable accounting standards to reflect the effects of certain
subsequent events, including a discontinued operation, a change in
reportable segments or a change in accounting principle. In such case,
the Interactive Data File will be required only as to such revised
financial statements regardless of whether the Form 8-K contains other
financial statements; or
(ii) The Form 8-K includes disclosure required to be provided in an
Interactive Data File pursuant to Item 1.05(b) of Form 8-K; and
* * * * *
PART 232--REGULATION S-T--GENERAL RULES AND REGULATIONS FOR
ELECTRONIC FILINGS
0
4. The general authority citation for part 232 continues to read as
follows:
Authority: 15 U.S.C. 77c, 77f, 77g, 77h, 77j, 77s(a), 77z-3,
77sss(a), 78c(b), 78l, 78m, 78n, 78o(d), 78w(a), 78ll, 80a-6(c),
80a-8, 80a-29, 80a-30, 80a-37, 80b-4, 80b-6a, 80b-10, 80b-11, 7201
et seq.; and 18 U.S.C. 1350, unless otherwise noted.
* * * * *
0
5. Amend Sec. 232.405 by adding paragraph (b)(4)(v) to read as
follows:
Sec. 232.405 Interactive Data File submissions.
* * * * *
(b) * * *
(4) * * *
(v) Any disclosure provided in response to: Sec. 229.106 of this
chapter (Item 106 of Regulation S-K); Item 1.05 of Sec. 249.308 of
this chapter (Item 1.05 of Form 8-K); and Item 16K of Sec. 249.220f of
this chapter (Item 16K of Form 20-F).
* * * * *
PART 239--FORMS PRESCRIBED UNDER THE SECURITIES ACT OF 1933
0
6. The general authority citation for part 239 continues to read as
follows:
Authority: 15 U.S.C. 77c, 77f, 77g, 77h, 77j, 77s, 77z-2, 77z-3,
77sss, 78c, 78l, 78m, 78n, 78o(d), 78o-7 note, 78u-5, 78w(a), 78ll,
78mm, 80a-2(a), 80a-3, 80a-8, 80a-9, 80a-10, 80a-13, 80a-24, 80a-26,
80a-29, 80a-30, 80a-37, and sec. 71003 and sec. 84001, Pub. L. 114-
94, 129 Stat. 1321, unless otherwise noted.
* * * * *
0
7. Amend Sec. 239.13 by revising paragraph (a)(3)(ii) to read as
follows:
Sec. 239.13 Form S-3, for registration under the Securities Act of
1933 of securities of certain issuers offered pursuant to certain types
of transactions.
* * * * *
(a) * * *
(3) * * *
(ii) Has filed in a timely manner all reports required to be filed
during the twelve calendar months and any portion of a month
immediately preceding the filing of the registration statement, other
than a report that is required solely pursuant to Item 1.01, 1.02,
1.05, 2.03, 2.04, 2.05, 2.06, 4.02(a), 6.01, 6.03, or 6.05 of Form 8-K
(Sec. 249.308 of this chapter). If the registrant has used (during the
twelve calendar months and any portion of a month immediately preceding
the filing of the registration statement) Sec. 240.12b-25(b) of this
chapter with respect to a report or a portion of a report, that report
or portion thereof has actually been filed within the time period
prescribed by that section; and
* * * * *
0
8. Amend Form S-3 (referenced in Sec. 239.13) by adding General
Instruction I.A.3(b).
Note: Form S-3 is attached as Appendix A to this document. Form
S-3 will not appear in the Code of Federal Regulations.
PART 240--GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF
1934
0
9. The authority citation for part 240 continues to read, in part, as
follows:
Authority: 15 U.S.C. 77c, 77d, 77g, 77j, 77s, 77z-2, 77z-3,
77eee, 77ggg, 77nnn, 77sss, 77ttt, 78c, 78c-3, 78c-5, 78d, 78e, 78f,
78g, 78i, 78j, 78j-1, 78j-4, 78k, 78k-1, 78l, 78m, 78n, 78n-1, 78o,
78o-4, 78o-10, 78p, 78q, 78q-1, 78s, 78u-5, 78w, 78x, 78dd, 78ll,
78mm, 80a-20, 80a-23, 80a-29, 80a-37, 80b-3, 80b-4, 80b-11, 7201 et
seq., and 8302; 7 U.S.C. 2(c)(2)(E); 12 U.S.C. 5221(e)(3); 18 U.S.C.
1350; and Pub. L. 111-203, 939A, 124 Stat. 1376 (2010); and Pub. L.
112-106, sec. 503 and 602, 126 Stat. 326 (2012), unless otherwise
noted.
* * * * *
Section 240.15d-11 is also issued under secs. 3(a) and 306(a),
Pub. L. 107-204, 116 Stat. 745.
* * * * *
0
10. Amend Sec. 240.13a-11 by revising paragraph (c) to read as
follows:
Sec. 240.13a-11 Current reports on Form 8-K (Sec. 249.308 of this
chapter).
* * * * *
(c) No failure to file a report on Form 8-K that is required solely
pursuant to Item 1.01, 1.02, 1.05, 2.03, 2.04, 2.05, 2.06, 4.02(a),
5.02(e), or 6.03 of Form 8-K shall be deemed to be a violation of 15
U.S.C. 78j(b) and Sec. 240.10b-5.
0
11. Amend Sec. 240.15d-11 by revising paragraph (c) to read as
follows:
Sec. 240.15d-11 Current reports on Form 8-K (Sec. 249.308 of this
chapter).
* * * * *
(c) No failure to file a report on Form 8-K that is required solely
pursuant to Item 1.01, 1.02, 1.05, 2.03, 2.04, 2.05, 2.06, 4.02(a),
5.02(e), or 6.03 of Form 8-K shall be deemed to be a violation of 15
U.S.C. 78j(b) and Sec. 240.10b-5.
PART 249--FORMS, SECURITIES EXCHANGE ACT OF 1934
0
12. The authority citation for part 249 continues to read, in part, as
follows:
Authority: 15 U.S.C. 78a et seq. and 7201 et seq.; 12 U.S.C.
5461 et seq.; 18 U.S.C. 1350; Sec. 953(b) Pub. L. 111-203, 124 Stat.
1904; Sec. 102(a)(3) Pub. L. 112-106, 126 Stat. 309 (2012), Sec. 107
Pub. L. 112-106, 126 Stat. 313 (2012), Sec. 72001 Pub. L. 114-94,
129 Stat. 1312 (2015), and secs. 2 and 3 Pub. L. 116-222, 134 Stat.
1063 (2020), unless otherwise noted.
Section 249.220f is also issued under secs. 3(a), 202, 208, 302,
306(a), 401(a), 401(b), 406 and 407, Pub. L. 107-204, 116 Stat. 745,
and secs. 2 and 3, Pub. L. 116-222, 134 Stat. 1063.
* * * * *
Section 249.308 is also issued under 15 U.S.C. 80a-29 and 80a-
37.
* * * * *
Section 249.310 is also issued under secs. 3(a), 202, 208, 302,
406 and 407, Public Law 107-204, 116 Stat. 745.
* * * * *
0
13. Revise Form 20-F (referenced in Sec. 249.220f) by adding Item 16K.
Note: Form 20-F is attached as Appendix B to this document. Form
20-F will not appear in the Code of Federal Regulations.
0
14. Amend Form 6-K (referenced in Sec. 249.306) by adding, in the
second paragraph of General Instruction B, the phrase ``material
cybersecurity incident;'' before the phrase ``and any
[[Page 51944]]
other information which the registrant deems of material importance to
security holders.''
0
15. Revise Form 8-K (referenced in Sec. 249.308) by:
0
a. Revising General Instruction B.1.;
0
b. Revising General Instruction G.1.; and
0
c. Adding Item 1.05.
Note: Form 8-K is attached as Appendix C to this document. Form
8-K will not appear in the Code of Federal Regulations.
0
16. Revise Form 10-K (referenced in Sec. 249.310) by:
0
a. Revising General Instruction J(1)(b); and
0
b. Adding Item 1C to Part I.
Note: Form 10-K is attached as Appendix D to this document. Form
10-K will not appear in the Code of Federal Regulations.
* * * * *
By the Commission.
Dated: July 26, 2023.
Vanessa A. Countryman,
Secretary.
Note: The following appendices will not appear in the Code of
Federal Regulations.
Appendix A--Form S-3
FORM S-3
* * * * *
INFORMATION TO BE INCLUDED IN THE REPORT
* * * * *
General Instructions
I. Eligibility Requirements for Use of Form S-3
* * * * *
A. Registrant Requirements
* * * * *
3. * * *
(b) has filed in a timely manner all reports required to be
filed during the twelve calendar months and any portion of a month
immediately preceding the filing of the registration statement,
other than a report that is required solely pursuant to Item 1.01,
1.02, 1.04, 1.05, 2.03, 2.04, 2.05, 2.06, 4.02(a) or 5.02(e) of Form
8-K (Sec. 249.308 of this chapter). If the registrant has used
(during the twelve calendar months and any portion of a month
immediately preceding the filing of the registration statement) Rule
12b-25(b) (Sec. 240.12b-25(b) of this chapter) under the Exchange
Act with respect to a report or a portion of a report, that report
or portion thereof has actually been filed within the time period
prescribed by that rule.
* * * * *
Appendix B--Form 20-F
FORM 20-F
* * * * *
PART II
* * * * *
Item 16K. Cybersecurity
(a) Definitions. For purposes of this section:
(1) Cybersecurity incident means an unauthorized occurrence, or
a series of related unauthorized occurrences, on or conducted
through a registrant's information systems that jeopardizes the
confidentiality, integrity, or availability of a registrant's
information systems or any information residing therein.
(2) Cybersecurity threat means any potential unauthorized
occurrence on or conducted through a registrant's information
systems that may result in adverse effects on the confidentiality,
integrity, or availability of a registrant's information systems or
any information residing therein.
(3) Information systems means electronic information resources,
owned or used by the registrant, including physical or virtual
infrastructure controlled by such information resources, or
components thereof, organized for the collection, processing,
maintenance, use, sharing, dissemination, or disposition of the
registrant's information to maintain or support the registrant's
operations.
(b) Risk management and strategy. (1) Describe the registrant's
processes, if any, for assessing, identifying, and managing material
risks from cybersecurity threats in sufficient detail for a
reasonable investor to understand those processes. In providing such
disclosure, a registrant should address, as applicable, the
following non-exclusive list of disclosure items:
(i) Whether and how any such processes have been integrated into
the registrant's overall risk management system or processes;
(ii) Whether the registrant engages assessors, consultants,
auditors, or other third parties in connection with any such
processes; and
(iii) Whether the registrant has processes to oversee and
identify such risks from cybersecurity threats associated with its
use of any third-party service provider.
(2) Describe whether any risks from cybersecurity threats,
including as a result of any previous cybersecurity incidents, have
materially affected or are reasonably likely to materially affect
the registrant, including its business strategy, results of
operations, or financial condition and if so, how.
(c) Governance. (1) Describe the board of directors' oversight
of risks from cybersecurity threats. If applicable, identify any
board committee or subcommittee responsible for the oversight of
risks from cybersecurity threats and describe the processes by which
the board or such committee is informed about such risks.
(2) Describe management's role in assessing and managing the
registrant's material risks from cybersecurity threats. In providing
such disclosure, a registrant should address, as applicable, the
following non-exclusive list of disclosure items:
(i) Whether and which management positions or committees are
responsible for assessing and managing such risks, and the relevant
expertise of such persons or members in such detail as necessary to
fully describe the nature of the expertise;
(ii) The processes by which such persons or committees are
informed about and monitor the prevention, detection, mitigation,
and remediation of cybersecurity incidents; and
(iii) Whether such persons or committees report information
about such risks to the board of directors or a committee or
subcommittee of the board of directors.
Instructions to Item 16K(c)
1. In the case of a foreign private issuer with a two-tier board
of directors, for purposes of paragraph (c) of this Item, the term
``board of directors'' means the supervisory or non-management
board. In the case of a foreign private issuer meeting the
requirements of Sec. 240.10A-3(c)(3) of this chapter, for purposes
of paragraph (c) of this Item, the term ``board of directors'' means
the issuer's board of auditors (or similar body) or statutory
auditors, as applicable.
2. Relevant expertise of management in paragraph (c)(2)(i) of
this Item may include, for example: Prior work experience in
cybersecurity; any relevant degrees or certifications; any
knowledge, skills, or other background in cybersecurity.
(d) Structured Data Requirement. Provide the information
required by this Item in an Interactive Data File in accordance with
Rule 405 of Regulation S-T and the EDGAR Filer Manual.
Instruction to Item 16K. Item 16K applies only to annual
reports, and does not apply to registration statements on Form 20-F.
* * * * *
Appendix C--Form 8-K
FORM 8-K
* * * * *
GENERAL INSTRUCTIONS
* * * * *
B. Events To Be Reported and Time for Filing of Reports
1. A report on this form is required to be filed or furnished,
as applicable, upon the occurrence of any one or more of the events
specified in the items in Sections 1 through 6 and 9 of this form.
Unless otherwise specified, a report is to be filed or furnished
within four business days after occurrence of the event. If the
event occurs on a Saturday, Sunday or holiday on which the
Commission is not open for business, then the four business day
period shall begin to run on, and include, the first business day
thereafter. A registrant either furnishing a report on this form
under Item 7.01 (Regulation FD Disclosure) or electing to file a
report on this form under Item 8.01 (Other Events) solely to satisfy
its obligations under Regulation FD (17 CFR 243.100 and 243.101)
must furnish such report or make such filing, as applicable, in
accordance with the requirements of Rule 100(a) of Regulation FD (17
CFR 243.100(a)), including the deadline for furnishing or filing
such report. A report pursuant to Item 5.08 is to be filed within
four business days after the registrant determines the anticipated
meeting date. A report pursuant to Item 1.05 is to be filed within
four business days after the registrant determines that it has
experienced a material cybersecurity incident.
* * * * *
[[Page 51945]]
G. Use of This Form by Asset-Backed Issuers
* * * * *
1. * * *
(a) Item 1.05, Cybersecurity Incidents;
(b) Item 2.01, Completion of Acquisition or Disposition of
Assets;
(c) Item 2.02, Results of Operations and Financial Condition;
(d) Item 2.03, Creation of a Direct Financial Obligation or an
Obligation under an Off-Balance Sheet Arrangement of a Registrant;
(e) Item 2.05, Costs Associated with Exit or Disposal
Activities;
(f) Item 2.06, Material Impairments;
(g) Item 3.01, Notice of Delisting or Failure to Satisfy a
Continued Listing Rule or Standard; Transfer of Listing;
(h) Item 3.02, Unregistered Sales of Equity Securities;
(i) Item 4.01, Changes in Registrant's Certifying Accountant;
(j) Item 4.02, Non-Reliance on Previously Issued Financial
Statements or a Related Audit Report or Completed Interim Review;
(k) Item 5.01, Changes in Control of Registrant;
(l) Item 5.02, Departure of Directors or Principal Officers;
Election of Directors; Appointment of Principal Officers;
(m) Item 5.04, Temporary Suspension of Trading Under
Registrant's Employee Benefit Plans; and
(n) Item 5.05, Amendments to the Registrant's Code of Ethics, or
Waiver of a Provision of the Code of Ethics.
* * * * *
INFORMATION TO BE INCLUDED IN THE REPORT
Section 1--Registrant's Business and Operations
* * * * *
Item 1.05 Material Cybersecurity Incidents
(a) If the registrant experiences a cybersecurity incident that
is determined by the registrant to be material, describe the
material aspects of the nature, scope, and timing of the incident,
and the material impact or reasonably likely material impact on the
registrant, including its financial condition and results of
operations.
(b) A registrant shall provide the information required by this
Item in an Interactive Data File in accordance with Rule 405 of
Regulation S-T and the EDGAR Filer Manual.
(c) Notwithstanding General Instruction B.1. to Form 8-K, if the
United States Attorney General determines that disclosure required
by paragraph (a) of this Item 1.05 poses a substantial risk to
national security or public safety, and notifies the Commission of
such determination in writing, the registrant may delay providing
the disclosure required by this Item 1.05 for a time period
specified by the Attorney General, up to 30 days following the date
when the disclosure required by this Item 1.05 was otherwise
required to be provided. Disclosure may be delayed for an additional
period of up to 30 days if the Attorney General determines that
disclosure continues to pose a substantial risk to national security
or public safety and notifies the Commission of such determination
in writing. In extraordinary circumstances, disclosure may be
delayed for a final additional period of up to 60 days if the
Attorney General determines that disclosure continues to pose a
substantial risk to national security and notifies the Commission of
such determination in writing. Beyond the final 60-day delay under
this paragraph, if the Attorney General indicates that further delay
is necessary, the Commission will consider additional requests for
delay and may grant such relief through Commission exemptive order.
(d) Notwithstanding General Instruction B.1. to Form 8-K, if a
registrant that is subject to 47 CFR 64.2011 is required to delay
disclosing a data breach pursuant to such rule, it may delay
providing the disclosure required by this Item 1.05 for such period
that is applicable under 47 CFR 64.2011(b)(1) and in no event for
more than seven business days after notification required under such
provision has been made, so long as the registrant notifies the
Commission in correspondence submitted to the EDGAR system no later
than the date when the disclosure required by this Item 1.05 was
otherwise required to be provided.
Instructions to Item 1.05
1. A registrant's materiality determination regarding a
cybersecurity incident must be made without unreasonable delay after
discovery of the incident.
2. To the extent that the information called for in Item 1.05(a)
is not determined or is unavailable at the time of the required
filing, the registrant shall include a statement to this effect in
the filing and then must file an amendment to its Form 8-K filing
under this Item 1.05 containing such information within four
business days after the registrant, without unreasonable delay,
determines such information or within four business days after such
information becomes available.
3. The definition of the term ``cybersecurity incident'' in
229.106(a) [Item 106(a) of Regulation S-K] applies to this Item.
4. A registrant need not disclose specific or technical
information about its planned response to the incident or its
cybersecurity systems, related networks and devices, or potential
system vulnerabilities in such detail as would impede the
registrant's response or remediation of the incident.
* * * * *
Appendix D--Form 10-K
FORM 10-K
* * * * *
GENERAL INSTRUCTIONS
* * * * *
J. Use of This Form by Asset-Backed Issuers
* * * * *
(1) * * *
(b) Item 1A, Risk Factors and Item 1C, Cybersecurity;
* * * * *
Part I
* * * * *
Item 1C Cybersecurity
(a) Furnish the information required by Item 106 of Regulation
S-K (229.106 of this chapter).
* * * * *
[FR Doc. 2023-16194 Filed 8-3-23; 8:45 am]
BILLING CODE 8011-01-P