Self-Regulatory Organizations; The Options Clearing Corporation; Order Granting Approval of Proposed Rule Change, as Modified by Partial Amendment No. 1, Concerning Clearing Member Cybersecurity Obligations, 82441-82447 [2023-25883]
Download as PDF
Federal Register / Vol. 88, No. 225 / Friday, November 24, 2023 / Notices
market? What are commenters’ views on
the extent to which that correlation
provides evidence that the CME bitcoin
futures market is ‘‘significant’’ related to
spot bitcoin?
III. Procedure: Request for Written
Comments
The Commission requests that
interested persons provide written
submissions of their views, data, and
arguments with respect to the issues
identified above, as well as any other
concerns they may have with the
proposal. In particular, the Commission
invites the written views of interested
persons concerning whether the
proposal is consistent with Section
6(b)(5) or any other provision of the Act,
and the rules and regulations
thereunder. Although there do not
appear to be any issues relevant to
approval or disapproval that would be
facilitated by an oral presentation of
views, data, and arguments, the
Commission will consider, pursuant to
Rule 19b–4, any request for an
opportunity to make an oral
presentation.28
Interested persons are invited to
submit written data, views, and
arguments regarding whether the
proposed rule change should be
approved or disapproved by December
15, 2023. Any person who wishes to file
a rebuttal to any other person’s
submission must file that rebuttal by
December 29, 2023.
Comments may be submitted by any
of the following methods:
Electronic Comments
• Use the Commission’s internet
comment form (https://www.sec.gov/
rules/sro.shtml); or
• Send an email to rule-comments@
sec.gov. Please include file number
SR–CboeBZX–2023–058 on the
subject line.
ddrumheller on DSK120RN23PROD with NOTICES1
Paper Comments
• Send paper comments in triplicate
to Secretary, Securities and Exchange
Commission, 100 F Street NE,
Washington, DC 20549–1090.
All submissions should refer to file
number SR–CboeBZX–2023–058. This
file number should be included on the
subject line if email is used. To help the
28 Section 19(b)(2) of the Act, as amended by the
Securities Acts Amendments of 1975, Public Law
94–29 (June 4, 1975), grants the Commission
flexibility to determine what type of proceeding—
either oral or notice and opportunity for written
comments—is appropriate for consideration of a
particular proposal by a self-regulatory
organization. See Securities Acts Amendments of
1975, Senate Comm. on Banking, Housing & Urban
Affairs, S. Rep. No. 75, 94th Cong., 1st Sess. 30
(1975).
VerDate Sep<11>2014
21:46 Nov 22, 2023
Jkt 262001
Commission process and review your
comments more efficiently, please use
only one method. The Commission will
post all comments on the Commission’s
internet website (https://www.sec.gov/
rules/sro.shtml). Copies of the
submission, all subsequent
amendments, all written statements
with respect to the proposed rule
change that are filed with the
Commission, and all written
communications relating to the
proposed rule change between the
Commission and any person, other than
those that may be withheld from the
public in accordance with the
provisions of 5 U.S.C. 552, will be
available for website viewing and
printing in the Commission’s Public
Reference Room, 100 F Street NE,
Washington, DC 20549, on official
business days between the hours of 10
a.m. and 3 p.m. Copies of the filing also
will be available for inspection and
copying at the principal office of the
Exchange. Do not include personal
identifiable information in submissions;
you should submit only information
that you wish to make available
publicly. We may redact in part or
withhold entirely from publication
submitted material that is obscene or
subject to copyright protection. All
submissions should refer to file number
SR–CboeBZX–2023–058 and should be
submitted on or before December 15,
2023. Rebuttal comments should be
submitted by December 29, 2023.
For the Commission, by the Division of
Trading and Markets, pursuant to delegated
authority.29
Sherry R. Haywood,
Assistant Secretary.
[FR Doc. 2023–25882 Filed 11–22–23; 8:45 am]
82441
proposed rule change SR–OCC–2023–
003 pursuant to Section 19(b) of the
Securities Exchange Act of 1934
(‘‘Exchange Act’’) 1 and Rule 19b–4 2
thereunder. The proposed rule change
would amend certain provisions in
OCC’s Rules relating to each Clearing
Member’s obligation to address a
‘‘Security Incident’’ (i.e., the occurrence
of a cyber-related disruption or
intrusion of a Clearing Member’s
systems that is reasonably likely to pose
an imminent risk or threat to OCC’s
operations) of that Clearing Member.
The proposed rule change was
published for public comment in the
Federal Register on April 5, 2023.3 The
Commission has received comments
regarding the proposed rule change.4
On May 18, 2023, pursuant to the
Section 19(b)(2) of the Exchange Act,5
the Commission designated a longer
period within which to approve,
disapprove, or institute proceedings to
determine whether to approve the
proposed rule change.6 On May 24,
2023, OCC filed Partial Amendment No.
1 to the Notice of Filing.7 For the
reasons discussed below, the
Commission is approving the proposed
rule change, as modified by Partial
Amendment No. 1 (hereinafter,
‘‘proposed rule change’’).
II. Background
Currently, the only OCC Rule
governing a Clearing Member’s
cybersecurity obligations to OCC is Rule
219, titled ‘‘Cybersecurity
Confirmation.’’ 8 It requires Clearing
Members and applicants for clearing
membership to submit to OCC a form
called the ‘‘Cybersecurity Confirmation’’
at least every two years or as part of its
application materials. Through the form,
BILLING CODE 8011–01–P
1 15
SECURITIES AND EXCHANGE
COMMISSION
[Release No. 34–98979; File No. SR–OCC–
2023–003]
Self-Regulatory Organizations; The
Options Clearing Corporation; Order
Granting Approval of Proposed Rule
Change, as Modified by Partial
Amendment No. 1, Concerning
Clearing Member Cybersecurity
Obligations
November 17, 2023.
I. Introduction
On March 21, 2023, the Options
Clearing Corporation (‘‘OCC’’) filed with
the Securities and Exchange
Commission (‘‘Commission’’) the
29 17
PO 00000
CFR 200.30–3(a)(57).
Frm 00129
Fmt 4703
Sfmt 4703
U.S.C. 78s(b)(1).
CFR 240.19b–4.
3 Securities Exchange Act Release No. 97225
(Mar. 30, 2023), 88 FR 20195 (Apr. 5, 2023) (File
No. SR–OCC–2023–003) (‘‘Notice of Filing’’).
4 Comments on the proposed rule change are
available at https://www.sec.gov/comments/sr-occ2023-003/srocc2023003.htm.
5 15 U.S.C. 78s(b)(2).
6 See Securities Exchange Act Release No. 97525
(May 18, 2023), 88 FR 33655 (May 24, 2023) (File
No. SR–OCC–2023–003).
7 See Securities Exchange Act Release No. 97602
(May 26, 2023), 88 FR 36351 (June 2, 2023) (File
No. SR–OCC–2023–003) (‘‘Notice of Partial
Amendment’’). OCC submitted Partial Amendment
No. 1 in response to comments regarding the
proposed definition of ‘‘Security Incident’’ for
purposes of proposed Rule 213(d), the notification
requirements and procedure in the event of a
Security Incident, factors considered when
determining whether to disconnect or reduce a
clearing member’s access, and clarification related
to reconnection.
8 Capitalized terms used but not defined herein
have the meanings specified in OCC’s Rules and ByLaws, available at https://www.theocc.com/about/
publications/bylaws.jsp.
2 17
E:\FR\FM\24NON1.SGM
24NON1
82442
Federal Register / Vol. 88, No. 225 / Friday, November 24, 2023 / Notices
ddrumheller on DSK120RN23PROD with NOTICES1
Clearing Members and applicants
confirm that they maintain a
comprehensive cybersecurity program
that meets certain criteria (e.g., the
cybersecurity program is approved by
senior management, it is reviewed and
updated periodically, the cybersecurity
program is designed to protect the
segment of the Clearing Member’s or
applicant’s system that interacts with
OCC, it includes a process for the
Clearing Member to remediate cyber
issues, etc.). However, current Rule 219
does not require Clearing Members to
notify OCC if they experience a
cybersecurity incident that could impact
OCC or otherwise address OCC’s
processes, or the Clearing Member’s
obligations with respect to OCC.
The proposed rule change would
renumber Rule 219 as Rule 213 and
rename the rule ‘‘Cybersecurity
Obligations’’ to reflect the expanded
scope of the Rule.9 It also would add
section headings to the Rule and replace
references to ‘‘OCC’’ with references to
‘‘the Corporation,’’ but otherwise would
not change the provisions regarding the
existing Cybersecurity Confirmation
form that confirms the existence of a
Clearing Member’s cybersecurity
program.10
The substantive changes to the Rule
would be the addition of two new
subsections—(d) and (e)—titled
‘‘Occurrence of a Security Incident’’ and
‘‘Procedures for Connecting Following a
Security Incident,’’ respectively. New
subsection (d) would require a Clearing
Member to immediately notify OCC if
the member becomes aware or should be
aware of a Security Incident (as defined
in the Rule). It would also specify that
OCC may take actions reasonably
necessary to mitigate any effects on its
operations following a Security
Incident. New subsection (e) would
require a Clearing Member wishing to
reconnect its systems to OCC’s systems
to provide OCC with a new form, titled
‘‘Reconnection Attestation,’’ that
describes the Security Incident and
attests to certain security requirements,
as well as an associated checklist, titled
‘‘Reconnection Checklist,’’ that
describes the affected Clearing
Member’s remediation efforts and other
key information. Each of these proposed
9 The renumbering follows proposed changes to
OCC’s clearing membership standards, which
includes removal of current Rules 213 through 218.
See Securities Exchange Act Release No. 97150
(Mar. 15, 2023), 88 FR 17046 (Mar. 21, 2023) (File
No. SR–OCC–2023–002).
10 Specifically, OCC would add the following
headings: ‘‘Cybersecurity Confirmation
Submission’’ to paragraph (a); ‘‘Representations in
the Cybersecurity Confirmation’’ to paragraph (b);
and ‘‘Execution of the Cybersecurity Confirmation’’
to paragraph (c).
VerDate Sep<11>2014
21:46 Nov 22, 2023
Jkt 262001
changes is described in greater detail
below.
A. New Paragraph (d): Occurrence of a
Security Incident
Proposed Rule 213(d) would define a
Security Incident as an incident that has
occurred or is occurring involving a
cyber-related disruption or intrusion of
the Clearing Member’s system(s) that is
reasonably likely to pose an imminent
risk or threat to OCC’s operations.11 To
provide guidance regarding the types of
disruptions or intrusions that might be
considered Security Incidents, the
proposed rule includes a nonexhaustive list of examples.
Specifically, a Security Incident may
include any disruption or degradation of
the normal operation of the Clearing
Member’s systems or any unauthorized
entry into the Clearing Member’s
systems that would result in loss of
OCC’s data or system integrity, an
unauthorized disclosure of sensitive
information related to OCC, or the
inability of OCC to conduct essential
clearance and settlement functions.12
Under the proposed rule, a Clearing
Member would be required to
immediately notify OCC if the member
becomes aware or should be aware that
there has been a Security Incident or
that a Security Incident is occurring.13
The Clearing Member would also need
to promptly confirm such notice in
writing.
The proposed rule would specify that,
if OCC receives notice of a Security
Incident from a Clearing Member or has
a reasonable basis to believe a Security
Incident has occurred or is occurring,
OCC may take actions reasonably
necessary to mitigate any effects to its
operations, including disconnecting the
Clearing Member’s access to OCC’s
information and data systems or
modifying the scope and specifications
of such access. Finally, paragraph (d) of
the proposed rule would provide a nonexhaustive list of factors OCC may
consider in determining whether to
modify a Clearing Member’s access to
OCC’s information and data systems, up
to and including disconnection, in
11 In response to public comment, OCC amended
the proposed rule change to specify that a
disruption or intrusion of a Clearing Member’s
systems would only be deemed a Security Incident
if it is ‘‘reasonably likely to pose an imminent risk
or threat to OCC’s operations.’’ See Notice of Partial
Amendment, 88 FR at 36352.
12 In response to public comment, OCC added the
non-exhaustive list of potential Security Incidents
to clarify that the focus of the Rule would be on
the potential impact on OCC of a disruption or
intrusion. See Notice of Partial Amendment, 88 FR
at 36352.
13 See Notice of Partial Amendment, 88 FR at
36352.
PO 00000
Frm 00130
Fmt 4703
Sfmt 4703
response to a Security Incident.
Specifically, among other factors, OCC
may consider the potential loss of
control by a Clearing Member of its
internal system(s), the potential loss of
OCC’s confidential data, the potential
strain on or loss of OCC’s resources due
to OCC’s inability to perform clearance
and settlement functions, and the
overall severity of the threat to the
security and operations of OCC.14
Further, if the Corporation reasonably
determines that disconnection of a
Clearing Member is necessary, the
Clearing Member must continue to meet
its obligations to the Corporation,
notwithstanding disconnection from the
Corporation’s systems.
B. New Paragraph (e): Procedures for
Connecting Following a Security
Incident That Results in Disconnection
Proposed Rule 213(e) would clarify
the process for a Clearing Member to
request reconnection to OCC’s systems
following disconnection as a result of a
Security Incident. In particular, the
Clearing Member would need to
complete and submit, upon OCC’s
request, a new form referred to by OCC
as the ‘‘Reconnection Attestation’’ and a
related checklist referred to by OCC as
the ‘‘Reconnection Checklist.’’ The
Reconnection Attestation would include
a text box for the Clearing Member to
provide a narrative description of the
Security Incident and five
representations to which, by signing the
form, the Clearing Member would be
attesting. Specifically, by signing the
Reconnection Attestation, the Clearing
Member would be attesting that it has:
• provided full, complete and
accurate information in response to all
requests made by OCC regarding the
Security Incident, including all requests
contained in the Reconnection
Checklist, on a good faith, best efforts
basis;
• provided full, complete and
accurate information regarding any OCC
data or systems that were potentially
compromised during the Security
Incident, including any potential
exposure of credentials used to access
OCC’s systems, and will immediately
notify OCC if it later becomes aware of
a previously undetected or unreported
compromise of OCC data or systems
during the Security Incident;
14 In response to public comment, OCC amended
its proposed rule to specify that these are the types
of factors OCC would consider when determining
whether to disconnect a Clearing Member. See
Notice of Partial Amendment, 88 FR at 36353. OCC
also clarified its anticipation that not all Security
Incident notifications will result in a Clearing
Member disconnection. See id. at 36352.
E:\FR\FM\24NON1.SGM
24NON1
Federal Register / Vol. 88, No. 225 / Friday, November 24, 2023 / Notices
ddrumheller on DSK120RN23PROD with NOTICES1
• determined whether the Security
Incident resulted, directly or indirectly,
from any controls that failed or were
circumvented by its employees,
contractors or agents (‘‘Failed
Controls’’); 15
• implemented, or will implement
promptly, technical and operational
changes, both preventative and
detective, with the intent to prevent a
recurrence of the Security Incident and
has provided written summaries of such
changes to OCC; and
• complied and will continue to
comply with all applicable laws in
connection with its response to the
Security Incident, including any
notifications required to be provided to
government agencies, OCC, and third
parties.16
The associated Reconnection
Checklist would include questions
designed to elicit additional details
regarding the Security Incident,
including the potential cause of the
incident, steps taken to contain it, the
exposure and impact to OCC’s systems
or data, the Clearing Member’s
remediation efforts, and any other
details relevant to the Clearing
Member’s request to reconnect to OCC’s
systems. The Reconnection Checklist
would require the Clearing Member to
respond to the following questions: 17
• was the disconnection the result of
a cybersecurity-related incident;
• describe the nature of the incident;
• what steps were taken to contain
the incident;
• what OCC data, if any, was
compromised during the incident;
• what OCC systems, if any, were
impacted during the incident;
• was there any risk of exposure of
credentials used to access OCC systems
and, if so, were the credentials reissued;
• which controls were circumvented
or failed that led to the incident
occurring;
• what changes, preventative and
detective, were implemented to prevent
a reoccurrence;
• how has data integrity been
preserved and what data checks have
been performed prior to reconnecting to
and sending/receiving data to/from
OCC;
• have third-parties, including
government agencies, been notified; and
15 The proposed language would further specify
that the Clearing Member has communicated the
existence of Failed Controls to OCC and is
remediating or has remediated all Failed Controls.
16 See proposed Rule 213(e)(1)(A) through (E).
Further, each Reconnection Attestation must be
provided in writing and signed by a designated
senior executive of the Clearing Member.
17 The description of the checklist provided here
is based on the Exhibit 3 to File No. SR–OCC–2023–
003 provided by OCC at the time of filing.
VerDate Sep<11>2014
21:46 Nov 22, 2023
Jkt 262001
• any additional details relevant to
reconnection.18
According to OCC, the Reconnection
Attestation and Reconnection Checklist
are designed to accomplish several
goals. First, they are designed to enable
OCC to determine whether the risk or
threat to OCC has been mitigated
sufficiently for OCC to resume
connectivity to the Clearing Member.19
Second, they are designed to provide
OCC with evidence related to a Clearing
Member’s response to a Security
Incident, including whether the
Clearing Member has appropriate
security requirements and carried out
suitable remediation measures, to
enable OCC to better understand and
manage Security Incidents more
broadly.20 Finally, they would better
enable OCC to identify areas of interest,
concern, or heightened risk by
presenting information in a
standardized format.21
III. Discussion and Commission
Findings
Section 19(b)(2)(C) of the Exchange
Act directs the Commission to approve
a proposed rule change of a selfregulatory organization if it finds that
such proposed rule change is consistent
with the requirements of the Exchange
Act and the rules and regulations
thereunder applicable to such
organization.22 Under the Commission’s
Rules of Practice, the ‘‘burden to
demonstrate that a proposed rule change
is consistent with the Exchange Act and
the rules and regulations issued
thereunder . . . is on the self-regulatory
organization [‘SRO’] that proposed the
rule change.’’ 23
The description of a proposed rule
change, its purpose and operation, its
effect, and a legal analysis of its
consistency with applicable
requirements must all be sufficiently
detailed and specific to support an
affirmative Commission finding,24 and
any failure of an SRO to provide this
information may result in the
Commission not having a sufficient
18 These are the specific questions included in the
Reconnection Checklist that OCC submitted as
Exhibit 3 to the proposed rule change. See Exhibit
3 to File No. SR OCC2023–003. However, proposed
Rule 213(e)(2) specifies that the Reconnection
Checklist may require ‘‘information including, but
not limited to,’’ the 11 questions noted above. This
is to account for the evolving nature of Security
Incidents and provide OCC with flexibility to
modify the specific information requirements if
necessary. See Notice of Filing, 88 FR at 20196.
19 See Notice of Filing, 88 FR at 20196.
20 Id. at 20197.
21 Id.
22 15 U.S.C. 78s(b)(2)(C).
23 Rule 700(b)(3), Commission Rules of Practice,
17 CFR 201.700(b)(3).
24 Id.
PO 00000
Frm 00131
Fmt 4703
Sfmt 4703
82443
basis to make an affirmative finding that
a proposed rule change is consistent
with the Exchange Act and the
applicable rules and regulations.25
Moreover, ‘‘unquestioning reliance’’ on
an SRO’s representations in a proposed
rule change is not sufficient to justify
Commission approval of a proposed rule
change.26
After carefully considering the
proposed rule change, the Commission
finds that the proposed rule change is
consistent with the requirements of the
Exchange Act and the rules and
regulations thereunder applicable to
OCC. More specifically, the Commission
finds that the proposal is consistent
with Section 17A(b)(3)(F) of the
Exchange Act 27 and Rule 17Ad–
22(e)(17)(i) 28 thereunder as described in
detail below.
A. Consistency With Section
17A(b)(3)(F) of the Exchange Act
Section 17A(b)(3)(F) of the Exchange
Act requires, among other things, that a
clearing agency’s rules are designed to
promote the prompt and accurate
clearance and settlement of securities
transactions.29 In addition to
centralizing relevant information
pertaining to Clearing Member Security
Incidents in a single rule, the proposed
rule change is designed to support
OCC’s management of potential
cybersecurity risks by enhancing OCC’s
ability to identify and mitigate
cybersecurity risks posed by a Security
Incident experienced by one of OCC’s
Clearing Members. It also is designed to
standardize OCC’s cybersecurity risk
management practices with respect to
such Security Incidents. Among other
things, the changes set forth Clearing
Member obligations and the actions
OCC may take if reasonably necessary to
mitigate the effects of a Security
Incident on its operations. As discussed
further below, the changes also
strengthen OCC’s ability to manage its
cyber-related risks by requiring Clearing
Members to immediately notify OCC if
the Clearing Member becomes aware of
or should be aware that there has been
a Security Incident or one is occurring,
and promptly confirm such a notice in
writing. Taken together, the proposed
changes should strengthen OCC’s
cybersecurity risk management
processes. By creating a consistent set of
obligations on Clearing Members for
identifying and reporting Security
25 Id.
26 Susquehanna Int’l Group, LLP v. Securities and
Exchange Commission, 866 F.3d 442, 447 (D.C. Cir.
2017) (‘‘Susquehanna’’).
27 15 U.S.C. 78q–1(b)(3)(F).
28 17 CFR 240.17Ad–22(e)(17)(i).
29 15 U.S.C. 78q–1(b)(3)(F).
E:\FR\FM\24NON1.SGM
24NON1
82444
Federal Register / Vol. 88, No. 225 / Friday, November 24, 2023 / Notices
ddrumheller on DSK120RN23PROD with NOTICES1
Incidents, OCC would enhance its
ability to monitor, mitigate, and manage
cybersecurity risks—such as
unauthorized disclosure of sensitive
information or a loss of data or system
integrity—in the event a Clearing
Member experiences a Security
Incident. Because OCC’s information,
data, and systems support and enable
OCC’s ability to conduct essential
clearance and settlement functions,
enhancing OCC’s ability to limit the
impact of a Security Incident at a
Clearing Member promotes OCC’s
ability to continue the prompt and
accurate clearance and settlement of
securities transactions.
Accordingly, and for the reasons
discussed below, the proposal is
consistent with the requirements of
Section 17A(b)(3)(F) of the Exchange
Act.
B. Consistency With Rule 17Ad–
22(e)(17)(i) of the Exchange Act
Rule 17Ad–22(e)(17)(i) requires that a
covered clearing agency establish,
implement, maintain and enforce
written policies and procedures
reasonably designed to manage the
covered clearing agency’s operational
risks by identifying the plausible
sources of operational risk, both internal
and external, and mitigating their
impact through the use of appropriate
systems, policies, procedures, and
controls.30 In adopting Rule 17Ad–
22(e)(17)(i), the Commission provided
guidance, stating that a covered clearing
agency generally should consider,
among other things, whether it
identifies, monitors, and manages the
risks that key participants pose to its
operations.31 To the extent they interact
with OCC’s systems, Clearing Member
systems may present operational risk to
OCC. As described above, OCC proposes
requiring members to report any cyberrelated disruption or intrusion that
could pose a risk to OCC’s operations,
such as a degradation of normal
operations that would result in the
inability of OCC to conduct essential
clearance and settlement functions. OCC
also proposes numerous protective
measures, such as the ability to take
reasonably necessary actions to mitigate
the effects of a Security Incident on its
operations, including disconnecting the
Clearing Member’s access to OCC’s
systems; the ability to consider a nonexhaustive list of factors to determine
whether to modify a Clearing Member’s
access to OCC’s systems in response to
30 17
CFR 240.17Ad–22(e)(17)(i).
Standards for Covered Clearing Agencies,
Securities Exchange Act Release No. 78961 (Sept.
28, 2016), 81 FR 70786, 70838 (Oct. 13, 2016).
31 See
VerDate Sep<11>2014
21:46 Nov 22, 2023
Jkt 262001
a Security Incident, up to and including
disconnection; and the requirement for
disconnected Clearing Members to
complete a Reconnection Attestation
and Reconnection Checklist that OCC
would review and evaluate as part of a
determination to reconnect the Clearing
Member to OCC’s systems. Taken
together, these proposals support OCC’s
ability to effectively identify, monitor,
and manage the risks that Clearing
Members pose to OCC operations, and
are therefore consistent with Rule
17Ad–22(e)(17)(i).
A commenter opposed the proposal
on a number of grounds.32 Specifically,
the commenter expressed concerns
about the proposed definition of
Security Incident, stating that because
the proposed definition applies to all of
a Clearing Member’s systems and
therefore could include an incident that
would not affect OCC systems, the
definition is inconsistent with the risks
identified by OCC in the rule filing,
other regulatory and SRO requirements,
and is potentially beyond the scope of
OCC’s authority.33 The commenter also
stated that OCC’s proposed definition of
Security Incident is inconsistent with
other regulatory and SRO requirements
because it does not require that a loss or
harm has occurred and it does not
require that a clearing member be aware
of the incident.34 The commenter stated
that the definition of Security Incident
should be limited to an incident that
could result in ‘‘loss of data or system
integrity,’’ ‘‘unauthorized disclosure of
sensitive information,’’ or ‘‘an inability
[for the OCC] to conduct essential
clearance and settlement functions.’’ 35
The commenter further requested
clarification that the reference to
‘‘disruption or degradation of a clearing
member’s systems’’ in the proposed
definition of Security Incident is limited
to cyber-related disruptions or
intrusions resulting from malicious
third-party activity as opposed to, for
example, a power outage.36
OCC responded by amending the
proposed rule change in a number of
ways.37 First, OCC amended the
32 See letter from Howard Meyerson, Managing
Director, Financial Information Forum (‘‘FIF’’),
dated April 26, 2023, to Vanessa Countryman,
Secretary, Commission (‘‘FIF Letter’’).
33 Id. at 2–3. FIF stated that, as drafted, a Security
Incident could include an incident that would not
affect OCC systems and this approach appears to be
overly broad with the risks identified in the
proposed rule change, indicating that the reference
to ‘‘disruption or degradation of a clearing
member’s systems’’ in the proposed definition of
Security Incident is ambiguous. Id. at 2.
34 Id. at 4–5.
35 Id. at 3.
36 Id. at 5–6.
37 See Notice of Partial Amendment supra note 7.
PO 00000
Frm 00132
Fmt 4703
Sfmt 4703
definition of Security Incident to limit
it to a cyber-related disruption or
intrusion of the Clearing Member’s
systems that is reasonably likely to pose
an imminent risk or threat to OCC’s
operations.38 OCC further amended the
definition of Security Incident to state
that such an incident may include, but
is not limited to, any disruption or
degradation of the normal operation of
the Clearing Member’s systems or any
unauthorized entry into the Clearing
Member’s systems that would result in
loss of OCC’s data or system integrity,
unauthorized disclosure of sensitive
information related to OCC, or the
inability of OCC to conduct essential
clearance and settlement functions.39 In
amending the Security Incident
definition this way, OCC reasonably
addressed the commenter’s concerns
about the scope of the rule by clarifying
that only occurrences that present
certain risks or threats to OCC’s
operations are considered Security
Incidents, and provided examples to
help illustrate the types of risks and
threats to OCC’s operation that are
covered by the rule. In response to the
commenter’s concern that the proposed
definition of Security Incident does not
require that a clearing member be aware
of the Incident, OCC also amended the
proposed definition to require notice
only if the Clearing Member becomes
aware or should be aware that such an
incident has occurred or is occurring.40
The commenter further stated that OCC
‘‘should incorporate into the notice
provision a [condition] that only
requires reporting when a clearing
member has a reasonable basis to
conclude that a reportable cybersecurity
incident has occurred or determines that
a reportable cybersecurity incident has
occurred.’’ 41 As noted, OCC amended
the proposed definition to require
reporting only where a Clearing Member
becomes or should be aware of a
Security Incident. The proposed rule
change therefore would require Clearing
Members to engage in reasonable
diligence to obtain and report to OCC
readily discoverable information about a
Security Incident, consistent with the
Clearing Member’s current obligation to
maintain a comprehensive cybersecurity
program that, among other things, is
designed to protect the segment of the
Clearing Member’s system that interacts
with OCC, but it would not require
reporting of a cybersecurity incident if
the member could not reasonably be
aware of such an incident. OCC’s
38 Id.
39 Id.
40 Id.
41 FIF
E:\FR\FM\24NON1.SGM
Letter at 5.
24NON1
ddrumheller on DSK120RN23PROD with NOTICES1
Federal Register / Vol. 88, No. 225 / Friday, November 24, 2023 / Notices
response reasonably balances the
commenter’s concern about being
required to report unknown information
and OCC’s need to ensure that its
Clearing Members are diligently
monitoring their own systems so that
OCC can identify, monitor, and manage
the impact of a Security Incident at a
Clearing Member on OCC’s systems and
operations, as well as the listed options
markets generally.
A commenter stated that the content
of the notification should be limited in
scope given the requirement for
‘‘immediate’’ notification, and
recommended that OCC should provide
more detail about the expected content
in the notification.42 The commenter
also expressed the view that the need
for immediate written notice ‘‘does not
provide a clearing member with the
opportunity to evaluate the incident
prior to reporting.’’ 43 OCC addressed
these comments in the amendment by
clarifying the notification requirements
and procedure in the event of a Security
Incident. Specifically, because there are
‘‘innumerable circumstances that could
lead to a Security Incident,’’ rather than
requiring the notice to include specific,
pre-determined content, OCC clarified
that a Clearing Member can share
information it believes is relevant, and
that OCC can follow up directly as
needed.44 OCC also noted that, given the
urgency required to address a Security
Incident quickly and remain functional
as a systemically important financial
market utility, OCC will provide a
dedicated email address for Clearing
Members to provide OCC with written
notification (or confirmation) of a
Security Incident.45 By clarifying that
the notice is limited to information the
affected Clearing Member believes is
relevant and that OCC can follow up
directly with the Clearing Member as
needed, OCC’s response reasonably
balances the commenter’s concern about
the rule not specifying what information
needs to be included in the notice and
OCC’s need to identify, monitor, and
manage the impact of a Security
Incident at a Clearing Member on OCC’s
systems and operations, as well as the
listed options markets generally.
Allowing Clearing Members to provide
the information they believe is relevant
together with OCC’s ability to gather
additional information as necessary and
appropriate helps ensure that OCC gets
timely information on Security
Incidents, which supports OCC’s ability
42 Id.
at 5–6.
at 5.
44 See Notice of Partial Amendment, 88 FR at
36352.
45 See id.
43 Id.
VerDate Sep<11>2014
21:46 Nov 22, 2023
Jkt 262001
to identify, monitor, and manage risks
posed to its operations,46 consistent
with the Commission’s guidance
regarding Rule 17Ad–22(e)(17)(i).
A commenter stated that OCC should
enumerate threshold conditions that
must be satisfied before OCC could
disconnect or modify a Clearing
Member’s access.47 The commenter
further requested clarification on the
relationship between the proposed
Security Incident notifications and the
proposed disconnection and
reconnection process.48 In response, as
noted above, OCC amended the
definition of Security Incident to limit
it to a cyber-related disruption or
intrusion of the Clearing Member’s
systems that is reasonably likely to pose
an imminent risk or threat to OCC’s
operations.49 OCC also stated that
because there are ‘‘innumerable
circumstances that could lead to a
Security Incident,’’ such a
determination would require an
evaluation of the specific facts and
circumstances related to the Security
Incident, and amended the proposed
rule to include a non-exhaustive list of
factors OCC will consider when making
a disconnection determination.50
Specifically, as amended, the rule
provides that OCC may consider any
one or more of the following in
determining whether or not to
disconnect a member: the potential loss
of control by a Clearing Member of its
internal system(s), the potential loss of
OCC’s confidential data, the potential
strain on or loss of OCC’s resources due
to OCC’s inability to perform clearance
and settlement functions, and the
overall severity of the threat to OCC’s
security and operations. By amending
the definition of a Security Incident in
this way, OCC identified the threshold
condition that must be satisfied before
OCC could disconnect or modify a
Clearing Member’s access in response to
a Security Incident. Specifically, unless
the Clearing Member experiences a
cyber-related disruption or intrusion of
the Clearing Member’s system that is
reasonably likely to pose an imminent
risk or threat to OCC’s operations, OCC
46 The clarification provided by OCC also
addresses a commenter concern that the disclosure
should ‘‘take into account the fact that target firms
often have incomplete information about a
cybersecurity incident and engage in an
investigative process over a period of time.’’ FIF
Letter at 7. OCC’s ability to follow up directly as
needed ensures that Clearing Members will have an
opportunity to provide additional information as
facts develop.
47 Id. at 6–7.
48 Id. at 7.
49 See Notice of Partial Amendment supra note 7.
50 See Notice of Partial Amendment, 88 FR at
36353.
PO 00000
Frm 00133
Fmt 4703
Sfmt 4703
82445
would not have a basis under the
proposed rule to disconnect or modify
a Clearing Member’s access to OCC
systems. Further, disconnection or
modification of a Clearing Member’s
access to OCC’s systems is not an
automatic consequence in the event a
Clearing Member notifies OCC of a
Security Incident. OCC stated that it
believes that not all Security Incident
notifications will result in a Clearing
Member disconnection, and the
proposed rule does not mandate
disconnection in response to a Security
Incident. Rather, disconnection or
modification of access are among the
various mitigation actions that OCC may
take if it determines that it is reasonably
necessary to do so to mitigate a Security
Incident’s effects on its operations. In
addition, OCC’s non-exhaustive list of
factors provides examples of specific
risks or threats to OCC’s operations that
OCC would consider as factors in
making a disconnection determination,
and that are consistent with the
Commission’s guidance related to Rule
17Ad–22(e)(17)(i). Given the extensive
variety and rapidly evolving nature of
cyber-related threats, it is reasonable for
OCC to balance its need to evaluate the
specific facts and circumstances of each
cyber-related incident at a Clearing
Member and the desire of Clearing
Members to know in advance the
specific conditions that could result in
a disconnection or modification of its
access to OCC’s systems. OCC’s
proposed approach of defining a single,
specific threshold condition—namely, a
cyber-related disruption or intrusion of
the Clearing Member’s system
reasonably likely to pose an imminent
risk or threat to OCC’s operations—
while providing an illustrative list of
factors OCC will consider as it makes a
disconnection determination, strikes
this balance.
By making these amendments, OCC
also clarified the connection between a
Security Incident notification and the
proposed disconnection and
reconnection process. If OCC
determines that disconnection is
reasonably necessary to mitigate any
effects to its operations, the process for
the affected Clearing Member to
reconnect to OCC’s systems following
the disconnection are set forth in
paragraph (e) of proposed rule 213,
‘‘Procedures for Connecting Following a
Security Incident.’’ Additionally, OCC
amended the proposed rule to require a
Clearing Member to complete the
Reconnection Attestation and
Reconnection Checklist only in the
event that OCC disconnected the
Clearing Member that has reported a
E:\FR\FM\24NON1.SGM
24NON1
ddrumheller on DSK120RN23PROD with NOTICES1
82446
Federal Register / Vol. 88, No. 225 / Friday, November 24, 2023 / Notices
Security Incident.51 The information
provided in the Reconnection
Attestation and Reconnection Checklist
would help OCC determine whether the
risk to OCC has been mitigated
sufficiently for OCC to resume
connectivity to the Clearing Member.
Taken together, these changes as well
would allow OCC to identify and
mitigate operational risks presented by
its Clearing Members and secure its
environment more effectively against
potential vulnerabilities.
A commenter stated that the
Reconnection Checklist appears to be a
security incident notification form
rather than a checklist for
reconnection.52 As discussed above, the
Reconnection Checklist is only required
in the event that a Clearing Member is
disconnected from OCC’s systems as the
result of a Security Incident. The
checklist includes information such as
the nature of the incident, the steps
taken to contain the incident, and any
OCC data that was compromised during
the incident, all of which is used by
OCC to determine whether the risk to
OCC posed by the Security Incident has
been mitigated sufficiently to resume
the Clearing Member’s connectivity. The
commenter also stated that the proposed
rule should establish a clear process for
reconnection, including the process and
timing for OCC to decide on a
reconnection request and the process for
OCC to communicate its
determination.53 As noted above, the
process for reconnection is set forth in
paragraph (e) of proposed Rule 213. In
addition, although the proposed rule
does not mandate the specific timing for
OCC to make a reconnection
determination, the information provided
to OCC by the Reconnection Attestation
and Reconnection Checklist is designed
to facilitate OCC’s reconnection
determinations, which should help
expedite the process. Given the
innumerable circumstances that could
lead to a Security Incident and a
resulting disconnection, the proposed
rule strikes a reasonable balance
between OCC’s need to ensure that the
operational risks presented by a
Security Incident at a Clearing Member
have been sufficiently mitigated before
reconnecting to OCC’s systems and the
Clearing Member’s desire to reconnect
as quickly as possible.
A commenter expressed concern that
the information required to be disclosed
in Reconnection Checklist and
Attestation is too detailed and could
either provide a roadmap to malicious
51 Id.
52 FIF
Letter at 8.
53 Id.
VerDate Sep<11>2014
21:46 Nov 22, 2023
Jkt 262001
actors or subject the Clearing Member to
third-party litigation risk.54 The
commenter also requested clarification
on the protection of information
reported by Clearing Members to OCC.55
Any information disclosed to OCC in a
Reconnection Checklist and Attestation
would be kept confidential by OCC and
would not be made publicly available,
including to third parties and potential
malicious actors, and therefore would
not, by virtue of being provided to OCC,
provide a roadmap to malicious actors
or subject the reporting Clearing
Member to third-party litigation risk.
Further, OCC routinely receives, and is
responsible for the protection of,
confidential information related to its
Clearing Members. For example, OCC
routinely receives and protects
confidential and sensitive information
related Clearing Members’ risk
management practices,56 as well as
information related to any financial or
operational difficulty reported by
Clearing Members to any regulatory
organization.57
The commenter also stated that OCC
should provide an exception to
disclosure when law enforcement
directs the member not to disclose.58
However, the lack of the type of law
enforcement exception suggested by the
commenter is consistent with the
Exchange Act. For example, OCC’s
current rules, as approved by the
Commission, include various reporting
and disclosure requirements, none of
which provide the type of explicit law
enforcement exception suggested by the
commenter.59
The commenter also questioned
whether the Clearing Members should
be required to provide evidence of
regulatory compliance to other
government agencies and third
parties.60 OCC’s current rules, as
54 Id. at 7–8. For example, the commenter
expressed concern that the level of detail required
by the proposed rule change could provide a
roadmap for malicious actors who wish to gain
access to OCC’s systems or could present thirdparty litigation risk to the Clearing Member.
55 Id. at 6.
56 See OCC Rule 305(b).
57 See OCC Rule 306A(1).
58 FIF Letter at 6.
59 See, e.g., OCC Rules 207 (Submission to and
Retrieval of Items to and from the Corporation) and
306A (Event-Based Reporting).
60 FIF Letter at 7. The commenter stated that
many clearing members would be subject to
numerous governmental and third-party
notification requirements in the event of a
cybersecurity incident and expressed confusion
regarding why OCC would require an attestation
relating to a clearing member’s notification to other
regulators and third-parties if the clearing member
has provided all required notifications to the OCC.
Id. The commenter also stated that any required
attestation should be to the knowledge of the
attesting executive. The proposed rule change states
PO 00000
Frm 00134
Fmt 4703
Sfmt 4703
approved by the Commission, require
Clearing Members to notify OCC if the
Clearing Member is required to notify
any regulatory organization of any
operational difficulty affecting the
Clearing Member, or of any failure by
the Clearing Member to be in
compliance with the operational
responsibility rules of any regulatory
organization.61 Thus, a Clearing
Member that experiences a Security
Incident that subjects the Clearing
Member to a regulatory notification
requirement is already required, under
existing OCC Rules, to notify OCC that
it complied with that requirement. The
proposed rule change does not create a
new obligation for Clearing Members to
notify OCC of regulatory notices to
regulatory organizations; it merely
specifies when a notification to OCC in
connection with a Security Incident
must be provided.
Finally, a commenter referenced a
number of cybersecurity-related rule
proposals recently published by the
Commission and stated that the
proposed rule change should be delayed
at least until the Commission finalizes
all the currently proposed cybersecurity
rulemaking to ensure that investors are
protected from cyber threats and
unnecessary additional burdens are not
placed on OCC Clearing Members.62
The commenter states further that the
proposed rule change interconnects and
may overlap with four different rules
proposed by the Commission,63 and
requests that the Commission extend the
period for comment on the proposed
rule change to allow time to analyze the
proposed rule change alongside the
rules proposed by the Commission.64
explicitly that the representations in the
Reconnection Attestation would be made ‘‘on a
good faith, best efforts basis,’’ which necessarily
means the attestation would be to the knowledge of
the attesting executive. See proposed Rule
213(e)(1)(A).
61 See OCC Rule 306A (Event-Based Reporting).
62 See letter from Melissa MacGregor, Managing
Director, Deputy General Counsel & Corporate
Secretary, SIFMA, dated April 25, 2023, to Vanessa
Countryman, Secretary, Commission, (‘‘SIFMA
Letter’’) available at https://www.sec.gov/
comments/sr-occ-2023-003/srocc202300320164982-334488.pdf. A similar perspective was
provided by a second commenter. See FIF Letter at
8–9; see also Securities Exchange Act Release Nos.
97141 (Mar. 15, 2022), 88 FR 20616 (Apr. 6, 2023);
97142 (Mar. 15, 2022), 88 FR 20212 (Apr. 5, 2023);
97143 (Mar. 15, 2023), 88 FR 23146 (Apr. 14, 2023);
97144 (Mar. 15, 2023), 88 FR 16921 (Mar. 21, 2023);
94382 (Mar. 9, 2022), 87 FR 16590 (Mar. 23, 2022).
63 SIFMA Letter at 2. SIFMA does not state how
the proposed rule change interconnects or conflicts
with the Commission’s proposed rules.
64 Id. This concern was echoed in a letter from the
FIF. See FIF Letter (stating that OCC should
withdraw the proposed rule change and resubmit
after the comment periods for the Commission’s
proposals have expired).
E:\FR\FM\24NON1.SGM
24NON1
Federal Register / Vol. 88, No. 225 / Friday, November 24, 2023 / Notices
Under the Exchange Act and relevant
rules thereunder, SROs, including OCC,
determine for themselves when to file a
proposed rule change. The Exchange
Act defines the process and time within
which the Commission may act,65 and
Section 19(b)(2)(C) of the Exchange Act
requires the Commission to approve a
proposed rule change of a SRO if it finds
that such change is consistent with the
Exchange Act and rules and regulations
thereunder that are applicable to the
SRO.66 Concerns regarding rules
proposed by the Commission may be
presented as comments to such rules so
that the Commission may consider them
in determining what, if any, final rule it
will adopt.
Based on the foregoing, the
Commission finds that the proposed
rule change is consistent with the
requirements of Rule 17Ad–22(e)(17)(i)
under the Exchange Act.67
IV. Conclusion
On the basis of the foregoing, the
Commission finds that the proposed
rule change, as modified by Partial
Amendment No. 1, is consistent with
the requirements of the Exchange Act,
and in particular, the requirements of
Section 17A of the Exchange Act 68 and
the rules and regulations thereunder.
It is therefore ordered, pursuant to
Section 19(b)(2) of the Exchange Act,69
that the proposed rule change (SR–
OCC–2023–003), as modified by Partial
Amendment No. 1, be, and hereby is,
approved.
For the Commission, by the Division of
Trading and Markets, pursuant to delegated
authority.70
Sherry R. Haywood,
Assistant Secretary.
[FR Doc. 2023–25883 Filed 11–22–23; 8:45 am]
ddrumheller on DSK120RN23PROD with NOTICES1
BILLING CODE 8011–01–P
65 See, e.g., 15 U.S.C. 78s(b)(2)(A)(ii) (allowing the
Commission to extend the period for review by not
more than 45 days if the Commission determines
that a longer period is appropriate and publishes
the reasons for such determination).
66 15 U.S.C. 78s(b)(2)(C).
67 17 CFR 240.17Ad–22(e)(17)(i).
68 In approving this proposed rule change, the
Commission has considered the proposed rules’
impact on efficiency, competition, and capital
formation. See 15 U.S.C. 78c(f).
69 15 U.S.C. 78s(b)(2).
70 17 CFR 200.30–3(a)(12).
VerDate Sep<11>2014
21:46 Nov 22, 2023
Jkt 262001
SECURITIES AND EXCHANGE
COMMISSION
[Release No. 34–98980; File No. SR–FINRA–
2023–006]
Self-Regulatory Organizations;
Financial Industry Regulatory
Authority, Inc.; Notice of Filing of
Amendment No. 2 and Order Granting
Accelerated Approval of a Proposed
Rule Change, as Modified by
Amendment Nos. 1 and 2, To Adopt
Supplementary Material .19
(Residential Supervisory Location)
Under FINRA Rule 3110 (Supervision)
November 17, 2023.
I. Introduction
On March 29, 2023, the Financial
Industry Regulatory Authority, Inc.
(‘‘FINRA’’) filed with the Securities and
Exchange Commission (‘‘SEC’’ or
‘‘Commission’’), pursuant to Section
19(b)(1) of the Securities Exchange Act
of 1934 (‘‘Exchange Act’’) 1 and Rule
19b–4 thereunder,2 a proposed rule
change (SR–FINRA–2023–006) to adopt
new Supplementary Material .19
(Residential Supervisory Location)
under FINRA Rule 3110 (Supervision).
The proposed rule change, as modified
by Amendment Nos. 1 and 2
(hereinafter, the ‘‘proposed rule change’’
unless otherwise specified), would treat
a private residence in which an
associated person engages in specified
supervisory activities, subject to certain
safeguards and limitations, as a nonbranch location.3 Treated as non-branch
locations, these newly defined
Residential Supervisory Locations
(‘‘RSLs’’) would be subject to
inspections on a regular periodic
schedule (presumed to be at least every
three years) instead of the annual
inspection currently required for
‘‘offices of supervisory jurisdiction’’
(‘‘OSJs’’) and ‘‘supervisory branch
offices.’’ 4
The proposed rule change was
published for public comment in the
Federal Register on April 6, 2023.5 On
May 16, 2023, FINRA consented to an
extension of the time period in which
the Commission must approve the
proposed rule change, disapprove the
proposed rule change, or institute
proceedings to determine whether to
1 15
U.S.C. 78s(b)(1).
CFR 240.19b–4.
3 See Exchange Act Release No. 97237 (Mar. 31,
2023), 88 FR 20568, 20568 (Apr. 6, 2023) (File No.
SR–FINRA–2023–006 (‘‘Notice’’) (citing FINRA
Rules 3110(c)(1)(C) and 3110.13), https://
www.govinfo.gov/content/pkg/FR-2023-04-06/pdf/
2023-07145.pdf.
4 See id.
5 Id.
2 17
PO 00000
Frm 00135
Fmt 4703
Sfmt 4703
82447
approve or disapprove the proposed
rule change to July 5, 2023.6 The
Commission received thirteen comment
letters in response to the Notice.7
On July 3, 2023, FINRA filed an
amendment to the proposed rule change
(‘‘Amendment No. 1’’).8 On July 5, 2023,
the Commission published a notice of
filing of Amendment No. 1 and an order
instituting proceedings to determine
whether to approve or disapprove the
proposed rule change, as modified by
Amendment No. 1.9 On July 25, 2023,
FINRA responded to the comment
letters received in response to the
Notice.10 The Commission received
twelve comment letters in response to
the notice of Amendment No. 1 and
order instituting proceedings.
On September 14, 2023, FINRA
responded to the comment letters
received in response to the notice of
Amendment No. 1 and order instituting
proceedings, and it filed an amendment
to the proposed rule change
(‘‘Amendment No. 2’’).11 On September
22, 2023, FINRA consented to an
extension of the time period in which
the Commission must approve or
disapprove the proposed rule change to
December 2, 2023.12 The Commission is
publishing this order to provide notice
of the filing of, and to solicit comments
on, Amendment No. 2 from interested
persons and is approving the proposed
6 See letter from Sarah Kwak, Associate General
Counsel, Office of General Counsel, FINRA, to
Daniel Fisher, Branch Chief, Division of Trading
and Markets, Commission, dated May 16, 2023,
https://www.finra.org/sites/default/files/2023-05/srfinra-2023-006-extension-no-1.pdf.
7 The comment letters are available at https://
www.sec.gov/comments/sr-finra-2023-006/
srfinra2023006.htm.
8 See Amendment No. 1, https://www.finra.org/
sites/default/files/2023-07/sr-2023-006-amendmentNo1.pdf.
9 Exchange Act Release No. 97839 (July 5, 2023),
88 FR 44173 (July 11, 2023) (File No. SR–FINRA–
2023–006), https://www.govinfo.gov/content/pkg/
FR-2023-07-11/pdf/2023-14523.pdf.
10 See letter from Sarah Kwak, Associate General
Counsel, Office of General Counsel, FINRA, to
Vanessa Countryman, Secretary, Commission, dated
July 25, 2023 (‘‘FINRA Response I’’), https://
www.sec.gov/comments/sr-finra-2023-006/
srfinra2023006-235699-491502.pdf.
11 See Amendment No. 2, https://www.finra.org/
sites/default/files/2023-09/SR-FINRA-2023-006Amendment-2.pdf; letter from Kosha Dalal, Vice
President and Associate General Counsel, Office of
General Counsel, FINRA, to Vanessa Countryman,
Secretary, Commission, dated Sept. 14, 2023
(‘‘FINRA Response II’’), https://www.sec.gov/
comments/sr-finra-2023-006/srfinra2023006259039-608182.pdf.
12 See letter from Sarah Kwak, Associate General
Counsel, Office of General Counsel, FINRA, to
Daniel Fisher, Branch Chief, Division of Trading
and Markets, Commission, dated Sept. 22, 2023,
https://www.finra.org/sites/default/files/2023-09/srfinra-2023-006-ext2.pdf.
E:\FR\FM\24NON1.SGM
24NON1
Agencies
[Federal Register Volume 88, Number 225 (Friday, November 24, 2023)]
[Notices]
[Pages 82441-82447]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2023-25883]
-----------------------------------------------------------------------
SECURITIES AND EXCHANGE COMMISSION
[Release No. 34-98979; File No. SR-OCC-2023-003]
Self-Regulatory Organizations; The Options Clearing Corporation;
Order Granting Approval of Proposed Rule Change, as Modified by Partial
Amendment No. 1, Concerning Clearing Member Cybersecurity Obligations
November 17, 2023.
I. Introduction
On March 21, 2023, the Options Clearing Corporation (``OCC'') filed
with the Securities and Exchange Commission (``Commission'') the
proposed rule change SR-OCC-2023-003 pursuant to Section 19(b) of the
Securities Exchange Act of 1934 (``Exchange Act'') \1\ and Rule 19b-4
\2\ thereunder. The proposed rule change would amend certain provisions
in OCC's Rules relating to each Clearing Member's obligation to address
a ``Security Incident'' (i.e., the occurrence of a cyber-related
disruption or intrusion of a Clearing Member's systems that is
reasonably likely to pose an imminent risk or threat to OCC's
operations) of that Clearing Member. The proposed rule change was
published for public comment in the Federal Register on April 5,
2023.\3\ The Commission has received comments regarding the proposed
rule change.\4\
---------------------------------------------------------------------------
\1\ 15 U.S.C. 78s(b)(1).
\2\ 17 CFR 240.19b-4.
\3\ Securities Exchange Act Release No. 97225 (Mar. 30, 2023),
88 FR 20195 (Apr. 5, 2023) (File No. SR-OCC-2023-003) (``Notice of
Filing'').
\4\ Comments on the proposed rule change are available at
https://www.sec.gov/comments/sr-occ-2023-003/srocc2023003.htm.
---------------------------------------------------------------------------
On May 18, 2023, pursuant to the Section 19(b)(2) of the Exchange
Act,\5\ the Commission designated a longer period within which to
approve, disapprove, or institute proceedings to determine whether to
approve the proposed rule change.\6\ On May 24, 2023, OCC filed Partial
Amendment No. 1 to the Notice of Filing.\7\ For the reasons discussed
below, the Commission is approving the proposed rule change, as
modified by Partial Amendment No. 1 (hereinafter, ``proposed rule
change'').
---------------------------------------------------------------------------
\5\ 15 U.S.C. 78s(b)(2).
\6\ See Securities Exchange Act Release No. 97525 (May 18,
2023), 88 FR 33655 (May 24, 2023) (File No. SR-OCC-2023-003).
\7\ See Securities Exchange Act Release No. 97602 (May 26,
2023), 88 FR 36351 (June 2, 2023) (File No. SR-OCC-2023-003)
(``Notice of Partial Amendment''). OCC submitted Partial Amendment
No. 1 in response to comments regarding the proposed definition of
``Security Incident'' for purposes of proposed Rule 213(d), the
notification requirements and procedure in the event of a Security
Incident, factors considered when determining whether to disconnect
or reduce a clearing member's access, and clarification related to
reconnection.
---------------------------------------------------------------------------
II. Background
Currently, the only OCC Rule governing a Clearing Member's
cybersecurity obligations to OCC is Rule 219, titled ``Cybersecurity
Confirmation.'' \8\ It requires Clearing Members and applicants for
clearing membership to submit to OCC a form called the ``Cybersecurity
Confirmation'' at least every two years or as part of its application
materials. Through the form,
[[Page 82442]]
Clearing Members and applicants confirm that they maintain a
comprehensive cybersecurity program that meets certain criteria (e.g.,
the cybersecurity program is approved by senior management, it is
reviewed and updated periodically, the cybersecurity program is
designed to protect the segment of the Clearing Member's or applicant's
system that interacts with OCC, it includes a process for the Clearing
Member to remediate cyber issues, etc.). However, current Rule 219 does
not require Clearing Members to notify OCC if they experience a
cybersecurity incident that could impact OCC or otherwise address OCC's
processes, or the Clearing Member's obligations with respect to OCC.
---------------------------------------------------------------------------
\8\ Capitalized terms used but not defined herein have the
meanings specified in OCC's Rules and By-Laws, available at https://www.theocc.com/about/publications/bylaws.jsp.
---------------------------------------------------------------------------
The proposed rule change would renumber Rule 219 as Rule 213 and
rename the rule ``Cybersecurity Obligations'' to reflect the expanded
scope of the Rule.\9\ It also would add section headings to the Rule
and replace references to ``OCC'' with references to ``the
Corporation,'' but otherwise would not change the provisions regarding
the existing Cybersecurity Confirmation form that confirms the
existence of a Clearing Member's cybersecurity program.\10\
---------------------------------------------------------------------------
\9\ The renumbering follows proposed changes to OCC's clearing
membership standards, which includes removal of current Rules 213
through 218. See Securities Exchange Act Release No. 97150 (Mar. 15,
2023), 88 FR 17046 (Mar. 21, 2023) (File No. SR-OCC-2023-002).
\10\ Specifically, OCC would add the following headings:
``Cybersecurity Confirmation Submission'' to paragraph (a);
``Representations in the Cybersecurity Confirmation'' to paragraph
(b); and ``Execution of the Cybersecurity Confirmation'' to
paragraph (c).
---------------------------------------------------------------------------
The substantive changes to the Rule would be the addition of two
new subsections--(d) and (e)--titled ``Occurrence of a Security
Incident'' and ``Procedures for Connecting Following a Security
Incident,'' respectively. New subsection (d) would require a Clearing
Member to immediately notify OCC if the member becomes aware or should
be aware of a Security Incident (as defined in the Rule). It would also
specify that OCC may take actions reasonably necessary to mitigate any
effects on its operations following a Security Incident. New subsection
(e) would require a Clearing Member wishing to reconnect its systems to
OCC's systems to provide OCC with a new form, titled ``Reconnection
Attestation,'' that describes the Security Incident and attests to
certain security requirements, as well as an associated checklist,
titled ``Reconnection Checklist,'' that describes the affected Clearing
Member's remediation efforts and other key information. Each of these
proposed changes is described in greater detail below.
A. New Paragraph (d): Occurrence of a Security Incident
Proposed Rule 213(d) would define a Security Incident as an
incident that has occurred or is occurring involving a cyber-related
disruption or intrusion of the Clearing Member's system(s) that is
reasonably likely to pose an imminent risk or threat to OCC's
operations.\11\ To provide guidance regarding the types of disruptions
or intrusions that might be considered Security Incidents, the proposed
rule includes a non-exhaustive list of examples. Specifically, a
Security Incident may include any disruption or degradation of the
normal operation of the Clearing Member's systems or any unauthorized
entry into the Clearing Member's systems that would result in loss of
OCC's data or system integrity, an unauthorized disclosure of sensitive
information related to OCC, or the inability of OCC to conduct
essential clearance and settlement functions.\12\
---------------------------------------------------------------------------
\11\ In response to public comment, OCC amended the proposed
rule change to specify that a disruption or intrusion of a Clearing
Member's systems would only be deemed a Security Incident if it is
``reasonably likely to pose an imminent risk or threat to OCC's
operations.'' See Notice of Partial Amendment, 88 FR at 36352.
\12\ In response to public comment, OCC added the non-exhaustive
list of potential Security Incidents to clarify that the focus of
the Rule would be on the potential impact on OCC of a disruption or
intrusion. See Notice of Partial Amendment, 88 FR at 36352.
---------------------------------------------------------------------------
Under the proposed rule, a Clearing Member would be required to
immediately notify OCC if the member becomes aware or should be aware
that there has been a Security Incident or that a Security Incident is
occurring.\13\ The Clearing Member would also need to promptly confirm
such notice in writing.
---------------------------------------------------------------------------
\13\ See Notice of Partial Amendment, 88 FR at 36352.
---------------------------------------------------------------------------
The proposed rule would specify that, if OCC receives notice of a
Security Incident from a Clearing Member or has a reasonable basis to
believe a Security Incident has occurred or is occurring, OCC may take
actions reasonably necessary to mitigate any effects to its operations,
including disconnecting the Clearing Member's access to OCC's
information and data systems or modifying the scope and specifications
of such access. Finally, paragraph (d) of the proposed rule would
provide a non-exhaustive list of factors OCC may consider in
determining whether to modify a Clearing Member's access to OCC's
information and data systems, up to and including disconnection, in
response to a Security Incident. Specifically, among other factors, OCC
may consider the potential loss of control by a Clearing Member of its
internal system(s), the potential loss of OCC's confidential data, the
potential strain on or loss of OCC's resources due to OCC's inability
to perform clearance and settlement functions, and the overall severity
of the threat to the security and operations of OCC.\14\ Further, if
the Corporation reasonably determines that disconnection of a Clearing
Member is necessary, the Clearing Member must continue to meet its
obligations to the Corporation, notwithstanding disconnection from the
Corporation's systems.
---------------------------------------------------------------------------
\14\ In response to public comment, OCC amended its proposed
rule to specify that these are the types of factors OCC would
consider when determining whether to disconnect a Clearing Member.
See Notice of Partial Amendment, 88 FR at 36353. OCC also clarified
its anticipation that not all Security Incident notifications will
result in a Clearing Member disconnection. See id. at 36352.
---------------------------------------------------------------------------
B. New Paragraph (e): Procedures for Connecting Following a Security
Incident That Results in Disconnection
Proposed Rule 213(e) would clarify the process for a Clearing
Member to request reconnection to OCC's systems following disconnection
as a result of a Security Incident. In particular, the Clearing Member
would need to complete and submit, upon OCC's request, a new form
referred to by OCC as the ``Reconnection Attestation'' and a related
checklist referred to by OCC as the ``Reconnection Checklist.'' The
Reconnection Attestation would include a text box for the Clearing
Member to provide a narrative description of the Security Incident and
five representations to which, by signing the form, the Clearing Member
would be attesting. Specifically, by signing the Reconnection
Attestation, the Clearing Member would be attesting that it has:
provided full, complete and accurate information in
response to all requests made by OCC regarding the Security Incident,
including all requests contained in the Reconnection Checklist, on a
good faith, best efforts basis;
provided full, complete and accurate information regarding
any OCC data or systems that were potentially compromised during the
Security Incident, including any potential exposure of credentials used
to access OCC's systems, and will immediately notify OCC if it later
becomes aware of a previously undetected or unreported compromise of
OCC data or systems during the Security Incident;
[[Page 82443]]
determined whether the Security Incident resulted,
directly or indirectly, from any controls that failed or were
circumvented by its employees, contractors or agents (``Failed
Controls''); \15\
---------------------------------------------------------------------------
\15\ The proposed language would further specify that the
Clearing Member has communicated the existence of Failed Controls to
OCC and is remediating or has remediated all Failed Controls.
---------------------------------------------------------------------------
implemented, or will implement promptly, technical and
operational changes, both preventative and detective, with the intent
to prevent a recurrence of the Security Incident and has provided
written summaries of such changes to OCC; and
complied and will continue to comply with all applicable
laws in connection with its response to the Security Incident,
including any notifications required to be provided to government
agencies, OCC, and third parties.\16\
---------------------------------------------------------------------------
\16\ See proposed Rule 213(e)(1)(A) through (E). Further, each
Reconnection Attestation must be provided in writing and signed by a
designated senior executive of the Clearing Member.
---------------------------------------------------------------------------
The associated Reconnection Checklist would include questions
designed to elicit additional details regarding the Security Incident,
including the potential cause of the incident, steps taken to contain
it, the exposure and impact to OCC's systems or data, the Clearing
Member's remediation efforts, and any other details relevant to the
Clearing Member's request to reconnect to OCC's systems. The
Reconnection Checklist would require the Clearing Member to respond to
the following questions: \17\
---------------------------------------------------------------------------
\17\ The description of the checklist provided here is based on
the Exhibit 3 to File No. SR-OCC-2023-003 provided by OCC at the
time of filing.
---------------------------------------------------------------------------
was the disconnection the result of a cybersecurity-
related incident;
describe the nature of the incident;
what steps were taken to contain the incident;
what OCC data, if any, was compromised during the
incident;
what OCC systems, if any, were impacted during the
incident;
was there any risk of exposure of credentials used to
access OCC systems and, if so, were the credentials reissued;
which controls were circumvented or failed that led to the
incident occurring;
what changes, preventative and detective, were implemented
to prevent a reoccurrence;
how has data integrity been preserved and what data checks
have been performed prior to reconnecting to and sending/receiving data
to/from OCC;
have third-parties, including government agencies, been
notified; and
any additional details relevant to reconnection.\18\
---------------------------------------------------------------------------
\18\ These are the specific questions included in the
Reconnection Checklist that OCC submitted as Exhibit 3 to the
proposed rule change. See Exhibit 3 to File No. SR OCC2023-003.
However, proposed Rule 213(e)(2) specifies that the Reconnection
Checklist may require ``information including, but not limited to,''
the 11 questions noted above. This is to account for the evolving
nature of Security Incidents and provide OCC with flexibility to
modify the specific information requirements if necessary. See
Notice of Filing, 88 FR at 20196.
---------------------------------------------------------------------------
According to OCC, the Reconnection Attestation and Reconnection
Checklist are designed to accomplish several goals. First, they are
designed to enable OCC to determine whether the risk or threat to OCC
has been mitigated sufficiently for OCC to resume connectivity to the
Clearing Member.\19\ Second, they are designed to provide OCC with
evidence related to a Clearing Member's response to a Security
Incident, including whether the Clearing Member has appropriate
security requirements and carried out suitable remediation measures, to
enable OCC to better understand and manage Security Incidents more
broadly.\20\ Finally, they would better enable OCC to identify areas of
interest, concern, or heightened risk by presenting information in a
standardized format.\21\
---------------------------------------------------------------------------
\19\ See Notice of Filing, 88 FR at 20196.
\20\ Id. at 20197.
\21\ Id.
---------------------------------------------------------------------------
III. Discussion and Commission Findings
Section 19(b)(2)(C) of the Exchange Act directs the Commission to
approve a proposed rule change of a self-regulatory organization if it
finds that such proposed rule change is consistent with the
requirements of the Exchange Act and the rules and regulations
thereunder applicable to such organization.\22\ Under the Commission's
Rules of Practice, the ``burden to demonstrate that a proposed rule
change is consistent with the Exchange Act and the rules and
regulations issued thereunder . . . is on the self-regulatory
organization [`SRO'] that proposed the rule change.'' \23\
---------------------------------------------------------------------------
\22\ 15 U.S.C. 78s(b)(2)(C).
\23\ Rule 700(b)(3), Commission Rules of Practice, 17 CFR
201.700(b)(3).
---------------------------------------------------------------------------
The description of a proposed rule change, its purpose and
operation, its effect, and a legal analysis of its consistency with
applicable requirements must all be sufficiently detailed and specific
to support an affirmative Commission finding,\24\ and any failure of an
SRO to provide this information may result in the Commission not having
a sufficient basis to make an affirmative finding that a proposed rule
change is consistent with the Exchange Act and the applicable rules and
regulations.\25\ Moreover, ``unquestioning reliance'' on an SRO's
representations in a proposed rule change is not sufficient to justify
Commission approval of a proposed rule change.\26\
---------------------------------------------------------------------------
\24\ Id.
\25\ Id.
\26\ Susquehanna Int'l Group, LLP v. Securities and Exchange
Commission, 866 F.3d 442, 447 (D.C. Cir. 2017) (``Susquehanna'').
---------------------------------------------------------------------------
After carefully considering the proposed rule change, the
Commission finds that the proposed rule change is consistent with the
requirements of the Exchange Act and the rules and regulations
thereunder applicable to OCC. More specifically, the Commission finds
that the proposal is consistent with Section 17A(b)(3)(F) of the
Exchange Act \27\ and Rule 17Ad-22(e)(17)(i) \28\ thereunder as
described in detail below.
---------------------------------------------------------------------------
\27\ 15 U.S.C. 78q-1(b)(3)(F).
\28\ 17 CFR 240.17Ad-22(e)(17)(i).
---------------------------------------------------------------------------
A. Consistency With Section 17A(b)(3)(F) of the Exchange Act
Section 17A(b)(3)(F) of the Exchange Act requires, among other
things, that a clearing agency's rules are designed to promote the
prompt and accurate clearance and settlement of securities
transactions.\29\ In addition to centralizing relevant information
pertaining to Clearing Member Security Incidents in a single rule, the
proposed rule change is designed to support OCC's management of
potential cybersecurity risks by enhancing OCC's ability to identify
and mitigate cybersecurity risks posed by a Security Incident
experienced by one of OCC's Clearing Members. It also is designed to
standardize OCC's cybersecurity risk management practices with respect
to such Security Incidents. Among other things, the changes set forth
Clearing Member obligations and the actions OCC may take if reasonably
necessary to mitigate the effects of a Security Incident on its
operations. As discussed further below, the changes also strengthen
OCC's ability to manage its cyber-related risks by requiring Clearing
Members to immediately notify OCC if the Clearing Member becomes aware
of or should be aware that there has been a Security Incident or one is
occurring, and promptly confirm such a notice in writing. Taken
together, the proposed changes should strengthen OCC's cybersecurity
risk management processes. By creating a consistent set of obligations
on Clearing Members for identifying and reporting Security
[[Page 82444]]
Incidents, OCC would enhance its ability to monitor, mitigate, and
manage cybersecurity risks--such as unauthorized disclosure of
sensitive information or a loss of data or system integrity--in the
event a Clearing Member experiences a Security Incident. Because OCC's
information, data, and systems support and enable OCC's ability to
conduct essential clearance and settlement functions, enhancing OCC's
ability to limit the impact of a Security Incident at a Clearing Member
promotes OCC's ability to continue the prompt and accurate clearance
and settlement of securities transactions.
---------------------------------------------------------------------------
\29\ 15 U.S.C. 78q-1(b)(3)(F).
---------------------------------------------------------------------------
Accordingly, and for the reasons discussed below, the proposal is
consistent with the requirements of Section 17A(b)(3)(F) of the
Exchange Act.
B. Consistency With Rule 17Ad-22(e)(17)(i) of the Exchange Act
Rule 17Ad-22(e)(17)(i) requires that a covered clearing agency
establish, implement, maintain and enforce written policies and
procedures reasonably designed to manage the covered clearing agency's
operational risks by identifying the plausible sources of operational
risk, both internal and external, and mitigating their impact through
the use of appropriate systems, policies, procedures, and controls.\30\
In adopting Rule 17Ad-22(e)(17)(i), the Commission provided guidance,
stating that a covered clearing agency generally should consider, among
other things, whether it identifies, monitors, and manages the risks
that key participants pose to its operations.\31\ To the extent they
interact with OCC's systems, Clearing Member systems may present
operational risk to OCC. As described above, OCC proposes requiring
members to report any cyber-related disruption or intrusion that could
pose a risk to OCC's operations, such as a degradation of normal
operations that would result in the inability of OCC to conduct
essential clearance and settlement functions. OCC also proposes
numerous protective measures, such as the ability to take reasonably
necessary actions to mitigate the effects of a Security Incident on its
operations, including disconnecting the Clearing Member's access to
OCC's systems; the ability to consider a non-exhaustive list of factors
to determine whether to modify a Clearing Member's access to OCC's
systems in response to a Security Incident, up to and including
disconnection; and the requirement for disconnected Clearing Members to
complete a Reconnection Attestation and Reconnection Checklist that OCC
would review and evaluate as part of a determination to reconnect the
Clearing Member to OCC's systems. Taken together, these proposals
support OCC's ability to effectively identify, monitor, and manage the
risks that Clearing Members pose to OCC operations, and are therefore
consistent with Rule 17Ad-22(e)(17)(i).
---------------------------------------------------------------------------
\30\ 17 CFR 240.17Ad-22(e)(17)(i).
\31\ See Standards for Covered Clearing Agencies, Securities
Exchange Act Release No. 78961 (Sept. 28, 2016), 81 FR 70786, 70838
(Oct. 13, 2016).
---------------------------------------------------------------------------
A commenter opposed the proposal on a number of grounds.\32\
Specifically, the commenter expressed concerns about the proposed
definition of Security Incident, stating that because the proposed
definition applies to all of a Clearing Member's systems and therefore
could include an incident that would not affect OCC systems, the
definition is inconsistent with the risks identified by OCC in the rule
filing, other regulatory and SRO requirements, and is potentially
beyond the scope of OCC's authority.\33\ The commenter also stated that
OCC's proposed definition of Security Incident is inconsistent with
other regulatory and SRO requirements because it does not require that
a loss or harm has occurred and it does not require that a clearing
member be aware of the incident.\34\ The commenter stated that the
definition of Security Incident should be limited to an incident that
could result in ``loss of data or system integrity,'' ``unauthorized
disclosure of sensitive information,'' or ``an inability [for the OCC]
to conduct essential clearance and settlement functions.'' \35\ The
commenter further requested clarification that the reference to
``disruption or degradation of a clearing member's systems'' in the
proposed definition of Security Incident is limited to cyber-related
disruptions or intrusions resulting from malicious third-party activity
as opposed to, for example, a power outage.\36\
---------------------------------------------------------------------------
\32\ See letter from Howard Meyerson, Managing Director,
Financial Information Forum (``FIF''), dated April 26, 2023, to
Vanessa Countryman, Secretary, Commission (``FIF Letter'').
\33\ Id. at 2-3. FIF stated that, as drafted, a Security
Incident could include an incident that would not affect OCC systems
and this approach appears to be overly broad with the risks
identified in the proposed rule change, indicating that the
reference to ``disruption or degradation of a clearing member's
systems'' in the proposed definition of Security Incident is
ambiguous. Id. at 2.
\34\ Id. at 4-5.
\35\ Id. at 3.
\36\ Id. at 5-6.
---------------------------------------------------------------------------
OCC responded by amending the proposed rule change in a number of
ways.\37\ First, OCC amended the definition of Security Incident to
limit it to a cyber-related disruption or intrusion of the Clearing
Member's systems that is reasonably likely to pose an imminent risk or
threat to OCC's operations.\38\ OCC further amended the definition of
Security Incident to state that such an incident may include, but is
not limited to, any disruption or degradation of the normal operation
of the Clearing Member's systems or any unauthorized entry into the
Clearing Member's systems that would result in loss of OCC's data or
system integrity, unauthorized disclosure of sensitive information
related to OCC, or the inability of OCC to conduct essential clearance
and settlement functions.\39\ In amending the Security Incident
definition this way, OCC reasonably addressed the commenter's concerns
about the scope of the rule by clarifying that only occurrences that
present certain risks or threats to OCC's operations are considered
Security Incidents, and provided examples to help illustrate the types
of risks and threats to OCC's operation that are covered by the rule.
In response to the commenter's concern that the proposed definition of
Security Incident does not require that a clearing member be aware of
the Incident, OCC also amended the proposed definition to require
notice only if the Clearing Member becomes aware or should be aware
that such an incident has occurred or is occurring.\40\ The commenter
further stated that OCC ``should incorporate into the notice provision
a [condition] that only requires reporting when a clearing member has a
reasonable basis to conclude that a reportable cybersecurity incident
has occurred or determines that a reportable cybersecurity incident has
occurred.'' \41\ As noted, OCC amended the proposed definition to
require reporting only where a Clearing Member becomes or should be
aware of a Security Incident. The proposed rule change therefore would
require Clearing Members to engage in reasonable diligence to obtain
and report to OCC readily discoverable information about a Security
Incident, consistent with the Clearing Member's current obligation to
maintain a comprehensive cybersecurity program that, among other
things, is designed to protect the segment of the Clearing Member's
system that interacts with OCC, but it would not require reporting of a
cybersecurity incident if the member could not reasonably be aware of
such an incident. OCC's
[[Page 82445]]
response reasonably balances the commenter's concern about being
required to report unknown information and OCC's need to ensure that
its Clearing Members are diligently monitoring their own systems so
that OCC can identify, monitor, and manage the impact of a Security
Incident at a Clearing Member on OCC's systems and operations, as well
as the listed options markets generally.
---------------------------------------------------------------------------
\37\ See Notice of Partial Amendment supra note 7.
\38\ Id.
\39\ Id.
\40\ Id.
\41\ FIF Letter at 5.
---------------------------------------------------------------------------
A commenter stated that the content of the notification should be
limited in scope given the requirement for ``immediate'' notification,
and recommended that OCC should provide more detail about the expected
content in the notification.\42\ The commenter also expressed the view
that the need for immediate written notice ``does not provide a
clearing member with the opportunity to evaluate the incident prior to
reporting.'' \43\ OCC addressed these comments in the amendment by
clarifying the notification requirements and procedure in the event of
a Security Incident. Specifically, because there are ``innumerable
circumstances that could lead to a Security Incident,'' rather than
requiring the notice to include specific, pre-determined content, OCC
clarified that a Clearing Member can share information it believes is
relevant, and that OCC can follow up directly as needed.\44\ OCC also
noted that, given the urgency required to address a Security Incident
quickly and remain functional as a systemically important financial
market utility, OCC will provide a dedicated email address for Clearing
Members to provide OCC with written notification (or confirmation) of a
Security Incident.\45\ By clarifying that the notice is limited to
information the affected Clearing Member believes is relevant and that
OCC can follow up directly with the Clearing Member as needed, OCC's
response reasonably balances the commenter's concern about the rule not
specifying what information needs to be included in the notice and
OCC's need to identify, monitor, and manage the impact of a Security
Incident at a Clearing Member on OCC's systems and operations, as well
as the listed options markets generally. Allowing Clearing Members to
provide the information they believe is relevant together with OCC's
ability to gather additional information as necessary and appropriate
helps ensure that OCC gets timely information on Security Incidents,
which supports OCC's ability to identify, monitor, and manage risks
posed to its operations,\46\ consistent with the Commission's guidance
regarding Rule 17Ad-22(e)(17)(i).
---------------------------------------------------------------------------
\42\ Id. at 5-6.
\43\ Id. at 5.
\44\ See Notice of Partial Amendment, 88 FR at 36352.
\45\ See id.
\46\ The clarification provided by OCC also addresses a
commenter concern that the disclosure should ``take into account the
fact that target firms often have incomplete information about a
cybersecurity incident and engage in an investigative process over a
period of time.'' FIF Letter at 7. OCC's ability to follow up
directly as needed ensures that Clearing Members will have an
opportunity to provide additional information as facts develop.
---------------------------------------------------------------------------
A commenter stated that OCC should enumerate threshold conditions
that must be satisfied before OCC could disconnect or modify a Clearing
Member's access.\47\ The commenter further requested clarification on
the relationship between the proposed Security Incident notifications
and the proposed disconnection and reconnection process.\48\ In
response, as noted above, OCC amended the definition of Security
Incident to limit it to a cyber-related disruption or intrusion of the
Clearing Member's systems that is reasonably likely to pose an imminent
risk or threat to OCC's operations.\49\ OCC also stated that because
there are ``innumerable circumstances that could lead to a Security
Incident,'' such a determination would require an evaluation of the
specific facts and circumstances related to the Security Incident, and
amended the proposed rule to include a non-exhaustive list of factors
OCC will consider when making a disconnection determination.\50\
Specifically, as amended, the rule provides that OCC may consider any
one or more of the following in determining whether or not to
disconnect a member: the potential loss of control by a Clearing Member
of its internal system(s), the potential loss of OCC's confidential
data, the potential strain on or loss of OCC's resources due to OCC's
inability to perform clearance and settlement functions, and the
overall severity of the threat to OCC's security and operations. By
amending the definition of a Security Incident in this way, OCC
identified the threshold condition that must be satisfied before OCC
could disconnect or modify a Clearing Member's access in response to a
Security Incident. Specifically, unless the Clearing Member experiences
a cyber-related disruption or intrusion of the Clearing Member's system
that is reasonably likely to pose an imminent risk or threat to OCC's
operations, OCC would not have a basis under the proposed rule to
disconnect or modify a Clearing Member's access to OCC systems.
Further, disconnection or modification of a Clearing Member's access to
OCC's systems is not an automatic consequence in the event a Clearing
Member notifies OCC of a Security Incident. OCC stated that it believes
that not all Security Incident notifications will result in a Clearing
Member disconnection, and the proposed rule does not mandate
disconnection in response to a Security Incident. Rather, disconnection
or modification of access are among the various mitigation actions that
OCC may take if it determines that it is reasonably necessary to do so
to mitigate a Security Incident's effects on its operations. In
addition, OCC's non-exhaustive list of factors provides examples of
specific risks or threats to OCC's operations that OCC would consider
as factors in making a disconnection determination, and that are
consistent with the Commission's guidance related to Rule 17Ad-
22(e)(17)(i). Given the extensive variety and rapidly evolving nature
of cyber-related threats, it is reasonable for OCC to balance its need
to evaluate the specific facts and circumstances of each cyber-related
incident at a Clearing Member and the desire of Clearing Members to
know in advance the specific conditions that could result in a
disconnection or modification of its access to OCC's systems. OCC's
proposed approach of defining a single, specific threshold condition--
namely, a cyber-related disruption or intrusion of the Clearing
Member's system reasonably likely to pose an imminent risk or threat to
OCC's operations--while providing an illustrative list of factors OCC
will consider as it makes a disconnection determination, strikes this
balance.
---------------------------------------------------------------------------
\47\ Id. at 6-7.
\48\ Id. at 7.
\49\ See Notice of Partial Amendment supra note 7.
\50\ See Notice of Partial Amendment, 88 FR at 36353.
---------------------------------------------------------------------------
By making these amendments, OCC also clarified the connection
between a Security Incident notification and the proposed disconnection
and reconnection process. If OCC determines that disconnection is
reasonably necessary to mitigate any effects to its operations, the
process for the affected Clearing Member to reconnect to OCC's systems
following the disconnection are set forth in paragraph (e) of proposed
rule 213, ``Procedures for Connecting Following a Security Incident.''
Additionally, OCC amended the proposed rule to require a Clearing
Member to complete the Reconnection Attestation and Reconnection
Checklist only in the event that OCC disconnected the Clearing Member
that has reported a
[[Page 82446]]
Security Incident.\51\ The information provided in the Reconnection
Attestation and Reconnection Checklist would help OCC determine whether
the risk to OCC has been mitigated sufficiently for OCC to resume
connectivity to the Clearing Member. Taken together, these changes as
well would allow OCC to identify and mitigate operational risks
presented by its Clearing Members and secure its environment more
effectively against potential vulnerabilities.
---------------------------------------------------------------------------
\51\ Id.
---------------------------------------------------------------------------
A commenter stated that the Reconnection Checklist appears to be a
security incident notification form rather than a checklist for
reconnection.\52\ As discussed above, the Reconnection Checklist is
only required in the event that a Clearing Member is disconnected from
OCC's systems as the result of a Security Incident. The checklist
includes information such as the nature of the incident, the steps
taken to contain the incident, and any OCC data that was compromised
during the incident, all of which is used by OCC to determine whether
the risk to OCC posed by the Security Incident has been mitigated
sufficiently to resume the Clearing Member's connectivity. The
commenter also stated that the proposed rule should establish a clear
process for reconnection, including the process and timing for OCC to
decide on a reconnection request and the process for OCC to communicate
its determination.\53\ As noted above, the process for reconnection is
set forth in paragraph (e) of proposed Rule 213. In addition, although
the proposed rule does not mandate the specific timing for OCC to make
a reconnection determination, the information provided to OCC by the
Reconnection Attestation and Reconnection Checklist is designed to
facilitate OCC's reconnection determinations, which should help
expedite the process. Given the innumerable circumstances that could
lead to a Security Incident and a resulting disconnection, the proposed
rule strikes a reasonable balance between OCC's need to ensure that the
operational risks presented by a Security Incident at a Clearing Member
have been sufficiently mitigated before reconnecting to OCC's systems
and the Clearing Member's desire to reconnect as quickly as possible.
---------------------------------------------------------------------------
\52\ FIF Letter at 8.
\53\ Id.
---------------------------------------------------------------------------
A commenter expressed concern that the information required to be
disclosed in Reconnection Checklist and Attestation is too detailed and
could either provide a roadmap to malicious actors or subject the
Clearing Member to third-party litigation risk.\54\ The commenter also
requested clarification on the protection of information reported by
Clearing Members to OCC.\55\ Any information disclosed to OCC in a
Reconnection Checklist and Attestation would be kept confidential by
OCC and would not be made publicly available, including to third
parties and potential malicious actors, and therefore would not, by
virtue of being provided to OCC, provide a roadmap to malicious actors
or subject the reporting Clearing Member to third-party litigation
risk. Further, OCC routinely receives, and is responsible for the
protection of, confidential information related to its Clearing
Members. For example, OCC routinely receives and protects confidential
and sensitive information related Clearing Members' risk management
practices,\56\ as well as information related to any financial or
operational difficulty reported by Clearing Members to any regulatory
organization.\57\
---------------------------------------------------------------------------
\54\ Id. at 7-8. For example, the commenter expressed concern
that the level of detail required by the proposed rule change could
provide a roadmap for malicious actors who wish to gain access to
OCC's systems or could present third-party litigation risk to the
Clearing Member.
\55\ Id. at 6.
\56\ See OCC Rule 305(b).
\57\ See OCC Rule 306A(1).
---------------------------------------------------------------------------
The commenter also stated that OCC should provide an exception to
disclosure when law enforcement directs the member not to disclose.\58\
However, the lack of the type of law enforcement exception suggested by
the commenter is consistent with the Exchange Act. For example, OCC's
current rules, as approved by the Commission, include various reporting
and disclosure requirements, none of which provide the type of explicit
law enforcement exception suggested by the commenter.\59\
---------------------------------------------------------------------------
\58\ FIF Letter at 6.
\59\ See, e.g., OCC Rules 207 (Submission to and Retrieval of
Items to and from the Corporation) and 306A (Event-Based Reporting).
---------------------------------------------------------------------------
The commenter also questioned whether the Clearing Members should
be required to provide evidence of regulatory compliance to other
government agencies and third parties.\60\ OCC's current rules, as
approved by the Commission, require Clearing Members to notify OCC if
the Clearing Member is required to notify any regulatory organization
of any operational difficulty affecting the Clearing Member, or of any
failure by the Clearing Member to be in compliance with the operational
responsibility rules of any regulatory organization.\61\ Thus, a
Clearing Member that experiences a Security Incident that subjects the
Clearing Member to a regulatory notification requirement is already
required, under existing OCC Rules, to notify OCC that it complied with
that requirement. The proposed rule change does not create a new
obligation for Clearing Members to notify OCC of regulatory notices to
regulatory organizations; it merely specifies when a notification to
OCC in connection with a Security Incident must be provided.
---------------------------------------------------------------------------
\60\ FIF Letter at 7. The commenter stated that many clearing
members would be subject to numerous governmental and third-party
notification requirements in the event of a cybersecurity incident
and expressed confusion regarding why OCC would require an
attestation relating to a clearing member's notification to other
regulators and third-parties if the clearing member has provided all
required notifications to the OCC. Id. The commenter also stated
that any required attestation should be to the knowledge of the
attesting executive. The proposed rule change states explicitly that
the representations in the Reconnection Attestation would be made
``on a good faith, best efforts basis,'' which necessarily means the
attestation would be to the knowledge of the attesting executive.
See proposed Rule 213(e)(1)(A).
\61\ See OCC Rule 306A (Event-Based Reporting).
---------------------------------------------------------------------------
Finally, a commenter referenced a number of cybersecurity-related
rule proposals recently published by the Commission and stated that the
proposed rule change should be delayed at least until the Commission
finalizes all the currently proposed cybersecurity rulemaking to ensure
that investors are protected from cyber threats and unnecessary
additional burdens are not placed on OCC Clearing Members.\62\ The
commenter states further that the proposed rule change interconnects
and may overlap with four different rules proposed by the
Commission,\63\ and requests that the Commission extend the period for
comment on the proposed rule change to allow time to analyze the
proposed rule change alongside the rules proposed by the
Commission.\64\
---------------------------------------------------------------------------
\62\ See letter from Melissa MacGregor, Managing Director,
Deputy General Counsel & Corporate Secretary, SIFMA, dated April 25,
2023, to Vanessa Countryman, Secretary, Commission, (``SIFMA
Letter'') available at https://www.sec.gov/comments/sr-occ-2023-003/srocc2023003-20164982-334488.pdf. A similar perspective was provided
by a second commenter. See FIF Letter at 8-9; see also Securities
Exchange Act Release Nos. 97141 (Mar. 15, 2022), 88 FR 20616 (Apr.
6, 2023); 97142 (Mar. 15, 2022), 88 FR 20212 (Apr. 5, 2023); 97143
(Mar. 15, 2023), 88 FR 23146 (Apr. 14, 2023); 97144 (Mar. 15, 2023),
88 FR 16921 (Mar. 21, 2023); 94382 (Mar. 9, 2022), 87 FR 16590 (Mar.
23, 2022).
\63\ SIFMA Letter at 2. SIFMA does not state how the proposed
rule change interconnects or conflicts with the Commission's
proposed rules.
\64\ Id. This concern was echoed in a letter from the FIF. See
FIF Letter (stating that OCC should withdraw the proposed rule
change and resubmit after the comment periods for the Commission's
proposals have expired).
---------------------------------------------------------------------------
[[Page 82447]]
Under the Exchange Act and relevant rules thereunder, SROs,
including OCC, determine for themselves when to file a proposed rule
change. The Exchange Act defines the process and time within which the
Commission may act,\65\ and Section 19(b)(2)(C) of the Exchange Act
requires the Commission to approve a proposed rule change of a SRO if
it finds that such change is consistent with the Exchange Act and rules
and regulations thereunder that are applicable to the SRO.\66\ Concerns
regarding rules proposed by the Commission may be presented as comments
to such rules so that the Commission may consider them in determining
what, if any, final rule it will adopt.
---------------------------------------------------------------------------
\65\ See, e.g., 15 U.S.C. 78s(b)(2)(A)(ii) (allowing the
Commission to extend the period for review by not more than 45 days
if the Commission determines that a longer period is appropriate and
publishes the reasons for such determination).
\66\ 15 U.S.C. 78s(b)(2)(C).
---------------------------------------------------------------------------
Based on the foregoing, the Commission finds that the proposed rule
change is consistent with the requirements of Rule 17Ad-22(e)(17)(i)
under the Exchange Act.\67\
---------------------------------------------------------------------------
\67\ 17 CFR 240.17Ad-22(e)(17)(i).
---------------------------------------------------------------------------
IV. Conclusion
On the basis of the foregoing, the Commission finds that the
proposed rule change, as modified by Partial Amendment No. 1, is
consistent with the requirements of the Exchange Act, and in
particular, the requirements of Section 17A of the Exchange Act \68\
and the rules and regulations thereunder.
---------------------------------------------------------------------------
\68\ In approving this proposed rule change, the Commission has
considered the proposed rules' impact on efficiency, competition,
and capital formation. See 15 U.S.C. 78c(f).
---------------------------------------------------------------------------
It is therefore ordered, pursuant to Section 19(b)(2) of the
Exchange Act,\69\ that the proposed rule change (SR-OCC-2023-003), as
modified by Partial Amendment No. 1, be, and hereby is, approved.
---------------------------------------------------------------------------
\69\ 15 U.S.C. 78s(b)(2).
For the Commission, by the Division of Trading and Markets,
pursuant to delegated authority.\70\
---------------------------------------------------------------------------
\70\ 17 CFR 200.30-3(a)(12).
---------------------------------------------------------------------------
Sherry R. Haywood,
Assistant Secretary.
[FR Doc. 2023-25883 Filed 11-22-23; 8:45 am]
BILLING CODE 8011-01-P