privacy-data-security
Compare original and translation side by side
🇺🇸
Original
English🇨🇳
Translation
ChinesePrivacy and Data Security
隐私与数据安全
Purpose
目的
Guide the design, implementation, and operation of privacy and data security programs for SEC-registered investment advisers, broker-dealers, investment companies, and other financial services firms. This skill covers Regulation S-P (privacy of consumer financial information), Regulation S-ID (identity theft prevention), SEC cybersecurity rules and examination expectations, incident response requirements, state privacy law intersections, vendor and third-party risk management, data governance, and employee training obligations.
为SEC注册的投资顾问、经纪交易商、投资公司和其他金融服务公司的隐私与数据安全方案的设计、落地和运行提供指引。本技能涵盖Regulation S-P(消费者金融信息隐私)、Regulation S-ID(身份盗窃预防)、SEC网络安全规则与检查要求、事件响应要求、州隐私法交叉适用、供应商与第三方风险管理、数据治理以及员工培训义务等内容。
Layer
层级
9 — Compliance & Regulatory Guidance
9 — 合规与监管指引
Direction
适用方向
prospective
前瞻性指引
When to Use
适用场景
- Designing or reviewing a firm's written information security program under the Reg S-P Safeguards Rule
- Drafting or updating initial and annual privacy notices under Reg S-P
- Evaluating whether the firm qualifies for the FAST Act annual privacy notice exception
- Building an Identity Theft Prevention Program under Reg S-ID (Red Flags Rule)
- Preparing for an SEC cybersecurity-focused examination
- Responding to a data breach or cybersecurity incident affecting customer NPI
- Assessing vendor and third-party service provider data security arrangements
- Determining state breach notification obligations across multiple jurisdictions
- Designing data classification, access control, and encryption policies
- Evaluating compliance with New York DFS 23 NYCRR 500 cybersecurity requirements
- Implementing employee training programs for privacy and cybersecurity awareness
- Reviewing cloud service provider arrangements for SEC examination readiness
- Assessing whether a cybersecurity incident triggers SAR filing obligations
- 依据Reg S-P保障规则设计或审查公司的书面信息安全方案
- 依据Reg S-P起草或更新首次及年度隐私通知
- 评估公司是否符合FAST Act规定的年度隐私通知豁免条件
- 依据Reg S-ID(Red Flags Rule)搭建身份盗窃预防方案
- 准备SEC以网络安全为核心的检查
- 响应影响客户非公开个人信息(NPI)的数据泄露或网络安全事件
- 评估供应商和第三方服务提供商的数据安全安排
- 确定跨多司法管辖区的州级数据泄露通知义务
- 设计数据分类、访问控制和加密政策
- 评估对纽约DFS 23 NYCRR 500网络安全要求的合规性
- 落地隐私与网络安全意识的员工培训项目
- 审查云服务提供商安排以满足SEC检查要求
- 评估网络安全事件是否触发可疑活动报告(SAR)提交义务
Core Concepts
核心概念
Regulation S-P (Privacy of Consumer Financial Information)
Regulation S-P(消费者金融信息隐私)
Regulation S-P (17 CFR Part 248, Subparts A and B) implements Title V of the Gramm-Leach-Bliley Act (GLBA) for entities registered with the SEC. It applies to SEC-registered investment advisers, broker-dealers, investment companies, and transfer agents. The regulation has three core components:
Privacy Notice Requirements. Firms must provide an initial privacy notice to each customer at the time of establishing the customer relationship (17 CFR 248.4). The notice must describe: (a) categories of nonpublic personal information (NPI) collected, (b) categories of NPI disclosed to third parties, (c) categories of affiliates and nonaffiliated third parties to whom NPI is disclosed, (d) the customer's right to opt out of certain disclosures, (e) the firm's policies and practices for protecting confidentiality and security of NPI, and (f) any disclosures required under the Fair Credit Reporting Act. Annual privacy notices must be delivered once during each 12-month period for the duration of the customer relationship (17 CFR 248.5). The FAST Act of 2015 (Pub. L. 114-94, Section 75001) created an exception to the annual notice requirement: firms that (i) share NPI only under the exceptions in 17 CFR 248.14 and 248.15, and (ii) have not changed their privacy policies and practices since the most recent notice, may satisfy the annual requirement by posting the privacy notice continuously on their website in a clear and conspicuous manner rather than mailing it to each customer.
Opt-Out Requirements. Before sharing NPI with nonaffiliated third parties, firms must provide customers with a reasonable opportunity to opt out (17 CFR 248.7 and 248.10). The opt-out notice must be clear, conspicuous, and delivered along with or as part of the privacy notice. Exceptions to the opt-out requirement include: (a) disclosures necessary to effect, administer, or enforce a transaction requested by the customer, (b) disclosures to service providers and joint marketing partners under written contractual agreements that restrict the third party's use of NPI, (c) disclosures with customer consent, (d) disclosures to protect against fraud, and (e) disclosures required by law (17 CFR 248.14 and 248.15). Joint marketing agreements must include written contracts specifying that the third party will maintain the confidentiality of NPI and will use it only for the purposes for which it was disclosed.
Safeguards Rule. Section 248.30 requires every covered institution to adopt written policies and procedures that address administrative, technical, and physical safeguards for the protection of customer records and information. Administrative safeguards include designating a responsible employee or officer, conducting risk assessments, implementing employee training, and establishing oversight of service providers. Technical safeguards include access controls, encryption, intrusion detection systems, and monitoring of information systems. Physical safeguards include secure storage of records, controlled access to facilities, and proper disposal of documents. The policies must be reasonably designed to: (a) ensure the security and confidentiality of customer records and information, (b) protect against anticipated threats or hazards to the security or integrity of such records, and (c) protect against unauthorized access to or use of such records that could result in substantial harm or inconvenience to the customer.
Disposal Rule. Section 248.30(b) requires proper destruction of consumer report information derived from consumer reports. Reasonable measures for disposal include shredding physical documents, erasing or destroying electronic media, and entering into contracts with third-party disposal services that require proper destruction.
Regulation S-P(17 CFR Part 248, Subparts A和B)是SEC注册实体适用的Gramm-Leach-Bliley Act(GLBA)第五章的实施规则,适用于SEC注册的投资顾问、经纪交易商、投资公司和过户代理人。该法规包含三个核心部分:
隐私通知要求。 公司必须在建立客户关系时向每位客户提供首次隐私通知(17 CFR 248.4)。通知必须说明:(a) 收集的非公开个人信息(NPI)类别;(b) 向第三方披露的NPI类别;(c) 接收NPI披露的关联方和非关联第三方类别;(d) 客户选择退出某些披露的权利;(e) 公司保护NPI保密性和安全性的政策与实践;(f) 《公平信用报告法》要求的任何披露。在客户关系存续期间,公司必须每12个月发送一次年度隐私通知(17 CFR 248.5)。2015年FAST Act(Pub. L. 114-94, Section 75001)为年度通知要求设立了豁免:如果公司(i) 仅在17 CFR 248.14和248.15规定的例外情形下共享NPI,且(ii) 自最近一次通知发布以来未修改隐私政策与实践,则可以将隐私通知持续以清晰显眼的方式发布在公司网站上,而非邮寄给每位客户,即可满足年度通知要求。
选择退出要求。 在向非关联第三方共享NPI之前,公司必须为客户提供合理的选择退出机会(17 CFR 248.7和248.10)。选择退出通知必须清晰、显眼,且与隐私通知一同发送或作为隐私通知的一部分发送。选择退出要求的例外情形包括:(a) 为执行、管理或落实客户要求的交易所必需的披露;(b) 根据书面合同向服务提供商和联合营销合作伙伴的披露,且合同限制第三方对NPI的使用;(c) 经客户同意的披露;(d) 为防范欺诈进行的披露;(e) 法律要求的披露(17 CFR 248.14和248.15)。联合营销协议必须包含书面合同,明确第三方将对NPI保密,且仅将其用于披露时约定的目的。
保障规则。 第248.30条要求所有受监管机构制定书面政策和流程,覆盖保护客户记录和信息的行政、技术和物理保障措施。行政保障措施包括指定负责的员工或管理人员、开展风险评估、落地员工培训、建立对服务提供商的监督机制。技术保障措施包括访问控制、加密、入侵检测系统和信息系统监控。物理保障措施包括记录的安全存储、设施访问控制和文件的妥善处置。这些政策必须经过合理设计,以实现以下目标:(a) 确保客户记录和信息的安全性和保密性;(b) 防范此类记录的安全性或完整性面临的预期威胁或风险;(c) 防范可能导致客户遭受重大损害或不便的对记录的未授权访问或使用。
处置规则。 第248.30(b)条要求妥善销毁来源于消费者报告的消费者报告信息。合理的处置措施包括粉碎纸质文件、擦除或销毁电子介质、与第三方处置服务签订要求妥善销毁的合同。
Regulation S-ID (Red Flags Rule)
Regulation S-ID(Red Flags Rule)
Regulation S-ID (17 CFR 248.201-202) implements Sections 114 and 315 of the Fair and Accurate Credit Transactions Act (FACTA) for SEC-regulated entities. It requires financial institutions and creditors that hold "covered accounts" to develop and implement a written Identity Theft Prevention Program (ITPP) designed to detect, prevent, and mitigate identity theft.
Covered Accounts. Two categories of accounts are covered: (a) accounts primarily for personal, family, or household purposes that involve or are designed to permit multiple payments or transactions (e.g., brokerage accounts, margin accounts, advisory accounts with ongoing services), and (b) any other account for which there is a reasonably foreseeable risk to customers or to the safety and soundness of the financial institution from identity theft, including financial, operational, compliance, reputation, or litigation risks.
Identity Theft Prevention Program Requirements. The ITPP must include reasonable policies and procedures to: (1) identify relevant red flags applicable to the firm's covered accounts, drawing from five categories of red flags — alerts, notifications, or warnings from consumer reporting agencies; suspicious documents; suspicious personal identifying information; unusual use of or suspicious activity related to a covered account; and notices from customers, victims of identity theft, law enforcement, or other persons regarding possible identity theft — (2) detect red flags that have been incorporated into the program, (3) respond appropriately to any red flags that are detected to prevent and mitigate identity theft, and (4) ensure the program is updated periodically to reflect changes in risks to customers and to the safety and soundness of the firm.
Administration. The ITPP must be approved by the board of directors, a committee of the board, or senior management (17 CFR 248.201(d)). Ongoing administration includes: assigning specific responsibility for the program's implementation, training staff to carry out the program, exercising appropriate and effective oversight of service provider arrangements (ensuring that service providers' activities in connection with covered accounts are conducted in accordance with reasonable policies and procedures to detect, prevent, and mitigate identity theft), and ensuring the program is updated as necessary.
Regulation S-ID(17 CFR 248.201-202)是SEC监管实体适用的《公平准确信用交易法》(FACTA)第114和315条的实施规则。它要求持有“受监管账户”的金融机构和债权人制定并落实书面的身份盗窃预防方案(ITPP),用于检测、预防和缓解身份盗窃风险。
受监管账户。 两类账户属于受监管范围:(a) 主要用于个人、家庭或 household目的,涉及或设计为允许多次支付或交易的账户(例如经纪账户、保证金账户、提供持续服务的顾问账户);(b) 存在可合理预见的身份盗窃风险,可能对客户或金融机构的安全稳健造成损害的其他任何账户,包括财务、运营、合规、声誉或诉讼风险。
身份盗窃预防方案要求。 ITPP必须包含合理的政策和流程,以实现以下目标:(1) 识别适用于公司受监管账户的相关红旗预警,参考五类红旗预警:消费者报告机构发出的警报、通知或警告;可疑文件;可疑的个人身份信息;与受监管账户相关的异常使用或可疑活动;客户、身份盗窃受害者、执法部门或其他人员发出的关于可能存在身份盗窃的通知;(2) 检测已纳入方案的红旗预警;(3) 对检测到的任何红旗预警做出适当响应,以预防和缓解身份盗窃;(4) 确保方案定期更新,以反映客户面临的风险以及公司安全稳健状况的变化。
管理要求。 ITPP必须经过董事会、董事会委员会或高级管理层批准(17 CFR 248.201(d))。持续管理要求包括:指派专人负责方案的落地、对员工开展方案执行相关培训、对服务提供商安排进行适当有效的监督(确保服务提供商与受监管账户相关的活动符合合理的政策和流程,以检测、预防和缓解身份盗窃)、确保方案根据需要及时更新。
SEC Cybersecurity Rules and Guidance
SEC网络安全规则与指引
The SEC has addressed cybersecurity through a combination of rulemaking, interpretive guidance, and enforcement.
Public Company Disclosure Rules (2023). In July 2023, the SEC adopted rules requiring public companies to disclose material cybersecurity incidents on Form 8-K (Item 1.05) within four business days of determining that an incident is material. Companies must also disclose their cybersecurity risk management, strategy, and governance on Form 10-K (Item 1C of Regulation S-K). Required disclosures include: processes for assessing, identifying, and managing cybersecurity risks; whether cybersecurity risks have materially affected or are reasonably likely to materially affect the company's business strategy, results of operations, or financial condition; the board of directors' oversight of cybersecurity risk; and management's role in assessing and managing cybersecurity risks.
Registered Entity Cybersecurity Expectations. For SEC-registered investment advisers and broker-dealers, the SEC has not adopted a standalone cybersecurity rule as of this skill's compilation. However, the SEC enforces cybersecurity obligations through existing authority, principally the Reg S-P Safeguards Rule (17 CFR 248.30), the books-and-records rules (SEC Rule 17a-4, IA Act Rule 204-2), and the general antifraud provisions. The SEC proposed rules in February 2022 (Release Nos. 33-11028, 34-94382, IA-5956) that would require registered investment advisers and funds to adopt and implement written cybersecurity policies, report significant cybersecurity incidents to the SEC on a new confidential form, and disclose cybersecurity risks and incidents to clients and investors. While these proposals had not been adopted in final form as of the current law, they signal the direction of SEC rulemaking, and firms should evaluate their programs against the proposed requirements.
SEC EXAMS (formerly OCIE) Examination Priorities. Cybersecurity has been a top SEC examination priority since 2014. Key areas examined include: governance and risk assessment (board or senior management oversight, CISO or equivalent role, documented risk assessments), access rights and controls (least privilege, multi-factor authentication, access logging, prompt deprovisioning of terminated employees), data loss prevention (monitoring for unauthorized data transfers, encryption at rest and in transit, endpoint protection), vendor management (due diligence on third-party service providers, contractual security requirements, ongoing monitoring), incident response (written plans, testing and tabletop exercises, escalation procedures), and training (frequency, content, phishing simulation results).
SEC Enforcement. The SEC has brought enforcement actions against registered firms for cybersecurity failures under Reg S-P's Safeguards Rule and under the Identity Theft Red Flags Rule. Notable enforcement themes include: failure to implement written policies and procedures for protecting customer information, insufficient access controls (e.g., allowing shared credentials, failing to implement multi-factor authentication), failure to detect and respond to known vulnerabilities, and misleading disclosures about cybersecurity practices following a breach.
SEC通过规则制定、解释性指引和执法相结合的方式监管网络安全相关事项。
上市公司披露规则(2023年)。 2023年7月,SEC通过规则,要求上市公司在确定事件具有重大性后的四个工作日内,通过Form 8-K(Item 1.05)披露重大网络安全事件。公司还必须在Form 10-K(Regulation S-K第1C项)中披露其网络安全风险管理、战略和治理情况。要求披露的内容包括:评估、识别和管理网络安全风险的流程;网络安全风险是否已经对公司的业务战略、经营成果或财务状况产生重大影响,或是否合理可能产生重大影响;董事会对网络安全风险的监督情况;管理层在评估和管理网络安全风险中的角色。
注册实体网络安全要求。 截至本技能编制时,SEC尚未针对SEC注册投资顾问和经纪交易商出台独立的网络安全规则。但是SEC通过现有职权执行网络安全义务,主要依据包括Reg S-P保障规则(17 CFR 248.30)、账簿记录规则(SEC Rule 17a-4、IA Act Rule 204-2)以及一般反欺诈条款。SEC在2022年2月提出了规则草案(Release Nos. 33-11028, 34-94382, IA-5956),要求注册投资顾问和基金制定并落实书面网络安全政策、通过新的保密表格向SEC报告重大网络安全事件、向客户和投资者披露网络安全风险和事件。虽然截至现行法律生效时这些草案尚未最终通过,但它们表明了SEC规则制定的方向,公司应当对照草案要求评估自身的方案。
SEC EXAMS(原OCIE)检查重点。 自2014年以来,网络安全一直是SEC的首要检查重点。检查的核心领域包括:治理与风险评估(董事会或高级管理层监督、CISO或同等角色、书面风险评估)、访问权限与控制(最小权限原则、多因素认证、访问日志记录、离职员工权限及时注销)、数据丢失防护(监控未授权数据传输、静态和传输中数据加密、端点防护)、供应商管理(第三方服务提供商尽职调查、合同安全要求、持续监控)、事件响应(书面计划、测试和桌面演练、升级流程)以及培训(频率、内容、钓鱼模拟结果)。
SEC执法。 SEC已经依据Reg S-P保障规则和身份盗窃红旗规则对注册公司的网络安全违规行为提起执法诉讼。值得注意的执法重点包括:未落实保护客户信息的书面政策和流程、访问控制不足(例如允许共享凭证、未落实多因素认证)、未检测和响应已知漏洞、数据泄露后对网络安全实践的误导性披露。
Incident Response Requirements
事件响应要求
Regulatory expectations require financial firms to maintain comprehensive incident response capabilities.
Written Incident Response Plan. The SEC expects registered firms to maintain a written incident response plan that includes: designation of an incident response team with clear roles and escalation authority; procedures for detecting and classifying incidents by severity; containment procedures to limit the scope and impact of an incident; evidence preservation protocols (forensic imaging, log retention, chain of custody documentation); eradication and recovery procedures; internal escalation and reporting timelines (to senior management, the board, legal counsel, and the compliance department); external notification procedures (to customers, regulators, and law enforcement as required); and a post-incident review process to identify root causes and remediation actions.
Customer Notification. There is no general federal SEC breach notification requirement for investment advisers or broker-dealers as of current law. However, state breach notification laws apply in all 50 states, the District of Columbia, and U.S. territories, and they impose varying notification obligations depending on the types of data compromised, the number of individuals affected, and the state in which the affected individual resides. Most states require notification within 30 to 60 days of discovery; some states, such as Florida (30 days under Fla. Stat. 501.171) and Colorado (30 days under C.R.S. 6-1-716), impose shorter deadlines. Firms operating in multiple states must comply with the notification requirements of each state where affected individuals reside, which often means complying with the most restrictive standard.
Regulatory Notification. While there is no general SEC breach reporting rule for advisers and broker-dealers, certain circumstances may trigger reporting obligations: (a) if the breach involves potential financial crime, SAR filing obligations under BSA/AML rules may apply; (b) FINRA expects member firms to notify FINRA of significant cybersecurity incidents; (c) New York DFS-regulated entities must notify DFS within 72 hours of a cybersecurity event that has a reasonable likelihood of materially harming normal operations (23 NYCRR 500.17); and (d) the SEC's proposed cybersecurity rules would, if adopted, require significant incident reporting to the SEC.
Law Enforcement Coordination. Firms should establish relationships with relevant law enforcement agencies (FBI, Secret Service, state attorneys general) before an incident occurs. In the event of a breach, law enforcement may request a delay in public notification to avoid compromising an investigation; firms should work with counsel to balance this request against state breach notification deadlines.
SAR Filing. If a cybersecurity incident involves or is connected to potential financial crime — for example, unauthorized access leading to theft of funds, account takeovers, or identity theft used to facilitate fraudulent transactions — the firm must evaluate whether a Suspicious Activity Report should be filed under its BSA/AML obligations. The SAR should describe the cybersecurity incident, the nature of the suspected criminal activity, and the impact on customer accounts.
监管要求金融公司具备全面的事件响应能力。
书面事件响应计划。 SEC要求注册公司制定书面事件响应计划,内容包括:指定具有明确角色和升级权限的事件响应团队;按严重程度检测和分类事件的流程;限制事件范围和影响的遏制流程;证据保存协议(取证镜像、日志留存、监管链文档);根除和恢复流程;内部升级和报告时间线(向高级管理层、董事会、法律顾问和合规部门报告);外部通知流程(根据要求向客户、监管机构和执法部门通知);以及识别根本原因和整改措施的事后审查流程。
客户通知。 截至现行法律生效时,没有通用的联邦SEC层面针对投资顾问或经纪交易商的数据泄露通知要求。但是所有50个州、哥伦比亚特区和美国领土都适用州级数据泄露通知法律,这些法律根据泄露的数据类型、受影响人数和受影响个人所在州的不同,规定了不同的通知义务。大多数州要求在发现泄露后30至60天内通知;部分州,例如佛罗里达州(根据Fla. Stat. 501.171规定为30天)和科罗拉多州(根据C.R.S. 6-1-716规定为30天)规定了更短的期限。在多个州开展业务的公司必须遵守受影响个人所在每个州的通知要求,这通常意味着要遵守最严格的标准。
监管通知。 虽然没有通用的SEC层面针对投资顾问和经纪交易商的数据泄露报告规则,但某些情况下可能触发报告义务:(a) 如果泄露涉及潜在金融犯罪,则可能适用BSA/AML规则下的SAR提交义务;(b) FINRA要求会员公司将重大网络安全事件通知FINRA;(c) 受纽约DFS监管的实体必须在网络安全事件存在合理可能性对正常运营造成重大损害后的72小时内通知DFS(23 NYCRR 500.17);(d) SEC拟议的网络安全规则如果获得通过,将要求向SEC报告重大事件。
执法部门协调。 公司应当在事件发生前与相关执法机构(FBI、特勤局、州总检察长)建立联系。如果发生数据泄露,执法部门可能会要求推迟公开通知,以免影响调查;公司应当与法律顾问合作,平衡这一要求与州级数据泄露通知期限的要求。
SAR提交。 如果网络安全事件涉及或关联潜在金融犯罪——例如未授权访问导致资金被盗、账户接管、或用于促进欺诈交易的身份盗窃——公司必须根据其BSA/AML义务评估是否应当提交可疑活动报告(SAR)。SAR应当描述网络安全事件、可疑犯罪活动的性质以及对客户账户的影响。
State Privacy Laws
州隐私法
Financial firms face a layered regulatory environment where federal securities privacy rules intersect with state privacy and cybersecurity legislation.
California (CCPA/CPRA). The California Consumer Privacy Act (Cal. Civ. Code 1798.100 et seq.), as amended by the California Privacy Rights Act (effective January 1, 2023), grants California residents broad rights over their personal information, including rights to know, delete, correct, and opt out of the sale or sharing of personal information. Financial institutions are partially exempt from the CCPA/CPRA to the extent they are subject to the GLBA and collect, process, sell, or disclose personal information pursuant to GLBA. However, the exemption applies only to information collected, processed, sold, or disclosed subject to GLBA — information outside the GLBA's scope (e.g., employee data, website tracking data, marketing data) may still be subject to CCPA/CPRA. Firms must carefully analyze which data falls within the GLBA exemption and which does not.
New York (DFS 23 NYCRR 500). The New York Department of Financial Services cybersecurity regulation applies to all entities operating under or required to operate under a DFS license, registration, or charter, or that are otherwise DFS-regulated. This includes many broker-dealers and investment advisers operating in New York. Key requirements include: designation of a Chief Information Security Officer (CISO); establishment and maintenance of a cybersecurity program based on a risk assessment; written cybersecurity policies covering 14 specified areas (information security, data governance and classification, asset inventory, access controls, business continuity, systems and network security, monitoring, incident response, vendor management, encryption, and others); annual penetration testing and bi-annual vulnerability assessments; multi-factor authentication for accessing internal networks from an external network; encryption of NPI both in transit and at rest; 72-hour notification to DFS of material cybersecurity events (23 NYCRR 500.17); annual written certification of compliance by the board or senior officer (23 NYCRR 500.17(b)); and a requirement that CISOs report in writing at least annually to the board or senior governing body. DFS has actively enforced 23 NYCRR 500 through consent orders and civil penalties.
Massachusetts (201 CMR 17.00). Massachusetts Standards for the Protection of Personal Information require every entity that owns, licenses, stores, or maintains personal information of Massachusetts residents to develop, implement, and maintain a comprehensive written information security program (WISP). Required elements include: designation of a responsible employee, risk assessment, employee training, monitoring of the program, discipline for violations, prevention of terminated employees from accessing records, service provider oversight, restrictions on physical access, monitoring of systems for unauthorized access, encryption of transmitted records containing personal information, encryption of all personal information stored on laptops and portable devices, use of reasonably up-to-date firewall and operating system security patches, and use of up-to-date malware protection.
Multi-State Compliance. Firms with customers in multiple states must track and comply with each state's privacy and data breach notification laws. Key variations include: the definition of "personal information" triggering notification obligations (some states include broader categories such as biometric data, health information, or online account credentials); notification deadlines (ranging from 30 days to "reasonable" without a specified limit); notification content requirements; requirements to notify the state attorney general or other state agency; and requirements to provide credit monitoring or identity theft protection services. Maintaining a breach notification matrix that maps state-by-state requirements is a best practice for multi-state firms.
金融公司面临分层监管环境,联邦证券隐私规则与州隐私和网络安全立法交叉适用。
加利福尼亚州(CCPA/CPRA)。 《加利福尼亚消费者隐私法》(Cal. Civ. Code 1798.100 et seq.)经《加利福尼亚隐私权法案》(2023年1月1日生效)修订后,赋予加利福尼亚州居民对其个人信息的广泛权利,包括知情权、删除权、更正权以及选择退出个人信息出售或共享的权利。金融机构在受GLBA监管,且根据GLBA收集、处理、出售或披露个人信息的范围内,部分豁免适用CCPA/CPRA。但是该豁免仅适用于根据GLBA收集、处理、出售或披露的信息——GLBA范围之外的信息(例如员工数据、网站跟踪数据、营销数据)可能仍然受CCPA/CPRA约束。公司必须仔细分析哪些数据属于GLBA豁免范围,哪些不属于。
纽约州(DFS 23 NYCRR 500)。 纽约州金融服务局(DFS)网络安全监管适用于所有根据DFS牌照、注册或许可运营,或受DFS监管的实体,包括许多在纽约运营的经纪交易商和投资顾问。核心要求包括:指定首席信息安全官(CISO);基于风险评估建立和维护网络安全方案;覆盖14个指定领域的书面网络安全政策(信息安全、数据治理与分类、资产清单、访问控制、业务连续性、系统和网络安全、监控、事件响应、供应商管理、加密等);年度渗透测试和半年度漏洞评估;从外部网络访问内部网络时的多因素认证;传输中和静态NPI的加密;重大网络安全事件发生后72小时内通知DFS(23 NYCRR 500.17);董事会或高级管理人员每年提交合规书面证明(23 NYCRR 500.17(b));要求CISO每年至少向董事会或高级治理机构提交一次书面报告。DFS已经通过同意令和民事处罚积极执行23 NYCRR 500。
马萨诸塞州(201 CMR 17.00)。 《马萨诸塞州个人信息保护标准》要求所有拥有、许可、存储或维护马萨诸塞州居民个人信息的实体,制定、落实和维护全面的书面信息安全方案(WISP)。要求的要素包括:指定负责员工、风险评估、员工培训、方案监控、违规处罚、防止离职员工访问记录、服务提供商监督、物理访问限制、监控系统以防范未授权访问、传输包含个人信息的记录时加密、存储在笔记本电脑和便携设备上的所有个人信息加密、使用合理最新的防火墙和操作系统安全补丁、使用最新的恶意软件防护。
多州合规。 客户分布在多个州的公司必须跟踪并遵守每个州的隐私和数据泄露通知法律。主要差异包括:触发通知义务的“个人信息”定义(部分州包含更广泛的类别,例如生物识别数据、健康信息或在线账户凭证);通知期限(从30天到未明确规定的“合理期限”不等);通知内容要求;通知州总检察长或其他州机构的要求;提供信用监控或身份盗窃保护服务的要求。维护记录各州要求的数据泄露通知矩阵是多州运营公司的最佳实践。
Vendor and Third-Party Risk Management
供应商与第三方风险管理
SEC and FINRA expect registered firms to exercise diligent oversight of service providers with access to customer data, information systems, or critical business functions. The principle that outsourcing does not outsource compliance responsibility is fundamental — the firm remains accountable for the security of customer data regardless of where the data is processed or stored.
Due Diligence Before Engagement. Before engaging a vendor with access to customer NPI or critical systems, firms should assess the vendor's information security posture, including: the vendor's written information security policies and procedures, SOC 2 Type II audit reports (or equivalent), business continuity and disaster recovery capabilities, incident response procedures and history, use of subcontractors and sub-processors, data center security (physical and logical), encryption practices, access control mechanisms, employee screening and training, and financial stability.
Contractual Protections. Contracts with service providers should include: confidentiality obligations covering all customer NPI and proprietary data; minimum information security standards (referencing recognized frameworks such as NIST CSF, ISO 27001, or SOC 2 criteria); breach notification requirements (specifying the vendor must notify the firm within a defined period, typically 24 to 72 hours, of discovering a security incident affecting the firm's data); the firm's right to audit the vendor's security practices and to receive audit reports; requirements for prompt return or destruction of data upon contract termination; restrictions on the vendor's use of the firm's data for purposes beyond the contracted services; provisions addressing the vendor's use of subcontractors, including the firm's right to approve or be notified of material subcontracting; indemnification for losses arising from the vendor's security failures; and the firm's right to terminate the contract for material security deficiencies.
Ongoing Monitoring. Due diligence is not a one-time exercise. Firms should: review updated SOC reports or equivalent assessments annually, conduct periodic security questionnaires or assessments, monitor the vendor for reported security incidents or regulatory actions, review the vendor's business continuity and disaster recovery testing results, and reassess the vendor's risk profile if there are material changes to the services provided, the data accessed, or the vendor's ownership or financial condition.
Cloud Service Provider Considerations. The SEC has issued risk alerts specifically addressing cloud security (SEC EXAMS Risk Alert, January 2020). Key expectations include: understanding the shared responsibility model (the cloud provider secures the infrastructure; the firm secures its data and configurations within the cloud); proper configuration of cloud storage to prevent unauthorized public access; strong identity and access management for cloud environments; encryption of data at rest and in transit within cloud services; logging and monitoring of cloud environment activity; and understanding the cloud provider's data residency, backup, and disaster recovery practices.
Concentration Risk. Regulators have expressed concern about concentration risk when multiple firms rely on the same critical service providers. Firms should assess whether the failure of a key vendor would create systemic risk, maintain business continuity plans that address vendor failure scenarios, and consider diversification of critical services where practicable.
SEC和FINRA要求注册公司对能够访问客户数据、信息系统或关键业务职能的服务提供商进行勤勉监督。外包不会转移合规责任是基本原则——无论数据在哪里处理或存储,公司始终对客户数据的安全负责。
合作前尽职调查。 在与能够访问客户NPI或关键系统的供应商合作之前,公司应当评估供应商的信息安全状况,包括:供应商的书面信息安全政策和流程、SOC 2 Type II审计报告(或同等报告)、业务连续性和灾难恢复能力、事件响应流程和历史记录、分包商和子处理商的使用情况、数据中心安全(物理和逻辑)、加密实践、访问控制机制、员工筛选和培训、以及财务稳定性。
合同保护。 与服务提供商的合同应当包含:覆盖所有客户NPI和专有数据的保密义务;最低信息安全标准(参考公认框架,例如NIST CSF、ISO 27001或SOC 2标准);数据泄露通知要求(明确供应商必须在发现影响公司数据的安全事件后的指定期限内(通常为24至72小时)通知公司);公司审计供应商安全实践和接收审计报告的权利;合同终止时及时返还或销毁数据的要求;限制供应商将公司数据用于合同约定服务之外的其他目的;涉及供应商使用分包商的条款,包括公司批准重大分包或获得通知的权利;对供应商安全故障造成的损失进行赔偿的条款;以及公司在供应商存在重大安全缺陷时终止合同的权利。
持续监控。 尽职调查不是一次性工作。公司应当:每年审查更新的SOC报告或同等评估报告、定期开展安全问卷调查或评估、监控供应商是否有公开的安全事件或监管处罚、审查供应商的业务连续性和灾难恢复测试结果、如果提供的服务、访问的数据或供应商的所有权或财务状况发生重大变化,重新评估供应商的风险状况。
云服务提供商注意事项。 SEC已经发布了专门针对云安全的风险预警(SEC EXAMS风险预警,2020年1月)。核心要求包括:理解责任共担模型(云提供商保障基础设施安全;公司保障其在云内的数据和配置安全);正确配置云存储以防止未授权的公共访问;云环境的强身份和访问管理;云服务内静态和传输中数据的加密;云环境活动的日志记录和监控;了解云提供商的数据驻留、备份和灾难恢复实践。
集中度风险。 监管机构已经对多家公司依赖同一关键服务提供商带来的集中度风险表示担忧。公司应当评估关键供应商的故障是否会造成系统性风险,制定覆盖供应商故障场景的业务连续性计划,并在可行的情况下考虑关键服务的多元化。
Data Governance for Financial Firms
金融公司数据治理
Effective data governance provides the operational framework for meeting privacy and security regulatory requirements.
Data Classification. Firms should classify data based on sensitivity and regulatory requirements. A common taxonomy includes: (a) Public — information intended for public distribution (marketing materials, publicly filed regulatory documents), (b) Internal — information for internal use that would not cause significant harm if disclosed (general correspondence, internal procedures), (c) Confidential — information whose unauthorized disclosure could cause harm to the firm or its clients (customer account information, trade data, financial projections), and (d) Restricted — the most sensitive information requiring the highest level of protection (Social Security numbers, account credentials, consumer report information, material nonpublic information). Classification drives the application of access controls, encryption, monitoring, and disposal requirements.
Access Controls. The principle of least privilege requires that employees, systems, and service providers receive only the minimum access necessary to perform their functions. Role-based access control (RBAC) assigns permissions based on job function rather than individual identity, facilitating consistent enforcement and efficient provisioning and deprovisioning. Segregation of duties prevents any single individual from having end-to-end control over a process that could facilitate fraud or unauthorized access. Access reviews should be conducted at least annually, and more frequently for privileged accounts.
Encryption. Data encryption should be applied both at rest (stored data) and in transit (data moving across networks). At rest, full-disk encryption, database encryption, and file-level encryption are common approaches. In transit, TLS 1.2 or higher should be used for all communications containing NPI. Encryption key management — including key generation, storage, rotation, and destruction — must be addressed in the firm's security policies.
Data Retention and Destruction. Financial firms must balance data minimization principles with books-and-records retention requirements. SEC Rule 17a-4 (broker-dealers) and IA Act Rule 204-2 (investment advisers) impose specific retention periods for various categories of records, typically ranging from 3 to 6 years depending on the record type. Data should be retained for the longest applicable retention period and securely destroyed when the retention period expires. Destruction methods must render data unrecoverable: shredding for physical media, cryptographic erasure or physical destruction for electronic media.
Data Loss Prevention (DLP). DLP systems monitor and control the movement of sensitive data within and outside the firm. Common DLP controls include: monitoring email and web traffic for NPI patterns (e.g., Social Security numbers, account numbers), blocking unauthorized transfers of sensitive files to external destinations (USB drives, personal email, cloud storage), monitoring print activity for sensitive documents, and generating alerts for anomalous data movement patterns. DLP controls should be calibrated to the firm's data classification scheme.
Monitoring and Logging. Firms should maintain comprehensive logs of access to sensitive systems and data, including: user authentication events (successful and failed), access to customer account records, changes to access permissions, data exports and transfers, and system administrator activities. Logs must be retained for a sufficient period to support incident investigation and regulatory examination (SEC examiners frequently request 12 to 24 months of access logs). Automated alerting should be configured for anomalous activity patterns, such as after-hours access, access from unusual locations, or bulk data downloads.
有效的数据治理为满足隐私和安全监管要求提供了运营框架。
数据分类。 公司应当根据敏感性和监管要求对数据进行分类。常见的分类体系包括:(a) 公开——计划公开分发的信息(营销材料、公开提交的监管文件);(b) 内部——供内部使用,披露后不会造成重大损害的信息(一般信函、内部流程);(c) 机密——未授权披露可能对公司或其客户造成损害的信息(客户账户信息、交易数据、财务预测);(d) 受限——最敏感的信息,需要最高级别的保护(社会安全号码、账户凭证、消费者报告信息、重大非公开信息)。分类决定了访问控制、加密、监控和处置要求的适用情况。
访问控制。 最小权限原则要求员工、系统和服务提供商仅获得履行其职能所需的最低访问权限。基于角色的访问控制(RBAC)根据工作职能而非个人身份分配权限,便于一致执行和高效的权限开通与注销。职责分离防止任何单一个人对某个流程拥有端到端控制权,从而避免欺诈或未授权访问。访问审查应当至少每年开展一次,特权账户的审查频率应当更高。
加密。 应当对静态数据(存储的数据)和传输中数据(跨网络传输的数据)都应用数据加密。静态数据的常见加密方式包括全磁盘加密、数据库加密和文件级加密。传输中数据的所有包含NPI的通信应当使用TLS 1.2或更高版本。加密密钥管理——包括密钥生成、存储、轮换和销毁——必须在公司的安全政策中予以规定。
数据留存与销毁。 金融公司必须平衡数据最小化原则与账簿记录留存要求。SEC Rule 17a-4(经纪交易商)和IA Act Rule 204-2(投资顾问)对各类记录规定了特定的留存期限,通常根据记录类型不同为3至6年不等。数据应当留存至最长适用留存期限届满,留存期限届满后应当安全销毁。销毁方式必须使数据无法恢复:纸质介质采用粉碎方式,电子介质采用加密擦除或物理销毁方式。
数据丢失防护(DLP)。 DLP系统监控和控制敏感数据在公司内部和外部的流动。常见的DLP控制措施包括:监控电子邮件和网络流量中的NPI特征(例如社会安全号码、账户号码)、阻止敏感文件向外部目的地(USB驱动器、个人邮箱、云存储)的未授权传输、监控敏感文档的打印活动、对异常数据流动模式生成警报。DLP控制措施应当根据公司的数据分类方案进行校准。
监控与日志记录。 公司应当留存对敏感系统和数据的访问的全面日志,包括:用户认证事件(成功和失败)、对客户账户记录的访问、访问权限的变更、数据导出和传输、以及系统管理员活动。日志必须留存足够长的时间,以支持事件调查和监管检查(SEC检查员通常要求提供12至24个月的访问日志)。应当为异常活动模式配置自动警报,例如非工作时间访问、异常位置访问、或批量数据下载。
Employee Training and Awareness
员工培训与意识
Regulators expect all employees to receive privacy and security training, with the scope and depth tailored to the employee's role and access level.
Regulatory Foundation. The Reg S-P Safeguards Rule requires firms to include employee training as part of their written information security policies. FINRA Regulatory Notice 21-18 emphasizes cybersecurity practices for member firms, including the importance of employee awareness and training. New York DFS 23 NYCRR 500.14 specifically requires regular cybersecurity awareness training for all personnel.
Training Content. Effective training programs should cover: the firm's privacy and information security policies and procedures; the types of NPI the firm collects and the regulatory requirements for protecting it; recognizing and reporting social engineering attacks, including phishing, spear-phishing, vishing (voice phishing), smishing (SMS phishing), pretexting, and business email compromise (BEC); physical security practices, including visitor management, secure areas, and clean desk policies; proper use of email, internet, and removable media; mobile device security and bring-your-own-device (BYOD) policies; password management and multi-factor authentication; procedures for reporting suspected security incidents, including whom to contact and what information to provide; and consequences of policy violations, including disciplinary action and potential regulatory liability.
Phishing Simulation. Firms should conduct periodic phishing simulation exercises to test employee awareness. Results should be tracked, and employees who fail simulations should receive additional targeted training. SEC examiners have requested phishing simulation results and click-through rates during cybersecurity examinations.
Training Frequency and Documentation. Training should be conducted at least annually, with supplemental training when significant new threats emerge or when the firm's policies change materially. New employees should receive training during onboarding before receiving access to customer NPI. All training must be documented, including the date, attendees, topics covered, and materials used. Documentation should be retained for a minimum of 5 years to satisfy examination and audit requirements.
Role-Specific Training. Employees with elevated access or specific security responsibilities — including IT staff, compliance personnel, executive management, and employees with administrative system privileges — should receive additional training tailored to their roles, covering advanced threat detection, incident response procedures, and regulatory expectations for their specific functions.
监管机构要求所有员工接受隐私和安全培训,培训的范围和深度应当根据员工的角色和访问级别定制。
监管基础。 Reg S-P保障规则要求公司将员工培训作为其书面信息安全政策的一部分。FINRA监管通知21-18强调了会员公司的网络安全实践,包括员工意识和培训的重要性。纽约DFS 23 NYCRR 500.14明确要求对所有人员开展定期网络安全意识培训。
培训内容。 有效的培训项目应当覆盖:公司的隐私和信息安全政策与流程;公司收集的NPI类型以及保护NPI的监管要求;识别和报告社会工程攻击,包括钓鱼邮件、鱼叉式钓鱼、语音钓鱼(vishing)、短信钓鱼(smishing)、 pretexting和商业电子邮件泄露(BEC);物理安全实践,包括访客管理、安全区域和干净桌面政策;电子邮件、互联网和可移动介质的正确使用;移动设备安全和自带设备(BYOD)政策;密码管理和多因素认证;报告疑似安全事件的流程,包括联系对象和需要提供的信息;政策违规的后果,包括纪律处分和潜在的监管责任。
钓鱼模拟。 公司应当定期开展钓鱼模拟演练以测试员工的安全意识。应当跟踪演练结果,未通过模拟的员工应当接受额外的针对性培训。SEC检查员在网络安全检查期间已经要求提供钓鱼模拟结果和点击通过率数据。
培训频率与记录留存。 培训应当至少每年开展一次,当出现重大新威胁或公司政策发生重大变更时应当开展补充培训。新员工应当在入职期间、获得客户NPI访问权限之前接受培训。所有培训必须留存记录,包括日期、参会人员、覆盖的主题和使用的材料。记录应当至少留存5年,以满足检查和审计要求。
角色专属培训。 拥有 elevated访问权限或特定安全职责的员工——包括IT人员、合规人员、高管管理层和拥有系统管理权限的员工——应当接受针对其角色的额外培训,覆盖高级威胁检测、事件响应流程和针对其特定职能的监管要求。
Worked Examples
实操示例
Example 1: Departing Employee Downloads Client NPI to Personal USB Drive
示例1:离职员工将客户NPI下载到个人USB驱动器
Scenario: An SEC-registered investment adviser discovers during a routine access review that a recently departed portfolio manager downloaded a file containing client NPI — including names, Social Security numbers, dates of birth, and account values for 850 clients — to a personal USB drive on the employee's last day of employment. The firm's IT team identifies the transfer through endpoint monitoring logs. The employee has already left the firm and started at a competing RIA.
Compliance Issues:
- The Reg S-P Safeguards Rule (17 CFR 248.30) requires written policies and procedures to protect against unauthorized access to customer records. The firm must evaluate whether its existing controls were adequate to prevent this type of exfiltration and whether its policies were followed.
- If the firm's policies prohibited personal USB device use or required DLP controls blocking the transfer of files containing NPI to removable media, a failure to enforce those policies is itself a Safeguards Rule deficiency.
- If the firm lacked such policies, the absence constitutes a potential Safeguards Rule violation, as the policies must be reasonably designed to protect against unauthorized access.
- State breach notification laws are triggered because Social Security numbers were compromised. The firm must determine the states of residence of all 850 affected clients and comply with each applicable state law's notification requirements.
- Several states — including California (Cal. Civ. Code 1798.82), Massachusetts (M.G.L. c. 93H, Section 3), and New York (N.Y. Gen. Bus. Law 899-aa) — require notification to both the affected individuals and the state attorney general. Notification timelines vary but are typically 30 to 60 days from discovery.
- The firm should evaluate whether the departing employee's actions constitute potential financial crime (theft of trade secrets, identity theft facilitation, or misuse of client information for competitive solicitation), which may warrant a SAR filing under BSA/AML obligations. Analysis: The firm should immediately take the following steps: (1) Preserve all evidence of the data transfer, including endpoint monitoring logs, the employee's access logs, and any records of the files accessed or copied. (2) Engage legal counsel to assess state breach notification obligations and to manage attorney-client privilege over the investigation. (3) Contact the former employee and the competing firm through counsel to demand the return or certified destruction of all client data, supported by a forensic certification that no copies remain. (4) Conduct a forensic analysis of the former employee's workstation and access history to determine whether additional data was compromised. (5) Notify affected clients as required by applicable state laws, providing information about the nature of the data compromised, the steps the firm is taking, and resources for credit monitoring or identity theft protection (several states require the firm to offer credit monitoring at no cost). (6) Report the incident to senior management and the board (or equivalent governing body) for oversight. (7) Evaluate whether existing access controls should be strengthened — for example, implementing or enforcing USB port blocking, DLP controls preventing NPI transfer to removable media, and enhanced monitoring during employee offboarding periods. (8) Document all remediation actions, as SEC examiners will expect to see evidence that the firm identified the root cause and implemented corrective measures.
场景: 一家SEC注册投资顾问在例行访问审查中发现,一名最近离职的投资组合经理在其任职最后一天将包含850名客户的NPI(包括姓名、社会安全号码、出生日期和账户价值)的文件下载到了该员工个人的USB驱动器上。公司的IT团队通过端点监控日志识别到了该传输行为。该员工已经离开公司,入职了一家竞争对手的注册投资顾问公司。
合规问题:
- Reg S-P保障规则(17 CFR 248.30)要求制定书面政策和流程,防范对客户记录的未授权访问。公司必须评估其现有控制措施是否足以防止此类数据外泄,以及其政策是否得到了遵守。
- 如果公司的政策禁止个人USB设备使用,或要求采用DLP控制措施阻止包含NPI的文件传输到可移动介质,那么未执行这些政策本身就属于保障规则缺陷。
- 如果公司缺乏此类政策,那么缺失政策就构成潜在的保障规则违规,因为政策必须经过合理设计,防范未授权访问。
- 由于社会安全号码遭到泄露,触发了州数据泄露通知法律。公司必须确定所有850名受影响客户的居住州,并遵守每个适用州法律的通知要求。
- 多个州——包括加利福尼亚州(Cal. Civ. Code 1798.82)、马萨诸塞州(M.G.L. c. 93H, Section 3)和纽约州(N.Y. Gen. Bus. Law 899-aa)——要求同时向受影响个人和州总检察长发出通知。通知期限各不相同,但通常为发现泄露后的30至60天。
- 公司应当评估离职员工的行为是否构成潜在金融犯罪(盗窃商业秘密、协助身份盗窃、或滥用客户信息用于竞争性招揽),这可能需要根据BSA/AML义务提交SAR。 分析: 公司应当立即采取以下措施:(1) 保存所有数据传输的证据,包括端点监控日志、该员工的访问日志、以及任何访问或复制的文件的记录。(2) 聘请法律顾问评估州数据泄露通知义务,并对调查工作赋予律师-客户特权保护。(3) 通过法律顾问联系前员工和竞争对手公司,要求返还或认证销毁所有客户数据,并提供不存在副本的 forensic认证。(4) 对前员工的工作站和访问历史开展取证分析,确定是否有其他数据遭到泄露。(5) 根据适用州法律的要求通知受影响客户,提供关于泄露数据的性质、公司正在采取的措施、以及信用监控或身份盗窃保护资源的信息(多个州要求公司免费提供信用监控服务)。(6) 向高级管理层和董事会(或同等治理机构)报告事件,以获得监督。(7) 评估是否应当加强现有访问控制措施——例如实施或执行USB端口封锁、阻止NPI传输到可移动介质的DLP控制措施、以及员工离职期间的增强监控。(8) 记录所有整改措施,因为SEC检查员将期望看到公司识别根本原因并落实纠正措施的证据。
Example 2: Third-Party Vendor Ransomware Attack Exposes Customer Data
示例2:第三方供应商勒索软件攻击暴露客户数据
Scenario: A mid-sized broker-dealer uses a third-party portfolio accounting vendor to process and store customer account data for approximately 15,000 accounts. The vendor notifies the firm that it has experienced a ransomware attack in which threat actors exfiltrated data before encrypting systems. The vendor's initial assessment indicates that the exfiltrated data may include customer names, addresses, account numbers, Social Security numbers, and account holdings. The firm's customers reside in 38 states. The vendor's notification arrives 10 days after the vendor discovered the incident.
Compliance Issues:
- The firm's Reg S-P Safeguards Rule obligations extend to its oversight of service providers. The firm is required to have written policies and procedures addressing service provider oversight, including contractual protections and ongoing monitoring (17 CFR 248.30).
- The firm must evaluate the adequacy of its vendor management program: Did the contract require the vendor to notify the firm within a specified period (e.g., 24 to 72 hours)? A 10-day delay may indicate a contractual gap or a vendor breach of its contractual obligations. Did the firm conduct due diligence on the vendor's security posture before engagement? Did the firm review the vendor's SOC reports or equivalent assessments? Did the contract include audit rights, subcontractor controls, and indemnification?
- If the firm is DFS-regulated, 23 NYCRR 500.17 requires notification to DFS within 72 hours of determining that a cybersecurity event has occurred that has a reasonable likelihood of materially harming normal operations — this includes incidents at third-party service providers that affect the firm's customer data.
- State breach notification laws are triggered for all 38 states where customers reside. The firm — not the vendor — is typically the entity with the customer relationship and thus bears the notification obligation (though the vendor may have independent notification obligations in some states).
- FINRA expects member firms to notify FINRA of significant cybersecurity incidents. A breach affecting 15,000 customer accounts with Social Security numbers is significant.
- The firm must assess whether the incident has triggered the SEC's proposed incident reporting requirements (if adopted) or, in any case, whether the incident is material for purposes of the firm's own regulatory filings and disclosures. Analysis: The firm should activate its incident response plan and take the following actions: (1) Engage external cybersecurity counsel and a forensic investigation firm to assess the scope of the compromise independently of the vendor's assessment. (2) Demand from the vendor: a detailed incident timeline, forensic investigation reports, confirmation of the specific data compromised, the vendor's remediation steps, and evidence that the attack vector has been closed. (3) Begin mapping state-by-state breach notification requirements for all 38 states. Assign the most restrictive deadline (likely 30 days from the firm's discovery) as the target for all notifications to ensure compliance across jurisdictions. (4) Prepare customer notification letters that comply with the content requirements of each applicable state, providing the nature of the compromised data, the firm's response actions, and information about credit monitoring services (the firm should provide credit monitoring at its expense for affected customers). (5) Notify DFS within 72 hours if the firm is subject to 23 NYCRR 500. (6) Notify FINRA of the incident. (7) Evaluate whether the breach resulted in or facilitated any unauthorized transactions, account takeovers, or other potential financial crime, and file SARs as appropriate. (8) Reassess the vendor relationship: review the contract for breach provisions and indemnification rights, consider whether the vendor's security practices are adequate for continued engagement, and document the reassessment. (9) Report the incident and remediation actions to the board or senior management, and update the firm's written information security program to address any gaps revealed by the incident. (10) Retain all documentation of the incident, investigation, notifications, and remediation for examination and audit purposes.
场景: 一家中型经纪交易商使用第三方投资组合会计供应商处理和存储约15000个账户的客户账户数据。该供应商通知公司,其遭遇了勒索软件攻击,威胁 actors在加密系统之前窃取了数据。供应商的初步评估显示,被窃取的数据可能包括客户姓名、地址、账户号码、社会安全号码和账户持仓情况。公司的客户分布在38个州。供应商在发现事件10天后才向公司发出通知。
合规问题:
- 公司的Reg S-P保障规则义务延伸到其对服务提供商的监督。公司必须制定书面政策和流程,覆盖服务提供商监督,包括合同保护和持续监控(17 CFR 248.30)。
- 公司必须评估其供应商管理项目的充分性:合同是否要求供应商在指定期限内(例如24至72小时)通知公司?10天的延迟可能表明存在合同漏洞或供应商违反了合同义务。公司在合作前是否对供应商的安全状况开展了尽职调查?公司是否审查了供应商的SOC报告或同等评估报告?合同是否包含审计权利、分包商控制和赔偿条款?
- 如果公司受DFS监管,23 NYCRR 500.17要求在确定网络安全事件存在合理可能性对正常运营造成重大损害后的72小时内通知DFS——这包括影响公司客户数据的第三方服务提供商发生的事件。
- 触发客户所在所有38个州的州数据泄露通知法律。通常是公司而非供应商与客户存在关系,因此承担通知义务(尽管在某些州供应商可能有独立的通知义务)。
- FINRA要求会员公司将重大网络安全事件通知FINRA。影响15000个包含社会安全号码的客户账户的泄露属于重大事件。
- 公司必须评估事件是否触发SEC拟议的事件报告要求(如果已通过),或者无论如何,事件对于公司自身的监管备案和披露而言是否具有重大性。 分析: 公司应当启动事件响应计划,并采取以下行动:(1) 聘请外部网络安全法律顾问和取证调查公司,独立于供应商的评估来评估泄露的范围。(2) 向供应商要求:详细的事件时间线、取证调查报告、确认具体泄露的数据、供应商的整改措施、以及攻击向量已被封堵的证据。(3) 开始梳理所有38个州的州级数据泄露通知要求。将最严格的期限(可能是公司发现后的30天)作为所有通知的目标期限,以确保跨司法管辖区的合规性。(4) 准备符合每个适用州的内容要求的客户通知函,提供泄露数据的性质、公司的响应行动、以及信用监控服务的信息(公司应当自掏腰包为受影响客户提供信用监控)。(5) 如果公司受23 NYCRR 500监管,在72小时内通知DFS。(6) 将事件通知FINRA。(7) 评估泄露是否导致或便利了任何未授权交易、账户接管或其他潜在金融犯罪,并酌情提交SAR。(8) 重新评估与供应商的合作关系:审查合同中的违约条款和赔偿权利,考虑供应商的安全实践是否足以支持继续合作,并记录重新评估过程。(9) 向董事会或高级管理层报告事件和整改措施,更新公司的书面信息安全方案,以解决事件暴露的任何漏洞。(10) 留存事件、调查、通知和整改的所有文档,用于检查和审计目的。
Example 3: SEC Examination Focused on Cybersecurity
示例3:SEC以网络安全为重点的检查
Scenario: An SEC-registered investment adviser with $5 billion in AUM receives an examination notification letter from the SEC Division of Examinations. The document request list includes cybersecurity as a focus area, requesting production of the firm's written information security policies, incident response plan, vendor assessments, access control documentation, employee training records, and board or management reporting on cybersecurity.
Compliance Issues:
- The examination will test the firm's compliance with the Reg S-P Safeguards Rule, which requires written policies and procedures for administrative, technical, and physical safeguards.
- If the firm is subject to Reg S-ID, examiners may also request the firm's Identity Theft Prevention Program and evidence of its implementation.
- SEC examiners will assess not only the existence of written policies but their actual implementation, testing, and updating — a policy that exists on paper but is not followed is a deficiency.
- Common SEC examination deficiency findings related to cybersecurity include: lack of a comprehensive written information security policy; policies that have not been updated to reflect current threats, technology, or business practices; insufficient access controls (e.g., shared passwords, failure to implement multi-factor authentication, failure to decommission access promptly upon employee departure); lack of a written incident response plan or failure to test the plan through tabletop exercises; insufficient vendor due diligence documentation (no SOC reports, no security questionnaires, no contractual protections); inadequate employee training records (no evidence of training, training not conducted annually, no phishing simulation program); failure to conduct periodic risk assessments; failure to encrypt NPI at rest and in transit; and insufficient board or senior management oversight (no regular reporting on cybersecurity risks, no board-level engagement). Analysis: To prepare for the examination, the firm should: (1) Assemble all responsive documents before the production deadline, including the written information security policy, risk assessments, incident response plan, vendor management policies and individual vendor assessments (SOC reports, security questionnaires, contracts with security provisions), access control documentation (user access lists, privileged account inventories, access review records, MFA implementation evidence), employee training materials and attendance records for at least the prior two years, phishing simulation results, incident logs (even if no material incidents occurred — examiners want to see the logging process), board or management committee meeting minutes reflecting cybersecurity discussions and reporting, and any third-party penetration testing or vulnerability assessment reports. (2) Conduct a gap analysis against SEC examination expectations before the examination begins. Identify any deficiencies and begin remediation immediately — examiners view active remediation favorably, even if the deficiency exists. (3) Prepare the CISO, CCO, and relevant IT and compliance personnel for examination interviews. Examiners will ask questions about how policies are implemented in practice, how incidents are escalated, how vendors are monitored, and how the firm stays current with evolving threats. (4) Review recent SEC EXAMS risk alerts and deficiency letters related to cybersecurity to anticipate the examination team's areas of focus. (5) Ensure that the firm's written policies are current and accurately reflect the firm's actual practices — a material gap between written policy and actual practice is a significant deficiency. (6) Document the firm's remediation of any prior examination findings, internal audit findings, or self-identified deficiencies.
场景: 一家管理资产规模50亿美元的SEC注册投资顾问收到SEC检查部门的检查通知函。文件请求清单将网络安全列为重点领域,要求提供公司的书面信息安全政策、事件响应计划、供应商评估、访问控制文档、员工培训记录、以及董事会或管理层关于网络安全的报告。
合规问题:
- 检查将测试公司对Reg S-P保障规则的合规性,该规则要求制定覆盖行政、技术和物理保障措施的书面政策和流程。
- 如果公司受Reg S-ID监管,检查员还可能要求提供公司的身份盗窃预防方案和其落地的证据。
- SEC检查员不仅会评估书面政策是否存在,还会评估其实际落地、测试和更新情况——仅存在于纸面上但未得到遵守的政策属于缺陷。
- SEC检查中常见的与网络安全相关的缺陷发现包括:缺乏全面的书面信息安全政策;政策未更新以反映当前威胁、技术或业务实践;访问控制不足(例如共享密码、未落实多因素认证、员工离职后未及时注销访问权限);缺乏书面事件响应计划或未通过桌面演练测试计划;供应商尽职调查文档不足(没有SOC报告、没有安全问卷调查、没有合同保护);员工培训记录不足(没有培训证据、未每年开展培训、没有钓鱼模拟项目);未开展定期风险评估;未对静态和传输中NPI进行加密;董事会或高级管理层监督不足(没有关于网络安全风险的定期报告、没有董事会层面的参与)。 分析: 为准备检查,公司应当:(1) 在提交截止日期前整理所有响应文件,包括书面信息安全政策、风险评估、事件响应计划、供应商管理政策和单个供应商评估(SOC报告、安全问卷调查、包含安全条款的合同)、访问控制文档(用户访问列表、特权账户清单、访问审查记录、MFA落地证据)、至少过去两年的员工培训材料和出勤记录、钓鱼模拟结果、事件日志(即使没有发生重大事件——检查员希望看到日志记录流程)、反映网络安全讨论和报告的董事会或管理委员会会议纪要、以及任何第三方渗透测试或漏洞评估报告。(2) 在检查开始前对照SEC检查要求开展差距分析。识别任何缺陷并立即开始整改——即使缺陷存在,检查员也会对积极整改持正面看法。(3) 为CISO、CCO以及相关IT和合规人员准备检查访谈。检查员将询问政策在实践中如何落地、事件如何升级、供应商如何监控、以及公司如何跟进不断演变的威胁等问题。(4) 查阅SEC EXAMS最近发布的与网络安全相关的风险预警和缺陷函,以预判检查团队的重点关注领域。(5) 确保公司的书面政策是最新的,且准确反映公司的实际实践——书面政策和实际实践之间存在重大差距属于严重缺陷。(6) 记录公司对任何先前检查发现、内部审计发现或自我识别缺陷的整改情况。
Common Pitfalls
常见陷阱
- Treating the Reg S-P Safeguards Rule as a documentation exercise rather than an operational requirement — written policies must be implemented, tested, and updated, not merely drafted and filed
- Assuming the FAST Act annual privacy notice exception applies without verifying that the firm shares NPI only under permitted exceptions and has not changed its privacy policies since the last notice
- Failing to conduct a covered account analysis under Reg S-ID — firms sometimes assume that only banks have covered accounts, but brokerage accounts and advisory accounts with ongoing transactions qualify
- Implementing an Identity Theft Prevention Program at the time of initial adoption but never updating it, even as the firm's customer base, products, and threat landscape change
- Treating vendor due diligence as a one-time onboarding exercise rather than an ongoing monitoring obligation — a SOC report from three years ago does not satisfy current diligence expectations
- Including security standards in vendor contracts but never exercising audit rights or reviewing compliance with those standards
- Relying on a vendor's notification of a breach as the sole trigger for the firm's incident response — the firm has an independent obligation to monitor for and detect security incidents
- Failing to map multi-state breach notification obligations before an incident occurs, resulting in delayed or non-compliant notifications under compressed timelines
- Not distinguishing between data subject to the GLBA exemption from CCPA/CPRA and data that falls outside the exemption — employee data, website analytics, and marketing data may not be covered by the GLBA exemption
- Implementing encryption for data in transit but neglecting encryption at rest, or vice versa
- Failing to decommission system access promptly when employees depart — SEC examiners routinely check for active accounts belonging to former employees as an indicator of access control weaknesses
- Treating employee cybersecurity training as a compliance checkbox rather than an effective awareness program — annual slide decks without phishing simulations, role-specific content, or measurable outcomes are increasingly viewed as inadequate
- Maintaining incident response plans that have never been tested through tabletop exercises or simulations — untested plans frequently fail under the pressure of an actual incident
- Assuming that outsourcing data processing or storage to a cloud provider eliminates the firm's regulatory responsibility for data security — the shared responsibility model requires the firm to secure its own configurations, access controls, and data within the cloud environment
- 将Reg S-P保障规则视为文档工作而非运营要求——书面政策必须得到落地、测试和更新,而不仅仅是起草后归档
- 未核实公司仅在允许的例外情形下共享NPI,且自上次通知发布以来未修改隐私政策,就假定FAST Act年度隐私通知豁免适用
- 未根据Reg S-ID开展受监管账户分析——公司有时认为只有银行才有受监管账户,但经纪账户和提供持续交易的顾问账户也符合要求
- 在最初落地身份盗窃预防方案后从未更新,即使公司的客户群、产品和威胁环境已经发生变化
- 将供应商尽职调查视为一次性的入职工作而非持续的监控义务——三年前的SOC报告无法满足当前的尽职调查要求
- 在供应商合同中包含安全标准,但从未行使审计权利或审查对这些标准的合规情况
- 仅依赖供应商的泄露通知作为公司事件响应的唯一触发条件——公司有独立的义务监控和检测安全事件
- 未在事件发生前梳理多州数据泄露通知义务,导致在紧迫的期限下通知延迟或不合规
- 未区分受GLBA豁免CCPA/CPRA的数据和属于豁免范围之外的数据——员工数据、网站分析数据和营销数据可能不属于GLBA豁免范围
- 仅对传输中数据实施加密而忽略静态数据加密,或反之
- 员工离职时未及时注销系统访问权限——SEC检查员例行检查是否存在属于前员工的活跃账户,作为访问控制薄弱的指标
- 将员工网络安全培训视为合规勾选框而非有效的意识项目——没有钓鱼模拟、角色专属内容或可衡量成果的年度幻灯片演示越来越被视为不足
- 维护的事件响应计划从未通过桌面演练或模拟进行测试——未经测试的计划在实际事件的压力下经常失效
- 假定将数据处理或存储外包给云提供商就消除了公司对数据安全的监管责任——责任共担模型要求公司保障其在云环境中的配置、访问控制和数据的安全
Cross-References
交叉引用
- client-disclosures (Layer 9): The Reg S-P privacy notice is a required client disclosure document; its content, delivery timing, and the FAST Act exception are addressed in the client-disclosures skill
- books-and-records (Layer 9): Data retention and destruction requirements under privacy regulations must be reconciled with books-and-records retention rules under SEC Rule 17a-4 and IA Act Rule 204-2
- know-your-customer (Layer 9): KYC data — including Social Security numbers, dates of birth, addresses, and identification documents — constitutes NPI requiring protection under Reg S-P and is a primary target for identity theft under Reg S-ID
- anti-money-laundering (Layer 9): Cybersecurity incidents involving unauthorized account access, funds theft, or identity theft may trigger SAR filing obligations under BSA/AML requirements
- examination-readiness (Layer 9): Cybersecurity is consistently among the SEC Division of Examinations' top examination priorities; cybersecurity document requests, interview topics, and common deficiency findings are central to examination preparation
- conflicts-of-interest (Layer 9): Information barriers, access controls, and data segregation policies serve dual purposes — preventing misuse of material nonpublic information and protecting customer NPI from unauthorized internal access
- client-disclosures(第9层):Reg S-P隐私通知是 required客户披露文档;其内容、交付时间和FAST Act豁免在client-disclosures技能中说明
- books-and-records(第9层):隐私法规下的数据留存和销毁要求必须与SEC Rule 17a-4和IA Act Rule 204-2下的账簿记录留存规则保持一致
- know-your-customer(第9层):KYC数据——包括社会安全号码、出生日期、地址和身份证明文件——属于Reg S-P下要求保护的NPI,也是Reg S-ID下身份盗窃的主要目标
- anti-money-laundering(第9层):涉及未授权账户访问、资金盗窃或身份盗窃的网络安全事件可能触发BSA/AML要求下的SAR提交义务
- examination-readiness(第9层):网络安全一直是SEC检查部门的首要检查重点;网络安全文件请求、访谈主题和常见缺陷发现是检查准备的核心内容
- conflicts-of-interest(第9层):信息屏障、访问控制和数据隔离政策具有双重目的——防止重大非公开信息被滥用,以及保护客户NPI免受内部未授权访问