IAPP-GDPR Web Banners-300x250-FINAL
DPI16_Banner_300x250 WITH COPY

A cybersecurity breach can create huge costs for a corporation by damaging the company’s reputation and consumer loyalty while also creating the risk of class-action litigation. The Securities and Exchange Commission (SEC) has recognized the risks that publicly traded companies face in dealing with cybersecurity incidents. In October 2011, the SEC promulgated guidelines that publicly traded companies should evaluate when determining what information should be disclosed concerning a cybersecurity incident or potential incident. These advisory guidelines provide a new paradigm for evaluating how cybersecurity risks should be disclosed by publicly traded companies.

While the guidelines are not a rule, regulation or statement of the SEC, and while the commission has not approved or disapproved of its content, publicly traded companies need to be aware of the guidelines and plan accordingly. By promulgating the guidelines, the SEC has made the financial community aware that it considers cybersecurity a very serious matter and that the impact of cybersecurity on a company’s bottom line should be disclosed. Simply ignoring the impact that a cybersecurity incident may have on a company’s balance sheet is no longer a proper course of action.

Evaluate the Risks of Cyber Incidents

The guidelines instruct companies to disclose the risk of cyber incidents if a security incident may be “among the most significant factors that make an investment in the company speculative or risky.” In making this determination, a company should examine its cybersecurity risks, prior cyber incidents and the severity and frequency of such incidents.  A company should also analyze the likelihood of additional incidents occurring in the future and the impact of such incidents on the company. A company does not need to disclose risks that would typically be generic in nature.

If a company determines that disclosure of the risk of a cyber incident is appropriate, the SEC instructs that appropriate disclosures may include discussion of aspects of a company’s operations that give risk to material risks; outsourced security functions; past cybersecurity incidents and costs of remediating the incidents; risks of undetected cybersecurity incidents, and relevant insurance coverage that might cover the incident.

Management’s Discussion and Analysis of Financial Condition and Results of Operations

The SEC instructs that a company should address cybersecurity risks and incidents in their MD&A “if the costs or other consequences associated with one or more known incidents or the risks of potential incidents represent a material event, trend or uncertainty that is reasonably likely to have a material effect” on the company’s financial position. For example, if critical intellectual property is stolen, a company may want to consider disclosing that the information was stolen and the effect of the theft on the company’s position.

Legal Proceedings

The SEC instructs that a legal proceeding involving a cyber incident may need to be disclosed. This would be disclosed in the company’s “Legal Proceedings” disclosure. The disclosure would state the name of the court, the date the suit was instituted, the principal parties, a description of the allegations and the damages sought.

Dealing with a Cyber Incident

A cybersecurity incident will likely require disclosure of certain losses. If a cybersecurity incident affects a publicly traded company, the company might consider providing an incentive to customers in order to retain the business. Such incentives should be appropriately disclosed. In addition, a cybersecurity breach may create losses related to warranties, breach of contract, indemnification of counterparty losses, diminished future cash flows and impairment of good will and intangible assets. Companies should provide disclosure of such losses as well.

Three Steps Companies Should Take

Given the new SEC advisory guidelines, publicly traded companies should make sure that they are adequately protected in the event of a cybersecurity incident or potential incident. They can do so by taking the following three steps:

Evaluate the likelihood of a potential cybersecurity incident and examine their existing disclosures to determine if they are meeting their obligations under the SEC guidelines. 

  • If a company handles sensitive types of data—like financial data or healthcare information—the company should seriously consider updating its disclosure forms to explain the impact of a cybersecurity incident on the bottom line. Such an incident would likely result in significant remediation measures, litigation or fines imposed by a regulatory body.

Analyze insurance policies to determine whether a policy provides coverage for a cybersecurity incident. 

  • Many insurance companies require the purchase of cyber risk insurance to cover a cybersecurity breach. The SEC’s emphasis on insurance as a way to mitigate risk means that companies should evaluate their insurance policies in light of the risk of a security incident.

Stay abreast of legal development regarding your company’s disclosure obligations. 

  • While the SEC guidelines are merely advisory in nature, new legislation has been proposed that would require certification requirements by certain entities on cybersecurity readiness.

The SEC’s guidelines address cybersecurity incidents in the context of business planning and risk management. By emphasizing risk factors and disclosure obligations, the SEC guidelines demonstrate that managing information security is about risk analysis rather than a particular type of technology at issue.

Written By

Rebecca Shwayri


If you want to comment on this post, you need to login.


Board of Directors

See the esteemed group of leaders shaping the future of the IAPP.

Contact Us

Need someone to talk to? We’re here for you.

IAPP Staff

Looking for someone specific? Visit the staff directory.

Learn more about the IAPP»

Daily Dashboard

The day’s top stories from around the world

Privacy Perspectives

Where the real conversations in privacy happen

The Privacy Advisor

Original reporting and feature articles on the latest privacy developments

Privacy Tracker

Alerts and legal analysis of legislative trends

Privacy Tech

Exploring the technology of privacy

Canada Dashboard Digest

A roundup of the top Canadian privacy news

Europe Data Protection Digest

A roundup of the top European data protection news

Asia-Pacific Dashboard Digest

A roundup of the top privacy news from the Asia-Pacific region

Latin America Dashboard Digest

A roundup of the top privacy news from Latin America

IAPP Westin Research Center

Original works. Groundbreaking research. Emerging scholars.

Get more News »

Find a KnowledgeNet Chapter Near You

Network and talk privacy at IAPP KnowledgeNet meetings, taking place worldwide.

Women Leading Privacy

Events, volunteer opportunities and more designed to help you give and get career support and expand your network.

IAPP Job Board

Looking for a new challenge, or need to hire your next privacy pro? The IAPP Job Board is the answer.

Join the Privacy List

Have ideas? Need advice? Subscribe to the Privacy List. It’s crowdsourcing, with an exceptional crowd.

Find more ways to Connect »

Find a Privacy Training Class

Two-day privacy training classes are held around the world. See the complete schedule now.

Online Privacy Training

Build your knowledge. The privacy know-how you need is just a click away.

The Training Post—Can’t-Miss Training Updates

Subscribe now to get the latest alerts on training opportunities around the world.

New Web Conferences Added!

See our list of upcoming web conferences. Just log on, listen in and learn!

Train Your Staff

Get your team up to speed on privacy by bringing IAPP training to your organization.

Learn more »

CIPP Certification

The global standard for the go-to person for privacy laws, regulations and frameworks

CIPM Certification

The first and only privacy certification for professionals who manage day-to-day operations

CIPT Certification

The industry benchmark for IT professionals worldwide to validate their knowledge of privacy requirements

Certify Your Staff

Find out how you can bring the world’s only globally recognized privacy certification to a group in your organization.

Learn more about IAPP certification »

Get Close-up

Looking for tools and info on a hot topic? Our close-up pages organize it for you in one easy-to-find place.

Where's Your DPA?

Our interactive DPA locator helps you find data protection authorities and summary of law by country.

IAPP Westin Research Center

See the latest original research from the IAPP Westin fellows.

Looking for Certification Study Resources?

Find out what you need to prepare for your exams

More Resources »

GDPR Comprehensive: Spots Going Fast

With the top minds in the field leading this exceptional program, it's no wonder it's filling quickly. Register now to secure your spot.

Be Part of Something Big: Join the Summit

Registration is open for the Global Privacy Summit 2016. Discounted early bird rates available for a short time, register today!

Data Protection Intensive Returns to London

Registration is now open for the IAPP Europe Data Protection Intensive in London. Check out the program!

P.S.R. Call for Speakers Open!

P.S.R. is THE privacy + cloud security event of the year, and you can take a leading role. Propose a session for this year's program.

Sponsor an Event

Increase visibility for your organization—check out sponsorship opportunities today.

Exhibit at an Event

Put your brand in front of the largest gatherings of privacy pros in the world. Learn more.

More Conferences »

Become a Member

Start taking advantage of the many IAPP member benefits today

Corporate Members

See our list of high-profile corporate members—and find out why you should become one, too

Renew Your Membership

Don’t miss out for a minute—continue accessing your benefits

Join the IAPP»