
Fundamentals for Newer Directors 2014 (pdf)
The latest edition of ICI’s flagship publication shares a wealth of research and data on trends in the investment company industry.
[22305]
March 7, 2008
TO: CLOSED-END INVESTMENT COMPANY COMMITTEE No. 4-08
The Securities and Exchange Commission has proposed for comment extensive amendments to Rule 248.30 in Regulation S-P, which governs the duty of registered investment companies, investment advisers, and broker-dealers to safeguard and properly dispose of customer records and information. [1] Importantly, the amendments would also, for the first time, subject transfer agents to Rule 248.30 of Reg. S-P, rather than to the FTC’s safeguard rule.
Comments on the proposal are due to the SEC within 60 days of the proposal’s publication in the Federal Register. The Institute will hold a conference call on Tuesday, March 25th at 3 p.m. Eastern Time to discuss the Commission’s proposal. If you plan to participate on the call, please let Lynnette Smith know by email (lsmith@ici.org) as soon as possible, but no later than Friday, March 21st. If you are unable to participate in the call but have comments on the proposal, please provide them to Tami Salmon prior to the call by phone (202-326-5825) or email (tamara@ici.org).
As discussed in more detail below, among other things, these amendments would require federally-registered investment companies, investment advisers, broker-dealers, and transfer agents (collectively referred to as “registrants”) to:
The proposal would also add a new limited exception to Rule 248.15, which provides exceptions from Reg. S-P’s notice and opt-out requirements, to enable broker-dealer and investment adviser representatives who switch firms to transfer limited customer information from their old firm to their new firm.
I. Information Security Programs
As proposed, Rule 248.30 of Reg. S-P would require each registrant to develop, implement, and maintain a comprehensive information security program (the “program”) that includes written policies and procedures providing administrative, technical, and physical safeguards for protecting personal information. Each registrant’s program must be appropriate to its size and complexity, the nature and scope of its activities, and the sensitivity of personal information at issue. It must also meet the conditions discussed below.
A. Objectives
The program must be reasonably designed to: ensure the security and confidentiality of personal information; protect against any anticipated threats or hazards to the security or integrity of personal information; and protect against unauthorized access to or use of personal information “that could result in substantial harm or inconvenience to any consumer, employee, investor, or security holder who is a natural person.” [2]
B. Safeguards
The rule would require the registrant to:
The revised rule would address responding to unauthorized access to or use of personal information, including notifying individuals and the SEC of such occurrences. In particular, the rule would require the program to include written procedures to:
In the event the registrant determines that an unauthorized person has obtained access to or used sensitive personal information and the misuse of such information has occurred or is reasonably possible, the rule requires the registrant to notify “each individual with whom the information is identified in a clear and conspicuous manner and by means designed to ensure that the individual can reasonably be expected to receive it.” [7] Such notice must:
II. Disposal of Personal Information
As stated above, the proposed rule would require registrants to adopt written policies and procedures addressing the proper disposal of personal information and to document such disposal. Under the rule, proper disposal would involve taking reasonable measures to protect against unauthorized access to or use of the information when disposing of it. This portion of the rule clarifies that it does not require a registrant to maintain or destroy any records except as otherwise required by law.
III. Recordkeeping
Many provisions of the proposed rule would require the registrant to maintain records documenting its compliance with the rule’s various requirements. The rule would include a “recordkeeping” section specifying the period of time for which such records must be maintained. Investment companies would be required to maintain their records as specified in Rule 31a-2(a)(4)-(6) under the Investment Company Act, which requires records to be maintained for not less than six years, the first two in an easily accessible place. Transfer agents’ records would have to be maintained in accordance with Rule 17Ad-7(b) under the Securities Exchange Act of 1934, which imposes a two-year retention requirement. And, an investment adviser must maintain its records for five years as required by Rule 204-2(e)(1) under the Investment Advisers Act.
IV. Form SP-30
&As mentioned above, the rule would require proposed Form SP-30 be filed with the SEC whenever there is any incident of unauthorized access to our use of personal information in which there is either a significant risk that an individual might suffer substantial harm or inconvenience or an unauthorized person has intentionally obtained access to or used sensitive personal information. Form SP-30 would require disclosure of specified information including: a detailed description of the security incident containing certain information; steps taken in response including whether affected individuals are being notified; customer account losses; and unauthorized changes to securities portfolios.
V. Amendments to Rule 248.15
Rule 248.15 of Reg. S-P excepts from the Regulation’s notice and opt out requirements certain disclosures of nonpublic personal information. The Commission has proposed to amend this rule to add a new exception for representatives of a broker-dealer or investment adviser who leave the employ of one registrant to become the representative of another. This exception would permit the representative to disclose to its new firm limited information about the representative’s existing customers – i.e., the customer’s name, a general description of the type of account and products held by the customer, and the customer’s contact information. A representative could not disclose any account number, social security number, or securities positions under this exception. The sharing of this information would be conditioned on the representative providing a written record to its existing broker-dealer or investment adviser of the information that will be disclosed to its new employer pursuant to the exception.
VI. The Release’s Cost/Benefit Estimates
&According to the Release, the staff estimates that the time “smaller institutions” would devote to initial compliance with the proposed amendments would range from 2 to 80 hours, with a midpoint of 41 hours. Their implementation costs are estimated to be approximately $18,560. [8] These estimates reflects the following time allocations:
The Commission estimates that “larger institutions” would devote 40-400 hours on compliance, with a midpoint of 220 hours. This estimate includes, in part, 2 hours for the program coordinator to review the amendments, 42 hours to assess risks and review procedures, 60 hours to review, revise, and implement new safeguards, 60 hours to test the effectiveness of the safeguards controls and procedures, 34 hours to train staff, and 20 hours to review service providers’ procedures and revise contracts appropriately. It is estimated that these efforts would cost registrants approximately $172,732 each.
As regards the breach notification provisions, the Release estimates that it would take a smaller institution approximately 10 hours to respond appropriately to potential incidents of data security breach, which includes investigating the breach and notifying affected individuals. For a larger institution, the Commission estimates this process would take 20 hours, in part, “because larger institutions are likely to conduct more complicated investigations that require more detailed explanations on proposed Form SP-30” due to the fact that they “may experience more sophisticated security attacks.” [10]
Though not quantified, the Release notes that the benefits from the proposal include “boosting investor confidence and mitigating losses due to security breach incidents, helping to ensure that information security programs are actively managed and regularly updated, and reducing the compliance burden for institutions in the event of a data security breach incident.” [11]
In addition to soliciting members’ comments on the proposed amendments to Reg. S-P during the Institute’s March 25th call, we are also interested in obtaining members’ views concerning the costs that are likely to be associated with implementing them.
Tamara K. Salmon
Senior Associate Counsel
[1] See Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Personal Information, SEC Release Nos. 34-57427, IC-28178, and IA-2712 (March 4, 2008) (the “Release”). The Commission’s proposal is patterned after similar provisions adopted by other federal regulators of financial institutions in 2001 to implement the Gramm-Leach-Bliley Act . See Release at n. 23.
[2] See proposed Rule 248.30(a)(2)(iii). Note that, currently, Rule 248.30 only applies to customer records and information – not to consumers’ or employees’ information.
[3] “Service provider” is defined to mean “any person or entity that receives, maintains, processes, or otherwise is permitted access to personal information through its provision of services directly to a broker, dealer, investment company, or investment adviser or transfer agent registered with the Commission.”
[4] “Sensitive personal information” is defined in the rule to mean “personal information, or any combination of personal information, that would allow an unauthorized person to use, log into, or access an individual’s account, or to establish a new account using the individual’s identifying information including the individual’s: social security number; or name, telephone number, street address, e-mail address, or online user name, in combination with the individual’s account number, credit or debit card number, driver’s license number, credit card expiration date or security code, mother’s maiden name, password, personal identification number, biometric record, or other authenticating information.” “Personal information” is defined as “any record containing consumer report information, or nonpublic personal information . . . that is identified with any consumer, or with any employee, investor, or security holder who is a natural person, whether in paper, electronic, or other form, and is handled by or maintained by [the registrant or on its behalf].”
[5] Such notice to individuals may be delayed if an appropriate law enforcement agency determines that notification will interfere with a criminal investigation and requests, in writing, that it be delayed.
[6] “Substantial harm or inconvenience” is defined to mean “personal injury, or more than trivial financial loss, expenditure of effort or loss of time, including theft, fraud, harassment, impersonation, intimidation, damaged reputation, impaired eligibility for credit, or the unauthorized use of information identified with an individual to obtain a financial product or service, or access, log into, effect a transaction in, or otherwise use the individual’s account.” Expressly excluded is any unintentional access to personal information by an unauthorized person that results only in trivial financial loss, expenditure of effort or loss of time (e.g., the registrant deciding to change the individual’s account number or password).
[7] See proposed Rule 248.30(a)(5).
[8] Interestingly, the Release estimates that smaller institutions current spend between $5,000 and $1,000,000 per year to comply with the existing safeguard and disposal rules.
[9] Note, however, that unlike the Interagency Guidelines, which expressly require the institution’s board of directors to approve the institution’s program and oversee its implementation and maintenance, the proposed amendments do not require board approval of an information security program coordinator.
[10] Release at p. 54.
[11] Release at p. 59.
Latest Comment Letters:
TEST - ICI Comment Letter Opposing Sales Tax on Additional Services in Maryland
ICI Comment Letter Opposing Sales Tax on Additional Services in Maryland
ICI Response to the European Commission on the Savings and Investments Union