Cybersecurity Disclosures – SEC and FBI Guidance

When the SEC issued its new cybersecurity disclosure Final Rule, it created the new Item 1.05 Form 8-K requiring disclosure of material cybersecurity incidents.  You can read more about the Final Rule and the Form 8-K, along with the related implementation timing, in this blog post.

One of the complex issues in the 1.05 Form 8-K is this instruction:

(c) Notwithstanding General Instruction B.1. to Form 8-K, if the United States Attorney General determines that disclosure required by paragraph(a)of this Item1.05 poses a substantial risk to national security or public safety, and notifies the Commission of such determination in writing, the registrant may delay providing the disclosure required by this Item 1.05 for a time period specified by the Attorney General, up to 30 days following the date when the disclosure required by this Item 1.05 was otherwise required to be provided. Disclosure may be delayed for an additional period of up to 30 days if the Attorney General determines that disclosure continues to pose a substantial risk to national security or public safety and notifies the Commission of such determination in writing. In extraordinary circumstances, disclosure may be delayed for a final additional period of up to 60 days if the Attorney General determines that disclosure continues to pose a substantial risk to national security and notifies the Commission of such determination in writing. Beyond the final 60-day delay under this paragraph, if the Attorney General indicates that further delay is necessary, the Commission will consider additional requests for delay and may grant such relief through Commission exemptive order.

The FBI has established a process to request such disclosure delays on this webpage: FBI Guidance to Victims of Cyber Incidents on SEC Reporting Requirements.  Interestingly, the guidance suggests that companies establish a relationship with the cyber squad at their local field office.  It also notes that “delay requests won’t be processed unless they are received by the FBI immediately upon a company’s determination to disclose a cyber incident via 8k.”

On December 14, 2023, CorpFin issued four new Compliance and Disclosure Interpretations in Section 104B (C&DIs) that address questions about the delay process.  The new C&DIs address issues including what a company should do if it contacts the Attorney General, but a determination is not made by the original due date for the Form 8-K.  In this situation, the 8-K must be filed by its original due date.  The C&DIs also clarify that consulting with the Department of Justice about a cyber security incident does not create a presumption that the incident is material.

To provide additional support for companies as they work to provide required cyber security disclosures, on December 14, 2023, CorpFin Director Eric Gerding published this Speech providing an overview of the new rules and specific thoughts about the cybersecurity incident disclosures on Form 8-K and the cybersecurity governance and risk management disclosures required in new Item 1C for Form 10-K.  In his speech Director Gerding states:

“But I want to reassure companies and their representatives that our Division does not seek to make ‘gotcha’ comments or penalize foot faults.  To the extent appropriate, we may issue forward-looking comments to companies or additional CDIs.”

As always, your thoughts and comments are welcome!

Cybersecurity Enforcement and Chief Information Security Officers

SolarWinds Corporation, a provider of IT infrastructure management software products, completed its IPO in the fall of 2018.  In its IPO registration statement and periodic reporting, the company disclosed lengthy cybersecurity risk factors.  For example, in its December 31, 2019 Form 10-K, the company included this risk factor:

If we sustain system failures, cyberattacks against our systems or against our products, or other data security incidents or breaches, we could suffer a loss of revenue and increased costs, exposure to significant liability, reputational harm and other serious negative consequences.

We are heavily dependent on our technology infrastructure to sell our products and operate our business, and our customers rely on our technology to help manage their own IT infrastructure. Our systems and those of our third-party service providers are vulnerable to damage or interruption from natural disasters, fire, power loss, telecommunication failures, traditional computer “hackers,” malicious code (such as viruses and worms), employee or contractor theft or misuse, and denial-of-service attacks, as well as sophisticated nation-state and nation-state-supported actors (including advanced persistent threat intrusions). The risk of a security breach or disruption, particularly through cyberattacks or cyber intrusion, including by computer hacks, foreign governments, and cyber terrorists, has generally increased the number, intensity and sophistication of attempted attacks, and intrusions from around the world have increased. In addition, sophisticated hardware and operating system software and applications that we procure from third parties may contain defects in design or manufacture, including “bugs” and other problems that could unexpectedly interfere with the operation of our systems.

Because the techniques used to obtain unauthorized access or to sabotage systems change frequently and generally are not identified until they are launched against a target, we may be unable to anticipate these techniques or to implement adequate preventative measures. We may also experience security breaches that may remain undetected for an extended period and, therefore, have a greater impact on the products we offer, the proprietary data contained therein, and ultimately on our business.

The foregoing security problems could result in, among other consequences, damage to our own systems or our customers’ IT infrastructure or the loss or theft of our or our customers’ proprietary or other sensitive information.

(Note:  Balance of the risk factor is omitted.)

This risk factor provides a general discussion of cybersecurity risk.  It does not address the nature and extent of actual cybersecurity risks facing the company, any specific steps the company is taking to address cybersecurity risk, or the strengths and weaknesses of the company’s cybersecurity defenses.

After the company experienced a major cybersecurity breach, these issues were at the center of the SEC’s charges against the company and, interestingly, the company’s Chief Information Security Officer (“CISO”).  According to the SEC’s Press Release and the related Complaint, the company was aware that its defenses against cybersecurity attacks were weak and that the company was extremely vulnerable to cyberattack.

The Press Release states:

“SolarWinds’ public statements about its cybersecurity practices and risks were at odds with its internal assessments, including a 2018 presentation prepared by a company engineer and shared internally, including with Brown (The CISO), that SolarWinds’ remote access set-up was ‘not very secure’ and that someone exploiting the vulnerability ‘can basically do whatever without us detecting it until it’s too late,’ which could lead to ‘major reputation and financial loss’ for SolarWinds.”

Similarly, as described in the Press Release and Complaint, in 2018 and 2019 the CISO made presentations that stated the “current state of security leaves us in a very vulnerable state for our critical assets” and that “[a]ccess and privilege to critical systems/data is inappropriate.”

SolarWinds’ public statements about its cybersecurity practices and risks were very different from its internal discussions and documentation.  As companies implement the SEC’s new cybersecurity disclosures, there are clear lessons in this case.

The Press Release and Complaint provide more details and discussion.

As always, your thoughts and comments are welcome!

Channel Stuffing to Manipulate a Non-GAAP Measure?  Enforcement!

When a company presents a non-GAAP measure investors generally should ask, “Is this non-GAAP measure presented to try and make things look better than the story the related GAAP measure tells?”  For example, in this SEC enforcement against ADT, the company presented adjusted EBITDA in the headline of its earnings release, highlighting a 7% increase, but did not mention that the company’s GAAP loss had increased from $(141) to $(157) million until later in the release.  Highlighting a positive change in a non-GAAP measure while the comparable GAAP measure deteriorates raises significant questions.  In addition, ADT did not follow Regulation S-K Item 10(e), which clearly applies to a company’s earnings release, and requires that GAAP measures be presented with equal or greater (OK, really greater) prominence than the comparable non-GAAP measure.

In an interesting twist on this process, as discussed in a recent enforcement release, a company disclosed a non-GAAP measure that was not as positive as the related GAAP measure, but used a classic revenue manipulation strategy to make the non-GAAP measure look more positive.

In the headline for its third-quarter 2016 earnings release, Newell Brands said:

Newell Brands Announces Third Quarter Results

Net Sales Growth of 158.5%; Core Sales Growth of 3.0%

New Strategic Plan Transformation into Action

Raises 2016 Guidance to Top Half of Range

Provides 2017 Initial Outlook

At first glance, all appears reasonable with this headline.  In particular, placing GAAP sales growth before the non-GAAP measure “core sales growth” follows the S-K Item 10(e) requirements discussed above, and avoids the frequent “equal or greater prominence” non-GAAP measure comment.

The large difference between the GAAP and non-GAAP sales growth rates raises a number of questions.  The earnings release notes that the GAAP sales growth is primarily due to the impact of an acquisition.  The question that naturally arises is, “what would have happened to sales without the acquisition?”

Below is the rationale for the company’s presentation of “core sales growth.”  In its non-GAAP measure disclosures Newell Brands says:

“The company’s management believes that core sales provides a more complete understanding of underlying sales trends by providing sales on a consistent basis as it excludes the impacts of acquisitions (other than the Jarden acquisition, which is included in core sales on a pro forma basis starting in the second quarter of 2016), planned or completed divestitures, the deconsolidation of the company’s Venezuelan operations and changes in foreign currency from year-over-year comparisons.”

This presents a reasonable rationale for the presentation of the non-GAAP measure, and, in fact, the non-GAAP measure presents a reasonably positive picture.

This seemed true until September 29, 2023, when the SEC released an Accounting and Auditing Enforcement Release describing how Newell and its former CEO engaged in a classic revenue manipulation scheme – channel stuffing or “pull-forwards” – designed to inflate this non-GAAP measure.  According to the AAER:

“During the last month of each quarter in the Relevant Period, Newell employees determined that its sales were inadequate to achieve management goals, including internal targets, guidance to investors, or analyst estimates. As part of an effort to achieve those goals, Polk (the former CEO) was made aware of and approved plans to pull forward sales scheduled for subsequent quarters. To do so, Newell employees identified orders scheduled for delivery early the following quarter and obtained customer permission to deliver those orders in the current quarter. Newell employees then informed Polk of the volume of orders that had been pulled forward.”

Many companies have used this strategy to try and maintain a sales growth rate.  As we discussed in this post about Under Armour (where you can find links to a number of similar cases), this is not an unusual kind of fraud.  In this case, however, it is interesting that the strategy was used specifically to manipulate the non-GAAP measure for “core sales growth.”

The company and the former CEO both entered into cease and desist orders and paid fines of $12,500,000 and $110,000, respectively.

As always, your thoughts and comments are welcome!

SEC’s Fall Regulatory Agenda

On December 6, 2023, SEC Chair Gary Gensler published a Statement noting that the SEC’s Fall Regulatory Agenda has been published.  His Statement does not mention any specific projects.  As you can read in the Agenda, the Climate Change Disclosure and Special Purpose Acquisition Company projects are both in the final rule stage, with expected final rules by April 2024.  Human Capital Management disclosures are in the proposed rule stage.

As always, your thoughts and comments are welcome!

Chief Accountant Issues Statement Addressing the Statement of Cash Flows

On December 4, 2023, SEC Chief Accountant Dr. Paul Munter issued a Statement titled “The Statement of Cash Flows: Improving the Quality of Cash Flow Information Provided to Investors.”  In his introduction Dr. Munter notes:

“Unfortunately, we have observed that preparers and auditors may not always apply the same rigor and attention to the statement of cash flows as they do to other financial statements, which may impede high quality financial reporting for the benefit of investors.”

He also discusses the importance of cash flow information to investors and that the statement of cash flows has consistently been one of the higher frequency areas of restatements.

The statement addresses several statement of cash flow considerations including:

    • Materiality;
    • The importance of proper classification;
    • How misclassification in the statement of cash flows can be material and lead to “Big R” restatements;
    • Internal control considerations;
    • The potential advantages of using the direct method to present cash from operating activities;
    • The FASB’s project to make targeted improvements to the statement of cash flows; and
    • Focus points for auditors as they examine cash flow information.

Dr. Munter’s conclusion makes the point:

“The statement of cash flows represents a critical piece of a complete picture of an issuer’s financial health and operations. Issuers and auditors have a responsibility, under securities laws and professional standards, to apply the same high level of care and professionalism to the preparation, review, and audit of the statement of cash flows as is required for the other financial statements.”

As always, your thoughts and comments are welcome!

Enforcement Division Announces 2023 Results

On November 14, 2023, the Division of Enforcement announced its 2023 results in this Press Release and  related Addendum.  According to the Press Release, the Division of Enforcement:

    • Brought 784 enforcement actions, an increase of 3%;
    • Levied financial remedies totaling $4.949 billion, down from $6.439 billion the year before;
    • Obtained officer and director bars against 133 individuals, the highest number in more than a decade; and
    • Continued to focus on gatekeepers.

The Press Release highlights that 2023 was a record year for the Whistleblower Program with awards of almost $600 million, a record annual total.  Even more dramatically, the number of whistleblower tips increased from 12,300 in 2022 to 16,000 in 2023.  You can read more about the Whistleblower Program 2023 results in its separate annual report.

As always, your thoughts and comments are welcome.

Reporting Implications of the Share Repurchase Rule Postponement

As we discussed in this post, on November 22, 2023, the SEC postponed the effective date of its Share Repurchase Disclosure Modernization rule.  The postponement was in the wake of an opinion by the U.S. Court of Appeals for the Fifth District in Chamber of Com. of the USA v SEC.  Gary Brown of Nelson Mullins has written this Securities Alert exploring how companies should deal with the postponement, including the implications for issuer 10b5-1 plans.

As always, your thoughts and comments are welcome.

Share Repurchase Rule Effective Date Deferred

On November 22, 2023, the SEC postponed the effective date of its Share Repurchase Disclosure Modernization rule.  The postponement was in the wake of an opinion by the U.S. Court of Appeals for the Fifth District in Chamber of Com. of the USA v SEC.  You can read more in the SEC’s Announcement.  The rule has been stayed pending further Commission action.  Companies do not need to comply with the new rule at this time.  It would have required daily share repurchase disclosures for the first full fiscal quarter that began on or after October 1, 2023.

As always, your thoughts and comments are welcome.

CorpFin Announces Mandatory Online Process for Requesting Views on Excluding Shareholder Proposals

On November 7, 2023, the Division of Corporation Finance announced a new online system for submitting shareholder proposals under the Division’s process to provide informal, non-binding staff views regarding companies’ intentions to exclude proposals from proxy statements.  Companies must use this new online form.  Emailed submissions will not be accepted.  You can read more and find a link to the online form here

This announcement does not change the Division’s process for providing informal, non-binding views, which is described on this webpage.

As always, your thoughts and comments are welcome!

Self-Reporting to and Cooperation with Enforcement Do Make a Difference

On September 25, 2023, the SEC announced a settled enforcement action against GTT Communications, Inc.  GTT grew rapidly, primarily through acquisitions.  This growth created challenges and disruption that eventually resulted in material problems in two of GTT’s key operational and reporting systems.  The two systems were used to track elements of expenses, and over time they began reporting diverging amounts. Though the company tried, the systems could not be reconciled.  As a result, the company could not reasonably determine amounts to record for certain expenses, including its cost of revenue (COR).  Without solving this identified problem, company personnel made large, unsupported adjustments to its accounting records.  When this situation came to light, the company commenced an internal investigation and ultimately filed this Item 4.02 Form 8-K to inform investors that its previously issued financial statements should not be relied upon.

It is difficult to appreciate the magnitude of GTT’s reporting problems.  The company spent more than a year and tens of millions of dollars trying to build the information required to restate its financial statements. Ultimately, the company abandoned these efforts.  It eventually filed for bankruptcy, emerging as a privately-owned company.  Because the company’s historical records could not be reconstructed, upon emerging from bankruptcy, the company used fresh-start accounting.

Early in its process the company self-reported its problems to the SEC.  It also “cooperated extensively with the SEC staff during its investigation.”  The company’s remedial measures included “attempting to rebuild its COR accounts, replacing certain members of management, its board of directors, and its auditor, and overhauling its accounting function, including its policies and procedures relating to COR.”

The company entered into a cease-and-desist order, but as a result of self-reporting, cooperating and taking strong remedial steps, there was no monetary penalty against the company.  You can read more in this Press Release and the related SEC Order.

This case presents a favorable outcome, but self-reporting and cooperation present several complex questions.  When companies find a problem, they must consider whether to self-report, when to self-report, how to approach the staff, and what information to share.  For an in-depth discussion of these and a number of related issues, you can listen to this episode of PLI’s inSecurities podcast.  Host Kurt Wolf and Miller & Chevalier Partner Sandra Hanna discuss a variety of issues including considerations for self-reporting.

As always, your thoughts and comments are welcome.