{"id":2678,"date":"2023-07-27T11:58:35","date_gmt":"2023-07-27T15:58:35","guid":{"rendered":"https:\/\/seci.wpenginepowered.com\/?p=2678"},"modified":"2023-07-27T11:58:40","modified_gmt":"2023-07-27T15:58:40","slug":"sec-adopts-new-cybersecurity-rules","status":"publish","type":"post","link":"https:\/\/seciblog.pli.edu\/index.php\/sec-adopts-new-cybersecurity-rules\/","title":{"rendered":"SEC Adopts New Cybersecurity Rules"},"content":{"rendered":"<p style=\"font-weight: 400;\">On July 26, 2023, the SEC adopted a <a href=\"https:\/\/www.sec.gov\/rules\/final\/2023\/33-11216.pdf\">Final Rule<\/a> significantly expanding cybersecurity disclosure requirements.\u00a0 The rule adds Item 1.05 to Form 8-K to disclose material cybersecurity incidents and new Item 106 to Regulation S-K to require annual disclosures about cybersecurity governance, risk management and strategy in Form 10-K.\u00a0 Similar changes have been made to Forms 20-F and 6-K for Foreign Private Issuers.<\/p>\n<p style=\"font-weight: 400;\">The transition for the new Item 1.05 Form 8-K and related Form 6-K disclosures is the later of 90 days after the date of publication of the Final Rule in the Federal Register or December 18, 2023.\u00a0 Smaller reporting companies have an additional 180 days for the Form 8-K changes.<\/p>\n<p style=\"font-weight: 400;\">The transition for the new annual report disclosures on Form 10-K and Form 20-F is for fiscal years ending on or after December 15, 2023.<\/p>\n<p style=\"font-weight: 400;\">The new disclosures must be tagged with iXBRL beginning one year after the initial disclosure requirements.<\/p>\n<p style=\"font-weight: 400;\"><strong><u>New Form 8-K Item 1.05 <\/u><\/strong><\/p>\n<p style=\"font-weight: 400;\">Item 1.05 requires disclosure of a cybersecurity incident within four days of a company determining that a cybersecurity incident has occurred and is material.\u00a0 General Instruction B.1. to Form 8-K now states:<\/p>\n<p style=\"font-weight: 400; padding-left: 40px;\">A report pursuant to Item 1.05 is to be filed within four business days after the registrant determines that it has experienced a material cybersecurity incident.<\/p>\n<p style=\"font-weight: 400;\">Disclosure on Form 8-K may be delayed if the \u201cUnited States Attorney General determines that immediate disclosure would pose a substantial risk to national security or public safety.\u201d\u00a0 In this case the U.S. Attorney general must notify the SEC in writing.<\/p>\n<p style=\"font-weight: 400;\">The instructions to Form S-3 have been amended to add the Item 1.05 Form 8-K to the list of 8-Ks where late filing does not affect Form S-3 eligibility.<\/p>\n<p style=\"font-weight: 400;\">The Instructions for the new Item are:<\/p>\n<p style=\"font-weight: 400; padding-left: 40px;\"><strong>Item 1.05 Material Cybersecurity Incidents. <\/strong><\/p>\n<p style=\"font-weight: 400; padding-left: 80px;\">(a) If the registrant experiences a cybersecurity incident that is determined by the registrant to be material, describe the material aspects of the nature, scope, and timing of the incident, and the material impact or reasonably likely material impact on the registrant, including its financial condition and results of operations.<\/p>\n<p style=\"font-weight: 400;\">The instructions also state:<\/p>\n<p style=\"font-weight: 400; padding-left: 80px;\">A registrant need not disclose specific or technical information about its planned response to the incident or its cybersecurity systems, related networks and devices, or potential system vulnerabilities in such detail as would impede the registrant\u2019s response or remediation of the incident.<\/p>\n<p style=\"font-weight: 400;\">Similar changes are made to Form 6-K.<\/p>\n<p style=\"font-weight: 400;\"><strong><u>New Form 10-K Disclosures<\/u><\/strong><\/p>\n<p style=\"font-weight: 400;\">Cybersecurity disclosures will be presented in new Item 1.C. in Part I of Form 10-K.\u00a0 The following has been added to the instructions to the Form:<\/p>\n<p style=\"font-weight: 400; padding-left: 40px;\"><strong>Part I<br \/>\n<\/strong>**** *<br \/>\n<strong>Item 1C. Cybersecurity.<br \/>\n<\/strong>(a) Furnish the information required by Item 106 of Regulation S-K (\u00a7 229.106 of this chapter).<\/p>\n<p style=\"font-weight: 400;\">New S-K Item 106 defines various terms and requires disclosures in two main areas:<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Risk management and strategy; and<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Governance<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\"><strong>Risk management and strategy<\/strong> disclosures include<em> \u201c<\/em>processes, if any, for assessing, identifying, and managing material risks from cybersecurity threats.\u201d\u00a0 These disclosures should address whether cybersecurity risk management is integrated into the company\u2019s overall risk management processes, information about the use of outside resources and how the company addresses cybersecurity risk in the use of third party service providers.<\/p>\n<p style=\"font-weight: 400;\">In an MD&amp;A like requirement, risk management and strategy disclosures should also address whether cybersecurity risks \u201chave materially affected or are reasonably likely to materially affect the registrant, including its business strategy, results of operations, or financial condition and if so, how.\u201d<\/p>\n<p style=\"font-weight: 400;\"><strong>Governance<\/strong> disclosures should describe the board of directors\u2019 oversight of cybersecurity risks The Final rule also states, \u201cIf applicable, identify any board committee or subcommittee responsible for the oversight of risks from cybersecurity threats and describe the processes by which the board or such committee is informed about such risks.\u201d\u00a0 Companies must also include details about management\u2019s role in assessing and managing material cybersecurity risk. \u00a0Not included in the Final Rule was a provision in the proposed rule to address board expertise in the cybersecurity area.<\/p>\n<p style=\"font-weight: 400;\">You can read the entire text of new Item 106 and the related definitions on page 169 of the <a href=\"https:\/\/www.sec.gov\/rules\/final\/2023\/33-11216.pdf\">Final Rule<\/a>.<\/p>\n<p style=\"font-weight: 400;\">Similar changes are made to Form 20-F in a new Item 16K.<\/p>\n<p style=\"font-weight: 400;\">As always, your thoughts and comments are welcome.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On July 26, 2023, the SEC adopted a Final Rule significantly expanding cybersecurity disclosure requirements.\u00a0 The rule adds Item 1.05 to Form 8-K to disclose material cybersecurity incidents and new Item 106 to Regulation S-K to require annual disclosures about cybersecurity governance, risk management and strategy in Form 10-K.\u00a0 Similar changes have been made to &hellip; <a href=\"https:\/\/seciblog.pli.edu\/index.php\/sec-adopts-new-cybersecurity-rules\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">SEC Adopts New Cybersecurity Rules<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"_wpas_customize_per_network":false},"categories":[143,242],"tags":[],"coauthors":[154],"class_list":["post-2678","post","type-post","status-publish","format-standard","hentry","category-hot-topic","category-reporting"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/seciblog.pli.edu\/index.php\/wp-json\/wp\/v2\/posts\/2678","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/seciblog.pli.edu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/seciblog.pli.edu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/seciblog.pli.edu\/index.php\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/seciblog.pli.edu\/index.php\/wp-json\/wp\/v2\/comments?post=2678"}],"version-history":[{"count":0,"href":"https:\/\/seciblog.pli.edu\/index.php\/wp-json\/wp\/v2\/posts\/2678\/revisions"}],"wp:attachment":[{"href":"https:\/\/seciblog.pli.edu\/index.php\/wp-json\/wp\/v2\/media?parent=2678"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/seciblog.pli.edu\/index.php\/wp-json\/wp\/v2\/categories?post=2678"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/seciblog.pli.edu\/index.php\/wp-json\/wp\/v2\/tags?post=2678"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/seciblog.pli.edu\/index.php\/wp-json\/wp\/v2\/coauthors?post=2678"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}