United States: Cyber$ecurity: Recent Developments In The Protection Of Financial Data

Last Updated: February 7 2017
Article by Richard C. Hsu, Jeewon Kim Serrato and Marc Elzweig

As cybersecurity remains in the headlines moving into 2017, we consider recent developments in public policy concerning cybersecurity in the financial services industry.

Given the importance of financial sector infrastructure, sensitivity of financial information and the increasing use of technology in financial services, it is vital for the financial services industry to prioritize cybersecurity and privacy. (And the use of technology in financial services should not be thought of as only online banking and back-end computer systems, but also as innovations in financial services such as mobile payment applications, robo-advisers, peer-to-peer lending, distributed ledger technology, etc., collectively referred to as "fintech.")

Recent actions by regulatory authorities reflect the current focus on improving financial services cybersecurity and illustrate different forms such actions may take: new or revised regulations (by the New York DFS; FRB, OCC and FDIC; and CFTC), raising awareness (as in the FinCEN advisory) and enforcement (most recently by FINRA).

New York DFS Revises Proposed Cybersecurity Requirements on Financial Services Companies

The New York State Department of Financial Services (DFS) initially published its proposed cybersecurity regulations on September 28, 2016.1 The regulations were introduced as "first-in-the-nation" rules that would require banks, insurers and other financial services institutions to establish and maintain cybersecurity programs to protect consumers—and the financial system itself—from cyber attacks "to the fullest extent possible." The proposed regulations were subject to a 45-day notice and comment period.

The proposed regulations were criticized by financial industry groups. In a November 14, 2016 letter to DFS,2 a collection of such groups raised several issues, including: both duplication of and inconsistencies with existing laws and frameworks; lack of flexibility; and overbroad definitions of material terms. In the same letter, the financial industry groups suggested numerous changes to the proposed regulations.

On December 28, 2016, DFS published updated proposed regulations, in response to some of the comments it received.3 In the updated regulations, DFS would permit cybersecurity measures to be implemented based on risk assessments, and it substantially revised the sections on exemptions (entities with fewer than ten employees are now exempted), chief information security officers, third party service providers, encryption, cybersecurity event notifications and penetration testing. DFS also delayed the effective date of the proposed regulations, from January 1, 2017 to March 1, 2017, and provided additional time for covered entities to comply with specified provisions.

The updated proposed regulations are subject to an additional 30-day comment period, ending on January 27, 2017. Following the changes, the updated proposed regulations have received criticism as being too weak.4

Federal Financial Regulatory Agencies Propose Enhanced Cyber Risk Management Standards

On October 26, 2016, the Board of Governors of the Federal Reserve System (FRB), the Office of the Comptroller of the Currency (OCC) and the Federal Deposit Insurance Corporation (FDIC) (together, the Agencies) jointly published an advance notice of proposed rulemaking (ANPR) of Enhanced Cyber Risk Management Standards5. The Agencies' stated goal in considering these enhanced standards is to strengthen the operational resilience of large and interconnected financial entities and by doing so reduce the likely impact of a cyber event on the financial system as a whole.

In the ANPR, the Agencies take a standards-based, compartmentalized approach to establishing a cybersecurity framework, with five categories of standards, namely: (i) cyber risk governance, developing, maintaining and implementing a formal cyber risk management strategy, integrated into the overall strategic and governance structures of a covered entity; (ii) cyber risk management, integrating cyber risk management into the responsibilities of at least three independent functions within a covered entity;  (iii) internal dependency management, identifying and managing cyber risks associated with a covered entity's business assets; (iv) external dependency management, managing cyber risks associated with a covered entity's interconnections to external parties; and (v) incident response, cyber resilience and situational awareness, planning to respond to, contain and recover from cyber incidents.

Further compartmentalizing the approach, the Agencies are considering a tiered implementation, where the additional, higher standards referred to as "sector-critical standards" would apply to systems that are critical to proper functioning of the financial sector. Such "sector-critical systems" would be determined based on their interconnectedness and the importance of their role in the financial sector as a whole.

The Agencies also proposed a limited application of the enhanced standards, where each Agency would apply the standards to entities within its jurisdiction with total consolidated assets of $50 billion or more, due to the potential systemic effects of a cyber attack on such an entity. The consolidated assets are determined on an enterprise-wide basis, and the enhanced standards would also apply on an enterprise-wide basis, to all subsidiaries of a covered entity, on the understanding that each subsidiary is a point of risk to the entity as a whole. The ANPR also includes provisions to apply the enhanced standards to third-party service providers.

The comment period for the ANPR has been extended to February 17, 2017.6

FinCEN Issues Advisory on Cyber Crime and Bank Secrecy Act Obligations, Seeking Technical Details in Reports of Suspicious Activity

On October 25, 2016, the Department of the Treasury's Financial Crimes Enforcement Network (FinCEN) issued an Advisory to Financial Institutions on Cyber Events and Cyber-Enabled Crime (the Advisory), to advise financial institutions on how their obligations under the Bank Secrecy Act (BSA) relate to cyber events and cyber-enabled crime.[7] Under the BSA,8 financial institutions are obligated to assist the US government in the detection and prevention of money laundering, including by submitting Suspicious Activity Reports (SARs) to report suspicious transactions or series of transactions conducted or attempted that involve $5,000 or more in funds or other assets. FinCEN makes clear that the Advisory does not change current BSA requirements, SAR requirements or reporting obligations to other regulators. Rather, the Advisory discusses proper reporting of cyber events and other means of aggregating information about cyber events. (For these purposes, "cyber event" is defined as an attempt to compromise or gain unauthorized access to electronic systems, services or information.)

As the Advisory makes clear, if a financial institution knows or suspects, or has reason to suspect, that a cyber event was intended to conduct, facilitate or affect a transaction or series of transactions, it should be considered an attempt to conduct a suspicious transaction or series of transactions. Such cyber events are reportable as suspicious activity, but to determine whether it is obligated to report a cyber event, a financial institution should consider all available information, including the nature of the cyber event and its targets, as well as the value of funds or assets involved. As examples of cyber events that trigger mandatory SAR reporting, the Advisory describes a malware intrusion that is suspected to involve at least $5,000 in assets, a hack that exposes sensitive customer information, and a DDoS attack that is used to prevent the detection of an unauthorized wire transfer. In each case, financial institutions should file a SAR detailing the cyber event, even if no actual transactions may have occurred.

In addition, when filing a SAR, financial institutions should include all cyber-related information. Most financial transactions occur over electronic systems, and details such as IP address and timestamps, device identifiers, virtual wallet information, methods or other technical characteristics can be useful in investigations and in connecting related events.

As the Advisory makes clear, there is a great deal of value in sharing cyber-related information, which can be used to track criminals, identify victims and trace funds. Cyber-related information can also be used in aggregate form, as when FinCEN used BSA reporting from more than twenty financial institutions to investigate an internet company facilitating numerous types of crime with digital currency services.

FinCEN encourages information sharing within financial institutions, by collaboration between BSA/anti-money laundering units, cybersecurity units, fraud prevention teams and other units affected by cyber events. Such collaborations can reveal new patterns of suspicious behaviors, identify otherwise unknown bad actors and generally provide a clearer picture of risks and exposure to the financial institution.

FinCEN also encourages information sharing between financial institutions, under the safe harbor provided by Section 314(b) of the USA PATRIOT Act.9 After notifying FinCEN and satisfying certain requirements, financial institutions may, under a safe harbor from liability, share information with each other, including cyber-related information, for the purposes of identifying and reporting money-laundering and terrorist activities. According to FinCEN, sharing information about cyber events across institutions may reveal suspicious or illegal activities that would not be detected by any single financial institution.

CFTC Issues Final Rules on System Safeguards

Citing the "well-documented increase" and expansion of cyber threats and the resulting need to enhance cybersecurity testing, the Commodity Futures Trading Commission (CFTC) adopted amendments to its system safeguard rules, in order to enhance and clarify cybersecurity requirements (the Final Rules), effective September 19, 2016.10 Rather than requiring security measures to protect financial data, these Final Rules require certain cybersecurity testing to be performed at all derivatives clearing organizations, designated contract markets, swap execution facilities and swap data repositories.

The Final Rules set forth several required types of testing, namely: (i) vulnerability testing, to identify discoverable information and other vulnerabilities in systems; (ii) penetration testing, attempts to penetrate automated systems to identify and exploit vulnerabilities, may be launched internally or externally; (iii) controls testing, to determine whether controls are correctly implemented and operational (where "controls" refers to safeguards and security measures to protect automated systems); (iv) security incident response plan testing, to determine the effectiveness of the security incident response plan and identify deficiencies and improvements; and (v) enterprise technology risk assessments, to conduct a written assessment of threats and vulnerabilities and to prioritize risks.

Under the Final Rules, these tests must be performed periodically, subject to minimum testing frequencies for specified types of cybersecurity testing. In addition, reports on testing protocols and results must be communicated to covered entities' senior management and board of directors. Any vulnerabilities or deficiencies discovered through the required testing must be documented, along with analyses of risks posed by such vulnerabilities or deficiencies and the determination of whether to address or accept those risks.

Compliance dates for the Final Rules range from March 18, 2017 to September 19, 2017 (180 days to 1 year from the effective date), varying according to the type of entity.

FINRA Enforcement Action: 12 Firms Fined $14.4 Million for Cybersecurity Deficiencies

As proposed rules and regulations continue to be considered, we can expect agencies' focus on cybersecurity to also result in enforcement actions. One recent enforcement action in the financial industry may be notable for its scope and for the specificity of the rule enforced.

On December 21, 2016, the Financial Industry Regulatory Authority (FINRA) announced that it had fined 12 firms a total of $14.4 million for alleged violations of federal securities laws and rules.11 According to FINRA's findings, each of the firms allegedly failed to store electronic brokerage records or electronic communications in the "write once, read many" (WORM) format as required under the Exchange Act and related federal rules. The WORM format prevents alteration or destruction of electronic records, and as such it ensures that electronic financial records remain accurate and durable over time. Keeping records in the WORM format also better protects those records against hacking efforts. FINRA asserted that, by failing to use the WORM format, these firms left millions or in some cases hundreds of millions of financial records vulnerable to attack or other misconduct.

Echoing the present emphasis on cybersecurity, FINRA Executive Vice President and Chief of Enforcement noted that the agency's actions stem from its "focus on ensuring that firms maintain accurate, complete and adequately protected electronic records," and that "the integrity of these records is critical to the investor protection function."


1 See DFS Press Release, Governor Cuomo Announces Proposal of First-in-the-Nation Cybersecurity Regulation to Protect Consumers and Financial Institutions (Sep. 13, 2016), available at http://www.dfs.ny.gov/about/press/pr1609131.htm.

2 Available at http://www.aba.com/Advocacy/commentletters/Documents/SIFMA-NY-DFS-Proposed-Cyber-Requirements.pdf.

3 See DFS Press Release, DFS Issues Updated Proposed Cybersecurity Regulation Protecting Consumers and Financial Institutions (Dec. 28, 2016), available at http://www.dfs.ny.gov/about/press/pr1612281.htm See also Proposed 23 NYCRR 500, Cybersecurity Requirements for Financial Services Companies, available at http://www.dfs.ny.gov/legal/regulations/proposed/rp500t.pdf.

4 See, e.g., Kevin Dugan, New York lightens cybersecurity steps for banks despite surge in hacking (New York Post, Dec. 28, 2016), available at http://nypost.com/2016/12/28/new-york-lightens-cybersecurity-steps-for-banks-despite-surge-in-hackings/.

5 Available at https://www.federalreserve.gov/newsevents/press/bcreg/bcreg20161019a1.pdf

6 Comments on the ANPR may be viewed at https://www.federalreserve.gov/apps/foia/ViewComments.aspx?doc_id=R-1550&doc_ver=1,

https://www.regulations.gov/docket?D=OCC-2016-0016 and


7 Available at https://www.fincen.gov/sites/default/files/advisory/2016-10-25/Cyber%20Threats%20Advisory%20-%20FINAL%20508_2.pdf. See also FinCEN, Frequently Asked Questions (FAQs) regarding the Reporting of Cyber Events, Cyber-Enabled Crime, and Cyber-Related Information through Suspicious Activity Reports (SARs) (Oct. 25, 2016), available at https://www.fincen.gov/sites/default/files/shared/FAQ_Cyber_Threats_508_FINAL.PDF

8 31 USC § 5311 et seq.

9 See also 31 CFR § 1010.540.

10 See CFTC, Fact Sheet – Final Rules on Systems Safeguards Testing Requirements (Sep. 8, 2016), available at http://www.cftc.gov/idc/groups/public/@newsroom/documents/file/syssafeguard_factsheet090816.pdf The Final Rules may be found at 17 CFR Parts 37, 38, 39 & 49.

11 See FINRA News Release,  FINRA Fines 12 Firms a Total of $14.4 Million for Failing to Protect Records from Alteration (Dec. 21, 2016), available at https://www.finra.org/newsroom/2016/finra-fines-12-firms-total-144-million-failing-protect-records-alteration.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

To print this article, all you need is to be registered on Mondaq.com.

Click to Login as an existing user or Register so you can print this article.

Similar Articles
Relevancy Powered by MondaqAI
In association with
Related Topics
Similar Articles
Relevancy Powered by MondaqAI
Related Articles
Related Video
Up-coming Events Search
Font Size:
Mondaq on Twitter
Mondaq Free Registration
Gain access to Mondaq global archive of over 375,000 articles covering 200 countries with a personalised News Alert and automatic login on this device.
Mondaq News Alert (some suggested topics and region)
Select Topics
Registration (please scroll down to set your data preferences)

Mondaq Ltd requires you to register and provide information that personally identifies you, including your content preferences, for three primary purposes (full details of Mondaq’s use of your personal data can be found in our Privacy and Cookies Notice):

  • To allow you to personalize the Mondaq websites you are visiting to show content ("Content") relevant to your interests.
  • To enable features such as password reminder, news alerts, email a colleague, and linking from Mondaq (and its affiliate sites) to your website.
  • To produce demographic feedback for our content providers ("Contributors") who contribute Content for free for your use.

Mondaq hopes that our registered users will support us in maintaining our free to view business model by consenting to our use of your personal data as described below.

Mondaq has a "free to view" business model. Our services are paid for by Contributors in exchange for Mondaq providing them with access to information about who accesses their content. Once personal data is transferred to our Contributors they become a data controller of this personal data. They use it to measure the response that their articles are receiving, as a form of market research. They may also use it to provide Mondaq users with information about their products and services.

Details of each Contributor to which your personal data will be transferred is clearly stated within the Content that you access. For full details of how this Contributor will use your personal data, you should review the Contributor’s own Privacy Notice.

Please indicate your preference below:

Yes, I am happy to support Mondaq in maintaining its free to view business model by agreeing to allow Mondaq to share my personal data with Contributors whose Content I access
No, I do not want Mondaq to share my personal data with Contributors

Also please let us know whether you are happy to receive communications promoting products and services offered by Mondaq:

Yes, I am happy to received promotional communications from Mondaq
No, please do not send me promotional communications from Mondaq
Terms & Conditions

Mondaq.com (the Website) is owned and managed by Mondaq Ltd (Mondaq). Mondaq grants you a non-exclusive, revocable licence to access the Website and associated services, such as the Mondaq News Alerts (Services), subject to and in consideration of your compliance with the following terms and conditions of use (Terms). Your use of the Website and/or Services constitutes your agreement to the Terms. Mondaq may terminate your use of the Website and Services if you are in breach of these Terms or if Mondaq decides to terminate the licence granted hereunder for any reason whatsoever.

Use of www.mondaq.com

To Use Mondaq.com you must be: eighteen (18) years old or over; legally capable of entering into binding contracts; and not in any way prohibited by the applicable law to enter into these Terms in the jurisdiction which you are currently located.

You may use the Website as an unregistered user, however, you are required to register as a user if you wish to read the full text of the Content or to receive the Services.

You may not modify, publish, transmit, transfer or sell, reproduce, create derivative works from, distribute, perform, link, display, or in any way exploit any of the Content, in whole or in part, except as expressly permitted in these Terms or with the prior written consent of Mondaq. You may not use electronic or other means to extract details or information from the Content. Nor shall you extract information about users or Contributors in order to offer them any services or products.

In your use of the Website and/or Services you shall: comply with all applicable laws, regulations, directives and legislations which apply to your Use of the Website and/or Services in whatever country you are physically located including without limitation any and all consumer law, export control laws and regulations; provide to us true, correct and accurate information and promptly inform us in the event that any information that you have provided to us changes or becomes inaccurate; notify Mondaq immediately of any circumstances where you have reason to believe that any Intellectual Property Rights or any other rights of any third party may have been infringed; co-operate with reasonable security or other checks or requests for information made by Mondaq from time to time; and at all times be fully liable for the breach of any of these Terms by a third party using your login details to access the Website and/or Services

however, you shall not: do anything likely to impair, interfere with or damage or cause harm or distress to any persons, or the network; do anything that will infringe any Intellectual Property Rights or other rights of Mondaq or any third party; or use the Website, Services and/or Content otherwise than in accordance with these Terms; use any trade marks or service marks of Mondaq or the Contributors, or do anything which may be seen to take unfair advantage of the reputation and goodwill of Mondaq or the Contributors, or the Website, Services and/or Content.

Mondaq reserves the right, in its sole discretion, to take any action that it deems necessary and appropriate in the event it considers that there is a breach or threatened breach of the Terms.

Mondaq’s Rights and Obligations

Unless otherwise expressly set out to the contrary, nothing in these Terms shall serve to transfer from Mondaq to you, any Intellectual Property Rights owned by and/or licensed to Mondaq and all rights, title and interest in and to such Intellectual Property Rights will remain exclusively with Mondaq and/or its licensors.

Mondaq shall use its reasonable endeavours to make the Website and Services available to you at all times, but we cannot guarantee an uninterrupted and fault free service.

Mondaq reserves the right to make changes to the services and/or the Website or part thereof, from time to time, and we may add, remove, modify and/or vary any elements of features and functionalities of the Website or the services.

Mondaq also reserves the right from time to time to monitor your Use of the Website and/or services.


The Content is general information only. It is not intended to constitute legal advice or seek to be the complete and comprehensive statement of the law, nor is it intended to address your specific requirements or provide advice on which reliance should be placed. Mondaq and/or its Contributors and other suppliers make no representations about the suitability of the information contained in the Content for any purpose. All Content provided "as is" without warranty of any kind. Mondaq and/or its Contributors and other suppliers hereby exclude and disclaim all representations, warranties or guarantees with regard to the Content, including all implied warranties and conditions of merchantability, fitness for a particular purpose, title and non-infringement. To the maximum extent permitted by law, Mondaq expressly excludes all representations, warranties, obligations, and liabilities arising out of or in connection with all Content. In no event shall Mondaq and/or its respective suppliers be liable for any special, indirect or consequential damages or any damages whatsoever resulting from loss of use, data or profits, whether in an action of contract, negligence or other tortious action, arising out of or in connection with the use of the Content or performance of Mondaq’s Services.


Mondaq may alter or amend these Terms by amending them on the Website. By continuing to Use the Services and/or the Website after such amendment, you will be deemed to have accepted any amendment to these Terms.

These Terms shall be governed by and construed in accordance with the laws of England and Wales and you irrevocably submit to the exclusive jurisdiction of the courts of England and Wales to settle any dispute which may arise out of or in connection with these Terms. If you live outside the United Kingdom, English law shall apply only to the extent that English law shall not deprive you of any legal protection accorded in accordance with the law of the place where you are habitually resident ("Local Law"). In the event English law deprives you of any legal protection which is accorded to you under Local Law, then these terms shall be governed by Local Law and any dispute or claim arising out of or in connection with these Terms shall be subject to the non-exclusive jurisdiction of the courts where you are habitually resident.

You may print and keep a copy of these Terms, which form the entire agreement between you and Mondaq and supersede any other communications or advertising in respect of the Service and/or the Website.

No delay in exercising or non-exercise by you and/or Mondaq of any of its rights under or in connection with these Terms shall operate as a waiver or release of each of your or Mondaq’s right. Rather, any such waiver or release must be specifically granted in writing signed by the party granting it.

If any part of these Terms is held unenforceable, that part shall be enforced to the maximum extent permissible so as to give effect to the intent of the parties, and the Terms shall continue in full force and effect.

Mondaq shall not incur any liability to you on account of any loss or damage resulting from any delay or failure to perform all or any part of these Terms if such delay or failure is caused, in whole or in part, by events, occurrences, or causes beyond the control of Mondaq. Such events, occurrences or causes will include, without limitation, acts of God, strikes, lockouts, server and network failure, riots, acts of war, earthquakes, fire and explosions.

By clicking Register you state you have read and agree to our Terms and Conditions