Data breaches – always critically important to those with responsibility for storing, transporting and protecting electronic information – have become an all-consuming topic of late. Stories about data theft dominate political headlines, boardroom discussions, and family meetings around the dinner table. They, of course, have also been the subject of government investigations and private litigation.

The current environment is not unlike other moments in our recent past that seemed to have captured the attention of Wall Street, K Street and Main Street, including the financial reporting scandals of the early 2000s. There are some important parallels between the concerns raised by those accounting scandals involving companies like Enron and WorldCom, and the concerns raised by data breaches and theft today. With the accounting scandals, the integrity of our financial markets – impacting the institutional and retail investor alike – was at stake. Today, data breaches threaten the integrity of the very lifeblood – electronic information – that makes virtually all of our personal, political and business transactions and interactions possible.

During the financial reporting scandals in the early 2000s, regulators and private litigants looked not only to the entities and their executives committing the fraud, but also to the so-called "watchdogs" – financial statement auditors. As the SEC has remarked regarding financial statement auditors

Auditors serve as critical gatekeepers – experts charged with making sure that the process that companies use to prepare and report financial information are ones that are built on strength and integrity. Investors rely on auditors and need them to do their job and do it very well.1

Statements like these have been echoed and amplified by private litigants for decades, with allegations that the auditor must have known about the fraud, or should have discovered it. It did not matter to the plaintiffs' bar what the fraud was, or whether it touched on a subject within the auditor's purview.

In response, the accounting profession developed a series of standards and requirements that minimized the auditor's exposure in litigation for things not squarely within the area of an auditor's responsibility. Those standards, promulgated by the American Institute of Certified Public Accountants (AICPA), clarify the scope of an auditor's responsibility, define the responsibilities of the audit client, and dictate how the results of the auditor's work should be communicated. They are intended to "reduce[ ] the risk that management may inappropriately rely on the auditor to protect management against certain risks or to perform certain functions that are management's responsibility." AU-C § 210, Terms of Engagement, A22.

To date, there has not been a flood of litigation or government inquiries directed at cybersecurity auditors when data breaches occur. But cybersecurity professionals conducting incident response procedures or security risk assessments would be wise to adopt the maxim, hope for the best, prepare for the worst. To that end, here are three measures developed by accounting firms that can be easily incorporated into a cybersecurity audit engagement letter.

  • Define the scope, objectives, and limitations of the work.

AICPA professional standards require that auditors document the terms of an audit engagement in a written engagement letter to confirm "that a common understanding of the terms of the audit engagement exists" between the auditor and client. AU-C § 210. The written engagement agreement must speak to the scope and objective of the audit engagement, and make clear that, "because of the inherent limitations of an audit ... an unavoidable risk exists that some material misstatements may not be detected, even though the audit is properly planned and performed in accordance with [generally accepted auditing standards]." AU-C § 210.10. The AICPA standards provide a sample engagement letter with language addressing these requirements.

We will conduct our audit in accordance with auditing standards generally accepted in the United States of America (GAAS). Those standards require that we plan and perform the audit to obtain reasonable assurance about whether the financial statements are free from material misstatement ... Because of the inherent limitations of an audit, ... an unavoidable risk that some material misstatements may not be detected exists, even though the audit is properly planned and performed in accordance with GAAS.

Through this language, the auditor identifies (i) which professional standards will govern the work (GAAS), (ii) the objective of the work to be performed (to obtain "reasonable assurance" that the financial statements are free of material misstatement), and (iii) the "unavoidable risk" that even if the audit is correctly planned and performed, a material misstatement may go undetected. The AICPA also requires financial statement auditors to describe in the engagement letter the expected form and content of the report to be issued at the conclusion of the work.

Likewise, cybersecurity auditors should incorporate these features into their engagement agreements. For instance, where a cybersecurity professional is performing a security risk assessment, the engagement agreement should explicitly state which frameworks its process will follow, including those accepted by HIPAA, Office of Civil Rights, Payment Card Industry Security Standards Council, and the Center for Medicare & Medicaid Services. The agreement should also clarify where there are inherent limitations that would prevent any audit or assessment, even those perfectly planned and executed, from catching all security related issues. Finally, cybersecurity auditors should preview the expected content of any report to issue after the work is complete.

  • Define the client's responsibilities.

Financial statement auditors are required by professional standards to have their clients confirm in the engagement letter certain of the client's responsibilities in connection with the audit. AU-C § 210.10. For example, the audit client's management must acknowledge that they are responsible for preparing the financial statements, as well as giving the auditor access to all relevant information and persons within the organization from whom the auditor deems it necessary to obtain evidence. AU-C § 210.06.b.

Cybersecurity auditors should also insist that their engagement agreements detail their client's responsibilities that are important to the audit or assessment. For instance, the client should agree that it has the responsibility to provide all necessary information concerning any security incident which prompted the need for the cybersecurity professional's services. The client should also agree to grant access to all systems within the scope of the audit, as well as to all individuals with sufficient authority to schedule testing and deal with other issues as they arise. A cybersecurity auditor may also want the client to agree to maintain a stable configuration over their network until the audit is complete (or as stable as is reasonably feasible). Finally, the cybersecurity auditor should make clear in the engagement agreement that the client's failure to comply with its obligations may preclude the auditor from completing its work.

  • Precisely communicate the result of the auditor's work.

Even with a perfectly articulated engagement agreement that incorporates the first two elements described above, the work necessary to minimize litigation risk is far from complete. The end product of the auditor's work must also precisely communicate the auditor's conclusions and define, again, the scope of the work supporting the conclusions, and any inherent limitations. It is not enough to rely on the language of an engagement agreement, because a report generated at the conclusion of the work is a separate statement that an unhappy client, or possibly a third party, could claim contains misrepresentations. In that scenario, a cybersecurity auditor will want to point to any limitations and caveats in the final report itself to make clear that the report as a whole is accurate and a fair representation of the work performed and conclusions reached.

For these reasons, AICPA professional standards require financial statement auditors to identify in their audit report which financial statements covering which periods were audited, explain management's responsibilities in preparing the financial statement, and explain the nature of the auditor's work and inherent limitations thereof. In addition, the AICPA maps out precisely the content of an "unmodified" or "clean" audit opinion:

When expressing an unmodified on financial statements, the auditor's opinion should state that the financial statements present fairly, in all material respects, the financial position of the entity as of the balance sheet date and the results of its operations and cash flows for the period then ended[.]

AU-C § 700.35 (emphasis added). This language is key, because it ties directly to the scope of the work that the auditor agrees to perform in the engagement agreement (as required by AU-C § 210, see above). To wit, the auditor agreed to "plan and perform the audit to obtain reasonable assurance about whether the financial statements are free from material misstatement." Thus, the description of work performed, responsibilities, and scope of the opinion described in the engagement agreement mirror those set forth in the final report. Cybersecurity professionals should similarly structure their final reports to avoid any potential confusion between the content and scope of its report and the nature and limitations of the work agreed to by the parties at the outset of the arrangement.

Footnote

1 SEC Chair Mary Jo White, Remarks at the Securities Enforcement Forum, October 9, 2013

To view Foley Hoag's Security, Privacy and The Law Blog please click here

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.