SEC Issues Updated Guidance On Cybersecurity Incident Disclosure Under Item 1.05 Of Form 8-K

M
Mintz

Contributor

Mintz is a general practice, full-service Am Law 100 law firm with more than 600 attorneys. We are headquartered in Boston and have additional US offices in Los Angeles, Miami, New York City, San Diego, San Francisco, and Washington, DC, as well as an office in Toronto, Canada.
On June 24, 2024, the SEC issued five new Compliance & Disclosure Interpretations (C&DIs) relating to the materiality assessment and disclosure requirements of material cybersecurity incidents under Item 1.05 of Form 8-K.
United States Technology
To print this article, all you need is to be registered or login on Mondaq.com.

On June 24, 2024, the SEC issued five new Compliance & Disclosure Interpretations (C&DIs) relating to the materiality assessment and disclosure requirements of material cybersecurity incidents under Item 1.05 of Form 8-K.

As discussed in a previous Viewpoints advisory in July 2023, the SEC adopted new rules concerning cybersecurity risk management, strategy, governance, and incident disclosure, including current reporting of certain material cybersecurity incidents under the newly created Item 1.05 of Form 8-K.

These new C&DIs supplement four prior C&DIs published by the SEC in December 2023 and follow statements issued by Erik Gerding, Director of the SEC's Division of Corporation Finance, in May 2024 (See our earlier Viewpoints advisory) and provide interpretative guidance on situations involving ransomware attacks. Under the new C&DIs (which can be read in full here):

  1. A registrant is required to make a materiality determination regarding a ransomware attack resulting in a disruption in operations or the exfiltration of data even if, before determining whether the incident is material, the registrant makes a ransomware payment and the incident ends or data is returned. In assessing the materiality of the incident, the registrant should determine "if there is a substantial likelihood that a reasonable shareholder would consider the incident important in making an investment decision, or if it would have significantly altered the total mix of information made available," notwithstanding the fact that the incident may have ended. Question 104B.05
  2. A registrant needs to disclose a ransomware attack that results in a disruption in operations or the exfiltration of data that the registrant has determined to be material even if the registrant makes a ransomware payment and the incident ends, or data is returned before the Item 1.05 Form 8-K filing deadline. Question 104B.06
  3. A cybersecurity incident involving a ransomware attack for which the registrant makes a ransomware payment that is covered by insurance may still be material. In assessing the materiality of the incident, the registrant "should take into consideration all relevant facts and circumstances, which may involve consideration of both quantitative and qualitative factors," including, for example, "consider[ing] both the immediate fallout and any longer-term effects on its operations, finances, brand perception, customer relationships, and so on, as part of its materiality analysis[,]" which may include an assessment of the subsequent availability of, or increase in cost to the registrant of, insurance policies that cover cybersecurity incidents. Question 104B.07
  4. The size of the ransomware payment with respect to a cybersecurity incident involving a ransomware attack, by itself, is not determinative as to whether the cybersecurity incident is material, but is only one of the facts and circumstances that a registrant should consider in making its materiality determination. Question 104B.08
  5. Disclosure of a series of cybersecurity incidents involving ransomware attacks over time, either by a single threat actor or by multiple threat actors, that the registrant determines are each immaterial individually may be required. In these circumstances, the registrant should consider whether any of those incidents were related and, if so, determine whether those related incidents, collectively, were material. Related incidents could come from the same bad actor or from multiple bad actors exploiting the same vulnerability. Question 104B.09

If you have questions about the new C&DIs or the reporting of any cybersecurity incident, please contact the authors of this Viewpoints advisory or your regular counsel at Mintz.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

See More Popular Content From

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More