Can a whistleblower disclosure to the SEC about cybersecurity qualify for a SEC whistleblower award?

Yes, a disclosure about cybersecurity that leads to an enforcement action in which the SEC collects one million dollars or more in penalties will qualify for a SEC whistleblower award.

Our experienced cybersecurity whistleblower lawyers have represented Chief Information Security Officers, CIOs, compliance officers, internal and external auditors, and other cybersecurity professionals in cybersecurity whistleblower rewards and protections matters.

To find out more about whistleblower rewards and protections for cybersecurity whistleblowers, call us at 202-262-8959 for a free, confidential consultation.

 

 

The SEC’s recently filed complaint against SolarWinds Corporation and its CIO for fraud and internal control failures relating to allegedly known cybersecurity risks and vulnerabilities describes the types of cybersecurity-related violations that can lead to an SEC enforcement action. According to the complaint, SolarWinds defrauded investors by overstating its cybersecurity practices and understating or failing to disclose known risks.  The SEC’s complaint signifies robust SEC enforcement of cybersecurity-related securities violations, including failure to disclose known material cybersecurity risks and failure to maintain adequate cybersecurity controls.  In a press release announcing the charges, Gurbir S. Grewal, Director of the SEC’s Division of Enforcement, states: “Today’s enforcement action not only charges SolarWinds and Brown for misleading the investing public and failing to protect the company’s ‘crown jewel’ assets, but also underscores our message to issuers: implement strong controls calibrated to your risk environments and level with investors about known concerns.”

In light of the elevated cybersecurity risk environment and the SEC prioritizing enforcement of cybersecurity violations, cybersecurity whistleblowers have a strong incentive to report cybersecurity violations to potentially qualify for an SEC whistleblower award and can play a vital role in protecting against cyber breaches and attacks.

Information security and data privacy whistleblowers are often in a position to identify and remedy vulnerabilities—and therefore prevent breaches—if only decision makers would act on their concerns. In our practice representing cybersecurity whistleblowers, we find that all too often, chief information security officers and other information security professionals encounter indifference or retaliation when they raise concerns about vulnerabilities.  The SEC whistleblower program offers a powerful incentive for cybersecurity whistleblowers to report violations to the SEC and assist the SEC in taking decisive enforcement actions that will encourage registrants to provide accurate disclosures about cybersecurity and maintain appropriate cybersecurity controls.

The complaint alleges what appears to be a blatant failure to remedy significant cybersecurity vulnerabilities and concealment from shareholders of the risks stemming from those vulnerabilities:

The complaint reveals how the SEC applies anti-fraud and internal control rules to cybersecurity violations, including two key issues:

The complaint against SolarWinds alleges violations of the following provisions of federal securities laws:

Cybersecurity Enforcement Action Against Broker-Dealer for Violating Safeguards Rule and Red Flags Rule

And an enforcement action against Voya Financial Advisors Inc. (VFA), a broker-dealer and investment adviser, demonstrates the SEC’s increased commitment to enforcing rules requiring brokers and advisers to safeguard customer information. In particular, VFA is paying $1 million to settle charges that it failed to protect brokerage customer and advisory client information.

VFA’s practice was to give its independent contractor representatives, the majority of its workforce, access to customer information through a proprietary web portal that could be accessed remotely from the contractors’ personal devices. During a six-day period in April of 2016, unknown persons accessed the web portal by impersonating VFA contractors and calling the technical support line to request password resets. The passwords were reset, and the imposters were given temporary passwords over the phone, giving them access to 5,600 VFA customers’ personally identifiable information (PII).

After the breach, VFA failed to address deficiencies in its cybersecurity program, including aspects of the design, implementation, and employee training.  And even after one of the advisers alerted VFA that he had not requested a new password, two more advisers were impersonated.

The Safeguards Rule (Rule 30(a) of Regulation S-P codified at 17 C.F.R. § 248.30(a)) requires broker-dealers and investment advisers to have written policies and procedures that address the protection of customer records and information. The policies “must be reasonably designed to: (1) insure the security and confidentiality of customer records and information; (2) protect against any anticipated threats or hazards to the security or integrity of customer records and information; and (3) protect against unauthorized access to or use of customer records or information that could result in substantial harm or inconvenience to any customer.”

The Identity Theft Red Flags Rule (Rule 201 of Regulation S-ID (17 C.F.R § 248.201)) requires certain financial institutions and creditors registered with the SEC to create and implement a written Identity Theft Prevention program.  “An Identity Theft Prevention Program must include reasonable policies and procedures to: identify relevant red flags for the covered accounts and incorporate them into the Identity Theft Prevention Program; detect the red flags that have been incorporated into the Identity Theft Prevention Program; respond appropriately to any red flags that are detected pursuant to the Identity Theft Prevention Program; and ensure that the Identity Theft Prevention Program is updated periodically to reflect changes in risks to customers from identity theft.”

According to the SEC’s order, VFA violated the Safeguards Rule because its policies and procedures to protect customer information and to prevent and respond to cybersecurity incidents were not reasonably designed to meet these objectives.  And VFA violated the Identity Theft Red Flags Rule because it did not review and update the Identity Theft Prevention Program in response to changes in risks to its customers or provide adequate training to its employees.

SEC Whistleblower Incentives for Cybersecurity Whistleblowers

Zuckerman Law has represented cybersecurity whistleblowers in whistleblower retaliation and whistleblower rewards claims, including in Sarbanes-Oxley whistleblower actions.  We have written extensively about protections for cybersecurity whistleblowers, including the following publications:

The Wall Street Journal quoted Hammer extensively in an article titled Cybersecurity Whistleblowers Are Growing Corporate Challenge.  Corporate Crime Reporter interviewed Mr. Hammer about cybersecurity whistleblowing:  Dallas Hammer on the Rise of Cybersecurity Whistleblowing.  And CSO quoted Mr. Hammer in an article titled Cybersecurity whistleblowers: Get ready for more.

To learn more about the SEC Whistleblower Program, download Zuckerman Law’s eBook: SEC Whistleblower Program: Tips from SEC Whistleblower Attorneys to Maximize an SEC Whistleblower Award.

Cybersecurity Whistleblower Retaliation

Cybersecurity SEC Whistleblower Lawyers

Tips for Cybersecurity SEC Whistleblowers

Cybersecurity SEC Whistleblower Process

Dodd-Frank Whistleblower
Tags: cybersecurity whistleblower bountycybersecurity whistleblower lawyerscybersecurity whistleblower protectionlaws protecting cybersecurity whistleblowingSEC whistleblower bountiesSEC whistleblower protection