July 18, 2025
By Electronic Submission
The Hon. Paul Atkins
Chairman
Securities and Exchange Commission
100 F Street, NE
Washington, DC 20549-1090
Re: File No. S7-05-23
Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Customer Information
Dear Chairman Atkins,
The Securities Industry and Financial Markets Association (“SIFMA”), SIFMA Asset Management Group (“SIFMA AMG”), American Bankers Association (“ABA”), Bank Policy Institute (“BPI”), Financial Services Institute (“FSI”), Institute of International Bankers (“IIB”), Investment Company Institute (“ICI”), Insured Retirement Institute (“IRI”), and the Committee of
Annuity Insurers (“CAI”) (collectively, the “associations”) appreciate the opportunity to provide suggested changes to the recent amendments to Regulation S-P issued by the Securities and Exchange Commission (the “Commission” or “SEC”) on May 16, 2024 (the “Regulation S-P Amendments”).
Regulation S-P should be further amended to provide further clarity and guidance to its existing rules. Our members appreciate the importance of strong cybersecurity practices for companies and our country, including appropriate notification of cybersecurity incidents to individuals. The joint trades comment letter on the Regulation S-P Amendments (“Joint Trades Letter”) as originally proposed urged the Commission to reconsider certain aspects of its Regulation S-P Proposal, which at times is too prescriptive and does not provide enough flexibility to covered institutions in responding to the unique circumstances that can arise during an incident. Such prescriptive requirements may subject covered institutions to unnecessary and adverse enforcement actions if such requirements are not followed to the letter which may happen due to any number of circumstances surrounding a cyber event. As such, Appendix B includes detailed proposed revisions to improve the Regulation S-P Amendments, which takes into account a covered institution’s need to comply with existing data breach notification laws and the benefit of coordinating with a range of law enforcement, cybersecurity, intelligence, and national security agencies during a security incident.
Further, the associations continue to urge the Commission to extend the compliance date for the Regulation S-P Amendments by an additional year. The associations believe that additional time is absolutely necessary to achieve our members’ compliance with the prescriptive requirements in the Regulation S-P Amendments. Regardless of the Commission’s decision on that extension request, we believe these additional changes are necessary to ensure that compliance can be achieved efficiently and without jeopardizing the security of customer information.
Summary of Proposed Changes
The associations’ suggested revisions to the Regulation S-P Amendments in Appendix B reflect the following considerations, many of which were included in the Joint Trades Letter, which can be cross-referenced for additional details:
- Harmonize with the notification requirement for service providers with existing standards. The Commission should eliminate the 72-hour notification requirement for service providers, which is an unreasonably specific standard that does not adequately align with the wide variety of service providers. The associations’ proposed edits would harmonize service provider and covered institution requirements by requiring service providers to provide notification to a covered institution without unreasonable delay after a reasonable investigation has been performed. Importantly, this approach would be wholly consistent with, for example, the Final Interagency Guidance on Third-Party Relationships: Risk Management, which provides that banking organizations should adopt “sound risk management practices that are commensurate with the level of risk and complexity of their respective third-party relationships.”
- Allow for investigation and a reasonable notification period. The Commission should allow a covered institution to provide notice only after it has conducted a reasonable investigation and concluded that misuse of customer information has occurred or is likely to occur. As such, covered institutions would not be subject to an arbitrary 30-day notification requirement, which is an entirely insufficient amount of time for covered institutions to perform reasonable investigations
and risk assessments, collect and analyze the voluminous information necessary to generate customer notices, and provide notices, especially when dealing with in complex cases. It would also eliminate a maximum limit on notice delays, allowing for such delays for an unspecified period of time, subject to determination by law enforcement, intelligence, or cyber security authorities.
- Do not require that a covered institution provide notice to customers with whom it does not have a preexisting relationship. A covered institution should only be required to provide notice to its own customers or to the institution that provided the sensitive information that was, or is reasonably likely to have been, accessed or used without authorization (subject to the requisite triggering data elements and risk of harm threshold). It would be impractical for a covered institution to identify and contact customers of another institution and could cause customers to be confused and concerned about why they receive notification from an institution with which they do not have a relationship. Accordingly, we have created two sections regarding notification: one for affected individuals who are customers of the covered institution, and one for affected individuals who are customers of a third-party financial institution.
- Allow covered institutions greater flexibility in notice content and format. We agree that contact information sufficient for an individual to contact the covered institution should be included in customer notifications. However, covered institutions should have flexibility in determining the type of contact information to provide based on how they normally interact with their customers. As such, we propose revising the current requirement to require only one of the listed contact methods to better align with existing procedures.
- Broaden the national security exception to include a law enforcement and cybersecurity agency exception, including foreign counterparts. The national security notification exception should be expanded to include cooperation with appropriate law enforcement and cybersecurity agencies, as well as cooperation with international authorities with the flexibility to determine when such cooperation qualifies for the exception. Such a provision would incentivize the industry to include provisions in their incident response plans to seek help from international, federal, state, or local government resources early during a cyber-related incident. Given the priority of national security and public safety concerns, a covered entity should be allowed to temporarily pause any required Reg S-P data breach notification or disclosure when an appropriate law enforcement agency (such as, the FBI or a state law enforcement agency) is requesting a delay, or where a court order requires delay in public disclosure until such time as the delay is lifted.
- Define “Sensitive Customer Information” more clearly and consistent with other federal and state breach standards. The Commission should list the specific data elements that are sensitive and could trigger notification rather than leaving an open-ended standard that just offers potential examples of such data elements. This, again, would be consistent with the approach used in the Interagency Guidance. Accordingly, we proposed that the Commission adopt the definition of “sensitive customer information” in the Interagency Guidance, which means information identifying an individual or the individual’s account, including the individual’s account number, name, or online user name, in combination with authenticating information such as a social security number, driver’s license number, alien registration number, government passport number, or employer or taxpayer identification number; a biometric record; or a unique electronic identification number, address, or routing code that would permit access to the customer’s account.
- Clarify other select definitions to avoid over-notification. First, the Commission should remove the “consumer information” definition and focus on customer information—that is, information that is actually related to an account with the covered institution or service provider. Additionally, service provider notification obligations should be limited to incidents of unauthorized access to or use of “customer information,” rather than information existing on “customer information systems.” The latter definition is overbroad and would be likely to overburden information security teams of both the service provider and the covered institution. Finally, we propose excluding affiliates of covered institutions from the definition of “service provider,” since affiliates are part of the same enterprise information/cybersecurity oversight as the covered institutions.
- Expressly exclude encrypted data. Additionally, the associations recommend that the Commission exclude encrypted information where the decryption key has not been obtained, consistent with existing state data breach notification laws. Note that all U.S. state data breach notification laws provide an encryption safe harbor because it incentivizes encryption to protect customer data. To this end, we have proposed adding the word “nonencrypted” to the definition of customer information.
The associations appreciate the Commission’s attention to cybersecurity and privacy and agree with the Commission regarding the importance of sound cybersecurity practices within the financial sector in order to decrease cybersecurity risk from threat actors. However, we encourage the Commission to consider our proposed changes as a means to avoid too many overly prescriptive, duplicative, and burdensome requirements on covered institutions. These changes would better promote harmonization between the various SEC-proposed rules—and with rules of other federal agencies—simplify requirements within the proposals, and design proposals that protect against cyberthreats without creating enforcement and litigation traps. If you have any questions or would like to discuss these comments further, please reach out to Melissa Macgregor at [email protected].
Sincerely,
Securities Industry and Financial Markets Association
SIFMA Asset Management Group
American Bankers Association
Bank Policy Institute
Financial Services Institute
Institute of International Bankers
Investment Company Institute
Insured Retirement Institute
Committee of Annuity Insurers
Cc: The Hon. Hester M. Peirce, Commissioner
The Hon. Caroline A. Crenshaw, Commissioner
The Hon. Mark T. Uyeda, Commissioner
Vanessa Countryman, Secretary
Jamie Selway, Director, Division of Trading and Markets
Brian Daley, Director, Division of Investment Management