<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>The Harvard Law School Forum on Corporate Governance</title>
	<atom:link href="https://corpgov.law.harvard.edu/2021/09/05/sec-sanctions-company-for-hypothetical-cyber-risk-factor/feed/" rel="self" type="application/rss+xml" />
	<link>https://corpgov.law.harvard.edu</link>
	<description>The leading online blog in the fields of corporate governance and financial regulation.</description>
	<lastBuildDate>Wed, 15 Sep 2021 13:16:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.8</generator>
	<item>
		<title>SEC Sanctions Company for Hypothetical Cyber Risk Factor</title>
		<link>https://corpgov.law.harvard.edu/2021/09/05/sec-sanctions-company-for-hypothetical-cyber-risk-factor/</link>
		<comments>https://corpgov.law.harvard.edu/2021/09/05/sec-sanctions-company-for-hypothetical-cyber-risk-factor/#respond</comments>
		<pubDate>Sun, 05 Sep 2021 13:28:20 +0000</pubDate>
<!-- 		<dc:creator><![CDATA[]]></dc:creator> -->
				<category><![CDATA[Accounting & Disclosure]]></category>
		<category><![CDATA[Practitioner Publications]]></category>
		<category><![CDATA[Securities Litigation & Enforcement]]></category>
		<category><![CDATA[Securities Regulation]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Risk]]></category>
		<category><![CDATA[SEC]]></category>
		<category><![CDATA[SEC enforcement]]></category>
		<category><![CDATA[Securities enforcement]]></category>
		<category><![CDATA[Securities regulation]]></category>

		<guid isPermaLink="false">https://corpgov.law.harvard.edu/?p=140045?d=20210905092820EDT</guid>
		<description><![CDATA[The SEC filed an enforcement action against a company for disclosing the risk that it “could” have a data privacy breach when it knew it already had experienced a breach. The action also shows the importance of software patch management, which can significantly reduce the number of incidents. On August 16, the Securities and Exchange [&#8230;]]]></description>
				<content:encoded><![CDATA[<hgroup><em>Posted by Robert Cohen, Michael Kaplan and Richard Truesdell, Davis Polk & Wardwell LLP, on Sunday, September 5, 2021 </em><div style="background:#F8F8F8;padding:10px;margin-top:5px;margin-bottom:10px"><strong>Editor's Note: </strong> <a href="https://www.davispolk.com/lawyers/robert-cohen">Robert Cohen</a>, <a href="https://www.davispolk.com/lawyers/michael-kaplan">Michael Kaplan</a> and <a href="https://www.davispolk.com/lawyers/richard-truesdell-jr">Richard Truesdell</a> are partners at Davis Polk &amp; Wardwell LLP. This post is based on a Davis Polk memorandum by Mr. Cohen, Mr. Kaplan, Mr. Truesdell, <a href="https://www.davispolk.com/lawyers/greg-andres">Greg Andres</a>, <a href="https://www.davispolk.com/lawyers/joseph-hall">Joseph Hall</a>, and <a href="https://www.davispolk.com/lawyers/matthew-kelly">Matthew Kelly</a>.
</div></hgroup><p>The SEC filed an enforcement action against a company for disclosing the risk that it “could” have a data privacy breach when it knew it already had experienced a breach. The action also shows the importance of software patch management, which can significantly reduce the number of incidents.</p>
<p>On August 16, the Securities and Exchange Commission (SEC) announced a <a href="https://www.sec.gov/litigation/admin/2021/33-10963.pdf">settlement</a> with Pearson plc (Pearson), a London-based company that primarily provides educational publishing services to schools and universities, for making a misleading risk factor disclosure about data breaches. Pearson collected large volumes of student data and administrator log-in credentials, and learned in March 2019 that millions of rows of data had been stolen by a sophisticated threat actor. The company mailed a breach notice to customers in July 2019 but did not disclose the breach in its SEC filings. Instead, its next SEC filing included a statement that a data privacy incident was a risk that “could result” in a major breach.</p>
<p>The company received a media inquiry a few days later, and gave the reporter a statement the company had prepared months before. The statement said that the data breach “may” have involved certain types of information that the SEC asserts the company already knew were involved. The statement also referred to the incident as “unauthorized access” and “expos[ure of] data” instead of disclosing that data had been removed, and did not include all of the types of data at issue. The statement said that the company had strict protections in place, had fixed the issue, and had no evidence the information had been misused, even though it had failed to patch the vulnerability for six months and was using an outdated encryption algorithm.</p>
<p> <a href="https://corpgov.law.harvard.edu/2021/09/05/sec-sanctions-company-for-hypothetical-cyber-risk-factor/#more-140045" class="more-link"><span aria-label="Continue reading SEC Sanctions Company for Hypothetical Cyber Risk Factor">(more&hellip;)</span></a></p>
]]></content:encoded>
			<wfw:commentRss>https://corpgov.law.harvard.edu/2021/09/05/sec-sanctions-company-for-hypothetical-cyber-risk-factor/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
