SEC Cyber Enforcement Continues: More Scrutiny of Internal Controls

July 18, 2024

Reading Time : 4 min

On June 18, 2024, the United States Securities and Exchange Commission (SEC) announced a settlement with R.R. Donnelley & Sons Company (RRD) for alleged internal control and disclosure failures following a ransomware attack in 2021. Without admitting or denying the SEC’s findings, the business communications and marketing services provider agreed to pay a civil penalty of over $2.1 million to settle charges alleging violations of Section 13(b)(2)(B) of the Securities Exchange Act of 1934 (Exchange Act) and Exchange Act Rule 13a-15(a).1

Background

RRD’s relevant services involved storing and transmitting confidential client data on its network (from clients such as SEC-registered firms, healthcare organizations, publicly traded companies and financial institutions), including personal identifying information, financial information and business plans. According to the Order Instituting Cease-and-Desist Proceedings (SEC Order), RRD’s wide variety of applications and network structure meant that its alert system for intrusion detection was very complex.2 RRD used a third-party managed security services provider (MSSP) to conduct initial review and analysis of alerts before escalating to RRD’s internal cybersecurity personnel.3

Per the SEC Order, a ransomware intrusion occurred between November 29 and December 23, 2021, during which time the MSSP escalated alerts to RRD’s internal security personnel.4  The SEC also alleged that RRD did not “reasonably manage” the MSSP’s resource allocation for alert review.5  Although RRD reviewed the alerts, they did not conduct their own investigation, remove infected instances from the network or conduct any remedial steps, while the threat actor installed encryption software and exfiltrated client data.6 RRD began responding on December 23, 2021, after another company that shared access to RRD’s network alerted RRD’s Chief Information Security Officer (CISO) about anomalous activity coming from the network.7  This last alert led to a response operation by RRD’s security personnel, which included shutting down servers and sending notices to clients and government agencies.

Disclosure and Internal Controls for Cyber Incidents

The SEC stated that protecting data confidentiality and integrity was critically important for RRD’s business, therefore the company should have had effective disclosure controls and procedures to address cybersecurity incidents and to ensure information passed up the chain to decision-makers in a timely manner. The agency argued that RRD’s cybersecurity practices violated the requirements of Exchange Act Section 13(b)(2)(B) to maintain sufficient internal accounting controls to prevent assets from being accessed without management authorization; and Exchange Act Rule 13a-15(a) to maintain internal disclosure controls necessary to ensure information is recorded, processed, summarized and reported within specified time periods.

Specifically, according to the SEC Order, RRD violated Exchange Act Section 13(b)(2)(B) and Exchange Act Rule 13a-15(a) by failing to:

  • Design effective disclosure controls and procedures for escalating all relevant information related to cybersecurity alerts and incidents to decision-makers
  • Respond to cybersecurity alerts and incidents in a timely manner
  • Provide guidance for personnel responsible for reporting alerts and incidents to management
  • Create a prioritization scheme and clear guidance to both internal and external personnel on incident response procedures
  • Use sufficient internal controls to oversee third-party service provider review and escalation of cybersecurity alerts.8

Remedial Efforts

According to the SEC Order, RRD’s cooperation with the agency and prompt remedial steps factored into the SEC’s final decision to accept the offer. These steps included:

  1. Reporting the 2021 ransomware event to the SEC prior to RRD’s first EDGAR filing disclosing the event
  2. Revising incident response policies and procedures voluntarily, with new cybersecurity technology and controls, updated employee training and increased cybersecurity personnel
  3. Providing SEC staff with detailed explanations and summaries of specific factual issues throughout the investigation
  4. Following up on SEC staff requests without requiring subpoenas, such as obtaining employee information, providing additional documents and explaining technical cybersecurity issues.9

Takeaways for Business

Cybersecurity remains a top priority for the SEC, and the agency is not shying away from using its full regulatory toolbox. The SEC has previously applied its power under Exchange Act Section 13(b)(2)(B) to alleged cybersecurity failures after a breach, notably enforcing such requirements against SolarWinds last October (see here for our article on that enforcement), which is still ongoing as of this writing. This latest enforcement is a signal for companies that the SEC’s authority under Exchange Act Section 13 remains a significant consideration for their cyber policies and procedures as well as oversight of any third-party security service providers. Exchange Act Section 13(b)(2)(B) requires companies to maintain adequate “internal accounting controls,” which will apply to cybersecurity-related controls after a cyberattack incident. Companies should not wait for an attack to test their practices and should proactively ensure those practices deliver critical information from their cybersecurity frontlines to decision-makers.

Please contact a member of Akin’s cybersecurity, privacy and data protection team if you have any questions about this enforcement or how it may impact your company.


1 U.S. Securities & Exchange Commission, Press Release, SEC Charges R.R. Donnelley & Sons Co. with Cybersecurity-Related Controls Violations (June 18, 2024), available at https://www.sec.gov/news/press-release/2024-75.

2 In the Matter of R.R. Donnelley & Sons Co., Release No. 100365 (June 18, 2024), available at https://www.sec.gov/files/litigation/admin/2024/34-100365.pdf.

3 Id. at 2-3.

4 Id. at 3.

5 Id.

6 Id. at 4.

7 Id.

8 Id. at 4-5.

9 Id. at 5-6.

Share This Insight

Previous Entries

Data Dive

November 19, 2024

The European Union’s AI Office published the inaugural General-Purpose AI Code of Practice on November 14, 2024. The Code is intended to assist providers of AI models in their preparations for compliance with the forthcoming EU AI Act, to be enforced from August 2, 2025. The Code is designed to be both forward-thinking and globally applicable, addressing the areas of transparency, risk evaluation, technical safeguards and governance. While adherence to the Code is not mandatory, it is anticipated to serve as a means of demonstrating compliance with the obligations under the EU AI Act. Following a consultation period that garnered approximately 430 responses, the AI Office will be empowered to apply these rules, with penalties for nonconformity potentially reaching 3% of worldwide turnover or €15 million. Three additional iterations of the Code are anticipated to be produced within the coming five months.

...

Read More

Data Dive

November 15, 2024

On October 29, 2024, the DOJ issued a proposed rule prohibiting and restricting certain transactions that could allow persons from countries of concern, such as China, access to bulk sensitive personal data of U.S. citizens or to U.S. government-related data (regardless of volume).

...

Read More

Data Dive

October 17, 2024

During the course of any lending transaction, lenders will conduct a due diligence review of the borrower, including reviewing any relevant “know-your-customer” information.

...

Read More

Data Dive

September 17, 2024

Following the publication of the European Union’s Artificial Intelligence Act (AI Act or Act) on 12 July 2024, there are now a series of steps that various EU bodies need to take towards implementation. One of the first key steps is in relation to the establishment of codes of practice to “contribute to the proper application” of the AI Act.

...

Read More

Data Dive

August 6, 2024

On July 30, 2024, the Senate passed the Kids Online Safety and Privacy Act (S. 2073) via an overwhelmingly bipartisan vote of 91-3 shortly before departing for the August recess.

...

Read More

Data Dive

July 18, 2024

On 12 July 2024, the European Union Artificial Intelligence Act (AI Act or Act) was published in the Official Journal of the European Union (EU), marking the final step in the AI Act’s legislative journey. Its publication triggers the timeline for the entry into force of the myriad obligations under the AI Act, along with the deadlines we set out below. The requirement to ensure a sufficient level of AI literacy of staff dealing with the operation and use of AI systems will, for example, apply to all providers and deployers on 2 February 2025.

...

Read More

Data Dive

July 18, 2024

On June 18, 2024, the United States Securities and Exchange Commission (SEC) announced a settlement with R.R. Donnelley & Sons Company (RRD) for alleged internal control and disclosure failures following a ransomware attack in 2021. Without admitting or denying the SEC’s findings, the business communications and marketing services provider agreed to pay a civil penalty of over $2.1 million to settle charges alleging violations of Section 13(b)(2)(B) of the Securities Exchange Act of 1934 (Exchange Act) and Exchange Act Rule 13a-15(a).1

...

Read More

Data Dive

June 11, 2024

In May, the National Institute of Standards and Technology (NIST) issued updated recommendations for security controls for controlled unclassified information (CUI) that is processed, stored or transmitted by nonfederal organizations using nonfederal systems, (NIST Special Publication 800-171 (SP 800-171), Revision 3). These security requirements are “intended for use by federal agencies in contractual vehicles or other agreements that are established between those agencies and nonfederal organizations.”1 While these new controls are only applicable to nonfederal entities that agree to comply with the new issuance, Revision 3 signals the next phase of expected security for government contractors.

...

Read More

© 2024 Akin Gump Strauss Hauer & Feld LLP. All rights reserved. Attorney advertising. This document is distributed for informational use only; it does not constitute legal advice and should not be used as such. Prior results do not guarantee a similar outcome. Akin is the practicing name of Akin Gump LLP, a New York limited liability partnership authorized and regulated by the Solicitors Regulation Authority under number 267321. A list of the partners is available for inspection at Eighth Floor, Ten Bishops Square, London E1 6EG. For more information about Akin Gump LLP, Akin Gump Strauss Hauer & Feld LLP and other associated entities under which the Akin Gump network operates worldwide, please see our Legal Notices page.