I’ve long thought that sending faxes was a pretty silly means of communication. Don’t send me a fax. I don’t want it. At some point I’m hoping that even my kids’ doctor’s office will get dragged into the 20th century and drop their insistence on faxing. In the meantime a pdf will be fine, thanks. In addition to the many reasons faxes are antiquated and annoying, the SEC has just provided us another reason to avoid them: they encourage violations of Reg. S-P!
The Rule
Reg. S-P’s Safeguards Rule requires that every broker-dealer registered with the SEC adopt policies and procedures reasonably designed to:
- insure the security and confidentiality of customer records and information;
- protect against any anticipated threats or hazards to the security or integrity of customer records and information; and
- protect against unauthorized access to or use of customer records or information that could result in substantial harm or inconvenience to any customer.
The Allegations
Craig Scott Capital, LLC, a broker-dealer in Uniondale, New York, had written supervisory procedures that purported to describe the manner in which the firm complied with the Safeguards Rule. But those procedures allegedly had some problems. For example, the procedures said the “Designated Supervisor” was responsible for ensuring compliance, but did not identify the Designated Supervisor. Also, the procedures allegedly contained blanks to be filled in later, such as: “[The Firm] has adopted procedures to protect customer information, including the following: [methods].”
But let’s get to the faxes. As last month’s administrative order sanctioning Craig Scott Capital says:
From January 20, 2012 until approximately June 2014 (the “Relevant Period”), CSC used email addresses other than those with the Firm’s domain name--@craigscottcapital.com – to electronically receive more than 4,000 faxes from customers and other third parties. These faxes routinely included sensitive customer records and information, such as customer names, addresses, social security numbers, bank and brokerage account numbers, copies of driver’s licenses and passports, and other customer financial information. During the Relevant Period, Taddonio and Porges, CSC’s principals, as well as other CSC employees and registered representatives, also used their personal (i.e., non-Firm) email addresses for matters relating to the business of CSC. CSC did not maintain and preserve either these faxes or this email correspondence as required by Section 17(a) of the Exchange Act and Rule 17a-4 thereunder.
The problem was the same as with all faxes: nobody wants them. They want emails instead. So when the firm set up an electronic faxing service, they added an extra step in the communication chain, and routed the faxes to email addresses. While they should have sent those faxes to email addresses with the firm’s domain name, thousands went to personal email addresses instead. Those personal email addresses were outside the firm’s communication management system, and the data in the faxes was unprotected.
The violations of Reg. S-P and Rule 17a-4 have cost Craig Scott Capital a $100,000 penalty and left the firms’ principals subject to cease-and-desist orders.
A Three-Step Data Security Plan[1] for Your Business
- Have a good reason for the communication methods your firm uses. Do you have a plan for your faxes? Can you protect the integrity of the data they contain? If not, quit it with the faxes.
- Keep your business in front, and party in the back. Are you using personal emails for your business? Can you protect the integrity of the data they contain? If not, quit it with the personal emails and save them for your fantasy jai alai league. They are a terrible idea.
- Re-read your data security procedures. Do they have actual blank spaces that will leave you exposed later? Fill those, and then look for your other problems, which you surely have.
[1] This is an incomplete plan. You need way more than this plan.
Add a comment
Archives
- January 2022
- June 2021
- March 2020
- August 2019
- March 2019
- October 2018
- July 2016
- June 2016
- May 2016
- February 2016
- November 2015
- September 2015
- July 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- July 2014
- March 2014
- July 2013
- June 2013
- April 2013
- March 2013
- October 2012
- September 2012
- August 2012
- April 2012
- March 2012
- February 2012
- January 2012
- November 2011
- September 2011
- June 2011
- May 2011
- April 2011
- February 2011
- January 2011
- December 2010
- October 2010
- September 2010
- August 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
- October 2009
- September 2009
- August 2009
- July 2009
- June 2009
- May 2009
- April 2009
- March 2009
- February 2009
- January 2009
- December 2008
- November 2008
- October 2008
- September 2006
- February 2006
Recent Posts
- Rethinking Your Cyber Insurance Needs as Your Workplace Evolves
- Data Breach Defense for Educational Institutions
- COVID-19 and the Increased Cybersecurity Risk in a Work-From-Home World
- Like Incorporating Facebook into your Website? EU Decision Raises New Issues
- Lessons Learned: Key Takeaways for Every Business from the Capital One Data Breach
- Will Quick Talks to WRAL About Privacy Issues Related to Doorbell Cameras
- About Us
- Not in My House - California to Regulate IoT Device Security
- Ninth Circuit Says You’re Going to Jail for Visiting That Website without Permission
- Ninth Circuit Interprets “Without Authorization” under the Computer Fraud and Abuse Act
Topics
- Data Security
- Data Breach
- Privacy
- Defamation
- Public Records
- Cyberattack
- FCC Matters
- Reporters Privilege
- Political Advertising
- Newsroom Subpoenas
- Shield Laws
- Internet
- Miscellaneous
- Digital Media and Data Privacy Law
- Indecency
- First Amendment
- Anti-SLAPP Statutes
- Fair Report Privilege
- Prior Restraints
- Wiretapping
- Access to Courtrooms
- Education
- FOIA
- HIPAA
- Drone Law
- Access to Court Dockets
- Access to Search Warrants
- Intrusion
- First Amendment Retaliation
- Mobile Privacy
- Newsroom Search Warrants
- About This Blog
- Disclaimer
- Services