DISCUSS AND DISCOVER BDC Roundtable Thursday, September 11, 2014 Hosted by: Sponsored by: SUTHERL AND ASBILL & BRENNAN LLP www.sutherland.com Agenda RONALD REAGAN BUILDING AND INTERNATIONAL TRADE CENTER 1300 PENNSYLVANIA AVENUE, NW WASHINGTON, DC Thursday, September 11, 2014 GENERAL MEETING AGENDA 8:00 a.m. – 9:00 a.m. Continental Breakfast 9:00 a.m. – 9:15 a.m. Welcome 9:15 a.m. – 10:30 a.m. Regulatory, Legislative and Market Overview Panel Speakers Steve Boehm, Partner, Sutherland Cynthia Krus, Partner, Sutherland Brett Palmer, President, Small Business Investor Alliance Mark Timperman, Managing Director, Wells Fargo 10:30 a.m. – 10:45 a.m. Break 10:45 a.m. – 11:45 a.m. Facing Disclosure: Meet the SEC Reviewers Panel Speakers Jim Curtis, Branch Chief, Division of Investment Management, U.S. Securities and Exchange Commission Christina Fettig, Senior Accountant, Division of Investment Management, U.S. Securities and Exchange Commission John Ganley, Senior Counsel, Division of Investment Management, U.S. Securities and Exchange Commission Matt Giordano, Assistant Chief Accountant, Division of Investment Management, U.S. Securities and Exchange Commission Christian Sandoe, Assistant Director, Division of Investment Management, U.S. Securities and Exchange Commission 11:45 a.m. – 1:00 p.m. Lunch – Table Topics and Networking Join the table(s) of your choice to discuss current developments, challenges and new ideas around these subject areas, or network on your own. CCOs Enforcement Outsourcing Private Funds SBICs RONALD REAGAN BUILDING AND INTERNATIONAL TRADE CENTER 1300 PENNSYLVANIA AVENUE, NW WASHINGTON, DC Thursday, September 11, 2014 1:00 p.m. – 2:15 p.m. Financing Structures and Alternatives: What You Need to Know Panel Speakers Robert Copps, Partner, Sutherland Eric Fenichel, Partner, Sutherland Peter Fozzard, Partner, Sutherland Daphne Frydman, Partner, Sutherland Moderator: Cynthia Krus, Partner, Sutherland 2:15 p.m. – 3:15 p.m. Takedown Lowdown: Trends in Capital Raising Panel Speakers Paul Echausse, Chief Executive Officer and President, Alcentra Capital Corporation Larry Herman, Managing Director, Raymond James Alan Kirshenbaum, Chief Financial Officer, TPG Specialty Lending, Inc. Al Laufenberg, Managing Director, Keefe, Bruyette and Woods, a Stifel Company Rich Petrocelli, Chief Financial Officer, Fifth Street Finance Corp. / Fifth Street Senior Floating Rate Corp. Moderator: Harry Pangas, Partner, Sutherland 3:15 p.m. – 3:30 p.m. Break 3:30 p.m. – 4:30 p.m. OCIE Exams: What to Expect When the SEC Comes Calling Speakers Andrew Bowden, Director of the Office of Compliance Inspections and Examinations, U.S. Securities and Exchange Commission John Walsh, Partner, Sutherland 4:30 p.m. Closing Remarks Speaker Biographies 2014 BDC ROUNDTABLE Thursday, September 11, 2014 SPEAKER BIOGRAPHIES 2014 Regulatory, Legislative and Market Overview Steve Boehm, Partner, Sutherland Asbill & Brennan LLP Nationally recognized as an authority on business development companies (BDCs), Steve Boehm guides his clients in successfully navigating the intricate rules and regulations of the U.S. Securities and Exchange Commission (SEC), especially the Investment Company Act of 1940 and its 1980 amendments. Steve and his team represent many of the nation’s largest BDCs, which he advises on a broad range of legal matters and transactions, including initial public offerings (IPOs), debt financing and structural solutions. In his practice, Steve also represents registered and unregistered investment funds and investment advisers on a broad range of regulatory and transactional matters. Cynthia Krus, Partner, Sutherland Asbill & Brennan LLP Cynthia Krus, who serves as vice chair of Sutherland’s Corporate and Financial Services practices, has been involved in numerous public and private securities offerings and has advised clients in connection with a variety of corporate transactions including mergers and acquisitions, proxy contests, exchange and rights offerings, going-private transactions and reorganizations. She advises companies on the structure and formation of various entities and the establishment and operation of private and public equity, including business development companies (BDCs) and Small Business Investment Companies (SBICs). Cynthia counsels public companies in a broad range of corporate and securities matters, such as the Sarbanes-Oxley Act of 2002, corporate governance, disclosure, executive compensation and shareholder matters. Brett Palmer, President, Small Business Investor Alliance Brett T. Palmer is the president of the Small Business Investor Alliance (SBIA). In this role, Mr. Palmer works to foster a healthy environment for small business investing and a strong and profitable lower middle market. In addition to managing the SBIA organization, he serves as its principal liaison with Congress, the Executive Branch, and other industry organizations. Mr. Palmer brings years of valuable public policy and advocacy experience to SBIA. He served in the executive branch as a Presidential appointee in the Commerce Department as Assistant Secretary for Legislative Affairs and as Deputy Assistant Secretary for Trade Legislation. He served in a number of roles in Congress including as a policy aide for the Speaker of the House. Mr. Palmer graduated from Davidson College with a degree in history. Mark Timperman, Managing Director, Wells Fargo Mark Timperman is a managing director in the Financial Institutions group at Wells Fargo Securities and is head of the Asset Management Investment Banking practice. He is based in Charlotte. Mark joined Wells Fargo in 1997 and helped establish the Asset Management practice in 2003. He has extensive industry knowledge and long-term clients in both asset management and specialty finance. He helped build Wells Fargo’s position in underwriting business development companies and closed-end funds, and he has significant experience advising clients on capital markets and strategic transactions. Mark earned a B.A. from Duke University and an M.B.A. from the Darden School of Business at the University of Virginia. 2014 BDC ROUNDTABLE Thursday, September 11, 2014 SPEAKER BIOGRAPHIES Facing Disclosure: Meet the SEC Reviewers Jim Curtis, Branch Chief, Division of Investment Management, U.S. SEC Mr. Curtis currently is a branch chief in the Office of Chief Counsel of the Division of Investment Management. He has served as an attorney with the Securities and Exchange Commission since 1991 and has worked on various projects for offices within the Division of Investment Management. He is the author of “Special Duties of Closed-End Fund Directors,” a chapter in the treatise Fund Governance: Legal Duties of Investment Company Directors, published by the American Lawyer’s Law Journal Press. Prior to his employment with the SEC, Mr. Curtis was in private practice in New York. Before attending law school, he worked as a product manager for Seagram’s in New York. Mr. Curtis is a graduate of Hamilton College (B.A.), The Amos Tuck School of Business Administration (M.B.A.) and New York University School of Law (J.D.). The Securities and Exchange Commission, as a matter of policy, disclaims responsibility for any private publications or statements by any of its employees. The views expressed here are those of the author and do not necessarily reflect the views of the Commission or the others on the staff of the Commission. Christina Fettig, Senior Staff Accountant, Division of Investment Management, U.S. SEC Christina has a total of 16 years of asset management experience and currently has been with the SEC for 11 years as a Staff Accountant in the Division of Investment Management’s Disclosure Review and Accounting Office. Christina examines and analyzes, from an accounting and auditing perspective, all financial statements and other financial data included in registration statements, prospectuses and amendments filed under the Securities Act of 1933. She examines applications for registration and annual and semi-annual reports filed under the Investment Company Act of 1940. She conducts and participates in conferences with other members of the staff and with the Chief Accountant of the Division with respect to technical accounting and auditing problems arising in the examination and analysis of documents and conducts and participates in conferences with representatives and the accountants of registrants. Prior to joining the Commission, she was a Senior Associate in the Assurance and Business Advisory Services practice of PricewaterhouseCoopers LLP where she spent 5 years. At PricewaterhouseCoopers, Christina was responsible for the planning, execution and completion of audits of clients in the financial services industry, with an emphasis on investment management clients. Her responsibilities as a senior associate included supervising audit teams ranging from two to fifteen team members and accepting overall engagement responsibility as well as communicating with varying levels of client management as well as interacting directly with partners and managers. Christina is a Certified Public Accountant and received her BBA in Accounting from Loyola College in Maryland in 1998. Christina received her MBA with a concentration in Finance from Loyola College in Maryland. John Ganley, Senior Counsel, Division of Investment Management, U.S. SEC John Ganley has served with the SEC since 1990, first serving with the Office of the General Counsel before working with the Office of Disclosure Rulemaking. John currently serves with the Disclosure Review Office and the Division of Investment Management. John received his JD, with honors, from the George Washington University Law School and his B.S. from the University of Rochester. 2014 BDC ROUNDTABLE Thursday, September 11, 2014 SPEAKER BIOGRAPHIES Facing Disclosure: Meet the SEC Reviewers (cont.) Matt Giordano, Assistant Chief Accountant, Division of Investment Management, U.S. SEC Matt Giordano is an Assistant Chief Accountant for the Division of Investment Management at the U.S. Securities and Exchange Commission. Matt assists the Chief Accountant in interpreting new accounting regulations and directing the financial reporting and accounting practices of investment companies in compliance with the federal securities laws. Prior to joining the Commission, Matt was a Senior Manager at KPMG LLP, where he worked for approximately ten years specializing in audit and attest engagements for various investment management clients. As a Senior Manager at KPMG LLP, Matt was also a national instructor focusing on technical accounting and audit methodology topics. Matt received his BBA with a focus in Accounting from the University of Massachusetts and a MSA from Boston College. Matt is a Certified Public Accountant licensed in Massachusetts and New York. Christian Sandoe, Assistant Director, Division of Investment Management, U.S. SEC Christian Sandoe is an 18 year veteran of the SEC. Christian has spent the past 14 years with the Disclosure Review Office, specifically in the Division of Investment Management. Prior to this, Christian spent several years working with the Division of Enforcement in New York. Christian earned his LLM in Securities and Financial Regulation from Georgetown University law Center and received his JD from Suffolk University Law School. 2014 BDC ROUNDTABLE Thursday, September 11, 2014 SPEAKER BIOGRAPHIES Financing Structures and Alternatives: What You Need to Know Robert Copps, Partner, Sutherland Asbill & Brennan LLP Bob Copps is a corporate lawyer focusing on private investment funds and mergers and acquisitions. Bob represents private investment funds in all aspects of their operations, including fund formation, regulatory matters, the management of portfolio investments and exit transactions. Bob handles M&A transactions and general corporate matters for both publicly-traded and private corporate clients. He has worked with very prominent clients on several of the most significant transactions in the timber, water and natural resources industries. Eric Fenichel, Partner, Sutherland Asbill & Brennan LLP Eric Fenichel represents corporate and financial services clients in structured finance transactions. His clients include insurance companies, business development companies, energy dealers, financial services companies, timber investment management firms and commercial and industrial firms. Eric’s experience includes life insurance reserve securitizations, including XXX and AXXX reserve securitization financings; commercial loan portfolio financings, including CLO/CDO transactions; commodity financing arrangements in the energy industry; timber installment note transactions and general corporate finance transactions. Peter Fozzard, Partner, Sutherland Asbill & Brennan LLP Working primarily with generation and transmission cooperatives, renewable energy developers and lenders across the country, Peter Fozzard helps these clients finance utility, telecommunications and other corporate operations and project development. His finance background includes senior, second lien and subordinated commercial financings; private placements and other taxable long-term debt issuances; government-guaranteed financings; project financing; public, pollution control and industrial revenue bond issuances; structured financings of inventories; commercial paper offerings; lines of credit; and letter of credit transactions. Daphne Frydman, Partner, Sutherland Asbill & Brennan LLP Daphne Frydman helps companies in the financial services industry raise capital for their operations through a broad range of financing and other deals including structured finance, life insurance reserve securitizations, including XXX and AXXX reserve securitization financings, and general corporate finance transactions including senior debt financing, private debt placements and retail notes. Daphne also advises asset managers, insurance companies, public and private funds, business development companies and other investment vehicles, in their operations, structure, governance, CFTC registration, public offerings, private placements and compliance with the Dodd-Frank Act and applicable requirements of the U.S. Securities and Exchange Commission (SEC) exchange rules, the Commodity Futures Trading Commission (CFTC), and the National Futures Association (NFA). Cynthia Krus, Partner, Sutherland Asbill & Brennan LLP Cynthia Krus, who serves as vice chair of Sutherland’s Corporate and Financial Services practices, has been involved in numerous public and private securities offerings and has advised clients in connection with a variety of corporate transactions including mergers and acquisitions, proxy contests, exchange and rights offerings, going-private transactions and reorganizations. She advises companies on the structure and formation of various entities and the establishment and operation of private and public equity, including business development companies (BDCs) and Small Business Investment Companies (SBICs). Cynthia counsels public companies in a broad range of corporate and securities matters, such as the Sarbanes-Oxley Act of 2002, corporate governance, disclosure, executive compensation and shareholder matters. 2014 BDC ROUNDTABLE Thursday, September 11, 2014 SPEAKER BIOGRAPHIES Takedown Lowdown: Trends in Capital Raising Paul Echausse, Chief Executive Office and President, Alcentra Capital Corporation Paul is responsible for the overall management and direction of fund investing, including transaction sourcing, deal execution and the monitoring of portfolio companies. Paul is a member of the Investment Committee, serves as the Chairman of the board of directors of Grindmaster Cecilware Corporation and is a member of the board of directors of Emerald Waste Services, EB Brands, FST Technical Services, DRC and Battery Solutions. Paul brings more than 20 years of leveraged finance experience to the origination and management of the Partnership’s investment portfolios. Prior to joining Alcentra, Paul was President of Kisco Capital Corporation, the growth capital Small Business Investment Company affiliate of the Kohlberg family office. Previously, he was Chief Operating Officer of IBJS Capital Corporation, the junior capital investment affiliate of IBJ Schroder Bank. Prior to IBJS, Paul was the Assistant Division Head of Southeast Banking for the Bank of New York. Paul has served as President of the Northeast Regional Association of Small Business Investment Companies and on the national board of the National Association of Small Business Investment Companies. Paul received a B.S. from Fordham University (magna cum laude, Phi Beta Kappa), an M.B.A. from New York University and a J.D. from Fordham Law School and is a member of the New York State Bar. Larry Herman, Managing Director, Raymond James Mr. Herman joined Raymond James in 2012 as part of the merger with Morgan Keegan. Prior to joining Morgan Keegan, he was in the investment banking groups of CIBC World Markets and Alex. Brown and was head of corporate development for Radiant Systems, Inc. Mr. Herman received a B.B.A. with high honors in finance from The University of Texas at Austin and an M.B.A. with honors from the Olin School of Business at Washington University. Alan Kirshenbaum, Chief Financial Officer, TPG Specialty Lending, Inc. Prior to being named Chief Financial Officer in November 2013, Mr. Kirshenbaum was a Vice President of the Company since 2011. From 2011 to 2013, Mr. Kirshenbaum was Chief Financial Officer and Executive Director of TPG Special Situations Partners (“TSSP”). From 2007 to 2011, Mr. Kirshenbaum was the Chief Financial Officer of Natsource, a private investment firm. Mr. Kirshenbaum was a Managing Director, Chief Operating Officer and Chief Financial Officer of MainStay Investments from 2006 to 2007. Mr. Kirshenbaum joined Bear Stearns Asset Management (“BSAM”) in 1999 and was BSAM’s Chief Financial Officer from 2003 to 2006. Prior to working at BSAM, Mr. Kirshenbaum worked in public accounting at KPMG from 1996 to 1999 and J.H. Cohn from 1994 to 1996. Mr. Kirshenbaum received a B.S. from Rutgers University in 1994 and an M.B.A. from New York University’s Stern School of Business in 2003. Allen Laufenberg, Managing Director, Keefe, Bruyette and Woods, a Stifel Company Mr. Laufenberg’s primary responsibilities include advising public and privately-owned business development companies (BDCs) and depositories on a wide range of alternatives. Al has represented numerous financial institutions (buy side and sell side) as well as working for special committees for approximately 20 years. Mr. Laufenberg leads the firm’s BDC investment banking initiative and is also a member of firm’s fairness opinion committee. 2014 BDC ROUNDTABLE Thursday, September 11, 2014 SPEAKER BIOGRAPHIES Takedown Lowdown: Trends in Capital Raising (cont.) Rich Petrocelli, Chief Financial Officer, Fifth Street Finance Corp./Fifth Street Senior Floating Rate Corp. Richard Petrocelli is the Chief Financial Officer of Fifth Street Finance Corp. (NASDAQ:FSC) and Fifth Street Senior Floating Rate Corp. (NASDAQ:FSFR) – both publicly-traded business development companies (BDCs). Mr. Petrocelli joined Fifth Street in March 2014 with over 20 years of experience in investment management, private equity and corporate reorganizations. In addition, he is a member of the Board of Directors of Healthcare Finance Group, LLC. Before joining Fifth Street, Mr. Petrocelli served as Chief Financial Officer, Chief Compliance Officer and Secretary at Saratoga Investment Corp., a publiclytraded BDC, where he was responsible for all accounting, finance, compliance and fund administration functions and had direct involvement in the underwriting of new loans. He was also a Managing Director of the company’s investment adviser, Saratoga Investment Advisors, LLC. Additionally, Mr. Petrocelli was a Managing Director and Chief Financial Officer at Saratoga Partners, a private equity investment firm, where he was involved with originating, structuring, managing and monitoring middle market investments. He has served as a Director of a number of Saratoga Partners’ portfolio companies. Prior to joining Saratoga Partners in 1998, Mr. Petrocelli worked at Gabelli Asset Management in the corporate finance department with a primary focus on the company’s alternative investment business. Before that, he worked at BDO Siedman as an accountant. Mr. Petrocelli received his B.S.B.A. from Georgetown University and earned an M.B.A. from New York University’s Stern School of Business. He is a Certified Public Accountant. Harry Pangas, Partner, Sutherland Asbill & Brennan LLP Harry Pangas represents issuers and investment banking firms in connection with public and private offerings of equity and debt securities, including initial public offerings (IPOs), Rule 144A offerings, shelf offerings, at-the-market offerings, registered direct offerings, high-yield bond offerings, convertible debt offerings and rights offerings. Harry also regularly advises public companies on compliance with ongoing SEC reporting obligations and other securities laws, including Section 16(b) compliance, Rule 10b5-1 plans, the Sarbanes-Oxley Act, Form S-8 and proxy disclosure, as well as the corporate governance listing requirements of the national securities exchanges. In addition, Harry has developed a niche practice representing financial services companies, including business development companies (BDCs), private investment funds, lending cooperatives, banks and insurance companies, in connection with a myriad of securities transactional and regulatory matters. 2014 BDC ROUNDTABLE Thursday, September 11, 2014 SPEAKER BIOGRAPHIES OCIE Exams: What to Expect When the SEC Comes Calling Andrew Bowden, Director of the Office of Compliance Inspections and Examinations, U.S. SEC Drew Bowden was appointed by Chair Mary Jo White as the Director of the Office of Compliance Inspections and Examinations (OCIE) in June 2013. He joined the SEC in November 2011 and initially served as the National Associate for the Investment Adviser and Investment Company Examination Program. In September 2012, Mr. Bowden was named Deputy Director of OCIE. Mr. Bowden began his career as a trial attorney and partner at a major Baltimore law firm, specializing in securities related litigation, arbitration, and regulatory matters. He later worked for seventeen years at Legg Mason in a variety of roles, including legal, compliance, operations, sales, service, marketing, and corporate governance. He has also served on the Board of Governors and Executive Committee of the Investment Adviser Association. He holds a Bachelor of Arts degree, summa cum laude, from Loyola University Maryland and a law degree, cum laude, from The University of Pennsylvania. John Walsh, Partner, Sutherland A 23-year veteran of the Securities and Exchange Commission (SEC), John Walsh joined Sutherland in October 2011. With his deep, insider’s experience and perspective of the SEC, John now represents brokerdealers, hedge funds, investment advisers and other securities firms in compliance and regulatory issues involving the agency. He counsels clients on the full spectrum of securities issues from development and compliance to cooperation in examinations and defense in enforcement proceedings. At the SEC, John played a key role in creating the Office of Compliance Inspections and Examinations (OCIE), which administers examinations of U.S. registered securities entities. He designed and implemented the SEC’s securities compliance examination practices, first as a senior advisor for compliance policy and then, most recently, as associate director-chief counsel. In 2009, he served as OCIE’s acting director and led a massive retraining of examination staff on antifraud techniques. Supplemental Materials Organization of the SEC – Division of Investment Management ©2014 Sutherland Asbill & Brennan LLP DivisionofInvestmentManagement(IM) OrganizationChart Director’s Office Director: Norm Champ Deputy Director: Dave Grim (202) 551‐6720 Senior Advisor: Jennifer McHugh Senior Advisor: Judy Lee Senior Counsel: Marian Fowler Senior Counsel: Aidan O’Connor Confidential Assistant: Ammani Nagesh (202) 551‐6720 The Division of Investment Management works to: protect investors; promote informed investment decisions; and facilitate appropriate innovation in investment products and services through regulating the asset management industry. Chief Counsel’s Office Associate Director and Chief Counsel: Douglas Scheidt (202) 551‐6701 Associate Director and Deputy Chief Counsel: Elizabeth Osterman (202) 551‐6746 Disclosure Review and Accounting Office Associate Director: Barry Miller (202) 551‐6725 Associate Director and Deputy for Disclosure Policy: Susan Nash Rulemaking Office Associate Director: Diane Blizzard Managing Executive’s Office Managing Executive: Eun Ah Choi (202) 551‐6702 (202) 551‐6720 (202) 551‐6742 Chief Counsel's Office #1 (Legal Guidance) Assistant Chief Counsel: Nadya Roytblat (202) 551‐6825 Disclosure Review Office #1 Assistant Director: Brent Fields (202) 551‐6921 Investment Adviser Regulation Office Assistant Director: Daniel Kahl (202) 551‐6999 Administrative Office Business Manager: Denise Green (202) 551‐6720 Chief Counsel's Office #2 (Legal Guidance) Assistant Chief Counsel: Sara Crovitz (202) 551‐6825 Disclosure Review Office #2 Assistant Director: Christian Sandoe (202) 551‐6921 Investment Company Regulation Office Assistant Director: Sarah ten Siethoff (202) 551‐6792 Risk and Examinations Office Assistant Director: Jon Hertzke (202) 551‐6706 Chief Counsel's Office #3 (Legal Guidance) Assistant Chief Counsel: Dalia Blass (202) 551‐6825 Disclosure Review Office #3 (Insured Investments) Assistant Director: William Kotapish (202) 551‐6921 Chief Counsel's Office (Enforcement Liaison) Assistant Director: Janet Grossnickle (202) 551‐6785 Chief Accountant’s Office Chief Accountant: Jaime Eichen (202) 551‐6918 Communications Vacant 202‐551‐6720 Technology Office Senior Technology Officer: Amy Lawson 202‐551‐6720 Updated June 16, 2014 Legal Alert: The Division of Investment Management Clarifies Certain Positions Regarding the Applicability of Rules 3-09 and 4-08(g) of Regulation S-X to BDCs October 23, 2013 Related People/Contributors The U.S. Securities and Exchange Commission (“SEC”) Division of Investment Management recently published written guidance (see link below) on rules that require that certain financial information be included pertaining to unconsolidated subsidiaries to portfolio companies of business development companies (“BDCs”). The relevant provisions are found in Rules 3-09 and 4-08(g) of Regulation S-X. Rule 3-09 generally addresses whether separate financial statements of an unconsolidated subsidiary of an SEC registrant should be included in its SEC filings, while Rule 408(g) generally covers whether summarized annual (and, indirectly, interim) balance sheet and income statement information must be included in a note to an SEC registrant’s financial statements for its unconsolidated subsidiaries. Both rules look to the three significance tests set forth in Rule 102(w) of Regulation S-X, though with different thresholds applied for Rules 3-09 and 4-08(g), respectively. • • • • Steven B. Boehm Cynthia M. Krus John J. Mahon Harry S. Pangas The Division of Investment Management has now clarified, through informal discussions, certain positions relating to the applicability of Rules 3-09 and 4-08(g) to BDCs under certain circumstances. In particular, the Division of Investment Management has clarified the following positions: • For purposes of the definition of “subsidiary” set forth in Rule 1-02(x) of Regulation S-X, “control” should be tested by reference to the definition set forth in the Investment Company Act of 1940, as amended (the “1940 Act”), which includes holding 25% or more of an entity’s voting securities. • Rules 3-09 and 4-08(g) can be applied, as applicable, to any BDC portfolio company, regardless of the nature of its business. • Rule 3-09 should only be applied to majority-owned portfolio companies that are not consolidated. • All three significance tests set forth under Rule 1-02(w), including the investment, asset and income test, should be applied using a 20% threshold when evaluating the applicability of Rule 3-09 to any majority-owned portfolio company. • All three significance tests set forth under Rule 1-02(w), including the investment, asset and income test, should be applied using a 10% threshold when evaluating the applicability of Rule 4-08(g) to any BDC portfolio company that would qualify as a “subsidiary.” • As opposed to Rule 3-09 which applies to majority-owned portfolio companies, Rule 4-08(g) can apply to any BDC portfolio company that would qualify as a “subsidiary” (i.e., where a BDC is deemed to “control” such portfolio company, as that term is defined under the 1940 Act). • It would be inappropriate to utilize investment structures that appear to be designed to ATLANTA AUSTIN GENEVA HOUSTON LONDON NEW YORK SACRAMENTO WASHINGTON, DC Legal Alert: The Division of Investment Management Clarifies Certain Positions Regarding the Applicability of Rules 3-09 and 4-08(g) of Regulation S-X to BDCs continued technically avoid the applicability of either Rule 3-09 or Rule 4-08(g). The original written guidance issued by the Division of Investment Management is provided as a reference. If you have any questions about this Legal Alert, please feel free to contact the attorneys listed under "related people/contributors" above, or the Sutherland attorney with whom you regularly work. ATLANTA AUSTIN GENEVA HOUSTON LONDON NEW YORK SACRAMENTO WASHINGTON, DC Legal Alert: The Volcker Rule: The Rising Appeal of Registered Investment Companies and BDCs January 10, 2014 Related People/Contributors On December 10, 2013, the U.S. Federal Reserve, the Office of the Comptroller of the Currency, the Federal Deposit Insurance Corporation, the Commodity Futures Trading Commission, and the Securities and Exchange Commission issued final rules implementing Section 619 of the DoddFrank Wall Street Reform and Consumer Protection Act of 2010, also known as the “Volcker Rule.” While the final rules clarify a number of important questions regarding implementation of the Volcker Rule, they also serve to distinguish investment companies registered under the Investment Company Act of 1940, as amended (the 1940 Act), as well as closed-end funds that have elected to be treated as a business development company, or BDC, under the 1940 Act, from traditional private funds that rely on exemptions from registration under the 1940 Act. The final rules also exempt small business investment companies, or SBICs, from the definition of covered fund, thus providing BDCs with the possibility of pursuing SBIC licenses either for the BDCs themselves or for their subsidiaries. In doing so, the final rules arguably create incentives for insured depository institutions and their affiliates to seek opportunities to sponsor, invest in, and potentially manage registered investment companies and BDCs. • • • • • Brian Barrett Steven B. Boehm Cynthia M. Krus John J. Mahon Harry S. Pangas The Volcker Rule, which is intended to curb potentially risky bank practices, generally prohibits insured depository institutions and their affiliates, typically referred to as “banking entities,” from: • Engaging in short-term proprietary trading, or • Investing in, or having certain relationships with, hedge funds and private equity funds, referred to as “covered funds” under the Volcker Rule. The Volcker Rule effectively seeks to prohibit banking entities, directly or indirectly, from acquiring or retaining an ownership interest in covered funds. Under the Volcker Rule, covered funds include: • An issuer that would be an investment company under the 1940 Act, but for an exclusion set forth under 3(c)(1) or 3(c)(7) of the 1940 Act, • Certain commodity pools, and • Funds organized outside of the United States that are sponsored by a U.S. banking entity or in which a U.S. banking entity is an investor. However, the final rules specifically exclude registered investment companies, as well as BDCs and SBICs, from the scope of the term “covered fund” for purposes of the Volcker Rule, since Section 619 only references funds that rely on Sections 3(c)(1) or 3(c)(7) of the 1940 Act. In addition, the final rules clarify that neither registered investment companies nor BDCs will be considered “affiliates” of a banking entity so long as that banking entity: • Does not own, control, or hold the power to vote 25% or more of the voting shares of the registered investment company or BDC; and ATLANTA AUSTIN GENEVA HOUSTON LONDON NEW YORK SACRAMENTO WASHINGTON, DC Legal Alert: The Volcker Rule: The Rising Appeal of Registered Investment Companies and BDCs continued • Provides investment advisory, commodity trading advisory, administrative, and other services to the registered investment company or BDC in compliance with the limitations under applicable regulation, order, or other authority. As a result, a banking entity generally may invest in a registered investment company or BDC, including one that potentially engages in activities subject to restriction under the Volcker Rule so long as that banking entity does not hold the power to vote more than 25% of such registered investment company or BDC’s voting shares, provided that it is otherwise permitted to do so under applicable banking law. Likewise, a banking entity may manage such a registered investment company or BDC, so long as it does so in compliance with applicable securities and banking law, including the Bank Holding Company Act of 1956, and the applicable provisions under the 1940 Act and the Investment Advisers Act of 1940, in each case as amended. While registered investment companies and BDCs remain subject to substantial regulation under the 1940 Act, including limits on the use of leverage, the above benefits may provide potential opportunities for banking entities to sponsor, invest in, and manage investment vehicles with attributes and investment objectives similar to the types of hedge funds and private equity funds that would otherwise be subject to restriction under the Volcker Rule. If you have any questions about this Legal Alert, please feel free to contact any of the attorneys listed or the Sutherland attorney with whom you regularly work. ATLANTA AUSTIN GENEVA HOUSTON LONDON NEW YORK SACRAMENTO WASHINGTON, DC Legal Alert: M&A Brokers Exempt from SEC Broker-Dealer Registration Requirements February 7, 2014 Related People/Contributors On January 31, 2014, the U.S. Securities and Exchange Commission’s (SEC) Division of Trading and Markets issued a No-Action Letter (Letter)1 that allows a private business broker (M&A Broker) to receive transaction-based compensation for assisting in effecting sales of privately-held companies without being registered as a broker-dealer under the Securities Exchange Act of 1934 (Exchange Act). It is important to note that the relief granted in the Letter applies only to federal broker-dealer registration requirements. M&A Brokers must still consider registration and licensing requirements under state laws that may apply to M&A Brokers. Background The registration status of private business brokers was the focus of a 2005 report published by the American Bar Association (ABA).2 The ABA report noted that private business brokers, sometimes called M&A Brokers, operate only as “finders,” connecting potential buyers and sellers of private companies, and that the traditional broker-dealer registration model would impose significant costs on these brokers. More recently, the U.S. Congress has introduced legislation, scheduled for consideration in 2014, that would exempt M&A Brokers from SEC registration in certain securities transactions that involve transferring ownership of a privately-held company.3 Importantly, the legislation would be limited to transactions involving companies with annual earnings of less than $25 million and annual gross revenue of less than $250 million. The SEC No-Action Letter The Letter permits M&A Brokers to facilitate certain types of securities transactions, including mergers, acquisitions, business sales and business combinations (collectively, M&A Transactions) without registering as a broker-dealer so long as specified conditions (discussed below) are met by the business being sold, the M&A Transaction, the buyer and the M&A Broker. As explained in the Letter, an M&A Broker is a person engaged in the business of effecting securities transactions solely in connection with the transfer of ownership and control of a privately-held company through the purchase, sale, exchange, issuance, repurchase, or redemption of, or a business combination involving, securities or assets of the company, to a buyer that will actively operate the company or the business conducted with the assets of the company. • • • • • • • • • • • • • • • • • • • • • • • • • Peter J. Anderson Eric A. Arnold Keith J. Barnett Steven B. Boehm Bruce M. Bettigole Patricia A. Gorham Olga Greenberg Cheryl L. Haas Gregory S. Kaufman Clifford E. Kirsch Michael B. Koffler Susan S. Krawczyk Cynthia M. Krus Yasho Lahiri Neil S. Lang John J. Mahon Harry S. Pangas S. Lawrence Polk Brian L. Rubin Amelia Toy Rudolph Holly H. Smith W. Scott Sorrels John H. Walsh Bryan M. Ward Ben Marzouk Conditions for the Business Being Sold. The business being sold must be a privately-held company. A “privately-held company” is a company that does not have any class of securities registered, or required to be registered with the SEC under Section 12 of the Exchange Act, or does not file, and is not required to file, periodic information, documents or reports under Section 15(d) of the Exchange Act. The privately-held company must be a “going concern”4 and not a “shell” company.5 Significantly, the size of the privately-held company is not a consideration. Conditions for the M&A Transaction. The relief is limited to a transaction involving the transfer of ownership and control of a privately-held company through the purchase, sale, exchange, issuance, repurchase, or redemption of, or a business combination involving, securities or assets of the company, to a buyer that will actively operate the company or the business conducted with the assets of the company. Additionally, the M&A Transaction cannot involve a public offering of securities. If the M&A Transaction involves an offering or sale of securities, the offering and sale must be conducted in compliance with an applicable exemption from registration under the Securities Act of 1933 (Securities Act). Moreover, any securities received by the buyer or the M&A ATLANTA AUSTIN GENEVA HOUSTON LONDON NEW YORK SACRAMENTO WASHINGTON, DC Legal Alert: M&A Brokers Exempt from SEC BrokerDealer Registration Requirements continued Broker in connection with the M&A Transaction must be restricted securities within the meaning of Rule 144(a)(3) under the Securities Act. Conditions for the Buyer: Upon completion of the M&A Transaction, the buyer must “control” and “actively operate” the company. The necessary “control” would exist if the buyer has the power, directly or indirectly, to direct the management or policies of the company, and will be presumed to exist if the buyer, upon completion of the M&A Transaction, has the right to vote, sell or direct the sale of at least 25% of a class of voting securities or, in the case of a partnership or limited liability company, has the right to receive upon dissolution or has contributed 25% or more of the capital. The Letter also contemplates that a buyer could “actively operate” the company, among other ways, through the power to elect executive officers and approve the annual budget, or by service as an executive or other executive manager. But the Letter clarifies that the relief would not cover a buyer that is a shell company upon the conclusion of the M&A Transaction (excluding shell companies formed to complete the M&A Transaction or change the corporate domicile). Conditions for the M&A Broker: To rely on the Letter, an M&A Broker cannot take custody, control, or possession, or otherwise handle any funds or securities issued or exchanged in connection with the M&A Transaction. The M&A Broker also cannot provide financing, either directly or indirectly, for the M&A Transaction. Nor can the M&A Broker have the authority to bind a party to the M&A Transaction. In addition, the M&A Broker cannot rely on the Letter if any officer, director or employee thereof has been barred from association with a broker-dealer by the SEC, any state, or any self-regulatory organization, or suspended from association with a broker-dealer. Significantly, the Letter explicitly permits the M&A Broker to provide the following services without being registered as a broker-dealer: • Advertise the privately-held company for sale with information such as the description of the business, general location and price range. • Assess the value of any securities being sold. • Represent both the buyer and seller, so long as the M&A Broker gives both parties clear written disclosure of the joint representation and obtains their written consent. • Participate in negotiations for the M&A Transaction. • Assist buyers in obtaining financing from unaffiliated third parties, so long as the M&A Broker complies with all applicable requirements, including Regulation T, and discloses to the buyer in writing any compensation received by the M&A Broker for such services. • Advise the buyer and seller to issue securities, or otherwise effect the transfer of the privatelyowned company by means of securities. ATLANTA AUSTIN GENEVA HOUSTON LONDON NEW YORK SACRAMENTO WASHINGTON, DC Legal Alert: M&A Brokers Exempt from SEC BrokerDealer Registration Requirements continued Most importantly, the Letter permits the M&A Broker to receive transaction-based compensation without being registered as a broker-dealer. 1 The SEC’s No-Action Letter, dated January 31, 2014, is available at http://www.sec.gov/divisions/marketreg/mrnoaction/2014/ma-brokers-013114.pdf. 2 The ABA Report and Recommendation of the Task Force on Private Placement Broker-Dealers, dated June 20, 2005, is available at http://www.sec.gov/info/smallbus/2009gbforum/abareport062005.pdf. 3 H.R. 2274, 113th Congress, 2d Session (introduced October 6, 2013), “Small Business Mergers, Acquisitions, Sales, and Brokerage Simplification Act,” available at http://docs.house.gov/billsthisweek/20140113/BILLS113hr2274-SUS.pdf. 4 The Letter explains that a “going concern” need not be profitable, and could even be emerging from bankruptcy, so long as it has actually been conducting business, including soliciting or effecting business transactions or engaging in research and development activities. 5 The Letter explains that a “shell” company is a company with no or nominal operations that has (i) no or nominal assets, (ii) assets consisting solely of cash or cash equivalents, or (iii) assets consisting of any amount of cash and cash equivalents and nominal other assets. If you have any questions about this Legal Alert, please feel free to contact any of the attorneys listed under 'Related People/Contributors' or the Sutherland attorney with whom you regularly work. ATLANTA AUSTIN GENEVA HOUSTON LONDON NEW YORK SACRAMENTO WASHINGTON, DC Legal Alert: SEC Awards Whistleblower More Than $14 Million – Largest Award to Date October 4, 2013 Related People/Contributors In a press release issued on October 1, 2013, the U.S. Securities and Exchange Commission (SEC or Commission) announced its largest whistleblower award yet of $14 million. (Click here for the press release.) The recipient of the award is an individual whistleblower who reported information that led to a successful enforcement action for a potential violation of the federal securities laws and ultimately allowed the SEC to recover “substantial” investors’ funds. Because the whistleblower wanted to remain anonymous, the SEC did not disclose any additional information surrounding the grounds for the enforcement action. Although the details of the enforcement action were not disclosed, the Commission’s Order Determining Whistleblower Award Claim (Order) provides some insight into the basis for the size of the award. (Click here for the Order.) According to the Order, the expected dollar amount of the award will exceed $14 million “in light of the monetary sanctions already collected” and after “appropriately recogniz[ing] the significance of the information that the [whistleblower] provided to the Commission, the assistance the [whistleblower] provided in the Commission action, and the law enforcement interest in deterring violations by granting awards.”1 • • • • • • • • • • • Thomas R. Bundy, III Peter N. Farley Cynthia M. Krus Allegra J. Lawrence-Hardy Holly H. Smith W. Scott Sorrels John H. Walsh Gail L. Westover James J. Briody Lee A. Peifer Yvonne M. Williams-Wass To date, the SEC has awarded eligible whistleblowers $25,000 to $14 million as part of the incentivized Whistleblower Program. The recent $14 million award is the fifth award the Commission has awarded since the Whistleblower Program went into effect in July 2010 as part of the Dodd-Frank Wall Street Reform and Consumer Protection Act. Considering factors prescribed by law, the SEC sets whistleblower awards between 10% and 30% of the total monetary sanctions collected as the result of a successful enforcement action. Specific factors considered by the SEC include the significance of the information provided to the SEC, the extent of the whistleblower’s participation in an investigation and successful proceeding, law enforcement interest in deterring violations, and whether the whistleblower was a participant or culpable in the securities laws violations. Employers should know that an individual is eligible for an award under the Whistleblower Program only if the person “voluntarily provides [the SEC] with original information about a possible violation of the federal securities laws that has occurred, is ongoing, or is about to occur [and] [that] information. . . lead[s] to a successful SEC action resulting in an order of monetary sanctions exceeding $1 million.”2 The recent whistleblower award of $14 million should serve as a message to employers given the great monetary incentive driving the Whistleblower Program and possible sanctions that can result from a SEC investigation. Thus, employers subject to federal securities laws should be proactive and look to ATLANTA AUSTIN GENEVA HOUSTON LONDON NEW YORK SACRAMENTO WASHINGTON, DC Legal Alert: SEC Awards Whistleblower More Than $14 Million – Largest Award to Date continued develop appropriate internal reporting procedures. 1Whistleblower Award Proceeding, File No. 2013-4 (SEC Sept. 30, 2013), available at http://www.sec.gov/rules/other/2013/34-70554.pdf. 2SEC Office of the Whistleblower, Frequently Asked Questions and Answers (October 2, 2013), available at http://www.sec.gov/about/offices/owb/owb-faq.shtml#P2_764. If you have any questions about this Legal Alert, please feel free to contact any of the attorneys listed under Related People/Contributors or the Sutherland attorney with whom you regularly work. ATLANTA AUSTIN GENEVA HOUSTON LONDON NEW YORK SACRAMENTO WASHINGTON, DC 2014 BDC ROUNDTABLE BDC CCO COMPENSATION SURVEY RESULTS SUTHERLAND ASBILL & BRENNAN LLP www.sutherland.com BDCCCOCompensationSurvey Q1IsyourBDCinternallyorexternally managed? Answ ered:14 Skipped:0 Internally managed 6 Externally managed 8 0 3 6 9 Sutherland Asbill & Brennan LLP 12 15 BDCCCOCompensationSurvey Q2InadditiontotheChiefCompliance OfficertitlefortheBDC,whatother functionaltitledoestheCCOhold? (chooseallthatapply) Answ ered:14 Skipped:0 Chief Compliance Officerfor... 6 Chief Compliance Officerfor... 5 Chief Financial Officer 4 Chief Operating Officer Corporate Secretary 3 General Counsel 4 Other (please specify) 3 0 3 6 9 Sutherland Asbill & Brennan LLP 12 15 BDCCCOCompensationSurvey Q3IftheCCO'stimeisallocatedamong otherpositionsorentities,approximately whatpercentageofhis/hertimeis allocatedtotheBDCCCOfunction? Answ ered:14 Skipped:0 30.71 Percentage 0 50 Average Percent Allocation of Time to CCO Role Sutherland Asbill & Brennan LLP UNITED STATES SECURITIES AND EXCHANGE COMMISSION WASHINGTON, D.C. 20549 THE CHAIR October 21, 2013 The Honorable Scott Garrett Chairman Subcommittee on Capital Markets and Government Sponsored Enterprises U.S. House of Representatives Washington, DC 20515 The Honorable Carolyn Maloney Ranking Member Subcommittee on Capital Markets and Government Sponsored Enterprises U.S. House of Representatives Washington, DC 20515 Dear Chairman Garrett and Ranking Member Maloney: I understand that the Capital Markets Subcommittee of the House Financial Services Committee will be discussing at an upcoming legislative hearing three bills that would amend provisions of the Investment Company Act of 1940 (Act) concerning business development companies (BDCs): H.R. 31 (the Next Steps for Credit Availability Act); H.R. 1800 (the Small Business Credit Availability Act); and H.R. 1973 (the Business Development Company Modernization Act). I write to briefly provide background on BDCs and to draw your attention to certain features of these bills. Please note that the views expressed in this letter are my own and do not necessarily reflect the views of the full Commission or any Commissioner. As of June 30, 2013, there were 68 active BDCs with aggregate total assets of $53.7 billion. While BDCs account for a small percentage of the assets managed by all regulated investment companies, assets managed by BDCs have grown rapidly over the past decade from net assets ofjust $5 billion at the end of 2003. Much of this growth is from newly organized BDCs sponsored by large private capital managers. Most BDCs sell a fixed number of shares in periodic offerings and most (about 85%) provide investors with liquidity by listing their shares on a stock exchange. Significantly, most securities issued by BDCs, whether traded or not, are held by retail investors. Congress created BDCs in 1980 as a specialized type of closed-end investment company (i.e., a fund that is notrequired to repurchase or redeem its securities) whose principal activities consist of investing in, and providing managerial assistance to, small, growing, or financially troubled domestic businesses. To this end, the Act generally requires a BDC to invest at least 70% of its portfolio assets in cash (or high quality, short-term debt securities), securities issued by financially troubled businesses, orcertain securities issued by domestic companies that: • do not have a security listed on a national securities exchange (i.e., are private companies), or have a security listed on a national securities exchange but have less • than $250 million of common shares outstanding; are not investment companies; and The Honorable Scott Garrett The Honorable Carolyn Maloney Page 2 • would not be investment companies but for an exclusion from the definition of "investment company" in section 3(c) ofthe Act. The remaining 30% of a BDCs portfolio assets are not limited by these investment restrictions and can be invested freely. Under the Act, BDCs enjoy greater operating flexibility than mutual funds or other closed-end funds. A BDC, for example, may issue long term options and warrants, may issue multiple classes of debt securities, and may issue approximately 50% more debt securities as a percentageof capital than other investmentcompanies. As discussed below, H.R. 31 and H.R. 1800 would ease that regulatory structure by permitting a BDC to double its permitted borrowingsand issue an unlimited amount of preferred stock, thereby increasing the risk of loss from such leverage for BDC shareholders and holders of senior securities issued by BDCs. H.R. 31 and H.R. 1800 Both H.R. 31 and H.R. 1800 would amend section 61(a) of the Act to: (a) reduce the asset coverage for senior securities representing indebtedness from 200% to 150%; and (b) make inapplicable the 200% asset coverage requirement for senior securities that are stock, le.t preferred stock, and other provisions ofthe Act intended to protect holders ofpreferred stock.1 In my view, this increase in theability of BDCs to use leverage, and theelimination of provisions of the Actintended to protect holders of preferred stock issued by a BDC, gives rise to investor protection concerns, particularly because most BDC shareholders are retail investors. The Act's asset coverage requirements existfor the protection of both a BDCs shareholders on one hand and investors in its senior securities on the other.2 Leverage amplifies both negative and positive portfolio performance. As the percentage of a BDCs capital from senior securities increases, the greater is theamplification. Increased leverage increases earnings volatility. Atthe same time, the risk increases that the BDC will lack the resources to pay 1 Asset coverage is the ratio oftotal assets less liabilities other than senior securities to senior securities. The asset coverage requirement for senior securities issued by aBDC is 200%. For other closed-end funds, the asset coverage requirement is 300% for debt securities and 200% for preferred stock. An asset coverage of300% is approximately equivalent to adebt to equity ratio of1:2; an asset coverage of200% is approximately equivalent to adebt to equity ratio of 1:1. 2 When Congress enacted the Act, the highly capitalized and simplified capital structure that the Act imposes on investment companies was regarded as being ofcentral importance to the protection ofinvestors. Prior to 1940, the use ofexcessive leverage and complex capital structures by certain closed-end funds led to personal gain for insiders at the expense ofpublic security holders. In some instances, debt and preferred stock sold to the public accounted for adisproportionate amount ofafund's capital, but common stock concentrated in the hands ofinsiders controlled the fund. Although a fund's assets might be insufficient to liquidate the senior securities, insiders could induce the fund to pay distributions with respect to the common stock or repurchase common stock. See Investment Trusts and Investment Companies pt. 3, H.R. Doc. No. 279, 76th Cong., 1st Sess. 1001, 1582-97 (1939). In this regard, section 1(b) ofthe Act identifies "excessive borrowing and the issuance ofexcessive amounts ofsenior securities [i.e., preferred stock or debt securities]" as one ofthe principal abuses the Act was designed to address. The Honorable Scott Garrett The Honorable Carolyn Maloney Page 3 promised interest or dividends, or the principal or liquidation preference, to the holders of its senior securities. The risk that a BDC will be unable to make timely payments to senior security holders is, in my view, of particular concern in view ofthe illiquid types of investments that BDCs make. The asset coverage provisions act as a circuit breaker. If a BDCs asset coverage of its senior securities is less than 200% (after giving effect to the distribution, issuance or repurchase), the BDC may not make cash distributions to shareholders, issue additional senior securities, or repurchase common stock and must retain for the BDCs use cashthat the BDC otherwise would pay to its shareholders as distributions.3 Both H.R. 31 and H.R. 1800 would permit a BDC to significantly increase its leverage in two specific ways. First, the amendments to the Act proposed inthose bills would reduce the asset coverage requirement for debt securities to 150% from 200%, thereby increasing the debt to equity ratio from approximately 1:1 to 2:1. By way of example, under current law, a BDC with $100 in equity could borrow $100 (equal to $200 total assets). If that BDCs assets lost 50% oftheir value, its shareholders wouldexperience a total loss on their equity investment. Reducing the required asset coverage to 150% would permit the same BDC toborrow $200, effectively doubling its leverage. A BDCs assets would only have to lose 33 1/3% oftheir value before exposing shareholders to a total loss oftheir investment. Second, the proposed amendments would allow aBDC to issue an unlimited amount of preferred stock, effectively eliminating the Act's limitations on leverage. Because the proposed amendments would treat the issuance of preferred stock as the equivalent of the issuance of common stock for purposes ofcalculating asset coverage, aBDC could increase its leverage by issuing preferred stock and thereby actually increase its capacity for issuing additional debt securities. Both H.R. 31 and H.R. 1800 also would eliminate all ofthe provisions in the Act specifically intended to protect the holders ofpreferred stock issued by aBDC. A potential 3 Debt securities issued by aBDC also provide that if: (a) asset coverage declines to less than 100% for one year then the holders ofthose securities have the right toelect a majority ofthe BDCsdirectors; or(b) asset coverage declines to less than 100% for 24 consecutive months then a default shall be deemed tohave occurred. Failing to meet the asset coverage requirements, however, is not aviolation ofthe Act, and the BDC is not forced to sell assets. 4The Act provides that holders ofpreferred stock, voting separately as aclass, are entitled to: (a) elect at least two directors at all times; (b) elect amajority ofthe directors ifat any time dividends on the preferred stock have been in arrears for two full years; (c) approve or disapprove any plan ofreorganization adversely affecting their interests; and (d) approve or disapprove certain other major corporate events, such as converting to amutual fund format. These voting rights help balance the sometimes conflicting interests ofthe holders ofthe common stock and the holders ofthe preferred stock issued by the same fund. Under the Act, aBDC may not issue different classes of preferred stock, i.e., classes with different priorities as to the payment ofdividends or liquidation preference. In liquidation, ifthe value ofaBDCs assets is insufficient to satisfy the claims ofall security holders, holders ofa class with ahigher priority have aclear advantage. Absent liquidation, that priority can influence the market value ofasecurity, particularly during times when aparticular BDCs prospects dim. Retail investors might find ajunior class ofpreferred stock with ahigh dividend rate attractive but fail to appreciate the risks in the event that the BDC The Honorable Scott Garrett The Honorable Carolyn Maloney Page 4 consequence is the sale to retail investors of preferred stock with a confusing mix of characteristics and rights. Under the Act, for example, preferred stockhas "complete priority" over the common stock as to payment of dividends, and dividends are cumulative. This provision prohibitsthe sale of participating preferred stock or preferred stock that is preferred only as to assets in liquidation but not as to dividends. But for these provisions, holders of preferred stock could find that dividends not paid during lower earnings periods are never paid, even ifthe BDC subsequently prospers. The two bills also would: (a) amend section 60 of the Act to permit a BDC to purchase securities issued by registered investment advisers; and (b) direct the Commission to revise certain rules under the Securities Act of 1933 to put BDCs on parity with other issuers that are required to file certain reports under the SecuritiesExchangeAct of 1934. In my view, these provisions do not raise significant investor protection concerns. H.R. 1973 By amending the Act's definition of "eligible portfolio company" to include currently excluded financial institutions, H.R. 1973 would change the definition and stated purpose of BDCs. The Act defines "business development company" as a closed-end fund that is "operated for the purpose of making investments in securities" issued by small or financially distressed companies, generally companies that meet the Act'sdefinition of "eligible portfolio company." This definition requires that, with one exception,5 an eligible portfolio company be neither an investment company, as defined inAct, nor a company that is excluded from the definition of investment company solely by section 3(c) ofthe Act, i.e., financial institutions such as hedge funds, private equity funds, brokers and consumer finance companies. The Act, however, does not prohibit a BDC from investing infinancial institutions orother companies that are not eligible portfolio companies; under the Act, a BDC can invest up to 30% ofits portfolio in securities issued by these companies. The explicit exclusion ofinvestment companies and other financial institutions from the definition of"eligible portfolio company" was intended to encourage a BDC to focus its investment activities onoperating companies that directly produce goods orprovide services rather than on other financial institutions that serve primarily as conduits of capital. Congress created BDCs inresponse to"the slowing ofthe flow ofcapital to American enterprise, particularly to smaller, growing businesses."6 To the extent that aBDC concentrates its experiences financial reversals. ABDC in financial distress, for example, might eliminate dividend payments to holders ofajunior class ofpreferred stock but continue dividend payments to holders ofa senior class. 5 The one exception allows an eligible portfolio company to be asmall business investment company (SBIC) licensed by the Small Business Administration that is a wholly owned subsidiary ofa BDC. ASBIC makes investments that are consistent with the purpose of BDCs. 6 H.R. Rep. No. 1341,96th Cong., 2d Sess. 20 (1980). The House Report states that "[t]he importance ofthese businesses tothe American economic system interms ofinnovation, productivity, increased competition and the jobsthey create is,of course, critical." Id The Honorable Scott Garrett The Honorable Carolyn Maloney Page 5 investments in other financial institutions, it would divert capital from small, growing businesses that BDCs were originally created to help. While Congress obviously can choose to change the purpose of BDCs in this manner, of particular concern is the prospect of a BDC concentrating its investments in hedge and other private funds because of the riskier strategies associated with some of these funds. This raises potential investor protection concerns, as it would allow non-accredited investors to invest in a BDC comprised entirely of private funds. As such, BDCs could be used to circumvent the general prohibition on selling interests in private funds to retail investors. 1hope that this information is helpful to you and to the other members of the Subcommittee. Please do not hesitate to contact me at (202) 551-2010, or have your staff contact Tim Henseler, Director of the Office of Legislative and Intergovernmental Affairs, at (202) 5512015, if I can be of any further assistance. Sincerely, 'X-^toUr Mary Jo White Chair cc: Chairman Jeb Hensarling Ranking Member Maxine Waters IM Guidance Update September 2013 | No. 2013-07 business Development Companies—SEPARATE Financial Statements or Summarized Financial Information of Certain Subsidiaries Applicability of Regulation S-X Rules 3-09 and 4-08(g) to Business Development Companies (BDCs). In reviewing registration statements filed by BDCs, the staff has observed that some BDCs that have certain significant subsidiaries do not provide separate financial statements or summarized financial information for those subsidiaries as required by Regulation S-X. This written guidance reflects the comments that the staff has provided to these BDCs. The bases of the staff’s comments are Regulation S-X Rules 3-09 and 4-08(g), which apply to BDCs. Rule 3-09 describes, among other things, the circumstances under which separate financial statements of an unconsolidated majority-owned subsidiary are required to be filed. Rule 4-08(g) describes, among other things, the circumstances under which summarized financial information must be presented in the notes to the financial statements for subsidiaries not consolidated. BDCs register their securities under the Securities Act of 1933 on Form N-2. For purposes of Form N-2, “[a] business development company should comply with the provisions of Regulation S-X generally applicable to registered management investment com­panies. (See . . . Sections 210.6-01 through 210.6-10 of Regulation S-X . . .).” 1 Under Regulation S-X, in turn, “[t]he financial statements filed for persons to which [rules 6-01 to 6-10] are applicable shall be prepared in accordance with the . . . special rules [6-01 to 6-10] in addition to the general rules [1-01 to 4-10] (Articles 1, 2, 3, and 4). Where the requirements of a special rule differ from those prescribed in a general rule, the requirements of the special rule shall be met.” 2 Rules 3-09 and 4-08(g) apply to BDCs because they are general rules and there are no special rules in Rules 6-01 through 6-10 that differ from the requirements in Rules 3-09 and 4-08(g) related to whether, and for what periods, financial statements and financial information are required to be presented. Rule 4-08(g) generally requires registrants to present in the notes to their financial statements summarized financial information for all unconsolidated subsidiaries when any unconsolidated subsidiary, or combination of unconsolidated subsidiaries, meets the definition of a “significant subsidiary” in Regulation S-X Rule 1-02(w). If a BDC is required to present summarized financial information, the Division generally would not US Securities and Exchange Commission Division of Investment Management IM g u i d a n c e u p d a t e 2 object if the BDC presents summarized financial information in the notes to the financial statements only for each unconsolidated subsidiary which individually meets the definition of a “significant subsidiary” in Rule 1-02(w) but does not present summarized financial information in the notes to the financial statements for all unconsolidated subsidiaries. If a BDC believes the application of Rule 3-09 or Rule 4-08(g) results in the presentation of either financial statements or summarized financial information of an unconsolidated subsidiary that is not necessary to reasonably inform investors, the BDC should contact the Division’s Chief Accountant’s Office at 202-551-6918 or imoca@sec.gov. BDCs are also encouraged to contact the Division’s Chief Accountant’s Office with any other questions or concerns about the application of these requirements to their particular situations. Endnotes 1 Instruction 1.a to Item 8.6.c of Form N-2. 2 Regulation S-X Rule 6-03. This IM Guidance Update summarizes the views of the Division of Investment Management regarding various requirements of the federal securities laws. Future changes in laws or regulations may supersede some of the discussion or issues raised herein. This IM Guidance Update is not a rule, regulation or statement of the Commission, and the Commission has neither approved nor disapproved of this IM Guidance Update. The Investment Management Division works to: s protect investors s promote informed investment decisions and s facilitate appropriate innovation in investment products and services through regulating the asset management industry. If you have any questions about this IM Guidance Update, please contact: Chief Accountant’s Office Phone:202.551.6918 Email:IMOCA@sec.gov IM Guidance Update JUNE 2014 | No. 2014-09 BUSINESS DEVELOPMENT COMPANIES WITH WHOLLY-OWNED SBIC SUBSIDIARIES—ASSET COVERAGE REQUIREMENTS The Commission has, from time to time, issued exemptive orders to business development companies (“BDCs”)1 granting limited relief from the asset coverage requirements of sections 18(a) and 61(a) of the 1940 Act.2 Subject to representations and a condition described in the exemptive applications, this relief permits a BDC to treat certain indebtedness issued by its wholly owned subsidiary operating as a small business investment company (“SBIC Subsidiary”) as indebtedness not represented by senior securities for purposes of determining the BDC’s consolidated asset coverage.3 Recently, the staff has become aware that certain BDCs have sought to rely on this limited relief in connection with SBICs that have not issued indebtedness that is held or guaranteed by the Small Business Administration (“SBA”). As discussed further below, the staff does not believe that reliance on the relief for this purpose is consistent with the representations historically included in the exemptive applications. In addition, to make explicit this existing requirement under the orders, the staff requests that all new applications include a modified condition, as described below. Background Section 18(a)(1) of the 1940 Act prohibits a registered closed-end company from issuing any class of senior security representing indebtedness unless the company complies with the asset coverage requirements set forth in that section.4 Section 61(a) of the 1940 Act makes section 18(a) applicable to BDCs, with certain modifications. A BDC may be deemed an indirect issuer of any class of senior security issued by its direct or indirect wholly owned SBIC Subsidiary. As a result, absent exemptive relief, the BDC would also be required to comply with the asset coverage requirements on a consolidated basis, meaning that it would treat as its own the assets and liabilities of its SBIC Subsidiary for purposes of calculating the BDC’s asset coverage.5 US Securities and Exchange Commission Division of Investment Management I M G U I D A N C E U P D AT E 2 The Commission has issued a number of exemptive orders to BDCs granting limited relief from the asset coverage requirements. This relief allows the BDCs to treat certain indebtedness issued by their wholly owned SBIC Subsidiaries as indebtedness not represented by senior securities for purposes of determining the BDC’s consolidated asset coverage. For purposes of the asset coverage calculation, this indebtedness is deducted from the BDC’s total assets and is also excluded from the amount of senior securities representing indebtedness. In support of the request for relief, applicants represent that companies operating under the SBIA, such as the SBIC Subsidiaries, are subject to the SBA’s separate regulation of permissible leverage in their capital structure. Applicants also point to section 18(k) of the 1940 Act, which exempts investment companies operating as SBICs from the asset coverage requirements contained in sections 18(a)(1)(A) and (B) for senior securities representing indebtedness. Applicants contend that because an SBIC Subsidiary would be entitled to rely on section 18(k) if it were a BDC, there is no policy reason to deny the benefit of that exemption to the BDC parent. Existing Orders Existing orders are subject to several representations and a condition described in the exemptive applications. Although in most cases the representations and condition have not explicitly required that the SBIC Subsidiary have issued indebtedness held or guaranteed by the SBA, we believe this requirement is implicit in the rationale for the relief. Specifically, the relief is premised on the SBA’s separate oversight of the SBIC Subsidiary’s indebtedness rendering application of the 1940 Act’s asset coverage requirements unnecessary. However, if the SBIC Subsidiary has not issued indebtedness such that the SBIC Subsidiary is fully subject to that oversight, the application of the 1940 Act’s requirements is not duplicative. Accordingly, where an SBIC Subsidiary has not issued indebtedness that is held or guaranteed by the SBA, the staff does not believe that reliance on the order would be consistent with the representations made in the existing exemptive applications. Potential Applicants for Orders To make explicit this existing requirement under the orders, the staff requests that all new applications include a modified condition. Specifically, the condition should provide that any senior securities representing indebtedness of an SBIC Subsidiary will not be considered senior securities and, for purposes of the definition of “asset coverage” in section 18(h), will be treated as indebtedness not represented by senior securities but only if that SBIC Subsidiary has issued indebtedness that is held or guaranteed by the SBA.6 I M G U I D A N C E U P D AT E 3 Endnotes 1 Section 2(a)(48) of the 1940 Act defines a BDC to be any closed-end investment company that, among other things, is operated for the purpose of making investments in securities described in sections 55(a)(1) through 55(a)(3) of the 1940 Act and makes available significant managerial assistance with respect to the issuers of such securities. 2 For examples of this type of relief, see In the Matter of Medley Capital Corporation, et al., Investment Company Act Release Nos. (30234) (Oct. 16, 2012) (notice) and (30262) (Nov. 14, 2012) (order) and In the Matter of Saratoga Investment Corporation, et al., Investment Company Act Release Nos. (30145) (July 23, 2012) (notice) and (30171) (Aug. 20, 2012) (order). 3 A “small business investment company” or “SBIC” is a company that is licensed by the Small Business Administration (“SBA”) to operate as such under the Small Business Investment Act of 1958 (“SBIA”). 4 Section 18(g) of the 1940 Act provides, in relevant part, that “‘Senior security’ means any bond, debenture, note, or similar obligation or instrument constituting a security and evidencing indebtedness, and any stock of a class having priority over any other class as to distribution of assets or payment of dividends; and ‘senior security representing indebtedness’ means any senior security other than stock.” 5 Section 18(h) of the 1940 Act provides, in relevant part, that, “‘Asset coverage’ of a class of senior security representing an indebtedness of an issuer means the ratio which the value of the total assets of such issuer, less all liabilities and indebtedness not represented by senior securities, bears to the aggregate amount of senior securities representing indebtedness of such issuer.” 6 See In the Matter of OFS Capital Corporation, et al., Investment Company Act Release Nos. (30771) (Oct. 30, 2013) (notice) and (30812) (Nov. 26, 2013) (order). I M G U I D A N C E U P D AT E This IM Guidance Update summarizes the views of the Division of Investment Management regarding various requirements of the federal securities laws. Future changes in laws or regulations may supersede some of the discussion or issues raised herein. This IM Guidance Update is not a rule, regulation or statement of the Commission, and the Commission has neither approved nor disapproved of this IM Guidance Update. The Investment Management Division works to: s protect investors s promote informed investment decisions and s facilitate appropriate innovation in investment products and services through regulating the asset management industry. If you have any questions about this IM Guidance Update, please contact: Chief Counsel’s Office Phone: 202.551.6825 Email: IMOCC@sec.gov 4 IM Guidance Update March 2014 | No. 2014-04 GUIDANCE ON THE TESTIMONIAL RULE AND SOCIAL MEDIA From time to time, we have been asked questions concerning the nature, scope and application of the rule that prohibits investment advisers from using testimonials in their advertisements. In addition, in the past several years, we have been asked a number of questions concerning investment advisers’ use of social media. We are now providing this guidance concerning registered investment advisers’ use of social media and their publication1 of advertisements that feature public commentary about them that appears on independent, third-party social media sites.2 We understand that use of social media has increased the demand by consumers for independent, third-party commentary or review of any manner of service providers, including investment advisers. We recognize that social media has facilitated consumers’ ability to research and conduct their own due diligence on current or prospective service providers. Through this guidance, we seek to clarify application of the testimonial rule as it relates to the dissemination of genuine third-party commentary that could be useful to consumers. Specifically, we seek through this guidance to assist firms in applying section 206(4) of the Investment Advisers Act of 1940 (“Advisers Act”) and rule 206(4)-1(a)(1) thereunder (“testimonial rule”) to their use of social media.3 The guidance, in the form of questions and answers, also seeks to assist investment advisers in developing compliance policies and procedures reasonably designed to address participation in this evolving technology, specifically with respect to the publication of any public commentary that is a testimonial. Consistent with previous staff guidance, we believe that in certain circumstances, as described below, an investment adviser’s or investment advisory representative’s (“IAR’s”) publication of all of the testimonials about the investment adviser or IAR from an independent social media site on the investment adviser’s or IAR’s own social media site or website would not implicate the concern underlying the testimonial rule.4 US Securities and Exchange Commission Division of Investment Management I M G U I D A N C E U P D AT E 2 BACKGROUND Section 206(4) generally prohibits any investment adviser from engaging in any act, practice or course of business that the Commission, by rule, defines as fraudulent, deceptive or manipulative. In particular, rule 206(4)-1(a)(1) states that: [i]t shall constitute a fraudulent, deceptive, or manipulative act, practice, or course of business . . . for any investment adviser registered or required to be registered under [the Advisers Act], directly or indirectly, to publish, circulate, or distribute any advertisement which refers, directly or indirectly, to any testimonial of any kind concerning the investment adviser or concerning any advice, analysis, report or other service rendered by such investment adviser. Rule 206(4)-1(a)(1) was designed to address the nature of testimonials when used in investment advisory advertisements. When it adopted the rule, the Commission stated that, in the context of investment advisers, it found “. . . such advertisements are misleading; by their very nature they emphasize the comments and activities favorable to the investment adviser and ignore those which are unfavorable.” 5 The staff has stated that the rule forbids the use of a testimonial by an investment adviser in advertisements “because the testimonial may give rise to a fraudulent or deceptive implication, or mistaken inference, that the experience of the person giving the testimonial is typical of the experience of the adviser’s clients.”6 Whether public commentary on a social media site is a testimonial depends upon all of the facts and circumstances relating to the statement. The term “testimonial” is not defined in the rule, but the staff has consistently interpreted that term to include a “statement of a client’s experience with, or endorsement of, an investment adviser.” 7 Depending on the facts and circumstances, public commentary made directly by a client about his or her own experience with, or endorsement of, an investment adviser or a statement made by a third party about a client’s experience with, or endorsement of, an investment adviser may be a testimonial.8 The staff also has stated that an investment adviser’s publication of an article by an unbiased third party regarding the adviser’s investment performance is not a testimonial, unless it includes a statement of a client’s experience with or endorsement of the adviser. 9 The staff also has stated that an adviser’s advertisement that includes a partial client list that does no more than identify certain clients of the adviser cannot be viewed either as a statement of a client’s experience with, or endorsement of, the adviser and therefore is not a testimonial.10 Such an advertisement could nonetheless violate section 206(4) and rule 206(4)-1(a)(5) if the advertisement is false or misleading.11 I M G U I D A N C E U P D AT E 3 The staff no longer takes the position, as it did a number of years ago, that an advertisement that contains non-investment related commentary regarding an IAR, such as regarding an IAR’s religious affiliation or community service, may be deemed a testimonial violative of rule 206(4)-1(a)(1).12 The following questions and answers are intended to provide more guidance. Third-party commentary Q1. May an investment adviser or IAR publish public commentary that is an explicit or implicit statement of a client’s experience with or endorsement of the investment adviser or IAR on the investment adviser’s or IAR’s social media site? A1. Generally, staff believes that such public commentary would be a testimonial within the meaning of rule 206(4)-1(a)(1) and its use in an advertisement by an investment adviser or IAR would therefore be prohibited. • For example, if an investment adviser or IAR invited clients to post such public commentary directly on the investment adviser’s own internet site, blog or social media site that served as an advertisement for the investment adviser or IAR’s advisory services, such testimonials would not be permissible. Q2.May an investment adviser or IAR publish the same public commentary on its own internet or social media site if it comes from an independent social media site? A2.When an investment adviser or IAR has no ability to affect which public commentary is included or how the public commentary is presented on an independent social media site; where the commentators’ ability to include the public commentary is not restricted;13 and where the independent social media site allows for the viewing of all public commentary and updating of new commentary on a real-time basis, the concerns underlying the testimonial prohibition may not be implicated. As described in more depth below, publication of public commentary from an independent social media site would not raise any of the dangers that rule 206(4)-1(a) (1) was designed to prevent if: • the independent social media site provides content that is independent of the investment adviser or IAR; • there is no material connection between the independent social media site and the investment adviser or IAR that would call into question the independence of the independent social media site or commentary; and I M G U I D A N C E U P D AT E • 4 the investment adviser or IAR publishes all of the unedited comments appearing on the independent social media site regarding the investment adviser or IAR.14 Under these circumstances, an investment adviser or IAR may include such public commentary in an advertisement without implicating the concerns underlying the testimonial rule. If, however, the investment adviser or IAR drafts or submits commentary that is included on the independent social media site, the testimonial rule generally would be implicated. Also, if the investment adviser or IAR is allowed to suppress the publication of all or a portion of the commentary, edit the commentary or is able to organize or prioritize the order in which the commentary is presented, the testimonial rule generally would be implicated. Q3.What content is not independent of an investment adviser or IAR and what is a material connection that would call into question the independence of a site or commentary? A3.Commentary would not be independent of an investment adviser or IAR if the investment adviser or IAR directly or indirectly authored the commentary on the independent social media site, whether in their own name, a third party’s name, or an alias, assumed or screen name. An investment adviser or IAR would have a material connection with a site or commentary that would call into question the independence of the site or commentary if, for example, the investment adviser or IAR: (1) compensated a social media user for authoring the commentary, including with any product or service of value; or (2) prioritized, removed or edited the commentary.15 • For example, an investment adviser could not have a supervised person submit testimonials about the investment adviser on an independent social media site and use such testimonials in advertisements without implicating the testimonial rule. • An investment adviser or IAR could not compensate a client or prospective client (including with discounts or offers of free services) to post commentary on an independent social media site and use such testimonials in advertisements without implicating the testimonial rule. Q4.May an investment adviser or IAR publish testimonials from an independent social media site in a way that allows social media users to sort the criteria? I M G U I D A N C E U P D AT E 5 A4.An investment adviser or IAR’s publication of testimonials from an independent social media site that directly or indirectly emphasizes commentary favorable to the investment adviser or IAR or de-emphasizes commentary unfavorable to the investment adviser or IAR would implicate the prohibition on testimonials. The investment adviser may publish only the totality of the testimonials from an independent social media site and may not highlight or give prominence to a subset of the testimonials. • Investment adviser or IAR sites may publish the testimonials from an independent social media site in a content-neutral manner, such as by chronological or alphabetical order, which presents positive and negative commentary with equal prominence. • Social media users, however, are free to personally display the commentary and sort by any criteria, including by the lowest or highest rating. Investment adviser and IAR sites may facilitate a user’s viewing of the commentary by providing a sorting mechanism as long as the investment adviser or IAR site does not itself sort the commentary. Q5.May an investment adviser or IAR publish testimonials from an independent social media site that includes a mathematical average of the public commentary? A5.Publication by an investment adviser or IAR of such testimonials from an independent social media site would not raise any of the dangers that rule 206(4)-1(a) (1) was designed to prevent if the independent social media site were designed to make it equally easy for the public to provide negative or positive commentary about an investment adviser or IAR. • Investment advisers or IARs could publish testimonials from an independent social media site that include a mathematical average of the commentary provided that commenters themselves rate the investment advisers or IARs based on a ratings system that is not designed to elicit any pre-determined results that could benefit any investment adviser or IAR. • The independent social media site, the investment adviser and the IAR may not provide a subjective analysis of the commentary.16 Inclusion of on Investment Adviser Advertisements on Independent Social Media Site Q6.May an investment adviser or IAR publish public commentary from an independent site if that site also features the investment adviser or IAR’s advertising? I M G U I D A N C E U P D AT E 6 A6.The existence of an investment adviser or IAR’s advertisement within the architecture of an independent site that also contains independent public commentary does not, in combination, create a prohibited testimonial or otherwise make the advertisement false or misleading, provided that the investment adviser complies with the material connection and independence factors described above and provided that the advertisement is easily recognizable to the public as a sponsored statement. • In other words, an advertisement would not cause the investment adviser or IAR’s publication of the independent social media site’s commentary to violate rule 206(4)-1 where (1) it would be readily apparent to a reader that the investment adviser or IAR’s advertisement is separate from the public commentary featured on the independent social media site and (2) the receipt or non-receipt of advertising revenue did not in any way influence which public commentary is included or excluded from the independent social media site. Reference to Independent Social Media Site Commentary Investment Adviser Non-Social Media Advertisements Q7. May an investment adviser or IAR refer to public commentary from an independent social media site on non-social media advertisements (e.g., newspaper, radio, television)? A7. An investment adviser or IAR could reference the fact that public commentary regarding the investment adviser or IAR may be found on an independent social media site, and may include the logo of the independent social media site on its non-social media advertisements, without implicating the testimonial rule. • For example, an IAR could state in its newspaper ad “see us on [independent social media site],” to signal to clients and prospective clients that they can research public commentary about the investment adviser or IAR on an independent social media site. • In contrast, an investment adviser or IAR may not publish any testimonials from the independent social media site on the newspaper ad without implicating the testimonial rule.17 Client lists Q8.Would a list or photographs of “friends” “or “contacts” on an investment adviser or IAR’s social media site that is viewable by the general public be considered a testimonial or otherwise violate section 206(4) or rule 206(4)-1? I M G U I D A N C E U P D AT E 7 A8.It is common on social media sites to include a communal listing of contacts or friends. The staff has stated that an advertisement that contains a partial client list that does no more than identify certain clients of the adviser cannot be viewed either as a statement of a client’s experience with, or endorsement of, the investment adviser, and therefore is not a testimonial.18 Such an advertisement, however, could be false or misleading under rule 206(4)-1(a)(5) depending on the facts and circumstances. • If the contacts or friends are not grouped or listed so as to be identified as current or past clients of an IAR, but are simply listed by the social media site as accepted contacts or friends of the IAR in the ordinary course, such a listing of contacts or friends generally would not be considered to be in violation of rule 206(4)-1(a)(1). • However, if an IAR attempts to create the inference that the contacts or friends have experienced favorable results from the IAR’s investment advisory services, the advertisement could be considered to be in violation of section 206(4) and rule 206(4)-1. Fan/Community Pages Q9.Individuals unconnected with a particular investment adviser or IAR may establish “community” or “fan” or other third-party sites where the public may comment on a myriad of investment topics, along with commentary regarding an investment adviser firm or individual IARs. Do such sites raise concerns under rule 206(4)-1? A9. In the ordinary course, a third party’s creation and operation of unconnected community or fan pages generally would not implicate rule 206(4)-1. We strongly caution investment advisers and supervised persons when publishing content from or driving user traffic to such sites (including through hyperlinks to such sites), particularly if the site does not meet the material connection and independence conditions described above. The Commission has stated that: any SEC-registered investment adviser (or investment adviser that is required to be SEC registered) that includes, in its web site or in other electronic communications, a hyperlink to postings on third-party web sites, should carefully consider the applicability of the advertising provisions of the [Advisers Act]. Under the Advisers Act, it is a fraudulent act for an investment adviser to, among other things, refer to testimonials in its advertisements.19 I M G U I D A N C E U P D AT E 8 Endnotes 1 For purposes of this guidance, “publication” refers to any form of real-time broadcast through social media or the Internet whether by hyperlinking, posting, livestreaming, tweeting, or forwarding or any similar public dissemination and, does not relate to advertisements on non-Internet or non-social media sites, such as paper, television or radio. Social media allows for instantaneous updating of posted commentary and concurrent viewing of all of the comment history; in contrast, paper, television and radio are static media that reflect public commentary at a particular point in time and are limited media that would typically not reproduce all of the available public commentary simultaneously (often due to cost, space and other considerations). 2 As used herein, “independent social media sites” refers specifically to third-party social media sites that predominantly host user opinions, beliefs, findings or experiences about service providers, including investment advisory representatives or investment advisers (e.g., Angie’s List). An investment adviser’s or IAR’s own social media profile or account that is used for business purposes is not an “independent social media site.” 3This IM Guidance Update only addresses the use by a firm or IARs of social media sites for business purposes. This Update does not address the use by individuals of social media sites for purely personal reasons. This Update does not seek to address any obligations under state law of social media for business use. In addition, this guidance does not seek to address the use of social media sites by broker-dealers. 4 Any such advertisements also must comply with rule 206(4)-1(a)(5). 5 Investment Advisers Act Rel. No. 121 (Nov. 2, 1961) (adopting rule 206(4)-1). 6 See Richard Silverman, Staff No-Action Letter (pub. avail. March 27, 1985). 7 See Cambiar Investors, Inc., Staff No-Action Letter (pub. avail. Aug. 28, 1997) (“Cambiar”). 8 See DALBAR, Inc., Staff No-Action letter (pub. avail. March 24, 1998) (“DALBAR”). 9 See New York Investors Group, Inc., Staff No-Action Letter (pub. avail. Sept. 7, 1982); Stalker Advisory Services, Staff No-Action Letter (pub. avail. Feb. 14, 1994). See also Kurtz Capital Management, Staff No-Action Letter (pub. avail. Jan. 22, 1988). 10 See Cambiar, supra note 7. 11 Id. (“For example, the inclusion of a partial client list in an adviser’s advertisement has the potential to mislead investors if the clients on the list are selected on the basis of performance and this selection bias is not adequately disclosed. A list that includes only advisory clients who have experienced above-average performance could lead an investor who contacts the clients for references to infer something about the adviser’s competence or about the possibility of enjoying a similar investment experience that the investor might not have inferred if criteria unrelated to the client’s performance had been used to select the clients on the list or if the selection bias was fully and fairly disclosed.”). I M G U I D A N C E U P D AT E 9 12 See Dan Gallagher, Staff No-Action Letter (pub. avail. July 10, 1995). Advisers that publish advertisements regarding non-investment related commentary remain subject to the fiduciary responsibilities imposed by section 206(1) and (2) of the Advisers Act. Thus an adviser cannot use social media to perpetrate affinity frauds, which are investment scams that prey upon members of identifiable groups, such as religious or ethnic communities, the elderly, or professional groups. Affinity frauds can target any group of people who take pride in their shared characteristics, whether they are religious, ethnic, or professional. See http://www.sec.gov/investor/ pubs/affinity.htm. 13 Some independent social media sites may have member fees or subscriptions payable by users. An investment adviser or IAR’s publication of public commentary from a site that charges member or subscription fees to public users would not call into question the independence of the independent social media site for purposes of our views herein. 14 Independent social media sites may have editorial policies that edit or remove public commentary violative of the site’s own published content guidelines (e.g., prohibiting defamatory statements; threatening language; materials that infringe on intellectual property rights; materials that contain viruses, spam or other harmful components; racially offensive statements or profanity). An investment adviser or IAR’s publication of public commentary that has been edited according to such an editorial policy would not call into question the independence of the independent social media site for purposes of the staff’s views herein. 15 As explained in Q6 below, any arrangement whereby the investment adviser or IAR compensated the independent social media site, including with advertising or other revenue, in order to publish or suppress the publication of anything less than the totality of the public commentary submitted could render any use by the IAR or investment adviser on its social media site violative of the prohibition on testimonials. 16 See DALBAR, supra note 8. 17 See supra note 1. 18 See Cambiar, supra note 7. 19 See Commission Guidance on the Use of Company Websites at note 83, Investment Company Act Rel. No. 28351 (Aug. 1, 2008). See also SEC Interpretation: Use of Electronic Media, Investment Company Act Rel. No. 24426 (May 4, 2000). I M G U I D A N C E U P D AT E This IM Guidance Update summarizes the views of the Division of Investment Management regarding various requirements of the federal securities laws. Future changes in laws or regulations may supersede some of the discussion or issues raised herein. This IM Guidance Update is not a rule, regulation or statement of the Commission, and the Commission has neither approved nor disapproved of this IM Guidance Update. The Investment Management Division works to: s protect investors s promote informed investment decisions and s facilitate appropriate innovation in investment products and services through regulating the asset management industry. If you have any questions about this IM Guidance Update, please contact: Catherine Courtney Gordon Chief Counsel’s Office/Public Inquiry Phone:202.551.6825 Email:IMOCC@sec.gov 10 Investor Alert: Social Media and Investing -- Stock Rumors Search July 25, 2014 The U.S. Securities and Exchange Commission’s (SEC) Office of Investor Education and Advocacy (“OIEA”) is issuing this Investor Alert to warn investors about fraudsters who may attempt to manipulate share prices by using social media to spread false or misleading information about stocks. Social media and the Internet in general have become important tools for investors. Investors may use social media to research particular stocks, look up background information on a broker-dealer or investment adviser, find guidance on investing strategies, receive up-to-date news, and discuss the markets with others. While social media can provide many benefits for investors, it also presents opportunities for fraudsters. Through social media, fraudsters can spread false or misleading information about a stock to large numbers of people with minimum effort and at a relatively low cost. They can also conceal their true identities by acting anonymously or even impersonating credible sources of market information. One way fraudsters may exploit social media is to engage in a market manipulation, such as spreading false and misleading information about a company to affect the stock’s share price. Wrongdoers may perpetuate stock rumors on social media, as well as on online bulletin boards and in Internet chat rooms. The false or misleading rumors may be positive or negative. For example, in a “pump-and-dump” scheme, promoters “pump” up the stock price by spreading positive rumors that incite a buying frenzy and they quickly “dump” their own shares before the hype ends. Typically, after the promoters profit from their sales, the stock price drops and the remaining investors lose money. In other instances, fraudsters start negative rumors urging investors to sell their shares so that the stock price plummets and the fraudsters take advantage of buying shares at the artificially low price. SEC Enforcement Action Involving Social Media and Market Manipulation The SEC has charged individuals for committing securities fraud through the use of social media. In SEC v. McKeown and Ryan, the SEC obtained judgments against a Canadian couple who used their website (PennyStockChaser), Facebook, and Twitter to pump up the stock of microcap companies, and then profited by selling shares of those companies. The couple allegedly received millions of shares of these companies as compensation and sold the shares around the time that their website predicted the stock price would massively increase (a practice known as “scalping”). The SEC’s complaint alleged that the couple did not fully disclose the compensation they received for touting the stocks. The court ordered the couple and their companies to pay more than $3.7 million in disgorgement for profits gained as a result of the alleged conduct, and ordered the couple to pay $300,000 in civil penalties. Investors should be aware that fraudsters may use social media to impersonate an established source of market information. For example, fraudsters may set up an account name, profile, or handle designed to mimic a particular company or securities research firm. They may go so far as to create a webpage that uses the company’s logo, links to the company’s actual website, or references the name of an actual person who works for the company. When you receive investment information through social media, verify the identity of the underlying source. Look for slight variations or typos in the sender’s account name, profile, email address, screen name, or handle, or other signs that the sender may be an imposter. Determine whether information appearing to be from a particular company or securities research firm is authentic. When contacting a company or attempting to access its website, be sure to use contact information or the website address provided by the company itself, such as in the company’s SEC filings. Carefully type the website’s address into the address bar of your web browser. Some social media operators have systems that may help you to determine whether or not a sender is genuine. For example, Twitter verifies accounts for authenticity by posting a blue verified badge (a solid blue circle containing a white checkmark) on Twitter profiles. While a verified account does not guarantee that the source is genuine, be more skeptical of information from accounts that are not verified. Think twice about investing if you spot any of these red flags of investment fraud: Limited history of posts. Fraudsters can set up new accounts specifically designed to carry out their scam while concealing their true identities. Be skeptical of information from social media accounts that lack a history of prior postings or sending messages. Pressure to buy or sell RIGHT NOW. Take the time to research the stock before you invest. Be skeptical of messages urging you to buy a hot stock before you “miss out” or to sell shares of a stock you own before the price goes down after negative news is announced. Be especially wary if the promoter claims the recommendation is based on “inside” or confidential information. Unsolicited investment information or offers. Fraudsters may look for victims on social media sites, chat rooms, and bulletin boards. Exercise extreme caution regarding information provided in new posts on your wall, tweets, direct messages, e-mails, or other communications that solicit an investment or provide information about a particular stock if you do not personally know the sender (even if the sender appears connected to someone you know). Unlicensed sellers. Federal and state securities laws require investment professionals and their firms who offer and sell investments to be licensed or registered. Many fraudulent investment schemes involve unlicensed individuals or unregistered firms. Check license and registration status by searching the SEC’s Investment Adviser Public Disclosure (IAPD) website or the Financial Industry Regulatory Authority (FINRA)’s BrokerCheck website. Investors who learn of investing opportunities from social media should always be on the lookout for fraud. If you are aware of possible securities fraud, including potential market manipulation, submit a tip or complaint to the SEC. To report a problem or to ask a question, submit a complaint or question to the SEC or call the SEC’s tollfree investor assistance line at (800) 732-0330 (dial 1-202-551-6551 if calling from outside of the United States). Additional Resources: Investor Alert: Investment Newsletters Used as Tools for Fraud Investor Alert: Don’t Trade on Pump-And-Dump Stock Emails Investor Alert: Social Media and Investing – Avoiding Fraud Investor Alert: Social Media and Investing – Understanding Your Accounts NASAA.org: Informed Investor Advisory: Social Networking Receive the latest Investor Alerts and Bulletins from OIEA by email or RSS feed. Visit Investor.gov, the SEC’s website for individual investors. Like OIEA on Facebook at www.facebook.com/secinvestoreducation. Follow OIEA on Twitter @SEC_Investor_Ed. Boards of Directors, Corporate Governance and Cyber-Risks: Sharpening the Focus Search Commissioner Luis A. Aguilar "Cyber Risks and the Boardroom" Conference New York Stock Exchange New York, NY June 10, 2014 Good afternoon. Thank you for that kind introduction. I am glad to be back at the New York Stock Exchange. In anticipating today’s conference, I thought back to an earlier trip to the NYSE where in April 2009, I had the opportunity to ring the closing bell. Before I begin my remarks, let me issue the standard disclaimer that the views I express today are my own, and do not necessarily reflect the views of the U.S. Securities and Exchange Commission (“SEC” or “Commission”), my fellow Commissioners, or members of the staff. I am pleased to be here and to have the opportunity to speak about cyber-risks and the boardroom, a topic that is both timely and extremely important. Over just a relatively short period of time, cybersecurity has become a top concern of American companies, financial institutions, law enforcement, and many regulators. [1] I suspect that not too long ago, we would have been hard-pressed to find many individuals who had even heard of cybersecurity, let alone known what it meant. Yet, in the past few years, there can be no doubt that the focus on this issue has dramatically increased.[2] Cybersecurity has become an important topic in both the private and public sectors, and for good reason. Law enforcement and financial regulators have stated publicly that cyber-attacks are becoming both more frequent and more sophisticated.[3] Indeed, according to one survey, U.S. companies experienced a 42% increase between 2011 and 2012 in the number of successful cyber-attacks they experienced per week.[4] As I am sure you have heard, recently there have also been a series of well-publicized cyber-attacks that have generated considerable media attention and raised public awareness of this issue. A few of the more well-known examples include: The October 2013 cyber-attack on the software company Adobe Systems, Inc., in which data from more than 38 million customer accounts was obtained improperly;[5] The December 2013 cyber-attack on Target Corporation, in which the payment card data of approximately 40 million Target customers and the personal data of up to 70 million Target customers was accessed without authorization;[6] The January 2014 cyber-attack on Snapchat, a mobile messaging service, in which a reported 4.6 million user names and phone numbers were exposed;[7] The sustained and repeated cyber-attacks against several large U.S. banks, in which their public websites have been knocked offline for hours at a time;[8] and The numerous cyber-attacks on the infrastructure underlying the capital markets, including quite a few on securities exchanges.[9] In addition to becoming more frequent, there are reports indicating that cyber-attacks have become increasingly costly to companies that are attacked. According to one 2013 survey, the average annualized cost of cyber-crime to a sample of U.S. companies was $11.6 million per year, representing a 78% increase since 2009.[10] In addition, the aftermath of the 2013 Target data breach demonstrates that the impact of cyber-attacks may extend far beyond the direct costs associated with the immediate response to an attack. [11] Beyond the unacceptable damage to consumers, these secondary effects include reputational harm that significantly affects a company’s bottom line. In sum, the capital markets and their critical participants, including public companies, are under a continuous and serious threat of cyber-attack, and this threat cannot be ignored.[12] As an SEC Commissioner, the threats are a particular concern because of the widespread and severe impact that cyber-attacks could have on the integrity of the capital markets infrastructure and on public companies and investors.[13] The concern is not new. For example, in 2011, staff in the SEC’s Division of Corporation Finance issued guidance to public companies regarding their disclosure obligations with respect to cybersecurity risks and cyber-incidents.[14] More recently, because of the escalation of cyber-attacks, I helped organize the Commission’s March 26, 2014 roundtable to discuss the cyber-risks facing public companies and critical market participants like exchanges, broker-dealers, and transfer agents.[15] Today, I would like to focus my remarks on what boards of directors can, and should, do to ensure that their organizations are appropriately considering and addressing cyber-risks. Effective board oversight of management’s efforts to address these issues is critical to preventing and effectively responding to successful cyber-attacks and, ultimately, to protecting companies and their consumers, as well as protecting investors and the integrity of the capital markets. The Role of the Boards of Directors in Overseeing Cyber-Risk Management Background on the Role of Boards of Directors When considering the board’s role in addressing cybersecurity issues, it is useful to keep in mind the broad duties that the board owes to the corporation and, more specifically, the board’s role in corporate governance and overseeing risk management. It has long been the accepted model, both here and around the world, that corporations are managed under the direction of their boards of directors.[16] This model arises from a central tenet of the modern corporation — the separation of ownership and control of the corporation. Under this structure, those who manage a corporation must answer to the true owners of the company — the shareholders. It would be neither possible nor desirable, however, for the many, widely-dispersed shareholders of any public company to come together and manage, or direct the management of, that company’s business and affairs. Clearly, effective full-time management is essential for public companies to function. But management without accountability can lead to self-interested decision-making that may not benefit the company or its shareholders. As a result, shareholders elect a board of directors to represent their interests, and, in turn, the board of directors, through effective corporate governance, makes sure that management effectively serves the corporation and its shareholders.[17] Corporate Boards and Risk Management Generally Although boards have long been responsible for overseeing multiple aspects of management’s activities, since the financial crisis, there has been an increased focus on what boards of directors are doing to address risk management.[18] Indeed, many have noted that, leading up to the financial crisis, boards of directors may not have been doing enough to oversee risk management within their companies, and that this failure contributed to the unreasonably risky behavior that resulted in the destruction of untold billions in shareholder value and plunged the country and the global economy into recession.[19] Although primary responsibility for risk management has historically belonged to management, the boards are responsible for overseeing that the corporation has established appropriate risk management programs and for overseeing how management implements those programs.[20] The importance of this oversight was highlighted when, in 2009, the Commission amended its rules to require disclosure about, among other things, the board’s role in risk oversight, including a description of whether and how the board administers its oversight function, such as through the whole board, a separate risk committee, or the audit committee.[21] The Commission did not mandate any particular structure, but noted that “risk oversight is a key competence of the board” and that “disclosure about the board’s involvement in the oversight of the risk management process should provide important information to investors about how a company perceives the role of its board and the relationship between the board and senior management in managing the material risks facing the company.”[22] The evidence suggests that boards of directors have begun to assume greater responsibility for overseeing the risk management efforts of their companies.[23] For example, according to a recent survey of 2013 proxy filings by companies comprising the S&P 200, the full boards of these companies are increasingly, and nearly universally, taking responsibility for the risk oversight of the company.[24] Clearly, boards must take seriously their responsibility to ensure that management has implemented effective risk management protocols. Boards of directors are already responsible for overseeing the management of all types of risk, including credit risk, liquidity risk, and operational risk[25] — and there can be little doubt that cyber-risk also must be considered as part of board’s overall risk oversight. The recent announcement that a prominent proxy advisory firm is urging the ouster of most of the Target Corporation directors because of the perceived “failure…to ensure appropriate management of [the] risks” as to Target’s December 2013 cyber-attack is another driver that should put directors on notice to proactively address the risks associated with cyber-attacks.[26] What Boards of Directors Can and Should Be Doing to Oversee Cyber-Risk Given the significant cyber-attacks that are occurring with disturbing frequency, and the mounting evidence that companies of all shapes and sizes are increasingly under a constant threat of potentially disastrous cyber-attacks, ensuring the adequacy of a company’s cybersecurity measures needs to be a critical part of a board of director’s risk oversight responsibilities. [27] In addition to the threat of significant business disruptions, substantial response costs, negative publicity, and lasting reputational harm, there is also the threat of litigation and potential liability for failing to implement adequate steps to protect the company from cyber-threats.[28] Perhaps unsurprisingly, there has recently been a series of derivative lawsuits brought against companies and their officers and directors relating to data breaches resulting from cyber-attacks.[29] Thus, boards that choose to ignore, or minimize, the importance of cybersecurity oversight responsibility, do so at their own peril. Given the known risks posed by cyber-attacks, one would expect that corporate boards and senior management universally would be proactively taking steps to confront these cyber-risks. Yet, evidence suggests that there may be a gap that exists between the magnitude of the exposure presented by cyberrisks and the steps, or lack thereof, that many corporate boards have taken to address these risks. Some have noted that boards are not spending enough time or devoting sufficient corporate resources to addressing cybersecurity issues.[30] According to one survey, boards were not undertaking key oversight activities related to cyber-risks, such as reviewing annual budgets for privacy and IT security programs, assigning roles and responsibilities for privacy and security, and receiving regular reports on breaches and IT risks.[31] Even when boards do pay attention to these risks, some have questioned the extent to which boards rely too much on the very personnel who implement those measures.[32] In light of these observations, directors should be asking themselves what they can, and should, be doing to effectively oversee cyber-risk management. NIST Cybersecurity Framework In considering where to begin to assess a company’s possible cybersecurity measures, one conceptual roadmap boards should consider is the Framework for Improving Critical Infrastructure Cybersecurity, released by the National Institute of Standards and Technology (“NIST”) in February 2014. The NIST Cybersecurity Framework is intended to provide companies with a set of industry standards and best practices for managing their cybersecurity risks.[33] In essence, the Framework encourages companies to be proactive and to think about these difficult issues in advance of the occurrence of a possibly devastating cyber-event. While the Framework is voluntary guidance for any company, some commentators have already suggested that it will likely become a baseline for best practices by companies, including in assessing legal or regulatory exposure to these issues or for insurance purposes.[34] At a minimum, boards should work with management to assess their corporate policies to ensure how they match-up to the Framework’s guidelines — and whether more may be needed. Board Structural Changes to Focus on Appropriate Cyber-Risk Management The NIST Cybersecurity Framework, however, is a bible without a preacher if there is no one at the company who is able to translate its concepts into action plans. Frequently, the board’s risk oversight function lies either with the full board or is delegated to the board’s audit committee. Unfortunately, many boards lack the technical expertise necessary to be able to evaluate whether management is taking appropriate steps to address cybersecurity issues. Moreover, the board’s audit committee may not have the expertise, support, or skills necessary to add oversight of a company’s cyber-risk management to their already full agenda.[35] As a result, some have recommended mandatory cyber-risk education for directors. [36] Others have suggested that boards be at least adequately represented by members with a good understanding of information technology issues that pose risks to the company.[37] Another way that has been identified to help curtail the knowledge gap and focus director attention on known cyber-risks is to create a separate enterprise risk committee on the board. It is believed that such committees can foster a “big picture” approach to company-wide risk that not only may result in improved risk reporting and monitoring for both management and the board, but also can provide a greater focus — at the board level — on the adequacy of resources and overall support provided to company executives responsible for risk management.[38] The Dodd-Frank Act already requires large financial institutions to establish independent risk committees on their boards.[39] Beyond the financial institutions required to do so, some public companies have chosen to proactively create such risk committees on their boards.[40] Research suggests that 48% of corporations currently have board-level risk committees that are responsible for privacy and security risks, which represents a dramatic increase from the 8% that reported having such a committee in 2008.[41] Clearly, there are various mechanisms that boards can employ to close the gap in addressing cybersecurity concerns — but it is equally clear that boards need to be proactive in doing so. Put simply, boards that lack an adequate understanding of cyber-risks are unlikely to be able to effectively oversee cyber-risk management. I commend the boards that are proactively addressing these new risks of the 21st Century. However, while enhancing board knowledge and board involvement is a good business practice, it is not necessarily a panacea to comprehensive cybersecurity oversight. Internal Roles and Responsibilities Focused on Cyber-Risk In addition to proactive boards, a company must also have the appropriate personnel to carry out effective cyber-risk management and to provide regular reports to the board. One 2012 survey reported that less than two-thirds of responding companies had full-time personnel in key roles responsible for privacy and security, in a manner that was consistent with internationally accepted best practices and standards.[42] In addition, a 2013 survey found that the companies that detected more security incidents and reported lower average financial losses per incident shared key attributes, including that they employed a full-time chief information security officer (or equivalent) who reported directly to senior management.[43] At a minimum, boards should have a clear understanding of who at the company has primary responsibility for cybersecurity risk oversight and for ensuring the adequacy of the company’s cyber-risk management practices.[44] In addition, as the evidence shows, devoting full-time personnel to cybersecurity issues may help prevent and mitigate the effects of cyber-attacks. Board Preparedness Although different companies may choose different paths, ultimately, the goal is the same: to prepare the company for the inevitable cyber-attack and the resulting fallout from such an event. As it has been noted, the primary distinction between a cyber-attack and other crises that a company may face is the speed with which the company must respond to contain the rapid spread of damage.[45] Companies need to be prepared to respond within hours, if not minutes, of a cyber-event to detect the cyber-event, analyze the event, prevent further damage from being done, and prepare a response to the event.[46] While there is no “one-size-fits-all” way to properly prepare for the various ways a cyber-attack can unfold, and what responses may be appropriate, it can be just as damaging to have a poorly-implemented response to a cyber-event. As others have observed, an “ill-thought-out response can be far more damaging than the attack itself.”[47] Accordingly, boards should put time and resources into making sure that management has developed a well-constructed and deliberate response plan that is consistent with best practices for a company in the same industry. These plans should include, among other things, whether, and how, the cyber-attack will need to be disclosed internally and externally (both to customers and to investors).[48] In deciding the nature and extent of the disclosures, I would encourage companies to go beyond the impact on the company and to also consider the impact on others. It is possible that a cyber-attack may not have a direct material adverse impact on the company itself, but that a loss of customers’ personal and financial data could have devastating effects on the lives of the company’s customers and many Americans. In such cases, the right thing to do is to give these victims a heads-up so that they can protect themselves.[49] Conclusion Let me conclude my remarks by reaffirming the significance of the role of good corporate governance. Corporate governance performed properly, results in the protection of shareholder assets. Fortunately, many boards take on this difficult and challenging role and perform it well. They do so by, among other things, being active, informed, independent, involved, and focused on the interests of shareholders. Good boards also recognize the need to adapt to new circumstances — such as the increasing risks of cyber-attacks. To that end, board oversight of cyber-risk management is critical to ensuring that companies are taking adequate steps to prevent, and prepare for, the harms that can result from such attacks. There is no substitution for proper preparation, deliberation, and engagement on cybersecurity issues. Given the heightened awareness of these rapidly evolving risks, directors should take seriously their obligation to make sure that companies are appropriately addressing those risks. Those of you who have taken the time and effort to be here today clearly recognize the risks, and I commend you for being proactive in dealing with the issue. Thank you for inviting me to speak to you today. [1] For example, the Director of the Federal Bureau of Investigation (FBI), James Comey, said last November that “resources devoted to cyber-based threats will equal or even eclipse the resources devoted to non-cyber based terrorist threats.” See, Testimony of James B. Comey, Jr., Director, FBI, U.S. Department of Justice, before the Senate Committee on Homeland Security and Governmental Affairs (Nov. 14, 2013), available at http://www.hsgac.senate.gov/hearings/threats-to-the-homeland. See also, Testimony of Jeh C. Johnson, Secretary, U.S. Department of Homeland Security, before the House Committee on Homeland Security (Feb. 26, 2014) (“DHS must continue efforts to address the growing cyber threat to the private sector and the ‘.gov’ networks, illustrated by the real, pervasive, and ongoing series of attacks on public and private infrastructure.”), available at http://docs.house.gov/meetings/HM/HM00/20140226/101722/HHRG-113-HM00-Wstate-JohnsonJ20140226.pdf; Testimony of Ari Baranoff, Assistant Special Agent in Charge, United States Secret Service Criminal Investigative Division, before the House Committee on Homeland Security, Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies (Apr. 16, 2014), available at http://docs.house.gov/meetings/HM/HM08/20140416/102141/HHRG-113-HM08-Wstate-BaranoffA- 20140416.pdf (“Advances in computer technology and greater access to personally identifiable information (PII) via the Internet have created online marketplaces for transnational cyber criminals to share stolen information and criminal methodologies. As a result, the Secret Service has observed a marked increase in the quality, quantity, and complexity of cybercrimes targeting private industry and critical infrastructure.”); Remarks by Secretary of Defense Leon E. Panetta to the Business Executives for National Security (Oct. 11, 2012), available at http://www.defense.gov/transcripts/transcript.aspx?transcriptid=5136 (“As director of the CIA and now Secretary of Defense, I have understood that cyber attacks are every bit as real as the more well-known threats like terrorism, nuclear weapons proliferation and the turmoil that we see in the Middle East. And the cyber threats facing this country are growing.”). [2] See, e.g., Martin Lipton, et al., Risk Management and the Board of Directors — An Update for 2014, The Harvard Law School Forum on Corporate Governance and Financial Regulation (Apr. 22, 2014), available at http://blogs.law.harvard.edu/corpgov/2014/04/22/risk-management-and-the-board-of-directors-anupdate-for-2014/ (noting that cybersecurity is a risk management issue that “merits special attention” from the board of directors in 2014); PwC 2012 Annual Corporate Directors Survey, Insights from the Boardroom 2012: Board evolution: Progress made yet challenges persist, available at http://www.pwc.com/en_US/us/corporate-governance/annual-corporate-directors-survey/assets/pdf/pwcannual-corporate-directors-survey.pdf (finding that 72% of directors are engaged with overseeing and understanding data security issues and risks related to compromising customer data); Michael A. Gold, Cyber Risk and the Board of Directors–Closing the Gap, Bloomberg BNA (Oct. 18, 2013) available at http://www.bna.com/cyber-risk-and-the-board-of-directors-closing-the-gap// (“The responsibility of corporate directors to address cyber security is commanding more attention and is obviously a significant issue.”); Deloitte Development LLC, Hot Topics: Cybersecurity … Continued in the boardroom, Corporate Governance Monthly (Aug. 2013), available at http://www.corpgov.deloitte.com/binary/com.epicentric.contentmanagement.servlet.ContentDeliveryServlet /USEng/Documents/Deloitte%20Periodicals/Hot%20Topics/Hot%20Topics%20%20Cybersecurity%20%20%20Continued%20in%20the%20boardroom%20-August%202013%20-Final.pdf (“Not long ago, the term ‘cybersecurity’ was not frequently heard or addressed in the boardroom. Cybersecurity was often referred to as an information technology risk, and management and oversight were the responsibility of the chief information or technology officer, not the board. With the rapid advancement of technology, cybersecurity has become an increasingly challenging risk that boards may need to address.”); Holly J. Gregory, Board Oversight of Cybersecurity Risks, Thomson Reuters Practical Law (Mar. 1, 2014), available at http://us.practicallaw.com/5-558-2825 (“The risk of cybersecurity breaches (and the harm that these breaches pose) is one of increasing significance for most companies and therefore an area for heightened board focus.”). [3] For example, on December 9, 2013, the Financial Stability Oversight Council held a meeting to discuss cybersecurity threats to the financial system. See, U.S. Department of the Treasury Press Release, “Financial Stability Oversight Council to Meet December 9,” available at http://www.treasury.gov/presscenter/press-releases/Pages/jl2228.aspx. During that meeting, Assistant Treasury Secretary Cyrus-AmirMokri said that “[o]ur experience over the last couple of years shows that cyber-threats to financial institutions and markets are growing in both frequency and sophistication.” See, Remarks of Assistant Secretary Cyrus Amir-Mokri on Cybersecurity at a Meeting of the Financial Stability Oversight Council (Dec. 9, 2013), available at http://www.treasury.gov/press-center/press-releases/Pages/jl2234.aspx. In addition, in testimony before the House Financial Services Committee in 2011, the Assistant Director of the FBI’s Cyber Division stated that the number and sophistication of malicious incidents involving financial institutions has increased dramatically over the past several years and offered numerous examples of such attacks, which included fraudulent monetary transfers, unauthorized financial transactions from compromised bank and brokerage accounts, denial of service attacks on U.S. stock exchanges, and hacking incidents in which confidential information was misappropriated. See, Testimony of Gordon M. Snow, Assistant Director, Cyber Division, FBI, U.S. Department of Justice, before the House Financial Services Committee, Subcommittee on Financial Institutions and Consumer Credit (Sept. 14, 2011), available at http://financialservices.house.gov/uploadedfiles/091411snow.pdf. [4] 2012 Cost of Cyber Crime Study: United States, Ponemon Institute LLC and HP Enterprise Security (Oct. 2012), available at http://www.ponemon.org/local/upload/file/2012_US_Cost_of_Cyber_Crime_Study_FINAL6%20.pdf. [5] See, e.g., Jim Finkle, Adobe says customer data, source code accessed in cyber attack, Reuters (Oct. 3, 2013), available at http://www.reuters.com/article/2013/10/03/us-adobe-cyberattackidUSBRE99212Y20131003; Jim Finkle, Adobe data breach more extensive than previously disclosed, Reuters (Oct. 29, 2013), available at http://www.reuters.com/article/2013/10/29/us-adobe-cyberattackidUSBRE99S1DJ20131029; Danny Yadron, Hacker Attack on Adobe Sends Ripples Across Web, Wall Street Journal (Nov. 11, 2013), available at http://online.wsj.com/news/articles/SB10001424052702304644104579192393329283358. [6] See, Testimony of John Mulligan, Executive Vice President and Chief Financial Officer of Target, before the Senate Judiciary Committee (Feb. 4, 2014), available at http://www.judiciary.senate.gov/imo/media/doc/02-04-14MulliganTestimony.pdf; Target Press Release, “Target Confirms Unauthorized Access to Payment Card Data in U.S. Stores” (Dec. 19, 2013), available at http://pressroom.target.com/news/target-confirms-unauthorized-access-to-payment-card-data-in-u-sstores. [7] See, e.g., Andrea Chang and Salvador Rodriguez, Snapchat becomes target of widespread cyberattack, L.A. Times (Jan. 2, 2014), available at http://articles.latimes.com/2014/jan/02/business/la-fi-snapchathack-20140103; Brian Fung, A Snapchat security breach affects 4.6 million users. Did Snapchat drag its feet on a fix? Washington Post (Jan. 1, 2014), available at http://www.washingtonpost.com/blogs/theswitch/wp/2014/01/01/a-snapchat-security-breach-affects-4-6-million-users-did-snapchat-drag-its-feet-ona-fix/. [8] See, e.g., Joseph Menn, Cyber attacks against banks more severe than most realize, Reuters (May 18, 2013), available at http://www.reuters.com/article/2013/05/18/us-cyber-summit-banksidUSBRE94G0ZP20130518; Bob Sullivan, Bank Website Attacks Reach New Highs, CNBC (Apr. 3, 2013), available at http://www.cnbc.com/id/100613270. [9] For example, according to a 2012 global survey of securities exchanges, 53% reported experiencing a cyber-attack in the previous year. See, Rohini Tendulkar, Cyber-crime, securities markets, and systemic risk, Joint Staff Working Paper of the IOSCO Research Department and World Federation of Exchanges (July 16, 2013), available at http://www.iosco.org/research/pdf/swp/Cyber-Crime-Securities-Markets-andSystemic-Risk.pdf. Forty-six securities exchanges responded to the survey. [10] See, HP Press Release, HP Reveals Cost of Cybercrime Escalates 70 Percent, Time to Resolve Attacks More Than Doubles (Oct. 8, 2013), available at http://www8.hp.com/us/en/hp-news/press-release.html? id=1501128. [11] See, Target Financial News Release, Target Reports Fourth Quarter and Full-Year 2013 Earnings (Feb. 26, 2014), available at http://investors.target.com/phoenix.zhtml?c=65828&p=irolnewsArticle&ID=1903678&highlight (including a statement from then-Chairman, President and CEO Gregg Steinhafel that Target’s fourth quarter results “softened meaningfully following our December announcement of a data breach.”); Elizabeth A. Harris, Data Breach Hurts Profit at Target, N.Y. Times (Feb. 26, 2014), available at http://www.nytimes.com/2014/02/27/business/target-reports-on-fourth-quarterearnings.html?_r=0 (noting that “[t]he widespread theft of Target customer data had a significant impact on the company’s profit, which fell more than 40 percent in the fourth quarter” of 2013). [12] I also want to note that at the Investment Company Institute’s (“ICI”) general membership meeting, held just last month, the issue of cybersecurity was front and center. Among the issues raised during the meeting was the “huge risk to brand” for a firm if they have a security failure in the event of a cyber-attack. A separate panel at the ICI conference devoted to cybersecurity also discussed the shift in focus from building “hard walls” to protect against risks from outside the company to cybersecurity focused on “inside” risks, such as ensuring that individuals with mobile applications or other types of flexible applications don’t introduce, intentionally or unintentionally, malware or other kinds of security breaches that could lead to a cyber-attack on the company. See, e.g., Jackie Noblett, Cyber Breach a “Huge Risk to Brand,” Ignites (May 29, 2014), available at http://ignites.com/c/897654/86334/cyber_breach_huge_risk_brand? referrer_module=emailMorningNews&module_order=7. [13] See, Commissioner Luis A. Aguilar, The Commission’s Role in Addressing the Growing Cyber-Threat (Mar. 26, 2014), available at http://www.sec.gov/News/PublicStmt/Detail/PublicStmt/1370541287184. [14] On October 13, 2011, staff in the Commission’s Division of Corporation Finance (Corp Fin) issued guidance on issuers’ disclosure obligations relating to cyber security risks and cyber incidents. See, SEC’s Division of Corporation Finance, CF Disclosure Guidance: Topic No. 2—Cybersecurity (“SEC Guidance”) (Oct. 31, 2011), available at http://www.sec.gov/divisions/corpfin/guidance/cfguidance-topic2.htm. Among other things, this guidance notes that securities laws are designed to elicit disclosure of timely, comprehensive, and accurate information about risks and events that a reasonable investor would consider important to an investment decision, and cybersecurity risks and events are not exempt from these requirements. The guidance identifies six areas where cybersecurity disclosures may be necessary under Regulation S-K: (1) Risk Factors; (2) Management’s Discussion and Analysis of Financial Condition and Results of Operation (MD&A); (3) Description of Business; (4) Legal Proceedings; (5) Financial Statement Disclosures; and (6) Disclosure Controls and Procedures. The SEC Guidance further recommends that material cybersecurity risks should be disclosed and adequately described as Risk Factors. Where cybersecurity risks and incidents that represent a material event, trend or uncertainty reasonably likely to have a material impact on the organization's operations, liquidity, or financial condition — it should be addressed in the MD&A. If cybersecurity risks materially affect the organization’s products, services, relationships with customers or suppliers, or competitive conditions, the organization should disclose such risks in its description of business. Data breaches or other incidents can result in regulatory investigations or private actions that are material and should be discussed in the Legal Proceedings section. Cybersecurity risks and incidents that represent substantial costs in prevention or response should be included in Financial Statement Disclosures where the financial impact is material. Finally, where a cybersecurity risk or incident impairs the organization's ability to record or report information that must be disclosed, Disclosure Controls and Procedures that fail to address cybersecurity concerns may be ineffective and subject to disclosure. Some have suggested that such disclosures fail to fully inform investors about the true costs and benefits of companies’ cybersecurity practices, and argue that the Commission (and not the staff) should issue further guidance regarding issuers’ disclosure obligations. See, Letter from U.S. Senator John D. Rockefeller IV to Chair White (Apr. 9, 2013), available at http://www.commerce.senate.gov/public/? a=Files.Serve&File_id=49ac989b-bd16-4bbd-8d64-8c15ba0e4e51. [15] See SEC Press Release, SEC Announces Agenda, Panelists for Cybersecurity Roundtable (Mar. 24, 2014), available at http://www.sec.gov/News/PressRelease/Detail/PressRelease/1370541253749; Cybersecurity Roundtable Webcast (Mar. 26, 2014), available at http://www.sec.gov/news/otherwebcasts/2014/cybersecurity-roundtable-032614.shtml. In addition, the SEC’s National Exam Program has included cybersecurity among its areas of focus in its National Examination Priorities for 2014. See, SEC’s National Exam Priorities for 2014, available at http://www.sec.gov/about/offices/ocie/national-examination-program-priorities-2014.pdf. In addition, it was recently announced that SEC examiners will review whether asset managers have policies to prevent and detect cyber-attacks and are properly safeguarding against security risks that could arise from vendors having access to their systems. See, Sarah N. Lynch, SEC examiners to review how asset managers fend off cyber attacks, Reuters (Jan. 30, 2014), available at http://www.reuters.com/article/2014/01/30/us-seccyber-assetmanagers-idUSBREA0T1PJ20140130. FINRA has also identified cybersecurity as one of its examination priorities for 2014. See, FINRA’s 2014 Regulatory and Examination Priorities Letter (Jan. 2, 2014), available at http://www.finra.org/web/groups/industry/@ip/@reg/@guide/documents/industry/p419710.pdf. To continue the discussion and to allow the public to weigh in on this important topic, the SEC set up a public comment file associated with the Cybersecurity Roundtable. To date, we have received ten comment letters from academics, software companies, and other interested parties, available at http://www.sec.gov/comments/4-673/4-673.shtml. See, e.g., Jodie Kelly, Senior Vice President and General Counsel, BSA| The Software Alliance comment letter (Apr. 30, 2014) (highlighting the importance of strong internal controls related to software assets as a first line of defense against cyber-attacks, and noting that verifying legal use of software is a critical first step in deterring cyber-attacks because the “existence and availability of pirated and counterfeit software exposes corporate information technology networks to significant risks in many ways.”); Tom C.W. Lin, Associate Professor of Law, Temple University Beasley School of Law comment letter (Apr. 29, 2014) (expressing support for the roundtable and the Commission’s attention to cybersecurity and highlighting four broad issues for the Commission’s consideration: (1) cybersecurity threats to the high-speed, electronically connected modern capital markets can create systemic risks; (2) due to technological advances, financial choices are made by both people and machines, which does not comport congruently with many traditional modes of securities regulation; (3) incentives, in addition to penalties, should be designed to encourage firms to upgrade their cybersecurity capabilities; and (4) private regulation of cybersecurity should be vigorously enhanced and leveraged to better complement government regulation); Dave Parsonage, CEO, MitoSystems, Inc. comment letter (Apr. 3, 2014); Gail P. Ricketts, Senior IT Compliance and Risk Analyst, ON Semiconductor comment letter (Mar. 26, 2014) (suggesting future roundtables include speakers from outside the financial services industry, such as manufacturing); Michael Utzig, IT Director, Hefren Tillotson, Inc. comment letter (Mar. 26, 2014) (noting that readily available technologies that can protect email communications are not widely used despite universal understanding that cybersecurity is a high-priority); Cathy Santoro comment letter (Mar. 26, 2014) (raising questions about the interactions between banks and service providers and the measures being undertaken regarding mobile payment cybersecurity risks); Duane Kuroda, Senior Threat Researcher, NetCitadel comment letter (Mar. 25, 2014) (noting that the panel discussion should focus on the process and people involved in responding to breaches and not just their detection); William Pfister, Jr. comment letter (Mar. 25, 2014) (requesting that one of the panels address the potential conflicts between national security and required disclosure). Many of these letters are generally supportive of the Commission’s efforts and focus in this area, and some identify issues and concerns that were not discussed in detail during the roundtable and warrant further attention. For example, one commenter highlighted the need for companies to adopt sound internal controls over the legal use of software, noting that pirated and counterfeit software can expose companies to heightened risk of cyber-attacks and recommending that registrants report on the status of such internal controls.[15] See, e.g., Jodie Kelly, Senior Vice President and General Counsel, BSA| The Software Alliance comment letter (Apr. 30, 2014) (noting, among other things, that unlicensed software eliminates the opportunity for security updates and patches from legitimate vendors when security breaches are identified, and that malware and viruses may be contained within pirated software itself or reside on the networks from which it is downloaded. BSA recommends that registrants report on the status of their internal controls in the area of licensing and legal use of software, and that such controls should, at a minimum, ensure that software is only purchased from authorized vendors and that companies should have procedures to conduct periodic software inventories and limit exposure to malware and viruses brought into their systems by linkage of employees’ personal devices to corporate systems). I encourage others to comment and provide valuable input on this critical issue. [16] See, e.g., Model Bus. Corp. Act § 8.01 (2002); Del. Gen. Corp. Law § 141(a). [17] For additional thoughts on the importance of effective corporate governance, see Commissioner Luis A. Aguilar, Looking at Corporate Governance from the Investor’s Perspective, available at http://www.sec.gov/News/Speech/Detail/Speech/1370541547078. [18] See, e.g., Committee of Sponsoring Organizations of the Treadway Commission, Effective Enterprise Risk Oversight: The Role of the Board of Directors (2009), available at http://www.coso.org/documents/COSOBoardsERM4pager-FINALRELEASEVERSION82409_001.pdf (“Clearly, one result of the financial crisis is an increased focus on the effectiveness of board risk oversight practices.”); Committee of Sponsoring Organizations of the Treadway Commission, Board Risk Oversight: A Progress Report — Where Boards of Directors Currently Stand in Executing Their Risk Oversight Responsibilities (Dec. 2010), available at http://www.coso.org/documents/Board-Risk-Oversight-SurveyCOSO-Protiviti_000.pdf (“Risk oversight is a high priority on the agenda of most boards of directors. Recently, the importance of this responsibility has become more evident in the wake of an historic global financial crisis, which disclosed perceived risk management weaknesses across financial services and other organizations worldwide. Based on numerous legislative and regulatory actions in the United States and other countries as well as initiatives in the private sector, it is clear that expectations for more effective risk oversight are being raised not just for financial services companies, but broadly across all types of businesses.”); David A. Katz, Boards Play A Leading Role in Risk Management Oversight, The Harvard Law School Forum on Corporate Governance and Financial Regulation (Oct. 8, 2009), available at http://blogs.law.harvard.edu/corpgov/2009/10/08/boards-play-a-leading-role-in-risk-managementoversight/ (“Just as the Enron and other high-profile corporate scandals were seen as resulting from a lack of ethics and oversight, the credit market meltdown and resulting financial crisis have been blamed in large part on inadequate risk management by corporations and their boards of directors. As a result, along with the task of implementing corporate governance procedures and guidelines, a company’s board of directors is expected to take a leading role in overseeing risk management structures and policies.”). [19] Nicola Faith Sharpe, Informational Autonomy in the Boardroom, 201 U. Ill. L. Rev. 1089 (2013) (“The financial crisis of 2007-2008 was one of the worst in U.S. history. In a single quarter, the blue chip company Lehman Brothers (who eventually went bankrupt) lost $2.8 billion. While commentators have identified multiple reasons why the crisis occurred, many posit that boards mismanaged risk and failed in their oversight duties, which directly contributed to their firms failing.”); Lawrence J. Trautman and Kara Altenbaumer-Price, The Board’s Responsibility for Information Technology Governance, 28 J. Marshall J. Computer & Info. L. 313 (Spring 2011) (“With accusations that boards of directors of financial institutions were asleep at the wheel while their companies engaged in risky behavior that erased millions of dollars of shareholder value and plunged the country into recession, increasing pressure is now being placed on public company boards to shoulder the burden of risk oversight for the companies they serve.”); William B. Asher, Jr., Michael T. Gass, Erik Skramstad, and Michele Edwards, The Role of Board of Directors in Risk Oversight in a Post-Crisis Economy, Bloomberg Law Reports-Corporate Law Vol. 4, No. 13, available at http://www.choate.com/uploads/113/doc/Asher,%20Gass%20The%20Role%20of%20Board%20of%20Directors%20in%20Risk%20Oversight%20in%20a%20PostCrisis%20Economy.pdf (“Senior management and corporate directors face renewed criticism surrounding risk management practices and apparent failures in oversight that are considered, at least in part, to be at the root of the recent crisis.”). [20] See, e.g., Stephen M. Bainbridge, Caremark and Enterprise Risk Management, 34 Iowa J. Corp. L. 967 (2009) (“Although primary responsibility for risk management rests with the corporation’s top management team, the board of directors is responsible for ensuring that the corporation has established appropriate risk management programs and for overseeing management’s implementation of such programs.”); Martin Lipton, Risk Management and the Board of Directors–An Update for 2014, The Harvard Law School Forum on Corporate Governance and Financial Regulation (Apr. 22, 2014), available at http://blogs.law.harvard.edu/corpgov/2014/04/22/risk-management-and-the-board-of-directors-anupdate-for-2014/ (“. . . the board cannot and should not be involved in actual day-to day risk management. Directors should instead, through their risk oversight role, satisfy themselves that the risk management policies and procedures designed and implemented by the company’s senior executives and risk managers are consistent with the company’s strategy and risk appetite, that these policies and procedures are functioning as directed, and that necessary steps are taken to foster a culture of risk-aware and riskadjusted decision making throughout the organization. The board should establish that the CEO and the senior executives are fully engaged in risk management and should also be aware of the type and magnitude of the company’s principal risks that underlie its risk oversight. Through its oversight role, the board can send a message to management and employees that comprehensive risk management is neither an impediment to the conduct of business nor a mere supplement to a firm’s overall compliance program, but is instead an integral component of strategy, culture and business operations.”). [21] Proxy Disclosure Enhancements, SEC Rel. No. 33-9089 (Dec. 16, 2009), 74 Fed. Reg. 68334, available at http://www.sec.gov/rules/final/2009/33-9089.pdf. [22] Id. That amendment also required disclosure of a company’s compensation policies and practices as they relate to a company’s risk management in order to help investors identify whether the company has established a system of incentives that could lead to excessive or inappropriate risk taking by its employees. [23] Supra note 19, William B. Asher, Jr. et al., The Role of Board of Directors in Risk Oversight in a PostCrisis Economy (“We know today, however, that risk management has indeed forced its way into the boardroom and that there has been a substantial change in the relationship between the overseers of public companies and their shareholders.”). [24] Risk Intelligent Proxy Disclosures — 2013: Trending upward, Deloitte (2013), available at http://deloitte.wsj.com/riskandcompliance/files/2014/01/Risk_Intelligent_Proxy_Disclosures_2013.pdf (noting that 91% of the issuers of proxy disclosures noted that “the full board is responsible for risk.”). [25] See, Proxy Disclosure Enhancements, supra note 21. [26] Paul Ziobro, Target Shareholders Should Oust Directors, ISS Says, Wall St. Journal (May 28, 2014), available at http://online.wsj.com/article/BT-CO-20140528-709863.html; Bruce Carton, ISS Recommends Ouster of Seven Target Directors for Data Breach Failures, ComplianceWeek (May 29, 2014), available at http://www.complianceweek.com/iss-recommends-ouster-of-seven-target-directors-for-data-breachfailures/article/348954/?DCMP=EMC-CW-WeekendEdition. [27] See, e.g., Risk Management and the Board of Directors–An Update for 2014, supra note 2 (noting that cybersecurity is a risk management issue that “merits special attention” from the board of directors in 2014); Alice Hsu, Tracy Crum, Francine E. Friedman, and Karol A. Kepchar, Cybersecurity Update: Are Data Breach Disclosure Requirements On Target?, The Metropolitan Corporate Counsel (Jan. 24, 2014), available at http://www.metrocorpcounsel.com/articles/27148/cybersecurity-update-are-data-breach-disclosurerequirements-target (“As part of a board’s risk management oversight function, directors should assess the adequacy of their company’s data security measures. Among other things, boards should have a clear understanding of the company’s cybersecurity risk profile and who has primary responsibility for cybersecurity risk oversight and should ensure the adequacy of the company’s cyber risk management practices, as well as the company’s insurance coverage for losses and costs associate with data breaches.”). [28] Charles R. Ragan, Information Governance: It’s a Duty and It’s Smart Business, 19 Rich. J.L. & Tech. 12 (2013), available at http://jolt.richmond.edu/v19i4/article12.pdf. (indicating that “[t]he principles thus enunciated raise the specter of potential liability if officers and directors utterly fail to ensure the adequacy of information systems.”); J. Wylie Donald and Jennifer Black Strutt, Cybersecurity: Moving Toward a Standard of Care for the Board, Bloomberg BNA (Nov. 4, 2013), available at http://www.bna.com/cybersecurity-moving-toward-a-standard-of-care-for-the-board/ (quoting from a Delaware Chancery Court decision stating that directors may be liable if “(a) the directors utterly failed to implement any reporting or information system or controls; or (b) having implemented such a system or controls, consciously failed to monitor or oversee its operations thus disabling themselves from being informed of risks or problems requiring their attention.”). [29] See, e.g., Collier v. Steinhafel et al. (D.C. Minn. Jan. 2014), case number 0:14-cv-00266 (alleging that Target's board and top executives harmed the company financially by failing to take adequate steps to prevent the cyber-attack then by subsequently providing customers with misleading information about the extent of the data theft.); Dennis Palkon et al. v. Stephen P. Holmes et al. (D.C.N.J. May 2014), case number 2:14-cv-01234 (alleging that Wyndham's board and top executives harmed the company financially by failing to take adequate steps to safeguard customers' personal and financial information.). [30] Steven P. Blonder, How closely is the board paying attention to cyber risks?, Inside Counsel (formerly Corporate Legal Times) (Apr. 9, 2014), available at http://www.insidecounsel.com/2014/04/09/howclosely-is-the-board-paying-attention-to-cyber. (Indicating that “[i]n all likelihood, absent an incident, it is likely that board members are not spending sufficient time evaluating or analyzing the risks inherent in new technologies, as well as their related cybersecurity risks.”). [31] Jody R. Westby, Governance of Enterprise Security: CyLab 2012 Report — How Boards & Senior Executives Are Managing Cyber Risks, Carnegie Mellon University CyLab (May 16, 2012), at 5. (Hereinafter “CyLab 2012 Report.”). [32] Supra note 30, Steven P. Blonder, How Closely is the Board Paying Attention to Cyber Risks? (stating that “[f]urther, even if a board has evaluated these risks, to what extent is such an evaluation dependent on a company’s IT department — the same group implementing the existing technology protocols?”). [33] The National Institute of Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity (Feb. 12, 2014) (the “NIST Cybersecurity Framework”), available at http://www.nist.gov/cyberframework/upload/cybersecurity-framework-021214.pdf, was released in response to President Obama’s issued Executive Order 13636, titled “Improving Critical Infrastructure Cybersecuity,” dated February 12, 2013. The NIST Cybersecurity Framework sets out five core functions and categories of activities for companies to implement that relate generally to cyber-risk management and oversight, which the NIST helpfully boiled down to five terms: Identify, Protect, Detect, Respond and Recover. This core fundamentally means the following: companies should (i) identify known cybersecurity risks to their infrastructure; (ii) develop safeguards to protect the delivery and maintenance of infrastructure services; (iii) implement methods to detect the occurrence of a cybersecurity event; (iv) develop methods to respond to a detected cybersecurity event; and (v) develop plans to recover and restore the companies’ capabilities that were impaired as a result of a cybersecurity event. See also, Ariel Yehezkel and Thomas Michael, Cybersecurity: Breaching the Boardroom, The Metropolitan Corporate Counsel (Mar. 17, 2014), available at http://www.sheppardmullin.com/media/article/1280_MCCCybersecurity-Breaching%20The%20Boardroom.pdf. [34] Supra note 2, Holly J. Gregory, Board Oversight of Cybersecurity Risks; supra note 33, Ariel Yehezkel and Thomas Michael, Cybersecurity: Breaching the Boardroom (stating that “[w]hile adoption of the Cybersecurity Framework is voluntary, it will likely become a key reference for regulators, insurance companies and the plaintiffs’ bar in assessing whether a company took steps reasonably designed to reduce and manage cybersecurity risks.”). [35] Matteo Tonello, Should Your Board Have a Separate Risk Committee?, The Harvard Law School Forum on Corporate Governance and Financial Regulation (Feb. 12, 2012), available at https://blogs.law.harvard.edu/corpgov/2012/02/12/should-your-board-have-a-separate-risk-committee/ (asking “[d]oes the audit committee have the time, the skills, and the support to do the job, given everything else it is required to do?”). [36] See, e.g., Katie W. Johnson, Publicly Traded Companies Should Prepare To Disclose Cybersecurity Risks, Incidents, Bloomberg BNA (Mar. 17, 2014), available at http://www.bna.com/publicly-tradedcompanies-n17179885721/ (citing Mary Ellen Callahan, Chair of the Privacy and Information Governance Practice at Jenner & Block, LLP at the International Association of Privacy Professionals Global Privacy Summit, held in March 2014); Michael A. Gold, Cyber Risk and the Board of Directors — Closing the Gap, Bloomberg BNA (Oct. 18, 2013), available at http://www.bna.com/cyber-risk-and-the-board-of-directorsclosing-the-gap// (suggesting that companies would do well to have “[m]andatory cyber risk education for directors,” among other things.); see also, The Comprehensive National Cybersecurity Initiative, initially launched by then-President George W. Bush in 2008, referencing “Initiative #8. Expand cyber education,” and available at http://www.whitehouse.gov/issues/foreign-policy/cybersecurity/national-initiative. [37] Supra note 19, Lawrence J. Trautman and Kara Altenbaumer-Price, The Board’s Responsibility for Information Technology Governance. [38] Supra note 35, Matteo Tonello, Should Your Board Have a Separate Risk Committee?; supra note 33, Ariel Yehezkel and Thomas Michael, Cybersecurity: Breaching the Boardroom. [39] Dodd-Frank Act Section 165(h). [40] Supra note 19, Lawrence J. Trautman and Kara Altenbaumer-Price, The Board’s Responsibility for Information Technology Governance. [41] Deloitte Audit Committee Brief, Cybersecurity and the audit committee (Aug. 2013), at 2, available at http://deloitte.wsj.com/cfo/files/2013/08/ACBrief_August2013.pdf. [42] See, supra note 31, CyLab 2012 Report, at 27. [43] PricewaterhouseCoopers LLP, The Global State of Information Security Survey 2014, at 4, available at http://www.pwc.com/gx/en/consulting-services/information-security-survey/download.jhtml (the “PwC IS Survey”). The PwC IS Survey also noted other shared attributes, such as having (i) an overall information security strategy; (ii) measured and reviewed the effectiveness of their security measures within the past year; and (iii) an understanding as to exactly what type of security events have occurred in the past year. See also, supra note 2, Holly Gregory, Board Oversight of Cybersecurity Risks. [44] Supra note 27, Alice Hsu, et al., Cybersecurity Update: Are Data Breach Disclosure Requirements on Target?. [45] See, e.g., Roland L. Trope and Stephen J. Humes, Before Rolling Blackouts Begin: Briefing Boards on Cyber Attacks That Target and Degrade the Grid, 40 Wm. Mitchell L. Rev. 647 (2014), at 656 (stating that “unlike other corporate crises, boards and management must be ready to address severe cyber incidents with response and recovery plans that activate upon discovery of an intrusion and with little or no time for deliberation.”) Some observers have even suggested that companies conduct “cyberwar games” organized around hypothetical business scenarios in order to reenact how a company might respond in a real cybersecurity situation in order to fix what vulnerabilities are teased out from the simulated scenario. Tucker Bailey, James Kaplan, and Allen Weinberg, Playing war games to prepare for a cyberattack, McKinsey & Company Insights & Publications (July 2012). Other observers have suggested that companies implement a response plan that takes into consideration a number of factors, such as (i) how much risk the company can accept if systems or services have to shut down; (ii) for how long the company can sustain operations using limited or backup technology; and (iii) how quickly the company can restore full operations. See, Former FBI Agent Mary Galligan on Preparing for a Cyber Attack, CIO Journal, Deloitte Insights (Mar. 3, 2104), available at http://deloitte.wsj.com/cio/2014/03/03/former-fbi-agent-marygalligan-on-preparing-for-a-cyber-attack/. [46] See, e.g., id., Roland L. Trope and Stephen J. Humes, Before Rolling Blackouts Begin: Briefing Boards on Cyber Attacks That Target and Degrade the Grid, at 656. [47] Supra note 45, Tucker Bailey, James Kaplan, and Allen Weinberg, Playing War Games to Prepare for a Cyberattack. [48] Supra note 33, Ariel Yehezkel and Thomas Michael, Cybersecurity: Breaching the Boardroom, Metropolitan Corporate Counsel (stating that “Boards should prepare for worst-case scenario cybersecurity breaches and help management develop immediate response plans, including public disclosure procedures and economic recovery strategies, to mitigate potential damages.” In addition, “[b]oards should consider disclosing cybersecurity risks and protective measures on relevant SEC filings, as such disclosures can generate confidence in investors rather than fear.”) The U.S. Department of Commerce also has suggested that a company’s cybersecurity preparedness could include cybersecurity insurance, which is specifically designed to mitigate losses from a variety of cyber incidents, including data breaches, business interruption, and network damage. Cybersecurity Insurance, U.S. Department of Homeland Security, available at http://www.dhs.gov/publication/cybersecurity-insurance. Despite the increased threats of cyber-attacks, the cybersecurity insurance market has been slow to develop, and many companies have chosen to forego available policies, citing their perceived high cost, a lack of awareness about what they cover, and their confidence (or ignorance) about their actual risk of a cyber-attack. Id. Moreover, despite the fact that cyber incidents are not covered by general liability policies, one survey noted that 57% of respondents indicated that their boards are not reviewing their existing policies for cyber-related risks. See, supra note 31, CyLab 2012 Report, at 15. [49] The Department of Justice recently unsealed indictments against five Chinese military officials who allegedly conspired to steal information from U.S. companies across different industries. In connection with this indictment, it was recently reported that three U.S. public companies identified as victims of this conspiracy failed to report the theft of trade secrets and other data to their investors, despite the Commission’s disclosure guidance on this topic. Two of the companies, Alcoa Inc. and Allegheny Technologies Inc., said that the thefts were not “material,” and therefore did not have to be disclosed to investors. See, Chris Strohm, Dave Michaels and Sonja Elmquist, U.S. Companies Hacked by Chinese Didn’t Tell Investors, Bloomberg (May 21, 2014), available at http://www.bloomberg.com/news/2014-05-21/u-scompanies-hacked-by-chinese-didn-t-tell-investors.html; See also, supra note 14. Last modified: June 10, 2014 Keynote Address at Compliance Week 2014 Search Andrew Ceresney Director of the Division of Enforcement Washington D.C. May 20, 2014 At the outset, let me give the requisite reminder that the views I express today are my own and do not necessarily represent the views of the Commission or its staff. It is a real pleasure to be here with a group of legal and compliance professionals. In my time in private practice, and now as the Director of Enforcement, I have come to appreciate how your work is invaluable to the SEC’s mission of protecting investors and ensuring the integrity of our markets. You serve as a critical line of defense against securities law violations. I recently reached my one-year anniversary since joining the Commission, and so I want to share with you today my thoughts on some of our accomplishments over the last year, including some of the significant changes we have made, and what lies ahead. As I often like to say, this is a great time to be in the Enforcement Division. Let me first salute the Division staff. I have been truly amazed every day by the talent, ingenuity and commitment of the people in Enforcement. They possess a tremendous wealth of knowledge and experience and are wholly devoted to the mission of the Agency. In all of their actions, they are tough and aggressive but fair. Thanks to their efforts, we achieved a great deal in my first year. I could stand here and give you statistics about the number of enforcement actions brought last year and the amounts of disgorgement and penalties that were ordered as a result of those actions. But you can obtain those numbers from our website, and such quantitative metrics do not fully capture the effectiveness of our enforcement efforts. When measuring our performance, we primarily consider the quality, breadth, and impact of our efforts. And by that standard, it was a banner year, as our cases spanned the full breadth of the securities industry, served as a strong deterrent to misconduct, punished securities violators, returned funds to injured investors, and sent important messages to the market. Those cases included actions against exchanges to ensure they operate fairly and in compliance with applicable rules, actions against investment advisers and broker-dealers for taking undisclosed fees and for disrupting the markets through failures in their automated trading systems, important financial reporting cases against issuers, actions against auditors and others who serve as gatekeepers to our financial system, FCPA cases against large multinational corporations, actions against municipal issuers, and landmark insider trading cases. We covered the proverbial waterfront of securities violations. Specialized Units As you know, pursuing violations related to the financial crisis has been one of our key priorities. But after successfully addressing such misconduct over the last five years, we now have shifted our attention to other areas and redeployed our resources accordingly. Let me touch on some of those areas. My predecessor, Rob Khuzami, created five specialized units relating to areas of significant concern. The idea was to build expertise and knowledge in each of these areas, and to have unit personnel solely focused on making cases in these important areas. As I like to say, these units were designed not just to eat a piece of the “Enforcement pie” – by working on cases that we otherwise would have brought – but to make the pie bigger by creating initiatives to examine practices that may not have in the past received sufficient attention and bringing cases for violations related to those practices. The units have been incredibly successful in accomplishing these goals. Over the last couple of years, the Asset Management Unit has launched a series of innovative initiatives – often in partnership with OCIE – focusing on important regulations like the custody rule and on undisclosed principal transactions and conflicts of interest; identified funds with aberrational returns that engaged in misconduct and investment advisers with deficient compliance programs; and brought cases against boards that did not exercise their responsibilities to determine investment adviser fees or to value their funds’ holdings properly.[1] The Municipal Securities and Public Pensions unit this year brought the first action against a municipal issuer for materially misleading statements made outside of its securities disclosure documents,[2] the first case in which the Commission assessed a financial penalty against a municipal issuer,[3] and helped bring significant cases against individuals, including a City of Miami budget director and several City of Victorville officials.[4] The FCPA Unit has teamed with DOJ to bring significant cases against issuers and individuals this past year, including reaching global settlements with Alcoa for over $380 million,[5] with Weatherford International for over $250 million,[6] and with Hewlett-Packard for over $108 million.[7] The Complex Financial Instruments Unit was incredibly productive in addressing misconduct arising from the financial crisis, bringing CDO and RMBS cases against several prominent financial institutions.[8] The unit has now shifted its attention to the next frontier and I expect it to zero in on the structuring, rating, valuation, sale, and use of other types of complex financial products, such as CMBSs, structured notes, and CDSs, while also preparing to enforce new Dodd-Frank rules like the Volcker Rule. Finally, the Market Abuse Unit has been focused on complex insider trading and market structure cases. Let me spend a few minutes on market structure, since that is an area that has received much attention recently. Market Structure Our markets have been radically transformed over the last five or so years due to the proliferation of sophisticated technological tools and the increased use of high-frequency trading, complex algorithmic trading, and off-exchange trading venues, including so-called “dark pools.” Although other divisions within the Commission handle the policy and rulemaking questions arising out of these developments, Enforcement’s role is to prosecute violations of the law. To ensure fair trading and equal access to information in the securities markets, we have brought significant actions in the past year against exchanges, broker-dealers, and other key market participants relating to failures in controls and the use of manipulative trading strategies. For example, in the last three years, we have pursued a number of cases against national securities exchanges. Most recently, we charged NYSE and two affiliated exchanges with failing to conduct their operations in accordance with Commission-approved exchange rules, which resulted in a $4.5 million penalty.[9] This action comes on the heels of our other recent cases against national exchanges, including charges against NASDAQ for violations in connection with the Facebook IPO[10] and the Chicago Board Options Exchange (CBOE) for breakdowns in its role as a self-regulatory organization, including its failure to oversee compliance with Reg SHO.[11] NASDAQ and CBOE ultimately paid $10 million and $6 million, respectively – the two largest SEC penalties ever levied against exchanges. After many decades of never assessing a single penalty against a securities exchange, we now have had six exchanges collectively pay over $25 million in less than two years. And through these actions, we have sent a strong, unmistakable message that exchanges need to institute appropriate controls and closely monitor trading. Our market structure cases have not been limited to exchanges. A substantial amount of trading—recently reported to be over one-third of all trading—occurs off-exchange, and we are expanding our presence in this realm. Indeed, the Commission has already brought actions against two dark pool operators in recent years[12] and will continue to pursue Reg ATS violations, including the failure to implement safeguards that protect ATS subscribers’ confidential trading information as required by Reg ATS. Considering the volume of trading at these venues, investors must be able to trust that off-exchange trading is fair and reliable. In addition to trading venues like exchanges and dark pools, we also must continue to focus on brokerdealers that route much of the order flow in today’s markets. Rule 15c3-5, known as the “Market Access Rule,” requires brokers-dealers to have reasonably designed controls and supervisory procedures to manage the risks of having market access, including both financial controls to prevent problems like erroneous orders and trades that exceed capital and credit limits, and regulatory controls that ensure compliance with our rules and regulations.[13] Last fall, we brought our first enforcement case under Rule 15c3-5 against Knight Capital related to the firm’s August 2012 trading incident that disrupted the markets. The action included a $12 million penalty and our investigation showed, among other things, that Knight did not have adequate controls for its smart order router.[14] This is an important area for us and you can expect continued scrutiny relating to compliance with the Market Access Rule. We also have been focused on other issues related to high-frequency and automated trading, including potential abuses of order types, net capital rules, and manipulative trading. For example, we have brought cases involving a manipulative trading practice known as “layering,” which involves the use of fictitious orders that a trader intends to cancel before they are executed, to induce others to buy or sell securities at prices that do not represent actual supply and demand. Indeed, the Commission charged the owner of a brokerage firm last month with engaging in layering over a three-year period.[15] As the primary regulator of the securities industry, the SEC remains committed to bringing enforcement actions whenever parties jeopardize the integrity of our markets or otherwise fail to operate within the rules. Through these efforts, we will continue to ensure that our markets remain fair, efficient, and reliable for all investors. Task Forces Over the last year, we also have amplified the division’s focus on other areas of growing concern, beyond the ones covered by the specialized units. We have accomplished this by launching several task forces, which have enabled us to quickly mobilize a core group of attorneys, professionals, and industry experts to concentrate on high-priority areas and share their expertise and promising leads division-wide. For example, we launched the Financial Reporting and Audit Task Force to renew our attention on financial reporting and accounting fraud.[16] The importance of pursuing financial fraud cannot be overstated. Comprehensive, accurate and reliable financial reporting is the bedrock upon which our markets are based because false financial information saps investor confidence and erodes the integrity of the markets. The Task Force’s mandate is to incubate financial reporting cases by finding promising investigations. It brings together an experienced group of attorneys and accountants who are developing state-of-the-art techniques for identifying and uncovering accounting fraud. The team relies on the latest data analytic tools and outside services to identify high-risk companies and potential accounting issues.[17] And it is already off to a great start, having helped generate several promising leads. Meanwhile, we have brought a series of financial reporting cases over the last few months, including significant actions against CVS, Diamond Foods, AgFeed, and Dewey & LeBouf.[18] More such cases will be coming down the pike. In addition to more closely monitoring financial reporting, we also have bolstered our focus on financial reporting “gatekeepers.”[19] In every financial reporting investigation, we evaluate the conduct of the auditors, seeking to determine whether they followed audit procedures and performed their role according to generally accepted auditing standards. We also are more closely monitoring and pursuing misconduct related to microcap securities. Abuses in this area frequently involve entities that use false or misleading marketing campaigns and manipulative trading strategies, largely at the expense of less sophisticated, retail investors. Over time, these abuses have proliferated due to the increased use of the Internet and social media to publicize fraudulent schemes and lure in unsuspecting investors. To stay on top of this, we created a Microcap Fraud Task Force, which is focused on developing proactive initiatives that target executives, gatekeepers and other repeat players who help facilitate these schemes. [20] The Task Force also aims to identify and shut down schemes in their early stages, with tools like trading suspensions and asset freezes. And it has had an immediate impact. We have opened numerous investigations because of their work and brought 15 trading suspensions in recent months. These efforts have enabled us to more quickly halt misconduct and mitigate investor harm, while sending an unmistakable message to the microcap community.[21] We also recently launched a Broker-Dealer Task Force that is focusing on current issues and practices within the broker-dealer community. The group is liaising closely with the broker-dealer program within OCIE, as well as the Division of Trading and Markets, to develop initiatives that can be implemented division-wide. Their early efforts include initiatives relating to anti-money laundering regulations and recidivist brokerage firms that shelter rogue brokers and engage in abusive activities. The Division also is focused on enforcing some of the Commission’s new and upcoming rules. For example, last year we launched the JOBS Act Task Force, a nationwide group dedicated to preparing the Division to enforce the new capital-raising rules under the JOBS Act, including rules related to general solicitation and crowdfunding. The group has created risk-based initiatives to identify parties that are not adhering to the new regulations, including issues related to inadequate efforts to verify accreditation.[22] New Approach to Settlements The changes in the last year have not been limited to substantive areas of focus. One of the first changes implemented after Chair White and I arrived at the SEC last year was to modify the SEC’s longstanding no admit/no deny settlement protocol by requiring admissions in certain types of cases. Our prior practice had been to settle all cases, except those with a guilty plea or criminal conviction, on a no admit/no deny basis. This practice had served the SEC well for many years. When we settle enforcement cases on a no admit/no deny basis, we often are able to get the same – or even higher – penalties than we would have if we litigated and won the case. Such settlements also speed up our ability to reclaim ill-gotten gains and return funds to wronged investors, avoid the delay and uncertainty inherent in trials, and allow us to use our finite resources more efficiently. But there are some cases where the need for accountability and acceptance of responsibility is critical to the success of our program. In such cases, admissions enhance the message and strength of the action, and enable us to achieve a greater measure of public accountability, which, in turn, bolsters the public’s confidence in the safety of our markets. After nearly a year, I am happy to report that the new program is working very well. We have obtained admissions in eight cases under the new approach – with more in the pipeline. And we have obtained them across a broad spectrum of defendants – against firms and individuals; against regulated and unregulated entities; and in scienter-based, as well as non-scienter, controls-based cases. Many originally doubted our ability to implement this new approach. Some expressed concern that we would not be able to obtain admissions because defendants would be overly concerned about collateral consequences. Others wondered whether our new policy would bog down settlements and cause more parties to go to trial. But these dire predictions have not materialized and we have been able to obtain significant admissions in cases where we thought they were appropriate. Now that we have settled a number of cases with admissions, the types of cases where the Division may seek them can be better appreciated. We obtained admissions in the ConvergEx matter, for example, where the defendants were regulated entities and their egregious and fraudulent conduct harmed numerous clients.[23] We obtained admissions from JP Morgan – for conduct related to the so-called “London Whale” trading loss – where the company’s woefully deficient controls created a significant risk to investors.[24] In our action against Philip Falcone and his advisory firm, admissions helped give the public unambiguous information about the defendant’s actions so they would be empowered to make informed decisions about whether to continue investing in companies with which he was involved.[25] In the Scottrade matter, we obtained admissions where the company produced inaccurate blue sheet data over an extended period of time, which impeded the SEC’s ability to investigate misconduct and protect investors.[26] And in Lions Gate, we sent an important message to the market about the perils of misleading investors in the midst of a tender offer battle.[27] The new admissions approach gives us an additional powerful tool to use in appropriate cases and it has undoubtedly strengthened our program. Trials Another area of focus for the Division over the past year has been enhancing our litigation efforts. We have experienced a significant increase in the number of trials this year – in fact, we had more trials in the first half of this fiscal year than we had during all of the last fiscal year. This is hardly a bad development – as Mary Jo has said in the past, trials have lots of benefits, including the public airing and adjudication of the facts. Although it could just be a blip, this uptick in trials means that we must marshal appropriate resources and skills to remain competitive in court against defendants that often have far greater resources at their disposal. And we have been doing just that. We have incredibly talented lawyers at the SEC who I would put up against any defense counsel. We are ensuring that we provide the strongest advocacy possible in every case, preparing relentlessly for any argument that might be raised at trial. This renewed focus does not mean we will win every case – though we have been very successful overall and recently, winning our last five jury trials, including our significant victory last week in the Wyly matter. What it does mean is that defendants know we will not hesitate to go to trial, and that when we are in court, defendants will face skilled, tireless advocates who will present as strong a case as possible on our behalf. Use of Technology We also have been focused on using technology to improve our ability to detect and investigate fraud. With the increased complexity of the markets, and of schemes more generally, as well as the proliferation of big data, we need to better harness technology in order to keep up with wrongdoers. Take insider trading. Over the last five years, we have filed an unprecedented number of insider trading actions against more than 570 individuals and firms. We often have learned of this misconduct through surveillance referrals from FINRA and ORSA. But we also have now developed in-house the Advanced Bluesheet Analysis Program to identify suspicious trading patterns that would suggest relationships among different traders who may be sharing inside information. Identifying these trading relationships allows us to work backwards to find evidence of connections and sources of the inside information. Technology is assisting us in many other areas as well. We developed a program a couple of years ago that identifies aberrant returns in investment funds, which often can signify misconduct. We have brought a number of cases identified through this initiative and continue to expand its application as we receive and process new fund data. Last year, we launched the Center for Quantitative and Risk Analytics, which is helping us develop technologies to analyze trading and other types of data available to us from a wide variety of venues.[28] It is critical that we continue to develop tools that mine these massive data sources for possible violations. This data is a rich source of information for us and we need to take advantage of it. Increased Focus on Compliance Finally, because this is the Compliance Week conference, I thought it would be appropriate to spend a few minutes on compliance programs and compliance officers. I start from the premise that the companies that have done well in avoiding significant regulatory issues typically have prioritized legal and compliance issues, and developed a strong culture of compliance across their business lines and throughout the management chain. This is something I observed firsthand while in private practice and have come to fully appreciate from my perch at the SEC. I have found that you can predict a lot about the likelihood of an enforcement action by asking a few simple questions about the role of the company’s legal and compliance departments in the firm. Are legal and compliance personnel included in critical meetings? Are their views typically sought and followed? Do legal and compliance officers report to the CEO and have significant visibility with the board? Are the legal and compliance departments viewed as an important partner in the business and not simply as support functions or a cost center? Far too often, the answer to these questions is no, and the absence of real legal and compliance involvement in company deliberations can lead to compliance lapses, which, in turn, result in enforcement issues. When I was in private practice, I always could detect a significant difference between companies that prioritized legal and compliance and those that did not. When legal and compliance were not equal partners in the business, and were not consulted as a matter of course, problems were inevitable. I hope to use my current role to further promote a strong, empowered legal and compliance presence at firms, in part by encouraging legal and compliance personnel to engage and become involved when they see an issue that raises a concern. You should not hesitate to provide advice and help remediate when problems arise. And I do not want you to be concerned that by engaging, you will somehow be exposed to liability. As recent SEC staff guidance makes clear, compliance personnel do not become supervisors solely because they provide advice to, or consult with, business line personnel and the staff does not view compliance or legal personnel generally as supervising business personnel.[29] But at the same time, I need to be clear that we have brought – and will continue to bring – actions against legal and compliance officers when appropriate. This typically will occur when the Division believes legal or compliance personnel have affirmatively participated in the misconduct, when they have helped mislead regulators, or when they have clear responsibility to implement compliance programs or policies and wholly failed to carry out that responsibility. A recent case illustrates all three of these situations. Yesterday, the Commission instituted administrative proceedings against the CCO, among others, at what used to be one of the largest independent clearing firms in the country. In the matter, the Division alleged that the firm violated Reg SHO for more than three years and that the CCO not only knew about the firm’s decision to violate the rules, but also affirmatively participated in the violations by, among other things, failing to implement procedures that he was responsible for implementing and that would have brought the firm into compliance, and then concealing those violations from regulators.[30] It also is certainly appropriate to bring actions against compliance officers when they fail to carry out their clearly assigned responsibility to implement necessary policies. For example, we launched the Compliance Program Initiative – a joint effort with OCIE – to identify and bring actions against investment advisers that fail to adopt or implement adequate compliance programs after being notified repeatedly of deficiencies by examination staff.[31] To date, the Commission has brought ten actions as part of this initiative, including charges against compliance personnel when they were clearly responsible for the failure. At the end of the day, though, legal and compliance officers who perform their responsibilities diligently, in good faith, and in compliance with the law are our partners and need not fear enforcement action. In fact, we want to use our enforcement program to support your efforts. Last year, for example, we filed our firstever charge against an individual for misleading and obstructing a compliance officer of an investment adviser. The Commission’s Order was based on factual findings that an assistant portfolio manager had, among other things, attempted to conceal from his firm’s CCO his involvement in more than 600 unauthorized personal trades – many of which involved securities held or acquired by funds that the firm managed.[32] We will look for more cases like this one. Conclusion So you can see that we have been quite busy this past year trying to expand our enforcement footprint. As markets continue to evolve, we must continue to innovate and devise new strategies that enhance our ability to deter wrongdoers, and broaden our reach within the industry. I am confident that this next year will be even better and I hope to return in 2015 to report on another great round of innovations that will help us detect misconduct and bring securities violators to justice. Thanks very much and I look forward to taking your questions. [1] See, e.g., Press Release No. 2013-230, SEC Charges Three Firms With Violating Custody Rule (Oct. 28, 2013), available at http://www.sec.gov/News/PressRelease/Detail/PressRelease/1370540098359; Press Release No. 2013-250, SEC Announces Charges Against Two-Houston Based Firms for Engaging in Thousands of Undisclosed Principal Transactions (Nov. 26, 2013), available at http://www.sec.gov/News/PressRelease/Detail/PressRelease/1370540414827; Press Release No. 2012-90, SEC Charges Scotland-Based Firm for Improperly Boosting Hedge Fund Client at Expense of U.S. Fund Investors (May 10, 2012), available at http://www.sec.gov/News/PressRelease/Detail/PressRelease/1365171489060; Press Release No. 2013-259, SEC Charges London-Based Hedge Fund Adviser and U.S.-Based Holding Company for Internal Control Failures (Dec. 12, 2013), available at http://www.sec.gov/News/PressRelease/Detail/PressRelease/1370540491613; Press Release No. 2013-226, SEC Sanctions Three Firms Under Compliance Program Initiative (Oct. 23, 2013), available at http://www.sec.gov/News/PressRelease/Detail/PressRelease/1370540008287; Press Release No. 2013-78, SEC Charges Gatekeepers of Two Mutual Fund Trusts for Inaccurate Disclosures About Decisions on Behalf of Shareholders (May 2, 2013), available at http://www.sec.gov/News/PressRelease/Detail/PressRelease/1365171514096; Press Release No. 2012-259, SEC Charges Eight Mutual Fund Directors for Failure to Properly Oversee Asset Valuation (Dec. 10, 2012), available at http://www.sec.gov/News/PressRelease/Detail/PressRelease/1365171486708. [2] See Press Release No. 2013-82, SEC Charges City of Harrisburg for Fraudulent Public Statements (May 6, 2013), available at http://www.sec.gov/News/PressRelease/Detail/PressRelease/1365171514194. [3] See Press Release No. 2013-235, SEC Charges Municipal Issuer in Washington’s Wenatchee Valley Region for Misleading Investors (Nov. 5, 2013), available at http://www.sec.gov/News/PressRelease/Detail/PressRelease/1370540262235. [4] See Press Release No. 2013-130, SEC Charges City of Miami and Former Budget Director with Municipal Bond Offering Fraud (July 19, 2013), available at http://www.sec.gov/News/PressRelease/Detail/PressRelease/1370539727618; Press Release No. 2013-75, SEC Charges City of Victorville, Underwriter, and Others with Defrauding Municipal Bond Investors (Apr. 29, 2013), available at http://www.sec.gov/News/PressRelease/Detail/PressRelease/1365171514980. [5] See Press Release No. 2014-3, SEC Charges Alcoa With FCPA Violations (Jan. 9, 2014), available at http://www.sec.gov/News/PressRelease/Detail/PressRelease/1370540596936. [6] See Press Release No. 2013-252, SEC Charges Weatherford International With FCPA Violations (Nov. 26, 2013), available at http://www.sec.gov/News/PressRelease/Detail/PressRelease/1370540415694. [7] See Press Release No. 2014-73, SEC Charges Hewlett-Packard With FCPA Violations (Apr. 9, 2014), available at http://www.sec.gov/News/PressRelease/Detail/PressRelease/1370541453075. [8] See, e.g., Press Release No. 2011-131, J.P. Morgan to Pay $153.6 Million to Settle SEC Charges of Misleading Investors in CDO Tied to U.S. Housing Market (June 21, 2011), available at http://www.sec.gov/news/press/2011/2011-131.htm; Press Release No. 2013-148, SEC Charges Bank of America With Fraud in RMBS Offering (Aug. 6, 2013), available at http://www.sec.gov/News/PressRelease/Detail/PressRelease/1370539751924. [9] See Press Release No. 2014-87, SEC Charges NYSE, NYSE ARCA, and NYSE MKT for Repeated Failures to Operate in Accordance With Exchange Rules (May 1, 2014), available at http://www.sec.gov/News/PressRelease/Detail/PressRelease/1370541706507. [10] See Press Release No. 2013-95, SEC Charges NASDAQ for Failures During Facebook IPO (May 29, 2013), available at http://www.sec.gov/News/PressRelease/Detail/PressRelease/1365171575032. [11] See Press Release No. 2013-107, SEC Charges CBOE for Regulatory Failures (June 11, 2013), available at http://www.sec.gov/News/PressRelease/Detail/PressRelease/1365171575348. [12] See Press Release No. 2012-204, SEC Charges Boston-Based Dark Pool Operator for Failing to Protect Confidential Information (Oct. 3, 2012), available at http://www.sec.gov/News/PressRelease/Detail/PressRelease/1365171485204; Press Release No. 2011-220, Alternative Trading System Agrees to Settle Charges That It Failed to Disclose Trading by an Affiliate (Oct. 24, 2011), available at http://www.sec.gov/news/press/2011/2011-220.htm. [13] See 17 C.F.R. § 240.15c3-5. [14] See Press Release No. 2013-222, SEC Charges Knight Capital With Violations of Market Access Rule (Oct. 16, 2013), available at http://www.sec.gov/News/PressRelease/Detail/PressRelease/1370539879795. [15] See Press Release No. 2014-67, SEC Charges Owner of N.J.-Based Brokerage Firm With Manipulative Trading (Apr. 4, 2014), available at http://www.sec.gov/News/PressRelease/Detail/PressRelease/1370541406190. [16] See Press Release No. 2013-121, SEC Announces Enforcement Initiatives to Combat Financial Reporting and Microcap Fraud and Enhance Risk Analysis (July 2, 2013), available at http://www.sec.gov/News/PressRelease/Detail/PressRelease/1365171624975. [17] See SEC Spotlight on the Financial Reporting and Audit Task Force, available at http://www.sec.gov/spotlight/finreporting-audittaskforce.shtml. [18] See Press Release No. 2014-69, SEC Charges CVS With Misleading Investors and Committing Accounting Violations (Apr. 8, 2014), available at http://www.sec.gov/News/PressRelease/Detail/PressRelease/1370541437806; Press Release No. 2014-4, SEC Charges Diamond Foods and Two Former Executives Following Accounting Scheme to Boost Earnings Growth (Jan. 9, 2014), available at http://www.sec.gov/News/PressRelease/Detail/PressRelease/1370540598296; Press Release No. 2014-47, SEC Charges Animal Feed Company and Top Executives in China and U.S. With Accounting Fraud (Mar. 11, 2014), available at http://www.sec.gov/News/PressRelease/Detail/PressRelease/1370541102314; Press Release No. 2014-45, SEC Charges Five Executives and Finance Professionals Behind Fraudulent Bond Offering by International Law Firm (Mar. 6, 2014), available at http://www.sec.gov/News/PressRelease/Detail/PressRelease/1370540889964. [19] See Press Release No. 2013-207, SEC Charges Three Auditors in Continuing Crackdown on Violations or Failures By Gatekeepers (Sept. 30, 2013), available at http://www.sec.gov/News/PressRelease/Detail/PressRelease/1370539850572. [20] See Press Release No. 2013-121, SEC Announces Enforcement Initiatives to Combat Financial Reporting and Microcap Fraud and Enhance Risk Analysis (July 2, 2013), available at https://www.sec.gov/News/PressRelease/Detail/PressRelease/1365171624975. [21]See SEC Spotlight on Microcap Fraud, available at http://www.sec.gov/spotlight/microcap-fraud.shtml. [22] See SEC Spotlight on Jumpstart Our Business Startups (JOBS) Act, available at http://www.sec.gov/spotlight/jobs-act.shtml. [23] See Press Release No. 2013-266, SEC Charges ConvergEx Subsidiaries With Fraud for Deceiving Customers About Commissions (Dec. 18, 2013), available at http://www.sec.gov/News/PressRelease/Detail/PressRelease/1370540521484. [24] See Press Release No. 2013-187, JPMorgan Chase Agrees to Pay $200 Million and Admits Wrongdoing to Settle SEC Charges (Sep. 19, 2013), available at http://www.sec.gov/News/PressRelease/Detail/PressRelease/1370539819965. [25] See Press Release No. 2013-159, Philip Falcone and Harbinger Capital Agree to Settlement (Aug. 19, 2013), available at http://www.sec.gov/News/PressRelease/Detail/PressRelease/1370539780222. [26] See Press Release No. 2014-17, Scottrade Agrees to Pay $2.5 Million and Admits Providing Flawed ‘Blue Sheet’ Trading Data (Jan. 29, 2014), available at http://www.sec.gov/News/PressRelease/Detail/PressRelease/1370540696906. [27] See Press Release No. 2014-51, SEC Charges Lions Gate With Disclosure Failures While Preventing Hostile Takeover (Mar. 13, 2014), available at http://www.sec.gov/News/PressRelease/Detail/PressRelease/1370541123111. [28] See Press Release No. 2013-121, SEC Announces Enforcement Initiatives to Combat Financial Reporting and Microcap Fraud and Enhance Risk Analysis (July 2, 2013), available at http://www.sec.gov/News/PressRelease/Detail/PressRelease/1365171624975. [29] See Frequently Asked Questions about Liability of Compliance and Legal Personnel at Broker-Dealers under Sections 15(b)(4) and 15(b)(6) of the Exchange Act (Sept. 30, 2013), available at http://www.sec.gov/divisions/marketreg/faq-cco-supervision-093013.htm. [30] See Press Release No. 2014-101, SEC Announces Charges Against Four Former Officials at Clearing Firm Penson Financial Services for Regulation SHO Violations (May 19, 2014), available at http://www.sec.gov/News/PressRelease/Detail/PressRelease/1370541860014. [31] See Press Release No. 2013-226, SEC Sanctions Three Firms Under Compliance Program Initiative (Oct. 23, 2013), available at http://www.sec.gov/News/PressRelease/Detail/PressRelease/1370540008287. [32] See Press Release No. 2013-165, SEC Sanctions Colorado-Based Portfolio Manager for Forging Documents and Misleading Chief Compliance Officer (Aug. 27, 2013), available at http://www.sec.gov/News/PressRelease/Detail/PressRelease/1370539791420. Last modified: May 21, 2014