Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
On December 28, the New York State Department of Financial Services (DFS) issued an updated version of its first-in-the-nation cybersecurity regulation after having “carefully considered all comments submitted” during the comment period following the issuance of the original regulation in September. The comments received by the DFS included a strongly worded and detailed letter authored by banking and insurance industry groups. The updated draft is subject to an additional comment period of 30 days and the final version will become effective March 1, 2017. The updated proposed regulation provides significantly more wiggle room than the original version, shifting from an approach that enforces minimum standards to a risk-based approach with increased transition periods for compliance. A few highlights of the changes are summarized below:
In addition to the delayed effective date of March 1 (from January 1)and the default transition period of 180 days to comply (which now runs on August 28, 2017), the DFS has built in longer transition periods for certain sections. New deadlines include:
Penetration Testing and Vulnerability Assessments (Section 500.05): In addition to the longer transition period provided, this section was updated to allow for “continuous monitoring or periodic penetration testing and vulnerability assessments.” If the proposed regulation becomes final in its current form, vulnerability assessments will only required bi-annually. In the DFS's original proposed regulations, penetration testing would have been required annually and vulnerability assessments quarterly “at a minimum,” and there was no suggestion of continuous monitoring as a substitute option.
Third Party Service Provider Security Policy (Section 500.11): In addition to the 18 month extension on implementation of this section, this section sets a lower threshold of accountability for vendors with access to information systems and nonpublic information and then, only “to the extent possible.” Notable changes include removal of the requirement that contracts with third party service providers require “prompt notice” of cybersecurity events and the right “to perform cyber security audits” of the third party.
The parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.
The DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.
This article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.
There is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.
The Second Circuit affirmed the lower courts' judgment that a "transfer made … in connection with a securities contract … by a qualifying financial institution" was entitled "to the protection of ... §546 (e)'s safe harbor ...."