As of December 3, 2025, the SEC’s long-awaited amendments to Regulation S-P, the Commission’s primary data-security rule, are officially in force for “larger entities,” including registered investment advisers with a minimum of $1.5 billion in AUM. Smaller firms have until June 3, 2026, but the message from regulators is clear: Modern data-protection expectations have arrived.
At a high level, the amendments require firms to (1) implement a written incident-response program, (2) provide customer breach notifications within 30 days, (3) strengthen service-provider oversight, and (4), maintain detailed recordkeeping demonstrating compliance. These elements are well understood.
What remains less clear—and where advisers may face greater headaches—is navigating the practical grey areas the amended rule (the Rule) inevitably leaves open.
Defining “Sensitive Customer Information”
The amendments outline “sensitive customer information” as any customer data that, alone or when combined with other information, if compromised, could result in substantial harm or inconvenience to an individual.
Straightforward on paper, sure, but what actually qualifies? Basic identifiers? Account data? Holdings and performance? Depending on the context, almost anything could fit.
As such, many advisers are taking the conservative route and treating a broader range of information as sensitive to avoid under-notification risk.
Sensible, but not painless: Over-classifying data can trigger more escalations, documentation, and client notifications than truly necessary. The challenge is staying cautious without making the process unmanageable.
Determining When Data Was “Reasonably Likely” Accessed
Of course, the hard part isn't proving data was accessed, it's figuring out when someone actually grabbed it. Deciding that data was “reasonably likely” to have been accessed is what triggers the (often) unforgiving 30-day notification clock, yet most incidents don’t offer clean evidence of timing.
Murky logs, a missing (but supposedly encrypted) device, or a vendor that can’t quite say what happened can put firms on the spot. With no bright lines in the rule, advisers are forced to set their own thresholds, kicking off the breach-response sprint.
Coordinating State, Federal & Contractual Obligations
Regulation S-P may set a federal floor for breach notification, but firms still have to juggle a patchwork of state laws, global rules, and whatever timelines their vendors happen to live by. It's no wonder many are drifting toward a “strictest standard wins” approach, not because it's required, but to sidestep the chaos of tracking a dozen different countdowns simultaneously.
The Third-Party Wildcard
If all of this sounds challenging inside your own four walls, it really gets knotty once you remember that most of the action now happens at third-party vendors (think custody, reporting systems, CRM, and workflow platforms, etc.).
The Rule expects advisers to ensure service providers both safeguard customer information and tell you quickly when they don’t, yet it never spells out how deep your diligence must go or what vendor contract terms are non-negotiable.
Meanwhile, if a vendor is breached, you’re the one who has 30 days to explain it to clients. That combination turns vendor oversight from a routine checkbox into one of the most complex, high-stakes parts of the entire regime.
The Takeaway
With the Rule now live, compliance shifts from reading the SEC’s words to interpreting everything it didn’t say.
Firms must define their thresholds, document their logic, and be ready to defend their judgment calls in an exam, because ambiguity isn’t an excuse; it’s the new operating environment. In other words: The Rule was the easy part. The real work begins now. |
|