Practical IT Change Management, the CCO’s Best Friend: Utilizing Change Management to Evidence Monitoring

Utilizing Change Management to Evidence Monitoring

As the SEC arrives to the technology party in a very public manner, investment advisers and broker dealers, who have already been operating in a needs-driven and best practice environment, must now open their programs for scrutiny. Current SEC and FINRA exams are already extending the interview and examination process into the technology arena, starting with the Chief Compliance Officer’s methods for touching base with and monitoring tech processes with regulatory ramifications. There are very few tech processes without direct ramifications for the compliance function. Consider Rule 204-2 and the maintenance and archiving of firm records on systems, file servers, and in the cloud; Regulation S-P and the protection of client information through secure networks, VPN’s, and the utilization of encryption; FINRA Notice to Members 11-39 (August 2011) in conjunction with Rule 17a-4 regarding the retention of business communications extending to personal devices like phones and tablets. The list goes on indefinitely as all of our business models have become intertwined with enabling technology. The registered adviser’s fiduciary responsibility to clients has been inextricably snared in the ability to manage, maintain, and deliver services through systems, networks, outsourced applications, and third parties.

Perhaps equally important to the potential for regulators connecting your compliance monitoring duties to technology, investors, both private and institutional, expect evidence of your firm’s ability to secure data and provide continuous services. The final critical consideration in vetting your technology program in general is the growing threat of breach and corresponding business risk. I have heard the words many times “our perimeter is secure.” Industry surveys, daily reports in the media, and our own experience teaches that this is a special form of hubris.1 Are you, the Chief Compliance Officer, working to validate such statements?

Fill in the form below

Loading form...
Category: Tags: ,

Cart

Latest Content

Schedule 13D/13F Clarity on ETF Issues

Do I need to file a 13D or 13G if my client accounts hold in excess of 5% of an ETF? Generally, no. The SEC has granted no-action relief to ETFs with respect to compliance with Section 13(d) of the Securities Exchange Act. Section 13(d) was designed to require disclosure when holders begin to accumulate … Continued

New Remedy Coming for SEC’s Custody Rule?

The SEC’s Custody Rule continues to be a common source of confusion and a landmine for noncompliance. Custodial paperwork has caused huge headaches for investment advisers, who are not a party to the agreement and may not even have a copy of the custodial new account paperwork. The issue with existing guidance is that it … Continued

SEC Issues MiFID II No-Action Relief

Some industry anxiety was assuaged on October 26 with three no-action letters that offer relief for some US regulated broker-dealers and investment advisers regarding European MiFID II regulations. The letters followed consultation with the European authorities, and are designed to address concerns that investors could lose access to valuable research. MiFID II is a series of regulations … Continued

Regulatory Changes Impacting RICs and Service Providers

A year ago, the SEC adopted Investment Company Reporting Modernization Rules and Forms, as well as rules pertaining to liquidity risk management programs and swing pricing. New forms N-Port and N-Cen along with amendments to Regulation S-X significantly change the current reporting regime for most registered investment companies (RICs) because they require more comprehensive disclosure and … Continued

Publicly Available Information Heightens Need for Cybersecurity Vigilance

For any business, “ports” that allow for communication generally need to be open (for example, ports 80 and 443 for websites, and port 500 for VPN access). While most of these ports allow you to engage in critical functions, there are often ports that remain open despite being unneeded or unused. These available ports present … Continued

Mailing List

Subscribe to the Ascendant Compliance email list for the latest compliance resources, conferences, ComplianceCasts™, and more.

Loading form...

Contact Us

Ascendant works together with clients to identify and assess critical needs through customized plans. If you need assistance with compliance functions, regulatory services, cybersecurity or technology tools, we’d love to speak with you.