Remove tag gramm-leach-bliley-act
article thumbnail

Newly Proposed SEC Cybersecurity Risk Management and Governance Rules and Amendments for Public Companies

Data Matters

an unauthorized incident that has compromised the confidentiality, integrity, or availability of an information asset (data, system, or network) or violated the registrant’s security policies or procedures; b. an incident in which a malicious actor has demanded payment to restore company data that was stolen or altered.