Alert:
For more information on the cybersecurity incident, please visit the cybersecurity incident page.
Overview
This Guidance outlines IIROC’s requirements related to IIROC Rule subsection 3703(1) and clause 3703(2)(vii) (Cybersecurity Incident Reporting Requirements) and also provides guidance to Dealer Members (Dealers) on how to demonstrate compliance with IIROC requirements. This Guidance replaces GN-3700-21-005.
Through the Cybersecurity Incident Reporting Requirements, IIROC has been able to:
In addition to the Cybersecurity Incident Reporting Requirements, other relevant IIROC requirements are:3
Pursuant to Cybersecurity Incident Reporting Requirements, Dealers must:
The requirements also outline specific information that must be provided when reporting to IIROC.
Dealers should develop criteria to determine what would constitute a cybersecurity incident at their firm that would trigger reporting to IIROC, including:
The definition of cybersecurity incident is broad, in order to accommodate the evolving nature of cybersecurity risk, and includes, among others, breaches that:
Dealers should use their judgment when assessing the reasonable likelihood that an incident can (i) result in substantial harm to a person, 4 or (ii) have a “material impact” on its normal operations, taking into consideration its size, business model and the nature of the cybersecurity incident.
For instance, an incident could be considered to be “material” if the Dealer would, in the normal course of operations, escalate it to senior management. Also, Dealers should not look at incidents in isolation. A non-material incident by itself may still be considered material or likely to cause substantial harm if it recurs or has a wider impact5.
When evaluating what constitutes Dealer “information system” or “information stored on such systems”, Dealers need to also consider elements that are supplied by outsourced or third-party service providers.
The initial report is a brief snapshot of relevant information about a cybersecurity incident provided by a Dealer immediately following discovery of the cybersecurity incident and is meant to reflect only a preliminary assessment of the cybersecurity incident.
The Cybersecurity Incident Reporting Requirements prescribe what needs to be provided in the initial report, but the Dealer should share all pertinent information about the cybersecurity incident with IIROC. We recognize that Dealers may not have a complete analysis within three calendar days following discovery of the cybersecurity incident and we expect Dealers to submit the best information available to them at the time of reporting6.
If a Dealer has identified a possible cybersecurity incident but is not sure if the incident meets the definition to trigger reporting, we recommend that the Dealer contact its Financial & Operations Compliance (FinOps) relationship manager for guidance. Similarly, if a Dealer has reported the cybersecurity incident to IIROC within three days, but later determines that no cybersecurity incident, as defined in the IIROC Rules, occurred, then the Dealer must notify IIROC of this change in assessment. If IIROC is satisfied with the explanation provided by the Dealer that no cybersecurity incident occurred, then the Dealer does not need to provide an incident investigation report to IIROC7.
The incident investigation report is a more detailed report that a Dealer produces after a thorough investigation8 of the cybersecurity incident. The Cybersecurity Incident Reporting Requirements prescribe what needs to be provided to IIROC in the incident investigation report. The incident investigation report should include:
If a Dealer obtains material new information related to the cybersecurity incident after providing the incident investigation report, it must provide IIROC with the details.
If a Dealer needs more time to provide the incident investigation report, it should notify its FinOps relationship manager and let them know:
If IIROC agrees to grant an extension, the Dealer should keep IIROC up to date regarding the status of its investigation and the actions taken.
Dealers must be able to demonstrate to IIROC that they are complying with all applicable rules and requirements.
Dealers can demonstrate compliance with the Cybersecurity Incident Reporting Requirements by providing evidence as follows:
IIROC’s FinOps group will review the Dealer’s evidence of controls to ensure compliance with the Cybersecurity Incident Reporting Requirements and all applicable IIROC requirements during regularly scheduled field examinations. If the Dealer is unable to demonstrate that they have designed and implemented sufficient and appropriate controls to ensure compliance with the IIROC rules or the controls, as designed and implemented, are not working effectively, then such an examination finding could lead to action by IIROC including but not limited to one or more of the following: more frequent IIROC examinations, administrative fees or penalties, and the imposition of terms and conditions.
For other information and resources on managing cybersecurity threats, including guides and webinars, please refer to IIROC’s cybersecurity site.
This Guidance Note discusses the following IIROC Rules:
This Guidance replaces GN-3700-21-005 Frequently Asked Questions – Mandatory Cybersecurity Incident Reporting.
This Guidance Note was published under Notice 22-0024.
Welcome to CIRO.ca!
You can find the Canadian Investment Regulatory Organization (CIRO) at CIRO.ca with our fresh look and feel.