News & Analysis


September 28, 2017 | Compliance Alert

Below are the regulatory filing submission deadlines occurring from October through December 2017.

September 28, 2017 | Compliance Alert

On September 14, 2017, the SEC’s Office of Compliance Inspections and Examinations (“OCIE”) issued a National Exam Program Risk Alert related to Rule 206(4)-1 under the Investment Advisers Act of 1940 (the “Advertising Rule”).

September 27, 2017 | Article
Protecting Your Business from All Angles —  Preventing a Cyber Incident from the Top-Down and Inside-Out

Cyber incidents can have devastating effects on business of all sizes. A breach or malware attack could cripple business operations, lead to financial losses, expose sensitive data, and cause reputational damage.

September 26, 2017 | Compliance Alert

The U.S. Securities and Exchange Commission (SEC) announced two cyber enforcement initiatives on September 25, 2017 to address cyber threats and protect retail investors. The SEC will create a Cyber Unit to target cyber-related misconduct and establish a Retail Strategy Task Force to enforce initiatives that impact retail investors.

September 26, 2017 | Cyber Alert
Threat Summary
September 25, 2017 | Compliance Alert

October 1, 2017 is the compliance date for the Form ADV amendments and the books and records rule amendments which were adopted in August 2016.

September 21, 2017 | Compliance Alert

U.S. Financial Institutions (FI's) are required to file a Currency Transaction Report (CTR) for each transaction in currency over $10,000. A transaction is any deposit, withdrawal, exchange, or other payment or transfer made by, through, or to the Financial Institution. These CTR's must then be filed with the Financial Crimes Enforcement Network (FinCEN).

September 21, 2017 | Compliance Alert

In 2016, Venezuela ranked 166thout of 176 countries listed on the Corruption Perception Index issued by Transparency International[1] . As Venezuela's social and economic situation continues to deteriorate, there is an increased risk of corruption money making its way to the U.S. financial system. This risk, combined with sanctions imposed by the U.S.

September 20, 2017 | Compliance Alert, Article

ACA Compliance Group recently hosted the webcast briefing Regulatory Investment in Trade Surveillance – What You Should Know.

September 15, 2017 | Compliance Alert

If the idea of hashtags, interactive posts, and social media presence isn’t scary enough, the SEC is now interested in knowing how advisers are managing and monitoring the risks that social media platforms present. As part of broader Form ADV updates that will begin influencing advisers on October 1, 2017, advisers will be required to disclose the links to company level social media sites. 

September 13, 2017 |
Threat Summary

Researchers discovered a new attack vector, “BlueBorne,” along with eight zero-day Bluetooth vulnerabilities, four of which are critical, that could allow an attacker to remotely control Bluetooth-enabled devices and install malware that can rapidly jump from one device to another on the same network.

Mobile device manufacturers were notified of the Bluetooth vulnerabilities in April of this year, so the vulnerabilities have been patched in the majority of new phones. However, devices with older software may be at risk.

September 12, 2017 | Article

Following the SEC’s recent commentary on Initial Coin Offerings, some investment adviser firm employees will now need to report the personal trades they make in certain types of virtual currency tokens.

September 8, 2017 | White Paper

The need to implement cyber security and other information security controls has become the new business reality. Organizations that are technology and data dependent, regardless of size, need to evaluate their exposure and formulate an information security program, as well as contemplate their potential breach response. Such a program must include third party service providers, include cloud-based providers, and organizations must recognize that their third party providers’ program in many ways become part of their information security programs.