The amended Regulation S-P requires every SEC-registered investment adviser to maintain four specific compliance documents before the June 3, 2026 deadline. These are not optional add-ons or best practices. They are regulatory requirements that SEC examiners will check during your next examination.
This article breaks down each document: what the SEC formally requires, what examiners actually look for in practice, the mistakes that trip up small RIAs, and how to build documents that hold up under scrutiny.
Document 1: Incident Response Program
The incident response program is the centerpiece of the amended Regulation S-P. The SEC added this requirement because too many firms had no documented process for handling security incidents. When something went wrong, the response was improvised. The amended rule makes a written, tested program mandatory.
What the SEC Requires
Under Rule 248.30(a)(4), your incident response program must include written policies and procedures that are "reasonably designed" to detect, respond to, and recover from unauthorized access to customer information. Specifically, the SEC expects:
- Detection procedures: How does your firm identify potential security incidents? This includes monitoring systems, log reviews, employee reporting channels, and vendor notifications.
- Assessment criteria: Once an incident is detected, how do you determine its severity? What triggers a full response versus a monitoring-only approach? The SEC wants documented classification criteria, not ad hoc judgment calls.
- Containment steps: What specific actions does your firm take to limit damage? This means isolating affected systems, revoking compromised credentials, and preserving evidence for investigation.
- Recovery plan: How do you restore normal operations? This includes system restoration procedures, data integrity verification, and client communication protocols.
- Annual testing schedule: The SEC expects your plan to be tested regularly through tabletop exercises or simulations, with documented results and follow-up actions.
What Examiners Actually Look For
SEC examination staff have limited time per firm. They develop patterns for quickly assessing whether a compliance program is real or performative. Here is what experienced examiners focus on:
Specificity over length. A 10-page plan tailored to a three-person RIA is more credible than a 50-page plan copied from an enterprise template. If your plan references a "24/7 security operations center" and you have three employees, the examiner will flag it immediately.
Evidence of testing. Examiners ask: "When did you last test this plan?" If the answer is never, that is a finding. They want dates, participants, scenarios tested, and what you changed afterward.
Named roles and responsibilities. A plan that says "the designated incident response coordinator" is weaker than one naming "Jane Smith, CCO" and a specific backup. Real names signal a real plan.
Realistic scenarios. Your plan should address incidents that could actually happen to your firm: compromised email credentials, a phishing attack targeting client data, a vendor data breach. Not a nation-state cyber attack.
Common Mistakes Small RIAs Make
The most frequent mistake is treating the incident response program as a theoretical exercise. Firms draft a document, file it away, and never look at it again. The SEC has repeatedly emphasized that policies must be implemented, not just written.
Another common error is failing to update the plan when operations change. If you switch custodians, adopt a new CRM, or add remote employees, your incident response program needs to reflect those changes.
RegShield generates a firm-specific incident response program based on your actual operations, technology stack, and team structure, so the document reflects reality from day one.
Document 2: Service Provider Oversight Program
The expanded vendor oversight requirements under the amended Regulation S-P reflect a simple truth: most small RIAs rely heavily on third-party technology. Your custodian, CRM, portfolio management software, cloud storage, email provider, and financial planning tools all handle customer information. The SEC now requires you to formally oversee each one.
What the SEC Requires
The amended rule requires written policies and procedures for the "oversight of service providers." According to the SEC's adopting release (Release No. 34-99494), this includes:
- Vendor inventory: A documented list of all service providers with access to customer information, including the type of data they access and the services they provide.
- Due diligence requirements: A defined process for evaluating a vendor's security practices before you engage them. This includes reviewing their security certifications, incident history, and data handling practices.
- Contractual notification obligations: Your vendor agreements must require the service provider to notify you of security incidents affecting your customer data within 72 hours of discovery. This is not a suggestion. The SEC expects this to be a contractual term.
- Ongoing monitoring: Procedures for periodically reviewing whether your vendors continue to meet your security standards. Annual reviews are the minimum expectation.
What Examiners Actually Look For
Examiners start with a simple question: "Can you show me your list of service providers who have access to customer information?" If you cannot produce this list, the rest of the conversation goes poorly.
Beyond the inventory, examiners check:
Contractual provisions. They will review vendor agreements and verify that breach notification clauses are included. If your contract with a key vendor has no security provisions, that is a finding.
Due diligence documentation. When you onboarded your last vendor, did you document your security review? Examiners look for evidence that you evaluated security before granting access to customer data.
Monitoring cadence. How often do you review vendors' security posture? "We trust them because they are a big company" is not a monitoring program.
Common Mistakes Small RIAs Make
The biggest mistake is assuming vendor oversight is only about your custodian. Small RIAs typically use 10 to 20 different technology platforms, and many touch customer information. If client data passes through it, it falls under these requirements.
Another frequent error is ignoring legacy vendor relationships. Firms focus due diligence on new vendors but never reassess providers they have used for years. The SEC does not distinguish between old and new vendor relationships.
RegShield includes a service provider oversight program that covers vendor inventory frameworks, due diligence checklists, and contractual language templates tailored to your firm's vendor relationships.
Document 3: Breach Notification Procedures
The individual breach notification requirement is entirely new under the amended Regulation S-P. Before the 2023 amendments, there was no federal requirement for investment advisers to notify individual customers of data breaches. Now there is, and the timeline is tight.
What the SEC Requires
When a security incident results in unauthorized access to customer information, you must notify affected individuals. The rule specifies:
- 30-day notification window: You must provide notice to affected individuals "as soon as practicable, and no later than 30 days" after becoming aware that unauthorized access to customer information has occurred or is reasonably likely to have occurred.
- Required content: Your notification must describe the nature of the incident, the types of information that were or are reasonably believed to have been accessed, and your firm's contact information for inquiries.
- State coordination: Many states have their own breach notification laws with different timelines and content requirements. Your procedures should account for overlapping obligations.
- SEC notification: While the rule does not mandate notifying the SEC directly of every breach, the SEC expects firms to file suspicious activity reports (SARs) when appropriate and to be transparent about incidents during examinations.
What Examiners Actually Look For
Examiners focus on preparedness. They know that most small RIAs have not experienced a major breach, so they evaluate your readiness to handle one.
Pre-drafted notification templates. The SEC specifically calls out the importance of having templates ready before an incident occurs. During a breach, you will not have time to draft notifications from scratch, obtain legal review, and send them within 30 days. Examiners will ask to see your templates.
Clear triggers. Your procedures should define what constitutes "unauthorized access" and when the notification obligation kicks in. The SEC wants objective criteria, not vague language.
Delivery mechanisms. How will you reach affected customers? Mail, email, or both? Your procedures should specify the method and include a process for handling undeliverable notifications.
Escalation protocols. Who decides that a breach has occurred and that notifications must be sent? In a small firm, this might be the principal and the CCO. The decision-making process should be documented.
Common Mistakes Small RIAs Make
The most dangerous mistake is not having templates at all. Firms tell themselves they will figure it out if something happens. In practice, a breach creates chaos: technical response, vendor coordination, regulatory reporting, and client anxiety, all simultaneously. Drafting notifications under that pressure leads to mistakes.
Another common error is ignoring state law requirements. The SEC's 30-day window may conflict with stricter state timelines. If you have clients in multiple states, your procedures need to account for the most restrictive applicable deadline.
RegShield generates breach notification procedures with pre-drafted templates that include the SEC-required content elements, customized with your firm's information and contact details.
Document 4: Recordkeeping Procedures
Recordkeeping is the foundation that supports the other three documents. Without proper records, you cannot prove you implemented your policies, tested your plans, or responded appropriately to incidents. The SEC treats recordkeeping deficiencies as evidence of broader compliance failures.
What the SEC Requires
The amended Regulation S-P, in conjunction with the existing recordkeeping requirements under Rule 204-2 of the Advisers Act, requires you to maintain:
- Written policies and procedures: Current and historical versions of all compliance documents.
- Incident log: A record of all security incidents (including near-misses), your assessment of each one, actions taken, and outcomes.
- Vendor records: Due diligence documentation, vendor agreements, monitoring records, and correspondence related to security issues.
- Notification records: Copies of all breach notifications sent to individuals, including dates, delivery methods, and recipient lists.
- Training records: Evidence of staff training on your security policies, including dates, attendees, materials used, and assessment results.
- Testing records: Documentation of incident response plan testing, including exercise scenarios, findings, and subsequent plan modifications.
- Minimum five-year retention: All records must be maintained for at least five years, with the first two years in an easily accessible location.
What Examiners Actually Look For
Recordkeeping is often the first thing examiners review because it tells them whether a compliance program is operational or decorative.
Consistency. If your incident response plan says you test annually, examiners will look for annual testing records. If your vendor oversight policy says you review vendors quarterly, they will look for quarterly review documentation. Inconsistencies between stated procedures and actual records are one of the most common examination findings.
Completeness. Examiners check that you are maintaining records across all required categories, not just the ones that are easy to document. Training records and incident logs are frequently missing from small RIA files.
Organization and access. Can you produce the records an examiner requests within a reasonable timeframe? A disorganized pile of files, whether physical or digital, signals a lack of attention to compliance. The SEC expects records to be "easily accessible" for the first two years and retrievable for the full five-year period.
Incident documentation. Even if your firm has never experienced a significant breach, you should have records of near-misses, phishing attempts, and minor incidents. An empty incident log raises questions. Either nothing has ever happened (unlikely) or you are not tracking incidents (a problem).
Common Mistakes Small RIAs Make
The most common mistake is treating recordkeeping as an afterthought. Firms spend weeks drafting policies and then maintain no records showing those policies were followed. From an examination standpoint, policies without records are almost as bad as no policies at all.
Another frequent error is underestimating what qualifies as a "security incident." A phishing email caught by your spam filter is still worth documenting. A failed login from an unfamiliar location is worth noting. These records demonstrate that your detection procedures are working.
RegShield generates recordkeeping procedures that include structured log templates, retention schedules, and access control frameworks, all tailored to how your firm actually operates.
Putting It All Together
These four documents do not exist in isolation. They form an interconnected compliance framework:
- Your incident response program triggers your breach notification procedures when customer data is compromised
- Your service provider oversight program feeds into your incident response plan when a vendor reports a breach
- Your recordkeeping procedures capture evidence across all three operational documents
The SEC evaluates this framework as a whole. Strong policies in one area cannot compensate for gaps in another. A firm with an excellent incident response plan but no vendor oversight program still has a significant compliance deficiency.
For small RIAs, the challenge is creating documents that satisfy regulatory requirements without requiring enterprise-level resources: thorough enough for examination scrutiny, realistic enough to implement with a small team.
The Deadline Is Not Moving
June 3, 2026 is the compliance date for smaller entities under the amended Regulation S-P. The SEC has shown no indication of extending this deadline, and the Division of Examinations has already signaled that Reg S-P compliance will be an examination priority.
The firms that will have the hardest time are those that start in the final weeks. A policy drafted on June 1 that no one has read, tested, or trained on is a liability, not an asset.
RegShield helps small RIAs generate all four required documents in about 15 minutes, with firm-specific language based on your actual operations. At $299 for all four documents, it is designed for firms that need to move quickly without sacrificing quality. You can learn more at regshield.co.
Start now. The SEC is not going to wait, and neither should you.
Frequently Asked Questions
Rees Calder
Rees is the founder of RegShield and CEO of Levity Leads Ltd. He works with small registered investment advisers to simplify SEC compliance, with a focus on making Regulation S-P requirements accessible and actionable for firms that lack dedicated compliance departments.