{"version":"1.0","provider_name":"IQ-EQ U.S.","provider_url":"https:\/\/iqeq.com\/us","author_name":"chantelleharvey","title":"10 elements of the SEC\u2019s proposed cybersecurity rules | IQ-EQ","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"MaBjNzZ4rZ\"><a href=\"https:\/\/iqeq.com\/us\/insights\/10-elements-secs-proposed-cybersecurity-rules\/\">10 elements of the SEC\u2019s proposed cybersecurity rules<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/iqeq.com\/us\/insights\/10-elements-secs-proposed-cybersecurity-rules\/embed\/#?secret=MaBjNzZ4rZ\" width=\"600\" height=\"338\" title=\"&#8220;10 elements of the SEC\u2019s proposed cybersecurity rules&#8221; &#8212; IQ-EQ U.S.\" data-secret=\"MaBjNzZ4rZ\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\" data-ot-ignore=\"\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/iqeq.com\/us\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/iqeq.com\/us\/wp-content\/uploads\/sites\/3\/2024\/08\/shutterstock_2181808749-scaled.jpg","thumbnail_width":2560,"thumbnail_height":1280,"description":"On February 9, 2022, the U.S. SEC proposed Rule 206(4)-9 under the Investment Advisers Act of 1940 and Rule 38a-2 under the Investment Company Act of 1940. The proposed rules, which are not yet finalized but are expected to be in April 2023, would provide registered investment advisers and funds with a set of rules governing how they address cybersecurity risks. In this article, Sean Wilke outlines the 10 key elements of the SEC's proposed cybersecurity protection rules."}