Safepay, Regulation S-P, and the new breach math: when your payment vendor becomes your SEC problem š³š
On December 5, 2025 ā two days after the first compliance deadline for the SECās revamped Regulation S-P ā class-action lawyers announced they were investigating a data breach at Safepay, a payment processor tied to juliuskoch.com, after a notice-of-breach campaign went out to consumers.
On its own, Safepay looks like yet another fintech-adjacent incident. In the shadow of the new federal breach-notification requirements for broker-dealers, RIAs, funds, and transfer agents, itās something else: a live stress test of your vendor risk, contracts, and cyber playbook under Regulation S-P 2.0.(Federal Register)
This piece walks through what just changed in Reg S-P, how a Safepay-style breach would be analyzed under the new rule set, and what to repair in your contracts and governance now ā before your own payment or billing stack becomes Exhibit A.
What actually changed in Regulation S-P? šš§©
The SECās 2024 amendments to Regulation S-P modernize a rule that hadnāt really kept up with cloud, APIs, and everything-as-a-service. The core move: treating data breaches as a regulated incident-response problem with mandatory customer notification, rather than just a āhave a policyā box-check.(Federal Register)
At a high level, covered institutions (broker-dealers, investment companies, SEC-registered investment advisers, funding portals, and transfer agents) must now:(Federal Register)
- Adopt and maintain a written incident response program for unauthorized access to or use of ācustomer information.ā
- Assess, contain, and control incidents impacting customer data.
- Notify affected individuals when āsensitive customer informationā was, or is reasonably likely to have been, accessed or used without authorization, within a set timeframe (with limited national-security delay).(Federal Register)
- Extend safeguards and disposal obligations to transfer agents and broaden the categories of protected information.(Federal Register)
- Maintain written records documenting compliance with the safeguards, disposal, and incident-response requirements.(Federal Register)
Compliance dates are now live:
| ā° Reg S-P compliance clock | Who it hits | Key dates |
|---|---|---|
| āLargerā entities (e.g., RIAs with >$1.5B AUM, non-small broker-dealers, large funds) | Full incident-response and notification regime in effect | December 3, 2025 |
| āSmallerā entities | Same rule set, later compliance | June 3, 2026 |
(FINRA)
For anyone in securities or asset-management land, thatās no longer an abstract deadline. It now sits next to Safepay in your board deck.
Why the Safepay breach is a useful test case š³š„
From publicly available information, Safepay is described as a āpopular payment processing platformā linked to juliuskoch.com, with a significant breach discovered on December 5, 2025 and followed by breach notices and a potential class action.(Class Action Litigation | SLFLA)
For your clients, this scenario is uncomfortably familiar:
- Third-party processor: The breach is upstream, in someone elseās stack.
- Consumer financial data: Likely implicates payment information and other PII.
- Rapid notice campaign: A law firm advertises a class action almost immediately after notices go out.(Class Action Litigation | SLFLA)
Under the amended Regulation S-P, that kind of fact pattern triggers two overlapping regimes:
- Vendor / service-provider obligations ā what Safepay must do for its institutional customers as a āservice providerā processing their customer information.(Federal Register)
- Covered institution obligations ā what those customers (broker-dealers, funds, RIAs, etc.) must do for their own customers once they learn of Safepayās incident.(Federal Register)
If you represent a fund complex, adviser, or broker-dealer, the question is no longer āDid Safepay send notices?ā It is āDid we meet our own Reg S-P obligations once Safepay told us something was wrong?ā
Regulation S-P in one table: whatās new vs. the old world š
Hereās the practical pivot:
| š Issue | Old Reg S-P reality | Amended Reg S-P reality |
|---|---|---|
| Incident response | āHave safeguardsā and a general security program; no detailed incident-response blueprint. | Written incident response program with specific steps for assessment, containment, and remediation of unauthorized access or use of customer information.(Federal Register) |
| Customer notification | Often driven by state breach-notification laws; federal rules were thin and patchy. | Federal minimum: notify affected individuals when āsensitive customer informationā was, or is reasonably likely to have been, accessed or used without authorization, within a defined period (generally within 30 days, subject to limited AG-approved delays).(Federal Register) |
| Service providers (like Safepay) | Contracts often had generic āreasonable securityā and āprompt noticeā language, heavily state-law driven. | Service providers must notify covered institutions promptly (often within 72 hours) after becoming aware of an incident involving customer information systems, so the institution can meet its own notification clock.(Goodwin Law) |
| Scope of ācustomer informationā | Narrower definitions; disposal rule didnāt always track modern data flows, and transfer agents werenāt fully covered. | Expanded definitions of ācustomer informationā and āconsumer information,ā extended to all transfer agents, and broader disposal/safeguards obligations.(Federal Register) |
| Documentation | Policies and procedures, but incident files were often ad-hoc. | Recordkeeping duty: maintain written records documenting compliance with safeguards, disposal, and incident-response requirements.(Federal Register) |
Once you drop a Safepay-style breach into the right-hand column, it becomes a fairly unforgiving checklist.
How a Safepay-type breach plays under Reg S-P š§Ŗ
Step 1: Does the incident touch ācustomer informationā?
For a covered institution, the first question is whether Safepay handles nonpublic personal information about your ācustomersā under GLBA and Reg S-P ā account numbers, transaction histories, names plus financial identifiers, etc.(Federal Register)
Payment processing obviously sits within that zone. If Safepay is running card or ACH rails for your product, you almost certainly have customer information at issue.
Step 2: Is the information āsensitive customer informationā?
The amended rule draws a distinction for notification: āsensitive customer informationā is a sub-set where misuse can cause āsubstantial harm or inconvenience,ā such as identity theft or financial fraud.(Federal Register)
If threat actors gained access to payment credentials, bank details, or combinations of PII plus financial data, youāre probably in sensitive-information territory.
Step 3: Did Safepay tell you in time?
Under the new regime, your service provider (Safepay) is expected to notify you promptly ā often within a defined contractual period like 72 hours ā once it determines an incident has occurred involving your customer information systems.(Goodwin Law)
If Safepay hesitates, gives partial information, or routes you through a public-relations script instead of an incident-response channel, your own notification clock is already in trouble.
Step 4: Do you have to notify, even if Safepay already did?
Yes. Reg S-P does not let a covered institution outsource its duties to a vendor by pointing at the vendorās consumer notices. The rule contemplates that either:
- The service provider gives notice on your behalf pursuant to a written arrangement that meets the ruleās requirements; or
- You provide notice directly to affected individuals.(Federal Register)
If Safepay simply sends its own generic notice, that may not relieve your institution of its separate S-P notification obligation ā especially if you have additional customer relationships, accounts, or regulatory context the vendor doesnāt see.
Step 5: What about public company disclosure rules?
Separate from Reg S-P, SEC registrants now face cybersecurity-incident disclosure rules that can trigger a Form 8-K filing within four business days of determining an incident is āmaterial,ā plus ongoing disclosure about cyber risk management and governance.(FINRA)
So a Safepay-linked breach for a registrant may be:
- An S-P incident (customer notification, incident-response program); and
- A securities-disclosure event (Form 8-K, MD&A / risk factors), if the impact is material.
The fact that the attacker hit a vendor instead of your own servers doesnāt buy you much sympathy on either front.
Contract and governance checklist after Safepay š§¾āļø
If youāre product counsel or outside corporate counsel, the Safepay timeline is a warning shot: the incident is on December 5; your Reg S-P compliance date (if youāre ālargeā) was December 3. There is no āgrace periodā narrative you can sell to regulators.(FINRA)
Hereās where to look first:
š Vendor contracts (Safepay-class providers)
- Incident-response and notice clauses
- Hard timeframes for vendor notice (e.g., within 24ā72 hours of determining an incident involving your data).(Goodwin Law)
- Obligation to provide sufficient detail: systems affected, data types, number of records, encryption status, and whether data was exfiltrated.
- Cooperation requirements for your own regulatory filings and customer communications.
- Delegated notification
- If the vendor will notify end customers on your behalf, the contract should:
- Reference Reg S-P standards for timing and content;
- Make clear the notifications are in your name or co-branded; and
- Require copies of all notices and scripts for your files.(Federal Register)
- If the vendor will notify end customers on your behalf, the contract should:
- Allocation of remediation costs
- Credit monitoring, call-center support, re-issuance of cards or credentials, and regulatory penalties should not be left to āgood faith discussions.ā
š§± Internal governance
- Board / committee briefings
- Update charters so cyber-risk and vendor-risk oversight explicitly reference Reg S-P incident-response and notification obligations.
- Playbooks and runbooks
- Your incident-response runbooks should have vendor-incident variants: what happens when the first email comes from Safepay, not from your own SOC.
- Recordkeeping and audit trail
- Build the practice now of keeping chronological incident files: notices received, internal decisions, notification drafts, regulatory correspondence ā all of which Reg S-P now expects you to maintain.(Federal Register)
Practical mini-matrix: where Safepay meets Reg S-P
| Scenario | Safepayās move | Your move as a covered institution |
|---|---|---|
| Safepay reports a confirmed intrusion but claims āno evidence of data exfiltration.ā | Provides limited detail, focuses on āno evidenceā language. | Treat as an incident involving customer information. Open an incident file, conduct your own risk assessment, and determine if sensitive data was reasonably likely to have been accessed. Donāt let Safepayās PR language drive your legal conclusion.(Federal Register) |
| Safepay offers to send notices to affected cardholders as āprocessor for multiple institutions.ā | Drafts generic letter, may avoid naming specific FI clients. | Decide whether this satisfies your Reg S-P duties. If not, insist on co-branded or institution-specific notices that meet timing and content requirements, or send your own.(Federal Register) |
| Youāre a small RIA relying on a clearing broker that itself uses Safepay. | Clearing broker handles much of the response. | You still need to verify where you sit in the data chain and ensure your own customers receive compliant notices. Map whose ācustomer informationā is where before a breach, not during.(Federal Register) |
Two FAQs your clients will start asking ā
š§ āIf the breach is at Safepay, and my firm never lost control of its own systems, can I argue this isnāt āourā incident under Reg S-P?ā
Unlikely. Regulation S-P focuses on customer information, not just your own servers. If a service provider processes your customer information and suffers unauthorized access or use, the amended rule treats that as part of your risk perimeter.(Federal Register)
The fact that Safepay or another vendor was the direct victim may shape materiality and notification content, but it doesnāt carve you out of the incident-response and notification framework. Your safeguards obligation explicitly includes service-provider oversight.
š§¾ āCan I rely on state breach-notification law and ignore the new federal notification structure?ā
No. State law still matters, especially for residents outside your home jurisdiction, but the Reg S-P amendments add a federal floor for covered institutions. The SEC rules require:(Federal Register)
- A written incident-response program;
- A specific standard and timing for notifying individuals about unauthorized access to sensitive customer information; and
- Defined roles for service providers.
State laws may be stricter or require different timing or content, so in practice you end up with a stacked regime: satisfy Reg S-P and harmonize with the strictest applicable state requirements. Treat them as additive, not alternatives.
The bottom line for product and corporate counsel š§©
Safepay is not the first payment processor to be breached and will not be the last. Whatās changed is the regulatory backdrop: as of December 2025, a processor breach in your stack is no longer just a contractual headache and a round of state-law notices. Itās a test of whether your institution:
- Has Reg S-P-grade incident-response and notification machinery,
- Can move quickly when a vendor pings you with incomplete information, and
- Has contracts and governance that reflect the new reality that vendor incidents are your incidents in the SECās eyes.
For clients in fintech, wealth, and funds, the safest posture is to assume that āSafepay dayā will come for them in some form ā and to use this incident, while itās still someone elseās litigation, as a blueprint for shoring up their own stack before Reg S-P and the next breach collide on the same week.