Safepay, Regulation S-P, and the new breach math: when your payment vendor becomes your SEC problem šŸ’³šŸ”

Published: December 7, 2025 • Online Sales

On December 5, 2025 — two days after the first compliance deadline for the SEC’s revamped Regulation S-P — class-action lawyers announced they were investigating a data breach at Safepay, a payment processor tied to juliuskoch.com, after a notice-of-breach campaign went out to consumers.

On its own, Safepay looks like yet another fintech-adjacent incident. In the shadow of the new federal breach-notification requirements for broker-dealers, RIAs, funds, and transfer agents, it’s something else: a live stress test of your vendor risk, contracts, and cyber playbook under Regulation S-P 2.0.(Federal Register)

This piece walks through what just changed in Reg S-P, how a Safepay-style breach would be analyzed under the new rule set, and what to repair in your contracts and governance now — before your own payment or billing stack becomes Exhibit A.


What actually changed in Regulation S-P? šŸ“œšŸ§©

The SEC’s 2024 amendments to Regulation S-P modernize a rule that hadn’t really kept up with cloud, APIs, and everything-as-a-service. The core move: treating data breaches as a regulated incident-response problem with mandatory customer notification, rather than just a ā€œhave a policyā€ box-check.(Federal Register)

At a high level, covered institutions (broker-dealers, investment companies, SEC-registered investment advisers, funding portals, and transfer agents) must now:(Federal Register)

  • Adopt and maintain a written incident response program for unauthorized access to or use of ā€œcustomer information.ā€
  • Assess, contain, and control incidents impacting customer data.
  • Notify affected individuals when ā€œsensitive customer informationā€ was, or is reasonably likely to have been, accessed or used without authorization, within a set timeframe (with limited national-security delay).(Federal Register)
  • Extend safeguards and disposal obligations to transfer agents and broaden the categories of protected information.(Federal Register)
  • Maintain written records documenting compliance with the safeguards, disposal, and incident-response requirements.(Federal Register)

Compliance dates are now live:

ā° Reg S-P compliance clockWho it hitsKey dates
ā€œLargerā€ entities (e.g., RIAs with >$1.5B AUM, non-small broker-dealers, large funds)Full incident-response and notification regime in effectDecember 3, 2025
ā€œSmallerā€ entitiesSame rule set, later complianceJune 3, 2026

(FINRA)

For anyone in securities or asset-management land, that’s no longer an abstract deadline. It now sits next to Safepay in your board deck.


Why the Safepay breach is a useful test case šŸ’³šŸ”„

From publicly available information, Safepay is described as a ā€œpopular payment processing platformā€ linked to juliuskoch.com, with a significant breach discovered on December 5, 2025 and followed by breach notices and a potential class action.(Class Action Litigation | SLFLA)

For your clients, this scenario is uncomfortably familiar:

  • Third-party processor: The breach is upstream, in someone else’s stack.
  • Consumer financial data: Likely implicates payment information and other PII.
  • Rapid notice campaign: A law firm advertises a class action almost immediately after notices go out.(Class Action Litigation | SLFLA)

Under the amended Regulation S-P, that kind of fact pattern triggers two overlapping regimes:

  1. Vendor / service-provider obligations — what Safepay must do for its institutional customers as a ā€œservice providerā€ processing their customer information.(Federal Register)
  2. Covered institution obligations — what those customers (broker-dealers, funds, RIAs, etc.) must do for their own customers once they learn of Safepay’s incident.(Federal Register)

If you represent a fund complex, adviser, or broker-dealer, the question is no longer ā€œDid Safepay send notices?ā€ It is ā€œDid we meet our own Reg S-P obligations once Safepay told us something was wrong?ā€


Regulation S-P in one table: what’s new vs. the old world šŸ“Š

Here’s the practical pivot:

šŸ” IssueOld Reg S-P realityAmended Reg S-P reality
Incident responseā€œHave safeguardsā€ and a general security program; no detailed incident-response blueprint.Written incident response program with specific steps for assessment, containment, and remediation of unauthorized access or use of customer information.(Federal Register)
Customer notificationOften driven by state breach-notification laws; federal rules were thin and patchy.Federal minimum: notify affected individuals when ā€œsensitive customer informationā€ was, or is reasonably likely to have been, accessed or used without authorization, within a defined period (generally within 30 days, subject to limited AG-approved delays).(Federal Register)
Service providers (like Safepay)Contracts often had generic ā€œreasonable securityā€ and ā€œprompt noticeā€ language, heavily state-law driven.Service providers must notify covered institutions promptly (often within 72 hours) after becoming aware of an incident involving customer information systems, so the institution can meet its own notification clock.(Goodwin Law)
Scope of ā€œcustomer informationā€Narrower definitions; disposal rule didn’t always track modern data flows, and transfer agents weren’t fully covered.Expanded definitions of ā€œcustomer informationā€ and ā€œconsumer information,ā€ extended to all transfer agents, and broader disposal/safeguards obligations.(Federal Register)
DocumentationPolicies and procedures, but incident files were often ad-hoc.Recordkeeping duty: maintain written records documenting compliance with safeguards, disposal, and incident-response requirements.(Federal Register)

Once you drop a Safepay-style breach into the right-hand column, it becomes a fairly unforgiving checklist.


How a Safepay-type breach plays under Reg S-P 🧪

Step 1: Does the incident touch ā€œcustomer informationā€?

For a covered institution, the first question is whether Safepay handles nonpublic personal information about your ā€œcustomersā€ under GLBA and Reg S-P — account numbers, transaction histories, names plus financial identifiers, etc.(Federal Register)

Payment processing obviously sits within that zone. If Safepay is running card or ACH rails for your product, you almost certainly have customer information at issue.

Step 2: Is the information ā€œsensitive customer informationā€?

The amended rule draws a distinction for notification: ā€œsensitive customer informationā€ is a sub-set where misuse can cause ā€œsubstantial harm or inconvenience,ā€ such as identity theft or financial fraud.(Federal Register)

If threat actors gained access to payment credentials, bank details, or combinations of PII plus financial data, you’re probably in sensitive-information territory.

Step 3: Did Safepay tell you in time?

Under the new regime, your service provider (Safepay) is expected to notify you promptly — often within a defined contractual period like 72 hours — once it determines an incident has occurred involving your customer information systems.(Goodwin Law)

If Safepay hesitates, gives partial information, or routes you through a public-relations script instead of an incident-response channel, your own notification clock is already in trouble.

Step 4: Do you have to notify, even if Safepay already did?

Yes. Reg S-P does not let a covered institution outsource its duties to a vendor by pointing at the vendor’s consumer notices. The rule contemplates that either:

  • The service provider gives notice on your behalf pursuant to a written arrangement that meets the rule’s requirements; or
  • You provide notice directly to affected individuals.(Federal Register)

If Safepay simply sends its own generic notice, that may not relieve your institution of its separate S-P notification obligation — especially if you have additional customer relationships, accounts, or regulatory context the vendor doesn’t see.

Step 5: What about public company disclosure rules?

Separate from Reg S-P, SEC registrants now face cybersecurity-incident disclosure rules that can trigger a Form 8-K filing within four business days of determining an incident is ā€œmaterial,ā€ plus ongoing disclosure about cyber risk management and governance.(FINRA)

So a Safepay-linked breach for a registrant may be:

  • An S-P incident (customer notification, incident-response program); and
  • A securities-disclosure event (Form 8-K, MD&A / risk factors), if the impact is material.

The fact that the attacker hit a vendor instead of your own servers doesn’t buy you much sympathy on either front.


Contract and governance checklist after Safepay šŸ§¾āš™ļø

If you’re product counsel or outside corporate counsel, the Safepay timeline is a warning shot: the incident is on December 5; your Reg S-P compliance date (if you’re ā€œlargeā€) was December 3. There is no ā€œgrace periodā€ narrative you can sell to regulators.(FINRA)

Here’s where to look first:

šŸ” Vendor contracts (Safepay-class providers)

  • Incident-response and notice clauses
    • Hard timeframes for vendor notice (e.g., within 24–72 hours of determining an incident involving your data).(Goodwin Law)
    • Obligation to provide sufficient detail: systems affected, data types, number of records, encryption status, and whether data was exfiltrated.
    • Cooperation requirements for your own regulatory filings and customer communications.
  • Delegated notification
    • If the vendor will notify end customers on your behalf, the contract should:
      • Reference Reg S-P standards for timing and content;
      • Make clear the notifications are in your name or co-branded; and
      • Require copies of all notices and scripts for your files.(Federal Register)
  • Allocation of remediation costs
    • Credit monitoring, call-center support, re-issuance of cards or credentials, and regulatory penalties should not be left to ā€œgood faith discussions.ā€

🧱 Internal governance

  • Board / committee briefings
    • Update charters so cyber-risk and vendor-risk oversight explicitly reference Reg S-P incident-response and notification obligations.
  • Playbooks and runbooks
    • Your incident-response runbooks should have vendor-incident variants: what happens when the first email comes from Safepay, not from your own SOC.
  • Recordkeeping and audit trail
    • Build the practice now of keeping chronological incident files: notices received, internal decisions, notification drafts, regulatory correspondence — all of which Reg S-P now expects you to maintain.(Federal Register)

Practical mini-matrix: where Safepay meets Reg S-P

ScenarioSafepay’s moveYour move as a covered institution
Safepay reports a confirmed intrusion but claims ā€œno evidence of data exfiltration.ā€Provides limited detail, focuses on ā€œno evidenceā€ language.Treat as an incident involving customer information. Open an incident file, conduct your own risk assessment, and determine if sensitive data was reasonably likely to have been accessed. Don’t let Safepay’s PR language drive your legal conclusion.(Federal Register)
Safepay offers to send notices to affected cardholders as ā€œprocessor for multiple institutions.ā€Drafts generic letter, may avoid naming specific FI clients.Decide whether this satisfies your Reg S-P duties. If not, insist on co-branded or institution-specific notices that meet timing and content requirements, or send your own.(Federal Register)
You’re a small RIA relying on a clearing broker that itself uses Safepay.Clearing broker handles much of the response.You still need to verify where you sit in the data chain and ensure your own customers receive compliant notices. Map whose ā€œcustomer informationā€ is where before a breach, not during.(Federal Register)

Two FAQs your clients will start asking ā“

🧠 ā€œIf the breach is at Safepay, and my firm never lost control of its own systems, can I argue this isn’t ā€˜our’ incident under Reg S-P?ā€

Unlikely. Regulation S-P focuses on customer information, not just your own servers. If a service provider processes your customer information and suffers unauthorized access or use, the amended rule treats that as part of your risk perimeter.(Federal Register)

The fact that Safepay or another vendor was the direct victim may shape materiality and notification content, but it doesn’t carve you out of the incident-response and notification framework. Your safeguards obligation explicitly includes service-provider oversight.

🧾 ā€œCan I rely on state breach-notification law and ignore the new federal notification structure?ā€

No. State law still matters, especially for residents outside your home jurisdiction, but the Reg S-P amendments add a federal floor for covered institutions. The SEC rules require:(Federal Register)

  • A written incident-response program;
  • A specific standard and timing for notifying individuals about unauthorized access to sensitive customer information; and
  • Defined roles for service providers.

State laws may be stricter or require different timing or content, so in practice you end up with a stacked regime: satisfy Reg S-P and harmonize with the strictest applicable state requirements. Treat them as additive, not alternatives.


The bottom line for product and corporate counsel 🧩

Safepay is not the first payment processor to be breached and will not be the last. What’s changed is the regulatory backdrop: as of December 2025, a processor breach in your stack is no longer just a contractual headache and a round of state-law notices. It’s a test of whether your institution:

  • Has Reg S-P-grade incident-response and notification machinery,
  • Can move quickly when a vendor pings you with incomplete information, and
  • Has contracts and governance that reflect the new reality that vendor incidents are your incidents in the SEC’s eyes.

For clients in fintech, wealth, and funds, the safest posture is to assume that ā€œSafepay dayā€ will come for them in some form — and to use this incident, while it’s still someone else’s litigation, as a blueprint for shoring up their own stack before Reg S-P and the next breach collide on the same week.