Cyber security the focus of new OSFI advisory

25 January 2019

The Office of the Superintendent of Financial Institutions ("OSFI") today issued an advisory[1] setting out new guidelines for how federally regulated financial institutions ("FRFI") report technology or cyber security breaches. The Advisory references and complements the cyber security self-assessment guidance OSFI released in 2013.[2]



The advisory affects a wide swath of financial entities, as OSFI has oversight over all banks, federally incorporated or registered trust and loan companies, cooperative credit associations, insurance companies, fraternal benefit societies, private pension plans, and federal cooperatives.

Under the new guidelines, which will go into effect on March 31, 2019, FRFIs are expected to report cyber security or technology-related incident that are of a "high or critical severity level" to OSFI. These are defined as incidents that materially impact the normal operations of an FRFI, including incidents affecting the confidentiality, integrity, or availability of the FRFI's systems or its information.

While OSFI does not explain what constitutes a "material" breach of sufficient severity to warrant a report, it offers some guidance, noting that a reportable incident may have:

  • Significant operational impact to key/critical information systems or data;
  • Material impact to FRFI operational or customer data, including confidentiality, integrity or availability of such data;
  • Significant operational impact to internal users that is material to customers or business operations;
  • Significant levels of system / service disruptions;
  • Extended disruptions to critical business systems / operations;
  • Number of external customers impacted is significant or growing;
  • Negative reputational impact is imminent (e.g., public/media disclosure);
  • Material impact to critical deadlines/obligations in financial market settlement or payment systems (e.g., Financial Market Infrastructure);
  • Significant impact to a third party deemed material to the FRFI;
  • Material consequences to other FRFIs or the Canadian financial system; or
  • A FRFI incident has been reported to the Office of the Privacy Commissioner or local/foreign regulatory authorities.

If an incident occurs, an FRFI has 72 hours to notify its OSFI Lead Supervisor, and is expected to notify OSFI's Technology Risk Division (TRD) by email (TRD@osfi-bsif.gc.ca). The affected FRFI also has an ongoing obligation to disclose additional information that becomes available, as well as any remediation plans. Once the incident has been satisfactorily addressed, the FRFI is also expected to report with a post-incident review to OSFI, reflecting lessons learned.

The Advisory stems from OSFI's commitment in its 2018-19 Departmental Plan to re-examine OSFI's "role in, and approach to, enhancing cyber security at Canadian financial institutions."[3] OSFI notes in the 2018-19 Plan that its efforts on this front are to take place "within the broader context of Canada's overall cyber strategy," and that its efforts will focus on "deepening its understanding of risk factors arising outside of its direct responsibilities (e.g., financial technologies) and adjusting OSFI's prudential expectations if warranted."[4] Interestingly, Canada's current national cyber security strategy,[5] rolled out in June 2018, says nothing specific about OSFI, and makes only passing reference to financial institutions, in commenting on their value as targets for cyber attacks.[6]

It will be interesting to observe how the guidelines set out by OSFI and other authorities to address emerging cyber security risks mesh with the broader national strategy set out by Public Safety Canada, and how quickly and fully institutions embrace this guidance.


[1] OSFI, Technology and Cyber Security Incident Reporting, online: http://www.osfi-bsif.gc.ca/Eng/fi-if/rg-ro/gdn-ort/adv-prv/Pages/TCSIR.aspx (January 2019).

[2] OSFI, Cyber Security Self-Assessment Guidance, online: http://www.osfi-bsif.gc.ca/Eng/fi-if/in-ai/Pages/cbrsk.aspx (October 28, 2013)

[5] Government of Canada Public Safety Canada, National Cyber Security Strategy: Canada's Vision for Security and Prosperity in the Digital Age, online: https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ntnl-cbr-scrt-strtg/ntnl-cbr-scrt-strtg-en.pdf (June 12, 2018).

[6] Government of Canada Public Safety Canada, National Cyber Security Strategy: Canada's Vision for Security and Prosperity in the Digital Age, online: https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ntnl-cbr-scrt-strtg/ntnl-cbr-scrt-strtg-en.pdf (June 12, 2018) at pp.13 and 18.


NOT LEGAL ADVICE. Information made available on this website in any form is for information purposes only. It is not, and should not be taken as, legal advice. You should not rely on, or take or fail to take any action based upon this information. Never disregard professional legal advice or delay in seeking legal advice because of something you have read on this website. Gowling WLG professionals will be pleased to discuss resolutions to specific legal concerns you may have.