Technology infrastructure and data security for secondary market operations
Technology and cybersecurity infrastructure for secondaries funds must address the data-intensive nature of the strategy while protecting sensitive information from multiple sources. Evaluating potential acquisitions requires accessing confidential data about underlying funds and their portfolios, creating information security obligations that extend beyond typical private fund operations. Building appropriate technology capabilities supports both deal execution and operational security.
Secondaries funds handle substantial data volumes throughout their operations:
During transaction evaluation, deal teams analyze detailed information about underlying fund positions, including NAV reports, portfolio company financials, capital account statements, and cash flow projections. This data often arrives in varied formats from multiple sources and must be organized for analysis.
Post-acquisition, the fund tracks ongoing reporting from potentially hundreds of underlying positions, each with different reporting formats, frequencies, and delivery methods.
Portfolio monitoring requires aggregating look-through data to understand exposure across underlying portfolio companies, sectors, and geographies.
Effective data management systems help organize this information, support analysis, and enable reporting without creating security vulnerabilities.
Technology infrastructure for secondaries operations typically includes:
Given the sensitive data handled, cybersecurity programs for secondaries funds should address multiple risk categories:
Managing who can access what information represents a foundational security element. Considerations include:
Protecting data throughout its lifecycle involves:
Encryption for data at rest and in transit, ensuring intercepted data remains unusable to attackers.
Data classification to identify and appropriately protect the most sensitive information.
Secure destruction procedures for data that is no longer needed, particularly confidential deal information for transactions that did not proceed.
Protecting devices used by personnel includes:
Protecting the network environment involves:
Firewalls and intrusion detection systems monitoring network traffic.
Network segmentation separating sensitive systems from general access areas.
Secure remote access solutions for personnel working outside the office.
Monitoring for anomalous activity that might indicate compromise.
Secondaries funds rely on various service providers with access to sensitive information. Managing third-party risk includes:
Due diligence on vendor security practices before engagement, particularly for fund administrators, data providers, and cloud services.
Contractual provisions addressing data protection, breach notification, and vendor security obligations.
Ongoing monitoring of vendor security posture, including review of SOC reports where available.
Secondary transactions typically involve non-disclosure agreements governing the use and protection of confidential information. Technology and security practices should support compliance with these obligations, including:
Tracking which personnel have access to information covered by specific NDAs.
Ensuring confidential information is not retained beyond permitted timeframes.
Preventing unauthorized disclosure through technical controls and monitoring.
SEC rules and guidance increasingly emphasize cybersecurity for registered investment advisers. Relevant requirements include:
Written information security policies and procedures reasonably designed to protect client information.
Incident response planning and breach notification procedures.
Vendor oversight and due diligence on service provider security.
LPs also increasingly request detailed cybersecurity information during due diligence.
Despite preventive measures, incidents may occur. Incident response plans should address: