Fair Funds for Investors
SOX Section 308 (“Fair Funds for Investors”) authorizes the SEC to add civil penalties to disgorgement funds so harmed investors can be paid from a combined pool. For a CCO or GRC lead, the operational requirement is readiness: preserve records, quantify harm, and support a claims-and-distribution process quickly if the SEC creates a Fair Fund tied to your enforcement matter. (Public Law 107-204)
Key takeaways:
- Fair Funds is SEC distribution mechanics, not a standing “program” you run day-to-day, but you must be able to execute if triggered. (Public Law 107-204)
- Your controls should focus on investor harm quantification, eligibility logic, record retention, and third-party administrator oversight (if appointed). (Public Law 107-204)
- Exams and enforcement teams will pressure-test your ability to identify victims, calculate loss, and produce clean data fast. (Public Law 107-204)
“Fair Funds for Investors” is often misunderstood as a general investor-protection rule. In practice, SOX Section 308 is a post-enforcement distribution mechanism: if the SEC obtains disgorgement and civil penalties, it can add the civil penalties to the disgorgement pool for the benefit of victims. (Public Law 107-204) That matters operationally because the moment an enforcement action becomes likely, you need to treat investor remediation as a deliverable with its own data, governance, and audit trail.
For compliance leaders at public companies, the best way to “implement” Fair Funds is to build a playbook that can be activated under legal privilege and executed cross-functionally. Your job is not to promise repayment outcomes or pre-commit to an SEC decision. Your job is to make your organization capable of: (1) identifying harmed investors, (2) calculating potential losses with defensible methods, (3) preserving and producing transaction and communications records, and (4) governing third parties who may support claims administration.
This page translates SOX Section 308 into concrete actions: scope, triggers, steps, evidence, common exam questions, and a practical execution plan that a CCO can put into motion immediately. (Public Law 107-204)
Regulatory text
Excerpt (SOX Section 308): “Civil penalties obtained by the Commission shall be added to disgorgement funds for the benefit of victims.” (Public Law 107-204)
Plain-English interpretation
- What the law does: It permits the SEC to combine two buckets collected in an enforcement action: (1) disgorgement and (2) civil penalties, then distribute the combined amount to harmed investors through a Fair Fund. (Public Law 107-204)
- What the law does not do: It does not require issuers to create a standing Fair Fund on their own, and it does not define your internal controls directly. Your obligations arise because an enforcement action can force you to support identification of victims, calculations, and distribution logistics. (Public Law 107-204)
What an operator must do
Treat “Fair Funds” as a readiness and execution requirement under an enforcement-triggered scenario:
- Maintain data and records that let you identify victims and quantify harm.
- Stand up governance (roles, approvals, legal review) to respond to SEC requests.
- Manage third parties (for example, claims administrators, data vendors, forensic accountants) if they are brought in to run distribution work. (Public Law 107-204)
Who it applies to
Entity types
- Public companies (issuers). (Public Law 107-204)
Operational context (when this becomes real)
This requirement becomes operationally urgent when any of the following occur:
- You face an SEC investigation or enforcement action where investor harm is plausible.
- You anticipate a settlement or order that includes disgorgement and civil penalties.
- You are asked (formally or informally) to support a victim identification, loss calculation, or distribution dataset.
Even without a live case, a mature compliance program keeps a “Fair Funds readiness” playbook alongside investigation response, litigation hold, and remediation governance. (Public Law 107-204)
What you actually need to do (step-by-step)
1) Define the trigger and activate a controlled workstream
- Create a trigger memo template: “If Enforcement Risk Level reaches X (your internal threshold), activate Investor Remediation Readiness.” Keep it simple and tied to your existing investigations/escalations process.
- Put Legal in the driver’s seat for privilege and settlement posture. Compliance owns coordination and control testing; Finance and IR own investor data sources; IT owns extraction and retention.
Deliverable: Investor Remediation Readiness charter (owner, approvers, scope, cadence). (Public Law 107-204)
2) Map the investor harm data universe
Build a data inventory that answers: “If asked, can we identify who was harmed and by how much?” Typical sources:
- Transfer agent/shareholder register data (where applicable)
- Broker/nominee holdings interfaces (often partial; plan for gaps)
- Corporate actions records
- Trading/transaction logs that relate to the misconduct period (if relevant and accessible)
- Disclosure artifacts: press releases, filings, investor presentations, scripts
- Complaint logs and investor relations communications
Deliverable: Investor harm data map (system, owner, retention, extraction method, data quality notes). (Public Law 107-204)
3) Establish a defensible loss calculation approach
You need a method that is:
- Documented: assumptions, formulas, and rationale
- Reproducible: same inputs yield same outputs
- Auditable: versioning and approvals are clear
Common operational pattern:
- Define the “eligible period” tied to the alleged conduct.
- Define eligible transaction types (purchases, holds, sales) and exclusions.
- Define how you handle incomplete data (for example, nominee accounts, missing cost basis). Avoid inventing precision; document limits and fallback logic.
Deliverables: Loss methodology document; calculation workbook/model with change log; approvals and sign-off evidence. (Public Law 107-204)
4) Build the claims readiness process (even if a third party will run it)
If a claims administrator is appointed later, you still need internal readiness:
- Eligibility rules matrix: who qualifies, what proof is required, and who adjudicates exceptions.
- Intake and triage: mailbox/workflow, identity verification steps, fraud screening flags.
- Exception handling: escalation path for disputed claims or edge cases.
- Communications controls: approved language, routing through Legal/IR, retention of outbound notices.
Deliverables: Claims process flow; eligibility decision matrix; communications SOP and templates. (Public Law 107-204)
5) Prepare for third-party involvement (TPRM controls)
Fair Fund distributions often require specialized support (data, notices, claims processing). If third parties are used:
- Contracting: define scope, data handling, confidentiality, record retention, and audit rights.
- Security and privacy review: ensure secure transfer, access controls, and incident reporting.
- Oversight: KPIs tied to accuracy, timeliness, and exception resolution; documented governance meetings.
Deliverables: Third-party due diligence package; executed SOW; data processing and retention terms; oversight meeting notes. (Public Law 107-204)
6) Run a tabletop test
A short tabletop reveals gaps fast:
- Can you produce an investor list for the affected period from systems of record?
- Can you reconcile multiple sources and explain differences?
- Can you reproduce a loss calculation from frozen inputs?
- Can you evidence approvals and change control?
Deliverables: Tabletop script, findings log, remediation tickets, and retest evidence. (Public Law 107-204)
Required evidence and artifacts to retain
Use an “exam-ready binder” structure (electronic is fine):
- Governance
- Charter, RACI, meeting minutes, approvals (Public Law 107-204)
- Legal and investigation coordination
- Litigation hold notices, data preservation confirmations, privilege protocols (Public Law 107-204)
- Data and methodology
- Data map, extraction queries, data dictionaries, reconciliation notes (Public Law 107-204)
- Loss methodology and model version history (Public Law 107-204)
- Claims readiness
- Eligibility matrix, exception procedure, communications templates and approval log (Public Law 107-204)
- Third-party risk
- Due diligence artifacts, contracts/SOWs, oversight records (Public Law 107-204)
Common exam/audit questions and hangups
Expect reviewers (internal audit, regulators, or settlement counsel) to press on:
- “Show me how you would identify victims.” They want system lineage, not a narrative.
- “How did you calculate harm?” They want documented assumptions and reproducibility.
- “What’s your record retention story?” They want proof of holds and extraction integrity.
- “How do you govern third parties?” They want due diligence, audit rights, and oversight evidence.
- “Who approves communications to investors?” They want controlled messaging and retention.
Hangup to anticipate: investor ownership data is often intermediated. Document what you can obtain, how you would request gaps to be filled, and how that constraint affects eligibility. (Public Law 107-204)
Frequent implementation mistakes and how to avoid them
-
Treating Fair Funds as a policy-only requirement
Fix: build a playbook with data extraction steps, owners, and a tabletop test. (Public Law 107-204) -
Loss calculations without change control
Fix: version models, lock inputs, and require formal approval for any assumption change. (Public Law 107-204) -
Uncontrolled investor communications
Fix: route all templates and outbound notices through Legal/Compliance approvals, retain final versions, and log distribution. (Public Law 107-204) -
Ignoring third-party risk because “they’re the claims administrator”
Fix: run third-party due diligence and require audit rights and data handling terms in the contract. (Public Law 107-204) -
Data pulled once, then overwritten
Fix: preserve “as-produced” datasets, document extraction time, and store immutable copies with access logs. (Public Law 107-204)
Enforcement context and risk implications
SOX Section 308 increases the practical stakes of an enforcement outcome because civil penalties can be directed to victims through a combined Fair Fund. (Public Law 107-204) For operators, the risk is not abstract: weak records, poor harm quantification, or sloppy governance can slow remediation, create disputes, and compound regulatory scrutiny around cooperation and controls.
Operationally, you should assume that if a Fair Fund is created, you will face tight deadlines for data, explanations, and sign-offs. Readiness reduces the chance you are forced into ad hoc calculations or incomplete datasets that you cannot defend later. (Public Law 107-204)
Practical 30/60/90-day execution plan
First 30 days (foundation)
- Assign owner and form the cross-functional working group (Legal, Compliance, Finance, IR, IT, Security).
- Draft the Investor Remediation Readiness charter and RACI.
- Build the data map and retention/hold checklist tied to likely enforcement scenarios.
- Identify likely third parties and pre-clear procurement and security intake requirements. (Public Law 107-204)
Days 31–60 (build)
- Write the loss methodology template and approval workflow.
- Create eligibility decision matrix and exception handling procedure.
- Draft communications templates with approval routing and retention rules.
- Define third-party contract clauses: audit rights, security, retention, breach notice, subcontractor controls. (Public Law 107-204)
Days 61–90 (prove)
- Run a tabletop: extract sample datasets, reconcile sources, run a sample harm calculation, produce a mock “exam binder.”
- Fix gaps: missing fields, unclear ownership, untested queries, weak approvals.
- Operationalize ongoing monitoring: periodic checks that systems, owners, and retention paths have not changed. (Public Law 107-204)
Where Daydream fits (practical, non-disruptive)
If you are coordinating multiple third parties (claims admin, forensic accounting, data providers), Daydream can centralize third-party due diligence artifacts, contract obligations (audit rights, retention, security terms), and oversight evidence so your Fair Funds readiness binder stays current without manual chasing across teams.
Frequently Asked Questions
Does SOX Section 308 require my company to create a Fair Fund proactively?
No. The text authorizes the SEC to add civil penalties to disgorgement funds for victims in an enforcement context. Your practical obligation is readiness to support identification of victims and defensible calculations if the SEC establishes a Fair Fund tied to your matter. (Public Law 107-204)
What should a CCO own versus Legal in a Fair Funds readiness program?
Legal should control privilege, investigation posture, and settlement-facing decisions. Compliance should own the operational playbook, control design/testing, recordkeeping discipline, and third-party oversight mechanics. (Public Law 107-204)
What evidence will regulators or auditors expect if a Fair Fund distribution is on the table?
Expect requests for data lineage, loss methodology documentation, approvals, record preservation proof, and third-party oversight records if external firms are involved. Build an “as-produced” dataset archive with versioning so you can reproduce results. (Public Law 107-204)
Our investor ownership data sits with brokers and nominees. How do we handle that?
Document the limitations and your process to obtain what you can through recognized channels (transfer agent records, nominee breakdown requests, or administrator-led outreach). Your goal is a controlled, well-documented approach to gaps, not perfection you cannot evidence. (Public Law 107-204)
Can we reuse our incident response or customer remediation process for Fair Funds?
You can reuse governance patterns (war room, approvals, communications control), but investor harm calculations and eligibility proofs are specialized. Add a dedicated loss methodology template and data map specific to investor datasets. (Public Law 107-204)
How do we avoid creating discoverable “shadow calculations” during readiness work?
Keep Legal involved early, document purpose and scope, and control drafts and distribution. Use a single source of truth repository with access controls and clear versioning so drafts do not sprawl across inboxes. (Public Law 107-204)
Frequently Asked Questions
Does SOX Section 308 require my company to create a Fair Fund proactively?
No. The text authorizes the SEC to add civil penalties to disgorgement funds for victims in an enforcement context. Your practical obligation is readiness to support identification of victims and defensible calculations if the SEC establishes a Fair Fund tied to your matter. (Public Law 107-204)
What should a CCO own versus Legal in a Fair Funds readiness program?
Legal should control privilege, investigation posture, and settlement-facing decisions. Compliance should own the operational playbook, control design/testing, recordkeeping discipline, and third-party oversight mechanics. (Public Law 107-204)
What evidence will regulators or auditors expect if a Fair Fund distribution is on the table?
Expect requests for data lineage, loss methodology documentation, approvals, record preservation proof, and third-party oversight records if external firms are involved. Build an “as-produced” dataset archive with versioning so you can reproduce results. (Public Law 107-204)
Our investor ownership data sits with brokers and nominees. How do we handle that?
Document the limitations and your process to obtain what you can through recognized channels (transfer agent records, nominee breakdown requests, or administrator-led outreach). Your goal is a controlled, well-documented approach to gaps, not perfection you cannot evidence. (Public Law 107-204)
Can we reuse our incident response or customer remediation process for Fair Funds?
You can reuse governance patterns (war room, approvals, communications control), but investor harm calculations and eligibility proofs are specialized. Add a dedicated loss methodology template and data map specific to investor datasets. (Public Law 107-204)
How do we avoid creating discoverable “shadow calculations” during readiness work?
Keep Legal involved early, document purpose and scope, and control drafts and distribution. Use a single source of truth repository with access controls and clear versioning so drafts do not sprawl across inboxes. (Public Law 107-204)
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream