SlideShare a Scribd company logo
1 of 2
Download to read offline
Compare and contrast the theories of liability for insider trading under the antifraud provisions of
Section 10(b) of the Securities Exchange Act of 1934. Analyze and evaluate the various issues
presented while arguing and debating the connections between business, law, politics, and ethics.
Solution
An understanding of insider trading law begins with The Security Exchange Act of 1934
(Act).24 This Act, a response to the 1929 stock market crash, seeks to supervise and regulate
securities trading. Section 10(b) and Rule 10b-5, the relevant provisions of the Act, form the
foundation of insider trading law. Indeed, the majority of inside traders are prosecuted under
these two provisions. Section 10(b) provides that a person may not “use or employ, in connection
with the purchase or sale of any security . . . any manipulative or deceptive device or contrivance
in contravention of such rules and regulations as the [SEC] may prescribe as necessary or
appropriate in the public interest or for the protection of investors.” Section 10(b) is implemented
by Rule 10b-5, which makes it “unlawful for any person . . . to employ any device . . . to defraud
. . . in connection with the purchase or sale of any security.” Under Rule 10b-5, the SEC can
prosecute a defendant for fraud by showing the defendant made a “material misstatement or
omission in connection with the purchase or sale of securities that has caused damages.” The
deception element is satisfied by the occurrence of a misrepresentation or an omission. However,
an omission is only deceptive when there is a duty to inform. In the context of computer hacking,
the device must be deceptive, not manipulative, due to the way “manipulative” has been defined
by the courts. The Supreme Court has ruled that “manipulative” implies defrauding shareholders
by rigging the price of securities. Hacking into a computer in no way amounts to rigging the
price of securities. While Section 10(b) and Rule 10b-5 are used to prosecute inside traders, these
provisions fail to lay out a definition of “insider trading.” Instead, courts have defined what it
means to be an inside trader, and as discussed below, the definition of an inside trader has
expanded over time.
Although the ethical and economic aspects of insider trading regulation have been discussed at
length, only recently have commentators begun to examine the political aspects of this
practice.[1] The virtual total neglect of the political side of the story is particularly curious in
light of the fact that regulation of insiders' trading practices has become a highly politicized
issue and has prompted numerous hearings[2] and bills[3] in Congress.
At present, a battle for the right to regulate insider trading is being fought among Congress, the
regulators at the SEC, and the federal judiciary. Each of these organizations has an institutional
(if not political) interest in regulating the trading practices of insiders, and those interests are
reflected in the regulations and proposals they have promulgated.
Not surprisingly, the federal judiciary, insulated as it is by the relative independence from
political pressures brought about by Article III of the Constitution, has promulgated the most
sensible--though not thoroughly sensible--rules about insider trading.[4] It is dissatisfaction with
these rules among powerful political constituencies that has led the SEC and Congress to attempt
to abrogate the clear rules developed by the Supreme Court and the lower federal courts over the
last several years.
With an aim of exploring more deeply the political aspects of the current debate on insider
trading, this essay begins by examining the political implications of the rules on this subject that
were generated by the Supreme Court in Chiarella v. United States[5] and Dirks v. Securities and
Exchange Commission[6] and clarified in a series of lower court decisions. These two decisions
brought both clarity and coherence to the law of insider trading, which previously had been a bog
of confusion. The decisions also represented major defeats of the SEC's concerted attempts to
use the rules against insider trading to advance its own bureaucratic ends.
Powerful special-interest constituencies of Congress and the SEC were dissatisfied with the rules
generated by the Supreme Court. Their dissatisfaction led to the promulgation of the SEC's
recently proposed compromise statute, which purports to define the crime of insider trading for
the first time.[7]
The proposed statute reflects the interests of those constituencies rather than the proffered
public-interest goal of protecting the "fairness, efficiency and integrity of the Nation's securities
markets."[8] Judge-made law of insider trading evolved from the enactment of SEC Rule 10b-5
to the Supreme Court's decisions in Chiarella and Dirks.[9] The courts gradually moved from
vague, incoherent "fairness" justifications of insider trading law toward precise, intellectually
defensible contract-based justifications of such law. Recently, however, the locus of lawmaking
on the subject of insider trading has shifted from the federal courts to Congress. The result has
been the triumph of politics over principl

More Related Content

More from aishwaryaequipment

Companies for your comparative analysis Caterpillar Inc. and Deere .pdf
Companies for your comparative analysis Caterpillar Inc. and Deere .pdfCompanies for your comparative analysis Caterpillar Inc. and Deere .pdf
Companies for your comparative analysis Caterpillar Inc. and Deere .pdfaishwaryaequipment
 
Compano Inc. was founded in 1986 in Baytown, Texas. The firm provide.pdf
Compano Inc. was founded in 1986 in Baytown, Texas. The firm provide.pdfCompano Inc. was founded in 1986 in Baytown, Texas. The firm provide.pdf
Compano Inc. was founded in 1986 in Baytown, Texas. The firm provide.pdfaishwaryaequipment
 
College students often make up a substantial portion of the populati.pdf
College students often make up a substantial portion of the populati.pdfCollege students often make up a substantial portion of the populati.pdf
College students often make up a substantial portion of the populati.pdfaishwaryaequipment
 
coefficient of linear expansionSolutionThe change in length .pdf
coefficient of linear expansionSolutionThe change in length .pdfcoefficient of linear expansionSolutionThe change in length .pdf
coefficient of linear expansionSolutionThe change in length .pdfaishwaryaequipment
 
Communications between computers can take several approaches. Which .pdf
Communications between computers can take several approaches. Which .pdfCommunications between computers can take several approaches. Which .pdf
Communications between computers can take several approaches. Which .pdfaishwaryaequipment
 
Code In PythonFile 1 main.pyYou will implement two algorithms t.pdf
Code In PythonFile 1 main.pyYou will implement two algorithms t.pdfCode In PythonFile 1 main.pyYou will implement two algorithms t.pdf
Code In PythonFile 1 main.pyYou will implement two algorithms t.pdfaishwaryaequipment
 
Come up with a mean and standard deviation. Using the information yo.pdf
Come up with a mean and standard deviation. Using the information yo.pdfCome up with a mean and standard deviation. Using the information yo.pdf
Come up with a mean and standard deviation. Using the information yo.pdfaishwaryaequipment
 
Complex AnalysisFind the image of (the region outside the unite ci.pdf
Complex AnalysisFind the image of (the region outside the unite ci.pdfComplex AnalysisFind the image of (the region outside the unite ci.pdf
Complex AnalysisFind the image of (the region outside the unite ci.pdfaishwaryaequipment
 
completely forgot how to do these limits, could i have a extremely d.pdf
completely forgot how to do these limits, could i have a extremely d.pdfcompletely forgot how to do these limits, could i have a extremely d.pdf
completely forgot how to do these limits, could i have a extremely d.pdfaishwaryaequipment
 
Complex logarithmDescribe log z.SolutionThe complex logarith.pdf
Complex logarithmDescribe log z.SolutionThe complex logarith.pdfComplex logarithmDescribe log z.SolutionThe complex logarith.pdf
Complex logarithmDescribe log z.SolutionThe complex logarith.pdfaishwaryaequipment
 
Complete the Income Statement.What was the company’s interest expe.pdf
Complete the Income Statement.What was the company’s interest expe.pdfComplete the Income Statement.What was the company’s interest expe.pdf
Complete the Income Statement.What was the company’s interest expe.pdfaishwaryaequipment
 
College Algebra Can anyone help me If $2500 is invested in the ac.pdf
College Algebra Can anyone help me If $2500 is invested in the ac.pdfCollege Algebra Can anyone help me If $2500 is invested in the ac.pdf
College Algebra Can anyone help me If $2500 is invested in the ac.pdfaishwaryaequipment
 
Complete by hand. Show all work. 14. Information Gathering and E.pdf
Complete by hand. Show all work. 14. Information Gathering and E.pdfComplete by hand. Show all work. 14. Information Gathering and E.pdf
Complete by hand. Show all work. 14. Information Gathering and E.pdfaishwaryaequipment
 
Compensation plans usually include a variety of benefits. Name the t.pdf
Compensation plans usually include a variety of benefits. Name the t.pdfCompensation plans usually include a variety of benefits. Name the t.pdf
Compensation plans usually include a variety of benefits. Name the t.pdfaishwaryaequipment
 
Comparecontrast economies of scale and diseconomies of scale.So.pdf
Comparecontrast economies of scale and diseconomies of scale.So.pdfComparecontrast economies of scale and diseconomies of scale.So.pdf
Comparecontrast economies of scale and diseconomies of scale.So.pdfaishwaryaequipment
 
Comparecontrast explicit and implicit costs.SolutionExplicit .pdf
Comparecontrast explicit and implicit costs.SolutionExplicit .pdfComparecontrast explicit and implicit costs.SolutionExplicit .pdf
Comparecontrast explicit and implicit costs.SolutionExplicit .pdfaishwaryaequipment
 
Compare the Euro downfall with the other major currencies of the wor.pdf
Compare the Euro downfall with the other major currencies of the wor.pdfCompare the Euro downfall with the other major currencies of the wor.pdf
Compare the Euro downfall with the other major currencies of the wor.pdfaishwaryaequipment
 
Compare the difference between using the RTI interrupt to control th.pdf
Compare the difference between using the RTI interrupt to control th.pdfCompare the difference between using the RTI interrupt to control th.pdf
Compare the difference between using the RTI interrupt to control th.pdfaishwaryaequipment
 
compare and contrast the change interventions (first and second orde.pdf
compare and contrast the change interventions (first and second orde.pdfcompare and contrast the change interventions (first and second orde.pdf
compare and contrast the change interventions (first and second orde.pdfaishwaryaequipment
 
Compare and contrast the national cultures of the U.S. and India usi.pdf
Compare and contrast the national cultures of the U.S. and India usi.pdfCompare and contrast the national cultures of the U.S. and India usi.pdf
Compare and contrast the national cultures of the U.S. and India usi.pdfaishwaryaequipment
 

More from aishwaryaequipment (20)

Companies for your comparative analysis Caterpillar Inc. and Deere .pdf
Companies for your comparative analysis Caterpillar Inc. and Deere .pdfCompanies for your comparative analysis Caterpillar Inc. and Deere .pdf
Companies for your comparative analysis Caterpillar Inc. and Deere .pdf
 
Compano Inc. was founded in 1986 in Baytown, Texas. The firm provide.pdf
Compano Inc. was founded in 1986 in Baytown, Texas. The firm provide.pdfCompano Inc. was founded in 1986 in Baytown, Texas. The firm provide.pdf
Compano Inc. was founded in 1986 in Baytown, Texas. The firm provide.pdf
 
College students often make up a substantial portion of the populati.pdf
College students often make up a substantial portion of the populati.pdfCollege students often make up a substantial portion of the populati.pdf
College students often make up a substantial portion of the populati.pdf
 
coefficient of linear expansionSolutionThe change in length .pdf
coefficient of linear expansionSolutionThe change in length .pdfcoefficient of linear expansionSolutionThe change in length .pdf
coefficient of linear expansionSolutionThe change in length .pdf
 
Communications between computers can take several approaches. Which .pdf
Communications between computers can take several approaches. Which .pdfCommunications between computers can take several approaches. Which .pdf
Communications between computers can take several approaches. Which .pdf
 
Code In PythonFile 1 main.pyYou will implement two algorithms t.pdf
Code In PythonFile 1 main.pyYou will implement two algorithms t.pdfCode In PythonFile 1 main.pyYou will implement two algorithms t.pdf
Code In PythonFile 1 main.pyYou will implement two algorithms t.pdf
 
Come up with a mean and standard deviation. Using the information yo.pdf
Come up with a mean and standard deviation. Using the information yo.pdfCome up with a mean and standard deviation. Using the information yo.pdf
Come up with a mean and standard deviation. Using the information yo.pdf
 
Complex AnalysisFind the image of (the region outside the unite ci.pdf
Complex AnalysisFind the image of (the region outside the unite ci.pdfComplex AnalysisFind the image of (the region outside the unite ci.pdf
Complex AnalysisFind the image of (the region outside the unite ci.pdf
 
completely forgot how to do these limits, could i have a extremely d.pdf
completely forgot how to do these limits, could i have a extremely d.pdfcompletely forgot how to do these limits, could i have a extremely d.pdf
completely forgot how to do these limits, could i have a extremely d.pdf
 
Complex logarithmDescribe log z.SolutionThe complex logarith.pdf
Complex logarithmDescribe log z.SolutionThe complex logarith.pdfComplex logarithmDescribe log z.SolutionThe complex logarith.pdf
Complex logarithmDescribe log z.SolutionThe complex logarith.pdf
 
Complete the Income Statement.What was the company’s interest expe.pdf
Complete the Income Statement.What was the company’s interest expe.pdfComplete the Income Statement.What was the company’s interest expe.pdf
Complete the Income Statement.What was the company’s interest expe.pdf
 
College Algebra Can anyone help me If $2500 is invested in the ac.pdf
College Algebra Can anyone help me If $2500 is invested in the ac.pdfCollege Algebra Can anyone help me If $2500 is invested in the ac.pdf
College Algebra Can anyone help me If $2500 is invested in the ac.pdf
 
Complete by hand. Show all work. 14. Information Gathering and E.pdf
Complete by hand. Show all work. 14. Information Gathering and E.pdfComplete by hand. Show all work. 14. Information Gathering and E.pdf
Complete by hand. Show all work. 14. Information Gathering and E.pdf
 
Compensation plans usually include a variety of benefits. Name the t.pdf
Compensation plans usually include a variety of benefits. Name the t.pdfCompensation plans usually include a variety of benefits. Name the t.pdf
Compensation plans usually include a variety of benefits. Name the t.pdf
 
Comparecontrast economies of scale and diseconomies of scale.So.pdf
Comparecontrast economies of scale and diseconomies of scale.So.pdfComparecontrast economies of scale and diseconomies of scale.So.pdf
Comparecontrast economies of scale and diseconomies of scale.So.pdf
 
Comparecontrast explicit and implicit costs.SolutionExplicit .pdf
Comparecontrast explicit and implicit costs.SolutionExplicit .pdfComparecontrast explicit and implicit costs.SolutionExplicit .pdf
Comparecontrast explicit and implicit costs.SolutionExplicit .pdf
 
Compare the Euro downfall with the other major currencies of the wor.pdf
Compare the Euro downfall with the other major currencies of the wor.pdfCompare the Euro downfall with the other major currencies of the wor.pdf
Compare the Euro downfall with the other major currencies of the wor.pdf
 
Compare the difference between using the RTI interrupt to control th.pdf
Compare the difference between using the RTI interrupt to control th.pdfCompare the difference between using the RTI interrupt to control th.pdf
Compare the difference between using the RTI interrupt to control th.pdf
 
compare and contrast the change interventions (first and second orde.pdf
compare and contrast the change interventions (first and second orde.pdfcompare and contrast the change interventions (first and second orde.pdf
compare and contrast the change interventions (first and second orde.pdf
 
Compare and contrast the national cultures of the U.S. and India usi.pdf
Compare and contrast the national cultures of the U.S. and India usi.pdfCompare and contrast the national cultures of the U.S. and India usi.pdf
Compare and contrast the national cultures of the U.S. and India usi.pdf
 

Recently uploaded

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 

Recently uploaded (20)

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 

Compare and contrast the theories of liability for insider trading u.pdf

  • 1. Compare and contrast the theories of liability for insider trading under the antifraud provisions of Section 10(b) of the Securities Exchange Act of 1934. Analyze and evaluate the various issues presented while arguing and debating the connections between business, law, politics, and ethics. Solution An understanding of insider trading law begins with The Security Exchange Act of 1934 (Act).24 This Act, a response to the 1929 stock market crash, seeks to supervise and regulate securities trading. Section 10(b) and Rule 10b-5, the relevant provisions of the Act, form the foundation of insider trading law. Indeed, the majority of inside traders are prosecuted under these two provisions. Section 10(b) provides that a person may not “use or employ, in connection with the purchase or sale of any security . . . any manipulative or deceptive device or contrivance in contravention of such rules and regulations as the [SEC] may prescribe as necessary or appropriate in the public interest or for the protection of investors.” Section 10(b) is implemented by Rule 10b-5, which makes it “unlawful for any person . . . to employ any device . . . to defraud . . . in connection with the purchase or sale of any security.” Under Rule 10b-5, the SEC can prosecute a defendant for fraud by showing the defendant made a “material misstatement or omission in connection with the purchase or sale of securities that has caused damages.” The deception element is satisfied by the occurrence of a misrepresentation or an omission. However, an omission is only deceptive when there is a duty to inform. In the context of computer hacking, the device must be deceptive, not manipulative, due to the way “manipulative” has been defined by the courts. The Supreme Court has ruled that “manipulative” implies defrauding shareholders by rigging the price of securities. Hacking into a computer in no way amounts to rigging the price of securities. While Section 10(b) and Rule 10b-5 are used to prosecute inside traders, these provisions fail to lay out a definition of “insider trading.” Instead, courts have defined what it means to be an inside trader, and as discussed below, the definition of an inside trader has expanded over time. Although the ethical and economic aspects of insider trading regulation have been discussed at length, only recently have commentators begun to examine the political aspects of this practice.[1] The virtual total neglect of the political side of the story is particularly curious in light of the fact that regulation of insiders' trading practices has become a highly politicized issue and has prompted numerous hearings[2] and bills[3] in Congress. At present, a battle for the right to regulate insider trading is being fought among Congress, the regulators at the SEC, and the federal judiciary. Each of these organizations has an institutional (if not political) interest in regulating the trading practices of insiders, and those interests are
  • 2. reflected in the regulations and proposals they have promulgated. Not surprisingly, the federal judiciary, insulated as it is by the relative independence from political pressures brought about by Article III of the Constitution, has promulgated the most sensible--though not thoroughly sensible--rules about insider trading.[4] It is dissatisfaction with these rules among powerful political constituencies that has led the SEC and Congress to attempt to abrogate the clear rules developed by the Supreme Court and the lower federal courts over the last several years. With an aim of exploring more deeply the political aspects of the current debate on insider trading, this essay begins by examining the political implications of the rules on this subject that were generated by the Supreme Court in Chiarella v. United States[5] and Dirks v. Securities and Exchange Commission[6] and clarified in a series of lower court decisions. These two decisions brought both clarity and coherence to the law of insider trading, which previously had been a bog of confusion. The decisions also represented major defeats of the SEC's concerted attempts to use the rules against insider trading to advance its own bureaucratic ends. Powerful special-interest constituencies of Congress and the SEC were dissatisfied with the rules generated by the Supreme Court. Their dissatisfaction led to the promulgation of the SEC's recently proposed compromise statute, which purports to define the crime of insider trading for the first time.[7] The proposed statute reflects the interests of those constituencies rather than the proffered public-interest goal of protecting the "fairness, efficiency and integrity of the Nation's securities markets."[8] Judge-made law of insider trading evolved from the enactment of SEC Rule 10b-5 to the Supreme Court's decisions in Chiarella and Dirks.[9] The courts gradually moved from vague, incoherent "fairness" justifications of insider trading law toward precise, intellectually defensible contract-based justifications of such law. Recently, however, the locus of lawmaking on the subject of insider trading has shifted from the federal courts to Congress. The result has been the triumph of politics over principl