This document is a case study presentation on regulatory rules applying to insider trading. It was presented by five students for their BUS 5111 financial management course. It addresses the legal, ethical, and economic implications of insider trading and ways to curb it. Regarding legal implications, insider trading violates SEC regulations and can result in prison time and large fines. Ethically, it undermines market confidence and fairness. Economically, it reduces investor returns and confidence in the system. The presentation recommends restricting risky trades, appointing compliance watchdogs, educating employees, investigating suspicions, and monitoring technology use to curb insider trading.
TFW LTE 1032 ANM Assignments Position Paper Detail Submission Grade .pdftesmondday29076
TFW LTE 10:32 ANM Assignments Position Paper Detail Submission Grade Position Paper
Due: Jul 25, 2018 at 11:59 PM Topics for Final Paper-choose a topic from the following options
. Examine the issue of insider trading Analyze the ethical issues at stake (be sure to look at the
issue from both Utilitarian and Kantian perspectives). Do you believe insider trading is ethical?
Why or why not? Be sure to support your position with reasoned argumentation (including
showing why the alternative positions are ethically weaker than your own) Write a critical essav
(either in sunnort of Previous Next Dashboard Calendar To Do Notifications Inbox
Solution
Answer ) Insider Trading and Business Ethics
Many people are complaining insider trading since it is unfair for some people who do not have
confidential information about a certain company. People who do not have information that is
not yet into the public lose their confidence and trust towards the company. Therefore, many
companies lose potential investor from insider trading. Insider trading is a huge issue among
people. Insider trading can be an unethical; yet sometimes it can be ethical.
What is Insider Trading :Insider trading is a word that has many definitions and connotations and
which includes both legal and illegal activities. It can also be described as an insider trading of a
company’s stock, securities, bonds and stock options by persons with possible access to non-
public information about the company. Nevertheless, insider trading can take place lawfully
every day, when trading by the corporate insiders such as officers, directors, employees and large
shareholders to buy or sell stock in their own companies if this trading will not be taking
advantage of the non-public information and also be within the boundaries of the company’s
policies and the rules governing this trading. However, the term “insider trading\" is mostly used
to describe a practice in which an insider party trades based on non-public material information
gained through the performance of the insider’s obligation at the company, in violation of other
relationships of faith and assurance or otherwise when the non-public information was stolen
from the company. In other words, insider trading is buying, selling or dealing in securities,
bonds, and stocks of a company by a director, manager, or employee of the company who has
confidential information that is not accessible to the public.
Who is an Insider:An insider is a person who has entrée to the confidential information about a
company or corporation that will affect the stock price or might manipulate investors’ decisions.
This is “material information\". Moreover, most company executives clearly have important
information about the company. For example, the manager of sales knows how much the
company has sold and if it rallies, the estimates provided with the investors. Moreover, others
who work with the company also have material information; for instance, the accoun.
Regulating Insider Trading in India- Emerging Trends & Challenges.pptxtaxguruedu
The SEBI (Prohibition of Insider Trading) Regulations 2015 were implemented by the Securities and Exchange Board of India (SEBI) to regulate insider trading in India. Insider trading refers to the practice of trading in securities by individuals who have access to unpublished price-sensitive information (UPSI).
Discussion #1Based on authoritative sources (including peer revi.docxcuddietheresa
Discussion #1
Based on authoritative sources (including peer reviewed articles from the library, Fraud Examiners Manual, etc), give some examples and discuss current ways in which you could obtain information from public and private sources if you were asked to investigate an employee in accounts receivable that is believed to be embezzling funds from your company. Do you think the data you obtained is reliable from these public and private sources, why or why not?
Comment (FG)
The investigation's study element includes specialists in publicly sourced data obtaining appropriate data about people and organizations suspected of fraud participation (PWC, 2008). This is one of the first measures taken when a suspect was recognized in an inquiry. Most of the information and paperwork used in an inquiry are produced internally – it comes from within the organization or is otherwise easily accessible within the organization (in the event of invoices from the seller). However, sometimes it becomes vital to have information or paperwork that is only accessible from external sources. Public data and documents are typically accessible to the general government either by visiting a website or facility or on request from the record holder. In most instances, government agencies maintain public records. There are two wide categories of external information sources, public and non-public. For instance, if an employee posts pictures or makes statements on social media, this data could be easily accessible to all spectators. “Investigators should always use caution when accessing this information, especially if the information is only available to ‘friends’ or other contacts that the individual has granted special access to.” (Pomerantz & Zack, 2017)
Non-public documents are confidential and private. Holders of such documents are under no obligation to generate such documents unless they have given their permission or are required to do so as a consequence of legal proceedings, such as a court order or summons. This category includes records such as private bank statements from people who may be the topic of an inquiry. Researchers do not normally have ready access to these records. Non-public records include information about a private and confidential person or business. Must get from 1) Consent, 2) Legal process 3) Search warrant.
An employer who uses a third party to conduct a workplace investigation no longer has to obtain the prior consent of an employee if the investigation involves suspected: 1) Misconduct, 2) Violation of law or regulations, 3) Violation of any preexisting policy of the employer (ACFE, 201
Discussion #2
Play the video titled 5 Steps to Reduce Small Business Fraud located on the ACFE website http://www.acfe.com/Video-Library.aspx
What did you learn from this video that you could relate to your current, past or future job in accounting? Be sure to use authoritative sources (including peer reviewed articles from the library, F ...
Introduction to US Privacy and Data Security: Regulations and RequirementsFinancial Poise
The United States has no federal data security or privacy law covering all businesses or all U.S. citizens. Instead, federal agencies and individual states have created their own patchwork of laws and regulations which must be evaluated for their application to a business.
This webinar will help you navigate the overlapping and sometimes confusing system of laws and regulations which may impact your business, ranging from emerging state-level privacy legislation to the numerous data breach notification statutes to cybersecurity regulations with extraterritorial effect.
Part of the webinar series: CYBERSECURITY & DATA PRIVACY 2022
See more at https://www.financialpoise.com/webinars/
TFW LTE 1032 ANM Assignments Position Paper Detail Submission Grade .pdftesmondday29076
TFW LTE 10:32 ANM Assignments Position Paper Detail Submission Grade Position Paper
Due: Jul 25, 2018 at 11:59 PM Topics for Final Paper-choose a topic from the following options
. Examine the issue of insider trading Analyze the ethical issues at stake (be sure to look at the
issue from both Utilitarian and Kantian perspectives). Do you believe insider trading is ethical?
Why or why not? Be sure to support your position with reasoned argumentation (including
showing why the alternative positions are ethically weaker than your own) Write a critical essav
(either in sunnort of Previous Next Dashboard Calendar To Do Notifications Inbox
Solution
Answer ) Insider Trading and Business Ethics
Many people are complaining insider trading since it is unfair for some people who do not have
confidential information about a certain company. People who do not have information that is
not yet into the public lose their confidence and trust towards the company. Therefore, many
companies lose potential investor from insider trading. Insider trading is a huge issue among
people. Insider trading can be an unethical; yet sometimes it can be ethical.
What is Insider Trading :Insider trading is a word that has many definitions and connotations and
which includes both legal and illegal activities. It can also be described as an insider trading of a
company’s stock, securities, bonds and stock options by persons with possible access to non-
public information about the company. Nevertheless, insider trading can take place lawfully
every day, when trading by the corporate insiders such as officers, directors, employees and large
shareholders to buy or sell stock in their own companies if this trading will not be taking
advantage of the non-public information and also be within the boundaries of the company’s
policies and the rules governing this trading. However, the term “insider trading\" is mostly used
to describe a practice in which an insider party trades based on non-public material information
gained through the performance of the insider’s obligation at the company, in violation of other
relationships of faith and assurance or otherwise when the non-public information was stolen
from the company. In other words, insider trading is buying, selling or dealing in securities,
bonds, and stocks of a company by a director, manager, or employee of the company who has
confidential information that is not accessible to the public.
Who is an Insider:An insider is a person who has entrée to the confidential information about a
company or corporation that will affect the stock price or might manipulate investors’ decisions.
This is “material information\". Moreover, most company executives clearly have important
information about the company. For example, the manager of sales knows how much the
company has sold and if it rallies, the estimates provided with the investors. Moreover, others
who work with the company also have material information; for instance, the accoun.
Regulating Insider Trading in India- Emerging Trends & Challenges.pptxtaxguruedu
The SEBI (Prohibition of Insider Trading) Regulations 2015 were implemented by the Securities and Exchange Board of India (SEBI) to regulate insider trading in India. Insider trading refers to the practice of trading in securities by individuals who have access to unpublished price-sensitive information (UPSI).
Discussion #1Based on authoritative sources (including peer revi.docxcuddietheresa
Discussion #1
Based on authoritative sources (including peer reviewed articles from the library, Fraud Examiners Manual, etc), give some examples and discuss current ways in which you could obtain information from public and private sources if you were asked to investigate an employee in accounts receivable that is believed to be embezzling funds from your company. Do you think the data you obtained is reliable from these public and private sources, why or why not?
Comment (FG)
The investigation's study element includes specialists in publicly sourced data obtaining appropriate data about people and organizations suspected of fraud participation (PWC, 2008). This is one of the first measures taken when a suspect was recognized in an inquiry. Most of the information and paperwork used in an inquiry are produced internally – it comes from within the organization or is otherwise easily accessible within the organization (in the event of invoices from the seller). However, sometimes it becomes vital to have information or paperwork that is only accessible from external sources. Public data and documents are typically accessible to the general government either by visiting a website or facility or on request from the record holder. In most instances, government agencies maintain public records. There are two wide categories of external information sources, public and non-public. For instance, if an employee posts pictures or makes statements on social media, this data could be easily accessible to all spectators. “Investigators should always use caution when accessing this information, especially if the information is only available to ‘friends’ or other contacts that the individual has granted special access to.” (Pomerantz & Zack, 2017)
Non-public documents are confidential and private. Holders of such documents are under no obligation to generate such documents unless they have given their permission or are required to do so as a consequence of legal proceedings, such as a court order or summons. This category includes records such as private bank statements from people who may be the topic of an inquiry. Researchers do not normally have ready access to these records. Non-public records include information about a private and confidential person or business. Must get from 1) Consent, 2) Legal process 3) Search warrant.
An employer who uses a third party to conduct a workplace investigation no longer has to obtain the prior consent of an employee if the investigation involves suspected: 1) Misconduct, 2) Violation of law or regulations, 3) Violation of any preexisting policy of the employer (ACFE, 201
Discussion #2
Play the video titled 5 Steps to Reduce Small Business Fraud located on the ACFE website http://www.acfe.com/Video-Library.aspx
What did you learn from this video that you could relate to your current, past or future job in accounting? Be sure to use authoritative sources (including peer reviewed articles from the library, F ...
Introduction to US Privacy and Data Security: Regulations and RequirementsFinancial Poise
The United States has no federal data security or privacy law covering all businesses or all U.S. citizens. Instead, federal agencies and individual states have created their own patchwork of laws and regulations which must be evaluated for their application to a business.
This webinar will help you navigate the overlapping and sometimes confusing system of laws and regulations which may impact your business, ranging from emerging state-level privacy legislation to the numerous data breach notification statutes to cybersecurity regulations with extraterritorial effect.
Part of the webinar series: CYBERSECURITY & DATA PRIVACY 2022
See more at https://www.financialpoise.com/webinars/
This course provides an overview of whistleblower protections for employees who blow the whistle on cybersecurity or data privacy concerns. And it offers practical tips and insights for practitioners on how to evaluate potential cybersecurity whistleblower claims and overlapping remedies to maximize damages. In addition, the course addresses the challenging issues that arise when a whistleblower simultaneously prosecutes both whistleblower retaliation and whistleblower rewards claims.
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Financial Poise
The United States has no federal data security or privacy law covering all businesses or all U.S. citizens. Instead, federal agencies and individual states have created their own patchwork of laws and regulations which must be evaluated for their application to a business.
This webinar will help you navigate the overlapping and sometimes confusing system of laws and regulations which may impact your business, ranging from emerging state-level privacy legislation to the numerous data breach notification statutes to cybersecurity regulations with extraterritorial effect.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/introduction-to-us-privacy-and-data-security-regulations-and-requirements-2021/
All levels of society rely upon information technology systems. Network operations are pervasive and impact nearly every aspect of our society. The desire of companies to collect, use, store, and secure information about customers, employees, and other individuals is a requirement of the new economy. It is no wonder that the prevalence of electronic communications and a growing dependency on cyber structures and operations also create potential vulnerabilities to cyberattacks. It is critical to preserve information systems and address and prevent weaknesses in cyber protection efforts. This webinar examines the means for companies to reach data goals ethically, efficiently and legally. Best practices and model comprehensive privacy and cybersecurity policies are discussed. And, data breach response and related litigation, including class action litigation issues and fiduciary duty violations under corporate law, are discussed.
To view the accompanying webinar, go to:
https://www.financialpoise.com/financial-poise-webinars/data-privacy-compliance-2020/
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Financial Poise
There is no federal law governing privacy and data security applicable to all US citizens. Rather, individual states and regulatory agencies have created a patchwork of protections that may overlap in certain industries.
This webinar provides an overview of the many privacy and data security laws and regulations which may impact your business, from the state law protecting personal information to regulations covering the financial services industry to state breach notification laws.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/introduction-to-us-privacy-and-data-security-2020/
All levels of society rely upon information technology systems. Network operations are pervasive and impact nearly every aspect of our society. The desire of companies to collect, use, store, and secure information about customers, employees, and other individuals is a requirement of the new economy. It is no wonder that the prevalence of electronic communications and a growing dependency on cyber structures and operations also create potential vulnerabilities to cyberattacks. It is critical to preserve information systems and address and prevent weaknesses in cyber protection efforts. This webinar examines the means for companies to reach data goals ethically, efficiently and legally. The panel will also discuss the evolving regulatory approaches of the European Union, United States Federal government and significant developments in U.S. state regimes, including California. Best practices and model comprehensive privacy and cybersecurity policies are discussed. And, data breach response and related litigation, including class action litigation issues and fiduciary duty violations under corporate law, are discussed.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/data-privacy-compliance-2021/
Freescale Semiconductors, Inc.
Advanced Auditing
December 9, 2014
Threat of prison terms deter executives
Wide range in sentencing
Longer prison terms
No perfect answer
Additional laws and harsher penalties on financial fraud can eliminate or mitigate financial fraud.
Does the threat of prison terms deter executives from committing wide-scale financial frauds? In my opinion, yes and no.
An executive engaging in accounting fraud is typically not planning on getting caught. Therefore, stricter sentencing guidelines wouldn’t seem to have much of an impact on an executive’s thought as to not commit fraud. If an executive isn’t planning on getting caught, a potential prison term of 10 years versus five years is no different.
If the goal of sentencing is really punishment over deterrence, the longer prison sentences are meeting that goal. Society needs protection from these criminal minds who cause widespread financial damage to so many.
No perfect answer exists when it comes to white-collar crimes and prison sentences. The system is still evolving and will likely continue to do so for a long time to come. What is important to recognize is that white-collar crimes can have many victims and can cause widespread damage. For that, stiff sentences to punish and possibly deter the fraud perpetrators are necessary, and lawmakers should work to make those sentences fair and equitable.
2
SOX protection
Sentencing guidelines have changed dramatically
Is there still fairness
Powerful deterrent
Additional laws and harsher penalties on financial fraud can eliminate or mitigate financial fraud, continued
Since the corporate scandals the SOX Act of 2002 sought to protect retail investors from financial statement fraud. Sentencing guidelines have changed dramatically because of Sarbanes-Oxley. For example, wire and mail fraud previously carried maximum five-year sentences, and that was increased to 20 years under the legislation.
The increase in the length of sentences for white-collar crimes now puts many of these crimes ahead of crimes such as drug trafficking and manslaughter. Some question the fairness of this. While financial crimes can cost millions or billions of dollars, to some it still seems irrational to make those prison sentences harsher than the sentences for violent crimes. Others recognize the widespread financial devastation even one white-collar crime can cause, and hope that lengthy sentences will serve as a powerful deterrent.
3
Shallow sentencing should be examined closer
Limited resources tendency to focus on violent crimes
Direct involvement cooperation lighter sentencing
The publicity of fraud
Additional laws and harsher penalties on financial fraud can eliminate or mitigate financial fraud, continued
The fact remains that shallow sentencing should be examined closer. Lawmakers, judges, and prosecutors owe it to consumer and victims to work toward a system that is fair and equitable ...
Fraud and corporate governance changing paradigm in India 2012EY
This report offers a perspective on the bribery landscape across Europe, the Middle East, India and Africa (EMEIA), including enforcement trends, risks for businesses to be aware of and mitigating steps companies may want to consider.
For further information on EY's fraud investigation and dispute services, please visit: http://www.ey.com/IN/en/Services/Assurance/Fraud-Investigation---Dispute-Services
Pending legislation in Congress wuold protect whistleblowing about cybersecurity and data privacy. In the interim, some existing federal and state whistleblower protection laws provide limited protection for cybersecuriity and data privacy whistleblowing.
Research paper - Forensic investigation, due diligenceHarsh Chitroda
Topic: Importance of Business Intelligence Services - Forensic Investigation, Due diligence in the current business scenario. The type of research method used in the paper was a qualitative one and obtained from real experience working at Deloitte.
Discover the innovative and creative projects that highlight my journey throu...dylandmeas
Discover the innovative and creative projects that highlight my journey through Full Sail University. Below, you’ll find a collection of my work showcasing my skills and expertise in digital marketing, event planning, and media production.
What are the main advantages of using HR recruiter services.pdfHumanResourceDimensi1
HR recruiter services offer top talents to companies according to their specific needs. They handle all recruitment tasks from job posting to onboarding and help companies concentrate on their business growth. With their expertise and years of experience, they streamline the hiring process and save time and resources for the company.
This course provides an overview of whistleblower protections for employees who blow the whistle on cybersecurity or data privacy concerns. And it offers practical tips and insights for practitioners on how to evaluate potential cybersecurity whistleblower claims and overlapping remedies to maximize damages. In addition, the course addresses the challenging issues that arise when a whistleblower simultaneously prosecutes both whistleblower retaliation and whistleblower rewards claims.
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Financial Poise
The United States has no federal data security or privacy law covering all businesses or all U.S. citizens. Instead, federal agencies and individual states have created their own patchwork of laws and regulations which must be evaluated for their application to a business.
This webinar will help you navigate the overlapping and sometimes confusing system of laws and regulations which may impact your business, ranging from emerging state-level privacy legislation to the numerous data breach notification statutes to cybersecurity regulations with extraterritorial effect.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/introduction-to-us-privacy-and-data-security-regulations-and-requirements-2021/
All levels of society rely upon information technology systems. Network operations are pervasive and impact nearly every aspect of our society. The desire of companies to collect, use, store, and secure information about customers, employees, and other individuals is a requirement of the new economy. It is no wonder that the prevalence of electronic communications and a growing dependency on cyber structures and operations also create potential vulnerabilities to cyberattacks. It is critical to preserve information systems and address and prevent weaknesses in cyber protection efforts. This webinar examines the means for companies to reach data goals ethically, efficiently and legally. Best practices and model comprehensive privacy and cybersecurity policies are discussed. And, data breach response and related litigation, including class action litigation issues and fiduciary duty violations under corporate law, are discussed.
To view the accompanying webinar, go to:
https://www.financialpoise.com/financial-poise-webinars/data-privacy-compliance-2020/
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Financial Poise
There is no federal law governing privacy and data security applicable to all US citizens. Rather, individual states and regulatory agencies have created a patchwork of protections that may overlap in certain industries.
This webinar provides an overview of the many privacy and data security laws and regulations which may impact your business, from the state law protecting personal information to regulations covering the financial services industry to state breach notification laws.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/introduction-to-us-privacy-and-data-security-2020/
All levels of society rely upon information technology systems. Network operations are pervasive and impact nearly every aspect of our society. The desire of companies to collect, use, store, and secure information about customers, employees, and other individuals is a requirement of the new economy. It is no wonder that the prevalence of electronic communications and a growing dependency on cyber structures and operations also create potential vulnerabilities to cyberattacks. It is critical to preserve information systems and address and prevent weaknesses in cyber protection efforts. This webinar examines the means for companies to reach data goals ethically, efficiently and legally. The panel will also discuss the evolving regulatory approaches of the European Union, United States Federal government and significant developments in U.S. state regimes, including California. Best practices and model comprehensive privacy and cybersecurity policies are discussed. And, data breach response and related litigation, including class action litigation issues and fiduciary duty violations under corporate law, are discussed.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/data-privacy-compliance-2021/
Freescale Semiconductors, Inc.
Advanced Auditing
December 9, 2014
Threat of prison terms deter executives
Wide range in sentencing
Longer prison terms
No perfect answer
Additional laws and harsher penalties on financial fraud can eliminate or mitigate financial fraud.
Does the threat of prison terms deter executives from committing wide-scale financial frauds? In my opinion, yes and no.
An executive engaging in accounting fraud is typically not planning on getting caught. Therefore, stricter sentencing guidelines wouldn’t seem to have much of an impact on an executive’s thought as to not commit fraud. If an executive isn’t planning on getting caught, a potential prison term of 10 years versus five years is no different.
If the goal of sentencing is really punishment over deterrence, the longer prison sentences are meeting that goal. Society needs protection from these criminal minds who cause widespread financial damage to so many.
No perfect answer exists when it comes to white-collar crimes and prison sentences. The system is still evolving and will likely continue to do so for a long time to come. What is important to recognize is that white-collar crimes can have many victims and can cause widespread damage. For that, stiff sentences to punish and possibly deter the fraud perpetrators are necessary, and lawmakers should work to make those sentences fair and equitable.
2
SOX protection
Sentencing guidelines have changed dramatically
Is there still fairness
Powerful deterrent
Additional laws and harsher penalties on financial fraud can eliminate or mitigate financial fraud, continued
Since the corporate scandals the SOX Act of 2002 sought to protect retail investors from financial statement fraud. Sentencing guidelines have changed dramatically because of Sarbanes-Oxley. For example, wire and mail fraud previously carried maximum five-year sentences, and that was increased to 20 years under the legislation.
The increase in the length of sentences for white-collar crimes now puts many of these crimes ahead of crimes such as drug trafficking and manslaughter. Some question the fairness of this. While financial crimes can cost millions or billions of dollars, to some it still seems irrational to make those prison sentences harsher than the sentences for violent crimes. Others recognize the widespread financial devastation even one white-collar crime can cause, and hope that lengthy sentences will serve as a powerful deterrent.
3
Shallow sentencing should be examined closer
Limited resources tendency to focus on violent crimes
Direct involvement cooperation lighter sentencing
The publicity of fraud
Additional laws and harsher penalties on financial fraud can eliminate or mitigate financial fraud, continued
The fact remains that shallow sentencing should be examined closer. Lawmakers, judges, and prosecutors owe it to consumer and victims to work toward a system that is fair and equitable ...
Fraud and corporate governance changing paradigm in India 2012EY
This report offers a perspective on the bribery landscape across Europe, the Middle East, India and Africa (EMEIA), including enforcement trends, risks for businesses to be aware of and mitigating steps companies may want to consider.
For further information on EY's fraud investigation and dispute services, please visit: http://www.ey.com/IN/en/Services/Assurance/Fraud-Investigation---Dispute-Services
Pending legislation in Congress wuold protect whistleblowing about cybersecurity and data privacy. In the interim, some existing federal and state whistleblower protection laws provide limited protection for cybersecuriity and data privacy whistleblowing.
Research paper - Forensic investigation, due diligenceHarsh Chitroda
Topic: Importance of Business Intelligence Services - Forensic Investigation, Due diligence in the current business scenario. The type of research method used in the paper was a qualitative one and obtained from real experience working at Deloitte.
Discover the innovative and creative projects that highlight my journey throu...dylandmeas
Discover the innovative and creative projects that highlight my journey through Full Sail University. Below, you’ll find a collection of my work showcasing my skills and expertise in digital marketing, event planning, and media production.
What are the main advantages of using HR recruiter services.pdfHumanResourceDimensi1
HR recruiter services offer top talents to companies according to their specific needs. They handle all recruitment tasks from job posting to onboarding and help companies concentrate on their business growth. With their expertise and years of experience, they streamline the hiring process and save time and resources for the company.
Enterprise Excellence is Inclusive Excellence.pdfKaiNexus
Enterprise excellence and inclusive excellence are closely linked, and real-world challenges have shown that both are essential to the success of any organization. To achieve enterprise excellence, organizations must focus on improving their operations and processes while creating an inclusive environment that engages everyone. In this interactive session, the facilitator will highlight commonly established business practices and how they limit our ability to engage everyone every day. More importantly, though, participants will likely gain increased awareness of what we can do differently to maximize enterprise excellence through deliberate inclusion.
What is Enterprise Excellence?
Enterprise Excellence is a holistic approach that's aimed at achieving world-class performance across all aspects of the organization.
What might I learn?
A way to engage all in creating Inclusive Excellence. Lessons from the US military and their parallels to the story of Harry Potter. How belt systems and CI teams can destroy inclusive practices. How leadership language invites people to the party. There are three things leaders can do to engage everyone every day: maximizing psychological safety to create environments where folks learn, contribute, and challenge the status quo.
Who might benefit? Anyone and everyone leading folks from the shop floor to top floor.
Dr. William Harvey is a seasoned Operations Leader with extensive experience in chemical processing, manufacturing, and operations management. At Michelman, he currently oversees multiple sites, leading teams in strategic planning and coaching/practicing continuous improvement. William is set to start his eighth year of teaching at the University of Cincinnati where he teaches marketing, finance, and management. William holds various certifications in change management, quality, leadership, operational excellence, team building, and DiSC, among others.
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...Kumar Satyam
According to TechSci Research report, “India Orthopedic Devices Market -Industry Size, Share, Trends, Competition Forecast & Opportunities, 2030”, the India Orthopedic Devices Market stood at USD 1,280.54 Million in 2024 and is anticipated to grow with a CAGR of 7.84% in the forecast period, 2026-2030F. The India Orthopedic Devices Market is being driven by several factors. The most prominent ones include an increase in the elderly population, who are more prone to orthopedic conditions such as osteoporosis and arthritis. Moreover, the rise in sports injuries and road accidents are also contributing to the demand for orthopedic devices. Advances in technology and the introduction of innovative implants and prosthetics have further propelled the market growth. Additionally, government initiatives aimed at improving healthcare infrastructure and the increasing prevalence of lifestyle diseases have led to an upward trend in orthopedic surgeries, thereby fueling the market demand for these devices.
What is the TDS Return Filing Due Date for FY 2024-25.pdfseoforlegalpillers
It is crucial for the taxpayers to understand about the TDS Return Filing Due Date, so that they can fulfill your TDS obligations efficiently. Taxpayers can avoid penalties by sticking to the deadlines and by accurate filing of TDS. Timely filing of TDS will make sure about the availability of tax credits. You can also seek the professional guidance of experts like Legal Pillers for timely filing of the TDS Return.
As a business owner in Delaware, staying on top of your tax obligations is paramount, especially with the annual deadline for Delaware Franchise Tax looming on March 1. One such obligation is the annual Delaware Franchise Tax, which serves as a crucial requirement for maintaining your company’s legal standing within the state. While the prospect of handling tax matters may seem daunting, rest assured that the process can be straightforward with the right guidance. In this comprehensive guide, we’ll walk you through the steps of filing your Delaware Franchise Tax and provide insights to help you navigate the process effectively.
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...PaulBryant58
This article provides a comprehensive guide on how to
effectively manage the convert Accpac to QuickBooks , with a particular focus on utilizing online accounting services to streamline the process.
Putting the SPARK into Virtual Training.pptxCynthia Clay
This 60-minute webinar, sponsored by Adobe, was delivered for the Training Mag Network. It explored the five elements of SPARK: Storytelling, Purpose, Action, Relationships, and Kudos. Knowing how to tell a well-structured story is key to building long-term memory. Stating a clear purpose that doesn't take away from the discovery learning process is critical. Ensuring that people move from theory to practical application is imperative. Creating strong social learning is the key to commitment and engagement. Validating and affirming participants' comments is the way to create a positive learning environment.
Cracking the Workplace Discipline Code Main.pptxWorkforce Group
Cultivating and maintaining discipline within teams is a critical differentiator for successful organisations.
Forward-thinking leaders and business managers understand the impact that discipline has on organisational success. A disciplined workforce operates with clarity, focus, and a shared understanding of expectations, ultimately driving better results, optimising productivity, and facilitating seamless collaboration.
Although discipline is not a one-size-fits-all approach, it can help create a work environment that encourages personal growth and accountability rather than solely relying on punitive measures.
In this deck, you will learn the significance of workplace discipline for organisational success. You’ll also learn
• Four (4) workplace discipline methods you should consider
• The best and most practical approach to implementing workplace discipline.
• Three (3) key tips to maintain a disciplined workplace.
1. Case Study – Regulatory Rules Applying to Insider Trading
Project Group Activity-0011D
Course: BUS 5111: Financial Management
Instructor: Dr. Bhavesh Kumar Rathod
Presented By: Md. Azgor Ali, Sefanit Kiros Hagos, Stephanie Mari Owen, Zoe Tokaryk, Florence Zingwe
October 26, 2022
2. Roles
Objective- Sefanit Kiros Hagos
Insider Trading Defined- Sefanit Kiros Hagos
Legal implications- Stephanie Marie Owen
Ethical implication- Md. Azgor Ali
Economic-social implications and How to curb insider trading - Zoe Tokaryk
Conclusion - Florence Zingwe
References - Florence Zingwe
Organization, distribution of tasks, create Google Ppt and spreadsheet- Md. Azgor Ali
Editing and Formating - Sefanit Kiros Hagos
3. Objective
Address a case of insider trading in In view of regulatory rules focusing on:
Legal Implications
Ethical Implications
Economic – Social Implications & How to Curb Insider Trading
(Battar, 2017)
4. Insider Trading refers to trading of company’s securities by someone with significant access to
the company’s material and nonpublic information.
In US, Insider trading is regulated by Security Exchange Commission.
Legal Insider Trading
● Acquired information is disclosed &
transactions are registered with SEC
E.g: CEO buys shares from his company &
Information is disclosed to SEC
Illegal Insider Trading
Misuse of access to privileged information
to gain personal benefit.
Unfair manipulation of information to
benefit from it
E.g: CEO selling share ahead of news of
company’s bankruptcy
Insider Trading?
5. Legal Implications
According to the information presented by Ganti (2022), insider trading occurs when
someone uses knowledge not available to the public to make a stock purchase or sale
for personal gain.
In the case study presented, one learns there will be a corporate merger that will greatly
benefit stockholders. Using this knowledge to purchase additional stock would be an
instance of insider trading and be a direct violation of the federal regulations set forth
by the Securities and Exchange Commission.
Further, any employees of the two companies who have this knowledge, or their
families, associates, etc. that use this information to bolster their personal stock in
either company will be in direct violation as well.
The SEC states that those found guilty of insider trading can face time in prison up to 20
years and fines 25,000,000 depending on the level of violation (2013 insider trading
policy)
6. Ethical Implications
Stock marketplace is governed by a social contract between many buyers and investors on
the idea of fairness and ethical trading. Unethical practice:
Undermines investor confidence in the stock exchange market
Sets unfair competition ground between those with insider information and those
without
Results in a war of rights
Risk of misery, loss, adverse effect, harm, or psychological or other harm to any person
(player/researcher/bystander) or participant group
Privacy issues or problems ( publicity, identifiable statistics, statistics security troubles)
Conflict of interest
7. Socio and Economic Implications of Insider Trading and How to curb insider
trading
Insider trading reduces investor returns by negatively affecting market liquidity and raising transaction costs.
Additionally, because so many individuals have a stake in the financial markets—roughly half of American families
own stocks directly or indirectly—most Americans are harmed by this activity. Furthermore, Insider trading when
caught can also make the public believe the system is possibly rigged. The public is forced to pay extra for the
issuance of stocks due to insider trading. A bigger investment is unavoidable if investors learn that bonds are
being traded. Lastly, insider trading has the potential to undermine the confidence of the public.
How to Curb Insider Trading? Insight from (Five best practices to prevent insider trading, 2022)
1. Restrict risky trades- This is when restrictions are put on specific time frames when the earning reports come
out.
2. Appoint an in house “watchdog”- by mandating statements, and proper
3. Teach your staff about what insider trading is , the implications of insider trading, and how to report it
4. Conduct investigations legally if you believe insider trading is happening
5. Utilize technology in the workplace to ensure proper channels are being monitored.
8. Conclusion
Insider trading has Legal, Ethical, Socio- Economic implications.
SEC has rules in place that traders should conform their compliance.
SEC holds everyone accountable for insider and securities fraud
If a decision maker knows someone with privileged information about a future merger
between two companies and such information could benefit the decision maker unfairly,
the decision maker should
Never engage with the person with privileged information to gain access to information
that will influence the stock buying or selling decision. If such information is acquired, it is
illegal, and SEC considers it as fraud.
9. References
2013 insider trading policy. (n.d.). SEC. https://www.sec.gov/Archives/edgar/data/25743/000138713113000737
Battar S. (2017, April 7). Insider trading regulation in India [image]. Legal India. Retrieved October 15,2022, from Insider Trading
Regulation in India | Legal India | Legal Helpline - Law News, Articles & Legal Tips
Angel, J. J., & McCabe, D. M. (2018). Insider Trading 2.0? The Ethics of Information Sales. Journal of Business Ethics, 147(4), 747-760.
https://www.coursehero.com/u/file/39716590/Insider-Tradingppt/
Battar S. (2017, April 7). Insider trading regulation in India [image]. Legal India. Retrieved October 15,2022, from Insider Trading
Regulation in India | Legal India | Legal Helpline - Law News, Articles & Legal Tips
Cornell Law School. (n.d.). Insider trading. Legal Information Institute. Retrieved October 15, 2022, from
https://www.law.cornell.edu/wex/insider_trading
Ganti, A. (2022, March 7). What is insider trading, and when is it legal? Investopedia. Retrieved October 15, 2022, from
https://www.investopedia.com/terms/i/insidertrading.asp
Kenton, W. (2022, April 18). Insider information definition. Investopedia. Retrieved October 22, 2022, from
https://www.investopedia.com/terms/i/insiderinformation.asp
Law Teacher. (2021, August 31).Insider Trading and Business Ethics. Law Teacher. Retrieved from https://www.lawteacher.net/free-
law-essays/business-law/insider-trading-and-business-ethics-business-law-essay.php
Editor's Notes
This presentation aims to address a case of insider trading where, a decision maker knows someone with information about a future merger between two companies. The companies’ union will influence the industry market dynamics and stockowners will benefit once the news is announced to the public.
Reference
Battar S. (2017, April 7). Insider trading regulation in India [image]. Legal India. Retrieved October 15,2022, from Insider Trading Regulation in India | Legal India | Legal Helpline - Law News, Articles & Legal Tips
Insider trading is trading of company’s securities by someone with significant access to the company’s confidential and nonpublic information. To give fair ground for all traders, corporations are required to report trading made by their officers, directors, or others with access to privileged confidential non-public information, to the Security Exchange Commission- SEC (Cornell Law School, n.d.).
SEC is mandated to set fairground for everyone to trade on the stock exchange market. Insider trading is legal if it conforms to rules set forth by the SEC and it is reported in a timely manner (Ganti, 2022). For instance, directors must disclose their stake or transactions to SEC in time.
However, there are instances where traders abuse and manipulate their access to privileged information to work for their personal benefit, by either selling or buying their stock, ahead of the public, and without disclosing such to the SEC. This form of trading is illegal and will result in potential fines and, or jail time (Ganti, 2022). For example, an investor with a stock from a particular company gets non-public information from a friend associated with the company and learns that the company is facing bankruptcy, but this information is not disclosed to public. Based on this, the investor sells his stock and benefits from it. This will be considered illegal insider trading and both the investor, and the friend will face stern consequence.
SEC considers insider trading as fraud that is punishable by imprisonment, hefty fine or both (Kenton, 2022).
Reference
Cornell Law School. (n.d.). Insider trading. Legal Information Institute. Retrieved October 15, 2022, from https://www.law.cornell.edu/wex/insider_trading
Ganti, A. (2022, March 7). What is insider trading, and when is it legal? Investopedia. Retrieved October 15, 2022, from https://www.investopedia.com/terms/i/insidertrading.asp
Kenton, W. (2022, April 18). Insider information definition. Investopedia. Retrieved October 22, 2022, from https://www.investopedia.com/terms/i/insiderinformation.asp
According to the information presented by Ganti (2022), insider trading occurs when someone uses knowledge not available to the public to make a stock purchase or sale for personal gain.
Insider buying and selling have earned a dreadful call in the latest years because folks who interact in insider trading are thought to be absolute without ethical values (Lawteacher, 2021). However, now not all folks that interact in insider trading are unethical; research has shown that some insider buying and selling is beneficial to the investment society and organizations (Lawteacher, 2021). The real aspect is to detach those illegally harmed or aided using insider trading (Lawteacher, 2021).
Insider buying and selling on personal, other than its affiliation with fraud or violation of fiduciary responsibility, entails accomplishing financial investments primarily based on information others do not recognize approximately (Lawteacher, 2021). Such movements must be considered ethically immoral since they affect others unfairly. The reality that some people, or to mention, insiders, have facts that others don’t have, therefore, can be an awesome downside to the relaxation of the stakeholders because they cannot make use of this in all likelihood treasured statistics. If the other stakeholders knew this data, they'll have probable acted differently and loved the identical advantage as the insiders (Lawteacher, 2021). Moreover, while someone knows private statistics about a company, they tend to become greedy and choose to maintain the records to themselves and throw caution into the wind, which may cause overlook sensibility and rationality which is, after all the first of the cardinal virtues, and moral cost.
Reference:
Angel, J. J., & McCabe, D. M. (2018). Insider Trading 2.0? The Ethics of Information Sales. Journal of Business Ethics, 147(4), 747-760. https://www.coursehero.com/u/file/39716590/Insider-Tradingppt/
LawTeacher. (2021 August 31), Insider Trading and Business Ethics. LawTeacher. Retrieved from
https://www.lawteacher.net/free-law-essays/business-law/insider-trading-and-business-ethics-business-law-essay.php
According to Akhilesh Ganti “insider trading is the buying or selling of a publicly traded company's stock by someone who has non-public, material information about that stock” (Ganti, 2022). Insider trading can be performed by anyone and not just the employees of a company, whoever is involved in the communication chain of the non-public material information can be implicated. Insider trading is only legal when company insiders report their trades to SEC in a timely manner (Ganti, 2022).A good example of insider trading is suppose someone learns about nonpublic material information from a family member at a family function while making small talk and then goes ahead and shares it with a friend innocently while catching up, if the friend uses this insider information to profit in the stock market, then all three of the people involved could be prosecuted (Ganti, 2022). Insider trading is not fair to everyone else who is not in the know of the non-public information used by others to make the trades. There are several socio economic implications as well as ethical implications to insider trading. The SEC has rules in place that traders should conform to in order to be in compliance. Some of these rules include company insiders reporting their trades in a timely manner as well as the implementation of the Securities Exchange Act 1934. This act has three different forms in which directors and majority shareholders must disclose their transactions, ownership and transfer of shares. The SEC holds everyone accountable for insider and securities fraud. A good example is Martha Stewart a prominent director and celebrity who faced the legal implications and penalties for insider trading. It is everyone’s duty to minimize insider trading by reporting any cases they may know of.