The document outlines the CFA Institute Code of Ethics, which establishes standards for professional conduct for CFA charterholders and candidates. It covers 7 major topics: Professionalism, Integrity of Capital Markets, Duties to Clients, Duties to Employers, Investment Analysis and Recommendations, Conflicts of Interest, and Charterholder/Candidate Responsibilities. Some key aspects include requiring loyalty to clients, independence and objectivity, fair treatment of clients, avoidance of conflicts of interest, and disclosure of any potential conflicts.
CompTIA Security+ is a worldwide certification that verifies the fundamental skills required to execute basic security activities and build a career in information security. CompTIA Security+ SY0-601 is the latest version of the Security+ certification. The very first security certification that IT professionals can obtain is CompTIA Security+, and it is the best entry-level certification.
https://www.infosectrain.com/blog/comptia-security-sy0-601-domain-1-attacks-threats-and-vulnerabilities/
Data Governance and the Internet of ThingsDATAVERSITY
Several years back there were already more devices connected to the internet than people. It is estimated that more than 20 billion devices will be connected by 2020 and that number will never fall. Connecting to the internet implies the transfer of data. The numbers of devices and what they transfer imply a lot of data. Who is governing all of this data?
Join Bob Seiner for this month’s installment of Real-World Data Governance to expand your appreciation of the data issues that pertain to the Internet of Things (IoT). You may be surprised how much of what you already know about data governance applies to governing this new definition, production and use of data.
In this webinar Bob will talk about:
•Clear Description of IoT Focused on the data
•Addressing Data Management Concerns
•Applications of IoT Data
•Dimensions of IoT Data Processes and Quality
•Risk Associated with Interoperability
The latest version of Security+ SY0-601 have 5 Domains:
Domain 1.0: Attacks, Threats, and Vulnerabilities (24%)
Domain 2.0: Architecture and Design (21%)
Domain 3.0: Implementation (25%)
Domain 4.0: Operations and Incident Response (16%)
https://www.infosectrain.com/blog/comptia-security-sy0-601-domain-2-architecture-and-design/
Ethical hacking is the art of legally exploiting the security weaknesses to steal confidential/personal information from an individual or organization’s network.
CompTIA Security+ is a worldwide certification that verifies the fundamental skills required to execute basic security activities and build a career in information security. CompTIA Security+ SY0-601 is the latest version of the Security+ certification. The very first security certification that IT professionals can obtain is CompTIA Security+, and it is the best entry-level certification.
https://www.infosectrain.com/blog/comptia-security-sy0-601-domain-1-attacks-threats-and-vulnerabilities/
Data Governance and the Internet of ThingsDATAVERSITY
Several years back there were already more devices connected to the internet than people. It is estimated that more than 20 billion devices will be connected by 2020 and that number will never fall. Connecting to the internet implies the transfer of data. The numbers of devices and what they transfer imply a lot of data. Who is governing all of this data?
Join Bob Seiner for this month’s installment of Real-World Data Governance to expand your appreciation of the data issues that pertain to the Internet of Things (IoT). You may be surprised how much of what you already know about data governance applies to governing this new definition, production and use of data.
In this webinar Bob will talk about:
•Clear Description of IoT Focused on the data
•Addressing Data Management Concerns
•Applications of IoT Data
•Dimensions of IoT Data Processes and Quality
•Risk Associated with Interoperability
The latest version of Security+ SY0-601 have 5 Domains:
Domain 1.0: Attacks, Threats, and Vulnerabilities (24%)
Domain 2.0: Architecture and Design (21%)
Domain 3.0: Implementation (25%)
Domain 4.0: Operations and Incident Response (16%)
https://www.infosectrain.com/blog/comptia-security-sy0-601-domain-2-architecture-and-design/
Ethical hacking is the art of legally exploiting the security weaknesses to steal confidential/personal information from an individual or organization’s network.
details of tools and methods used in cyber crime & how to protect your system from crimes...
detail study of password cracking, Denial of service, DDoS, steganography, keylogger, proxy server, phishing etc..
You've seen the headlines. You're beginning to understand the importance of cybersecurity. Where do you begin? It's important to understand the common methods of attack and ways you can begin to protect your organization today. For more information on our cybersecurity education please visit FPOV.com/edu.
-The project "Strengthening European Network Centres of Excellence in Cybercrime" (SENTER
project, Reference No HOME/2014/ISFP/AG/7170) is funded by the European Commission under
Internal Security Fund-Police 2014-2020 (ISFP). The main goal of the project is to create a single
point of Reference for EU national Cybercrime Centres of Excellence (CoE) and develop further the
Network of national CoE into well-defined and well-functioning community. More details here: http://www.senter-project.eu/
Vulnerability assessment & Penetration testing Basics Mohammed Adam
In these days of widespread Internet usage, security is of prime importance. The almost universal use of mobile and Web applications makes systems vulnerable to cyber attacks. Vulnerability assessment can help identify the loopholes in a system while penetration testing is a proof-of-concept approach to actually explore and exploit a vulnerability.
This presentation describes penetration testing with a Who, What, Where, When, and How approach. In the presentation, you may discover the common pitfalls of a bad penetration test and you could identify a better one. You should be able to recognize and differentiate both looking at the methods (attitude) and result.
Presentation by Soumya Mondal, on "Information Security: Importance of having definded policy & process" at "Braindigit 9th National ICT Conference 2013" organized by Information Technology Society, Nepal at Alpha House, Kathmandu, Nepal on 26th January, 2013
The Google Hacking Database: A Key Resource to Exposing VulnerabilitiesTechWell
We all know the power of Google—or do we? Two types of people use Google: normal users like you and me, and the not-so-normal users—the hackers. What types of information can hackers collect from Google? How severe is the damage they can cause? Is there a way to circumvent this hacking? As a security tester, Kiran Karnad uses the GHDB (Google Hacking Database) to ensure their product will not be the next target for hackers. Kiran describes how to effectively use Google the way hackers do, using advanced operators, locating exploits and finding targets, network mapping, finding user names and passwords, and other secret stuff. Kiran provides a recipe of five simple security searches that work. Learn how to automate the Google Hacking Database using Python so security tests can be incorporated as a part of the SDLC for the next product you develop.
This Edureka PPT on "Application Security" will help you understand what application security is and measures taken to improve the security of an application often by finding, fixing and preventing security vulnerabilities.
Following are the topics covered in this PPT:
Introduction to Cybersecurity
What is Application Security?
What is an SQL Injection attack
Demo on SQL Injection
Follow us to never miss an update in the future.
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
I'm Andrea D'Ubaldo, I am a software developer and cyber security enthusiast. The purpose of this presentation is to warn people about google "hacking".
I don't pretend to teach, I only love sharing knowledge. Hope you enjoy ! Comments and remarks are welcome.
------------------------------------------------
Summary
- What is Google dorks
- Queries syntax
- Queries examples
- Conclusion
Google Dork Definition
"A Google dork is an employee who unknowingly exposes sensitive corporate information on the Internet. The word dork is slang for a slow-witted or in-ept person."
Margaret Rouse
Director, WhatIs.com at TechTarget
@WhatIsDotCom
What is
Google dorks is a powerful advanced search, an instrument to perform queries on Google search engine.
How it works
That queries allows the user to find detailed information over the internet, such files, hidden pages, sensitive documents and so on.
Why use
But...dork queries are considered by many an “hacking technique”. Because of his nature, the dorks can be used for different purposes, often bad purpose and we shall then see...
Queries syntax
a) inurl
Find that word or sentences in the URL
inurl: php?id=
b) related
Find that related websites
related:www.google.com
c) filetype
research by file type
filetype:pdf shakespeare
d) site
Restrict to a specific site
site:fakesite.com
e) intitle
Find that word or sentences in the title of a website
intitle: search
...Other syntax characters and operators.
Examples :
- Search files containing username and password
- Discover vulnerable server, affected by SQL Injection
- Pages containing login portal
- Sensitive directory
Credits and References
What is Google dork? – Margaret Rouse
What is Google dork? - WhatIs.com - TechTarget
whatis.techtarget.com
Conclusion
Be careful and protect your data!
Google hacking
https://en.wikipedia.org/wiki/Google_hacking
Wikipedia.
Google Hacking Database (GHDB)
https://www.exploit-db.com/google-hacking-database/
Exploit Database
Special thanks to all the people who made and released these awesome resources for free:
Presentation template by SlidesCarnival (http://www.slidescarnival.com/)
Photographs by Unsplash (http://unsplash.com/)
Application Security - Your Success Depends on itWSO2
Traditional information security mainly revolves around network and operating system (OS) level protection. Regardless of the level of security guarding those aspects, the system can be penetrated and the entire deployment can be brought down if your application's security isn't taken into serious consideration. Information security should ideally start at the application level, before network and OS level security is ensured. To achieve this, security needs to be integrated into the application at the software development phase.
In this session, Dulanja will discuss the following:
The importance of application security - why network and OS security is insufficient.
Challenges in securing your application.
Making security part of the development lifecycle.
details of tools and methods used in cyber crime & how to protect your system from crimes...
detail study of password cracking, Denial of service, DDoS, steganography, keylogger, proxy server, phishing etc..
You've seen the headlines. You're beginning to understand the importance of cybersecurity. Where do you begin? It's important to understand the common methods of attack and ways you can begin to protect your organization today. For more information on our cybersecurity education please visit FPOV.com/edu.
-The project "Strengthening European Network Centres of Excellence in Cybercrime" (SENTER
project, Reference No HOME/2014/ISFP/AG/7170) is funded by the European Commission under
Internal Security Fund-Police 2014-2020 (ISFP). The main goal of the project is to create a single
point of Reference for EU national Cybercrime Centres of Excellence (CoE) and develop further the
Network of national CoE into well-defined and well-functioning community. More details here: http://www.senter-project.eu/
Vulnerability assessment & Penetration testing Basics Mohammed Adam
In these days of widespread Internet usage, security is of prime importance. The almost universal use of mobile and Web applications makes systems vulnerable to cyber attacks. Vulnerability assessment can help identify the loopholes in a system while penetration testing is a proof-of-concept approach to actually explore and exploit a vulnerability.
This presentation describes penetration testing with a Who, What, Where, When, and How approach. In the presentation, you may discover the common pitfalls of a bad penetration test and you could identify a better one. You should be able to recognize and differentiate both looking at the methods (attitude) and result.
Presentation by Soumya Mondal, on "Information Security: Importance of having definded policy & process" at "Braindigit 9th National ICT Conference 2013" organized by Information Technology Society, Nepal at Alpha House, Kathmandu, Nepal on 26th January, 2013
The Google Hacking Database: A Key Resource to Exposing VulnerabilitiesTechWell
We all know the power of Google—or do we? Two types of people use Google: normal users like you and me, and the not-so-normal users—the hackers. What types of information can hackers collect from Google? How severe is the damage they can cause? Is there a way to circumvent this hacking? As a security tester, Kiran Karnad uses the GHDB (Google Hacking Database) to ensure their product will not be the next target for hackers. Kiran describes how to effectively use Google the way hackers do, using advanced operators, locating exploits and finding targets, network mapping, finding user names and passwords, and other secret stuff. Kiran provides a recipe of five simple security searches that work. Learn how to automate the Google Hacking Database using Python so security tests can be incorporated as a part of the SDLC for the next product you develop.
This Edureka PPT on "Application Security" will help you understand what application security is and measures taken to improve the security of an application often by finding, fixing and preventing security vulnerabilities.
Following are the topics covered in this PPT:
Introduction to Cybersecurity
What is Application Security?
What is an SQL Injection attack
Demo on SQL Injection
Follow us to never miss an update in the future.
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
I'm Andrea D'Ubaldo, I am a software developer and cyber security enthusiast. The purpose of this presentation is to warn people about google "hacking".
I don't pretend to teach, I only love sharing knowledge. Hope you enjoy ! Comments and remarks are welcome.
------------------------------------------------
Summary
- What is Google dorks
- Queries syntax
- Queries examples
- Conclusion
Google Dork Definition
"A Google dork is an employee who unknowingly exposes sensitive corporate information on the Internet. The word dork is slang for a slow-witted or in-ept person."
Margaret Rouse
Director, WhatIs.com at TechTarget
@WhatIsDotCom
What is
Google dorks is a powerful advanced search, an instrument to perform queries on Google search engine.
How it works
That queries allows the user to find detailed information over the internet, such files, hidden pages, sensitive documents and so on.
Why use
But...dork queries are considered by many an “hacking technique”. Because of his nature, the dorks can be used for different purposes, often bad purpose and we shall then see...
Queries syntax
a) inurl
Find that word or sentences in the URL
inurl: php?id=
b) related
Find that related websites
related:www.google.com
c) filetype
research by file type
filetype:pdf shakespeare
d) site
Restrict to a specific site
site:fakesite.com
e) intitle
Find that word or sentences in the title of a website
intitle: search
...Other syntax characters and operators.
Examples :
- Search files containing username and password
- Discover vulnerable server, affected by SQL Injection
- Pages containing login portal
- Sensitive directory
Credits and References
What is Google dork? – Margaret Rouse
What is Google dork? - WhatIs.com - TechTarget
whatis.techtarget.com
Conclusion
Be careful and protect your data!
Google hacking
https://en.wikipedia.org/wiki/Google_hacking
Wikipedia.
Google Hacking Database (GHDB)
https://www.exploit-db.com/google-hacking-database/
Exploit Database
Special thanks to all the people who made and released these awesome resources for free:
Presentation template by SlidesCarnival (http://www.slidescarnival.com/)
Photographs by Unsplash (http://unsplash.com/)
Application Security - Your Success Depends on itWSO2
Traditional information security mainly revolves around network and operating system (OS) level protection. Regardless of the level of security guarding those aspects, the system can be penetrated and the entire deployment can be brought down if your application's security isn't taken into serious consideration. Information security should ideally start at the application level, before network and OS level security is ensured. To achieve this, security needs to be integrated into the application at the software development phase.
In this session, Dulanja will discuss the following:
The importance of application security - why network and OS security is insufficient.
Challenges in securing your application.
Making security part of the development lifecycle.
The standard 3 of the CFA (Certified Financial Analyst) is described in the following order
(Duties to Clients)
1. Standard iii (A)
2. Standard iii (B)
3. Standard iii (C)
4. Standard iii (D)
5. Standard iii (E)
All the topics are described based on the key points on the standard and then after each of the standards, the way to follow for compliance is also described.
Lastly, relevant examples are given under each section to make the readings more clear and understandable.
Starting an IPO journey involves careful steps. From financial readiness to SEC filings, every stage demands thorough consideration. Selecting reliable advisors, conducting due diligence, and strategic pricing are key factors. Post-IPO, maintaining compliance, clear communication, and investor relations are crucial. If you're eager to understand these difficulties, consider Stock Market Classes. Delhi Trading Academy provides the best online and offline Stock Market and Trading Classes, offering insights to navigate the IPO landscape successfully. Enroll with Delhi Trading Academy for a comprehensive understanding of financial markets.
Join CMT program become a professional Technical Analyst, CMT USA Best COACHING CLASSES. CMT Institute Live Classes by Expert Faculty. Exams are available in India. Best Career in Financial Market.
www.ptajaipur.com/chartered-market-technician-cmt-course-india.html
Legal Issues In Business Sales: The Pilgrim's Purchasewww.growthlaw.com
This talk outlines the issues, documents, due diligence, characters, and problems to consider in the course of looking for and negotiating a business purchase.
Auditing A Practical Approach 1st Edition Moroney Test BankRooneyStokess
Full download : http://alibabadownload.com/product/auditing-a-practical-approach-1st-edition-moroney-test-bank/ Auditing A Practical Approach 1st Edition Moroney Test Bank
If you are looking for a pi coin investor. Then look no further because I have the right one he is a pi vendor (he buy and resell to whales in China). I met him on a crypto conference and ever since I and my friends have sold more than 10k pi coins to him And he bought all and still want more. I will drop his telegram handle below just send him a message.
@Pi_vendor_247
what is the future of Pi Network currency.DOT TECH
The future of the Pi cryptocurrency is uncertain, and its success will depend on several factors. Pi is a relatively new cryptocurrency that aims to be user-friendly and accessible to a wide audience. Here are a few key considerations for its future:
Message: @Pi_vendor_247 on telegram if u want to sell PI COINS.
1. Mainnet Launch: As of my last knowledge update in January 2022, Pi was still in the testnet phase. Its success will depend on a successful transition to a mainnet, where actual transactions can take place.
2. User Adoption: Pi's success will be closely tied to user adoption. The more users who join the network and actively participate, the stronger the ecosystem can become.
3. Utility and Use Cases: For a cryptocurrency to thrive, it must offer utility and practical use cases. The Pi team has talked about various applications, including peer-to-peer transactions, smart contracts, and more. The development and implementation of these features will be essential.
4. Regulatory Environment: The regulatory environment for cryptocurrencies is evolving globally. How Pi navigates and complies with regulations in various jurisdictions will significantly impact its future.
5. Technology Development: The Pi network must continue to develop and improve its technology, security, and scalability to compete with established cryptocurrencies.
6. Community Engagement: The Pi community plays a critical role in its future. Engaged users can help build trust and grow the network.
7. Monetization and Sustainability: The Pi team's monetization strategy, such as fees, partnerships, or other revenue sources, will affect its long-term sustainability.
It's essential to approach Pi or any new cryptocurrency with caution and conduct due diligence. Cryptocurrency investments involve risks, and potential rewards can be uncertain. The success and future of Pi will depend on the collective efforts of its team, community, and the broader cryptocurrency market dynamics. It's advisable to stay updated on Pi's development and follow any updates from the official Pi Network website or announcements from the team.
how to sell pi coins on Bitmart crypto exchangeDOT TECH
Yes. Pi network coins can be exchanged but not on bitmart exchange. Because pi network is still in the enclosed mainnet. The only way pioneers are able to trade pi coins is by reselling the pi coins to pi verified merchants.
A verified merchant is someone who buys pi network coins and resell it to exchanges looking forward to hold till mainnet launch.
I will leave the telegram contact of my personal pi merchant to trade with.
@Pi_vendor_247
where can I find a legit pi merchant onlineDOT TECH
Yes. This is very easy what you need is a recommendation from someone who has successfully traded pi coins before with a merchant.
Who is a pi merchant?
A pi merchant is someone who buys pi network coins and resell them to Investors looking forward to hold thousands of pi coins before the open mainnet.
I will leave the telegram contact of my personal pi merchant to trade with
@Pi_vendor_247
US Economic Outlook - Being Decided - M Capital Group August 2021.pdfpchutichetpong
The U.S. economy is continuing its impressive recovery from the COVID-19 pandemic and not slowing down despite re-occurring bumps. The U.S. savings rate reached its highest ever recorded level at 34% in April 2020 and Americans seem ready to spend. The sectors that had been hurt the most by the pandemic specifically reduced consumer spending, like retail, leisure, hospitality, and travel, are now experiencing massive growth in revenue and job openings.
Could this growth lead to a “Roaring Twenties”? As quickly as the U.S. economy contracted, experiencing a 9.1% drop in economic output relative to the business cycle in Q2 2020, the largest in recorded history, it has rebounded beyond expectations. This surprising growth seems to be fueled by the U.S. government’s aggressive fiscal and monetary policies, and an increase in consumer spending as mobility restrictions are lifted. Unemployment rates between June 2020 and June 2021 decreased by 5.2%, while the demand for labor is increasing, coupled with increasing wages to incentivize Americans to rejoin the labor force. Schools and businesses are expected to fully reopen soon. In parallel, vaccination rates across the country and the world continue to rise, with full vaccination rates of 50% and 14.8% respectively.
However, it is not completely smooth sailing from here. According to M Capital Group, the main risks that threaten the continued growth of the U.S. economy are inflation, unsettled trade relations, and another wave of Covid-19 mutations that could shut down the world again. Have we learned from the past year of COVID-19 and adapted our economy accordingly?
“In order for the U.S. economy to continue growing, whether there is another wave or not, the U.S. needs to focus on diversifying supply chains, supporting business investment, and maintaining consumer spending,” says Grace Feeley, a research analyst at M Capital Group.
While the economic indicators are positive, the risks are coming closer to manifesting and threatening such growth. The new variants spreading throughout the world, Delta, Lambda, and Gamma, are vaccine-resistant and muddy the predictions made about the economy and health of the country. These variants bring back the feeling of uncertainty that has wreaked havoc not only on the stock market but the mindset of people around the world. MCG provides unique insight on how to mitigate these risks to possibly ensure a bright economic future.
The Evolution of Non-Banking Financial Companies (NBFCs) in India: Challenges...beulahfernandes8
Role in Financial System
NBFCs are critical in bridging the financial inclusion gap.
They provide specialized financial services that cater to segments often neglected by traditional banks.
Economic Impact
NBFCs contribute significantly to India's GDP.
They support sectors like micro, small, and medium enterprises (MSMEs), housing finance, and personal loans.
how to sell pi coins in South Korea profitably.DOT TECH
Yes. You can sell your pi network coins in South Korea or any other country, by finding a verified pi merchant
What is a verified pi merchant?
Since pi network is not launched yet on any exchange, the only way you can sell pi coins is by selling to a verified pi merchant, and this is because pi network is not launched yet on any exchange and no pre-sale or ico offerings Is done on pi.
Since there is no pre-sale, the only way exchanges can get pi is by buying from miners. So a pi merchant facilitates these transactions by acting as a bridge for both transactions.
How can i find a pi vendor/merchant?
Well for those who haven't traded with a pi merchant or who don't already have one. I will leave the telegram id of my personal pi merchant who i trade pi with.
Tele gram: @Pi_vendor_247
#pi #sell #nigeria #pinetwork #picoins #sellpi #Nigerian #tradepi #pinetworkcoins #sellmypi
The European Unemployment Puzzle: implications from population agingGRAPE
We study the link between the evolving age structure of the working population and unemployment. We build a large new Keynesian OLG model with a realistic age structure, labor market frictions, sticky prices, and aggregate shocks. Once calibrated to the European economy, we quantify the extent to which demographic changes over the last three decades have contributed to the decline of the unemployment rate. Our findings yield important implications for the future evolution of unemployment given the anticipated further aging of the working population in Europe. We also quantify the implications for optimal monetary policy: lowering inflation volatility becomes less costly in terms of GDP and unemployment volatility, which hints that optimal monetary policy may be more hawkish in an aging society. Finally, our results also propose a partial reversal of the European-US unemployment puzzle due to the fact that the share of young workers is expected to remain robust in the US.
The secret way to sell pi coins effortlessly.DOT TECH
Well as we all know pi isn't launched yet. But you can still sell your pi coins effortlessly because some whales in China are interested in holding massive pi coins. And they are willing to pay good money for it. If you are interested in selling I will leave a contact for you. Just telegram this number below. I sold about 3000 pi coins to him and he paid me immediately.
Telegram: @Pi_vendor_247
how to sell pi coins in all Africa Countries.DOT TECH
Yes. You can sell your pi network for other cryptocurrencies like Bitcoin, usdt , Ethereum and other currencies And this is done easily with the help from a pi merchant.
What is a pi merchant ?
Since pi is not launched yet in any exchange. The only way you can sell right now is through merchants.
A verified Pi merchant is someone who buys pi network coins from miners and resell them to investors looking forward to hold massive quantities of pi coins before mainnet launch in 2026.
I will leave the telegram contact of my personal pi merchant to trade with.
@Pi_vendor_247
when will pi network coin be available on crypto exchange.DOT TECH
There is no set date for when Pi coins will enter the market.
However, the developers are working hard to get them released as soon as possible.
Once they are available, users will be able to exchange other cryptocurrencies for Pi coins on designated exchanges.
But for now the only way to sell your pi coins is through verified pi vendor.
Here is the telegram contact of my personal pi vendor
@Pi_vendor_247
2. CFA Code of Ethics
I: Professionalism
II: Integrity of Capital Markets
III: Duties to Clients
IV: Duties to Employers
V: Investment Analysis, Recommendations, Actions
VI: Conflicts of Interest
VII: Charterholder / Candidate Responsibilities
2
4. I: Professionalism
I.A.: Knowledge of the Law
• Understand AND COMPLY with all applicable
laws
• Includes licensing agencies, professional
associations, etc.
• Includes CFA Code
• May not KNOWINGLY participate in violations
• Reasonable grounds to believe = knowing
• Based on peer opinions
4
5. I: Professionalism
I.A.: Knowledge of the Law
• Intermediate steps to attempt to stop
– Notify employer
– Confront the person directly
– Gov’t reporting not req’d by code but may be by law
• Must dissociate from violator/violations
– Remove name
• NOT required to be a legal or compliance expert
5
7. I: Professionalism
I.B.: Independence and Objectivity
• Consideration – is the consideration reasonably expected
to compromise?
• Cause or be PERCEIVED to cause
• Gift from client? disclose to employer
• Distinguish facts from opinions
• Use firewalls in firms with conflicted depts
7
9. I: Professionalism
I.C.: Misrepresentation
• Related to investment analysis, recommendations,
actions
– Or other professional activities
• Can be a misleading statement or omission of fact
• Includes qualifications, firm’s services, performance
record
• You cannot guarantee returns
• Cannot plagiarize, must cite sources
• Authorization req’d to use spreadsheets, algorithms
9
11. I: Professionalism
I.D.: Misconduct
• Dishonesty, fraud, deceit
• Act that reflects adversely on professional
reputation, integrity, competence
• Bankruptcy is acceptable unless fraudulent or
deceitful
• Examples
– Abusing alcohol during business hours
– Abusing the CFA Institute for vengeance to settle a
personal score
11
12. CFA Code of Ethics
I: Professionalism
I.A.: Knowledge of the Law
I.B.: Independence and Objectivity
I.C.: Misrepresentation
I.D.: Misconduct
II: Integrity of Capital Markets
III: Duties to Clients
IV: Duties to Employers
V: Investment Analysis, Recommendations, Actions
VI: Conflicts of Interest
VII: Charterholder / Candidate Responsibilities
12
13. CFA Code of Ethics
I: Professionalism
II: Integrity of Capital Markets
III: Duties to Clients
IV: Duties to Employers
V: Investment Analysis, Recommendations, Actions
VI: Conflicts of Interest
VII: Charterholder / Candidate Responsibilities
13
14. II: Integrity of Capital Markets
II.A. Material Non-Public Information
II.B. Market Manipulation
14
15. II: Integrity of Capital Markets
II.A. Material Non-Public Information
• Do not act on it
• Material if a reasonable investor would want to
know it
• Reliability of the source affects materiality
• Beware of selectively disclosed info
• Can construct a mosaic
• Encourage disclosure
• Use firewalls when necessary
15
16. II: Integrity of Capital Markets
II.A. Material Non-Public Information
II.B. Market Manipulation
16
17. II: Integrity of Capital Markets
II.B. Market Manipulation
• No practice that manipulates price or
volume with the intent to mislead
• Could be through transactions or spreading
rumours
• Includes cornering a market
• Can pursue legitimate trading strategies
that exploit market power, information, other
inefficiencies
17
18. CFA Code of Ethics
I: Professionalism
II: Integrity of Capital Markets
II.A. Material Non-Public Information
II.B. Market Manipulation
III: Duties to Clients
IV: Duties to Employers
V: Investment Analysis, Recommendations, Actions
VI: Conflicts of Interest
VII: Charterholder / Candidate Responsibilities
18
19. CFA Code of Ethics
I: Professionalism
II: Integrity of Capital Markets
III: Duties to Clients
IV: Duties to Employers
V: Investment Analysis, Recommendations, Actions
VI: Conflicts of Interest
VII: Charterholder / Candidate Responsibilities
19
20. III: Duties to Clients
III.A.: Loyalty, Prudence, and Care
III.B.: Fair Dealing
III.C.: Suitability
III.D.: Performance Presentation
III.E.: Confidentiality
20
21. III: Duties to Clients
III.A.: Loyalty, Prudence, and Care
• Client interests before employer or self
• Prudence=discretion, caution, care, skill
• Comply with legally imposed fiduciary
responsibility
• Determine identity of client
• Avoid real and potential conflicts of interest
21
22. III: Duties to Clients
III.A.: Loyalty, Prudence, and Care
• Ensure client objectives are realistic &
suitable
• Judge investments in portfolio context
– Prudent expert not prudent man rule
• Informed responsible proxy voting
• Direct the brokerage for client’s best
interest
22
23. III: Duties to Clients
III.A.: Loyalty, Prudence, and Care
• Disclose actual and potential conflicts
• Disclose all forms of compensation
• Keep client info confidential
• Seek best execution(CI)
• Use soft dollars for things that benefit
clients
23
24. III: Duties to Clients
III.A.: Loyalty, Prudence, and Care
III.B.: Fair Dealing
III.C.: Suitability
III.D.: Performance Presentation
III.E.: Confidentiality
24
25. III: Duties to Clients
III.B.: Fair Dealing
• No favouritism
• Fairly does not mean equally
– Client needs vary
– Service levels vary
• Varying service levels should not
disadvantage clients
• All service levels available to all
25
26. III: Duties to Clients
III.B.: Fair Dealing
• Investment recommendations
– Give clients a fair opportunity to act
– Have a system to prevent selective
discriminatory disclosure
– If client order is contrary to current firm
recommendation – notify them
26
27. III: Duties to Clients
III.B.: Fair Dealing
• Investment actions
– Prorate allocation of oversubscribed issues
– No personal participation till client purchases
satisfied
– Have & disclose written allocation procedures
27
28. III: Duties to Clients
III.A.: Loyalty, Prudence, and Care
III.B.: Fair Dealing
III.C.: Suitability
III.D.: Performance Presentation
III.E.: Confidentiality
28
29. III: Duties to Clients
III.C.: Suitability
For Individual Accounts:
• Reasonable check of client experience, risk &
return objectives, financial constraints
• Update client profile regularly, at least annually
• Ensure investments match profile
• Judge suitability in context of total portfolio
• Directed trades: notify client of any suitability
concerns
29
30. III: Duties to Clients
III.C.: Suitability
For Individual Accounts:
• Suitability requires an IPS that incorporates:
– Risk tolerance, Return requirements
– Time horizon, Liquidity needs
– Tax concerns, Legal and regulatory issues
– Unique issues
– Roles, Review schedule(Updated the IPS in a
timely bases)
• Not responsible for info withheld by client 30
31. • For pools
• -respect stated strategy and
style(mandate)
• - respect pool constrains
31
32. III: Duties to Clients
III.A.: Loyalty, Prudence, and Care
III.B.: Fair Dealing
III.C.: Suitability
III.D.: Performance Presentation
III.E.: Confidentiality
32
33. III: Duties to Clients
III.D.: Performance Presentation
• Fair, accurate, complete
• GIPS encouraged but not req’d
• Tailored to audience knowledge,
sophistication
• Use composites, not sample accounts
• Include terminated accounts -“survivor bias”
• Maintain data files to back up performance
33
34. III: Duties to Clients
III.A.: Loyalty, Prudence, and Care
III.B.: Fair Dealing
III.C.: Suitability
III.D.: Performance Presentation
III.E.: Confidentiality
34
35. III: Duties to Clients
III.E.: preservation of Confidentiality
• For current, former, prospective clients
unless:
– Req’d by law
– Permitted by client or prospect
– For CFA Professional Conduct Program
investigation
35
36. CFA Code of Ethics
I: Professionalism
II: Integrity of Capital Markets
III: Duties to Clients
III.A.: Loyalty, Prudence, and Care
III.B.: Fair Dealing
III.C.: Suitability
III.D.: Performance Presentation
III.E.: Confidentiality
IV: Duties to Employers
V: Investment Analysis, Recommendations, Actions
VI: Conflicts of Interest
VII: Charterholder / Candidate Responsibilities
36
37. CFA Code of Ethics
I: Professionalism
II: Integrity of Capital Markets
III: Duties to Clients
IV: Duties to Employers
V: Investment Analysis, Recommendations, Actions
VI: Conflicts of Interest
VII: Charterholder / Candidate Responsibilities
37
38. IV: Duties to Employers
IV.A.: Loyalty
IV.B.: Additional Compensation
IV.C.: Responsibility of Supervisors
38
39. IV: Duties to Employers
IV.A.: Loyalty
1.Don’t deprive employer of your skills, abilities
2.Don’t divulge confidential information
3.Don’t cause harm to employer
4.Need NOT put employer above family/ personal
responsibilities
1. Should dialogue with employer on conflict
2. Assumes employer will honour its duty to employee
5.Market and client obligations outrank employers
1. Can copy employer records if intent is clearly to
protect clients or market integrity
39
40. IV: Duties to Employers
IV.A.: Loyalty
Independent Practice
• Abstain from competing with employer
• Notify employer of types of service, duration,
compensation
• Don’t render independent service till employer consents
• Excludes preparing for independent practice
• No stealing or misusing company information
• No client solicitation before leaving
• Once you leave, skills/ experience developed at the firm
are no longer confidential
• Knowledge of client names is not confidential
40
41. IV: Duties to Employers
IV.A.: Loyalty
Are you an employee?
• Dictated by degree of employer control
– Control of hours worked, location
– Provision of facilities, (equipment, place)
– Reimbursement of expenses
– Number of other clients you have
– Offering your services to others
– Independent contractor relationship governed to written
and oral agreement
41
42. IV: Duties to Employers
IV.A.: Loyalty
IV.B.: Additional Compensation
IV.C.: Responsibility of Supervisors
42
43. IV: Duties to Employers
IV.B.: Additional Compensation
• Nothing that creates a conflict of interest
with employer
• Unless written consent from all parties
43
44. IV: Duties to Employers
IV.A.: Loyalty
IV.B.: Additional Compensation
IV.C.: Responsibility of Supervisors
44
45. IV: Duties to Employers
IV.C.: Responsibility of Supervisors
• Reasonable effort to detect/ prevent violators
• Even if employee is not a CFA charterholder
• Delegating supervision doesn’t relieve you of duty
• E.g. implement and review adherence to written
compliance procedures
• Promptly respond to known violation
45
46. CFA Code of Ethics
I: Professionalism
II: Integrity of Capital Markets
III: Duties to Clients
IV: Duties to Employers
IV.A.: Loyalty
IV.B.: Additional Compensation
IV.C.: Responsibility of Supervisors
V: Investment Analysis, Recommendations, Actions
VI: Conflicts of Interest
VII: Charterholder / Candidate Responsibilities
46
47. CFA Code of Ethics
I: Professionalism
II: Integrity of Capital Markets
III: Duties to Clients
IV: Duties to Employers
V: Investment Analysis, Recommendations, Actions
VI: Conflicts of Interest
VII: Charterholder / Candidate Responsibilities
47
49. V :Investment Analysis, Recommendations, Action
V.A.: Diligence & reasonable basis
• Diligence, independence, thoroughness
• Basis supported by research, investigation
• Depends on investment philosophy, role
• 2nd, 3rd party research
– Reasonable effort to ensure it’s sound
– Review assumptions, judge rigor, recency,
objectivity
49
50. V: Investment Analysis, Recommendations, Action
V.A.: Diligence & reasonable basis
Group Decision-Making
• Can disagree but still be named in group if
you feel there is reasonable basis
• But document your difference with the team
• Firm should establish review process to
judge basis
50
52. V: Investment Analysis, Recommendations, Action
V.B.: Communications w/Clients & Prospects
1.Disclose format & principles of investment
process,Promptly disclose changes
2.Use reasonable judgment in Identify
important factors in an investment,
communicate those factors in communication
with clients
3.Distinguish between fact and opinion
52
54. V: Investment Analysis, Recommendations, Action
V.C.: Record retention
• To support analysis, recommendations,
actions, other investment-related
communications with clients & prospects
• 7 years retention recommended
54
55. CFA Code of Ethics
I: Professionalism
II: Integrity of Capital Markets
III: Duties to Clients
IV: Duties to Employers
V: Investment Analysis, Recommendations, Actions
V.A.: Diligence & Reasonable Basis
V.B.: Communications w/Clients & Prospects
V.C.: Record Retention
VI: Conflicts of Interest
VII: Charterholder / Candidate Responsibilities
55
56. CFA Code of Ethics
I: Professionalism
II: Integrity of Capital Markets
III: Duties to Clients
IV: Duties to Employers
V: Investment Analysis, Recommendations, Actions
VI: Conflicts of Interest
VII: Charterholder / Candidate Responsibilities
56
57. VI: Conflicts of Interest
VI.A.: Disclosure
VI.B.: Priority of Transactions
VI.C.: Referral Fees
57
58. VI: Conflicts of Interest
VI.A.: Disclosure
VI.B.: Priority of Transactions
VI.C.: Referral Fees
58
59. VI: Conflicts of Interest
VI.A.: Disclosure
• If it could reasonably be expected to impair
independence or objectivity
• Or interfere with duty to clients, prospects,
employer
• Prominent, plain language, relevant information
• Best practice: avoid, otherwise disclose
• Actual or potential conflict
• E.g. recommending stocks you own, friend’s
company
59
60. VI: Conflicts of Interest
VI.A.: Disclosure
Director conflicts
• Has two conflicted clients
• May get stock as compensation
• May have material non-public information
60
61. VI: Conflicts of Interest
VI.A.: Disclosure
• Let employer avoid embarrassing/costly
ethical/legal issues
• Employers could specifically guide on major
issues
• Should disclose short term performance
criteria, commissions, incentive fees,
performance fees, referral fees
61
62. VI: Conflicts of Interest
VI.A.: Disclosure
VI.B.: Priority of Transactions
VI.C.: Referral Fees
62
63. VI: Conflicts of Interest
VI.B.: Priority of Transactions
• Clients and employers before self
• Co-investing is often ok; some clients
require it
• Covers anyone who knows of potential
pending transactions
• Firm should establish and communicate
policies
63
64. VI: Conflicts of Interest
VI.A.: Disclosure
VI.B.: Priority of Transactions
VI.C.: Referral Fees
64
65. VI: Conflicts of Interest
VI.C.: Referral Fees
• Disclose to employer, client, prospect
• Any compensation received from or paid to
others
• For recommendation of service or product
• Before agreement to do business
• Disclose how the fee is structured
• Disclose estimated dollar value
65
66. CFA Code of Ethics
I: Professionalism
II: Integrity of Capital Markets
III: Duties to Clients
IV: Duties to Employers
V: Investment Analysis, Recommendations, Actions
VI: Conflicts of Interest
VI.A.: Disclosure
VI.B.: Priority of Transactions
VI.C.: Referral Fees
VII: Charterholder / Candidate Responsibilities
66
67. CFA Code of Ethics
I: Professionalism
II: Integrity of Capital Markets
III: Duties to Clients
IV: Duties to Employers
V: Investment Analysis, Recommendations, Actions
VI: Conflicts of Interest
VII: Charterholder / Candidate Responsibilities
67
68. VII: Charterholder / Candidate Responsibilities
VII.A.: Conduct
VII.B.: Reference to Institute, Designation,
Program
68
69. VII: Charterholder / Candidate Responsibilities
VII.A.: Conduct
Nothing harming Institute/designation/exam process
– Exam cheating, disregarding exam policies, disclosing
confidential exam information
– Attempting to circumvent exam security
– Improper use of designation or association w/Institute
– Misrepresent on Prof. Conduct Stmt/Prof. Dev Program
– Can express disagreement with program
69
70. VII: Charterholder / Candidate Responsibilities
VII.A.: Conduct
VII.B.: Reference to Institute, Designation,
Program
70
71. VII: Charterholder / Candidate Responsibilities
VII.B.: Reference to Institute, Designation, Program
• Do not exaggerate
• Do not over-promise competency
• Do not over-promise future investment results
• Can make statements that emphasize the Institute’s
thoroughness, rigour, commitment to ethics
• Can express opinions about relative merits of the program
• Can express candidacy but not partial designation
• To be a candidate you must be registered for the exam
71
72. VII: Charterholder / Candidate Responsibilities
VII.A.: Conduct
VII.B.: Reference to Institute, Designation,
Program
72
73. CFA Code of Ethics
I: Professionalism
II: Integrity of Capital Markets
III: Duties to Clients
IV: Duties to Employers
V: Investment Analysis, Recommendations, Actions
VI: Conflicts of Interest
VII: Charterholder / Candidate Responsibilities
VII.A.: Conduct
VII.B.: Reference to Institute, Designation,
Program
73
74. CFA Code of Ethics
I: Professionalism
II: Integrity of Capital Markets
III: Duties to Clients
IV: Duties to Employers
V: Investment Analysis, Recommendations, Actions
VI: Conflicts of Interest
VII: Charterholder / Candidate Responsibilities
74
Editor's Notes
COURSE OBJECTIVES
1.Know the CFA code of ethics
2.Build skills and interpreting ethics-related situation
3.Understanding how industry work
CFA brand
Tie members
Violation of any law is violation of A
KNOWINGLY=PEOPLE have the reasonable ground to believe
Can not pretend to be blind
That is based on what your peer(who didn’t participate in the event ) will think as reasonable(reasonable ground)
Loophole / molingliangke
Application of the law
notification of known violations, report situation to supervisor, seek an independent legal opinion and determine whether the regulator should be notified of the error
Dissociating from a violation, when knowing that certain information(ex. Preliminary prospectus) is misleading, if matter is not remedied and employer does not dissociate from the underwriting. One should sever the connections with …..+legal advice
Misrepresenting performance, assisting in violating of 1A
Following the highest requirement
Law and regulation based on religious tenets-for investor with particular compliance
Reporting potential unethical actions
Failure to maintain knowledge of the law
When involving in creation of products/services whereas the distributor might not doing this, that make you vicariously liable and responsible for that distributor in that senses.
Firm should 1. develop/Adopt code and standard of ethics
2. provide information about applicable law
3. Establish procedure for reporting violations.
Buy-side clients
Fund manager and custodial relationships
Investment banking &research, analyst client relationship
Recommended procedure for compliance
1. protect the integrity of opinion
2. create a restricted list
3. restrict special cost arrangement
4. limit gifts token items only business related entertainment.
5. restrict investment
6. review procedures-supervisor review procedures related to the personal investment
7.independence policy
compensation that rewards objectivity and accuracy
Separate reporting structures
Performance measurement and attribution
Public companies
Credit rating agency opinions
Influence during the manager selection/procurement process
Issuer-paid research
travel funding -ex. flying on a corporate or chartered jet or attending sponsored conferences, should use commercial travel or aviod the appearance
Performance measurement; attribution
May not affect yourself but that may affect how others see about that
-can not guarantee investment performance
-no one can guarantee that, remember what you have control over
Exercise care/ Diligence when using 3rd party information
Although 1c didn't’t require a benchmark to be provided but when using it it should not be misrepresented
-any data point that omit can be perceived as omission or misrepresentation
Plagiarism –authorizing
Ok to distribute 3rd party report, even to precis those reports –extent to oral communication, use of audio/ VIDEO MEDIA, ELECTRONIC MEDIA
Not include the paid study and research-cannot claim when left position
Recommended procedure for compliance
-factual presentation, firm, can provide guidance for written /oral communication
-designating who can speak on behalf of the firm
Qualification summary
-use outside information
Maintain webpages
Plagiarism policy-maintain copies of source material
-attribute quotations(projections, table, statistics)
-attribute summaries(paraphrases or summaries)
…......as pre so ....time .....atribution
Boarder guidance
-business of finance is build on the soul of foundation of trustworthiness
-conduct reflected the integrity and competence of member
Recommended procedure for compliance
-Code of ethics
-List of violations
-Employee reference
For people who possesses material nonpublic information that could affect the value of an investment must act or cause others to act on the information
-impact on the price of the security
Front-running ; act on informaion
Test-consider the source and likely effect
Less likely less likely
More ambiguous less likely
Nonpublic – information is nonpublic is not available to the public –selectively disclosed by a corporation to a small group of investors or analysts-->This is ok to get it or have it but just do not act on it
Exception -—mosaic theory-analysis of public information
-analysis of nonmaterial nonpublic info
-may lead to a conclusion that may be material nonpublic
-save and document all research
Social media
-m/C Should verify that info is that available at anywhere?
Publicly available from another source
-if you distribute info with sources make sure any regulatory filings have been made
-public dissemination
-adopt compliance procedures
Adopt disclosures
-issue press release
-firewall element
-appropriate interdepartmental communication
-physical separation of department
-sale & reporting
In banking & corporate finance
-record maintenance
-proprietary trading procedures
-communication to all employees
Intent to mislead
-may do sth that distort prices or inflate trading volume
-but with o intent
Pomp and dump the scheme(misleading information in order to favor own position) ; rely not only on rumor to writing, also more tactics, to motivate market, pennies stock
Two type
Information based manipulation
Spreading false rumors to induce trading by others
Transaction-based manipulation
-wash trade: giving the impression of activity
cornering -securing a dominant/controlling position in a financial asset to exploit and manipulate the price related derivative
Standard 2b excludes legitimate trading strategies
Ex. 2million share
Sell
Buy puts
Selling on expiration day
Manipulation?
Benefit by one’s owner behavior
Material,non public info?
3A is not a substitute for any legal obligation
Some statuary, more strict obligation apply
-if has custody of client asset, heightened level of responsibility
Identifying the actual investment client
-in short-> the beneficiary, some may no be your client
Eg; pension plans, trust, client is not the person who hire the PM, client are beneficiaries of the fund ..
When there is no beneficiary (index fund)
-decision do not have to be based on beneficiary requirement only to the mandate
Care
-fiduciary duties-people acting for the benefit of another party-managing asset
-this duty exceed what is acceptable in normal
( statuary duty to minor)
-people with limited infor
-duty in law
Deal fairly with all client with respect investment action
->Developing the client’s portfolio
-suitability
Disclose all potential conflicts of interest to the client
-client guidelines are followed
3A DECISION SHOULD BE JUDGED
in the context of the total portfolio
(regardless the effect of particular investment )
-for portfolio with variety of stock (independently, non correlated)
-in differ industries
Soft commission policies
Proxy voting policies
-custody of client/for their value
Violate 2b?
Hedge fund with high volume of share
possible
Correct action for proxy voting
Ex. Client approval,
Doing research
In house custody service
1.All trading through brokerage
Firm policies- follow all applicable laws
=establish investment objective of the client
-consider all info when taking actions
Suitability-client security portfolio
Diversity
Regular reviews
Disclose
Conflicts of interest
Compensation arrangement
Vote proxies
Maintain confidentiality
See best execution
Consider client first
Fairly ⍀equitable, equally
-client may be at different level of service and fees
(service levels/fees disclosure)
(available to all clients)
Favoritism based on
-wealth
Written police
Heighten for employee
Important
All orders processed FIFO basis
Best price is the best price can get
Best execution is the one that aggregate al the order, bundling when efficient
=process to determine execution prices and partial fills
Disclosure allocation process; disclosure don not except people from 3b
Ssystematic account review
Weighted average –allocation
For the fair communication – for investor in the different stages
(3a)
When m/C (member of Canada )
Suitability does not mean no losses
-expected return does not guarantee actual return
-unsolicited order
If m/c knows such an order is unsuitable, should get them acknowledge that
Manger should act in accordance with the mandate
----investment policy statement
----regular updates/ reviews
-------suitability test policies
M/C only responsible for information that is known
Hit ratio: number of correct calls/ Total calls
Made 10 call 4 of them happen to be right
Must present accurately and completely
GIPS: Global investment performance standard
-include all account
-include terminated accounts
-gross or net of fees taxes, inflation
-maintain data and records used to calculate performance
1.Information concerns illegal action
on the part of the client
2.Disclosure is required by law(if applicable laws require confidentiality, even if 1. above applies, M/C must follow law )
3.Client or prospective client permits it
How about stolen?
Firm have police
This standard does not prevent the m/c from cooperating with CFA-PCP if requested to supply client account info
--don’t disclose anything
-if outside of the scope of the confidential relationship and does not involve illegal activity may be ok(can provide with the public contact number, so that is not the confidential information, but when it related to the phone number then that is confidential )
Loyalty
Client. .> integrity of capital market.>employer interest.> m/c interest
Problem.
Employers are not obligated to adhere to the code ad standards
-m/c are however
Firm should not adopt /develop conflicting practices
THEY ARE NOT OBLIGATE!!
Independent practice
-should disclosure of intent and it is ok
Must continue to act in employer’s best interest until resignation takes effect
Must not –trade secret
2.Misuse confidential
3.Solicit employer’s client
4.Take client lists
May need to cite yourselves work
1.non-compete agreement, legal,
12months, cannot contact with any client within period of 12 moths
Whistle blowing – violating 4a ids permitted , protect client or integrity of the market
Competition policy
Termination policy
Incident reporting procedures (whistle blowing)
Employee classified in each classes
Make reasonable efforts to detect and prevent violation law, rules, regulation,
Whether or not they are m/c
Delegating supervisory duties is no relief from 4 c
-if one know or should know that procedures are not being followed, merely having them would not be enough
-compliance procedures
WHEN VIOLATION ARISES m/c must promptly initiated an investigation to assess extent
(employee placed on restricted access pending the outcome)
-inadequate procedures
Inform senior manager
Enforcement of non-investment related policies
Enforced Equally
Attendance, acceptable workplace actions
Tie incentives to adherence
Identify situation in which violation are likely to occur and develop compliance procedures that are ;
Clearly written and accessible
Easy to understand
Designate a compliance officer
Clear hierarchy of supervisor
Who have resources and authority to do so
Out line the scope of the procedure along with procedure
To monitor/test
Once the system is in place, supervisor should
Disseminate to appropriate personnel
employee
Investigate promptly
Response to determine scope
Restrict employee action pending outcomes
Must exercise diligence,
Depend on
Support and resources provided by m/c employer
level of thoroughness of the information received
Differ with product/ security being analyzed
Reasonable basis mean
based on a set of facts known and understood at the time
Reasonable basis
Depend on balance of what is known and what resources have been provided
When using secondary resources
Assess-assumption used
Rigor of the analysis(anything quantity and historical, look at the methodiology, test and replicate what you down)
Date and timeline
Evaluation of the conclusion
When research vendor are chosen from above m/c may use it in good faith
-Quantitatively quantified research
-developing quantitatively oriented techniques
-
Before Today is fact
Tomorrow is opinion
Communication with the client and prospective clients
m/c –clear
-frequent update with client ===understanding of
-thorough instrumental factor, opinion
Ensure all client are traded
Must known the limitation and risks of the analysis
When you see the risk then people known what they are doing and been aware of the risk and limitation
Identifying limitation of analysis
Risk disclosure
Having no knowledge
Informing the client about what you found and do in the 5a
Is that the defensible ?
Can you answer other’s people
Internal peer reviews
Last learning objective (communication with c or pc)
Defensible !
To support your output/ Analysis more defensible
Record are property of the firm
-regulators often impose requirement with the required time frame for retaining records(7 years)
-recommended procedures for compliance
Responsibility to maintain record rest with the firm
---must archive the research note
6A
Must make full and fair disclosure of all inf
--best practice is to avoid real/perceived conflicts
If avoidance is not possible
Must ensure that conflicts are communicated effectively
-participation on outside board
-ownership of stocks analyzed
->>>may interfere with the investment recommendation
--the mere appearance of a conflict could create problem for m/c their employers
-in conflict occur inadvertently must report promptly
-disclosure to client
-m/c must be and be seen as objective
-disclosure to client’
Fee arrangement, subadvisor agreement other non-standard fee structure
=cross-department conflicts
=conflicts with stock ownership
Being recommended to clients
Prohibition is unfair, therefore beneficial ownership disclosure is required
Conflicts as director
-conflict between duty owed to clients vs, to shareholders
-option compensation vs. objectivity
m/c Should be isolated from those making investment decisions
Disclosure special compensation agreements that might conflict with client interest
-doesn’t mean there are conflict
-people may have no conflict at all
-appearance of conflict led to misunderstanding
Including information on compensation packages in promotional literature
Avoiding potential conflicts
m/c is free to invest personally as long as
1). The client is not disadvantage by any trade
2).rules does not benefit personally from the trades undertaken for clients
3).m/c complies with applicable regulatory requirements
-extends to trades that may counter to current recommendations ,as long as these three is applicable then ok
Personal trading secondary to trading for clients
Ex. client place big order in a certain range
you know that going to push up the price a little bit so you want to buy it in the front
That call
Front running
Getting information from client as to what order will hit the market that called order flow
Or refers to the compensation that a broker receives, not from its client, but from a third party that wants to influence how the broker routes client orders.
RPFC
Limited participation in equity IPO
Restriction on private placement
Establish a blackout/restricted period-not practical for large firms, shall cover all involved in the decision-making process
Confidential program information
Additional CFA program restrictions
Expressing an opinion
-m/c are free to disagree and express their disagreement with cfa
Cannot disclosure content-specific information
The most Point of disagreement
-meant to prevent promotional efforts that make promises or guarantee that are tied to the CFA
CFA institute, CFA institute membership
Are trade make, member are not owner
1.-remit annually a professional conduct statement
2.-pay applicable membership dues
Using the CFA designation
Those who have earned it, may use the trade marker, "chartered financial analyst ” or “CFA”
-Must also satisfy membership requirements to maintain their right to use the designation
-still need to pay in the rest of their life
Only the right to write a cheque to CFA every year
MBA in finance =CFA Designation
-Never state/imply partial designation or cite an expected completion date
-if your pass all three level in consecutives years, you can say so but you cannot say it gives you superior ability
C, CFA protocal
one knee bow their heads to a 33 title and cast their gaze downward