The case emerged when a Washington-based stock brokerage firm, Height Securities, allegedly alerted clients of an imminent government decision favoring private health insurers who participate in a Medicare program.
This document discusses the protections available for whistleblowers within the U.S. Intelligence Community and analyzes three cases of whistleblowers - Frank Snepp, Thomas Drake, and Edward Snowden. It outlines the history of legislation providing some protections, such as the ability to report issues to Inspectors General, but also notes laws like the Espionage Act that can punish unauthorized disclosures. The document then summarizes the cases of Snepp, Drake, and Snowden, noting that while Snepp and Drake faced penalties for unauthorized disclosures, the consequences for Snowden remain unclear given his actions were the most recent and high-profile.
This memorandum from the Office of Management and Budget provides clarifying guidance on the Paperwork Reduction Act in order to increase transparency and openness in government information collection. It summarizes the key requirements of the Act, including that agencies must seek public comment on proposed collections and get OMB approval. It defines what types of information and collections are and are not covered by the Act. The goal is to specify the central requirements of the Act and clarify policies to promote greater openness.
The document outlines legislation around access to information and privacy protection in Trinidad and Tobago, specifically the Freedom of Information Act and the proposed Data Protection Bill. It discusses the objectives and key principles of the FOI Act, including giving individuals the right to request information from public authorities. It also explains what is considered personal information and sensitive personal information according to the Data Protection Bill, and the general privacy principles around collection, use, disclosure and protection of personal information. Public bodies will need to complete privacy impact assessments for any enactments, systems or programs involving personal information.
Financial Market Abuse & Fraud. A US and UK Perspective.Mushtaq Dost FICA
The document discusses insider trading and market abuse. It provides examples of behaviors that can constitute market abuse, including:
1) An employee who buys shares in their company before public knowledge of an imminent takeover bid, based on private information, giving them an unfair advantage over others in the market.
2) An employee who discloses private information about an imminent takeover to a friend, allowing the friend to also profit unfairly from inside knowledge.
3) Selling shares based on private information about an upcoming loss of a major contract, again providing insider knowledge to the detriment of others trading.
4) Manipulating transactions by purchasing a large number of shares to artificially inflate the price at the
New York Washington, D.C. Los Angeles Palo Alto London Paris Frankfurt
Tokyo Hong Kong Beijing Melbourne Sydney
www.sullcrom.com
December 22, 2015
The Cybersecurity Act of 2015
Congress Passes and President Signs Long-Anticipated Measure
Setting Framework for Sharing Cyber Threat Information with Federal
Government and Private Sector
SUMMARY
On December 18, 2015, President Obama signed into law the Cybersecurity Act of 2015. The Act,
arguably the most significant piece of federal cyber-related legislation enacted to date, establishes a
mechanism for cybersecurity information sharing among private-sector and federal government entities.
It also provides safe harbors from liability for private entities that share cybersecurity information in
accordance with certain procedures, and it authorizes various entities, including outside the federal
government, to monitor certain information systems and operate defensive measures for cybersecurity
purposes. The Act also contains provisions designed to bolster cybersecurity protections at federal
agencies, assess the federal government’s cybersecurity workforce, and implement a range of measures
intended to improve the cybersecurity preparedness of critical information systems and networks.
BACKGROUND
For nearly two decades, information relating to potential cyber threats has been shared through industry-
specific Information Sharing and Analysis Centers (“ISACs”), established in 1998 under the auspices of
Presidential Decision Directive 63. Despite the growth and importance of ISACs, participants and
commentators have expressed concern that perceived risks associated with information sharing—
including potential civil liability, antitrust issues, and the protection of intellectual property and other
proprietary business information—have limited the effectiveness of ISACs and other information-sharing
efforts.
http://www.sullcrom.com/
-2-
The Cybersecurity Act of 2015
December 22, 2015
On February 13, 2015, President Obama signed Executive Order 13691 “to encourage and promote
sharing of cybersecurity threat information within the private sector and between the private sector and
government.” The Order encouraged the development of Information Sharing and Analysis Organizations
(“ISAOs”) and of a common set of voluntary standards for ISAOs, including privacy protections. It also
clarified the authority and operational framework of the National Cybersecurity and Communications
Integration Center (“NCCIC”), a civilian agency in the Department of Homeland Security (“DHS”) tasked
with coordinating the sharing of information within the federal government and with entities outside the
government. Finally, it added DHS to the list of federal agencies that approve classified information-
sharing arrangements to streamline private companies’ ability to access classified cybersecurity thre ...
The Right to Information Act was passed in 2005 and provides citizens a legal right to access information from public authorities in order to promote transparency and accountability. It defines public authorities as those established by the constitution, parliament, or state legislatures. Citizens can request information in writing from public information officers and pay applicable fees. Requests must be responded to within 30 days, with some exceptions for urgent matters affecting life or liberty. While most public information is disclosed, there are exemptions around national security, privacy, and other sensitive matters. Appeals can be made if information requests are denied.
This document summarizes key changes to securities laws and capital raising regulations under the JOBS Act of 2012. It discusses three new exemptions created by the JOBS Act that allow companies to conduct public securities offerings without SEC registration: 1) Title II allows general solicitation for offerings to accredited investors; 2) Title III permits crowdfunding from unaccredited investors; and 3) Title IV expands access to smaller public offerings. While the JOBS Act makes capital more accessible, it also increases responsibilities for business lawyers as regulatory gatekeepers.
This document discusses recommendations for Congress to create regulations allowing qualified civil society organizations to share intelligence on issues like human trafficking with financial institutions and regulators under safe harbor protections. It provides an overview of why the financial industry needs intelligence from civil society to better identify criminal activity, given limitations of industry-initiated identification efforts. It also gives examples of how human trafficking is connected to money laundering and the financial system through various case studies. The document argues that establishing protections for civil society organizations to share vetted intelligence would help disrupt criminal networks while protecting information sources.
This document discusses the protections available for whistleblowers within the U.S. Intelligence Community and analyzes three cases of whistleblowers - Frank Snepp, Thomas Drake, and Edward Snowden. It outlines the history of legislation providing some protections, such as the ability to report issues to Inspectors General, but also notes laws like the Espionage Act that can punish unauthorized disclosures. The document then summarizes the cases of Snepp, Drake, and Snowden, noting that while Snepp and Drake faced penalties for unauthorized disclosures, the consequences for Snowden remain unclear given his actions were the most recent and high-profile.
This memorandum from the Office of Management and Budget provides clarifying guidance on the Paperwork Reduction Act in order to increase transparency and openness in government information collection. It summarizes the key requirements of the Act, including that agencies must seek public comment on proposed collections and get OMB approval. It defines what types of information and collections are and are not covered by the Act. The goal is to specify the central requirements of the Act and clarify policies to promote greater openness.
The document outlines legislation around access to information and privacy protection in Trinidad and Tobago, specifically the Freedom of Information Act and the proposed Data Protection Bill. It discusses the objectives and key principles of the FOI Act, including giving individuals the right to request information from public authorities. It also explains what is considered personal information and sensitive personal information according to the Data Protection Bill, and the general privacy principles around collection, use, disclosure and protection of personal information. Public bodies will need to complete privacy impact assessments for any enactments, systems or programs involving personal information.
Financial Market Abuse & Fraud. A US and UK Perspective.Mushtaq Dost FICA
The document discusses insider trading and market abuse. It provides examples of behaviors that can constitute market abuse, including:
1) An employee who buys shares in their company before public knowledge of an imminent takeover bid, based on private information, giving them an unfair advantage over others in the market.
2) An employee who discloses private information about an imminent takeover to a friend, allowing the friend to also profit unfairly from inside knowledge.
3) Selling shares based on private information about an upcoming loss of a major contract, again providing insider knowledge to the detriment of others trading.
4) Manipulating transactions by purchasing a large number of shares to artificially inflate the price at the
New York Washington, D.C. Los Angeles Palo Alto London Paris Frankfurt
Tokyo Hong Kong Beijing Melbourne Sydney
www.sullcrom.com
December 22, 2015
The Cybersecurity Act of 2015
Congress Passes and President Signs Long-Anticipated Measure
Setting Framework for Sharing Cyber Threat Information with Federal
Government and Private Sector
SUMMARY
On December 18, 2015, President Obama signed into law the Cybersecurity Act of 2015. The Act,
arguably the most significant piece of federal cyber-related legislation enacted to date, establishes a
mechanism for cybersecurity information sharing among private-sector and federal government entities.
It also provides safe harbors from liability for private entities that share cybersecurity information in
accordance with certain procedures, and it authorizes various entities, including outside the federal
government, to monitor certain information systems and operate defensive measures for cybersecurity
purposes. The Act also contains provisions designed to bolster cybersecurity protections at federal
agencies, assess the federal government’s cybersecurity workforce, and implement a range of measures
intended to improve the cybersecurity preparedness of critical information systems and networks.
BACKGROUND
For nearly two decades, information relating to potential cyber threats has been shared through industry-
specific Information Sharing and Analysis Centers (“ISACs”), established in 1998 under the auspices of
Presidential Decision Directive 63. Despite the growth and importance of ISACs, participants and
commentators have expressed concern that perceived risks associated with information sharing—
including potential civil liability, antitrust issues, and the protection of intellectual property and other
proprietary business information—have limited the effectiveness of ISACs and other information-sharing
efforts.
http://www.sullcrom.com/
-2-
The Cybersecurity Act of 2015
December 22, 2015
On February 13, 2015, President Obama signed Executive Order 13691 “to encourage and promote
sharing of cybersecurity threat information within the private sector and between the private sector and
government.” The Order encouraged the development of Information Sharing and Analysis Organizations
(“ISAOs”) and of a common set of voluntary standards for ISAOs, including privacy protections. It also
clarified the authority and operational framework of the National Cybersecurity and Communications
Integration Center (“NCCIC”), a civilian agency in the Department of Homeland Security (“DHS”) tasked
with coordinating the sharing of information within the federal government and with entities outside the
government. Finally, it added DHS to the list of federal agencies that approve classified information-
sharing arrangements to streamline private companies’ ability to access classified cybersecurity thre ...
The Right to Information Act was passed in 2005 and provides citizens a legal right to access information from public authorities in order to promote transparency and accountability. It defines public authorities as those established by the constitution, parliament, or state legislatures. Citizens can request information in writing from public information officers and pay applicable fees. Requests must be responded to within 30 days, with some exceptions for urgent matters affecting life or liberty. While most public information is disclosed, there are exemptions around national security, privacy, and other sensitive matters. Appeals can be made if information requests are denied.
This document summarizes key changes to securities laws and capital raising regulations under the JOBS Act of 2012. It discusses three new exemptions created by the JOBS Act that allow companies to conduct public securities offerings without SEC registration: 1) Title II allows general solicitation for offerings to accredited investors; 2) Title III permits crowdfunding from unaccredited investors; and 3) Title IV expands access to smaller public offerings. While the JOBS Act makes capital more accessible, it also increases responsibilities for business lawyers as regulatory gatekeepers.
This document discusses recommendations for Congress to create regulations allowing qualified civil society organizations to share intelligence on issues like human trafficking with financial institutions and regulators under safe harbor protections. It provides an overview of why the financial industry needs intelligence from civil society to better identify criminal activity, given limitations of industry-initiated identification efforts. It also gives examples of how human trafficking is connected to money laundering and the financial system through various case studies. The document argues that establishing protections for civil society organizations to share vetted intelligence would help disrupt criminal networks while protecting information sources.
JOBS Act Rulemaking Comments on SEC File Number S7-06-13Jason Coombs
This letter summarizes concerns about the SEC's implementation of rules around the JOBS Act and public offerings. It argues that the SEC should take a more constitutionally focused approach and avoid political influences. The author advocates for the SEC to establish a reputation and verification system to help investors evaluate issuers and prevent fraud. Overall, the letter is critical of how politics has influenced the SEC and calls for new transparency measures and a focus on problem solving rather than politics.
02/27: IRS Guidance on Candidate Related Political Activityartba
The document is a letter from the American Road and Transportation Builders Association (ARTBA) commenting on proposed IRS guidance regarding political activities of tax-exempt organizations. ARTBA argues that the proposed guidance would too broadly define advocacy as political activity, endangering the tax-exempt status of organizations. Specifically, the guidance would consider any communication mentioning a candidate and related legislation within 60 days of an election as political activity. This could negatively impact ARTBA's ability to inform its members about relevant transportation legislation. ARTBA urges the IRS to abandon the proposed guidance.
Here are the key steps the Ethics Committee should take based on the audit report:
1. Review the audit report findings that Arun and Smita are in violation of the company's code of conduct.
2. Formally determine that Arun accepting personal gifts from suppliers and Smita misusing company resources for personal gain are unacceptable violations.
3. Notify Arun and Smita in writing of the Ethics Committee's decision and the specific code violations.
4. Schedule meetings with Arun and Smita to discuss the issues, get their perspectives, and hear if they have any mitigating factors to consider.
5. Determine the appropriate disciplinary actions for each case, with options potentially including training
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfInternet Law Center
This document provides a section by section summary of proposed legislation called the American Data Privacy and Protection Act. Some key points:
- It would establish definitions for terms like "covered entity", "covered data", and "sensitive covered data". Covered entities would include companies that collect or process personal data.
- It outlines various individual rights for access, correction, deletion and data portability of personal data. Covered entities would need to provide transparency into their data practices and privacy policies.
- It establishes duties for covered entities around data minimization, security, and "privacy by design". It restricts certain uses of sensitive data and requires consent for things like targeted advertising.
- It addresses issues like third
1235TransparencyIntroduction The Central Intelligen.docxaulasnilda
This document discusses the history of transparency in government budgets and spending in the United States. It describes how William Richardson sued in the 1970s to obtain the budget of the CIA, which was secret at the time, arguing citizens had a right to know how tax dollars were spent. The Supreme Court ruled against Richardson, finding he lacked standing. The document then provides context on laws and policies around government transparency, including freedom of information laws, public reporting requirements, and debates around openness versus secrecy of national security information.
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Financial Poise
There is no federal law governing privacy and data security applicable to all US citizens. Rather, individual states and regulatory agencies have created a patchwork of protections that may overlap in certain industries.
This webinar provides an overview of the many privacy and data security laws and regulations which may impact your business, from the state law protecting personal information to regulations covering the financial services industry to state breach notification laws.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/introduction-to-us-privacy-and-data-security-2020/
Security Compliance Models- Checklist v. FrameworkDivya Kothari
The document discusses and compares three compliance standards - PCI, GLBA, and HIPAA. It categorizes them based on whether they use a checklist model, risk management framework, or a hybrid of both. PCI is described as an industry standard checklist aimed at protecting card data. GLBA uses a risk-based approach giving financial institutions autonomy in compliance. HIPAA takes a hybrid approach with both checklist and risk-based elements, suited to the varied healthcare industry. The intent behind each is also discussed - with PCI providing a standardized baseline, GLBA enabling flexible risk management, and HIPAA's hybrid nature accommodating different entity types. Examples are given of entities that would need to comply with each standard.
Data breach events result in significant losses each year. Our partners at Bonahoom & Bobilya, LLC, created a presentation about understanding the hidden regulatory risks of a data breach so you can keep your company from going out of business.
This presentation has been shared with permission.
This document summarizes the key issues and shortcomings with privacy laws in the United States. It notes that unlike the European Union's GDPR, the US takes a sectoral approach with different federal and state statutes governing specific areas. This creates a complex patchwork of laws that are uneven and sometimes incompatible. The document calls for a unified federal privacy law that establishes consistent standards and gives individuals private rights of action for violations. It also recommends principles like data minimization, opt-in consent for data sharing, and non-discrimination in privacy rights.
This document summarizes the Summer 2016 edition of Willis Towers Watson's Cyber Claims Brief publication. It discusses potential liability issues that may arise when companies are directed by government authorities to take action or not take action related to a cybersecurity event. It also examines the growing threat of cyber extortion, particularly ransomware attacks, and how companies can help mitigate these threats. Finally, it provides an analysis of the recent EU General Data Protection Regulation and EU-US Privacy Shield agreement.
MTBiz is for you if you are looking for contemporary information on business, economy and especially on banking industry of Bangladesh. You would also find periodical information on Global Economy and Commodity Markets.
Signature content of MTBiz is its Article of the Month (AoM), as depicted on Cover Page of each issue, with featured focus on different issues that fall into the wide definition of Market, Business, Organization and Leadership. The AoM also covers areas on Innovation, Central Banking, Monetary Policy, National Budget, Economic Depression or Growth and Capital Market. Scale of coverage of the AoM both, global and local subject to each issue.
MTBiz is a monthly Market Review produced and distributed by Group R&D, MTB since 2009.
Republic Act 10173 Data Privacy Act of 2012 (DPA)
“An act protecting individual personal information in information and communications systems in the government and the private sector, creating for this purpose a National Privacy Commission, and for other purposes”
- Privacy issues will continue to be a major concern for Congress and the upcoming elections, fueled by increased computer and internet usage. While industry self-regulation was previously preferred, there is now support for more aggressive privacy regulation, especially around financial and medical information.
- The FTC now supports new regulatory powers over companies collecting personal data online, while the Administration focuses on financial and medical privacy. Congress remains reluctant to pass comprehensive privacy laws.
- Several bills have been introduced to address privacy, including establishing a commission to study existing laws and make recommendations, and strengthening protections for financial and medical privacy data. However, opponents argue these approaches could delay needed legislation.
- Privacy issues will continue to be a major concern for Congress and the upcoming elections in the fall. Both the widespread use of computers and the internet have fueled these privacy concerns.
- While Congress is unlikely to pass comprehensive privacy legislation this year, some lawmakers may try to attach privacy provisions to other bills moving through Congress.
- The Federal Trade Commission now supports new regulations for companies collecting personal data online, reversing its previous support for industry self-regulation. However, the Administration and Congress have been reluctant to embrace comprehensive privacy legislation.
This document reports that as of December 31, 2015, the company had 13,517,672 Class A ordinary shares and 419,204,400 Class B ordinary shares outstanding. It also indicates that the registrant is a well-known seasoned issuer and is not a shell company. The document contains the standard table of contents for an annual report filed with the Securities and Exchange Commission.
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeLoeb Smith Attorneys
The US Department of Justice released a report regarding #cryptocurrency enforcement with strategies to take related to #digitalassets and interest in how enforcement will work in the #decentralizedfinance space.
The report could serve to shape the future vision of authorities and regulators towards #cryptocurrencies.
Government Contacting - FAR Part 24 - Protection Of Privacy And Freedom Of In...JSchaus & Associates
Please join Jennifer Schaus & Associates every Friday in 2020 for a complimentary series. See the full recording on our YouTube Channel (https://youtu.be/8WSeOIlY7VY). For more information about our federal contracting services please visit http://www.Jenniferschaus.com or contact us at 202-365-0598. Win more federal government contracts!
Methodologies for mandatory disclosure initiatives
Host country legislation: Philippines Freedom of Information Bill 3732/Bill 3308
Filomeno Sta. Ana, Action for Economic Reforms, Philippines
Ten Laws Internet Businesses Should Consider Part IIRyan K. Hew
This Part 2 of a 2-part presentation surveys several five laws that may be applicable to those who transact or conduct a lot of business online. In Part 2, the Stored Communications Act (SCA), Computer Fraud and Abuse Act (CFAA), State Laws on Security Breach Notification, Uniform Electronic Transactions Act (UETA), andElectronic Signatures in Global and National Commerce Act (E-Sign) are reviewed.
FOI reply from MoJ regarding meetings between Grayling and BFG representativesbjknight
This letter responds to a Freedom of Information request about meetings between Chris Grayling MP and the Big Firms Group since 2009. Some of the requested information is exempt as it is published quarterly and accessible online. The letter provides details of two relevant meetings since September 2013. It also confirms that no agreements have been made to deal favourably with Big Firms Group firms over smaller firms. The letter concludes by explaining the requester's right to an internal review or appeal to the Information Commissioner's Office.
An astonishing, first-of-its-kind, report by the NYT assessing damage in Ukraine. Even if the war ends tomorrow, in many places there will be nothing to go back to.
Essential Tools for Modern PR Business .pptxPragencyuk
Discover the essential tools and strategies for modern PR business success. Learn how to craft compelling news releases, leverage press release sites and news wires, stay updated with PR news, and integrate effective PR practices to enhance your brand's visibility and credibility. Elevate your PR efforts with our comprehensive guide.
More Related Content
Similar to Height Capital Markets | Insider Trading and Enforcement Shifts from Wall Street to K Street
JOBS Act Rulemaking Comments on SEC File Number S7-06-13Jason Coombs
This letter summarizes concerns about the SEC's implementation of rules around the JOBS Act and public offerings. It argues that the SEC should take a more constitutionally focused approach and avoid political influences. The author advocates for the SEC to establish a reputation and verification system to help investors evaluate issuers and prevent fraud. Overall, the letter is critical of how politics has influenced the SEC and calls for new transparency measures and a focus on problem solving rather than politics.
02/27: IRS Guidance on Candidate Related Political Activityartba
The document is a letter from the American Road and Transportation Builders Association (ARTBA) commenting on proposed IRS guidance regarding political activities of tax-exempt organizations. ARTBA argues that the proposed guidance would too broadly define advocacy as political activity, endangering the tax-exempt status of organizations. Specifically, the guidance would consider any communication mentioning a candidate and related legislation within 60 days of an election as political activity. This could negatively impact ARTBA's ability to inform its members about relevant transportation legislation. ARTBA urges the IRS to abandon the proposed guidance.
Here are the key steps the Ethics Committee should take based on the audit report:
1. Review the audit report findings that Arun and Smita are in violation of the company's code of conduct.
2. Formally determine that Arun accepting personal gifts from suppliers and Smita misusing company resources for personal gain are unacceptable violations.
3. Notify Arun and Smita in writing of the Ethics Committee's decision and the specific code violations.
4. Schedule meetings with Arun and Smita to discuss the issues, get their perspectives, and hear if they have any mitigating factors to consider.
5. Determine the appropriate disciplinary actions for each case, with options potentially including training
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfInternet Law Center
This document provides a section by section summary of proposed legislation called the American Data Privacy and Protection Act. Some key points:
- It would establish definitions for terms like "covered entity", "covered data", and "sensitive covered data". Covered entities would include companies that collect or process personal data.
- It outlines various individual rights for access, correction, deletion and data portability of personal data. Covered entities would need to provide transparency into their data practices and privacy policies.
- It establishes duties for covered entities around data minimization, security, and "privacy by design". It restricts certain uses of sensitive data and requires consent for things like targeted advertising.
- It addresses issues like third
1235TransparencyIntroduction The Central Intelligen.docxaulasnilda
This document discusses the history of transparency in government budgets and spending in the United States. It describes how William Richardson sued in the 1970s to obtain the budget of the CIA, which was secret at the time, arguing citizens had a right to know how tax dollars were spent. The Supreme Court ruled against Richardson, finding he lacked standing. The document then provides context on laws and policies around government transparency, including freedom of information laws, public reporting requirements, and debates around openness versus secrecy of national security information.
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Financial Poise
There is no federal law governing privacy and data security applicable to all US citizens. Rather, individual states and regulatory agencies have created a patchwork of protections that may overlap in certain industries.
This webinar provides an overview of the many privacy and data security laws and regulations which may impact your business, from the state law protecting personal information to regulations covering the financial services industry to state breach notification laws.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/introduction-to-us-privacy-and-data-security-2020/
Security Compliance Models- Checklist v. FrameworkDivya Kothari
The document discusses and compares three compliance standards - PCI, GLBA, and HIPAA. It categorizes them based on whether they use a checklist model, risk management framework, or a hybrid of both. PCI is described as an industry standard checklist aimed at protecting card data. GLBA uses a risk-based approach giving financial institutions autonomy in compliance. HIPAA takes a hybrid approach with both checklist and risk-based elements, suited to the varied healthcare industry. The intent behind each is also discussed - with PCI providing a standardized baseline, GLBA enabling flexible risk management, and HIPAA's hybrid nature accommodating different entity types. Examples are given of entities that would need to comply with each standard.
Data breach events result in significant losses each year. Our partners at Bonahoom & Bobilya, LLC, created a presentation about understanding the hidden regulatory risks of a data breach so you can keep your company from going out of business.
This presentation has been shared with permission.
This document summarizes the key issues and shortcomings with privacy laws in the United States. It notes that unlike the European Union's GDPR, the US takes a sectoral approach with different federal and state statutes governing specific areas. This creates a complex patchwork of laws that are uneven and sometimes incompatible. The document calls for a unified federal privacy law that establishes consistent standards and gives individuals private rights of action for violations. It also recommends principles like data minimization, opt-in consent for data sharing, and non-discrimination in privacy rights.
This document summarizes the Summer 2016 edition of Willis Towers Watson's Cyber Claims Brief publication. It discusses potential liability issues that may arise when companies are directed by government authorities to take action or not take action related to a cybersecurity event. It also examines the growing threat of cyber extortion, particularly ransomware attacks, and how companies can help mitigate these threats. Finally, it provides an analysis of the recent EU General Data Protection Regulation and EU-US Privacy Shield agreement.
MTBiz is for you if you are looking for contemporary information on business, economy and especially on banking industry of Bangladesh. You would also find periodical information on Global Economy and Commodity Markets.
Signature content of MTBiz is its Article of the Month (AoM), as depicted on Cover Page of each issue, with featured focus on different issues that fall into the wide definition of Market, Business, Organization and Leadership. The AoM also covers areas on Innovation, Central Banking, Monetary Policy, National Budget, Economic Depression or Growth and Capital Market. Scale of coverage of the AoM both, global and local subject to each issue.
MTBiz is a monthly Market Review produced and distributed by Group R&D, MTB since 2009.
Republic Act 10173 Data Privacy Act of 2012 (DPA)
“An act protecting individual personal information in information and communications systems in the government and the private sector, creating for this purpose a National Privacy Commission, and for other purposes”
- Privacy issues will continue to be a major concern for Congress and the upcoming elections, fueled by increased computer and internet usage. While industry self-regulation was previously preferred, there is now support for more aggressive privacy regulation, especially around financial and medical information.
- The FTC now supports new regulatory powers over companies collecting personal data online, while the Administration focuses on financial and medical privacy. Congress remains reluctant to pass comprehensive privacy laws.
- Several bills have been introduced to address privacy, including establishing a commission to study existing laws and make recommendations, and strengthening protections for financial and medical privacy data. However, opponents argue these approaches could delay needed legislation.
- Privacy issues will continue to be a major concern for Congress and the upcoming elections in the fall. Both the widespread use of computers and the internet have fueled these privacy concerns.
- While Congress is unlikely to pass comprehensive privacy legislation this year, some lawmakers may try to attach privacy provisions to other bills moving through Congress.
- The Federal Trade Commission now supports new regulations for companies collecting personal data online, reversing its previous support for industry self-regulation. However, the Administration and Congress have been reluctant to embrace comprehensive privacy legislation.
This document reports that as of December 31, 2015, the company had 13,517,672 Class A ordinary shares and 419,204,400 Class B ordinary shares outstanding. It also indicates that the registrant is a well-known seasoned issuer and is not a shell company. The document contains the standard table of contents for an annual report filed with the Securities and Exchange Commission.
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeLoeb Smith Attorneys
The US Department of Justice released a report regarding #cryptocurrency enforcement with strategies to take related to #digitalassets and interest in how enforcement will work in the #decentralizedfinance space.
The report could serve to shape the future vision of authorities and regulators towards #cryptocurrencies.
Government Contacting - FAR Part 24 - Protection Of Privacy And Freedom Of In...JSchaus & Associates
Please join Jennifer Schaus & Associates every Friday in 2020 for a complimentary series. See the full recording on our YouTube Channel (https://youtu.be/8WSeOIlY7VY). For more information about our federal contracting services please visit http://www.Jenniferschaus.com or contact us at 202-365-0598. Win more federal government contracts!
Methodologies for mandatory disclosure initiatives
Host country legislation: Philippines Freedom of Information Bill 3732/Bill 3308
Filomeno Sta. Ana, Action for Economic Reforms, Philippines
Ten Laws Internet Businesses Should Consider Part IIRyan K. Hew
This Part 2 of a 2-part presentation surveys several five laws that may be applicable to those who transact or conduct a lot of business online. In Part 2, the Stored Communications Act (SCA), Computer Fraud and Abuse Act (CFAA), State Laws on Security Breach Notification, Uniform Electronic Transactions Act (UETA), andElectronic Signatures in Global and National Commerce Act (E-Sign) are reviewed.
FOI reply from MoJ regarding meetings between Grayling and BFG representativesbjknight
This letter responds to a Freedom of Information request about meetings between Chris Grayling MP and the Big Firms Group since 2009. Some of the requested information is exempt as it is published quarterly and accessible online. The letter provides details of two relevant meetings since September 2013. It also confirms that no agreements have been made to deal favourably with Big Firms Group firms over smaller firms. The letter concludes by explaining the requester's right to an internal review or appeal to the Information Commissioner's Office.
Similar to Height Capital Markets | Insider Trading and Enforcement Shifts from Wall Street to K Street (20)
An astonishing, first-of-its-kind, report by the NYT assessing damage in Ukraine. Even if the war ends tomorrow, in many places there will be nothing to go back to.
Essential Tools for Modern PR Business .pptxPragencyuk
Discover the essential tools and strategies for modern PR business success. Learn how to craft compelling news releases, leverage press release sites and news wires, stay updated with PR news, and integrate effective PR practices to enhance your brand's visibility and credibility. Elevate your PR efforts with our comprehensive guide.
El Puerto de Algeciras continúa un año más como el más eficiente del continente europeo y vuelve a situarse en el “top ten” mundial, según el informe The Container Port Performance Index 2023 (CPPI), elaborado por el Banco Mundial y la consultora S&P Global.
El informe CPPI utiliza dos enfoques metodológicos diferentes para calcular la clasificación del índice: uno administrativo o técnico y otro estadístico, basado en análisis factorial (FA). Según los autores, esta dualidad pretende asegurar una clasificación que refleje con precisión el rendimiento real del puerto, a la vez que sea estadísticamente sólida. En esta edición del informe CPPI 2023, se han empleado los mismos enfoques metodológicos y se ha aplicado un método de agregación de clasificaciones para combinar los resultados de ambos enfoques y obtener una clasificación agregada.
04062024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
Acolyte Episodes review (TV series) The Acolyte. Learn about the influence of the program on the Star Wars world, as well as new characters and story twists.
Here is Gabe Whitley's response to my defamation lawsuit for him calling me a rapist and perjurer in court documents.
You have to read it to believe it, but after you read it, you won't believe it. And I included eight examples of defamatory statements/
Height Capital Markets | Insider Trading and Enforcement Shifts from Wall Street to K Street
1. In April 2013, the press began to report
about an SEC investigation into possible
insider trading based on information pro-
vided by political intelligence firms.3 The case
emerged when a Washington-based stock
brokerage firm, Height Securities, allegedly
alerted clients of an imminent government
decision favoring private health insurers who
participate in a Medicare program. The mat-
ter also caught the attention of Senator Chuck
Grassley, who started investigating whether
a lobbyist at a K Street law firm tipped
Height Securities with news of the government
decision.4
This shifting focus on the use of informa-
tion provided by political intelligence firms
is not a surprise. It is a logical progression
of prior investigations by the SEC because
political intelligence firms resemble expert
networks in terms of the services provided to
hedge funds and other investment firms. The
Vol. 20, No. 12 • December 2013
Political Intelligence Firms – Insider Trading and
Enforcement Shifts from Wall Street to K Street
By Catherine Botticelli, Jane Kanter, Adam Wasserman, and Sean Murphy
I
nsider trading remains a top priority for the Securities and Exchange Commission (SEC)
and Department of Justice (DoJ). In fiscal year 2012, the SEC filed 58 enforcement actions
against 131 individuals and entities and the DoJ charged and convicted dozens of indi-
viduals.1 The regulators continued their crackdown on hedge funds and their information
suppliers associated with expert networks, which began in 2010. Now, with the passage of the Stop
Trading on Congressional Knowledge Act (STOCK Act)2, we are experiencing déjà vu, as the law
has “teed up” a new category of experts – political intelligence firms – as the next source of potential
investigations and actions in an ever changing landscape of insider trading laws.
Ms. Botticelli and Mr. Wasserman are partners
in Dechert LLP’s White Collar and Securities
Litigation practice. Ms. Kanter is a partner, and
Mr. Murphy is an associate, in Dechert LLP’s
Financial Services Group.
2. THE INVESTMENT LAWYER 2
value of the information provided by politi-
cal intelligence firms, largely collected from
Washington insiders, is based on the realiza-
tion among market participants that decisions
in Washington can move markets. And, the
political intelligence industry is a lucrative
industry that is said to have doubled in size in
the past decade, which provides added induce-
ment for enforcement focus.5
The government recognizes that there are
many legitimate ways to utilize experts and
expert networks.6 And the same is certainly
true for political intelligence firms. However,
just as with expert networks, political intel-
ligence firms and the investors who use them
should be aware of the potential insider
trading issues raised by the use of politi-
cal intelligence and take steps to reduce
their regulatory risk. This is especially true
given that, going forward, the STOCK Act
potentially will provide an additional legal
basis for enforcement in circumstances where
the intelligence transmitted is improper
information.
I. The STOCK Act
The STOCK Act was signed into law on
April 4, 2012, and explicitly extends the pro-
hibitions on insider trading under the fed-
eral securities laws to members of Congress,
their congressional staff and other congres-
sional employees, certain executive branch
officials and their employees, and judicial
officers and their employees (covered pub-
lic officials).7 Although covered public offi-
cials were not previously exempt from insider
trading laws, the STOCK Act attempts to
eliminate any ambiguity with respect to
whether public servants may profit from
information they garner during the course
of their duties.
The STOCK Act amends Section 21A
of the Securities Exchange Act of 19348
(Exchange Act), to provide that covered public
officials9 owe “a duty arising from a relation-
ship of trust and confidence to the Congress,
the United States Government, and the citi-
zens of the United States with respect to mate-
rial, nonpublic information derived from such
person’s position….”10 Importantly, however,
the STOCK Act does not specifically identify
what information is subject to the duty of
trust and confidence and thus would create
liability if disclosed.
A. What Political Intelligence Might
Constitute Material Nonpublic
Information?
The scope of what information is sub-
ject to the duty under Section 21A of the
Exchange Act is certainly significant. For
example, would a member of Congress breach
the duty if he or she disclosed the mere intent
to support a particular bill? In this regard, the
STOCK Act instructed the Select Committee
on Ethics of the Senate (Senate Committee)
and the Committee on Ethics of the House of
Representatives (House Committee) to issue
interpretative guidance regarding the duties of
their members and employees.
1. Committee on Ethics of the House
of Representatives Guidance
The House Committee issued guidance
in April 2012 that advised House members
and their employees of their duties under the
STOCK Act.11 When identifying what infor-
mation might be considered material non-
public information, the House Committee’s
guidance referenced the House Committee’s
Rules Regarding Financial Transactions
(Rules),12 which generally state:
Material nonpublic information is any
information concerning a company,
security, industry or economic sector,
or real or personal property that is
not available to the general public and
which an investor would likely con-
sider important in making an invest-
ment decision. A good rule of thumb
to determine whether information may
be material nonpublic information
is whether or not the release of that
information to the public would have
an effect on the price of the security or
property.
Thus, it is important to note that mate-
rial nonpublic information need not relate
to a specific company or security. Rather,
3. Vol. 20, No. 12 • December 2013
3
according to the House Committee’s Rules
and guidance, material nonpublic information
can include information regarding industries
and economic sectors more generally.
The Rules note that much of the informa-
tion available during the legislative process,
such as information from public briefings
or hearings, is considered public informa-
tion. However, the guidance also suggests
that some information gained during the
course of government service may be mate-
rial nonpublic information, including, but
not limited to:
legislation and amendments prior to
their public introduction, information
from conference or caucus meetings
regarding votes or other issues, and
information learned in private brief-
ings from either the public or private
sector.13
This guidance may be viewed by some as
troubling as it is commonplace in Washington
for lawmakers, government officials and regu-
lators to “float” potential legislation and ideas
for potential legislation, rulemaking or pos-
sible political appointments prior to their pub-
lic introduction or official announcement. The
Rules, together with the guidance and obliga-
tions under the STOCK Act, suggest that
merely communicating information regarding
potential legislation may constitute a violation
of a covered public official’s duty.
2. Select Committee on Ethics
of the Senate Guidance
The Senate Committee issued guidance in
December 201214 and noted at the outset that:
[The STOCK Act] is not intended…to
chill legitimate communications made
in good faith between public officials
and their constituents, inhibit govern-
ment transparency, or otherwise hinder
the dissemination of public informa-
tion about government activities.
The Senate Committee’s guidance addition-
ally notes that obligations under the STOCK
Act apply to “information obtained in a
variety of circumstances, including informa-
tion received in a closed, nonpublic hearing;
information gathered during the confidential
stages of a committee investigation; and clas-
sified national security information.” This
guidance does not line up with the House
Committee guidance in that it does not spe-
cifically state that information about potential
legislation or amendments to legislation would
be considered material nonpublic informa-
tion, but instead focuses on information dis-
seminated during a proceeding or subject to
investigation where there would be an inherent
expectation of confidentiality.
B. Liability under the STOCK Act
The STOCK Act makes covered public
officials liable for breaching their duty, and
trading on or disclosing (that is, tipping),
certain material nonpublic information that
is revealed to them during the course of their
duties. Consequently, market participants
who trade after interacting with, and receiv-
ing information from, covered officials may
themselves face increased risk of enforcement
under the expanded insider trading regime.
1. Tippee Liability
The STOCK Act creates the potential for
new insider trading “tippee” liability for pri-
vate citizens and organizations that receive
material nonpublic information from covered
public officials who disclose such information
in violation of what is now an express statu-
tory duty of trust and confidence owed by
covered public officials with respect to mate-
rial nonpublic information to which they are
privy during the course of their duties.
Under traditional insider trading theories, a
market participant who receives material non-
public information (the “tippee”) would be
liable for trading on that material nonpublic
information when the tippee knows or should
have known that the person from whom he has
received the material nonpublic information
(the “tipper”) provided that information in
violation of a duty to the tipper’s source.
Because the STOCK Act clearly creates
a duty for covered public officials, should
such persons provide material nonpublic
4. THE INVESTMENT LAWYER 4
information to tippees in exchange for a per-
sonal benefit, traditional tipper/tippee prin-
ciples regarding what qualifies as a personal
benefit may well apply. The STOCK Act does
not define personal benefit and the threshold
for what may constitute personal benefit,
pursuant to prior case law, is extremely low.
Indeed, courts have found an inference of
a personal benefit based solely on the close
friendship between the tipper and the tippee,
and the “hypothetical benefits” that may have
been derived from it.15 This raises unique prob-
lems in the political context, where obtaining
goodwill is often a core part of an elected
official’s job.
2. Misappropriator Liability
An investor may be liable for trading on
material nonpublic information obtained from
a source when there is a relationship of trust
and confidence between the source and the
investor.16 In these situations, the source rea-
sonably expects, by implicit or explicit agree-
ment, that the client/investor will keep the
information provided confidential and will
not use the information for investment pur-
poses. Thus, market participants who trade
on material nonpublic information obtained
from covered public officials or political intel-
ligence firms may be subject to insider trading
liability based on the misappropriation theory
depending on the circumstances surrounding
their receipt of the material nonpublic infor-
mation, as well as their or their consultant’s
relationship with a covered public official. The
STOCK Act broadly asserts a covered public
official’s duty of trust and confidence and
thereby might arguably raise the inference that
a covered official would not disclose material
nonpublic information without a reciprocal
duty by the recipient to maintain the informa-
tion as confidential.
It is important to remember that the gov-
ernment will often look to whether a duty
was breached by the source of that informa-
tion and will argue that the breach taints any
additional disclosures down the chain. So,
if Congressman A gives material nonpublic
information to Lobbyist B, who provides the
information to Political Intelligence Firm C,
who then informs Trader D, the SEC and DoJ
may very well take the position that Trader D
should have known that the information came
to him or her in breach of a duty and thus may
be liable for insider trading.
C. Government Accountability Office
(GAO) Report17
The STOCK Act mandated that the
Comptroller General of the United States, in
consultation with the Congressional Research
Service, submit a report to Congress on the
role of political intelligence firms in the mar-
ketplace.18 The GAO was required to provide
findings on, among other items, the prevalence
of the sale of political intelligence, the effect
of political intelligence on financial mar-
kets, and the potential benefits of disclosure
requirements on those who engage in politi-
cal intelligence activities. On April 4, 2013,
the GAO issued the required report (Report),
which included the findings of a 12-month
study that interviewed regulators, individuals
at political intelligence firms, trade associa-
tions, law firms, financial services firms, and
advocacy organizations.
The Report highlights that currently there
are no specific laws or ethics rules that gov-
ern the business of political intelligence firms
in terms of the sale of political intelligence.
But, the Report does acknowledge that securi-
ties laws, including insider trading laws, and
executive and legislative branch ethics rules
do require covered political officials to protect
nonpublic information. The Report found that
the “prevalence of the sale of political intel-
ligence is not known and therefore is difficult
to quantify.”19 The Report notes that compen-
sation provided to political intelligence firms
is often not tied to either a particular source
or specific investment decision. Moreover, the
Report observes that “even when a connection
can be established between discrete pieces of
government and investment decisions, it is not
always clear whether such information could
be categorized as material…and whether such
information stemmed from public or nonpub-
lic sources at the time the information was
exchanged…”20
Responses from political intelligence firms
illustrate that “information is often bundled
and provided to clients with other information
5. Vol. 20, No. 12 • December 2013
5
such as research, opinions, and policy analy-
sis.”21 In addition, investors responded that
“investment decisions are most likely to be
based on an overall analysis of the political
climate and not necessarily on a single piece
of political intelligence.”22 As such, it may be
difficult for prosecutors (or the SEC’s enforce-
ment Staff) to clearly establish a connection
between the information provided by a politi-
cal intelligence firm to a client and a particular
investment decision by that client to a particu-
lar piece of material nonpublic information
from a covered public official.
The Report reviewed whether a disclosure
requirement for political intelligence firms
would be advantageous. However, the Report
side-steps the issue and simply suggests that
Congress should weigh the potential costs
and benefits of such a disclosure regime. Not
surprisingly, certain public advocacy groups
and the SEC were in support of the disclosure
regime and noted that it would add transpar-
ency and lead to investor protections. But, one
response from the SEC does suggest uncer-
tainty regarding the utility of a disclosure
regime to protect investors given the “pace
of market movements.”23 Other respondents
noted concerns regarding the restrictions on
anonymity of their clients, cost of enforce-
ments, restrictions on First Amendment rights,
and the potential “chilling effect” on commu-
nications between government officials, the
media and political intelligence firms.
Ultimately, the Report provided no rec-
ommendations in connection with its find-
ings. Nevertheless, the Report may provide
context for compliance professionals and
political intelligence firms when considering
policies and procedures to reduce enforcement
exposure.
II. Shifting Enforcement Focus:
Insider Trading Based on Political
Intelligence
The investigation of Height Securities and
a Washington lobbyist in connection with
the Medicare leak is objective evidence that
the SEC has its eye on political intelligence
firms and clients/investors that subscribe to
their services. It has been reported that the
SEC opened an insider trading investigation
and is reviewing trading in certain health
insurance stocks in the days leading up to a
policy change by the Centers for Medicare &
Medicaid Services. The concern is that certain
government employees and policy makers at
the Centers for Medicare & Medicaid Services
provided information to lobbyists and other
Washington insiders, who in turn provided the
information to political intelligence firms, like
Height Securities, who then provided infor-
mation to hedge funds and other Wall Street
traders – all before the actual policy decision
was effective and known to the public.
Such a chain of events may create the
appearance of impropriety by any number
of parties. However, before generating an
enforcement action, the traditional insider
trading questions must still be asked. For
example, was the information public? Recent
news reports have indicated that Height
Securities was not the only political intelli-
gence firm disseminating such information.24
Indeed, at least one other firm held a confer-
ence call discussing the policy decision. If such
information was widely shared, it could create
an inference that the information was not nec-
essarily “non-public” for the purposes of the
insider trading laws.
In light of the government’s scrutiny of
Height Securities, clients/investors should be
cognizant of whether information received
from a political intelligence firm, or simi-
lar service provider, was provided by a cov-
ered public official in violation of the duties
imposed by the STOCK Act with respect
to the dissemination of material nonpublic
information.25
III. Practical Considerations
and Protective Measures
To date, there have been no enforcement
actions under the STOCK Act.26 Nevertheless,
it is evident that the new law will have effects
on market participants, particularly those that
rely to any extent upon information obtained
from covered public officials, political intel-
ligence firms and lobbyists or consultants
providing information about legislation and
regulatory changes. Although the STOCK
Act does signify a new twist on insider
6. THE INVESTMENT LAWYER 6
trading regulation, the considerations of mar-
ket participants are not unlike traditional
considerations when analyzing insider trading
generally.
A. Duty
When analyzing insider trading issues, mar-
ket participants often focus on whether the
information is “material” and whether it is
“nonpublic.” However, in the expert network
investigations it appears that the first ques-
tion prosecutors have been asking is whether
the information was obtained in violation of
a duty. Under these circumstances, and as a
result of the STOCK Act, in order to properly
protect themselves, political intelligence firms
and their clients/investors also must focus on
the question of duty and understand that, if
there was arguably a duty violation, the gov-
ernment may discount even reasonable argu-
ments that the information was immaterial or
public.
The question of duty becomes more dif-
ficult the further away one gets from the origi-
nal source of the information. For example, a
client/investor who hires a political intelligence
consultant may not know that the information
was obtained by the consultant in violation of
an official’s duties. However, if the informa-
tion provided resulted in a monetary benefit to
the recipient, the client/investor should expect
that prosecutors may be quick to accuse the
client/investor (rightfully or wrongly) of will-
ful blindness if the government believes a duty
was breached.27
B. Public Information
Prior to executing a trade on the basis of
information from a covered public official
or a political intelligence firm, market par-
ticipants should consider whether the infor-
mation is in fact public. Here, the inquiry
generally should be whether the information
is already available to the investing public.
In answering this question, it is important to
remember that, in the United States, infor-
mation is “public” in the context of insider
trading if investors’ trading has caused the
information to be fully absorbed into the
price of the stock.
C. Materiality
Market participants must also consider
whether the information upon which they
are trading is material. In the political intel-
ligence context, this may be difficult to deter-
mine. For example, if a congressional staffer
remarks upon the general sentiments of one
member of Congress during a committee
meeting, there could be strong arguments
that it is not material information, given, for
example, that the information only reflects the
views of one Congressman out of many and
he could always change his mind. However,
information regarding a confidential meet-
ing of a group of influential members could
be material depending on the particular cir-
cumstances. Of course, materiality is often
inferred after the fact. In addition, while a
good defense attorney might be able to suc-
cessfully argue the materiality issue, prosecu-
tors may still assume that information bought
from consultants is material – otherwise why
would one pay for it?
D. Surrounding Circumstances
Prudent investors must also be aware of the
circumstances in which the information, which
they will potentially trade on, was obtained.
Here, it is important to consider whether the
information was disseminated by a covered
public official in furtherance of his or her
responsibilities as a public official and there-
fore not a breach of a duty, or, alternatively
whether the information was exchanged pur-
suant to a quid pro quo arrangement whereby
the covered public official would receive a
personal benefit. Such an arrangement could
result in a presumption that the information
obtained was material. Furthermore, clients/
investors should consider whether there is a
relationship of trust and confidence between
the direct recipient of the information and the
covered public official providing the informa-
tion that would imply that the information
exchanged was confidential and subject to
the covered public official’s duty with respect
to information obtained during the course of
his or her duties. Also, clients/investors should
assess whether the source knew that the infor-
mation would ultimately be used for trading
7. Vol. 20, No. 12 • December 2013
7
purposes. If this fact was concealed from the
covered public official, the government may
be more prone to argue that a duty owed to
the original source (that is, the covered public
official) had been violated.
E. Considerations for Advisors and Funds
Given the increased regulatory focus in this
area, if an adviser is engaging in business
with political intelligence firms or executing
trades based upon information received from
government sources, advisers should consider
exploring whether it makes sense for them
to undertake certain precautionary measures,
such as:
• Amending insider trading policies and pro-
grams and training to specifically cover the
STOCK Act and the use of political intel-
ligence firms, lobbyists and consultants;
• Putting provisions in contracts with politi-
cal intelligence firms that ensure such firms
will not provide material nonpublic infor-
mation obtained improperly or in violation
of a source’s duty;
• Informing political intelligence consul-
tants, prior to sharing information, that the
adviser anticipates using the information
obtained to trade and does not want mate-
rial nonpublic information or information
obtained in violation of a source’s duty;
• Requiring advisers or their investment per-
sonnel to obtain approval from the firm’s
compliance department before using the
services of political intelligence firms;
• Vetting political intelligence firms before
their use, including reviewing their policies
and procedures designed to protect against
the misuse of material nonpublic informa-
tion; and
• Implementing compliance reviews of the
adviser’s use of political intelligence firms.
F. Considerations for Political
Intelligence Firms
Although there is a regulatory spotlight
on political intelligence firms, the services
they provide in the marketplace do not per sé
violate federal securities laws. Nevertheless,
political intelligence firms that provide market
participants with information for the purposes
of investment should evaluate their relation-
ships with covered public officials and consider
whether it makes sense for them to take certain
other precautions to mitigate enforcement
exposure. Such precautions might include:
• Informing covered public officials from
whom they receive information that they act
as consultants and may provide the infor-
mation to clients/investors who may trade
upon the information;
• Implementing insider trading policies and
training programs that focus on, inter alia,
the meaning of material nonpublic informa-
tion in the political context and the duties
owed by and to covered public officials who
provide information and the STOCK Act;
• Implementing compliance reviews to check
that their insider trading policies are being
followed; and
• Requiring their employees to attest that
they will not seek material nonpublic infor-
mation or information that would violate a
source’s duty.
The insider trading enforcement environ-
ment is in a continuous state of flux. Not
only are the lines between what is proper and
improper blurry, but they are shifting. Thus,
it is important that firms remain vigilant in
evaluating what insider trading risks they are
facing and how they can mitigate those risks.
The proper use of political intelligence firms
can provide advisers with important infor-
mation and significant opportunities – but,
especially in today’s enforcement environment,
political intelligence must be used intelligently.
This means identifying, understanding, and
mitigating against insider trading risks posed
by using such information. We hope that this
article provides the tools to do so.
Notes
1. See “SEC Enforcement Actions: Insider Trading
Cases,” available at www.sec.gov/spotlight/insidertrading/
cases.shtml; Preet Bharara, Securities Fraud, available
at www.justice.gov/usao/briefing_room/fin/securities_fraud.
html.
2. STOCK Act, S.2038, 112th Cong. (2012).
3. See Tom McGinty, Brody Mullins & Jenny Strasburg,
“Stock Surge Linked to Lobbyist,” WALL ST. J.,
8. THE INVESTMENT LAWYER 8
Apr. 17, 2013, available at online.wsj.com/article/SB10001
424127887324345804578427102504475618.html; Dina El
Boghdady & Tom Hamburger, “SEC Subpoenas Firm,
Individuals in a Case of Leaked Information,” WALL
ST. J., May 1, 2013, available at articles.washingtonpost.
com/2013-05-01/business/38957569_1_sec-subpoena-the-
sec-law-firm.
4. According to the news article, the lobbyist in ques-
tion sent an email to Height Securities at 3:12 p.m. on
April 1. Subsequently, Height Securities sent a notice
to clients approximately half an hour later. Then, the
government decision by the Centers for Medicare &
Medicaid Services came out at approximately 4:30 p.m.
Jason Milliman, “Chuck Grassley Eyes Former Aide in
Medicare Advantage Leak,” POLITICO, Apr. 17, 2013,
available at http://www.politico.com/story/2013/04/grassley-
eyes-former-aides-role-in-market-intelligence-90197.html.
5. Jerry Markon & Jia Lynn Yang, “Intel for Investors:
What’s Going on Behind Closed Doors in Washington,”
WASH. POST, May 2, 2013, available at http://www.
washingtonpost.com/politics/political-intelligence-industry-in-
washington-under-scrutiny-amid-federal-inquiry/2013/05/02/
e284e08e-b364-11e2-9a98-4be1688d7d84_story.html?
hpid=z1.
6. See, e.g., “SEC Brings Expert Network Insider Trading
Charges - Moonlighting Employees Passed Company
Secrets to Hedge Funds and Others,” SEC Press Release
(pub. avail. Feb. 3, 2011) (stating, “While it’s legal to obtain
expert advice and analysis through expert networking
arrangements, it’s illegal to trade on material nonpublic
information obtained in violation of a duty to keep that
information confidential.”), available at http://www.sec.gov/
news/press/2011/2011-38.htm.
7. Momentum to pass the law began after a “60 Minutes”
exposé, and several related publications, reported that
members of Congress and hedge funds had profited off of
securities transactions based upon “political intelligence”
or inside information concerning pending legislation and
regulatory matters. See 60 Minutes: Insiders (CBS televi-
sion broadcast Nov. 13, 2011).
8. 15 U.S.C. 78u-1.
9. Covered officials and employees include: members
of Congress, employees of Congress, executive branch
employees, judicial officers and judicial employees. See
STOCK Act, §§ 2(1) – 2(7).
10. The STOCK ACT also extends the insider trading
prohibitions under the Commodity Exchange Act to cover
members of Congress and staff.
11. Staff of H. Comm. on Ethics, 112th Cong.,
Memorandum to all House Members, Officers and
Employees, New Ethics Requirements Resulting from the
STOCK Act (2012) available at http://ethics.house.gov/sites/
ethics.house.gov/files /Stock%20Act%20Pink%20Sheet.pdf.
12. Staff of H. Comm. on Ethics, 112th Cong.,
Memorandum to all House Members, Officers and
Employees, Rules Regarding Financial Transactions
(2011), available at http://ethics.house.gov/sites/ethics.house.
gov/files/fin%20trans%20pink%20sheet.pdf.
13. Id. at 3.
14. Staff of S. Comm. on Ethics, 112th Cong., Restrictions
on Insider Trading Under Securities Laws and Ethics
Rules, Dec. 4, 2012, available at http://www.ethics.senate.
gov/public/index.cfm /guidance?I D=409cd1e7-2f41-4e12-
8d19-32a4333b6367.
15. See, e.g., SEC v. Maio, 51 F.3d 623 (7th Cir. 1995); see
also, SEC v. Warde, 151 F.3d 42 (2d Cir. 1998).
16. 17 C.F.R. § 240.10b-5-2.
17. U.S. Gen. Accountability Office, Political Intelligence:
Financial Market Value of Government Information
Hinges on Materiality and Timing, Apr. 4, 2013 (GAO
Report), available at www.gao.gov/products/GAO-13-389.
18. STOCK Act, §7.
19. See GAO Report, supra n.17 at 2.
20. Id. at 9.
21. Id. at 8.
22. Id.
23. Id. at 16.
24. See Brody Mullins, “Health Policy Move Widely
Shared,” WALL ST. J., May 13, 2013, available at http://
online.wsj.com/article/SB1000142412788732403140457848
1461859150402.html.
25. It is worth noting that early versions of the STOCK
Act contained provisions that would require political
intelligence firms to register with the government and
provide certain information regarding their activities and
the names of clients. Although this requirement was not
adopted, after significant lobbying by financial services
firms seeking to protect their anonymity, the STOCK Act
charged the Government Accountability Office with the
responsibility of performing a study on political intelli-
gence firms. See S.2038.ES, 112th Cong. (2012), available
at www.gpo.gov/fdsys/pkg/BILLS-112s2038es/pdf/BILLS-
112s2038es.pdf.
26. Although no individuals have been charged with
violations of the STOCK Act, while the legislation was
being considered by Congress, House Financial Services
Committee Chairman Spencer Bachus was investigated
by the House’s Office of Congressional Ethics (OCE)
for possible insider trading. Media reports indicate that
the investigation focused on several short options traded
by Rep. Bachus in September 2008 subsequent to par-
ticipating in a confidential meeting with then Treasury
Secretary Henry Paulson and Federal Reserve Chairman
Benjamin Bernanke. Ultimately, OCE did not recommend
any enforcement. See Scott Higham and Dan Keating,
Published, “Rep. Spencer Bachus faces insider-trading
investigation,” Wash. Post, February 9, 2012, available
at www.washingtonpost.com/politics/2012/02/09/gIQA-
21Ui2Q_story.html.