The document discusses the SEC's "Broken Windows" enforcement policy, which aims to pursue even minor violations of securities laws in order to prevent larger issues. The policy is based on a similar policing strategy used in New York City in the 1990s. The document analyzes whether Broken Windows truly represents a significant change for the SEC, concluding that it has mainly intensified existing enforcement elements. It advises compliance professionals to remain vigilant in monitoring their organizations but not to overreact, as the SEC is continuing its historical role rather than adopting a wholly new approach.
The document summarizes findings from a study examining how three large English metropolitan police forces handle allegations of discrimination from the public. Key findings include: 1) Only 94 of 170 complaints from the public were investigated and none of the discrimination allegations were upheld, compared to over half when raised by other officers or parties; 2) Complaints handling at the local level by officers is generally poor quality compared to specialist professional standards departments; 3) Officers receive insufficient training on handling discrimination allegations, especially those involving perceptions rather than overt behavior. Overall, the report finds discrimination complaints from the public are poorly handled from start to finish across the forces examined.
The document provides an overview of what investment advisory firms can expect from a Securities and Exchange Commission (SEC) examination. It discusses the SEC's National Examination Program and types of exams, including presence exams. The key areas of focus for presence exams are conflicts of interest, marketing/performance, portfolio management, custody, and valuation. Recent SEC enforcement actions and common deficiency themes are also reviewed. The document outlines the exam process, from initial notification to the post-onsite period. It concludes with a high-level review of the SEC's examination priorities for 2014.
Cordium's Annual Regulatory Forum full presentation 2014 Cordium
This document provides an overview of an upcoming regulatory forum on what lies ahead in regulation.
The first section summarizes the agenda, including presentations on SEC exams, the UK regulatory agenda, and using alternative investment funds.
The second section discusses what to expect from SEC exams, including the document production process, timing, onsite visits, and follow up. It emphasizes being prepared, having proper documentation, and promptly addressing any issues identified.
The third section reviews the SEC's 2014 examination priorities, including fraud prevention, conflicts of interest, technology risks, and never-before examined advisors. Safety of assets and custody is noted as the top core risk area.
2013 sec systemic report using initial form pf dataSeth Berlin
The document summarizes data reported to Congress by the SEC's Division of Investment Management on private funds. It discusses the sources and uses of the data, including Form PF and Form ADV filings. The data is used by the Financial Stability Oversight Council, International Organization of Securities Commissions, and other SEC divisions for analytical tools and assessing aberrational fund performance. Charts show breakdowns of fund type, advisor location, fund domicile, liquidity, and redemption policies.
Technology plays both a facilitating and mitigating role in money laundering risks. On one hand, technology enables new methods of money laundering like through electronic currencies and online banking. On the other hand, financial institutions rely on technology like transaction monitoring software to comply with anti-money laundering regulations and identify suspicious transactions. However, software alone is not a complete solution and well-trained staff are still needed to analyze transactions. New technologies also pose challenges as money laundering risks can change, and rules trying to define what constitutes suspicious activity can sometimes be abstract.
Review of SEC Enforcement Developments In 2014asianextractor
The document summarizes developments in the SEC's enforcement program in 2014 and areas of continued focus in 2015. Key points include:
1) The SEC has adopted an aggressive "broken windows" approach to enforcement, focusing on even minor violations to deter larger ones. However, some commissioners have criticized this approach as misusing limited resources.
2) The SEC has increased its use of administrative proceedings, allowing it to avoid federal courts and secure more favorable outcomes. However, this has raised criticisms about fairness and developing case law.
3) The SEC has emphasized individual culpability and prosecuting corporate "gatekeepers" like compliance officers and accountants to increase deterrence.
4) The SEC has eroded
This seminar report discusses automatic number plate recognition (ANPR) technology. It provides background on number plates and their use by law enforcement. ANPR systems use cameras and optical character recognition to capture images of license plates, extract the plate numbers, and compare them to databases to identify vehicles of interest in seconds. The report covers the process of ANPR including pre-processing, plate localization, character segmentation, and character recognition. It also discusses types and applications of ANPR systems and their advantages for law enforcement.
The document summarizes findings from a study examining how three large English metropolitan police forces handle allegations of discrimination from the public. Key findings include: 1) Only 94 of 170 complaints from the public were investigated and none of the discrimination allegations were upheld, compared to over half when raised by other officers or parties; 2) Complaints handling at the local level by officers is generally poor quality compared to specialist professional standards departments; 3) Officers receive insufficient training on handling discrimination allegations, especially those involving perceptions rather than overt behavior. Overall, the report finds discrimination complaints from the public are poorly handled from start to finish across the forces examined.
The document provides an overview of what investment advisory firms can expect from a Securities and Exchange Commission (SEC) examination. It discusses the SEC's National Examination Program and types of exams, including presence exams. The key areas of focus for presence exams are conflicts of interest, marketing/performance, portfolio management, custody, and valuation. Recent SEC enforcement actions and common deficiency themes are also reviewed. The document outlines the exam process, from initial notification to the post-onsite period. It concludes with a high-level review of the SEC's examination priorities for 2014.
Cordium's Annual Regulatory Forum full presentation 2014 Cordium
This document provides an overview of an upcoming regulatory forum on what lies ahead in regulation.
The first section summarizes the agenda, including presentations on SEC exams, the UK regulatory agenda, and using alternative investment funds.
The second section discusses what to expect from SEC exams, including the document production process, timing, onsite visits, and follow up. It emphasizes being prepared, having proper documentation, and promptly addressing any issues identified.
The third section reviews the SEC's 2014 examination priorities, including fraud prevention, conflicts of interest, technology risks, and never-before examined advisors. Safety of assets and custody is noted as the top core risk area.
2013 sec systemic report using initial form pf dataSeth Berlin
The document summarizes data reported to Congress by the SEC's Division of Investment Management on private funds. It discusses the sources and uses of the data, including Form PF and Form ADV filings. The data is used by the Financial Stability Oversight Council, International Organization of Securities Commissions, and other SEC divisions for analytical tools and assessing aberrational fund performance. Charts show breakdowns of fund type, advisor location, fund domicile, liquidity, and redemption policies.
Technology plays both a facilitating and mitigating role in money laundering risks. On one hand, technology enables new methods of money laundering like through electronic currencies and online banking. On the other hand, financial institutions rely on technology like transaction monitoring software to comply with anti-money laundering regulations and identify suspicious transactions. However, software alone is not a complete solution and well-trained staff are still needed to analyze transactions. New technologies also pose challenges as money laundering risks can change, and rules trying to define what constitutes suspicious activity can sometimes be abstract.
Review of SEC Enforcement Developments In 2014asianextractor
The document summarizes developments in the SEC's enforcement program in 2014 and areas of continued focus in 2015. Key points include:
1) The SEC has adopted an aggressive "broken windows" approach to enforcement, focusing on even minor violations to deter larger ones. However, some commissioners have criticized this approach as misusing limited resources.
2) The SEC has increased its use of administrative proceedings, allowing it to avoid federal courts and secure more favorable outcomes. However, this has raised criticisms about fairness and developing case law.
3) The SEC has emphasized individual culpability and prosecuting corporate "gatekeepers" like compliance officers and accountants to increase deterrence.
4) The SEC has eroded
This seminar report discusses automatic number plate recognition (ANPR) technology. It provides background on number plates and their use by law enforcement. ANPR systems use cameras and optical character recognition to capture images of license plates, extract the plate numbers, and compare them to databases to identify vehicles of interest in seconds. The report covers the process of ANPR including pre-processing, plate localization, character segmentation, and character recognition. It also discusses types and applications of ANPR systems and their advantages for law enforcement.
The real cost of KYC & AML compliance for the financial sector - OndatoOndato
In this report, Ondato explores:
Compliance cost
Budget allocation
Non-compliance penalties
How KYC affects banks’ customers
A solution that cuts costs while maintaining compliance
Source: https://ondato.com/reports/the-real-cost-of-kyc-aml-compliance-for-the-financial-sector/
The real cost of KYC & AML compliance for the financial sector - Ondato.pdfNehmeh Taouk elMeaaz
The document discusses the real costs of KYC (Know Your Customer) and AML (Anti-Money Laundering) compliance for financial institutions. It finds that major European banks spend on average €14,250,000 per year on AML-related costs, with 40% (€5.7 million) spent specifically on KYC compliance. Banks employ an average of 77 KYC officers and spend €17,008 per day on labor costs for these specialists. While technology could help automate and streamline compliance work, most banks only allocate 26% of their KYC budgets to technological solutions. The cost of non-compliance, through regulatory penalties, is estimated to be much higher at $14
OFAC Name Matching and False-Positive Reduction TechniquesCognizant
Exploration of Office of Foreign Asset Control (OFAC) compliance and strategies to avoid false positives (and negatives), covering watch lists such as specially designated nationals (SDN), customer due diligence,data mining, probabilistic techniques and anti-money-laundering (AML) software.
Money Laundering and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...Resurgent India
In an effort to detect potential money laundering schemes, financial institutions have deployed anti-money laundering (AML) detection solutions and enterprise-wide procedural programs.
The document summarizes five ways the SEC Enforcement Division has strengthened enforcement efforts and how these changes may affect individuals and companies. The SEC has established specialized investigative units focused on areas like market abuse, structured products, and foreign corrupt practices. It has also streamlined management, improved intake of tips and complaints, and begun using cooperation agreements to encourage cooperation from individuals and companies under investigation.
AMLsys enables reporting entities Anti Money Laundering (AML) regulations compliance in an easy, effective and economical way by providing know your customer (KYC) and due diligence mapping, auditing, scoring, reporting and other tools.
SRPc Post COVID-19 Futures Scenarios for Payment Processing Marminio77
The document summarizes the findings of a futures scenarios assessment conducted by the Secure Remote Payment Council to understand the most pressing issues the payment industry will need to address once the COVID-19 quarantine is lifted. Industry experts were interviewed and scored 11 potential futures scenarios on probability of occurrence and impact. The top 5 scenarios identified were accelerated deployment of contactless payments, growth in online fraud, tightening of underwriting standards, new user authentication methods, and customers' increased reliance on digital payment channels. The report provides analysis of each scenario and recommendations for payment industry stakeholders.
The document discusses how corporations can use data analytics to detect fraud through analyzing large volumes of transaction data. It describes three common techniques used: distribution analysis, which looks for anomalies compared to statistical norms like Benford's Law; correlation analysis, which identifies anomalies in cause-and-effect relationships; and scenario testing, which simulates how fraudsters may exploit control weaknesses. While useful, data analytics techniques have limitations, and fighting fraud ultimately relies on increasing the probability of detecting abnormal transactions through these types of sophisticated analyses.
The document discusses the introduction of the EU Damages Directive, which aims to facilitate private damages actions for breaches of competition law. The key objectives of the Directive are to ensure that victims of anticompetitive practices can effectively claim damages in national courts or through settlements, and to enhance the relationship between public enforcement by competition authorities and private enforcement through damages actions. The Directive is meant to balance supporting private actions while still protecting elements of public enforcement like leniency programs. It is part of efforts to increase private enforcement of competition law as a complement to the limited resources of authorities.
Anti bribery and-corruption_the_good_the_bad_and_the_uglyBarrett_Mackey
The document discusses antibribery and corruption compliance. It begins by outlining the increasing regulatory burden and fines for noncompliance. It then emphasizes the importance of strong internal controls, transaction monitoring, and oversight to prevent issues and have an effective compliance program. The document concludes by describing how the Oversight Systems solution helps organizations meet compliance obligations through continuous transaction monitoring and analytics.
This document discusses the potential benefits and concerns of implementing a body-worn camera system for the Prince George's County Police Department. Some key benefits discussed include improving police accountability, reducing public complaints against officers, and assisting in criminal prosecutions. However, there are also concerns around issues like privacy, data storage costs, and impacts on officer and community relationships. The document recommends a pilot program to evaluate the real-world impacts in these areas before a full implementation.
The document summarizes requirements for companies related to reporting on conflict minerals originating from the Democratic Republic of Congo and surrounding countries. Key points:
- The SEC rule requires publicly traded companies to report on conflict minerals like tin, tantalum, and tungsten used in their products.
- Companies must conduct due diligence on their supply chains to determine if conflict minerals originate from covered countries. Additional reporting and auditing is required if they do originate from those areas.
- Industry groups have developed tools and templates to help companies comply with reporting requirements and identify conflict-free smelters and refiners. Collaborating with suppliers like contract manufacturers can also help companies meet requirements.
Conflict Minerals: Understanding Dodd-Frank 1502 and Its Affect on Your Suppl...Optimum Design Associates
On August 22, 2012 the Securities and Exchange Commission (SEC) adopted a new rule pursuant to Section 1502 of the Dodd-Frank Wall Street Reform and Consumer Protection Act that requires publicly-traded companies in the United States to report the use of “Conflict Minerals”. Under the rule, Conflict Minerals are cassiterite, columbite-tantalite, gold woframite and their derivatives which have been limited to tantalum, tin and tungsten (collectively known as the 3Ts), that are sourced from mines in the Democratic Republic of the Congo (DRC) or surrounding countries (collectively known as the “Covered Countries”.)
While the reporting requirements only apply to publicly traded companies, it also impacts any company supplying a company that is required to report since publicly-traded companies are requiring their suppliers to support their due diligence efforts.
This paper looks at Conflict Minerals regulations from the perspective of a company in the electronics manufacturing services (EMS) in terms of the processes necessary to support disclosure requirements and the likely support services needed over time.
For more whitepapers and articles on PCBA design and manufacturing, visit http://blog.optimumdesign.com
The document provides instructions for creating an account and submitting assignment requests on the HelpWriting.net website. It outlines a 5-step process: 1) Create an account with an email and password. 2) Complete a form with assignment details, sources, and deadline. 3) Review bids from writers and choose one based on qualifications. 4) Review the completed paper and authorize payment. 5) Request revisions to ensure satisfaction, with a full refund option for plagiarized work. The process aims to match clients with qualified writers to meet assignment needs.
This document discusses the evolution of single window systems for international trade over the past 10 years. It begins by describing the initial concept of a single window as a means to streamline paper-based trade documentation processes. It notes that single windows have increasingly been implemented using information and communication technologies. The document also explains that single windows often do not involve coordinating all relevant government agencies due to political challenges. It provides an overview of different forms single windows have taken, trends in their use across world regions, and common objectives and lessons learned from their implementation.
This document discusses mapping corruption risks in water licensing processes in Kazakhstan. It begins by explaining why water licensing is important for water resource management as licenses determine access to and use of water. It then discusses why mapping corruption risks in licensing is useful for reform efforts.
The document outlines the methodology used to map risks in Kazakhstan which involved interviews and observations. It identifies four main risk areas in Kazakhstan's licensing system: the application process, license content, bidding procedures, and enforcement.
Finally, it discusses lessons learned around using corruption risk mapping to inform policy and the importance of monitoring integrity indicators over time to evaluate risk areas.
Fraud Management_CAS_Presentation_Oct2016Mark Jones
1. The presentation discusses insurance fraud management and how companies can improve their fraud detection approaches. It provides examples of insurance fraud cases and statistics on the growing costs of fraud.
2. It outlines how companies currently manage fraud through special investigations units (SIUs) but notes challenges with justifying the costs. The presentation proposes three opportunities to create greater value: improving claims and SIU technology, outsourcing SIUs, and developing new analytical approaches.
3. It demonstrates how machine learning and other advanced analytics can be used in various stages of the fraud management process from detection to investigation to quantification. Combining human and machine intelligence through continuous learning is presented as a way to improve fraud management outcomes.
Anti-Bribery and Corruption Compliance for Third PartiesDun & Bradstreet
In this white paper, Kelvin Dickenson, Managing Director of D&B Global Compliance Solutions, discusses thoughtful approaches to buidling a scalable, effective and proportionate anti-corruption program for third-party due dilligence.
More Related Content
Similar to SEC Broken Windows Enforcement Policy - Is There Anything New Here
The real cost of KYC & AML compliance for the financial sector - OndatoOndato
In this report, Ondato explores:
Compliance cost
Budget allocation
Non-compliance penalties
How KYC affects banks’ customers
A solution that cuts costs while maintaining compliance
Source: https://ondato.com/reports/the-real-cost-of-kyc-aml-compliance-for-the-financial-sector/
The real cost of KYC & AML compliance for the financial sector - Ondato.pdfNehmeh Taouk elMeaaz
The document discusses the real costs of KYC (Know Your Customer) and AML (Anti-Money Laundering) compliance for financial institutions. It finds that major European banks spend on average €14,250,000 per year on AML-related costs, with 40% (€5.7 million) spent specifically on KYC compliance. Banks employ an average of 77 KYC officers and spend €17,008 per day on labor costs for these specialists. While technology could help automate and streamline compliance work, most banks only allocate 26% of their KYC budgets to technological solutions. The cost of non-compliance, through regulatory penalties, is estimated to be much higher at $14
OFAC Name Matching and False-Positive Reduction TechniquesCognizant
Exploration of Office of Foreign Asset Control (OFAC) compliance and strategies to avoid false positives (and negatives), covering watch lists such as specially designated nationals (SDN), customer due diligence,data mining, probabilistic techniques and anti-money-laundering (AML) software.
Money Laundering and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...Resurgent India
In an effort to detect potential money laundering schemes, financial institutions have deployed anti-money laundering (AML) detection solutions and enterprise-wide procedural programs.
The document summarizes five ways the SEC Enforcement Division has strengthened enforcement efforts and how these changes may affect individuals and companies. The SEC has established specialized investigative units focused on areas like market abuse, structured products, and foreign corrupt practices. It has also streamlined management, improved intake of tips and complaints, and begun using cooperation agreements to encourage cooperation from individuals and companies under investigation.
AMLsys enables reporting entities Anti Money Laundering (AML) regulations compliance in an easy, effective and economical way by providing know your customer (KYC) and due diligence mapping, auditing, scoring, reporting and other tools.
SRPc Post COVID-19 Futures Scenarios for Payment Processing Marminio77
The document summarizes the findings of a futures scenarios assessment conducted by the Secure Remote Payment Council to understand the most pressing issues the payment industry will need to address once the COVID-19 quarantine is lifted. Industry experts were interviewed and scored 11 potential futures scenarios on probability of occurrence and impact. The top 5 scenarios identified were accelerated deployment of contactless payments, growth in online fraud, tightening of underwriting standards, new user authentication methods, and customers' increased reliance on digital payment channels. The report provides analysis of each scenario and recommendations for payment industry stakeholders.
The document discusses how corporations can use data analytics to detect fraud through analyzing large volumes of transaction data. It describes three common techniques used: distribution analysis, which looks for anomalies compared to statistical norms like Benford's Law; correlation analysis, which identifies anomalies in cause-and-effect relationships; and scenario testing, which simulates how fraudsters may exploit control weaknesses. While useful, data analytics techniques have limitations, and fighting fraud ultimately relies on increasing the probability of detecting abnormal transactions through these types of sophisticated analyses.
The document discusses the introduction of the EU Damages Directive, which aims to facilitate private damages actions for breaches of competition law. The key objectives of the Directive are to ensure that victims of anticompetitive practices can effectively claim damages in national courts or through settlements, and to enhance the relationship between public enforcement by competition authorities and private enforcement through damages actions. The Directive is meant to balance supporting private actions while still protecting elements of public enforcement like leniency programs. It is part of efforts to increase private enforcement of competition law as a complement to the limited resources of authorities.
Anti bribery and-corruption_the_good_the_bad_and_the_uglyBarrett_Mackey
The document discusses antibribery and corruption compliance. It begins by outlining the increasing regulatory burden and fines for noncompliance. It then emphasizes the importance of strong internal controls, transaction monitoring, and oversight to prevent issues and have an effective compliance program. The document concludes by describing how the Oversight Systems solution helps organizations meet compliance obligations through continuous transaction monitoring and analytics.
This document discusses the potential benefits and concerns of implementing a body-worn camera system for the Prince George's County Police Department. Some key benefits discussed include improving police accountability, reducing public complaints against officers, and assisting in criminal prosecutions. However, there are also concerns around issues like privacy, data storage costs, and impacts on officer and community relationships. The document recommends a pilot program to evaluate the real-world impacts in these areas before a full implementation.
The document summarizes requirements for companies related to reporting on conflict minerals originating from the Democratic Republic of Congo and surrounding countries. Key points:
- The SEC rule requires publicly traded companies to report on conflict minerals like tin, tantalum, and tungsten used in their products.
- Companies must conduct due diligence on their supply chains to determine if conflict minerals originate from covered countries. Additional reporting and auditing is required if they do originate from those areas.
- Industry groups have developed tools and templates to help companies comply with reporting requirements and identify conflict-free smelters and refiners. Collaborating with suppliers like contract manufacturers can also help companies meet requirements.
Conflict Minerals: Understanding Dodd-Frank 1502 and Its Affect on Your Suppl...Optimum Design Associates
On August 22, 2012 the Securities and Exchange Commission (SEC) adopted a new rule pursuant to Section 1502 of the Dodd-Frank Wall Street Reform and Consumer Protection Act that requires publicly-traded companies in the United States to report the use of “Conflict Minerals”. Under the rule, Conflict Minerals are cassiterite, columbite-tantalite, gold woframite and their derivatives which have been limited to tantalum, tin and tungsten (collectively known as the 3Ts), that are sourced from mines in the Democratic Republic of the Congo (DRC) or surrounding countries (collectively known as the “Covered Countries”.)
While the reporting requirements only apply to publicly traded companies, it also impacts any company supplying a company that is required to report since publicly-traded companies are requiring their suppliers to support their due diligence efforts.
This paper looks at Conflict Minerals regulations from the perspective of a company in the electronics manufacturing services (EMS) in terms of the processes necessary to support disclosure requirements and the likely support services needed over time.
For more whitepapers and articles on PCBA design and manufacturing, visit http://blog.optimumdesign.com
The document provides instructions for creating an account and submitting assignment requests on the HelpWriting.net website. It outlines a 5-step process: 1) Create an account with an email and password. 2) Complete a form with assignment details, sources, and deadline. 3) Review bids from writers and choose one based on qualifications. 4) Review the completed paper and authorize payment. 5) Request revisions to ensure satisfaction, with a full refund option for plagiarized work. The process aims to match clients with qualified writers to meet assignment needs.
This document discusses the evolution of single window systems for international trade over the past 10 years. It begins by describing the initial concept of a single window as a means to streamline paper-based trade documentation processes. It notes that single windows have increasingly been implemented using information and communication technologies. The document also explains that single windows often do not involve coordinating all relevant government agencies due to political challenges. It provides an overview of different forms single windows have taken, trends in their use across world regions, and common objectives and lessons learned from their implementation.
This document discusses mapping corruption risks in water licensing processes in Kazakhstan. It begins by explaining why water licensing is important for water resource management as licenses determine access to and use of water. It then discusses why mapping corruption risks in licensing is useful for reform efforts.
The document outlines the methodology used to map risks in Kazakhstan which involved interviews and observations. It identifies four main risk areas in Kazakhstan's licensing system: the application process, license content, bidding procedures, and enforcement.
Finally, it discusses lessons learned around using corruption risk mapping to inform policy and the importance of monitoring integrity indicators over time to evaluate risk areas.
Fraud Management_CAS_Presentation_Oct2016Mark Jones
1. The presentation discusses insurance fraud management and how companies can improve their fraud detection approaches. It provides examples of insurance fraud cases and statistics on the growing costs of fraud.
2. It outlines how companies currently manage fraud through special investigations units (SIUs) but notes challenges with justifying the costs. The presentation proposes three opportunities to create greater value: improving claims and SIU technology, outsourcing SIUs, and developing new analytical approaches.
3. It demonstrates how machine learning and other advanced analytics can be used in various stages of the fraud management process from detection to investigation to quantification. Combining human and machine intelligence through continuous learning is presented as a way to improve fraud management outcomes.
Anti-Bribery and Corruption Compliance for Third PartiesDun & Bradstreet
In this white paper, Kelvin Dickenson, Managing Director of D&B Global Compliance Solutions, discusses thoughtful approaches to buidling a scalable, effective and proportionate anti-corruption program for third-party due dilligence.
Similar to SEC Broken Windows Enforcement Policy - Is There Anything New Here (20)
Anti-Bribery and Corruption Compliance for Third Parties
SEC Broken Windows Enforcement Policy - Is There Anything New Here
1. 1
The SEC’s Broken Windows Enforcement Policy: Is there Anything New Here?
Denver G. Edwards
Summary: This article examines the Commission’s Broken Windows enforcement program and whether it
should change how compliance professionals think about carrying out their duties. Historically, the
Commission has been perceived as monitoring all areas of the securities markets. Broken Windows does not
appear to be a significant shift. Instead, Broken Windows has intensified existing elements of the
Commission’s enforcement program. Compliance personnel need not overreact to the Commission
rebranding as the tough cop on the beat, but they should remain vigilant of business practices within their
organizations, leverage technology to monitor their organization’s commercial activities, and think creatively
about where and how violations may occur.
In the early 1990s, if you drove a car in New York City and were lucky, men carrying squeegees sprayed water
on your windshield and demanded a tip. If you were unlucky, squeegee men, as there were known, merely
spat on your windshield, wiped it off with a dirty rag, and then demanded a tip. Subway cars were “tagged”
with graffiti and riders felt unsafe. Prostitution and peep shows littered Times Square, and up the street in
Bryant Park, the drug trade flourished.
Former Mayor Rudy Giuliani and Police Commissioner Bill Bratton adopted a policing strategy in 1994 known
as “Broken Windows” to combat “quality of life crimes.” The theory is that “when a window is broken and
someone fixes it, it is a sign that disorder will not be tolerated. But, when a window is not fixed, it is a signal
that no one cares, and so breaking more windows cost nothing.” Broken Windows aimed to avoid an
environment of disorder that would encourage more serious crimes to flourish and to send a message of law
and order. No infraction was too small to be uncovered and punished.
New York is markedly better today than it was in 1994. The squeegee-men have been banished. Subway
cars are clean and safe day or night. Times Square is home to “Good Morning America,” and Bryant Park
hosts New York Fashion Week in the fall and movie screenings in the summer.
Securities and Exchange Chairwoman, Mary Jo White, was the United States Attorney for the Southern District
of New York from 1993 through 2002, and she witnessed New York’s transformation under Broken Windows.
Chair White has sought to adapt the Broken Windows approach to regulation of the securities market.
In speech on October 9, 2013, Chair White said that the Commission’s enforcement program intends to be
perceived as being “everywhere, pursuing all types of violation of federal securities law, big and small.”
“Even the smallest infractions have victims, and the smallest infractions are very often just the first step
toward bigger ones,” which “can foster a culture where laws are increasingly treated as toothless guidelines.”
The Commission will be a strong cop on the beat and the Division of Enforcement will pursue not just the
biggest frauds, but also violations such as control failures, negligence based offenses and strict liability
offenses where intent is not required.
The Broken Windows Enforcement Program
The Broken Windows enforcement program is comprised of five elements:
Streamline collaboration with the Department of Justice, Financial Industry Regulatory Authority
(FINRA), and state securities regulators;
Target gatekeepers;
2. 2
Leverage the Office of Compliance Inspections and Examinations (OCIE) to understand and monitor
the latest risks and to provide effective oversight;
Incentivize whistleblowers to report wrongdoing; and
Marshal technology to analyze data efficiently.
Each of the first four elements has been a constant feature of the Commission’s enforcement regime. The
Commission routinely works with the Department of Justice to conduct parallel investigations, as evidenced
by recent insider trading investigations. Similarly, the Commission works with SROs, such as FINRA, to
conduct “sweeps” to target industry-wide behaviors that are detrimental to investors and could jeopardize
the integrity of the financial markets. The Commission collaborates with the North American Securities
Administrators Association and state securities regulators to get intelligence on developments in state
securities markets so that it can target issues before they become systemic problems.
The Commission has increasingly targeted “gatekeepers,” including attorneys and accountants since passage
of the Sarbanes-Oxley Act (SOX), and more recently it has targeted broker-dealers who violate the market
access rule.
OCIE has been the Commission’s “boots on the ground” to monitor risks posed by registrants since its
creation in May 1995. OCIE has been a source of referrals for the Division of Enforcement since its inception.
A key difference today, however, is that OCIE examiners specialize in discrete areas and are able to better
understand the businesses they are examining, and the Division of Enforcement now values investigating and
bringing non-fraud enforcement actions as it does bringing insider trading cases.
The Commission’s whistleblower bounty program has been effective since enactment of the Insider Trading
and Securities Enforcement Act of 1988, which mandated payments for tips reporting insider trading. The
Dodd-Frank Wall Street and Consumer Protection Act (Dodd-Frank) provides a 10% - 30% bounty for
reporting violations of the securities laws in SEC or CFTC enforcement actions that result in monetary
sanctions greater than $1 million.
The Commission’s investment in technology is the new feature of its enforcement program and may have the
most significant impact on broker-dealer compliance functions. The Commission created the Center for Risk
and Quantitative Analytics (CRQA) with a mandate to develop quantitative methods to monitor signs of
potential wrongdoing and high risk behaviors. CRQA will feed its findings to the Division of Enforcement to
investigate and prevent conduct that harm investors. The Commission has also developed the Advanced
Bluesheet Analysis Program to analyze relationship among market participants to identify suspicious trading
which may not be readily apparent. It also uses predictive analyses to spot trends, identify aberrational
performance, and analyze data from new data sources, such as Form PF. On the examination side, the
National Examination Analytics Tool (NEAT) enables the examiners to analyze millions of transaction
documents accurately within a short time, and enables OCIE to do more precise and sophisticated
examination.
More information about the long-term effectiveness of the Commission’s analytics tools is needed. Based on
recent releases from the Commission, the tools are working as intended, and have increased the
Commission’s ability to devise sophisticated surveillances of broker-dealer activities. For example, the Staff
conducts link analyses, which looks for relationship between two disparate data sources, in insider trading
cases. Link analysis has been used to analyze phone records and trading data to determine if two suspects
had a phone call with the same person. In another example, the Staff has used link analysis to analyze large
volumes of brokerage firm data to identify instances when a corporation allegedly purchased and sold its own
stock, with no significant gain or loss, to create fictitiously high trading volume in order to obtain bank
financing. The Staff has also used analytics to detect aberrational performance of a hedge fund that
3. 3
fraudulently claimed it performed better than its peers throughout good and bad markets. These analyses
use to take the Staff weeks or months to perform and were subject to human error. Today, these analyses can
be completed within days. As a result of the Commission’s zero-tolerance for technical violations or control
failures, and their willingness to bring enforcement actions for non-fraud cases, compliance officers will need
to rethink how they fulfill their roles to protect their institutions.
Broken Windows Presents Opportunities for Compliance
Broken Windows presents two potential opportunities for compliance: (1) a chance for more assertiveness
with business units in instituting rigorous controls and testing those controls more frequently; and (2) an
opening to negotiate for more resources to respond to the regulatory environment and greater cooperation
from other areas of the firm.
Broker-dealers are required by statute/regulations to have written supervisory policies and procedures
(WSPs) regarding their activities. Compliance is a partner to a firm’s business units. However, the goal of the
firm is to make money for clients, shareholders and employees, and onerous and overly restrictive WSPs may
be perceived as limiting legitimate commercial activities for which buy-in from business units is necessary.
Broken Windows presents an opportunity to tighten existing WSPs to limit supervisory gaps, require
increased cooperation between compliance personnel and line supervisors, offer more training on codes of
conduct and ethics for employees and management, and obtain more certifications or attestations regarding a
supervisor’s fulfilling his or her supervisory obligation.
Moreover, Broken Window policies may help compliance obtain more resources and organizational support.
Currently, compliance initiatives are balanced against interests of the firm, including for example, technology
and operations projects that drive the firm’s commercial success. Compliance can cite penalties/fines as
evidence of the Commission’s aggressive approach to demonstrate that lack of resources, including personnel
or proper technology, create enterprise-wide legal, regulatory, and reputational risks that may have far-
reaching consequences for clients, counterparties, shareholders, and may cause personal liability to
supervisors and management.
The intensity around the Broken Windows enforcement policy arms compliance with tools to make the case
to employees to report violations to compliance in order for the organization to avoid regulatory scrutiny,
fines, and penalties. Compliance must balance encouraging employees to report violations internally while
not undermining the employee’s right (and perhaps the Commission’s expectation) to report securities
violations externally. As a starting point, compliance could appeal to the shared responsibility of each
employee to root out bad actors that violate the securities laws, jeopardize investors, and threaten the
integrity of the market. It could also promote methods within the organization to facilitate reporting
violations, such as toll-free hotlines, an ombudsman position, anonymous e-mail websites to accept tips, and
drop-boxes to submit tips regarding violations.
Without suggesting employees should not report externally, compliance could point out to employees that
reporting outside (1) does not guarantee an award due to the high threshold (voluntarily providing original
information and $1 million sanction), and (2) may have an impact on the organization. For example, in fiscal
year 2014, the Commission received 3620 tips of which 139 (3.8%) received the designation of Notice of
Covered Action (“NoCA”) and therefore eligible for an award. Since the inception of the program in August
2011, only 5.6% of tips (570 out of 10,193) have received the NoCA designation. The impact of non-
qualifying tips include business disruption, lost productivity, costs to retain legal counsel to defend against
regulatory investigations, and potential damage the firm’s reputation, and client or counterparty
relationships. Compliance should reiterate to employees that external reporting remains an option if the
4. 4
employee reports a violation internally to a designated person and the violation is not addressed timely. This
approach balances the firm’s goal of operating in an efficient, ethical and commercially reasonable manner
with the Commission’s interest in protecting investors and the market.
Considerations for Compliance Professionals
Compliance personnel who actively work with a business unit to implement WSPs risks being labeled a
supervisor and may be subject to liability for aiding and abetting or failure to supervise. Compliance
personnel may minimize the risk of being labeled a supervisor by establishing in meetings with business
supervisors that although he or she is an integral part of the business unit’s operations, the business
supervisor is the designated supervisor. Compliance personnel must document the supervisory reviews of
the business that the supervisor is responsible for overseeing, and should periodically obtain certifications or
attestations from supervisors indicating that she or he understands his or her supervisory role and is
undertaking his or her supervisory obligations. More generally, compliance should ensure that the firm’s
supervisory manual states that compliance personnel are solely responsible for activities within the
compliance department.
Compliance personnel should have a predetermined process to investigate, track and document red flags.
They must act decisively when red flags surface or if red flags are brought to their attention. Compliance
personnel should document each red flag, which business supervisors will address the red flag, and what
corrective action will be taken. Compliance personnel must take reasonable steps to follow up with the
business supervisor to ensure the issue has been resolved and then must monitor the issue to ensure it does
not recur. Compliance personnel should also share information with firm management (particularly if a red
flag involves a senior manager), and should be prepared, and have a process in place, to escalate matters to
the Board of Directors if management fails to take corrective action.
Membership on firm committees is also an area of concern for compliance personnel. As evidenced in In the
Matter of Theodore Urban, membership on certain firm committees may cause the Commission to determine
that compliance personnel who, as a member of a committee, learn critical information about a violation have
a duty to ensure that corrective action is taken. The Commission’s approach exposes compliance personnel to
personal liability that could potentially jeopardize careers and, as a result, may cause qualified candidates to
avoid compliance roles.
The Commission’s use of data analytics tools has increased the pressure on compliance personnel to ferret
out fraud, technical violations, and control failures. One approach is to conduct surveillances similar to those
performed by the SEC’s analytics teams. Some reliable off-the-shelf surveillance may be available, but
compliance may have to leverage internal information technology resources and get buy-in from business
units to build surveillance tools to counter the SEC. The associated costs may be significant since the
Commission’s data analytics program is continuously evolving and broker-dealers would need to keep pace.
However, since repeated violations could lead to increasingly severe fines, create the impression that there is
a lack of institutional control at firms, personal liability, and could jeopardize firms’ reputation and client
relationships, firm may have limited choice.
The other alternative is for compliance personnel to rely on the traditional approach, which is based on
developing strong policies and procedures that match the firm’s business and the regulatory environment,
and diligent oversight. This approach requires frequent monitoring and testing of the adequacy of business
units’ compliance with polices and procedures. It also requires compliance personnel regularly ask where
issues could occur, what controls are in place to prevent or detect problems, and what residual risks remain
unmitigated by such controls?