Insider Trading Risk Assessment Insider Term Paper

PAGES
5
WORDS
2321
Cite

However, it would be safer to follow general policies that are being followed even now. This means that one should pass on published information to shareholders on the Internet as it would be simpler and less expensive to send. This may include information about quarterly results, monthly turnover, changes of directors, appointment of new sales agents, general trends of markets at certain times, etc. The question would still remain as to how many shareholders would be competent enough to use this information and the passing on of information may result for the clients as an exercise of garbage in, garbage out. 5. Discuss the legal boundaries, including privacy issues. What exceptions if any exist to allow for the use of such data? If they do not exist, how would you counter the privacy advocates concerns?

Some experts believe that privacy concerns will ultimately reduce the growth of the Internet generally and electronic commerce. As it is, different countries consider privacy issues variedly, but this is for the privacy of individuals. In the U.S. companies have largely been allowed to self-regulate. In Europe on the other hand, protection of consumer privacy is the topic of wide legislation, and that includes a comprehensive Data Protection Directive that took its form in 1998. In November 2000, the Commerce Department prepared a safe harbor program for U.S. companies trying to acquire personal information from that of the European organizations. The basic need of the program is that companies do have a privacy policy addressing certain listed principles inclusive of "access; choice; notice; security; transfers to third parties; and data integrity and enforcement." (Privacy Policy Primer) Studies have revealed while an enhancing number of U.S. companies have developed privacy policies, enforcement of these policies has been found at best. (Privacy Policy Primer) The question here is of privacy of individuals in general. Regarding share trading risks and privacy, it is not clear as to what issues may come up.

6. Discuss risk mitigation strategies. These should be in the form of recommendations to mitigate the risks identified while considering the allocation of resources within the organization?

Risk management services are to provide insurance for transactions and entail information in order to help the buyer and seller to deal with delivery, price, theft, and other types of risks. These are the methods of reducing risks, and as e-commerce increases, several insurance companies now provide insurance services to reduce risks. (Is Government needed to watch online markets?) Towards the middle of the1980's, participating national regulatory institutions from the...

...

The general agreement among national banking authorities was that banks in their respective jurisdictions would be asked to hold $8 in capital against each of the $100 of loans it had booked. This is again a safety measure. In June, 2004, the BIS released "Basel II," which is a lengthy and much more complex new capital adequacy framework for the purpose of wide application through the entire financial services sector. (Is Insurance a substitute for capital under the revised Basel Accord?) Thus different actions are being taken, but the ultimate safety comes from the reduction of the mad rush for profits which makes organizations try for more profits.
Conclusion:

What has to be realized is that profit and risk are the two opposite sides of the same coin and when it is sought that profits must increase, and then risks will also increase. The opposite is also true. The risks of insider trading are also more when profits keep swinging from one side to the other like a pendulum, and principled growth will reduce the possibilities of benefits from insider trading. Ultimately, the trader has to make money fast.

Sources Used in Documents:

References

Insider Trading" U.S. Securities and Exchange Commission. Retrieved at http://www.sec.gov/answers/insider.htm. Accessed 15 October, 2005

Is Government needed to watch online markets?" (11 November, 2002) Harvard Business

School. Retrieved at http://searchcio.techtarget.com/originalContent/0,289142,sid19_gci864459,00.html. Accessed 15 October, 2005

Ivancevich, Susan; Jones, Lucian. C; Keaveney, Thomas. (December, 2002) "Don't Run the Risk" Journal of Accountancy. Retrieved at http://www.aicpa.org/pubs/jofa/dec2002/ivance.htm. Accessed 15 October, 2005
Retrieved at http://gsbwww.uchicago.edu/fac/christopher.culp/research/SF/29.pdf. Accessed 15 October, 2005
Newkirk, Thomas. C. (September 19, 1998) "Speech by SEC Staff: Insider Trading - AU.S. Perspective" 16th International Symposium on Economic Crime. Jesus College, Cambridge, England. Retrieved at http://www.sec.gov/news/speech/speecharchive/1998/spch221.htm. Accessed 15 October, 2005
Privacy Policy Primer" Retrieved at http://www.wecomply.com/wc/home/summaries/privacy.asp. Accessed 15 October, 2005


Cite this Document:

"Insider Trading Risk Assessment Insider" (2005, October 17) Retrieved April 20, 2024, from
https://www.paperdue.com/essay/insider-trading-risk-assessment-insider-70171

"Insider Trading Risk Assessment Insider" 17 October 2005. Web.20 April. 2024. <
https://www.paperdue.com/essay/insider-trading-risk-assessment-insider-70171>

"Insider Trading Risk Assessment Insider", 17 October 2005, Accessed.20 April. 2024,
https://www.paperdue.com/essay/insider-trading-risk-assessment-insider-70171

Related Documents

Risk Management in Hedge Funds A research of how dissimilar hedge fund managers identify and achieve risk The most vital lesson in expressions of Hedge Fund Management comes from the inadequate name of this kind of alternative investment that is an alternative: The notion that all methodical risks are differentiated away is not really applicable here, with the Hedge Fund returns, in realism, representing a mixture of superior administration of market

(Thomas a. Piraino, 2009) The particular case of Yahoo! rejecting Microsoft's claim did not constitute a real violation of any existing laws, though it does touch on some issues of ethics regarding company paid stockholders selling stocks during merger talks (which verges on insider trading) as well as ethical issues surrounding stockholder interests and deliberate actions that might devalue the company to make it less desirable to another. (Summative Assessment

Cardillo Travel Systems
PAGES 4 WORDS 1418

Explain the Securities and Exchange Commission's rationale to charge Cardillo executives with each of the following violations: Making false representations to outside auditors Without a doubt, executives of Cardillo Travel Systems made incorrect accounting transactions. As a result, this gave rise to false representations to external auditors. The rational for the SEC to charge these executives with this particular violation is linked to Management's Report on Internal Control Over Financial Reporting Under

911 and Beyond Presage an Era of New Terrorism? What Problems Does this Pose in Terms of Risk Management? For airports and the airline industry worldwide, the events of September 11, 2001 were absolutely catastrophic, especially in the United States, and resulted in major changes in risk assessment and security procedures. In the United States, all airline security was removed from the hands of the airlines and private contractors and

Enron Was the Seventh Largest
PAGES 98 WORDS 27112

Enron could engage in their derivative trading strategy with no fear of government intervention because derivative trading was specifically exempted from government regulation. Due in part to a ruling by the Commodity Futures Trading Commission's (CFTC) chairwoman, Wendy Graham, derivatives remained free of regulatory oversight. Ms. Graham, wife of Texas senator Phil Graham, made this ruling 5 weeks before resigning as chairwoman of the CFTC and joining the Enron Board

Sarbanes-Oxley Act of 2002 in reducing fraudulent financial reporting Introduction to Fraudulent Financial Reporting Available research on financial statement fraud relies mostly on anecdotal evidence (for example, Wells, 2001, 2002, 2004a, and 2004b; Rezaee, 2003). This evidence offers advice on how mechanisms related to the fraud triangle can be curtailed. It leads to theoretical sense to reduce factors which lead to more instances of fraud. However, deterrence and established deterrence methods