Securities Regulation The Securities And Essay

PAGES
2
WORDS
580
Cite

The U.S. Supreme Court then granted a writ of certiorari to determine the meaning of the language "in connection with the purchase or sale of any security" (Reed, O. Shedd, P. Morehead, J. & Pagnattaro, M. 2008). What argument did the security dealer make in seeking to have the civil complaint dismissed?

Zandford's defense in this matter was particularly interesting as he does not deny his involvement in the "simple theft of cash or securities in an investment account" (Reed, O. Shedd, P. Morehead, J. & Pagnattaro, M. 2008). For Zandford the issue is not that he sold the securities which he contends "were perfectly lawful," rather that the fraudulent activity of "misappropriation of the proceeds is desultory from the actual sale of the securities. If Zandford's argument is believable then the sales of securities would have been aligned with the investment strategy designed to...

...

Zandford's contention falls squarely on the premise that the securities transactions were legitimate sales and not concomitant with intent to defraud.
What does the Supreme Court Conclude with respect to the language "in connection with the purchase or sale of any security?

The question of "in connection with the purchase or sale of any security" invariably falls to the Court's interpretation of the circumstance surrounding the Zandford transactions. The Court rejects Zandford's argument that the sales and the transfers of funds from Wood's account to Zandford's were separate and disconnected. Zandford's argument falls apart because the sales "throughout the two-year period" (Reed, O. Shedd, P. Morehead, J. & Pagnattaro, M. 2008) reflect a deliberate and concerted effort to "convert the proceeds of the sales of the Woods securities to his

Cite this Document:

"Securities Regulation The Securities And" (2011, March 22) Retrieved April 16, 2024, from
https://www.paperdue.com/essay/securities-regulation-the-securities-and-3495

"Securities Regulation The Securities And" 22 March 2011. Web.16 April. 2024. <
https://www.paperdue.com/essay/securities-regulation-the-securities-and-3495>

"Securities Regulation The Securities And", 22 March 2011, Accessed.16 April. 2024,
https://www.paperdue.com/essay/securities-regulation-the-securities-and-3495

Related Documents

Securities Regulation SECURITIES REGULARIZATIONS IN NON-PROFIT ORGANIZATIONS The ensuring of the fact that an organization is working as per regulations and is following the code of conduct, while keeping the interest of the public first, are matters which are becoming more and more complicated with the passage of time. Therefore, it can be said with some emphasis, that today one of the most basic issues of many organizations is the issue of

Organizational security strategies must be designed for agility and speed through the use of state-of-the-art systems that can quickly be reconfigured to match changing roles in an organization. Organizational security will be defined through role-based access, configurable through authenticated, clearly delineated processes that can be administered at the administrator level (Hone, Eloff, 2002). The organizational security strategy will also be designed on the empirically validated Confidential, Integrity and Availability (CIA)

Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework

Security in Cloud Computing
PAGES 10 WORDS 3274

Security in Cloud Computing Security issues associated with the cloud Cloud Security Controls Deterrent Controls Preventative Controls Corrective Controls Detective Controls Dimensions of cloud security Security and privacy Compliance Business continuity and data recovery Logs and audit trails Legal and contractual issues Public records The identified shortcomings in the cloud computing services and established opportunities for growth regarding security aspects are discussed in the current research. The security of services is regarded as the first obstacle. The opportunity for growth is provided as combination

(Gartenberg, 2005) Like all other aspects of business today, security systems often prove to be highly complex and hard (even for the participants) to identify. The culture of an organization is like the culture of a family, a community, or a nation: Because it surrounds the people in it they often have a great deal of difficulty in recognizing to what extent policies and procedures arise from the constraints of culture

SECURITY and PRIVACY - the following security and privacy requirements apply: The Office does not accept responsibility for the privacy, confidentiality or security of data or information not generated by this office or transmitted from external sources into the system. The Office does not accept responsibility for loss, corruption, misdirection or delays in transmission of personal data through the system. Users are responsible for the integrity of all data and