More On Legal & Compliancefrom The Advisor's Professional Library
- Do’s and Don’ts of Advisory Contracts In preparation for a compliance exam, securities regulators typically will ask to see copies of an RIAs advisory agreements. An RIA must be able to produce requested contracts and the contracts must comply with applicable SEC or state rules.
- Disaster Recovery Plans and Succession Planning RIAs owe a fiduciary duty to clients to prepare for disasters and other contingencies. If an RIA does not have a disaster recovery plan, clients financial well-being may be jeopardized. RIAs should also engage in succession planning, ensuring a smooth transaction if an owner or principal leaves.
The Securities and Exchange Commission’s Office of Compliance Inspections and Examinations (OCIE) released Thursday a report to help broker-dealers safeguard confidential information from misuse, such as insider trading.
The report describes strengths and weaknesses identified in examinations into how broker-dealers keep material nonpublic information from being misused. It also highlights effective practices that examiners observed at some broker-dealers.
OCIE Director Carlo di Florio said in a statement that the report “illustrates the types of conflicts of interest that may arise between a broker-dealer’s obligations to clients that provide confidential information for business purposes and the potential misuse of such information for insider trading or other improper ends.” He said it also describes “various methods that broker-dealers use to identify and effectively manage such conflicts, including information barriers that limit the flow of sensitive information.”
The types of issues identified in the report “may be helpful to firms as they review their conflict of interest risk management programs,” di Florio said. “In particular, in any review of information barriers control programs, broker-dealers should be alert to changes in business practices and available compliance tools.”
Conflicts of interest and other issues of concern raised by the report include:
- A significant amount of informal, undocumented interaction occurred between groups that have material nonpublic information and internal and external groups with sales and trading responsibilities that might profit from the misuse of such material nonpublic information
- At some broker-dealers, a senior executive might have access to material nonpublic information from one business unit while overseeing a different unit that could potentially profit from misuse of that information, with few if any restrictions or monitoring to prevent such misuse
- Some broker-dealers did not have risk controls to address certain business units that possess material nonpublic information such as sales, trading or research personnel who receive confidential information for business purposes; institutional and retail customers or asset management affiliates with access to material nonpublic information, or firm personnel who receive information through business activities outside of investment banking, such as participation in bankruptcy committees or through employees serving on the boards of directors of public companies.
The report also highlights effective practices that examiners observed at some broker-dealers, such as:
- Broker-dealers sometimes adopted processes that differentiate between types of material nonpublic information based on the nature of the information or where it originated. In some cases, broker-dealers create tailored “exception” reports that take into account the different characteristics of the information
- Some broker-dealers expanded reviews for potential misuse of confidential information to include trading in credit default swaps, equity or total return swaps, loans, components of pooled securities such as unit investment trusts and exchange traded funds, warrants, and bond options
- Broker-dealers often considered electronic sources of confidential information and instituted monitoring to identify which employees had accessed the information
- Broker-dealers often monitored access rights for key cards and computer networks to confirm that only authorized personnel had access to sensitive areas.