Tuesday, February 18, 2020

Securities act of 1933 Essay Example | Topics and Well Written Essays - 1750 words

Securities act of 1933 - Essay Example In fact, this law was brought into light after the great depression in 1929 in the US economy. By means of fraudulent activities, many companies sold fake securities based on false information and thus huge investment from the investors went in vain. So, underlying principle of 1933 act was to help potential investors get information about the company (issuer) and its securities that are offered for sale publicly. This overt expression from the issuer, thereby results a more concerned securities market because the investor were fully aware of the background of the company and their securities before investing money into purchase. Thus, it was a pressing need for a first major federal law which can govern the unstable situation in a uniform manner. In fact, from the buyer point of view, it was really inspiring step to make the issuers conformed to certain rules as to disclose their information accurately before they offer or sale securities. Regardless of whether securities must be registered, the 1933 Act makes it illegal to commit fraud in conjunction with the offer or sale of securities. A scammed investor can sue for recovery under the 1933 Act. Rule 144, promulgated by the SEC under the 1933 Act, permits, under limited circumstances, the sale of restricted and controlled securities without registration.. The amount of securities sold during any subsequent 3-month period generally does not exceed any of the following limitations: 1% of the stock outstanding, The avg. weekly reported volume of trading in the securities on all national securities exchanges for the preceding 4 weeks, and The avg. weekly volume of trading of the securities reported through the consolidated transactions reporting system (NASDAQ). Regulation S is a "safe harbor" that defines when an offering of 'securities' will be deemed to come to rest abroad and therefore not be subject to the registration obligations imposed under Section 5 of the 1933 Act. Civil Liability under the 1933 Securities Act Any violation of the registration requirements can be a cause to civil liability for the issuer and underwriters Sections 11, 12(a) (1) or 12(a) (2) of the Act. Additional

Monday, February 3, 2020

Technology of Information Security Essay Example | Topics and Well Written Essays - 500 words

Technology of Information Security - Essay Example at the present are a mixture of these two solutions, where some data are stored on a centralized server and accessed by client computers, as well as some data is stored only on local computers which is never shared with other client computers (Microsoft, 2003; Shelly, Cashman, & Vermaat, 2005). In addition, all of the above discussed situations come with a variety of security problems to consider. In fact, for the majority of business organizations, at the very least some of this data must be kept secure. Moreover, in order to help present effective data security in the above discussed situations, there exist a wide variety of IT security technologies that can be used by the business organizations to keep their sensitive data and information secure during storage and network communication. Additionally, there is not a single IT security technology that has the capability to protect all data against all kinds of attack. However, there are many security technologies that can be combined to implement a wide-ranging security infrastructure that protects against a wide variety of security attacks (Microsoft, 2003; Shelly, Cashman, & Vermaat, 2005). I have presented below three information security technologies: It is an admitted fact that the majority of business organizations are exposing their personal networks to Internet traffic; as a result, the deployment of firewalls has become a basic need. Basically, â€Å"a firewall stops illegal communication inside and outside of the network, facilitating the company to implement a security strategy on traffic running between its network and the Internet† (Turban, Leidner, McLean, & Wetherbe, 2005; Laudon & Laudon, 1999). Additionally, firewalls can be either software or hardware. However, an effective firewall arrangement will be based on both (Beal, 2004). In this scenario, a firewall divides a network into different domains. A wide-ranging implementation of the firewall has the Internet as un-trusted domain; a semi