Verified Document

Role Of Technology In Corporate And Social Essay

Role of Technology in Corporate and Social Responsibility Insider trading. The insider trading case that has become most prominent is that against Raj Rajaratnam who ran the hedgefund Galleon Group, and was charged along with his co-defendant, Danielle Chiesi, a former consultant with New Castle Funds, LLC ("Insider Trading," 2010). Rajaratnam was convicted of 14 counts of insider trading, which makes this case the largest scheme concocted by a hedge fund ("Insider Trading," 2010). Rajaratnam's sentence was 11 years in prison accompanied by a $10 million fine ("Insider Trading," 2010). Rajaratnam was part of a "triangle of trust" that functioned as a deliberately corrupt business model in which inside information is fed through networks of experts to traders within various companies ("Insider Trading," 2010). Along with five others, Rajaratnam worked with a network of consultants and insiders to net in excess of $20 million between the years 2006 to 2009 ("Insider Trading," 2010). Rajaratnam's actions -- along with those of his colleagues -- qualify as deeds of misappropriation as defined by the insider trading case United States v. O'Hagan 521 U.S. 642 (1997) ("Insider Trading," 2010). The court considers corporate information to be company property, and specifically states that, "A company's confidential information...qualifies as property to which the company has a right of exclusive use ("Insider Trading," 2010). The undisclosed misappropriation of such information in violation of a fiduciary duty...constitutes fraud akin to embezzlement -- the fraudulent appropriation to one's own use of the money or goods entrusted to one's care by another ("Insider Trading," 2010)." Classical theory of insider trading liability §10(b) and Rule 10b-5 stipulate that material, nonpublic information must be the basis of trades made by a corporate trader in his corporation's securities ("Insider Trading," 2010). When a corporate trader makes trades based on material, non-public information, a "deceptive device" as under §10(b) has been used ("Insider Trading," 2010). More so, because there is professional confidence and trust relationship between a corporation's shareholders and the insiders who gain access to confidential information because of their employment with the corporation ("Insider Trading," 2010). There is a fiduciary "duty to disclose [or abstain from trading]" as a result of that relationship in order to avoid taking "unfair advantage of & #8230;uninformed…stockholders" Id., at 228-229. Under the misappropriation theory, fraud is committed when an individual misappropriates confidential information for securities trading purposes in what amounts to a breach of duty that is owed to source of the information ("Supreme Court," 1997). When duty of loyalty and duty of confidentially are breeched in this manner, the principal is defrauded of exclusive use of that information by the fiduciary's self-serving and undisclosed use of that information to buy or sell securities ("Supreme Court," 1997). The court reasoned that the two theories complement each other and together address attempts to capitalize on nonpublic information when selling or buying securities ("Supreme Court," 1997). The classical theory focuses on the breach of duty to shareholders with whom the corporate insider normally transacts business ("Supreme Court," 1997). The misappropriations theory prohibits trading based on nonpublic, material information by a corporate outsider in a breach of duty that is owed to the source of the information rather than to a trading party ("Supreme Court," 1997). Clearly, the misappropriations theory is intended to protect against abuses by corporate outsiders who gain access to confidential information, but who do not owe a fiduciary duty or other duty to the shareholders of a corporation ("Supreme Court," 1997). In further support of the deceptive devices aspect of the court's interpretation, the conviction of Rajat K. Gupta provides evidence of the duplicitous relationship of Rajaratnam to those who could reasonably expect him to conduct business according to his fiduciary duty. The court charged Gupta, who is a former director of Goldman Sachs and Procter & Gamble, with one count of conspiracy to commit securities fraud and actual counts of securities fraud ("Angwin," 2010). Specifically, Gupta leaked Goldman Sachs corporate secrets to Rajaratnam, such as the advance information that Warren Buffet intended to make $5 billion investment in Goldman Sachs ("Angwin," 2010). The Galleon investigation continues as the tangled tendrils of the illegal hedge fund business model are unraveled by investigators like Preet Bhara ("Angwin," 2010).

Consumer privacy issues. Privacy legislation must be the basis for consumer privacy solutions ("Sterns," 2011). Neither consumer self-help nor industry self-regulation will result in actual protections for a number of important reasons ("Sterns," 2011). Through my discussion of proposed...

That said, I believe that legislation is necessary and that increased specificity of regulatory language coupled with rulemaking that keeps pace with technological change is required if U.S. citizens are going to prevent their personally identifiable information from becoming commoditized ("Insider Trading," 2010). On April 13, 2011, Republican Representative Cliff Stearns from Florida introduced the Consumer Privacy Protection Act of 2011 ("Sterns," 2011). The act is intended to "protect and enhance consumer privacy" across online and offline contexts; it seeks to accomplish these safeguards through the imposition of requirements for consumer notice and consumer choice regarding the collection and use of personally identifiable information ("Sterns," 2011). Unfortunately, from this author's perspective, the bill is overly broad as it would only apply when an entity would access and use personal information of more than 5,000 consumers during a 12-month period ("Sterns," 2011). Further, as written, the bill would exclude governmental agencies [the U.S. Postal Service comes to mind], and "providers of professional services obligated by rules of ethics and confidentiality requirements and data processing outsourcing entities ("Sterns," 2011)." These exclusions substantially weaken the impact the law would have ("Sterns," 2011). Further, although the language in the bill is set up to offer consumers the opportunity to prevent disclosure or sale of their information, this provision must be renewed by each consumer every five years ("Sterns," 2011). The violations of the Act would be considered unfair or deceptive acts or practices and could incur a $500,000 fine ("Sterns," 2011). In what seems like an attempt to knock the legs out from underneath the Act, participants in self-regulatory programs would be exempt from civil penalties for a period of five years ("Sterns," 2011). Last, the Act provides that entities complying with other federal privacy laws are considered to be in compliance with the Act ("Sterns," 2011). In a more focused effort to protect consumer privacy, U.S. Senators Al Franken, Democrat of Minnesota and chairman of the Judiciary Subcommittee on Privacy, Technology and the Law, and Richard Blumenthal, Democrat of Connecticut, introduced legislation -- the Location Privacy Protection Act -- to restrict mobile device application developers and companies like Apple and Google, from sharing geo-location information about consumers with third parties without obtaining the express consent of those consumers ("Franken," 2011). One purpose of the proposed legislation is close loopholes in current federal law ("Franken," 2011). An ancillary purpose is to prevent geo-location information from getting into the wrong hands where very real harm can come to the consumer -- as in the case of domestic violence ("Franken," 2011). The fundamental issue is that personal information is being sold and used without the express permission of the owners of that confidential and often personally identifiable information -- and this lucrative business that has developed from the widespread access to personal information occurs without consumers total awareness or complete understanding (Angwin, 2010). Ashley Hayes-Beaty is a good example (Angwin, 2010). According to a Wall Street Journal article, Hayes-Beaty's computer holds a little file that collects data about her and sells it for one tenth of a penny (Angwin, 2010). Basic math indicates that this process is replicated hundreds upon thousands of times in order to generate profits for the entities involved with the data collection and sales (Angwin, 2010). The marketing company that sells her data, $1 per thousand, can segment the data right down to a single person. The company that buys Hayes-Beaty's data is BlueKai, and every day, BlueKai instantly sells approximately 50 million pieces of information like Hayes-Beaty's most viewed movies. BlueKai CEO, Omar Tawakol told the Wall Street Journal that, "It is a sea change in the way the industry works. Advertisers want to buy access to people, not Web pages." And so it is that casual use of the internet delivers a an enormous -- and apparently commercially useful -- amount of information about users through pervasive and intrusive methods, of which only a few people in digitally-based industry vanguards are aware (Verrier, 2010). Where people once thought they browsed the internet to follow their own interests, passions, and task, now advertisers follow consumers wherever they go on the internet in order to place very specific advertising messages before them (Verrier, 2010). This lucrative commercial industry that morphs every few months to maximize its profit potential is not about to self-regulate, and it is not possible for average consumers conducting their quotidian online business…

Sources used in this document:
References

Angwin, J. (2010, July 30). The new gold mine: Your secrets. The Wall Street Journal. Retrieved http://online.wsj.com/article/SB10001424052748703940904575395073512989404.html A web of insider trading charges. (2010, April 1). The New York Times. Retrieved http://www.nytimes.com/interactive/

2010/04/01/business/01galleon.html?ref=insidertrading

Insider Trading, Times Topics, (2011, December 6). The New York Times. Retrieved http://topics.nytimes.com/topics/reference/timestopics/subjects/i/insider_trading/index.html

Representative Stearns introduces consumer privacy protection act. (2011, April 15). Privacy and information Security Law Blog. Hunton & Williams LLP. Retrieved http://www.huntonprivacyblog.com/2011/04/articles/representative-stearns-introduces-consumer-privacy-protection
Supreme Court Case No. 96-842: United States, Petitioner v. James Herman O'Hagan. (1997, June). Legal Information Institute, Cornell University Law School. Retrieved http://www.law.cornell.edu/supct/html/96-842.ZO.html
Senators Franken, Blumenthal introduce bill to protect consumer privacy on mobile devices. (2011, June 15). Retrieved http://franken.senate.gov/?p=press_release&id=1587
Verrier, R. (2010, September 28). Anti-piracy enforcement vs. A functional Internet. Los Angeles Times. Retrieved http://opinion.latimes.com/opinionla/2010/09/anti-piracy-enforcement-vs.-a-functional-internet.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Corporate Social Responsibility and Transnational Companies in
Words: 2956 Length: 10 Document Type: Essay

Corporate Social Responsibility and Transnational Companies In this essay, I have discussed how essential Corporate Social Responsibility (CSR) is for the success of Transnational Corporations. UN Global Compact is also being discussed. I have also included case studies to support of Nike, Primark and Microsoft. Moreover, I have included positives and negatives about CSR and the factors that exist in CSR which may lead to the success of transnational corporations. Finally,

Corporate Social Responsibility Literature Review a Topic-Corporate...
Words: 4258 Length: 14 Document Type: Essay

Corporate Social Responsibility Literature Review a topic-Corporate Social Responsibility The term 'corporate social responsibility' is a social word that has often taken the world by a storm at its mention. Noya and Clarence (2007) in their book "The social economy: building inclusive economies" offers a succinct description and understanding of what normally takes place and get exemplified at the mention of this term in the business world. Many writers of business journals

Corporate Social Responsibility
Words: 1519 Length: 6 Document Type: Research Paper

Corporate Social Responsibility There are various definitions aiming to explain what Corporate Social Responsibility (CSR) signifies. Because of the many ways in which this concept is interpreted by the millions of companies around this country, and the world, there is no consensus as to what CSR could truly mean. In other words, definitions vary depending upon the field examined, and the impact of a business' actions. Yet CSR is of vital

Corporate Social Responsibility Initiatives a Corporation That
Words: 1301 Length: 4 Document Type: Essay

Corporate Social Responsibility Initiatives A corporation that responds positively towards social issues is considered socially acceptable. There are some corporate social responsibility initiatives which the firm should take in order to get socially responsible. There are five main corporate social responsibility initiatives: Philanthropy, Work/Life programs, Community redevelopment, Acceptance of whistle blowers and Environmental protection. Philanthropy The first way is to donate a lot to charities. These include hospitals, colleges and nursing homes. Many

Corporate Social Responsibility Sony Corporate Social Responsibility...
Words: 2695 Length: 10 Document Type: Essay

Corporate Social Responsibility (Sony) Corporate social responsibility (CSR) is no longer a tenable option to just be silent. Companies have to take responsibilities of their actions as a result of the impacts their businesses causes to the community and their stakeholders. For example during the recent oil spill of the British Petroleum Company (BP), at the coast of United States, the U.S. government did not remain silent on the issue but

Corporate Social Responsibility
Words: 2369 Length: 5 Document Type: Term Paper

591-2). The failure to integrate CSR initiatives into a larger development plan is another problem contributing to the lack of implementation of CSR projects. Projects are often driven by short-term expediency meaning that the decisions taken are at too low a level as to which projects to execute. There may be little coordination in determining the areas that will benefit and how the projects can be put together to contribute

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now