Expert Network Best Practices, Part II: Interpreting the SEC’s Risk Alert on MNPI
14 July 2022
Foley Partner Jim Lundy will join an ACA Group panel of subject-matter experts to examine the U.S. Securities and Exchange Commission’s (SEC) Division of Examinations recent risk alert highlighting common deficiencies in material non-public information (MNPI) observed during examinations. The panelists will discuss why these deficiencies are so common and how your firm can avoid making the same mistakes.
Key learning objectives:
- Rules about the use of Expert Networks and other research
- Use of alternative data outlined in the risk alert
- Application of the SEC’s “shadow trading” theory
- How your advisors and vendors can help you comply
In addition to Jim Lundy, the speakers include:
- Carlo di Florio, Chief Services Officer, ACA Group
- Dan Campbell, Director, ACA Group
- Jason Howard, GC/CCO, Tegus
There is no charge to attend this webinar. To register, click here.
People
Related Insights
27 May 2025
Events
The RIF Roadmap: Tools and Tactics for a Smooth and Compliant Transition
Join us for an insightful discussion on proactive workforce planning in today's dynamic economic and regulatory landscape.
16 May 2025
Manufacturing Industry Advisor
Reese’s Law: The Evolving Regulatory and Enforcement Landscape for Consumer Products Containing Button Cell or Coin Batteries
Over the past year, manufacturers, importers, distributors, and retailers of consumer products containing button cell and coin batteries (or products intended to contain them) have continued to adapt to the requirements of Reese’s Law and the Consumer Product Safety Commission’s corresponding enforcement efforts.
29 May 2025
Events
May 2025 Midwest Cyber Security Alliance Meeting | What Happens After a Breach: Practical Tips for the Notification Process
Join us on Thursday, May 29, 2025, at the next Midwest Cyber Security Alliance Meeting. Brandon Hollinder, Esq., and Adam Botter from Epiq will provide practical tips and insights on organizing the data mining and subsequent notification process after a cybersecurity breach.