Marketing and advertising in the mid-20th Century was very different then what exists in today’s world of social media. Marketing and advertising are constantly evolving. Today’s social media influencers, hashtags, comments, likes, and posts can all be used for marketing purposes. With this in mind, it makes sense that regulations should evolve as well and not be stuck in the past. In December 2020, the SEC adapted regulations to better align with the 21st Century’s marketing environment. The 1961 Advertising Rule 206(4)-1 2021 combined with the Cash Solicitation Rule206(4)-3 will now be regulated under a single rule referred to as Read more about What’s ‘New’ about the SEC’s New Marketing Rule for Investment Advisers?[…]
In an effort to clarify the rules regarding security-based swaps (SBS), FINRA has adopted amendments to rules 0180, 4120, and 4220. FINRA had previously adopted temporary relief from the application of most FINRA rules to SBS (Rule 0180), in tandem with temporary exemptive orders issued by the SEC relating to the definition of SBS as securities, as well as an interim pilot program with respect to margin requirements for transactions in CDS held in an account at a member (Rule 4240). These rules expire on February 6, 2022, and April 6, 2022, respectively. Amendments to Rule 0180 FINRA has adopted Read more about Amendments to FINRA Rules for Security-Based Swaps[…]
Under SEC Rule 17F-2, every member of a national securities exchange, broker, dealer, registered transfer agent and registered clearing agency, and national securities association (as well as others), shall require that each of its partners, directors, officers, and employees be fingerprinted and submit appropriate and complete fingerprint cards to FINRA. FINRA then transmits these fingerprints and identifying information to the FBI to identify and process, consistent with protocols and requirements established by the Attorney General. Who is Required to be Fingerprinted? SEC Rule 17f-2 requires that the following associated persons be fingerprinted: Persons applying for registration. A fingerprint card must Read more about SEC Rule 17f-2: Fingerprinting Of Securities Industry Personnel[…]
SEC Rule 17f-1 calls for the SEC or its designee, currently the Securities Information Center (SIC), to maintain records of lost, counterfeit, missing, or stolen securities. This rule was created in an effort to reduce trafficking in lost, stolen, missing, and counterfeit securities. The database of securities maintained by the SIC can only be accessed by registered BDs and other financial institutions to ascertain if securities that have come into their possession have been reported as lost, stolen, missing, or counterfeit. No Criminal Action Suspected Upon discovery of the likely loss of a security, if no criminal action is suspected, Read more about Reporting And Inquiry for Lost, Counterfeit, Missing, and Stolen Securities[…]
Rule 147, also known as the intrastate offering exemption, allows for firms to avoid registration with the SEC for intrastate offerings under certain conditions. This exemption seeks to facilitate the financing of local business operations for companies that are organized in the state where it is offering the securities, carry out a significant amount of its business in that state, and make offers and sales only to residents of that state. The Rule 147 exemption is available only if the entire issue is offered and sold exclusively to residents of that single state. If any sales take place to non-residents, Read more about Rule 147 Offerings[…]
Cybersecurity remains one of the principal operational risks facing broker-dealers and Registered Investment Advisers. Accordingly, FINRA and the SEC’s examiners expect firms to have reasonably designed cybersecurity programs and controls consistent with the firm business model and scale of operations to ensure that sensitive data, including client information, is not lost or misused, or accessed by unauthorized users.
Examiners continue to inquire into the Firm’s controls regarding firewalls, vulnerability, penetration testing, and training during office examinations.