StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

What works in Security laws (Summary) - Essay Example

Comments (0) Cite this document
Summary
The significance of security laws is evident in the modern corporate world where shareholders fall victim of poor and invalid public offerings. With many organizations rising to the ability…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.1% of users find it useful
What works in Security laws (Summary)
Read TextPreview

Extract of sample "What works in Security laws (Summary)"

What works in Security Laws? affiliation What works in Security Laws? Security laws are clauses and regulations aimed atprotecting shareholders and investors. The significance of security laws is evident in the modern corporate world where shareholders fall victim of poor and invalid public offerings. With many organizations rising to the ability of offering shares, security laws govern the mode in which this is done. The laws dictate the depth of disclosure and the depth at which the public would be involved in corporate affairs. According to LaPorta, Lopez-de-Silanes & Shleifer (2004) security laws are aimed at protecting both the organization and the shareholders. The author further argues that these laws do not favor any particular party.
One significant strategy that the laws apply to ensure equality in public offering is the use of supervisors. Supervisors are agents who ensure the security laws are adhered to. The laws requires of all supervisors not to be biased or influenced by power or any other factor. Another significant content of the security laws is regulating the depth at which shareholders are exposed to company figures. Every company is required to expose its figures to shareholders before placing their shares at public offerings. However, the depth of knowledge is also regulated in favor of companies. The laws protect companies from exposing all information on the company before its public offering (LaPorta, Lopez-de-Silanes & Shleifer, 2004).
From the journal by LaPorta, Lopez-de-Silanes & Shleifer (2004) the need to bridge the gap between countries with strong and weak investor protection strategy is sensitized. In his recommendation, legal laws and reforms to support financial development are required.
Reference
LaPorta, R., Lopez-de-Silanes, F. & Shleifer, A. (2004). What Works in Securities Laws? The Journal of Finance, 1545 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“What works in Security laws (Summary) Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
What works in Security laws (Summary) Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/management/1608115-what-works-in-security-laws-summary
(What Works in Security Laws (Summary) Essay Example | Topics and Well Written Essays - 250 Words)
What Works in Security Laws (Summary) Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/management/1608115-what-works-in-security-laws-summary.
“What Works in Security Laws (Summary) Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/management/1608115-what-works-in-security-laws-summary.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF What works in Security laws (Summary)

The reassessment of security issues and their impacts on Adventure Works business processes

...? Full Paper Executive Summary This document will highlight the reassessment of security issues and their impacts on Adventure Works business processes. Security and contingency planning is vital for any organization, as they ensure protecting critical assets as well as maintain business processes. A security policy is essential, as it defines the overall action plan of a security incident or procedure. Apart from the Firewall installation at WAN interfaces, there are no security measures, which may demonstrate a safe network environment. Moreover, Adventure Works is planning to make an online presence. In order to promote business on the web requires certain security measures and a fail / safe network environment. After reviewing... , the...
5 Pages(1250 words)Essay

Summary (Information Security Management )

...steps like entering credit card number. The information provided is encrypted securely at servers and is shown only as asterisks.Maintaineance of reasonable physical, electronic and procedural safeguards accorded with federal regulations is another secure storage step. Yahoo! prefers working with vendors and partners to maintain sound security .The employees who come in direct contact with customers to provide products and services related information are abstained from accessing personal information section. Last but not the least Yahoo conducts company-wide education and training programme to constantly educate employees about information security...
2 Pages(500 words)Essay

Summary of Case Laws

...Summary of Case Laws Michelin Tire Company is a company, which deals with the manufacturing of tires and distributing them to many of its warehouses in the world. One of its distribution warehouses is located in Gwinnett County, Georgia where it receives the imported tires from France and Nova Scotia for later distribution. In the case of Michelin Tire Corporation V. Wages, the court levied a nondiscriminatory ad valorem property tax on goods, which was a certain percentage of the company’s value. Michelin Tire Company made a claim in court that the contents of the warehouses were constitutionally free from taxation by the state since they were in their original containers. However, the court declared...
4 Pages(1000 words)Essay

Laws

...or maneuvering of local or federal courts to manipulate jurisdictional constraints. I would further propose that the law be monitored through a peer oriented process, which would make it mandatory for all interrogations of suspects to be audio and video recorded. That no confession will be accepted as truth until the entire process has been completely viewed and analyzed by a trained independent master. This person will attest to the procedural accuracy of the process and proclaim the veracity of the statements recorded. There will be fewer if any additional convictions based on...
2 Pages(500 words)Essay

Literature Course Works Summary

...at a bank while a bitter bank employee named Nils Krogstad who collects the payment for debts attempts to blackmail Nora to be able to secure his job at the bank for he is faced with the fact of losing his job, she then tried all the means for Nils not to be fired from work (Ibsen 153-229). She then became vulnerable to harassment when she asked the help of Dr. Rank who became too flirtatious with her and expressed his desire to love Nora more than her husband; her problem was resolved with the help of Mrs. Linde who was a past love of Nils, Nils then had a change of heart and decided not to blackmail the Helmers anymore, unfortunately, Torvald discovered Nora’s secret and became furious at her but then...
9 Pages(2250 words)Essay

Monopoly and Perfect Competition

1 Pages(250 words)Essay

The Concept of e-Healthcare Information Security and Issues in e-Healthcare Information Security

...the information from accessing it. It is essential to ensure that people are not only physically, but even virtually stopped from accessing this information if that are not authorized to do so. There are several issues linked with the security of electronic healthcare information such as the inconsistency between the laws that govern healthcare and the policies of different healthcare institutes (Shoniregun 23). Another issue is that just because of politics and lack of proper culture different healthcare systems such as the e-healthcare information systems and the physical employees are obstructed from successful implementation of the system. Same issue is experienced when the healthcare system tried...
1 Pages(250 words)Essay

Laws

...between economics and law have produced legal arguments. In addition, the legal harmonization work now involves several organizations- both institutions of government and the representatives of the private sector. In the harmonization process, it is important for the agencies responsible for the formulation to recognize the limits of the instruments they are producing and the possible shortcomings of their working methods. It has been said that the future harmonization of contract law will be consisting of some interaction between the laws binding international conventions and the new phenomenon of principles of contract laws. The...
1 Pages(250 words)Assignment

Summary of How diversity works

...Summary of “How diversity works." The main focus of the is to highlight the role played by diversity in various societies. The issue of diversity is noted as having generated a huge debate and even conflict in United States. In fact, the issue has been addressed in the courts. On the other hand, there have been efforts to trying to achieve diversity in United States. Corporate have invested heavily in trying to achieve it although it has been a challenge. Diversity has been shown to have an impact on society in various ways. First, diversity has been shown to play a significant role in innovations. It has been shown to be crucial in enhancing creativity. It also gives rise to more information and...
2 Pages(500 words)Essay

Analysis of Security Plan

...and company objectives. 9. Appointment of Chief Security Officer A Chief Security Officer will ensure the enforcement of the proposed measures. In addition, the person oversees all security departments and ensures proper enforcement of faculty laws and regulations. 10. Employee Training Methods Employees must receive proper training to ensure that there are no misunderstandings in implementation of the proposed security measures. Technology-based training enables employees to understand the functioning of the new system. Works Cited Khameesy, Nashaat and Rahman, Hossan. A Proposed Model for Enhancing Data Storage...
2 Pages(500 words)Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic What works in Security laws (Summary) for FREE!

Contact Us