StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

What works in Security laws (Summary) - Essay Example

Cite this document
Summary
The significance of security laws is evident in the modern corporate world where shareholders fall victim of poor and invalid public offerings. With many organizations rising to the ability…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.1% of users find it useful
What works in Security laws (Summary)
Read Text Preview

Extract of sample "What works in Security laws (Summary)"

What works in Security Laws? affiliation What works in Security Laws? Security laws are clauses and regulations aimed atprotecting shareholders and investors. The significance of security laws is evident in the modern corporate world where shareholders fall victim of poor and invalid public offerings. With many organizations rising to the ability of offering shares, security laws govern the mode in which this is done. The laws dictate the depth of disclosure and the depth at which the public would be involved in corporate affairs.

According to LaPorta, Lopez-de-Silanes & Shleifer (2004) security laws are aimed at protecting both the organization and the shareholders. The author further argues that these laws do not favor any particular party. One significant strategy that the laws apply to ensure equality in public offering is the use of supervisors. Supervisors are agents who ensure the security laws are adhered to. The laws requires of all supervisors not to be biased or influenced by power or any other factor. Another significant content of the security laws is regulating the depth at which shareholders are exposed to company figures.

Every company is required to expose its figures to shareholders before placing their shares at public offerings. However, the depth of knowledge is also regulated in favor of companies. The laws protect companies from exposing all information on the company before its public offering (LaPorta, Lopez-de-Silanes & Shleifer, 2004). From the journal by LaPorta, Lopez-de-Silanes & Shleifer (2004) the need to bridge the gap between countries with strong and weak investor protection strategy is sensitized.

In his recommendation, legal laws and reforms to support financial development are required. ReferenceLaPorta, R., Lopez-de-Silanes, F. & Shleifer, A. (2004). What Works in Securities Laws? The Journal of Finance, 1545

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“What works in Security laws (Summary) Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
What works in Security laws (Summary) Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/management/1608115-what-works-in-security-laws-summary
(What Works in Security Laws (Summary) Essay Example | Topics and Well Written Essays - 250 Words)
What Works in Security Laws (Summary) Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/management/1608115-what-works-in-security-laws-summary.
“What Works in Security Laws (Summary) Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/management/1608115-what-works-in-security-laws-summary.
  • Cited: 0 times

CHECK THESE SAMPLES OF What works in Security laws (Summary)

Privacy of Information Systems

One of the applications used in the health systems is the summary Care Record (SCR).... Governments also formulate laws that govern the use of information systems to prevent the privacy threats.... Professional bodies such as nursing that deal with confidential information of their patients adhere to ethics and laws to prevent the violation of privacy laws of data.... The leakage may then lead to security threats when the unauthorized persons manipulate the data for their benefits (Quinn, 2010)....
5 Pages (1250 words) Essay

Research Exercise 5

This is a major threat to information security.... An ILM strategy should only be implemented when needed and after determining what the need is.... It will describe the challenges posed to legislators and government investigation agencies because of legal complexities of information as… Please provide answers to the following three (3) questions....
4 Pages (1000 words) Essay

Computer Security for Oracle Corporation

The practice of hacking led to prosecution and fine of Razvan in the court of laws.... The topic reports that computer security is an essential aspect that Oracle Corporation emphasizes to the users to enable them avoid cases of hacking.... This made the users of the A Report on Computer security for Oracle Inc Report of the Topic The topic reports that computer security is an essential aspect that Oracle Corporation emphasizes to the users to enable them avoid cases of hacking....
1 Pages (250 words) Essay

United States and Australias Gun Control Laws

Because of the many debates in full force, legislations and laws on gun control have been put into operation in Gun control is any policy, law, practice or proposal that is designed to limit or restrain the production, possession, shipment, importation, use and/ or sale of firearms.... While many have opposed the strict gun control laws, their implementation is associated by many pros that ultimately benefit the Australian and American societies as a whole.... Both the United States gun control laws and the Australia's gun control laws have decreased suicide rates and mass shootings (Baker & McPhedran, 2007)....
6 Pages (1500 words) Essay

The Concept of e-Healthcare Information Security and Issues in e-Healthcare Information Security

This form of information is linked closely with EHR and EHR has the ability to provide medicine to the patients in a customized manner with the help of… The information that is stored in the EPHR is owned and monitored by different individuals and the source of this information is the individual healthcare service professionals and can be accessed only by those individuals who have summary The electronic information for healthcare contains two elements, the multimedia that isdigitalized and healthcare records....
1 Pages (250 words) Essay

The Major Solutions to Defeat Homeland and National Security Loopholes in the USA

hellip; The present study tries to identify major setbacks, legal issues and vulnerabilities of the procedures and laws that are in place to Home land security involves military intelligence and active field reporting to ensure that there is no offence within the country.... National security is a major topic of study and debate in many developed countries, the governments of which aim to keep the focus on how to safeguard the interests of its citizens and also see to it that critical information about the country does not leak out of the system....
13 Pages (3250 words) Research Paper

Chief Security Officer

In essence, before establishing an enterprise or an institution, it is necessary to ensure that effective security mechanisms are put in place.... The problem of insecurity has been very controversial in… The diversity of the education system and the increased use of the modern technology facilities in education has resulted in numerous security threats.... Among the most dangerous security concerns that have emerged as a Computer crime cab be described as any unlawful activity involving a combination of a network and a computer....
8 Pages (2000 words) Assignment

Analysis of Security Plan

The implementation of this proposal must be in line with existing data security laws and policies.... In addition, the person oversees all security departments and ensures proper enforcement of faculty laws and regulations.... This essay discusses some beneficial security measures for the facility concerning the transition to an Electronic Health Record (EHR) system.... hellip; The transition to the new HER system is a localized short-term procedure, but necessary security measures are necessary to ensure business continuity....
2 Pages (500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us