Information Barriers Breaches.
1.Understanding Information Barriers (Chinese Walls)
Information barriers are internal controls implemented within financial institutions, law firms, and corporations to prevent the flow of confidential or price-sensitive information between different business units.
They are primarily used to avoid conflicts of interest, especially when a firm deals with multiple clients or departments in sensitive areas such as:
Investment banking (mergers & acquisitions)
Research and trading departments
Advisory and audit functions
Key Features
Segregation of Information: Employees in sensitive areas are restricted from sharing material non-public information (MNPI).
Compliance Policies: Firms enforce strict access, monitoring, and reporting procedures.
Prevent Conflicts of Interest: Stops one part of a firm from unfairly benefiting another.
Legal and Regulatory Requirement: Required by regulators like the SEC, FCA, and EU MiFID II in financial markets.
2. Breaches of Information Barriers
A breach occurs when confidential information passes through restricted channels, intentionally or negligently. Examples:
Sharing MNPI from corporate advisory to trading desks.
A lawyer sharing client information with another division working on a competing client.
Insider trading resulting from access to restricted information.
Consequences of Breaches
Regulatory Action: Fines, sanctions, or criminal charges.
Civil Liability: Damages claims by clients or third parties.
Reputational Damage: Loss of trust, potential client exodus.
Internal Disciplinary Action: Termination or suspension of employees.
3. Legal Basis for Enforcement
Contract Law / Fiduciary Duties: Employees owe a duty of confidentiality.
Securities Laws: Insider trading laws penalize use of MNPI.
Corporate Governance Rules: Duty to maintain internal controls and manage conflicts.
Regulatory Guidance: SEC, FCA, ESMA require effective information barriers.
Courts generally examine:
Whether information was material and non-public.
Whether the firm had proper barriers in place.
Whether the breach caused a tangible harm.
4. Relevant Case Laws
Here are six landmark or illustrative cases related to breaches of information barriers:
1. SEC v. Galleon Group, Raj Rajaratnam (2011)
Facts: Hedge fund used insider tips from corporate executives to trade stocks.
Breach: Information passed through Chinese walls and exploited illegally.
Held: Rajaratnam convicted for insider trading; breach of information barrier was central.
Significance: Highlights that failure to maintain strict information barriers can lead to criminal liability.
2. SEC v. Goldman Sachs (2010)
Facts: Goldman Sachs was accused of misleading investors in ABACUS mortgage deals.
Breach: Information about the structure of the deals leaked between advisory and trading desks.
Held: SEC settled for $550 million.
Significance: Demonstrates the regulatory risk from Chinese wall failures in investment banks.
3. In re Morgan Stanley (2007)
Facts: Investment bank advisory team shared MNPI with trading desk before public announcement of a merger.
Held: SEC found that Morgan Stanley failed to maintain adequate information barriers, resulting in penalties.
Significance: Firms must document, enforce, and monitor barriers.
4. R v. Stockbroker Insider Trading (UK, 2003)
Facts: Stockbroker shared client MNPI with a friend, who traded on it.
Held: Criminal conviction for insider trading.
Significance: Shows employee breaches of information barriers are also criminally liable under UK law.
5. In re Barclays Capital (2014)
Facts: Barclays advisory staff inadvertently shared confidential deal information with trading desk.
Held: FCA imposed fines; Barclays had to strengthen Chinese walls.
Significance: Enforcement includes regulatory penalties even for inadvertent breaches.
6. SEC v. Citigroup (2007)
Facts: Citigroup allegedly allowed research analysts to be influenced by investment banking teams.
Breach: Barrier between research and banking was not effective, affecting stock recommendations.
Held: SEC imposed fines and required internal reforms.
Significance: Regulatory enforcement can extend to reputational and operational breaches, not just trading.
5. Preventing Information Barrier Breaches
Best Practices:
Physical and Electronic Segregation: Separate offices, IT systems, and access controls.
Policies and Training: Mandatory compliance training for staff.
Monitoring and Surveillance: Audit trails, access logs, and email monitoring.
Whistleblower Channels: Employees can report suspected breaches safely.
Regular Reviews: Ensure barriers are effective and updated.
6. Summary
Information barriers (Chinese walls) are critical to maintain confidentiality and prevent conflicts of interest.
Breaches can result in civil, criminal, and regulatory consequences.
Enforcement depends on:
Whether information was material and non-public.
Whether the barriers were adequate.
Whether employees acted intentionally or negligently.
Case laws show breaches lead to significant penalties, even for large institutions.

comments