Chinese wall

Last updated

A Chinese wall or ethical wall is an information barrier protocol within an organization designed to prevent exchange of information or communication that could lead to conflicts of interest. For example, a Chinese wall may be established to separate people who make investments from those who are privy to confidential information that could improperly influence the investment decisions. Firms are generally required by law to safeguard insider information and ensure that improper trading does not occur. [1]

Contents

Etymology

The term is said to allude to the Great Wall of China but the screen walls of Chinese internal architecture have also been attributed as its origin The Great Wall of China at Jinshanling-edit.jpg
The term is said to allude to the Great Wall of China but the screen walls of Chinese internal architecture have also been attributed as its origin

Bryan Garner's Dictionary of Modern Legal Usage states that the metaphor title "derives of course from the Great Wall of China", [2] although an alternative explanation links the idea to the screen walls of Chinese internal architecture. [3]

The term was popularized in the United States following the stock market crash of 1929, when the U.S. government legislated information separation between investment bankers and brokerage firms, in order to limit the conflict of interest between objective company analysis and the desire for successful initial public offerings. [4] Rather than prohibiting one company from engaging in both businesses, the government permitted the implementation of Chinese-wall procedures.

A leading note on the subject published in 1980 in the University of Pennsylvania Law Review titled "The Chinese Wall Defense to Law-Firm Disqualification" perpetuated the use of the term. [5] [6]

Objections to the term Chinese wall

There have been disputes about the use of the term for some decades, particularly in the legal and banking sectors. The term can be seen both as culturally insensitive and an inappropriate reflection on Chinese culture and trade, which are now extensively integrated into the global market.[ citation needed ]

In Peat, Marwick, Mitchell & Co. v. Superior Court (1988), Presiding Justice Harry W. Low, a Chinese American, [7] wrote a concurring opinion specifically in order "to express my profound objection to the use of this phrase in this context". He called the term a "piece of legal flotsam which should be emphatically abandoned", and suggested "ethics wall" as a more suitable alternative. He maintained that the "continued use of the term would be insensitive to the ethnic identity of the many persons of Chinese descent". [6] [8]

Alternative terms

Alternative phrases include "screen", [9] "firewall", "cone of silence", and "ethical wall".

"Screen", or the verb "to screen", is the preferred term of the American Bar Association Model Rules of Professional Conduct. [10] The ABA Model Rules define screening as "the isolation of a lawyer from any participation in a matter through the timely imposition of procedures within a firm that are reasonably adequate under the circumstances to protect information that the isolated lawyer is obligated to protect under these Rules or other law", [10] [11] [12] [ full citation needed ] [13] and suitable "screening procedures" have been approved where paralegals have moved from one law firm to another and have worked on cases for their former employer which may conflict with the interests of their current employer and the clients they represent. [14]

Usage in specific industries

Finance

A Chinese wall is commonly employed in investment banks, between the corporate-advisory area and the brokering department. This separates those giving corporate advice on takeovers from those advising clients about buying shares [1] and researching the equities themselves.

The "wall" is thrown up to prevent leaks of corporate inside information, which could influence the advice given to clients making investments, and allow staff to take advantage of facts that are not yet known to the general public. [15] [16]

The phrase "over the wall" is used by equity research personnel to refer to rank-and-file personnel who operate without an ethics wall at all times. Examples include members of the Chinese wall department, most compliance personnel, attorneys and certain NYSE-licensed analysts. The term "already over the wall" is used when an employee who is not normally privy to wall-guarded information somehow obtains sensitive information. Breaches considered semi-accidental were typically not met with punitive action during the heyday of the "dot-com" era. These and other instances involving conflicts of interest were rampant during this era. A major scandal was exposed when it was discovered that research analysts were encouraged to blatantly publish dishonest positive analyses on companies in which they, or related parties, owned shares, or on companies that depended on the investment banking departments of the same research firms. The U.S. government has since passed laws strengthening the use ethics walls such as Title V of the Sarbanes–Oxley Act in order to prevent such conflicts of interest.

Ethics walls are also used in the corporate finance departments of the "Big Four" and other large accountancy and financial services firms. They are designed to insulate sensitive documentation from the wider firm in order to prevent conflicts.

Journalism

The term is used in journalism to describe the separation between the editorial and advertising arms. [17] The Chinese wall is regarded as breached for "advertorial" projects. [18] In student journalism, maintaining a publication's independence from its associated educational institution can be a challenge. [19]

Separately, the term can refer to a separation between a publication's news and opinions arms. [20]

Insurance

The term is used in property and casualty insurance to describe the separation of claim handling where both parties to a claim (e.g. an airport and an airline) have insurance policies with the same insurer. The claim handling process needs to be segregated within the organisation to avoid a conflict of interest.

This also occurs when there is an unidentified or uninsured motorist involved in an auto collision. In this case, two loss adjusters will take on the claim - one representing the insured party and another representing the uninsured or unidentified motorist. While they both represent the same policy, they both must investigate and negotiate to determine fault and what if anything is covered under the policy. In this case, a Chinese wall is erected between the two adjusters.

Law

Chinese walls may be used in law firms to address a conflict of interest, for example to separate one part of the firm representing a party on a deal or litigation from another part of the firm with contrary interests or with confidential information from an adverse party. Under UK law, a firm may represent competing parties in a suit, but only in strictly defined situations and when individual fee earners do not act for both sides. [21] In United States law firms, the use of Chinese walls is no longer sufficient on its own to eliminate or "cure" a potential conflict of interest except within very narrow exceptions. They are, however, still used in conjunction with requests from clients as a condition of waivers, or as a prudential measure within the firm to prevent or address potential business issues. The American Bar Association Model Rules of Professional Conduct (2004) state: "While lawyers are associated in a firm, none of them shall knowingly represent a client when any one of them practicing alone would be prohibited from doing so by Rules 1.7 or 1.9, unless the prohibition is based on a personal interest of the prohibited lawyer and does not present a significant risk of materially limiting the representation of the client by the remaining lawyers in the firm." [22] Although ABA rules are only advisory, most U.S. states have adopted them or have even stricter regulations in place.

Government procurement

Chinese or ethical walls may be required where a company which already has a contract with a public body intends to bid for a new contract, in circumstances where the public body concerned wishes to maintain a fair competitive procedure and avoid or minimise the advantage which the existing contractor may have over other potential bidders. In some cases UK public sector terms of contract require the establishment of "ethical wall arrangements" approved by the customer as a pre-condition for involvement in the procurement process for additional goods and services or for a successor contract. [23]

Computer science

In computer science, the concept of a Chinese wall is used by both the operating system for computer security and the US judicial system for protection against copyright infringement. In computer security it concerns the software stability of the operating system. The same concept is involved in an important business matter concerning the licensing of each of a computer's many software and hardware components.

Any hardware component that requires direct software interaction will have a license for itself and a license for its software "driver" running in the operating system. Reverse engineering software is a part of computer science that can involve writing a driver for a piece of hardware in order to enable it to work in an operating system unsupported by the manufacturer of the hardware, or to add functionality or increase the performance of its operations (not provided by the manufacturer) in the supported operating system, or to restore the usage of a piece of computer hardware for which the driver has disappeared altogether. A reverse engineered driver offers access to development, by persons outside the company that manufactured it, of the general hardware usage.

Reverse engineering

There is a case-law mechanism called "clean room design" that is employed to avoid copyright infringement when reverse engineering a proprietary driver.

It involves two separate engineering groups separated by a Chinese wall. One group works with the hardware to reverse engineer what must be the original algorithms and only documents their findings. The other group writes the code, based only on that documentation. Once the new code begins to function with tests on the hardware, it is able to be refined and developed over time.

This method insulates the new code from the old code, so that the reverse engineering is less likely to be considered by a jury as a derived work. [24] [25]

Computer security

The basic model used to provide both privacy and integrity for data is the "Chinese wall model" or the "Brewer and Nash model". It is a security model where read/write access to files is governed by membership of data in conflict-of-interest classes and datasets.

See also

Related Research Articles

<span class="mw-page-title-main">Computing</span> Activity involving calculations or computing machinery

Computing is any goal-oriented activity requiring, benefiting from, or creating computing machinery. It includes the study and experimentation of algorithmic processes, and development of both hardware and software. Computing has scientific, engineering, mathematical, technological and social aspects. Major computing disciplines include computer engineering, computer science, cybersecurity, data science, information systems, information technology and software engineering.

<span class="mw-page-title-main">Software</span> Non-tangible executable component of a computer

Software is a collection of programs and data that tell a computer how to perform specific tasks. Software often includes associated software documentation. This is in contrast to hardware, from which the system is built and which actually performs the work.

In computing, source code, or simply code, is any collection of text, with or without comments, written using a human-readable programming language, usually as plain text. The source code of a program is specially designed to facilitate the work of computer programmers, who specify the actions to be performed by a computer mostly by writing source code.

Clean-room design is the method of copying a design by reverse engineering and then recreating it without infringing any of the copyrights associated with the original design. Clean-room design is useful as a defense against copyright infringement because it relies on independent creation. However, because independent invention is not a defense against patents, clean-room designs typically cannot be used to circumvent patent restrictions.

In its most general sense, the practice of law involves giving legal advice to clients, drafting legal documents for clients, and representing clients in legal negotiations and court proceedings such as lawsuits, and is applied to the professional services of a lawyer or attorney at law, barrister, solicitor, or civil law notary. However, there is a substantial amount of overlap between the practice of law and various other professions where clients are represented by agents. These professions include real estate, banking, accounting, and insurance. Moreover, a growing number of legal document assistants (LDAs) are offering services which have traditionally been offered only by lawyers and their employee paralegals. Many documents may now be created by computer-assisted drafting libraries, where the clients are asked a series of questions that are posed by the software in order to construct the legal documents. In addition, regulatory consulting firms also provide advisory services on regulatory compliance that were traditionally provided exclusively by law firms.

<span class="mw-page-title-main">Investment banking</span> Type of financial services company

Investment banking pertains to certain activities of a financial services company or a corporate division that consist in advisory-based financial transactions on behalf of individuals, corporations, and governments. Traditionally associated with corporate finance, such a bank might assist in raising financial capital by underwriting or acting as the client's agent in the issuance of debt or equity securities. An investment bank may also assist companies involved in mergers and acquisitions (M&A) and provide ancillary services such as market making, trading of derivatives and equity securities, FICC services or research. Most investment banks maintain prime brokerage and asset management departments in conjunction with their investment research businesses. As an industry, it is broken up into the Bulge Bracket, Middle Market, and boutique market.

Ethical codes are adopted by organizations to assist members in understanding the difference between right and wrong and in applying that understanding to their decisions. An ethical code generally implies documents at three levels: codes of business ethics, codes of conduct for employees, and codes of professional practice.

A conflict of interest (COI) is a situation in which a person or organization is involved in multiple interests, financial or otherwise, and serving one interest could involve working against another. Typically, this relates to situations in which the personal interest of an individual or organization might adversely affect a duty owed to make decisions for the benefit of a third party.

Software engineering professionalism is a movement to make software engineering a profession, with aspects such as degree and certification programs, professional associations, professional ethics, and government licensing. The field is a licensed discipline in Texas in the United States, Engineers Australia(Course Accreditation since 2001, not Licensing), and many provinces in Canada.

A financial analyst is a professional, undertaking financial analysis for external or internal clients as a core feature of the job. The role may specifically be titled securities analyst, research analyst, equity analyst, investment analyst, or ratings analyst. The job title is a broad one: in banking, and industry more generally, various other analyst-roles cover financial management and (credit) risk management, as opposed to focusing on investments and valuation; these are also discussed in this article.

In computing, a clone is hardware or software that is designed to function in exactly the same way as another system. A specific subset of clones are remakes, which are revivals of old, obsolete, or discontinued products.

Professional responsibility is a set of duties within the concept of professional ethics for those who exercise a unique set of knowledge and skill as professionals.

A registered investment adviser (RIA) is a firm that is an investment adviser in the United States, registered as such with the Securities and Exchange Commission (SEC) or a state's securities agency. The numerous references to RIAs within the Investment Advisers Act of 1940 popularized the term, which is closely associated with the term investment adviser. An investment adviser is defined by the Securities and Exchange Commission as an individual or a firm that is in the business of giving advice about securities. However, an RIA is the actual firm, while the employees of the firm are called Investment Adviser Representatives (IARs).

Legal advertising is advertising by lawyers (attorneys), solicitors and law firms. Legal marketing is a broader term referring to advertising and other practices, including client relations, social media, and public relations. It's a type of marketing undertaken by law firms, lawyers (attorneys) and solicitors that aims to promote the services of law firms and increase their brand awareness.

Law practice management software is software designed to manage a law firm's case and client records, billing and bookkeeping, schedules and appointments, deadlines, computer files and to facilitate any compliance requirements such as with document retention policies, courts' electronic filing systems and, in the UK, the Solicitors' Accounts Rules as defined by the Solicitors Regulation Authority.

Proprietary software is software that grants its creator, publisher, or other rightsholder or rightsholder partner a legal monopoly by modern copyright and intellectual property law to exclude the recipient from freely sharing the software or modifying it, and—in some cases, as is the case with some patent-encumbered and EULA-bound software—from making use of the software on their own, thereby restricting their freedoms.

Reverse engineering is a process or method through which one attempts to understand through deductive reasoning how a previously made device, process, system, or piece of software accomplishes a task with very little insight into exactly how it does so. Depending on the system under consideration and the technologies employed, the knowledge gained during reverse engineering can help with repurposing obsolete objects, doing security analysis, or learning how something works.

The American Bar Association's Model Rules of Professional Conduct (MRPC) are a set of rules and commentaries on the ethical and professional responsibilities of members of the legal profession in the United States. Although the MRPC generally is not binding law in and of itself, it is intended to be a model for state regulators of the legal profession to adopt, while leaving room for state-specific adaptations. All fifty states and the District of Columbia have adopted legal ethics rules based at least in part on the MRPC.

<span class="mw-page-title-main">Legal technology</span> Technology and software to provide legal services

Legal technology, also known as Legal Tech, refers to the use of technology and software to provide legal services and support the legal industry. Legal Tech companies are often startups founded with the purpose of disrupting the traditionally conservative legal market.

Open source is source code that is made freely available for possible modification and redistribution. Products include permission to use the source code, design documents, or content of the product. The open-source model is a decentralized software development model that encourages open collaboration. A main principle of open-source software development is peer production, with products such as source code, blueprints, and documentation freely available to the public. The open-source movement in software began as a response to the limitations of proprietary code. The model is used for projects such as in open-source appropriate technology, and open-source drug discovery.

References

  1. 1 2 Frier, Sarah (9 October 2014). "Goldman Sachs Turns to Digital Surveillance to Catch Rogue Bankers". Bloomberg Businessweek. Archived from the original on 2014-10-20. Retrieved 2014-10-17.
  2. Garner, Bryan A. (2001). A Dictionary of Modern Legal Usage . Oxford University Press. p.  152. ISBN   978-0-19-514236-5 . Retrieved 15 January 2021., italics added
  3. Readers’ editor: Is the term “Chinese wall” racist?, published 30 January 2014, accessed 15 January 2021
  4. Investopedia. "The Chinese Wall Protects Against Conflicts Of Interest". Archived from the original on 2012-01-19. Retrieved 13 February 2012.
  5. "The Chinese Wall Defense to Law-Firm Disqualification" (1980) 128 University of Pennsylvania Law Review . 677
  6. 1 2 Peat, Marwick, Mitchell & Co. v. Superior Court Archived 2014-10-17 at the Wayback Machine , 200 Cal.App.3d 272, 293–294, 245 Cal.Rptr. 873, 887–888 (1988)
  7. "Hon. Harry W. Low (Ret.)". JAMS . Archived from the original on 2014-10-21. Retrieved 17 October 2014.
  8. David Hricik (June 8, 2005). "Chinese Walls: Racist?". Legal Ethics Forum. Archived from the original on 2014-10-20. Retrieved 2014-10-17.
  9. See Martin v. MacDonald Estate (Gray) [1991] 1 WWR 705 at 715, as per Sopinka J.
  10. 1 2 "Model Rules of Professional Conduct" Archived 2010-12-04 at the Wayback Machine
  11. "HALT - Lawyer Accountability". Archived from the original on 2010-10-30. Retrieved 2010-03-24.
  12. "{title}" (PDF). Archived from the original (PDF) on 2010-06-13. Retrieved 2010-03-24.
  13. Sharon D. Nelson; David K. Isom; John W. Simek (2006). Information Security for Lawyers and Law Firms. American Bar Association. pp. 25 ff. ISBN   978-1-59031-663-4 . Retrieved 6 August 2012.
  14. American Bar Association Standing Committee on Ethics and Professional Responsibility, Informal Opinion 88-1526: BNA Lawyers' Manual on Professional Conduct 901:318, adopted 22 June 1988, quoted in Connecticut Superior Court, Rivera v Chicago Pneumatic Tool Company, No. 516364, 5 August 1991, accessed 16 January 2021
  15. "Chinese Wall Definition" (Archived 2009-10-26 at the Wayback Machine ), Investopedia.
  16. Luyendijk, Joris (3 February 2012), "Equity finance banker: 'Don't underestimate the Japanese banks'", The Guardian , London, archived from the original on 2013-08-02, retrieved 7 February 2012 see Australian case ASIC v Citigroup Global Markets Australia Pty Ltd [2007] FCA 963 , Federal Court (Australia)
  17. Belfiore, Michael (24 March 2022). "The Marketing/Editorial Firewall Explained". Robot Lotus. Retrieved 8 January 2023.
  18. Sheehan, Kim (2004). "Chapter 3: The Chinese Wall: Advertising and Mass Media". Controversies in Contemporary Advertising. Thousand Oaks: SAGE Publications. ISBN   9781452233130.
  19. Santo, Alysia (30 September 2011). "Ensuring Independence". Columbia Journalism Review . Retrieved 8 January 2023.
  20. Perreault, Gregory; Kananovich, Volha; Hackett, Ella (27 March 2022). "Guarding the Firewall: How Political Journalists Distance Themselves From the Editorial Endorsement Process". Journalism & Mass Communication Quarterly . doi:10.1177/10776990221084609.
  21. Solicitors Regulation Authority. "Rule 3: Conflict of interests". SRA guidelines rule 3. Archived from the original on 2011-02-24. Retrieved 2011-03-23.
  22. McMullan, James M. "How to Avoid Conflicts". Americanbar.org. Archived from the original on 2015-06-20. Retrieved 2015-04-09.
  23. "Agreement between Buying Solutions and Banner Business Services Limited for the provision of Office Supplies (Product Grouping 1) (redacted)". Buying Solutions, a trading fund of the Cabinet Office. 2011. section N. Archived from the original on 21 January 2021. Retrieved 16 January 2021.
  24. Schwartz, Mathew (2001-11-12). "Reverse-Engineering". Computerworld. Archived from the original on 2013-06-24. Retrieved 2013-06-23. To protect against charges of having simply (and illegally) copied IBM's BIOS, Phoenix reverse-engineered it using what's called a 'clean room,' or 'Chinese wall,' approach. First, a team of engineers studied the IBM BIOS—about 8KB of code—and described everything it did as completely as possible without using or referencing any actual code. Then Phoenix brought in a second team of programmers who had no prior knowledge of the IBM BIOS and had never seen its code. Working only from the first team's functional specifications, the second team wrote a new BIOS that operated as specified.
  25. Hogle, Sean (2008-10-23). "Clean Room Defeats Software Infringement Claim in U.S. Federal Court". Archived from the original on 2014-10-21. Retrieved 2013-05-23. [...] dirty room reverse engineering should be done in conjunction with clean room development by using two physically and electronically isolated teams where one team does dirty room reverse engineering and the other does clean room development. If a dirty room team exists, the clean room engineers can write a description of the portion of the specification that needs elaboration or clarification. The dirty room engineers then use that request to create additional functional specifications or tests.