Burr & Forman's Partner Tom Potter Quoted in Corporate Counsel in "Is the SEC Being Too Tough on Compliance Officers?"

Firm News

 

In an article published on August 11, 2015, Tom Potter provides commentary on the recent decision to dismiss charges brought by the U.S. Securities and Exchange Commission's (SEC) against Judy Wolf, a compliance consultant who worked for Wells Fargo. The decision by an SEC administrative law judge (ALJ) furthers the debate around a recent trend of the Commission increasingly charging corporate auditors and compliance officers for alleged failures to identify and call out wrongdoing at their companies. While the ALJ cited a number of reasons for dismissal, including the opinion that the compliance offer should not take the blame for deeper systemic problems, Potter points out the ALJ's surprising acknowledgement that charging compliance personnel can be problematic in general. "Certainly you can't give your compliance officers a free pass to ignore or break the rules," Potter said. "But you certainly don't want to intimidate the people who are supposed to be helping you out."

For the full article, please click here.

About Burr & Forman LLP
For over a century, Burr & Forman LLP's experienced legal team has served clients with local, national, and international interests in numerous industry and practice areas, ranging from commercial litigation and class actions to corporate transactions, including bankruptcy and restructurings. A Southeast regional firm with nearly 300 attorneys and nine offices in Alabama, Florida, Georgia, Mississippi, and Tennessee, Burr & Forman attorneys draw from a diverse range of resources to help clients achieve their goals and address their complex legal needs. For more information, visit the firm's website at www.burr.com.

 

Burr
Jump to Page

Contact Us

About Burr & Forman Cybersecurity & Data Privacy Law

Burr & Forman's experienced team helps clients navigate the complex cybersecurity and data privacy landscape with strategies designed to assess current risks, develop a corrective action plan, implement best practices, and provide immediate and appropriate responses to a cybersecurity breach.

We use cookies to improve your website experience, provide additional security, and remember you when you return to the website. This website does not respond to "Do Not Track" signals. By clicking "Accept," you agree to our use of cookies. To learn more about how we use cookies, please see our Privacy Policy.

Necessary Cookies

Necessary cookies enable core functionality such as security, network management, and accessibility. These cookies may only be disabled by changing your browser settings, but this may affect how the website functions.


Analytical Cookies

Analytical cookies help us improve our website by collecting and reporting information on its usage. We access and process information from these cookies at an aggregate level.