United States v. O'Hagan, 521 U.S. 642, 34 (1997)

Page:   Index   Previous  27  28  29  30  31  32  33  34  35  36  37  38  39  40  41  Next

Cite as: 521 U. S. 642 (1997)

Opinion of the Court

bankers, and accountants involved in structuring the transaction. The availability of that information may lead to abuse, for "even a hint of an upcoming tender offer may send the price of the target company's stock soaring." SEC v. Materia, 745 F. 2d 197, 199 (CA2 1984). Individuals entrusted with nonpublic information, particularly if they have no long-term loyalty to the issuer, may find the temptation to trade on that information hard to resist in view of "the very large short-term profits potentially available [to them]." Peters, 978 F. 2d, at 1167.

"[I]t may be possible to prove circumstantially that a person [traded on the basis of material, nonpublic information], but almost impossible to prove that the trader obtained such information in breach of a fiduciary duty owed either by the trader or by the ultimate insider source of the information." Ibid. The example of a "tippee" who trades on information received from an insider illustrates the problem. Under Rule 10b-5, "a tippee assumes a fiduciary duty to the shareholders of a corporation not to trade on material nonpublic information only when the insider has breached his fiduciary duty to the shareholders by disclosing the information to the tippee and the tippee knows or should know that there has been a breach." Dirks, 463 U. S., at 660. To show that a tippee who traded on nonpublic information about a tender offer had breached a fiduciary duty would require proof not only that the insider source breached a fiduciary duty, but that the tippee knew or should have known of that breach. "Yet, in most cases, the only parties to the [information transfer] will be the insider and the alleged tippee." Peters, 978 F. 2d, at 1167.20

20 Justice Thomas opines that there is no reason to anticipate difficul-ties in proving breach of duty in "misappropriation" cases. "Once the source of the [purloined] information has been identified," he asserts, "it should be a simple task to obtain proof of any breach of duty." Post, at 697. To test that assertion, assume a misappropriating partner at Dor-

675

Page:   Index   Previous  27  28  29  30  31  32  33  34  35  36  37  38  39  40  41  Next

Last modified: October 4, 2007