-
Justice Ginsburg delivered the opinion of the Court.
This case concerns the interpretation and enforcement of § 10(b) and § 14(e) of the Securities Exchange Act of 1934, and rules made by the Securities and Exchange Commission pursuant to these provisions, Rule 10b-5 and Rule 14e-3(a).
*647 Two prime questions are presented. The first relates to the misappropriation of material, nonpublic information for securities trading; the second concerns fraudulent practices in the tender offer setting. In particular, we address and resolve these issues: (1) Is a person who trades in securities for personal profit, using confidential information misappropriated in breach of a fiduciary duty to the source of the information, guilty of violating § 10(b) and Rule 10b-5? (2) Did the Commission exceed its rulemaking authority by adopting Rule 14e-3(a), which proscribes trading on undisclosed information in the tender offer setting, even in the absence of a duty to disclose? Our answer to the first question is yes, and to the second question, viewed in the context of this case, no.I
Respondent James Herman O’Hagan was a partner in the law firm of Dorsey & Whitney in Minneapolis, Minnesota. In July 1988, Grand Metropolitan PLC (Grand Met), a company based in London, England, retained Dorsey & Whitney as local counsel to represent Grand Met regarding a potential tender offer for the common stock of the Pillsbury Company, headquartered in Minneapolis. Both Grand Met and Dorsey & Whitney took precautions to protect the confidentiality of Grand Met’s tender offer plans. O’Hagan did no work on the Grand Met representation. Dorsey & Whitney withdrew from representing Grand Met on September 9, 1988. Less than a month later, on October 4,1988, Grand Met publicly announced its tender offer for Pillsbury stock.
On August 18, 1988, while Dorsey & Whitney was still representing Grand Met, O’Hagan began purchasing call options for Pillsbury stock. Each option gave him the right to purchase 100 shares of Pillsbury stock by a specified date in September 1988. Later.in August and in September, O’Hagan made additional purchases of Pillsbury call options. By the end of September, he owned 2,500 unexpired Pillsbury options, apparently more than any other individual in
*648 vestor. See App. 85,148. O’Hagan also purchased, in September 1988, some 5,000 shares of Pillsbury common stock, at a price just under $39 per share. When Grand Met announced its tender offer in October, the price of Pillsbury stock rose to nearly $60 per share. O’Hagan then sold his Pillsbury call options and common stock, making a profit of more than $4.3 million.The Securities and Exchange Commission (SEC or Commission) initiated an investigation into O’Hagan’s transactions, culminating in a 57-count indictment. The indictment alleged that O’Hagan defrauded his law firm and its client, Grand Met, by using for his own trading purposes material, nonpublic information regarding Grand Met’s planned tender offer. Id., at 8.
1 According to the indictment, O’Hagan used the profits he gained through this trading to conceal his previous embezzlement and conversion of unrelated client trust funds. Id., at 10.2 O’Hagan was charged with 20 counts of mail fraud, in violation of 18 U. S. C. § 1341; 17 counts of securities fraud, in violation of § 10(b) of the Securities Exchange Act of 1934 (Exchange Act), 48 Stat. 891, 15 U.S.C. § 78j(b), and SEC Rule 10b-6, 17 CFR §240.10b-5*649 (1996); 17 counts of fraudulent trading in connection with a tender offer, in violation of § 14(e) of the Exchange Act, 15 U. S. C. § 78n(e), and SEC Rule 14e-3(a), 17 CFR §240.14e-3(a) (1996); and 3 counts of violating federal money laundering statutes, 18 U. S. C. §§ 1956(a)(1)(B)(i), 1957. See App. 13-24. A jury convicted O’Hagan on all 57 counts, and he was sentenced to a 41-month term of imprisonment.A divided panel of the Court of Appeals for the Eighth Circuit reversed all of O’Hagan’s convictions. 92 F. 3d 612 (1996). Liability under § 10(b) and Rule 10b-5, the Eighth Circuit held, may not be grounded on the “misappropriation theory” of securities fraud on which the prosecution relied. Id., at 622. The Court of Appeals also held that Rule 14e-3(a) — which prohibits trading while in possession of material, nonpublic information relating to a tender offer — exceeds the SEC’s § 14(e) rulemaking authority because the Rule contains no breach of fiduciary duty requirement. Id., at 627. The Eighth Circuit further concluded that O’Hagan’s mail fraud and money laundering convictions rested on violations of the securities laws, and therefore could not stand once the securities fraud convictions were reversed. Id., at 627-628. Judge Fagg, dissenting, stated that he would recognize and enforce the misappropriation theory, and would hold that the SEC did not exceed its rulemaking authority when it adopted Rule 14e-3(a) without requiring proof of a breach of fiduciary duty. Id., at 628.
Decisions of the Courts of Appeals are in conflict on the propriety of the misappropriation theory under § 10(b) and Rule 10b-5, see infra this page and 650, and n. 3, and on the legitimacy of Rule 14e-3(a) under § 14(e), see infra, at 669-670. We granted certiorari, 519 U. S. 1087 (1997), and now reverse the Eighth Circuit’s judgment.
II
We address first the Court of Appeals reversal of 0 Ha-gan’s convictions under § 10(b) and Rule 10b-5. Following
*650 the Fourth Circuit’s lead, see United States v. Bryan, 58 F. 3d 933, 943-959 (1995), the Eighth Circuit rejected the misappropriation theory as a basis for § 10(b) liability. We hold, in accord with several other Courts of Appeals,3 that criminal liability under § 10(b) may be predicated on the misappropriation theory.4 A
In pertinent part, § 10(b) of the Exchange Act provides:
“It shall be unlawful for any person, directly or indirectly, by the use of any means or instrumentality of interstate commerce or of the mails, or of any facility of any national securities exchange—
“(b) To use or employ, in connection with the purchase or sale of any security registered on a national securities exchange or any security not so registered, any manipulative or deceptive device or contrivance in contravention of such rules and regulations as the [Securities and Exchange] Commission may prescribe as necessary or appropriate in the public interest or for the protection of investors.” 15 U. S. C. § 78j(b).
*651 The statute thus proscribes (1) using any deceptive device (2) in connection with the purchase or sale of securities, in contravention of rules prescribed by the Commission. The provision, as written, does not confine its coverage to deception of a purchaser or seller of securities, see United States v. Newman, 664 F. 2d 12, 17 (CA2 1981); rather, the statute reaches any deceptive device used “in connection with the purchase or sale of any security.”Pursuant to its § 10(b) rulemaking authority, the Commission has adopted Rule 10b-5, which, as relevant here, provides:
“It shall be unlawful for any person, directly or indirectly, by the use of any means or instrumentality of interstate commerce, or of the mails or of any facility of any national securities exchange,
“(a) To employ any device, scheme, or artifice to defraud, [or]
“(c) To engage in any act, practice, or course of business which operates or would operate as a fraud or deceit upon any person,
“in connection with the purchase or sale of any security.” 17 CFR §240.10b-5 (1996).
Liability under Rule 10b-5, our precedent indicates, does not extend beyond conduct encompassed by § 10(b)’s prohibition. See Ernst & Ernst v. Hochfelder, 425 U. S. 185, 214 (1976) (scope of Rule 10b-5 cannot exceed power Congress granted Commission under § 10(b)); see also Central Bank of Denver, N. A. v. First Interstate Bank of Denver, N. A., 511 U. S. 164, 173 (1994) (“We have refused to allow [private] 10b-5 challenges to conduct not prohibited by the text of the statute.”).
Under the “traditional” or “classical theory” of insider trading liability, § 10(b) and Rule 10b-5 are violated when a corporate insider trades in the securities of his corporation
*652 on the basis of material, nonpublic information. Trading on such information qualifies as a “deceptive device” under § 10(b), we have affirmed, because “a relationship of trust and confidence [exists] between the shareholders of a corporation and those insiders who have obtained confidential information by reason of their position with that corporation.” Chiarella v. United States, 445 U. S. 222, 228 (1980). That relationship, we recognized, “gives rise to a duty to disclose [or to abstain from trading] because of the ‘necessity of preventing a corporate insider from . . . tak[ing] unfair advantage of. . . uninformed . . . stockholders.’” Id., at 228-229 (citation omitted). The classical theory applies not only to officers, directors, and other permanent insiders of a corporation, but also to attorneys, accountants, consultants, and others who temporarily become fiduciaries of a corporation. See Dirks v. SEC, 463 U. S. 646, 655, n. 14 (1983).The “misappropriation theory” holds that a person commits fraud “in connection with” a securities transaction, and thereby violates § 10(b) and Rule 10b-5, when he misappropriates confidential information for securities trading purposes, in breach of a duty owed to the source of the information. See Brief for United States 14. Under this theory, a fiduciary’s undisclosed, self-serving use of a principal’s information to purchase or sell securities, in breach of a duty of loyalty and confidentiality, defrauds the principal of the exclusive use of that information. In lieu of premising liability on a fiduciary relationship between company insider and purchaser or seller of the company’s stock, the misappropriation theory premises liability on a fiduciary-turned-trader’s deception of those who entrusted him with access to confidential information.
The two theories are complementary, each addressing efforts to capitalize on nonpublic information through the purchase or sale of securities. The classical theory targets a corporate insider’s breach of duty to shareholders with whom the insider transacts; the misappropriation theory outlaws
*653 trading on the basis of nonpublic information by a corporate “outsider” in breach of a duty owed not to a trading party, but to the source of the information. The misappropriation theory is thus designed to “protec[t] the integrity of the securities markets against abuses by 'outsiders’ to a corporation who have access to confidential information that will affect th[e] corporation’s security price when revealed, but who owe no fiduciary or other duty to that corporation’s shareholders.” Ibid.In this case, the indictment alleged that O’Hagan, in breach of a duty of trust and confidence he owed to his law firm, Dorsey & Whitney, and to its client, Grand Met, traded on the basis of nonpublic information regarding Grand Met’s planned tender offer for Pillsbury common stock. App. 16. This conduct, the Government charged, constituted a fraudulent device in connection with the purchase and sale of securities.
5 B
We agree with the Government that misappropriation, as just defined, satisfies §10(b)’s requirement that chargeable conduct involve a “deceptive device or contrivance” used “in connection with” the purchase or sale of securities. We observe, first, that misappropriators, as the Government describes them, deal in deception. A fiduciary who “[pretends] loyalty to the principal while secretly converting the principal’s information for personal gain,” Brief for United States
*654 17, “dupes” or defrauds the principal. See Aldave, Misappropriation: A General Theory of Liability for Trading on Nonpublic Information, 13 Hofstra L. Rev. 101, 119 (1984).We addressed fraud of the same species in Carpenter v. United States, 484 U. S. 19 (1987), which involved the mail fraud statute’s proscription of “any scheme or artifice to defraud,” 18 U. S. C. § 1341. Affirming convictions under that statute, we said in Carpenter that an employee’s undertaking not to reveal his employer’s confidential information “became a sham” when the employee provided the information to his co-conspirators in a scheme to obtain trading profits. 484 U. S., at 27. A company’s confidential information, we recognized in Carpenter, qualifies as property to which the company has a right of exclusive use. Id., at 25-27. The undisclosed misappropriation of such information, in violation of a fiduciary duty, the Court said in Carpenter, constitutes fraud akin to embezzlement — “‘the fraudulent appropriation to one’s own use of the money or goods entrusted to one’s care by another.’ ” Id., at 27 (quoting Grin v. Shine, 187 U. S. 181, 189 (1902)); see Aldave, 13 Hofstra L. Rev., at 119. Carpenter’s discussion of the fraudulent misuse of confidential information, the Government notes, “is a particularly apt source of guidance here, because [the mail fraud statute] (like Section 10(b)) has long been held to require deception, not merely the breach of a fiduciary duty.” Brief for United States 18, n. 9 (citation omitted).
Deception through nondisclosure is central to the theory of liability for which the Government seeks recognition. As counsel for the Government stated in explanation of the theory at oral argument: “To satisfy the common law rule that a trustee may not use the property that [has] been entrusted [to] him, there would have to be consent. To satisfy the requirement of the Securities Act that there be no deception, there would only have to be disclosure.” Tr. of Oral Arg. 12; see generally Restatement (Second) of Agency §§ 390, 395
*655 (1958) (agent’s disclosure obligation regarding use of confidential information).6 The misappropriation theory advanced by the Government is consistent with Santa Fe Industries, Inc. v. Green, 430 U. S. 462 (1977), a decision underscoring that § 10(b) is not an all-purpose breach of fiduciary duty ban; rather, it trains on conduct involving manipulation or deception. See id., at 473-476. In contrast to the Government’s allegations in this case, in Santa Fe Industries, all pertinent facts were disclosed by the persons charged with violating § 10(b) and Rule 10b-5, see id., at 474; therefore, there was no deception through nondisclosure to which liability under those provisions could attach, see id., at 476. Similarly, full disclosure forecloses liability under the misappropriation theory: Because the deception essential to the misappropriation theory involves feigning fidelity to the source of information, if the fiduciary discloses to the source that he plans to trade on the nonpublic information, there is no “deceptive device” and thus no § 10(b) violation — although the fiduciary-turned-trader may remain liable under state law for breach of a duty of loyalty.
7 We turn next to the § 10(b) requirement that the misappro-priator’s deceptive use of information be “in connection with
*656 the purchase or sale of [a] security.” This element is satisfied because the fiduciary’s fraud is consummated, not when the fiduciary gains the confidential information, but when, without disclosure to his principal, he uses the information to purchase or sell securities. The securities transaction and the breach of duty thus coincide. This is so even though the person or entity defrauded is not the other party to the trade, but is, instead, the source of the nonpublic information. See Aldave, 13 Hofstra L. Rev., at 120 (“a fraud or deceit can be practiced on one person, with resultant harm to another person or group of persons”). A misappropriator who trades on the basis of material, nonpublic information, in short, gains his advantageous market position through deception; he deceives the source of the information and simultaneously harms members of the investing public. See id., at 120-121, and n. 107.The misappropriation theory targets information of a sort that misappropriators ordinarily capitalize upon to gain no-risk profits through the purchase or sale of securities. Should a misappropriator put such information to other use, the statute’s prohibition would not be implicated. The theory does not catch all conceivable forms of fraud involving confidential information; rather, it catches fraudulent means of capitalizing on such information through securities transactions.
The Government notes another limitation on the forms of fraud § 10(b) reaches: “The misappropriation theory would not. . . apply to a case in which a person defrauded a bank into giving him a loan or embezzled cash from another, and then used the proceeds of the misdeed to purchase securities.” Brief for United States 24, n. 13. In such a case, the Government states, “the proceeds would have value to the malefactor apart from their use in a securities transaction, and the fraud would be complete as soon as the money was obtained.” Ibid. In other words, money can buy, if not anything, then at least many things; its misappropriation
*657 may thus be viewed as sufficiently detached from a subsequent securities transaction that § 10(b)’s "in connection with” requirement would not be met. Ibid.Justice Thomas’ charge that the misappropriation theory is incoherent because information, like funds, can be put to multiple uses, see post, at 681-686 (opinion concurring in judgment in part and dissenting in part), misses the point. The Exchange Act was enacted in part “to insure the maintenance of fair and honest markets,” 15 U. S. C. § 78b, and there is no question that fraudulent uses of confidential information fall within § 10(b)’s prohibition if the fraud is “in connection with” a securities transaction. It is hardly remarkable that a rule suitably applied to the fraudulent uses of certain kinds of information would be stretched beyond reason were it applied to the fraudulent use of money.
Justice Thomas does catch the Government in overstatement. Observing that money can be used for all manner of purposes and purchases, the Government urges that confidential information of the kind at issue derives its value only from its utility in securities trading. See Brief for United States 10, 21; post, at 683-684 (several times emphasizing the word “only”). Substitute “ordinarily” for “only,” and the Government is on the mark.
8 *658 Our recognition that the Government’s “only” is an overstatement has provoked the dissent to cry “new theory.” See post, at 687-689. But the very case on which Justice Thomas relies, Motor Vehicle Mfrs. Assn. of United States, Inc. v. State Farm Mut. Automobile Ins. Co., 463 U. S. 29 (1983), shows the extremity of that charge. In State Farm, we reviewed an agency’s rescission of a rule under the same “arbitrary and capricious” standard by which the promulgation of a rule under the relevant statute was to be judged, see id., at 41-42; in our decision concluding that the agency had not adequately explained its regulatory action, see id., at 57, we cautioned that a “reviewing court should not attempt itself to make up for such deficiencies,” id., at 43. Here, by contrast, Rule 10b-5’s promulgation has not been challenged; we consider only the Government’s charge that O’Hagan’s alleged fraudulent conduct falls within the prohibitions of the Rule and § 10(b). In this context, we acknowledge simply that, in defending the Government’s interpretation of the Rule and statute in this Court, the Government’s lawyers have pressed a solid point too far, something lawyers, occasionally even judges, are wont to do.The misappropriation theory comports with § 10(b)’s language, which requires deception “in connection with the purchase or sale of any security,” not deception of an identifiable purchaser or seller. The theory is also well tuned to an animating purpose of the Exchange Act: to insure honest securities markets and thereby promote investor confidence. See 45 Fed. Reg. 60412 (1980) (trading on misappropriated information “undermines the integrity of, and investor confidence in, the securities markets”). Although informational disparity is inevitable in the securities markets, investors likely would hesitate to venture their capital in a market where trading based on misappropriated nonpublic information is unchecked by law. An investor’s informational disadvantage vis-á-vis a misappropriator with material, nonpublic in
*659 formation stems from contrivance, not luck; it is a disadvantage that cannot be overcome with research or skill. See Brudney, Insiders, Outsiders, and Informational Advantages Under the Federal Securities Laws, 93 Harv. L. Rev. 322, 356 (1979) (“If the market is thought to be systematically populated with . . . transactors [trading on the basis of misappropriated information] some investors will refrain from dealing altogether, and others will incur costs to avoid dealing with such transactors or corruptly to overcome their unerodable informational advantages.”); Aldave, 13 Hofstra L. Rev., at 122-123.In sum, considering the inhibiting impact on market participation of trading on misappropriated information, and the congressional purposes underlying § 10(b), it makes scant sense to hold a lawyer like O’Hagan a § 10(b) violator if he works for a law firm representing the target of a tender offer, but not if he works for a law firm representing the bidder. The text of the statute requires no such result.
9 The misappropriation at issue here was properly made the subject of a.§ 10(b) charge because it meets the statutory requirement that there be “deceptive” conduct “in connection with” securities transactions.*660 cThe Court of Appeals rejected the misappropriation theory primarily on two grounds. First, as the Eighth Circuit comprehended the theory, it requires neither misrepresentation nor nondisclosure. See 92 F. 3d, at 618. As we just explained, however, see supra, at 654-665, deceptive nondisclosure is essential to the § 10(b) liability at issue. Concretely, in this case, “it [was O’Hagan’s] failure to disclose his personal trading to Grand Met and Dorsey, in breach of his duty to do so, that ma[de] his conduct ‘deceptive’ within the meaning of [§]10(b).” Reply Brief 7.
Second and “more obvious,” the Court of Appeals said, the misappropriation theory is not moored to § 10(b)’s requirement that “the fraud be ‘in connection with the purchase or sale of any security.’” 92 F. 3d, at 618 (quoting 15 U. S. C. § 78j(b)). According to the Eighth Circuit, three of our decisions reveal that § 10(b) liability cannot be predicated on a duty owed to the source of nonpublic information: Chiarella v. United States, 445 U. S. 222 (1980); Dirks v. SEC, 463 U. S. 646 (1983); and Central Bank of Denver, N. A. v. First Interstate Bank of Denver, N. A, 511 U. S. 164 (1994). “[Ojnly a breach of a duty to parties to the securities transaction,” the Court of Appeals concluded, “or, at the most, to other market participants such as investors, will be sufficient to give rise to § 10(b) liability.” 92 F. 3d, at 618. We read the statute and our precedent differently, and note again that § 10(b) refers to “the purchase or sale of any security,” not.to identifiable purchasers or sellers of securities.
Chiarella involved securities trades by a printer employed at a shop that printed documents announcing corporate takeover bids. See 445 U. S., at 224. Deducing the names of target companies from documents he handled, the printer bought shares of the targets before takeover bids were announced, expecting (correctly) that the share prices would rise upon announcement. In these transactions, the printer did not disclose to the sellers of the securities (the target
*661 companies’ shareholders) the nonpublic information on which he traded. See ibid. For that trading, the printer was convicted of violating § 10(b) and Rule 10b-5. We reversed the Court of Appeals judgment that had affirmed the conviction. See id., at 225.The jury in Chiarella had been instructed that it could convict the defendant if he willfully failed to inform sellers of target company securities that he knew of a takeover bid that would increase the value of their shares. See id., at 226. Emphasizing that the printer had no agency or other fiduciary relationship with the sellers, we held that liability could not be imposed on so broad a theory. See id., at 235. There is under § 10(b), we explained, no “general duty between all participants in market transactions to forgo actions based on material, nonpublic information.” Id., at 233. Under established doctrine, we said, a duty to disclose or abstain from trading “arises from a specific relationship between two parties.” Ibid.
The Court did not hold in Chiarella that the only relationship prompting liability for trading on undisclosed information is the relationship between a corporation’s insiders and shareholders. That is evident from our response to the Government’s argument before this Court that the printer’s misappropriation of information from his employer for purposes of securities trading — in violation of a duty of confidentiality owed to the acquiring companies — constituted fraud in connection with the purchase or sale of a security, and thereby satisfied the terms of § 10(b). Id., at 235-236. The Court declined to reach that potential basis for the printer’s liability, because the theory had not been submitted to the jury. See id., at 236-237. But four Justices found merit in it. See id., at 239 (Brennan, J., concurring in judgment); id., at 240-243 (Burger, C. J., dissenting); id., at 245 (Blackmun, J., joined by Marshall, J., dissenting). And a fifth Justice stated that the Court “wisely le[ft] the resolution of this issue for another day.” Id., at 238 (Stevens, J., concurring).
*662 Chiarella thus expressly left open the misappropriation theory before us today. Certain statements in Chiarella, however, led the Eighth Circuit in the instant case to conclude that § 10(b) liability hinges exclusively on a breach of duty owed to a purchaser or seller of securities. See 92 F. 3d, at 618. The Court said in Chiarella that § 10(b) liability “is premised upon a duty to disclose arising from a relationship of trust and confidence between parties to a transac- . tion,” 445 U. S., at 230 (emphasis added), and observed that the printshop employee defendant in that case “was not a person in whom the sellers had placed their trust and confidence,” see id., at 232. These statements rejected the notion that § 10(b) stretches so far as to impose “a general duty between all participants in market transactions to forgo actions based on material, nonpublic information,” id., at 233, and we confine them to that context. The statements highlighted by the Eighth Circuit, in short, appear in an opinion carefully leaving for future resolution the validity of the misappropriation theory, and therefore cannot be read to foreclose that theory.Dirks, too, left room for application of the misappropriation theory in cases like the one we confront.
10 Dirks involved an investment analyst who had received information from a former insider of a corporation with which the analyst had no connection. See 463 U. S., at 648-649. The information indicated that the corporation had engaged in a massive fraud. The analyst investigated the fraud, obtaining corroborating information from employees of the corporation. During his investigation, the analyst discussed his findings with clients and investors, some of whom sold their holdings in the company the analyst suspected of gross wrongdoing. See id., at 649.*663 The SEC censured the analyst for, inter alia, aiding and abetting § 10(b) and Rule 10b-5 violations by clients and investors who sold their holdings based on the nonpublic information the analyst passed on. See id., at 650-652. In the SEC’s view, the analyst, as a “tippee” of corporation insiders, had a duty under § 10(b) and Rule 10b-5 to refrain from communicating the nonpublic information to persons likely to trade on the basis of it. See id., at 651, 655-656. This Court found no such obligation, see id., at 665-667, and repeated the key point made in Chiarella: There is no “ ‘general duty between all participants in market transactions to forgo actions based on material, nonpublic information.’” 463 U. S., at 655 (quoting Chiarella, 445 U. S., at 233); see Aldave, 13 Hofstra L. Rev., at 122 (misappropriation theory bars only “trading on the basis of information that the wrongdoer converted to his own use in violation of some fiduciary, contractual, or similar obligation to the owner or rightful possessor of the information”).No showing had been made in Dirks that the “tippers” had violated any duty by disclosing to the analyst nonpublic information about their former employer. The insiders had acted not for personal profit, but to expose a massive fraud within the corporation. See 463 U. S., at 666-667. Absent any violation by the tippers, there could be no derivative liability for the tippee. See id., at 667. Most important for purposes of the instant case, the Court observed in Dirks: “There was no expectation by [the analyst’s] sources that he would keep their information in confidence. Nor did [the analyst] misappropriate or illegally obtain the information . . . .” Id., at 665. Dirks thus presents no suggestion that a person who gains nonpublic information through misappropriation in breach of a fiduciary duty escapes § 10(b) liability when, without alerting the source, he trades on the information.
Last of the three cases the Eighth Circuit regarded as warranting disapproval of the misappropriation theory, Cen
*664 tral Bank held that “a private plaintiff may not maintain an aiding and abetting suit under § 10(b).” 511 U. S., at 191. We immediately cautioned in Central Bank that secondary actors in the securities markets may sometimes be chargeable under the securities Acts: “Any person or entity, including a lawyer, accountant, or bank, who employs a manipulative device or makes a material misstatement (or omission) on which a purchaser or seller of securities relies may be liable as a primary violator under 10b—5, assuming . . . the requirements for primary liability under Rule 10b-5 are met.” Ibid. (emphasis added). The Eighth Circuit isolated the statement just quoted and drew from it the conclusion that § 10(b) covers only deceptive statements or omissions on which purchasers and sellers, and perhaps other market participants, rely. See 92 F. 3d, at 619. It is evident from the question presented in Central Bank, however, that this Court, in the quoted passage, sought only to clarify that secondary actors, although not subject to aiding and abetting liability, remain subject to primary liability under § 10(b) and Rule 10b-5 for certain conduct.Furthermore, Central Bank’s discussion concerned only private civil litigation under § 10(b) and Rule 10b-5, not-criminal liability. Central Bank’s reference to purchasers or sellers of securities must be read in light of a longstanding limitation on private § 10(b) suits. In Blue Chip Stamps v. Manor Drug Stores, 421 U. S. 723 (1975), we held that only actual purchasers or sellers of securities may maintain a private civil action under § 10(b) and Rule 10b-5. We so confined the § 10(b) private right of action because of “policy considerations.” Id., at 737. In particular, Blue Chip Stamps recognized the abuse potential and proof problems inherent in suits by investors who neither bought nor sold, but asserted they would have traded absent fraudulent conduct by others. See id., at 739-747; see also Holmes v. Securities Investor Protection Corporation, 503 U. S. 258, 285
*665 (1992) (O’Connor, J., concurring in part and concurring in judgment); id., at 289-290 (Scalia, J., concurring in judgment). Criminal prosecutions do not present the dangers the Court addressed in Blue Chip Stamps, so that decision is “inapplicable” to indictments for violations of § 10(b) and Rule 10b-5. United States v. Naftalin, 441 U. S. 768, 774, n. 6 (1979); see also Holmes, 503 U. S., at 281 (O’Connor, J., concurring in part and concurring in judgment) (“[T]he purchaser/seller standing requirement for private civil actions under § 10(b) and Rule 10b-5 is of no import in criminal prosecutions for willful violations of those provisions.”).In sum, the misappropriation theory, as we have examined and explained it in this opinion, is both consistent with the statute and with our precedent.
11 Vital to our decision that criminal liability may be sustained under the misappropriation theory, we emphasize, are two sturdy safeguards Congress has provided regarding scienter. To establish a criminal violation of Rule 10b-5, the Government must prove that a person “willfully” violated the provision. See 15 U. S. C.*666 §78ff(a).12 Furthermore, a defendant may not be imprisoned for violating Rule 10b-5 if he proves that he had no knowledge of the Rule. See ibid.13 O’Hagan’s charge that the misappropriation theory is too indefinite to permit the imposition of criminal liability, see Brief for Respondent 30-33, thus fails not only because the theory is limited to those who breach a recognized duty. In addition, the statute’s “requirement of the presence of culpable intent as a necessary element of the offense does much to destroy any force in the argument that application of the [statute]” in circumstances such as O’Hagan’s is unjust. Boyce Motor Lines, Inc. v. United States, 342 U. S. 337, 342 (1952).The Eighth Circuit erred in holding that the misappropriation theory is inconsistent with § 10(b). The Court of Appeals may address on remand O’Hagan’s other challenges to his convictions under § 10(b) and Rule 10b-5.
H-H HH HH
We consider next the ground on which the Court of Appeals reversed O’Hagan’s convictions for fraudulent trading in connection with a tender offer, in violation of § 14(e) of the Exchange Act and SEC Rule 14e-3(a). A sole question is before us as to these convictions: Did the Commission, as the Court of Appeals held, exceed its rulemaking authority under § 14(e) when it adopted Rule 14e-3(a) without requiring a showing that the trading at issue entailed a breach of
*667 fiduciary duty? We hold that the Commission, in this regard and to the extent relevant to this case, did not exceed its authority.The governing statutory provision, § 14(e) of the Exchange Act, reads in relevant part:
“It shall be unlawful for any person ... to engage in any fraudulent, deceptive, or manipulative acts or practices, in connection with any tender offer.... The [SEC] shall, for the purposes of this subsection, by rules and regulations define, and prescribe means reasonably designed to prevent, such acts and practices as are fraudulent, deceptive, or manipulative.” 15 U. S. C. §78n(e).
Section 14(e)’s first sentence prohibits fraudulent acts in connection with a tender offer. This self-operating proscription was one of several provisions added to the Exchange Act in 1968 by the Williams Act, 82 Stat. 454. The section’s second sentence delegates definitional and prophylactic rulemaking authority to the Commission. Congress added this rule-making delegation to § 14(e) in 1970 amendments to the Williams Act. See § 5, 84 Stat. 1497.
Through § 14(e) and other provisions on disclosure in the Williams Act,
14 Congress sought to ensure that shareholders “confronted by a cash tender offer for their stock [would] not be required to respond without adequate information.” Rondeau v. Mosinee Paper Corp., 422 U. S. 49, 58 (1975); see Lewis v. McGraw, 619 F. 2d 192, 195 (CA2 1980) (per curiam)*668 (“very purpose” of Williams Act was “informed decision-making by shareholders”). As we recognized in Schreiber v. Burlington Northern, Inc., 472 U. S. 1 (1985), Congress designed the Williams Act to make “disclosure, rather than court-imposed principles of ‘fairness’ or ‘artificiality,’ . . . the preferred method of market regulation.” Id., at 9, n. 8. Section 14(e), we explained, “supplements the more precise disclosure provisions found elsewhere in the Williams Act, while requiring disclosure more explicitly addressed to the tender offer context than that required by § 10(b).” Id., at 10-11.Relying on § 14(e)’s rulemaking authorization, the Commission, in 1980, promulgated Rule 14e-3(a). That measure provides:
“(a) If any person has taken a substantial step or steps to commence, or has commenced, a tender offer (the ‘offering person’), it shall constitute a fraudulent, deceptive or manipulative act or practice within the meaning of section 14(e) of the [Exchange] Act for any other person who is in possession of material information relating to such tender offer which information he knows or has reason to know is nonpublic and which he knows or has reason to know has been acquired directly or indirectly from:
“(1) The offering person,
“(2) The issuer of the securities sought or to be sought by such tender offer, or
“(3) Any officer, director, partner or employee or any other person acting on behalf of the offering person or such issuer, to purchase or sell or cause to be purchased or sold any of such securities or any securities convertible into or exchangeable for any such securities or any option or right to obtain or to dispose of any of the foregoing securities, unless within a reasonable time prior to any purchase or sale such information and its source
*669 are publicly disclosed by press release or otherwise.” 17 CFR §240.14e-3(a) (1996).As characterized by the Commission, Rule 14e-3(a) is a "disclose or abstain from trading” requirement. 45 Fed. Reg. 60410 (1980).
15 The Second Circuit concisely described the Rule’s thrust:“One violates Rule 14e-3(a) if he trades on the basis, of material nonpublic information concerning a pending tender offer that he knows or has reason to know has been acquired ‘directly or indirectly’ from an insider of the offeror or issuer, or someone working on their behalf. Rule 14e-3(a) is a disclosure provision. It creates a duty in those traders who fall within its ambit to abstain or disclose, without regard to whether the trader owes a pre-existing fiduciary duty to respect the confidentiality of the information.” United States v. Chestman, 947 F. 2d 551, 557 (1991) (en banc) (emphasis added), cert. denied, 503 U. S. 1004 (1992).
See also SEC v. Maio, 51 F. 3d 623, 635 (CA7 1995) (“Rule 14e-3 creates a duty to disclose material non-public information, or abstain from trading in stocks implicated by an impending tender offer, regardless of whether such information was obtained through a breach of fiduciary duty.” (emphasis added)); SEC v. Peters, 978 F. 2d 1162, 1165 (CA10 1992) (as written, Rule 14e-3(a) has no fiduciary duty requirement).
In the Eighth Circuit’s view, because Rule 14e-3(a) applies whether or not the trading in question breaches a fiduciary duty, the regulation exceeds the SEC’s § 14(e) rulemaking authority. See 92 F. 3d, at 624, 627. Contra, Maio, 51 F. 3d, at 634-635 (CA7); Peters, 978 F. 2d, at 1165-1167 (CA10);
*670 Chestman, 947 F. 2d, at 556-563 (CA2) (all holding Rule 14e-3(a) a proper exercise of SEC’s statutory authority). In support of its holding, the Eighth Circuit relied on the text of § 14(e) and our decisions in Schreiber and Chiarella. See 92 F. 3d, at 624-627.The Eighth Circuit homed in on the essence of §14(e)’s rulemaking authorization: “[T]he statute empowers the SEC to 'define* and ‘prescribe means reasonably designed to prevent’ ‘acts and practices’ which are ‘fraudulent.’” Id., at 624. All that means, the Eighth Circuit found plain, is that the SEC may “identify and regulate,” in the tender offer context, “acts and practices” the law already defines as “fraudulent”; but, the Eighth Circuit maintained, the SEC may not “create its own definition of fraud.” Ibid. (internal quotation marks omitted).
This Court, the Eighth Circuit pointed out, held in Schrei-ber that the word “manipulative” in the § 14(e) phrase “fraudulent, deceptive, or manipulative acts or practices” means just what the word means in § 10(b): Absent misrepresentation or nondisclosure, an act cannot be indicted as manipulative. See 92 F. 3d, at 625 (citing Schreiber, 472 U. S., at 7-8, and n. 6). Section 10(b) interpretations guide construction of § 14(e), the Eighth Circuit added, see 92 F. 3d, at 625, citing this Court’s acknowledgment in Schreiber that §14(e)’s “ ‘broad antifraud prohibition’ . . . [is] modeled on the anti-fraud provisions of § 10(b). .. and Rule 10b-5,” 472 U. S., at 10 (citation omitted); see id., at 10-11, n. 10.
For the meaning of “fraudulent” under § 10(b), the Eighth Circuit looked to Chiarella. See 92 F. 3d, at 625. In that case, the Eighth Circuit recounted, this Court held that a failure to disclose information could be “fraudulent” under § 10(b) only when there was a duty to speak arising out of “ ‘a fiduciary or other similar relation of trust and confidence.’ ” Chiarella, 445 U. S., at 228 (quoting Restatement (Second) of Torts § 551(2)(a) (1976)). Just as § 10(b) demands a showing
*671 of a breach of fiduciary duty, so such a breach is necessary to make out a § 14(e) violation, the Eighth Circuit concluded.As to the Commission’s § 14(e) authority to “prescribe means reasonably designed to prevent” fraudulent acts, the Eighth Circuit stated: “Properly read, this provision means simply that the SEC has broad regulatory powers in the field of tender offers, but the statutory terms have a fixed meaning which the SEC cannot alter by way of an administrative rule.” 92 F. 3d, at 627.
The United States urges that the Eighth Circuit’s reading of § 14(e) misapprehends both the Commission’s authority to define fraudulent acts and the Commission’s power to prevent them. “The ‘defining’ power,” the United States submits, “would be a virtual nullity were the SEC not permitted to go beyond common law fraud (which is separately prohibited in the first [self-operative] sentence of Section 14(e)).” Brief for United States 11; see id., at 37.
In maintaining that the Commission’s power to define fraudulent acts under § 14(e) is broader than its rulemaking power under § 10(b), the United States questions the Court of Appeals’ reading of Schreiber. See Brief for United States 38-40. Parenthetically, the United States notes that the word before the Schreiber Court was “manipulative”; unlike “fraudulent,” the United States observes, “‘manipulative’ ... is ‘virtually a term of art when used in connection with the securities markets.’ ” Brief for United States 38, n. 20 (quoting Schreiber, 472 U. S., at 6). Most tellingly, the United States submits, Schreiber involved acts alleged to violate the self-operative provision in § 14(e)’s first sentence, a sentence containing language similar to § 10(b). But § 14(e)’s second sentence, containing the rulemaking authorization, the United States points out, does not track § 10(b), which simply authorizes the SEC to proscribe “manipulative or deceptive device[s] or contrivance[s].” Brief for United States 38. Instead, § 14(e)’s rulemaking prescription tracks § 15(c)(2)(D) of the Exchange Act, 15 U. S. C. § 78o(c)(2)(D),
*672 which concerns the conduct of broker-dealers in over-the-counter markets. See Brief for United States 38-39. Since 1938, see 52 Stat. 1075, § 15(c)(2) has given the Commission authority to “define, and prescribe means reasonably designed to prevent, such [broker-dealer] acts and practices as are fraudulent, deceptive, or manipulative.” 15 U. S. C. § 78o(c)(2)(D). When Congress added this same rulemaking language to § 14(e) in 1970, the Government states, the Commission had already used its § 15(c)(2) authority to reach beyond common-law fraud. See Brief for United States 39, n. 22.16 We need not resolve in this case whether the Commission’s authority under § 14(e) to “define . .. such acts and practices as are fraudulent” is broader than the Commission’s fraud-defining authority under § 10(b), for we agree with the United States that Rule 14e-3(a), as applied to cases of this genre, qualifies under § 14(e) as a “means reasonably designed to prevent” fraudulent trading on material, nonpublic information in the tender offer context.
17 A prophylactic*673 measure, because its mission is to prevent, typically encompasses more than the core activity prohibited. As we noted in Schreiber, § 14(e)’s rulemaking authorization gives the Commission “latitude,” even in the context of a term of art like “manipulative,” “to regulate nondeceptive activities as a 'reasonably designed’ means of preventing manipulative acts, without suggesting any change in the meaning of the term ‘manipulative’ itself.” 472 U. S., at 11, n. 11. We hold, accordingly, that under § 14(e), the Commission may prohibit acts not themselves fraudulent under the common law or § 10(b), if the prohibition is “reasonably designed to prevent . . . acts and practices [that] are fraudulent.” 15 U. S. C. § 78n(e).18 Because Congress has authorized the Commission, in § 14(e), to prescribe legislative rules, we owe the Commission’s judgment “more than mere deference or weight.” Batterton v. Francis, 432 U. S. 416, 424-426 (1977). Therefore, in determining whether Rule 14e-3(a)’s “disclose or abstain from trading” requirement is reasonably designed to prevent fraudulent acts, we must accord the Commission’s assessment “controlling weight unless [it is] arbitrary, capricious, or manifestly contrary to the statute.” Chevron U. S. A. Inc. v. Natural Resources Defense Council, Inc., 467 U. S. 837, 844 (1984). In this case, we conclude, the Commission’s assessment is none of these.
19 *674 In adopting the “disclose or abstain” rule, the SEC explained:“The Commission has previously expressed and continues to have serious concerns about trading by persons in possession of material, nonpublic information relating to a tender offer. This practice results in unfair disparities in market information and market disruption. Security holders who purchase from or sell to such persons are effectively denied the benefits of disclosure and the substantive protections of the Williams Act. If furnished with the information, these security holders would be able to make an informed investment decision, which could involve deferring the purchase or sale of the securities until the material information had been disseminated or until the tender offer had been commenced or terminated.” 45 Fed. Reg. 60412 (1980) (footnotes omitted).
The Commission thus justified Rule 14e-3(a) as a means necessary and proper to assure the efficacy of Williams Act protections.
The United States emphasizes that Rule 14e-3(a) reaches trading in which “a breach of duty is likely but difficult to prove.” Reply Brief 16. “Particularly in the context of a tender offer,” as the Tenth Circuit recognized, “there is a fairly wide circle of people with confidential information,” Peters, 978 F. 2d, at 1167, notably, the attorneys, investment
*675 bankers, and accountants involved in structuring the transaction. The availability of that information may lead to abuse, for “even a hint of an upcoming tender offer may send the price of the target company’s stock soaring.” SEC v. Materia, 745 F. 2d 197, 199 (CA2 1984). Individuals entrusted with nonpublic information, particularly if they have no long-term loyalty to the issuer, may find the temptation to trade on that information hard to resist in view of “the very large short-term profits potentially available [to them].” Peters, 978 F. 2d, at 1167.“[I]t may be possible to prove circumstantially that a person [traded on the basis of material, nonpublic information], but almost impossible to prove that the trader obtained such information in breach of a fiduciary duty owed either by the trader or by the ultimate insider source of the information.” Ibid. The example of a “tippee” who trades on information received from an insider illustrates the problem. Under Rule 10b-5, “a tippee assumes a fiduciary duty to the shareholders of a corporation not to trade on material nonpublic information only when the insider has breached his fiduciary duty to the shareholders by disclosing the information to the tippee and the tippee knows or should know that there has been a breach.” Dirks, 463 U. S., at 660. To show that a tippee who traded on nonpublic information about a tender offer had breached a fiduciary duty would require proof not only that the insider source breached a fiduciary duty, but that the tippee knew or should have known of that breach. “Yet, in most cases, the only parties to the [information transfer] will be the insider and the alleged tippee.” Peters, 978 F. 2d, at 1167.
20 *676 In sum, it is a fair assumption that trading on the basis of material, nonpublic'information will often involve a breach of a duty of confidentiality to the bidder or target company or their representatives. The SEC, cognizant of the proof problem that could enable sophisticated traders to escape responsibility, placed in Rule 14e-3(a) a “disclose or abstain from trading” command that does not require specific proof of a breach of fiduciary duty. That prescription, we are satisfied, applied to this case, is a “means reasonably designed to prevent” fraudulent trading on material, nonpublic information in the tender offer context. See Chestman, 947 F. 2d, at 560 (“While dispensing with the subtle problems of proof associated with demonstrating fiduciary breach in the problematic area of tender offer insider trading, [Rule 14e-3(a)] retains a close nexus between the prohibited conduct and the statutory aims.”); accord, Maio, 51 F. 3d, at 635, and n. 14; Peters, 978 F. 2d, at 1167.21 Therefore, insofar as it serves to prevent the type of misappropriation charged against O’Hagan, Rule 14e-3(a) is a proper exercise of the Commission’s prophylactic power under § 14(e).22 As an alternate ground for affirming the Eighth Circuit’s judgment, O’Hagan urges that Rule 14e-3(a) is invalid be
*677 cause it prohibits trading in advance of a tender offer — when “a substantial step ... to commence” such an offer has been taken — while § 14(e) prohibits fraudulent acts “in connection with any tender offer.” See Brief for Respondent 41-42. O’Hagan further contends that, by covering pre-offer conduct, Rule 14e-3(a) “fails to comport with due process on two levels”: The Rule does not “give fair notice as to when, in advance of a tender offer, a violation of § 14(e) occurs,” id., at 42; and it “disposes of any scienter requirement,” id., at 43. The Court of Appeals did not address these arguments, and O’Hagan did not raise the due process points in his briefs before that court. We decline to consider these contentions in the first instance.23 The Court of Appeals may address on remand any arguments O’Hagan has preserved.HH
>
Based on its dispositions of the securities fraud convictions, the Court of Appeals also reversed O’Hagan’s convictions, under 18 U. S. C. § 1341, for mail fraud. See 92 F. 3d, at 627-628. Reversal of the securities convictions, the Court of Appeals recognized, “d[id] not as a matter of law require that the mail fraud convictions likewise be reversed.” Id., at 627 (citing Carpenter, 484 U. S., at 24, in which this Court unanimously affirmed mail and wire fraud convictions based on the same conduct that evenly divided the Court on the defendants’ securities fraud convictions). But in this case, the Court of Appeals said, the indictment was so structured that the mail fraud charges could not be disassociated from the securities fraud charges, and absent any securities
*678 fraud, “there was no fraud upon which to base the mail fraud charges.” 92 F. 3d, at 627-628.24 The United States urges that the Court of Appeals’ position is irreconcilable with Carpenter: Just as in Carpenter, so here, the “mail fraud charges are independent of [the] securities fraud charges, even [though] both rest on the same set of facts.” Brief for United States 46-47. We need not linger over this matter, for our rulings on the securities fraud issues require that we reverse the Court of Appeals judgment on the mail fraud counts as well.
25 O’Hagan, we note, attacked the mail fraud convictions in the Court of Appeals on alternate grounds; his other arguments, not yet addressed by the Eighth Circuit, remain open for consideration on remand.
* * *
The judgment of the Court of Appeals for the Eighth Circuit is reversed, and the case is remanded for further proceedings consistent with this opinion.
It is so ordered.
As evidence that O’Hagan traded on the basis of nonpublic information misappropriated from his law firm, the Government relied on a conversation between O’Hagan and the Dorsey & Whitney partner heading the firm’s Grand Met representation. That conversation allegedly took place shortly before August 26,1988. See Brief for United States 4. O’Hagan urges that the Government’s evidence does not show he traded on the basis of nonpublic information. O’Hagan points to news reports on August 18 and 22,1988, that Grand Met was interested in acquiring Pillsbury, and to an earlier, August 12, 1988, news report that Grand Met had put up its hotel chain for auction to raise funds for an acquisition. See Brief for Respondent 4 (citing App. 73-74, 78-80). O’Hagan’s challenge to the sufficiency of the evidence remains open for consideration on remand.
O’Hagan was convicted of theft in state court, sentenced to 30 months’ imprisonment, and fined. See State v. O’Hagan, 474 N. W. 2d 613, 615, 623 (Minn. App. 1991). The Supreme Court of Minnesota disbarred O’Hagan from the practice of law. See In re O’Hagan, 450 N. W. 2d 571 (1990).
See, e. g., United States v. Chestman, 947 F. 2d 551, 566 (CA2 1991) (en banc), cert. denied, 503 U. S. 1004 (1992); SEC v. Cherif 933 F. 2d 403, 410 (CA7 1991), cert. denied, 502 U. S. 1071 (1992); SEC v. Clark, 915 F. 2d 439, 453 (CA9 1990).
Twice before we have been presented with the question whether criminal liability for violation of § 10(b) may be based on a misappropriation theory. In Chiarella v. United States, 445 U. S. 222, 235-237 (1980), the jury had received no misappropriation theory instructions, so we declined to address the question. See infra, at 661. In Carpenter v. United States, 484 U. S. 19, 24 (1987), the Court divided evenly on whether, under the circumstances of that case, convictions resting on the misappropriation theory should be affirmed. See Aldave, The Misappropriation Theory: Carpenter and Its Aftermath, 49 Ohio St. L. J. 373, 375 (1988) (observing that “Carpenter was, by any reckoning, an unusual case,” for the information there misappropriated belonged not to a company preparing to engage in securities transactions, e. g., a bidder in a corporate acquisition, but to the Wall Street Journal).
The Government could not have prosecuted O’Hagan under the classical theory, for O’Hagan was not an “insider” of Pillsbury, the corporation in whose stock he traded. Although an “outsider” with respect to Pillsbury, O’Hagan had an intimate association with, and was found to have traded on confidential information from, Dorsey & Whitney, counsel to tender offeror Grand Met. Under the misappropriation theory, O’Hagan’s securities trading does not escape Exchange Act sanction, as it would under Justice Thomas’ dissenting view, simply because he was associated with, and gained nonpublie information from, the bidder, rather than the target.
Under the misappropriation theory urged in this case, the disclosure obligation runs to the source of the information, here, Dorsey & Whitney and Grand Met. Chief Justice Burger, dissenting in Chiarella, advanced a broader reading of § 10(b) and Rule 10b—5; the disclosure obligation, as he envisioned it, ran to those with whom the misappropriator trades. 445 U. S., at 240 (“a person who has misappropriated nonpublic information has an absolute duty to disclose that information or to refrain from trading”); see also id., at 243, n. 4. The Government does not propose that we adopt a misappropriation theory of that breadth.
Where, however, a person trading on the basis of material, nonpublie information owes a duty of loyalty and confidentiality to two entities or persons — for example, a law firm and its client — but makes disclosure to only one, the trader may still be liable under the misappropriation theory.
Justice Thomas’ evident struggle to invent other uses to which O’Ha-gan plausibly might have put the nonpublie information, see post, at 685, is telling. It is imaginative to suggest that a trade journal would have paid O’Hagan dollars in the millions to publish his information. See Tr. of Oral Arg. 36-37. Counsel for O’Hagan hypothesized, as a nontrading use, that O’Hagan could have “misappropriat[ed] this information of [his] law firm and its client, delivered] it to [Pillsbury], and suggested] that [Pillsbury] in the future ... might find it very desirable to use [O’Hagan] for legal work.” Id., at 37. But Pillsbury might well have had large doubts about engaging for its legal work a lawyer who so stunningly displayed his readiness to betray a client’s confidence. Nor is the Commission’s theory “incoherent” or “inconsistent,” post, at 680, 692, for failing to inhibit use of confidential information for “personal amusement ... in a fantasy stock trading game,” post, at 685.
As noted earlier, however, see supra, at 654-655, the textual requirement of deception precludes § 10(b) liability when a person trading on the basis of nonpublic information has disclosed his trading plans to, or obtained authorization from, the principal — even though such conduct may affect the securities markets in the same manner as the conduct reached by the misappropriation theory. Contrary to Justice Thomas’ suggestion, see post, at 689-691, the fact that § 10(b) is only a partial antidote to the problems it was designed to alleviate does not call into question its prohibition of conduct that falls within its textual proscription. Moreover, once a disloyal agent discloses his imminent breach of duty, his principal may seek appropriate equitable relief under state law. Furthermore, in the context of a tender offer, the principal who authorizes an agent’s trading on confidential information may, in the Commission’s view, incur liability for an Exchange Act violation under Rule 14e-3(a).
The Eighth Circuit’s conclusion to the contrary was based in large part on Dirks’s reiteration of the Chiarella language quoted and discussed above. See 92 F. 3d 612, 618-619 (1996).
The United States additionally argues that Congress confirmed the validity of the misappropriation theory in the Insider Trading and Securities Fraud Enforcement Act of 1988 (ITSFEA), § 2(1), 102 Stat. 4677, note following 15 U. S. C. § 78u-1. See Brief for United States 32-35. ITSFEA declares that “the rules and regulations of the Securities and Exchange Commission under the Securities Exchange Act of 1934 . . . governing trading while in possession of material, nonpublic information are, as required by such Act, necessary and appropriate in the public interest and for the protection of investors.” Note following 15 U. S. C. §78u-1. ITSFEA also includes a new §20A(a) of the Exchange Act expressly providing a private cause of action against persons whq violate the Exchange Act “by purchasing or selling a security while in possession of material, nonpublic information”; such an action may be brought by “any person who, contemporaneously with the purchase or sale of securities that is the subject of such violation, has purchased ... or sold . . . securities of the same class.” 15 U. S. C. § 78t-1(a). Because we uphold the misappropriation theory on the basis of § 10(b) itself, we do not address ITSFEA’s significance for eases of this genre.
In relevant part, § 32 of the Exchange Act, as set forth in 15 U. S. C, § 78ff(a), provides:
“Any person who willfully violates any provision of this chapter ... or any rule or regulation thereunder the violation of which is made unlawful or the observance of which is required under the terms of this chapter ... shall upon conviction be fined not more than $1,000,000, or imprisoned not more than 10 years, or. both ...; but no person shall be subject to imprisonment under this section for the violation of any rule or regulation if he proves that he had no knowledge of such rule or regulation.”
The statute provides no such defense to imposition of monetary fines. See ibid.
In addition to § 14(e), the Williams Act and the 1970 amendments added to the Exchange Act the following provisions concerning disclosure: § 13(d), 15 U. S. C. § 78m(d) (disclosure requirements for persons acquiring more than five percent of certain classes of securities); § 13(e), 15 U. S. C. § 78m(e) (authorizing Commission to adopt disclosure requirements for certain repurchases of securities by issuer); § 14(d), 15 U. S. C. § 78n(d) (disclosure requirements when tender offer results in offeror owning more than five percent of a class of securities); § 14(f), 15 U. S. C. § 78n(f) (disclosure requirements when tender offer results in new corporate directors constituting a majority).
The Rule thus adopts for the tender offer context a requirement resembling the one Chief Justice Burger would have adopted in Chiarella for misappropriators under § 10(b). See supra, at 655, n. 6.
The Government draws our attention to the following measures: 17 CFR § 240.15e2-1 (1970) (prohibiting a broker-dealer’s hypothecation of a customer’s securities if hypothecated securities would be commingled with the securities of another customer, absent written consent); § 240.15c2-3 (prohibiting transactions by broker-dealers in unvalidated German securities); § 240.15c2-4 (prohibiting broker-dealers from accepting any part of the sale price of a security being distributed unless the money received is promptly transmitted to the persons entitled to it); §240.15c2-5 (requiring broker-dealers to provide written disclosure of credit terms and commissions in connection with securities sales in which broker-dealers extend credit, or participate in arranging for loans, to the purchasers). See Brief for United States 39, n. 22.
We leave for another day, when the issue requires decision, the legitimacy of Rule 14e-3(a) as applied to “warehousing,” which the Government describes as “the practice by which bidders leak advance information of a tender offer to allies and encourage them to purchase the target company’s stock before the bid is announced.” Reply Brief 17. As we observed in Chiarella, one of the Commission’s purposes in proposing Rule 14e-3(a)
*673 was “to bar warehousing under its authority to regulate tender offers.” 445 U. S., at 234. The Government acknowledges that trading authorized by a principal breaches no fiduciary duty. See Reply Brief 17. The instant ease, however, does not involve trading authorized by a principal; therefore, we need not here decide whether the Commission’s proscription of warehousing falls within its § 14(e) authority to define or prevent fraud.The Commission’s power under § 10(b) is more limited. See supra, at 651 (Rule 10b-5 may proscribe only conduct that § 10(b) prohibits).
Justice Thomas’ dissent urges that the Commission must be precise about the authority it is exercising — that it must say whether it is acting to “define” or to “prevent” fraud — and that in this instance it has pur
*674 ported only to define, not to prevent. See post, at 696. Justice Thomas sees this precision in Rule 14e-3(a)’s words: “it shall constitute a fraudulent . . . act . . . within the meaning of section 14(e) . . . .” We do not find the Commission’s Rule vulnerable for failure to recite as a regulatory preamble: We hereby exercise our authority to,“define, and prescribe means reasonably designed to prevent, . . . [fraudulent] acts.” Sensibly read, the Rule is an exercise of the Commission’s full authority. Logically and practically, such a rule may be conceived and defended, alternatively, as definitional or preventive.Justice Thomas opines that there is no reason to anticipate difficulties in proving breach of duty in “misappropriation” cases. “Once the source of the [purloined] information has been identified,” he asserts, “it should be a simple task to obtain proof of any breach of duty.” Post, at 697. To test that assertion, assume a misappropriating partner at Dor
*676 sey & Whitney told his daughter or son and a wealthy friend that a tender for Pillsbury was in the offing, and each tippee promptly purchased Pillsbury stock, the child borrowing the purchase price from the wealthy friend. Justice Thomas’ confidence, post, at 698, n. 12, that “there is no reason to suspect that the tipper would gratuitously protect the tippee,” seems misplaced.Justice Thomas insists that even if the misappropriation of information from the bidder about a tender offer is fraud, the Commission has not explained why such fraud is “in connection with” a tender offer. Post, at 697, 698. What else, one can only wonder, might such fraud be “in connection with”?
Repeating the argument it made concerning the misappropriation theory, see supra, at 665, n. 11, the United States urges that Congress confirmed Rule 14e-3(a)’s validity in ITSFEA, 15 U. S. C. § 78u-1. See Brief for United States 44-45. We uphold Rule 14e-3(a) on the basis of § 14(e) itself and need not address ITSFEA’s relevance to this case.
As to O’Hagan’s scienter argument, we reiterate that 15 U. S. C. § 78ff(a) requires the Government to prove “willful[l] violation]” of the securities laws, and that lack of knowledge of the relevant rule is an affirmative defense to a sentence of imprisonment. See supra, at 665-666.
The Court of Appeals reversed respondent’s money laundering convictions on similar reasoning. See 92 F. 3d, at 628. Because the United States did not seek review of that ruling, we leave undisturbed that portion of the Court of Appeals’ judgment.
Justice Thomas finds O’Hagan’s convictions on the mail fraud counts, but not on the securities fraud counts, sustainable. Post, at 700-701. Under his view, securities traders like O’Hagan would escape SEC civil actions and federal prosecutions under legislation targeting securities fraud, only to be caught for their trading activities in the broad mail fraud net. If misappropriation theory cases could proceed only under the federal mail and wire fraud statutes, practical consequences for individual defendants might not be large, see Aldave, 49 Ohio St. L. J., at 381, and n. 60; however, “proportionally more persons accused of insider trading [might] be pursued by a U. S, Attorney, and proportionally fewer by the SEC,” id., at 382. Our decision, of course, does not rest on such enforcement policy considerations.
Document Info
Docket Number: 96-842
Citation Numbers: 138 L. Ed. 2d 724, 117 S. Ct. 2199, 521 U.S. 642, 1997 U.S. LEXIS 4033
Judges: Ginsburg, Kennedy, O'Connor, Scalia, Souter, Stevens, Thomas
Filed Date: 6/25/1997
Precedential Status: Precedential
Modified Date: 11/15/2024