AboutServicesMediaInsightsInvestigation FAQContact📞 Global Hotline +886-800-090-007
SEC · INSIDER TRADING · M&A CONFIDENTIALITY · INTERNAL INVESTIGATION

SEC Insider Trading CaseWhy M&A Confidentiality Risk Is Often a People Problem, Not Only a System Problem

📅 2026.5.15
Relieved Xiànyu Business Risk Advisory Desk

The U.S. Securities and Exchange Commission charged 21 individuals for their alleged involvement in a decade-long insider trading scheme that used information allegedly misappropriated from multiple global law firms and resulted in millions of dollars in illicit profits. For companies, boards, law firms, investors, and M&A teams, the most important lesson is not simply that insider trading remains an enforcement priority. The deeper lesson is this: in high-value transactions, the most dangerous confidentiality gap is often not the system itself, but the people who know how to move around it.

Executive Summary

If your company is handling M&A, private financing, strategic investment, restructuring, listed-company announcements, or board-sensitive information, start with these principles:

  • 1. An NDA is not a complete control system: confidentiality protection requires access governance, insider lists, clean-team rules, and evidence discipline.
  • 2. Deal risk sits with people, not only files: anyone who knows the deal timing, target name, valuation, signing date, or announcement schedule can become a risk node.
  • 3. Adviser reputation does not replace adviser oversight: law firms, accountants, investment banks, consultants, and external contractors must be managed under need-to-know rules.
  • 4. A deal leak may not look like a data breach: it may occur through private chats, oral tips, coded language, family accounts, outside traders, or relationship networks.
  • 5. The best response is quiet evidence preservation: if a leak is suspected, preserve records before accusations, account deletions, or internal panic destroy the trail.

1. What Happened: Why the SEC Case Matters

On May 6, 2026, the SEC announced charges against 21 individuals for alleged involvement in a wide-reaching insider trading scheme. According to the SEC, the case involved material nonpublic information allegedly misappropriated from multiple global law firms and generated millions of dollars in illicit profits. The SEC’s complaint alleged that Nicolo Nourafchan, a Los Angeles-based M&A attorney, orchestrated a scheme with Robert Yadgarov between 2018 and 2024, involving confidential information about more than twelve pending corporate transactions. Read the SEC release.

The U.S. Department of Justice separately announced criminal charges against 30 defendants in a global insider trading scheme that allegedly netted tens of millions of dollars in illicit profits. The DOJ release described a large-scale, decade-long scheme involving corporate attorneys and financial professionals, with confidential information on nearly 30 M&A deals allegedly stolen from major law firms. Read the DOJ release.

For business leaders, the point is not to treat this as a distant Wall Street enforcement story. It is a practical warning about how market-sensitive information can escape from professional environments that appear sophisticated, prestigious, and secure.

Risk advisory note: A confidentiality framework that only protects documents, but does not monitor people, permissions, incentives, and external relationships, is incomplete.

2. The Real Risk: The Trust Chain, Not Just the Data Room

Many companies still think of M&A confidentiality as a document problem. They set up a virtual data room, ask parties to sign NDAs, limit downloads, watermark documents, and assume the sensitive information is under control.

Those measures are necessary, but they do not fully address the real risk. In a live transaction, the most valuable information is not always a document. Sometimes it is the target name, the expected announcement date, the regulatory milestone, the board approval timing, the fact that a buyer is serious, the price range being discussed, or the knowledge that a deal is about to fail.

That information can be remembered, hinted at, spoken about, coded, or traded on without ever leaving as a PDF. This is why high-value transactions require a broader view of confidentiality risk: not only where the documents sit, but who knows what, when they learned it, why they needed to know it, and whether their behaviour changed afterward.

3. Why Professional Environments Can Create Blind Spots

Law firms, accounting firms, investment banks, consulting firms, fund managers, and other professional advisers are essential to major transactions. But their professional status can also create a blind spot. Companies often trust the institution, while failing to assess the specific individuals, permission structures, conflicts, incentives, and information access patterns within that institution.

In the SEC and DOJ allegations, the information at issue was tied to major law-firm environments and M&A work. That should remind every company that prestige is not the same as control. A global law firm, an elite advisory team, or a well-known investment institution may have strong policies, but a single person with improper access, financial pressure, external relationships, or weak supervision can still become a risk node.

Public reporting after the charges also highlighted renewed concerns over law-firm security and the challenge of controlling access to sensitive deal information on a strict need-to-know basis. Read Reuters coverage.

4. What Companies Should Strengthen Before a Sensitive Transaction

1. Insider Lists

Maintain a clear list of all internal and external people who know deal-sensitive information. This should include executives, board members, finance teams, legal teams, advisers, data-room administrators, IT personnel, consultants, translators, and assistants where relevant.

2. Need-to-Know Access

Access should be based on real necessity, not seniority, convenience, curiosity, or broad departmental visibility. Review who can see the data room, who can search matter files, and who can infer deal status from calendars, billing codes, or shared folders.

3. Clean-Team Protocols

For strategic buyers, competitors, sensitive commercial data, or market-moving transactions, establish clean-team rules to control who may receive sensitive information and how that information may be used.

4. Adviser and Vendor Oversight

External counsel, accountants, bankers, consultants, PR firms, translators, data-room vendors, and technical providers should be covered by confidentiality scope, access discipline, conflicts review, and escalation procedures.

5. Behavioural and Access Red Flags

Watch for unusual file access, repeated viewing of matters outside assignment, off-platform messaging, sudden contact with market participants, irregular download patterns, financial stress signals, or unexplained trading around major events.

6. Evidence Preservation Plan

Before a transaction enters its most sensitive stage, define what will be preserved if a leak occurs: logs, communications, devices, data-room activity, meeting records, trading timelines, and adviser correspondence.

5. Why M&A Confidentiality Is Also a Background-Check Issue

Background checks are often treated as an HR procedure. In high-stakes transactions, that is too narrow. When a person has access to market-sensitive information, background risk can become transaction risk.

For key executives, finance personnel, legal personnel, investment professionals, external consultants, and advisers, a targeted background check may reveal litigation history, undisclosed conflicts, financial pressure, reputational issues, prior misconduct, hidden business relationships, offshore ties, or unusual networks that may create confidentiality exposure.

This does not mean every person is suspicious. It means that access to valuable information should be matched with appropriate verification. A company would not release millions of dollars without payment controls. It should not release market-sensitive information without people controls.

6. If a Leak Is Suspected: Do Not Start With Accusations

The worst response to a suspected information leak is to panic, accuse the wrong person, alert the wrong party, or allow relevant records to disappear. A proper response should be discreet, structured, and evidence-led.

RESPONSE 01
Preserve the Evidence
Secure data-room logs, email records, chat records, calendars, meeting minutes, call logs, document history, device records, adviser engagement files, access permissions, and relevant communications before accounts are altered or deleted.
RESPONSE 02
Reconstruct the Timeline
Map when each person learned the information, what they accessed, who they communicated with, when market activity occurred, and when the information became public.
RESPONSE 03
Map Relationship Networks
Identify hidden ties between insiders, external advisers, investors, traders, counterparties, friends, family members, consultants, or intermediaries who may have received or acted on sensitive information.
RESPONSE 04
Coordinate With Legal Counsel
Where appropriate, structure the review under legal direction so that fact-finding, privilege, reporting, and potential litigation strategy are aligned from the beginning.

7. How Relieved Xiànyu Supports Confidentiality, Insider-Risk, and Deal-Leak Matters

Relieved Xiànyu supports companies, law firms, investors, founders, family businesses, board committees, and legal teams in sensitive matters involving internal investigation, commercial intelligence, background checks, deal-leak review, evidence preservation, cross-border risk mapping, and litigation support.

SERVICE 01
Insider-Risk and Confidentiality Review
We help clients assess who had access to sensitive information, whether access was justified, where leakage paths may exist, and what controls should be strengthened before or during a major transaction.
SERVICE 02
Internal Investigation and Deal-Leak Analysis
We assist with timeline reconstruction, communication review, access-log analysis, relationship mapping, adverse intelligence checks, and fact summaries for legal counsel or board-level review.
SERVICE 03
Executive, Adviser, and Key-Person Background Checks
We conduct targeted checks on high-access individuals, external advisers, transaction participants, consultants, or counterparties to identify conflicts, reputational issues, hidden affiliations, litigation history, or other risk indicators.
SERVICE 04
Litigation Support and Evidence Preservation
We help organise communications, documents, timelines, public records, asset leads, relationship networks, and evidence summaries for counsel, dispute strategy, regulatory response, or board investigation.
SERVICE 05
M&A Due Diligence and Counterparty Intelligence
Beyond checking the target company, we help clients assess the people, advisers, funding sources, ownership structures, conflicts, and transaction paths surrounding the deal.
SERVICE 06
Cross-Border Commercial Intelligence
When a matter involves foreign advisers, offshore accounts, multiple jurisdictions, hidden intermediaries, or international trading networks, we support clients with discreet intelligence gathering and risk interpretation.

8. A Practical M&A Confidentiality Risk Checklist

  • Do we have a current insider list for this transaction?
  • Do we know which external advisers and vendors have access to which materials?
  • Are data-room permissions based on need-to-know rather than convenience?
  • Can anyone view matters or files unrelated to their assignment?
  • Are board, finance, legal, and adviser communications preserved properly?
  • Have we reviewed conflicts of interest for advisers and key transaction participants?
  • Are sensitive deal milestones visible through calendars, billing codes, folders, or meeting invites?
  • Do we have clean-team rules for competitively sensitive or market-sensitive information?
  • Would we know what evidence to preserve if a leak occurred tomorrow?
  • Have we performed targeted background checks on high-access or high-risk individuals?

If the answer to several of these questions is unclear, the confidentiality framework is probably weaker than it appears.

9. Final Observation: Protect the Deal Before the Market Knows It Exists

The SEC case is a reminder that sophisticated transactions do not fail only because of weak systems. They can also be compromised by weak boundaries, excessive access, hidden incentives, and misplaced trust.

In the M&A world, information has market value before it becomes public. That value creates temptation. The more valuable the transaction, the more disciplined the company must be about who knows, who accesses, who communicates, who trades, who benefits, and who can explain their role if the matter is later scrutinised.

Final note:
In a sensitive transaction, confidentiality is not just a legal clause. It is a control architecture. Protect the documents, but also protect the people perimeter, the adviser perimeter, the evidence trail, and the decision-making process. In high-stakes business, information is not only an asset. Information is exposure.

Source note: This article is based on public information from the U.S. Securities and Exchange Commission, the U.S. Department of Justice, and public reporting on the broader insider-trading case. The article is for business risk awareness and does not constitute legal advice.

FAQ | SEC Insider Trading Case, M&A Confidentiality Risk, and Internal Investigation
What does the SEC insider trading case mean for companies involved in M&A or private financing?
+
It means confidentiality risk should not be treated only as an IT or NDA issue. In a transaction environment, risk also sits with people who know the deal timing, deal parties, valuation logic, board discussions, data-room contents, and market-sensitive information. Relieved Xiànyu can help companies map access points, identify high-risk insiders or external advisers, and preserve evidence if a leak is suspected.
Is an NDA enough to protect material nonpublic information?
+
No. An NDA is a legal baseline, not a complete control framework. Companies also need insider lists, need-to-know access rules, clean-team protocols, access logs, adviser vetting, device and communication preservation policies, conflicts review, and clear escalation procedures when suspicious behaviour appears.
Who should be included in an insider-risk or deal-confidentiality review?
+
The review should include directors, senior executives, finance teams, legal teams, investor-relations personnel, external counsel, accountants, investment bankers, consultants, translators, data-room administrators, IT administrators, and any person who may learn deal timing, target names, valuation information, regulatory milestones, or signing and announcement schedules.
Why are law firms, advisers, and investment professionals especially sensitive in M&A confidentiality risk?
+
Professional advisers often handle multiple high-value transactions and may have access to market-moving information before public announcement. Their brand credibility can lower a company’s caution, but the real risk is created by specific individuals, permissions, relationships, incentives, and access behaviour. Adviser reputation does not replace adviser oversight.
What are early red flags of a possible deal leak or insider-risk problem?
+
Common red flags include unusual access to transaction files, employees viewing matters they are not assigned to, sudden private communications with external market participants, unusual personal trading patterns, unexplained financial pressure, repeated requests for sensitive documents, unexplained downloads, account changes, off-platform messaging, or unexplained contact between advisers and investors before a transaction announcement.
How can a company investigate suspected information leakage without damaging the transaction?
+
The first step is not public accusation. The company should quietly preserve records, define a privileged investigation scope with counsel where appropriate, reconstruct the access timeline, review data-room logs, identify relevant devices and accounts, map communications, and assess whether external advisers or counterparties may be involved. A discreet investigation protects the deal while preserving evidence.
What should be preserved immediately if insider trading, information leakage, or adviser misconduct is suspected?
+
Preserve data-room access logs, email records, chat records, calendar entries, meeting minutes, call logs, document version histories, device records, trading timelines if available, adviser engagement records, NDA records, conflicts disclosures, and file-access histories. Evidence should be preserved before accounts are deleted, devices are replaced, or parties are alerted unnecessarily.
Can background checks help prevent insider-risk issues?
+
Yes, particularly for high-access roles. Background checks for executives, finance personnel, legal personnel, investment professionals, external consultants, and key advisers can reveal litigation history, financial stress indicators, undisclosed conflicts, reputational issues, prior misconduct, hidden business ties, and relationship networks that may create confidentiality risk.
How is M&A due diligence connected to confidentiality risk?
+
Due diligence is usually focused on the target company, but major transactions also require due diligence on people and process. Companies should review who has access, who controls the data room, who communicates with counterparties, whether adviser conflicts exist, and whether sensitive information is being shared beyond a proper need-to-know perimeter.
What is a clean team and why does it matter?
+
A clean team is a restricted group authorised to review competitively sensitive or market-sensitive information under defined rules. In M&A, private equity, strategic investment, and competitive bidding, clean-team controls help prevent unnecessary circulation of sensitive information and reduce regulatory, commercial, and reputational risk.
Can Relieved Xiànyu determine whether a leak occurred?
+
A professional investigation does not start by assuming guilt. Relieved Xiànyu can help clients reconstruct facts, compare access logs with communication timelines, identify inconsistencies, review public and commercial intelligence, map relationship networks, and prepare evidence summaries that support legal counsel, board review, or dispute strategy.
When should a company engage an investigation and risk advisory team?
+
The best time is before a major transaction enters its most sensitive stage: before data-room access expands, before external advisers receive full materials, before the signing timetable becomes visible, before financing parties are approached, and before the company suspects that sensitive information has already moved beyond its control.
Who is this type of confidentiality and insider-risk review suitable for?
+
It is suitable for listed companies, private companies preparing financing, family businesses, law firms, investment banks, private equity teams, venture investors, M&A advisers, board committees, founders, shareholders, and legal teams handling sensitive transactions, suspected leaks, internal misconduct, or adviser-related risk.
Can we start with a preliminary confidential review instead of a full investigation?
+
Yes. Relieved Xiànyu can begin with a confidential preliminary risk review to understand the transaction context, information-access structure, suspected red flags, evidence already available, missing records, and whether a deeper internal investigation, background check, OSINT review, or litigation-support engagement is justified.
Related Services
Confidential Assessment
Handling M&A, private financing, or suspected information leakage? Start with a confidential insider-risk review.
If your company is preparing for a major transaction, sharing sensitive materials with external advisers, managing a data room, reviewing a suspected deal leak, or assessing key-person risk, Relieved Xiànyu can support you through internal investigation, background checks, commercial intelligence, adviser-risk review, evidence preservation, and litigation-support preparation.
Related Reading

Related Reading

If this matter overlaps with your company’s transaction, adviser, or internal-risk concerns, these are the next pages worth reading before you act.

RELATED ARTICLE

Rising Financial-Crime and AML Risk

When transaction risk also involves funds flow, beneficial owners, related entities, and hidden intermediaries, a broader risk map is required.

Read Article →
RELATED ARTICLE

Supply-Chain and Geopolitical Risk Due Diligence

Strategic transactions often carry risks beyond the target company, including suppliers, third-country entities, and cross-border performance structures.

Read Article →
RELATED SERVICE

Litigation Support and Cross-Border Evidence

When a confidentiality issue may lead to dispute, regulatory response, or board review, evidence timelines and fact summaries become critical.

View Service →
CONFIDENTIAL CONSULTATION

If your company is handling M&A, private financing, board-sensitive information, or suspected information leakage, start with a confidential risk review

Relieved Xiànyu helps clients organise insider-risk review, key-person background checks, confidentiality breach investigation, evidence preservation, transaction timeline reconstruction, and litigation support before reputational or legal exposure expands.

📞LINEWhatsApp