security

(redirected from The security)
Also found in: Dictionary, Thesaurus, Legal, Encyclopedia.
Related to The security: Social Security

Security

Piece of paper that proves ownership of stocks, bonds, and other investments.

Security

A document; historically, a physical certificate but increasingly electronic, showing that one owns a portion of a publicly-traded company or is owed a portion of a debt issue. Securities are tradable. At their most basic, securities refer to stocks and bonds, but the term sometimes also refers to derivatives such as futures and options.

security

1. An instrument that, for a stock, shows ownership in a firm; for a bond, indicates a creditor relationship with a firm or with a federal, state, or local government; or signifies other rights to ownership.
2. Collateral used to guarantee repayment of a debt.

Security.

Traditionally, a security was a physical document, such as stock or bond certificate, that represented your investment in that stock or bond.

But with the advent of electronic recordkeeping, paper certificates have increasingly been replaced by electronic documentation.

In current general usage, the term security refers to the stock, bond, or other investment product itself rather than to evidence of ownership.

security

  1. a FINANCIAL SECURITY such as a STOCK, SHARE or BOND.
  2. the provision of a ‘collateral’ to obtain a LOAN. See COLLATERAL SECURITY.

security

(1) Property that serves as collateral for a debt,such that defaulting on the debt will result in the creditor seizing and selling the property.(2) Under what has come to be known as “the modified Howey rule,” an investment contract or other instrument commonly known as a security is defined as “an investment in a common venture premised on a reasonable expectation of profit to be derived from the entrepreneurial or managerial efforts of others.”This definition includes many real estate investments that, if not specifically exempted under some provision of federal law, are susceptible to SEC regulation and oversight for the investment itself, the persons marketing the investment,or both.The Howey rule arose out of a Supreme Court case interpreting sales of interests in an orange grove in Florida—a real estate sale arrangement held to be a security.

References in periodicals archive ?
For instance, if the security unit discovers an employee is committing acts of theft, they must have the capability to instantly freeze the employees' access to information systems, stop payment of paychecks, and begin to take legal action.
If the carrying amount of the security reflects factors that are not recognized in the investee's financial statements or fair values of assets that are materially different from the investee's carrying amounts, the auditor should obtain sufficient evidence in support of these amounts.
Security managers must keep several important issues in mind when assembling the security management committee.
As the security frameworks mentioned earlier become more prevalent, the role of LDAP and its importance to information technology security will continue to grow exponentially.
Cernium Corporation is the leading developer and provider of behavior recognition software and systems for the security industry, focusing on real-time video analysis.
And in an exclusive presentation for The Security Standard, MIT Professor Stuart Madnick will share his findings from recent research on the effectiveness of security strategies in increasingly complicated cross-organizational environments.
We kept this in mind while crafting the agenda for The Security Standard and have put together a slate of topics and visionaries that no security-focused executive can afford to miss.
Compliance shifted the security management from monitoring external network activity to managing internal user activity at the application and database level," said Charles Kolodgy, an analyst at IDC.
As with other managed services from ISS, the Security Event Management Service supports data from multiple vendors, including those from ISS, Check Point, Cisco Systems, Juniper Networks, 3Com and McAfee.
This guide breaks down the various HIPAA Security Rule provisions and provides guidance on specific steps organizations can take to become compliant with the Security Rule.