Driving Nails in the Coffin of Corporate Law

This article is adapted from Economics, Capitalism, and Corporations: Contradictions of Corporate Law, Economics, and the Theory of the Firm, part of the Routledge series on The Economics of Legal Relationships, ISBN 978-0367895563.


I explained the end of modern corporate law in a previous article, It’s the End of Corporate Law as We Know It (Business Law Today, January 29, 2021). This article serves to recognize the death of modern corporate law, drive nails in its coffin, and bury it..  

The first nail in the coffin concerns shareowners’ rights to protection from creditors.

Shareowners are often said to have “limited liability;” i.e., protection against claims of creditors of the corporation.

But for shareowners to have limited liability for corporate debt, shareowners must have some liability, as would be the case if, for example, directors were the agents of shareowners (which I address below). For shareowners to have any liability, limited or otherwise, necessarily means that property that is owned by shareowners can be used to satisfy the claims of the creditors of the corporation; it means that creditors may assert a claim against the property of the shareowners.

In bankruptcy proceedings, the unsecured property of the bankrupt corporation is used to satisfy the claims of unsecured creditors. Therefore, we must ask, what property that is owned by the shareowners can be used to satisfy claims of creditors against the corporation?

Posner, for example, wrote that a “shareholder’s liability for corporate debt is limited to the value of his shares.”[1] If by “the value of his shares” Posner meant the market value, the market value of the shareowners’ shares is determined by the market and absolutely no market value of shareowners’ shares can be used to satisfy corporate creditors. That is, corporate creditors can assert no claim against shareowners for the market value of their shares.

If, however, by “the value of his shares” Posner was referring to the book value of the shares (total corporate equity, i.e., assets minus liabilities, divided by the number of shares outstanding), then that also fails to meet the requirement of liability for corporate creditors. The total assets are owned by the corporation. Therefore, the net assets are also owned by the corporation. But since net assets is the equity, it is the corporation that owns the equity, not the shareowners and thus, the equity that is used to satisfy corporate debts is the corporation’s equity, not the shareowners’.

While shareowners may lose the entire value of their shares when the market price falls to zero, the value of their shares cannot be used to satisfy any claims of creditors because first, the value of their shares is not determined by the value of the corporate equity, and second because corporate creditors can assert no claim against shareowners’ assets. Shareowners’ risk of loss is limited to the market value of their shares, none of which is used to satisfy corporate debt.

There is no such thing as “limited liability” for shareowners unless limited means zero. Shareowners have no liability, limited or otherwise. What “limited liability” really means is “limited risk.” Shareowners have the risk that the value of their shares will fall to zero, but that is unrelated to liability for corporate debt. Therefore, Posner was wrong. Shareowners’ liability for corporate debt is not limited to the value of their shares because shareowners have no liability for corporate debt and the value of their shares cannot be used to pay corporate debt.

In order for shareowners to have any liability to creditors of the corporation, shareowners would have to owe a duty, whether contractual or tortious, to the creditors of the corporation. But on closer inspection we find that by property law and corporate statutory law, shareowners owe no duty to creditors whatsoever.

Delaware General Corporation Law, for example, states: “The aggregate liability of any stockholder of a dissolved corporation for claims against the dissolved corporation shall not exceed the amount distributed to such stockholder in dissolution” (emphasis added).[2] At first glance the law appears to say the shareowners do have a liability for corporate debts, but that is not the case.

Upon dissolution, the net assets which are owned by the corporation are distributed to shareowners. The aggregate liability of any shareowners of a dissolved corporation for claims against the dissolved corporation is merely a claim by creditors of the corporation to recover the net assets that were owned by the corporation and wrongfully distributed to the shareowners. It is thus not the shareowners’ liability since they were never entitled to receive a distribution of the net assets owned by the corporation. 

But, perhaps more important is the fact that the law refers to “the aggregate liability of any stockholder of a dissolved corporation for claims against the dissolved corporation.” A dissolved corporation no longer exists.

A second nail in the coffin of modern corporate law concerns shareowners’ right to dividends and distributions. Shareowners’ rights, or rather lack thereof, to dividends is well known but the implication is often ignored. The implication of shareowners’ rights, or lack of rights, to distributions is also often ignored.

Shareowners have no property right in corporate earnings; the earnings belong to the corporation. Thus, shareowners have no right to dividends which are distributed out of corporate earnings. Under Delaware General Corporation Law, “The directors of every corporation, subject to any restrictions contained in its certificate of incorporation, may declare and pay dividends upon the shares of its capital stock…” (emphasis added).[3] New York’s corporate law is similar. The right to receive dividends is merely an expectation and not a right (and certainly not since Dodge v. Ford),[4] which even Berle and Means acknowledged: “[the] shareholder in the modern corporate situation has surrendered a set of definite rights for certain indefinite expectations.”[5]

Shareowners have no property interest in the corporation or its assets. Thus, they have no right to distribution of its net assets, i.e., its equity. Shareowners only have a right to a distribution of net assets of a dissolved corporation, which no longer exists. The corporation owns the equity. The equity is comprised in part of earnings that have not been paid out in dividends (“retained earnings”), reinforcing the principle that neither corporate earnings nor equity is owned by shareowners, but by the corporation.

 

Another nail in the coffin of modern corporate law concerns shareowners as “residual claimants” which is related to the distribution of net assets. The term “residual claimant” refers to the proposition that shareowners have a claim on net assets, i.e., the equity, after all liabilities are satisfied by corporate assets.

In order to see that shareowners are not residual claimants, we must ask what, exactly, is the claim that “residual owners” have? What are they claiming? Against whom or what?  In order to be a claimant, one must have a claim recognizable in a court of law. However, as previously shown, shareowners have no rights or ownership interest in the corporation, its assets, or its earnings. 

While shareowners have a right to receive a distribution of the net assets of a dissolved corporation, they have no claim on either the assets or net assets of the corporation the way a creditor has a claim against the assets of the corporation. A creditor may assert a claim against the corporation in a court of law. A shareowner may not assert a claim against the corporation in a court of law. A creditor does not wait for the directors to declare an interest or principal payment. A shareowner must wait for the directors to declare a distribution. Thus, shareowners are not residual claimants because they have no claim that can be asserted in a court of law.

That shareowners are residual claimants is an assumption not supported by either property law or corporate law. Shareowners have no greater claim on the net assets than they do on the total assets. The corporation owns the assets and shareowners have no claim against the total assets. The corporation owns the equity, thus the shareowners have no claim against the equity.

Qui facit per alium facit per se. “He who acts through another acts himself.” This has been the literal basis of agency law for centuries.

I touched on agency law in my previous article. Here, I further explain the legal impossibility of directors being agents of shareowners in order to drive another nail in the coffin of modern corporate law.

If directors are agents of shareowners, then directors are those through whom another (the shareowner) acts. Thus, we must ask, and answer, the question that has been ignored for decades. How, exactly, do shareowners act through directors? The response to that question is found by first answering another question: Are shareowners legally permitted to act through directors? The answer to the second question is no, shareowners are prohibited by corporate statutory law from acting through directors. Thus, the response to the first question is that, in fact, shareowners do not act through directors.

Delaware General Corporation Law states: “The business and affairs of every corporation organized under this chapter shall be managed by or under the direction of a board of directors.”[6] New York and other states have similarly worded statutes. Thus, corporate statutory law prohibits shareowners from acting through directors. If shareowners are prohibited by corporate statutory law from acting through directors, then directors are prohibited by corporate statutory law from being agents of shareowners.

The funeral march is long overdue.. It is time to bury modern corporate law.


About the author:

Wm. Dennis Huber is Visiting Professor at Nova Southeastern University. He is a CPA and received a J.D., M.A. in economics, and MBA from SUNY at Buffalo, and an LL.M. from Thomas Cooley School of Law. He has published more than forty articles on topics ranging from corporate and securities law to constitutional law, auditing, economics, accounting and the public interest, forensic accounting, the accounting profession, and social accounting.


[1] Richard A. Posner, Economic analysis of law (9th ed, 2014).

[2] Delaware General Corporation Law § 282(c).

[3] Delaware General Corporation Law § 170.

[4] Dodge v. Ford Motor Co., 204 Mich. 459, 170 N.W. 668 (Mich. 1919).

[5] Alfred A. Berle & Gardiner C. Means, The modern corporation and private property (2nd ed., 1991, 244).

[6] Delaware General Corporation Law §141(a).

Delaware versus California and Choice of Law: JUUL Labs, Inc. v. Grove

An earlier article, Choice of Law/Forum and Waiving the Right to a Jury Trial: California Court Holds That the Former Cannot Do the Latter,[1] reviewed the William West v. Access Control Related Enterprises, LLC decision in which a California court held that a California citizen could not be required to litigate an action involving a Delaware LLC in the Delaware Chancery Court because that forum does not provide for jury trials. In a subsequent addition to the choice of law battle between California and Delaware, the Delaware Chancery Court in JUUL Labs, Inc. v. Grove held that the inspection of books and records of a Delaware corporation is governed by Delaware law notwithstanding a California statute to the contrary.[2]

Daniel Grove was a shareholder and employee of JUUL Labs, Inc. This corporation is organized in Delaware, but its principal place of business is in San Francisco. Grove demanded to inspect JUUL’s books and records under Section 1601 of the California Corporations Code, indicating that if he did not receive the requested books and records he would bring suit in California to compel inspection under California law. The California Corporations Code, at section 1601(a), purports to apply not only to corporations incorporated in California but also to “any foreign corporation keeping such records in this state or having its principal executive office in this state.” JUUL, in response, filed this action in the Delaware Chancery Court, seeking among other relief a declaration that it is Delaware, not California, law that governs Grove’s rights to inspect JUUL’s books and records. It sought further relief in the form of an injunction against Grove to prevent him from attempting to circumvent certain contractual limitations on his ability to inspect books and records. Thereafter, Grove filed an action in the Superior Court of California for the County of San Francisco seeking relief under California Corporations Code Section 1601. That action, Grove v. Adam Bowen,[3] was stayed by the California court.

The Chancery Court, after disposing of arguments that Grove had, by contract, waived his right to bring an action under California Section 1601, turned to the (frankly more interesting) question of the Internal Affairs Doctrine. That analysis began with a quotation from the decision of the United States Supreme Court, Edgar v. MITE Corp., namely:

The internal affairs doctrine is a conflict of laws principles which recognizes that only one State should have the authority to regulate a corporation’s internal affairs—matters particular to the relationships among or between the corporation and its current officers, directors, and shareholders—because otherwise a corporation could be faced with conflicting demands.[4]  

From there the court cited a number of Delaware decisions holding that the Internal Affairs Doctrine protects rights that arise under the Due Process Clause, the Full Faith and Credit Clause, and the Commerce Clause,[5] all of which may be well and good, but to this point still beg the question of exactly what actions and activities constitute “internal affairs.” It was to that question that the court next turned its attention. For the Delaware Chancery Court, it was not a close question. Rather, “Stockholder inspection rights are a core matter of internal corporate affairs.”[6] Turning its attention to the analysis previously set forth in Salzberg v. Sciavacucchi,[7] the court reviewed that decision and determined that inspection of books and records is a core internal affair.

The Chancery Court went on to compare section 1600 of the California Corporations Code, which affords access to the shareholder list, with section 220 of the Delaware General Corporation Law (DGCL), finding the California statute to be broader than that of Delaware. Likewise, the comparison of California Corporations Code section 1602, governing the inspection rights of directors, was made against DGCL section 220(d), with another determination being made that the rights under California law are broader than they are under Delaware law ultimately:

Generally speaking, the California inspection regime is not radically different from the Delaware regime, but it is not the same either. California’s precious balancing of the competing interests between stockholders and the Corporation differ from Delaware’s.[8]

Drawing a line in the sand, the JUUL court wrote:

Under constitutional principles outlined by the Supreme Court of the United States and under Delaware Supreme Court precedent, stockholder inspection rights are a matter of internal affairs. Grove’s rights as a stockholder are governed by Delaware law, not by California law. Grove therefore cannot seek an inspection under [California Corporate Code] section 1601.[9]

JUUL’s Amended and Restated Certificate of Incorporation contains an exclusive jurisdiction clause requiring that “the Court of Chancery in the state of Delaware shall be the sole and exclusive forum for any stockholder (including a beneficial owner) to bring . . . (iv) any action asserting a claim against the Corporation, its directors, officers, employees or stockholders governed by the Internal Affairs Doctrine.” On that basis, and citing Boilermakers Local 145 Ret. Fund v. Chevron Corp.,[10] it was held that the inspection of records could be brought only in the Delaware Chancery Court.[11]

So there you have it; unsurprisingly, the Delaware Chancery Court has held that the right of inspection of corporate books and records is soundly within the scope of the “internal affairs” of the Corporation, and therefore governed by the law of the jurisdiction of organization, and that a provision in the certificate of incorporation vesting exclusive jurisdiction to hear disputes with respect to internal affairs in the Delaware Chancery Court will likewise be enforced. The question the JUUL court did not resolve was whether contractual waivers of the right to inspect books and records will, when properly presented to the court, be enforced.[12] But again, that determination should be made under the Internal Affairs Doctrine.

Procedurally, Delaware courts will continue to apply its broad interpretation of “internal affairs,” and as long as exclusive jurisdiction provisions of certificates and by-laws are enforced by Delaware courts,[13] and there is no reason to think to the contrary, we could end up in a situation in which companies as a matter of ordinary course include (i) exclusive jurisdiction clauses that expressly encompass inspection of books and records and (ii) waivers of the right to inspect, whether under DGCL § 220, under the law of any other jurisdiction, or under common law. Ergo, “it would mean that 220 inspection rights could be left a functional dead letter.”[14] The question will then arise as to whether the courts of California or another state will disagree that (a) the Delaware courts have exclusive jurisdiction or (b) that inspection rights are subject to waiver, thereby setting up a true conflict as to choice of law.

Another interesting interface of a potential elimination of inspection rights will be upon the standards to bring a derivative action. Currently, Delaware imposes a high threshold for bringing a derivative action, cautioning that plaintiffs should avail themselves of DGCL § 220 inspection rights in order to plead the prospective case with the necessary degree of specificity. If by private ordering the shareholders’ right of inspection has been restricted or eliminated, will the enhanced standards for bringing a derivative action be necessarily reduced?[16] 


[1] Business Law Today (Sept. 2020).

[2] 238 A.3d 904 (Del. Ch. 2020).

[3] Superior Court of California, CGC20582059.

[4] 457 U.S. 624, 645 (1982) (citing Restatement (Second) of Conflict of Laws § 302 cmt. b. (1971)).

[5] 238 A.3d at 914.

[6] 238 A.3d at 915.

[7] 227 A.3d 102 (Del. 2020).

[8] 238 A.3d at 917.

[9] 238 A.3d at 918.

[10] 73 A.3d 934, 963 (Del. Ch. 2013).

[11] 238 A.3d at 919.

[12] 238 A.3d at 919-20.

[13] See Salzberg v. Sciabacucci, 227 A.3d 102 (2020); see also Gabriel K. Gillett, Michael F. Linden, and Howard S. Suskin, Delaware Supreme Court Declares Federal Forum Provisions in Corporate Charters Are “Facially Valid,” Business Law Today (April 2, 2020).

[14] See Professor Ann Lipton (Tulane Law) in a posting on the Business Law Prof Blog on August 15, 2020, titled The United States of Delaware.

[15] See AmerisourceBergen Corporation v. Lebanon County Employees’ Retirement Fund, 243 A.3d 417 (Del. 2020) (“For over a quarter-century, this Court has repeatedly encouraged stockholders suspicious of a corporation’s management or operations to exercise this right to obtain the information necessary to meet the particularization requirements that are applicable in derivative litigation.”); Id. collecting case at note 33.

[16] While this is not the place for a full exploration thereof, there exists a significant policy question with respect to whether, particularly in closely held ventures, limitations on inspection of books and records should be permitted. While it is necessary to balance the need of the corporation or other legal entity to operate in accordance with the directions of its management, eliminating access to books and records allows those fiduciaries the benefit of operating without oversight. See also Thomas E. Rutledge, Who Will Watch the Watchers?: Derivative Actions in Nonprofit Corporations, 103 Kentucky Law Journal Online 31 (2015). The hazard is obvious.

COVID-19 Economic Stimulus Programs: Different Countries, Similar Approaches

The economic impact of COVID-19 has been almost universal, yet some economies appear to be recovering more quickly than others. Comparing some of the major components of select stimulus programs in Germany, Singapore, and the United Kingdom in response to the economic downturn may help explain the different economic recovery rates. Yet, despite huge variations in legal systems, population, geography, and culture in the countries analyzed, we found significant uniformity in the programs implemented, with the contrasts akin to variations on a theme. 

Early Responses

Each country under review announced large stimulus packages between February and May 2020. Germany adopted a $844 billion[1] package comprised of a $175 billion stimulus program and $675 billion worth of loans and loan guarantees to struggling companies. The UK’s response, announced on March 17, 2020, also included large loan guarantee schemes, including two parallel programs: one for large companies (the “CLBILS”) and one targeting small and medium-sized enterprises (the “CBILS”). Singapore implemented five separate stimulus packages between February 18 and May 26, 2020, totaling approximately $71.8 billion. 

All three countries quickly instituted wage subsidy programs, with the German government providing a minimum of 60 percent of employee salaries, Singapore providing 50 percent (later increased to 75 percent), and the UK providing 80 percent of furloughed employees’ salaries. As of early July 2020, the UK’s furlough program had supplemented 9 million employees’ wages while another program supported an additional 2.7 million self-employed persons. Singapore also instituted a Wage Credit Scheme to provide government funding for employee wage increases given in 2019 or early 2020. These programs assuaged some of the economic pain caused by huge spikes in unemployment as lockdowns took effect in the second quarter of 2020. (See the representative graphs here for Germany, here  for Singapore, and here for the UK.)

In addition, Germany announced a three-month payment moratorium on consumer loans issued prior to March 15, 2020 for households financially impacted by the pandemic. Singapore provided individuals and businesses with assistance to make insurance premium payments, and the UK Financial Conduct Authority requested that firms freeze payments on loans and credit cards for up to three months in April 2020. 

Summer 2020 Packages

Generalized worker and company support programs

On June 29, 2020, the German Parliament passed a $146 billion package establishing and funding a number of programs designed to support workers and prop up struggling companies. The package provided families with an approximate $350 per child payment, doubled the single-parent income tax allowance to $4,500, and extended access to basic income support through the balance of 2020. On July 8, 2020, Germany provided $28 billion in bridging grants to companies to cover fixed operating costs. Companies with more than 10 employees could obtain grants capped at $169,000 depending on how steeply the company’s sales revenue had declined.

On July 8, 2020, the UK announced a “Plan for Jobs” estimated to cost up to $37.5 billion. Similar to Germany’s June 2020 stimulus package, the UK Plan included a number of programs designed to support workers and companies. The Plan extended some programs and established others, including the “Kickstart Scheme,” which provided $2.5 billion to create hundreds of thousands of six-month work placements for those aged 16 to 24 and deemed to be at risk of long-term unemployment, and the Job Retention Bonus, which provided a one-off payment of approximately $1,250 to UK employers for every furloughed employee who remained continuously employed through January 2021. 

Singapore’s Summer 2020 efforts largely extended and supplemented already established programs. Eligibility for the Workfare Special Payment, a grant to low-wage workers, was widened, and the Job Support Scheme was extended to cover employee wages until March 2021. The COVID-19 Support Grant, introduced in May 2020 to provide grants to unemployed applicants that demonstrate job search or training efforts, was also extended. In August 2020, Singapore announced the Jobs Growth Incentive (JGI), a $718 million program to encourage firms to increase their headcount of local workers, reallocating funding chiefly from development expenditures delayed due to the pandemic.   

Targeted programs

Each country targeted specific portions of their Summer 2020 stimulus programs to assisting particularly hard-hit sectors of the economy, as well as investing significant chunks to upgrade infrastructure and support industries of the future.

To shore up restaurants and pubs, the UK created the “Eat Out to Help Out” program, which provided diners with a 50% discount on meals and non-alcoholic drinks purchased at eateries during August 2020. The government also reduced the VAT rate from 20% to 5% at restaurants, hotels, and tourist attractions. Singapore provided its highest level of wage subsidies to employees working in the hardest-hit sectors, namely aerospace, aviation, and tourism. Singapore also provided a standalone relief package for airlines and their employees, and $230 million in vouchers to Singaporeans for use at local attractions, to offset the loss of dollars from now-nonexistent foreign tourists.

The stimulus programs also focused on technology, digitalization and sustainability. Germany’s June 2020 stimulus featured a $56 billion “future investment package” that included a doubling of the electric car buyer rebate to $6,750, $2.8 billion in e-charging facility upgrades, electric-powered bus and truck purchases, and battery cell production, $5.6 billion to the railway company Deutsche Bahn to support modernization, expansion, and electrification of the railway system, and $10 billion to research and develop hydrogen fuel technology with the hope of becoming a world leader in the space. Billions more were invested to retrofit buildings, build out 5G infrastructure, research artificial intelligence, and build “at least two” quantum computers.

The UK introduced a $2.5 billion Green Homes Grant, providing $2 for every $1 spent on home energy efficiency upgrades. The Plan for Jobs established and funded more environmental programs to promote decarbonization of public buildings, to support environmental charities, to promote direct air capture of CO2, and to develop the next generation of clean automotive technology.  The UK also announced $6.25 billion put toward the acceleration of certain infrastructure projects to support both the economy and the transformation of the nation’s infrastructure.

Fall 2020 Stimulus

In October 2020, Singapore announced a six-month extension of its Enhanced Training Support Program for the hardest-hit sectors and expanded it to provide benefits to companies and workers in the marine and offshore sector. Eligibility for Singapore’s JGI was widened to provide 50% wage support for all new hires with disabilities. The Temporary Bridging Loan Program, providing companies access to low interest, government-guaranteed loans of up to $718,000, was extended six months. The government also provided grocery vouchers to individuals, extended COVID-19 Support Grants for the unemployed, and established a new “baby bonus” to encourage families to have children. 

Similarly, the UK abandoned plans to end several stimulus programs in late Fall 2020, extending wage subsidies and grants to the self-employed and reducing VAT rates. The Bank of England continued its quantitative easing program, agreeing on November 5, 2020 to purchase $187 billion of government bonds to promote lowered borrowing costs for consumers and businesses. The Bank also maintained the benchmark interest rate at 0.1%. In November 2020, Germany extended the enhanced electric vehicle subsidy to 2025. It also provided an additional $16 billion to cover fixed costs of companies and solo entrepreneurs affected by the lockdown re-imposed in November, capped at $225,000 and $5,625 respectively.

The Fall 2020 stimulus packages again emphasized investments in infrastructure and the future.  Singapore funded upgrades at the Changi Air Hub, a major driver of the nation’s economy.  Singapore also dedicated funds to the development of the Tuas Port, with the first berths scheduled to be operational in 2021. When fully completed in 2040, the Tuas Port will be the world’s largest fully automated terminal. 

On November 15, 2020, UK Prime Minister Johnson announced his $15 billion “Ten Point Plan for a Green Industrial Revolution.” The plan called for funding of hydrogen fuel technology, a quadrupling of offshore wind power by 2030, and investments in small, advanced nuclear reactors. Its proposal to ban sales of new gasoline and diesel cars by 2030 grabbed the media’s attention. On November 25, 2020, a $125 billion National Infrastructure Plan was announced as part of the annual Spending Review. The plan seeks to upgrade the nation’s roadways, railways, and develop a network of fiber broadband cables. A billion pounds were set aside for building retrofits, and another billion to “future-proof” the electricity grid along motorways and to support the installation of high-powered charging hubs at motorway service areas by 2023.

Recent Stimulus

Stimulus efforts continued in December 2020 and into 2021. Germany announced a $12.3 billion package to support companies impacted by the shutdown over the 2020 Christmas season, and Chancellor Merkel stated additional “large sums” could be deployed in 2021. Singapore moved into Phase 3 of its reopening plan on December 28, 2020, and has not reported more than one new case of locally transmitted COVID-19 in a single day since February 13, 2021. The country continues to seek ways to reopen to international travel, including constructing the Connect@Changi bubble to permit international business travelers to meet in Singapore. It also implemented new support measures for the finance industry and the local construction industry. The UK extended the furlough and business loan schemes, announced new grant programs, including a $1,250 Christmas grant for pubs, and announced new rounds of funding for Scotland, Wales, and Northern Ireland, which can be spent on business support and COVID-19 medical response efforts, among other things. 

Conclusion

Each country is projected to bounce back to positive growth in 2021, with the IMF projecting annual GDP growth rates of 3.5%, 4.5%, and 5% for Germany, the UK, and Singapore respectively. There is, of course, a good deal of uncertainty regarding those projections with so much still unknown regarding the efficacy, manufacture, and distribution of vaccines, whether the emergence of new virus variants will slow down containment, and whether governments will continue to spend to support their respective economies. One thing that looks increasingly clear, however, is that the multitude of programs discussed above cushioned the economic blow dealt by the virus, and provided some much-needed breathing space (literally and figuratively) as well as a platform for a hoped-for economic resurgence in 2021 and beyond. 


[1] For ease of comparison, all currencies have been converted to US dollars.  The exchange rates were taken as of July 1, 2020, and are as follows: $1 = €0.889 = £0.801 = S$1.394. 

The Evolution of Payments Fraud in the Era of COVID-19: Hacks, Scams, and Deceit

While some forms of payments fraud have existed for centuries (like forged checks), others have emerged more recently. And as banking technology and payment methods evolve, fraudsters are doing their part to keep pace, including by updating classic payment fraud schemes to take advantage of the COVID-19 pandemic. Payments fraud generally falls into two categories:

  • unauthorized payments – such as unauthorized ACH debits, altered or forged checks, or transactions initiated after an account takeover; and
  • scams – such as fraudulently induced payments, “bad check” scams, and revocable payment fraud.

Some of these traditional fraud schemes have been tailored to take advantage of the pandemic situation by targeting vulnerable consumers (e.g., through imposter or work-from-home scams) and state unemployment agencies, which are defrauded when criminals use consumers’ stolen personally identifiable information (PII) to fraudulently apply for unemployment insurance in the victim’s name, then transfer funds through a “money mule” account.

 A variety of different laws, regulations, and payment system rules are relevant to payments fraud, and different rules apply based on the type of transaction and nature of the fraud.

Core laws applicable to payments fraud include:

  • For check transactions: UCC Article 3 – Negotiable Instruments[1], and Article 4 – Bank Deposits and Collections[2];
  • For consumer electronic fund transfers: the Electronic Fund Transfer Act[3] and its implementing regulation, Regulation E[4]; and
  • For commercial funds transfers: UCC Article 4A – Funds Transfers.

Other laws may also have relevance, such as the various prohibitions on unfair, deceptive and abusive acts or practices (UDAAP), anti-money laundering requirements under the Bank Secrecy Act[5] (BSA), and the privacy and data security requirements for financial institutions under the Gramm-Leach-Bliley Act[6] (GLBA). Further, private sector payment system rules, such as the NACHA Operating Rules for ACH[7], may also apply, particularly with respect to the allocation of loss between financial institutions. Which laws apply, and how, may depend on characteristics of the transaction, including the payment channel, whether the payment was unauthorized or resulted from a scam, and whether it is a consumer or commercial transaction.

Check Fraud

Traditional types of check fraud include check alteration (e.g. changes to the payee or amount of a check), check forgery (a forged drawer’s signature), counterfeit checks, and bad check scams (where a consumer receives a bad check, deposits it, and is asked to send some or all of the provisionally credited funds to a third party).

The UCC generally requires a paying bank to recredit its customer’s account when it pays an unauthorized check, which provides customers protection against checks that are not properly payable. In addition, transfer and presentment warranties determine the allocation of loss between the depositary bank and the paying bank.[8] Whereas, in a bad check scam, the loss is likely to fall on the consumer who deposited the bad check when the check is returned unpaid by the paying bank. In these bad check schemes, fraudsters take advantage of a victim’s lack of understanding of payment system functionality and applicable legal framework by instructing the victim to transfer funds through an irrevocable payment channel (wire transfer) or a method that is difficult to trace and recover (purchasing and mailing a prepaid card) once the depositary bank provisionally credits the funds.

Wire Transfer Scams

Business email compromise (BEC) is a sophisticated form of payments fraud that has emerged in recent years. BEC targets businesses in which employees are tricked into sending funds to a fraudster (typically by wire transfer, but sometimes an ACH credit transfer). BEC is carried out through the compromise of legitimate email accounts and social engineering. Many large banks have taken action to try and prevent their customers from falling victim to BEC, including extensive education campaigns.

For commercial transactions, the allocation of loss that results from a BEC scam between the commercial customer and the bank is determined by Article 4A’s security procedure framework. In particular, the commercial customer (Sender) is not liable to the Sending Bank for a funds transfer that was not authorized. However, the transfer can be deemed “authorized” if the Sending Bank verified the authenticity of the instruction using a mutually agreed upon “security procedure,” the security procedure is commercially reasonable, and the bank accepted the payment order in “good faith” and in compliance with the security procedure.

COVID-19 Scams

Fraudsters have taken advantage of the COVID-19 pandemic to target vulnerable consumers, such as the elderly and unemployed. These scams provide a new twist on classic payment fraud schemes, and have taken various forms, including:

  • those involving government impersonators;
  • fraudulent cures, medical equipment or charities;
  • work-from-home fraud;
  • contact tracing scams; and
  • scams relating to the CARES Act Economic Impact Payments.

These criminal acts may involve an “imposter scam” scenario, or utilize the “bad check” or fraudulently induced wire transfer schemes, with legal responsibility for the loss determined by existing payment laws and regulations as applicable.

Fraudsters have also targeted state unemployment agencies with scams in which a criminal submits fraudulent unemployment insurance claims using consumers’ stolen personally identifiable information (PII), and instructs payments to accounts controlled by money mules (generally by ACH), who themselves may be either witting or unwitting participants and may be lured to participate through good-Samaritan, romance, and work-from-home schemes. This type of fraud has been facilitated by recent large scale data breaches that led to widespread access to consumer PII that can be used to perpetrate payments fraud and for other illicit purposes, such as identity theft.

Notably, FinCEN has released advisories providing financial institutions guidance on potential red flags of such schemes for purposes of Suspicious Activity Reporting obligations under the Bank Secrecy Act, including where a customer receives multiple state unemployment insurance payments to their account within the same disbursement timeframe from one or multiple states, or receives an unemployment insurance payment from a different state from where the customer lives or works.[9]

Policy Considerations

As banks undertake more measures to help customers avoid becoming victims of payments fraud schemes, it is important to consider whether by doing so they are altering the “delicate balance” of interests contemplated under existing loss allocation rules for fraudulent payments and, if so, how that may impact the availability and pricing of certain types of payments in the future.


[1] UCC §§ 3-101 et seq.

[2] UCC §§ 4-101 et seq.

[3] 15 USC §§ 1693 et seq.

[4] 12 CFR Part 1005

[5] 31 USC §§ 5311 et seq.

[6] 15 USC §§ 6801 et seq.

[7] See https://www.nacha.org/rules/operating-rules.

[8] For example, under the UCC, the depositary bank generally bears the loss for improper endorsements and alterations, while the paying bank generally bears the loss for a forged drawer’s signature or a counterfeit check. These UCC provisions reflect the long-standing rule from Price v. Neal, 3 Burr. 1354, 97 Eng. Rep. 872 (KB. 1763).

[9] FIN-2020-A003, 2020 Advisory on Imposter Scams and Money Mule Schemes Related to Coronavirus Disease 2019 (COVID-19) (July 7, 2020), available at: https://www.fincen.gov/sites/default/files/advisory/2020-07-07/Advisory_%20Imposter_and_Money_Mule_COVID_19_508_FINAL.pdf.

Most Favored or Too Favored? Suits Challenge MFN Clauses Used by Amazon and Valve

Most-Favored Nations (MFN) clauses (also known as antidiscrimination clauses or most-favored customer clauses) are common in business today. These provisions require that the supplier will treat a particular customer no worse than all other customers (and sometimes even better).  They are often coupled with some sort of monitoring mechanism, such as the power to audit the supplier.  For example, imagine a flour mill signs a requirements contract with Bakery A that contains an MFN clause.  The mill cannot then turn to Bakery B and offer the flour at a lower price without either a) offering the same to Bakery A or b) breaching the requirements contract.  These clauses can extend beyond price to other contractual terms and conditions (e.g., product release dates, promotional prices, or product offerings).

Common as they may be, a series of lawsuits out of New York and California will subject those very clauses to scrutiny under U.S. antitrust law.  First, a class action suit against Amazon and the five largest book publishers in the United States—Hachette Book Group, HarperCollins Publishers, Macmillan Publishing Group, Penguin Random House, and Simon & Schuster (the “Big Five”)—alleges that MFN clauses in ebooks agency contracts amount to an illegal price-fixing agreement.[1]  The suit echoes a 2012 suit against Apple and the Big Five that culminated in a consent decree restricting the use of MFN clauses that prevented ebook retailers from adding their own discounts. 

The second class action accuses Valve, Inc. of using MFN clauses in its contracts with game developers—both big (Ubisoft) and small (Rust)—to maintain its monopoly in personal computer video game sales through its online marketplace Steam as well as stifle competition more generally.  The complaint alleges that the MFN clauses cause game prices across online marketplaces to be the same even though stores like the Epic Games Store take a smaller commission than Valve.  Rather than pass those savings on to the consumer, the developers must maintain higher prices to remain profitable on Steam. 

While the suits target different markets, they boil down to the same issue: when do MFN clauses become anticompetitive?  As the panels to a day-long public workshop on these types of clauses by the 2012 Department of Justice and Federal Trade Commission indicate, it depends on the market at issue, the contracting parties, and the effect on that market.  On the one hand, MFN clauses are practical and advantageous in that they eliminate the purchaser’s risk in negotiating a bad deal under unstable pricing conditions, reduce transaction costs in re-negotiating agreements upon discovery of lower prices, and are generally benign when market power is absent.  On the other hand, MFN clauses as a price-monitoring mechanism can be used to facilitate collusion amongst competitors; discounts to the purchaser’s competitors and new market entrants, regardless of their size, are effectively foreclosed, resulting in increased prices overall.  For these reasons and more, MFN clauses alone are subject to the rule of reason—a lenient standard that requires a rigorous market analysis.

So, what made Amazon and Valve targets for these suits? Market power.  Amazon was public enemy number two (second only to Google) in the House Judiciary Committee’s antitrust report on competition in digital markets, which denounced Amazon’s impact on small- and medium-sized enterprises dependent on the monopolist’s platform.  A humble bookseller no more, the class action alleges that Amazon now enjoys a stunning 90% of the ebook market.  As for Valve, European antitrust regulators recently fined them 1.6 million euros (approx. $2 million) for the practice of restricting access to games based on physical location, which the European Commission deemed an illegal partition of the Digital Single Market. And U.S. regulators may turn towards Valve if the class action is correct in asserting that 75% of all PC games sold in the United States are through Steam.  Both companies have inordinate market share for online sales at a time when antitrust enforcement is experiencing a renaissance and the digital economy is subject to exacting scrutiny. 

The suits should not be a cause for alarm for most companies using MFN clauses.  After all, when small purchasers in unconcentrated markets use MFN clauses to reduce price fluctuations or to commit to a long-term business relationship, courts should recognize that the economic efficiencies outweigh the anticompetitive effects.  But when big tech closes off competition by maverick firms, keeps a watchful eye on its supplier through auditing rights or algorithmic pricing, and guarantees dominance over an extended period of time, it is no surprise that consumers, competitors, and Congress cry foul.  MFN clauses have a time and a place, but it is not at the top.

 

New UK National Security Investment Controls Expected to Affect Thousands of Deals Per Year

The United Kingdom Government introduced a National Security and Investment Bill (the “Bill”) to Parliament in November 2020. It passed the House of Commons on 20 January 2021 and will now make its way through the House of Lords. When enacted, the Bill will give the Government unprecedented new powers to investigate and block corporate deals that it suspects might threaten the security of the UK, with potentially thousands of deals having to be pre-notified and cleared by the Government each year. While it is not limited to foreign investment, non-UK investors may attract additional scrutiny. Deal-makers will therefore now need to navigate a new regulatory regime that is much more onerous than the current limited national security intervention powers, and in addition to the usual UK merger control rules.

This piece looks at the background to the Bill, the mandatory notification procedure it will introduce,  the Government’s powers to ‘call-in’ other deals for review, how it will assess national security risks and the potential implications of the Bill for investors.

The Bill a Government white paper, a Parliamentary Select Committee inquiry, and various interim measures stemming from concern over foreign investment in UK assets, including Chinese investment in the Hinkley Point nuclear power plant and Huawei’s involvement in the UK 5G network. There have also been allegations of ‘aggressive acquisitions’ during the COVID-19 pandemic, with the Government giving itself new intervention powers to protect the UK’s capability to combat public health emergencies. There was therefore little surprise when the Government announced a new framework to allow further scrutiny of transactions and investments. At present, the UK Government can only intervene in a transaction on national security grounds where the deal meets the thresholds for UK merger control. The bar for that has recently been lowered for targets with potential national security implications in order to facilitate more Government intervention, but the Bill will replace that regime with a greatly expanded role for the State.

First, the Bill will introduce a pre-closing notification obligation for certain deals, which the Government estimates will catch over 1,000 transactions per year. Second, it will empower the Government to ‘call-in’ acquisitions it considers may give rise to a national security risk, up to five years after the deal has completed. As an anti-avoidance measure, the latter power will apply to any deal completed on or after 12 November 2020 (the day after the Bill was introduced to Parliament).

Mandatory Notification

Scope

The obligation to notify the of a deal will arise where an investor acquires a right or interest in a “qualifying entity” that participates in particular activities within certain key sectors. A qualifying entity can be any form of legal entity (e.g. a company, partnership or trust) and includes non-UK entities that carry on activities in the UK or supply goods or services to persons in the UK. The Bill gives the Government wide powers to make regulations specifying the sectors of the economy and the types of transaction and activity that will engage the notification obligation.

The Government launched a public consultation on the sectors and deals it proposes should be covered, which closed in early January. The results have not yet been announced so it remains to be seen whether the responses will affect the Government’s plans, but the consultation identified 17 sectors as raising potential concerns. These include not only the most obvious candidates but also broad categories that may not have immediately obvious national security implications. The proposed sectors are:

  • Advanced Materials
  • Advanced Robotics
  • Artificial Intelligence
  • Civil Nuclear
  • Communications
  • Computing Hardware
  • Critical Suppliers to Government
  • Critical Suppliers to the Emergency Services
  • Cryptographic Authentication
  • Data Infrastructure
  • Defence
  • Energy
  • Engineering Biology
  • Military and Dual-Use Technologies
  • Quantum Technologies
  • Satellite and Space Technologies
  • Transport

There is no minimum target turnover or deal value threshold for the notification obligation to apply, and it will catch deals involving non-UK entities that are active in the UK.

Level of Control

A “notifiable acquisition” will arise where the transaction results in the acquiring person either acquiring a right or interest equivalent to at least 15% of the shares or voting rights in the target, or gaining control over the target. Gaining control of an entity means acquiring either:

  • more than 25% of the shares or voting rights, with a new notifiable acquisition if an existing shareholder passes thresholds of 50% or 75%; or
  • voting rights that enable the acquirer to ensure or prevent the passage of any class of resolution.

Consequences

The Bill provides that a notifiable acquisition will be void if it completes without Government approval. It is not clear what that will mean in practice. Most obviously, it would mean that the terms of the deal would be legally unenforceable. If the parties were content to implement the deal regardless, the Government would have the same powers to unwind a non-notified deal as it has under the voluntary regime (see below).

There will also be very significant corporate and personal consequences for failing to clear a notifiable acquisition. A person who completes such a deal (including any director, manager etc. of a body corporate) risks a criminal conviction with up to five years imprisonment, an unlimited fine, or both. Alternatively, the Government will be able to impose civil penalties of up to the greater of 5% of turnover or £10 million.

Unlike the voluntary regime, the mandatory notification obligation will not have effect so will not affect deals closed prior to the Bill becoming law. However, investors in UK businesses (and businesses with UK interests) should follow the Bill with keen interest, in anticipation of being faced with a significant new regulatory hurdle in 2021.

The ‘Call-in’ Regime and Voluntary Notification

The Bill does not just create risk for deals that qualify as notifiable acquisitions; it also empowers the Government to ‘call-in’ non-notifiable deals for review where it perceives national security concerns.

Scope

This power will exist where a “trigger event” takes place in relation to a “qualifying entity” (see above) or a “qualifying asset”, and the Government thinks the deal could create a national security risk.

The term “qualifying asset” covers a very broad range of assets, including land and corporeal moveable property as well as “ideas, information or techniques which have industrial, commercial or other economic value” (the Bill gives the examples of trade secrets, databases, source code, algorithms, formulae, designs, software, and plans, drawings and specifications). In each case, the asset must be either within the UK or its territorial sea (in the case of land or corporeal property), or otherwise used in connection with activities carried on in the UK or the supply of goods and services to persons in the UK.

A “trigger event” will occur where a person gains control of a qualifying entity or asset. Control of an entity is defined as explained above (and so the 15% threshold does not apply to the call-in power), or where the acquirer gains material influence over the target’s policy (reminiscent of the ‘control’ test in UK merger control). For an asset, gaining control means a person acquiring a right or interest in, or in relation to, the asset that makes them able to use the asset or direct or control how it is used (or able to use it / direct its use to a greater extent). There is, again, no minimum turnover or deal value threshold.

These very broad definitions will give the Government a call-in power over essentially any type of deal where a national security risk might be identified.

Timings

The call-in power can be invoked within six months of the Government becoming aware of the trigger event, up to a maximum of five years after the trigger event. This extremely long window is intended to ensure no transactions slip through the net, either by accident or by design.

This lengthy risk period can be avoided by voluntarily sending notification of the relevant transaction (either before or after completion) to a new Investment Security Unit under the remit of the Business Secretary. As with merger control, it will be for the Government to decide whether the notification contains sufficient information, which means it will control the clock. Once the Government accepts the notification it will have 30 working days to decide whether to call-in the deal for further investigation over an additional 30 working day period (extendible to 75 working days).

A key point to note is that all deals completed after 12 November 2020 will come within the scope of the call-in regime, with the six month / five year periods only commencing when the relevant provisions of the Bill take effect. This anti-avoidance measure means the Bill must already be factored into deals that might raise UK national security considerations, particularly because the process to have a deal cleared via voluntary notification will not even become available until the Bill is fully enacted and in force. In the interim period, parties will have no option but to decide whether to proceed at risk.

Consequences

Where the Government identifies a risk to national security it can impose remedies to prevent, remedy or mitigate that risk. The Bill gives a wide discretion on the remedies that can be imposed, but options are likely to include:

  • unwinding a completed deal (e.g. by divestment of the relevant entity or asset);
  • prohibiting a deal that has not yet been completed;
  • requiring the business to appoint someone to supervise and potentially control any activities that would cause a national security concern; and
  • operational restrictions, such as making UK security clearance a condition of a person accessing particular information, working at a particular site, taking part in certain operations, or even holding a management role in the organisation.

If a completed deal is called-in or notified, the Government will be able to impose interim orders to prevent the review process being frustrated, most obviously by prohibiting the acquirer from integrating the acquired business or asset into its own operations. Such orders are routinely made in merger control cases, but may well be even stricter in the national security context.

In a further parallel with UK merger control (also, in principle, a voluntary regime), the potential consequences of completing a deal only for it to be called-in for review – including the administrative and financial burden of complying with an interim order, as well as the substantive risk of a forced sale of the entity or asset purchased – mean that buyers and investors are likely to err on the side of caution and try to make any deal that might have national security implications conditional on Government clearance.

Interestingly (and very much unlike merger control), the Bill confers a power on the Government to give financial assistance to an entity in consequence of an order. That perhaps reflects a principle that the State should meet at least part of any additional cost incurred by a private entity as a result of measures imposed on national security grounds.

How Will National Security Risks Be Assessed?

The Bill does not define potential risks to national security in any meaningful sense. However, the Government has published a draft ‘Statement of Policy Intent’ describing how it expects to use the call-in power.

The Government expects to consider three risk factors:

  1. Target risk: the entity or asset subject to the trigger event could be used to undermine UK national security (e.g. the entity or asset plays a key role in national security matters or could, simply because of its nature, put national security at risk if it fell into the ‘wrong’ hands – there is likely to be significant overlap here with the sectors identified for mandatory notification);
  2. Trigger event risk: the acquisition itself could undermine national security (e.g. because it could facilitate unauthorised access to sensitive information, or give a hostile actor leverage over the UK in other matters); and
  3. Acquirer risk: the identity of the acquirer would give rise to national security concerns.

On the latter risk, a range of factors would need to be considered on a case-by-case basis, but the nationality of the acquirer – while not formally part of any test under the Bill – will surely be a key issue. However, concerns will not necessarily be limited to nationals of hostile states: in 2019 the UK Government intervened in the acquisition of the British satellite telecommunications company Inmarsat plc by Connect Bidco, a US-UK-Canadian joint venture, obtaining undertakings to ensure the maintenance of strategic services and prevent unauthorised access to sensitive information.

The various risks will be considered in combination – for example, the draft Statement of Policy Intent notes that a pension fund investing in UK infrastructure would involve a target risk but no acquirer risk.

Use and Application

At this point, it is only possible to speculate as to how strictly the Government will apply the powers in the Bill and, in particular, how many deals will need to be notified pursuant to the Bill. By the Government’s own estimate, however, mandatory filings alone will result in between 1,000 and 1,830 notifications per year.

For the voluntary regime, and notwithstanding that the draft Statement and other guidance documents give some indication of how risks will be assessed, it will take time to build up a body of precedent that will allow buyers to consider when to notify. Even that may be complicated by the need for confidential decisions in light of the obvious sensitivities. Buyers are therefore likely to err on the side of caution for some time, in which case the Government should also expect to receive a large number of voluntary notifications.

There will therefore be an enormous increase in the number of cases dealt with compared to the current public interest intervention regime, under which only 12 transactions have been reviewed on national security grounds since 2003 (albeit with a recent uptick following reductions to the applicable turnover thresholds, including the frustration of Chinese-backed Gardner Aerospace Holdings’ proposed acquisition of Impcross, a UK manufacturer of aerospace components).

The Bill will impose a strict and wide-ranging new regime that has the potential to cause significant disruption to deals and investments. It is essential that investors, sellers and advisers are aware of the risks involved, including for any deal completed after 12 November 2020, and plan their transactions accordingly.

ABA Releases Updated White Paper Regarding Cryptocurrencies and Digital Assets

On January 19, 2021, the American Bar Association (ABA) Derivatives and Futures Law Committee’s Innovative Digital Products and Processes Subcommittee (IDPPS) Jurisdiction Working Group released an update to its comprehensive white paper addressing jurisdictional issues associated with digital products, including cryptocurrencies and other digital assets, and digital processes, such as blockchain.[1]

The updated white paper gives an in depth analysis of several current issues in the cryptocurrency and digital asset space that have developed since the March 2019 publication of the first white paper, including:

  • rapid development of Stablecoins;
  • growth of the decentralized finance movement and the increasing number of state central banks exploring the creation of virtual currencies;
  • 2020 guidance from the CFTC concerning “actual delivery” of digital assets and related litigation;
  • The SEC’s Digital Asset Framework, its first issuance of digital asset-related no-action letters, and further developments in its key enforcement actions targeting significant digital asset projects;
  • SEC staff guidance on the custody of digital asset securities under the rules applicable to broker-dealers;
  • Recent case law developments in certain CFTC enforcement actions involving digital assets;
  • New developments regarding the Travel Rule’s application to virtual asset service providers;
  • FinCEN’s first assessment of civil money penalties against a peer-to-peer virtual currency exchanger; and
  • International developments, including the EU’s recent approval of the Sixth Anti-Money-Laundering Directive.

The need for this update reflects the rapid evolution of the digital asset and cryptocurrency space.  As regulators worldwide endeavor to keep pace with this ever-developing industry, it is imperative that market participants continue to keep themselves informed of the applicable legal and regulatory landscape, as detailed in this update.  Several key developments merit further discussion below, as we expect that regulators will focus on these areas in the coming years.

A. Stablecoins

Stablecoins were developed in response to the price volatility of bitcoin and other cryptocurrencies.[2]  As their name suggests, Stablecoins aim to “increase price stability,” given that their value is tied to fiat currencies, which typically are “stable and liquid.”[3]  The stability of Stablecoins should increase their market acceptance, particularly for payment purposes.[4]   

In 2019, the Swiss Financial Market Supervisory Authority (FINMA) released Stablecoin guidelines.[5]  This guidance noted that while Swiss law lacks specific provisions to regulate Stablecoins, they would be treated the same as any other blockchain-based tokens.  The specific characteristics of Stablecoins can influence which financial laws apply.  For example, if a token is linked to a particular fiat currency, it likely would be categorized as a deposit under the banking laws.  The updated white paper explores FINMA’s and other regulators’ evolving approaches to Stablecoins in more depth.

B. Actual Delivery

The Commodity Exchange Act (CEA) provides that agreements, contracts, or transactions in commodities—other than foreign currencies or securities—entered into by or offered to retail customers on a leveraged, margined, or financed basis must be regulated as or “as if” they were futures, unless covered by an exemption.[6]  This effectively means that a non-exempt transaction may be executed only on or subject to the rules of a CFTC-regulated exchange, and persons providing services in connection with nonexempt transactions may be covered by one of the CEA’s registration categories for professionals.

One oft-discussed exception to this requirement is for contracts for commodity sales that result in actual delivery of the commodity within 28 days.  The CFTC has been grappling for years with its interpretation of the term “actual delivery.”[7]  The need to clarify the meaning of actual delivery in virtual currency transactions became more pronounced in 2016, when the CFTC brought its first enforcement action against a trading platform that offered retail commodity transactions in virtual currency without registering with the CFTC.[8]  In its settlement order against that platform, Bitfinex, the CFTC took the position that delivery of bitcoin purchased with borrowed funds to a private, omnibus settlement wallet where the coins were held for the benefit of the buyer but also as collateral for the loan did not constitute actual delivery, because the buyer did not have any rights to access or use the purchased bitcoin until released by Bitfinex following satisfaction of the loan.  In March 2020, the CFTC addressed the uncertainty surrounding the concept of “actual delivery” in the context of digital asset transactions by issuing an interpretation that aligns with the approach it employed in Bitfinex.  This guidance provides, in part, that the actual delivery exception applies only when a customer secures possession and control of, and has the ability to use freely in commerce, the entire quantity of the digital asset no later than 28 days from the date of the transaction, rendering any lien on the digital asset as a means to secure repayment incompatible with actual delivery.[9]  The updated white paper examines the CFTC’s actions in this area in greater depth.

C. SEC Digital Asset Framework and Other Enforcement Issues

In April 2019, the SEC’s Strategic Hub for Innovation and Financial Technology (FinHub) published the Digital Asset Framework,[10] which provides guidance regarding FinHub’s view as to whether a given digital asset would be considered a security—and thus subject to SEC regulation—under the test set forth in SEC v. W.J. Howey Co.[11]  The SEC staff also recently issued its first digital-asset-related no-action letters, confirming that two digital assets that essentially function as stored-value cards would not be deemed securities.  The Framework and other developments concerning the SEC’s regulation of digital assets are discussed in detail in the updated white paper. 

The white paper also addresses the regulatory uncertainty attending digital assets, which could potentially frustrate law enforcement and innovation.  The CFTC and the SEC appear to be coordinating in combatting perceived fraudulent activity involving cash market transactions in digital assets, but their coordination does not necessarily mean that where only one agency initiates an action, only that agency has jurisdiction.  One legislative attempt to address this regulatory uncertainty is the Digital Commodity Exchange Act of 2020 (DCEA), which was introduced to fill regulatory gaps that exist between the CFTC and the SEC and to provide a clear means by which market participants could ensure that their transactions in digital assets comply with the law.  The updated white paper includes more detailed discussion of the DCEA.

D. Travel Rule

FinCEN’s Travel Rule has been a recent focus of international attention, with the Financial Action Task Force (FATF) adopting an interpretive note in June 2019 confirming that countries should apply provisions similar to the Travel Rule to virtual asset services providers.[12]  In the United States, FinCEN has confirmed that the Travel Rule is the most commonly cited violation by the IRS against money services businesses engaged in virtual currency money transmission.[13]  The updated white paper expands on this topic in detail. 


[1] By Michael Spafford and Katherine Berris of Paul Hastings, Jonathan Marcus of Skadden, and Daren Stanaway of Interactive Brokers.

[2] Tim Swanson, Why Bitcoin Needs Fiat (And This Won’t Change in 2018), Coindesk (Jan. 4, 2018), https://www.coindesk.com/bitcoin-still-needs-fiat-currency-wont-change-2018/.

[3] Id.

[4] FINMA, Supplement to the Guidelines for Enquiries Regarding the Regulatory Framework for Initial Coin Offerings (ICOS) (2019), https://www.finma.ch/en/news/2019/09/20190911-mm-stable-coins/.

[5] Id.

[6]  7 U.S.C. § 2(c)(2)(D)(iii).

[7] American Bar Association Derivatives and Futures Law Committee Innovative Digital Products and Processes Subcommittee Jurisdiction Working Group, Digital and Digitized Assets: Federal and State Jurisdiction Issues 61 (2020), https://www.americanbar.org/content/dam/aba/administrative/business_law/buslaw/committees/CL620000pub/digital_assets.pdf.

[8] See In re BFXNA Inc., CFTC No. 16-19 [2016-2017 Transfer Binder] Comm. Fut. L. Rep. (CCH) ¶ 33,766 (June 2, 2016).

[9] Retail Commodity Transactions involving Certain Digital Assets, 85 Fed. Reg. 37,734, 37,742–43 (June 24, 2020).

[10] SEC, Strategic Hub for Innovation and Financial Technology, Framework for “Investment Contract” Analysis of Digital Assets (Apr. 3, 2019), https://www.sec.gov/corpfin/framework-investment-contract-analysis-digital-assets.

[11] SEC v. W.J. Howey Co., 328 U.S. 293 (1946).

[12] See FATF, Outcomes FATF Plenary, 16-21 June 2019 (June 21, 2019), https://www.fatfgafi.org/publications/fatfgeneral/documents/outcomes-plenary-june-2019.html. FinCEN subsequently “applauded” FATF’s interpretation. See FinCEN, Prepared Remarks of FinCEN Director Kenneth A. Blanco at Chainalysis Blockchain Symposium (May 13, 2020), https://www.fincen.gov/news/speeches/prepared-remarks-fincen-directorkenneth-blanco-delivered-consensus-blockchainsymposium.

[13] See FinCEN, Prepared Remarks of FinCEN Director Kenneth A. Blanco at Chainalysis Blockchain Symposium (Nov. 15, 2019), https://www.fincen.gov/news/speeches/prepared-remarks-fincen-director-kenneth-blancochainalysis-blockchain-symposium.

Massive Defense Bill Includes Broad SEC Disgorgement Authority and Anti-Money Laundering Provisions: A Recommendation for Treasury Secretary Janet Yellen

Buried in the $740.5 billion National Defense Authorization Act for 2021[1] (“NDAA”) are numerous provisions that affect financial services law.  Although the news media directed most of their coverage to Congress’s override of President Trump’s veto of the massive bill[2], this article discusses a few of the provisions that should be of interest to the financial services bar. 

Disgorgement Authority

Of major significance is a provision that enhances the Securities and Exchange Commission’s (“SEC”) authority to seek disgorgement remedies in conjunction with an enforcement action.[3]  The provision addresses a limitation on the SEC’s authority to seek equitable remedies against bad actors.  In Kokesh v. SEC, the U.S. Supreme Court held that the five-year statute of limitations in 28 USC § 2462 applies when the SEC seeks disgorgement from those who have wrongfully enriched themselves. The court held that “disgorgement, as it is applied in SEC enforcement proceedings, operates as a penalty under § 2462.  Accordingly, any claim for disgorgement in an SEC enforcement action must be commenced within five years of the date the claim accrued.”[4]  In testimony before the U.S. Senate Committee on Banking, Housing, and Urban Affairs, SEC Chairman Jay Clayton asserted that the Kokesh decision has had the

anomalous effect of allowing the most “successful” perpetrators of fraud—those whose frauds are well-concealed and stretch beyond the five-year limitations period—to keep their ill-gotten gains.  Since Kokesh was decided, an estimated $1.1 billion in ill-gotten gains has been unavailable for possible distribution to harmed investors, much of which is tied to losses by investors.[5]

Chairman Clayton further noted:

I greatly appreciate the bipartisan, bicameral work underway to address this issue, and I welcome the opportunity to continue to work with Congress to ensure the Commission is able to seek recoveries in cases of well-concealed, long-running frauds so that defrauded retail investors can get their investment dollars back while remaining true to the principles embedded in statutes of limitations.[6]

Apparently, those efforts bore fruit in the NDAA.  The legislation amends Section 21(d) of the Securities Exchange Act of 1934 (“Exchange Act”), granting the SEC the authority to seek disgorgement against the person who received “unjust enrichment.”  Congress included a statute of limitations of ten years for equitable remedies in most instances.  The statute of limitations “clock” does continue to run during any time that the bad actor is outside of the United States.

I have prepared a mark-up showing how Congress amended Section 21 of the Exchange Act (in “Hill-speak” a “Ramseyer”).  I have struck through deletions and marked the legislative changes in italics.  It appears below:

H.R. 6395

The “William M. (Mac) Thornberry National Defense Authorization Act for Fiscal Year 2021”

******

Amendments of Title LXV – Miscellaneous

******

SEC. 6501. INVESTIGATIONS AND PROSECUTION OF OFFENSES FOR VIOLATIONS OF THE SECURITIES LAWS

[Page 1238]

(a) IN GENERAL. —Section 21(d) of the Securities Exchange Act of 1934 (15 U.S.C. 78u(d)) is amended —

(3) CIVIL MONEY PENALTIES IN CIVIL ACTIONS.— AND AUTHORITY TO SEEK DISGORGEMENT

(A) AUTHORITY OF COMMISSION.—Whenever it shall appear to the Commission that any person has violated any provision of this title, the rules or regulations thereunder, or a cease and-desist order entered by the Commission pursuant to section 21C of this title, other than by committing a violation subject to a penalty pursuant to section 21A, the Commission may bring an action in a United States district court to seek, and the court shall have jurisdiction to impose, upon a proper showing, a civil penalty to be paid by the person who committed such violation. “jurisdiction to—

“(i) impose, upon a proper showing, a civil penalty to be paid by the person who committed such violation; and

“(ii) require disgorgement under paragraph (7) of any unjust enrichment by the person who received such unjust enrichment as a result of such violation.”

(B) AMOUNT OF PENALTY. — 

(i) FIRST TIER. — The amount of the penalty a civil penalty imposed under subparagraph (A)(i) shall be determined by the court in light of the facts and circumstances. For each violation, the amount of the penalty shall not exceed the greater of (I) $5,000 for a natural person or $50,000 for any other person, or (II) the gross amount of pecuniary gain to such defendant as a result of the violation.

(ii) SECOND TIER. — Notwithstanding clause (i), the amount of penalty amount of a civil penalty imposed under subparagraph (A)(i) for each such violation shall not exceed the greater of (I) $50,000 for a natural person or $250,000 for any other person, or (II) the gross amount of pecuniary gain to such defendant as a result of the violation, if the violation described in subparagraph (A) involved fraud, deceit, manipulation, or deliberate or reckless disregard of a regulatory requirement.

(iii) THIRD TIER.—Notwithstanding clauses (i) and (ii), the amount of penalty for each such violation amount of a civil penalty imposed under subparagraph (A)(i) for each violation described in that subparagraph shall not exceed the greater of (I) $100,000 for a natural person or $500,000 for any other person, or (II) the gross amount of pecuniary gain to such defendant as a result of the violation, if— (aa) the violation described in subparagraph (A) involved fraud, deceit, manipulation, or deliberate or reckless disregard of a regulatory requirement; and (bb) such violation directly or indirectly resulted in substantial losses or created a significant risk of substantial losses to other persons.

(C) PROCEDURES FOR COLLECTION. — [No change.]

* * * * *

(D) SPECIAL PROVISIONS RELATING TO A VIOLATION OF A

CEASE-AND-DESIST ORDER.  [No change.]

* * * * *

(4)  PROHIBITION OF ATTORNEYS’ FEES PAID FROM COMMISSION DISGORGEMENT FUNDS.—Except as otherwise ordered by the court upon motion by the Commission, or, in the case of an administrative action, as otherwise ordered by the Commission, funds disgorged under paragraph (7) as the result of an action brought by the Commission in Federal court, or as a result of any Commission administrative action, shall not be distributed as payment for attorneys’ fees or expenses incurred by private parties seeking distribution of the disgorged funds.

(5) EQUITABLE RELIEF [No change.]

* * * * *

(6) AUTHORITY OF A COURT TO PROHIBIT PERSONS FROM PARTICIPATING IN AN OFFERING OF PENNY STOCK [No change.]

* * * * *

(7) DISGORGEMENT. — In any action or proceeding brought by the Commission under any provision of the securities laws, the Commission may seek, and any Federal court may order, disgorgement.

(8) LIMITATIONS PERIODS.  —

(A) DISGORGEMENT. — The Commission may bring a claim for disgorgement under paragraph (7)—

(i) not later than 5 years after the latest date of the violation that gives rise to the action or proceeding in which the Commission seeks the claim occurs; or

(ii) not later than 10 years after the latest date of the violation that gives rise to the action or proceeding in which the Commission seeks the claim if the violation involves conduct that violates —  

(I) section 10(b);

(II) section 17(a)(1) of the Securities Act of 1933 (15 U.S.C. 77q(a)(1));

(III) section 206(1) of the Investment Advisers Act of 1940 (15 U.S.C. 80b–6(1)); or

(IV) any other provision of the securities laws for which scienter must be established.

(B) EQUITABLE REMEDIES. —The Commission may seek a claim for any equitable remedy, including for an injunction or for a bar, suspension, or cease and desist order, not later than 10 years after the latest date on which a violation that gives rise to the claim occurs.

(C) CALCULATION. — For the purposes of calculating any limitations period under this paragraph with respect to an action or claim, any time in which the person against which the action or claim, as applicable, is brought is outside of the United States shall not count towards the accrual of that period.

(9) RULE OF CONSTRUCTION. — Nothing in paragraph (7) may be construed as altering any right that any private party may have to maintain a suit for a violation of this Act.” 

***** 

(b) APPLICABILITY— The amendments made by subsection (a) [i.e., of this amendment] shall apply with respect to any action or proceeding that is pending on, or commenced on or after, the date of enactment of this Act.[7]

Anti-Money Laundering Provisions

Protection of Algorithms

The NDAA includes a remarkable provision to protect the privacy of algorithms that financial institutions use for their anti-money laundering (“AML”) compliance programs.  Division F of the NDAA includes many amendments to the Bank Secrecy Act (“BSA”), including provisions that expand the scope of the BSA to “value that substitutes for currency,”[8] presumably referring to cryptocurrency.  Other provisions strengthen the Financial Crimes Enforcement Network (“FinCEN”) by establishing a FinCEN exchange to facilitate voluntary public-private sharing of information[9] and increase technical assistance for international cooperation.[10]  This article does not attempt to discuss all of those provisions on a comprehensive basis. However, I will focus on one provision that may have implications beyond AML compliance, and will make a recommendation with respect to AML rules.  

The NDAA amends the Bank Secrecy Act to protect the confidentiality of algorithms that financial institutions use for their AML efforts.  Section 6209 amends 31 USC § 5318(o)(3) to provide that if a financial institution discloses to its regulator information about an algorithm that the institution uses in conjunction with its AML program, the regulator must not disclose that information to the public. 

Hedge fund managers have had legitimate concerns about revealing the details of their trading algorithms to regulators for fear of public disclosure.  Managers appreciate the need for regulatory oversight, but preferred that regulators look at actual trading patterns, rather than the algorithms, during examinations.  Managers only wished to release information about the algorithms themselves after regulators have examined other, less proprietary data, but still have regulatory concerns.

This amendment to the Bank Secrecy Act protects the confidentiality of the algorithms that financial institutions use for AML purposes, i.e., a public purpose, rather than trading algorithms.  Nonetheless, the provision demonstrates the sensitivity of algorithms and the need for confidentiality, at least in some settings.

Perhaps this amendment to the Bank Secrecy Act will validate hedge fund managers’ concerns about keeping their trading algorithms confidential unless regulators cannot reasonably discharge their oversight responsibility in any other way.

Recommendation to FinCEN

The author suggests that the Treasury Department and FinCEN should re-propose and adopt final AML rules for investment advisers.  Remarkably, FinCEN has never adopted final rules subjecting investment advisers to AML requirements.  Prior administrations have proposed rules, but never adopted them.  

The FinCEN 2015 Proposal[11] reviewed the history of the proposal and I have summarized it below:

  • On September 26, 2002, FinCEN proposed rules requiring that unregistered investment companies establish AML programs (“Proposed Unregistered Investment Companies Rule”).[12] 
  • On May 5, 2003, FinCEN proposed requiring that certain investment advisers establish AML programs (“First Proposed Investment Adviser Rule”).[13]
  • In June 2007, FinCEN announced that it was reconsidering both the Proposed Unregistered Investment Companies Rule and the First Proposed Investment Adviser Rule, and subsequently withdrew them.[14]
  • After Congress passed the Dodd Frank Act,[15] FinCEN decided to propose new AML rules for investment advisers. The proposal notes that the Dodd Frank Act required most investment advisers to be registered with the SEC.  “Accordingly, FinCEN believes the two-pronged approach of the prior proposals is no longer necessary to address the money laundering and terrorist financing risks presented by SEC registered investment adviser clients and the unregistered investment companies that are managed by such advisers.”

    Briefly, the proposal would have amended 31 CFR § 1010 to add a new subsection 100(nnn), defining an investment adviser as “[a]ny person who is registered or required to register with the SEC under section 203 of the Investment Advisers Act of 1940….”  As a result, the proposal would have made such investment advisers subject to the AML requirements.  Of course, the proposal included numerous other requirements.[16]  For whatever reason, the Obama Administration never adopted a final rule requiring that investment advisers have AML rules. 

On September 14, 2020, FinCEN published an advanced notice of rulemaking (“ANPRM”), seeking comments on ways to improve the current AML requirements.  The proposal notes that “any such amendments would be expected to further clarify that such a program assesses and manages risk as informed by a financial institution’s risk assessment, including consideration of anti-money laundering priorities to be issued by FinCEN.”[17]  The ANPRM does not include any reference to the 2015 Proposal.  The Trump Administration did not otherwise pursue the issue of applying AML requirements to investment advisers. 

In my view, the Biden Administration should re-propose rules subjecting investment advisers to AML rules.  I cannot point to a specific regulatory failure to justify my suggestion.  Nonetheless, I believe that it is time for FinCEN to adopt such requirements for the following reasons:

  • Investment advisers, particularly hedge funds, have AML programs. It would be foolish indeed for any investment manager not to have a program and wittingly or unwittingly to take “dirty” money.  Any manager that accepted tainted money would face extreme reputational risk and probably would violate other statutes, depending on the circumstances. 
  • In some circumstances, it may be wise to adopt rules in the absence of a crisis. As President Kennedy said, “the time to repair the roof is when the sun is shining.”[18]  I suggest that FinCEN should propose and adopt new rules in an environment that would permit thoughtful consideration of a proposal and comments rather than hastily adopting ill-conceived rules in a crisis environment.  The NRPRM noted above might inform such a proposal.
  • FinCEN’s rules should reflect the existing course of business that investment managers have with other, regulated financial institutions. AML rules for investment managers should integrate with the existing regulatory framework.
  • If FinCEN adopted AML rules that differ from existing practice, managers would have an opportunity to comply.

Thoughtful rules would help investment advisers do a better job of supporting the existing AML infrastructure.  Establishing clear rules for investment advisers that complement existing rules and practices would benefit everyone.


© Stuart J. Kaswell 2021, who has granted permission to the ABA to publish this article in accordance with the ABA’s release, a copy of which is incorporated by reference. Stuart Kaswell is an experienced financial services lawyer. He has worked at the Securities and Exchange Commission, as securities counsel to the Committee on Energy and Commerce of the U.S. House of Representatives (when it had securities jurisdiction), and has been a partner at two law firms and general counsel of two financial trade associations.


[1]  The William M. (Mac) Thornberry National Defense Authorization Act for Fiscal Year 2021, H.R. 6395, 116th Cong., 2d. Sess. (2021).  The bill is 1,480 pages long.

[2] The House voted to override the veto on Dec. 28, 2020; the Senate voted to override on Jan. 1, 2021. See also WSJ, Jan. 1. 2021

[3] Section 6501 of the NDAA.  See also A. Frankel, Congress hid a big gift to the SEC in defense spending bill awaiting Trump’s signature, Reuters, Dec. 23, 2020.

[4] 581 US ___ slip op. at 11 (2017).

[5] Testimony of the Honorable Jay Clayton, Dec. 10, 2019 at text accompanying footnote 76.  The Supreme Court subsequently upheld the SEC’s authority to seek disgorgement “an antecedent question” that Kokesh left unanswered. Liu v. SEC, 591 US ____ (2020), at slip op. 1.

[6] Id at text accompanying note 81.

[7] Compared to Exchange Act version dated October 2, 2019 available on the SEC’s website at https://www.govinfo.gov/content/pkg/COMPS-1885/pdf/COMPS-1885.pdf,As amended Through P.L. 115-141, Enacted March 23, 2018.

[8] Section 6102(c) of the NDAA.

[9] Section 6103 of the NDAA.

[10] Section 6111 of the NDAA.

[11] Department of the Treasury, FinCEN, RIN 1506-AB10, August 24, 2015, 80 FR 52680 (Sept. 1, 2015).

[12] Anti-Money Laundering Programs for Unregistered Investment Companies, 67 FR 60617 (Sept. 26, 2002).

[13] Anti-Money Laundering Programs for Investment Advisers, 68 FR 23646 (May 5, 2003).

[14] Withdrawal of the Notice of Proposed Rulemaking; Anti-Money Laundering Programs for Unregistered Investment Companies, 73 FR 65569 (Nov. 4, 2008); and Withdrawal of the Notice of Proposed Rulemaking; Anti-Money Laundering Programs for Investment Advisers, 73 FR 65568 (Nov. 4, 2008).

[15]  The Wall Street Reform and Consumer Protection Act (“Dodd Frank Act”), Public Law 111–203, 124, Stat. 1376 (2010).

[16] FinCEN, Department of the Treasury, RIN 1506-AB10, (Aug. 15, 2015); 80 FR 52680 (Sept. 1, 2015)

 

[17] Docket No. FinCEN-2020-0011, 85 FR 58023 (Sept. 17, 2020).

[18] President John F. Kennedy, Jan. 11 1962, State of the Union Address.

The Role of the Company When Its Owners Face Off Against Each Other

Owners of closely held corporations or LLCs often find themselves litigating for control of their “Company.” When that happens, on which side of the caption does the Company line up? What role should it play? And should either warring faction enjoy access to the Company’s assets to fund that side’s litigation costs?

When derivative claims are asserted, the Company must be a party,[1] but when nothing is sought on behalf of or from the Company and all the owners are before the court, should the Company be a plaintiff or a defendant, or should it be left off the caption altogether? If it is not named as a party, the court may require the Company to become one so that it will be subject to the court’s orders.

When the Company is named a nominal defendant in the Complaint, the plaintiff runs the risk that the defendant owners will retain one lawyer to represent both them and the Company and pay that lawyer’s retainer (and eventually a lot more) from the Company’s treasury, even though as a practical matter that lawyer will be advancing one side’s position in the litigation against the other. In addition to whether that is fair, joint representation raises ethical issues.[2] The result is that the choice of counsel, the authority to choose counsel, and the use of Company funds to pay counsel become issues in a soon-to-follow pretrial application for relief by the plaintiff.[3]

These issues were addressed, but not conclusively resolved, in a case that came before the Texas Supreme Court on pretrial applications to disqualify defendants’ counsel.[4] The underlying dispute, which had not yet been decided by the lower court, was between twelve LLC owners and six “Governing Persons” collectively divided into two factions. The disagreement arose from the majority’s firing of the previously unanimously elected president and managing member who, with his supporters, claimed that a unanimous vote was required for dismissal. The minority’s Complaint, asserting derivative as well as direct claims, included the LLC as a named plaintiff. The defendant majority engaged a law firm that had previously represented the LLC, funded its litigation costs from the Company treasury, and asserted counterclaims.

Late in the litigation, the minority moved to disqualify defendants’ counsel charging (1) that the law firm, having previously been counsel to the plaintiff LLC, could not appear against its former client, and (2) that the defendant faction had no authority to hire a law firm to act for the LLC.

The court noted that the core issue underlying the litigation was who had the right to control the LLC’s management, and as to this issue, each faction’s position was that the other side’s position was incorrect and harmful to the LLC. The court observed that when stripped of the baggage of the derivative label, the Company’s alignment in the caption was immaterial to this issue, noting that “[C]ompanies in derivative litigation are simultaneously ‘plaintiffs’ and ‘defendants’ depending on how you look at it.”[5]

The court reviewed decisions from other jurisdictions questioning joint representation and found no categorical rule.[6] Based on Texas law and the Texas Rule serving as the basis for one of the applications made below, and in light of the timing of the motions to disqualify, the Texas Supreme Court upheld the lower court’s discretion not to grant disqualification. The core merits question of control was capable of being fairly litigated by the factions and lawyers for both sides presently before the court.

Whether defendants had the authority to hire counsel at Company expense was not determined at this stage of the proceeding. The authority to hire counsel for an LLC often turns on whether it is a “major” or “material” or “extraordinary” or “not in the usual course of business” decision that requires unanimity or high vote under either statute or operating agreement. 

As to the inequity of one side’s use of Company money to pay its litigation costs, the court said that “adequate remedies exist” for subsequent recovery of any legal fees that may turn out to have been improperly paid from the other group’s interests in the LLC.

“Adequate remedies” after the fact may be viable if the personal resources of both sides fighting for control are such that each is able to fund its litigation costs without hardship. This may have been true in the Texas case. If one or both litigants have limited resources, the rights of one side to postlitigation remedies are of little avail when the other side is enjoying the real-time advantage of financing its position in the litigation with the Company’s funds. Courts do afford relief in those situations when timely application is made.[7]


[1]  Meyer v. Fleming, 327 U.S. 161 (1946); Liddy v. Urbanek, 707 F.2d 1222 (11th Cir. 1983). In Cotter on behalf of Reading International, Inc. v. Kane, 473 P.3d 451 (Nev. 2020), the plaintiff, asserting that his termination as corporate president was void, filed a derivative action against the directors naming the corporation as a nominal defendant.  Although the corporation had to remain neutral on the merits of the claim, the court allowed it to challenge the plaintiff’s standing because the corporation might later be called upon to indemnify the defendant directors.

[2]  See, for example, In re Conduct of Kinsey, 680 P.2d 660 (Or.1983).

[3]  When the court orders the Company to be represented by separate counsel, additional indirect costs are incurred by both parties. The Company’s lawyer, however, when acting as a neutral, may assist the court as would a guardian and perhaps facilitate amicable resolution.

[4]  In re Murrin Brothers 1885, Ltd., 603 S.W.3d 53 (Tex. 2019).

[5]  Id. at 58. Because the nominal defendant corporation stands to be the beneficiary of any derivative action recovery, its interests are not necessarily adverse to the plaintiff. Cotter on behalf of Reading International, Inc. v. Kane, note 1 supra.

[6]  In addition to the cases cited, Rosenfeld v. Metals Selling Corp., 643 A.2d 1253, 1264 (Conn. 1994), and Messing v. FDI, Inc., 439 F.Supp. 776 (D. N.J. 1977) are also instructive.

[7]  In Ehlinger v. Hauser, 785 N.W.2d 328 (Wis. 2010), the court, recognizing that the dispute was really between the two shareholders, and citing Matter of Clemente Bros., Inc., 239 N.Y.S.2d 703 (App. Div. 1963), aff’d o.b. 13 N.Y.2d 963 (1963), observing that “the corporation may not assume a ‘militant alignment on the side of one of the two equal, discordant stockholders,’ ” prohibited the corporation from paying the expenses incurred by one of the shareholders. Similarly, Matter of Penetent Corp., 605 N.Y.S.2d 691 (App. Div. 1993), affirmed the trial court’s grant of petitioner’s motion to restrain respondent from using corporate funds to pay for professional services incurred in the proceeding.

Sports Betting and Data Security: Cybersecurity, Data Protection, and Privacy Rights in Gaming Law Practice

At the ABA Business Law Section’s annual meeting in Spring 2020, which went virtual for the first time due to the pandemic, the Section’s Gaming Law Committee took up the issue of sports betting and data security as a key emerging area that intersects with numerous other areas of law practice, including contracts, commercial transactions, securities regulation, business entity issues, tribal-state compacting, and intellectual property. Along with the authors of this article, Dennis Ehling (Partner with Blank Rome in Los Angeles), Raymond Luk, Jr. (Corporate Counsel for BorgWarner Inc., in Auburn Hills, Michigan), and Peter McLaughlin (Partner with Culhane Meadows in Boston) comprised the panel, which was co-sponsored by the Business Law Section’s Intellectual Property and Sports Law Committees. ABA Business Law Section members can watch the program for CLE credit on-demand here.

Introduction

A rapidly evolving subfield in gaming law concerns cybersecurity, data protection, and privacy rights. The swift expansion of legalized sports betting, as well as igaming, mobile gaming, daily fantasy sports (DFS), and competitive videogaming (esports), have created both opportunities and challenges for the business lawyer. Online and mobile platforms for sports betting and DFS, as well as team trademarks and design of esports games, raise issues related to intellectual property, data collection and reporting, data ownership, protection, and privacy, and ensuring data security. A business lawyer advising clients in these areas, or working directly in these industries, needs to know how data protection compliance and intellectual property interests operate in these rapidly developing contexts. Such matters also increasingly intersect with the dynamic area of digital currencies and cryptocurrencies, blockchain technologies and transactions, and compliance within and across jurisdictions, whether domestic or international.

Data security has always been a key issue for the gaming industry. Traditionally a “cash business,” the current $260 billion U.S. gaming industry runs primarily on transactions, often large ones. Like finance and banking institutions, casinos must be diligent in guarding against cybersecurity threats, especially as mobile and online transactions become the norm. The gaming industry also relies on computer systems for operating gaming devices, gaming floor security, and gathering and storing player data, among other functions, all of which can be targets for hackers and cheats. With the recent spread of legalized sports betting, data security is more important than ever.

Casinos and Cybersecurity

Like other industries that retain extensive customer data, the gaming industry is particularly vulnerable to cyber threats. The 2014 hacking of the Las Vegas Sands Corporation (LVS), which owns the Venetian and Palazzo casino resorts in Las Vegas as well as several casino resorts in Asia, provides a cautionary tale. As confirmed by the U.S. Director of National Intelligence, the cyber-attack was carried out by Iranian “hacktivists” in retaliation for LVS CEO Sheldon Adelson’s support of a U.S. military strike against Iran. Malware shut down company email and phone lines, and wiped out employee hard drives. Hackers stole customer credit card data, Social Security numbers, and driver’s license information. The company’s casino websites were taken over and defaced, prompting a one-week shutdown before the sites were restored. The cyber-attack impacted the majority of the company’s Las Vegas servers; the cost of recovering data and building new systems reportedly was in excess of $40 million.

The gaming industry has its own particular vulnerabilities as well. Several years ago, a Russian hacker devised a system to decipher the random number generator programs in slot machines. He then organized teams to visit casinos and identify vulnerable slot machines, before using a smartphone app to trigger a jackpot on the machine. Reportedly, the teams took in $250,000 a week from casinos around the world. In 2014, four team members pled guilty to federal fraud charges stemming from using the slot machine cheat in casinos in California, Illinois, and Missouri. The hacker also leveraged the success of the teams to attempt to extort the slot machine manufacturer. Though the extortion attempt was unsuccessful, the hacker bragged to magazine that he continues to earn millions through the scheme.

Sports Betting

Since the U.S. Supreme Court’s 2018 decision striking down the federal Professional and Amateur Sports Protection Act in Murphy v. NCAA, 584 U.S. ___, some 24 states plus the District of Columbia have legalized sports betting, with as many as a dozen more expected to take up sports wagering legislation in 2021. Commentators predict that as many as 45 states may have legal sports betting within five years. A growing number of states, including Indiana, Iowa, Nevada, New Jersey, Pennsylvania, Rhode Island, and West Virginia, have also legalized online and mobile sports betting.

Legal wagers on Super Bowl LIV in 2020 exceeded $270 million (though legal wagers continue to be eclipsed by the illegal market; the estimated total wagers for the Super Bowl were over $6 billion, placed by some 26 million bettors). Industry experts estimated that five million people placed their bets—both legal and illegal—via online or mobile platforms.

Next on the calendar, of course, was March Madness—the NCAA men’s basketball tournament. The American Gaming Association had predicted over $10 billion in wagers ($295 million made legally) by over 50 million Americans and some 100 million people around the world. The tournament was cancelled due to the pandemic—as were all collegiate and major-league professional sports throughout the U.S., as well as globally, throughout the summer and into the fall. This only raised the stakes. Industry commentators predict that latent and pent-up demand for sports and sports gambling opportunities will generate wagers of similar or even larger amounts for Super Bowl LV in Tampa Bay, as well for as the recently announced “bubble edition” of March Madness taking place in Indiana in spring 2021.

As more states enter the legalized sports betting market, many of them have minimal regulatory experience as compared to Nevada, where sports betting has been legal and highly regulated for decades. Even fewer states have experience with regard to online and mobile betting, as federal law has permitted states to legalize online gaming only for the last decade or so.

Sports Betting and Data Security

Cybersecurity experts warn about the risks posed by the lure of the anticipated handle, both legal and illegal, around sports betting. While money laundering and theft are concerns, so are data breaches of customer information, which in the long run may be even more valuable—and more damaging—to patron and operator alike. The customer data collected by casinos often is extensive. Bettors may be required to provide date of birth, Social Security number, physical and email addresses, and other personal identifying information. They may also be required to create accounts with financial and banking information, along with passwords and security questions. Customer habits and preferences may be tracked through players club cards and apps. For online and mobile betting, age (sometimes via date of birth) and location data is also collected.

But sports betting also has other valuable data: sports data.

Sports books offer wagers not just on the outcome of the game (win or moneyline), but on the score (over/under, point spread) and special events (proposition bets, such as whether the game will go into overtime or whether a particular player will score a touchdown). In-play or live betting allows bettors to place wagers after an event has started and up to the time of its conclusion. The odds on all of these bets are driven by sports data on all features of the players, teams, contests, and leagues. The security of sports data is critical to the integrity of legalized sports betting. As sports betting has one of the slimmest margins of any casino games, the security of sports data also is critical to the financial risk inherent in a casino’s sports book.

Sports data also is an intellectual property asset. Leagues and teams have claimed ownership of sports data, with the business plan of selling their official data to data analytics companies and oddsmakers, or charging integrity or data rights fees to the gaming industry. For example, in 2018, MGM Resorts entered into a 3-year deal with the NBA to receive league-verified data for some $25 million, followed by similar deals between MGM and the NHL and MLB. But there are unsettled questions regarding ownership, copyright, and fair use. Broadcasts of sporting events may be copyrightable, but the live game likely is not. Prior cases, including NBA v. Motorola, Inc., 105 F.3d 841 (2d Cir. 1997) (broadcasts, not games, are copyrighted; facts derived from broadcasts are not copyrighted; a sports broadcast is not “hot news”), Morris Communications Co. v. PGA Tour, 364 F.3d 1288 (11th Cir. 2004) (a sports league may charge a fee for access to proprietary data without violating antitrust laws), C.B.C Distribution & Marketing, Inc. v. MLB Advanced Media, 505 F.3d 818 (8th Cir. 2007) (a fantasy sports operator’s use of baseball statistics in the public domain is protected by the First Amendment), and Daniels v. FanDuel, Inc., 909 F.3d 876 (7th Cir. 2018) (college athletes’ names, likenesses, and statistical data are “newsworthy” and may be used without an athlete’s permission), provide clear answers to issues that are increasingly significant, or even novel, in the post-Murphy legal environment as the legal sports betting industry—and its demands for data—expand.

Similar considerations and questions with regard to data security and intellectual property apply to DFS and esports.

Applicable Data Security Laws

While data protection, data privacy, and data-breach notification are recognized as critical dimensions of cybersecurity law, regulation, and policy, these issues have yet to be addressed in any comprehensive legislation in the U.S Not so elsewhere. The European Union’s comprehensive General Data Protection Regulation (GDPR) took effect in 2018. The GDPR regulates the processing of personal data within its territoriality requirements. Processing of personal data includes collection, use, storage, organization, disclosure, or any other operation performed on personal data. Personal data is defined as any information relating to an identified or identifiable person, including names, identification numbers, location data, IP addresses, etc. The GDPR’s territoriality requirements bring within its scope any organization with an “establishment” in the EU that processes personal data as part of that establishments’ activities.

As for the U.S., there is not yet a single, comprehensive federal data protection law. There are several federal laws that address data security in specific areas, including:

  • Children’s Online Privacy Protection Act (COPPA)
  • Computer Fraud and Abuse Act (CFAA)
  • Consumer Financial Protection Act (CFPA)
  • Electronic Communications Privacy Act (ECPA)
  • Family Educational Rights and Privacy Act (FERPA)
  • Federal Trade Commission Act (FTC Act)
  • Health Insurance Portability and Accountability Act (HIPAA)
  • Fair Credit Reporting Act (FCRA)

These laws, however, speak to highly diverse forms of data and expectations of privacy, with divergent requirements for relevant industry actors.

States, however, have moved more rapidly to address privacy, cybersecurity, and data breaches, passing or at least considering hundreds of bills across all 50 states, territories, and the District of Columbia, many of which focus heavily on consumer protection. At least 25 states have laws addressing data security practices in the private sector, more than half of them passed in the last five years. Most states also now have data disposal laws, governing how companies destroy or render indecipherable the personal information obtained from customers and employees. The California Consumer Privacy Act (CCPA) is notable for its comprehensive approach, as it applies to most for-profit companies that do business in the state, and regulates all “personal information,” encompassing nearly any and all information that a business might collect from a customer.

Conclusion

The rapid expansion of legalized sports betting, as well as the emergent areas of DFS and esports, have created both opportunities and challenges for the business lawyer. In particular, online and mobile platforms for sports betting and DFS, as well as team trademarks and design of esports games, raise rapidly mounting issues and dynamic questions related to intellectual property and data protection, privacy, and security.

A business lawyer advising clients in these areas, or working directly in the gaming industry or with public officials who either have or claim a stake in the success of gaming regulation, needs to know how data protection compliance and intellectual property interests operate in these rapidly developing contexts as they merge with gaming law in retail casino operations and online or mobile wagering alike.

Fortunately, the ABA’s Business Law Section, including its Gaming Law, Intellectual Property, and Sports Law Committees, will continue to spotlight these issues as they arise and evolve.