Does “Good Faith” Matter to the Fourth Circuit? Constructive Fraudulent Conveyances Under the UFCA

The law’s definition of “good faith” is often amorphous, fact specific, and difficult to spell out. No doubt, courts and factfinders have grappled with it for centuries. Yet what explains Maryland’s aversion to interpreting it—or acknowledging it—in the “fair consideration” definition in the Uniform Fraudulent Conveyance Act (UFCA)?

New York and Maryland are the only jurisdictions still applying the UFCA (most other states—43 of them—have moved on to the modernized Uniform Fraudulent Transfer Act), and not surprisingly, New York courts have spilled a lot of ink interpreting and articulating the rights of creditors seeking to void fraudulent conveyances. At this point in New York, there is little ambiguity on what good faith means in the constructive fraudulent conveyance context when insolvent businesses are moving money and assets.

Under the constructive fraudulent conveyance statute of the UFCA,

Every conveyance made and every obligation incurred by a person who is or will be rendered insolvent by it is fraudulent as to creditors without regard to his actual intent, if the conveyance is made or the obligation is incurred without a fair consideration.

“Fair consideration” is provided in exchange for property or an obligation if:

(a) In exchange for such property, or obligation, as a fair equivalent therefor, and in good faith, property is conveyed or an antecedent debt is satisfied, or

(b) The property, or obligation is received in good faith to secure a present advance or antecedent debt in amount not disproportionately small as compared with the value of the property, or obligation obtained.

On a plain reading, the statute permits the avoidance of a transfer as constructively fraudulent even if the debtor receives equivalent value if the plaintiff can prove that the value was not provided in good faith. Striking down such conveyances is permitted regardless of the debtor-transferor’s intent.

In New York, as found in the definition, fair consideration is present when (1) the recipient of the debtor’s property either conveys property in exchange or discharges an antecedent debt; (2) the debtor receives the “fair equivalent” of the property conveyed; and (3) the exchange is undertaken in good faith. See Sharp Int’l Corp. v. State St. Bank & Trust Co. (In re Sharp Int’l Corp.), 403 F.3d 43, 53-54 (2d Cir. 2005). The New York Court of Appeals has identified a few parameters defining “good faith”—an honest belief in the activities in question; no intent to take unconscionable advantage of others; no intent to delay, hinder, or defraud others—and certain circumstances that constitute bad faith as a matter of law; notably, transfers to directors, officers, and shareholders of insolvent corporations in derogation of the rights of general creditors. Farm Stores, Inc. v. School Feeding Corp., 102 A.D.2d 249 (2d Dep’t 1984). Other courts interpreting New York law have interpreted good faith to apply to any transaction between an insolvent corporation and a corporate insider. See Hirsch v. Gersten (In re Centennial Textiles), 220 B.R. 165, 172 (Bankr. S.D.N.Y. 1998) (“under New York law, transfers from an insolvent corporation to an officer, director or major shareholder of that corporation are per se violative of the good faith requirement of DCL § 272 and the fact that the transfer may have been made for a fair equivalent is irrelevant.”); Allen Morris Commercial Real Estate Servs. Co. v. Numismatic Collectors Guild, Inc., No. 90 Civ. 264, 1993 WL 183771, 1993 U.S. Dist. LEXIS 7052, at *28-*30 (S.D.N.Y. May 26, 1993) (“it has been held that transfers from an insolvent corporation to an officer, director and major shareholder of that corporation are per se violative of the good faith requirement of Section 272.”).

Although the fact patterns are often nuanced, it’s undeniable that good faith is of great significance under New York’s UFCA when insolvent businesses are making transfers or entering into transactions with insiders.

Given the robust attention to good faith in New York, it seems safe to assume that the other UFCA jurisdiction—Maryland—might perform a similar test. Or maybe not.

Recently, in United Bank v. Buckingham, 761 F. App’x 185 (4th Cir. 2019), the Fourth Circuit Court of Appeals reversed a decision by the late Judge Roger W. Titus assessing whether fair consideration existed when an insolvent business changed the beneficiary designations on two life insurance policies the company purchased for its CEO.

The judgment creditor bank in the case was owed millions of dollars by the bankrupt debtor business, its CEO, and his wife. Prior to becoming insolvent, the company purchased life insurance policies as an employment benefit to the CEO. Upon the CEO’s death, the company would be reimbursed its premium payments (from the death benefits), and with the beneficiary designated by the CEO receiving the remainder.

After a protracted default by the company, a forbearance agreement between the parties, the CEO diminished by dementia, and his son David appointed guardian, the debtor company’s board approved a sale of the policies. The policies were sold for $110,000—a value determined by the life insurance company pursuant to an IRS formula—to a trust. The trustee of the trust was David, and the beneficiaries were David and his two siblings.

The bank alleged that the transfer of the policies to the trust for only $110,000 was fraudulent because it lacked fair consideration in that the policies were conveyed from the debtor company to the trust despite the fact that the policies were cashed in for $750,000 soon after the sale. The court disagreed with the bank and found that “the $110,000 was a ‘fair equivalent’ for the John Hancock policies.” In short, David—voting for his ill father—and his brother Thomas agreed to transfer the policies from the defunct business to a trust, of which David was both the trustee and a beneficiary, along with his two other siblings, for $110,000 despite evidence that the policies were cashed in for $750,000 after the sale.

The district court’s decision focused solely on fair equivalence and undertook a financial valuation of the policies, ultimately agreeing with David’s position that the policies’ value was $110,000 based on overdue premium payments, negative surrender values, and the fact that the policies were in danger of lapsing and becoming worthless; the policies were also subject to a neutral evaluation from John Hancock based on an IRS-approved formula.

Although the court examined the financial considerations in great detail—and per the “fair equivalent” reference definition—no mention of good faith can be found in the opinion.

In reversing the district court, Judge A. Marvin Quattlebaum, writing for the Fourth Circuit, reversed Judge Titus because there was a genuine factual dispute “concerning the fairness of the consideration” paid for the policies; yet, instead of assessing whether the insolvent business sold the policies for a (1) fair equivalent and (2) in good faith—as the statute requires—the panel held that the trial court had “improperly weighed the evidence” in the defendant’s favor at the summary judgment stage. Indeed, Judge Quattlebaum’s opinion offers no mention of good faith of Maryland’s UFCA (to be fair, he’s not the first to omit it, nor likely the last).

Being on both sides of a transaction is usually a red flag for good faith. See Matter of Bernasconi v. Aeon, LLC, 963 N.Y.S.2d 437 (N.Y. App. Div. 3d Dep’t 2013) (“[W]here . . . a corporate insider participates in both sides of the transfer and the insider controls the transferee, the transfer will be deemed to have been made in bad faith if made to a creditor’s detriment . . . .”) But not here.

Although New York has a robust body of law evaluating good faith and arguably would have denied summary judgment had this case been decided under New York law, the failure of the Buckingham courts to undertake even a minimal good-faith examination of the sale to the trust—and ignore that those voting for the policy would receive the benefits—all raise significant and legitimate doubts as to whether courts are properly interpreting Maryland’s “fair consideration” definition in the UFCA. Although Judge Titus acknowledged Maryland’s deficiency in noting that that there is no dispositive authority as to how to determine fair consideration under specific circumstances, under his and the Fourth Circuit’s interpretation, the “and in good faith” clause may as well have been removed from the “fair consideration” definition found at Md. Code § 15-204. United Bank v. Buckingham, 301 F. Supp. 3d 561 (D. Md. 2018).

Until Maryland’s UFCA “fair consideration” definition is fully interpreted—with at least an acknowledgment to the good-faith clause—creditors may well be advised to seek a nexus to New York law, or a similarly favorable jurisdiction, if they hope to truly enforce their rights.

When Must E-mails Be Produced in DGCL Section 220 Books and Records Actions?

Since common law, stockholders have enjoyed a qualified right to inspect the corporation’s “books and records” for any “proper purpose”—i.e., a purpose reasonably related to the stockholder’s interests as a stockholder. Codified in state corporation statutes such as section 220 of the Delaware General Corporations Law (DCGL), these stockholder inspection rights were exercised infrequently until the Delaware courts began to encourage stockholders to utilize these “tools at hand” to obtain information necessary to plead demand excusal in derivative actions. As the Delaware Supreme Court noted in the seminal decision of Rales v. Blasband: “Surprisingly, little use has been made of section 220 as an information-gathering tool in the derivative context.” 634 A.2d 927, 935 n.10 (Del. 1993). Over the last 20 years, “Delaware courts have encouraged stockholders to use the ‘tools at hand’ (e.g., Section 220) to gather information before filing complaints that will be subject to heightened pleading standards.” Lavin v. West Corp., 2017 WL 6728702, at *9 (Del. Ch. Dec. 29, 2017). The significant increase in section 220 litigation over the last decade is a testament to the plaintiffs’ bar heeding the Delaware courts’ admonitions.

At the same time that section 220 books and records demands have become commonplace, rapid technological advances have driven the proliferation of the forms of media in which corporate information is kept, including, for instance, e-mails, text messages, and other electronic communications and records not traditionally viewed as a corporation’s “books and records.” The issue is only further complicated by the fact that officers’ and directors’ use of personal computers, smartphones, and personal e-mail accounts potentially renders communications beyond the direct control of the corporations whom the officers and directors serve. Until relatively recently, Delaware courts have been hesitant to compel the production of such “nontraditional” books and records in section 220 litigation, given that the extant jurisprudence dictates that a section 220 summary proceeding is far from coextensive in scope with Rule 34 discovery, and a stockholder is only entitled to those books and records deemed “necessary and essential” to achieving a proper purpose. Typically, board minutes, resolutions, and the like are deemed sufficient because the courts are mindful that a stockholder’s inspection rights must be balanced against the potential for burdensome and abusive “fishing expeditions” that mirror discovery requests in plenary corporate litigation. Nonetheless, as technological advances have expanded the range of media used to conduct business, the law has also evolved regarding access to e-mail, text messages, and other forms of communication as books and records of the corporation. Although still evolving, some general principles have emerged that generally guide when the Delaware courts will permit access to electronic communications in section 220 proceedings.

Who cares? Corporations and their officers and directors absolutely should. Section 220 demands have become virtually a necessary prerequisite to any stockholder derivative action, and the books and records that stockholders receive and use to draft their complaint can be outcome-determinative on a motion to dismiss. Whereas board minutes and more “formal” corporate records will allow little room for “creative interpretation” by the plaintiffs’ bar, the same cannot be said of e-mail communications where plans and decisions are informally deliberated in real time, perhaps satirically or within a context that may not be evident when portrayed with hindsight by counsel whose objective is to prove a breach of fiduciary duty. Although producing e-mails in a books and records case cannot always be avoided, there are steps corporations can take on a clear day to mitigate the risk.

The seminal decision granting access to e-mails is a 2013 nonpublished transcript ruling, Ind. Elec. Workers Pension Tr. Fund IBEW v. Wal–Mart Stores, Inc., 7779–CS, at 97–98 (Del. Ch. May 20, 2013) (Strine, C.), which ironically does not directly address the issue of whether e-mails are corporate records subject to section 220 inspection rights. In Wal-Mart, then-Chancellor Strine ordered the production of private communications between officers and directors concerning an alleged bribery scandal under investigation by the plaintiff. In the process, the issue arose as to whether e-mails and electronic documents created or maintained on personal devices were the appropriate subject of a section 220 demand. The court drew no distinctions between e-mails and documents created by employees upon their personal devices verses those generated within the company’s official systems, concluding that where the documents were created or maintained was not controlling: “In terms of this issue of the home devices . . . if you use your home computer to handle Wal-Mart information, I don’t think that many companies would believe that . . . that makes it their personal information.” Given that the e-mails were deemed corporate records necessary for the plaintiff to conduct its investigation, they were to be produced irrespective of where they were physically created or maintained. Although the unpublished Wal-Mart decision did not directly address when the production of e-mails is appropriate in a section 220 action, its affirmance on appeal was routinely cited by the plaintiffs’ bar for that principle.

The issue arose again in Chammas v. Navlink, Inc., 2016 WL 767714 (Del.Ch. 2016), a case involving a director’s demand for books and records pursuant to the more expansive rights that directors have as compared to stockholders. In Chammas, the director plaintiff sought to “investigate whether ‘the other members of the Board and management are excluding them from board business and related communications,’ including emails prior to Board meetings and alleged Secret Meetings.” Consistent with Wal-Mart, Vice Chancellor Noble first observed that whether a document or communication is stored on the company’s servers is “not necessarily determinative of whether it constitutes a book or record of the company.” More important, the court concluded, is whether the book or record must be “in the possession or control of the corporation.” Second, recognizing the importance of burden considerations in the section 220 context, the court disclaimed that although its “holding is not to be interpreted as a blanket prohibition against inspection of private communications among directors, subjecting Section 220 proceedings to such broad requests, even by directors, runs contrary to the ‘summary nature of a Section 220 proceeding.’” Finally, the court observed that the books and records of the company are “those that affect the corporation’s rights, duties, and obligations . . . .” The court’s ultimate rejection of the demand for e-mails turned on the insufficiency of the plaintiff’s evidence of wrongdoing to warrant their production: “Mere suspicions of pre-meeting collusion among board members or board members and management, in the context of a Section 220 action, is insufficient to compel the production of private communications between such officers and directors . . . .”

The same year Chammas was decided, Vice Chancellor Laster analyzed whether e-mails may be within the scope of books and records obtainable pursuant to section 220. In Amalgamated Bank v. Yahoo! Inc., 132 A.3d 752 (Del. Ch. 2016), a stockholder sought to investigate the hiring of Yahoo’s chief operating officer, and in that connection sought e-mails from the company’s CEO. The court began its analysis by categorically rejecting the argument that e-mails are per se beyond section 220’s scope. Vice Chancellor Laster observed the evolution of corporate record-keeping and the modern reality that virtually all books and records are now kept electronically: “Limiting ‘books and records’ to physical documents ‘could cause Section 220 to become obsolete or ineffective.’” The court then relied upon Wal-Mart to reject the argument that the company’s search for documents would be limited to the company’s devices, as opposed to a custodian’s personal device, holding that “a corporate record retains its character regardless of the medium used to create it.” As for the test to determine whether e-mails must be produced, the court limited itself to a single consideration: “As with other categories of documents subject to production under Section 220, what matters is whether the record is essential and sufficient to satisfy the stockholder’s proper purpose, not its source.”

A few years later in Schnatter v. Papa John’s International, Inc., 2019 WL 194634 (Del. Ch. 2019), Chancellor Bouchard addressed the test suggested in Chammas as to whether e-mails (or any documents) are deemed books and records of the company—i.e., whether they are “those that affect the corporation’s rights, duties, and obligations . . . .” The defendant in Papa John’s resisted production of e-mails between directors discussing former director Schnatter, citing Chammas and claiming that “Schnatter is just curious about what his fellow fiduciaries were saying about him.” The court rejected the argument because the scope of documents ordered to be produced would be limited to those related to the plaintiff’s proper purpose, thus satisfying the standard. Commenting further, Chancellor Bouchard then effectively agreed with Vice Chancellor Laster’s reasoning for producing e-mails as articulated in Yahoo, albeit qualified by consideration of the additional costs inherent in producing electronic communications:

A further word is in order regarding emails and text messages from personal accounts and devices. The reality of today’s world is that people communicate in many more ways than ever before, aided by technological advances that are convenient and efficient to use. Although some methods of communication (e.g., text messages) present greater challenges for collection and review than others, and thus may impose more expense on the company to produce, the utility of Section 220 as a means of investigating mismanagement would be undermined if the court categorically were to rule out the need to produce communications in these formats.

Citing then-Chancellor Strine’s decision in Wal-mart, the court held that “if the custodians identified here . . . used personal accounts and devices to communicate about changing the Company’s relationship with Schnatter, they should expect to provide that information to the Company.” Expressly disclaiming the promulgation of any bright-line rule, Chancellor Bouchard grounded the analysis in “balanc[ing] the need for the information sought against the burdens of production and the availability of the information from other sources, as the statute contemplates.”

If there were any question about whether e-mails are properly within the scope of section 220 demands, the Delaware Supreme Court resolved it in KT4 Partners LLC v. Palantir Technologies Inc., 203 A.2d 738 (Del. 2018). In Palantir, after a potential sale of the company fell through because Palantir allegedly thwarted the deal and KT$ sought information pursuant to its far-reaching rights under an “Investors Rights Agreement,” Palantir allegedly amended the agreement to curtail KT4’s rights. KT4 made a demand to inspect Palantir’s books and records under section 220 of the DGCL for the purpose of investigating “fraud, mismanagement, abuse and breach of fiduciary duty.” Palantir rejected the demand, and KT4 commenced a section 220 action in the Delaware Court of Chancery. Following trial, Vice Chancellor Slights held that KT4 had shown a proper purpose of investigating potential wrongdoing in multiple areas, including Palantir’s amendment of the Investors’ Rights Agreement in ways that “eviscerated” KT4’s contractual information rights after KT4 sought to exercise those rights. The court specifically held that KT4 was entitled to “all books and records relating to” the amendments to the Investors’ Rights Agreement. After the parties were unable to agree on whether the books and records to be produced were to include e-mails, the court issued a final order that excluded e-mails from the documents that Palantir would be required to produce. The court reasoned in part that e-mails were not essential to fulfill KT4’s stated investigative purpose, based on the (mistaken) understanding that Palantir possessed and would produce formal board-level documents relating to the amendments of the Investors’ Rights Agreement, rendering a further production of e-mail unnecessary for KT4’s purpose. 

KT4 appealed the Court of Chancery’s ruling. Importantly, on appeal, Palantir conceded that other than the amendments to the Investors’ Rights Agreement themselves, responsive nonemail documents did not exist, and that e-mails related to the amendments did exist. The Delaware Supreme Court held that the e-mails plaintiff sought were necessary and essential to investigating the alleged wrongdoing because the defendant admitted other, more traditional forms of books and records did not exist. Insofar as being required to produce e-mails was concerned, the Supreme Court viewed Palantir’s obligation as a self-inflicted wound. As the Supreme Court made clear, “if a company observes traditional formalities, such as documenting its actions through board minutes, resolutions and official letters, it will likely be able to satisfy a Section 220 petitioner’s needs solely by producing those books and records.” The court conversely cautioned that “if a respondent in a § 220 action conducts formal corporate business without documenting its actions in minutes and board resolutions or other formal means, but maintains its records of the key communications only in emails, the respondent has no one to blame but itself for making the production of those emails necessary.” 

* * *

The foregoing cases illustrate several principles inherent in any analysis of whether electronic communications will be ordered produced in section 220 litigation. First, electronic communications are deemed corporate records that may be ordered in section 220 proceedings, but only to the extent that they are “necessary and essential” to the plaintiff’s investigation. Second, whether or not the electronic communications reside on the corporation’s servers or personal devices, if they are necessary and essential to the plaintiff’s investigation, they may subject to an order compelling production. Third, although e-mails may be ordered to be produced in section 220 litigation, the cost and burden of such a production will weigh considerably in the court’s final determination. And finally, Palantir serves as an admonition to corporate boards and their counsel to be mindful to observe corporate formalities and appropriately document board meetings and actions through minutes, resolutions, and other official materials, and avoid conducting “formal corporate business . . . through informal electronic communications.” Absent proper recordkeeping and formal documentation of the board’s decisions, there is risk that a corporate respondent in a section 220 action may be ordered to produce e-mails as “necessary and essential” to satisfying a stockholder’s books and records demand.


Mr. Blanchard is a partner at Morgan, Lewis & Bockius LLP. He represents clients in all facets of shareholder litigation, class actions, securities enforcement matters, investigations, and business disputes. The views expressed by the author are his alone and are not the views of Morgan Lewis or the firms’ clients. This article is for information purposes only and does not constitute legal advice.

AI Product Liability Issues and Associated Risk Management

The following is excerpted from Chapter 16 of Law of Artificial Intelligence and Smart Machines: Understanding A.I. and the Legal Impact.


Robots, and autonomous vehicles (AVs) in particular, act in the physical world.  Accidents involving these systems are inevitable.  Some of these accidents will cause catastrophic injury for those involved in the accident.  Even worse, if a defect or cyber attack could compromise every instance of a particular robot or an entire network, fleet, or industry, the defect or attack could cause widespread simultaneous accidents throughout the country or even the world.  Imagine, for instance, a future in which regional transportation centers in metropolitan centers control the dispatch and navigation of AVs in the region.  Imagine further that a sudden defect causes all the AVs under control of the system to crash all at once in a major metropolitan area like New York.  The impact of such an event in terms of harm, property damage, injury, and deaths could easily exceed an event like the attacks on September 11, 2001.

In 2012, I had the opportunity to speak at the Driverless Car Summit presented by the Association of Unmanned Vehicle Systems International.  The conference organizers polled the audience which, although admittedly unscientific, did provide a data point about industry views on product liability.  One polling question asked attendees to identify the chief obstacle to the deployment of AVs, and the top answer was “legal issues.”  The proceedings of the conference identified this issue as well.[1]  Although the poll did not break down the issues among compliance and liability, I suspect that liability is the larger perceived issue.  Indeed, some people have identified product liability suits are an existential threat to autonomous driving.[2]

In the worst-case scenario for the industry, manufacturers could face numerous suits that force some of them to exit the robotics market and cause others to decide not to enter the market in the first place.  They could perceive that the sales are not worth the risk.  Such an outcome could be tragic if it results in manufacturers not bringing otherwise life-saving and socially beneficial robots to the market.  Manufacturers, however, can implement practices to minimize the likelihood, frequency, and magnitude of accidents, and thereby control the risk of liability.  By implementing these practices, manufacturers can maintain the profitability they would need to offer robots in the market.

Managing the Risk of Robot Product Liability

Given the large human and financial consequences of defective products, manufacturers seek to manage the risk of product liability litigation and costly recalls.  What can a robot, AV, or AI system manufacturer do to reduce the likelihood of company-ending product liability litigation?  Most importantly, if manufacturers can proactively prevent defects and resulting accidents from occurring in the first place, they can prevent the need to defend product liability claims.  Planning for improved safety can enable manufacturers to make safer products that are less likely to cause accidents and trigger product suits.

Of course, accidents may occur anyway and with any widely-deployed robot, AV, or AI system, a manufacturer can foresee that accidents are inevitable.  Nonetheless, a proactive approach to risk management would permit a manufacturer to put itself in the best position possible to prevail in product liability cases based on the inevitable accidents.  A proactive approach to design safety means that the manufacturer takes the steps today to implement a commitment to safety, which will minimize its risk from future suits.  History shows that juror anger fuels outsize verdicts.  If a proactive manufacturer takes the concrete and effective steps to implement a commitment to safety, it will be able to tell a future jury why its products were safe and how it truly cared about safety.  Such actions will place the manufacturer in the best possible light when, despite all these safety measures, an accident does occur.

Making the commitment to safety upfront is crucial.  As one commentator stated, “The most effective way for [counsel for] a corporate defendant to reduce anger toward his or her client is to show all the ways that the client went beyond what was required by the law
or industry practice.”[3]  Going beyond minimum standards is important because, first, juries may look at minimum standards skeptically, thinking that the industry set the bar too low.  Moreover, juries expect that manufacturers know more about their product than any ordinary “reasonable person,” which is the standard for judging a defendant in a negligence action.  Juries expect more from manufacturers.  “A successful defense can also be supported by walking jurors through the relevant manufacturing or decision-making process, showing all of the testing, checking, and follow-up actions that were included.  Jurors who have no familiarity with complex business processes are often impressed with all of the thought that went into the process and all of the precautions that were taken.”[4]  The most important thing to a jury is that the manufacturer tried hard to do the right thing.[5]  Accordingly, a manufacturer that goes above and beyond minimum industry standards is in the best position to minimize the likelihood of juror anger and minimize possible product liability risk.

Any proactive approach to product safety should begin with a thorough risk analysis.  A risk analysis would look at the types of problems that could arise with a product, how likely these problems could occur, and the likely frequency and impact of these problems.  After completing this analysis, a manufacturer can analyze its robot or AI product design in light of the risks.  It can change design and engineering practices to address potential issues and prioritize risk mitigation measures based on what it sees as the most significant risks.  In implementing this risk management process, a manufacturer may obtain guidance from a number of standards relevant to robots and AI systems.  In the field of AVs, examples include:

  • ISO 31000 “Risk management – Guidelines” (regarding the risk management process).
  • Software development guidelines from the Motor Industry Software Reliability Association.
  • IEC 61508 Functional safety of electrical/electronic/programmable electronic safety-related systems (safety standard for electronic systems and software).
  • ISO 26262 family of “Functional Safety” standards implementing IEC 61508 for the functional safety of electronic systems and software for autos.

Adherence to international standards may not insulate a manufacturer from liability, whether in front of a jury or as a matter of law.  Nonetheless, following international standards increases the credibility of a manufacturer’s risk management program.  Also, following standards helps a manufacturer create a framework of controls for its risk management process.  Such a framework would make implementation and assessment easier.  Therefore, organizing a risk management program based on the methods specified in international standards provides an important basis for defending later product liability litigation.

In addition to adhering to international standards, insurance will play an important role in managing robot and AI product liability risk.  Insurance functions to shift product liability risk to insurance carriers.  In exchange for paying a premium, a manufacturer’s insurance carriers will defend and indemnify manufacturers for losses and pay for settlements or judgments to resolve third party claims.  The insurance industry is in the early stages of understanding robot and AI risk and creating coverage that effectively manages risk.[6]  As businesses and consumers deploy robots and AI systems more broadly, insurers will create insurance programs for third party accident and liability risks.  Some of those risks may include privacy and security breaches.  One barrier to effective insurance programs is the lack of loss experience data to assist in the underwriting process.  To start writing policies for given robots or AI systems, however, insurance carriers are likely to look at analogous conventional products.[7]  In the short run, manufacturers may need to tailor-make insurance coverage with bespoke policies that fit their risk profiles.  Over time, carriers will enter the market and create standard policies, reducing premium costs over the longer run.

Beyond the most immediate internal safe design steps and insurance programs, manufacturers of a given type of robot or AI system may be able to act jointly to mitigate risk to the entire industry sector (subject to possible antitrust issues involving joint action).  For instance, they may work on safety and information security standards to promote safe practices within the industry sector.  Trade groups and purchasing consortia can help manufacturers promote the safety among component manufacturers.  Finally, an industry sector may want to create and maintain information sharing groups to develop and promote safety practices among industry participants.

During the design process, effective records and information management (RIM) will help a manufacturer document and evidence its commitment to safety.  Documents generated contemporaneously with the design process can memorialize a manufacturer’s safety program and the steps it takes to fulfill its commitment to safety.  In any product liability suit, a witness could certainly testify about the manufacturer’s safety program.  Nonetheless, without corroborating contemporaneously recorded documentation, there is a risk that the jury would find any such testimony to be self-serving and thus disbelieve it.  In this vein, wholesale destruction of all design documents of a certain age may be as bad as retaining too many documents.  Archiving the right documents in preparation of future litigation will help the business defend itself in the future.  Effective RIM may win cases, while poor RIM may lose cases.

Finally, some pre-litigation strategies may further reduce product liability risks.  For example, manufacturers can work with jury consultants to advise the manufacturer in the defense of a product liability case.  They can focus on ways the manufacturer can place its safety program in the best light to avoid impressions that would anger a jury.  Moreover, a manufacturer may want to create a network of defense experts familiar with their robotics or AI technologies.  These experts can help educate jurors about various engineering, information technology, and safety considerations.  Further, attorneys representing AI and robotics manufacturers may work within existing bar groups or form new ones to share specialized knowledge, sample briefs, case developments, and other information helpful to the defense of product liability cases.


[1] E.g., Autonomous Solutions Inc., 5 Key Takeaways From AUVSI’s Driverless Car Summit 2012 (Jul. 12, 2012) (“Some of the largest obstacles to autonomous consumer vehicles are the legalities.”).  Reports from Lloyd’s of London and the University of Texas listed product liability as among the top obstacles for AVs.  Lloyd’s, Autonomous Vehicles Handing Over Control:  Opportunities and Risks for Insurance 8 (2014) [hereinafter, “Lloyd’s Paper”]; University of Texas, Autonomous Vehicles in Texas 5 (2014).

[2] See, e.g., Tim Worstall, When Should Your Driverless Car From Google Be Allowed To Kill You?, Forbes, Jun. 18, 2014 (“the worst outcome would be that said liability isn’t sorted out so that we never do get the mass manufacturing and adoption of driverless cars”), http://www.forbes.com/sites/timworstall/2014/06/18/when-should-your-driverless-car-from-google-be-allowed-to-kill-you/.

[3] Robert D. Minick & Dorothy K. Kagehiro, Understanding Juror Emotions:  Anger Management in the Courtroom, For the Defense, July 2004, at 2 (emphasis added), http://www.krollontrack.com/publications/tg_forthedefense_robertminick-dorothyhagehiro070104.pdf.

[4] Id.

[5] See id.

[6] See generally Lloyd’s Paper, supra note 1.

[7] Cf. David Beyer et al., Risk Product Liability Trends, Triggers, and Insurance in Commercial Aerial Robots 20 (Apr. 5, 2014) (describing the development of insurance coverage for drones), available at http://robots.law.miami.edu/2014/wp-content/uploads/2013/06/Beyer-Dulo-Townsley-and-Wu_Unmanned-Systems-Liability-and-Insurance-Trends_WE-ROBOT-2014-Conference.pdf.

Six Steps to Take Back Control of Your Information Landscape

Introduction

A plaintiff is seeking class-action status in his lawsuit against Square, the electronics payments company. The facts as alleged are that the plaintiff received treatment from a medical provider who used Square to execute a credit-card payment for the medical service. Inexplicably thereafter, “Square allegedly sent a text message linking to a digital invoice with information about the treatment he received to a friend (of the patient allegedly without authorization).”

I know nothing about what happened with the Square technology, what information to which Square had access from the patient’s credit card, how Square uses the information it garners, or whether Square has access to user’s personal contacts, including their phone numbers. What I do know is that Square most assuredly did not want the alleged event to form the basis of a lawsuit and did not want negative coverage from the news outlets. Worse, as reported in the Wall Street Journal on July 2, 2019, “misfired receipts issued by Square have ruined surprise gifts, spilled secrets, informed spouses of the spending habits of their significant other and unnerved consumers who wonder how stores got their contact information when they don’t remember providing it . . . .”

Self-preservation and stock valuations would seem to dictate that these news reports and lawsuits are not good for business. I believe Square is a good corporate citizen. I also believe Square, like so many other businesses, do not actually know how they handle all of the information to which they have access in every given situation. It is easy to be critical of Square’s alleged failure but much more difficult to be perfect when managing information today because there is so much of it, and it is moving at the speed of light through networks the company does not necessarily own or control.

Most companies are at a tipping point as they collect, grab, mismanage, misdirect, expose, lose, and improperly share electronic information day in and day out with greater downside, and they are not fixing the problem because most businesses do not have a good sense of the electronic information assets in their “care, custody or control.” However, there are constructive measures that businesses can take that won’t break the bank, can add value, and can even be accretive to the bottom line.

This article is meant for every business because every business has information, and every business could be doing a better job at wrangling it.

Why Every Company Should Know More About Its Information

Like any company asset, the company and its executives are remiss if they mismanage any company information asset. That is why every container moving through the global shipping network is tagged, monitored, and essentially babysat so that the owner of the container or its contents—or the truck, train, or ship on which the container sits—know its whereabouts at all times. Similarly, produce growers who sell their products through a major retailer, for example, are using blockchain technology to create an immutable record that travels with the plant from sprout to plate to document provenance and safety. Such technology would allow immediate recall if claims of product adulteration are alleged. Payments to vendors above a certain amount require the approval of higher-level executives who are specifically tasked with managing company assets. Company inventories are generally tightly controlled with sophisticated barcoding and GPS because loss or pilferage impacts the bottom line.

When it comes to managing information assets, however, most companies are not managing information like other company assets, and that must change. After all, information allows the company to better respond to customer needs, plan for the future, and generally advance business while protecting legal interests. That is just the beginning: information is increasingly a commodity that is sold, traded, and transformative for a business. That is certainly worth protecting, but information is still the often-discussed valuable “step-child” to whom companies do not show nearly enough real love.

What Is “Care, Custody, and Control” in 2020?

In the old days before the widespread use of computers, having control over company information was not really an issue. Information existed in paper form at employees’ desks or in banker’s boxes at a storage facility. The proliferation of information was limited to the copy machine, and companies did not really have to worry much about having their information exposed or stolen in wholesale form.

Then came the roaring 1990s with the growth of the internet, e-mail, and networked systems that changed the calculus completely. Information became transportable and easily misdirected or misappropriated. Controlling information was a completely new paradigm. Further confounding matters was that more business processes were outsourced, which meant that third parties working on behalf of companies arguably now had “care, custody, and control” over company information and may have believed that the information was theirs. The move to the Cloud complicated things still further as more and more company information was stored in another company’s servers, and doing business in social media environments meant that evidence of those transactions was “trapped” in someone else’s software and/or hardware. In other words, in this brave new information world, knowing what information is yours, where it is, who else has access to it, and what contracts give others rights to use it has created a completely new challenge.

Six Steps to Take Stock

Not surprisingly, getting a handle on your information assets to take back control is essential, but is not so simple. Businesses should take the following six steps to better control their electronic information.

1. Take an Inventory

The only way to know what information resources a company possesses is by looking. That doesn’t mean that the company can inventory each and every file, but rather use tools (some of which the company likely already owns) to understand what information exists, the business units to which it relates, and the storage locations and servers on which it is parked, etc. What is in the structured databases, and what information resides in unstructured share drive environments? What is the aging and continued use of the data? Do records retention rules allow the information to be disposed? This can do several valuable things. Knowing where your information lives will promote a methodical and less burdensome litigation response and discovery process. Assessing content using analytics tools can help unearth trade secrets and personally identifiable information (PII) that is stored in locations that pose a greater risk of exposure. Mostly, however, knowing what information assets the company possesses and where the information is promotes a better business in various ways.

2. Understand What Contracts Dictate

Every business unit likely has various business relationships with partners and third parties working on behalf of the company. Those relationships likely have been memorialized in contracts, which may delineate who owns the information, what rules apply to it, who can use it and how and with whom it can be shared, what happens when litigation arises, etc. The company should develop a process to understand what contracts exist that implicate company information. Thereafter, the company should develop standardized language for contracts that deal with all relevant information issues, such as access, ownership, responsibilities, and costs in responding to requests for information and so on. Building consistency in contracts through proactive, well-thought-out, boilerplate language will begin to build a better information ecosystem.

There is another contract activity that should be undertaken as well. Companies should know what “agreements” exist between the company and customers or potential customers. If a company tells employees information will not be shared, then the company must comply. Saying the company is complying and making sure everyone is actually complying is a different story. Conduct routine audits to ensure the company and all of its movable parts are following suit. One last thing is that contract language telling nonlawyers about what the company may do with information should be devoid of legalese and should be brain-dead simple. In this environment, saying the customer “waived” his or her right to object to the company selling information because the customer could have reviewed the linked legal language (which is multiple pages of lawyerly drivel) is not prudent.

3. Assess Third-Party Actions

Separate but related to step two is getting a handle on what is being done with your information. Beyond contract language, what third parties have access to or use of your company information? Once it is determined who, it’s important to understand what others are doing with that information. The Facebook/Cambridge Analytica fiasco is a good reminder of why it is important to understand not only what your employees are doing, but also what others may be doing as well.

Additionally, your company should understand what its own employees are doing with other companies’ or individuals’ information inside your company. If a business unit shares information from a partner it did not realize should not be shared, there could be substantial consequences. In other words, your company should be on top of where its information comes from and where it goes at a macro level to help promote less information chaos, mitigate liability, and better its business.

4. Assess What Employees Do in the Company’s Name in the Social World

If your company is like most today, multiple business units are doing real business in various social network or media environments. Maybe it is looking for new hires or marketing products and doing competitive analysis. That is great for business, but invariably the company is parking company information in an environment that is outside its control. The social environments are not inclined to accommodate your information needs and apply your information rules, even if you are paying for their service.

5. Understand Where Employees Park Company Information

With the proliferation of cloud computing and working from home came the reality that company information moves to myriad places without the company knowing. With data loss prevention (DLP) tools and similar monitoring applications, companies increasingly can watch and stop the movement of data leaving it, but the reality is that more and more information is parked outside a company computer by more and more employees for various reasons. Efforts should be undertaken to reign that in through policy and technology to monitor and audit the flow of information.

6. Understand Information Created by IoT Devices

Increasingly, noncomputing devices that assess, collect, or distribute information in many business processes (commonly referred to as IoT) are being added to companies usually without much thought about the information output created. Companies must assess each and every business process that is using an IoT device or appliance and determine what information is collected, by whom, where the information is stored, and who has access to and use of it.

Create an Information Asset Register

Whether it is inventorying databases, understanding what third-party applications are used to conduct business, or applying IoT devices likely transforming your business, keeping track of this organically growing and morphing ecosystem of information is increasingly complex and begs for management. One of the concrete steps companies can take to address the chaos is to centralize the process of sizing up all the information inputs and outflows in an Information Asset Register (IAR). This process will routinize the collection of information, and the IAR will provide a centralized view of all things information that can drive business efficiency and mitigate risk.

Avoiding Things That Explode

The information landscape of most companies looks like the data equivalent of a “yard sale”—stuff everywhere without rhyme or reason; chaos that does not reflect the true value of the objects. What we have learned from so many horror stories is that every company is on the brink of disaster if it does not get its informational act together. Put another way, mismanagement has no upside, loads of downside, and there are ample horror stories to prove it.

For example, Facebook regularly graces the front cover of many news outlets with yet another story of how it is “breaching the public trust” or exposing, selling, or otherwise misusing personal information. Because of prior issues, Facebook must now deal with a steady diet of U.S. and foreign regulators seeking to ensure it is following past agreements and not running afoul of the law anew.

Whether it is a litigation headache with a cloud provider who does not have the technical personnel available to accommodate helping with discovery requests on your tight timeframe, or the inability to find the final contract documenting in an important transaction, information mismanagement is bountiful, inconvenient, and expensive.

The Tale of Two Companies

A client recently realized that it had tens of thousands of information storage tapes on which it had never conducted discovery despite the fact that the company has hundreds of active lawsuits at any given time. That’s a company problem waiting to explode. As the head of an information governance consultancy, we have helped many companies clean up their information chaos, sometimes reactively and sometimes proactively. In the process, we have learned that being proactive is much less costly and painful.

Another client is migrating to Office 365 and rather than move outdated digital data detritus, we helped them clean out the crud. That’s a company taking stock now so that it doesn’t explode later. That same client just finished a project to crawl their share drive environments and e-mail to find and lock down all PII. Although this client used our help, great companies have great employees who can get a lot accomplished with thought, planning, and guidance from their lawyers. In other words, just because cleaning up the past is tough doesn’t mean you can’t or shouldn’t do it.

Conclusion—The Gift That Keeps Giving

If you have had any bad information event, what you quickly realize is that problems tend to be more painful than originally expected. For example, a west coast gas and electric company penalized by the state for failing to properly manage records now has a regulator routinely in the company’s “shorts,” ensuring it takes the necessary corrective action for years to come. Additionally, an attack on the way your company managed information on one occasion can be extrapolated to all situations if the same process and technology is always used. Finally, Facebook is a reminder that breaching the trust of users or customers comes with a heavy price. The court of public opinion is difficult to change, and the last thing your company wants to lose is its customers. Information flows and customers vote with their feet. Take stock now.


Randolph Kahn’s forthcoming book The Executive’s Guide to Navigating the Information Universe will help companies understand the opportunities and risks presented by harnessing and harvesting information.

The Biggest Data: Advising Clients about Alternative Lending Models and the Regulatory Scrutiny They Generate

Introduction

The Equal Credit Opportunity Act (ECOA) was one[1] of the seminal anti-discrimination standards set in the lending/credit industry. It set the standard for preventing discrimination in lending. When it was enacted, ECOA was meant to offer similarly qualified borrowers equity in lending transactions regardless of race, color, marital status, age, religion, sex, or national origin. Before ECOA, lenders, who held the reigns on financing, could easily turn away a black family or an unmarried woman simply because they wanted to.

Today, we might be surprised if a lender were openly violating ECOA. Or not.

Despite the longevity of the lending discrimination laws, traditional lenders have had trouble discerning when something is a reasonable and lawful lending criterion and when it is not. For example, a large national bank entered into a $5 million dollar settlement with a federal regulatory authority when it denied loans to pregnant women.[2] Another paid $54 million for charging black and Hispanic borrowers higher fees than similarly situated white borrowers.[3]

Some businesses have taken a different approach to lending. Instead of relying solely on traditional lending and risk characteristics, these lenders consider traditional lending criteria such as income and credit scores, nontraditional criteria like college attended, or some mixture of the two, using machine learning techniques to correlate these criteria with lending risk. The trend has caught on and more and more fintech lenders and fintech partnerships are entering the market each year.

And why not? If traditional lenders, with years of experience in underwriting and with rigorous compliance controls, sometimes fail at complying with fair lending standards, might there be another way? Perhaps.

One of the most discussed impacts of fintech has been on who is able to receive credit. Unburdened by the many risk requirements of traditional lenders, fintech companies and partnerships are able to extend credit to a wider variety of people, offering credit access to the underbanked[6] and creating opportunities for profit in markets that may not be accessible to other financial institutions.[7]

Although the possibilities for reaching a greater diversity of customers seems limitless, financial institutions and credit providers that use complementary data and artificial intelligence (AI) must consider state and federal consumer protection laws when they use novel technologies and criteria for lending.

AI and Lending

In particular, using alternative criteria and AI for credit decisions can violate fair lending laws, even when the criteria used in the credit decision is not based on a protected class, such as race, gender, religion, or marital status. Federal regulators have been honing in on instances of discriminatory lending based on alternative lending criteria and unconventional lending programs, exposing organizations to systemic operational changes and substantial regulatory costs.

There are ways to avoid regulatory risk and still reach underserved markets when using alternative lending models; however, it helps to understand how they work in order to craft salient, useful questions when working with a client’s computing and data professionals. Understanding machine bias and how AI can go wrong is the first step. Understanding what regulators are looking for when considering alternative data is the second. This information, taken together, will assist attorneys who advise lenders that are using expanded data and/or machine learning to make credit decisions.

What Is Bias, Anyway?

Data scientists use the term “bias” or “prediction bias” to refer to a program’s inability to accurately reflect the reality that it is supposed to measure.[8] When financial regulators refer to bias caused by AI systems, the term refers to results prejudiced against a protected group.[9] The concept of prediction bias, which refers to the way a program works, and of discriminatory bias are somewhat linked, and in many cases have similar causes, but prediction bias is morally neutral, whereas discriminatory bias is not. 

A machine learning model is the way certain computer programs seek to categorize and connect things. A model can be used to determine the risk of flooding in a Florida city or the likelihood that a borrower will pay back a loan. The things that models seek to categorize are called “examples,” and models categorize the differences between examples based on the relationships between known characteristics called “features” and unknown characteristics called “labels.”

For instance, if we want to build a machine learning model to help us decide whether to advance funds to a borrower based on the borrower’s income, address, and FICO score, the borrower is the “example”; the income, address, and FICO score are the “features”; and the likelihood that the borrower is an acceptable credit risk is the “label.” The model created will provide a representation of the relationships between the features and the labels based on the data it has, but that representation will not necessarily create accurate predictions when presented with new information.

A model can fail in one of two ways. A model with high “variance” is a model that captures the relationships in training data rather well, but fails to translate that knowledge to new information. A model with high “bias” is one that fails to do a good job of capturing the relationships at all. In general, a high bias model results from using the wrong programming technique for the specific task, but can also be caused by poor data selection. Poor data selection also leads to models with high variance.

It’s All about Data and Critical Thinking

When data scientists are talking about “data bias,” they are talking about errors in selecting data that lead to both high bias and high variance models. The data scientists are focused on selecting the appropriate data in order to obtain more accurate results from the models.

When regulators are discussing bias, they are concerned with preventing models from making decisions based on the protected characteristics of the people involved. From a fair lending perspective, a machine learning model that causes a bank to deny loans to more women than men would be improperly biased, whereas a model that denies loans equally to both groups, but does an equally poor job for both groups, is not.

When working with organizations that use data and AI in lending, it’s important to connect the dots that the data set might not. This is the time to use both common sense and critical thinking to consider what relationships might not be apparent to a model. This is especially important as data sets expand beyond the traditional income, debt-to-income ratio, and credit scoring systems on which many institutions have relied for years.

The FDIC recently commissioned a paper on the use of digital footprints in lending determinations, and the CFPB issued a set of “principles” meant to ensure that consumers remain protected as AI and the data it uses becomes more commonplace. Both of these publications show that regulators have a keen interest in continuing to ensure that lending remains fair without regard to the data used to make lending decisions. More aggressively, the state of New York has introduced a bill that specifically prohibits the use of certain types of data in lending models.[10]

As we have noted above, data bias and discriminatory bias are usually caused by poor data selection. As an advisor to organizations that use data, the best counsel that you can offer is to connect the relationships that your programming team may not be able to from the data alone. Below, we discuss steps for advising AI lenders how to overcome common data issues that can lead to fair lending problems.

Again, in most cases, discrimination in a model is caused by problems in data collection and “feature” selection (picking the types of information that will go into a model). In other words, avoiding discriminatory bias requires an understanding of the processes used to avoid data bias in building machine learning models.

The following four data collection problems can impact a lender’s model: use of a prohibited feature, use of correlated features, selection bias, and imbalanced data sets. To illustrate the manner in which these issues can arise, let us visit our fictional lending organization: XYZ Online Loans. XYZ wants to use information about potential borrowers to decide whether to extend credit.

Data Problem 1: The Use of Prohibited Features. A bank is prohibited from making a decision about whether to extend credit based on the borrower’s sex, so the borrower’s sex is a prohibited feature.

Lawyer Answer: Sex is obviously only one protected characteristic under U.S. fair lending laws. Ensure that those programming or writing machine learning models understand that features that implicate sex or any other protected characteristic should not be used in the model itself. It is not as simple as “sex” or “race.” Consider the Department of Housing and Urban Development’s (HUD) recent suit against Facebook, where organizations could market ads that avoided people with an interest in childcare. HUD charged that this was discrimination on the basis of familial status. In addition, consider a model that uses higher education as the basis for determining borrower risk and whether higher education may ultimately exclude borrowers unfairly based on age, race, or national origin.

Data Problem 2: Correlated Features. XYZ’s model has analyzed borrower loan histories and discovered that borrowers with long hair have a .1 percent default rate, whereas those with short hair have a .2 percent default rate. However, 70 percent of the borrowers with short hair are male. Hair length correlates with sex, the prohibited feature.

Lawyer Answer: Identifying the features that actually cause defaults and using those features to build models will generate better models. When a potentially usable feature correlates to sex, using that feature can improperly bias the model based on sex. Even though hair length might be a potential feature from a purely statistical point of view, sex remains a prohibited feature. Correlation, which occurs when one measure changes value in step with another measure, does not imply causation. Unless a causal connection between hair length and default rates can be established, the feature should not be used for analysis purposes. Even if some causal relationship exists, care should be taken to normalize the data to avoid indirectly making credit decisions based on sex.

Data Problem 3: Selection Bias. Selection bias occurs when insufficient attention has been paid to the sources of data. Selection bias is a term that encompasses a number of potential errors.

Assume, for example, that a lender is building a machine learning model based on historical information showing the results of prior lending decisions. The bank has two branches. One branch services a neighborhood where many of the residents are single. The second branch services a neighborhood where many of the residents are married, but the loan officers at that branch tended to reject most loan applications from married applicants. A machine learning model built on this data may, in considering borrower location, discriminate against married applicants because it will embed in its decision structure the prior biases of the loan officers. This is selection bias.

Similarly, consider a lender that builds a model based solely on data collected about users through the bank’s app. If members of a particular age group are more likely to bank in person at a branch, rather than use the app, the model will not reflect their behavior accurately and might discriminate against them. This is also selection bias.

Lawyer Answer: Consider the source! Selection bias is avoided primarily by spending additional time and effort reviewing the sources of data used to build the model, analyzing that data for inherent bias, and understanding the business processes used to create that data. Advising your client to include various business departments and a diverse selection of individuals when reviewing the data set will help identify potential issues. This is also an excellent time to review the testing, policies, and practices used in underwriting decisions to ensure that your client is not building on a shaky or discriminatory lending foundation.

Data Problem 4: Imbalanced Data Sets. Imbalanced data sets occur when machine learning models lack a complete data set. For a successful model, there must be a large amount of data. When a certain group is underrepresented in the sample, predictions relating to that group will be less accurate. If a model is built on a dataset that contains little information about people who are Asian American, the resulting model will do a poor job of decision making when a potential borrower is Asian American. A lender using a model built with insufficient information about Asian American borrowers will end up denying them loans when they would have received a loan had they belonged to another race.

Lawyer Answer: Dataset imbalance is addressed by identifying the important categories of data within the set and remedying the imbalance by collecting additional data so that all groups are well represented, or building out synthetic data to help the model generate better results. When advising your client, take the time to ensure that they are holistically considering the content of the data. If the data cannot be found with features that include all potential borrowers, it’s time to pause and consider why and what that might mean about the quality of the data.

Ultimately, the best way to advise your fintech and AI clients is to understand where the processes begin. They begin with data. A model is only as useful as its data. Whether you are serving the underbanked or trying to open up to borrowers working in a gig-economy, the quality of the data and an understanding of relationships will be key. Advising clients on relationships and counseling them toward more thorough and complete data sets is one of the best ways to counsel them for the future of fair lending.


[1] For a more in-depth discussion of other applicable fair lending laws, like the FCRA and the Civil Rights Act of 1964, read this FTC report.

[2] Wells Fargo settled with the Department of Housing and Urban Development for $5 million when it denied loans to women who were pregnant, had recently given birth, or who were otherwise on maternity leave.

[3] JP Morgan Chase settled with the DOJ for stipulated ECOA violations.

[4] A brief discussion of the ways that data is being used in lending. We are not discussing the types of data used here, however, we’re offering tips for advising organizations that DO use these types of data. https://www.npr.org/sections/alltechconsidered/2017/03/31/521946210/will-using-artificial-intelligence-to-make-loans-trade-one-kind-of-bias-for-anot

[5] Upstart, a fintech lender based in California, successfully received a “no-action letter” from the CFPB in exchange for providing the regulator with ongoing information about its AI/ML loans.

[6]The CFPB’s Office of Research conducted a study of how many Americans were underbanked and unbanked, calling such people “credit invisibles.” These demographics are often correlated to age and race, which is useful to remember when considering how to structure data sets for marketing to these communities.

[7] A discussion of the underbanked and underwriting in China and beyond can be found here.

[8] See Google Developers, Machine Learning Glossary; Brookings Institute, Algorithmic bias detection and mitigation: Best practices and policies to reduce consumer harms (May 22, 2019).

[9] 15 U.S.C. § 1691(a).

[10] N.Y. S.B. S2302 prohibits the use of social network information in lending decisions.

Canadian Senate Report Urges Action on Open Banking

In June 2019, Canada’s Standing Senate Committee on Banking, Trade and Commerce (the Committee) released its report on open banking, entitled “Open Banking: What it Means for You” (the Report). Open banking has gained popularity in several countries in recent years, including the United Kingdom and Australia, yet Canada has lagged behind.

The purpose of the Report was to analyze the benefits and issues surrounding open banking for Canada and how the Canadian federal government should regulate open banking. The Report calls for, among other things, swift action on the part of the Canadian federal government to advance a secure open banking framework.

What Is Open Banking?

Open banking is a framework that gives individuals control over, and access to, their financial data. The Report notes that in most countries, open banking consists of two elements: (1) financial data portability (the ability of consumers to direct that their personal financial information be shared with another organization); and (2) payments initiation (the enabling of payments directly from a bank account using a smartphone app as an alternative to credit- and debit-card payments).

Open banking allows individuals to securely and easily transfer and share data held by their financial institutions with third parties, such as other financial institutions and fintech companies. These third parties can then use this information in the provision of its services to that individual. This ability to easily transfer financial information among entities means that consumers can easily move from one financial institution to another. In addition to this, open banking removes some of the friction surrounding mortgage applications or loans, allowing an individual to instantaneously grant a lender temporary access to specific financial information about her or him that is relevant to the mortgage/loan application.

A formal review of open banking was announced by the Canadian federal government in the 2018 federal budget, and an advisory committee was established by the Minister of Finance in September 2018. A consultation paper was released in early 2019 based on some submissions to the advisory committee, and a more formal report is anticipated this year.

The Report and Recommendations

In the Report, the Senate found that individuals presently face significant difficulty in accessing and sharing their financial data and have little control over this data. The Report also found that the rapid adoption by Canadian consumers of new banking technologies (e.g., roboadvisors) has created an impetus for fintechs to be able to access consumer data “easily and seamlessly”.

The Report commented on current practices used by an individual to grant financial services providers access to his or her financial information and the associated privacy risks. One such practice for facilitating data sharing is “screen scraping.” This requires users to provide third-party financial service providers with login credentials for the user’s online banking platform. This allows these third-party service providers with access to extract user transactional and financial information. This approach is fraught with risks for the consumer, however, including the inability to limit further access to user’s financial information and identity fraud and cybersecurity risks. Open banking would be able to overcome this in that the individual can limit the amount and types of financial information to only what is needed to provide the relevant services.

To address the above concerns and to address the need for a strong open banking framework, the Committee makes ten recommendations. These recommendations include:

  1. Fund consumer research. The Committee recognized that although benefits to consumers were discussed, scant research on consumer attitudes toward open banking has been conducted. A key recommendation is to fund consumer advocacy groups for this purpose.
  2. Name an interim oversight body. The report recommends that the Financial Consumer Agency of Canada (FCAC) be named an interim oversight body to monitor screen scraping and open banking in Canada.
  3. Develop a framework for regulation. Led by industry and based on guiding principles, a framework to regulate open banking should be developed to govern the implementation of open banking.
  4. Develop an accreditation system. Provide registration for third-party providers and tools for innovation for those providers to develop technology.
  5. Reform privacy laws. The report recommends reforming the Personal Information Protection and Document Act to become more closely aligned with global standards of privacy.
  6. Payments modernization. As the open banking framework is developed, the government should work with industry experts in payment modernization.

Conclusion

The Report is a call for clear, decisive action toward open banking in Canada. Although some of the recommendations are long-term in nature, the need to protect people’s privacy is pressing, and the problem is clearly defined.

With the upcoming federal election in October 2019, open banking is unlikely to be implemented rapidly, but with attention on the issue from both Houses of Parliament, there is reason to be optimistic that change is around the corner.

Let’s Make a Deal: Four D&O Coverage Issues to Consider in M&A Transactions

Insurance coverage is an important, but sometimes overlooked, component of any M&A transaction. Many deal lawyers have a working knowledge of directors and officers insurance and how to protect businesses and decision makers in the event of a claim, but oftentimes insurance issues take a back seat to other aspects of transactions. As In re Glasshouse Technologies, Inc and other cases show, however, the devil is in the (insurance) details, and companies should not assume that the status quo will be preserved or that existing policies will offer adequate protection for current or future liabilities after closing. This article presents a brief overview of key insurance coverage issues to consider when structuring M&A deals to mitigate risk and maximize short- and long-term recoveries should a claim arise.

1. Change in Control

One of the first insurance questions to ask is whether the particular deal or financial restructuring triggers a “change in control” under the company’s current D&O policy, which typically includes an acquisition, merger, consolidation, or sale of more than 50 percent of assets. Whether this provision is triggered and, if so, when the change in control occurs matters because D&O policies will provide coverage only for wrongful acts that occur before the change in control occurs.

The change in control provision may also include conditions requiring that the company provide notice to the insurer within a certain amount of time to preserve coverage for the restructured entity. As with most insurance issues, the question of change in control is highly fact-specific and depends on the policy language and the details of the deal. For example, a series of sales to different entities may trigger a change in control if the buyers are acting in concert, even where no transaction involves more than 50 percent of the company’s assets. Parties also may assume that if the reorganization or asset sale takes place as part of bankruptcy proceedings (typically Chapter 11), then the change in control provision is automatically triggered. However, some policies turn on whether there is an appointment of a trustee, receiver, or similar entity, which does not always occur.

2. “Runoff” and “Tail” Coverage

Deals often involve runoff and tail coverage, which depend on the policy’s change in control provision and the effective date of the deal. If a change in control provision is triggered, it typically converts the existing D&O coverage to “runoff,” which means that claims based on conduct after the change in control are no longer covered and that claims based on pretransaction conduct are covered through the end of the policy period. “Tail” coverage extends coverage for claims based on pretransaction conduct, usually for several years, and is available through endorsement (either automatically or by request, typically subject to payment of an additional premium).

Runoff and tail coverage terms generally turn on whether the claims are based on conduct before or after the transaction’s effective date, but as the GlassHouse Technologies case shows, policyholders should not assume that the terms and conditions of those coverages will remain the same. The dispute in GlassHouse Technologies involved a broker’s alleged errors in procuring tail coverage in connection with sale of GlassHouse’s U.S. consulting business, which the broker viewed as potentially triggering the change in control provision in GlassHouse’s existing D&O policy. To avoid any gap in coverage for pretransaction conduct, GlassHouse purchased tail coverage by endorsing the policy, but as GlassHouse later learned, the tail coverage endorsement not only extended the reporting period for several years, it also reduced the limits for the remainder of the initial policy period from $15 to $5 million. As a result, when one of GlassHouse’s creditors asserted claims against the company’s directors and officers shortly after closing during the initial policy period, those claims were subject to substantially reduced limits. The parties became embroiled in litigation regarding the actions of the broker in modifying the existing limits as part of the tail coverage endorsement.

3. Preserve Existing Insurance Assets

A surviving entity might not assume all existing liabilities of the company it is acquiring. In structuring M&A deals, buyers and sellers alike should be aware of the potential adverse impact limited transfer of liability (or assets) may have on the surviving entity’s ability to access historic insurance assets or trigger coverage for legacy liabilities arising from pretransaction conduct. The right to claim coverage under legacy insurance policies may be extinguished if the liabilities of the policyholder were extinguished in a merger or acquisition.

The BCB Bancorp v. Progressive Casualty Insurance case illustrates this problem. In BCB, an insurance carrier withdrew its defense of a bank’s premerger shareholder class-action lawsuit on the grounds that the directors’ and officers’ rights under the policy terminated when the policyholder dissolved and was consolidated with the surviving entity via a statutory merger under New Jersey law. The court rejected the insurer’s argument based on the lack of an exclusion in the policy preventing transfer of rights to a surviving entity under the New Jersey merger statute. As the BCB case shows, the potential impact of M&A deals on D&O insurance depends not only on the policy language and terms and structure of the deal, but also on applicable state law. Another related issue is whether the insurance assets necessary to respond to a current or future claim were transferred in the deal.

4. Coverage for the Deal

Parties must assess a deal’s impact on existing and future insurance policies, but there also may be ways to mitigate risk by purchasing insurance coverage for the deal itself. The most common example of this is representation and warranty (R&W) insurance, which protects a buyer or seller from losses arising from inaccurate representations or warranties made by the seller or target companies during the merger, acquisition, asset sale, or other transaction. A buyer-side R&W insurance policy, for example, protects the purchaser by paying losses if the target company presents inaccurate information, such as by misrepresenting or failing to adequately disclose a particular liability. These protections can often fill in the gaps if a seller offers little or no seller indemnity in the deal and provide a useful alternative to the traditional indemnity protections. Other types of deal-specific insurance (such as an environmental policy for a particular liability) may be available to mitigate risk.

Takeaways

With all of these issues, the particular risks and potential protections afforded by D&O and other insurance policies are dependent on the terms of the deal, the existing or contemplated policy language, the type of claims giving rise to coverage, and numerous other individualized issues (e.g., financial resources, risk appetite, business needs, applicable state law, etc.). As the GlassHouse and BCB cases show, there is no one-size-fits-all approach or foolproof checklist when it comes to M&A deals and insurance. Involving experienced coverage counsel, however, can help address important insurance issues, mitigate risk, and maximize potential recoveries. The time to do that is early in the deal process before due diligence concludes, the parties become entrenched, and the pressure to close increases.

Circuit Split Deepens: Bankruptcy Court’s Jurisdiction over Social Security and Medicare Claims

Under 42 U.S.C. § 405(h), no plaintiff may bring a claim arising under the Social Security Act under 28 U.S.C. §§ 1331 and 1346 until they have exhausted administrative appeal remedies (the Exhaustion Requirement). The latter provisions provide federal jurisdiction for district courts related to federal questions and contract claims against the United States, respectively. But bankruptcy courts exercise federal jurisdiction under 28 U.S.C. § 1334. Thus, relying on the plain text of section 405(h) in a bankruptcy adversary proceeding, the Fifth Circuit held that bankruptcy courts are not barred from exercising their jurisdiction under section 1334 to hear Social Security claims. Benjamin v. United States (In re Benjamin), No. 18-20185, 2019 WL 3334653 (5th Cir. July 25, 2019). Given that this bar applies to healthcare companies operating in the Medicare Program pursuant to 42 U.S.C. § 1395ii, the In re Benjamin decision is important for healthcare entities filing for bankruptcy protection.

Benjamin’s Adversary Proceeding Against the Social Security Administration in Bankruptcy Court

The SSA determined that it had overpaid Benjamin by nearly $20,000 and was withholding $536 per month from Benjamin’s Social Security check. Benjamin filed for chapter 7 bankruptcy. To demand the return of money that the SSA collected from him, Benjamin initiated an adversary proceeding against the SSA. The bankruptcy court granted the SSA’s motion to dismiss, however, and the district court affirmed. On appeal to the Fifth Circuit, the sole issue was whether the bankruptcy court had jurisdiction to hear Benjamin’s claims.

Circuit Split: 3d/5th/9th Versus 11th

Courts of appeals are split on whether section 405(h) bars bankruptcy jurisdiction under section 1334. When enacted in 1939, section 405(h) referred to 28 U.S.C. § 41, which contained virtually all jurisdiction for federal courts, but Congress later adopted revised language that refers to only two kinds of jurisdiction for federal courts. In a neighboring section to the revised section 405(h), Congress characterized the changes as “technical.”

In addressing bankruptcy jurisdiction in this context, the Eleventh Circuit followed the reasoning of the courts of appeals that have held that the Exhaustion Requirement applies in diversity jurisdiction cases (which arise under 28 U.S.C. § 1332), which is also not expressly mentioned in section 405(h). Fla. Agency for Health Care Admin. v. Bayou Shores SNF, LLC (In re Bayou Shores SNF, LLC), 828 F.3d 1297 (11th Cir. 2016) (citing Midland Psychiatric Assocs. v. United States, 145 F.3d 1000 (8th Cir. 1998); Bodimetric Health Servs., Inc. v. Aetna Life & Casualty, 903 F.2d 480 (7th Cir. 1990)). In Bayou Shores, the Eleventh Circuit explained that it relied on the recodification canon to hold that the Exhaustion Requirement also applies to bankruptcy jurisdiction. Courts will not presume, under this canon, that Congress intended a substantive change without a clear indication otherwise. To that end, the Eleventh Circuit found that Congress did not intend to alter the substantive scope of section 405(h).

Two circuits have more complicated precedent related to the Exhaustion Requirement. The Third Circuit has held that the Exhaustion Requirement applies to diversity jurisdiction, see Nichole Med. Equip. & Supply, Inc. v. TriCenturion, Inc., 694 F.3d 340 (3d Cir. 2012), but does not apply to bankruptcy jurisdiction, see Univ. Med. Ctr. v. Sullivan (In re Univ. Med. Ctr.), 973 F.2d 1065 (3d Cir. 1992) (“Thus we agree with the Ninth Circuit that ‘where there is an independent basis for bankruptcy court jurisdiction, exhaustion of administrative remedies pursuant to other jurisdictional statutes is not required.’”).

The Ninth Circuit has also held that the Exhaustion Requirement applies to diversity jurisdiction, see Kaiser v. Blue Cross of Cal., 347 F.3d 1107 (9th Cir. 2003), but does not apply to bankruptcy jurisdiction, see Sullivan v. Town & Country Home Nursing Servs., Inc. (In re Town & Country Home Nursing Servs., Inc.), 963 F.2d 1146 (9th Cir. 1991). Unlike the Third Circuit, the Ninth Circuit has recognized this inconsistency and explained that it is because bankruptcy jurisdiction is unique. See Do Sung Uhm v. Humana, Inc., 620 F.3d 1134 (9th Cir. 2010) (“But upon closer reading, Kaiser and In re Town & Country can be reconciled. In re Town & Country’s reasoning relies almost exclusively on the special status of § 1334’s “broad jurisdictional grant over all matters conceivably having an effect on the bankruptcy estate. . . .” Thus, its reading of 42 U.S.C. § 405(h) can reasonably be understood to apply only to actions brought under § 1334, while not bearing on the relationship between § 405(h) and other jurisdictional provisions such as § 1332.” (citations omitted)).

The Fifth Circuit relied on the plain reading of section 405(h) to reach the conclusion that the Exhaustion Requirement does not apply in bankruptcy courts. The Fifth Circuit concluded that the intent of Congress may be found in places other than a neighboring section in the Statutes at Large. Indeed, the Fifth Circuit contended that the actual words of the new provision are the most obvious source of congressional intent. And given that the statutory text failed to mention a bar against bankruptcy courts from exercising jurisdiction to hear Social Security claims, the Fifth Circuit refused to find that such a bar existed.

Conclusion

The Fifth Circuit joins the Third and Ninth Circuit to deepen the circuit split over whether bankruptcy courts have jurisdiction over Social Security and Medicare claims. For a more in-depth discussion, see Samuel R. Maizel & Michael B. Potere, Killing the Patient to Cure the Disease: Medicare’s Jurisdictional Bar Does Not Apply to Bankruptcy Courts, 32 Emory Bankr. Dev. J. 19 (2015).

Wildfires, Renewable Resources, and Chapter 11: The Latest in the PG&E Story

After months of speculation, California’s largest utility, Pacific Gas and Electricity Corporation (PG&E), filed for protection under chapter 11 of the U.S. Bankruptcy Code on January 29, 2019. In the papers filed by the debtors, the affidavit in support of the filing, sworn out by Chief Financial Officer Jason P. Wells, aptly captured the reasons the company had given for the exigent filing: “[t]he chapter 11 filings were necessitated by a confluence of factors resulting from the catastrophic and tragic wildfires that occurred in Northern California in 2017 and 2018, and PG&E’s potential liability . . . made it abundantly clear that PG&E could not continue to address . . . claims and potential liabilities in the California state court system, continue to deliver safe and reliable service to its 16 million customers, and remain economically viable.”[1] The estimates for PG&E liability due to the wildfires, as reported by the company to the Securities and Exchange Commission through its January 14, 2019 Form 8-K, could exceed $39 billion.[2] California state fire investigators reported on January 20, 2019, that the devastating Sonoma county 2017 wildfire, known as the Tubbs fire, originated from a private electrical system and not by PG&E.[3] That brief respite was not enough to turn the tide, as a combination of heavy criticism from the public, regulators, the state’s newly sworn in governor, and the specter of liability from the other wildfires that had plagued the utility, buoyed the decision of PG&E to seek bankruptcy protection.

Since the filing, the utility has been connected with devastating fires in Northern California in 2015, 2016, 2017, and 2018, and the 2016 Ghost Ship Fire in Oakland.[4] Federal District Court Judge William Alsup has authority over PG&E, resulting from a 2016 felony jury conviction of the company that arose out of the San Bruno explosion of a PG&E gas pipeline, which killed eight people and destroyed 38 homes.[5] Judge Alsup recently ruled that the utility follow new safety standards in the wildfire mitigation plan submitted by PG&E to state regulators.[6] He had issued an earlier order to show cause requesting that the utility demonstrate why its conditions of probation should not be modified and much stricter standards imposed.[7] Several official committees authorized by 11 U.S.C. § 1102(a) have been appointed in the bankruptcy case,[8] including an official committee of unsecured creditors[9] and an official committee of tort claimants,[10] the latter to protect the rights of the victims of the wildfires.

Equity Holders Unconvinced

Not everyone was enthusiastic about the filing. Hedge fund BlueMountain Capital Management LLC, which holds a significant position in the utility, challenged the company’s decision to file for chapter 11 protection in two very public letters primarily on the grounds that the company was solvent. In the second letter, the hedge fund, which holds up to 11 million shares of the total 528 million PG&E shares, noted that “[y]ou have publicly stated that bankruptcy is in the best interests of all stakeholders. But you have failed to articulate a single cogent reason for why it is beneficial to any stakeholder.”[11] BlueMountain, undeterred by the pending chapter 11 filing, sent a letter to shareholders on January 24, 2019, announcing that it would be putting forth a completely new slate of directors to oust the current board.[12] The fund punctuated its sentiment toward the current PG&E leadership in the letter, stating, “[t]he Current Board has not only failed the Company and its shareholders; it has failed its customers; it has failed its employees; and, it has failed the people of California.” BlueMountain followed up with a March 1, 2019 statement that it selected 13 new board candidates from which it would ask other shareholders to elect as the new PG&E board at the company’s May 21 annual meeting.[14] PG&E has responded by announcing it will put forward five new board members and that the majority of its board would be independent directors by the date of the annual meeting.[15]

California State Government Response

California Governor Gavin Newsom was sworn in to office on January 7, 2019, and was immediately thrown into the PG&E crisis.[16] On February 12, 2019, Governor Newsom created a “strike team” of advisors, including bankruptcy lawyers and financial advisors.[17] The governor has given the strike team 60 days to provide a strategic plan to ensure continued and interrupted service, provide for the victims of the wildfires, protect workers, and protect consumers.[18] In late August 2018, the California legislature passed Senate Bill 901 (SB 901), and Governor Brown signed the bill into law on September 21, 2018.[19] SB 901 was part of a broader proposal that was intended to prevent PG&E’s bankruptcy filing. Although the legislation allowed for several reforms that were designed to alleviate some of the pressure on investor-owned utilities, the biggest and most controversial measure was to eliminate strict liability for utilities for fires caused by the equipment of investor-owned utilities. The elimination of strict liability, known as reverse condemnation, was dropped from the bill. SB 901 was signed with provisions allowing investor-owned utilities like PG&E to file with the California Public Utilities Commission to recover costs retroactively from the 2017 wildfires; establishing a new standard for determining costs that investor-owned utilities can recover beginning in 2019 for wildfire liabilities; and expanding requirements for wildfire mitigation plans. However, these measures were not enough to deter the PG&E decision to file chapter 11. On January 22, 2019, PG&E announced it had secured $5.5 billion in debtor-in-possession financing consisting of a $3.5 billion revolving credit facility, a $1.5 billion term loan, and a $500 million delayed draw term loan facility.[20]

The Star Crossed Universes of Bankruptcy Law and Energy Regulation

In the midst of this crisis, there is a complex intersection of the objectives of the reorganization of the utility and a web of regulators with different, and potentially contravening, policy objectives. PG&E is regulated by both the California Public Utility Commission (CPUC) and the Federal Energy Regulatory Commission (FERC). Many of the state issues revolve around the passing on of the utility’s liability to consumers, as well as particular renewable policy objectives of the State of California. The fight in the bankruptcy court to relieve the debtor of some of its regulatory burden also pits the less stringent standard of the debtors’ business judgment against the standard used by FERC regulators, which determines whether the requested regulatory action is in the public good.

As noted above, one of the biggest state regulatory issues is inverse condemnation. Inverse condemnation is the application of strict liability, imposition of liability for damages, whether the company acted negligently or not, if the utilities equipment causes damage, like the damages resulting from the California wildfires. Thus, if investigators find that a utility’s equipment, such as PG&E’s, was responsible for the havoc wreaked by the wildfires, that liability is passed directly onto consumers in the form of higher rates. This is not the first time consumers have borne the brunt of the utilities’ operations and legal troubles. PG&E previously filed for chapter 11 protection in 2001 due to the energy crisis, and their bankruptcy was the third-largest chapter 11 in U.S. history at the time.[21] PG&E exited chapter 11 three years later,[22] with customers paying higher rates to help repay $13 billion owed to creditors estimated at around $1,300 to $1,700 per customer.[23] SB 901’s mechanism for recovery of the costs of the earlier wildfires is to pass those costs on to customers through bonds. The law does not allow the bonds to be used to address liability post the 2017 wildfires. The camp fire, which killed 86 people, caused damages estimated between $10 billion to $16 billion and surpassed the damages from the 2017 Tubbs Fire, [24]would not be covered by SB 901’s bond relief provisions.[25]

The State of California also has a renewable energy initiative which has impacted PG&E through power purchase agreements and other state policy initiatives. A power purchase agreement (PPA) is a legal contract between an electricity generator (provider) and a power purchaser (buyer, typically a utility or large power buyer/trader). Contractual terms may last anywhere between five and 20 years, during which time the power purchaser buys energy, capacity, and/or ancillary services, from the electricity generator. The debtors have reported that they have PPAs in the aggregate amount of $42 billion.[26] The utility also reported that their PPA obligations are three times the 2017 gross revenues of PG&E and are the total undiscounted future obligations under PPAs approved by the CPUC.[27] The majority of the energy purchase obligations are tied to renewable energy requirements set by the State of California.[28] The debtor has been working with the CPUC to reduce its obligations under various aspects of the state’s regulatory regime, including requirements under the state’s Renewables Portfolio Standard Program, which requires a certain level of renewable energy purchases. [29] The state also requires PG&E to enter into energy storage contracts to further California’s renewable energy policy initiatives, and the utility has financed the construction of thousands of renewable energy generation resources.[30] The debtors have complained that many of the PPAs are at above-market rates and because of the tremendous investment by PG&E in the renewable energy market, their competitors both receive the advantage of lower rates resulting from that investment and PG&E is shut out from the market rates because of the state mandated PPAs.[31] The utility has been working with the CPUC toward relief from the regulator’s requirements in light of its current liabilities and chapter 11 filing.[32]

NextEra Energy, among other renewable energy companies, has several subsidiaries selling renewable power to the debtor and has asserted their rights in both bankruptcy court and through filings with the FERC, beginning with a request on January 18, 2019, to block the utility from amending or rejecting their PPAs with the debtor.[33] On January 25, 2019, the FERC held, “[w]e conclude that this Commission and the bankruptcy courts have concurrent jurisdiction to review and address the disposition of wholesale power contracts sought to be rejected through bankruptcy.”[34] The debtor has filed an adversary proceeding complaint in the bankruptcy court seeking to determine through a declaratory judgment (i) that the bankruptcy court has exclusive jurisdiction over the debtor’s rights to reject certain executory PPAs or other FERC regulated agreements, (ii) that the FERC does not have concurrent, or any, jurisdiction over the PPAs, and (iii) that either the automatic stay under section 362 of the U.S. Bankruptcy Code applies, or that the court enter into a preliminary and then permanent injunction to enjoin any action before the FERC related to the debtor’s ability under the Bankruptcy Code to eliminate their obligations under the PPAs through its power to assume or reject executory contracts under section 365.[35] On February 15, 2019, the FERC filed Defendant Federal Energy Regulatory Commission’s Response In Opposition To Debtors’ Motion for a Preliminary Injunction and Motion to Dismiss in which it strongly reasserted its sole jurisdiction over the debtors’ PPAs.[36] FERC has argued that once a rate, in this case the PPAs, has been approved by the commission, the terms, particularly the rates, are not private contracts, but creatures of the commission’s authority and can only be modified by petitioning FERC.[37] The court has scheduled a hearing on the preliminary injunction for April 10, 2019.[38] This is unlikely to be the last dispute, jurisdictional or otherwise, between the desire of the debtor to reorganize under chapter 11 and the varied constituencies with a keen interest in the fate of the utility.


[1] See Doc. No. 263, p. 3 of 166, Amended Declaration of Jason P. Wells in support of First Day Motions and Related Relief.

[2] U.S. SEC, PG&E Form 8-k (last visited Apr. 5, 2019).

[3] Michael Mohler, California Department of Forestry and Fire Protection, CAL FIRE Investigators Determine the Cause of the Tubbs Fire (last visited Apr. 5, 2019).

[4] George Avalos, The Mercury News, PG&E lands $5.5. billion in funds to keep operating during wildfire-linked bankruptcy (last visited Apr. 5, 2019).

[5] See Doc. No. 961, Order to Show Cause, United States of America v. PG&E, No. CR 14-0175 WHA (N.D. Cal. 2019). PG&E was convicted for six felony counts of knowingly and willfully violating safety standards and obstructing an investigation by the National Transportation Security Board.

[6] See Doc. Nos. 975 and 976, Response to Order to Show Cause, United States of America v. PG&E, No. CR 14-0175 WHA (N.D. Cal. 2019).

[7] See Doc. No. 992, Order to Show Cause, United States of America v. PG&E, No. CR 14-0175 WHA (N.D. Cal. 2019).

[8] A motion to appoint a committee of public entities, such as cities and counties, was filed, but the relief requested was denied by the court. See Doc. Nos. 720, 803, 820, 823, and 884.

[9] See Doc. Nos. 409 and 962, Notices of Appointment of Creditors’ Committee Amended Appointment of the Official Committee of Unsecured Creditors.

[10] See Doc. No. 453, Notice Regarding Appointment of the Official Committee of Tort Claimants

[11] BlueMountain Capital Management, LLC, Blue Mountain Capital Management, LLC Delivers Open Letter to Shareholders of PG&E Corporation (last visited Apr. 5, 2019) (outlining the number of shares); see also Becky Yerak, Hedge Fund BlueMountain Nominates New Board for PG&E (last visited Apr. 5, 2019).

[12] BlueMountain Capital Management, supra note 11 (outlining the number of shares).

[13] BlueMountain Capital Management, PG&E Corporation (NYSE: PCG) Materials (last visited Apr. 5, 2019).

[14] Press Release, BlueMountain Capital Management, LLC, BlueMountain Nominates 13 Highly Qualified Director Candidates for Election to the PG&E Board of Directors (last visited Apr. 5, 2019).

[15] BlueMountain Capital Management, LLC, PG&E Board of Directors Statement Regarding Director Nominations by BlueMountain (last visited Apr. 5, 2019).

[16] Leslie Brinkley, ABC 7 News, California Gov. Newsom announces new executive actions on wildfire preparedness, addresses PG&E (last visited Apr. 5, 2019).

[17] Mark Chediak, Romy Varghese & Allison McNeely, California Governor Forms ‘Strike Team’ to Advise on PG&E (last visited Apr. 5, 2019).

[18] Id.

[19] JDSupra, Governor Brown Signs SB 901, Addressing Wildfire Cost Recovery, But Ignoring Inverse Condemnation Liability (last visited Apr. 5, 2019).

[20] U.S. SEC, PG&E Form 8-k (last visited Apr. 5, 2019); see also Doc. No. 1091 Order Approving Debtor-in-Possession Financing.

[21] David Lazarus, PG&E Files for Bankruptcy / $9 billion in debt, firm abandons bailout talks with state (last visited Apr. 5, 2019).

[22] PG&E News & Events, Pacific Gas And Electric Company To Exit Chapter 11 On April 12, Sets Distribution Record Date For Holders Of Allowed Claims (last visited Apr. 5, 2019).

[23] Judy Lin, What happens if PG&E goes bankrupt? (last visited Apr. 5, 2019).

[24] Id.

[25] Jeff St. John, The Big Questions Raised by PG&E’s Coming Bankruptcy (last visited Apr. 5, 2019).

[26] See In re: PG&E Corp. C.A. No. 19-30088, Doc. No. 21, Debtors’ Complaint for Declaratory Judgment and Preliminary and Permanent Injunctive Relief.

[27] Id. ¶ No. 11.

[28] Id. ¶ No. 12.

[29] See In re: PG&E Corp. C.A. No. 19-30088, Doc. No. 21, Debtors’ Complaint for Declaratory Judgment and Preliminary and Permanent Injunctive Relief, ¶ Nos. 12–16.

[30] Id. ¶ Nos. 13–14.

[31] Id. ¶ No. 14.

[32] Id.

[33] See 166 FERC ¶ 61,049, Order Petition for Declaratory Order and Complaint ¶ No. 1; see also Exelon Corporation, Petition for Declaratory Order and Complaint, Docket No. EL19-36-000 (filed Jan. 22, 2019).

[34] See 166 FERC ¶ 61,049.

[35] Id. at 2.

[36] See In re: PG&E Corp v. FERC. C.A. No. 19-03003, Doc. No. 87, Defendant’s Response in Opp. Debtors’ Mot. Preliminary Injunction and Mot. Dismiss.

[37] Id. at. 4.

[38] See In re: PG&E Corp v. FERC. C.A. No. 19-03003, generally.

The Globalization of U.S. Patent Law: Companies May Risk Infringement Even Without Significant U.S. Presence

Traditionally, a U.S. patent could only be enforced against activities occurring within the U.S. The globalization of industries and markets over the past 50 years has brought down trade and communication barriers and integrated markets across the world.  This has changed many companies from local or regional concerns into global players in the international supply chain.  These changes have created conflict with existing U.S. patent law, in some cases allowing companies with infringing products to avoid liability by, for example, manufacturing the infringing product outside of the U.S. U.S. patent law has expanded over the last half century to address these loopholes. Many foreign activities that U.S. patent law traditionally carved out are now subject to liability, and the pace of change appears to be quickening. Although U.S. courts still discuss the traditional presumption against extraterritorial application of patent law,[1] in reality there are many exceptions to this presumption that allow enforcement of U.S. patents for activities occurring outside of the U.S.

Congress has repeatedly revised the patent infringement statute, 35 U.S.C. §271, to address foreign companies trying to skirt U.S. patent laws. For example, in Deepsouth Packing Co. v. Laitram Corp.,[2] the defendant manufactured components of an infringing product in the U.S. and then exported those components outside the U.S. for assembly into the infringing product. Applying the law at the time, the Supreme Court held that the defendant had not infringed the plaintiff’s patent because the assembly and sale of the infringing product occurred outside of the U.S., and it was “not an infringement to make or use a patented product outside of the United States.”[3] Congress enacted §271(f) in 1984 to address this gap by “expand[ing] the definition of infringement to include supplying from the U.S. a patented invention’s components” for assembly outside the U.S.[4] Four years later, Congress added §271(g) to the statute, which expanded liability for infringement for the importation, sale, or use in the United States of a product made abroad by a process patented in the United States. This closed the loophole for method claims of simply off-shoring manufacturing facilities (and then importing the manufactured product) to escape infringement liability. Similarly, in 1996, Congress added liability for the importation into the U.S. of infringing articles to the direct infringement subsection, §271(a).

These amendments can be applied broadly, especially alongside induced infringement under 35 U.S.C. § 271(b). §271(b) provides that “[w]hoever actively induces infringement of a patent shall be liable as an infringer.” For example, not only can a foreign manufacturer be liable for infringement under §271(g) for using a patented product to manufacture an infringing article outside of the U.S. (even if the article is ultimately imported into the U.S. by another entity), but in many cases the foreign manufacturer may also be liable for inducing its customers to import the infringing products under §271(b), even where the manufacturer has no direct link to the U.S. market. In Global-Tech Appliances, Inc. v. SEB S.A., the accused infringer, Pentalpha—located in Hong Kong—purchased one of SEB’s deep fryers in Hong Kong, manufactured its own copies of the fryer, and sold them to customers in Asia. [5] These customers independently imported the fryers into the United States.[6]  Pentalpha was found liable for having induced infringement by manufacturing and selling the fryers in Hong Kong for their customers to import into the United States.[7]

The Federal Circuit has held consistently under similar facts. In O2 Micro Int’l Ltd. v. Beyond Innovation Tech. Co., the Court of Appeals of the Federal Circuit affirmed induced infringement by an Asian defendant even though the directly-infringing U.S. sales were made by a customer several rungs down the supply chain.[8] Similarly, in Power Integrations, Inc. v. Fairchild Semiconductor Int’l, Inc., the defendant’s knowledge of the likelihood that the product could be imported into the U.S. by downstream customers was enough to find inducement.  In Power Integrations, even though the defendant did not actually know whether its customers were importing the infringing chips into the U.S., the evidence was sufficient to find inducement: designing chips to meet United States energy standards, providing demonstration boards containing the infringing chips to potential U.S. customers, and maintaining a technical support center in the United States.[9] Thus, a foreign business that runs a facially geographically-neutral operation can nevertheless be liable for induced infringement if its activities are directed at least in part to the United States. “[H]ard proof that any individual third-party direct infringer was actually persuaded to infringe” is not required.[10]

The district court opinion in Kaneka Corp. v. SKC Kolon PI, Inc., further illustrates this trend. In Kaneka, there were three degrees of separation between the accused induced infringer and the infringing act. The defendant’s polyimide film was sold to laminate manufacturers (layer 1), who sold laminates to manufacturers of circuit boards (layer 2), who then sold these circuit boards to the final “set-makers,” such as Samsung and LG (layer 3), who incorporated these circuit boards into mobile phones and imported them into the U.S.[11] Inducement was found because the defendant knew its film infringed plaintiff’s patents and that it actively and intentionally sold this film knowing that it would be incorporated into Samsung and LG phones, which would be imported into the United States.[12]

The geographic scope of patent damages has also been steadily expanding. For example, in 2018’s WesternGeco LLC v. ION Geophysical Corp,[13] the issue was whether a patent owner could recover lost foreign profits for infringement under §271(f). The dispute involved two competitors manufacturing sea-floor surveying technology.[14] The defendant manufactured components of its system and shipped them to other companies abroad who would then combine them to create a surveying system that infringed the plaintiff’s patent.[15] The court upheld the lower court award of lost profit damages based, in part, on purely foreign contracts (i.e. contracts for sales of the infringing product outside of the U.S.).[16] Several questions remain unanswered by this case, including whether such damages are limited to infringement under §271(f) and to “lost profits.” These issues are currently on appeal in Power Integrations,[17] where the plaintiffs argue that the analysis of WesternGeco would also permit recovery of damages for direct infringement under § 271(a) and both reasonable royalties as well as lost profits.[18]

With global commerce now being the norm rather than an exception, even purely foreign activities can create significant liability in the U.S. for patent infringement. This long-term trend toward an expansion of liability shows no signs of slowing down. Companies selling products into the international stream of commerce should be aware that significant U.S. liability may exist even where a company has no direct connection with U.S. markets.


[1] See Microsoft Corp. v. AT&T Corp., 550 U.S. 437, 454-455 (2007) (“The presumption that United States law governs domestically but does not rule the world applies with particular force in patent law”); Deepsouth Packing Co. v. Laitram Corp., 406 U.S. 518, 531 (1972) (“Our patent system makes no claim to extraterritorial effect.”).

[2] 406 U.S. at 531.

[3] Id. at 527.  

[4] Microsoft, 550 U.S. at 444-445.

[5] 563 U.S. 754 (2011).

[6] Id. at 578-79.

[7] Id. at 579.

[8] 449 F. App’x 923 (Fed. Cir. 2011) (unpublished).

[9] Power Integrations, Inc. v. Fairchild Semiconductor Int’l, Inc., 843 F.3d 1315, 1333-34 (Fed. Cir. 2016).

[10] Id. at 1335.

[11] 198 F. Supp. 3d 1089 (C.D. Cal. 2016).

[12] Id. at 1108-111.

[13] 138 S. Ct. 2129 (2018).

[14] Id. at 2132.

[15] Id. at 2132-33.

[16] Id. at 2133.

[17] See, e.g., Power Integrations, Inc. v. Fairchild Semiconductor Intl., No. 19-1246 (Fed. Cir. Dec. 3, 2018). 

[18] Power Integrations Opening Brief at 34, Power Integrations, Inc. v. Fairchild Semiconductor Intl., No. 19-1246 (Fed. Cir. Apr. 12, 2019) (Dkt. No. 32.)