Raising seed capital is not easy. Most entrepreneurs raise capital by using up savings, soliciting donations or small loans from friends and family, or convincing a local bank to provide a loan, which usually requires personal collateral and years of cash-flow projections, which are fairly arbitrary for a business that has not even started yet.
Many entrepreneurs seek out angel investors or, at later stages, consider going public, but even for more mature start-ups, going public is not always feasible. There are substantial legal and accounting costs associated with taking a company public, not to mention the complexity of facilitating and keeping up with ongoing reporting and disclosure requirements.
The goal of this article is to give small businesses some creative and viable financing ideas that do not require expensive legal filings, complicated securities regulations, or even angel investors.
Subscriptions and Preselling Products
So far, preselling a product generally is not considered selling a security in most states; therefore, regulators have not interfered with these rewards-based funding ideas. United Housing Foundation, Inc. v. Forman, 421 U.S. 837, 852 (1975) (the Supreme Court reasoned, “What distinguishes a security transaction […] is an investment where one parts with his money in the hope of receiving profits from the efforts of others, and not where he purchases a commodity for personal consumption […].”). See generally 15 U.S.C. § 77b(a)(1). The key to ensuring that preselling does not attract the attention of securities regulators seems to be making sure that customers who purchase the product do not receive any extra financial return in exchange for their payment (in addition to the product itself, that is). Buyers can receive their purchased products weeks or months after paying for their order. Put another way, funds can be raised from the public, in advance, without restrictions on the amount of money raised or the number of customers, and without subjecting the business to securities registration, reporting requirements, and the associated fees.
KICKSTARTER, for example, lets you set up a company project and accept money from any person in exchange for products, services, or other copies of the work produced. Indiegogo offers donors VIP perks in exchange for their donations. Awaken Café in Oakland California raised money to open a new store by preselling its coffee. Michael H. Shuman, 24 Top Tools for Local Investing (Oct. 11, 2013), available at http://michaelhshuman.com/wp-content/uploads/2013/12/Top-Tools-2.0.pdf. Some co-ops, like Weaver Street Market, a natural foods grocery store in North Carolina, offer their members a t-shirt, bag, and coupons to buy the market’s food products in exchange for their membership fee.
Allowing investors to prepurchase goods and services is a good way to attract more investors and, more importantly, customers all in one go; whereas, simple requests for donations are a one-way street—donors receive nothing in return for their contribution, and they may or may not decide to become a customer.
As mentioned previously, another benefit of this financing option is that federal securities laws generally do not apply to this kind of transaction because products, rather than securities, are sold. Forman, 421 U.S. at 852 (1975). State securities regulators, however, may have a different point of view. For example, in 1959 a country club in California presold club memberships and used the membership funds to start the business. Under federal securities laws, these memberships likely would not be considered securities, but a California court found that there was a significant risk that the business might fail before members got a chance to use their membership benefits. Because of the risk of loss involved, the memberships were deemed securities, and the club was found to be in violation of state securities laws for not registering the membership sales with California’s state securities regulator. Silver Hills Country Club v. Sobieski, 55 Cal. 2d 811, 814–16 (1961). But see Moreland v. Dep’t of Corp., 194 Cal. App. 3d 506, 522 (1987).
Roughly 17 states, including California, use the risk-capital test to determine whether a presold good might be considered a security (Alaska, Arkansas (1987), California, Georgia, Guam (Appellate Division, 1981), Hawaii (1971), Illinois, Michigan, New Mexico, North Carolina, North Dakota, Ohio (10th District, 1975), Oklahoma, Oregon (1976), Washington, Wisconsin, and Wyoming). Cutting Edge Capital, What is a security, and why does it matter? (last visited Dec. 2016). The risk-capital test focuses on whether there is a possibility that an investor will lose value (i.e., money) rather than whether the investor might make a profit from the investment, and has three elements: “(1) an investment, (2) in the risk capital of an enterprise, and (3) the expectation of a benefit.” Joseph C. Long, 12 Blue Sky Law § 2:80 (2014). For example, an investor in a risk-capital state might prepurchase 100 widgets. If the investor never receives the 100 widgets, then the investor has lost money, which potentially would make the transaction a security in a risk-capital state. In states that do not follow the risk-capital model, however, the investor never expected to receive a profit when paying for the widgets; consequently, the transaction likely will not be classified as a security. Therefore, it is important to understand how your state defines a security.
In addition to understanding securities regulations, budgeting and planning will be a critical part of preselling your product. Costs like taxes on the income and the shipping, packaging, and manufacturing expenses should be kept in mind when the orders start rolling in.
Further examples of this financing model in action include Credibles, an online food voucher company that lets anyone prepay a local restaurant for food that they will eat in the future. When the customer makes payments, they receive credits to use at their favorite restaurant. The restaurant owners receive those payments in advance and use the funds to grow their businesses.This strategy is not news to local farmers, who commonly have customers pay in advance for a year’s worth of produce, giving the farmer enough money to cover planting costs.
Gift Cards and Coupons
As far as securities laws go, selling regular gift cards is very similar to preselling products. In fact, one start-up called Stockpile actually allows customers to buy stock and place it on a gift card to give to someone else. Discounted gift cards, however, may be cause for concern from a regulator’s perspective. For example, if you sell a gift card with a purchasing value of $20 for only $15, then the gift card owner technically has the expectation of receiving $5 worth of extra value for his or her money. Unfortunately, this looks to regulators fairly similar to hedging futures on Wall Street.
As a general rule of thumb, securities regulators usually look to the substance and characteristics of a transaction, rather than the label you use for it. Sec. & Exch. Comm’n v. Howey Co., 328 U.S. 293, 298 (1946). See also Tcherepnin v. Knight, 389 U.S. 332, 339 (1967). Anything that creates an expectation of an increased value or profit, over and above what was given in exchange for it, can be characterized as a security. For instance, if you issue coupons that can be used later to buy a product, the market value of the product that will be purchased might increase in value between the time for which the coupon is paid and the time the product is actually purchased. Getting a deal like this arguably encourages people to buy coupons to get extra value (i.e., as does any other investment).
When it comes to selling gift cards and coupons, some ideas for avoiding regulator attention might include limiting gift card maximum values, having a fixed value, and having very clear disclaimers to purchasers that the gift card is not a security. In addition, there are other legal considerations. These include federal limits on card fees that may be charged to customers, if and when the card should expire, and what should be included in any required disclosures. See Kaufman v. Am. Express Travel Related Serv. Inc., 283 F.R.D. 404 (N.D. Ill. 2012) (wherein American Express failed to notify purchasers of the full terms and conditions applicable to its gift cards). For example, money on a gift card cannot expire in less than five years after purchase under the Credit Card Accountability Responsibility and Disclosure Act of 2009 (commonly referred to as the CARD Act), 12 C.F.R. § 1005.20(e)(2), and card service fees generally cannot be charged under 12 C.F.R. § 1005.20(c)(3) and (d) unless there is no activity on the card for at least one year and prior disclosure of the fee is made. In addition, gift cards that are issued in amounts greater than $2,000 may be subject to certain additional recordkeeping and reporting requirements under the Bank Secrecy Act (otherwise known as the Currency and Foreign Transactions Reporting Act of 1970, 31 C.F.R. § 1010.100(ff)(4)(iii)(A) (2011)).
Each state also has its own separate restrictions and requirements as well, which preexempt the CARD Act rules described above (e.g., expiration is not permitted at all in about half of all U.S. states). Emily Atkin, 3 Tips to Keep Gift Cards from Bestowing Legal Trouble, Law360 (Sept. 24, 2013); National Conference of State Legislatures, Gift Cards and Gift Certificates Statutes and Legislation (last updated Apr. 22, 2016). Some states prohibit imposing fees on gift cards. Also keep in mind that, if the gift card is purchased in one state and used in another, there may be two different sets of gift card laws with which to comply.
Keeping within a few guidelines, gift cards are a good way to avoid costly regulatory fees and, according to some marketing research, tend to make customers who shop with gift cards less sensitive to price and spend more money, not to mention the potential for referral business. A gift card vendor can offer information about what type of gift card might be most suitable.
Cooperatives
A cooperative is a group of members that pool their capital to make a common purchase, such as a piece of real estate. All members usually are co-owners of the collective purchase and are entitled to take advantage of any services provided by the cooperative and to use the purchased item, which an individual might not be able to afford alone.
Cooperatives do not just work in real estate. Equal Exchange is an example of a successful produce cooperative that has over 100 owner employees. Though Equal Exchange also raises money through selling securities and using an exemption from securities laws, a primary source of funding comes from employee contributions that do not require going through securities regulators. Daniel Fireside, How Equal Exchange Aligns Our Capital with Our Mission (May 29, 2015). Similar to many other types of businesses, each owner periodically gets a share of profits and losses, one equal vote in making decisions for the business, and an opportunity to serve on the managing board. Employees each put half of their annual profit earnings into a joint account used to reinvest in the co-op. Other cooperatives, like Coop Power, a consumer-owned energy cooperative in Massachusetts, pool funds from customers (who contribute and become members) and use the pool of capital to run their businesses, which involves investing in other sustainable energy businesses and developing job training programs.
The SEC has given certain cooperatives an exemption from registration requirements under federal securities laws. 17 C.F.R. § 240.15a-2. See Forman, 421 U.S. at 858. For example, collectively buying an apartment building through a licensed real estate agent generally is not subject to securities laws, even if each investor’s ownership interest takes the form of a share of stock, so long as the primary purpose of the purchase was not to make a profit from increases in the property value. Forman, 421 U.S. at 851. See also Grenader v. Spitz, 537 F.2d 612 (2d Cir. 1976), cert. denied, 429 U.S. 1009 (1976). Typically, the primary purpose of such a purchase is to have a place to live.
Based on court rulings thus far, a cooperative is more likely to qualify for an exemption if:
members are prohibited from selling or transferring their membership interest to others;
voting rights are equal, rather than directly proportional to the amount contributed;
membership interests do not appreciate in value over time;
the primary purpose or motive of the contribution is not financial gain (Forman, 421 U.S. at 851–54); and
all members are actively involved in management of the cooperative (Howey, 328 U.S. at 301).
State securities laws vary. Some states have an exemption from securities laws for all cooperatives, some do not have an exemption, some have a limited exemption if certain conditions are met (e.g., a maximum contribution amount is imposed), and others only have exemptions for certain kinds of cooperatives (e.g., farmer’s cooperatives). See Ariz. Rev. Stat. Ann. § 10-2080 (2015); Ariz. Rev. Stat. Ann. § 10-2146 (2015); Cal. Corp. Code § 25100(m) (West Supp. 1983); Ark. Stat. Ann. § 67-1248(a)(12) (1980). Also see Colo. Code Regs. 11-51-307(1)(j) (2015); Mass. Ann. Laws ch. 110A, § 402(a)(12) (Michie/Law. Co-op. Supp. 1983); Tex. Rev. Civ. Stat. Ann. art. 581-5(N) (Vernon Supp. 1982–83). Therefore, it cannot be stressed enough how important it is to be familiar with your state’s point of view.
Revolving Loan Funds
Another way to attract investors is to offer loans that pay a reasonable interest rate. In addition to borrowing funds from the community and/or members, some organizations take loans from investors and then use those funds to make microloans to other businesses and earn interest. For example, the La Montanita Grocery Co-op in New Mexico uses its members’ capital to financially support local farmers and food processors. Mountain Bizworks, a small business lending company headquartered in North Carolina, borrows money from investors, lets the investors choose their own loan terms, and loans the pooled funds to other small businesses.
Generally, a loan is represented by a promissory note. The definition of a security under the Securities Act at 15 U.S.C. § 77b(a)(1) includes any “note.” However, the law is not black and white about whether a promissory note is a security; the question is whether the note resembles a security close enough. For example, some ways to differentiate a loan from a security include:
providing some collateral for the loan (offering collateral also attracts more lenders);
disclosing to all lenders: (1) that the loans are not intended to be securities or registered pursuant to securities laws; (2) what laws would apply to protect the lender in the event of default (e.g., FDIC laws); and (3) the specific purpose of the loan;
advertising primarily through private networks, rather than to the general public;
keeping the number of lenders to a minimum;
using the funds for specific business purposes, rather than general business use;
offering investors that contribute to your loan fund services perks or products instead of interest in return (which is evidence that the lenders’ main interest is to make the business grow, not to earn a profit on an investment);
offering a very low interest rate (i.e., well below the prime market rate) if you do decide to pay interest;
borrowing from a bank or credit union rather than individuals (when possible); and
setting the loan term for less than nine months. 15 U.S.C. §§ 77c(a)(3), 78c(a)(10); See also Exch. Nat’l Bank of Chicago v. Touche Ross & Co., 544 F.2d 1126, 1137–38 (2d Cir. 1976) (created a rebuttable presumption that a note with a maturity greater than nine months is a security unless it bears a strong family resemblance to an item on the judicially crafted list of exceptions); Reves v. Ernst & Young, 494 U.S. 56, 64–65 (1990); Lee Lashway, Promissory Notes as “Securities”—A Trap for the Unwary? (July 16, 2013); HG.org, When Is a Promissory Note a Security?(last visited Dec. 2016).
As with all other types of fundraising, keep in mind that both federal and state laws should be followed. Lending laws in both the lender’s state and borrower’s state may apply.
Certificates of Deposit
Regular bank CDs generally are considered bank deposits rather than securities, which keeps CD issuers relatively safe from securities registration and reporting. Marine Bank v. Weaver, 455 U.S. 551, 555–61 (1982); 15 U.S.C. § 78a(10); 12 U.S.C. § 1813(l). SeeLloyd S. Harmetz, Frequently Asked Questions About Structured Certificates of Deposit, Morrison & Foerster LLP, (2015), at 4. As many small business owners already know, local banks and credit unions are not eager to make business loans without full collateral. That is not only because conservatism often makes good business sense, but also because, by law, banks are required to be conservative with their assets.
Some local businesses have created a financing model that involves a three-way partnership with banks and investors essentially to get fully collateralized loans from banks using CDs. For example, Equal Exchange created its own private CD. Equal Exchange advertises its CD publicly, and anyone who wants to invest in its purpose simply buys the CD from Eastern Bank. In exchange, like a normal CD, investors get the future return of their principle plus reasonable interest. Eastern Bank then loans the funds back to Equal Exchange to help finance its business. Essentially, investors who buy the CDs are agreeing to allow the CD funds to be used as cash collateral for the line of credit to Equal Exchange. In the event that Equal Exchange defaults on its loan to Eastern Bank, Eastern bank keeps the investor’s deposit. Daniel Fireside, How Equal Exchange Aligns Our Capital with Our Mission (May 29, 2015).
Similarly, Alternatives Credit Union in Ithaca has formed a partnership with several local, environmentally focused businesses. The Credit Union offers CDs to any investor interested in contributing to the betterment of the environment. The investor’s deposits are pooled and distributed as loans to various businesses that share this common purpose. Alternatives Credit Union not only facilitates the CD/loan set-up for small businesses, but also helps nonprofits by matching the nonprofit’s funds raised dollar-for-dollar and issuing microcredit loans with the combined amount. For example, if investors purchase a total of $5,000 in CDs, Alternatives loans out a total of $10,000 to the intended beneficiaries of that nonprofit.
A regular CD usually is FDIC-insured (or NCUA-insured in the case of credit unions), and the investor is entitled to a return of his or her deposit if the bank goes under. 12 U.S.C. § 1821(f)(1); Federal Deposit Insurance Corporation, A Guide to What Is and Is Not Protected by FDIC Insurance (last visited Dec. 2016); Federal Deposit Insurance Corporation, When a Bank Fails—Facts for Depositors, Creditors, and Borrowers (last visited Dec. 2016). This insurance protection may be what keeps securities regulators from seeing the need to get involved. Harmetz, Frequently Asked Questions About Structured Certificates of Deposit, Morrison & Foerster LLP (2015). However, the insurance recovery is only available in the event that the bank becomes insolvent. Default of the small business on its loan to the bank will not qualify for FDIC insurance coverage under 12 U.S.C. § 1821(b), (f)(1). Therefore, the investor’s funds are still wholly at risk if the business defaults, just as any other collateral would be.
This model requires that the investor be aware that he or she is putting up collateral on behalf of a small business owner who may not be able to do so. The risk for the investor is essentially the same in a CD-loan set-up as it would be if the investor had made a loan directly to the small business. The benefit of this set-up, however, is that the bank acts as a facilitator and administrator of the transaction, adding a sense of legitimacy and formality to the deal. In addition, banks and credit unions are experts at processing loan paperwork, handling cash, and providing regular reporting statements to both the investor and the small business borrower.
Conclusion
In short, there are many creative funding structures, including the few discussed above, that can allow small businesses to access a wider number of contributors without spending large amounts of money on legal and accounting fees and without becoming overburdened with extensive reporting and disclosure requirements.
Trevor Norwitz delivered the following remarks at the 2016 Delaware Business Law Forum, held in Wilmington, Delaware, during the week between Halloween and Election Day.
***
Is the Delaware appraisal rights remedy in need of repair? You may as well ask: is the American electoral system in need of repair?
In both cases the flaws are manifest and the scary results apparent. The difference is that the Delaware legislature can easily fix the General Corporation Law to eliminate the artificial and socially destructive phenomenon of appraisal arbitrage. This, of course, is the investing strategy in which an arbitrageur buys shares in a target company after the announcement of a deal specifically for the purpose of asserting appraisal rights. It is a recent development that has resulted directly from judicial interpretations of the outdated wording of section 262. Appraisal arbitrage leads to perverse incentives, unjust results, and a reduction in overall social benefit. Delaware lawmakers brought this Frankenstein creature into the world; they can and should take it out. (I hope you will forgive my gruesome metaphors and horror-flick references, but it is Halloween week, and we are still living through “The Nightmare on Pennsylvania Avenue.”)
Note that the question is not, “Is Section 262 good enough?” “Good enough” is not good enough for the State of Delaware. Delaware is the greatest jurisdiction for corporate law in the world—its sensible statutes; highly responsive legislators; sophisticated, fair-minded, and efficient judges; superb bar; and unparalleled deal- and case-flow all combine to make it the jurisdiction of choice for states in which to incorporate, conduct M&A deals, and litigate. That is good for Delaware. It is also good for business and for America. Delaware’s excellence in corporate law is part of America’s “secret sauce.”
In embracing appraisal arbitrage, however, Delaware distinguishes itself negatively, adding complexity and inequity to deal-making and threatening stockholder value in a wide range of transactions.
I am not arguing today for a total revamp of the appraisal rights remedy, such as the inclusion of a market out (which many other states recognize). I am not even arguing that the appropriate time for appraisal to attach should be the stockholder vote rather than the closing, or that stockholders should have to vote against a deal in order to assert appraisal rights. There are good arguments that can be made for those positions, and I believe those are conversations worth having over time. Today I am merely urging that the legislature should pluck the low-hanging fruit with alacrity. A modest amendment can eliminate the looming dark cloud of appraisal arbitrage. The need is clear and the fix is easy: dissenters’ rights should be for dissenters, not for speculators.
My learned opponent likely will say that this is all overblown, that Delaware’s judges are perfectly capable of making sense of the statute as it is and of dispensing justice to the parties before them, that the law was recently amended and should be given time to work before making more changes, and that appraisal arbitrage is actually beneficial.
These are inapt arguments. Of course Delaware’s judges are capable of dispensing justice, but they should not have to twist themselves into pretzels to deal with a poorly worded, outdated statute, creating artificial and perverse incentives in the process.
The fact that the statute was recently amended—seemingly as a compromise between the interests of the appraisal arbitrage community on the one hand, and those of Delaware corporations and their stakeholders on the other hand—is no reason not to fix the law. The interests of appraisal arbitrageurs should have no more weight in determining the appropriate legislative outcome to this question than the interests insider traders should have in determining what our insider trading laws should be.
I would like to be clear that I am not suggesting that appraisal arbitrageurs are evildoers who must be stopped. Well, they must be stopped, but that is because what they are doing is bad for Delaware corporations and stockholders and, ultimately, bad for Delaware and for America, not because they are bad people. They are merely doing what opportunistic investors are supposed to do, namely, find market inefficiencies, or gaps and loopholes in the law, and take advantage of them to divert wealth to themselves. I should not even call it an abuse. They are really just doing their civic duty by pointing out that our laws are broken and, as currently written, allow them to profit at everyone else’s expense. If they point this out to us and we do not fix it, then that is not their fault. Shame on us.
Why do I say that appraisal arbitrage leads to perverse incentives, unjust results, and a reduction in overall social benefit? Because it does. Let us go back to basics.
When you are buying a business, the most fundamental things you must know are what you are going to get and what you are going to pay for it. That is the essence of the deal—the quid and the quo. Buyers know they have to take some risks on the “get” side and go to great lengths and cost to minimize them, but at least they have some certainty as to what they will pay for the company they are buying, right? Unfortunately, in Delaware today that is not right.
Today, if you are buying a Delaware corporation, you can participate in an auction admirably conducted by independent directors unquestionably satisfying their fiduciary duties, engage in tough negotiations with those independent directors, compete with other bidders, potentiallty get held up by activist “bumpitrageurs” and be forced to raise your price to get their support, then have the stockholders of the target company approve the transaction based on full and fair disclosure—by a majority of the minority if you are a controlling stockholder—and still run a significant risk of having to write a large check years later because an “expert” testifies based on a subjective discounted cash flow (DCF) analysis, or a petitioner points to your success in running the business since you bought it, that the price you paid did not reflect fair value for the company.
You paid a market-clearing price in a fair and open process, yet you face a claim that the price was not fair; the fair price—which no one offered to pay—was really 30, 40, or even 50 percent higher.
This is not just a theoretical risk. These are basically the core facts of the Dell appraisal decision handed down a few months ago, which I will talk a bit more about (and in which, in the interests of full disclosure, my firm represented Michael Dell). This risk is one that troubles buyers of Delaware companies (especially private equity firms), preventing them from paying the highest prices they can pay or causing them to structure deals in ways that are not optimal just to avoid the appraisal risk. This means that it is also a worry for Delaware companies looking to sell because they know that buyers cannot pay top dollar due to the asymmetrical appraisal risk: the buyer takes all the downside risk, but arbs get an option on the upside.
Buyers must take all known risks into account, and they know what likely lies ahead: aggressive activist investors who get multiple bites at the proverbial apple. After negotiating the deal with independent directors, the buyer is not only at risk of the “headless highwayman” who jumps out from behind the bushes and tries to force a price bump before the stockholder vote (remember, it is Halloween week), but now must also worry about being chased for years after the deal closes by “zombie stockholders” who were never real investors in the company in the first place. These arb-zombies invested in a litigation play, not in the company.
Buyers must protect themselves, and they will. Sometimes they can structure a deal specifically to avoid appraisal rights, even if it is not the most economically desirable or efficient manner in which it could be done. In one large, pending merger in which my firm is involved, the deal was originally going to include some cash consideration for stockholders who wanted cash, but that changed. I am not going to go beyond the public disclosure, but it is a matter of public record that originally this was proposed as a stock-and-cash deal with appraisal rights. There was discussion over an appraisal condition, and by the time the deal was announced, it was an all-stock deal with no appraisal rights. Companies should not have to factor in appraisal risk when determining the optimal deal structure. If buyers cannot avoid the risk structurally, they must deal with it some other way, typically by holding back some of the price they would have been willing to pay to all stockholders so that they can pay off the “highwaymen” and the “zombies.” Of course they are never going to admit to holding back, but as someone who sits in these meetings and strategizes with the decision-makers, I can assure you that what they are calling the “Dell-risk” is not lost on anyone. A sizable appraisal award could make the difference between a successful transaction and an unsuccessful one. In a leveraged deal, where the risks to the buyer are significant and the margin for miscalculation is razor thin, it can mean the difference between viability and insolvency.
The only argument anyone has offered to suggest that there is any social value to appraisal arbitrage at all is that it performs a “policing” or “monitoring” function in that it discourages abuse by controlling stockholders. That claim applies only to conflict transactions, or squeeze-outs. It has absolutely no force to the vast majority of arm’s-length deals, and even in conflict deals, that was never the purpose of appraisal. Delaware already has a mechanism for discouraging abuse by controlling stockholders called fiduciary duty litigation, and Delaware lawyers and judges are the olympians of that particular blood sport. If there is a view that the Delaware courts are incapable of enforcing fiduciary duties of controllers and directors, someone should try to make that case, and anyway the remedy would be to improve that mechanism if it is flawed. Allowing statutory appraisal rights to be abused as a back-door method of policing fiduciary duties not only leads to injustice, but also creates perverse incentives throughout the system.
Here’s why: the great advantage of appraisal suits from the claimants’ point of view is that they do not have to prove or even allege any wrong-doing by the board, controlling stockholder, or anyone else; they must only convince a judge (years after the deal) that the fair value of the shares at closing was greater than the deal price. What this means is that, if the board or controller can be shown to have acted improperly (i.e., to have breached their fiduciary duties), then all stockholders share in any recovery. If the board and controllers cannot be said to have done anything wrong—as was the case in Dell—only the opportunistic “hold-outs” benefit from any award. That is not right. If stockholders were, in fact, harmed by a bad process, and that can be shown, they should all be made whole. In addition, it creates perverse incentives, not only on the part of the arbitrageurs (who know that buyers will hold back value from stockholders at large to satisfy their more aggressive claims), but also on the part of buyers themselves (who, frankly, know that there are far fewer holdouts seeking appraisal than there are stockholders).
So how did we get into this scary movie? (I am not sure whether you would call it “American Werewolf in Wilmington” or “Rocky Horror Appraisal Show.”) Not surprisingly, through a series of unrelated, mostly well-intentioned acts that had unintended consequences.
Appraisal rights themselves are not the problem. They have been part of Delaware law longer than any of us have been alive. Delaware companies never had to worry about them too much. They were not pursued very often and only resulted in large awards in egregious circumstances where there was real abuse of an insider position (e.g., Emerging Communications).
Section 262, added to the General Corporation Law in 1967, provides that a stockholder of a corporation engaging in certain fundamental transactions may, so long as their shares are not voted in favor of the transaction and certain other formalities are followed, ask the Court of Chancery to appraise the fair value of their shares. The legislative history of this provision is clear that this was intended to compensate minority stockholders who dissented from a fundamental transaction like a merger for the loss of their right to veto it. That appraisal rights were intended as a remedy for dissenting stockholders has been explicitly recognized by Delaware courts for decades (see, e.g., Weinberger, Technicolor and Transkaryotic).
Over the years, the appraisal remedy evolved: Weinberger opened up the range of permissible valuation techniques, whereas a series of later cases (see, e.g., MG Bancorp and Cox Radio) established DCF as the strongly favored valuation technique for establishing going-concern value. Golden Telecom posited that the Court of Chancery may not simply defer to the merger price full stop, but had to undertake an independent appraisal.
A key development was the dematerialization of shares. Unlike in 1967 when section 262 was enacted, we live in a world where almost all public company shares are held through depositaries in undifferentiated fungible bulk, as Chancellor Chandler so poetically put it. The question arose as to what should happen when a stockholder who bought shares in the market was not able to establish the statutory precondition to asserting appraisal rights, that the shares were not voted in favor of the transaction—that they were really dissenting shares. Almost 10 years ago, in Transkaryotic, the Court of Chancery held, regrettably, that the literal language of section 262 did not require that appraisal seekers must actually demonstrate that their shares were not voted in favor of the transaction. It is sufficient that enough shares were not voted in favor by the depositary for it to be mathematically possible. At the end of his decision, Chancellor Chandler noted the concern that his decision would “pervert the goals of the appraisal statute by allowing it to be used as an investment tool for arbitrageurs as opposed to a statutory safety net for objecting stockholders.” However, relief, he wrote, “more properly lies with the legislature.”
In effect this was a double invitation: to the arbitrageurs to “pervert the goals of the appraisal statute by allowing it to be used as an investment tool” and to the legislature to stop them. Sadly, only one of those invitations has thus far been taken up.
Even though Transkaryotic noted, like many cases before it, that appraisal rights were created as a remedy for “dissenting stockholders,” the interpretation it adopted allowed one to seek appraisal of shares one owns or later buys without being a dissenting stockholder as to those shares.
Transkaryotic laid the groundwork for a new industry—appraisal arbitrage—which was pioneered in part by members of the Delaware plaintiff’s bar who saw the lucrative potential in this legislative misalignment. Funds were raised specifically for the purpose of targeting this strategy, and a few years ago the all-out assault was launched, with a host of appraisal claims brought by speculators who were not real stockholders of the target companies. Among the first deals targeted were the buyouts of Ancestry.com, Ramtron, and BMC software. (In the interests of full disclosure, my firm represented Ancestry.com.)
Vice Chancellor Glasscock, in his first decision in Ancestry (that case has become known as Ancestry I), followed Transkaryotic and allowed the arbitrageurs to pursue their claims. He repeated Chancellor Chandler’s admonition that, if the legislative intent behind appraisal rights was not met by the words of the statute, then it was for the legislature, not the judiciary, to fix. Unfortunately, that has still not happened, and that is why we are having this debate.
After Ancestry I, a great hue and cry was heard across corporate America. Many people in business, legal practice, and academia (myself included) wrote to warn of the danger of appraisal arbitrage and implore the Delaware legislature to fix the statute. The problems were well-documented, including subversion of the legislative purpose, the uncertainty and deal risk created by buyers’ not knowing what they will have to pay, and the risk that they would hold back consideration to pay off arbitrageurs or seek to insert appraisal conditions in deals, which create dangerous uncertainty for both sides, but especially for sellers.
These problem were then exacerbated by the very high statutory interest rate that, in this current low-interest-rate environment, created an irresistible “heads I win; tails I win a bit less” dynamic. When the current statutory interest rate was adopted about 10 years ago, it was double the federal discount rate; now it is six times the federal discount rate.
Plaintiff’s lawyers were, to a large degree, driving the appraisal arbitrage gravy train, using slick marketing presentations to show hedge funds how to profit from appraisal arbitrage. Billions of dollars in hedge fund money were now targeting this unintended little aberration in the law.
The appraisal arbitrage claims kept coming—Dole, Petsmart, Safeway, Zale, and on and on. By one account, appraisal actions were filed in about a quarter of all Delaware transactions eligible for appraisal, making up a substantial part of the Delaware Court of Chancery docket. Add to the parade of horribles the wasting of judicial resources and the diversion of judicial brainpower to the intricacies and rabbit-holes of DCF analyses.
After all the fuss over Ancestry I, the Delaware Corporation Law Council proposed a partial measure to ameliorate the problem. I assume everyone here knows that this proposal was to exclude small, de minimis nuisance claims and to allow companies facing appraisal suits to make partial payments to the appraisal claimants, thereby cutting off the compounding above-market interest as to the amount paid. This proposal was criticized as inadequate by some (including yours truly), but it became embroiled with the fee-shifting tempest in a teapot, and the Delaware legislature did not take it up in 2015.
Then last year, we went into a period of a few months when the Court of Chancery was issuing its valuation determinations in a number of appraisal cases, and these decisions—Ancestry II, Autoinfo, Ramtron, and BMC II—suggested that, so long as a proper sale process was followed, the court would show a high degree of deference to the negotiated deal price. This “judicial solution” made people feel a lot better. The critics of the council’s proposal were mollified by the comforting notion that, even if the statute still facilitated appraisal arbitrage, the judges would step in to ensure that the rights were not abused. In that environment, the council repeated its anti-nuisance and partial-payment recommendations in 2016, and these changes were adopted by the legislature, taking effect this past August.
The recent revisions to section 262 are not very controversial as far as they go, but they do not go nearly far enough. This is because, at best, they may reduce but do not eliminate the artificial incentive to arbitrage appraisal rights. They may actually encourage appraisal arbitrage because they create a path for up-front funding for the litigation costs. Appraisal arbitrageurs will get most of their capital back, be able to pay their lawyers, and still be able to roll the dice for the upside. In Atlantic City they call this “playing with the House’s money.” It is early days, but so far in most cases, companies facing arbitrageur claims have chosen not to pre-fund their attackers, and the changes do not appear to have affected the tide of appraisal claims much.
At the time, however, with this legislative tweak and the Court of Chancery emphasizing the gravitational force of negotiated deal prices so long as a proper sale process was followed, a warm and fuzzy feeling set in among the M&A community. People stopped worrying and quit whining. (The noise level went from Texas Chainsaw Massacre to Silence of the Lambs.) It felt safe to go back into the water. Then came Dell. That decision made a lot of us feel like those holidaymakers on the beach at Amity Island.
Let us briefly recall the salient facts in Dell, as recounted in the court’s opinion. Dell Inc. was in deep trouble, facing declining prospects and a “changing ecosystem.” One analyst cited by the court called the company a “sinking ship.” Its stock was plummeting, its market share was declining, and its projections kept dropping lower and lower. Blue-chip private equity parties were dropping out of the process like Republican presidential candidates. KKR said it could not get its arms around the risk to the PC business; TPG said the cash flows were too uncertain and unpredictable to establish a business case.
The independent special committee of the Dell board ran an exemplary sales process. They negotiated hard and they achieved the best price that was available in the market. After the deal’s announcement, they engaged a second bank to run a full-go shop, which reached out to 60 new parties. Blackstone took a whiff and passed; there was only one guy who actually made a proposal: Carl Icahn. Talk about the mouse going to the cat for love. Icahn did not want to buy Dell, of course, but rather was merely playing his favorite game of “bumpitrage” and succeeded in extracting a price bump as tribute for his support of the deal.
The entire process followed in this case was pristine. Vice Chancellor Laster so held, noting expressly that, “this court could not hold that the directors breached their fiduciary duties or that there could be any basis for liability.” Indeed, the Vice Chancellor praised the manner in which the members of the special committee, acting for the sellers, conducted themselves, as he did Michael Dell, the controlling stockholder who was the largest member of the buyout group. Nevertheless, he found that the fair value of Dell was almost one-third higher than that hotly negotiated, stockholder-approved price that had even won Arbzilla’s approval.
In his decision, the Vice Chancellor effectively acknowledged that the fair value he decided on was not attainable in the circumstances in which the Dell special committee found themselves. It was not available in the market. There were no strategic buyers (as the Dell board and its advisers had correctly determined). All of the private equity firms who bid based their offers, as private equity firms do, on what they could afford to pay to receive the rate of return they required to justify the investment and the risk of taking on huge debt. Nevertheless, he determined that the fair value for statutory appraisal purposes was 28 percent higher than the established fair market value.
Was a great injustice done in Dell? Of course not. Only a small percentage of the overall shares had perfected their appraisal rights. The arbitrageurs who held them were very happy. With the benefit of almost three years of hindsight, one could see that Michael Dell and his co-purchasers at Silver Lake were doing rather well on the acquisition. Their bet was working out. So this might appear to be one of those win-win/no-loser situations, right? Not right. The losers are the stockholders of Delaware corporations in future transactions because decisions like this create a disincentive for buyers to pay top dollar out of a rational fear that a court will later require them to pay some theoretical “fair value” that the market itself would not support.
The appraisal process has largely become a battle of DCF experts-for-hire offering “chasmically” diverging opinions on the same sets of facts. As Chancellor Bouchard recently wrote (quoting Justice Jacobs in part): “The advantage of an arm’s-length transaction price as a reliable indicator of fair value is that it is ‘forged in the crucible of objective market reality (as distinguished from the unavoidably subjective thought process of a valuation expert) . . . .’”
The Dell case was not a mere aberration. Shortly after Dell, there was another case concerning the appraisal of DFC Global in which the Chancery Court awarded the appraisal plaintiffs a fair-value award of 7.5 percent above the negotiated deal price, despite the fact that the deal was the product of a robust two-year, arms-length sale process.
These were two very different cases, and 7.5 percent is a lot less than 28 percent, but to some ears, DFC Global amplified the alarm bells that Dell had sounded, alerting purchasers that they still must contend with appraisal risk.
In DFC Global, the company’s board also faced extremely difficult circumstances. As the Chancellor noted, “at the time of its sale, DFC was navigating turbulent regulatory waters that imposed considerable uncertainty on the company’s future profitability, and even its viability . . . the potential outcome could have been dire, leaving DFC unable to operate its fundamental businesses. . . .” In these dire straits, the DFC Global board made the decision that it was best to sell the company and let the buyer bear those risks. So the board ran an exhaustive process to successfully secure for stockholders the best price the market would deliver. Nevertheless, the Chancellor agreed with the appraisal plaintiffs that the company was sold “at a discount to its fair value during a period of regulatory uncertainly that temporarily depressed the market value of the company” and awarded them a price increase (admittedly not as much as they had hoped).
The Chancellor expressed that “[t]he merger price in an arm’s-length transaction that was subjected to a robust market check is a strong indication of fair value in an appraisal proceeding as a general matter, but the market price is informative of fair value only when it is the product of not only a fair sale process, but also of a well-functioning market.” In that case, he found, “the transaction . . . was negotiated and consummated during a period of significant company turmoil and regulatory uncertainty, calling into question the reliability of the transaction price as well as management’s financial projections.” These are carefully calibrated words, but not every lawyer reads every word.
So long as appraisal arbitrage is allowed, appraisal claims likely will be brought in certain situations, for example where DCF models suggest theoretical valuations higher than the deal price, or when the deal is struck at a time of great uncertainty. This litigation will be much more extensive and serious than traditional appraisal litigation because it will not be brought by real dissenting stockholders who are unhappy with the price, but by professional opportunists who are well-funded and who have organized themselves specifically to game the system and take advantage of this legislative quirk.
These decisions not only have troubling policy implications, but they also raise doctrinal questions. The law defers to the decisions of loyal and well-informed directors. That is especially true under the new MFW “unified standard” where the combination of effective independent director negotiation and minority stockholder approval leads to business judgment review of board action. It is difficult to see these determinations—that the fair value of these companies was higher than the board achieved or could possibly have achieved in the circumstances—as anything other than second-guessing the decisions of the board in each case that it was the right time to sell the company. The Dell and DFC Global boards decided to accept a premium to the trading value—the best price they could get—and to allow someone else to take the risk (the risk of righting the “sinking ship” in Dell’s case, or of regulatory Armageddon in DFC Global’s case). Rather than deferring to their loyal and well-informed decisions, the court said they sold too cheap. There is an inconsistency there, and it is not eliminated by the fact that the immediate consequences of this judicial second-guessing are borne not by the directors themselves, but by the buyers because the buyers simply will pass those costs on.
Some of the problem is inherent in the appraisal rights concept itself and in the wording of the statute. The judge’s statutory obligation is to determine de novo the target company’s fair value as of the closing date, which might be many months after a sale process has established the company’s fair market value. A company’s fair value is not necessarily the same as its fair market value, especially if the two determinations are separated in time. The temporal aspect is baked into the appraisal statute, and with the appraisal arbitrageurs attacking deals that can make it very hard to sell companies in certain circumstances, such as during regulatory turmoil or if they have a significant FDA approval pending. The legislature might consider revising the statute to have the appraisal valuation speak as of the date the stockholders make their decision to sell, as some jurisdictions do, but I am not promoting that amendment today.
Most appraisal fights are not driven by the timing differential, but by the difference between fair value and fair market value. This means the litigation battleground centers on valuation metrics, the intricacies of DCF modeling, projections, discount rates, terminal multiples, and dueling valuation experts. It is the Wharton version of Alien vs. Predator, and it is up to the courts to decide how deeply they want to get dragged into that quicksand, or whether the “value that is forged in the crucible of objective market reality” is close enough in most cases.
The modest changes I am urging would not completely eliminate the risk of timing or valuation arbitrage, but it would greatly alleviate the magnitude of the problem by limiting appraisal rights to those whom the law is supposed to protect. What the legislature should do is amend section 262 of the Delaware General Corporation Law to specify that only shareholders on the record date who can demonstrate that their shares were not voted in favor of the transaction are eligible for appraisal.
If that simple change were made, the number of appraisal cases, the dollars involved, and the risks to corporations doing business in Delaware will go down dramatically, with no loss of protection for the dissenting stockholders the law was aimed to protect. In fact, any “policing” value added by the fact that appraisal claims are easier to win than fiduciary claims would still exist; it would simply benefit the people it was always supposed to benefit, namely, dissenting stockholders rather than enriching opportunistic, quick-buck artists.
The Delaware Supreme Court might get the opportunity to weigh in on these questions, in Dell or in other cases in the pipeline, but there is no reason to ask the Supreme Court to fix what the legislature could with the stroke of a pen. The Delaware legislature must be The Exorcist.
The Legal Opinions Committee of the ABA Business Law Section recently published a report on cross-border closing opinions (the ABA Report). The City of London Law Society (CLLS) and the Toronto Interfirm Opinion Group (TOROG) have also published reports providing guidance for English and Canadian lawyers on closing opinions. In addition, lawyers in the Netherlands, Germany, and other countries have significant experience reviewing, and responding to requests for, closing opinions from counsel to U.S., English, and Canadian parties to business transactions. Nevertheless, the absence of a shared conceptual framework among lawyers in different jurisdictions often gives rise to misunderstandings due to differences among legal systems and language barriers (even when documents are in English). A program presented at the Spring 2016 ABA Business Law Section meeting in Montréal brought together opinion practitioners from the United States, Canada, the Netherlands and England to discuss how to make cross-border opinion practice more efficient and less contentious.
The premise of the program was that lawyers and their clients would benefit from consensus on recurring issues in transactions where opinion givers and recipients are from different jurisdictions, given that it is unlikely that a body of “supra-national” cross-border customary opinion practice will develop any time soon. The topics included: Which specific opinions should not be requested or given? What assumptions, qualifications or exceptions are appropriate in the cross-border context? How do different national laws interact and impact opinion practice? How do we account for the peculiarities of international transactions? How do opinion givers deal with the risk that their opinion will be litigated in a foreign jurisdiction? Can there be agreement on standard limitations on the liability of the opinion giver?
Not so long ago the practice of giving closing opinions to nonclients (so-called third-party legal opinions) was restricted to the United States. For example, in England the lender typically would receive an opinion that a loan agreement was valid, binding, and enforceable from its own counsel, whereas in the United States, it would be the borrower’s counsel that gives that opinion to the lender. Over the past decade, the practice of giving third-party legal opinions in cross-border transactions has spread beyond the United States, raising the question: Would it be helpful to establish some degree of uniformity in the opinion practice? It is critical, however, to strike the right balance between uniformity and respect for national practice, especially as it becomes more common that the governing law in cross-border transactions is notU.S. or English law—jurisdictions where third-party opinions have been most common—but rather the law of another country.
The program panel agreed on a number of core principles:
although parties must look primarily to advice from their own counsel to help structure financial transactions, negotiate agreements, and deal with potential legal issues, there are situations where requesting third-party closing opinions to complement that advice makes sense;
weighing the benefits of third-party legal opinions against the cost is critical;
third-party closing opinions should be limited to specific legal issues that involve the exercise of professional judgment by the opinion giver;
opinions are expressions of professional judgment, not guarantees that a court will reach the same conclusions as the opinion giver;
the specifics of a transaction may require exceptions or make it impossible to give an opinion; in such cases, if the parties wish to consummate the transaction, they must do so by accepting the risk or restructuring the terms which cause the opinion problem, not by attempting to coerce an unwilling opinion giver;; and
the meaning of an opinion must be understood in light of the customary practice in the jurisdiction of the lawyer giving it, which also shapes the diligence required to issue the opinion.
This last point is particularly important because, in some jurisdictions, customary practice may be to squeeze everything believed relevant into the four corners of the opinion letter, whereas in other jurisdictions (such as the United States) opinions may take a more streamlined form based on an understanding among the parties that matters not expressed in the opinion letter nevertheless are to be read into it. Customary practice in the United States also relies on a “golden rule” that: (1) an opinion should not be requested by counsel for the recipient if such counsel would not give the opinion if it represented the opinion giver’s client; and (2) the recipient should not be denied an opinion that lawyers experienced in the matter would commonly give in comparable circumstances.
Although the United States approach to legal opinions has its limitations, there is ever growing agreement on what third-party legal opinions should cover and what assumptions, exceptions, and qualifications are appropriate; there is no such custom in most foreign jurisdictions.Given the lack of a customary practice in cross-border transactions, applying the golden rule is even more difficult because counsel to a recipient in one jurisdiction may request an opinion that is commonly given in that jurisdiction, but not in the jurisdiction of the opinion giver. In addition, the golden rule is based on the premise that the roles of counsel for the opinion giver and the recipient could be reversed in a subsequent transaction, but this role reversal may not be as realistic in the cross-border context as it is in the U.S. domestic context. Nevertheless, the panelists agreed on a core tenet that should always apply: a closing opinion should be neither a bargaining chip between the parties, nor a zero-sum game; instead, it should be an exercise in professionalism with a limited purpose.
In light of the foregoing, the panel considered whether it makes sense to form a small working group, drawn from the growing community of lawyers active in cross-border transactions who deal regularly with third-party closing opinions to: (1) identify key practices in the most recurring jurisdictions; (2) define some broad archetypes of closing opinions; (3) define the most common areas of friction; and (4) develop common guidance to make giving and receiving cross-border opinions more consistent and less costly. The panel also considered whether the “charter” of such a cross-border working group should extend to closing opinions that counsel gives to its own client in connection with specific transactions, which may be functionally equivalent in some jurisdictions to third-party legal opinions. Developing a common lexicon might be especially helpful to in-house counsel which may have less experience than outside counsel in the area of opinion practice and may have to ensure that client checklists are met in circumstances where such lists and the law of the opinion giver’s jurisdiction may be at odds.
The interaction among members of the panel clearly illustrated both commonalities and differences among jurisdictions. For example, Canadian practitioners have led the way in developing guidance for giving and receiving cross-border opinions because many transactions involving Canadian clients have links to London or the United States, resulting in a fairly robust cross-border opinion practice in Canada. TOROG, which has been widely followed, has been instrumental in creating standard practices among Canadian law firms. Consequently, model opinion language and customary practice for Canadian lawyers engaged in transnational transactions has developed over the last 15 years and evolved into a fairly well-established body of guidance, which generally is consistent with U.S. practice. There are, however, recurring points of friction, particularly with English recipients, such as opinions in the financing context on bank regulatory matters, tax opinions, and, to a lesser extent, insolvency and creditor priority opinions. A Canadian lawyer pointed out that there are occasional requests for what he called “broad-form enforceability opinions:” an opinion under Canadian law on the enforceability in Canada of a document governed by foreign law (e.g., a loan agreement governed by English law with Canadian borrowers). The ABA Report refers to this kind of opinion as an “as if” enforceability opinion and takes a firm stand against giving such an opinion in cross-border transactions. Although Canadian lawyers sometimes give “as if” opinions, often in combination with opinions covering local enforceability of security interests in collateral located in Canada, the consensus is that Canadian lawyers would not have difficulty accepting the guidance in the ABA Report.
It also became apparent during the panel discussion that Dutch lawyers habitually give opinions to recipients in other jurisdictions when their clients engage in cross-border transactions. In the context of financing transactions involving Dutch borrowers, Dutch firms often face the issue of who should give a closing opinion that the loan agreement is valid, binding, and enforceable– lender’s counsel, as is the practice in London, or borrower’s counsel, as is the practice in the United States. Dutch lawyers tend to adopt a practical approach: when the transaction involves a U.S. lender, Dutch counsel representing the borrower is prepared to give the enforceability opinion, but when the transaction involves a U.K. lender, London practice is followed. Using both practices, however, can create difficulties for Dutch lawyers who do not participate regularly in cross-border transactions. Apparently, Belgian and Luxemburg law firms adhere to the English practice of borrower’s counsel giving opinions only on matters such as their client’s corporate status, power, and authority, whereas lender’s counsel gives enforceability and choice-of-law opinions. There seems to be well-established market practices among BeNeLux firms on giving most of the opinions discussed in the ABA Report, although friction sometimes arises on who can rely on the opinion and on limitations on the liability of the opinion giver. With respect to “as if” enforceability opinions, an experienced Dutch practitioner remarked that for the last 15–20 years, Dutch firms have given them when pressed but with significant qualifications that end up eroding coverage to something like “we are not really saying that the foreign law agreement is enforceable in the Netherlands, rather that, if the lender goes to a Dutch court, some remedy will be available.” Again, in this context there was support for the ABA Report’s position against giving “as if” enforceability opinions in cross-border transactions because they are costly and rather meaningless. Apparently, while Dutch firms generally are willing to give tax opinions in financing transactions, they often refuse to give (without facing much resistance) no-conflict, no-violation-of-law and no-litigation opinions. Some Dutch firms give a no-violation opinion limited to violations that would cause the contract to be unenforceable.
A lawyer familiar with both English and U.S. opinion practice made the point that many of the opinions identified by the panel as contentious are routine in the United Kingdom, which can result in friction when English lawyers are faced with different practice for cross-border opinions. She remarked that European lawyers have developed ways to accommodate those requests over 20 years of transactions among parties who share the commonalities of the European Union; therefore English lawyers are sometimes surprised when they face resistance from U.S. or Canadian lawyers. The conversations that ensue can be difficult, but are necessary, as evidenced by United States customary practice on issues such as withholding-tax opinions and “as-if” enforceability opinions. She also pointed out that for transactions involving English lenders, it is the in-house lawyers’ responsibility to confirm that their “standard checklist” of required items is fully satisfied; therefore, when U.S. borrower’s counsel refuses to cover an item on the list, much time can be spent explaining to the lenders’ in-house counsel how else those matters can be addressed. Similar issues arise in other countries with respect to certifications, for example, when a notary must be involved in the closing and certain matters which U.S. counsel typically does not cover (such as factual matters) must be addressed to the notary’s satisfaction.
Based on the views expressed by both panelists and members of the audience who practice in different jurisdictions, there was a consensus that a working group of lawyers experienced in requesting and preparing closing opinions in cross-border transactions could productively undertake an effort to build a common lexicon to bridge conceptual divides on issues that often make the negotiation of opinions time-consuming and unnecessarily acrimonious, such as:
the differences in approach between common law and civil law practitioners;
the nature and function of “true” closing opinions versus reasoned legal opinions versus the lawyer’s responsibility for due diligence reports;
the rights of opinion recipients versus those of nonaddressees who are given access to or allowed limited reliance on the opinion versus those of future assignees who are permitted to rely on a previously given opinion; and
the role of factual assumptions versus reliance on certificates of clients or public officials versus knowledge-based factual confirmations.
The working group could also work toward developing common ground on foundational matters, such as:
whether uniform structures can be developed for third-party closing opinions in common types of transactions;
how far assumptions can be taken (“I have no reason to doubt X” versus “I wash my hands of X regardless of reasonableness.”);
whether assumptions relate to only facts or can extend to legal matters;
how assumptions, qualifications, and exceptions differ;
when is disclosure to the opinion recipient appropriate if the law is uncertain;
whether choice-of-law and forum-selection clauses should be included in opinions; and
what fair limitations could be placed on the liability of opinion givers.
It was agreed that the working group’s analysis would transcend the law of individual jurisdictions and focus on ways for lawyers across jurisdictions to better communicate about opinion issues and that, to discover common ground, it may help to take a step back and ask:What are we trying to accomplish by asking counsel to client A in jurisdiction X to provide a legal opinion at closing to client B in jurisdiction Y who is represented by its own counsel in the transaction (who may or may not be familiar with the law of jurisdiction X)? Sometimes practitioners fail to address this basic question; focusing on it could allow both counsel and their clients to determine whether it is worthwhile to spend client A’s money on specific opinions or on a third-party opinion generally. The answer may be “yes,” but there may also be more efficient ways to satisfy client B’s concerns. On the other hand, in cross-border transactions, client B may fear unexpected results under the law of jurisdiction X and may not have its own counsel in that jurisdiction; then a third-party opinion covering agreed-upon aspects of the transaction, framed by an understanding of the customary diligence expected of the opinion giver and balanced by reasonable assumptions, qualifications, and exceptions, could be the right answer. Nevertheless, cross-border opinions are often significantly more costly than similar domestic opinions, and should not go beyond what is justified by a rigorous cost-benefit analysis. Moreover, the opinion giver cannot be expected to assume risk when it is not possible to reach “opinion-level” legal certainty on a particular issue.
The difficulty of this last point is illustrated by one member of the panel having witnessed increasing requests, primarily from civil law jurisdictions, for so-called “certifications” by counsel for a U.S. party, possibly because in those jurisdictions a notary may be responsible for certifying both the facts underpinning the transaction and the law that makes the contract valid, binding, and enforceable. When a third-party opinion is seen as part of the record before the notary, the distinction between factual confirmations and legal conclusions can blur. Although the request for a certification may be understandable, it puts the U.S. opinion giver in a difficult position because as a matter of U.S. customary practice, it is standard for a U.S. lawyer is to rely on a secretary’s or officer’s certificate without taking responsibility for the facts. That practice may be seen as problematic, at least in the eye of the recipient, because it lacks a “professional imprimatur.”
It seems important for the working group to grapple with the extent to which different jurisdictions may allow third-party opinions to be based on “customary practice” being read into the opinion without having to spell out every detail within the four corners of the document. For example, the CLLS report reads that all matters upon which an opinion is based are to be set out within the text of the opinion letter.By contrast, U.S. practitioners generally have moved toward avoiding expressing in opinion letters those matters which are well understood as a matter of customary practice. English lawyers in the audience pointed out, however, that the CLLS report represents one version of London opinion practice and, although useful and helpful, is not as authoritative as some U.S. bar groups’ reports. A Canadian lawyer on the panel pointed out that Canadian practitioners do not tend to rely heavily on unstated assumptions and scope limitations. The working group could analyze whether the courts of different jurisdictions might be willing to consider customary practice as one of the sources of evidence for resolving disputes over third-party legal opinions. If judges recognize something as “customary practice” and are prepared to use it as a benchmark for interpreting an opinion, then expert testimony would become relevant. That could be helpful, but the agreement on use of customary practice must be such as to avoid the definition of “customary practice” degenerating into a battle of the experts, where judges are left to decide whether to prefer one interpretation over another or reject all of them and do their best based solely on the wording of the opinion.
Knowing how different jurisdictions deal with this important aspect of opinion practice would lay a foundation for further work on cross-border opinions. The U.S. practitioners on the panel pointed out that they spend significant time thinking about customary practice with beneficial effects. First, customary practice can be invoked when counsel is asked to do something out of the ordinary or to give an opinion covering novel or unsettled areas of the law. Secondly, it establishes the work opinion preparers must do to support particular opinions. Thirdly, it helps define which assumptions or limitations are commonly understood to apply, whether they are stated or not. The “duly authorized” opinion offers a good example: would Canadian or English lawyers feel a need to state what U.S. lawyers typically do not (“we are only covering the requirements of the corporation law of the jurisdiction in which the company is organized, and we are not covering regulatory or other requirements that the company might have to satisfy, even though they may be applicable and relevant, despite what the opinion recipient might think if he or she simply relied on the plain meaning of the words ‘duly authorized’ without more”) because unlike U.S. lawyers they do not rely on customary practice to determine how opinion recipients should understand the scope of the words “duly authorized” in a third-party legal opinion?
Although non-U.S. lawyers on the panel generally agreed that practitioners in their jurisdiction often do have an understanding of what is covered in a legal opinion and what opinion preparers are doing to support the statements made in an opinion, what makes non-U.S. lawyers uncomfortable about relying on a customary practice concept is the wide range of contexts in which opinions are given. For example, finance lawyers may share an understanding that opinions in lending transactions do not cover tax or bank regulatory issues unless they are covered expressly, but lawyers operating in other transactional settings may lack a common understanding of what is or is not covered. As a general matter, then, an opinion giver in Canada, for example, would not be comfortable saying that an express statement with respect to the matters not covered is needed “because in Canada there is no customary practice which implies a scope limitation,” but rather would decide whether to add one based on the circumstances. It is also the case that there is limited case law in Canada on opinions.The discussion ended with consensus that, even if one starts from the position that there is no reliable customary practice and things must be spelled out, the reality is that the terms lawyers use in closing opinions are laden with special legal meaning, and no matter how much one tries, it is not possible to spell everything out. Thus, this looks like a productive area of analysis for a cross-jurisdictional working group.
The final topic the panel discussed was whether part of the effort to find common ground should address uncertainty around litigation with respect to cross-border opinions. In the United States it has been well settled for many years that opinions are neither contracts nor guarantees, and liability is predicated on the doctrine of negligent misrepresentation without any limits on liability. English lawyers routinely limit their liability to the opinion recipient, specify the choice of English law to cover disputes regarding the opinion, and insist on jurisdiction in England. That is not the practice in the United States, although all three topics increasingly have been the subject of debate. In the Netherlands, choice of Dutch law and Dutch forum selection are seen as noncontroversial because there is a strong sentiment that, when a Dutch firm renders an opinion on Dutch law, the recipient should not have the right to sue that firm in an English or U.S. court if that is where the opinion recipient happens to be. The same seems to be true in Canada, at least according to the TOROG report. There may be a compelling counterpoint, however: when a firm from jurisdiction X gives an opinion to a party in jurisdiction Y, the recipient might not be sympathetic to the concept that litigation should always take place in jurisdiction X, at least when there are significant contacts between the transaction and jurisdiction Y.
Even more complicated are issues relating to limitations on the liability of opinion givers because there is such a difference in understanding among jurisdictions as to the standards of liability of lawyers in general and of opinion givers to nonclient recipients in particular. For example, Dutch law provides that one of the considerations in awarding damages in a tort claim is what kind of insurance is in place. Thus, for a Dutch lawyer to limit liability to insurance proceeds, particularly where Dutch professional rules speak to appropriate levels of insurance coverage for lawyers, is absolutely uncontroversial. In England, lawyers mostly give opinions to their own clients, so liability is governed by the terms of engagement but for third-party opinions, where there are no such terms, opinion givers worry about potentially uncapped liability, particularly when the opinion is addressed to a party in a foreign jurisdiction and that party may turn out to have larger or broader claims than the opinion giver’s own client would not have if it were receiving the opinion. For that reason, English lawyers spell out a number of restrictions on the rights of a nonclient recipient in their opinions. It appears that it is rare in Canada for the opinion to get into matters such as forum selection, limitation of liability, and limitations on reliance principally as a result of limited experience with lawsuits against opinion givers. Moreover, it is not clear that Canadian case law on the liability of lawyers would always be favorable for opinion givers, so leaving the issue vague may be an attractive option as compared to agreeing expressly to governing-law and forum-selection language in cross-border opinions, particularly because those clauses might permit opinion recipients to bring contract-based claims, which might be a worse result.
The panel only scratched the surface on a host of other meaningful issues for lawyers who request or give legal opinions in cross-border transactions. It is undeniable that there are many substantive and procedural differences in opinion practices in different countries. Although there is no “right way,” it was agreed that understanding the differences and, ideally, promoting some measure of convergence where consistent with the legal regime of the opinion giver would seem like a worthwhile exercise. The Legal Opinions Committee of the ABA Business Law Section has authorized its leadership to pursue formation of a cross-border working group as a useful first step toward reducing the difficulties encountered in rendering opinions in cross-border transactions. Although this may be a small first step in what will be, at best, a long journey, U.S. lawyers look back at the very first attempt in Silverado, California, to deal in U.S. domestic opinion practice with many of the issues (which over the years have been resolved) with which we now wrestle anew in cross-border transactions as evidence that the journey can be successful.
This new journey is well worth undertaking for the benefit of all lawyers involved in cross-border transactions, as well as their respective clients.The fact that lawyers from, for example, the U.S. and Germany who are active in transnational transactions operate without the benefit of a largely shared conceptual framework in the same way as lawyers from New York and California is important, but need not force us to throw up our hands. We must be attentive to the tension between different legal systems, how international financial markets operate, and the fact that language barriers in legal analysis are still present even when everybody communicates in English. Nevertheless, the possibilities are exciting.
It is now time for a large number of non-U.S. companies to prepare their annual reports on Form 20-F. For companies with a calendar year-end, the Form 20-Fs must be filed with the U.S. Securities and Exchange Commission (SEC) by May 2, 2017.
To facilitate the preparation of this year’s annual reports, 20-F filers should note the following recent developments, trends, and topics that may be important focus areas of the SEC in the 2017 review process.
Trends in SEC Comment Letters in 2016
During the 2016 review process of Form 20-Fs, the SEC focused on the following themes.
Non-GAAP and Non-IFRS Disclosures
Disclosures of non-GAAP and non-IFRS measures continue to be important areas of focus for the SEC, as indicated by its comments not only on Form 20-F filings, but also on other SEC filings, such as quarterly earnings releases furnished on Form 8-K. In May 2016, the SEC updated its Compliance and Disclosure Interpretations (C&DIs) regarding the use of non-GAAP and non-IFRS financial measures and highlighted the following topics covered in comment letters to various Form 20-F filers.
Equal or Greater Prominence. The SEC has requested, as required by Regulation G and Item 10 of Regulation S-K, that a presentation of the most directly comparable GAAP financial measure must be presented “with equal or greater prominence” whenever a non-GAAP measure is disclosed. Accordingly, headings, bullets, and tables must first present the GAAP and then the non-GAAP measures (in that order). In addition, derivative non-GAAP metrics such as “adjusted EBITDA as a percentage of sales” need both reconciliation and a presentation of the comparable GAAP measure in a location of equal or greater prominence; in this case, a presentation of net income as a percentage of sales. Such presentations, to the extent they appear elsewhere in the 20-F, must also follow the same chronological order as presented in the first instance.
Reasons for Inclusion of Non-GAAP/Non-IFRS Measures. It may not be sufficient to include boilerplate language that management believes the company’s non-GAAP or non-IFRS measures provide investors with helpful supplemental information. In several comment letters, the SEC has asked companies to elaborate on the usefulness of each non-GAAP or non-IFRS measure to the specific circumstances of the company, sometimes focusing on particular adjustments.
Accurate Labeling. Measures such as “EBITDA” or “Free Cash Flow” must be labeled as “adjusted” if they include adjustments beyond those customarily made for measures with those names. Similarly, “pro forma” could only be used where such financial measures have been prepared in accordance with the SEC’s rules for pro forma financial statements in Article 11 of Regulation S-X.
Proper Adjustments and Reconciliation. In its updated C&DIs, the SEC has identified several adjustments as problematic, taking the position that certain non-GAAP adjustments, while not expressly prohibited, are presumed to be misleading. Those adjustments include, among others: normal, recurring cash operating expenses; acquisition-related expenses; and purchase accounting adjustments. In upcoming 20-F filings, companies can still provide explanations as to why such adjustments are relevant but may now face an uphill battle in retaining such adjustments.
Dealings with Sanctioned Countries
As in past years, the Office of Global Security Risk of the SEC’s Division of Corporation Finance continues to review annual reports on Form 20-F for transactions in or with countries and entities subject to sanctions implemented by the Office of Foreign Assets Control of the U.S. Department of Justice. In its comment letters (sometimes even referencing 20-F filings as far back as 2011), the SEC has required 20-F filers to disclose any past, current, and anticipated contacts with sanctioned countries, such as direct or indirect agreements, commercial arrangements, or other contacts with the governments of those countries or any entities that might be controlled by those governments. Given this practice, 20-F filers may want to review their prior filings to prepare themselves for any inquiries in this area.
In particular, the comments have instructed 20-F filers to describe the materiality of their contacts with any sanctioned countries and explain whether those contacts constitute a material investment risk for security holders. The materiality assessment should be provided in both quantitative and qualitative terms. Quantitatively, estimates should be denominated in U.S. dollar amounts of the associated revenues, assets, and liabilities for a period spanning the last three fiscal years and any subsequent interim period. Qualitatively, the disclosure should provide any information that a reasonable investor would deem important in making an investment decision, including the potential impact of the transactions on the company’s reputation and share value.
Litigation Disclosure
The SEC has continued to request 20-F filers to disclose, whenever possible, their best estimates of the potential outcome of pending litigation, and to describe the effects the outcome would have on their financial condition. In particular, where there is at least a reasonable possibility that a loss may have been incurred (in excess of the amounts already recognized), the comment letters have requested further information on the nature of the loss contingency. Additionally, the SEC has requested disclosure on a) the amount or range of reasonably possible losses in excess of amounts accrued, b) whether reasonably possible losses cannot be estimated, or c) whether any reasonably possible losses are not material to the company’s financial statements.
Where a reasonable estimate cannot be made, the SEC has requested 20-F filers to explain a) the procedures the 20-F filer undertook to develop a range of reasonably possible losses for disclosure and b) for each material matter, what specific factors are causing the inability to estimate and when the company expects those factors to be alleviated. In light of these instructions, however, the SEC has recognized that uncertainties associated with loss contingencies exist. To address this potential area of concern for companies, the SEC has allowed 20-F filers to disclose pending matters on an aggregated basis.
Impairment Charges
Impairment calculations, including the methodology and assumptions, have continued to be an area of interest for the SEC. In certain instances, the comment letters noted inconsistencies in the impairment assessment between certain impairment calculations compared against other impairment calculations performed throughout the 20-F filing. In other cases, the SEC has requested clarification on why certain segments of the company’s business were not subject to impairment pursuant to IAS 36. Where an impairment assessment was made, the comment letters instructed companies to explain which factors (including external factors such as declines in commodity prices in 2015) led companies to recognize an impairment charge.
Disclosure of Government Payments by Resource Extraction Issuers
On June 27, 2016, the SEC adopted a final rule implementing Section 1504 of the Dodd-Frank Wall Street Reform and Consumer Protection Act (the Dodd-Frank Act). Pursuant to Section 1504 of the Dodd-Frank Act (commonly known as “publish what you pay”), the SEC implemented rules requiring resource extraction issuers to disclose payments made to governments for the commercial development of oil, natural gas, or minerals.
The commercial development of oil, natural gas, or minerals is given broad scope to include stages from exploration to midstream activities, but does not extend to the final processing stages of refining and smelting. A wide range of payments, such as taxes, royalties, fees, bonuses, infrastructure payments, and community social responsibility payments, whether made in cash or in-kind, must be reported if paid to any level of government, including majority state-owned enterprises. Under the rule, payments must be disclosed by type and total amount at the project level.
The new rule will take effect for an issuer’s first fiscal year ending on or after September 30, 2018, and will require disclosure of government payment information annually in a specialized disclosure report on Form SD no later than 150 days after an issuer’s fiscal year-end. For companies with a calendar year-end, the first year of compliance will be the year ending December 31, 2018, and the filing deadline will be May 30, 2019. Reports filed in compliance with the substantially similar Canadian and European Union reporting regimes will be accepted by the SEC for purposes of compliance with the SEC rule.
Risk Factors Relating to “Brexit” and the U.S. Presidential Election
Several 20-F filers began including Brexit-related risk factors, and some (as a result of their filing date) have also disclosed potential risks relating to the results of the U.S. presidential election. Although SEC comment letters have not yet requested 20-F filers to assess any risks related to Brexit or the election, some comments directed at U.S. filers have requested consideration of those factors.
Brexit
A number of Brexit-related risk factors disclosed in 20-F filings have focused on the uncertainty surrounding the United Kingdom vis-à-vis its relation to the European financial and banking markets. Almost all risk factors explain that the withdrawal of the United Kingdom from the European Union will involve lengthy negotiations, and the uncertainty could increase volatility in the markets. Some risk factors also note that the Brexit vote is non-binding and that the United Kingdom has yet to invoke Article 50 of the Lisbon Treaty to trigger the withdrawal (which is currently expected to occur in late March of this year). Examples of Brexit risks identified by 20-F filers include: the fact that sales are denominated in British pounds the depreciation of which may impair purchasing power of European customers, potentially leading to cancellation of contracts or default on payments; restriction of imports and exports; reduction in movement of skilled professionals between the United Kingdom and the rest of the European Union; and increase in regulatory compliance costs.
U.S. Presidential Election
Results of the U.S. presidential election have led to identification of a few risk factors, namely potential changes to existing trade policies and agreements, proposed reforming of the U.S. Food and Drug Administration, potential repeal of the Patient Protection and Affordable Care Act (Obamacare) as well as perceived changes in U.S. social, political, regulatory, and economic conditions. As the SEC has continued to emphasize the need to tailor risk factors to the particular company’s circumstances, 20-F filers may need to carefully consider how potential changes in the U.S. social, political, regulatory, and economic landscape could impact the companies’ operations and financial conditions. While the result of the election may not be considered a risk itself, subsequent changes in legislation, trade policy, and economic conditions may be important considerations in drafting risk factors.
Iran Sanctions Update
On January 16, 2016, the Joint Comprehensive Plan of Action (JCPOA), which was signed among the Islamic Republic of Iran and the E3/EU+3 (China, France, Germany, the Russian Federation, the United Kingdom and the United States, with the High Representative of the European Union for Foreign Affairs and Security Policy), was implemented, lifting a number of “secondary” sanctions. However, the “primary” U.S. sanctions, which are directed primarily at U.S. persons, continue to apply, as well as certain sanctions outside the scope of the JCPOA, such as those relating to terrorism and human rights violations in Iran.
Furthermore, the results of the U.S. presidential election suggest that the lifting of “secondary” sanctions might be short-lived. The JCPOA contained a provision allowing any party to unilaterally “snap back” sanctions if it determines that Iran has violated the terms of the agreement. Although there is no public information indicating that to be the case, the JCPOA is only an executive agreement, and President-elect Trump has stated that one of his first tasks will be to withdraw from the JCPOA and reimpose the full panoply of sanctions on Iran. For European and other non-U.S. companies that have cautiously reopened commercial ties with Iran, the election considerably raises the risk that sanctions will be reimposed. Companies in the financial and oil and gas sectors face a choice of pursuing Iranian business and thereby taking the risk of facing secondary sanctions. The Office of Foreign Assets Control (OFAC), however, published Frequently Asked Questions guidance that should sanctions snap back, the U.S. government would provide a 180-day wind-down period for payments. For further details, please see our recent memo on this topic.
Even though the JCPOA has lifted certain sanctions, the current reporting company disclosure requirements under the Iran Threat Reduction and Syria Human Rights Act of 2012 (TRA) have not been eliminated. Under the TRA, any foreign private issuer that prepares annual reports on Form 20-F is required to disclose in its annual report certain of its (and its affiliates’) investments and transactions relating to the Iranian petroleum and petrochemical sectors and transactions involving the government of Iran. The company is required to disclose the nature and extent of the activity, the gross revenues and net profits attributable to the activity, and whether the activity will be continued. In addition, the TRA requires companies to continue to file separately with the SEC a notice that the disclosure of that activity has been included in the company’s annual report on Form 20-F.
SEC Updates
Updated Compliance and Disclosure Interpretations
The Division of Corporation Finance last updated its Compliance and Disclosure Interpretations in November 2016. The Compliance and Disclosure Interpretations are available here.
Updated Financial Reporting Manual
The Division of Corporation Finance last updated its Financial Reporting Manual in November 2016. The Financial Reporting Manual is available here.
The Annual Survey Working Group reports annually on the decisions we believe are the most significant to private equity and venture capital practitioners.1The decisions selected for this year’s Annual Survey are the following:
1.Prairie Capital III, L.P. v. Double E Holding Corp.(liability of fund sponsors for portfolio company fraud)
2.In re Molycorp, Inc. Shareholders Litigation(fiduciary duties in the context of the exercise of demand registration rights)
3.Halpin v. Riverstone National, Inc.(drag-along rights and waivers of appraisal rights)
4.TCV VI, L.P. v. TradingScreen, Inc.(funds available for redemption of preferred stock)
5.SIGA Technologies, Inc. v. PharmAthene, Inc.(expectation damages as a remedy for breach of an express contractual obligation to negotiate a definitive agreement in good faith)
6.Fox v. CDX Holdings, Inc.(treatment of stock options in a merger)
In this case,2the Delaware Court of Chancery dismissed several of a purchaser’s fraud-related counterclaims against a portfolio company seller based on the exclusive representations and integration clauses contained in the parties’ stock purchase agreement. In refusing to look beyond the “four corners” of the stock purchase agreement, the court found that the purchaser clearly disclaimed reliance on the seller’s extra-contractual misrepresentations.3However, the court rejected the seller’s motion to dismiss other fraud-based claims arising from representations made expressly within the stock purchase agreement.4The court also held that the purchaser’s fraud claims against certain of the officers and directors of the portfolio company and its private equity sponsors survived the purchaser’s motion to dismiss under aiding and abetting and conspiracy theories of liability.5According to the court, the purchaser’s allegations created an inference that such defendants either provided substantial assistance to, or acted in concert with, those making the stock purchase agreement’s fraudulent misrepresentations.6This decision has far-reaching implications: not only does it expose the fund sponsors of portfolio companies to potential liability for fraud claims in connection with a sale of the portfolio company based on the portfolio company’s contractual representations and warranties, but it also expands the ability of these firms to shield themselves against extra-contractual fraud claims.
BACKGROUND
Before its acquisition by Incline Equity Partners (“Incline”), Double E Parent LLC (“Double E”) was a Delaware limited liability company controlled by Prairie Capital III, L.P. and Prairie Capital III QP, L.P. (the “Prairie Funds”) and their affiliates.7The Prairie Funds were private equity funds sponsored by Prairie Capital Partners (“Prairie Capital”) and managed by Daniels & King Capital III, LLC (“Daniels & King”).8In the summer of 2011, Prairie Capital and Double E retained Livingstone Partners LLC (“Livingstone”) as their joint financial advisor in connection with a sale of Double E.9The sale process was managed by a group that included Mark B. Fortin, the chief executive officer of Double E; Jeffrey Vancura, the chief financial officer of Double E; and Christopher Killackey and Sean McNally, partners at Prairie Capital and directors of Double E.10
Throughout the initial due-diligence process, Livingstone and Double E touted Double E’s “growth story” as a focal point in attempting to appeal to potential acquirers, including Incline.11Specifically, Livingstone and Double E focused on Double E’s revenue growth in 2010 and 2011 and projected growth for 2012 and beyond.12Killackey and McNally worked in the background to control the due diligence information Double E provided to Incline.13In February 2012, Livingstone provided Incline with Double E’s financial statements, which included Double E’s actual financial results for 2011 and its interim financial results for January and February 2012.14Incline made an offer of $26.5 million contingent on Double E meeting its monthly sales goals of $3.2 million through closing at the end of March 2012.15Incline expressed doubt about the ability of Double E to satisfy this target by the middle of March because of a backlog report of Double E’s daily and cumulative sales figures for the month; however, Fortin, Vancura, and Livingstone represented to Incline that Double E had sufficient orders to meet the target.16Double E’s financial statements were falsified by Fortin and Vancura to conceal an actual shortfall.17
The parties executed a stock purchase agreement (the “SPA”) and closed the transaction on April 4, 2012.18Incline paid $27 million for Double E less $500,000, which was withheld in an escrow fund to satisfy the indemnification obligations of the parties.19Any amount remaining in this fund on June 30, 2013, was to be distributed to the Prairie Funds.20On June 28, 2013, Incline submitted a notice of various claims to the sellers’ representative, including fraud, against Double E, Double E’s management and the Prairie Funds.21Several months later, the sellers’ representative filed suit against Incline, and Incline asserted counterclaims against the Prairie Funds, Daniels & King, Fortin, and Vancura.22The counterclaims included claims of fraud against the Prairie Funds, Daniels & King, Fortin, and Vancura based on (1) extra-contractual statements, (2) extra-contractual omissions, and (3) representations made within the purchase agreement.23
ANALYSIS
Extra-Contractual Representations.The court found that a claim based on fraudulent representations that the sellers allegedly made during the sales process was foreclosed by an exclusive representations clause contained in Section 11.10 of the SPA and by an integration clause contained in Section 11.7 of the SPA.24Specifically, the exclusive representations clause defined the universe of information on which Incline could rely. Incline acknowledged that it had “conducted to its satisfaction an independent investigation of the financial condition, operations, assets, liabilities, and properties of the Double E Companies” and represented that “the representations and warranties of the Double E Parties expressly and specifically set forth in this Agreement, including the Schedules,” constituted “THE SOLE AND EXCLUSIVE REPRESENTATIONS AND WARRANTIES OF THE DOUBLE E PARTIES TO THE BUYER.”25Incline argued that it did not affirmatively disclaim reliance in the exclusive representations and reliance clauses.26The court disagreed and stated that anti-reliance language need not include any specific language such as “disclaim reliance” or other “magic words” so long as the buyer made the disclaimer affirmatively.27
Extra-Contractual Omissions.As an alternative means of avoiding the “non-reliance” provisions of the SPA, Incline argued that even if the SPA barred fraud claims based on extra-contractual representations, the non-reliance provisions did not apply to claims of fraudulent omission and concealment.28The court refused to distinguish between claims for misrepresentations and omissions for purposes of the “non-reliance” provisions of the SPA.29According to the court, any misrepresentation may be reframed for pleading purposes as an omission.30Accordingly, the exclusive representations and integration clauses precluded any fraud claim based on an extra-contractual omission.31
Accountable Defendants.The Prairie Funds, its managers, Fortin, and Vancura argued that they could not be held accountable for any misrepresentation contained in the SPA because the representations were made only by Double E.32The court disagreed, finding that Fortin and Vancura could be liable for the SPA’s misrepresentations because Incline alleged that they knew that the SPA’s representations were false and they were the agents through which Double E made its representations to Incline.33Relying on section 533 of theRestatement (Second) of Tortsand Delaware jurisprudence, the court noted, “‘[a] corporate officer or agent who commits fraud is personally liable to a person injured by the fraud. . . . Therefore, [a]n officer actively participating in the fraud cannot escape personal liability on the ground that the officer was acting for the corporation.’”34Additionally, the court found that Incline’s claims against the Prairie Funds and its managers survived a motion to dismiss because Incline alleged that the Prairie Capital directors (Killackey and McNally) had knowledge of the false nature of the representations made to Incline and actively assisted or approved the entire fraud, including the providing of false sales results to Incline.35
Secondary Liability.Furthermore, the court held that Incline sufficiently pled aiding-and-abetting fraud by the Prairie Funds and conspiracy to commit fraud by the Prairie Funds, Fortin, and Vancura.36Under the aiding-and-abetting theory, the alleged affirmative involvement of Killackey and McNally in the sales process was found to constitute the “substantial assistance” required to adequately plead this theory.37Additionally, the alleged communications among Killackey, McNally, Fortin, Vancura, and Livingstone suggested that they worked together to disclose to Incline only information that would convey continued Double E growth.38These allegations were likewise held to constitute a sufficient pleading under a conspiracy theory, which requires that the defendants act in concert for purposes of the fraudulent representations.39
CONCLUSION
ThePrairie Capitaldecision highlights for sellers the importance of having well-written disclaimer provisions within an agreement to reduce liability for fraudulent extra-contractual behavior. While the court reminds the reader that no rigid framework or exact language is required to disclaim reliance on extra-contractual statements,40the draftsman must be careful and clear to ensure the intended result. The recent decision inFdG Logistics LLC v. A&R Logistics Holdingsreemphasized this point.41In that case, the Delaware Court of Chancery held that a non-reliance provision contained in a merger agreement was ineffective to bar a buyer’s fraud claims based on extra-contractual statements made during the due-diligence and negotiation process because the non-reliance provision was formulated solely as a limitation on the seller’s representations and warranties.42According to the court, for a non-reliance provision to be effective against a buyer, it must be formulated as an affirmative promise by the buyer that it did not rely on any extracontractual statements that the seller made during the sales process.43
Even with the seemingly broadened ability to disclaim reliance on extracontractual statements, thePrairie Capital III, L.P. v. Double E Holding Corp.decision confirms that officers and directors of a portfolio company and its sponsor’s funds may be found liable for fraudulent misrepresentations made to a buyer in the course of a sale of a portfolio company, even if the sponsor did not directly communicate with or make any representations to the buyer. The extent of the sponsor’s involvement “behind the scenes” of the transaction and the level of knowledge held by the sponsor in relation to the fraudulent representations being made will determine the potential liability for the accompanying funds more than will the language of the agreement itself.
2. IN RE MOLYCORP, INC. SHAREHOLDERS LITIGATION (FIDUCIARY DUTIES IN THE CONTEXT OF THE EXERCISE OF DEMAND REGISTRATION RIGHTS)
SUMMARY
In this case,44the Delaware Court of Chancery granted the defendants’ motion to dismiss a derivative complaint in connection with a secondary stock offering of Molycorp Inc. (“Molycorp”) demanded by certain private equity investors that collectively owned 44.1 percent of Molycorp’s stock (the “Private Equity Investors”). The complaint alleged breaches of fiduciary duties by the Private Equity Investors and by the eight directors of Molycorp who facilitated the offering (the “Defendant Directors”), four of whom sold in the offering, while three others held significant positions within at least one of the Private Equity Investors.45The court assumed, without deciding, that the Private Equity Investors constituted a control group, that a majority of the Defendant Directors had disqualifying interests by reason of personal gains or relationships with the Private Equity Investors, and that demand would be excused, but the court dismissed the complaint for failure to state a claim in light of the Private Equity Investors’ clear contractual rights to take the challenged conduct.46
BACKGROUND
Molycorp is a publicly traded Delaware corporation engaged in the production and sale of rare earth oxides.47In April 2010, before Molycorp’s initial public offering (“IPO”), Molycorp’s Private Equity Investors had executed a registration rights agreement, giving them the right to have Molycorp register their shares for a secondary offering following the IPO subject to certain limitations, including Molycorp’s right to delay the offering for up to ninety days in certain circumstances.48The July 2010 IPO yielded a disappointing $360 million (short of the $478 million Molycorp had wanted to raise).49However, in September 2010, rare earth element prices spiked following China’s limits on exports and Molycorp’s stock rose, but Molycorp struggled to raise additional capital.50In May 2011, the Private Equity Investors invoked their right to a demand registration and Molycorp complied.51In the secondary offering that followed, the Private Equity Investors received approximately $575 million.52By September 2011, prices for rare earth elements fell significantly, as did Molycorp’s stock price, and the difference between cash on hand and its capital and operating budget stood at $388 million.53Molycorp proceeded to raise a further $390 million in a private offering of stock in February 2012, but the company would have raised $248 million more at the secondary offering price per share of $51.54The plaintiffs thereafter commenced a derivative action alleging, among other claims, that the Private Equity Investors and the Defendant Directors had breached their fiduciary duties by favoring their own interests over Molycorp’s, thereby closing Molycorp out of the equity markets.55In particular, the plaintiffs argued that the board of directors should either have delayed the secondary offering to allow Molycorp to hold its own offering first or at least allocated a substantial portion of the secondary offering to Molycorp.56
ANALYSIS
While the court noted that the registration rights agreement did not permit any fiduciary to breach its fiduciary duties, it found it unnecessary to determine whether a more exacting standard of review applied because its decision turned on the failure to state a claim.57The court held that, even when a form of heightened scrutiny (such as entire fairness) applies, a plaintiff cannot prevail by advancing unreasonable inferences, based on speculation or hindsight, or by making conclusory statements.58The court refused to find a breach of fiduciary duty merely because the Private Equity Investors and certain Defendant Directors failed to predict stock price movements accurately, particularly where there were no allegations that the defendants knew that the market for rare earth elements would rise and fall as dramatically as it did or that they knew the date when such price drop would occur (and prices did not, in fact, fall until a few months after the offering).59The court stated, “it is simply not wrong to sell stock knowing that ‘a pin lies in wait for every bubble,’ before a company with other opportunities decides to sell its stock.”60
In granting the defendants’ motion to dismiss, the court found it critical that the plaintiffs did not allege that the registration rights agreement was invalid or unfair. The court held that, “contending that the Private Equity Investors exercised rights that benefitted themselves, but were fairly extracted and disclosed in public filings, does not itself state a claim that the Private Equity Investors took advantage of Molycorp and its minority stockholders.”61The court commented that “a finding otherwise could discourage would-be investors from funding start-ups for fear that their investment value will not be preserved despite disclosed, carefully negotiated agreements.”62
Regarding the Defendant Directors, the court held that appointment by a powerful stockholder does not automatically render a director’s decisions suspect, nor is it wrong for a director to buy or sell company shares absent evidence of unfair dealing.63The court observed, “if such conduct was actionable, directors of every Delaware corporation would be faced with the ever-present specter of suit for breach of their duty of loyalty if they sold stock in the company on whose board they sit.”64Nevertheless, although the court did consider the plaintiff’s argument that the board of directors should have delayed the offering because of the detriment to Molycorp, it found that, despite Molycorp’s budget issues (which were not unusual for a developing company), the factual allegations did not support a finding that, during the period from May 2011 (when the demand was first made) until September 2011 (when rare earth element prices fell), Molycorp had an urgent cash need or absence of financing alternatives that would have justified delaying the registration or otherwise interfering with the contractual rights of the Private Equity Investors.65
CONCLUSION
The decision in this case recognizes the important place that registration rights occupy within the business model of private equity and venture capital firms, which typically bargain for such rights at the outset to effect an exit through a public offering, whether in connection with or following an IPO. The decision demonstrates that, in the absence of factual allegations that a controller took advantage of the minority stockholders, a court will not find the exercise of those rights or the board’s facilitation of demand offerings to be a breach of fiduciary duty. At the same time, the court recognized that the outcome may have been different if the plaintiffs had challenged the validity or fairness of the terms of the registration rights agreement or alleged facts supporting an inference that the board of directors had reason to exercise its rights to delay the offering. Accordingly, care should be taken to ensure that the terms of registration rights agreements are negotiated at arm’s length and include customary safeguards, including delay rights. Although such delay rights are typically invoked to avoid the premature disclosure of material transactions (such as mergers and acquisitions), they provide the board of directors with important flexibility to consider the impact that changed circumstances may have on previously negotiated contractual rights (akin to a fiduciary out in a public merger agreement). In the exercise of their fiduciary duties, directors (particularly those appointed by one or more demanding stockholders) should be mindful of current market conditions and the company’s cash needs when facilitating a demand registration and deciding whether such circumstances would require the exercise of delay rights.
3. HALPIN V. RIVERSTONE NATIONAL, INC. (DRAG-ALONG RIGHTS AND WAIVERS OF APPRAISAL RIGHTS)
SUMMARY
In this case,66a statutory appraisal action, the Delaware Court of Chancery declined an issuer’s request to order minority common stockholders to consent to a merger agreement, with a resulting loss of appraisal rights, notwithstanding the stockholders’ prior agreement to vote in favor of a change in control of the issuer pursuant to a drag-along provision contained in a stockholders’ agreement. The court reasoned that the issuer waited until after the merger had closed to seek the stockholders’ consent to the merger agreement in contravention of the drag-along provision that required the stockholders to prospectively consent to a merger after advance notice of the merger had been given.67Thus, the issuer failed to comply with the terms of the drag-along provision and was limited to the benefit of its bargain, which, according to the express language of the dragalong provision, did not include the right to require the common stockholders to consent to a transaction that had already taken place.68
The court also queried in dictum whether common stockholders can,ex anteand by contract, waive the right to seek a statutory appraisal of their shares, but ultimately did not address the question.69The court noted that preferred stockholders may waive appraisal rightsex anteby contract because the rights of holders of preferred stock are largely contractual in nature, but that the same rationale did not necessarily apply to common stockholders.70
BACKGROUND
This action arose from the acquisition of Riverstone National, Inc. (“Riverstone”) by the private equity firm, Greystar Real Estate Partners, LLC (“Greystar”).71The merger agreement was adopted in an action by written consent of Riverstone’s 91 percent stockholder, CAS Capital Limited (“CAS”), and became effective on June 2, 2014.72Pursuant to the terms of the merger agreement, Riverstone’s minority common stockholders were cashed out for $4.44 per share plus a contingent right to receive potential earn-out payments.73
On June 9, 2014, subsequent to the effectiveness of the merger, Riverstone first informed the stockholder plaintiffs about the merger with Greystar.74Specifically, Riverstone sent a letter to its stockholders informing them that CAS had provided the necessary stockholder approval, in an action by written consent pursuant to section 228 of the General Corporation Law of the State of Delaware (the “DGCL”), to adopt the merger agreement (the “Information Statement”).75The Information Statement also informed the minority stockholders of (1) the effectiveness of the merger, (2) their right to receive a portion of the merger consideration, and (3) the availability of appraisal rights in connection with the merger.76However, the Information Statement also stated that the merger consideration would be available only to stockholders who executed a form of written consent attached to the Information Statement (the “Written Consent”), with a resulting loss of appraisal rights.77The Information Statement explained that a 2009 stockholders agreement (the “Stockholders Agreement”) required Riverstone’s common stockholders to execute the Written Consent.78The Information Statement warned: “Riverstone further has determined that if you fail to execute and return the Written Consent you will be in breach of the provisions of the Stockholders Agreement referred to above, in which event Riverstone reserves all of its rights at law or in equity.”79
Section 3 of the Stockholders Agreement (the “Drag-Along Provision”) stated, in relevant part:
[I]f at any time the Company and/or any Transferring Stockholders propose to enter into any such Change-in-Control Transaction, the Company may require the Minority Stockholders to vote in favor of such transaction, where approval of the shareholders is required by law or otherwise sought, by giving the Minority Stockholders notice thereof within the time prescribed by law and the Company’s Certificate of Incorporation and By-Laws for giving notice of a meeting of shareholders called for the purpose of approving such transaction. If the Company requires such vote, the Minority Stockholder agrees that he or she will, if requested, deliver his or her proxy to the person designated by the Company to vote his or her Shares in favor of such Change-in-Control Transaction.80
Notwithstanding Riverstone’s attempt to invoke the Drag-Along Provision, the petitioners declined to sign the Written Consent.81On the contrary, the petitioners initiated a statutory appraisal action, seeking an appraisal of the fair value of their shares by the Delaware Court of Chancery pursuant to section 262 of the DGCL.82Riverstone counterclaimed, seeking specific performance of the DragAlong Provision.83The ruling discussed below was on the parties’ cross-motions for summary judgment on a stipulated record.84
ANALYSIS
Riverstone sought specific performance of the petitioners’ alleged obligation under the Drag-Along Provision to execute the Written Consent and accept the merger consideration, with a resulting loss of appraisal rights.85The petitioners advanced several arguments as to why the Drag-Along Provision failed to prescribe the performance sought by Riverstone.86First, the petitioners argued that a common stockholder cannot waive its statutory right to appraisalex ante— here, in a stockholders’ agreement in return for consideration that is to be set later by a controlling stockholder.87The court ultimately determined that it was not required to decide whether common stockholders could waive their statutory rights to appraisal, but not before suggesting in dicta that, unlike the issue of whether preferred stockholders may waive appraisal rights, the issue of whether common stockholders may waive appraisal rights remains an open question:
The rights of holders of preferred stock are largely contractual, and this Court has found that such stockholders may waive appraisal rights ex ante by contract. . . . The question of whether common stockholders can, ex ante and by contract, waive the right to seek statutory appraisal in the case of a squeeze-out merger of the corporation is [] more nuanced than is the case with preferred stockholders. That question has not yet been answered by a court of this jurisdiction.88
However, the court agreed with the second argument advanced by the petitioners that the defendants were not entitled to specific performance of the Drag-Along Provision after the vote on the merger had already occurred.89According to the court, the Drag-Along Provision created a prospective scheme that required Riverstone’s common stockholders to adopt a merger agreement after receiving advance notice of a proposed merger in accordance with applicable law and Riverstone’s organizational documents, rather than to consent to a merger after it became effective.90The Drag-Along Provision also did not contain an express agreement by the petitioners to waive their appraisal rights under any circumstances.91Here, Riverstone bargained for a right that it failed to exercise and could not compel the petitioners to comply with the bargain Riverstone now wished that it had struck with the petitioners.92Relatedly, the court rejected Riverstone’s attempt to use the implied covenant of good faith and fair dealing to compel its desired outcome.93According to the court, the “Supreme Court has made clear that the gap-filling function of the implied covenant does not provide relief in a situation such as this, where the Company asks the Court to imply a right for which it did not contract and should have foreseen.”94
CONCLUSION
Preferred stock financings almost invariably involve significant stockholders negotiating for a right of the majority to force the minority to join in a sale of a company. Investors view such provisions as an important protection, particularly if they seek to exit their investment and sell the company for a price that does not allow all preferred stockholders to recover their liquidation preference or provide for any value to common stockholders. While the court does not question the enforceability of such provisions, except to the extent that the provisions force a loss of appraisal rights of common stockholders, the court’s decision makes clear that an issuer or other party seeking to invoke a drag-along right must have complied with the literal terms of the drag-along right to invoke the provision.
The court’s decision casts doubt on the enforceability of waivers of appraisal rights when given by common stockholders, while confirming the enforceability of such waivers when given by preferred stockholders. Notwithstanding the court’s dictum, waivers of appraisal rights by common stockholders when fully informed may be given effect. The Delaware courts have upheld contractual waivers of other statutory rights by holders of both common and preferred stock, including waivers of some of the most significant statutory rights of all stockholders, such as the right to vote in favor of the removal of directors without cause absent a staggered board structure or cumulative voting.95The stockholders’ agreement at issue inHalpindid not expressly require the stockholders to waive their appraisal rights in connection with a merger but rather to vote in favor of a prospective merger. Thus, the court was not faced with a scenario in which the stockholders had consented to an express waiver of appraisal rights.
4. TCV VI, L.P. V. TRADINGSCREEN, INC. (FUNDS AVAILABLE FOR REDEMPTION OF PREFERRED STOCK)
INTRODUCTION
In this case,96the Delaware Court of Chancery held that factual issues surrounding a corporation’s solvency at the time holders of the company’s preferred stock demanded redemption of their shares precluded the court from granting the plaintiffs’ motion for judgment on the pleadings. In so ruling, the court rejected the preferred stockholders’ argument that section 160 of the DGCL (“section 160”), requiring that redemption be made generally out of surplus, was the sole determinant of whether a corporation was legally permitted to redeem shares of its capital stock.97Rather, as discussed below, the court recognized that the long-standing, common-law principle prohibiting a corporation from purchasing its own shares when doing so would impair its obligations to the corporation’s creditors could also prevent the redemption of preferred stock.98Therefore, the court resolved the tension between a mandatory redemption provision in the company’s certificate of incorporation and Delaware’s statutory and common law restrictions on a corporation’s ability to redeem stock in the corporation’s favor.99
BACKGROUND
The plaintiffs owned more than a majority of the Series D Convertible Preferred Stock (the “Series D Preferred Stock”) of TradingScreen, Inc. (“TradingScreen”).100Section 7 of TradingScreen’s certificate of incorporation governed the plaintiffs’ redemption rights. Specifically, Section 7.1 granted holders of a majority of the Series D Preferred Stock the right, “beginning three months prior to the fifth anniversary of the issuance of the Preferred Stock,” to demand that the company assist them in the sale of their Series D Preferred Stock “on satisfactory terms and conditions.”101If after nine months such assistance failed to result in a third-party purchase of the stock, the holders of the Series D Preferred Stock could demand that TradingScreen redeem their shares.102If TradingScreen failed to redeem the Series D Preferred Stock, the holders were entitled to interest.103
In June 2012, the plaintiffs asked for TradingScreen’s assistance in the sale of all of their preferred stock pursuant to Section 7.1 of TradingScreen’s certificate of incorporation.104TradingScreen’s board of directors formed a special committee to address the request.105When efforts to find a purchaser for the plaintiffs’ Series D Preferred Stock were unsuccessful, the plaintiffs gave written notice to the company of its demand that the company purchase its Series D Preferred Stock.106
In response to the plaintiffs’ redemption demand, TradingScreen disclosed to the plaintiffs that its special committee had engaged a financial advisor to assist the special committee in its determination of the extent to which the company could effect a redemption of the Series D preferred stock without impairing the company’s ability to continue as a going concern.107The financial advisor provided the special committee with a fifty-two-page report finding that the company could legally redeem only a portion of the shares that were the subject of the plaintiffs’ redemption demand.108Based on this advice, the special committee determined to make a partial redemption of the Series D Preferred Stock based on the amount it had determined that the company had available for that purpose.109
The plaintiffs objected and filed its suit against TradingScreen.110
ANALYSIS
The plaintiffs’ suit alleged that TradingScreen breached the redemption terms of its certificate of incorporation by not honoring plaintiffs’ redemption demand in full.111The plaintiffs also contended that the only limitation on the company’s redemption obligation was the statutory prohibition that corporations may not purchase shares of their own capital stock unless they have a statutory surplus (which the plaintiffs contended the company possessed).112Finally, plaintiffs also claimed that even if TradingScreen were not obligated to make a full redemption, the interest provisions applied to the unpaid portions.113
TradingScreen countered by arguing that, in addition to the statutory prohibitions on redemptions found in section 160, the common law prohibits a corporation from redeeming its shares “if doing so would threaten its ability to continue operating as a going concern.”114The company argued that the special committee’s business judgment as to the level of funds TradingScreen had available for redeeming the Series D Preferred Stock was entitled to deference.115TradingScreen further argued that because Delaware law prohibited the redemption of the unredeemed shares, no interest could be due to the plaintiffs for its failure to effect a full redemption.116
The court rejected the plaintiffs’ primary argument that section 160 was the sole determinant of whether and how a corporation may redeem its capital stock.117In doing so, the court held that:
While Section 160 prohibits corporations that are balance-sheet insolvent from making redemptions, a corporation can satisfy Section 160’s test despite being cash-flow insolvent (or at risk of becoming cash-flow insolvent), i.e. unable to pay its debts as they come due. In such a case, law extraneous to Section 160 limits the scope of permissible redemptions.118
Given the court’s finding that the common law prohibits a corporation from making redemptions if the corporation would be rendered cash-flow insolvent, the primary question before the court was whether the special committee had validly determined that TradingScreen did not have sufficient financial resources to continue as a going concern if it honored the plaintiffs’ redemption demand.119The court found, however, that such an inquiry was fact-laden and not amenable to resolution on a motion for judgment on the pleadings.120According to the court,
Decisions regarding a corporation’s ability to continue as a going concern are necessarily made by a board as part of a “judgment-laden exercise.” To succeed in challenging such a decision, a plaintiff “must prove that in determining the amount of funds legally available, the board acted in bad faith, relied on methods and data that were unreliable, or made a determination so far off the mark as to constitute actual or constructive fraud.121
The court also held that it was premature at this stage in the proceedings to determine whether TradingScreen was in default of its redemption obligations such that the interest provisions of the redemption provision applied.122
CONCLUSION
This case highlights the dual role that preferred stock often plays as it straddles the fence separating equity from debt. Given that hybrid role, this opinion (as well as the related opinion of the Delaware Supreme Court) makes clear that while a Delaware court will look to the contractual nature of the relationship between a corporation and the holders of its preferred stock to determine the rights of preferred stockholders, that relationship will also be subject to a statutory and common law overlay. This opinion also makes clear that a board of directors will be given fairly wide deference in deciding whether the corporation has sufficient funds to make what might otherwise be an obligatory redemption. While it is difficult to determine the precise terms that might be added to certificates of designation to validly cabin a board’s discretion in making this determination, at least as highlighted in this opinion, a differently drafted redemption provision might have provided some protection for holders of preferred stock where the corporation cannot make a complete redemption. For example, the preferred stock terms might have required the corporation to seek financing or sell assets to fund the redemption. The validity of such a provision is an open question.
5. SIGA TECHNOLOGIES, INC. V. PHARMATHENE, INC. (EXPECTATION DAMAGES AS A REMEDY FOR BREACH OF AN EXPRESS CONTRACTUAL OBLIGATION TO NEGOTIATE A DEFINITIVE AGREEMENT IN GOOD FAITH)
INTRODUCTION
In this case,123the Delaware Supreme Court held that the Delaware Court of Chancery (1) could revisit a prior decision holding that expectation damages were too speculative to award for breach of an express contractual obligation to negotiate a definitive licensing agreement in good faith and (2) correctly found that lump-sum expectation damages were not too speculative to award for breach of the term sheet.124
This case was the second appeal in a long-standing dispute that arose from a failed collaboration between the two pharmaceutical companies.125InSIGA 2, the Delaware Supreme Court clarified that during the first appeal the court resolved open points on Delaware law with respect to expectation damages in the context of agreements such as term sheets that are not final definitive agreements like a merger agreement.126The court inSIGA 2also focused on expert testimony that proved that lump-sum expectation damages were not “speculative, uncertain, contingent or conjectural.”127
BACKGROUND
In 2004, when SIGA Technologies, Inc. (“SIGA”) acquired technology for ST246, a smallpox drug, ST-246’s viability and uses were unknown.128In 2005, SIGA faced a financing shortfall, lacked the experience and employees to bring a drug to market, and faced the threat of NASDAQ delisting its stock.129
In light of those business issues, PharmAthene, Inc. (“PharmAthene”) and SIGA negotiated and entered into a non-binding term sheet for a license agreement (the “LATS”).130Pursuant to the LATS, PharmAthene would get a worldwide, exclusive license to use, develop, sell, and sublicense ST-246 in exchange for $6 million spread out over three payments (one immediate cash payment and two milestone payments) and potential royalty payments.131
The parties also successfully negotiated and agreed to (1) $3 million in bridge financing on March 20, 2006, so that SIGA could continue developing ST-246 (the “Bridge Loan Agreement”) and (2) a merger agreement on June 8, 2006 (the “Merger Agreement”) that required the parties to close the merger by September 30.132Both agreements obligated the parties to negotiate in good faith a definitive license agreement based on the LATS.133
Through the summer and fall of 2006, after agreeing to the merger agreement, SIGA (1) was awarded $5.4 million from the National Institute of Allergy and Infectious Disease, (2) announced that it had completed the first human clinical trial, (3) made well-received presentations to the Department of Defense and the Department of Homeland Security, and (4) was awarded $16.5 million from the National Institutes of Health to fund ST-246 development.134
SIGA internal e-mails made clear that SIGA regretted the planned merger because, at that point, it was clear that SIGA could successfully complete development of and eventually sell ST-246.135SIGA’s board of directors considered its options and terminated the merger.136PharmAthene, unsurprisingly, sued SIGA in the Delaware Court of Chancery.137
In 2011, the Delaware Court of Chancery held that (1) SIGA breached its contractual obligation under the Bridge Loan Agreement and Merger Agreement to negotiate in good faith a definitive license agreement as required by the LATS, (2) the parties would have agreed to a license agreement but for SIGA’s badfaith breach, (3) SIGA was liable under promissory estoppel, and (4) equitable payments were the proper remedy.138However, the chancery court found that lump-sum expectation damages were unavailable because they were too speculative, uncertain, contingent, and conjectural.139
On appeal inSIGA 1,140the Delaware Supreme Court held that Delaware law permitted a plaintiff to recover expectation damages where (i) there was a Type II preliminary agreement to negotiate in good faith and (ii) the trial record proved that the parties would have reached an agreement but for the breaching party’s bad-faith negotiations.141
The Delaware Supreme Court also affirmed the court of chancery’s finding that SIGA, in bad faith, breached its contractual obligation to negotiate a license agreement consistent with the LATS.142Moreover, the Delaware Supreme Court directed the chancery court to revisit and redetermine the damages award and, in doing so, could reevaluate expert testimony.143
As the Delaware Supreme Court noted inSIGA 2, the Delaware Court of Chancery, on remand,144did as instructed and reevaluated the evidence, leading to a $113 million award in lump-sum expectation damages to PharmAthene.145As the Delaware Supreme Court later explained in the opinion, $113 million was less than 11 percent of the $1.07 billion figure in the expert’s damages model.146According to the chancery court, there was a reasonable certainty that PharmAthene would have earned profits from selling ST-246 but for bad-faith negotiations, and such damages were calculable.147
ANALYSIS
The parties again appealed, and inSIGA 2, SIGA argued that case law prevented the chancery court from reconsidering its prior holding that lump-sum expectation damages were too speculative, and, that even if it could revisit its holding, lump-sum expectation damages were too speculative or not reasonably certain.148
With respect to SIGA’s assertion that case law prevented the chancery court from revisiting its prior holding, the Delaware Supreme Court held that the chancery court was indeed able to revisit its prior decision—the court instructed it to do just that (and reevaluate the expert’s testimony).149According to the Delaware Supreme Court, the chancery court’s factual findings supported its new damages determination.150
As for damages, the chancery court did as instructed: it reconsidered the damages award and reevaluated the expert testimony.151In doing so, it applied the right legal remedy of expectation damages to cure the contract breach.152Expectation damages are based on reasonable expectations of the parties.153The damages are measured by using the amount of money the promisee in the same position would have received if the promisor had performed.154In other words, the remedy compensates a promisee for the value that the promisee reasonably expected had the contract been fulfilled.
The Delaware Supreme Court succinctly stated that “the Court of Chancery reasonably took into account that it was SIGA’s increasingly bullish view of ST-246’s prospects based on what was known in December 2006 that caused it to commit a breach to secure more of the drug’s future value for itself than it would have had from a deal consistent with the terms of the LATS.”155Expectation damages must be “establish[ed] . . . with sufficient certainty [and cannot] be uncertain, contingent, conjectural or speculative.”156Contrary to SIGA’s assertion, a court must incorporate presumptions when determining expectation damages.157There are two aspects of expectation damages awards: (1) the “fact” of damages (i.e., there would have been some profits), which must be “reasonably certain”; and (2) the actual amount of damages, which can be less certain but must be based on legitimate calculations.158
Here, PharmAthene was positioned to profit, and the core financial terms were never in dispute even if one party sought to renegotiate the terms.159SIGA’s internal e-mails questioned the need for collaboration, and SIGA made positive public announcements that, combined with other events, made clear that at the time of the breach the parties “had a reasonable expectation that ST-246 would be commercialized in the near future.”160SIGA also stated that postbreach evidence was improperly used because the post-breach evidence was used to resolve “fatal” issues with the speculative nature of the damages.161The Delaware Supreme Court disagreed, holding that the chancery court relied on post-breach evidence only to help determine damages, not to determine if damages were speculative.162For example, although SIGA did not get the government contract until after the 2011 court trial, there was a reasonable inference that parties knew the contract was imminent at the time of breach.163
As for whether the damages were speculative, the Delaware Supreme Court highlighted certain facts to show that damages were not speculative and that the expert conducted a proper and reasonable analysis.164For example, in July 2006 SIGA announced that ST-246 was “its lead smallpox drug candidate and it had successfully completed the first planned human clinical safety trial,” SIGA had met scientific milestones and sought bridge financing because of its confidence in the drug, and additional government funding in September 2006 to complete development challenged any assertion that damages were too speculative.165In short, “SIGA believed it was on the cusp of bringing ST-246 to market.”166
CONCLUSION
SIGA 2(the 2015 decision) demonstrates that care should be taken in drafting term sheets or other preliminary documents and that obligations to negotiate in good faith should be taken seriously. In particular, if parties to a preliminary agreement agree to negotiate the final agreement in good faith but intend the material terms agreed to to be merely preliminary in nature, language disclaiming the finality or binding nature of terms should be included. Seller’s remorse, particularly that which is spelled out in internal e-mails, is not helpful. Post-breach evidence can serve to fortify an argument that certain damages are not speculative.
6. FOX V. CDX HOLDINGS, INC. (TREATMENT OF STOCK OPTIONS IN A MERGER)
SUMMARY
In a recent case challenging the acquisition of a venture-backed company,167the Delaware Court of Chancery confirmed that Delaware’s merger statutes do not effect a statutory conversion of options at the effective time of a merger. Rather, the treatment of stock options in a merger is governed by the underlying stock option plan, which must be amended in connection with a merger if the merger’s treatment of options differs from the treatment the plan contemplates.168In this instance, the parties to the merger agreement sought to provide the option holders with an amount of consideration that was defined by reference to the consideration received by the holders of common stock less an escrow holdback, even though the plan required the holders of options to receive the full fair market value of their options less the options’ exercise price.169
The court also confirmed that a standard qualification in stock option plans, requiring a corporation’s board of directors to determine the fair market value of an option for purposes of cashing out the option, could not be satisfied by informal board action, a delegation to management, or a third party.170
BACKGROUND
This class action arose from a 2011 spin-off/merger transaction pursuant to which Miraca Holdings, Inc. (“Miraca”) acquired CDX Holdings, Inc. (formerly known as Caris Life Sciences, Inc.) (“Caris”) for $725 million (the “Merger”).171David Halbert, the founder of Caris, owned 70.4 percent of Caris’s fully diluted equity, largely held in the form of preferred stock.172JH Whitney VI, L.P., a private equity fund (“Fund VI”), owned another 26.7 percent of Caris’s fully diluted equity, whose holdings also largely consisted of preferred stock.173Most of the remaining approximately 2.9 percent of Caris’s fully diluted equity took the form of stock options held by employees of Caris.174
Immediately before the Merger, Caris spun off two of its three subsidiaries (“SpinCo”) to its stockholders (the “Spin-Off”).175In the Merger, Miraca paid $725 million for what was left of Caris (“RemainCo”), with Halbert and Fund VI receiving total proceeds of approximately $560 million, including the liquidation preference of their preferred stock.176Each share of common stock was converted into the right to receive $4.46 in cash.177Each option was terminated with the right to receive the difference between $5.07 per share and the exercise price of the option, minus 8 percent of the total option proceeds, which were held back to fund an escrow account from which Miraca could satisfy indemnification claims brought post-closing.178Of the $5.07, $4.46 was for RemainCo; the remaining $0.61 was for SpinCo.179
Under the terms of Caris’s 2007 Stock Incentive Plan (the “Plan”), in the event of a merger, each option holder was entitled to receive the amount by which the fair market value of the subject shares, as determined by the Caris board, exceeded the exercise price.180Caris was supposed to adjust the options to account for the Spin-Off.181The board’s good-faith determinations of fair market value were to be conclusive unless found to be arbitrary and capricious.182
In this action, plaintiff, a holder of Caris options, alleged that Caris breached the Plan in allocating merger consideration to the option holders in three respects: (1) members of management, rather than the company’s board of directors, determined the fair market value of the options; (2) the valuation per share attributed to the spun-off subsidiaries was made in bad faith and resulted from an arbitrary and capricious process; and (3) a portion of the option consideration was placed in an escrow holdback.183In this post-trial decision, the court found in favor of the plaintiff on all three claims.184
ANALYSIS
With respect to the first alleged breach of the Plan, the court found that the Caris board abdicated its responsibility to determine the fair market value of the options.185According to the court, the determination was made by a single officer working in conjunction with Caris’s tax advisor, PricewaterhouseCoopers, with a single director then giving perfunctory approval. At no point did the Caris board (or a duly authorized committee of the board) properly review or determine the options’ fair market value as required by the Plan. Accordingly, the court found that Caris had breached the Plan.186
With respect to the second alleged breach of the Plan, the court found that Caris’s determination as to the fair market value of the options was either made in bad faith or was arbitrary and capricious because Caris determined the fair market value using a figure manufactured by Caris to result in zero tax liability for the Spin-Off, which did not actually reflect the fair market value of the options.187
With respect to the third alleged breach of the Plan, the court found that the terms of the Plan governed Caris’s treatment of options in a merger, not the merger agreement.188According to the court, section 251(b)(5) of the DGCL permits a merger agreement to convert shares of a corporation into the right to receive consideration that incorporates the outcome of an indemnification mechanism.189However, “[o]ptions are not shares, and option holders are not stockholders.”190Instead, options are contractual rights granted under section 157 of the DGCL, and “the rights and obligations of the parties to the option are governed by the terms of their contract.”191Under the Plan, the Caris board was permitted to terminate the options in connection with a merger if it paid the option holders the difference between the fair market value of the common stock underlying the option and the exercise price of the option.192The Plan did not provide for an escrow holdback. Caris was therefore obligated to pay the class the full amount of the difference between the fair market value and the exercise price of the options at issue.193
The court found that plaintiff’s options had a value of $6.57 per share and awarded the plaintiff class total damages in an amount equal to $16,260,332.77, plus interest.194
CONCLUSION
Acquisitions of venture-backed companies, which are structured as mergers, frequently involve creating an escrow holdback to satisfy the buyer’s post-closing indemnification claims. Payments to option holders are often subject to the escrow. This decision confirms that payments to holders of options may not be subject to an escrow or otherwise differ from the consideration payable to the holders of options under the underlying stock option plan unless the plan expressly so provides.
__________
* Lisa R. Stark, of K&L Gates LLP, chairs the Working Group and the Jurisprudence Subcommittee. Contributors of written summaries in this year’s survey, in addition to Ms. Stark, are Richard Renck from Duane Morris LLP, Michael Moeddel from Keating Muething & Klekamp PLL, Lisa Murison from Stradling Yocca Carlson & Rauth, and Scott F. Rissmiller from Hogan Lovells US LLP.
1. To be included in the survey, cases must meet the following criteria: (a) the decision must address either a preferred stock financing or a change in control of a company that had previously issued preferred stock; or (b) the court must (i) interpret preferred stock terms, (ii) interpret a statute pertaining to a preferred stock financing, or (iii) address a breach of fiduciary duty claim brought in the context of a transaction described in (a) above.
2. Prairie Capital III, L.P. v. Double E Holding Corp., 132 A.3d 35 (Del. Ch. 2015).
95. Klaassen v. Allegro Dev. Corp., C.A. No. 8626-VCL, 2013 WL 5739680, at *26 (Del. Ch. Oct. 11, 2013) (enforcing a provision contained in a stockholders’ agreement pursuant to the terms of which certain stockholders of a Delaware corporation agreed not to vote in favor of the removal of directors except for cause notwithstanding the requirement, contained in section 141(k) of the DGCL, that all directors, serving on non-staggered boards without cumulative voting, be removable with or without cause),aff’d, 106 A.3d 1035 (Del. 2014).
96. TCV VI, L.P. v. TradingScreen, Inc., C.A. No. 10164-VCN, 2015 Del. Ch. LEXIS 108 (Feb. 26, 2015).
121.Id. at *22 (internal quotations omitted). The Delaware Supreme Court rejected an interlocutory appeal of this decision.SeeTCV VI, L.P. v. TradingScreen, Inc., 115 A.3d 1216 (Del. 2015). In the opinion rejecting the appeal, the supreme court reaffirmed that “when a board decides on the amount of surplus available to make redemptions, its decision is entitled to deference absent a showing that the board: (1) acted in bad faith, (2) relied on unreliable methods and data, or (3) made determinations so far off the mark as to constitute actual or constructive fraud.”Id.at 1217.
122.See TCV VI, L.P., 2015 Del. Ch. LEXIS, at *22–26.
123. SIGA Techs., Inc. v. PharmAthene, Inc., 132 A.3d 1108 (Del. 2015) (“SIGA 2”).
137.Id.at 1117–18; PharmAthene, Inc. v. SIGA Techs., Inc., No. 2627-VCP, 2011 WL 4390726, at *1–2, *8–13 (Del. Ch. Sept. 22, 2011) (this matter was heard after the 2008 ruling on a motion to dismiss).
140. SIGA Techs., Inc. v. PharmAthene, Inc., 67 A.3d 330 (Del. 2013).
141. The court borrowed the concept of “Type I” and “Type II” agreements from federal court decisions interpreting New York law. In a Type I agreement, the “parties agree on all the points that require negotiation (including whether to be bound) but agree to memorialize their agreement in a more formal document.”Id.at 349 n.82 (citing Adjustrite Sys., Inc. v. GAB Bus. Servs., Inc., 145 F.3d 543, 548 (2d Cir. 1998)). In a Type II agreement, the “parties agree on certain major terms but leave other terms open for further negotiation.”Id.at 349 (citingAdjustrite Systems, 145 F.3d at 548). In contrast to the fully binding nature of Type I agreements, Type II agreements bind the parties “to negotiate the open issues in good faith” but do not commit the parties to reaching a final contract.Id.(citing Teachers Ins. & Annuity Ass’n of Am. v. Tribune Co., 670 F. Supp. 491, 498 (S.D.N.Y. 1987)).
143.Id.at 333–34, 346, 353 (reversing the holding with respect to promissory estoppel because it does not apply when a fully integrated, enforceable contract already exists governing the promise at issue).
144. SIGA Techs., Inc. v. PharmAthene, Inc., 132 A.3d 1108, 1110–11 (Del. 2015); PharmAthene, Inc. V. SIGA Techs., Inc., No. 2627-VCP, 2015 WL 220445, at *1–2 (Del. Ch. Jan. 15, 2015) (final remand order).
152.Id.at 1130, 1136–39. In 2011, the chancery court ruled that expectation damages were not appropriate because damages were too speculative. PharmAthene, Inc. v. SIGA Techs., Inc., No. 2627-VCP, 2011 WL 4390726, at *31–33 (Del. Ch. Sept. 22, 2011).
153.SIGA 2, 132 A.3d at 1130 (quoting Duncan v. Theratx, Inc., 775 A.2d 1019, 1022 (Del. 2001)).
Over six years have passed since the creation of a class of investment advisers exempt from registered investment adviser requirements, or “exempt reporting advisers,” under the Dodd-Frank Act. In that time the U.S. Securities and Exchange Commission (SEC) has enhanced its examination and investigations of private investment funds and their investment advisers. For example, in the first half of 2016, a number of SEC cases focused on lack of adequate cybersecurity, investment advisers’ failure to disclose fees, misuse of investor funds, and the failure of fund administrators to appropriately respond to red flags. On May 12, 2016, Andrew Ceresney, the director of the SEC’s Division of Enforcement, stated that securities regulators should focus on private equity enforcement due to the “unique characteristics” of private equity funds, including restrictions on the ability of fund investors to withdraw their investments.
“Exempt reporting advisers” in particular are a topic of interest among the SEC’s Enforcement Division due to their growing popularity among the investment adviser community. In a 2011 release implementing the Dodd-Frank Act’s new rules for exempt reporting advisers, the SEC indicated that they would not be subject to routine SEC examinations, a position that corroborated a previous statement made by former SEC Chairman Mary Schapiro. However, on November 20, 2015, Marc Wyatt, the director of the SEC’s Office of Compliance, Inspections, and Examinations (OCIE), announced that OCIE would in fact begin examining exempt reporting advisers as part of its routine examination program.
Given the likely prospect of heightened scrutiny, current and aspiring exempt reporting advisers should be aware of applicable filing and compliance requirements and best practices to better serve their customers and avoid falling afoul of federal and state regulations.
What Is an Exempt Reporting Adviser?
Investment advisers must register with either federal or state securities authorities, depending on the amount of assets under management. “Small advisers” (with under $25 million in assets) may register only with state securities authorities. “Large advisers” (with over $110 million in assets) and certain “mid-sized advisers” (with $25 to $110 million in assets) must register with the SEC unless they fall under the “Private Fund Adviser Exemption” or “Venture Capital Adviser Exemption” to registration, each of which were created by amendments enacted under the Dodd-Frank Act to the Investment Advisers Act of 1940 (the Advisers Act).
The Private Fund Adviser Exemption is available to advisers based in the United States that solely manage private funds and have less than $150 million in assets under management. A “private fund” is an issuer of securities that would be an “investment company” but for the exceptions in Sections 3(c)(1) and 3(c)(7) of the Investment Company Act of 1940 (the Investment Company Act)—that is, an investment fund limited to 99 accredited investors or exclusively qualified purchasers, respectively. The Venture Capital Adviser Exemption is available to investment advisers that solely advise venture capital funds. A “venture capital fund,” as defined in the Advisers Act, is a private fund that: (i) invests no more than 20 percent of its total capital in assets other than qualifying investments (meaning equity securities issued by a nonreporting or foreign-traded portfolio company that are directly acquired by the venture capital fund) and short-term holdings (i.e., cash and cash equivalents, U.S. Treasuries with remaining maturities of 60 days or less, and shares of registered money-market funds); (ii) is not leveraged; (iii) does not offer its investors liquidity rights except in extraordinary circumstances; (iv) is not registered under the Investment Company Act; (v) has not elected to be treated as a business development company; and (vi) represents that it follows a venture capital strategy.
Investment advisers that meet either the Private Fund Adviser Exemption or the Venture Capital Adviser Exemption are known as “exempt reporting advisers” (ERAs). ERAs are not subject to the same federal or state registration procedures as other investment advisers, but must still register with and report to securities regulators and satisfy certain compliance requirements.
Federal Registration Process
An ERA is required to file with the SEC and does so by completing and filing Form ADV—the same registration document submitted by registered investment advisers (RIAs). However, instead of the entire form, ERAs complete only certain items in Part 1A, along with corresponding schedules. These items disclose, among other things, basic identifying information about the ERA (e.g., its legal name, principal office, and place of business), details about the size of any private funds it advises, other business interests of the ERA and its affiliates, and disciplinary history of the ERA and its employees. In particular, an ERA must identify “control persons” that directly or indirectly control it.
Form ADV is electronically filed, and the information provided on it is available to the public on the Investment Adviser Registration Depository, operated by the Financial Industry Regulatory Authority. An ERA must complete and file Form ADV with the SEC (and pay associated filing fees) within 60 days of the date on which the investment adviser commences an advisory relationship with its first fund. Form ADV must be updated at least annually within 90 days of the ERA’s fiscal year, and more frequently following any material developments described therein. ERAs relying on the Private Fund Adviser Exemption must include any updates to their valuation of the private fund assets under management to determine whether the exemption is still applicable. If an ERA determines that it no longer manages under $150 million in assets, it is given a 90-day grace period to file an application for registration with the SEC.
State Registration Process
A number of states require ERAs that have a place of business and a minimum number—typically five or six—of investment advisory clients (i.e., private or venture capital funds) in-state to make additional filings, to pay fees, and to report to state securities authorities when filing or amending their Form ADV. Although specific state requirements vary, as a general rule, SEC Rule 222-1(a) defines the term “place of business” as an office or other location held out to the public as a location in which the investment adviser regularly provides investment advisory services or solicits, meets with, or otherwise communicates with clients. These “notice filings” may be accomplished by the ERA selecting the relevant states on Item 2.C of Part 1A of the Form ADV, which will automatically send the form to those states. It is important for the ERA to determine whether it is subject to notice filing requirements in individual states. If required to register with one or more state securities authorities, an ERA must complete the entire Form ADV for the SEC registration.
Advisers who are exempt from investment adviser registration with the SEC must still comply with applicable state law. Many states have adopted exemptions for venture capital advisers and private fund advisers that are similar to the federal exemptions. An ERA should check with the state in which it conducts investment advisory activities to determine whether there is a state exemption and what, if any, compliance requirements exist at that level. The North American Securities Administrators Association (NASAA) provides information about state investment adviser laws and rules on its website (www.nasaa.org). NASAA has also issued model state ERA registration rules, modified versions of which have been or are being implemented by a number of states.
Compliance Requirements and Best Practices
ERAs are not subject to some of the Advisers Act provisions regarding registration, recordkeeping, or performance that apply to RIAs. However, ERAs have fiduciary responsibilities to their clients and must abide by certain other compliance requirements applicable to all investment advisers, including anti-fraud rules and pay-to-play provisions. Furthermore, adopting certain best practices as described below can help an ERA stay on the right track and protect itself and its clients.
1. Anti-Fraud Requirements
An ERA should be forthcoming and honest with clients about its services to avoid falling afoul of its fiduciary obligations, which are set forth in Sections 206(1) and 206(2) of the Advisers Act. It is unlawful for any investment adviser, whether an ERA or RIA, to use any device, scheme, or artifice in order to defraud a client or a prospective client. Investment advisers must also refrain from engaging in any transaction, practice, or course of business that operates as a fraud or deceit upon a client or a prospective client. Examples of practices that run afoul of the anti-fraud rules include promising clients a guaranteed return from an equity investment or making false statements about the ERA’s investment history (once a client loses her money, she is not going to be sympathetic to claims that the ERA was merely “puffing”). Advisers Act Rule 206(4)-8 makes it a fraudulent, deceptive, or manipulative act or practice for any investment adviser, whether an ERA or a RIA, to make any untrue statement of material fact or omit a material fact such that a statement to an investor or potential investor becomes misleading, or otherwise engages in any act, practice, or course of business that is fraudulent, deceptive, or manipulative with respect to any investor or prospective investor. ERAs must be wary of conduct that poses conflicts of interest, such as tradeoffs between clients or tradeoffs between a client and other business dealings of the adviser, its affiliates, or their principals, officers, directors, employees, or other agents. Although ERAs are not subject to specific restrictions on advertising, general fiduciary obligations (as well as sound business practices) require avoiding misleading statements, such as through selectively cherry-picking performance information when soliciting investors. To prevent misuse of information regarding investments, ERAs should institute policies and procedures against insider trading.
2. Pay-to-Play Requirements
ERAs are subject to Advisers Act Rule 206(4)-5, which prohibits certain investment advisers from engaging in pay-to-play practices (i.e., being compensated for investment advisory services to a government entity or official after making political contributions to the same). Rule 206(4)-5, which is modeled after the Municipal Securities Rulemaking Board’s pay-to-play rules applicable to broker-dealers, imposes three main conditions on ERAs. First, investment advisers and their associates are subject to a two-year “cooling-off” period after making a contribution to an official of a government entity before the adviser can receive compensation for providing advice to the government entity. Second, investment advisers are not allowed to use third-party solicitors who themselves are not subject to pay-to-play restrictions. Finally, investment advisers may not solicit or coordinate campaign contributions from others (a practice known as “bundling”) for officials of a government entity to which the adviser provides or is seeking to provide services.
3. Anti-Money Laundering Requirements
Unlike broker-dealers and mutual funds, investment advisers are not subject to the anti-money laundering (AML) program requirements imposed by the USA PATRIOT Act, the Money Laundering Control Act of 1986, or the Bank Secrecy Act of 1970. However, due to counterparty risk management, investment funds often wisely refuse to do business with investment advisers that do not have AML programs of their own. Furthermore, U.S. investment advisers, including ERAs, are subject to the rules promulgated by the Office of Foreign Asset Control (OFAC) of the U.S. Treasury Department, which prohibits investment advisers from doing business with individuals and entities on OFAC’s list of “Specially Designated Nationals and Blocked Persons.” Investment advisers must ensure that they do not accept those individuals or entities as clients and must notify OFAC of any suspect clients or transactions.
Although not required by law, an investment adviser should conduct routine employee AML training to identify and report suspicious activity and should also implement a customer identification and due diligence program. The latter likely will involve obtaining appropriate AML documentation from prospective and existing investors. For example, an investment adviser may require natural persons with whom the adviser has not established a prior relationship to provide notarized signatures on his or her subscription agreement or a notarized copy of a driver’s license or passport.
4. Recordkeeping, Examinations, and Proxy Voting
Section 204 of the Advisers Act requires investment advisers to make and keep records and to make and disseminate such reports as the SEC may require. Although the SEC has yet to establish recordkeeping rules specific to ERAs, it is possible future ERAs could be subject to recordkeeping requirements.
The SEC has the legal authority to examine an ERA’s books and records. Historically, it has limited its examinations to those “for cause,” in which the SEC believed or had reason to believe there was wrongdoing (likely through tips, complaints, or referrals). However, as of November 20, 2016, the SEC has begun examining ERAs as part of its routine examination program. Thus, even ERAs without red flags could be subject to the scrutiny of the SEC’s Office of Examination and Compliance.
Given the SEC’s interest in this area (as well as for practical business reasons), it is advisable for ERAs to maintain most, if not all, of the records RIAs are required to maintain under Advisers Act Rule 204(2). These records include general and auxiliary ledgers, records of communications, financial records, purchases and sales, bank and custodial statements, evidence of political contributions, disciplinary records, policies and procedures, supervisory or operational procedures, and any other records one might expect an SEC examination team to request during an on-site inspection. Investment advisers should retain records for at least five years, and such records should be easily accessible for at least the first two years. Records may be maintained on paper or on micrographic or electronic media in accordance with Rule 204-2(g).
The SEC does not require ERAs to establish a written proxy voting policy, which RIAs usually file in Part 2A of Form ADV. However, certain states do require investment advisers doing business within their borders, including ERAs, to comply with recordkeeping requirements, including rules relating to proxy voting policies. ERAs should check the relevant states’ securities regulations to ensure they are in compliance with all applicable requirements.
5. Protecting Investor Privacy
ERAs and RIAs are both subject to rules promulgated under the Gramm-Leach Bliley Act that govern maintenance of investors’ personal information. Unlike RIAs, which are subject to privacy rules issued by the SEC, ERAs, along with broker-dealers and state-registered investment advisers, are subject to privacy rules issued by the Federal Trade Commission (FTC). The FTC privacy rules require ERAs to “develop, implement and maintain a comprehensive information security program that is written in one or more readily accessible parts.” In particular, ERAs must identify reasonably foreseeable risks to the security, confidentiality, and integrity of customer information, design and implement information safeguards, test and monitor these safeguards, and make adjustments as needed. Additionally, one or more employees must be appointed to coordinate the program, which could prove burdensome for ERAs that are individuals or smaller entities short on human resources.
ERAs are required to send initial privacy notices to investors along with standard fund documents describing their privacy policies and procedures. In addition, ERAs must send investors annual privacy disclosures, except when the ERA: (i) only shares investors’ nonpublic personal information with unaffiliated third parties that do not require an opt-out right be provided to investors under the Fixing America’s Surface Transportation Act (the FAST Act); and (ii) has not changed its privacy policies and procedures since its last privacy disclosure. Under the FAST Act, opt-out rights need not be provided to investors when information is shared with insurance rate advisory organizations, ratings agencies, consumer agencies, attorneys, accountants, auditors, and others determining industry standards; unaffiliated third parties providing services for or on behalf of the ERA; or for the purpose of fraud prevention or to comply with federal, state, or local laws.
6. Adoption of a Compliance Manual and Code of Ethics
Under Advisers Act Rule 206(4)-7, RIAs must adopt, review annually, and designate a chief compliance officer (CCO) to administer written policies and procedures to prevent violations of federal securities laws. Further, RIAs must adopt and enforce codes of ethics applicable to their “supervised persons,” which, as defined under the Advisers Act, include partners, officers, directors, employees, or other individuals who provide investment advice on behalf of the investment adviser and are subject to its supervision and control. Codes of ethics are meant to prevent misconduct by reinforcing fiduciary principles that govern the conduct of investment advisory firms and their personnel.
In contrast, ERAs are not required to adopt or implement compliance policies or procedures. However, doing so is considered a “best practice,” as internal compliance is the first line of defense against a violation of the securities laws to which ERAs are subject. If an ERA does decide to take this recommended route and adopt policies and procedures, these should be followed regardless of whether they are required by law. When the SEC conducts an examination, it will ask for—and will want to see evidence the ERA is complying with—all of an ERA’s policies and procedures.
Compliance policies often include an employee manual and code of ethics. These documents impose obligations on an ERA’s employees, contractors, and supervised persons to ensure that the ERA is in compliance with insider trading, pay-to-play, and privacy and confidentiality requirements, among others. For example, a compliance manual may require that an ERA’s supervised persons provide regular updates on the contractor’s equity or debt interests in any portfolio companies they recommend for investment by a fund the ERA advises. The documents may include other restrictions, such as limits on gifts an employee may accept, a conflicts-of-interest policy, and a catch-all provision for employee conduct.
It is important to note that the constraints imposed by an ERA compliance manual on supervised persons can be a major impediment to attracting talented investment professionals. For example, a small, recently formed ERA that is reliant on due diligence by supervised persons to advise investment funds may find it difficult to attract big-name investment or industry experts if the ERA’s compliance manual requires those supervised persons to attend quarterly, multiday training sessions on insider trading. An ERA should consult with counsel and take care to balance precautionary measures while maintaining a competitive edge against other investment advisers.
Codes of ethics typically designate a CCO, set forth the CCO’s responsibilities, and instruct employees to report to the CCO any potential violation of the investment adviser’s compliance manual or code of ethics, or other suspected wrongdoing. If an ERA appoints a CCO, the CCO’s name and contact information must be included in Form ADV along with the ERA’s basic identifying information. To the extent possible, a CCO should be a different individual than the manager, president, or chief executive officer of the ERA to avoid the appearance of conflicts of interest at the higher levels of the ERA’s organizational structure. Appearance of conflicts should not, however, hinder the relationship between a CCO and general counsel and outside general counsel, which is critical for a CCO to provide proper guidance and take corrective action. An ERA may even appoint its general counsel as CCO for economies of scale, although in such cases its general counsel/CCO must take care to remember which “hat” is being worn at a given moment to prevent any waivers of attorney-client privilege. Although an ERA that is a small entity, bereft of a general counsel, could theoretically engage outside counsel to serve as CCO, it would likely be very difficult for outside general counsel to enter into such a committed relationship while maintaining a separate law practice.
7. Other Investment Adviser Regular Updates
There are a number of other compliance obligations that all investment advisers, including ERAs, should bookmark in their calendars for review and possible action. This is not an exclusive list of an ERA’s recurring responsibilities, but they are important to note.
ERAs engaged in ongoing securities offerings should remember to ensure that information provided in their Form D and annual Form ADV filings is up to date, which may entail mandatory annual renewal of any state blue sky notice filings. These amendments should also be made when there have been any material changes to information previously provided.
ERAs may need to modify disclosures made in marketing materials and offering documents (e.g., partnership or operating agreements, private placement memoranda, and subscription agreements) to ensure that they remain consistent with and representative of the adviser’s business. For example, carried interest, fees, and expense allocations should conform to offering documents and communications with investors. Modifications to fund documents often are made through the use of side letters.
ERAs should conduct ongoing monitoring of equity participation by “benefit plan investors,” as defined under the Employee Retirement Income Security Act of 1974 (ERISA), to ensure that their investment funds are not deemed to include “plan assets” (thereby becoming subject to ERISA rules). ERAs should also send “venture capital operating company” or “real estate operating company” certifications to investors if so agreed upon in the fund documents, and may consider seeking an annual representation from all investors that there has been no change in their eligibility to participate in profits and losses from new issues.
ERAs, like investment funds and their general partners, should also obtain updated certifications and annually review their “bad actor” obligations under Rule 506(d) of Regulation D. Due diligence, including background checks and questionnaires, should be conducted on any service providers. ERAs should also monitor regulatory developments at the federal level and in the states in which they do business.
Conclusion
As evident by the rules and restrictions described in this article, “exempt reporting adviser” is somewhat of a misnomer. Although RIAs may have more onerous registration and reporting requirements, there are many regulatory pitfalls for ERAs at both the federal and state level. Adopting compliance policies and procedures to the extent practicable can help an ERA prevent securities laws violations, protect investors’ investments and privacy, instill investor confidence, and even help the ERA’s business run smoothly. Although it may seem like an administrative hassle initially, adopting a strong, yet flexible set of compliance policies and procedures will ultimately benefit new and up-and-coming ERAs.
On May 11, 2016, President Obama signed the Defend Trade Secrets Act (DTSA) into law. This important new legislation creates a federal, private, civil cause of action for trade-secret misappropriation in which “[a]n owner of a trade secret that is misappropriated may bring a civil action . . . if the trade secret is related to a product or service used in, or intended for use in, interstate or foreign commerce.” Defend Trade Secrets Act of 2016, S. 1890, 114th Cong. § 2 (2016). The DTSA enjoyed wide, bipartisan support leading up to its enactment, passing in the House by a vote of 410-2 and passing unanimously in the Senate. For the first time, the DTSA gives American companies the opportunity to protect against and remedy misappropriation of important propriety information in federal court. Businesses should be aware of the salient provisions of the DTSA discussed below in order to adequately prepare to employ the protections of the DTSA.
A Federal Cause of Action
Before the enactment of the DTSA, in the absence of diversity jurisdiction or an independent federal cause of action, companies seeking redress for trade-secret misappropriation had no choice but to sue in state court, where laws protecting against trade-secret misappropriation tend to differ from state to state both in the text of the laws themselves and in their application. For instance, the definition of “trade secret” differs from state to state, and different statutes of limitations may apply, and different remedies may be available for trade-secret misappropriation. The DTSA provides a uniform statute to be applied nationwide in federal court. Although the DTSA will not preempt existing state trade-secret laws, it gives companies the powerful option of filing suit in federal court, thus adding an important additional tool for American companies, especially those with a national footprint, to enforce their intellectual property rights.
Definition of Trade Secret and Misappropriation
The DTSA provides uniform definitions for the critical terms “trade secret” and “misappropriation.” The DTSA’s definition of trade secret is broad, allowing a wide range of proprietary information to fall within the purview of trade-secret protection under the statute. Specifically, trade secret is defined as: “all forms and types of financial, business, scientific, technical, economic, or engineering information, including patterns, plans, compilations, program devices, formulas, designs, prototypes, methods, techniques, processes, procedures, programs, or codes, whether tangible or intangible, and whether or how stored, compiled, or memorialized physically, electronically, graphically, photographically, or in writing if (A) the owner thereof has taken reasonable measures to keep such information secret; and (B) the information derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable through proper means by, another person who can obtain economic value from the disclosure or use of the information.”
The acts that constitute misappropriation are also described specifically, giving welcome guidance to litigants. Under the DTSA, misappropriation is defined as follows:
acquisition of a trade secret of another by a person who knows or has reason to know that the trade secret was acquired by improper means; or
disclosure or use of a trade secret of another without express or implied consent by a person who—
used improper means to acquire knowledge of the trade secret;
at the time of disclosure or use, knew or had reason to know that the knowledge of the trade secret was—
derived from or through a person who had used improper means to acquire the trade secret;
acquired under circumstances giving rise to a duty to maintain the secrecy of the trade secret or limit the use of the trade secret; or
derived from or through a person who owed a duty to the person seeking relief to maintain the secrecy of the trade secret or limit the use of the trade secret; or
before a material change of the position of the person, knew or had reason to know that—
the trade secret was a trade secret; and
knowledge of the trade secret had been acquired by accident or mistake.
Civil Seizure and Other Remedies
One provision of the new DTSA that has generated much commentary in the run up to its enactment is the new civil seizure mechanism established by the statute. The civil seizure mechanism is a preventative tool employed prior to a formal finding of misappropriation in which a court, on ex parte application by a trade-secret owner, may “issue an order providing for the seizure of property necessary to prevent the propagation or dissemination of the trade secret that is the subject of the action.” Using this tool, an American company aware of a potential misappropriation of its trade secrets may be able to quickly prevent further dissemination of that proprietary information during the pendency of a DTSA case. Following issuance of a seizure order, the court is required to hold a seizure hearing wherein the party who obtained the seizure order has the burden to prove the facts underlying the order. Civil seizure may be ordered only in “extraordinary circumstances” and requires a showing that:
an order pursuant to Fed. R. Civ. P. 65 or other equitable relief would be inadequate;
an immediate and irreparable injury will occur if seizure is not ordered;
harm to the applicant from denial of a seizure order: (1) outweighs the harm to the person against whom seizure is ordered; and (2) substantially outweighs the harm to any third parties by such seizure;
the applicant is likely to succeed in showing that the person against whom the order is issued misappropriated or conspired to misappropriate a trade secret through improper means;
the person against whom the order will be issued has possession of the trade secret and any property to be seized;
the application describes with reasonable particularity the property to be seized and, to the extent reasonable under the circumstances, the property’s location;
the person against whom seizure is ordered would destroy, move, hide, or otherwise make such property inaccessible to the court if put on notice; and
the applicant has not publicized the requested seizure.
Upon a finding of misappropriation of a trade secret, the statute provides for additional remedies. A court may grant an injunction to prevent any actual or threatened misappropriation, provided that the injunction does not “prevent a person from entering into an employment relationship,” and that any conditions placed on employment are based on “evidence of threatened misappropriation and not merely on the information the person knows.” Where appropriate, an injunction may require affirmative actions to protect the trade secret. Further, in “exceptional circumstances that render an injunction inequitable,” the court may condition future use of the trade secret on the payment of a reasonable royalty. Following a finding of misappropriation, a court may also award damages. Where the trade secret is “willfully and maliciously misappropriated,” a court may award exemplary damages double the damages amount already awarded. A court may also award attorney fees where the misappropriation or claim of misappropriation was in bad faith, or where a motion to terminate is made or opposed in bad faith.
Whistleblower Immunity
The DTSA includes a safe harbor for whistleblower employees that provides for immunity from any criminal or civil liability under any federal or state trade-secret law for disclosure of a trade secret that is made in confidence to an attorney or federal, state, or local governmental official “solely for the purpose of reporting or investigating a suspected violation of law,” or in a filing in a lawsuit made under seal. It is important that employers pay close attention to the notice provision within the whistleblower immunity section of the statute because compliance with this notice provision may affect whether an employer can seek certain remedies under the statute. The remedies for companies suing former employees for trade-secret misappropriation under the DTSA include punitive damages and attorney fees. In order to take advantage of these remedies, however, a company must advise its employees of the existence of the whistleblower immunity. As such, companies should strongly consider updating their employment policies and agreements going forward to include either the required notice, or a cross-reference to a policy document that includes a statement about the DTSA’s whistleblower immunity.
Other Notable Provisions
The DTSA additionally mandates that, within one year of enactment and every six months thereafter, the Attorney General submit a publicly available report on, inter alia: (1) the scope and breadth of theft of trade secrets of American companies occurring outside of the United States; (2) the extent to which theft outside the United States is sponsored by foreign governments or instrumentalities; (3) the ability of trade-secret owners to prevent misappropriation of trade secrets outside of the United States; and (4) recommendations for actions that may be undertaken to reduce the threat of misappropriation of trade secrets of American companies occurring outside of the United States.
Additionally, although the DTSA expressly indicates that “[n]othing in the amendments made by this section shall be construed . . . to preempt any other provision of law” and thus will not preempt existing state trade-secret laws, one remaining open question is what the result will be where the definition of trade secret within the DTSA conflicts with a state’s common-law definition, or where there is a different conflict between the DTSA and a state’s common-law requirements concerning keeping protected trade secrets confidential.
The DTSA’s broad definition of trade secret, together with the prophylactic provisions of the statute, will provide a robust additional tool for American companies to prevent unauthorized disclosure of propriety information. Although open questions certainly remain about the breadth of this statute given its recent enactment, it seems clear that this new law will provide an additional avenue through which American companies can ardently protect their intellectual property, thus providing enhanced value to their shareholders.
Once a kind of collateral handled only by specialists, intellectual property (IP) now occupies a significant position in commercial finance arrangements. Almost every business has IP[1] rights, whether as an owner or as a licensee, ranging from off-the-shelf software products to patents on the next big advance in biotech. The business name or website address can function as a trademark, and copyrights can exist in just about any written text or artwork, including marketing materials, employment manuals, and computer code.
A business will often use its intellectual property as collateral for loans and other financing arrangements. In venture capital financing, intellectual property such as a software program or a patent application may be the debtor’s only valuable asset. Film financing may be based on the value of the copyrighted script or film treatment. In other contexts, a loan may finance the debtor’s acquisition, development, or commercialization of particular IP assets. In almost all syndicated credit facilities, a debtor’s intellectual property is included as a matter of course in an all-assets collateral package, often without particular reliance on the value of the intellectual property or its usefulness in the debtor’s business.
Although these financing arrangements are not unusual, they may still present hurdles for the parties’ counsel. Many lawyers who regularly represent lenders and secured parties are familiar with Article 9 of the Uniform Commercial Code (U.C.C.)[2] but have only a vague understanding of the laws applicable to intellectual property. On the other hand, many IP lawyers are knowledgeable about the laws covering their clients’ IP assets but have avoided dealing with the U.C.C. since law school. U.C.C. lawyers and IP lawyers speak different languages; negotiation of IP collateral arrangements can be treacherous without a translation manual.
1.1 Purpose
The accompanying Model Intellectual Property Security Agreement (the Model Agreement) attempts to bridge the gap between U.C.C. and IP lawyers by offering—and explaining—provisions the lawyers should consider in documenting a secured loan when the collateral includes intellectual property. The Model Agreement was produced by a task force (the Task Force) organized by the Commercial Finance and Uniform Commercial Code Committees of the American Bar Association Business Law Section.
Some model agreements can be used as forms, with only minimal changes to adapt them for particular transactions. The types of intellectual property and their importance for any transaction are so varied, however, that a one-size-fits-all approach will not work. The Model Agreement is therefore largely a teaching tool, supplying basic provisions for an idealized hypothetical transaction that involves solely IP collateral. The footnotes address issues that often arise in practice and suggest modifications that may be negotiated to fit the needs of the parties in various real-world situations.
To assist users of the Model Agreement, this report summarizes some basic U.C.C. and IP concepts and terminology, and briefly discusses some issues that often arise when the two bodies of law interact. We have tried to explain, or at least identify, some of the most relevant legal issues, but neither the Model Agreement nor this report is intended as an exhaustive treatise on IP law or U.C.C. Article 9, “Secured Transactions.” The summaries in section 2 (IP basics) and section 3 (U.C.C. basics) merely point out the most salient and topical issues. The Model Agreement should be used with care; particular transactions may raise legal or practical issues making some provisions inappropriate or incomplete.
1.2 Limited Scope
For simplicity and clarity, the Task Force decided to limit the scope of the Model Agreement and to make certain assumptions about the hypothetical secured transaction. The most important of these limitations and assumptions are:
1.2.1 Loan Agreement
The Model Agreement assumes that the IP assets are being pledged as collateral for loans made under a separate loan agreement that will provide most of the substantive terms of the parties’ agreement. The Model Agreement focuses on the IP collateral, and defers to the loan agreement for more general terms to be negotiated by the parties, such as the matters that will be treated as “material” and the events and circumstances that will constitute events of default.
1.2.2 Single Parties
The Model Agreement contemplates a single U.S. borrower that owns the collateral and a single lender (which could be a single collateral agent acting on behalf of a group of lenders).
1.2.3 Stand-Alone Agreement
The Model Agreement deals solely with IP collateral and the directly associated rights and property. We do not, however, intend to perpetuate the historical practice of using both a “regular” security agreement and a separate IP security agreement for a single transaction. We believe that the historical bifurcated practice grew in part from the U.C.C. lawyer’s limited knowledge of IP law and the IP lawyer’s limited understanding of U.C.C. Article 9. To promote efficiency, eliminate inconsistent language, and conform terminology, we recommend including non-IP and IP assets in a single security agreement.
If the transaction documents include a single security agreement for all types of collateral, then the IP-specific provisions of the Model Agreement can be folded into it, replacing or supplementing the general terms.
1.2.4 U.S. Intellectual Property Only
Intellectual property is recognized under local law on a country-by-country basis. In light of the global nature of many businesses, lenders usually want to include foreign IP assets owned by the debtor, such as counterparts of U.S. patents issued in other nations or trademarks registered in other countries, in the collateral package. However, the legal regimes for establishing, protecting, and enforcing liens on intellectual property vary widely by country. While the Model Agreement includes foreign IP assets in the collateral package (through broad granting language covering all the debtor’s IP assets), the Task Force decided to leave for another day contractual provisions to establish, protect, and enforce the lender’s rights in foreign intellectual property. Lenders should consult with local counsel as to the requirements for liens on foreign intellectual property.
1.2.5 Broad Grant
The Model Agreement covers virtually every kind of intellectual property that a debtor might have, regardless of the intellectual property’s value or its importance to the debtor’s business or the secured party’s credit decision. To the extent that certain types of intellectual property are not important for the transaction, parts of the Model Agreement can be deleted. For example, if patents form an insignificant part of the collateral, then provisions applicable to patents can be deleted or patents can be expressly excluded from the definition of “Intellectual Property.” The Model Agreement also permits the parties to list property (either by class or item-by-item) that is to be excluded from the collateral package.[3]
1.2.6 Strict Representations and Covenants
The Model Agreement’s representations and warranties, scheduling obligations, and covenants are relatively strict, with few limitations. The result is a document that appears to read more favorably to the lender than the borrower, in the sense that the borrower will be more likely to breach a representation or covenant due to the absence of “wiggle room.” The Task Force took this approach for instructional purposes because it allows the Model Agreement to present straightforward provisions that highlight the issue being addressed, un-cluttered by qualifications. The first draft in a loan transaction is likely to favor the lender in any event, because counsel for the lender generally drafts the loan agreement. The Model Agreement includes footnotes explaining how and when a borrower may want to delete particular provisions, or modify them to include materiality, knowledge, or other limitations.
2. Intellectual Property—Basic Concepts and Terminology
2.1 Overview
2.1.1 IP Assets
“Intellectual property” is a catchall term for various types of intangible rights recognized under federal, state, or foreign law. Different types of intellectual property are created and obtained in different ways, have different characteristics, and are subject to different laws.
The most common types of U.S. statutory intellectual property are copyrights, patents, and trademarks. Copyrights[4] protect works of creative expression such as novels, motion pictures, music, or artworks; patents[5] protect inventions; and trademarks[6] and service marks protect the exclusive rights to use names, images, or slogans to identify products and services. Although trade secrets are not separately protected by statute, they also constitute intellectual property and can take many forms (such as customer lists, recipes, or production know-how). Some types of intellectual property are specialized, in that they pertain only to particular industries or particular assets, and may be subject to different or additional requirements.[7] Such specialized types of intellectual property are not excluded from the granting language and are thus included in the collateral package, but for simplicity the Model Agreement does not contain any special representations or covenants for those assets or the industries in which they are used. Sections 2.2 to 2.6 below briefly summarize some of the basic characteristics of different types of intellectual property.
2.1.2 United States vs. Foreign Intellectual Property
Intellectual property rights are territorial and protected on a country-by-country basis. U.S. patents, for example, are issued by the United States Patent and Trademark Office (PTO) and provide the right to exclude others from practicing the invention claimed in the patent in the United States only. Companies with worldwide businesses often have large IP portfolios consisting of registrations in multiple countries. U.S. companies can file for IP registrations in foreign IP filing offices and foreign corporations can register intellectual property in the United States. Local counsel is generally engaged to prosecute IP filings outside an applicant’s home jurisdiction.[8]
2.1.3 Registered vs. Unregistered Intellectual Property
Copyrights and trademarks can be registered or unregistered. (U.S. patents can only arise upon issuance by the PTO.) Copyright protection arises automatically when the copyrightable work is fixed in a tangible medium of expression, but copyrights can be registered in the United States Copyright Office. Trademarks may also arise under common law through use of the mark in commerce. In the United States, trademarks can be registered nationally in the PTO or locally in most states, usually through the secretary of state’s office.[9]
While IP rights can exist in unregistered copyrights and trademarks, registration provides certain legal advantages, and registered intellectual property is often perceived as more valuable. (The benefits of registering copyrights and trademarks are discussed in sections 2.2.3 and 2.4.3 below.)
2.1.4 Value of Intellectual Property
IP rights tend to be integral to the particular business in which they are used. Accordingly, their value apart from the business as a whole can be difficult to calculate. For these reasons, intellectual property may not be assigned much value in determining how much debt a company’s assets can support. Nevertheless, it is risky for a lender to leave intellectual property outside the collateral package if it hopes to sell the debtor’s business as a going concern in the event of a foreclosure.
2.2 Copyrights
2.2.1 What Law Governs?
The genesis of copyright law in the United States is Article 1, Section 8 of the U.S. Constitution, which provides that “Congress shall have the power … [t]o promote the Progress of Science and Useful Arts, by securing for limited times to Authors and Inventors, the Exclusive Right to their respective Writing and Discoveries.” Copyright protection is provided under the U.S. Copyright Act.[10]
2.2.2 What Is a Copyright?
Copyrights apply to original works of authorship fixed in a tangible medium of expression, including works of poetry and prose, motion pictures, musical compositions, sound recordings, paintings, drawings, sculptures, photographs, computer software, and other works.[11] Copyright protects only the expression of an idea, and not the idea itself.[12] For that reason, there can be many ways of expressing the story of star-crossed lovers from feuding factions, i.e., the overall plot line of Romeo and Juliet, without infringing the copyright in Shakespeare’s play (even if his copyright were still in force).
A copyright holder has the exclusive right to:
reproduce the copyrighted work;
prepare derivative works based upon the copyrighted work;
distribute copies of the copyrighted work; and
display or perform the copyrighted work publicly.[13]
A copyright arises in favor of a human author unless it is a “work for hire.” Works for hire include works prepared by an employee in the course of his or her employment and certain works prepared on commission or special order.[14] The hiring or commissioning party is considered the author of a work for hire. Most standard form employment agreements state that copyrightable works created by the employee in the scope of employment are works for hire and, as a back-up, also contractually obligate the employee to assign to the employer the copyright in all such works.
2.2.3 Registration
Because a copyright automatically attaches to a work of authorship when the work is reduced to tangible form, it is not necessary for the work to be either published or registered with the Copyright Office. Generally, however, registration of the copyright is a prerequisite to the right to sue for infringement.[15]
Remedies for infringement of copyright include actual damages, statutory damages, attorney’s fees, injunction against infringement, recovery of the infringer’s profits, and seizure of copies.[16] In general, statutory damages and attorney’s fees are available only for infringements occurring after the copyright is registered.[17]
2.2.4 Assignment and Transfer
The ownership of a copyright may be transferred, in whole or in part, by any means of conveyance or by operation of law, and may be bequeathed by will or pass under the applicable laws of intestate succession.[18] A written instrument or memorandum of the transfer must be duly signed by the transferor, unless ownership is transferred by operation of law.[19] A signed transfer instrument may be recorded in the Copyright Office. If the copyright has been registered and the transfer instrument identifies the work by title or registration number so that, after the document is indexed, it would be revealed by a reasonable search under the title or registration number, the recorded document will give all persons constructive notice of the facts stated therein.[20] Any “assignment, mortgage, exclusive license” or other “conveyance, alienation, or hypothecation” of a copyright (or any of the exclusive rights comprised in a copyright) is a “transfer of copyright ownership” as defined in the Copyright Act and will be subject to these transfer and recording provisions.[21]
The Copyright Act provides that a “transfer of copyright ownership” will “prevail” over a later conflicting transfer if the first transfer is properly recorded[22] in the Copyright Office (i) within one month after the effective date of the transfer (or within two months if the transfer is executed outside the United States) and (ii) at any time before the later transfer is recorded. Otherwise, the later transfer will prevail, if it is properly recorded and if the later transferee takes its copyright interest in good faith, for valuable consideration (or for a binding promise to pay royalties), and without notice of the first transfer.[23]
2.2.5 Duration
Copyrights have a limited, albeit lengthy, duration. The copyright term depends on several factors, including when the work was first published or renewed.[24] No renewal or maintenance payments are necessary to keep a copyright (or registration) in force for its full term.
The author of a copyrighted work (other than a work for hire) who has transferred or licensed the copyright on or after January 1, 1978, has the non-waivable right to terminate the transfer (i.e., to rescind the transaction) during the five-year period beginning thirty-five years after the transfer or license.[25] This means that authors and their heirs retain a residual interest in their copyrights, even if they have sold them or granted long-term licenses. This right to recapture copyright ownership could override assignments, licenses, and liens previously granted by the author or the author’s heirs.[26]
2.3 Patents
2.3.1 What Law Governs?
Patent protection, like copyright, traces its roots to Article 1, Section 8 of the U.S. Constitution.[27] Today, the right to obtain and enforce patents is governed by the U.S. Patent Act.[28] There is no state patent law or any common law patent rights.
2.3.2 What Is a Patent?
A patent is a right granted by the United States government permitting the inventor “to exclude others from making, using, offering for sale, or selling the invention throughout the United States or importing the invention into the United States”[29] for a limited time in exchange for public disclosure of the invention when the patent is granted. Patents provide a competitive advantage during their term; after the expiration of a patent, anyone is free to use the invention. Only a patentee (the original owner or a successor-in-title) can bring an action for infringement.[30]
2.3.3 Obtaining a Patent
To obtain a patent, the inventor, or a person to whom the inventor has assigned (or is under an obligation to assign) the invention, files an application in the PTO.[31] An inventor’s employer typically obtains and records a written assignment from the inventor in order to be recognized as the patent owner in the PTO.
A patent application must contain the information necessary for the PTO examiner to determine if the invention is eligible for a patent.[32] Patent examinations are notoriously rigorous and patents can take years to issue. The attorney for the applicant “prosecutes” the patent application by responding to the PTO examiner’s concerns and modifying the scope of the patent application until the PTO examiner is satisfied. During this “patent prosecution” process, the breadth of the invention initially described in a patent application is often narrowed in order to accommodate the examiner’s concerns. If and when the examiner determines that the invention as then described meets all the requirements, the application is approved and the patent issued.[33]
An application for a patent is generally kept in confidence by the PTO for eighteen months after its filing date.[34] Once a patent is issued, the invention is publicly available and will no longer be protectable as a trade secret.
2.3.4 Assignment and Transfer
A patent, patent application, or other interest in a patent can be assigned by a written instrument, and a patentee, applicant, or assignee may grant or convey all or part of its rights under the patent or application.[35] Any such “assignment, grant, or conveyance” of patent rights will be void as against any subsequent purchaser or mortgagee for a valuable consideration, without notice, unless it is recorded in the PTO within three months from its date or before the subsequent purchase or mortgage.[36]
2.3.5 Duration
A patent is generally valid for 20 years from its application date.[37] Maintenance payments are due periodically (at 3.5, 7.5, and 11.5 years after the issuance date) in order to continue the patent in force.[38] The validity of the patent can be challenged by third parties at any time by bringing an inter partes review in the PTO.[39]
2.4 Trademarks
2.4.1 What Law Governs?
Trademarks are protected under U.S. federal law, common law in most states, statutes in some states, and international law. The federal law is the Lanham Act (also referred to as the Trademark Act).[40]
2.4.2 What Is a Trademark?
Trademarks are words, phrases, symbols, designs, or a combination thereof that identify and distinguish the source of one party’s goods from those of others.[41] A trademark used in connection with services, rather than goods, is sometimes referred to as a “service mark,” and each may be referred to as a “mark.”[42] Trademark law protects consumers by making it easier to recognize a particular business, product, or service.[43] Trademark law also protects the trademark owner’s valuable property rights in the mark and the goodwill associated with the consumer’s recognition of the mark.[44]
In the United States, trademarks can be registered if they are used in commerce. However, a company can reserve a trademark before actually offering products under that mark by filing an application to register it in the PTO on the basis of a bona fide “intent to use” the mark.[45] The mark must then be put into commercial use in interstate commerce within three years from the examiner’s approval of the application.[46]
2.4.3 Registration
Registration is not required for trademark rights to attach to a mark that is used in connection with a business, product, or service. Registration of a trademark[47] in the PTO does, however, provide important advantages:
constructive notice of a claim of ownership of the mark;
a legal presumption of ownership of the mark and therefore the exclusive right to use the mark nationwide on or in connection with the goods/services listed in the registration;
the ability to bring an action concerning the mark in federal court;
the use of the U.S. registration as a basis to obtain registration in foreign countries;
the ability to record the U.S. registration with the U.S. Customs and Border Protection Service to prevent importation of infringing foreign goods;
the right to use the federal registration symbol ®; and
A registered trademark can be assigned, but only along with the goodwill of the business in which the trademark is used (or with the goodwill of the part of the business connected with the use of and symbolized by the trademark).[49] A trademark for which an application to register has been filed can be assigned in the same way, except that an “intent to use” (ITU) application can only be assigned to a successor to the applicant’s ongoing and existing business (or relevant part of that business) to which the trademark pertains.[50] The assignment must be in a signed writing and contain the information required by the PTO.[51] An assignment will be void against a subsequent purchaser for valuable consideration, without notice, unless the assignment (including the required information) is recorded in the PTO within three months after the date of the assignment or before the subsequent purchase.[52]
Patent and trademark assignees may be subject to laws in addition to the recording provisions of the Patent Act or Lanham (Trademark) Act; for example, a new trademark owner may be subject to a license granted by the previous trademark owner, even if the license is not recorded and the new owner has no knowledge of the preexisting license.[53]
2.4.5 Duration
Trademark registration can theoretically remain effective as long as use of the mark continues in connection with the products and services claimed in the registration, periodic affidavits and declarations are filed when required, and the trademark is not “abandoned.”[54] A trademark can become abandoned if it is not used, and a federally registered trademark may be presumed to be abandoned after three consecutive years of non-use.[55] Trademark protection can also be lost if the trademark owner engages in “naked licensing” (i.e., not adequately monitoring the use of the mark by its licensees) or fails to take adequate steps to prevent unauthorized use by others.[56] For example, because the owners of the marks “aspirin” and “escalator” did not take steps to protect against infringements, the names ultimately became generic terms available for anyone to use.[57]
2.5 Trade Secrets
2.5.1 What Law Governs?
Trade secrets have traditionally been protected and enforced under state law. Virtually all states have adopted the Uniform Trade Secrets Act (U.T.S.A.) and many courts still refer to guidance under section 757 of the original Restatement of Torts or section 39 of the Restatement of Unfair Competition. As of May 11, 2016, federal law recognizes a cause of action for misappropriation of trade secrets under the Defend Trade Secrets Act of 2016 (D.T.S.A.).[58] While virtually all states have adopted a variation of the Uniform Trade Secrets Act (U.T.S.A.),[59] many courts still refer to guidance under section 757 of the original Restatement of Torts or section 39 of the Restatement of Unfair Competition.
2.5.2 What Is a Trade Secret?
Trade secrets are defined in the U.T.S.A. as information that derives independent value from not being generally known or readily ascertainable by proper means by others (the novelty test) and that is the subject of reasonable efforts to maintain its secrecy (the secrecy test).[60] If both tests are met, information such as formulas, patterns, programs, methods, devices, techniques, and processes are cited by the U.T.S.A. as potential trade secrets. Often information that would not qualify as a true trade secret because it fails to satisfy the novelty or secrecy test can be protected by contractual non-disclosure agreements or covenants not to compete from employees (if permitted under applicable state law).
Unlike a patent, which permits the owner to exclude others from using the patented information, ownership of a trade secret does not prevent the independent development of the same information by others. Accordingly, a trade secret is only protected against “misappropriation”[61]—the acquisition of a trade secret by “improper means,”[62] such as industrial espionage, breach of a confidentiality agreement, or theft by an employee. The U.T.S.A. does not, however, expressly prohibit a company’s competitor from analyzing or reverse-engineering the company’s product or process in order to use it in the competitor’s own business; reverse engineering by itself is not considered improper means.[63] If a trade secret is incorporated into a product that will be publicly used or distributed, the owner may consider protecting it under patent law (if possible) rather than attempting to claim it as a trade secret.
2.5.3 Maintaining a Trade Secret
Trade secrets cannot be protected by filing or registering them in any state or federal jurisdiction. Rather, the owner of a trade secret must take reasonable steps to maintain the secrecy of the information. In certain cases, those steps may include limiting access to the information to only those employees who have a need to know the information in the course and scope of their work, providing locks and other physical security to the location at which the information is held, or obtaining confidentiality agreements from vendors or contractors who must use the trade secret in performing services for the owner. Additionally, the owner of a trade secret may sue to enjoin another from revealing or utilizing its trade secrets. Under the U.T.S.A. as adopted in most states, in an appropriate case the owner would be entitled to enjoin the use or distribution of the trade secret and would also be able to recover damages for misappropriation.
2.5.4 Duration
A trade secret will last as long as the owner is able to maintain the secrecy of the information so that it does not become lawfully available to the public.
2.6 Domain Names
2.6.1 What Law Governs?
Ownership of domain names is governed by state common law. The use of domain names and websites may be subject to regulation under federal law, however, as well as rules established by international organizations, such as the Internet Corporation for Assigned Names and Numbers (ICANN).
2.6.2 What Is a Domain Name?
A domain name is a part of the address of a website on the internet that helps a user to access the site. The complete address, including the domain name, is known as a URL, for Uniform Resource Locator. The domain name is the part of the address consisting of a single word, followed by a period and a short alphabetical indicator known as a top-level domain. For example, americanbar.org is a domain name and org is the top-level domain. Every computer or device on the internet has a unique internet address, consisting of a string of numbers, that allows it to connect with others. The domain name system allows more comprehensible letters and words to be associated with the numeric internet addresses. The creation, registration, and use of a domain name, along with the operation and maintenance of the website, generally involves an interlocking set of contracts among the owner, the domain name registrar, internet service providers, network operators, and the like.
2.6.3 Registration
Domain names are registered with one of several registrars recognized by ICANN, and the registration can be transferred from one registrar to another. Most courts have considered a registered domain name to constitute intangible personal property,[64] although a few have held that domain names are contractual rights.[65] The owner of a domain name may also have trademark rights in the name if it is used in marketing the owner’s business.
2.6.4 Duration
Registration is effective for the period provided in the registrar’s contract for services. Ten years is a common period, and renewal is generally permitted.
3. U.C.C. Article 9—Basic Concepts and Terminology
3.1 Overview
The U.C.C. as a whole is generally intended to simplify, clarify, and modernize the law governing various kinds of commercial transactions and to make that law uniform among the various jurisdictions.[66] One of the ways that U.C.C. Article 9 simplified commercial finance transactions was by collecting and consolidating various traditional but somewhat uncertain methods of using personal property as security.[67] The term “security interest” was created as a generic replacement for all those common law arrangements, including chattel mortgages, installment sales, title retention, conditional assignments, collateral assignments, and the like.[68] Since its creation in the mid-twentieth century, Article 9 has been revised several times to maintain its modern outlook, and was comprehensively revised in 2001.[69]
In reality, Article 9 is quite complex, not necessarily uniform, and definitely not simple. The following is a brief overview of the Article 9 concepts that are most relevant in discussing issues affecting the use of IP assets (especially federally registered intellectual property) as collateral.
Like the federal IP legal systems, U.C.C. Article 9 has its own terminology; both the differences and the unintended similarities can cause confusion when IP interests are used as collateral.
3.2 Security Interests
Under Article 9, a debtor enters into a security agreement that grants a security interest in personal property collateral to a secured party, generally to secure the payment or performance of an obligation of the debtor to the secured party.[70] Article 9 honors substance over form; any transaction creating a security interest (regardless of how the interest may be described) is subject to Article 9 unless excepted.[71]
3.3 Attachment and Title
A security interest attaches to, and becomes enforceable against, whatever rights the debtor has in the collateral described in a signed security agreement once value has been given; the title to the collateral is not necessarily determinative.[72] The security agreement must reasonably identify the collateral, but in most cases does not need to be specific, and can even use the collateral types defined in Article 9 (accounts, goods, general intangibles, inventory, etc.)[73] The security agreement can cover collateral acquired later by the debtor.[74] For example, the description of the collateral in the security agreement can be as general as “all present and future copyrights” of the debtor.
3.4 Perfection
The secured party perfects its security interest in most kinds of collateral under Article 9 by filing an appropriate financing statement in the appropriate filing office in the applicable state or other jurisdiction determined under Article 9’s governing law rules.[75] Perfection helps protect the secured party’s rights in the collateral against claims by other creditors. A financing statement must contain the names of the debtor and the secured party and must “indicate” the collateral.[76] In almost all cases, the financing statement need not describe the collateral specifically, and can even indicate only that the collateral consists of all the debtor’s personal property (an “all-assets” filing).[77] If authorized by the debtor, the financing statement can be filed before the security interest is created.[78] Financing statements are indexed by the name of the debtor, not the nature or type of collateral; potential creditors need only search under the debtor’s name to find any financing statements filed with respect to the debtor’s personal property.[79]
3.5 After-Acquired Collateral
A filed financing statement is effective against the indicated collateral at the time the security interest attaches to the collateral, even if attachment comes after the financing statement is filed.[80] This means that a secured party can file a single financing statement covering present and future items of collateral, without having to refile or specifically describe after-acquired property. For example, if a security agreement covers the debtor’s interests in all present and future patents, and the financing statement indicates “all patents” as the collateral, then the security interest will be enforceable against (i.e., will attach to) the debtor’s rights in both those patents existing when the security agreement is signed and any patents issued after that date, even if the invention is created and the patent granted after the financing statement is filed.
3.6 Priority
Article 9 has extensive rules to determine which creditors have priority—that is, the right to satisfy their obligations out of the collateral before other creditors. The priority rules depend on many factors, including the type of collateral, method of perfection, and the nature of the transaction.[81] Generally, however, and subject to several exceptions and conditions:
A security interest has priority over a general unsecured claim.
A perfected security interest has priority over an unperfected security interest.
A perfected security interest has priority over the claims of a person (including a bankruptcy trustee) who becomes a lien creditor[82] after the security interest is perfected.[83]
A perfected security interest has priority over a later-perfected security interest.[84]
The most prominent exceptions to these rules are:
A secured party who finances the debtor’s acquisition of some kinds of tangible property or software may, by following certain procedures, have priority as to that property over an earlier-perfected security interest.[85]
Third parties acquiring collateral subject to an existing security interest, including a buyer of goods in the ordinary course of business[86] and a “licensee in the ordinary course of business,” may take the collateral free of the security interest in certain circumstances.[87]
3.7 Override of Anti-Assignment Clauses
Article 9 overrides certain contractual restrictions on a debtor’s ability to use certain intangible property as collateral. Many contracts contain “anti-assignment” provisions that prohibit a party from “assigning” its contract rights to a third party without the other party’s consent, and provisions of state or federal law may prohibit “assignment” of governmental permits or licenses without the consent of the governmental authority. Such provisions often do not clearly distinguish between a party’s absolutely assigning away its rights under contracts or permits and merely granting a security interest in those rights.
Article 9 facilitates a debtor’s ability to pledge these intangible assets by making certain anti-assignment provisions included in contracts or created by law ineffective to prevent the creation, attachment, perfection, or, in some cases, enforcement of a security interest in these assets.[88]
The extent to which Article 9 overrides an anti-assignment clause depends in part on the nature of the collateral.[89] If the collateral is a right to payment from a third party (an “account” or “payment intangible”[90]), an anti-assignment provision is ineffective to prevent a secured party taking a security interest in those rights and, in some circumstances, collecting payments in place of the debtor after default.[91]
For collateral consisting of “general intangibles”[92] (a catch-all category of intangible assets that would include copyrights, patents, trademarks, software, IP licenses, and some other forms of intellectual property), the secured party can take a security interest in the debtor’s rights in the general intangibles, despite an anti-assignment clause, but the secured party’s enforcement rights will be significantly limited. Generally, without consent from the other party to the contract:
The secured party cannot enforce the security interest against the other party;
The other party does not assume any duty to the secured party;
The other party does not have to recognize the security interest, render performance to the secured party, or accept performance by the secured party; and
The secured party may not use or assign the debtor’s rights under the contract.[93]
3.8 Enforcement
Under Article 9, after default, a secured party may sell, lease, license, or otherwise dispose of collateral, subject to certain conditions.[94] The disposition can be private or public, but every aspect of the disposition must be commercially reasonable.[95] While the requirement of commercial reasonableness cannot be waived,[96] the security agreement may set the standards by which commercial reasonableness will be measured, provided that the standards are not themselves manifestly unreasonable.[97]
The secured party generally cannot purchase the collateral at a private sale,[98] and it cannot simply take or keep the collateral to satisfy the secured debt without satisfying certain conditions, including the debtor’s written consent after the default.[99]
The secured party may also collect amounts payable on the collateral and enforce the debtor’s rights under contracts included in the collateral.[100] The secured party’s rights to enforce a contract against the other party will generally be subject to the other party’s defenses and rights of setoff against the debtor, and it may be further restricted if the contract prohibits assignment by the debtor.[101]
4. Intersection of Federal IP Law and U.C.C. Article 9
4.1 Perfecting a Security Interest
4.1.1 Which Law Applies?
The federal IP registration systems are generally intended to create a “chain of title” to each IP asset, allowing the current position to be traced back to the original registration. Assignments, mergers, and name changes generally must be recorded with the applicable IP filing office in order for subsequent owners of the intellectual property to be put on notice. The Copyright Office and the PTO will also accept lien filings (and lien releases) for recording as long as they refer to the registration or application information for each item.[102] There is uncertainty, however, regarding the extent to which the federal systems for registering transfers of title are intended to cover transfers of partial interests, such as security interests.
One source of confusion is the lack of a common terminology. The federal rules and recording systems were established well before the original version of U.C.C. Article 9, and the few modifications have not dealt with the use of IP assets as collateral.[103] Key U.C.C. concepts, such as perfection, do not seem to have any analogue in the federal system, while some common terms have different meanings in the federal IP laws and U.C.C. Article 9.
The federal IP statutes generally speak of “assignments” or “transfers” of IP assets, but do not use the U.C.C. terms “security interest,” “secured party,” or “purchaser”; the statues thus address the rights of “assignees,” “transferees,” and even “mortgagees” in some cases, but not the rights of “secured parties.”[104]
Under the federal IP statutes, it is not clear whether “assignment” and “transfer” apply to a transfer of a partial interest, such as a security interest; some courts have interpreted the terms to refer solely to ownership transfers,[105] but the question remains unsettled. The U.C.C., on the other hand, explains that, depending on the context, “assignment” or “transfer” may refer to the outright assignment/transfer of an ownership interest or to the assignment/transfer of a security interest or other limited interest.[106]
4.1.2 Preemption
Under Article VI of the U.S. Constitution, the federal laws of the United States “shall be the supreme law of the land.” If the federal IP laws govern transfers of partial or limited interests[107] like security interests in registered IP assets, they would preempt the U.C.C. rules; the federal recording system would then provide the only means to give public notice of an interest akin to a U.C.C. security interest.
The U.C.C. recognizes, as it must, the preemptive power of federal law: Article 9 “does not apply … to the extent that a statute, regulation, or treaty of the United States preempts” it. However, the U.C.C. defers to federal law “only when and to the extent that it must.”[108]
Article 9 excepts from its perfection rules certain transactions that are subject to other legal systems. In particular, the filing of a U.C.C. financing statement “is not necessary or effective to perfect a security interest in property subject to … a statute, regulation, or treaty of the United States whose requirements for a security interest’s obtaining priority over the rights of a lien creditor with respect to the property preempt” Article 9’s requirement for a filed financing statement.[109]
Courts addressing this preemption issue have generally found that:
the Copyright Act includes requirements for a security interest to obtain priority over the rights of a lien creditor, and those requirements preempt Article 9’s perfection-by-filing requirements for federally registered copyrights,[110] but
neither the Patent Act nor the Lanham (Trademark) Act includes requirements for a security interest to have priority over the rights of a lien creditor and therefore neither act preempts Article 9’s perfection rules.[111]
Although only a few courts have addressed these perfection issues, the rulings cited above have been prominent and persuasive enough that the general understanding among finance and IP lawyers is that a security interest in registered copyrights can only be perfected by a filing in the Copyright Office, while a security interest in patents or trademarks can only be perfected by a U.C.C. filing.[112]
Perfection will protect a security interest against claims of lien creditors (including a bankruptcy trustee) and unperfected and later-perfected security interests.[113] Perfection is a term of art under U.C.C. Article 9, however, and the extent to which perfection will also protect the secured party against the claims of licensees and good-faith purchasers of federally registered intellectual property remains unsettled. Accordingly, the current practice for a cautious secured party with federally registered IP collateral is to file both a U.C.C. financing statement in the appropriate state office and a security document in the appropriate federal filing office.[114] The following sections discuss the reasons for this caution.
Secured parties often take precautionary approaches, seeking maximum protection by trying to comply with all competing and potentially contradictory legal systems, protocols, and practices affecting perfection.[115] This approach, along with due diligence and careful drafting, can address some of the risks, but compliance with multiple filing systems can be duplicative, expensive, and time-consuming. Parties often seek to balance the risks and benefits by negotiating carve-outs, limitations, exceptions, and other terms. Some examples of such provisions are included in the Model Agreement.[116]
4.2 Reasons for Dual Filing
4.2.1 Copyrights
For Article 9 perfection purposes, compliance with the Copyright Act’s requirements for obtaining priority over the rights of a lien creditor is “equivalent” to filing an Article 9 financing statement.[117] Nonetheless, secured parties will also want to file an actual financing statement covering all copyright collateral in the appropriate U.C.C. filing office. An “equivalent” federal recording may not cover non-copyright collateral, such as proceeds and other rights. More important, it probably will not cover unregistered copyrights.
Some courts have recognized that it is a practical impossibility to register all copyrightable material; a copyright can attach immediately to any tangible expression of an idea, regardless of whether the expression will remain in that initial form. These courts have held that the Copyright Act does not preempt Article 9 as to perfection of a security interest in an unregistered copyright.[118] The prevailing view now is that an unregistered copyright is a general intangible in which a security interest is perfected by filing a financing statement in accordance with Article 9, not by recording in the Copyright Office.[119]
The risk remains, of course, that a security interest in an unregistered copyright perfected by a U.C.C. filing will become unperfected if the copyright is later registered. The Model Agreement includes provisions intended to reduce that risk, including procedures facilitating the secured party’s ability to record its security interest in the Copyright Office immediately upon the debtor’s registration of a copyright or filing of a copyright application.[120]
4.2.2 Patents and Trademarks
Filing a financing statement covering patents or trademarks in the appropriate U.C.C. filing office should give a secured party priority over an unperfected or later-perfected security interest and a later lien creditor, including a bankruptcy trustee. But the extent to which Article 9’s other priority rules might be preempted by federal patent or trademark law remains an unsettled question, especially where a later purchaser or licensee of the intellectual property claims that it takes free of the security interest under federal law.
To some extent, the federal patent and trademark laws protect a purchaser who records the transfer of the IP asset in the federal filing office against claims of later transferees; a purchaser whose transfer is not recorded may be subject to the rights of a later transferee that acquires the IP asset in good faith, for value, and without knowledge of the first purchase.[121]
These are not the results one would expect under Article 9. For example, suppose a secured party files a financing statement covering a patent in the appropriate U.C.C. filing office, but does not record a security document in the PTO. Six months later, a third party purchases the patent without actual notice of the security interest, and it records its interest in the PTO. If all patent priority issues are determined under Article 9, as state law,[122] then the purchaser’s interest in the patent will be subject to the earlier perfected security interest regardless of the lack of a PTO recording.[123] But if the U.C.C. determines priority only as among secured parties and lien creditors, with federal IP law determining the respective rights of secured parties and purchasers, then the purchaser would take free of the unrecorded security interest.[124]
Because of this uncertainty, many secured parties record security interests in patents and trademarks in both the U.C.C. filing office and the PTO. If a court were to hold that federal law preempts Article 9 as to claims of parties acquiring ownership of a patent or trademark, the secured party’s timely federal recording could provide notice of its security interest to potential purchasers searching the federal records.
4.3 Assignment Language vs. Granting Language
Historically, lenders’ counsel unsure about the federal statutory provisions dealing with the “assignment” of IP interests would use assignment and conveyance language to create a security interest. Another traditional approach was to structure a secured transaction like an assignment of real property rents: The borrower would “assign” the intellectual property to the lender, who would license the intellectual property back to the borrower, who could exercise all the rights of an owner until a default, which would terminate the license.[125]
In light of the prevailing case law, it is not necessary to use assignment language to create a security interest in registered IP assets.[126] In addition, assignment language has possible drawbacks:
A secured party that is an assignee of a patent may be considered an owner and successor-in-title and thus be a necessary party to any infringement suit.[127]
A secured party that is an assignee of a trademark may be considered the trademark owner and licensor. As such, the secured party would be required to exercise quality control over the products and services bearing the trademark, whether provided by the debtor or its licensees, at the risk of invalidating the mark.[128]
An assignment of a trademark without the accompanying goodwill of the business (sometimes called an “assignment in gross”) can invalidate the mark or weaken its enforceability and value.[129] If a secured party is an assignee of a trademark, the security interest could constitute an assignment in gross, with negative consequences for both the secured party and the debtor.[130]
Since a secured party is not operating the debtor’s business, an assignment of trademark collateral that inadvertently includes an ITU application may invalidate both the application and the mark itself.[131] In the absence of law positively stating that creating a security interest is not the kind of assignment that would threaten the trademark application and any resulting registration, the practice has developed of conditionally excluding ITU applications from the collateral package, but only to the extent that, and as long as, the security interest would be treated as a prohibited assignment.[132]
4.4 Federal Recording vs. U.C.C. Filing Systems
The federal IP recording systems are based on the specific registered item, not the name of the person with an interest in the item. Consequently, a secured party’s document recorded in the Copyright Office or PTO would not be effective if it merely described the debtor’s collateral by category (e.g., “all registered copyrights” or “all patents” or “all registered trademarks”); rather, the recorded security document must specifically identify each item of collateral, generally by registration or application number. Similarly, potential creditors cannot easily determine the lien status of all of a debtor’s IP assets by simply searching in the debtor’s name, but must usually search item-by-item and then work through the sometimes chaotic results. Moreover, transfer and assignment documents must include the item’s registration number; therefore, a transfer or assignment of (or security interest in) future rights in IP assets cannot be effectively recorded, since no registration number would exist. (These requirements prevent the kind of floating lien often used in inventory financing.) All this is in marked contrast to the U.C.C. filing system, which indexes security interests by the debtor’s name, does not require item-by-item identification of collateral, and permits perfection by filing against future collateral.
As with real property collateral, a secured party will want to search the IP filing office records, not only to discover other liens, but to make sure that the debtor has good title to its IP assets. Searches are somewhat easier in the PTO, which maintains an online database of recordings against each registration, so that the chain of title can be followed. The Copyright Office records are not so well-organized; a search and the necessarily detailed review of search results can take much longer and cost much more than a U.C.C. search.[133]
Specific identification of each IP registration or application included in the collateral is thus necessary for recording a lien in the Copyright Office or PTO. The common practice is to identify each item of registered intellectual property in schedules to the security agreement and then attach the schedules to the documents to be recorded. The schedules also give the secured party information for monitoring the status of collateral registrations and applications and exercising its rights to collect on or dispose of collateral after default.
4.5 Security Interests in “Non-Assignable” IP Licenses
IP licenses are often described as “non-assignable” in a kind of shorthand to indicate that the license contains provisions prohibiting the licensee’s assignment of the license without the licensor’s consent. Even if a license is silent as to the licensee’s ability to assign its rights, IP lawyers consider the license to be non-assignable.[134] Under federal case law, generally, unless the license agreement provides otherwise, a nonexclusive patent, trademark, or copyright license gives the licensee only personal rights to, not property rights in, the licensed intellectual property; the license would thus not be assignable without the licensor’s consent. These are not statutory rules, but judicially developed contract interpretation default rules; the parties can (but generally do not) contract around them.[135]
Despite the presumption of non-assignability in IP practice, an anti-assignment provision in an IP license may not prevent the licensee’s grant of a security interest in the license. U.C.C. Article 9 views a party’s creation of a security interest in its rights under a contract as different from the type of “assignment” that may be prohibited by the contract terms. Thus, Article 9 generally permits a debtor to grant a security interest in its rights under a contract even if the contract or a statute prohibits “assignment.” However, Article 9 severely limits the rights of the secured party against the other party to the contract, thus averting many of the negative consequences faced by an IP licensor if its licensee assigns the license to an unapproved third party.[136]
Although courts have not directly determined whether federal law preempts the U.C.C. so as to make an anti-assignment clause in an IP license effective to prevent the grant of a security interest,[137] courts frequently rule that not all issues related to IP contracts are necessarily governed by federal law.[138] Even if federal law preempts Article 9 on this point, a court may still interpret the policy underlying Article 9’s rules of free assignability with limitations as compatible with federal policy, and find that a security interest in a licensee’s or licensor’s rights under an IP license need not be treated as a prohibited assignment in all circumstances.[139]
The Model Agreement leaves these arguments open by excluding from the collateral package an IP license if (and only as long as) it is subject to a provision of law or of the IP license that is effective and enforceable to prevent the grant of a security interest, whether or not the provision would prevent an absolute assignment of all the debtor’s rights.[140]
Disputes about retention and assignability of IP licenses often arise in bankruptcy cases, when a debtor wants to assume and/or assign its rights under an IP license. In bankruptcy, a secured party with collateral consisting of a debtor’s rights as licensee under an IP license faces an inherent risk that this collateral may evaporate if the licensor objects to the debtor’s assumption or assignment of the license.[141] The treatment of IP licenses in bankruptcy involves unresolved issues, and it is beyond the scope of this report.[142]
4.6 IP License Considerations
The collateral may include intellectual property licensed by the debtor to licensees or licensed by third parties to the debtor. The rights of a secured party holding a security interest in a debtor’s rights under an IP license will depend on whether the debtor is a licensor or a licensee, the type of IP asset licensed, and whether the license is exclusive or nonexclusive. Federal law addresses some of these factors, by statute or otherwise, with results that can differ from the results expected under Article 9.
If the debtor is a licensor, the secured party will be concerned that the debtor’s licensees might take the licensed intellectual property free of the security interest, or that licenses granted by the debtor would remain effective after foreclosure of the security interest. If the debtor is a licensee, the secured party will be concerned about limitations on the debtor’s rights under the license, in addition to possible restrictions on the debtor’s ability to assign or grant a security interest in its licensee rights.[143]
4.6.1 Article 9 “Licensee in Ordinary Course”
Under Article 9, an IP licensee generally takes the licensed IP rights subject to any previous security interest.[144] There is, however, an exception to this rule: If the license is nonexclusive, a “licensee in ordinary course of business”—that is, a person that in good faith, without knowledge that the license violates the rights of another person, acquires the license in the ordinary course from a person in the business of licensing such property—will take the licensed intellectual property free of a previously perfected security interest, even if the licensee knows of the security interest.[145] The federal IP laws take a different approach.
Debtor as licensor. Under Article 9, an exclusive licensee is not a licensee in ordinary course of business; accordingly, the exclusive license would be subject to any security interest that attaches to the licensed property.[147] However, under federal law, an exclusive licensee of a copyright may in some circumstances take free of a security interest.
Under the Copyright Act, the grant of an exclusive license of a copyright is a type of “transfer of copyright ownership.” Most recent courts decisions have also, explicitly or implicitly, viewed a security interest in a copyright as being a “transfer of copyright ownership.”[148] A secured party and an exclusive licensee from the debtor would thus be competing transferees of the license, subject to the rules on “conflicting transfers.”[149]
If the secured party properly records its security interest in a registered copyright in the Copyright Office within the applicable one or two-month grace period, the recorded security interest should prevail over a later conflicting exclusive license.[150] But if the secured party does not properly record within the grace period, a later exclusive license could prevail over the earlier security interest if the licensee takes its license in good faith, for valuable consideration, and without notice of the security interest, and properly records its license before the secured party records its security interest.
A secured party that immediately and properly records its security interest may be surprised to find itself behind an earlier exclusive licensee if the licensee records its license within the applicable grace period. For example, if a security interest is granted on January 20 and properly recorded that same day, the secured party may still find itself behind an undisclosed exclusive licensee that took its license on January 10 but did not record until January 30. An earlier exclusive license still in its grace period is like a secret lien, in that a search of Copyright Office filings would not reveal it.[151]
Debtor as licensee. If the debtor is an exclusive licensee of a registered copyright, the secured party should consider having the debtor record its license in the Copyright Office against the copyright registration, and then record its security interest in the recorded license. This two-step process minimizes the risk that a transferee of the debtor’s license rights (or a transferee of the licensed copyright itself) would take those rights free of the security interest. Courts have not yet addressed these issues. As a practical matter, however, outside some industries, such as motion pictures[152] or music, or with respect to exclusive copyrights that are essential to the transaction or the debtor’s business, secured parties do not generally record liens in the Copyright Office against copyrights licensed to the debtor.[153]
4.6.3 Nonexclusive Copyright Licenses
While the grant of a nonexclusive copyright license is not a “transfer of copyright ownership” under the Copyright Act, the Act protects a nonexclusive licensee, even if the license is not recorded and the licensee does not provide value to the licensor.[154]
If a debtor grants a security interest in a copyright and later grants a third party a written nonexclusive license to use the copyright, and the license and the security interest conflict with each other,[155] the licensee will prevail if the license is taken in good faith without notice of the security interest and before the security interest is recorded.[156] If the debtor’s written grant of a nonexclusive copyright license precedes its grant of the security interest, the licensee will prevail, regardless of whether the security interest or the license are recorded.[157]
These results under the Copyright Act differ from the results under Article 9. Under Article 9, a nonexclusive licensee will take free of an existing security interest only if its licensor created the security interest, is in the business of licensing such property, and grants the license in the ordinary course of its business.[158] The Copyright Act’s protections, in contrast, do not depend on who created the security interest or the nature of the licensor’s business or the license transaction. On the other hand, the licensee’s knowledge of the security interest would leave it unprotected under the Copyright Act, whereas Article 9 protects a licensee with knowledge of the security interest as long as the licensee does not have knowledge that the license violates another person’s rights in the copyright license.[159]
4.6.4 Patent and Trademark Licenses
Neither the Patent Act nor the Lanham (Trademark) Act directly addresses the rights of licensees. However, under well-established U.S. patent and trademark law principles, a license grant, whether exclusive or nonexclusive, continues in force when title to the patent or mark is transferred to a new owner, even if the new owner had no knowledge of the license and even if the license is not recorded.[160]
A security interest, of course, can only attach to the rights that the debtor has in the collateral. A secured party thus could find that its security interest in patent or trademark collateral loses to patent and trademark licenses previously granted by the debtor, and also loses to nonexclusive licensees qualifying as licensees in the ordinary course of business under Article 9.
4.7 Enforcement of IP Security Interests
For copyright, patent, or trademark collateral, a secured party will typically be able to use Article 9’s normal enforcement rules after default. Federal law generally does not preempt state law as to foreclosures and contract enforcement.[161]
If the debtor is a licensor, its rights to payment from licensees would be “accounts” or “payment intangibles” under the U.C.C., and the secured party should be able to collect payments generated by the licensee’s use of the intellectual property, even if the license prohibits assignment by the licensor.[162]
If the debtor is a licensee, however, its rights under the license would likely be “general intangibles.” Most IP licenses—especially trademark licenses—expressly or implicitly prohibit assignment by the licensee; even if U.C.C. section 9-408 allows the licensee to grant a security interest,[163] the secured party’s ability to use the licensed intellectual property or enforce the license would be severely limited.[164] A secured party that contemplates using or enforcing the debtor’s IP licenses upon default should get the licensor’s consent to assignments before the transaction closes, not after default.
Sometimes an agreement involving rights in intellectual property, but not titled “security agreement,” may contain language purporting to forfeit or transfer the intellectual property to the secured party automatically upon the debtor’s default. Finance lawyers tend to see this kind of provision as an attempt (possibly unwitting) to evade Article 9’s required foreclosure procedures.[165] If the substance of the agreement creates a security interest, then regardless of what the arrangement is called, the party seeking to take the IP asset must comply with Article 9’s enforcement rules, unless federal law preempts the Article 9 enforcement system. Not all courts, however, recognize Article 9’s substance-over-form approach in the IP context.[166]
5. Drafting Process
The Task Force was co-chaired by Katherine Simpson Allen and Matthew Kavanaugh, with David Fournier, John E. Murdock, and Elaine D. Ziff serving as vice chairs and Howard Darmstadter as editor.
The Task Force met jointly with the Commercial Finance Committee’s Intellectual Property Financing Subcommittee at the ABA annual meetings from 2009 through 2013, the Business Law Section’s spring meetings in 2011, 2013, 2014, and 2015, and the Business Law Section’s annual meetings in 2014 and 2015. Beginning in 2012, the Task Force also held monthly meetings by conference call.
Guided by John Murdock, the first few meetings in 2010 and 2011 focused on using a document assembly software program to construct a model agreement by collecting provisions in similar agreements available in the EDGAR database and analyzing their relative frequency of use. The initial 2012–2013 working drafts were based in large part on this system, but for various reasons the Task Force ultimately reverted to a more traditional drafting approach.
Co-chair Kathi Allen, vice chair Elaine Ziff, and editor Howard Darmstadter acted as a de facto drafting committee. Kathi prepared initial drafts, Elaine provided expert commentary on IP law and practice, and Howard edited each draft to streamline and simplify the language.
Revised drafts of the agreement and/or the accompanying report were distributed to the Task Force, and posted on the Task Force website, a few days before each Task Force meeting (whether held in person or by telephone), and the new drafts were discussed at the meeting. Based on the issues raised and discussed at the meeting, the process of revision, distribution, and discussion was repeated for the following meeting.
In addition to its co-chairs, co-vice chairs, and drafting committee, the Task Force was supported in its work by members of the Task Force and members of the Commercial Finance Committee’s IP Financing Subcommittee. (Lists of members are available on the respective website home pages for the Task Force and Subcommittee.) The following members of both groups provided especially critical support by attending meetings frequently, reviewing drafts, sending comments, correcting errors, drafting sections, explaining legal technicalities, updating practice tips, offering solutions to drafting problems, and resolving occasional differences of opinion:
Warren E. Agin
Leianne S. Crittenden
Patrick A. Guida
Kiriakoula Hatzikiriakos
Marilyn C. Maloney
Pamela J. Martinson
Peter S. Munoz
Stephen L. Sepinuck
Pauline M. Stevens
Stephen T. Whelan
The Task Force also enjoyed the support of successive chairs of its sponsoring Committees: Lynn A. Soukup, James Schulwolf, and Neal J. Kling of the Commercial Finance Committee, and Penelope L Christophorou, Norman M. Powell, and Kristen David Adams of the U.C.C. Committee.
In this report and the footnotes to the Model Agreement, we generally use “IP” as an abbreviation for “intellectual property” when used as an adjective. ↑
Unless otherwise indicated, all references to the “U.C.C.,” the Uniform Commercial Code, or any Article of the U.C.C. are to the Official Text approved by the American Law Institute and the Uniform Law Commission most recently before the date of this report. References to earlier versions of the Uniform Commercial Code mean the Official Text most recently approved and in effect in the year stated. References to “Former Article 9” refer to the Official Text as approved and in effect immediately prior to July 1, 2001. ↑
See section 1.2.1 (“Scheduled Excluded Property”) of the Model Agreement. ↑
Examples are plant variety patents (patents for distinct and new varieties of asexually reproduced plants that are not tuber-propagated or found in an uncultivated state); “mask works” (semiconductor chip product designs, which are protected under copyright laws); and vessel hull configurations (original designs of vessel hulls, which are protected under copyright laws). ↑
As noted in supra section 1.2.4, the Model Agreement includes foreign intellectual property in the collateral, but does not attempt to provide for protecting or enforcing that lien under non-U.S. law. Different countries’ approaches to IP collateral vary greatly. See generallyUnited Nations Comm’n on Int’l Trade Law, UNCITRAL Legislative Guide on Secured Transactions: Supplement on Security Rights in Intellectual Property (2010), http://www.uncitral.org/uncitral/uncitral_texts/security/ip-supplement.html. ↑
Although some trademarks and other IP assets may be recognized, registered, and/or regulated under the laws of some states, this report generally focuses on the legal issues raised by the pledge of IP property that is created, registered, and/or regulated under federal law. ↑
17 U.S.C. §§ 101–1332 (2012). Some pre-1976 sound recordings, however, are excluded from the Copyright Act requirements, and thus possibly governed by state law, until 2067. Id. § 301(a). ↑
Id. § 102(a) (listing examples of types of works of authorship). ↑
Id. § 205(a), (c). A transfer of copyright ownership (or other document pertaining to a copyright) can be recorded in the Copyright Office even if the copyright has not been registered, but the recording will only give constructive notice if it relates to a registered copyright. Note that identifying the copyright only by title may not satisfy the requirements for constructive notice if there are numerous registered works with the same title and many recorded documents referring to the title. ↑
For convenience, this report sometimes uses the term “properly record” to mean that the relevant document is recorded in the Copyright Office in the form and manner required to give constructive notice of the facts stated therein. ↑
Id. § 205(d). For a recorded transfer to “prevail over” another transfer, the recording must give constructive notice, which can only happen if the copyright is registered. See supra note 20. Thus, only documents pertaining to registered copyrights can “prevail” under these rules. ↑
Id. § 154(a)(1); see also id. § 271(a) (“whoever without authority makes, uses, offers to sell, or sells any patented invention … infringes the patent”). ↑
J. Thomas McCarthy, McCarthy on Trademarks and Unfair Competition §§ 5.1, 2.7 (4th ed. 2007) (as originally conceived the purpose of trademark law was to prevent fraud and deceit by unfair competition). ↑
See, e.g., Inwood Labs. v. Ives Labs., 456 U.S. 844, 854 n.9 (1982) (an infringer deprives trademark owner of goodwill earned by owner’s efforts and deprives consumers of ability to distinguish among competitors’ products). ↑
Id. § 1051(d)(1)–(2) (explaining the timing of usage and the extensions of time available). ↑
The PTO maintains both a “principal register” and a “supplemental register” for trademarks. Some trademark applications may not meet the requirements for the principal register, but may be recorded in the supplemental register, which provides a lower level of protection. This report and the Model Agreement do not distinguish between the two, but use the term “registered” to refer to the principal register, unless otherwise specified. ↑
Id. § 1127. If the registration is not challenged, however, the trademark will remain on the registry indefinitely, as long as the owner files an affidavit or declaration of use between five and six years after registration, and by the end of every ten-year period after registration. Id. §§ 1058, 1059. ↑
E.g., Eva’s Bridal, Ltd. v. Halanick Enters., 639 F.3d 788 (7th Cir. 2011) (trademark owner must have quality control over licensee’s use to maintain consistent quality, not necessarily high quality, of goods and services using the trademark); Barcamerica Int’l USA Trust v. Tyfield Imps., Inc., 289 F.3d 589 (9th Cir. 2002) (trademark owner engaged in naked licensing and thus forfeited its rights in the mark, resulting in the cancellation of registration). ↑
15 U.S.C. § 1064(3); Bayer Co. v. United Drug Co., 272 F. 505 (S.D.N.Y. 1821); Haughton Elevator Co. v. Seeberger (Otis Elevator Co.), 85 U.S.P.Q. 80 (Comm’r Pat. 1850). ↑
114 P.L. 153, 130 Stat. 376. The D.T.S.A. amends the Economic Espionage Act, 18 U.S.C. §§ 1831–1839 (2012), which was formerly solely a criminal statute. Among other things, the D.T.S.A. creates a federal civil cause of action for trade secret misappropriation, in parallel with state law. See D.T.S.A. § 2(f) (“Nothing in the amendments made by this section shall … preempt any other provision of law.”). ↑
U.T.S.A. refers to the Uniform Trade Secrets Act with 1985 amendments. ↑
See, e.g., Kremer v. Cohen, 337 F.3d 1024 (9th Cir. 2003) (under California law, a domain name is intangible personal property and can be subject to claim for conversion); Harrods, Ltd. v. Sixty Internet Domain Names, 302 F.3d 214 (4th Cir. 2002); Caesars World, Inc. v. Caesars-Palace.com, 112 F. Supp. 2d 502 (E.D. Va. 2000) (registered domain name is property subject to in rem action under Anti-Cybersquatting Consumer Protection Act); Schott v. McLear (In re Larry Koenig & Assoc., LLC), No. 01-12829, 2004 Bankr. LEXIS 2311, at *1 (Bankr. M.D. La. Mar. 31, 2004) (domain name and contractual right to use name are property rights under Louisiana law); Sprinkler Warehouse v. Systematic Rain Inc., 859 N.W. 2d 527 (Minn. Ct. App. 2015) (domain names and copyright-protected material on websites are subject to garnishment). ↑
See, e.g., Dorer v. Arel, 60 F. Supp. 2d 558 (E.D. Va. 1999) (registered domain name is not personal property that can be the object of a judgment lien); Network Solutions, Inc. v. Umbro Int’l, Inc., 529 S.E.2d 80, 87 (2000) (registered domain name is not personal property subject to garnishment, but “the product of a contract for services” between the registrant and the registrar). ↑
Revised Article 9 was approved in 1995 and effective in most states on July 1, 2001. The most recent amendments to Article 9 were approved in 2010 and became effective in most states on July 1, 2013. ↑
Id. § 9-610(c)(2) (secured party can purchase collateral at private sale only if the collateral is of a kind that is customarily sold on a recognized market or the subject of widely distributed standard price quotations). ↑
Id. § 9-620. Generally, the debtor cannot waive its rights in connection with the secured party’s acceptance of collateral in satisfaction of the debt, and can only waive certain other rights in an authenticated record after default. Id. §§ 9-602(10), 9-624. ↑
The PTO accepts only specific types of documents for recording, and it then cross-references each recorded document to the original registration; the PTO can therefore generate a report showing all documents recorded against a particular patent or trademark. The Copyright Office will record any document “pertaining to a copyright” (17 U.S.C. § 205(a)), as long as it contains the original registration number. The Copyright Office does not cross-reference or link the recorded documents and registrations, but can generate a report showing every document that refers to a particular registration or party. ↑
See, e.g., Moldo v. Matsco, Inc. (In re Cybernetic Servs.), 252 F.3d 1039, 1044 (9th Cir. 2001) (“As is often true in the field of intellectual property, we must apply an antiquated statute in a modern context.”). ↑
For instance, although U.C.C. Article 9 had been in effect for several decades when the Copyright Act was comprehensively amended in 1976 (effective January 1, 1978), the amendments did not specifically address “security interests.” Instead, the amendments defined mortgages, hypothecations, and exclusive licenses as “transfers of copyright ownership,” and addressed the priority of claims of transferees. The Copyright Act does recognize “security interests” as such, but only in a limited context related to collective bargaining agreements. 28 U.S.C. § 4001(c) (2012). ↑
See, e.g., Cybernetic Servs., 252 F.3d at 1049–50 (discussing historical meanings of assignment, grant, and conveyance as transfers of title, and equating “hypothecation” to a security interest). ↑
See U.C.C. § 9-102 cmt. 26 (regarding the terms “assignment” and “transfer,” “no significance should be placed on the use [in Article 9] of one term or the other. Depending on the context, each term may refer to the assignment or transfer of an outright ownership interest or to the assignment or transfer of a limited interest, such as a security interest.”). ↑
The federal IP laws generally permit the owner of a registered IP asset to transfer “partial” interests in the nature of different kinds of rights (e.g., performance rights and distribution rights in a copyrighted work) or rights that can be exercised only in certain geographic areas (e.g., exclusive right to use a trademark in Texas and Oklahoma). The federal laws do not necessarily govern all of the contractual rights among transferors and transferees. See infra note 133. The question here is whether a security interest is the kind of “partial interest” that would be governed by the federal IP laws. ↑
Id. § 9-311 (addressing federal preemption as to methods of perfection). ↑
Aerocon Eng’g, Inc. v. Silicon Valley Bank (In re World Auxiliary Power Co.), 303 F.3d 1120, 1126 (9th Cir. 2002) (Copyright Act’s use of “mortgage” as a type of “transfer” is properly read to include security interests under U.C.C. Article 9); In re Nacio Sys., Inc., 410 B.R. 38 (Bankr. N.D. Cal. 2009); see also In re AEG Acquisition Corp., 127 B.R. 34 (Bankr. C.D. Cal. 1991) (as to registered copyrights), aff’d, 161 B.R. 50 (9th Cir. BAP 1993); In re Peregrine Entm’t, Ltd., 116 B.R. 194 (C.D. Cal. 1990) (same). ↑
See, e.g., In re Tower Tech, Inc., 67 F. App’x 521 (10th Cir. 2003) (filing with PTO is ineffective to perfect security interest in patents); Moldo v. Matsco, Inc. (In re Cybernetic Servs.), 252 F.3d 1039 (9th Cir. 2001) (U.C.C. filing is effective to perfect security interest in patents); Trimarchi v. Together Dev. Corp., 255 B.R. 606 (D. Mass. 2000) (U.C.C. filing is necessary to perfect security interest in trademark and PTO recording is ineffective); In re Coldwave Sys. LLC, 368 B.R. 91 (Bankr. D. Mass. 2007) (U.C.C. filing is necessary to perfect security interest in patents); In re 199Z, Inc., 137 B.R. 778 (Bankr. C.D. Cal. 1992) (U.C.C. filing is necessary to perfect security interest in a trademark and PTO recording was ineffective); In re Chattanooga Choo-Choo Co., 98 B.R. 792 (Bankr. E.D. Tenn. 1989) (U.C.C. filing, not federal registration, is required to perfect security interest in trademarks); In re Roman Cleanser Co., 43 B.R. 940 (Bankr. E.D. Mich. 1984) (U.C.C. filing is sufficient to perfect security interest in trademark and PTO recording is not necessary), aff’d, 802 F.2d 207 (6th Cir. 1986). ↑
The federal IP laws do not use the term “perfection”; references here to “perfecting a security interest” in a copyright through a filing in the Copyright Office mean that the filing will be sufficient to give the secured party’s interest priority over lien creditors (including a bankruptcy trustee) and unperfected and later-perfected security interests. ↑
The exhibits to the Model Agreement include short-form security agreements for recording liens in the relevant federal IP filing offices. ↑
I.e., the secured party’s well-known “belt and suspenders.” ↑
See, e.g., section 1.4 (“After-acquired Collateral”), note 30 (possible knowledge and materiality qualifications), and note 65 (possible limitation on perfection requirements) in the Model Agreement. ↑
See, e.g., Aerocon Eng’g, Inc. v. Silicon Valley Bank (In re World Auxiliary Power Co.), 303 F.3d 1120, 1131 (9th Cir. 2002). ↑
A few older cases had held that recording in the Copyright Office would be necessary to per fect a security interest in materials for which a copyright application could be, but had not been, filed with the Copyright Office. In re AEG Acquisition Corp., 127 B.R. 34 (Bankr. C.D. Cal. 1991), aff’d, 161 B.R. 50 (9th Cir. BAP 1993); In re Avalon Software, Inc., 209 B.R. 517 (Bankr. D. Ariz. 1997). These decisions temporarily led some secured parties to impose the impracticable requirement that debtors register all their copyrights. These decisions were heavily criticized and have been generally discredited. The Aerocon court expressly rejected the holdings in AEG Acquisition and In re Avalon that recording in the Copyright Office would be necessary to perfect a security interest in an unregistered copyright. See also MCEG Sterling, Inc. v. Phillips Nizer Benjamin Krim & Ballon, 646 N.Y.S.2d 778, 780 (Sup. Ct. 1996) (Peregrine ruling is “questionable” as to the need to register security interests in accounts receivable arising from copyrights). ↑
See section 1.4.4 (“Notice of Copyright Applications”) and notes 16 & 17 of the Model Agreement. ↑
See supra sections 4.2.1 (Copyright Act) & 4.2.2 (Patent and Lanham Acts). Although the language used in the different statutes is not identical, this kind of “bona fide purchaser” is essentially the opposite of a lien creditor, such as a bankruptcy trustee, who does not acquire an asset in good faith and does not provide value. ↑
See U.C.C. § 9-311 cmt. 5 (perfection of a security interest under a preemptive federal statute has all the consequences of perfection under Article 9); Moldo v. Matsco, Inc. (In re Cybernetic Servs.), 252 F.3d 1039, 1058 n.9 (9th Cir. 2001) (former U.C.C. section 9-302(3) governs only the “where to file” question, while issues left unresolved by the federal statute, such as priority, are resolved by looking to Article 9). ↑
See In re Transp. Design & Tech., Inc., 48 B.R. 635, 639 (Bankr. S.D. Cal. 1985) (U.C.C. governs perfection of a security interest in a patent, but federal law governs rights of bona fide purchasers, and they would prevail over security interest not recorded in the PTO). ↑
For instance, in Clorox Co. v. Chemical Bank, 40 U.S.P.Q.2d 1098 (T.T.A.B. 1996), the transaction at issue was structured as this kind of “assignment-with-license-back.” See infra note 131. ↑
See, e.g., In re Roman Cleanser Co., 43 B.R. 940 (Bankr. E.D. Mich. 1984) (security interest in a trademark is not equivalent to an assignment under the Lanham (Trademark) Act), aff’d, 802 F.2d 207 (6th Cir. 1986). ↑
See 35 U.S.C. §§ 281.35 100(d) (2012); In re Neurografix (360) Patent Litig., 5 F. Supp. 3d 146 (D. Mass. 2014) (an assignee that only has exclusionary right cannot bring infringement suit without joining the assignor patentee). For recording purposes, the PTO treats a “conditional assignment” as an “absolute assignment” regardless of whether the condition, such as payment of money, has been fulfilled, and the “assignment” can only be cancelled by both parties or a court order. 37 C.F.R. § 3.56 (2015). If a security interest in a patent is structured as a conditional assignment and recorded, the secured party could be treated as an assignee. ↑
See 15 U.S.C. § 1060(a) (2012); Brown Bark II, L.P. v. Dixie Mills, LLC, 732 F. Supp. 2d 1353 (N.D. Ga. 2010) (secured party that bid on debtor’s trademarks at its own Article 9 foreclosure sale but did not actually use the marks in business had received an “assignment in gross” and had no enforceable rights in the marks). ↑
Roman Cleanser Co., 43 B.R. at 947 (security interest in a trademark along with formulas and customer lists satisfied the goodwill requirements of the Lanham (Trademark) Act). ↑
See supra section 2.4.4; 15 U.S.C. § 1060(a). In Clorox, the trademark collateral included an intent-to-use (ITU) application, which had been filed in the PTO, but for which the required evidence of use of the trademark had not been accepted by the PTO. Clorox Co. v. Chemical Bank, 40 U.S.P.Q.2d 1098, 1100 (T.T.A.B. 1996). In response to a later challenge, the court found that the trademark registration itself (not merely the lien) had been invalidated by the premature “assignment” of the ITU application without the corresponding goodwill and operating business. Id. at 1105. Because Clorox dealt with an actual “assignment” of the trademarks and ITU application, the same analysis would not necessarily apply to the grant of a security interest that is not structured as an “assignment.” ↑
In the Copyright Office, there is a significant lag time between the submission of a non-electronic document for recording and its actual recording. Consequently, the “chain of title” reflected in the records of the federal IP recording offices may not be complete or correct. For copyright assignments (which cannot be submitted electronically), the lag can be as much as one year. ↑
See, e.g., Elaine D. Ziff, The Effect of Corporate Acquisitions on the Target Company’s License Rights, 57 Bus. Law. 767 (2002). ↑
In re XMH Corp., 647 F.3d 690 (7th Cir. 2011) (rule that trademark licenses are not assignable without authorization is a sensible default rule); In re Trump Entm’t Resorts, Inc., 526 B.R. 116, 124 (Bankr. D. Del. 2014) (parties to a trademark license agreement are free to contract around the default rule of non-assignability); In re Golden Books Family Entm’t, 269 B.R. 311 (Bankr. D. Del. 2001) (nonexclusive copyright licenses do not create ownership rights and are not assignable over the licensor’s objection). ↑
But see U.C.C. § 9-408 cmt. 9 (“This section does not override federal law to the contrary. However, it does reflect an important policy judgment that should provide a template for future federal law reforms.”). ↑
See, e.g., as to copyrights, Ryan v. Editions Ltd. W., Inc., 786 F.3d 754, 761 (9th Cir. 2015) (Copyright Act does not generally preempt contract-based claims under state law); Gaiman v. Mc-Farlane, 360 F.3d 644, 652 (7th Cir. 2004) (citing Saturday Evening Post Co. v. Rumbleseat Press, Inc., 816 F.2d 1191, 1194–95 (7th Cir. 1987)) (like a suit to enforce a copyright license, a suit for an accounting of profits between copyright co-owners arises under state law, not federal law, and there is no issue of copyright law); Broadcast Music Inc. v. Hirsch, 104 F.3d 1163, 1167–68 (9th Cir. 1997) (state law, not federal law, determined the effect of copyright owner’s assignment of royalties). ↑
See Valley Bank & Trust Co. v. Spectrum Scan, LLC (In re Tracy Broad. Corp.), 696 F.3d 1051 (10th Cir. 2012). In confirming the validity of a debtor’s grant of a security interest in proceeds of its FCC license notwithstanding federal statutory prohibition of an assignment of such a license without FCC consent, the court found support in U.C.C. section 9-408, stating that section 9-408 “does for state licenses what FCC policy does for FCC licenses,” and noting that section 9-408 and its comments recognize that a lien on the right to sale proceeds of a government license can attach when a lender extends credit to a licensee, so long as the governmental interest in regulation of the license is not infringed. Id. at 1064; see also U.C.C. § 9-408 cmt. 9. ↑
See section 1.2.3 (“Restricted IP Licenses”) of the Model Agreement. ↑
See, e.g., In re Trump Entm’t Resorts, Inc., 526 B.R. 116, 124 (Bankr. D. Del. 2015) (debtor trademark-licensee cannot assume or assign trademark license because trademark law prohibits assignment without consent of licensor). Although courts differ widely as to the correct statutory analysis, Bankruptcy Code section 365 generally permits a bankruptcy trustee or debtor in possession to “assume” and/or “assign” some kinds of existing contracts even if “applicable law” would otherwise “prohibit, restrict, or condition the assignment” of the contract, with an exception for circumstances where the “applicable law” would still bar assumption or assignment of the particular contract at issue. 11 U.S.C. § 365(f) (2012); see, e.g., Perlman v. Catapult Entm’t (In re Catapult Entm’t), 165 F.3d 747 (9th Cir. 1999) (debtor licensee could not assume patent license over licensor’s objection). Although the language in Bankruptcy Code section 365 and in U.C.C. section 9-408 as to laws or contract terms that prohibit, restrict, or condition the assignment of a contract may be similar, Article 9 does not include the same exceptions as the Bankruptcy Code. ↑
Other Bankruptcy Code provisions deal with intellectual property. See, e.g., In re Crumbs Bake Shop, Inc., 522 B.R. 766 (Bankr. D.N.J. 2014) (despite debtor’s sale of all its assets, non-debtor trademark licensees could still elect to maintain licenses in place, under Bankruptcy Code section 365(n), even though it technically does not cover trademarks). ↑
Relevant Copyright Act provisions on recording, registration, priority, and related matters addressed in this section 4.6 are summarized in supra section 2.2.4. ↑
The circumstances in which the respective interests of a secured party and an exclusive licensee would “conflict” in a way that would allow one of them to “prevail over” the other are not clear. Possibly there is no “conflict” until the secured party forecloses its lien. Possibly no conflict arises unless both transfers are of the same type or unless the grants are identical. Notwithstanding these theoretical concerns, a secured party will likely be content with a perfected security interest covering the debtor’s rights to collect royalties or license fees generated under the license. See supra note 118. ↑
Documents submitted to the Copyright Office may not be recorded for several months. The date of recording, however, is the date when the proper document, in proper form, and fees are all received in the Copyright Office. 37 C.F.R. § 201.4(e) (2015). ↑
In film financing, for instance, the owner of the film copyright may grant an exclusive license in (or assign) the rights to distribute the film (and collect royalties) to a separate distribution company. A lender to the distribution company is likely to require the recordation of both the exclusive license (or assignment) and the security interest in the Copyright Office. ↑
Parties may also resist recording licenses when they would prefer to avoid the public disclosure of their relationships and other business terms. ↑
See, e.g., CERx Pharm. Partners, LP v. RPD Holdings, LLC (In re Provider Meds, LP), No. 13-30678-BJH, 2014 Bankr. LEXIS 3519, at *10–13 (Bankr. N.D. Tex. Aug. 20, 2014) (in lender’s suit against debtor for fraudulent inducement and tortious interference, alleging that debtor had reduced software collateral value by granting perpetual, royalty-free licenses to third parties, court held that the licenses did not create “encumbrances,” and that debtor therefore had not breached its representations or covenants as to priority and absence of encumbrances). ↑
See, e.g., Moldo v. Matsco, Inc. (In re Cybernetic Servs.), 252 F.3d 1039, 1052 (9th Cir. 2001) (citing Keystone Foundry v. Fastpress Co., 272 F. 242, 245 (2d Cir. 1921) (patents)); ICEE Distributors, Inc. v. J&J Snack Foods Corp., 325 F.3d 586, 593 (5th Cir. 2003) (trademarks). This rule also has been applied to covenants not to sue and settlement agreements. See, e.g., Jardin v. Datallegro, Inc., No. 08cv1462-IEG-RBB, 2009 U.S. Dist. LEXIS 3339, at *6–7 (S.D. Cal. Jan. 20, 2009) (new patent owner was bound by prior settlement agreement and could not bring infringement action); V-Formation, Inc. v. Benetton Grp. SpA, Civ. A. No. 02-cv-02259-PSF-CBS, 2006 U.S. Dist. LEXIS 13352, at *18–21 (D. Colo. Mar. 10, 2006) (new patent owner could not bring infringement suit even though new owner was not aware of covenant not to sue granted by prior owner). ↑
See, e.g., Republic Pictures Corp. v. Security-First Nat’l Bank of L.A., 197 F.2d 767 (9th Cir. 1952) (federal court does not have jurisdiction to foreclose copyright mortgage); Moore v. Willis, No. 14cv1602 BTM (RBB), 2014 U.S. Dist. LEXIS 127543, at *4–5 (S.D. Cal. Sept. 8, 2014) (state law applies to determine if copyrights are subject to execution to satisfy a judgment); Mayfair Wireless LLC v. Celico P’ship, No. 11-772-SLR-SRF, 2013 U.S. Dist. LEXIS 124206, at *17–18 (D. Del. Aug. 30, 2013) (federal law determines validity and terms of an assignment of a patent, but state law applies to a transfer of patent ownership by operation of law if it is not deemed an assignment). ↑
See U.C.C. § 9-408(a); supra section 3.6; see also supra section 4.5 (Bankruptcy Risks). ↑
See, e.g., Sky Techs. LLC v. SAP AG, 67 U.C.C. Rep. Serv. 2d 802 (E.D. Tex. 2008) (where patent security agreement was recorded in the PTO, purchaser from secured party’s assignee at fore-closure sale acquired patents by operation of law—U.C.C. Article 9—notwithstanding absence of written assignment or recorded transfer from original debtor to purchaser); In re Coldwave Sys. LLC, 368 B.R. 91 (Bankr. D. Mass. 2007) (U.C.C. Article 9, not patent law, governs secured party’s exercise of remedies, and secured party was not allowed to transfer the IP collateral to itself without debtor’s consent, or waiver, as required for a strict foreclosure under U.C.C. section 9-620). ↑
See Corsair Special Situations Fund, L.P. v. Engineered Framing Sys., Inc., 694 F. Supp. 2d 449, 459 (D. Md. 2010) (court construed security agreement provision that patent collateral would “become an absolute assignment” after default to effectuate an automatic transfer of title upon default); but see Steven O. Weise & Stephen L. Sepinuck, Personal Property Secured Transactions, 70 Bus. Law. 1243, 1265 n.218 (Corsair decision allowing collateral to be automatically assigned to secured party on default, as provided in security agreement, is “simply wrong”). ↑
When negotiating mergers or acquisitions, deal lawyers will often support their position by asserting that it is in accord with the “market” based on published deal points studies. However, as many of these lawyers intuit based on their experience, terms vary across the market based on a number of factors including deal size, a factor that no previously published study has examined or accounted for. This article confirms that intuition by surveying the middle market at deal sizes from several million to several billion dollars and showing, for the first time, that highly negotiated deal points tend to become more seller favorable as transaction value increases. This conclusion is based on a review of five terms (liability cap, liability basket amount and type, sellers’ catch all representations, the “no undisclosed liabilities” representation, and closing conditions) across 849 deals from 2007 to 2015, a sample larger than that used in any previously published deal points study of mergers and acquisitions.
When negotiating mergers or acquisitions, many deal lawyers try to gauge what a “market” position is for a given deal point by looking at published deal points studies.1 Often these studies are cited in negotiations by one of the parties to show that the position that party is advocating is in line with the market and thus fair. Seasoned practitioners know from experience that the other party will frequently reject the study data on grounds that it is not representative of the market segment their deal inhabits. This objection is reasonable; deal points studies provide a good baseline for understanding the market as a whole, but thus far they have not investigated how terms vary across market segments. Our study addresses one facet of that issue, perhaps the most significant one, by showing how transaction size affects highly negotiated deal points.2 By publishing, for the first time, data to show what market is at each transaction size, we hope to facilitate settlement of these contentious points and contribute to transactional efficiency.3
This study analyzes data collected from 849 merger or acquisition deals spanning nine years, from 2007 to 2015, on which SRS Acquiom served as the shareholders’ representative for a privately held target company’s shareholders.4 Through its shareholders’ representative service, SRS Acquiom is engaged when there is a large number of shareholders that would prefer to use the services of a third party to manage postclosing administration and dispute matters. In this set of 849 deals, the average number of shareholders of the private company target was 169 and the median number of shareholders was 90.5
This sample is larger than that used in any previously published study of M&A deal points and ensured that each of the six transactionsize buckets we examined contained a significant number of deals such that random outliers would not unduly skew the results. The sample reflects deals with purchase prices ranging from $1 million to $3.2 billion with a mean deal size of $149.3 million and a median of $74.5 million. This distribution focuses on deals that are sometimes referred to as the “middle market” ($10 million to $1 billion), but it also includes smaller deals under $10 million. The middle market can be further subdivided into the “lower” ($10 million to $250 million), “core” ($250 million to $500 million), and “upper” ($500 million to $1 billion) segments.6
In discussing the effect of transaction size on deal points with other deal professionals, we noted that many who have worked in multiple segments have observed that what market is varies by segment. This study demonstrates for the first time that this anecdotally observed variation of terms across deal sizes is a real phenomenon and quantifies that variation for the following negotiated terms: (I) liability caps, (II) liability basket amount and type, (III) seller’s catch-all representations and warranties, (IV) the “no undisclosed liabilities” representation, and (V) closing conditions. Our analysis shows that, in general, those highly negotiated deal points tend to become more seller favorable as deal size increases. We briefly explain each of these deal points and our findings on how transaction size affects them in the parts that follow.
Figure 1-A Liability Cap as a Percent of Deal Size, Versus Deal Size (Raw Data)
I. LIABILITY CAPS
Liability caps establish an upper limit on the amount of the seller’s indemnification obligations. Generally, liability caps apply to most of the seller’s representations, but they usually do not apply to covenants and representations defined by the parties to the transaction as “fundamental.”7 The seller, of course, prefers liability caps that are lower relative to the total transaction price, while the buyer prefers liability caps that are higher.
Across all deals in the sample, the mean liability cap was 14.2 percent of the transaction price. However, when looking at the relationship between liability caps and transaction size, we found that for smaller deals, buyers were able to obtain higher liability cap percentages; 74.7 percent of deals with liability caps of 20 percent or above occurred at deal sizes below the $74.5 million median of our sample (see Figure 1-A, above). To take a closer look at this nonlinear relationship, we fit an exponential decay to a mathematically smoothed set of the liability cap percentage data and found that as deals increase in size, liability caps as a percentage of the transaction size become smaller and more seller favorable (see Figure 1-B, below). This indicates that many buyers of smaller deals have the leverage to require sellers to bear more risk on a percentage basis.
Figure 1-B Liability Cap as a Percent of Deal Size, Versus Deal Size (Smoothed Data)8
II. LIABILITY BASKET AMOUNT AND TYPE
Liability baskets establish the minimum threshold amount of the seller’s indemnification obligation below which the seller will not be liable. Like liability caps, liability baskets generally apply to most of the seller’s representations, but they usually do not apply to covenants or to fundamental representations.9 The average threshold amount of a liability basket in our study was 0.83 percent of the transaction size, decreasing slightly as the purchase price increased. A decrease in the basket amount as a percentage of deal size as deals increase in transaction size reflects a benefit for buyers, who benefit from a lower threshold (as a percentage of deal size) in bringing indemnification claims. However, basket amounts in absolute dollars still increase as deal size increases. Therefore, although a buyer’s relative position appears to be more favorable as deals become larger, the increase in the nominal basket amount still favors sellers in absolute terms. Moreover, as explained below, as transaction size increases, sellers are able to negotiate more favorable types of baskets.
In general, there are three basic types of baskets. “Deductible” baskets, which are the most seller friendly, result in liability to the seller only for damages in excess of the threshold amount. Thus, if the basket is set at $1 million and there are $1.1 million of damages, only $100,000 is recoverable against the seller. First dollar or “tipping” baskets are more buyer friendly because they result in liability to the seller for all damages once the threshold amount has been reached. For the same example, because the $1.1 million in damages is greater than the basket amount of $1 million, all $1.1 million in damages would be recoverable with a tipping basket. A third common approach is a combination or “partial tipping” basket. Under a combination basket, the seller is liable for all damages in excess of a threshold amount plus a percentage of the damages below that threshold. For example, if we again assume $1.1 million in damages but this time with a $1 million basket amount with a 50 percent tip, then the seller would be liable for $600,000 of the $1.1 million in damages (equal to the $100,000 above the threshold plus 50 percent of the amount below the $1 million threshold). Finally, in a small subset of deals, there is no liability basket, meaning that the seller is liable for all damages from the first dollar of indemnified claims, which is the most buyer-friendly alternative.
Figure 2, below, highlights the prevalence of each type of basket at various deal sizes. We note that for deals having a purchase price of less than $10 million, deals with no basket or first dollar baskets make up 72.7 percent of the deals, while deals with deductible baskets make up only 27.3 percent. As the deal size increases, so too does the prevalence of deductible or combination baskets; 47.8 percent of deals having a purchase price greater than $250 million contain deductible or combination baskets, while only 52.2 percent contain first dollar or deductible baskets. The data reflects that as deal size increases, sellers are generally able to negotiate better liability basket terms.10
Figure 2 Basket Type, Segmented by Deal Size
III. SELLER’S CATCH-ALL REPRESENTATIONS
Seller’s “catch-all” representations serve to fill in any gaps that are left by more specific representations. One common formulation, the “10b-5” representation, mirrors the Securities Exchange Act of 1934 rule of the same name, but without the scienter requirement:
No representation or warranty or other statement made by Seller in this Agreement, the Disclosure Letter, any supplement to the Disclosure Letter, the certificates delivered pursuant to Section 2.7(a) or otherwise in connection with the Contemplated Transactions contains any untrue statement or omits to state a material fact necessary to make any of them, in light of the circumstances in which it was made, not misleading.
In another formulation, the “full disclosure” representation, the seller represents that all material facts of which it has knowledge have been disclosed:
Seller does not have Knowledge of any fact that has specific application to Seller (other than general economic or industry conditions) and that may materially adversely affect the assets, business, prospects, financial condition or results of operations of Seller that has not been set forth in this Agreement or the Disclosure Letter.
Figure 3 Seller’s Catch-All Representations, Segmented by Deal Size
Buyers prefer to include catch-all representations because they provide a more fulsome basis for indemnification protection than do the seller’s specific representations. Conversely, sellers object to these representations because they greatly expand the potential scope of sellers’ exposure to indemnification claims.
As noted in Figure 3 above, we found that for transactions having a purchase price of less than $10 million, buyers were successful in obtaining catch-all representations in 58.2 percent of the deals in our sample. However, as the deal size increases beyond $50 million, their prevalence decreases. For deals having a purchase price greater than $250 million, only 43.6 percent of deals contain catch-all representations.11
IV. “NO UNDISCLOSED LIABILITIES” REPRESENTATION
A “no undisclosed liabilities” representation is another type of catch-all representation, designed to protect the buyer against liabilities related to the business that have not been otherwise disclosed to the buyer. Buyers prefer a blanket representation from sellers, whereas sellers prefer to omit, or at least qualify, the representation. A buyer-friendly formulation of a no undisclosed liabilities representation is as follows:
Seller has no liability except for liabilities reflected or reserved against in the Balance Sheet or the Interim Balance Sheet and current liabilities incurred in Seller’s ordinary course of business since the date of the Interim Balance Sheet.
A seller-friendly formulation would limit the representation to liabilities required to be disclosed on a balance sheet prepared in accordance with GAAP, include a Material Adverse Effect qualifier, or both:
Seller has no liability of the nature required to be disclosed in a balance sheet prepared in accordance with GAAP [or which could not reasonably be expected to have, individually or in the aggregate, a Material Adverse Effect], except for liabilities reflected or reserved against in the Balance Sheet or the Interim Balance Sheet and current liabilities incurred in Seller’s ordinary course of business since the date of the Interim Balance Sheet.
As noted in Figure 4 below, we found that the buyer-friendly formulation is most prevalent in smaller deal sizes, with 68 percent of deals having a purchase price under $10 million containing a blanket no undisclosed liabilities representation. As the deal size increases, the buyer-friendly formulation is generally less prevalent, with less than 50 percent of deals above $250 million including the formulation. Therefore, as deal size increases, sellers are increasingly able to qualify the undisclosed liabilities representation.12
V. CLOSING CONDITIONS
Prior to closing, the seller must demonstrate that certain conditions are met in order for the buyer to be obligated to close. One critical and customary closing condition is the “bring-down” of the seller’s representations. Our study reveals that there is considerable variation as to the precise standard that the seller must meet to satisfy this condition. Buyers prefer sellers to demonstrate that their representations are accurate “in all respects” as of the closing. This means that even an immaterial inaccuracy at closing in a representation that was entirely true at signing would allow the buyer not to close the transaction. An example of this formulation follows:
Figure 4 “No Undisclosed Liabilities” Representation, Segmented by Deal Size
Each of the representations and warranties made by Seller in this Agreement shall have been accurate in all respects as of the Closing Date as if made on the Closing Date.
Somewhat less buyer friendly, but still requiring the seller to bear more of the risk of changes between signing and closing, is a bring-down requiring representations to be accurate “in all material respects”; this means that only material inaccuracies in individual representations as of the closing date would allow the buyer not to close the transaction. For example:
Each of the representations and warranties made by Seller in this Agreement shall have been accurate in all material respects as of the Closing Date as if made on the Closing Date.
The most seller-friendly form of the condition, which provides the seller with the highest degree of certainty of closing, is a bring-down requiring representations to be true except for inaccuracies in the representations that would not have a “Material Adverse Effect” (as defined in the purchase agreement and commonly referred to as an “MAE”) on the business. For example:
Figure 5 Closing Conditions, Segmented by Deal Size
Each of the representations and warranties made by Seller in this Agreement shall be accurate in all respects as of the Closing Date as if made on the Closing Date, except for inaccuracies of representations or warranties the circumstances giving rise to which, individually or in the aggregate, do not have and could not reasonably be expected to have a Material Adverse Effect.
As noted in Figure 5 above, only 18.4 percent of deals having a purchase price of less than $100 million have the seller-friendly Material Adverse Effect formulation. However, as purchase prices increase beyond $100 million, we found increasingly more seller-favorable formulations of the closing condition. For deals with purchase prices greater than $250 million, fully 53.1 percent of deals have the seller-favorable Material Adverse Effect formulation.13
VI. COMPARISON WITH THE 2013 AND 2015 ABA DEAL POINTS STUDIES
This is the first study to look at the prevalence of buyer- or seller-favorable deal points based on the sizes of transactions. Prior studies have tried to determine what “market” is for a given deal point by looking at the prevalence of various formulations in the study’s total sample but have not broken the sample down by transaction size.14 As a result, it is impossible to validate our results through a direct comparison with prior studies. However, by comparing the aggregate prevalence of different formulations of deal points across our entire sample with the aggregate prevalence found in prior studies, we can understand whether our sample yields similar conclusions as to what market is overall.
The most commonly cited deal points studies are the 2014 SRS Study and the 2013 and 2015 ABA Studies. The former is drawn from a subset of the data used here, and a comparison would thus not be helpful, but the ABA Studies are drawn from an entirely different sample. While the SRS Acquiom data used here come from deals in which the target company had a large number of shareholders that required the service of a shareholders’ representative, the ABA Studies look at publicly available deals that involved private targets being acquired by public companies. Despite these differences, in comparing the aggregate prevalence of the various deal point formulations seen in our study to those reported in the ABA Studies, we found that our results are consistent with those seen in the ABA Studies.
The 2013 and 2015 ABA Studies review 136 and 117 publicly available deals completed in 2012 and 2014, respectively, that involved private targets acquired by public companies through traditional merger or acquisition transactions. Compared to our sample, the ABA Studies’ samples skew toward larger deals. The value of the transactions in the 2013 ABA Study ranged from $17.2 million to $4.7 billion in purchase price (versus $1 million to $3.2 billion in this study), with mean and median deal sizes of $305 million and $150 million, respectively (versus $149 million and $74.5 million, respectively, in this study). Similarly, the value of the transactions in the 2015 ABA Study ranged from $50 million to $500 million in purchase price, with mean and median deal sizes of $186 million and $130.5 million, respectively.
Figure 6, below, demonstrates that the deals of the ABA Studies’ samples (with their larger mean and median transaction sizes) were, on average, more seller friendly than the deals of this study with respect to liability basket type, seller’s catch-all representations, and warranties and closing condition terms.15 This is consistent with this study’s finding that the market for highly negotiated terms is more seller friendly at larger transaction sizes. Additionally, when looking at the median liability cap as a percent of deal size, the larger deals of the ABA Studies had a more seller-friendly 10.0 percent median (in both the 2013 and 2015 ABA Studies), compared with an 11.3 percent median in this study.
Figure 6 Comparison of the Percent of Deals with Seller-Friendly Terms
VII. CONCLUSION
Based on the SRS Acquiom sample, we conclude that, overall, as deals increase in transaction value, the parties become increasingly likely to settle on seller-favorable formulations of the hotly contested deal points we investigated, including liability caps, liability baskets, sellers’ catch-all representations and warranties, the “no undisclosed liabilities” representation, and closing conditions. Examining these points individually reveals that there are some instances in which deal terms do not become more seller favorable with each increase in transaction size; rather, some minor deviations in the overall trend occur.16 It is clear, however, that with respect to all of the studied points, transactions with purchase prices of less than $10 million contain, on average, more buyer-friendly terms than transactions with purchase prices above $250 million.
The reasons that legal deal terms become increasingly seller friendly as deal size increases are beyond the scope of this study. There are many possible contributing factors, and it seems likely that multiple factors play a role. Future researchers who wish to take on this question may want to start their investigations by considering the simplest explanation: a relatively weaker market for smaller businesses causes sellers of these businesses to accept more onerous legal terms just as they, on average, accept purchase prices based on lower multiples of earnings as compared to sellers of larger businesses.17 If in fact market forces are the primary contributing factor, we would expect that, within an industry, the multiples of earnings would increase as deal points become more seller favorable. Likewise, we would expect that other markers of a robust market, such as a greater number of bidders participating in an auction process,18 would correlate positively with incidence of seller-friendly deal terms.
While this study cannot explain what causes heavily negotiated deal terms to become more seller friendly as deal size increases, the trend documented here should help all parties to understand the market better and to avoid the breakdowns in negotiations that often occur when each side thinks the other is making an unreasonable or “non-market” request.
__________________
* Eric Rauch is a partner in the mergers and acquisitions practice group at Dorsey & Whitney, LLP. Brian Burke is an associate in the mergers and acquisitions practice group at Dorsey & Whitney, LLP. The authors are indebted to SRS Acquiom for offering the use of its database of M&A deals for this article, without which this study would not have been possible. Glenn Kramer of SRS Acquiom deserves special acknowledgement for his contribution to the statistical analysis included below. The authors would also like to thank John Marsalek and Bryn R. Vaaler for their thoughtful comments on earlier versions of this article. The views and opinions expressed in this article are solely those of the authors and not those of Dorsey & Whitney or of SRS Acquiom.
2. In this study, “transaction size” or “deal size” means the purchase price for the transaction, not including any earn-out consideration.
3. See Ronald J. Gilson, Value Creation by Business Lawyers: Legal Skills and Asset Pricing, 94 YALE L.J. 239 (1984) (describing the role of the business lawyer as that of a transaction cost engineer, designing efficient mechanisms to allow parties to effect transactions).
4. The set analyzed here comprises all of the merger or acquisition deals in which SRS Acquiom served as a shareholder representative from 2007 through 2015, but it excludes certain deals not considered to be traditional merger or acquisition transactions. For example, the sample does not take into account ongoing transactions with no closing date or previously completed transactions in which SRS Acquiom was engaged to take over as the successor to a different initial shareholder representative.
5. For a comparison of this sample with studies that arrived at their sample by other means, see infra Part VI.
7. Although which representations are defined as fundamental varies by deal, one form of a pro-buyer private merger agreement offered by Practical Law Company identifies the following representations as a starting point: organization and qualification, due authority, capitalization, environmental matters, employee benefits, and broker fees. See Merger Agreement (Private Company, Pro-Buyer), PRACTICAL L., http://us.practicallaw.com/5-538-9385 (last accessed Apr. 4, 2016). In the 2014 SRS Study, representations that were identified as fundamental and carved out from liability caps more than 10% of the time included due authority (carved out 84% of the time), capitalization (78%), taxes (72%), ownership of shares (66%), due organization (62%), broker or finder fees (42%), intellectual property (31%), no conflicts (23%), employee benefits and ERISA (16%), and title to and sufficiency of assets (15%). Covenant breaches were also carved out of the liability cap 29% of the time. 2014 SRS Study, supra note 1, at 67.
8. For the smoothed data set, we ordered the deals by transaction size and convolved that with a fifteen-deal-wide triangle filter. We then fit an exponential decay to the resulting data set, obtaining the following equation of fit: Liability Cap Percent = 19.32 * exp(–0.11 * ln(Deal Size in $ Millions)). This model resulted in a residual standard of error of 0.883 on 757 degrees of freedom.
9. In the 2014 SRS Study, the following representations were carved out from the liability basket more than 10% of the time: due authority (carved out 74% of the time), capitalization (68%), taxes (64%), due organization (60%), ownership of shares (56%), broker or finder fees (42%), no conflicts (22%), intellectual property (19%), employee benefits or ERISA (17%), and title to or sufficiency of assets (14%). Covenant breaches were also carved out of the liability basket 65% of the time. 2014 SRS Study, supra note 1, at 62.
10. To determine whether the observed relationship between transaction size and basket type was meaningful, we grouped the basket types into “seller favorable” (deductible basket or partially deductible basket) and “buyer favorable” (no basket or tipping basket) and ran a Tukey honest significant difference test on the mean transaction sizes at a 95% family-wise confidence level. This test resulted in a p-value of 0.047, strongly suggesting that the data points to a relationship between transaction size and whether the basket type is buyer or seller favorable.
11. To determine whether the observed relationship between transaction size and catch-all representations was meaningful, we grouped the catch-all representations into “buyer favorable” (full disclosure, 10b-5, or both catch-all representations) and “seller favorable” (no catch-all representations) and ran a Tukey honest significant difference test on the mean transaction sizes at a 95% family-wise confidence level. This test resulted in a p-value of 0.037, strongly suggesting that the data points to a relationship between transaction size and whether a catch-all representation is included.
12. To determine whether the observed relationship between transaction size and no undisclosed liabilities representations was meaningful, we grouped the no undisclosed liabilities representations into “buyer favorable” (unqualified no undisclosed liabilities representation) and “seller favorable” (qualified no undisclosed liabilities representation or agreement silent on undisclosed liabilities) and ran a Tukey honest significant difference test on the mean transaction sizes at a 95% family-wise confidence level. This test resulted in a p-value of 0.024, strongly suggesting that the data points to a relationship between transaction size and whether the no undisclosed liabilities representation is buyer or seller favorable. Note also, however, that 8.9% of deals less than $10 million and 3.7% of deals between $10 and 25 million omit the undisclosed liabilities representation entirely, which is the most seller-favorable permutation. This is more frequent than in larger deals in our deal sample. While we cannot be certain of the reason for the apparent anomaly, it may be due to the buyer’s having addressed undisclosed liabilities through other catch-all representations.
13. To determine whether the observed relationship between transaction size and closing condition standard was meaningful, we grouped the closing condition standards into “buyer favorable” (bring-down in all respects or in all material respects) and “seller favorable” (bring-down qualified by Material Adverse Effect formulation) and ran a Tukey honest significant difference test on the mean transaction sizes at a 95% family-wise confidence level. This test resulted in a p-value of 0, reflecting a complete separation of the groups at the 95% confidence interval and indicating a very strong relationship between buyer- or seller-favorable formulations of closing condition standards and transaction size.
15. Note that the 2013 and 2015 ABA Studies’ categorization of the no undisclosed liabilities representation data and the 2015 ABA Study’s categorization of the closing conditions data differ from that used in our sample such that a comparison of results on those terms was not possible.
16. See, for example, Figure 2, which demonstrates that while the percentage of deals with deductible baskets generally increases as transaction size does, this percentage actually dips from 27% of deals under $10 million to only 23% of deals in the $10–25 million bucket before increasing to 34% of deals in the $25–50 million bucket.
18. This is especially the case because, in such processes, bidders often submit proposed revisions to the seller’s form of agreement. This allows the seller to select among bidders offering comparable valuations and choose the one that will accept the most seller-friendly legal terms.
Many companies believe that they are beyond the reach of the Fair Credit Reporting Act (FCRA) because they do not engage in typical “credit” reporting; however, such beliefs are enormously mistaken. Rather, the FCRA regulates a sprawling spectrum of products and industries ranging from insurance to retail to energy. The FCRA further governs all those involved in the consumer report chain of custody – furnishers, consumer reporting agencies (CRAs), and users of consumer information. Indeed, it is difficult to imagine an employer or a consumer-facing business that is not subject to the FCRA’s strict, technical requirements. Given the innumerable number of products offered by the plethora of specialty CRAs in the marketplace today, users may even unknowingly purchase a regulated consumer report. The bottom line is that the FCRA is likely regulating your client’s business, even if you do not think it is, and with regulation comes risk – both monetary and reputational. Besides the ever-expanding FCRA class-action arena, federal regulatory enforcement has become just as prominent, with the Consumer Financial Protection Bureau (CFPB) and Federal Trade Commission (FTC) taking the lead in prosecuting FCRA violators. Counsel must take notice of this ever-increasingly prominent statute and advise their clients accordingly.
This article explores the broad scope and expansive reach of the FCRA. Part I describes the various individuals and entities that fall within the FCRA’s reach. Part II illustrates the potentially staggering damages that may result from an FCRA violation. Part III then explores some of the common claims that typically are asserted against employers and CRAs. Part IV explains the emerging scrutiny on furnishers of consumer information.
I. The FCRA’s Expansive Reach
Although its name insinuates a limited scope, the FCRA governs more than just traditional credit reports. Rather, the FCRA focuses on any information that can be broadly defined as a “consumer report.” A “consumer report” means “any written, oral, or other communication of any information by a consumer reporting agency bearing on a consumer’s credit worthiness, credit standing, credit capacity, character, general reputation, personal characteristics, or mode of living which is used or expected to be used or collected in whole or in part for the purpose of serving as a factor in establishing the consumer’s eligibility” for credit, insurance, or employment purposes. A “consumer reporting agency,” in turn, is defined as “any person which, for monetary fees, dues, or on a cooperative nonprofit basis, regularly engages in whole or in part in the practice of assembling or evaluating consumer credit information or other information on consumers for the purpose of furnishing consumer reports to third parties.” Thus, the FCRA clearly reaches beyond the spectrum of credit reporting – it extends to criminal and civil records, civil lawsuits, reference checks, and other information obtained by a CRA.
The FCRA additionally imposes requirements on entities beyond typical CRAs. In addition to its clear control over the “Big Three” CRAs – Experian, Equifax, and Trans Union – and the burgeoning industry of specialty CRAs, the FCRA also regulates users and furnishers of consumer information, each of which is subject to a unique set of obligations.
First, the FCRA requires CRAs to use “reasonable procedures” to protect “the confidentiality, accuracy, relevancy, and proper utilization” of consumer credit information contained in consumer reports. Accordingly, CRAs are prohibited from furnishing consumer reports to persons who lack a permissible purpose, such as using a consumer report to determine employment or credit eligibility. These types of entities are further required to maintain reasonable procedures to ensure the maximum possible accuracy of consumer information in consumer reports and to ensure that such information is provided to only proper users.
Second, users of consumer information, such as employers, must first have a permissible purpose under the FCRA to obtain a consumer report. Users are also required to notify consumers when “adverse” actions are taken based at least in part on information contained in a consumer report.
Finally, furnishers have specific responsibilities to establish and maintain reasonable written policies and procedures designed to implement the FCRA requirements and to ensure that the information furnishers report to CRAs is accurate. Furnishers also have specific reinvestigation obligations in the context of consumer disputes that are submitted either directly or indirectly to the furnisher.
Each of these three entities clearly faces a different set of technical requirements under the FCRA and, as demonstrated below, potentially may be subject to enormous monetary damages for failure to comply.
II. Potential Damages under the FCRA
The FCRA provides for a range of potential remedies, including actual, statutory, and punitive damages as well as reasonable attorney fees. Specifically, the availability of statutory damages under the FCRA makes the statute attractive to plaintiffs who otherwise cannot prove an injury-in-fact and leads to potential enormous exposure for defendants.
The FCRA provides for statutory damages in the amount of $100 to $1,000, but plaintiffs must first prove a willful violation. Based on an analysis of the statutory construction of the term “willfully” in the FCRA, the U.S. Supreme Court in Safeco Insurance Co. of America v. Burr, 551 U.S. 47 (2007), defined “willful” to include reckless disregard of a statutory duty. The court then defined “reckless” as an “action entailing an unjustifiably high risk of harm that is either known or so obvious that it should be known,” and further explained that, “[i]t is this risk of harm, objectively assessed that is the essence of recklessness at common law.” The court summarized its holding as follows: “[A] company subject to FCRA does not act in reckless disregard of it unless the action is not only a violation under a reasonable reading of the statute’s terms, but shows that the company ran a risk of violating the law substantially greater than the risk associated with a reading that was merely careless.” The court’s ruling thus raised the bar for a plaintiff to prove reckless disregard because evidence of a defendant’s subjective bad faith is no longer determinative; rather, courts will apply an objective lens when considering a defendant’s actions.
Although many class-action plaintiff claims hinge on this statutory damages clause, the future of such damages remains questionable after the U.S. Supreme Court’s decision in Spokeo, Inc. v. Robins, 194 L. Ed. 2d 635 (2016). In Spokeo, Robins sued the “people search engine” for alleged violations of the FCRA. Specifically, Robins alleged that Spokeo published inaccurate (though not harmful per se) information about him, including that Robins had a graduate degree and was married and had children. At issue on appeal was the fact that Robins’s complaint alleged only statutory violations and no physical injury in fact. Spokeo argued that this statutory violation alone was insufficient to confer Article III standing because it did not meet the “irreducible constitutional minimum” to establish standing, which requires a plaintiff to have suffered an injury in fact by sustaining an “actual or imminent” harm that is “concrete and particularized.”
The district court originally dismissed the case, holding that Robins failed to allege any injury-in-fact and, therefore, did not have Article III standing. The Ninth Circuit reversed, holding that the alleged violation of Robins’s statutory rights alone is sufficient to satisfy Article III’s injury-in-fact requirement, regardless of whether the plaintiff can show a separate actual injury. On May 16, 2016, the U.S. Supreme Court issued its much-anticipated decision, vacating and remanding the decision of the Ninth Circuit.
Justice Alito delivered the 6–2 decision, with the majority holding that the Ninth Circuit’s injury-in-fact analysis was “incomplete” because it “focused on the second characteristic (particularity), but it overlooked the first (concreteness).” According to the court, “a ‘concrete’ injury must be ‘de facto’; that is, it must actually exist.” Through its analysis, the court indicated that a technical violation is not enough to create particularized, concrete harm. The court specifically determined that: “Congress’ role in identifying and elevating intangible harms does not mean that a plaintiff automatically satisfies the injury-in-fact requirement whenever a statute grants a person a statutory right and purports to authorize that person to sue to vindicate that right.” Rather, “Article III standing requires a concrete injury even in the context of a statutory violation.” The court thus held that “Robins cannot satisfy the demands of Article III by alleging a bare procedural violation.” The court remanded with instructions to the Ninth Circuit to decide “whether the particular procedural violations alleged in this case entail a degree of risk sufficient to meet the concreteness requirement.”
Although Spokeo is an FCRA decision, the ruling undoubtedly will have broad implications across all types of consumer lawsuits. The decision will continue to engender arguments as to whether a named plaintiff has alleged a sufficient “concrete” injury to give rise to constitutional standing. Given the number of individual and class-action lawsuits that were stayed pending the court’s decision, it is expected that many lower courts will soon flesh out the contours of Spokeo.
III. Common Claims Against FCRA Players
Common Claims Against Employers: Adverse Action Notices
Claims against employers have been on the rise, affecting all industries including retailers, restaurant chains, manufacturers, and financial institutions. Rejected applicants often allege violations of the FCRA’s background-screening requirements on behalf of themselves and putative class members. Although the FCRA specifically authorizes employers to obtain and use a consumer report (such as criminal background checks and credit reports) for employment decisions, including those related to hiring, retention, and promotion, the FCRA imposes a specific and a surprisingly technical three-step requirement on such use.
Disclosure forms. Before obtaining a report, the employer must provide a “clear and conspicuous” written disclosure to the consumer in a document that consists “solely” of the disclosure that a consumer report may be obtained. The employer must also obtain the consumer’s written authorization. Recent litigation has revolved around the interpretation of the term “solely.”
Preadverse action notices. Before making a final employment decision based in whole or even in part on the results of a report, the employer must provide a preadverse action notice to the individual, which includes a copy of the applicant’s consumer report and the CFPB’s Summary of Rights. The concept of “adverse action” is broad and generally includes any employment-related decision that negatively affects the employee. The purpose of a preadverse action notice is to allow the applicant or employee the opportunity to discuss the report with the employer before becoming subject to any adverse action. Although the timeframe is not specifically defined, the employer is required to wait a minimum amount of time (typically interpreted as at least five business days) before taking the adverse action.
Post-adverse action notices. In the final step, the employer is required to provide a post-adverse action notice to the individual, which includes:
the name and contact information of the CRA that provided the background check on which the adverse employment decision was based;
a statement advising the individual that the CRA did not make the adverse employment decision and therefore cannot provide any reasons why the adverse action was taken; and
notification that the applicant or employee is entitled to receive a free copy of the background check or consumer report on which the adverse action was based within a 60-day period.
On their face, these three requirements are relatively clear and specific; however, they quickly become convoluted because:
different kinds of background checks require different kinds of initial disclosures;
several states have additional requirements affecting the disclosure, consent, and adverse action procedures;
the trucking industry has its own special procedures under the FCRA;
recent court decisions have suggested additional, unwritten requirements on the process, particularly with respect to electronic employment application processes; and
compliance with “ban the box” statutes, which require the removal of questions related to criminal conviction history on a job application, and ordinances may require deferral of employment background checks in the employment process, leading to delays in the hiring process, additional paperwork, and a more unfriendly application process.
Indeed, the staggering number of recent class actions against employers, which have resulted in many multimillion-dollar settlements across the country, illustrate how intricate these requirements actually are. For example, the interpretation of the word “solely” has resulted in numerous, nationwide class actions. In March 2015, a class of job applicants requested that the U.S. District Court for the Middle District of North Carolina approve a nearly $3 million settlement they had reached with Delhaize America LLC, Food Lion’s parent company, for the company’s failure to include a stand-alone disclosure. The named plaintiff was joined by 59,000 others who had applied to Delhaize-owned stores in the preceding two years.
Food Lion was not the only company hit with such a class action, however. Three putative, nationwide class actions against Michaels stores were also filed, alleging that the company buried its disclosure among blank spaces on its employment application form. Whole Foods Market Group, Inc. agreed to pay $803,000 in October 2015 to settle claims that it improperly disclosed to job applications that they would undergo background checks. That putative class action included approximately 20,000 class members. Publix Super Markets likewise settled a class action for $6.8 million in October 2014 for the supermarket’s alleged failure to provide a stand-alone disclosure informing job applicants that a background check would be performed.
Common Claims Against CRAs: Failure to Maintain Reasonable Procedures
The FCRA requires CRAs to “follow reasonable procedures to assure maximum possible accuracy of the information concerning the individual about whom the [consumer] report relates.” Importantly, the FCRA is not a strict-liability statute. The mere existence of an error in a consumer report does not, in and of itself, constitute a violation. Rather, a CRA’s liability hinges on the failure to follow reasonable procedures. According to the FTC, “[a] CRA must accurately transcribe, store and communicate consumer information received from a source that it reasonably believes to be reputable, in a manner that is logical on its face.” FTC, 40 Years of Experience with the Fair Credit Reporting Act: An FTC Staff Report with Summary of Interpretations 67, § 2 (2011). The reasonableness of a CRA’s procedures typically is a question of fact for the jury.
This reasonable-procedure requirement similarly applies to resellers under the FCRA. A reseller is a type of CRA that assembles and merges information contained in another CRA’s database into a “tri-merge report.” A reseller does not maintain its own database of the assembled or merged information from which new consumer reports are produced. In other words, a reseller acts as a middleman between the CRA and the user of the consumer information. Although a reseller’s role is limited, given that the FCRA imposes liability on “[a]ny person” who fails to comply with the statute’s requirements regarding credit information, plaintiffs have named resellers as codefendants alongside CRAs. In turn, courts have held that a reseller is subject to the same reasonable-procedure requirements as imposed on CRAs, even though resellers typically have no ability to investigate, judge, or evaluate the decisions made by CRAs.
Besides the numerous individual and class-action lawsuits that have been filed pursuant to this reasonable-procedure requirement, the CFPB has also exercised its enforcement power under this provision. In October 2015, for example, the CFPB announced a $13 million settlement of an enforcement action against General Information Services, Inc. (GIS) and e-Backgroundchecks.com, Inc., two of the largest background-screening companies, for their alleged failure to assure maximum possible accuracy of the data provided to employers.
The companies provided public-record background information – such as criminal records and civil judgment data – to employers who were conducting screenings on job applicants and current employees. The CFPB’s order focused on the following four alleged deficiencies:
failure to have written procedures for researching public records for consumers with common names or who use nicknames;
failure to require employers to provide middle names for applicants for purposes of matching criminal records to consumers, resulting in the reporting of mismatched criminal record information about consumers;
failure to track consumer disputes in a manner that would allow for identification and remedy of reporting error trends, and failure of the internal departments to meet on a regular basis to discuss errors; and
failure to conduct sufficient testing of nondisputed records.
With regard to the first alleged deficiency, the CFPB’s order appeared to conclude that matching should be done by requiring an exact match based on first, middle, and last name in addition to one additional identifier, such as date of birth or Social Security number. By this order, therefore, the CFPB in effect attempted to create a detailed standard of conduct in matching data, but one that likely does not recognize the realities of the market. For example, few, if any, courts provide a Social Security number of the defendant, making a match on this element impossible for some criminal records. Similarly, with respect to the order’s focus on the companies’ internal compliance procedures, the CFPB sought to establish a detailed standard for internal compliance procedures down to the level of detail of how often internal meetings should occur to discuss consumer complaints.
In addition to the stiff monetary penalty, which requires $10.5 million in relief to harmed customers and a $2.5 million civil penalty, the CFPB’s order also required the background-screening companies to revise their procedures to assure reporting accuracy.
IV. Emerging Trends: Increased Scrutiny on Furnishers
Anyone who provides consumer information to a CRA, even those who only occasionally report information, is a furnisher under the FCRA. Creditors, insurers, employers, landlords, and debt collectors are all potentially subject to the FCRA’s furnisher requirements. Furnishers were once an unregulated group, but today furnisher compliance has become a top federal regulatory priority, as evidenced by the increased number of supervisory and enforcement actions brought by the CFPB and FTC.
The Furnisher Rule (Regulation V promulgated by the CFPB under the FCRA) requires furnishers to: (1) furnish information that is accurate and complete; and (2) investigate consumer disputes about the accuracy of the information they provide. With regard to this latter requirement, the Furnisher Rule requires furnishers to respond to consumer disputes that a consumer directly reports to the furnisher. The FCRA also requires furnishers to respond to “indirect” disputes, or disputes that consumers first lodge with a CRA but then are passed along to the furnisher by the CRA.
Whether submitted directly or indirectly, the furnisher must then undertake a reasonable reinvestigation of the dispute, which some courts have interpreted as some degree of a careful inquiry. During the reinvestigation process, the furnisher has an obligation to:
investigate the dispute and review all relevant information provided by the CRA about the dispute;
report the results of the investigation to the CRA;
provide corrected information to every CRA that received information if the investigation shows the information is incomplete or inaccurate; and
modify the information, delete it, or permanently block its reporting if the information turns out to be inaccurate or incomplete or cannot be verified.
Furnishers have four response options: (1) verify the account as accurate; (2) modify the account tradeline information as indicated; (3) delete the tradeline because the information cannot be verified; or (4) delete the tradeline due to fraud. Each of these steps must be completed within 30 days after the CRA receives the dispute.
The Furnisher Rule additionally requires furnishers to establish and maintain reasonable written policies and procedures designed to implement the FCRA requirements, to ensure that the information furnishers report to CRAs is accurate, and to allow consumers to dispute, directly with the furnisher, information they believe is inaccurate. More than one furnisher has been surprised by Regulation V’s written-policy requirement.
Through their advisory bulletins and hard-hitting enforcement actions, the FTC and CFPB have signaled their priority in holding all players in the credit reporting market accountable for ensuring the accuracy of data in credit reports, with a particular focus on furnisher compliance obligations. For example, in December 2014, the CFPB announced that it will require CRAs to provide regular reports to the CFPB identifying by name potentially problematic furnishers of information, including furnishers with the most overall disputes and those with particularly high disputes relative to their industry peers. This active monitoring for compliance has the potential to result in more enforcement actions against furnishers.
Enforcement actions brought by the FTC and CFPB have set a clear precedent for noncomplying furnishers, given that these actions often impose stiff penalties on companies that do not live up to its duties under the Furnisher Rule. Recent examples of FTC enforcement actions against furnishers include:
FTC v. Tricolor Auto Acceptance Corp., LLC, which was fined $82,777 for failing to maintain written policies and procedures regarding the accuracy of reported credit information, and for failing to properly investigate disputed consumer credit information. The FTC action can be found here.
Similarly, the CFPB has recently entered into consent orders with the following furnishers after investigations of FCRA violations:
EOS CCA, a Massachusetts debt-collection firm that was required to refund at least $743,000 to consumers and pay a $1.85 million civil penalty for providing inaccurate information to credit-reporting agencies and failing to correct reported information that it had determined was inaccurate;
First Investors Financial Services Group, Inc., an auto finance company that was required to pay a $2.75 million fine for failure to establish reasonable written policies and procedures regarding the accuracy and integrity of information furnished;
DriveTime Automotive Group, Inc., the nation’s largest “buy-here, pay-here” auto dealer, which was required to pay an $8 million penalty for having inadequate written policies governing the furnishing of information to CRAs.
Attorney generals nationwide have also stepped up enforcement in the furnisher arena. The 2015 multistate attorneys general settlement with the three national CRAs enlists the CRAs as part of the enforcement mechanism. Although the settlement only directly applies to changes to CRA business practices, many of the required changes will also impact furnishers. For example, CRAs are now required to:
review and update the terms of use agreed to by furnishers using e-Oscar;
establish a working group to share best practices for monitoring furnishers;
take corrective action when necessary with respect to furnishers that fail to comply with furnisher obligations and reinvestigation requirements; and
maintain information about problem furnishers and provide a list of those furnishers to the states upon request.
This regulatory focus on furnishers shows no signs of slowing down, as illustrated by the CFPB’s first bulletin of 2016, which warns furnishers yet again of the need to have adequate policies and procedures. The CFPB notes that a furnisher’s “policies and procedures must be appropriate to the nature, size, complexity, and scope of each furnisher’s activities.” In other words, “if an institution furnishes both credit information to nationwide CRAs and deposit account information to nationwide specialty CRAs, that institution must consider the appropriate approach to each type of furnishing in its policies and procedures in order to comply with Regulation V.” The bulletin concludes with a warning to furnishers to have such policies and procedures in place with respect to all types of consumer information furnished to each of the CRAs: “If the CFPB determines that a furnisher has engaged in any acts or practices that violate Regulation V or other federal consumer financial laws and regulations, it will take appropriate supervisory and enforcement actions to address violations and seek all appropriate remedial measures, including redress to consumers.”
In addition to the harsh consequences of regulatory enforcement, furnishers have also now found themselves subject to a new world of civil liability pursuant to the U.S. Bankruptcy Code. Plaintiffs’ lawyers have begun experimenting with bankruptcy laws in an attempt to certify previously uncertifiable classes against furnishers. Section 524 of the Bankruptcy Code, known as the “discharge injunction” provision, prohibits any attempt to collect a discharged debt. The injunction is intended to give complete effect to the discharge and to eliminate any doubt concerning the effect of the discharge. Class actions have now been filed based on a furnisher’s systematic violation of the discharge injunction for refusal to correct a plaintiff’s credit report by showing that the plaintiff’s debts had been discharged. Courts have denied motions to dismiss when plaintiffs allege that the failure to update a credit report is a veiled attempt to collect the debt.
Furnishers should take note that they have become a central focus for regulatory supervision as well as a key target of the plaintiffs’ bar. Complying with the Furnisher Rule (Regulation V) has never been more important than it is today.
Conclusion
FCRA litigation is here to stay, at least for the foreseeable future. If your client’s business is involved in FCRA-regulated activities, compliance with the highly technical FCRA requirements is a necessity. Otherwise, failure to comply exposes the company to civil liability, including class actions and regulatory attention by the CFPB and FTC.
Connect with a global network of over 30,000 business law professionals