LIBOR and Bankruptcy in the Current Market
Distressed companies and those in bankruptcy nearly always require some amount of loans to fund their recovery, exit from bankruptcy, or sale. What happens when those loans are not available, too expensive, or too risky in the eyes of the capital market? Combine that with volatility in The London Interbank Offer Rate, 'LIBOR,' the rate at which money is lent to other banks, and the terms, in particular, interest rates, that are offered to these distressed borrowers, are constantly in change.
Features
The Enterprise Bankruptcy Law of the People's Republic of China
In August 2006, after some 12 years of preparation, the Enterprise Bankruptcy Law ('EBL') of the People's Republic of China ('PRC') was signed into law by President Jintao Hu. The new law went into effect on June 1, 2007. The EBL supersedes the 1986 Interim Enterprise Bankruptcy Law, as well as all or a part of a variety of other regimes and statutes, including the People's Republic of China Company Law and the Foreign Invested Enterprise Liquidation Procedure. This article is a consolidated analysis of some of the significant features of the EBL.
Features
Can Software Be a Service?
You're probably tired of hearing the phrase 'think outside the box,' but that's an accurate characterization of 'software-as-a-service' ('SaaS'). The 'box' is the computer that sits on your desk; and SaaS is an innovative way to deliver software applications to that computer over the Internet.
Courts Show Confusion over Uses of 'Metatags'
The use of a trademark in computer code words, called 'metatags,' by a competitor to boost its position in Internet searches infringes under the Lanham Trademark Act, according to the Eleventh U.S. Circuit Court of Appeals. But the decision, which conflicts with a Second Circuit holding, has touched off criticism that the Eleventh Circuit panel and federal courts generally don't understand the uses of metatags, and that this has resulted in rulings that muddle infringement law. <i>North American Medical Corp. v. Axiom Worldwide Inc.</i>, 522 F.3d 1211 (2008).
Features
Using Your Fee Arrangement to Lower Litigation Costs
As discussed in the previous two articles in this series, having the smallest possible litigation team in place and having a person with adequate litigation experience to monitor the team effectively are two important elements for any general counsel intent on keeping litigation costs in check. This is particularly so if you insist upon working under the old paradigm of paying your outside counsel on an hourly basis. But believes in adopting or least considering a different fee arrangement ' contingency. Here's why.
Features
Deal Season 2008: Outlook for Transaction Support Services
Many global firms that provide transaction support services for law firms are exceedingly worried about the 2008 deal season. But is the anecdotal evidence of a drying pipeline true? A quick look at the data suggests that law and accounting firms are right to be worried about a decreased deal flow, with only a few highlights in sight.
Developing a Partner Scorecard That Is Meaningful To Your Firm
This article is the first in a series about developing a customized scorecard for your firm's partners, specific information to include in the scorecard, tailoring it to your firm's goals, and getting partners to understand the scorecard and achieve greater success.
Implementing an Alternative Billing Program
Corporate counsel are exercising increased bargaining power about fees and terms of employment of outside law firms. Law firms can no longer ignore the competition of the marketplace when establishing billing rates and fees. Several variations and combinations of three basic billing systems, hourly billing, fixed fee billing and contingent fee billing, follow.
Employers' Right to Limit Employees' E-Mail Upheld
In a recent decision, the NLRB, in a 3-2 decision split along Republican/Democrat lines, held that one company's Communications Systems Policy was lawful on its face, and that the employer's discipline based on the two e-mails soliciting support for union positions was lawful, but that the disciplinary action based on the purely informative e-mail was unlawful. What does this portend?
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Enhanced Oversight of Search Warrants and Title III WiretapsSearch warrants and wiretaps were once used primarily to investigate organized crime, drug dealing and terrorism. In recent years, however, prosecutors have employed these tools increasingly in the context of white-collar crime to the point where it is now commonplace.Read More ›
- Bankruptcy Sales: Finding a Diamond In the RoughThere is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The Right to Associate in the DefenseThe "right to associate" permits the insurer to work with the insured to investigate, defend, or settle a claim. Such partnerships protect the insurer and can prove beneficial to the insured's underlying case and ultimate exposure.Read More ›
- DOJ's Cyber Fraud Initiative: A Wake-up Call That Keeps RingingDOJ's Cyber Fraud Initiative has been a wake-up call for companies to prioritize cybersecurity and adhere to stringent standards. By leveraging the FCA, DOJ has used a powerful enforcement tool to target a wide range of cybersecurity failures and misrepresentations. The increasing focus on cybersecurity by enforcement agencies means that robust cybersecurity practices are becoming a standard expectation, not just a best practice.Read More ›