When Trade Vendor Priority Claims Get Paid
The U.S. Bankruptcy Court for the Eastern District of Pennsylvania recently issued one of the first decisions in the 3rd U.S. Circuit Court of Appeals to interpret ' 503(b)(9), an important new Bankruptcy Code provision passed under the Bankruptcy Abuse Prevention and Consumer Protection Act (BAPCPA): <i>In re Bookbinders' Restaurant Inc.</i> ' 503(b)(9) is certain to impact the relationship between a debtor seeking to reorganize and the trade vendors that deal with it.
Features
Exchange-Traded Solvency Derivatives
In the last ten years, the credit derivatives market has grown from its infancy to approximately $26 trillion of notional value according to the International Swaps and Derivatives Association, Inc. ('ISDA'). The most highly utilized type of credit derivative, the credit default swap, is used by investors to bet on a company's creditworthiness or hedge a position in a fashion that protects against the company's failure to make a payment or satisfy other terms.
Features
Wage Hour Laws Provide Traps for the Unwary
It has often been said that the most frequently violated federal employment-related statute is the Fair Labor Standards Act ('FLSA'), 29 U.S.C. '' 201-19 (Supp. 2006). This law, enacted in 1938, regulates, among other things, the payment of overtime to employees who work for employers. Our experience indicates that most, if not all, employers do not intend to violate the provisions contained in the FLSA but, instead, do so out of ignorance of its requirements. This article highlights some of the key provisions of the FLSA, makes reference to recent pronouncements by the United States Department of Labor (the federal agency principally responsible for interpretation of the statute) and presents advice on how to avoid the pitfalls inherent in the FLSA.
Features
Paddling Down Esopus Creek
An end-of-year (Nov. 29) Delaware Chancery Court decision, <i>Esopus Creek Value LP v. Hauf</i>, No. 2487-N (Del. Ch. Nov. 29, 2006), is receiving a great deal of attention from corporate transactional and corporate restructuring attorneys alike. In <i>Esopus</i>, the Delaware Chancery Court prevented a financially sound company that was prohibited by federal securities law from holding a shareholder vote, because it failed to meet its reporting requirements, from executing an agreement outside of bankruptcy to sell substantially all of its assets under Section 363 of the Bankruptcy Code without first obtaining common stockholder approval as required under Section 271(a) of the Delaware General Company Law ('DGCL').
Features
Enforcement Under State Security Breach Notification Laws
Thirty-four states have enacted security breach notification laws. And Michigan passed such a law with an effective date of July 2, 2007. These laws cover the notification that a company must make in the event of a breach of security of its system with respect to computerized personal information. How are these laws enforced in the event of a violation? These laws vary in terms of enforcement and penalties, as more particularly described below. This article provides an overview of the enforcement of these laws and describes examples of penalties.
Features
Document Discovery
In today's litigation world, corporate counsel struggle to contain the ever-increasing costs of document discovery. The explosion of electronically stored information ('ESI') is often a huge contributor to the expense of discovery. Consultants, vendors, and e-discovery software can help bring greater efficiencies and cost-savings to the process. But while there is a dizzying array of options available, they are not all created equal. Finding the right solution requires that you do your homework.
Attacking the Root of the Punitive Damages Problem
On Feb. 20, 2007, the U.S. Supreme Court issued a landmark decision on punitive damages in <i>Philip Morris USA v. Williams</i>, when it found a jury's $79.5 million punitive damage award, assessed in conjunction with $821,000 in compensatory damages for negligence and deceit in misleading a smoker to believe that smoking was safe, was unconstitutional. Instead of reducing yet another runaway punitive damage award, the 5 to 4 majority of the Court attacked the root of the problem: unfair punitive damages trial procedures. This decision may indicate that the Court, operating under Chief Justice Roberts, is considerably more aggressive in protecting the constitutional rights of punitive damage defendants than was the Rehnquist Court.
<b><i>Online Exclusive:</b></i> Internet Porn Law Ruled Unconstitutional
Congress suffered yet another setback on March 22 in its ongoing efforts to shield children from sexually explicit content on the Internet when a federal judge struck down the Child Online Protection Act, a 1998 federal law that makes it a crime for commercial Web site operators to allow children access to "harmful" material.
Features
Real Property Law
In-depth analysis of the latest verdicts.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Enhanced Oversight of Search Warrants and Title III WiretapsSearch warrants and wiretaps were once used primarily to investigate organized crime, drug dealing and terrorism. In recent years, however, prosecutors have employed these tools increasingly in the context of white-collar crime to the point where it is now commonplace.Read More ›
- Bankruptcy Sales: Finding a Diamond In the RoughThere is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The Right to Associate in the DefenseThe "right to associate" permits the insurer to work with the insured to investigate, defend, or settle a claim. Such partnerships protect the insurer and can prove beneficial to the insured's underlying case and ultimate exposure.Read More ›
- DOJ's Cyber Fraud Initiative: A Wake-up Call That Keeps RingingDOJ's Cyber Fraud Initiative has been a wake-up call for companies to prioritize cybersecurity and adhere to stringent standards. By leveraging the FCA, DOJ has used a powerful enforcement tool to target a wide range of cybersecurity failures and misrepresentations. The increasing focus on cybersecurity by enforcement agencies means that robust cybersecurity practices are becoming a standard expectation, not just a best practice.Read More ›