Know When to Hold Them, Know When to Fold Them: Determining Whether the Equipment is Worth the Cost of Litigation
Is the equipment really worth the cost of litigation? Before advising clients to pursue problem accounts legally, it pays to determine the true market value of the equipment in question.
True Lease or Secured Financing: Recovering Meaningful Residual Value
Equipment lessors bargain for a very different set of legal rights than secured creditors. These bargained-for rights are often subject to attack, particularly in the Chapter 11 context where it is common for interested parties to challenge the characterization of a Chapter 11 debtor's obligations under an agreement styled as a lease. <i>See In re APB Online, Inc.</i>, 259 B.R. 812, 815 (Bankr. S.D.N.Y. 2001). As the recent decision by the Third Circuit in <i>Duke Energy Royal, LLC v. Pillowtex Corp. (In re Pillowtex, Inc.)</i>, 349 F.3d 711 (3d Cir. 2003) illustrates, when faced with the question of whether a transaction constitutes a "true" lease or a secured financing, Bankruptcy Courts will look through the cosmetics of the deal to its substance. To avoid the re-characterization of an equipment lease by a Bankruptcy Court, an equipment lessor must structure its transactions to retain an economically meaningful "residual value" in the leased property.
Med Mal News
National news of importance to you and your practice.
Features
Ten Ways to Improve Medication Safety
The United States Pharmacopeia (USP), an organization that, among other things, operates MEDMARX, the national, Internet-accessible anonymous reporting database that hospitals and health care systems may voluntarily use to track and trend medication errors, last month published 10 recommendations for cutting down medication errors in hospitals and health care facilities.
Features
Doctors' Corporations Given FTCA Coverage
Earlier this year, the federal government lost an attempt to deny insurance coverage to doctors who -- in their capacity as sole owners of their own corporations -- signed contracts with the United States to provide health care to patients at a non-profit clinic. When the government attempted to tell the doctors -- after the doctors had been sued for malpractice -- that they were not eligible for coverage, the doctors fought back in the U.S. District Court for the District of Columbia.
A Sample of Effective <i>Voir Dire</i>
In Parts One and Two of this article, we discussed the strategies involved in deciding when to question the opposing party's expert; during preliminary <i>voir dire</i> or during cross examination. We noted that, in a jury trial, it is usually prudent to wait until cross-examination to attack the expert, so that the jury can see where the holes in the witness's qualifications and conclusions are. But sometimes, questioning during <i>voir dire</i> is preferable, especially when the result is likely to be the witness disqualification to testify as an expert.
CA Court Excludes Medical Expert Causation Testimony
Recently, the California Court of Appeal (Fourth Appellate District, Division One) issued a decision that confirms and clarifies the broad scope of trial court authority under California Evidence Code section 801 to exclude expert testimony that lacks adequate foundation. (<i>Jennings v. Palomar Pomerado Health Systems, Inc.</i> (2004) 114 Cal.App.4th 1108 [8 Cal. Rptr.3d 363].)
Features
Best Practices for E-Mail Filtering
Particularly during the past 2 years, the onerous task of filtering e-mail messages has grown to become a business and operational necessity - largely because of the influx of spam, as well as regulations and legislation that mandate the retention of e-communications such as e-mail and, increasingly, instant messages. Coupled with the traditional reasons for filtering ' malicious code attached to or embedded within the message, and inappropriate or sensitive message content ' filtering technologies and the market are undergoing radical change. This makes purchasing and implementation decisions difficult. Best practices for effective e-mail filtering can ease the decision-making process.
Features
Practice Tip: <B>Protecting Against Digital Spies</b>
As the legal industry leverages IT to deliver enhanced services and improve overall business operations, Internet threats are increasing. According to the latest Symantec Internet Security Threat Report, one of the most significant threats today is malicious code that exposes confidential data such as passwords, decryption keys, keystrokes and more. Moreover, this malicious code is entering businesses from a widening array of sources. One of the most common delivery vehicles is spyware. According to security experts, millions of PCs in homes and businesses across the world are already infested with spyware. Yet, for all its ubiquity, it remains a relatively misunderstood threat.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- When It Comes to Trademark Searches, AI Misses the MarkArtificial intelligence tools powered by large language models have become valuable resources in the trademark process. Despite incredible progress in natural-language reasoning, AI tools still face fundamental limitations when it comes to performing even basic trademark searches. Here are five important reasons why.Read More ›
