Although credit applications assist lessors in making these credit decisions, the lessor should make sure that it avoids the pitfalls of the Equal Credit Opportunity Act ('ECOA') and that the financial information it obtains through the credit application is stored appropriately to avoid liability under various state laws regulating the storage of private financial information. This article discusses the components of a good credit application, the requirements of the ECOA, and the best practices for storing private financial information.
For traditional institutional equity investors in leveraged and single-investor equipment lease transactions, solar equipment may offer an attractive investment opportunity. Leasing solar equipment may also provide an attractive investment structure for traditional investors in power projects looking to expand investments in renewable energy projects.
In-house counsel and executives within the railroad, logistics, and transportation industries need to be aware of an increasing likelihood of litigation-related to global warming. In the wake of the U.S. Supreme Court's 2007 decision in <i>Massachusetts v. EPA</i>, suits have been filed seeking to impose liability on companies whose activities emit carbon dioxide. As additional suits arise, they will doubtless reach companies in the oil, electric power, auto, and railroad sectors. These developments raise an important question: Are companies in transportation-related fields adequately prepared for the acceleration of climate change-based tort cases that their industry will likely encounter in the near future?
Equipment lenders and lessors face specialized issues when the asset is a vessel. How is the lender secured in its collateral? Can a lessor be secured in a vessel titled in lessor's name? How does a lessor perfect its security interest in the vessel? Where does the lessor stand in relation to competing creditors? This article addresses these questions within the U.S. legal system and describes proposed legislation to expand opportunities for lease financing of vessels.
This article discusses the business issues and challenges that are driving the need for lessors to reassess their IT strategy and approach. The focus of this discussion is on the factors management should consider as it examines the company's IT strategy for core leasing operations, <i>i.e.</i>, front-end and back-end systems.
This article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.
Most experienced intellectual property attorneys understand the significant role surveys play in trademark infringement and other Lanham Act cases, but relatively few are likely to have considered the use of such research in patent infringement matters. That could soon change in light of the recent admission of a survey into evidence in <i>Applera Corporation, et al. v. MJ Research, Inc., et al.</i>, No. 3:98cv1201 (D. Conn. Aug. 26, 2005). The survey evidence, which showed that 96% of the defendant's customers used its products to perform a patented process, was admitted as evidence in support of a claim of inducement to infringe. The court admitted the survey into evidence over various objections by the defendant, who had argued that the inducement claim could not be proven without the survey.
The parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.
The DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.
With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.