Worker Adjustment and Retraining Notification Act (WARN) Liability And Private Equity Firms

DrinkerBiddle

Last month’s decision out of the Delaware District Court in Woolery, et al. v. Matlin Patterson Global Advisers, LLC, et al. was an eye opener for private equity firms and other entities owning a controlling stake in a faltering business.  Breaking from the norm, the Court refused to dismiss private equity firm MatlinPatterson Global Advisers, LLC (“MatlinPatterson”) and affiliated entities from a class action WARN Act suit alleging that the 400-plus employees of Premium Protein Products, LLC (“Premium”), a Nebraska-based meat processer and MatlinPatterson portfolio company, hadn’t received the statutorily-mandated 60 days advance notice of layoffs.

According to the plaintiffs, Premium’s performance began to decline in 2008 and, upon the downturn, the defendants became more and more involved in Premium’s day-to-day operations, including by making business strategy decisions (e.g., to enter the kosher food market), terminating Premium’s existing President, and installing a new company President.  Things got bad enough that, in June 2009, the defendants decided to “furlough” all of Premium’s employees with virtually no notice and close the plant.  The defendants then, in November 2009, converted the furlough to layoffs, and Premium filed for bankruptcy.  According to the plaintiffs, Premium’s head of HR raised WARN Act concerns back in June, when the decision to close the plant and furlough the employees was made, and the defendants ignored the issue.

With Premium in bankruptcy, the plaintiffs, unsurprisingly, turned to MatlinPatterson and the other defendants as the targets of their WARN Act claim, asserting that they and Premium were a “single employer.”  The Court then applied the Department of Labor’s five-factor balancing test, namely (1) whether the entities share common ownership, (2) whether the entities share common directors or officers, (3) the existence of de facto exercise of control by the parent over the subsidiary, (4) the existence of a unity of personnel policies emanating from a common source, and (5) the dependency of operations between the two entities.  This test often favors private equity firms, and on balance it did so in Woolery too, with the Court finding that the plaintiffs had made no showing as to three of the five factors.  The Court nevertheless refused to grant the defendants’ motion to dismiss, holding that the complaint alleged that the defendants had exercised de facto control over Premium and then essentially giving that factor determinative weight.

No one should be surprised by the decision given the plaintiffs’ allegations, which had to be accepted as true at the motion to dismiss stage.  They presented an ugly picture of a private equity firm dictating the most critical decisions (to close plant, layoff employees) and then attempting to duck the WARN Act’s dictates. The decision is nevertheless a cautionary tale for private equity firms and at first blush it presents a catch 22: (a) do nothing and watch your investment sink or (b) get involved and risk WARN Act liability.

So what is a private equity firm, lender or majority investor to do?  Obviously, the best scenario is to build in the required 60-day notice period or, if applicable, utilize WARN Act exceptions, including the “faltering company” and “unforeseen business circumstances” exceptions.  Even where that’s not possible, private equity firms and other controlling investors need not take a completely hands off approach.  They would, however, be best-served (at least for WARN Act purposes) to do the following:

  • Provide only customary board-level oversight and allow the employer’s officers and management team to run the employer’s day-to-day operations
  • Although Board oversight and input can occur, continue to work through the management team on major decisions, including layoffs and potential facility closures
  • Avoid placing private equity firm or lender employees or representatives on the employer’s management team
  • Have the employer’s management team execute employment contracts with the employer, not the private equity firm or lender, and have the contracts, for the most part, create obligations only to the employer
  • Allow the employer to maintain its own personnel policies and practices, as well as HR oversight and function

What the courts are primarily concerned with in these cases are (a) a high degree of integration between the private equity firm or lender and the actual employer, particularly as to day-to-day operations, and (b) who the decision-maker was with regard to the employment practice giving rise to the litigation (typically the layoff or plant closure decision).  Private equity firms and lenders that have refrained from this level of integration have had, and should continue to have, success in avoiding WARN Act liability and returning the focus of the WARN Act discussion to the actual employer.

Article By:

 of

No “Safe Harbor” for BitTorrent Website Operator

McDermottLogo_2c_rgb

The U.S. Court of Appeals for the Ninth Circuit affirmed a summary judgment ruling in favor of seven film studios finding that the defendant induced third parties to download infringing copies of the plaintiffs’ copyrighted works. Columbia Pictures Industries, Inc., et al.  v. Gary Fung, et al., Case No. 10-55946 (9th Cir., Mar.21, 2013) (Berzon, J.).

Seven film studios—including Columbia Pictures, Disney and Twentieth Century Fox—sued Gary Fung and his company isoHunt Technologies, claiming that Fung induced third parties to download infringing copies of the studios’ copyrighted works through Fung’s websites, such as torrentbox.com and isohunt.com—websites that help users find copies of videos to download and stream through a type of peer-to-peer file sharing network.

The district court found Fung liable for contributory copyright infringement for inducing others to infringe the studios’ copyrights and also found that Fung was not entitled to protection from damages liability under the safe harbor provisions of the Digital Millennium Copyright Act (DMCA).  After a permanent injunction was issued, Fung appealed.

On appeal, Fung challenged the full holding, including the scope of the injunction claiming that it was vague, punitive and an impediment to free speech.  The 9th Circuit, citing the Supreme Court decision in Grokster III (which also dealt with peer-to-peer file sharing technology), analyzed the facts of the present case under the four elements of the Grokster III inducement principle:  the distribution of a device or product, acts of infringement, an object of promoting its use to infringe copyright and causation.

Inducement Liability Under Grokster III

With respect to the first element of the Grokster III inducement liability standard, Fung argued that he did not develop or distribute products, nor did he develop the BitTorrent protocol used by his websites.  The 9th Circuit, however, distinguished copyrights as expression that are not necessarily in the form of products or devices. Thus, the court concluded that a copyright can be infringed through “culpable actions resulting in impermissible reproductions of copyrighted expression,” even if such actions are the provision of services used in accomplishing the infringement.

Fung was not able to rebut the second “acts of infringement” Grokster III factor after the studios presented evidence that Fung’s services were widely used to infringe copyrights by allowing uploading and downloading of copyrighted material. Accordingly, the court found for the studios on the second factor, noting that the “predominant use” of Fung’s services was for copyright infringement.

As to the third Grokster III factor, the court agreed with Fung that mere knowledge of a potential to infringe, or knowledge of actual infringing uses of a product or service, is not enough for liability.  Nevertheless, the court found there was more than enough evidence that Fung offered his services with the object to promote their use to infringe copyrighted material.  Specifically, the court found that the evidence showed Fung actively encouraged uploading files of specific copyrighted material; he provided links for certain movies and urged users to download those movies; he affirmatively responded to requests for help in locating and playing copyrighted materials; and, he even personally instructed users on how to burn infringing files to DVDs.  The court also referenced two points of circumstantial evidence raised by the Grokster III opinion, namely, that Fung took no steps to develop filtering tools to diminish infringing activity and that he generated revenue by selling advertising space on his websites.

Finally, as to causation, the court adopted the studios’ interpretation of causation and held that the acts of infringement by third parties need only be caused by the product distributed or services provided.  This was contrary to Fung’s theory of causation (which was also joined by amicus curiae, Google) wherein Fung claimed that the infringement must be directly caused by a defendant’s inducing messages.

The Digital Millennium Copyright Act “Safe Harbor” Provisions

Fung also asserted affirmative defenses under three of the DMCA’s safe harbor provisions, 17 U.S.C. §512(a), (c) and (d). Although the studios argued that there can never be a DMCA safe harbor defense to contributory copyright liability inducement, the 9th Circuit disagreed, noting that the safe harbor provisions do not exclude vicarious or contributory liability from its protections. Even so, the court denied all of Fung’s safe harbor defenses.

In particular, the court concluded that Fung did not qualify for protection under §512(a) for transitory digital network communications because Fung’s torrent file trackers, not the third party users, were responsible for selecting the copyrighted data to be transmitted.

The court also concluded that § 512(c), relating to information residing on networks or systems at the direction of the users, was also not applicable because Fung had actual and “red flag” knowledge of infringing activity on his system due to his own active encouragement of infringement, as well as the fact that Fung did not dispute evidence that he personally used his isohunt.com website to download infringing material.

According to the 9th Circuit, Fung did not qualify for protection under §512(c) or §512(d) (for providers of information location tools) because Fung received a “financial benefit” from his services by selling ad space and because he had the “right and ability to control” the infringing activity, which was shown through evidence that Fung exerted substantial influence on the activities of the users of his websites.

Finding no available defenses under the DMCA safe harbors, the court affirmed summary judgment for the studios on the issue of liability under contributory copyright infringement.  However, the court found various terms of the lower court’s permanent injunction to be vague and unduly burdensome and remanded to the district court to modify certain employment prohibitions and to provide more specific language for several terms in the injunction.

Article By:

 of

Recent Social Media Developments Impacting Employers

Sills-Cummis-Gross-607x84

NLRB: Latest Decisions Addressing Social Media Policies and Activities

Within the past several months, the National Labor Relations Board (“NLRB“) has issued four precedent-setting opinions addressing the legality of an employer’s use of social media as a basis for taking adverse employment action. These decisions apply to both unionized and non-unionized workforces.

The key issue in each of these cases was whether the employer’s actions compromised the right of employees to engage in “protected concerted activities” for the purpose of their “mutual aid and protection.” However, as noted in a prior alert, recent federal case law could void all NLRB decisions dating back to January 4, 2012 (including those discussed below). Until there is clarity the NLRB decisions continue to be significant in shaping social media use, policy and practice.

On April 19, 2013, the NLRB, in Design Technology Group, LLC, found that an employee’s Facebook posts that criticized a manager’s handling of employee concerns were a “classic connected protected activity” under the National Labor Relations Act (“the Act”).

In that case, workers had approached their manager about closing the store they worked in at 7 PM instead of 8 PM, because of safety concerns. The manager advised that she would discuss those concerns with corporate officials, but the issue was never resolved. Subsequently, two employees posted messages on Facebook that were critical of how the manager handled that issue. Another employee showed the manager those posts and six days later, both employees who made the critical Facebook posts were fired by the manager.

The NLRB determined that the Facebook posts were part of the employees’ efforts to convince their employer to close the store earlier in the evening, based on their concerns about working late in an unsafe neighborhood. The NLRB found that those posts were protected under the Act and that the employees’ terminations constituted unfair labor practices.

Design Technology comes on the heels of three other NLRB social media rulings issued late last year.

In Hispanic United of Buffalo (December 14, 2012), the NLRB held that the termination of five employees for violating an employer’s policies on the basis of their social media activity was unlawful. In that case, five employees posted comments on Facebook that were critical of a co-worker who was scheduled to meet with and complain to management about their work performance. The employer terminated the five employees for “bullying and harassing” the co-worker in violation of its policies.

Hispanics United of Buffalo applied settled NLRB law regarding oral communications among co-workers to the social media context. Under NLRB precedent, employees’ comments regarding the terms and conditions of their employment are protected if their comments are “concerted” — meaning they are “‘engaged in, with or on the authority of other employees,” not only by “one employee on behalf of himself.” Finding the actions of these employees to be protected, the NLRB set a relatively low threshold for interpreting social media activity as protected concerted activity under the Act.

The Hispanics United decision is especially controversial because it may conflict with an employer’s competing obligation under federal and state discrimination laws to prevent workplace harassment. And, the decision may ultimately be in conflict with workplace anti-bullying laws in those states where such legislation is being actively considered. In Karl Knauz Motors, Inc. (September 28, 2012), the NLRB ordered another employer to rescind its social media policy. In that case, the employer terminated the employee for multiple reasons, including violation of the employer’s “Courtesy” rule requiring employees to be “courteous, polite and friendly” to customers, vendors, suppliers and fellow employees and not to use “language which injures the image or reputation of the Dealership.”

The NLRB held that the “Courtesy” rule violated the NLRA because employees could “reasonably construe its broad prohibition against ‘disrespectful’ conduct and ‘language’ which injures the image or reputation of the Dealership as encompassing Section 7 activity.” However, the NLRB upheld the employee’s termination, finding it was not motivated by protected concerted activity, but rather was solely based on the employee’s Facebook postings that did not relate to the terms and conditions of his or any other employee’s employment. The NLRB did not address whether other posts would be protected by the Act.

In Costco Wholesale Corp. (September 7, 2012), the NLRB ruled that an employer’s overbroad social media policy violated the National Labor Relations Act because it prohibited employees from posting statements “that damage the Company, defame any individual or damage any person’s reputation or violate the policies outlined in the Costco Employee Agreement.” The NLRB ordered Costco to rescind the policy based on its finding that the policy inhibited employees from engaging in protected concerted activity.

NJ Legislative Update: Proposed Law Seeks to Protect Employee and Job Applicant Passwords

A-2878, a bill that prohibits employers from requiring, or requesting, a current or prospective employee to reveal, as a condition of employment, his or her user name, password or other means of accessing the employee’s personal social media account, has passed both houses of the NJ Legislature and is awaiting further action by Governor Chris Christie. While it is not clear as of this writing whether Governor Christie will sign or veto this bill, the implications to employers of this potential new law are far reaching.

If enacted, this bill would prohibit employers from even asking an employee or prospective employee whether he or she has a profile on a social media site. In addition, the bill would prohibit employers from requiring prospective employees to waive or limit any protection granted to them under the law as a condition of applying for or receiving an offer of employment. It provides for a $1,000 civil penalty for the law’s first violation and $2,500 for each subsequent violation. If Governor Christie signs this bill into law, New Jersey would join other states that have enacted legislation preventing employers from requesting social media access information, including Arkansas, California, Delaware, Illinois, and Michigan, though it would be the first state to prevent employers from inquiring if employees or applicants have a social media account.

Notably, the bill does not prevent employers from performing their own online search to determine if a prospective or current employee is on a social media site. Accordingly, if a social media account is publically available, an employer would not run afoul of this proposed law by independently viewing an employee’s or prospective employee’s social media account. This type of activity could have other potential pitfalls associated with it however, such as learning protected class information about applicants.

We will continue to monitor the signing status of this bill.

What These Decisions and the Prospective NJ Statute Mean to Employers

In light of the foregoing, we recommend the following:

  • Employers should review and consider revising social media polices and hiring practices to address the NLRB decisions, the new NJ legislation, if enacted, and EEO issues associated with searches on applicants.
  • With respect to policies, employers should ensure that prohibitions placed on employees’ communications do not prohibit employees’ rights to engage in protected concerted activity.
  • Employers should continue to exercise caution when disciplining or terminating any employee based on his/her social media activities and should also consider training its managers in this area so that they do not inadvertently run afoul of these laws.
  • It is important to consult with counsel to consider whether an employee’s comments or posts would be deemed to be protected concerted activity under the Act before any disciplinary action is taken by the employer based on those comments or posts.
Article By:

of

Where Do Your Interests Lie Under Chapter 15 of the Bankruptcy Code?

Mintz Logo

Determining a foreign debtor’s “center of main interests” and its effect on creditors’ rights

When doing business with a foreign company, it is important to identify the company’s “center of main interests” (“COMI”) as creditors may find themselves bound by the laws of the COMI locale. If a company initiates insolvency proceedings outside the U.S., it must petition a U.S. court under Chapter 15 of the Bankruptcy Code for recognition of the foreign proceeding. If the foreign proceeding is found to be a “foreign main proceeding” (i.e., a proceeding pending where the debtor has its COMI), Chapter 15 provides certain automatic, nondiscretionary relief, including an automatic stay of all proceedings against the debtor in the U.S. Therefore, when faced with a foreign insolvency proceeding, U.S. creditors’ rights will often be determined in the jurisdiction where the debtor’s COMI is located. However, despite its significance, COMI is left undefined by the statute, which prompted the Second Circuit Court of Appeals in Morning Mist Holdings Ltd. v. Krys, 2013 U.S. App. LEXIS 7608 (2nd Cir. April 16, 2013) to determine the relevant factors for locating a COMI and the appropriate time frame to consider those factors.

In Morning Mist, Miguel Lomeli and Morning Mist Holdings Limited (collectively, “Morning Mist”) filed a derivative action in New York state court against Fairfield Sentry Limited (the “Debtor”). The Debtor was one of Bernie Madoff’s largest “feeder funds,” having invested over $7 billion in the scheme. Shortly after the commencement of the derivative action, the Debtor initiated liquidation proceedings in the British Virgin Islands (the “BVI”). Then, in accordance with Chapter 15 of the Bankruptcy Code, the Debtor petitioned the U.S. Bankruptcy Court in the Southern District of New York for recognition of the BVI liquidation proceeding. The bankruptcy court granted the Chapter 15 petition, recognizing the BVI liquidation as a “foreign main proceeding” and imposing an automatic stay on all proceedings against the Debtor in the U.S., including the derivative action. The district court upheld the bankruptcy court’s decision, and Morning Mist appealed to the Second Circuit, arguing that the lower courts improperly found the BVIs to be the Debtor’s COMI.

To determine the Debtor’s COMI, the Second Circuit examined which factors should be considered and over what time period. Tackling the temporal element first, the Court concluded that the Chapter 15 petition filing date is the relevant review period, subject to an inquiry into whether the process has been manipulated. To offset a debtor’s ability to manipulate its COMI, a court may also review the period between the initiation of the foreign liquidation proceeding and the filing of the Chapter 15 petition. The Court squarely rejected Morning Mist’s suggestion that courts must consider a debtor’s entire operational history.

As for the appropriate factors to consider in locating a COMI, the Second Circuit held that any relevant activities, including liquidation activities and administrative functions, may be considered in a COMI analysis. Elaborating, the Court held that Chapter 15 creates a rebuttable presumption that the country where the debtor has its registered office will be its COMI, but recognized that courts have focused on a variety of other factors as well, including the location of the debtor’s headquarters, the location of those who actually manage the debtor, the location of the debtor’s primary assets, the location of the majority of the debtor’s creditors or the majority of the creditors who would be affected by the case, and/or the jurisdiction whose law would apply to most disputes. However, the Second Circuit emphasized that consideration of these factors is neither required nor dispositive.

Finally, Morning Mist argued that Chapter 15’s public policy exception (“Nothing in this chapter prevents the court from refusing to take an action governed by this chapter if the action would be manifestly contrary to the public policy of the United States.”) applied because the BVI proceedings were confidential and therefore “cloaked in secrecy.” The Second Circuit quickly dismissed this argument explaining that the public policy exception should be read restrictively and invoked only under exceptional circumstances concerning matters of fundamental importance for the enacting State. Recognizing that court pleadings can be sealed in U.S. cases, including bankruptcy cases, the Second Circuit found that the confidentiality of the BVI bankruptcy proceedings did not offend U.S. public policy.

The Morning Mist case adds some clarity to a significant issue in cross border insolvencies by highlighting the importance of understanding the internal operations and structure of foreign companies—factors that could affect the ability of U.S. creditors to seek redress in U.S. courts.

Article By:

of

The Good Angel Investor (Part 1): Doing the Deal

Michael Best Logo

At a time when lean startups often require considerably less than $1 million dollars to develop the proverbial minimum viable product and even validate the same with some customers, angel investors are playing an increasingly important role in startup financings.  And that’s a good thing, particularly in places outside of the major venture capital centers, where institutional venture capital is scarce.

Most startups successfully launched with angel capital will want to tap deeper pools of capital later on, often from traditional venture capital investors.  That being the case, entrepreneurs and their angel investors should make sure that the structure and terms of angel investments are compatible with the likely needs of downstream institutional investors.  Herewith, some of the issues entrepreneurs and angels should keep in mind when they sit down and negotiate that first round of seed investment.

  1. Don’t get hung up on valuation.  Seed stage opportunities are difficult to put a value on, particularly where the entrepreneur and/or the investor have limited experience.  Seriously mispricing a deal – whether too high or too low – can strain future entrepreneur/investor relationships and even jeopardize downstream funding.  If you and your seed investor are having trouble settling in on the “right” price for your deal, consider structuring the seed round as convertible debt, with a modest (10%-30%) equity kicker.  Convertible debt generally works where the seed round is less than one-half the size of the subsequent “A” round and the A round is likely to occur within 12 months of the seed round based on the accomplishment of some well-defined milestone.
  1. Don’t look for a perfect fit in an off-the-shelf world.  In the high impact startup world, probably 95% of seed deals take the form either of convertible debt (or it’s more recent twin convertible equity) or “Series Seed/Series AA” convertible preferred stock (a much simplified version of the classic Series A convertible preferred stock venture capital financing).  Unless you can easily explain why your deal is so out of the ordinary that the conventional wisdom shouldn’t apply, pick one of the two common structures and live with the fact that a faster, cheaper, “good enough” financing is usually also the best financing at the seed stage.
  1. On the other hand, keeping it simple should not be confused with dumbing it down.  If the deal is not memorialized in a mutually executed writing containing all the material elements of the deal, it is not a “good enough” financing.  The best intentioned, highest integrity entrepreneurs and seed investors will more often than not recall key elements of their deal differently when it comes time to paper their deal – which it will at the A round, if not before.  And the better the deal is looking at that stage, the bigger those differences will likely be.
  1. Get good legal advice.  By “good” I mean “experienced in high impact startup financing.”  Outside Silicon Valley, the vast majority of reputable business lawyers have little or no experience representing high impact entrepreneurs and their investors in financing transactions.  When these “good but out of their element” lawyers get involved in a high impact startup financing the best likely outcome is a deal that takes twice as long, and costs twice as much, to close.  More likely outcomes include unconventional deals that complicate or even torpedo downstream financing.  This suggestion is even more important if your deal is perchance one of those few that for some reason does need some custom fitting.
  1. Finally, a pet peeve.  If you think your startup’s future includes investments by well regarded institutional venture capital funds, skip the LLC tax mirage and just set your company up as a Delaware “C” corporation.  If you want to know why, ask one of those “experienced high impact startup lawyers” mentioned in point 4 above.
Article By:

 of

Top Five Traps for the Unwary in Spin-Offs

McDermottLogo_2c_rgb

A wave of corporate breakups has swept through the United States over the last few years as investors have taken notice of the fact that smaller companies focused on a single business tend to outperform their more diversified peers.  A primary vehicle for these breakups has been the spin-off transaction, in which a publicly traded parent company distributes the shares of the spin-off company (spinco) to its own shareholders, creating a new, independent publicly traded entity.  The New York Times, citing Dealogic, reported that there were 93 spin-off transactions worth $128 billion in 2011, and that 2012 kept pace with 85 spin-off transactions worth $109 billion.  The rationale for a spin-off often is to unlock the value in a business or division that is trapped in a larger corporate bureaucracy.  Conglomerates tend to spread capital across all of their divisions rather than focusing on the individual opportunities within each business that are the most promising.  Holding company structures also can make decision-making more cumbersome and equity incentives less incentivizing for division management who feel as though their hard work is being diluted by the underperformance of other divisions or businesses.

Spin-offs, however, are complicated transactions that require a great deal of advance planning.  In many cases, an announcement that a parent company is considering the spin-off of one of its businesses is actually the start of a “dual-track” process wherein the parent company considers and plans for a spin-off while also remaining open to potential bids from third parties to acquire the business.  In even more complicated cases, a parent company agrees to sell a business to an acquirer in connection with a spin-off transaction.

The vast majority of spin-off transactions are designed to qualify under the rules of the Internal Revenue Code as “tax free” to the parent company and the shareholders who receive the spinco stock.

With this in mind, any company considering spinning off a division or business should keep in mind the following five potential traps.

1.  Tax-Free Qualification – Legitimate Business Purpose 

The spin-off must satisfy a legitimate business purpose in order to qualify under both the tax-free rules of the Internal Revenue Code and the Securities Act of 1933.  The tax authorities require that the spin-off be motivated in whole or in substantial part by one or more legitimate corporate business purposes in order to ensure that the purpose of the transaction is not simply “tax avoidance.”  The business purpose requirement is one of many requirements under the tax laws to qualify for a tax-free spin-off.  Because the costs of triggering tax in a spin-off transaction often are very high, most parent companies obtain a legal opinion from outside counsel and obtain a ruling from the Internal Revenue Service as a condition to completing a spin-off transaction.  As discussed in relation to trap number five below, a legitimate business purpose for the spin-off also is required under the securities laws in order for the distribution of the spinco stock to not be treated as a “sale” of securities by the parent company or the spinco requiring Securities Act of 1933 registration and the strict liability standard of care that comes with such a registration.  See the article entitled, “Five Key Tax Considerations for Spin-Off Transactions” for a more in depth discussion of tax issues raised in spin-offs.

2.  Separation of Assets and Liabilities

Before a business or a division can be spun off, both its assets and its liabilities must be separated.  Large companies with long operating histories often find that the process of separating out the spinco business is not straightforward, because the legal entities that house the business might also house other businesses and divisions that share assets, services, products, employees, vendors and customers with the spinco business.  The pre-spin separation transactions should avoid triggering contractual defaults and remedies under commercial agreements, financing agreements, intellectual property licensing agreements, collective bargaining agreements, employment contracts, benefit plans, etc.  Often the spinco and the parent company or another legacy business must enter into complex sharing or licensing agreements or joint ventures relating to valuable intellectual property, such as trade names, trademarks or patents, as well as employee matters.  See the article entitled “Trademark, Domain Name and Other IP Considerations for Spin-Offs” for a more in depth discussion of IP issues raised in spin-offs and see the article entitled, “Employee Benefit Issues in a Spin-Off” for a more in depth discussion of employee benefit issues raised in spin-offs.

The sharing of liabilities is often the most complicated endeavour because of the slew of legal obligations that are triggered.  In allocating liabilities to the spinco, the parent company must evaluate the impact such allocation will have on the solvency of the parent and the spinco.  Parent company directors can face personal liability under state corporate law for making an unlawful dividend because the company lacked sufficient capital to make such a dividend or for rendering the parent company insolvent by distributing out the spinco business, and the parent company itself can face claims of constructive fraudulent conveyance—i.e., the parent company received less than equivalent value, and either the parent or spinco was rendered insolvent (assets do not exceed liabilities), the parent and/or spinco was left with unreasonably small capital to run its respective business, or the parent or spinco was left with debts that exceed its respective ability to pay those debts as they become due.  Parent company directors can rely on legal experts and financial advisors to assist them in satisfying their duty of care.  A solvency opinion from a nationally recognized provider of such opinions is often a condition to the consummation of a spin-off transaction.  Such an opinion may be helpful to the directors of the parent company and spinco for a variety of reasons: (i) it can help to show that the directors properly exercised their duty of care in determining to enter into the spin-off transaction; (ii) it can assist in rebutting a fraudulent conveyance claim; and (iii) it can assist in rebutting a claim that the company had insufficient capital to make such a dividend.

3.  Transition Services

While one of the key rationales for spinning off a business or division is to allow the enterprise to operate independently, the reality in most cases is that, at least during the first year or so post-spin, a spinco must rely on its former parent company to provide many key administrative and operational services during the spinco’s transition period to a self-sufficient, independent public company.  During the pre-spin planning period, companies should consider, among other things, which transition services will be required, how they will be provided, for how long and under what pricing terms.  Typical transition services include legal, internal auditing, logistics, procurement, quality assurance, distribution and marketing.  These arrangements often have durations that last between six and 24 months.  Many parent companies agree to provide such transition services purely on a cost basis, while others will use a “cost plus” or “market” rate.

4.  Spinco Management and Board of Directors

Again, while independence from the former parent company is a key benefit for most spincos, having corporate managers with institutional knowledge and history with the enterprise is an important factor in assisting the spinco to successfully transition to independence.  Many spinco management teams include members who have served as executives at the former parent company.  In many cases, these are managers who served as division leaders who reported to the parent company CEO or CFO and are now ready to step into executive roles on their own.  It is also common for between one and three members of the parent company board to agree to take seats on the spinco board to provide the new public company board with a source of the company’s history and culture to ensure a smooth transition.  However, because of the competing fiduciary duties that these directors will face if they hold seats on both the parent and spinco boards, it is important for the spinco board to also have a majority of truly independent directors.  Spinco directors who are former executive officers of the parent also must be aware that the stock exchanges and influential shareholder services firms such as Institutional Shareholder Services will not view them as being truly independent from a corporate governance standpoint for some time after the completion of the spin-off.  This will inhibit their ability to serve on key board committees of the spinco.

5.  Preparation of the Disclosure 

Under the U.S. Securities and Exchange Commission’s rules, a spin-off of the shares of a subsidiary to a parent company’s shareholders does not involve the sale of securities by either the parent company or the subsidiary as long as the following conditions are met: (i) the parent company does not provide consideration for the spun-off shares; (ii) the spin-off is pro rata to the parent company shareholders; (iii) the parent company provides adequate information about the spin-off and the subsidiary to its shareholders and to the trading markets; and (iv) the parent has a valid business purpose for the spin-off.

To meet the adequate public information requirement, parent companies are required to prepare and disseminate detailed “information statements” that effectively look like initial public offering registration statements for the spinco.  These information statements are filed with the spinco’s Form 10 registration statement, which is required in order to register the spinco’s shares under the Securities Exchange Act of 1934 and to permit listing of such shares on a national securities exchange.  The preparation of the spinco information statement can take up to three or four months and requires a great deal of effort and cooperation among the lawyers, the business leaders, the finance department, the human resources/employee benefits department and the auditors.  In addition, under New York law, a spin-off of all or substantially all of a company’s assets may require a vote of such company’s shareholders, while under Delaware law, such a requirement is much less likely.

Article By:

 of

Pregnancy and Disability Discrimination the Focus of EEOC Enforcement Activity

Poyner SpruillSince Congress’ enactment of amendments to the Americans with Disabilities Act (ADA) in 2008, making it easier to establish disability status under that law, the EEOC has directed more of its attention to claims of pregnancy and disability discrimination and accommodation of pregnancy-related limitations. In its 2012 Strategic Enforcement Plan, the Commission identified the investigation and pursuit of this type of claim as a national priority.  This enforcement initiative was recently demonstrated in a lawsuit filed by the EEOC against an employer which allegedly denied accommodations to an employee who suffered from complications arising from her pregnancy. The suit, EEOC v. Engineering Documentation Systems, Inc.,settled for $70,000 before a judgment on the merits was reached. However, the case serves as a reminder to employers that the issue of pregnancy-related disability is now being targeted by the EEOC.

Title VII of the Civil Rights Act of 1964, as amended by the Pregnancy Discrimination Act (PDA), prohibits discrimination against employees or job applicants on the basis of pregnancy, childbirth or related medical conditions. The EEOC takes the position that Title VII and the PDA require employers to treat pregnant employees in the same manner as other employees with temporary medical conditions. For example, according to the EEOC, if an employer provides leaves of absence or light duty to employees with short-term medical conditions which render those employees unable to work, then an employee unable to work due to her pregnancy must also be afforded the same treatment.1   But Title VII is not the only potentially applicable law in this circumstance. The ADA requires employers to provide “reasonable accommodation” to an employee with an actual (or record of) disability. This raises the question whether a pregnant employee has a “disability” within the meaning of the ADA.

Under the ADA, a disability is defined in part as a physical or mental impairment which substantially limits a major life activity. Prior to the amendments to the ADA, temporary medical conditions generally were not found by the courts to constitute disabilities, on the grounds that short-term impairments were not “substantially limiting.” However, the ADA Amendments Act (ADAAA) has led to a more expansive interpretation of the term “disability.” Specifically, the EEOC’s regulations implementing the ADAAA state that an impairment may be substantially limiting of a major life activity, and thus a disability, even if it is of a duration of less than six months. While the EEOC still considers pregnancy itself not to constitute a disability (See EEOC’s “Questions and Answers on the Final Rule Implementing the ADA Amendments Act of 2008”), it recognizes that certain impairments resulting from pregnancy may be disabilities if they substantially limit a major life activity. As stated on the EEOC’s webpage regarding pregnancy discrimination, this could include short term complications of pregnancy such as gestational diabetes or preeclampsia.

With the possibility that more medical conditions and complications arising from pregnancy will now fall within the definition of disability under the ADAAA, employers must be more cognizant of when an obligation to consider and provide reasonable accommodation to employees with a pregnancy-related disability arises. Such accommodations might include leaves of absence, job reassignment, light duty, or job modifications, unless such accommodations would result in an undue hardship to the employer. It is also imperative that employers engage in the “interactive process” with such employees to identify reasonable accommodation. The failure to take such proactive measures can result in liability for an employer, particularly given that the EEOC is now focused on this area of enforcement.

Article By:

 of

“Actually, Someone Knows You are a Dog”– the Chinese Regulation Efforts on Private Data Protection

Sheppard Mullin 2012

Do you have privacy in the era of information?

“On the Internet, nobody knows you’re a dog.” First published in The New Yorker on July 5, 1993, this widely known and recognized saying has been quoted many times to describe the anonymous feature of Internet. However, now this description has been drifting from the truth.

The truth is that, some people using the Internet may know you better than yourself. When you log on Amazon, not only will the site greet you by name, the homepage will also suggest certain purchases. Surprisingly, you will be interested in at least one third of them. Your addresses have been recorded and Amazon will automatically calculate the delivery period. Besides those online shopping sites, getting visitors’ information is the common practice of online service and/or information providers. Youku and Netflix suggest videos to watch. Weibo and Facebook suggest friends to follow. Douban and IMDB suggest movie tickets to buy and parties to attend.

On one hand, these recommendations might give you convenience in your life and entertainment; while on the other hand, this can be really intruding and make you anxious by knowing you so much. For example, you just bought an apartment and even did not get the keys. However, decoration companies and contractors give you calls telling you the decoration designs for the new apartment have been done. You just submitted some resumes for a job. Even before the interview, insurance companies and training companies give you calls and emails to make sales. Have you wondered how strangers know your private, personal information?

Every time you log on a website, make a call or buy a ticket by showing ID card, computer systems will track you down, and record everything you have clicked and purchased. Data analyzing systems will collect, characterize, store your information, and take further actions based on the information. Some entities even purchase and resell personal data for profit. The reason why personal data become commodities is because direct marketing based on private data is profitable. Marketing communications are only classified as “direct marketing” where they are addressed to a specific person by name or where a phone call is made to a specific person, and the use of private data is the foundation of direct marketing. The newly issued Hong Kong Personal Data (Privacy) Amendment Ordinance contains a number of new provisions regulating the use of personal data in connection with direct marketing activities in Hong Kong, which has come into force since April 1, 2013. Apart from Hong Kong, there are over fifty countries and regions which have laws and regulations protecting personal data.

What is the new trend in China to protect personal data?

In order to safeguard the legitimate rights and interests of Chinese citizens concerning private data protection, the Ministry of Industry and Information Technology of China (“MIIT”) announced the Provisions on the Protection of Personal Information of Telecommunication and Internet Users (Draft for Comments) (“PPI Rules”) and the Provisions on the Registration of True Identity Information of Telephone Users (Draft for Comments) (“RTII Rules”) and sought for public comments. The deadline for submitting comments is May 15, 2013.

The PPI Rules and RTII Rules are a breakthrough with respect to legislation of personal information protection. Although these two rules are not officially a personal information protection law, they are a good beginning and call for a complete set of rules.

The PPI Rules and RTII Rules are designed to protect personal information from two perspectives. While the PPI Rules regulates the collection and utilization of users’ private information, the RTII Rules requests “real-name registration” of telephone users for the prohibition of direct or indirect marketing using no-name telephone numbers. Specifically, the PPI Rules requires that telecommunication service providers and Internet information service providers (“Service Providers”) shall not collect or use the users’ personal information without their consent. Service Providers shall also clearly notify the users of the purpose, method and scope of collection and utilization of the users’ personal information, retention period of such information, ways to access and modify such information, and consequences of refusal to provide such information.

Meanwhile, the “real-name registration” required by RTII Rules is a double-edged sword. Not only are telephone users required to supply their true identity information, some Internet services, for example, the Chinese Twitter Weibo, also require users’ true identity information. On one hand, it will reduce the risk of private information abuse by no-name telephones and Weibo bloggers. One the other hand, the “real-name registration” regime means it is legitimate for telephone and some Internet service providers to collect their users’ information. Although RTII Rules prohibits the sales and illegal provision of users’ information, it doesn’t mean those providers will not utilize the users’ information to make profits and provide such information to government or other compulsive entities. This “real-name registration” may limit the health development of Internet and even harm users’ right to free speech. Is “real-name registration” the only way to protect personal information? This is a controversial topic.

What can enterprises do to avoid violations of personal data protection rules in China?

Putting the controversial topic aside, let’s talk about what the enterprises doing business in China can do regarding new rules to protect personal information. Those enterprises may not be limited to Internet/telecommunication service providers, because the regime may expand in the future to regulate more entities that may get access to citizens’ personal data.

First, the concerned enterprises can log on MITT official websites and submit comments if any. They can make their voice heard since the rules are in the “draft for comments” period.

Second, thorough study of the new rules and other anticipated rules in this area is needed. The concerned enterprises need to provide proper training to their employees regarding the users’ information protection, since this is not only required by the new rules, but the enterprises might also have joint and several obligations with the employees who abuse the users’ information.

Third, proper drafts of disclaimer/declaration/agreement are needed when the enterprises want to collect and utilize the users’ private information. The enterprises need to make sure that they have obtained the users’ consents concerning the information collection and utilization. Proper preparations are needed to avoid future risks.

 of

Natural Gas Companies Settle Antitrust Suit Stemming from Joint Bidding

McDermottLogo_2c_rgb

On Monday, April 22, 2013, after rejecting the initial settlement agreement, Judge Richard Matsch (D. Colo.) approved a revised settlement of a suit brought by the U.S. Department of Justice (DOJ) against two energy companies for conspiring not to compete for mineral rights leases.  Gunnison Energy Corp. (GEC) and SG Interests I Ltd. and SG Interests VII Ltd. (collectively “SGI”) will each pay a fine of $275,000 to the DOJ to settle allegations of agreeing not to bid against each other in violation of antitrust law for natural gas leases on government land in western Colorado.  These fines are in addition to those related to alleged False Claims Act violations, for which SGI and GEC paid government fines of $206,250 and $245,000 respectively.  The new settlement is twice the amount of the fines in the original settlement.

McDermott Will & Emery wrote an article in February 2012 analyzing the DOJ’s initial complaint against the parties, and the competitive implications of joint bidding.  At the time, the parties had agreed to pay a total of $550,000 in fines.  The court rejected the settlement in December 2012 finding that it was not in the public interest.  “There is no basis for saying that the approval of these settlements would act as a deterrence to these defendants and others in the industry, particularly as GEC considers ‘joint bidding’ to be common in the industry.”  Further, the settlement amount was “nothing more than the nuisance value of [the] litigation.”  Additionally, as reflected in the newly approved deal, the court wanted the alleged Sherman Act violations and False Claims Act violations settled separately, with a payment for the Sherman Act claims separate from, and in addition to, any amount due under the False Claims Act.  At heart, it appears Judge Matsch wanted any settlement he approved to be meaningful enough to have a deterrent effect on future agreements.

This was the DOJ’s first challenge to an anti-competitive bidding agreement for mineral rights leases, but it is just one of the recent cases in which joint bidding activities have become the focus of antitrust scrutiny.  In Summer 2012, the DOJ opened an investigation into Chesapeake Energy’s acquisition of oil and gas properties in Michigan and the possibility that Chesapeake conspired with Encana Corp. to allocate bids on those properties.  In 2006, the DOJ began investigating the joint bidding practices of private equity firms in connection with leveraged buyouts.  That investigation led to class action suits against private equity firms.  One of those suits survived a motion for summary judgment last month.

It is important to note that the DOJ is paying attention to joint bidding practices and taking action.  As noted in the SGI/GEC matter, while joint bidding may in fact be common practice in the energy field, it is not necessarily lawful.  Each arrangement should be evaluated for potential anticompetitive effects.

Article By:

 of

Obama Administration Aims to Restrict Physician Self-Referrals for Certain In-Office Services in Proposed Budget

Barnes & Thornburg

In its recently unveiled budget proposal for fiscal year 2014, the Obama administration has proposed saving billions in federal expenditures by tightening restrictions on certain services for which physicians can self-refer patients and receive government payment.

Under current federal law, a physician cannot make a referral to an entity for the furnishing of “designated health services” payable by government-funded health programs, such as Medicare, if the physician has a financial relationship with the entity. Correspondingly, this law—the “Stark Law”—also prohibits the entity receiving the referral from submitting a claim for payment for such services. Several exceptions, however, punctuate these prohibitions, including the “in-office ancillary services” exception, which shields referrals within physician practice groups for designated health services that meet specified criteria regarding the individual who furnishes the services, the location where the individual furnishes the services, and the party that bills for the services.

In an overview of the President’s 2014 budget plan for health care spending, the U.S. Department of Health and Human Services (HHS) notes that there are “many appropriate uses” for the in-office ancillary services exception, which the agency describes as designed to allow physicians to “self-refer quick turnaround services.” But, the agency cautions, some physicians have relied on the exception for certain services, such as advanced imaging and outpatient therapy that “are rarely performed on the same day as the related office visit.” Additionally, HHS claims, evidence suggests that the exception may have spurred “overutilization and rapid growth” of these services.

In light of these findings, the Obama administration has recommended excluding radiation therapy, therapy services (such as physical therapy and occupational therapy), and advanced imaging (such as CT scans and MRIs) from the in-office ancillary exception to encourage “more appropriate use of select services,” as HHS explains in the health spending overview. Notably, however, the administration would not extend this exclusion to “cases where a practice meets certain accountability standards,” which the HHS Secretary would have the authority to define, presumably before the exclusion would take effect in calendar year 2015 as the administration intends. Amending the Stark Law exception in this fashion would yield $6.1 billion in federal savings over 10 years, according to the administration.

Providers of the in-office services identified by the Obama administration should follow closely to see if the administration’s suggested change to the Stark Law makes it into the final budget and, if so, how the HHS Secretary ultimately defines the “accountability standards” that could make the difference between staying within the boundaries of the law and falling outside of them.

Article By:

 of