Senate Finance Committee Leadership Releases Tax Reform Framework

Bracewell & Giuliani Logo

A major step forward on tax reform occurred today with Senate Finance Committee Chairman Max Baucus (D-MT) and Ranking Member Orrin Hatch (R-UT) releasing their tax reform framework.  They are planning a “blank-slate” approach:  stripping the tax code of all current tax deductions, credits, and expenditures in place of a lower individual and corporate tax rate.

In their “Dear Colleague” letter sent out today, Senators Baucus and Hatch announced their plan to hold a markup on a bill after the August recess.  Members of the Senate have been invited to submit by July 26th a “wish list” of which tax provisions they would like to keep alive, and the Senators are encouraging the submission of legislative language.  This approach, requiring Senators to defend the provisions they would like retained, rather than cut breaks they don’t support, is a departure from current practice.  Baucus and Hatch did note that any benefit that ends up in the tax code will reduce the amount of revenue that could go towards reducing the overall rate or reducing the deficit.

China to Strictly Regulate Secondment/Staffing Business Model

Morgan Lewis logo

Amendments to the PRC Labor Contract Law take effect on July 1, adding limitations on employment structures.

On July 1, 2013, amendments to the People’s Republic of China (PRC) Labor Contract Law will take effect. The amendments increase the regulation of staffing and labor service businesses and discourage the use of secondment arrangements to avoid employer-related liabilities. The new law was published on December 28, 2012 and is an important development in China’s business community.

In recent years, increasing numbers of labor-intensive businesses, including state-owned banks and large multinationals, have used secondment services provided by staffing firms due to the difficulties involved in terminating employees and increased compliance costs in China. The secondment arrangements became attractive options among employers because the termination of such an arrangement was not subject to the numerous restrictions set forth in the labor law and regulations and avoided triggering severance obligations.

In light of the Chinese government’s amendments to the PRC Labor Contract Law, companies with operations in China should keep in the mind the below major requirements when formulating or executing compliance plans.

Qualification of Staffing Firms

To engage in a staffing business for the provision of secondment services, a company must meet the new law’s requirements, which include a minimum registered capital of at least RMB$2 million. In addition, a company must apply for a special permit before conducting any staffing business. As the law is silent on the qualifications of an applicant to obtain such a permit, the approval authorities have broad discretion. It is possible the Chinese government will control the number of service providers in a particular geographic area by limiting the number of permits issued. In practice, firms without permits may structure their business models as outsourcing businesses by arguing that they are not providing staffing services. However, because the distinction between “secondment” and “outsourcing” is not defined in any law or regulation, the regulatory authorities may treat the outsourcing model as secondment in substance and thus require a permit.

Equal Work, Equal Pay

The new law requires that the recipients of secondment services compensate the secondee for his or her services on the principle of “equal work, equal pay.” Although this concept has been in existence since the promulgation of the PRC Labor Law in 1994, it is not a defined term in any labor regulation, including the new law. Traditionally, benefits and other nonsalary items, such as equity incentive awards, have not been considered when applying the principle of equal work, equal pay. It remains to be seen how the courts and labor arbitration organizations will interpret the principle in the context of the new law.

Limitation on the Role of Secondees

The new law expressly states that, as a general principle, employers should hire employees through signed labor contracts and that secondment can be used only if the position is of a temporary, auxiliary, or replaceable nature. A position will be treated as temporary if it lasts no more than six months, but it is not clear whether the secondment term can be renewed upon expiration. “Auxiliary positions” are defined as noncore business positions without further explanation. In practice, it may often be very difficult to distinguish between core and noncore positions. For instance, while it can be argued that only bankers are core to the banking business, it can also be asserted that in-house lawyers should be core personnel as well because of their role in controlling and managing risks, which is critical to banks. The new law defines “replaceable positions” as those left vacant because the formal employees are on leave for personal or business reason, but it is not clear if replacement positions can be renewed.

Percentage Limitation on the Number of Secondees

The new law requires employers to strictly limit the number of secondees to a certain percentage of the total number of personnel (including secondees). Specific percentages will be announced by the State Council. It is generally understood that the percentage should be within a 10% to 30% range. A literal reading of the language of the new law suggests that any percentage limitation should be in addition to the requirement that the positions for secondees should be of a temporary, auxiliary, or replaceable nature. Thus, an employer may not argue that it complies with the law by limiting the number of secondees below the maximum percentage, regardless of the nature of a secondee’s position. In practice, however, employers or regulatory authorities may take the percentage cap as a safe harbor due to the difficulties of defining the nature of a secondee’s position.

Consequences of Breach

For staffing firms without a permit, the Chinese government may take away all illegal revenue and impose monetary penalties of up to five times the amount of the revenue. If a staffing firm or employer fails to comply with the law, the labor regulatory authority will order it to take corrective measures. A per person penalty ranging from RMB$5,000 to RMB$10,000 will be imposed if no remedial measures are adopted by the employer or staffing service provider. The new law is silent on whether a secondee may request that the employer convert him or her into a formal employee if the employer is found to be noncompliant. If the answer is no, what will happen to the existing secondment? Should the parties terminate the secondment and should the actual user of the employee’s service formally employ someone for the same position? May the secondee have a right of first refusal if the actual user is required to do so? These and other similar questions remain to be answered by further implementing rules from the State Council or judicial interpretation from the Supreme People’s Court.

Article By:

 of

Yahoo!/Tumblr Deal and the Tax Cost of Cash Acquisition Payments

McBrayer NEW logo 1-10-13

When Yahoo! recently acquired the blogging service Tumblr, the two companies structured the deal so that virtually all of the $1.1 billion price tag for Tumblr will be paid in cash. In the current economy, many companies, particularly tech companies, have a lot of cash available, making the more traditional payment in stock appear less desirable. However, tax planning during mergers or acquisitions can be invaluable because, with proper counsel, the organizations can anticipate and mitigate the tax ramifications for the companies, individuals and shareholders.

Specific information about any tax planning in the Yahoo!/Tumblr deal hasn’t been released, but let’s consider the potential tax consequences of an essentially all-cash deal.

Most of Tumblr’s existing shareholders likely purchased their stock for substantially less than it was valued at the time of Yahoo’s acquisition. Since capital gains taxes are levied on the difference between the purchase price and the sale price, those Tumblr shareholders may be facing a hefty capital gains tax bill that will come due as soon as the transaction is complete.

If the deal had been structured as a stock transaction, on the other hand, it might have been structured to defer the capital gains tax for those shareholders until they actually sell their stock to Yahoo! There are a number of methods, such as 1031 exchanges, Section 368 tax-free reorganizations, and or 338(h)(10) stock purchase elections, that might also be effective in mitigating the tax burden.

An all-cash deal also presents challenges for Yahoo! in that it could affect the incentives for Tumblr’s founder and senior management going forward. In a tax-free reorganization, for example, they would generally be compensated in Yahoo! stock, which automatically creates an incentive for Tumblr’s leadership to build value for Yahoo! Without stock, a different incentive plan is needed.

According to The New York Times’ DealBook blog, Yahoo! may not need to worry about incentivizing Tumblr’s leadership, however, as it plans to continue to run the blog service as a separate company with the same group of executives. That may leave the existing incentives for success in place.

In this particular case, we don’t have enough information to determine why Yahoo! and Tumblr structured the acquisition as an all-cash deal. Well-considered tax planning, however, is essential for any business considering a merger or acquisition, stock sale, or major asset sale. Anticipating and minimizing transactional taxes, including business transfer taxes and business succession taxes, can help ensure that companies garner all potential benefits of the deal.

 of

New Cybersecurity Guidance Released by the National Institute of Standards and Technology: What You Need to Know for Your Business

Mintz Logo

The National Institute of Standards and Technology (“NIST”)1 has released the fourth revision of its standard-setting computer security guide, Special Publication 800-53 titled Security and Privacy Controls for Federal Information Systems and Organizations2 (“SP 800-53 Revision 4”), and this marks a very important release in the world of data privacy controls and standards. First published in 2005, SP 800-53 is the catalog of security controls used by federal agencies and federal contractors in their cybersecurity and information risk management programs. Developed by NIST, the Department of Defense, the Intelligence Community, the Committee on National Security Systems as part of the Joint Task Force Transformation Initiative Interagency Working Group3over a period of several years with input collected from industry, Revision 4 “is the most comprehensive update to the security controls catalog since the document’s inception in 2005.”4

Taking “a more holistic approach to information security and risk management,5” the new revision of SP 800-53 also includes, for the first time, a catalog of privacy controls (the “Privacy Controls”) and offers guidance in the selection, implementation, assessment, and ongoing monitoring of the privacy controls for federal information systems, programs, and organizations (the “Privacy Appendix”).6 The Privacy Controls are a structured set of standardized administrative, technical, and physical safeguards, based on best practices, for the protection of the privacy of personally identifiable information (“PII”)7 in both paper and electronic form during the entire life cycle8of the PII, in accordance with federal privacy legislation, policies, directives, regulations, guidelines, and best practices.9 The Privacy Controls can also be used by organizations that do not collect and use PII, but otherwise engage in activities that raise privacy risk, to analyze and, if necessary, mitigate such risk.

Description of the Eight Families of Privacy Controls

The Privacy Appendix catalogs eight privacy control families, based on the widely accepted Fair Information Practice Principles (FIPPs)10 embodied in the Privacy Act of 1974, Section 208 of the E-Government Act of 2002, and policies of the Office of Management and Budget (OMB). Each of the following eight privacy control families aligns with one of the eight FIPPs:

  1. Authority and Purpose. This family of controls ensures that an organization (i) identifies the legal authority for its collection of PII or for engaging in other activities that impact privacy, and (ii) describes the purpose of PII collection in its privacy notice(s).
  2. Accountability, Audit, and Risk Management. This family of controls ensures that an organization (i) develops and implements a comprehensive governance and privacy program; (ii) documents and implements a privacy risk management process that assesses privacy risk to individuals resulting from collection of PII and/or other activities that involve such PII; (iii) conducts Privacy Impact Assessments (“PIAs”) for information systems, programs, or other activities that pose a privacy risk; (iv) establishes privacy requirements for contractors and service providers and includes such requirements in the agreements with such third parties; (v) monitors and audits privacy controls and internal privacy policy to ensure effective implementation; (vi) develops, implements, and updates a comprehensive awareness and training program for personnel; (vii) engages in internal and external privacy reporting; (viii) designs information systems to support privacy by automating privacy controls, and (ix) maintains an accurate accounting of disclosures of records in accordance with the applicable requirements and, upon request, provides such accounting of disclosures to the persons named in the record.
  3. Data Quality and Integrity. This family of controls ensures that an organization takes reasonable steps to validate that the PII collected and maintained by the organization is accurate, relevant, timely, and complete.
  4. Data Minimization and Retention. This family of controls addresses (i) the implementation of data minimization requirements to collect, use, and retain only PII that is relevant and necessary for the original, legally authorized purpose of collection, and (ii) the implementation of data retention and disposal requirements.
  5. Individual Participation and Redress. This family of controls addresses implementation of processes (i) to obtain consent from individuals for the collection of their PII, (ii) to provide such individuals with access to the PII, (iii) to correct or amend collected PII, as appropriate, and (iv) to manage complaints from individuals.
  6. Security. This family of controls supplements the security controls in Appendix F and are implemented in coordinating with information security personnel to ensure that the appropriate administrative, technical, and physical safeguards are in place to (i) protect the confidentiality, integrity, and availability of PII, and (ii) to ensure compliance with applicable federal policies and guidance.
  7. Transparency. This family of controls ensures that organizations (i) provide clear and comprehensive notices to the public and to individuals regarding their information practices and activities that impact privacy, and (ii) generally keep the public informed of their privacy practices.
  8. Use Limitation. This family of controls addresses the implementation of mechanisms that ensure that an organization’s scope of use of PII is limited to the scope specified in their privacy notice or as otherwise permitted by law.

Some of the Privacy Controls, such as Data Quality and Integrity, Data Minimization and Retention, Individual Participation and Redress, and Transparency also contain control enhancements, and while these enhancements reflect best practices which organizations should strive to achieve, they are not mandatory.11 The Office of Management and Budget (“OMB”), tasked with enforcement of the Privacy Controls, expects all federal agencies and third-party contractors to implement the mandatory Privacy Controls by April 30, 2014.

The privacy families must be analyzed and selected based on the specific operational needs and privacy requirements of each organization and can be implemented at various operational levels (e.g., organization level, mission/business process level, and/or information system level12). The Privacy Controls and the roadmap provided in the Privacy Appendix will be primarily used by Chief Privacy Officers (“CPO”) or Senior Agency Officials for Privacy (“SAOP”) to develop enterprise-wide privacy programs or to improve an existing privacy programs in order to meet an organization’s privacy requirements and demonstrate compliance with such requirements. The Privacy Controls supplement and complement the security control families set forth in Appendix F (Security Control Catalog) and Appendix G (Information Security Programs) and together these controls can be used by an organization’s privacy, information security, and other risk management offices to develop and maintain a robust and effective enterprise-wide program for management of information security and privacy risk.

What You Need to Know

The Privacy Appendix is based upon best practices developed under current law, regulations, policies, and guidance applicable to federal information systems, programs, and organizations, and by implication, to their third-party contractors. If you provide services to the federal government, work on government contracts, or are the recipient of certain grants that may require compliance with federal information system security practices, you should already be sitting up and paying attention. This revision puts privacy up front with security.

Like other NIST publications, this revision will be looked at as an industry standard for best practices, even for commercial entities that are not doing business with the federal government. In fact, over the last few years, we have seen increasing references to compliance with NIST 800-53 as setting a contractual baseline for security. We expect that this will continue, and now will include both the Security Controls and the Privacy Controls. As such, general counsel, business executives and IT professionals should become familiar with and conversant in the Privacy Controls set forth in the new revision to SP 800-53. At a minimum, businesses should undertake a gap analysis of the privacy controls at their organization against these Privacy Controls to determine if they are up to par or if they have to enhance their current privacy programs. And, if NIST 800-53 appears in contract language as the “minimum standard” to which your company’s policies and procedures must comply, the gap analysis will at least inform you of what needs to be done to bring both your privacy and security programs up to speed.


1 The National Institute of Standards and Technology is a non-regulatory agency within the U.S. Department of Commerce, which, among other things, develops information security standards and guidelines, including minimum requirements for federal information systems to assist federal agencies in implementing the Federal Information Security Management Act of 2002.

2 See Security and Privacy Controls for Federal Information Systems and Organizations, NIST Special Publ. (SP) 800-53,
Rev. 4 (April 30, 2013), http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf.

3 The Joint Task Force Transformation Initiative Interagency Working Group is an interagency partnership formed in 2009 to produce a unified security framework for the federal government. It includes representatives from the Civil, Defense, and Intelligence Communities of the federal government.

4 See NIST Press Release for SP 800-53 Revision 4 at http://www.nist.gov/itl/csd/201304_sp80053.cfm. Revision 4 of
SP 800-53 adds a substantial number of security controls to the catalog, including controls that address new technology such as digital and mobile technologies and cloud computing. With the exception of the controls that address evolving technologies, the majority of the cataloged security controls are policy and technology neutral, focusing on the fundamental safeguards and countermeasures required to protect information during processing, while in storage, and during transmission.

5 See NIST Press Release for SP 800-53 Revision 4 at http://www.nist.gov/itl/csd/201304_sp80053.cfm.

6 See Appendix J, Privacy Control Catalog to Security and Privacy Controls for Federal Information Systems and Organizations, NIST Special Publ. (SP) 800-53, Rev. 4 (April 30, 2013),http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf. Appendix J was developed by NIST and the Privacy Committee of the Federal Chief Information Officer (CIO) Council.

7 Personally Identifiable Information is defined broadly in the Glossary to SP 800-53 Revision 4 as “Information which can be used to distinguish or trace the identity of an individual (e.g., name, social security number, biometric records, etc.) alone, or when combined with other personal or identifying information which is linked or likable to a specific individual (e.g., date and place of birth, mother’s maiden name, etc.). See page B-16 of Appendix B, Privacy Control Catalog to Security and Privacy Controls for Federal Information Systems and Organizations, NIST Special Publ. (SP) 800-53, Rev. 4 (April 30, 2013),http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf. However, as stated in footnote 119 in Appendix J, “the privacy controls in this appendix apply regardless of the definition of PII by organizations.”

8 Collection, use, retention, disclosure, and disposal of PII.

9 See page J-4 of Appendix J, Privacy Control Catalog to Security and Privacy Controls for Federal Information Systems and Organizations, NIST Special Publ. (SP) 800-53, Rev. 4 (April 30, 2013),http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf.

10 See NIST description and overview of Fair Information Practice Principles at http://www.nist.gov/nstic/NSTIC-FIPPs.pdf.

11 See pages J-4 of Appendix J, Privacy Control Catalog to Security and Privacy Controls for Federal Information Systems and Organizations, NIST Special Publ. (SP) 800-53, Rev. 4 (April 30, 2013),http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf.

12 See page J-2 of Appendix J, Privacy Control Catalog to Security and Privacy Controls for Federal Information Systems and Organizations, NIST Special Publ. (SP) 800-53, Rev. 4 (April 30, 2013),http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf.

The Libor Scandal: What’s Next? Re: London Interbank Offered Rate

GT Law

The London Interbank Offered Rate (Libor) is calculated daily by the British Banking Association (BBA) and published by Thomson Reuters. The rates are calculated by surveying the interbank borrowing costs of a panel of banks and averaging them to create an index of 15 separate Libor rates for different maturities (ranging from overnight to one year) and currencies. The Libor rate is used to calculate interest rates in an estimated $350 trillion worth of transactions worldwide.

The Libor Scandal

The surveyed banks are not required to provide actual borrowing costs. Rather, they are asked only for estimates of how much peer financial institutions would charge them to borrow on a given day. Because they are not required to substantiate their estimates, banks have been accused of Libor “fixing,” or manipulating the Libor rate by submitting estimates that are exaggeratedly higher or lower than their true borrowing costs. This scandal has resulted in the firing and even arrest of bank employees.

Libor’s reputation came under fire in June 2012 when Barclays PLC agreed to pay over $450 million to settle allegations that some traders fixed their reported rates to increase profits and make the bank appear healthier than it was during the financial crisis. In the wake of this settlement, investigative agencies around the world began to look deeper into Libor rate fixing, leading to a $750 million settlement by the Royal Bank of Scotland and a record-setting $1.5 billion settlement by UBS AG. To date, there have been over $2.5 billion in settlements, with many more investigations ongoing. One investment bank estimates that, in total, legal settlements could amount to as much as $35 billion by the time investigations conclude.

Replacing the Libor

In the wake of the Libor scandal, international and domestic agencies have advocated for its replacement. The BBA, the group responsible for setting Libor since the 1980s, voted to relinquish that authority, and a committee of the UK’s Financial Reporting Council is currently vetting bids from other independent agencies interested in administering the new rate.

The International Organization of Securities Commissions (IOSCO) Task Force on Benchmark Rates, led by the head of the UK Financial Services Authority Martin Wheatley and the US Futures Trading Commission Chairman Gary Gensler, released a report last month saying that the new system should be based on data from actual trades in order to restore creditability. Wheatley and Gensler agree on the need to create a transaction-based rate, but disagree on how to transition from Libor to the new system.

Wheatley proposes that: the estimate-based Libor system be kept in place while a new transaction based rate is introduced to run alongside it under a “dual-track” system (so as to avoid disrupting existing transactions), and that the decision as to if and when to abandon Libor be left to market participants as opposed to regulators.

Gensler proposes a wholesale replacement of Libor as soon as possible and cautions that its continued use undermines market integrity and threatens financial stability.

IOSCO is also pushing for a code of conduct that would hold banks to a higher standard of honesty in reporting and setting index rates, while other agencies, including the Financial Stability Board and the European Union, are working on the development of other potential solutions including stricter regulations and greater penalties for rate-fixing conduct.

The future of Libor is unclear, but it is certain that whomever is chosen to replace the BBA will be under immense pressure and scrutiny from the international financial community.

Recommendations

To stay prepared, parties to financial transactions should view existing and future contracts with an eye towards potential benchmark changes. Parties should perform contractual due diligence to establish the range of Libor definitions and benchmarks to which they are exposed. In addition, parties should review the fallback provisions dealing with change or discontinuance of Libor and other benchmark rates to understand the potential impact of such changes.

Going forward, parties should include fallback provisions in their contracts to allocate risk and set up alternatives to mitigate the uncertainty that could arise in the event of any changes to the Libor system or other relevant benchmarks.

Article By:

 of

Total Settles Foreign Corrupt Practices Act (FCPA) Bribery Claims for $398M

Katten Muchin

On May 29, French oil and gas company, Total SA, agreed to pay $398 million to settle US civil and criminal allegations that it paid bribes to win oil and gas contracts in Iran in violation of the Foreign Corrupt Practices Act (FCPA). Notably, the criminal penalty is the fourth-largest under the FCPA and the case marks the first coordinated action by French and US law enforcement agencies in a major foreign bribery case.

In a scheme that allegedly began nearly 20 years ago in 1995 and continued until 2004, Total allegedly paid approximately $60 million in bribes to induce an intermediary, designated by an Iranian government official, to help the company win contracts with National Iranian Oil Co. The contracts gave Total the right to develop three oil and gas fields and included a portion of South Parys, the world’s largest gas field. Total allegedly characterized the bribes as “business development expenses” in its books and records.

The DOJ filed a three-count criminal investigation charging Total with FCPA conspiracy and internal controls and books-and-records violations. Total agreed to resolve the FCPA charges by paying a $245.2 million criminal penalty, which was at the bottom of the $235.2 to $470.4 million range of fines available under the US Sentencing Guidelines. The company also settled a related civil case with the US Securities and Exchange Commission for $153 million in disgorgement of its profits in the scheme. The criminal case will be dismissed after three years if Total complies with the deferred prosecution agreement, which requires Total to (i) retain a corporate compliance monitor, who will conduct annual reviews; (ii) cooperate with authorities and (iii) implement an enhanced compliance program designed to prevent and detect FCPA violations. The compliance program requires, among other things, that Total’s Board of Directors and senior management “provide, strong, explicit and visible support and commitment” to the company’s anti-corruption policy and that they appoint a senior executive to oversee the program and report directly to an independent authority, such as internal audit, the Board or a committee thereof. Total’s problems, however, are not over. French prosecutors have recommended that the company and its chief executive officer be brought to trial on violations of French law, including France’s foreign bribery law.

U.S. v. Total SA, 13-cr-239 (E.D. VA. May 29, 2013).

Article By:

 of

United States Citizenship and Immigration Services (USCIS) Issues Final EB-5 Policy Memo

GT Law

On May 30, 2013, USCIS finally issued the much anticipated Final EB-5 Adjudications Policy Memorandum.  The Final EB-5 Adjudications Policy Memorandum makes significant changes to and provides clarifications for the EB-5 Program.  Here are some of the highlights:

  • Less Regional Center Amendments: The new memo states that USCIS does not require formal amendments to regional center designation when an RC changes its industries of focus, its geographic boundaries, its business plans, or its economic methodologies.  Previously, the I-924 listed “acceptable amendments” to include some of these. The memo clarifies the non-mandatory nature of these business changes.
  • An RC’s Geographic Area is Determined by Reasonableness:  For the first time, USCIS outlined that determinations on the geographic area of a regional center are based on the RC’s ability to establish by a preponderance of the evidence that the proposed economic activity will promote growth in the proposed area. This means that the RC must show that the proposed area contributes significantly to the supply chain and labor pool of the proposed projects.
  • Defines Hypothetical, Actual and Exemplar Projects: The memo states that if a project complies with the requirements of a Matter of Ho business plan, it is an “actual project.” If the project does not comply with Matter of Ho, it is “hypothetical.”  Additionally, an actual project requires more detail than a hypothetical. Finally, the memo defines an “exemplar” as an actual I-526 petition for a project that USCIS will review for EB-5 compliance, including all transactional documents (such as the offering materials).  This is important because if USCIS approves an “actual project,” USCIS will give deference to the later filed I-526s.  Hypothetical projects are not accorded deference at the I-526 stage.
  • We decided that already! Deference to Prior Decisions: Deference to already adjudicated matters is one of the most significant changes contained within the memo. For example, if USCIS approves an I-924’s Matter of Ho compliant business plan, it will give deference to this at the later I-526 stage.  I-924 approval notices should state whether a project has been approved as an exemplar or actual project, thereby being accorded deference in future adjudications.
  • Approved the Use of Escrow Accounts: USCIS explicitly approved investor’s use of escrow accounts as long as release of funds is immediate and irrevocable upon approval of the Form I-526 and acquisition of an immigrant visa or approval of Form 1-485 (adjustment of status).
  • Bridge financing Permitted If You Just Can’t WaitIf a developer uses bridge financing prior to receipt of the EB-5 capital, this will not affect the job creation calculation whether or not said financing was contemplated before the EB5 financing.  However, it is always a best practice to have contemporaneous evidence of the intent to use EB-5 capital.
  • USCIS Defers to State Adjudications of TEAs: USCIS will review state determinations of TEAs to see whether they used reasonable methodologies, but will otherwise defer to state determinations.
  • Eventual Acquisition of an Asset Does Not Count as “At Risk” Investment: If the investor is individually guaranteed the right to eventual ownership or use of a particular asset in consideration of the capital contribution, then the expected present value of the guaranteed ownership or use does not count toward total amount of the investor’s capital contribution in determining the amount of money truly at risk.
  • Restructure or Reorganization Means (probably) a Total Remodel or Significant Addition: Plans to convert a restaurant into a nightclub or add crop production to a livestock operation would constitute restructuring. This seems to mean USCIS wants a complete remodeling or significant addition to the existing business. “Reasonable time” to Create Jobs at I-829 is Not a Free Pass: Investors need not have created all the jobs at the I-829 stage, but need to be in “substantial compliance” and show that they will create jobs “within a reasonable time.”  This is not an open-ended allowance, but does provide some flexibility. After this time, jobs will not be considered unless there is a force majeure. 
  • Material changes at I-829 stage? Don’t Fret: An individual investor can proceed with their Form I-829 petition to remove conditions even if within the time between I-526 approval and submission of the Form I-829 a material change occurred to the business plan.  As long as the investor can show that they satisfy the conditions for removal of conditions, USCIS may still issue an approval.

Top 10 Affordable Care Act Compliance Tasks for Employers in 2013

Dickinson Wright LogoWith apologies to David Letterman, here are the top 10 Affordable Care Act compliance tasks for employers in 2013:

  1. Continue tracking for purposes of reporting the value of health plan coverage provided during 2013 on Form W-2 issued in January 2014 (for employers who issue more than 250 Forms W-2).
  2. The maximum reimbursement from a health flexible spending account for plan years beginning on or after January 1, 2013 is $2,500.  Make sure employees are aware of any reduction from prior years.
  3. An additional Medicare tax of 0.9% must be withheld from the wages of employees making more than $200,000 beginning in 2013.
  4. The summary of benefits and coverage (“SBC”) must be distributed to eligible employees during the open enrollment period.  Any changes to the SBC must generally be distributed at least 60 days before the effective date.
  5. The first payment of the Patient-Centered Outcomes Research Institute fee (the “PCORI” fee or the “comparative effectiveness” fee) is due July 31, 2013, regardless of the plan year of the health plan.  This fee is $1.00 per covered member (including employees and dependents) for the first year and is reported to the IRS on Form 720.  Health insurers will file the form and pay the fee for insured plans; a plan sponsor of a self-insured plan is responsible for filing and payment with respect to any self-insured plan.
  6.  A notice of availability of the Health Insurance Marketplace (formerly called the Exchange) must be given to current employees on or before October 1, 2013 and to all employees hired on or after October 1, 2013.  Model notices are available on the DOL website.
  7. The DOL has also published new COBRA model notices. It is unclear when the updated notices must be issued, but it appears to be no earlier than October 1, 2013, as the new COBRA notices refer to the availability of the Health Insurance Marketplace as an alternative to COBRA coverage.
  8. Establish the measurement period, administrative period, and stability period for purposes of determining whether employees are “full-time” for purposes of eligibility for the health plan and for purposes of the “pay or play” penalty.  For current employees, these periods will start in 2013 for purposes of 2014 eligibility determinations.  Determine how and when you will communicate the rules – in the SPD?  During open enrollment? As part of the employee handbook?
  9. If you are not sure whether your business is a large employer, count the number of full-time employees and full-time equivalents for at least a 6-month period in 2013 to determine if the business has more than 50 full-time/full-time equivalent employees as of January 1, 2014.
  10. If you are a large employer and you wish to avoid “pay or play” penalties in 2014, evaluate plan design and employee contributions to determine if the lowest cost option provides minimum value and is affordable.  Make sure waiting periods are not longer than 90 days.

Last word of advice: stay on top of continuing developments and be prepared for questions from employees.  It is a time of great change and uncertainty for employees as well as employers.

Article By:

 of

Weighing Going Private or Sale to Carl Icahn, Dell Cuts off Info

McBrayer NEW logo 1-10-13

As Dell Inc. considers its future after a massive loss in value over the past decade, the question may fundamentally be this: are the company’s problems are the result of poor leadership or a relatively straightforward matter of shedding its stock obligations?

Two proposals are on the table. First, founder Michael Dell has proposed taking the company private by buying out the company’s stock for $24.4 billion through a private equity firm called Silver Lake. Second, business magnate Carl Icahn’s Southeastern Asset Management has offered to buy Dell for $12 in cash per share. Unfortunately, it’s not clear how the buyout negotiations are going.

An unquestioned leader in the personal computer industry in the 90s, Dell had lost some $68 billion in stock market value by 2010, reportedly due to a change in its customer base and inability to respond to Apple’s iPhone and iPad products. Sales at Dell continue to shrink, reportedly showing a 79 percent drop in a quarterly profit report filed last week.

As part of the buyout negotiations, Icahn sent a letter on seeking more detailed information from Dell, including data room access for a certain potential lender This week, however, a special committee of Dell’s board of directors sent Icahn a letter refusing access to that information until it can determine whether his offer is “superior” to Michael Dell’s.

Meanwhile, Dell insisted upon more information from Icahn — such as whether his offer is even serious. In its response, the committee specifically asked Icahn to make “an actual acquisition proposal that the Board could evaluate” as opposed to merely offering the board a backup plan in case Michael Dell’s proposal fails to move forward.

“Please understand that unless we receive information that is responsive to our May 13 letter, we are not in a position to evaluate whether your proposal meets that standard,” the special committee reportedly wrote in response to Icahn’s request.

The question on Wall Street is the same as Dell’s: Is the Southeastern Asset Management offer serious? Icahn reportedly already owns 4.5 percent of Dell’s stock, while Southwest, already Dell’s largest outside shareholder, owns 8 percent.

 of

U.S. Supreme Court Unanimously Upholds Creditability of UK Windfall Tax

McDermottLogo_2c_rgb

In a rare unanimous decision with potentially far-reaching impact on taxpayers claiming foreign tax credits, the Supreme Court of the United States ruled that a “windfall tax” imposed by the United Kingdom was creditable under IRC Section 901.


On May 20, 2013, in a rare unanimous decision with potentially far-reaching impact on taxpayers claiming foreign tax credits, the Supreme Court of the United States ruled that a “windfall tax” imposed by the United Kingdom was creditable under Internal Revenue Code (IRC) Section 901.  This decision definitively establishes the principles to be applied when determining whether a foreign tax is creditable under Section 901, expressly favoring a “substance-over-form” evaluation of a foreign tax’s economic impact.

The UK windfall tax was enacted in 1997 as a means to recoup excess profits earned by 32 UK utility and transportation companies once owned by the government.  During the 1980s and 1990s, the UK sold several government-owned utility companies to private parties.  After privatization, the UK Government prohibited these companies from raising rates for an initial period of time.  Because only rates and not profits were regulated, many of these companies were able to greatly increase their profits by becoming more efficient.  The increased profitability of these companies drew public attention and became a hot political issue in the United Kingdom, which ultimately resulted in Parliament enacting a windfall tax designed to capture the excess or “windfall” profits earned by these companies during the years they were prohibited from raising rates.  The tax was 23 percent of any “windfall” earned by such companies, which was calculated by subtracting the price for which the company was sold by the United Kingdom from an imputed value based on the company’s average annual profits.  Both PPL Corporation and Entergy Corporation owned interests in two of these 32 privatized companies and took a U.S. tax credit for the windfall taxes paid to the United Kingdom.

IRC Section 901 grants U.S. citizens and corporations an income tax credit for “the amount of any income, war profits and excess-profits taxes paid or accrued during the taxable year to any foreign country or to any possession of the United States.”  Whether a foreign tax is creditable for U.S. income tax purposes is based upon the “predominant standard for creditability” laid out in Treasury Regulation §1.901-2.  Under that approach, a foreign tax is an income tax “if and only if the tax, judged on the basis of its predominant character,” satisfies three tests.  The foreign tax must be imposed on realized income (i.e., income that has already been earned), the basis of gross receipts (i.e., revenue) and net income (i.e., gross receipts less significant costs and expenditures).  See Treas. Reg. §1.901-2(a)(3).

The Supreme Court’s decision resolved a split between the U.S. Courts of Appeals for the Third and Fifth Circuits on how to apply the predominant standard for the creditability test set forth in the regulations.  The Third and Fifth Circuits took opposite views of two U.S. Tax Court decisions, PPL Corp.  v. Commissioner, 135 T.C. 304 (2010), and Entergy Corp.  v. Commissioner, T.C. Memo. 2010-197, which both held in favor of the taxpayers that the practical effect of the UK windfall tax, the circumstances of its adoption and the intent of the members of Parliament who enacted it evidenced that the substance of the tax was to tax excess profits, and therefore was creditable.

In PPL Corp. v. Commissioner, 665 F.3d 60 (3d Cir. 2011), the Third Circuit reversed the Tax Court, refusing to consider the practical effect of the UK windfall tax and the intent of its drafters.  Instead, the court focused solely on the text of the UK statute, which in its estimation was a tax on excess value and not on profits.  In contrast, in Entergy Corp. v. Commissioner, 683 F.2d 233 (5th Cir. 2012), the Fifth Circuit affirmed the Tax Court, finding that the tax’s practical effect on the taxpayer demonstrated that the purpose of the tax was to tax excess profits.  The court explained that Parliament’s decision to label an “entirely profit-driven figure a ‘profit-making value’ must not obscure the history and actual effect of the tax.”

In its decision, the Supreme Court agreed with both the Fifth Circuit and the Tax Court.  In applying the rules of the Treasury Regulations, the Supreme Court reinforced the three basic principles to determine whether a tax is creditable.  First, a tax that functions as an income tax in most instances will be creditable even if a “handful of taxpayers” may be affected differently.  This means that the controlling factor is the tax’s predominant character.  Second, the economic effect of the tax, and not the characterization or structure of the tax by the foreign government, is controlling on whether the tax is an income tax.  This extends the principle of “substance over form” to the characterization of a foreign tax.  Third, a tax will be an income tax if it reaches net gain or profits.  Applying these principles to the PPL case, the Supreme Court found that the predominant character of the windfall tax was that of an excess profit tax and was therefore creditable.

The PPL decision will likely have far-reaching effects on courts that wrestle with whether certain taxes paid overseas are creditable for U.S. income tax purposes.

Article By:

of