Lawyers representing creditors often compete with federal government claims against the same insolvent borrower/debtor. There are several common federal statutes that impact these disputes including: 11 U.S.C. Section 507[1]; 26 U.S.C. Section 6321[2], et seq.; and 31 U.S.C.
Singapore’s firm trajectory towards becoming an international hub for debt restructuring received a boost with the Companies (Amendment) Act 2017 coming into force on 23 May 2017.
The Judicial Insolvency Network (JIN) conference aims to encourage communication and cooperation amongst national courts.
From 10 to 11 October, Singapore hosted the inaugural JIN conference. JIN is a network of insolvency judges from around the world whose aim is to encourage communication and cooperation amongst national courts by pulling together best practices in cross-border restructuring and insolvency to facilitate cross-court communication and cooperation.
On January 1, 2016, the Uniform Voidable Transactions Act (UVTA) was enacted in Kentucky and can be found at KRS 378A.005 e seq. The UVTA replaces KRS 378, which contained KRS 378.010, the Kentucky fraudulent conveyance statute, and KRS 378.060, the Kentucky preference statute. Nationally, the UVTA will replace the Uniform Fraudulent Transfer Act (“UFTA”). According to the Conference of Commissioners on Uniform State Laws, California, Georgia, Idaho, Minnesota, New Mexico, North Carolina, and North Dakota have joined Kentucky in enacting the UVTA.
Introduction
Ask any restructuring professional about the greatest challenge in restructuring and reorganising a business group with operations in the People’s Republic of China (PRC), and he/she is likely to say that it is virtually impossible to take over control of the PRC operating subsidiaries without the co-operation of the existing PRC legal representatives.
The liquidator of a company has an obligation to find out what led to the company’s failure, and take steps to maximise recovery for the company’s creditors. He is usually a stranger to the company’s business, and starts off at a disadvantage, having no prior knowledge of the company’s affairs, and usually incomplete and unsatisfactory records. He also has to deal with previous directors and officers of the company who are often uncooperative and may themselves be complicit in the company’s demise.
Much has been written of late about data breaches and the liabilities for the unauthorized acquisition of Personally Identifiable Information (PII) from institutions, including financial institutions. But what about when the alleged “breach”--the release of information --is voluntarily and/or legally compelled? What are the risks for creditors who take collateral, in security for the repayment of debt, containing PII data? What are the risks to businesses when they transfer assets that include PII? What liabilities do they face? What are the rights of customers?
Much has been written of late about data breaches and the liabilities for the unauthorized acquisition of Personally Identifiable Information (PII) from institutions. But what about when the alleged “breach”--the release of information --is voluntarily and/or legally compelled? What are the risks to businesses when they sell assets that include PII? What liabilities do they face? What are the rights of customers?
Radio Shack – The pioneer of PII data collection
On Monday, we released three new research indices tracking distress in U.S. financial markets.
The indices use Chapter 11 bankruptcy filing data to signal underlying financial distress which may not be reflected in broader stock market averages. The indices and the full quarterly report can be found at www.distressindex.com.
The “FBT/TrBK Distress Indices” comprise three different measurements based on Chapter 11 filings:
As electronic discovery has become more prevalent and voluminous, national standards for the preservation of evidence have evolved dramatically in the past decade. Through a proliferation of electronic discovery orders involving discovery compliance, courts have addressed when the duty to preserve evidence arises, signifying a party’s duty to issue a “litigation hold.” Courts have not answered, however, whether a party can withhold documents generated before issuing a litigation hold on the basis of work product protection.