Roberta D. Anderson, Partner, K&L Gates, Pittsburgh. Alan Brill, Senior Managing Director, Kroll, Secaucus, N.J.

Size: px
Start display at page:

Download "Roberta D. Anderson, Partner, K&L Gates, Pittsburgh. Alan Brill, Senior Managing Director, Kroll, Secaucus, N.J."

Transcription

1 Presenting a live 90 minute webinar with interactive Q&A Data Privacy and Cybersecurity Due Diligence in M&A Deals Identifying Vulnerabilities, Drafting Data Related Provisions in M&A Agreements, Post Acquisition Data Integration Considerations THURSDAY, OCTOBER 9, pm Eastern 12pm Central 11am Mountain 10am Pacific Td Today s faculty features: Roberta D. Anderson, Partner, K&L Gates, Pittsburgh Alan Brill, Senior Managing Director, Kroll, Secaucus, N.J. Gerard M. Stegmaier, Partner, Goodwin Procter, Washington, D.C. The audio portion of the conference may be accessed via the telephone or by using your computer's speakers. Please refer to the instructions ed to registrants for additional information. If you have any questions, please contact Customer Service at ext. 10.

2 THE NUTS AND BOLTS OF ACQUISITIONS A BACKGROUNDER AND SOME QUESTIONS FOR PRIVACY PROS Due Diligence: The process of asking questions and assessing and quantifying risk in order to allocate it intentionally Due diligence provides the buyer with an opportunity to confirm any valuation of the Target and its assets and liabilities Due diligence also provides an opportunity to more closely assess the proposed synergy between the Buyer and the Target. The acquisition agreement will ultimately allocate risk among the parties given that perfect knowledge cannot exist. Three Principal Risk Areas Liability o FTC or Regulatory Actions (health, financial, children, international) o Shareholder Suits/D&O Liability o Class Actions Reputation Integration Managing Risk Identify Risk Shift Risk Mitigate Risk Accept Risk Common Acquisition Structures Asset Acquisitions Stock Acquisitions Mergers Asset Acquisitions Common Features Buyer purchases some or all assets of the Target Neither ownership nor existence of Target is affected (Target shareholders continue to own their stock) Stock Acquisitions Common Features Buyer purchases stock of the Target from the Target s shareholders All of the assets and liabilities of the Target remain with the Target (which is owned by Buyer post-closing) Because liabilities are acquired as well, due diligence investigations and contractual protections should be more comprehensive BUT fewer third party consents will be likely. Merger One company is merged with and into another which is the Survivor All assets and liabilities of the merged company succeed to, and are held by, the Survivor Three common types: o Direct mergers o Forward triangular mergers o Reverse triangular merger Triangular mergers and help manage risks associated with acquired liabilities Direct Merger Features Target merges directly with and into the Buyer and one party is designated the Survivor Stock held by the non-survivor s shareholders is converted into merger consideration All of the assets and liabilities of the non-survivor become assets and liabilities of the Survivor Forward Triangular Merger Involves merger of the Target with and into a subsidiary of the Buyer, with such subsidiary being the Survivor. Stock held by Target s shareholders is converted into merger consideration. Survivor remains a subsidiary of the Buyer. Subsidiary will hold all of its own assets and liabilities AND those of the Target. Reverse Triangular Merger 1

3 THE NUTS AND BOLTS OF ACQUISITIONS Merger of a subsidiary of the Buyer with and into the Target. The Target is the Survivor. Stock held by the Target s shareholders is converted into merger consideration. The Stock of the Buyer s subsidiary is converted into stock of the Target. Target becomes a subsidiary of Buyer and will hold all of the assets and liabilities of the Buyer s subsidiary. Third-Party Consents Some transactions, such as asset acquisitions, may require third-party consents. Failure to obtain consents, or breach of obligations, could impair asset values. Fiduciary Duties of Directors Directors owe fiduciary duties to the corporation and shareholders and sometimes creditors. When reviewing acquisition transactions, courts often review a decision to proceed applying the business judgment rule which is a presumption that the directors acted on an informed basis, in good faith, and in the honest belief that the action taken was in the best interests of the company. The business judgment rule will generally protect directors so long as they acted with due care and loyalty and in good faith. Fiduciary Duties: High Level Implications Among other things, collectively, fiduciary duties require the board to: Treat shareholders fairly Protect the shareholders investment Manage the corporation prudently for the benefit of all shareholders Cause the Seller to make the best possible representations and warranties Obligate the Seller to indemnify the acquirer for third party claims (work with deal team) Preserve meaningful remedies Common Negotiation Issues and Considerations Definition of knowledge and implications Materiality Definition of law Definition of personal information Remedies when we learn something what does it mean for the transaction? Contractual Risk Allocation 2

4 THE NUTS AND BOLTS OF ACQUISITIONS Eight Questions for Privacy & Data Security Pros in Transactions: Thinking Beyond Day-to-Day Responsibilities What is the relationship between the diligence information sought and the transaction (both now and in the future)? Do I know what the deal is about and what my clients care about (or should care about)? Am I being a problem solver rather than a problem spotter or administrator? Is privacy material in this deal? How? If not quantitatively material might it be qualitatively (e.g. knowing violations of law)? Do I know why this matters? What effect do qualifiers such as knowledge or MAE have on diligence? On, the seller s representations and therefore risk allocations? Should identified issues or risks be included on disclosure schedules? What tools are available to manage privacy risks to help the parties complete a transaction? Escrows? What information may be most helpful to facilitate integration after the transaction closes and who will inherit whatever is learned? Common Due Diligence Topics for Privacy & Data Security Pros in Transactions Health Information Financial Information / PCI-DSS Information on Children Employee Information Customer Information & Commercial Communications Company Privacy Statements Information Security & Data Breaches Foreign Information / European Union & Safe Harbor Contracts, Audits, & Obligations Gerard M. Stegmaier is a partner in the Washington, D.C. office of Goodwin Procter LLP where he leads the firm s D.C. privacy and data protection group. He practices technology law with special emphasis in the areas of e-commerce, privacy, intellectual property and the First Amendment. His practice encompasses transactional, regulatory and litigation matters for emerging enterprises as well as Fortune 100 companies. He regularly acts as outside global coordinating counsel for many leading enterprises for privacy and information governance. Mr. Stegmaier also serves as an adjunct professor at George Mason University School of Law where he created and has taught one of the first courses on information privacy law for over ten years. He has represented many of the Internet's pioneers on important questions of first impression. He serves on the Advisory Board of Internet Law & Regulation, a Pike & Fischer and has been regularly recognized as a leading international practitioner in Who s Who Legal: Technology Media & Communications. Mr. Stegmaier is a magna cum laude graduate of George Mason University School of Law, where he was as an editor of the law review Goodwin Procter LLP. All rights reserved. This informational piece, which may be considered advertising under the ethical rules of certain jurisdictions, is provided with the understanding that it does not constitute the rendering of legal advice or other professional advice by Goodwin Procter LLP, Goodwin Procter (UK) LLP or their attorneys. Prior results do not guarantee similar outcome. Goodwin Procter LLP is a limited liability partnership which operates in the United States and has a principal law office located at 53 State Street, Boston, MA Goodwin Procter (UK) LLP is a separate limited liability partnership registered in England and Wales with registered number OC Its registered office is at Tower 42, 25 Old Broad Street, London EC2N 1HQ. A list of the names of the members of Goodwin Procter (UK) LLP is available for inspection at the registered office. Goodwin Procter (UK) LLP is authorized and regulated by the Solicitors Regulation Authority. 3

5 THE NUTS AND BOLTS OF ACQUISITIONS IRS Circular 230 Disclosure: To ensure compliance with requirements imposed by the IRS, we inform you that any U.S. tax advice contained in this informational piece (including any attachments) is not intended or written to be used, and may not be used, for the purpose of (i) avoiding penalties under the Internal Revenue Code or (ii) promoting, marketing or recommending to another party any transaction or matter addressed herein. 4

6 Cyber Due Diligence: Pre-Transaction Assessment Can Uncover Costly Risks CYBER SECURITY USA

7 The company looks great on paper it has an innovative product, a great sales team and a lean approach to expenses. Whether the business model is centered around customer data, intellectual property or proprietary information, a key question often overlooked by investors is: Has management really recognized the issues and risks posed by insecure data protection? Even good companies can be unprepared How can you ensure that an investment target isn t one keystroke away from a major cyber incident or data breach? How can you be sure that an attacker isn t already lurking in their network? If a threat is identified, does the organization know how to respond to mitigate damage so brand, reputation and investment value are retained? CYBER DUE DILIGENCE conducted prior to investment can identify actual or potential cyber security lapses, areas that may be at risk, quantify remediation costs and help restructure an investment should substandard cyber security systems data or latent breaches be discovered. Likewise, a target can strengthen its attractiveness to investors by conducting its own cyber due diligence, enabling it to mitigate risk through identifying and minimizing any found cyber weakness. Kroll s experts know that cyber security risks are here to stay and have been helping investors identify, evaluate and quantify them. For more than 40 years, Kroll has advised private equity firms, hedge funds, investment banks and venture capital investors on reputational due diligence matters. Our cyber experts provide the same high level of care and attention in conducting your cyber due diligence, enabling us to: Uncover the cyber vulnerabilities you may be buying unwittingly Know if you are buying a company with an undisclosed data breach Reveal breach-breeding weaknesses in the target company s culture Kroll s Cyber Due Diligence Assessment Kroll s Cyber Due Diligence provides clients with a level of assurance regarding the state of their enterprise systems. Using its customizable modules, described below, to assess a firm s Cyber strengths and weakness, Kroll s thorough gap analysis provides actionable information for management to sharpen their practices and procedures ENDPOINT THREAT MONITORING AND ANALYSIS SECURITY CONTROLS REVIEW WITH IT SECURITY INCIDENT RESPONSE TABLE-TOP EXERCISE What We Do Module 1: Endpoint Threat Monitoring and Analysis Kroll can quickly install a sophisticated toolset that will rapidly detect and respond to threats in the subject environment. This enables us to watch every piece of software on every machine in real time. We can help you know what is happening in the network right now. Kroll s cyber security experts will work with your team to identify appropriate steps to contain and respond to any incident we detect and to implement countermeasures that help thwart future attacks. Module 2: Security Controls Risk Assessment Kroll s Security Controls Review evaluates existing policies and procedures to determine if the right standards and framework are in place to respond How mature is the target organization s cyber risk management program? Are they monitoring for threats? Would they be able to detect an incident? How quickly can they respond and recover from an incident?

8 to a Cyber Security incident. Our comprehensive assessment can determine if the right controls are in place to protect your confidential assets, and how well you can detect, respond to, and mitigate threats. A review can be standards-based (ISO, NIST, PCI-DSS, HIPAA/HITECH, GLBA, etc.), or against Cyber Security Best Practices. Module 3: Incident Response Tabletop Exercise A tabletop exercise can help identify any gaps or deficiencies prior to experiencing an incident, and ensures that responders know what to do in the event of an incident. Incident Response planning is critical to effectively detect and manage security incidents or data breaches. An Incident Response plan is a good first step, but it is not enough. The organization needs to effectively execute that plan so that reputational issues and associated costs, including notification and legal expenses, don t quickly spiral out of control. Security Controls Risk Assessment Report We ll provide a report documenting the strengths and weaknesses of Cyber Security policies and procedures, and provide our expert recommendation. The management team can use this report to add or modify policies and procedures. Incident Response Table-top Exercise Report Following the tabletop exercise, we ll create a report identifying what was done well and what wasn t and provide actionable items for improvement. The management team can use this report to improve procedures and clarify roles and responsibilities. With these Kroll reports in hand, management and investors can move forward with a thorough understanding of their cyber security environment. What You Get End Point Threat Monitoring Analysis Report We ll provide a report that details any suspicious activity or areas of concern, and our recommendations for remediation. The IT department can use this report to address vulnerabilities and improve monitoring. Our Endpoint Threat Monitoring tool can be left behind and training provided so that detailed monitoring can continue.

9 About Kroll Kroll is the leading global provider of risk solutions. For over 40 years, Kroll has helped clients make confident risk management decisions about people, assets, operations, and security through a wide range of investigations, due diligence and compliance, cyber security, physical and operational security, and data and information management services. Headquartered in New York with more than 55 offices across 26 countries, Kroll has a multidisciplinary team of nearly 2,300 employees and serves a global clientele of law firms, financial institutions, corporations, non-profit institutions, government agencies, and individuals. These materials have been prepared for general information purposes only and do not constitute legal or other professional advice. Always consult with your own professional and legal advisors concerning your individual situation and any specific questions you may have. CONTACT For more information, call or visit us online: kroll.com SLS 0023 ITDB US_CYBER DUE DILIGENCE_SEPT Kroll. All Rights Reserved. Certain Kroll companies provide investigative services. See for state licensing information.

Perspectives on Cybersecurity and Its Legal Implications

Perspectives on Cybersecurity and Its Legal Implications Survey Results 2015 Perspectives on Cybersecurity and Its Legal Implications a 2015 survey of corporate executives The National Institute of Standards and Technology (NIST), a non-regulatory agency of

More information

BUYING AND SELLING A BUSINESS

BUYING AND SELLING A BUSINESS BUYING AND SELLING A BUSINESS Joanne M. Murray, Esquire Antheil Maslow & MacMinn, LLP 131 West State Street Doylestown, PA 18901 215-230-7500 Telephone 215-230-7796 Facsimile BUCKS COUNTY BAR ASSOCIATION

More information

Mitigating and managing cyber risk: ten issues to consider

Mitigating and managing cyber risk: ten issues to consider Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed

More information

Insurance Due Diligence in M&A Deals: Evaluating Coverage and Gaps, Mitigating Risks and Potential Liabilities

Insurance Due Diligence in M&A Deals: Evaluating Coverage and Gaps, Mitigating Risks and Potential Liabilities Presenting a live 90-minute webinar with interactive Q&A Insurance Due Diligence in M&A Deals: Evaluating Coverage and Gaps, Mitigating Risks and Potential Liabilities THURSDAY, OCTOBER 29, 2015 1pm Eastern

More information

TEMPLATE. Equity Investment Agreement

TEMPLATE. Equity Investment Agreement TEMPLATE Equity Investment Agreement THIS EQUITY INVESTMENT AGREEMENT (the "Agreement") is dated as of DATE (the "Effective Date") by and between, a Delaware business corporation, having an address at

More information

Issues in insurance company mergers & acquisitions

Issues in insurance company mergers & acquisitions Issues in insurance company mergers & acquisitions By Perry J. Shwachman, Anthony J. Ribaudo and R. Bradley Drake, Sidley Austin LLP The completion of a successful merger or acquisition involving insurance

More information

ERISA Retirement Plans: Fiduciary Compliance and Risk Management for Investment Fund Selection and Fee Disclosures

ERISA Retirement Plans: Fiduciary Compliance and Risk Management for Investment Fund Selection and Fee Disclosures Presenting a live 90-minute webinar with interactive Q&A ERISA Retirement Plans: Fiduciary Compliance and Risk Management for Investment Fund Selection and Fee Disclosures Discharging Fiduciary Duties

More information

Major Legal Trends for 2015. Just Like 2014 Except More So. Charles Engros

Major Legal Trends for 2015. Just Like 2014 Except More So. Charles Engros Major Legal Trends for 2015 Just Like 2014 Except More So Charles Engros January 15, 2015 1 Major Legal Trends for 2015 SHAREHOLDER ACTIVISM SELLER S MARKET IN M&A DATA PROTECTION & PRIVACY Morgan, Lewis

More information

Gus P. Coldebella (@g_co) Partner, Goodwin Procter LLP Former General Counsel, Dept. of Homeland Security. What are we going to talk about today?

Gus P. Coldebella (@g_co) Partner, Goodwin Procter LLP Former General Counsel, Dept. of Homeland Security. What are we going to talk about today? Cyber Security Meets Corporate Securities: The SEC's Authority to Regulate Companies' Cyber Defenses and Corporate Directors' Fiduciary Responsibilities Gus P. Coldebella (@g_co) Partner, Goodwin Procter

More information

what your business needs to do about the new HIPAA rules

what your business needs to do about the new HIPAA rules what your business needs to do about the new HIPAA rules Whether you are an employer that provides health insurance for your employees, a business in the growing health care industry, or a hospital or

More information

U.S. and EU Mutual Funds: Key Legal and Regulatory Concepts

U.S. and EU Mutual Funds: Key Legal and Regulatory Concepts U.S. and EU Mutual Funds: Key Legal and Regulatory Concepts Strategic Issues and Challenges for the Investment Funds Industry Comissão de Valores Mobiliários Rio de Janiero, Brazil March 15, 2012 Marcia

More information

Cross-border Receivable Financing

Cross-border Receivable Financing Cross-border Receivable Financing Talk by Geoffrey Wynne, Partner, and Tom Glinka, Associate Sullivan & Worcester UK LLP Breakfast seminar on 24 October 2014 at Pinners Hall, 105-108 Old Broad Street,

More information

Posted by David A. Katz, Wachtell, Lipton, Rosen & Katz, on Sunday December 16, 2012 at 10:20 am

Posted by David A. Katz, Wachtell, Lipton, Rosen & Katz, on Sunday December 16, 2012 at 10:20 am 1 of 7 5/8/2014 7:34 PM Posted by David A. Katz, Wachtell, Lipton, Rosen & Katz, on Sunday December 16, 2012 at 10:20 am Editor s Note: David A. Katz is a partner at Wachtell, Lipton, Rosen & Katz specializing

More information

HCCA Compliance Institute 2013 Privacy & Security

HCCA Compliance Institute 2013 Privacy & Security HCCA Compliance Institute 2013 Privacy & Security 704 Conducting a Privacy Risk Assessment A Practical Guide to the Performance, Evaluation and Response April 23, 2013 Presented By Eric Dieterich Session

More information

Conducting due diligence and managing cybersecurity in medical technology investments

Conducting due diligence and managing cybersecurity in medical technology investments Conducting due diligence and managing cybersecurity in medical technology investments 2015 McDermott Will & Emery LLP. McDermott operates its practice through separate legal entities in each of the countries

More information

Infor Sys Ve. Top 10 Warning Signs of Problem Vendors

Infor Sys Ve. Top 10 Warning Signs of Problem Vendors Infor Sys Ve Top 10 Warning Signs of Problem Vendors 16 mation tems ndors By Susan M. Kornfield Complex information systems, once predominantly the realm of the sophisticated, high-tech company, are now

More information

Seven Environmental Do s and Don ts for Private Equity Investors

Seven Environmental Do s and Don ts for Private Equity Investors August 2014 Follow @Paul_Hastings Seven Environmental Do s and Don ts for Private Equity Investors BY TOM MOUNTEER Private equity ( PE ) investment opportunities abound in many commercial sectors, including

More information

WTAS Valuation Services Group

WTAS Valuation Services Group WTAS Valuation Services Group Information & Overview March 2014 Presented to 1 Table of Contents I. WTAS Valuation Services Overview II. WTAS Overview III. Services Offering IV. Approach V. Professionals

More information

Letter of Intent for Acquisition Purchase of Stock of the Business for a Combination of Cash and Purchaser s Stock (Pro-Buyer Oriented)

Letter of Intent for Acquisition Purchase of Stock of the Business for a Combination of Cash and Purchaser s Stock (Pro-Buyer Oriented) Form: Letter of Intent for Acquisition Purchase of Stock of the Business for a Combination of Cash and Purchaser s Stock (Pro-Buyer Oriented) Description: This is a sample Letter of Intent for the acquisition

More information

Post-Petition Bankruptcy Financing

Post-Petition Bankruptcy Financing Presenting a live 90-minute webinar with interactive Q&A Post-Petition Bankruptcy Financing Evaluating and Documenting DIP Financing and Obtaining Cash Collateral and Financing Orders THURSDAY, FEBRUARY

More information

Cyber Risks in the Boardroom

Cyber Risks in the Boardroom Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing

More information

Private Trust Companies A Primer

Private Trust Companies A Primer Private Trust Companies A Primer FAMILY OFFICES HAVE BEEN AROUND FOR YEARS, AND A FEW FAMILY OFFICES HAVE HELD TRUST POWERS OVER THE YEARS, CREATING A FAMILY PRIVATE TRUST COMPANY HAS BEEN RELATIVELY UNUSUAL

More information

Cybersecurity: Protecting Your Business. March 11, 2015

Cybersecurity: Protecting Your Business. March 11, 2015 Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks

More information

From: Hong Kong Wah Sun Company [mailto:wahsuntradinghongkong@outlook.com] Sent: Friday, October 23, 2015 3:39 PM Subject: Conflict Check

From: Hong Kong Wah Sun Company [mailto:wahsuntradinghongkong@outlook.com] Sent: Friday, October 23, 2015 3:39 PM Subject: Conflict Check From: Hong Kong Wah Sun Company [mailto:wahsuntradinghongkong@outlook.com] Sent: Friday, October 23, 2015 3:39 PM Subject: Conflict Check Legal Matter in process to review of proposed transaction contract

More information

FINRA Publishes its 2015 Report on Cybersecurity Practices

FINRA Publishes its 2015 Report on Cybersecurity Practices Securities Litigation & Enforcement Client Service Group and Data Privacy & Security Team To: Our Clients and Friends February 12, 2015 FINRA Publishes its 2015 Report on Cybersecurity Practices On February

More information

Reverse Due Diligence A New Trend In Financial M&A

Reverse Due Diligence A New Trend In Financial M&A Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Reverse Due Diligence A New Trend In Financial M&A

More information

PROFESSIONALISM in PRACTICE

PROFESSIONALISM in PRACTICE PROFESSIONALISM in PRACTICE Southwest Actuarial Forum San Antonio, Texas 10 December 2010 Disclaimer: The opinions expressed are solely those of the presenter and are not approved positions of the American

More information

Buying and Selling a Business: Getting the Deal Done October 7, 2009

Buying and Selling a Business: Getting the Deal Done October 7, 2009 Buying and Selling a Business: Getting the Deal Done October 7, 2009 4840-7004-9028 Deal Sequencing Solicitation and confirmation of interest Confidentiality agreement Negotiation of key business terms

More information

Intellectual Property in M&A

Intellectual Property in M&A Intellectual Property in M&A October 23, 2015 Dallas Bar Association IP Section Steve Stein, Jesse Betts, Craig Carpenter Thompson & Knight LLP Today s Topics Steps in M&A Transactions Drivers in M&A Transactions

More information

Due Diligence Process

Due Diligence Process Due Diligence Process Steps involved in legal due diligence Issues Introduction to Due Diligence Description Due diligence is a process of thorough and objective examination that is undertaken before corporate

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

Private Equity Update

Private Equity Update December 21, 2005 Private Equity Update An informational newsletter from Goodwin Procter s Private Equity Group Must Know D&O: Answers to 10 Common Questions About Portfolio Company D&O Insurance Directors

More information

Investment Advisory Agreement

Investment Advisory Agreement This Investment Advisory Agreement ( Agreement ) is entered into by and between ( Client ), SPC Financial (SPC) a U.S. Securities & Exchange Commission ( SEC ) Independent Registered Investment Adviser,

More information

Key Issues in M&A Transactions Ethical and Practical Considerations

Key Issues in M&A Transactions Ethical and Practical Considerations Key Issues in M&A Transactions Ethical and Practical Considerations Presented to: The Association of Corporate Counsel Arizona Chapter February 3, 2011 2011 Jennings, Strouss & Salmon, PLC. All rights

More information

Insights Spring 2009. ESOP Transaction Insights. Michael McGinley

Insights Spring 2009. ESOP Transaction Insights. Michael McGinley 56 ESOP Transaction Insights Selling an ESOP-Owned Employer Corporation Michael McGinley When a sponsor company establishes an employee stock ownership plan (ESOP), the initial plan is usually (1) that

More information

Acquiring a Company with Government Contracts: A Checklist of Unique Issues

Acquiring a Company with Government Contracts: A Checklist of Unique Issues Acquiring a Company with Government Contracts: A Checklist of Unique Issues A Presentation and Webinar by Matt Koehl Thursday, June, 20, 2013 9:00 10:00 a.m. MST Introduction Introduction Investor Interest

More information

America s New Cybersecurity Framework: Help or New Source of Exposure?

America s New Cybersecurity Framework: Help or New Source of Exposure? America s New Cybersecurity Framework: Help or New Source of Exposure? BY BEHNAM DAYANIM, RYAN NIER & ELIZABETH DORSI March 2014 Data theft is on the rise, and the federal government is concerned. In 2013

More information

How To Choose The Right Form Of Joint Venture

How To Choose The Right Form Of Joint Venture Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com How To Choose The Right Form Of Joint Venture Law360,

More information

Auditing your institution's cybersecurity incident/breach response plan. Baker Tilly Virchow Krause, LLP

Auditing your institution's cybersecurity incident/breach response plan. Baker Tilly Virchow Krause, LLP Auditing your institution's cybersecurity incident/breach response plan Objectives > Provide an overview of incident/breach response plans and their intended benefits > Describe regulatory/legal requirements

More information

M&A in 2015: Successor Liability Under the FCPA. Norton Rose Fulbright US LLP Thursday, February 26, 2015

M&A in 2015: Successor Liability Under the FCPA. Norton Rose Fulbright US LLP Thursday, February 26, 2015 M&A in 2015: Successor Liability Under the FCPA Norton Rose Fulbright US LLP Thursday, February 26, 2015 Speaker Marsha Z. Gerber Partner Norton Rose Fulbright US LLP Marsha Gerber is a partner in the

More information

FREQUENTLY ASKED QUESTIONS ABOUT BLOCK TRADE REPORTING REQUIREMENTS

FREQUENTLY ASKED QUESTIONS ABOUT BLOCK TRADE REPORTING REQUIREMENTS FREQUENTLY ASKED QUESTIONS ABOUT BLOCK TRADE REPORTING REQUIREMENTS Block Trades and Distributions What is a block trade? Many people use the term block trade colloquially. Technically, a block trade is

More information

Law Society of Upper Canada The Six-Minute Business Lawyer 2015

Law Society of Upper Canada The Six-Minute Business Lawyer 2015 Law Society of Upper Canada The Six-Minute Business Lawyer 2015 Materials for a Presentation by Sandra Sbrocchi, McMillan LLP June 10, 2015 Written by Sandra Sbrocchi and Timothy Cullen, Student-at-law

More information

The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations

The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations Jeffrey D. Scott Jeffrey D. Scott, Legal Professional Corporation Practice Advisors

More information

Bridging the Purchase Price Gap in Business Acquisitions

Bridging the Purchase Price Gap in Business Acquisitions Bridging the Purchase Price Gap in Business Acquisitions Curt P. Creely and Michael D. James, Foley & Lardner LLP Many transactional attorneys and other dealmakers have experienced the frustration of being

More information

Cyber Risks Connect With Directors and Officers

Cyber Risks Connect With Directors and Officers Cyber Risks Connect With Directors and Officers Implications of the New SEC Guidance on Cyber Security February 2012 Lockton Companies, LLC The Securities and Exchange Commission (SEC) has changed the

More information

2012 Winston & Strawn LLP

2012 Winston & Strawn LLP 2012 Winston & Strawn LLP Top 5 Negotiation Points for Software, SaaS, and Outsourcing Agreements Brought to you by Winston & Strawn s Advertising, Marketing, and Entertainment Law Group 2012 Winston &

More information

MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS

MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS RRD Donnelley SEC Hot Topics Institute May 21, 2014 1 MANAGING CYBERSECURITY RISK AND DISCLOSURE OBLIGATIONS Patrick J. Schultheis Partner Wilson

More information

Negotiating the Tax Provisions of Acquisition (Disposition) Agreements

Negotiating the Tax Provisions of Acquisition (Disposition) Agreements Negotiating the Tax Provisions of Acquisition (Disposition) Agreements Daniel Leightman Gardere Wynne Sewell HBA M&A Section Meeting November 21, 2013 Houston, Texas Role Of Various Professionals In The

More information

Table of Contents... 1. Chapter 1 Introduction... 5. 1.1 Goals & Objectives... 5 1.2 Required Review... 5 1.3 Applicability...

Table of Contents... 1. Chapter 1 Introduction... 5. 1.1 Goals & Objectives... 5 1.2 Required Review... 5 1.3 Applicability... ... 1 Chapter 1 Introduction... 5 1.1 Goals & Objectives... 5 1.2 Required Review... 5 1.3 Applicability... 5 Chapter 2 Company Culture... 6 Chapter 3 Risk Management Governance... 7 3.1 Board of Directors...

More information

Information security due diligence

Information security due diligence web applications and websites W A T S O N H A L L Watson Hall Ltd London 020 7183 3710 Edinburgh 0131 510 2001 info@watsonhall.com www.watsonhall.com Identifying information security risk for web applications

More information

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo 2014 Morrison & Foerster LLP All Rights Reserved mofo.com NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin,

More information

SEC Adopts Rules on Compliance Programs for Funds & Advisers

SEC Adopts Rules on Compliance Programs for Funds & Advisers Investment Management Group Legal Update: SEC Adopts Rules on Compliance Programs for Funds & Advisers If you have questions or would like additional information on the material presented herein, please

More information

HIPAA/HITECH Privacy and Security for Long Term Care. Association of Jewish Aging Services 1

HIPAA/HITECH Privacy and Security for Long Term Care. Association of Jewish Aging Services 1 HIPAA/HITECH Privacy and Security for Long Term Care 1 John DiMaggio Chief Executive Officer, Blue Orange Compliance Cliff Mull Partner, Benesch, Healthcare Practice Group About the Presenters John DiMaggio,

More information

Reverse Mergers Barry I. Grossman Ellenoff Grossman & Schole LLP

Reverse Mergers Barry I. Grossman Ellenoff Grossman & Schole LLP Reverse Mergers Barry I. Grossman Ellenoff Grossman & Schole LLP About EG&S Ellenoff Grossman & Schole LLP is a New York City-based law firm comprised of more than 65 professionals (30+ Securities Lawyers),

More information

Growth by acquisition.

Growth by acquisition. Forward thinking Growth by acquisition. A practical guide for owner-managed businesses Acquisitions can be an excellent means of enhancing shareholder value in a privately owned business. However, selecting

More information

M E M O R A N D U M. The Policy provides for blackout periods during which you are prohibited from buying or selling Company securities.

M E M O R A N D U M. The Policy provides for blackout periods during which you are prohibited from buying or selling Company securities. M E M O R A N D U M TO: FROM: All Directors, Officers and Covered Persons of Power Solutions International, Inc. and its Subsidiaries Catherine Andrews General Counsel and Insider Trading Compliance Officer

More information

Risk Management of Outsourced Technology Services. November 28, 2000

Risk Management of Outsourced Technology Services. November 28, 2000 Risk Management of Outsourced Technology Services November 28, 2000 Purpose and Background This statement focuses on the risk management process of identifying, measuring, monitoring, and controlling the

More information

Investigative and Security Consulting Services for Hedge Funds, Venture Capital Funds, Private Equity Firms and other Financial Institutions

Investigative and Security Consulting Services for Hedge Funds, Venture Capital Funds, Private Equity Firms and other Financial Institutions Investigative and Security Consulting Services for Hedge Funds, Venture Capital Funds, Private Equity Firms and other Financial Institutions 575 MADISON AVENUE, SUITE 1006, NEW YORK, NY 10022 T. 212 605

More information

Costa Rica Negotiated M&A Guide

Costa Rica Negotiated M&A Guide Costa Rica Negotiated M&A Guide Corporate and M&A Law Committee Contact Juan Manuel Godoy Consortium Laclé & Gutiérrez San José, Costa Rica jmgodoy@consortiumlegal.com Coordinator Rafael Alvarado-Riedel

More information

Faculty of Business, Law and the Built Environment Managing Investments Mr. Mike Coulburn

Faculty of Business, Law and the Built Environment Managing Investments Mr. Mike Coulburn Faculty of Business, Law and the Built Environment Managing Investments Mr. Mike Coulburn Assignment: Explain the differences between a financial audit and financial due diligence in the merger and acquisition

More information

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.

More information

The Role of Risk Management in Health Care Provider Mergers and Acquisitions

The Role of Risk Management in Health Care Provider Mergers and Acquisitions The Role of Risk Management in Health Care Provider Mergers and Acquisitions Beecher Carlson - Risk Roundtable Dennis S. Diaz, Esq. Davis Wright Tremaine LLP November 9, 2012 MERGERS AND ACQUISITIONS OVERVIEW

More information

ENGLISH FOR LAW STUDENTS

ENGLISH FOR LAW STUDENTS ENGLISH FOR LAW STUDENTS Legal Due Diligence 8 February2012 By Helen Michelle Jørgensen LEGAL DUE DILIGENCE Pre the event Post the event LEGAL DUE DILIGENCE Pre the event: buying an asset buying a business

More information

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Investment in cyber insurance Lockton Companies

More information

On Your Team. Toward Your Goal. UNIFI Companies Retirement Plans

On Your Team. Toward Your Goal. UNIFI Companies Retirement Plans FIDUCIARY investment safeguard SM On Your Team. Toward Your Goal. UNIFI Companies Retirement Plans RP 1351 8/08 FIDUCIARY INVESTMENT SAFEGUARd SM Let us help. Fiduciary Investment Safeguard is our warranty

More information

Professional Ethics in Liquidation and Insolvency

Professional Ethics in Liquidation and Insolvency COE Section 500 Issued February 2012Revised July 2015 Effective on 1 April 2012 Code of Ethics for Professional Accountants Part E Section 500 Professional Ethics in Liquidation and Insolvency SECTION

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement (the Agreement ), is made effective as of the sign up date on the login information page of the CarePICS.com website, by and between CarePICS,

More information

Cyber Security: Not if, but when...

Cyber Security: Not if, but when... Cyber Security: Not if, but when... Gerry Stegmaier Partner, Privacy and Data Security, Goodwin Procter Paul Luehr Managing Director & Chief Privacy Officer, Stroz Friedberg June 2015 Costs of Data Breaches

More information

FDIC Updates Guidance on Payment Processor Relationships

FDIC Updates Guidance on Payment Processor Relationships February 2012 FDIC Updates Guidance on Payment Processor Relationships BY KEVIN L. PETRASIC In its recently issued Financial Institution Letter, FIL-3-2012, the Federal Deposit Insurance Corporation (

More information

Data Breach Notification Burden Grows With First State Insurance Commissioner Mandate

Data Breach Notification Burden Grows With First State Insurance Commissioner Mandate Privacy, Data Security & Information Use September 16, 2010 Data Breach Notification Burden Grows With First State Insurance Commissioner Mandate by John L. Nicholson and Meighan E. O'Reardon Effective

More information

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES

PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES PRINCIPLES ON OUTSOURCING OF FINANCIAL SERVICES FOR MARKET INTERMEDIARIES TECHNICAL COMMITTEE OF THE INTERNATIONAL ORGANIZATION OF SECURITIES COMMISSIONS FEBRUARY 2005 Preamble The IOSCO Technical Committee

More information

RETIREMENT INSIGHTS. Understanding your fiduciary role. A plan sponsor fiduciary guide

RETIREMENT INSIGHTS. Understanding your fiduciary role. A plan sponsor fiduciary guide RETIREMENT INSIGHTS Understanding your fiduciary role A plan sponsor fiduciary guide ABOUT Perhaps no one topic in the employee benefits arena has drawn more attention and scrutiny over the last several

More information

Data Breaches and Trade Secrets: What to Do When Your Client Gets Hacked

Data Breaches and Trade Secrets: What to Do When Your Client Gets Hacked Data Breaches and Trade Secrets: What to Do When Your Client Gets Hacked R. Mark Halligan, FisherBroyles, LLP Andreas Kaltsounis, Stroz Friedberg Amy L. Carlson, Stoel Rives LLP Moderated by David A. Bateman,

More information

TaxSaverNetwork. Terms of Service

TaxSaverNetwork. Terms of Service TaxSaverNetwork Terms of Service 1031 Exchange Advantage (1031 EA, LLC) provides 1031 accommodation services for investors to conclude a 1031 exchange under IRC code regulations. 1031 EA, LLC structures,

More information

The Use of Insurance to Mitigate Tax Exposure

The Use of Insurance to Mitigate Tax Exposure The Use of Insurance to Mitigate Tax Exposure William Gallagher Associates Phone: 888.261.8884 www.wgains.com The reduction of Private Letter Rulings (PLRs) by the IRS in August 2003 has, among other things,

More information

Exercising Your Enterprise Cyber Response Crisis Management Capabilities

Exercising Your Enterprise Cyber Response Crisis Management Capabilities Exercising Your Enterprise Cyber Response Crisis Management Capabilities Ray Abide, PricewaterhouseCoopers, LLP 2015 PricewaterhouseCoopers LLP, a Delaware limited liability partnership. All rights reserved.

More information

Rogers Insurance Client Presentation

Rogers Insurance Client Presentation Rogers Insurance Client Presentation Network Security and Privacy Breach Insurance Presented by Matthew Davies Director Professional, Media & Cyber Liability Chubb Insurance Company of Canada mdavies@chubb.com

More information

ARCH CAPITAL ADVISORS

ARCH CAPITAL ADVISORS ARCH CAPITAL ADVISORS TERM SHEET Bridge Loan for PIPE This term sheet is among XYZ, Inc. ( Company ) and ABC Investments ( ABC ). Loan: Option: Bridge loan to the Company from ABC in the amount of $ (the

More information

How To Listen To A Conference On A Computer Or Cell Phone

How To Listen To A Conference On A Computer Or Cell Phone Presenting a live 90-minute webinar with interactive Q&A M&A Auctions: Successful Bidding Strategies Planning and Executing Winning Bids, Minimizing Costs of Losing Bids THURSDAY, JANUARY 8, 2015 1pm Eastern

More information

BUYING OR SELLING YOUR BUSINESS

BUYING OR SELLING YOUR BUSINESS BUYING OR SELLING YOUR BUSINESS On a regular basis I and work with buyers and sellers of businesses. In this article, I thought I would walk you through some considerations from an Advisor s point-of-view

More information

HOW TO HANDLE A WHISTLEBLOWER REPORT IN THE EU

HOW TO HANDLE A WHISTLEBLOWER REPORT IN THE EU HOW TO HANDLE A WHISTLEBLOWER REPORT IN THE EU 10 April 2014 Monica Salgado Advogada registered with the Portuguese Ordem dos Advogados Registered European Lawyer with the SRA Kirsti Laird Solicitor, (qualified

More information

Growth Equity: The Intersection of Venture Capital and Control Buyouts

Growth Equity: The Intersection of Venture Capital and Control Buyouts Growth Equity: The Intersection of Venture Capital and Control Buyouts by matthew stewart Growth equity (or growth capital) resides on the continuum of private equity investing at the intersection of venture

More information

2013 SRS M&A Post-Closing Claims Study An analysis of post-closing claims in private-target M&A transactions

2013 SRS M&A Post-Closing Claims Study An analysis of post-closing claims in private-target M&A transactions 2013 SRS M&A Post-Closing Claims Study An analysis of post-closing claims in private-target M&A transactions For more information, please contact SRS at pccs@shareholderrep.com 2013 2013 2012 SRS Shareholder

More information

How To Write A Debt For Equity Swap

How To Write A Debt For Equity Swap Restructuring and insolvency briefing October 2009 Debt for equity swaps: an introduction Summary and implications Companies are often looking for ways to strengthen their balance sheet and reduce their

More information

Guide to Penetration Testing

Guide to Penetration Testing What to consider when testing your network HALKYN CONSULTING 06 May 11 T Wake CEH CISSP CISM CEH CISSP CISM Introduction Security breaches are frequently in the news. Rarely does a week go by without a

More information

A Best Practice Guide

A Best Practice Guide A Best Practice Guide Contents Introduction [2] The Benefits of Implementing a Privacy Management Programme [3] Developing a Comprehensive Privacy Management Programme [3] Part A Baseline Fundamentals

More information

Cybersecurity and internal audit. August 15, 2014

Cybersecurity and internal audit. August 15, 2014 Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices

More information

IN TODAY S TROUBLED ECONOMY, DOWN

IN TODAY S TROUBLED ECONOMY, DOWN Navigating Down Round Financings: A Guide for VCs IN TODAY S TROUBLED ECONOMY, DOWN round financings have almost become the norm, as many portfolio companies ( PCs ) are forced to raise money by selling

More information

OCC 98-3 OCC BULLETIN

OCC 98-3 OCC BULLETIN To: Chief Executive Officers and Chief Information Officers of all National Banks, General Managers of Federal Branches and Agencies, Deputy Comptrollers, Department and Division Heads, and Examining Personnel

More information

CLAIMS SERVICE SOLVING THE TOUGHEST PROBLEMS

CLAIMS SERVICE SOLVING THE TOUGHEST PROBLEMS CLAIMS SERVICE SOLVING THE TOUGHEST PROBLEMS 02 CLAIMS SPECIALISTS THE EXCEPTIONAL EVERY DAY We believe that a consistent, high-quality claims service is pivotal to a successful client relationship. We

More information

Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day

Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day Lloyd s of London (Reuters) May 8, 2000 Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day Rivers Casino, Pittsburgh November 17, 2014

More information

SHARED ASSESSMENTS PROGRAM STANDARD INFORMATION GATHERING (SIG) QUESTIONNAIRE 2014 MAPPING TO OCC GUIDANCE (2013-29) ON THIRD PARTY RELATIONSHIPS

SHARED ASSESSMENTS PROGRAM STANDARD INFORMATION GATHERING (SIG) QUESTIONNAIRE 2014 MAPPING TO OCC GUIDANCE (2013-29) ON THIRD PARTY RELATIONSHIPS SHARED ASSESSMENTS PROGRAM STANDARD INFORMATION GATHERING (SIG) QUESTIONNAIRE 2014 MAPPING TO OCC GUIDANCE (2013-29) ON THIRD PARTY RELATIONSHIPS An overview of how the Shared Assessments Program SIG 2014

More information

Social Media Marketing Best Practices

Social Media Marketing Best Practices Social Media Marketing Best Practices Distributed at Igniting Opportunities: Measuring and Monetizing Social Media Presented by The Council of PR Firms and The Social Media Society Hosted by Davis & Gilbert

More information

STERIS Corporation to Contest U.S. Federal Trade Commission's Attempt to Block Synergy Health Acquisition

STERIS Corporation to Contest U.S. Federal Trade Commission's Attempt to Block Synergy Health Acquisition STERIS Corporation to Contest U.S. Federal Trade Commission's Attempt to Block Synergy Health Acquisition MENTOR, OHIO AND SWINDON, U.K. - May 29, 2015 - STERIS Corporation (NYSE: STE) ("STERIS") and Synergy

More information

Threat and Vulnerability Management (TVM) Protecting IT assets through a comprehensive program. Chicago IIA/ISACA

Threat and Vulnerability Management (TVM) Protecting IT assets through a comprehensive program. Chicago IIA/ISACA www.pwc.com Vulnerability Management (TVM) Protecting IT assets through a comprehensive program Chicago IIA/ISACA 2 nd Annual Hacking Conference Introductions Paul Hinds Managing Director Cybersecurity

More information

Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom. kpmg.bm

Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom. kpmg.bm Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom kpmg.bm Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom 1 Connecting the dots:

More information

A specialist investment manager for US clients

A specialist investment manager for US clients For US clients A specialist investment manager for US clients Sarasin Asset Management Ltd. July 2015 Why invest with Sarasin Asset Management? True client commitment and expertise for 03 US residents

More information

ALI-ABA Course of Study Corporate Mergers and Acquisitions. October 4-5, 2007 Boston, Massachusetts. Antitrust Issues in Mergers and Acquisitions

ALI-ABA Course of Study Corporate Mergers and Acquisitions. October 4-5, 2007 Boston, Massachusetts. Antitrust Issues in Mergers and Acquisitions 467 ALI-ABA Course of Study Corporate Mergers and Acquisitions October 4-5, 2007 Boston, Massachusetts Antitrust Issues in Mergers and Acquisitions By Hanno F. Kaiser Latham & Watkins LLP New York, New

More information

TERMS OF BUSINESS FROM ROYAL LONDON INCORPORATING OUR TRADING NAME SCOTTISH PROVIDENT

TERMS OF BUSINESS FROM ROYAL LONDON INCORPORATING OUR TRADING NAME SCOTTISH PROVIDENT For advisors only TERMS OF BUSINESS FROM ROYAL LONDON INCORPORATING OUR TRADING NAME SCOTTISH PROVIDENT Protection DOING BUSINESS TOGETHER 1. Our terms of business set out the conditions upon which we

More information