Jeanette Gorzala The Art of Hostile Takeover Defence



Similar documents
11. Corporate Restructuring. Corporate Control. Mergers & Acquisitions

Outline: I. Background.

Andreas Cseh. Quantum Fading. Strategies for Leveraged & Inverse ETFs. Anchor Academic Publishing. disseminate knowledge

How to start up a software business within a cloud computing environment

Permanent Establishments in International Tax Law

Open Source Customer Relationship Management Solutions Potential for an Impact of Open Source CRM Solutions on Small- and Medium Sized Enterprises

CHAPTER 29 Mergers and Acquisitions

windream Failover Cluster Installation

Strategic Management in Crisis Communication

Simulating Cloud Deployment Options for Software Migration Support

Volume URL: Chapter Title: An Overview of Takeover Defenses. Chapter URL:

Saratoga Research & Investment Management

Mergers & Acquisitions: Hostile takeovers and defense strategies against them

Radical innovation and Open innovation

Restructuring Ownership: Mergers & Acquisitions

Chapter 32 Mergers. Multiple Choice Questions

ISO/IEC 27001:2013 Thema Änderungen der Kontrollen der ISO/IEC 27001:2013 im Vergleich zur Fassung aus 2005 Datum

Synopse: EU-GMP- Leitfaden Annex 11 Computerised Systems

Services supply chain management and organisational performance

Usability Evaluation of Modeling Languages

INTRODUCTION TO MERGERS AND ACQUISITIONS

SAP GLOBAL DIVERSITY POLICY

Leitlinien- Clearingbericht "Depression

Verena A. Knipp. Trust the Brand. Corporate Reputation Management in Private Banking. Diplomica Verlag

Activist Hedge Funds. Materials from chapter 13 (ST), covering: 1) How does the strategy work? 2) Equity swap 3) Fund performance

Bank- und finanzwirtschaftliche Forschungen Band 395

Switzerland. Country Q&A Switzerland. Heinz Schärer, Claude Lambert and Hansjürg Appenzeller, Homburger. Country Q&A MARKET AND REGULATION

Global Trade Law. von Ulrich Magnus. 1. Auflage. Global Trade Law Magnus schnell und portofrei erhältlich bei beck-shop.de DIE FACHBUCHHANDLUNG

Run SAP Implementation Partner Program Guide 2009 ADOPTING THE RUN METHODOLOGY INTO YOUR SAP IMPLEMENTATIONS

III MBA[ ] Semester V Elective:Mergers and Acquisitions-552W1 Multiple Choice Questions.

Transforming and optimization of the supply chain to create value and secure growth and performance

Takeover Bids in Canada and Tender Offers in the United States A Guide for Acquirors and Targets

SAP Solution Manager Change Request Management. SAP Solution Manager Product Management SAP AG

The Software Industry

WRDS Overview on Corporate Governance Data. Rabih Moussawi

Special Committees Dealing with the Difficult Situations

Bermuda Public Companies Offshore Companies Onshore Exchanges

INVESTMENT POLICY MONITOR

LANCOM VoIP USB Handset LANCOM Advanced VoIP Client

APPLICATION SETUP DOCUMENT

AC500. Application Example. Scalable PLC for Individual Automation. Webserver Login Application Example With PM564-ETH. abb

VONTOBEL POLICY GUIDELINES FOR VOTING PROXIES

limo B. Poser The Impact of Corporate Venture Capital

Dokumentation über die Übernahme von. "GS-R-3" (The Management System for Facilities and Activities) "Sicherheitskriterien für Kernkraftwerke"

Smart Remote. with. QuickGuide

SAP Perfect Plant Manufacturing Solution. SAP Taiwan Allen Lin 林 信 宇

Merger: where two or more companies come together to form a new company -but rather uncommon actually

SAP Solution Manager for Customizing Synchronization

Proxy voting guidelines for U.S. securities. February 2015

Application example AC500 Scalable PLC for Individual Automation Communication between AC500 and KNX network abb

Project Cost Reporting for PPM

BRFplus Field Configuration for Portfolio Management

Executive summary Chapter 1 Introduction Chapter 2 The online advertising industry outlook Chapter 3 The segments of the online advertising industry

HWZ Schriftenreihe für Betriebs- und Bildungsökonomie. Herausgegeben von HWZ Hochschule für Wirtschaft Zürich. Band 9

SAP Supplier Relationship Management 7.0

Upgrading Your Skills to MCSA Windows Server 2012 MOC 20417

SAP Solution Manager Value Proposition. Walldorf, April 2007

DMX-Configurator 4PIXX

Dynamic Pricing and Automated Resource Allocation for Complex Information Services

A guide to public takeovers in Germany

GETTING FEEDBACK REALLY FAST WITH DESIGN THINKING AND AGILE SOFTWARE ENGINEERING

SAP NetWeaver Composite Application Framework (CAF)

BUSINESS VALUATION AND PRICING IN MERGER AND ACQUISITION CONTEXT

Credit Rating 107 FINANCIAL SERVICES (3 CREDITS) (5 ) MODULE I Overview of Financial Services

Erich R. Utz. Modelling and Measurement Methods of Operational Risk in Banking. Herbert Utz Verlag München

Testmanagement / [ISQI, International Software Quality Institute]. Andreas Spillner.,

The future of M&A in telecom

France Takeover Guide

STERIS Corporation to Contest U.S. Federal Trade Commission's Attempt to Block Synergy Health Acquisition

Semester at DHBW Stuttgart EXCHANGE AND STUDY ABROAD PROGRAMMES

SAP CRM 7.0 Detailed View

SAP Governance, Risk & Compliance Access Control 5.3. Post-Installation Enterprise Role Management Part I: Configuration

Private Equity Newsletter

Predictive Analytics and the Big Data Challenge

Joseph Beuys. Selection of 30 prints from three large suites Suite Schwurhand (1980) Suite Zirkulationszeit (1982) Suite Tränen (1985)

Vergleich der Versionen von Kapitel 1 des EU-GMP-Leitfaden (Oktober 2012) 01 July November Januar 2013 Kommentar Maas & Peither

DORO DORO. Non-Stick Bipolar Forceps Non-Stick Bipolarpinzetten Pinzas Bipolares Non-Stick. DORO Simply Better Built Simply More Choices.

Proceedings of the 8 th Euro-Asia Conference on Environment and CSR: Tourism, MICE, Hospitality Management and Education Session (Part II)

SAP CRM Detailed View SAP CRM Web Service Tool

Finance. Undergraduate Program of Study. Graduate Program of Study. Courses. Certificate in Risk Management and Insurance. Doctor of Philosophy

Transcription:

Jeanette Gorzala The Art of Hostile Takeover Defence IGEL Verlag

Jeanette Gorzala The Art of Hostile Takeover Defence 1.Auflage 2010 ISBN: 978 3 86815 423 8 IGEL Verlag GmbH, 2010. Alle Rechte vorbehalten. Dieses ebook wurde nach bestem Wissen und mit größtmöglicher Sorgfalt erstellt. Im Hinblick auf das Produkthaftungsgesetz weisen Autoren und Verlag darauf hin, dass inhaltliche Fehler und Änderungen nach Drucklegung dennoch nicht auszuschließen sind. Aus diesem Grund übernehmen Verlag und Autoren keine Haftung und Gewährleistung. Alle Angaben erfolgen ohne Gewähr.

IGEL Verlag

Table of contents 1. Abstract 1 1.1 Purpose and Scope 1 1.2 Overview and Structure 2 2 Conceptual Framework 4 2.1 Historical development of M&A 4 2.2 Hostile Takeovers 7 2.2.1 Definition 7 2.2.2 Economic rationale 8 2.2.3.1 Strategic and Operational Motivations 9 2.2.3.2 Management Control 10 2.2.3 Takeover Process 10 2.3 Anti-Takeover Defence 12 2.3.1 Pre-Bid Defence 14 2.3.1.1 Staggered Board 15 2.3.1.2 Super-Majority Provisions 15 2.3.1.3 Fair Price Amendment 16 2.3.1.4 Dual-Class Recapitalization 16 2.3.1.5 Restricted Voting Rights 16 2.3.1.6 Golden Parachute 16 2.3.1.7 Poison Pill 18 2.3.1.8 Poison Put 19 2.3.2 Post-Bid Defence 20 2.3.2.1 Greenmail 20 2.3.2.2 Standstill Agreement 21 2.3.2.3 Asset Restructuring 21 2.3.2.4 Liability Restructuring 22 2.3.2.5 White Knight 22 2.3.2.6 Litigation 23 2.3.2.7 Pac-Man Defence 24 2.3.2.8 Suicide Pill 24 2.4 Latest Development and Outlook 26 3 Empirical Research 30 3.1 Research Approach 30 3.2 Sample 31 3.3 Definitions and Terminology 32 I

4 Empirical Results 35 4.1 Statistical Findings 35 4.1.1 Development Over Time 35 4.1.2 Geographic Distribution 36 4.1.2.1 Breakdown by Regions 36 4.1.2.2 Cross-Border vs. Domestic Transactions 37 4.1.3 Sector Distribution 38 4.1.3.1 Breakdown by Industrial Sectors 38 4.1.3.2 Inter-Sector vs. Intra-Sector Transactions 41 4.1.4 Transaction Volume 42 4.1.5 Transaction Outcome 43 4.1.6 Defence Strategy 45 4.1.6.1 Pre-Bid Defence 46 4.1.6.2 Post-Bid Defence 47 4.1.6.3 Combined Strategy 50 5 Final Conclusion 52 5.1 Key Findings 52 5.2 Limitations and Further Research 54 6 Appendix 56 6.1 List of Figures 56 6.2 List of Tables 56 7 References 57 II

1. Abstract 1.1 Purpose and Scope The market for corporate control had been the playfield of bust-up artists and speculators seeking short-time profits during the 1980s. At that time takeover battles resembled Wild West shootouts, where greenmailers and predators weaponed with Saturday night specials and bear hugs fought against corporate managers and white knights, backed by poison pills and shark repellents. By only taking a short glimpse of the takeover games today you will no longer see legends like Carl C. Icahn or Kirk Kerkorian carve up their junk-bond financed raids for a short lived profit. The landscape of the market for corporate control has changed, as far as now strategy and synergy are the name of the game. Hostile takeovers have become an accepted part of today s M&A activity, however they are still viewed as the most radical and spectacular way to exercise corporate control. The high level of hostile activity during the 1980s had also encouraged many innovations in the art of hostile takeover defence. Until today antitakeover defence has reached a very sophisticated level and most companies have erected formidable defences to counter aggressive corporate raiders. A targets anti-takeover arsenal can be segmented into pre-bid and post-bid measures. Prior to the receipt of an unsolicited offer proactive defence strategies can be put in place to decrease the likelihood of a hostile takeover attempt. Once approached by the predator a wide spectrum of post-offer measures can be employed as a direct response to a received hostile takeover bid. The aim of this thesis is to provide a global perspective on hostile takeover defence during the latest merger wave. The focus lies on firstly determining the most common anti-takeover defence strategies and then in a second step evaluating their effectiveness to ward off corporate raiders. For this purpose the underlying concepts of the formal theory are presented in order to serve as a fundamental basis for an empirical study. In order to underline the theory with empirical evidence a sample of 335 hostile takeover bids launched in the timeframe form January 1, 2003 to December 31, 2008 has been analyzed. The key findings of the study are presented along two vital research questions reflecting the purpose of this thesis. 1