Posted

According to Theresa May, the UK’s recently installed prime minister, Brexit means Brexit. But what this actually means in practice is still unknown. There is still a huge amount of debate over what Brexit will look like, what process should be followed and how long it will take. Some commentators, such as Michael Dougan, Professor of European Law at the University of Liverpool, have suggested that it could take up to 10 years to make all the necessary adjustments.

In the meantime, it’s business-as-usual in the field of commercial contracts, outsourcing and technology deals. That said, there are some key areas that should be considered when putting these deals together, given what we now know (and still don’t know) about Brexit, as well as provisions that should be kept under review as the Brexit story unfolds. This is going to be an evolving area, but, based on discussions with both buyers and sellers over the past couple of weeks, here are my top ten:

Continue reading

Posted

In case you missed it, the Great British public caught the world off guard when, on 23 June 2016, a small but significant majority voted in favour of the UK withdrawing from the European Union. Much like the termination of an outsourcing agreement without detailed exit provisions and a well worked out plan, the decision has sparked political and economic chaos, as the UK is plunged into a period of prolonged uncertainty with much wider ramifications for political stability and economic growth across the EU and beyond.

What does this all mean?

From a UK-based outsourcing lawyer’s perspective, it is very much a case of wait and see. The English law regime applicable to outsourcing and procurement remains, for the time being, “as is”. Until parliament moves to repeal or amend the European Communities Act 1972, UK laws, which include the application of the EU Treaties, remain unchanged. Moreover, laws and regulations which have been transposed into English law in response to EU Directives in diverse areas such as working time, agency workers, data protection and TUPE laws will continue until further notice.

Posted

The ERISA Advisory Council1 recently announced that, as part of its goals for 2016, it will be focusing on cybersecurity issues affecting retirement plans and, in particular, the extent to which such issues relate to third-party administrators and vendors (TPAs) of retirement plans. To read what our attorneys have to say about this click here.

Posted

As stated by Wired, “It’s all the standard advice you’d give a tech novice,” aptly sums up the White House’s Cybersecurity National Action Plan (CNAP) that President Obama unveiled on February 9, 2016. Announced as part of the President’s overall budget proposal, CNAP is a plea within the federal government to implement a sturdier foundation for its cybersecurity strategy. The administration proposes a 35% increase in cybersecurity funding, much of which would go toward creating programs that are intended to leverage private sector expertise to improve the woefully outdated, if not completely nonexistent, federal government cybersecurity infrastructure.

Among other initiatives, CNAP includes an awareness campaign targeted at personal-level cybersecurity habits, a joint government-private sector commission for compiling cybersecurity best practices, and incentives to entice private sector talent to enlist in the government’s ranks. Although these programs anticipate private sector involvement, they are rooted in the government’s pressing concern about its own vulnerabilities to cyberattacks. The standard refrain is that CNAP seeks to raise the level of cybersecurity for the government and the private sector, but the rhetoric around the announcement belies an overwhelming focus on federal government advancement that will likely have little impact on private sector progress, if the program is implemented at all.

Citizens’ Awareness Campaign

Posted

Retirement plan sponsors face ever-evolving cyber-related threats to plan assets and participant personal information. To combat such threats, plan sponsors should proactively assess the third-party service providers’ ability to detect, prevent and respond to cyberattacks against the retirement plan. In order to minimize a retirement plan’s overall cyber risk profile, its sponsor(s) must implement a cyber risk management strategy, including focusing on evaluating its third-party service providers’ cybersecurity programs, performing periodic assessments of such programs, and ensuring that the retirement plan has mitigated risks from losses in the event of a cyberattack.

This advisory is the first in a series of advisories dedicated to understanding cybersecurity issues affecting retirement plans.

Read more…

Posted

Brian Wainwright • Robert S. Logan

The Protecting Americans from Tax Hikes Act of 2015 (the “PATH Act,” Division Q of the Consolidated Appropriations Act, 2016, P.L. 114-113, enacted December 18, 2015) made some important changes to the U.S. federal income tax treatment of U.S. real estate investments by non-U.S. persons under the Foreign Investment in Real Property Tax Act of 1980 (“FIRPTA”).

Increased Withholding

Posted

Happy new year, outsourcing industry!

In our last post, we posited that the new year brings an opportunity for a fresh start in structuring fundamental aspects of an outsourcing transaction. We pointed to the following mechanisms used to restrict a customer from an early exit from an IT outsourcing deal as being outdated, having originally been designed to protect a supplier’s significant capital investment in outsourcing deal, which has all but disappeared in today’s typical deals:

  • Whole or partial exclusivity;

Posted

The advent of the new year provides an opportunity to contemplate a fresh start — and that’s just what is needed when it comes to structuring the fundamentals of an IT outsourcing transaction.

Early IT outsourcing transactions typically involved significant capital investments by suppliers, who would often purchase the customer’s existing assets and promise to deliver services inclusive of refreshed assets at defined refresh cycles. These “asset-heavy” transactions often included mechanisms to either prevent the customer from exiting early, or to compensate the supplier for significant unamortized capital investment where the customer terminated services early. Examples of these “exit-restricting” mechanisms are:

  • Whole or partial exclusivity;

Posted

Of Silk and Services

As I listened to my wife, a custom wedding dress designer, talk a hysterical bride off the cliff this past weekend, I realized the conversation sounded eerily familiar. My wife was certain that the completed dress in front of them was exactly what had been ordered and she had emails, sketches and photos to prove it. The bride knew exactly what dress she had ordered, and this wasn’t it. She also had a set of texts, emails, and photos to support her expectation.

Sound familiar? This was nothing more than a failure to document a services solution. How can a “bride” to an outsourcing engagement avoid the same disaster?

Posted

In the first installment of this post, I posited that one factor contributing to disappointing results following a merger or acquisition is the flawed perception that transition services are not that important. I noted that this mindset may dilute the effectiveness of the post-deal enterprise(s) and result in unanticipated and unmitigated risks, lost or reduced revenues and/or interruptions of key business operations.

Let’s assume that you are sold on the importance of transition services. Even when transition is given appropriate attention, companies often suffer the perils of misguided implementation of the transition service regime, which may include:

  • Insufficient planning;
  • An undisciplined process;
  • Inadequate diligence (not asking the right questions); and/or
  • Incomplete or improper terms.

This installment focuses on how best to avoid these issues by adhering to a practical set of informed best practices.

Transition Services “Value Imperative”

Although there is no single “right way” to devise and execute a transition services strategy, there is one guiding principle that should drive any transition service regime. For the sake of discussion, I’ll call it the “value imperative,” which should advance three primary objectives:

  1. Help position the post-closing enterprise(s) to be at least as (if not more) competitive in the market(s) in which they operate;
  2. At a minimum, preserve (and potentially enhance) the valuation; and
  3. Enable the enterprise(s) to fully exploit the targeted synergies of the deal.

Put another way, the transition services should, at a minimum, “do no harm” to the value proposition being pursued, recognizing that the mechanisms for achieving this goal may differ depending on whether you are the seller or buyer (the recipient or provider of the transition services).

Implementing an effective transition services regime is as much about process as it is about substance. In this installment I explore the key attributes of an effective transition services process from the perspectives of both the provider and the recipient of these services.

Continue reading