Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
In what appears to be a matter of first impression, the Bankruptcy Court for the Northern District of Illinois recently held that payments made to investors in the two-tiered securitization structures commonly employed in commercial mortgage-backed securitization (CMBS) transactions are largely protected from fraudulent or preferential transfer claims by the securities contract safe harbor set forth in Bankruptcy Code section 546(e). Specifically, in Krol v. Key Bank National Ass'n (In re MCK Millennium Centre Parking, LLC), 2015 WL 1951036 (Bankr. C.D. Ill. April 30, 2015), the court held that payments by a debtor to a commercial bank on account of a loan, where the promissory note evidencing the loan was held by a real estate mortgage conduit (REMIC) trust, could be integrated with the trust's distribution of the loan payments to its investors under a pooling and servicing agreement such that the payments constituted transfers in connection with a securities contract and thus, were unavoidable.
The Bankruptcy Code's Safe Harbor Provisions
The Bankruptcy Code contains a number of provisions that shield certain financial transactions from application of various provisions of the Bankruptcy Code. For example, payments and other transfers made in connection with these transactions may not be avoided as constructively fraudulent or preferential transfers (but the provisions do not protect payments or transfers made in actual fraud). Actions taken against the debtor pursuant to these transactions are shielded from the application of the automatic stay, and the provisions provide for the enforceability of so-called ipso facto clauses (which allow termination or modification of these contracts due to the debtor's financial condition or bankruptcy filing).
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
In Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?