SlideShare a Scribd company logo
BUYING THE BRAINS - COMMON
STRUCTURAL ISSUES IN SECTOR
SPECIFIC M&A TRANSACTIONS
AIJA TALLINN – 19 APRIL 2013AIJA TALLINN – 19 APRIL 2013
JEROME VERMEYLENJEROME VERMEYLEN
Overview
 Structural issues specific to M&A
transactions in IP/IT intensive sectors
 Five issues:
Due diligence
Share deal vs asset deal
Keeping the brains
Financing / debt push down
Data protection
Case study
 Acquisition of a fence producer
Due diligence
 IP is not limited to registered IP
 Key questions are
Which IP is critical to the business:
trademarks, patents, copyrights
(including on software), domain
names, knowhow, trade secrets etc.
Who has rights regarding the IP:
clients, employees, self employed
contractors, joint venture partners, any
other third parties who may dispute
the rights / use by the target
Due diligence (2)
Which rights: ownership, right of use /
licensing right, economic / moral rights
(copyright only) etc.
Which scope: exclusivity, duration,
territory etc.
Who are the target’s brains and which
are their contractual arrangements:
employees, directors, self-employed
contractors, shareholders
Due diligence (3)
If target uses cloud computing, which
(contractual) protections are granted
by cloud computing/IT supplier: SLA,
data recovery measures, IP protection
(e.g. software developed by target),
confidentiality of data/information,
limitations of liability etc.
Due diligence (4)
Based on the result of the (IP/IT) due
diligence:
⇒ Structure the transaction
⇒ Determine reps & warranties and specific
indemnities
⇒ Remedy problems (conditions precedent or
post-closing)
Share deal - Asset deal
 Share deal: all assets and liabilities of
the target remain with the target
No need to organise the transfer of IP
rights / agreements
No need to request new permits /
authorisations
Check IP agreements for change of
control clauses
Share deal - Asset deal (2)
 Asset deal:
Transfer of non registered IP (except
copyrights): solo consensu
Transfer of registered IP and
copyright: writing required
Transfer of registered IP: formalities
for the enforceability of transfer
towards third parties
Transfer of agreements requires
approval of co-contracting party
Share deal - Asset deal (3)
Change of “data controller”
⇒ Registration with / notification to /
authorisation from local data protection
authorities
⇒ Notification to data subject
Keeping the brains
 Registered IP: no big issue
 Tangible and easily identified
 Well-protected and reps & warranties
 Non-registered IP: often key issue in
IP/IT intensive sector
 Existence and value rests with people
 Knowhow and skills
 Often no tangible evidence (except
for copyrights but also evidence
issues)
Keeping the brains (2)
 Keep the brains by using the carrot
and the stick:
Keep directors and key employees
incentivized through:
⇒ (Minority) shareholding
⇒ Stock options
⇒ Good leaver – bad leaver provisions
Keeping the brains (3)
Keep the sellers incentivized through:
⇒ (Minority) shareholding
⇒ Earnout
Non-compete clause for shareholders,
directors and key employees
⇒ With penalties / lump sum damages
Keeping the brains (4)
 Protect the target’s IP
Contractual provisions with all relevant
employees and self-employed for the
transfer of IP to the fullest extent
⇒ Condition precedent to transaction
Non-disclosure clause for
shareholders, directors and key
employees
⇒ With penalties / lump sum damages
Keeping the brains (5)
Protect the unregistered IP:
⇒ Protect computers and databases
⇒ Protect clients lists (e.g. “mystery
records” and “intentional typos”)
⇒ Restrict access to IP sensitive
locations
⇒ Log network access, data transfer,
printing, e-mailing etc.
⇒ Introduce good practice guidelines in
the working rules for employees
Financing / debt push down
 Can IP be used as collateral for
financing?
Floating charge on the business,
including IP: no problem
Pledge on IP rights? Requirement of
“dispossession” of the pledged assets
⇒ Possible for IP rights?
⇒ Current view: yes (at least for
registered IP)
Data protection
 “Adequate protection” required if
personal data transferred or
accessible from outside the EU
Authorisation of data subject
Standard clauses of the EU
Commission to be signed between
data exporter and data importer
US safe harbour list of companies
Countries with adequate protection
No difference if asset or share deal
QUESTIONS?
ALTIUS Brussels
Tour & Taxis Building
Avenue du Port 86C/414
1000 Brussels
Belgium
jerome.vermeylen@altius.com
T +32 2 426 14 14
F +32 2 426 20 30

More Related Content

What's hot

Mind Your Business: Why Privacy Matters to the Successful Enterprise
 Mind Your Business: Why Privacy Matters to the Successful Enterprise Mind Your Business: Why Privacy Matters to the Successful Enterprise
Mind Your Business: Why Privacy Matters to the Successful Enterprise
Eric Kavanagh
 
IT Governance: Privacy and Intellectual Property
IT Governance: Privacy and Intellectual PropertyIT Governance: Privacy and Intellectual Property
IT Governance: Privacy and Intellectual Property
Charles Mok
 
TLG Keep Your Head IN the Cloud Webinar (05-05-15)
TLG Keep Your Head IN the Cloud Webinar (05-05-15)TLG Keep Your Head IN the Cloud Webinar (05-05-15)
TLG Keep Your Head IN the Cloud Webinar (05-05-15)Neil Ende
 
Cyber Security: Whose problem is it?
Cyber Security: Whose problem is it?Cyber Security: Whose problem is it?
Cyber Security: Whose problem is it?
Eversheds Sutherland
 
Prepare Your Firm for GDPR
Prepare Your Firm for GDPRPrepare Your Firm for GDPR
Prepare Your Firm for GDPR
MyComplianceOffice
 
Using Social Business Software and being compliant with EU data protection la...
Using Social Business Software and being compliant with EU data protection la...Using Social Business Software and being compliant with EU data protection la...
Using Social Business Software and being compliant with EU data protection la...
BCC - Solutions for IBM Collaboration Software
 
Cloud Computing & IT in the Boardroom
Cloud Computing & IT in the BoardroomCloud Computing & IT in the Boardroom
Cloud Computing & IT in the Boardroom
Brendon Noney
 
Intellectual Property: Emerging Indian IP legislations and their impact on bu...
Intellectual Property: Emerging Indian IP legislations and their impact on bu...Intellectual Property: Emerging Indian IP legislations and their impact on bu...
Intellectual Property: Emerging Indian IP legislations and their impact on bu...
BananaIP Counsels
 
Technology Transfer and Cross Border Mergers in Thailand
Technology Transfer and Cross Border Mergers in ThailandTechnology Transfer and Cross Border Mergers in Thailand
Technology Transfer and Cross Border Mergers in ThailandLawPlus Ltd.
 
The Policy Framework: GDPR and all that
The Policy Framework: GDPR and all thatThe Policy Framework: GDPR and all that
The Policy Framework: GDPR and all that
EUDAT
 
Legal and privacy implications of IoT
Legal and privacy implications of IoTLegal and privacy implications of IoT
Legal and privacy implications of IoT
Andres Guadamuz
 
Barbe - Trade secrets international trade policy and empirical research
Barbe - Trade secrets international trade policy and empirical researchBarbe - Trade secrets international trade policy and empirical research
Barbe - Trade secrets international trade policy and empirical research
innovationoecd
 
INNA POLIAKOVA «5 key legal issues of outsourcing agreements to be negotiated...
INNA POLIAKOVA «5 key legal issues of outsourcing agreements to be negotiated...INNA POLIAKOVA «5 key legal issues of outsourcing agreements to be negotiated...
INNA POLIAKOVA «5 key legal issues of outsourcing agreements to be negotiated...
Lviv Startup Club
 
Worldwide Laws Privacy Presentation 2006
Worldwide Laws Privacy Presentation 2006Worldwide Laws Privacy Presentation 2006
Worldwide Laws Privacy Presentation 2006Kimberly Verska
 
Trade Secret Asset Management
Trade Secret Asset ManagementTrade Secret Asset Management
Trade Secret Asset Management
Donal O'Connell
 
Developing An Ip Strategy
Developing An Ip StrategyDeveloping An Ip Strategy
Developing An Ip Strategyjrstorella
 
3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICECFG
 
Intellectual Property 101 for Start-Ups
Intellectual Property 101 for Start-UpsIntellectual Property 101 for Start-Ups
Intellectual Property 101 for Start-Ups
James Alexander
 

What's hot (18)

Mind Your Business: Why Privacy Matters to the Successful Enterprise
 Mind Your Business: Why Privacy Matters to the Successful Enterprise Mind Your Business: Why Privacy Matters to the Successful Enterprise
Mind Your Business: Why Privacy Matters to the Successful Enterprise
 
IT Governance: Privacy and Intellectual Property
IT Governance: Privacy and Intellectual PropertyIT Governance: Privacy and Intellectual Property
IT Governance: Privacy and Intellectual Property
 
TLG Keep Your Head IN the Cloud Webinar (05-05-15)
TLG Keep Your Head IN the Cloud Webinar (05-05-15)TLG Keep Your Head IN the Cloud Webinar (05-05-15)
TLG Keep Your Head IN the Cloud Webinar (05-05-15)
 
Cyber Security: Whose problem is it?
Cyber Security: Whose problem is it?Cyber Security: Whose problem is it?
Cyber Security: Whose problem is it?
 
Prepare Your Firm for GDPR
Prepare Your Firm for GDPRPrepare Your Firm for GDPR
Prepare Your Firm for GDPR
 
Using Social Business Software and being compliant with EU data protection la...
Using Social Business Software and being compliant with EU data protection la...Using Social Business Software and being compliant with EU data protection la...
Using Social Business Software and being compliant with EU data protection la...
 
Cloud Computing & IT in the Boardroom
Cloud Computing & IT in the BoardroomCloud Computing & IT in the Boardroom
Cloud Computing & IT in the Boardroom
 
Intellectual Property: Emerging Indian IP legislations and their impact on bu...
Intellectual Property: Emerging Indian IP legislations and their impact on bu...Intellectual Property: Emerging Indian IP legislations and their impact on bu...
Intellectual Property: Emerging Indian IP legislations and their impact on bu...
 
Technology Transfer and Cross Border Mergers in Thailand
Technology Transfer and Cross Border Mergers in ThailandTechnology Transfer and Cross Border Mergers in Thailand
Technology Transfer and Cross Border Mergers in Thailand
 
The Policy Framework: GDPR and all that
The Policy Framework: GDPR and all thatThe Policy Framework: GDPR and all that
The Policy Framework: GDPR and all that
 
Legal and privacy implications of IoT
Legal and privacy implications of IoTLegal and privacy implications of IoT
Legal and privacy implications of IoT
 
Barbe - Trade secrets international trade policy and empirical research
Barbe - Trade secrets international trade policy and empirical researchBarbe - Trade secrets international trade policy and empirical research
Barbe - Trade secrets international trade policy and empirical research
 
INNA POLIAKOVA «5 key legal issues of outsourcing agreements to be negotiated...
INNA POLIAKOVA «5 key legal issues of outsourcing agreements to be negotiated...INNA POLIAKOVA «5 key legal issues of outsourcing agreements to be negotiated...
INNA POLIAKOVA «5 key legal issues of outsourcing agreements to be negotiated...
 
Worldwide Laws Privacy Presentation 2006
Worldwide Laws Privacy Presentation 2006Worldwide Laws Privacy Presentation 2006
Worldwide Laws Privacy Presentation 2006
 
Trade Secret Asset Management
Trade Secret Asset ManagementTrade Secret Asset Management
Trade Secret Asset Management
 
Developing An Ip Strategy
Developing An Ip StrategyDeveloping An Ip Strategy
Developing An Ip Strategy
 
3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE
 
Intellectual Property 101 for Start-Ups
Intellectual Property 101 for Start-UpsIntellectual Property 101 for Start-Ups
Intellectual Property 101 for Start-Ups
 

Similar to Common structural issues in sector specific M&A transactions

Intellectual Property - A Legal Prespective. By Napthens Solicitors.
Intellectual Property - A Legal Prespective. By Napthens Solicitors.Intellectual Property - A Legal Prespective. By Napthens Solicitors.
Intellectual Property - A Legal Prespective. By Napthens Solicitors.
InfoLab21, Lancaster University
 
C:\Documents And Settings\User\Desktop\Wipo Smes Sha 04 10 B
C:\Documents And Settings\User\Desktop\Wipo Smes Sha 04 10 BC:\Documents And Settings\User\Desktop\Wipo Smes Sha 04 10 B
C:\Documents And Settings\User\Desktop\Wipo Smes Sha 04 10 B
asireesha
 
Out
OutOut
Legal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptxLegal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptx
KRITARTHBANSAL1
 
Ip 101 for Startups
Ip 101 for StartupsIp 101 for Startups
Ip 101 for Startups
Fenwick & West
 
The ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computingThe ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computing
Dan Michaluk
 
IP Licensing in Outsourcing and Tech Agreements
IP Licensing in Outsourcing and Tech AgreementsIP Licensing in Outsourcing and Tech Agreements
IP Licensing in Outsourcing and Tech AgreementsWilliam Tanenbaum
 
Cork Open Coffee David Reilly 24 July 09
Cork Open Coffee David Reilly 24 July 09Cork Open Coffee David Reilly 24 July 09
Cork Open Coffee David Reilly 24 July 09
Gordon Murray
 
Class 02 ip strategies_ss
Class 02 ip strategies_ssClass 02 ip strategies_ss
Class 02 ip strategies_ss
lihuilin
 
Kko ip due diligence presentation (digital boot camp) 2016-02-17(2)
Kko   ip due diligence presentation (digital boot camp) 2016-02-17(2)Kko   ip due diligence presentation (digital boot camp) 2016-02-17(2)
Kko ip due diligence presentation (digital boot camp) 2016-02-17(2)
Arlen Meyers, MD, MBA
 
TRUST. IP and Technology Update - IT Audit Toolkit for CIOs and General Couns...
TRUST. IP and Technology Update - IT Audit Toolkit for CIOs and General Couns...TRUST. IP and Technology Update - IT Audit Toolkit for CIOs and General Couns...
TRUST. IP and Technology Update - IT Audit Toolkit for CIOs and General Couns...
Jan Lindberg
 
Gdpr and smart cities
Gdpr and smart citiesGdpr and smart cities
Gdpr and smart cities
Bart Van Den Brande
 
Clarke wilmot presentation to ukti clients
Clarke wilmot presentation to ukti clientsClarke wilmot presentation to ukti clients
Clarke wilmot presentation to ukti clients
Superfast Business
 
What You Should Know About Trade Secrets - Knobbe Martens Webinar Series for ...
What You Should Know About Trade Secrets - Knobbe Martens Webinar Series for ...What You Should Know About Trade Secrets - Knobbe Martens Webinar Series for ...
What You Should Know About Trade Secrets - Knobbe Martens Webinar Series for ...
Knobbe Martens - Intellectual Property Law
 
GDPR - a view for the non experts
GDPR - a view for the non expertsGDPR - a view for the non experts
GDPR - a view for the non experts
Claudio Bolla, CISM
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11mrmwood
 
Cover your ASSets
Cover your ASSetsCover your ASSets
Cover your ASSetscospaceatx
 

Similar to Common structural issues in sector specific M&A transactions (20)

Intellectual Property - A Legal Prespective. By Napthens Solicitors.
Intellectual Property - A Legal Prespective. By Napthens Solicitors.Intellectual Property - A Legal Prespective. By Napthens Solicitors.
Intellectual Property - A Legal Prespective. By Napthens Solicitors.
 
C:\Documents And Settings\User\Desktop\Wipo Smes Sha 04 10 B
C:\Documents And Settings\User\Desktop\Wipo Smes Sha 04 10 BC:\Documents And Settings\User\Desktop\Wipo Smes Sha 04 10 B
C:\Documents And Settings\User\Desktop\Wipo Smes Sha 04 10 B
 
Out
OutOut
Out
 
Intellectual Property Management
Intellectual Property ManagementIntellectual Property Management
Intellectual Property Management
 
Legal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptxLegal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptx
 
Ip 101 for Startups
Ip 101 for StartupsIp 101 for Startups
Ip 101 for Startups
 
The ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computingThe ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computing
 
13756360_1.PPT
13756360_1.PPT13756360_1.PPT
13756360_1.PPT
 
IP Licensing in Outsourcing and Tech Agreements
IP Licensing in Outsourcing and Tech AgreementsIP Licensing in Outsourcing and Tech Agreements
IP Licensing in Outsourcing and Tech Agreements
 
Cork Open Coffee David Reilly 24 July 09
Cork Open Coffee David Reilly 24 July 09Cork Open Coffee David Reilly 24 July 09
Cork Open Coffee David Reilly 24 July 09
 
Class 02 ip strategies_ss
Class 02 ip strategies_ssClass 02 ip strategies_ss
Class 02 ip strategies_ss
 
Kko ip due diligence presentation (digital boot camp) 2016-02-17(2)
Kko   ip due diligence presentation (digital boot camp) 2016-02-17(2)Kko   ip due diligence presentation (digital boot camp) 2016-02-17(2)
Kko ip due diligence presentation (digital boot camp) 2016-02-17(2)
 
TRUST. IP and Technology Update - IT Audit Toolkit for CIOs and General Couns...
TRUST. IP and Technology Update - IT Audit Toolkit for CIOs and General Couns...TRUST. IP and Technology Update - IT Audit Toolkit for CIOs and General Couns...
TRUST. IP and Technology Update - IT Audit Toolkit for CIOs and General Couns...
 
Gdpr and smart cities
Gdpr and smart citiesGdpr and smart cities
Gdpr and smart cities
 
Clarke wilmot presentation to ukti clients
Clarke wilmot presentation to ukti clientsClarke wilmot presentation to ukti clients
Clarke wilmot presentation to ukti clients
 
What You Should Know About Trade Secrets - Knobbe Martens Webinar Series for ...
What You Should Know About Trade Secrets - Knobbe Martens Webinar Series for ...What You Should Know About Trade Secrets - Knobbe Martens Webinar Series for ...
What You Should Know About Trade Secrets - Knobbe Martens Webinar Series for ...
 
GDPR - a view for the non experts
GDPR - a view for the non expertsGDPR - a view for the non experts
GDPR - a view for the non experts
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11
 
Trade secrete litigation
Trade secrete litigationTrade secrete litigation
Trade secrete litigation
 
Cover your ASSets
Cover your ASSetsCover your ASSets
Cover your ASSets
 

Recently uploaded

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 

Recently uploaded (20)

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 

Common structural issues in sector specific M&A transactions

  • 1. BUYING THE BRAINS - COMMON STRUCTURAL ISSUES IN SECTOR SPECIFIC M&A TRANSACTIONS AIJA TALLINN – 19 APRIL 2013AIJA TALLINN – 19 APRIL 2013 JEROME VERMEYLENJEROME VERMEYLEN
  • 2. Overview  Structural issues specific to M&A transactions in IP/IT intensive sectors  Five issues: Due diligence Share deal vs asset deal Keeping the brains Financing / debt push down Data protection
  • 3. Case study  Acquisition of a fence producer
  • 4. Due diligence  IP is not limited to registered IP  Key questions are Which IP is critical to the business: trademarks, patents, copyrights (including on software), domain names, knowhow, trade secrets etc. Who has rights regarding the IP: clients, employees, self employed contractors, joint venture partners, any other third parties who may dispute the rights / use by the target
  • 5. Due diligence (2) Which rights: ownership, right of use / licensing right, economic / moral rights (copyright only) etc. Which scope: exclusivity, duration, territory etc. Who are the target’s brains and which are their contractual arrangements: employees, directors, self-employed contractors, shareholders
  • 6. Due diligence (3) If target uses cloud computing, which (contractual) protections are granted by cloud computing/IT supplier: SLA, data recovery measures, IP protection (e.g. software developed by target), confidentiality of data/information, limitations of liability etc.
  • 7. Due diligence (4) Based on the result of the (IP/IT) due diligence: ⇒ Structure the transaction ⇒ Determine reps & warranties and specific indemnities ⇒ Remedy problems (conditions precedent or post-closing)
  • 8. Share deal - Asset deal  Share deal: all assets and liabilities of the target remain with the target No need to organise the transfer of IP rights / agreements No need to request new permits / authorisations Check IP agreements for change of control clauses
  • 9. Share deal - Asset deal (2)  Asset deal: Transfer of non registered IP (except copyrights): solo consensu Transfer of registered IP and copyright: writing required Transfer of registered IP: formalities for the enforceability of transfer towards third parties Transfer of agreements requires approval of co-contracting party
  • 10. Share deal - Asset deal (3) Change of “data controller” ⇒ Registration with / notification to / authorisation from local data protection authorities ⇒ Notification to data subject
  • 11. Keeping the brains  Registered IP: no big issue  Tangible and easily identified  Well-protected and reps & warranties  Non-registered IP: often key issue in IP/IT intensive sector  Existence and value rests with people  Knowhow and skills  Often no tangible evidence (except for copyrights but also evidence issues)
  • 12. Keeping the brains (2)  Keep the brains by using the carrot and the stick: Keep directors and key employees incentivized through: ⇒ (Minority) shareholding ⇒ Stock options ⇒ Good leaver – bad leaver provisions
  • 13. Keeping the brains (3) Keep the sellers incentivized through: ⇒ (Minority) shareholding ⇒ Earnout Non-compete clause for shareholders, directors and key employees ⇒ With penalties / lump sum damages
  • 14. Keeping the brains (4)  Protect the target’s IP Contractual provisions with all relevant employees and self-employed for the transfer of IP to the fullest extent ⇒ Condition precedent to transaction Non-disclosure clause for shareholders, directors and key employees ⇒ With penalties / lump sum damages
  • 15. Keeping the brains (5) Protect the unregistered IP: ⇒ Protect computers and databases ⇒ Protect clients lists (e.g. “mystery records” and “intentional typos”) ⇒ Restrict access to IP sensitive locations ⇒ Log network access, data transfer, printing, e-mailing etc. ⇒ Introduce good practice guidelines in the working rules for employees
  • 16. Financing / debt push down  Can IP be used as collateral for financing? Floating charge on the business, including IP: no problem Pledge on IP rights? Requirement of “dispossession” of the pledged assets ⇒ Possible for IP rights? ⇒ Current view: yes (at least for registered IP)
  • 17. Data protection  “Adequate protection” required if personal data transferred or accessible from outside the EU Authorisation of data subject Standard clauses of the EU Commission to be signed between data exporter and data importer US safe harbour list of companies Countries with adequate protection No difference if asset or share deal
  • 18. QUESTIONS? ALTIUS Brussels Tour & Taxis Building Avenue du Port 86C/414 1000 Brussels Belgium jerome.vermeylen@altius.com T +32 2 426 14 14 F +32 2 426 20 30