World Library  
Flag as Inappropriate
Email this Article

Undervalue transaction

Article Id: WHEBN0005918532
Reproduction Date:

Title: Undervalue transaction  
Author: World Heritage Encyclopedia
Language: English
Subject: Liquidation, British Virgin Islands bankruptcy law, Bankruptcy, Hong Kong insolvency law, Unfair preference
Collection: Bankruptcy, Business Law, Finance, Insolvency
Publisher: World Heritage Encyclopedia
Publication
Date:
 

Undervalue transaction

An undervalue transaction is a transaction entered into by a company[1] who subsequently goes into bankruptcy which the court orders be set aside, usually upon the application of a liquidator for the benefit of the debtor's creditors.[2] Under Australian insolvency law they are referred to as uncommercial transactions.

Under ordinary principles of contract law, the courts will not generally look into the adequacy of the consideration provided by either side. However, if a company is in real peril of going into bankruptcy, many legal systems provide a mechanism that transactions which are seriously commercially disadvantageous to the company can be unwound, so as to prevent prejudice to the creditors of the company.

Normally, for a transaction to be set aside as an undervalue transaction, the liquidator or equivalent must demonstrate that:

  1. the consideration received by the company in the transaction, in money or money's worth is significantly less than the value, in money or money's worth, provided by the company;
  2. the transaction was entered into during the "vulnerability period"; and
  3. at the time of the transaction, the company was unable to pay its debts as they fell due, or became unable to pay its debts as they fell due as a result of the transaction.[3]

The vulnerability period is the period of time immediately prior to the company going into bankruptcy. The length of the vulnerability period varies between countries, and some countries apply different vulnerability periods in different circumstances. For example, in the United Kingdom, the vulnerability period is either:

  1. two years, if the person with whom the company entered into the transaction with is a "connected person",[4] or
  2. 6 months, in all other cases.

The period is calculated by reference to the period of time immediately preceding the company going into liquidation or administration.

The effect of a successful application to have a transaction declared as an undervalue transaction varies. Inevitably the other party to the transaction who received the benefit has to return the benefit (or account for it) it to the liquidator. In some countries the assets are treated in the normal way, and may be taken by any secured creditors who have a security interest which catches the assets (characteristically, a floating charge).[5] However, some countries have "ring-fenced" recoveries of unfair preferences so that they are made available to the pool of assets for unsecured creditors.

Many jurisdictions which have prohibitions on undervalue transactions also provide for an exception in the case of transactions entered into in the ordinary course of business where the directors are of a view that it is for the benefit of the company, and such transactions are usually either validated or presumed to be validated.

See also

Footnotes

  1. ^ Some legal systems also apply undervalue transactions to insolvent individuals
  2. ^ See for example, section 238 of the Insolvency Act 1986 in the United Kingdom, and section 558FB of the Corporations Act 2001 in Australia
  3. ^ This is the cash-flow test of insolvency. Some jurisdictions (although not many) apply the balance-sheet test of insolvency to undervalue transactions, either as an alternative to the cash-flow test, or in addition to it.
  4. ^ Connected person is usually defined under the relevant legislation, e.g. in the United Kingdom, see section 249 of the Insolvency Act, and which is drafted so as to try and catch all insiders and affiliates, other than employees
  5. ^ See Re Oasis Merchandising Services Ltd (1997) BCC 282, now superseded by legislation.
This article was sourced from Creative Commons Attribution-ShareAlike License; additional terms may apply. World Heritage Encyclopedia content is assembled from numerous content providers, Open Access Publishing, and in compliance with The Fair Access to Science and Technology Research Act (FASTR), Wikimedia Foundation, Inc., Public Library of Science, The Encyclopedia of Life, Open Book Publishers (OBP), PubMed, U.S. National Library of Medicine, National Center for Biotechnology Information, U.S. National Library of Medicine, National Institutes of Health (NIH), U.S. Department of Health & Human Services, and USA.gov, which sources content from all federal, state, local, tribal, and territorial government publication portals (.gov, .mil, .edu). Funding for USA.gov and content contributors is made possible from the U.S. Congress, E-Government Act of 2002.
 
Crowd sourced content that is contributed to World Heritage Encyclopedia is peer reviewed and edited by our editorial staff to ensure quality scholarly research articles.
 
By using this site, you agree to the Terms of Use and Privacy Policy. World Heritage Encyclopedia™ is a registered trademark of the World Public Library Association, a non-profit organization.
 


Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.