As the owner of a corporation, when you set up your business, you and your lawyer believed that you had taken all necessary steps to protect your personal assets. After all, the primary reason you set up a corporation was to shield your own assets from your business’s creditors. In order to ensure that your assets are safe from the corporation’s creditors, you need to do more than just fill out the Secretary of State’s paperwork. The corporation must conduct itself as an entity separate and apart from you as the owner.
A recent decision provides a “textbook” example of how an owner of a corporation can put his own assets at risk simply by the way he conducted his company’s business. In Puntillo v. Dave Knecht Homes, the plaintiffs were a married couple who entered into a contract with a home builder, a corporation. The defendants, David and Karen Knecht, were the beneficiaries of a trust that held the home builder’s shares of stock. They were, in essence, the owners of the home-builder corporation. After the home was completed, it was riddled with defects and the couple obtained a judgment against the corporation. Thereafter, the corporation dissolved and the couple was unable to enforce their judgment. In the midst of all of it, a new corporation, Dave Knecht Homes, was created with similar ownership, management, staff, purpose and resources as the now asset-less builder. The defunct builder and the new company used the same line of credit. Beginning in 2006, Dave Knecht’s personal line of credit began funding the now defunct builder’s operations. After the new corporation, Dave Knecht Homes, came along, it also used the same credit line. After being unable to collect on its judgment against the out-of-business builder, the plaintiffs sued Dave Knecht Homes and its owners Dave and Karen Hecht personally. The plaintiffs claimed the new company was merely a successor to the defunct corporation and the corporate veil between the individuals and the successor, Dave Knecht Homes, should be “pierced,” allowing the plaintiffs to go after the individual owners for a corporation’s debt.
Generally, a corporation that purchases the assets of another corporation is not liable for the debts or liabilities of the selling corporation. There are, however, four exceptions to this general rule of successor corporate nonliability: (1) where an express or implied agreement of assumption of the liability exists; (2) where the transaction amounts to a consolidation or merger of the purchaser or seller corporation; (3) where the purchaser is merely a continuation of the seller; or (4) where the transaction is for the fraudulent purpose of escaping liability for the seller’s obligations. In this case, the plaintiffs successfully argued that Dave Knecht Homes is a “mere continuation” of the former company and the court agreed. The continuation exception applies when the purchasing corporation is “merely a continuation or reincarnation of the selling corporation.” In other words, the purchasing corporation maintains the same or similar management and ownership, but merely wears different clothes. The Illinois Supreme Court has made it clear that “[t]he exception is designed to prevent a situation whereby the specific purpose of acquiring assets is to place those assets out of the reach of the predecessor’s creditors.” To determine whether one corporate entity is a continuation of another, courts consider “whether there is a continuation of the corporate entity of the seller—not whether there is a continuation of the seller’s business operation.” Thus, the plaintiffs were permitted to look to the assets of the new company to satisfy their judgment. Unfortunately for the Knechts, it didn’t end there.
The plaintiffs also argued that the out-of-business corporation served as the Knecht’s “alter ego” and that the court should pierce the defunct builder’s corporate veil and impose individual liability against the Knechts. A court may disregard a corporate entity and pierce the veil of limited liability where the corporation is merely the alter ego or business conduit of another person or entity.” This doctrine imposes liability on the individual or entity that “uses a corporation merely as an instrumentality to conduct that person’s or entity’s business.” In Illinois, courts use a two-prong test to determine whether to pierce the corporate veil: “(1) there must be such unity of interest and ownership that the separate personalities of the corporation and the individual no longer exist; and (2) circumstances must exist such that adherence to the fiction of a separate corporate existence would sanction a fraud, promote injustice, or promote inequitable consequences.
The court found that the Knechts exercised control over the new builder and treated the company’s assets as their own, causing the company to pay significant sums of money for their own personal expenses including federal and state income tax payments, landscaping for their personal residences; personal life insurance premiums and attorney’s fees. Moreover, the Knechts caused the failed company to pay their personal expenses using David Knecht’s credit line. By causing Knecht’s former company to pay their significant personal expenses, the Knechts treated the company’s assets as their own. The court pierced the corporate veil of Dave Knecht Homes (who it imposed successor liability upon) and allowed the plaintiffs to enforce their judgment against David Hecht Homes and the individual defendants.
In order to insulate yourself from personal liability, as a business owner, the way that you run the business is as important as setting up the corporation in the first place.
For more information, please contact:
Howard Teplinsky at: email@example.com or 312-368-0100.
How can a business protect its critical information when an employee goes to work for a competitor? Many employers simply assume that if it deems information “confidential,” the law automatically protects it when an employee leaves and goes to work for a competitor. That’s not necessarily the case. In order to protect its confidential information, such as intellectual property, information, systems, customer lists, pricing information and the like, an employer must take affirmative steps long before the rogue employee leaves to ensure that its information is protected. Such information can be protected from disclosure both under Illinois common law and pursuant to the Illinois Trade Secrets Act (“ITSA”).
An employer’s trade secrets, such as its customer lists, are a protectable interest. An employer has a clear and ascertainable right in protecting its trade secrets. To show information is a trade secret under ITSA, an employer must meet two threshold requirements. First, it must show the information was sufficiently secret to provide the employer with a competitive advantage. Second, the employer must show that it took affirmative measures to stop others from acquiring or using the information. Examples of steps employers typically take to keep information confidential include keeping the information under lock and key, limiting computer access, requiring confidentiality agreements, and other employer efforts to advise employees that the information imparted to them must be kept secret. Establishing this second prong is where employers typically fall short.
Where employers have invested substantial time, money, and effort to obtain a secret advantage, the secret should be protected from an employee who obtains it through improper means. Although employees may take general knowledge or information with them that they developed during their employment, they may not take confidential information, including trade secrets. The taking does not have to be a physical taking by actually copying the names. A trade secret can be misappropriated by physical copying or by memorization. Using memorization to rebuild a trade secret does not transform the trade secret from confidential information into non-confidential information. A trade secret can also be obtained through reverse engineering
Whether and how an employer keeps information secret is one of the most important factors when determining whether information is a trade secret. When information is generally known or understood in an industry, even if it is unknown to the public at large, it does not constitute a trade secret. If a business fully discloses information throughout an industry through a catalog or other literature, it is not considered a trade secret. If the information can be readily duplicated without considerable time, effort, or expense, it is not considered a trade secret. If a customer list, for example, is generally available to all employees and the employees are not required to sign confidentiality agreements, the list is likely not considered a trade secret.
By far the most litigation in this area is over whether an employer’s customer list is a confidential trade secret. Whether customer lists constitute trade secrets largely depends on the facts of each case. Customer lists and other customer information can be considered a protectable trade secret if the information has been developed by the employer over a number of years at great expense and kept under tight security. However, the same type of information is not protectable where it has not been treated as confidential and secret by the employer, was generally available to other employees and known by persons in the trade, could be easily duplicated by reference to telephone directories or industry publications, and where the customers on such lists did business with more than one company or otherwise changed businesses frequently so that their identities were known to the employer’s competitors.
Illinois courts have found that customer lists do not constitute protectable trade secrets where, for example: a) the particular industry was competitive and customers often dealt with multiple companies; b) the employer had failed to produce sufficient evidence to demonstrate that the customer list was subject to reasonable efforts to protect its secrecy; and c) sufficient efforts had not been taken to maintain the list’s secrecy. To be a protectable trade secret, the employer must demonstrate the information it seeks to protect was sufficiently secret to provide it with a competitive advantage. However, for steps to be deemed sufficient to protect a trade secret, extensive steps must be taken to protect both the electronic and hard copies of the purported trade secret.
For more information regarding the protection of a company’s confidential information, please contact:
(312) 368-0100 or firstname.lastname@example.org
If you are a typical person today, you’ve likely used at least three different apps before 9 am. You get up in the morning and click on your weather app of choice to figure out what to wear and whether to take your umbrella. Then you grab an UBER® to get to the office and during the ride, you order your coffee so it is ready for you as you breeze through the building on the way to the elevator. No sense in waiting for the coffee, as this is a needless waste of time. With more and more people relying on apps, app design, branding, marketing, and protection are more important than ever.
The number of mobile apps is exploding. In June 2016, Apple® reported approximately 2,000,000 total apps in its app store. By May 2017, that number had increased by approximately 200,000. Mobile apps may be discussed in three categories – mobile web apps that enhance web browsing, apps that offer users a new service not previously available via a smart phone, and traditional brands whose business is widely known (such as WALGREENS®). With all of the competition in the marketplace, companies must consider how to protect their app brand as a trademark, before it launches the new app into the marketplace.
To be “protectable” as a U.S. trademark, an app must have a few key characteristics. First, consider the name of the app. Does it describe a feature or function of the app? If so, the owner may want to reconsider, as the U.S. Patent & Trademark Office typically does not allow registration of descriptive marks. Instead, the owner of the app will need to come up with a name that is either merely suggestive of the service the app provides or is arbitrary. Arbitrary names of apps are those that do not describe or suggest anything about the app. APPLE® itself is a good example of an arbitrary trademark, as APPLE® is a trademark for computers, pads, phones and other goods and services, all having nothing to do with fruit. Suggestive trademarks may be the happy medium where the function of the app is not outwardly described, but the app name hints at the meaning. For example, ENLIGHT® is a photo editor app and would be considered suggestive because it suggests something about photo editing but does not describe it.
In considering the name of the app, owners will also want to pay attention to the color and icon they will use with the app. Will these elements convey a unique design that may lend itself to trademark protection? While color is sometimes not claimed as part of a design trademark in the trademark application or emphasized in a typical enforcement setting, in the app setting it is important to claim color, as it is one mechanism to set the app apart from others.
Registration of an app name and design provides many benefits. The most important benefit is having the presumption that the owner has the right to use the name, design, and color of the app nationwide over all others, subject to certain exceptions. Another important benefit is that when the app name or design (or both) is a registered trademark, all others are put on notice of the owner’s rights. That is, all others are held to know about the registered app, even if they did not actually know about it. Finally, federally registered trademarks may obtain relief from an infringer without a lawsuit. If the owner simply wants the infringer to stop using the confusingly similar name, design and/or color scheme, the owner need only submit proof to the marketplace on which the app is available, and the marketplace, such as the Apple® App Store, will assist in removing the infringing app.
For further inquiries pertaining to apps and trademark protection and related questions regarding your intellectual property, please contact:
312.368.0100 or email@example.com.
*UBER®, WALGREENS®, APPLE®, and ENLIGHT® are all registered trademarks of their respective owners.
(Please note that we are not endorsing any products or services mentioned in this blog).