StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Interpret the law of secured transactions - Essay Example

Cite this document
Summary
Metro bank in accordance to personal securities act 1999 the main rule for priority of financial statements is present in section 66; whereas a perfected security interest has an advantage over unperfected security interest in the same (Miller, 2011). The party that undergoes…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98% of users find it useful
Interpret the law of secured transactions
Read Text Preview

Extract of sample "Interpret the law of secured transactions"

Interpret the law of secured transactions. Jennifer Reed Prof Muller Applied Business Law September 6, Metro bank in accordance to personal securities act 1999 the main rule for priority of financial statements is present in section 66; whereas a perfected security interest has an advantage over unperfected security interest in the same (Miller, 2011). The party that undergoes the perfection first has the priority on the collateral regardless of whether the perfection was by registration or possession.

However, an exception exist where there is purchase money security interest. In its existence, a Purchase Money Security Interest has a priority over general security interest. Article nine of the Uniform Commercial Code states that security interests are termed as personal property.According to the case, the first party to present the financing statement has priority to the collateral. Therefore, by filing the financing statement in advance, a party can perfect a security interest in the collateral.

Therefore, this makes the party a secured creditor; in addition, the secured party creditors’ interest is also protected through the collateral (Miller, 2011).The creditor who acquired the security interest later also has a valid claim towards the collateral. Nevertheless, the later creditor is considered a junior creditor therefore; his security interest has less priority than the first creditor. Even though the later creditor had no prior knowledge of the collateral, the first creditor has priority over the collateral.

The first creditor filed the notice first thus creating a useful knowledge for all future creditors (Miller, 2011).With regard to article 9 of the Uniform Commercial code, the interests are referred to as personal property. This is well to reveal the fact that according to the case, Metro Bank does not offer a quantitative statement to ensure that it receives as collateral if any as it claims (Duncan, Lyons, & Wilson, 2011). It is also the law according to the article that any other auxiliary shareholders or creditors should file statements that are clear to reveal the financial position of the company.

In the given case, it is expressed that Metro Bank did not carry out enough survey to find out the source of the assets in terms of financial statements that Agile Corporation borrowed. Had Metro Bank carried out a full analysis of the assets without rushing out to offer the amount of Money that it did to the corporation, it would have found out that Agile Group had borrowed 1 million dollars from Hi Finance Company. The security interest that Metro Bank bore at this point, where Agile bleached the contract leaves the bank at a point where it does not bear enough evidence to build up a strong case defaulting Agile for their actions.

However, Hi Finance has a rather strong case because almost all the securities that Agile bore for them would be repaid. This is done again with reference to article 9 where Hi Finance as advantage would take in the assets belonging to Agile Corporation (Mann & Roberts, 2012).Hi finance company (HFC) through the financial statement they filed with the state had perfected their security interest in the collateral first. Metro bank also have a claim because they had perfected their security interest.

However, they are considered juniors to Hi finance company. Therefore, HFC has better collateral to the claim in discussion. ReferencesDuncan, R. F., Lyons, W. H., & Wilson, C. L. (2011). The law and practice of secured transactions: Working with article 9. New York, N.Y: Law Journal Press.Mann, R. A., & Roberts, B. S. (2012). Essentials of business law and the legal environment. Mason, OH: South-Western Cengage Learning.Miller, R. L., (2011). Business Law text & exercises. (6th ed). South-Western, Cengage Learning.  

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Interpret the law of secured transactions Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from https://studentshare.org/law/1597691-interpret-the-law-of-secured-transactions
(Interpret the Law of Secured Transactions Essay Example | Topics and Well Written Essays - 500 Words)
https://studentshare.org/law/1597691-interpret-the-law-of-secured-transactions.
“Interpret the Law of Secured Transactions Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/law/1597691-interpret-the-law-of-secured-transactions.
  • Cited: 0 times

CHECK THESE SAMPLES OF Interpret the law of secured transactions

Information Technology and Financial Services

IT & Financial Services Contents Introduction 3 Financial transaction 4 Information technology and its development 5 Introduction 5 Development 6 Security in the financial transactions 7 Conclusion 8 References 10 Introduction An individual or a member of a family needs to take decisions in order to budget their expenses.... For this, the needs of financial transactions arise on a regular basis.... Digitalization and introduction of information technology in the field of financial transactions help mankind to a great extent (Mann & Mann, 2011, p....
9 Pages (2250 words) Essay

Law of Electronic Commerce and the Internet

the law used to deal with the physical movement or presence that... (law institute Victoria, 2007). The Australian High court will have the primary duty of interpreting the laws according to the constitution.... The taxation, customs, trade practices, industrial law, bankruptcy, immigration, administration law, patents, copyright, environment law, sexual and racial discrimination, access to information will be dealt by Federal court of Australia....
10 Pages (2500 words) Essay

Commerce as the Transfer of Goods and Services

However, the security needs to be upheld to a given degree which is of dual function in that it doesn't impede on the efficiency of transactions and still it doesn't leave obvious holes to the hackers' advantage.... The seller's website needs to be well protected and secure against fraudsters and hackers but at the same time, the security components should not suffocate the website to a level that the efficiency of business transactions is impeded on.... The buyer has the obligation to identify his/her security objectives: there is need to know what it is that the seller needs to protect and what should be left open with considerable trust to enhance business transactions....
12 Pages (3000 words) Coursework

Business Organizations and Agency Law Legal Issues

The various types of real estate business comprises of (i) Appraisal which includes professional valuation services (ii) Brokerages covers assisting buyers and sellers in transactions (iii) Development comprising of improving land for use by way of addition or replacing buildings (iv) Property management which is managing a property on behalf of its owners (v) Real Estate Marketing that covers the sales aspect of the property business and finally (vi) Relocation services encompassing repositioning people or businesses to a different country....
12 Pages (3000 words) Essay

Communications and Networks Analysis

VAN - Value Added Network - a private/public network setup to transport the information of well-defined objects in a pre-defined standard format.... E.... .... XML, MARC21 or RFID formats for demand-supply chains, library automation system, product tracking. Intranet - Is the physical network of networking and computing systems spread in a building or across buildings of the same organization....
6 Pages (1500 words) Essay

Electronic Financial Transactions over the Internet

This paper looks into the various types of security threats facing electronic financial transactions, the potential damage they could inflict, the remedial measures to counter these threats.... In recent years the role and scope of the Internet have assumed new dimensions with the introduction of commercial transactions.... As a culmination of these parallel but complementary processes, e-commerce in general and electronic financial transactions, in particular, has firmly taken root in the mainstream global economy....
8 Pages (2000 words) Term Paper

E-commerce as a Popular Way of Doing Business

The researcher of this essay aims to analyze E-commerce, that is picking up as a popular way of doing business not only in the retail section but also in the banking section.... It entails doing business over the web in which the seller and the buyer are both connected via a web browser.... hellip; This report seeks to elaborate on the security aspect of e-commerce....
12 Pages (3000 words) Coursework

Systems Management and Security

This platform is used by both sellers and buyers to perform the basic transactions online without any delays or necessary paperwork.... The case study "Systems Management and Security " states that Standard Chartered is one of the leading international organizations in the banking sector....
8 Pages (2000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us