The Investment Company Act of 1940 potentially imposes significant regulatory burdens on investment funds. To avoid these constraints, most private equity, venture capital, and hedge funds rely on exemptions under either Section 3(c)(1) or Section 3(c)(7). However, a fund utilizing the Section 3(c)(1) exemption may eventually approach its investor limit (100 or 250, depending on the circumstances) while still seeking to accept new investors. Similarly, a Section 3(c)(7) fund may wish to admit investors who do not qualify as "qualified purchasers."
This program will provide an in-depth exploration of the Section 3(c)(1) and 3(c)(7) exemptions, how to count investors under such exemptions, and discuss how fund sponsors can establish parallel funds to accommodate different investor bases while maintaining regulatory compliance. The discussion will also cover key structuring considerations, potential legal pitfalls, and best practices for fund managers.
This program is designed for fund formation attorneys, as well as in-house counsel at asset managers and investment firms.
Contracting with the Federal Government is not like a business deal between two companies or a contr...
This program addresses the critical intersection of criminal and immigration law, focusing on how mi...
This program introduces psychosocial evaluations as a valuable tool in civil litigation, particularl...
Between 1986 and now, the U.S. Government collected approximately $85 billion from Federal Contracto...
Philip A. Greenberg, Esq., who has been a litigator in the State and Federal Com1s for 52 years, has...
The landscape of global finance is undergoing a seismic shift as traditional assets migrate to the b...
In “Choosing the Right Business Entity,” I will walk through the issues that matter most...
Disasters, whether natural or manmade, happen. Disasters can impact the practice of law and, among o...
This program is geared towards lawyers, experts, commercial property owners, and others in the envir...
Protect your practice from the ethical vulnerabilities of AI by mastering Model Rules 1.1 and 1.5. T...