StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Interpret the law of secured transactions - Essay Example

Cite this document
Summary
Transactions are to be carried out legally, because; there are laws that are liable for secured transactions to take effect. In this paper, there is…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.6% of users find it useful
Interpret the law of secured transactions
Read Text Preview

Extract of sample "Interpret the law of secured transactions"

Law of Secured Transactions Law of Secured Transactions Transactions are agreements that are carried out between a consumer and a vendor to trade a product for payment (Cheeseman, 2009). Transactions are to be carried out legally, because; there are laws that are liable for secured transactions to take effect. In this paper, there is a scenario where the CEO of Money Games Inc. (MGI) borrowed $50,000 from First Savings Bank that was to be used in buying ads for a video game. MGI offered its accounts receivable as collateral and did not file a financing statement after completion of the transaction.

This paper will interpret the law of secured transactions from the scenario presented. According to common jurisdictions, the lender in this case who is the First Savings Bank can accept intangibles as security for loans borrowed. This mostly applies where the accounts receivable are traded to the creditor just like in the case of Money Games Incorporation. According to the scenario, the accounts receivable acts as collateral whether the financial statement is filed or not (Miller, 2011). A security interest arises in exchange of the loan whereby the debtor agrees that the secured party may take collateral owned by the debtor if he or she defaults in the payment of the loan (Miller, 2011).

Security agreements are contracts according to the law of business (Legal Information Institute, 2000). The collateral interest of the bank vests upon the signing of the guarantee contract. In this case, the bank security is attached. However, it has not perfected its collateral interest. In most situations, perfection can be easily achieved through filing of a financial statement. This document should include the signature of the debtor, a brief description of the collateral item and addresses of both the creditor and the debtor (Cheeseman, 2009).

In normal circumstances, when the debtor delivers the note and executes the security agreement, the bank swiftly authorizes for liberation of the funds that are being borrowed. When the money is released to the debtor, then the bank’s security is attached since, it has executed a security agreement that describes the collateral and has also offered valuable security that applies to the loan. The bank is required to perfect its security interest and its claim against the accounts receivable which subordinates to the claims against the accounts receivable.

This is because the bank’s security interest attaches from the agreement that secures the payment of the debt. For instance, the beneficiary of the security interest has certain rights in disposition of the secured assets. On the contrary, this may make the bank lose its priority to other creditors who are considered perfect (Cheeseman, 2009). According to article 9 of the UCC, most types of security agreements are provided in the form of personal property (Legal Information Institute, 2000).

In the perfection of a security agreement, the filing of the public note is highly recommended. This article also has a section that is liable for the resolution of conflicts that arise in case of multiple security interests. This aspect deals with the procedures that are supposed to be followed when the debtor defaults in the payment of his or her loan (Legal Information Institute, 2000).In conclusion, the remedies available to the secured credit include possession of the collateral as stated in the agreement between the two parties involved.

Moreover, one should be careful to avoid proceeds that may involve damage to the collateral, interference and defects that are associated with the collateral (Miller, 2011). These factors present the supreme nature of the UCC in matters regarding the sale of accounts receivable and loans. This vastly enhances the credit and risk factors that are associated with secured transactions (Miller, 2011).ReferencesCheeseman, H. (2009). Business law (7th ed.). New York: Prentice Hall Publishers.Legal Information Institute (2000).

Secured transactions. Retrieved from http://www.law.cornell.edu/wex/secured_transactionsMiller, R. (2011). Business law text & exercises (6th ed.). Southern-Western: Cengage Press.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Interpret the law of secured transactions Essay Example | Topics and Well Written Essays - 500 words - 1”, n.d.)
Retrieved from https://studentshare.org/law/1597692-interpret-the-law-of-secured-transactions
(Interpret the Law of Secured Transactions Essay Example | Topics and Well Written Essays - 500 Words - 1)
https://studentshare.org/law/1597692-interpret-the-law-of-secured-transactions.
“Interpret the Law of Secured Transactions Essay Example | Topics and Well Written Essays - 500 Words - 1”, n.d. https://studentshare.org/law/1597692-interpret-the-law-of-secured-transactions.
  • Cited: 0 times

CHECK THESE SAMPLES OF Interpret the law of secured transactions

Information Technology and Financial Services

IT & Financial Services Contents Introduction 3 Financial transaction 4 Information technology and its development 5 Introduction 5 Development 6 Security in the financial transactions 7 Conclusion 8 References 10 Introduction An individual or a member of a family needs to take decisions in order to budget their expenses.... For this, the needs of financial transactions arise on a regular basis.... Digitalization and introduction of information technology in the field of financial transactions help mankind to a great extent (Mann & Mann, 2011, p....
9 Pages (2250 words) Essay

Law of Electronic Commerce and the Internet

the law used to deal with the physical movement or presence that... (law institute Victoria, 2007). The Australian High court will have the primary duty of interpreting the laws according to the constitution.... The taxation, customs, trade practices, industrial law, bankruptcy, immigration, administration law, patents, copyright, environment law, sexual and racial discrimination, access to information will be dealt by Federal court of Australia....
10 Pages (2500 words) Essay

Commerce as the Transfer of Goods and Services

However, the security needs to be upheld to a given degree which is of dual function in that it doesn't impede on the efficiency of transactions and still it doesn't leave obvious holes to the hackers' advantage.... The seller's website needs to be well protected and secure against fraudsters and hackers but at the same time, the security components should not suffocate the website to a level that the efficiency of business transactions is impeded on.... The buyer has the obligation to identify his/her security objectives: there is need to know what it is that the seller needs to protect and what should be left open with considerable trust to enhance business transactions....
12 Pages (3000 words) Coursework

Communications and Networks Analysis

VAN - Value Added Network - a private/public network setup to transport the information of well-defined objects in a pre-defined standard format.... E.... .... XML, MARC21 or RFID formats for demand-supply chains, library automation system, product tracking. Intranet - Is the physical network of networking and computing systems spread in a building or across buildings of the same organization....
6 Pages (1500 words) Essay

Electronic Financial Transactions over the Internet

This paper looks into the various types of security threats facing electronic financial transactions, the potential damage they could inflict, the remedial measures to counter these threats.... In recent years the role and scope of the Internet have assumed new dimensions with the introduction of commercial transactions.... As a culmination of these parallel but complementary processes, e-commerce in general and electronic financial transactions, in particular, has firmly taken root in the mainstream global economy....
8 Pages (2000 words) Term Paper

Effect of Software Technology and Electronic Transactions

12), copyrights and the common law of confidence are better than patent (par.... The following paper “Effect of Software Technology and Electronic transactions” looks at electronic commerce, which is essentially global in character.... E-commerce and online transactions are made possible through the application of software technology.... The Copyright (Computer Software) Amendment Act (1985) was the first English law that provided protection to software (par....
8 Pages (2000 words) Assignment

E-commerce as a Popular Way of Doing Business

The researcher of this essay aims to analyze E-commerce, that is picking up as a popular way of doing business not only in the retail section but also in the banking section.... It entails doing business over the web in which the seller and the buyer are both connected via a web browser.... hellip; This report seeks to elaborate on the security aspect of e-commerce....
12 Pages (3000 words) Coursework

Systems Management and Security

This platform is used by both sellers and buyers to perform the basic transactions online without any delays or necessary paperwork.... The case study "Systems Management and Security " states that Standard Chartered is one of the leading international organizations in the banking sector....
8 Pages (2000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us