Site Meter

The Content of Veil Piercing Complaints

Dave Hoffman

Dave Hoffman is a James E. Beasley Professor of Law at Temple Law School. He specializes in law and psychology, contracts, and quantitative analysis of civil procedure. He currently teaches contracts, civil procedure, corporations, and law and economics.

You may also like...

5 Responses

  1. Lawrence Cunningham says:

    Dave,

    Great work. I was looking for exactly this when updating my Corporations casebook, which now relies on the old Bob Thompson study from Cornell L Rev.

    Thanks!

    Larry

  2. Dave Hoffman says:

    You could do worse! Bob’s paper is in the canon for a reason. Our inspiration, obviously, was from his work: we take his basic approach back a step in litigation and try to apply some more complex statistics. But the relevant factors of analysis are very similar.

  3. Greg Weston says:

    Besides the classic attack on limited liability corporate forms, plaintiffs sometimes have statutory shortcuts.

    For example, in my practice I utilize the Interstate Land Sales Full Disclosure Act’s creation of liability for “indirect” real estate developers who hide behind special purpose entities created to develop particular properties.

    Miami attorney Jared Beck has a discussion of this:

    http://beckandlee.wordpress.com/2008/06/02/reaching-for-the-deep-pocket-in-real-estate-litigation-does-the-interstate-land-sales-full-disclosure-act-ilsa-have-a-long-arm/

  4. Piercings says:

    I believe veil piercings is not a success and most of the people have disliked it.

  5. Dave Hoffman says:

    I would delete “piercings’s” spam comment, which originally linked to some commercial site. But I’m so happy to get comments on this work, and so impressed by how close the bot got to something a lawyer would say, that I decided to simply disable the link. Spam bots, I love you guys!

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

*
To prove you're a person (not a spam script), type the security word shown in the picture. Click on the picture to hear an audio file of the word.
Anti-spam image