Feeds

US regulators eye HPCom trade surge

Pre-deal jump

High performance access to file storage

A spike in 3Com options trading just hours before HP's $2.7bn cash takeover bid has caught the eye of US regulators, according to reports.

3Com's call trading surged to an astounding 26-month high on November 11 - four hours before the acquisition was disclosed after the market closed that day, Bloomberg said. Now the US Securities and Exchange Commission is looking into whether someone gleaned confidential information about the deal and illegally profited, the paper reports, citing an unnamed "person familiar with the matter."

Some stock watchers have been buzzing about a leaky HPCom deal based on the dubious jump in trading the evening the acquisition was first announced.

More than 8,000 3Com calls changed hands on November 11, which is 17 times the four-week average. Most were contracts conveying the right to purchase shares for $5 though the 20th, followed by December $5 calls, according to the WSJ.

HP proposed to buy 3Com at a price of $7.90 per share.

Also in the running to ankle HP's acquisition is a pair of shareholder lawsuits, filed in Delaware and Massachusetts, alleging the $2.7bn acquisition offer is an "unfair price."

The Delaware case, filed by New York attorney David Shaev on behalf of himself and 3Com shareholders, names the entire 3Com board of directors and accuses them of "attempting to deceive 3Com shareholders and unfairly deprive them of the true value of their investment in the company."

The Massachusetts case filed by Edward Tansey claims the 3Com board struck a deal "to meet their own personal objectives" rather than negotiate for the highest possible offer." It claims the deal is designed to "unlawfully divest" 3Com stockholders of their assets for a "grossly inadequate consideration."

Shareholder lawsuits demanding that a company hold out for more money are fairly common for any major acquisition, and nothing short of predictable in an enormous purchase like HP's offer for 3Com. ®

Top three mobile application threats

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Number crunching suggests Yahoo! US is worth less than nothing
China and Japan holdings worth more than entire company
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.