CA2362959A1 - A system and method for data processing of option/share pooling, and a method for conducting business - Google Patents

A system and method for data processing of option/share pooling, and a method for conducting business Download PDF

Info

Publication number
CA2362959A1
CA2362959A1 CA002362959A CA2362959A CA2362959A1 CA 2362959 A1 CA2362959 A1 CA 2362959A1 CA 002362959 A CA002362959 A CA 002362959A CA 2362959 A CA2362959 A CA 2362959A CA 2362959 A1 CA2362959 A1 CA 2362959A1
Authority
CA
Canada
Prior art keywords
security
set forth
sharing method
holder
risk sharing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002362959A
Other languages
French (fr)
Inventor
Dan Charash
Boaz Kaplan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BDD VENTURES Ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2362959A1 publication Critical patent/CA2362959A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

A risk sharing method that can be beneficial to employees of start-up companies, allows the pooling of shares or options to pool members (4), even when there is restriction on security transfer. The risk sharing method includes pooling securities in a database (1), evaluating them, and providing participants with stakes in the pool's proceeds based on the evaluations. On the occurrence of an exit, securities are sold and proceeds are distributed thereafter from Accounts of Proceeds From Exits (2). The closing of a pool occurs at a predetermined time, or upon the occurance of a predetermined event such as a maximum number of participants. The amount of securities is limited to a maximum number of participants. The amount of securities is limited to encourage loyalty of the employee to the company.

Description

A SYSTEM AND METHOD FOR DATA PROCESSING OF
OPTION/SHARE POOLING AND A METHOD FOR CONDUCTING
BUSINESS
BACKGROUND OF THE INVENTION
s Field of the invention.
The present invention relates generally to data processing systems, and in particular to a data processing system, method and method for conducting business for creating and managing a common pool of options and shares owned by individuals from different companies. Here, the term "share" is typically used ~o to refer to a share or an option to acquire a share. The concept of acquiring a share includes acquiring such share by way of the purchase thereof, as well as acquiring such share without the need to purchase (i.e., pay for) such share.
Here, the term "security" is typically used to refer to a share or an option to acquire a share. It will be appreciated that this is for the sake of linguistic convenience, and Is that where a distinction between share and option is necessary, it will be pointed out. The term "option" refers to an option to acquire a share, and includes the concept of a warrant to acquire a share. Also, it will be understood that references herein to "shareholder" or "security holder" generally refer equally to a holder of a share as well as a person who holds an option. Furthermore, as used zo herein, "security holder" usually refers to an employee, an ex-employee, a consultant, an ex-consultant, an adviser, an ex-adviser, a service-provider, an ex-service provider, or a founder (each, an "employee", and collectively, "employees") of a start-up company who holds securities in such start-up company. As used herein, "start-up company" refers to a company whose shares zs are not publicly traded.

Related work.
For many years, private (non-traded) companies, primarily high tech start-up and early-stage companies (collectively, "target companies") have been and are aiming to develop innovative and promising products in many fields. From a s statistical perspective, it is clear that many of such companies have not, and will not, succeed in their projects, for various reasons, such as, for example, technological, financing, marketing and sales barners, which need to be overcome in order to succeed from a business perspective.
As the need to finance the target companies has been growing rapidly and ~o substantially, venture capital funds and other professional investment vehicles and entities (each, a "VC", and in the plural, "VC's") have been established. VC's specialize in investing in those high-risk private companies at their earlier stages, before such companies succeed in effecting a public offering of their shares or a merger or acquisition transaction. The examinations which the quality VC's Is conduct, when checking such companies in order to contemplate an investment therein, are typically thorough and professional. Thus, from a statistical perspective, a start-up company in which a quality VC invests, is supposed to have a better probability of achieving success from a business perspective, as compared to private companies in which a quality VC has not invested. In zo addition to VC's, non-professional investors often invest in start-up companies.
Private companies often issue shares and/or grant options to acquire shares to their employees, as part of their compensation package. As a result, employees of start-up companies hold shares and/or options to acquire shares.
Options are attractive for many reasons. First, the option is a form of deferred zs payment that often provides tax benefits by allowing the optionee to control the time the income is derived, i.e. typically at the time of the exercise of the option and the conversion of such option into shares of the granting company. In addition, the provision of the opportunity to purchase shares in the company is considered an attractive mechanism to incentify the optionee to work hard in s promoting the company's business.
In many cases, the optionee employee is subject to various contractual terms and conditions which govern his options. These terms and conditions typically include a vesting period during which a fraction of the granted options become exercisable upon the expiration of each pre-determined period, provided io that the optionee continues to be employed by the granting company through the end of such period. In addition, the options generally set a per-share exercise price, i.e. a pre-determined sum which the optionee would be required to pay in order to convert his option into a shares) of the granting company. The terms and conditions which govern the employee options generally contain limitations on ~s transferability or sale of the options and underlying shares to others prior to the vesting of the options, termination terms and an expiration period. Other terms and conditions are also typically included.
However, not all target companies succeed or even survive, and only some of them can be considered a business success. In those many cases where the ao company fails from a business perspective, the options and shares of the employees are worthless once such failure becomes evident. On the other hand, those employees whose companies succeed may derive a cash profit from their shares and/or options. Such profit may be substantial, depending on the degree of success of the relevant company.
The reality is that only those employees whose company has succeeded, will derive a real return from their options and/or shares. In this respect, each employee is therefore totally dependent on the business success of the company for which he works.
Other methods of sharing risk have failed to address this problem, as will now be discussed.
The basic idea of the pooling of financial resources is known in banks, life insurance, pension funds and mutual funds. Over the years many variations of those have been adopted.
Pension plans.
The core idea of pension plans is the transferring of financial assets on a periodic basis (usually monthly) which will yield cash at the age of retirement.
Pension plans are highly regulated under specific legislation.
Pension plans have a goal of bolstering the future security and welfare of is the employee, and therefore generally invest in a low-risk portfolio, with the amount of risk typically limited by governmental laws. Securities in start-up companies have such high risk as to be generally unapproachable (or approachable in small quantities only) for pension plans.
Most of the investments by employees into pension plans are liquid assets.
zo The liquid assets are transferred in by the employees and/or the employers, and the management of the plan obtains securities in sufficiently secure companies.
This does nothing to help the employee of a start-up company with the high risk of the securities in his company.
Securities in a start-up company are non-liquid. Pension plans must have a substantial liquid portion because, at any given time, some of the plan participants should receive their pension.
A specific embodiment of a pension plan business model deals with the case whereby the employers transfer their own publicly traded shares or options into employee pension plans (US patent 5,806,047). This business model allows pension plans, which own employer's securities, to transfer the employers' securities into a combined pool. The pool management manages the combined portfolio, selling portions of the contributed stock and purchasing other financial ~o instruments to increase diversification.
The securities made available to security holders of start-up companies, however, are not in any way a pension plan. Such high risk securities could not readily be sold to satisfy periodic pension requirements, and thus do not satisfy the general requirements of a pension plan for liquidity of a high percentage of its ~ s assets.
Furthermore, pension plans are subject to restrictions which make it essential that the securities pooled be ones whose price can be determined every day (continuously) with reasonable precision. The value of shares of privately held companies is determined only in rare occasions, possibly years apart, such as zo a merger, acquisition or a round of financing.
Pension plans have thus been heretofore an unacceptable model for sharing risk in securities of start-up companies.
Venture Capital firms.
The core idea of a venture capital firm (VC) is to take money and to is transform it into shares of a plurality of start-up companies. Participants in start-up companies, however, have the need to transform shares / options of only one start-up company into a portfolio of various start-up companies. Thus, although VC's relate to start-up companies, they are not useful as a vehicle for employees of such companies to reduce risk.
Mutual funds.
A mutual fund is another model that has been unacceptable with respect to securities in start-up companies. A mutual fund usually invests in liquid assets such as publicly traded companies, bonds, foreign currencies, etc. Securities in start-ups are not liquid, however, and cannot be integrated within a mutual fund.
~ o An investor in a mutual fund can sell his holdings in the mutual fund every day, and thus realize his earnings. The non-liquidity of shares in a start-up company makes this another reason such shares are generally not held (or are held in small amounts only) by mutual funds.
The core idea of a mutual fund firm is to take money and transform it into ~s shares of companies. What is needed is some manner of taking the non-liquid securities in start-up companies and transforming them into something less risky.
SUMMARY OF THE INVENTION
It is the object of the present invention to provide a method and data processing system and method for conducting business for creating a common zo pool of options ("participating options") and shares ("participating shares") of multiple employees ("security holders") from different target companies, such that each pool security holder transfers to the pool a portion of his shares or options in his company, in return for a stake in the common pool. The transfer to the pool is effected by transfernng the shares or the options (as the case may be) zs to a management company, which will hold the shares or options (as the case may be) on behalf of the pool. In the preferred embodiment of the invention, the management company undertakes to sell the participating shares or shares underlying the participating options (as the case may be) in the event of an Exit (as defined below). In another embodiment, the management company would be s entitled to exercise discretion in determining the timing of the sale, and would not be required to effect such sale only in connection with an Exit. In the preferred embodiment, in those cases where the options/shares are not transferable/assignable at the time that the security holder joins the pool, the security holder would undertake to sell his participating shares or the shares ~o underlying his participating options (as the case may be) upon the earlier of: (i) the consummation of a transaction in which all or substantially all of the shares of the security holder's company are acquired by a third party in a single transaction or a series of transactions, (ii) within a pre-determined period following the consummation of a merger transaction in which such security holder receives ~s shares and/or options of a publicly-traded company in exchange for his participating shares, his participating options, or the shares underlying his participating options and such new shares or the shares underlying such new options (as the case may be) are not subject to any underwriter "lock-ups" and may be sold in the open market, free of any vesting provisions (in such case the zo shares to be sold are the shares of the new company received by the security holder or, in the event of a transfer or assignment to the pool, the pool), and (iii) within a pre-determined period (in the preferred embodiment this period is three months, but this may vary without prejudicing the invention presented herein) following the consummation of an initial public offering of shares of the security Zs holder's company and such security holder's participating shares and shares underlying such security holder's participating options are not subject to any underwriter "lock-ups" and may be sold in the open market, free of any vesting provisions. (Each of the events set forth in clauses (i), (ii) and (iii) above is referred to herein as an "Exit"). In another embodiment of the invention, in those s cases where the options/shares are not transferable/assignable at the time that the security holder joins the pool, the security holder would undertake to sell his participating shares or shares underlying his participating options (as the case may be) at such time as the management company instructs him to do so, provided that such shares may be sold without restrictions at such time. The pool security io holder would further undertake to transfer to the pool the proceeds of such sale within a certain pre-defined period, following the consummation thereof.
It is a further object of this invention to provide a method to define the relative stake of each of the pool security holders, at any point of time until the expiration of the life of the pool (in the preferred embodiment, the life of the pool is is ten years from the creation thereof, but this may vary without prejudicing the invention presented herein). The relative stake of each security holder is determined by taking into account various parameters, including the number of participating shares and participating options of such security holder as compared with the total number of participating shares and participating options in the pool, zo the value of each share of such security holder's company as compared with the value of the other participating shares and options prior to the "closing" of the pool, i.e. the point at which no new security holders are permitted to join the pool (such value may be determined based on the price-per-share paid by a pre-approved VC('s) in a recent substantial investment), the vesting terms of such Zs security holder's participating shares and/or participating options (as appropriate) _g_ as compared with the vesting terms of the other participating shares and participating options, any stock split or re-capitalization of the shares of such security holder's company after he joined the pool as compared with any stock split or re-capitalization of the shares of the other security holders' companies, s and the business status of his company during a certain period following the security holder's joining the pool, i.e. continuation or non-continuation of the company's existence as a "going concern" as compared with the continuation or non-continuation of the other companies' existence as a "going concern" within an equivalent period following the other security holders' joining the pool.
~o It is another object of the present invention to provide a method, data processing system , and method for conducting business for managing a common pool of options and shares of multiple employees from different target companies, such that the vested participating shares and shares underlying vested participating options would be sold by the pool or by the security holder, as the ~ s case may be, upon the occurrence of the first Exit, or at such other time as the management company will decide on a case-by-case basis. The proceeds of any such sales would be distributed among the pool security holders according to the relative stake each of them has at such time.
It is yet another object of the invention to provide a method of obligating zo the transfer of a security by a security holder when such transfer becomes permissible, in a situation in which the security holder is under an obligation preventing transfer of said security. According to the invention, an agreement is made with the security holder obligating him to undertake to transfer the security to the pool management (for purposes of realizing it and distributing the proceeds) Zs when he is no longer prevented from transferring the security.

The above and other objects of the invention are realized in a data processing system including controlling means directed to managing and tracking each security holders' commitments to the pool and his entitlement to receive proceeds from sales of participating shares and shares underlying participating options.
A unique and innovative characteristic of the invention is that it takes a very high-potential, high-risk asset (i.e. shares or options of a start-up company), and converts such asset into a lower-potential, lower-risk asset which statistically is designed to yield a mid-nice return, rather than a more binary result, i.e.
big ~ o success or nothing.
As such, the asset is designed to be a useful tool for employees holding shares or options in a target company who would like to decrease the risk while settling for a more modest, but more probable, return.
A system according to the invention described herein is different from ~ s pension plans, mutual funds, and VC firms in a variety of ways.
Contrast with pension plans.
Pension plans relate to periodic transfer of assets to realize returns upon retirement from a low-risk portfolio of publicly traded, substantially liquid assets;
the present invention deals with a one-time transfer of financial assets expected to zo yield cash within a few years from a high risk portfolio of non-publicly traded, non-liquid assets. Pension plans involve the acquisition of new assets in a long-term program, but the present invention involves closing participation and the planned selling of all assets without further acquisition.

Contrast with VC firms.
VC firms involve an investment of cash to be used in acquiring securities in start-up companies, whereas the present invention involves an investment of securities in start-up companies. The business model of a venture capital firm s includes three participants: 1) the investor that provides the money to the VC; 2) the VC that serves as a mediator between the investors and the investees (i.e., the start-up companies); and 3) the Start-up companies that receive investments from the VC. The model of the present invention, described in detail below, involves only two participants: 1 ) the members of the pool that hold options / shares of ~o their specific start-up companies; and 2) the management firm which manages the pool. Whereas the main role of a VC is to make investment decisions, the management company might make no investment decisions. VC's take an active role in the management of the portfolio companies, whereas the management company in the present invention has no role in the management of the assets of ~s its participants, nor on the management of the start-up companies.
The model set forth herein is the opposite model to the present activity of VC's, which invest real money (not shares and/or options) in high-potential, high-risk target companies. In the invented model, the employees utilize their participating shares and participating options in companies which are the subject Zo of the VC's investments, in order to convert them into real money based on an investment portfolio covering a wide range of target companies.
Contrast with mutual funds.
A mutual fund involves liquid assets such as publicly traded companies, bonds, foreign currencies, etc., but the present invention relates to assets that are zs non-liquid until an "exit". The core idea of a mutual fund firm is to take money and transform it into substantially liquid shares of publicly-traded companies, whereas, in the present invention, a participant transfers non-liquid securities in a start-up company into a portfolio of securities in various start-up companies.
Mutual fund managers make investment decisions; a management company as s described herein generally does not.
The foregoing and other objects and advantages of the invention will be more fully understood from the detailed description below, taken with the illustrative drawing figures.

~o FIG. 1 is an overall schematic view of the options/shares common pool management system of the present invention;
FIG. 2 is a flow diagram describing the steps for adding new options/shares to the common pool. This phase is referred to as the "new investments" process;
~s FIG. 3 is a flow diagram describing the steps for determining each security holder's stake determination ratio. That ratio is used to determine the security holder's stake in the common pool;
FIG. 4 is a flow diagram describing the steps for collecting proceeds deriving from sales of participating shares and shares underlying participating zo options , and distributing them among the security holders of the pool; and FIG. 5 is a flow diagram describing the steps for determining the security holder's entitlement to receive proceeds from the common pool.
DETAILED DE RIPTION OF THE PREFERRED EMBODIMENT
It will be understood that the invention may be realized not only in a zs method or process, but also a computer or data processing system and in a computer program product. For the sake of clarity, these terms will now be discussed.
Computer systems The term "computer system" is to be understood to include at least a s memory and a processor. In general, the memory will store, at one time or another, at least portions of an executable program code, and the processor will execute one or more of the instructions included in that executable program code.
It will be appreciated that the term "executable program code" and the term "software" mean substantially the same thing for the purposes of this description.
~o It is not necessary to the practice of this invention that the memory and the processor be physically located in the same place. That is to say, it is foreseen that the processor and the memory might be in different physical pieces of equipment or even in geographically distinct locations.
Computer program products ~s The above-identified invention may be embodied in a computer program product, as will now be explained.
On a practical level, the software that enables the computer system to perform the operations described further below in detail, may be supplied on any one of a variety of media. Furthermore, the actual implementation of the zo approach and operations of the invention are actually statements written in a programming language. Such programming language statements, when executed by a computer, cause the computer to act in accordance with the particular content of the statements. Furthermore, the software that enables a computer system to act in accordance with the invention may be provided in any number of forms zs including, but not limited to, original source code, assembly code, object code, machine language, compressed or encrypted versions of the foregoing, and any and all equivalents.
One of skill in the art will appreciate that "media", or "computer-readable media", as used here, may include a diskette, a tape, a compact disc, an integrated s circuit, a ROM, a CD, a cartridge, a remote transmission via a communications circuit, or any other similar medium useable by computers. For example, to supply software for enabling a computer system to operate in accordance with the invention, the supplier might provide a diskette or might transmit the software in some form via satellite transmission, via a direct telephone link, or via the ~o Internet. Thus, the term, "computer readable medium" is intended to include all of the foregoing and any other medium by which software may be provided to a computer.
Although the enabling software might be "written on" a diskette, "stored in" an integrated circuit, or "carried over" a communications circuit, it will be ~ s appreciated that, for the purposes of this application, the computer usable medium will be referred to as "bearing" the software. Thus, the term "bearing" is intended to encompass the above and all equivalent ways in which software is associated with a computer usable medium.
For the sake of simplicity, therefore, the term "program product" is thus zo used to refer to a computer useable medium, as defined above, which bears in any form of software to enable a computer system to operate according to the above-identified invention.
Thus, the invention is also embodied in a program product bearing software which enables a computer to perform a risk management process zs according to the invention described herein.

Operational floh~.
Refernng now to FIG. l, there is shown in overall scope an operational flow chart for implementing the options/shares common pool management system of the present invention. As therein depicted, the broad aspects of the system s include an options/shares account and database l, an account for handling the proceeds from the options/shares 2 and a data processor for managing both the database and the accounts 3. The pool security holders 4 manage their interactions with the pool through the various managers 5, 6, 7.
In the most basic embodiment of the present invention, the security holders ~0 4 transfer options/shares to the common pool 1 in return for a stake in the common pool. The data processor 3 determines the relative stake of each security holder. The dashed lines depict the flow of the options/shares and information.
Proceeds from options/shares are transferred to an additional account 2, and are distributed between the security holders. The solid lines depict the flow of the ~ s proceeds from the options/shares.
However, as illustrated in FIG. 1, the system of the present invention can be embodied in a more sophisticated manner. In the preferred embodiment, a management company 9 acts as the options/shares pool administrator. The management company includes managers for handling new investments 5 made zo by new and existing security holders 4. The term "investment" in this context refers to the addition of participating shares and/or participating options to the pool. The "new investment" process also involves the company 8 whose options/shares the security holder holds. We shall thereby refer to the company 8 as the "participant company". The participant company will supply information zs such as the per-share value of such security holder's participating shares or shares underlying such security holder's participating options at the time the security holder joined the pool (such value to be determined based on the price-per-share paid by a pre-approved VC('s) in a recent substantial investment), the vesting terms of his option plan, etc. The management company which organizes and s oversees the pool in exchange for a cash payment (which, in the preferred embodiment, is calculated as a percentage of the proceeds deriving from sales of participating shares or shares underlying participating options) in the event of an Exit 9 may require that those reports be confirmed by the participant company's 8 auditor or lawyer. A flow chart describing the "new investments" process appears io in FIG. 2, and will be discussed in detail later. All of the information gathered by the new investment managers 5 will be stored in the pool's database 1.
In the preferred embodiment, a security holder's reports and status manager 6 will communicate with the security holders 4 and the participant companies 8 to receive updated information. Information will be collected about ~ s any stock split or re-capitalization after the security holder joined the pool, the status of his entitlement to options of his company at any point of time, the business status of the participant company 8 during a certain period following the security holder's joining the pool, etc. All of the information gathered will be transferred to the pool's database 1.
zo Security holder information is stored in the pool's database 1. The information includes the security holder's identity, the participant company's identity and business status (i.e. whether the company continues to act as a "going concern" during a pre-determined period (in the preferred embodiment, this period is the one-year period following the security holder's joining the pool)), the zs amount of participating options and participating shares of such security holder, the mechanism of participation (i.e. the transfer/assignment of the shares/options or the undertaking of a contractual undertaking with respect thereto), the price-per-share values) of the security holder's participating shares or shares underlying participating options (as the case may be) at the time of the "closing"
s of the pool (i.e. the point at which no new security holders are permitted to join the pool), the vesting terms of the participating options and participating shares, the entitlement to options, the amount of proceeds collected from sales by such security holder in accordance with the rules of the pool ("pool sales"), the amount of proceeds transferred to the security holder in connection with pool sales of ~ o other security holders' participating shares and shares underlying participating options, and additional empty fields for uses that may arise in the future.
The database 1 will store each entry with the time of the entry, and the source of the information included in the entry. New and updated entries will be stored in addition to the old entries. No entries will be overrun, and all the current ~ s and past entries will remain accessible. The database can be embodied by a variety of memory devices (preferably, non-volatile devices), such as magnetic storage devices, semiconductor based storage devices, optical storage devices, and even printed paper. In the preferred embodiment, a magnetic storage device such as a RAID is used. Backups are made routinely and often on a memory storage zo media, such as compact disks, and are stored safely, for example outside the management company's premises.
The data processor 3 computes the stake of each security holder in the pool and controls the flow of options/shares/proceeds through the system. Flow diagrams describing those steps are included in FIG. 3, FIG. 4 and FIG. 5.
zs Processing is both time and event driven, for example when a new security holder joins it is event driven, and when the proceeds distribution dates are reached it is time driven. The proceeds distribution dates are pre-determined dates in which proceeds from the pool are distributed among the security holders. Those dates will be discussed in detail later. The data processor in the preferred embodiment s includes a central processing unit (CPU), a non-volatile memory storage device, and IO devices such as a keyboard, scanner, printer, modem, LAN, etc. A
desktop personal computer running under a suitable operating system is used in the preferred embodiment. The controlling program can be written in several suitable languages (e.g. Visual C++, Delphi, etc.) and is preferably compiled to an ~o executable program. Additional embodiments could utilize other configurations of hardware and software.
Referring back to FIG. 1, the mechanism of collecting and distributing the proceeds from the sales of participating shares and shares underlying participating options is shown schematically. The proceeds are collected from security holders ~s 4 in connection with pool sales. In the preferred embodiment, the transfer will be done through a manager 7 who will oversee the process. At pre-determined dates ("proceeds distribution dates"), the data processor 3 will determine the relative stake each security holder has at such time. Then the proceeds of such "exits"
will be withdrawn from the pool's account 2 and distributed among the pool security zo holders 4 according to the relative stake each of them has at such time.
The management company 9 will also receive a portion of the proceeds as a management fee.
Adding New Investments To The OptionslShares Pool The description set forth below with respect to "new investments" relates is only to the addition of new shares/options to the pool. This is in accordance with the preferred embodiment of the invention. It should be stated, however, that an additional embodiment would allow an investor to invest money (not shares or options) in an existing pool in exchange for a stake, to be determined based on the size of his investment as compared with the total value of the pool at the time of s his investment. In such case, the invested funds would be distributed among the then-existing security holders, who would benefit from an immediate cash return on their participation in the pool.
Following the schematic overview, we will now direct our attention to FIG. 2, which describes the steps for adding new investments to the options/shares ~o pool. This "new investments" process refers to the adding of new options/shares to an existing pool. Typically this process will commence when a candidate security holder wishes to join the pool (or add additional options/shares to his then-current participating shares and/or participating options (as the case may be)). This commencement is shown as 200 in FIG. 2. Therefore this process is ~s defined as an "event driven" process. The first step 201 is to check whether the "participant" company, whose options/shares the candidate security holder was granted, has received an investments) in the last 18 months. The second step is to check whether at least US$1.25 M of such investment was invested by pre-approved (quality) VC's. These two steps ensure that the participant company 2o was recently inspected by a quality VC, and was found worthwhile for a substantial investment; therefore, from a statistical perspective, such company should have a higher probability of achieving a business success, as compared to other private companies which have not consummated a recent substantial investment from quality VC's. The management company 9 will create and zs update the list of "approved VC's".

Other embodiments may include different investment requirements. For example, another embodiment is a pool specializing in "seed money" stage start-up companies. In this embodiment, the "substantial investment" may be defined as above 100 K$ for example (instead of above 1.25 M$ in the preferred s embodiment). Another example is an embodiment that will not be limited to investments from pre-approved VC's, but will also be open with respect to participant companies that received investments or other forms of funding from other sources such as private investors, investment banks, investment houses, government investments, investments by technological incubators, and ~o investments made by companies and universities. Another example is an embodiment that will not be limited to investments within the last 18 months but within a longer or shorter period, or that will not be limited to investments within a limited time period at all.
Continuing with FIG. 2, we will now direct our attention to the individual ~s candidate for membership. Step 203 verifies that the value of the participating shares or shares underlying the participating options that the candidate wishes to transfer is above $SK and below $75 K. The bottom limit is introduced in order to avoid dealing with small amounts, which is not worthwhile from the point of view of the management company. The upper limit is introduced in order to verify that zo no security holder can become rich solely from his holdings in the pool.
This protects the participant companies from security holders becoming rich and losing interest in working hard for the benefit of their companies. In another embodiment, step 203 may be discarded because of difficulties in evaluating the security holder's participating securities. Step 204 verifies that the security holder zs will transfer no more than 20% of his holdings in the participant company.
This mechanism assures that at least 80% of his holdings are still linked to the success of his participant company. This is designed to motivate the security holder to try and make his participant company a business success. In the case of a single security holder making multiple investments, all of the above-described steps refer s to the sum of his current and past investments.
Approval of the new investment 210 is given only if a positive output was received from all the previous steps 201,202,203,204. Otherwise the new investment is denied 280. In an additional embodiment the management company could exercise subjective discretion with respect to the acceptance or non-~o acceptance of a candidate security holder.
After the approval of the new investment 210, the new investment manager 5 and the security holder 4 will determine whether the participating options/shares are transferable/assignable in accordance with the terms and conditions governing such options/shares. If the options/shares are ~s transferable/assignable, then they will be transferred/assigned to the common options/shares pool 220. In those cases where the options/shares are not transferable/assignable at the time of joining, the security holder may undertake an undertaking to sell the participating shares and shares underlying the participating options in the event of an Exit, or otherwise in accordance with instructions it may zo receive from the management company, and transfer the proceeds to the management company in order to allow for the distribution thereof at a proceeds distribution date 230.
Other embodiments may include different acceptance criteria. For example, a value of participating shares or shares underlying participating options exceeding $ l OK and less than $1 SOK, and/or that the percentage of holding transferred to the pool is anything between 0.01-100% of the total holding.
Step 290 marks the end of FIG. 2 and refers us to FIG. 3.
Please note that the new investments manager 5 oversees the entire "new s investments" process.
Computing The Security Holder's Stake Determination Ratio Referring to FIG. 3, a flow diagram describing the stake determination algorithm is shown. The algorithm starts at step 300, which can be viewed as a continuation of step 290 from FIG. 2. The actual computations begin only after ~o the pool 1 has been closed for new investments 310. The pool will be closed to new investments either because an "event driven trigger" such as reaching a certain number of security holders in the pool, or because a "time driven trigger"
such as the arnval of a pre-determined date. In the preferred embodiment, the pool will close after fifty security holders have joined. In other embodiments this ~s number may be a larger number or a smaller number, provided however, that the number must be sufficiently large to ensure an adequate statistical basis.
Note that in the preferred embodiment, a limitation will be set such that only one security holder from every participant company will be allowed to join a certain pool.
This limitation is based on the desire for the pool to represent a wide range of Zo target companies, thereby increasing the statistical chances of achieving Exits. In other embodiments, this limitation may be revised ( e.g., a maximum of two security holders from every participant company may participate) or discarded.
The first step 301 is to load the appraised per-security value ("price-per-share" or PPS) of the security holder's participating shares or participating options zs at the time the security holder made his investment (as shown in FIG. 2).
The original price-per-share of a particular security will be referred to as the "original price-per-share" of such security. Later changes in the price-per-share may occur due to additional investments, stock splits or re-capitalizations. Changes in the "original price-per-share" of a security holder's shares/options may be accepted if he reports to the pool of those changes until such time as the pool is closed to new investments. This updated price-per-share will be referred to as the "updated price-per-share", and it is an optional mechanism, to be used at the security holder's discretion.
In a highly advantageous embodiment, the appraisal of the "price-per-~o share" (PPS) may be based, for example, on a "Black and Scholes" method for appraising the value of securities, as such method may be adapted and/or revised in order to take into account the lack of a trading market for the securities being appraised. Such method may take into account, for example, the price-per-share in the last financing round of the participant company, the exercise price, vesting ~ s terms, and other terms and conditions which apply to an option.
The Price Per Share ("PPS") 302 is the taken as either the "original price-per-share" or the "updated price-per-share", whichever is higher. This mechanism assures the security holder, that changes with respect to his company that occurred between his investment and the closing of the pool, will always work in his favor.
zo The PPS will be used as an auxiliary variable in the subsequent steps. In the preferred embodiment, the evaluation of the securities is performed before the pool is closed to participation by other securities holders. Although it is possible and foreseen that the evaluation of the securities could be delayed until only after the pool is closed to other participation by other security holders, it will be appreciated that participants may wish to know the evaluation of their securities before the closing of the pool. A pre-closing evaluation is thus preferred.
The Number Of Securities (NOS) 303 is defined as the total number of shares or the shares underlying options that the security holder has invested in the s common pool. This number includes both shares and options for shares. Shares and options are treated equally in this respect. In another embodiment, each security holder may invest different types of securities (i.e. shares and options), and each type of security will be assigned its own PPS. The NOS is not affected by the vesting terms, therefore options/shares that are not vested are treated ~o equally as compared with vested shares/options. The NOS also serves as an auxiliary variable, which indicates the full potential size of the security holder's investment, in terms of the number of shares.
Continuing to the next step 304, the theoretical monetary value of the security holder's investments is computed. This is the theoretical value at the ~s point of time that the pool has been closed for new investments. The Member's Initial Investment Value (MIIV) is that theoretical value. The MIIV is computed by multiplying the NOS by the PPS.
The Members Stake Determination Ratio (MSDR) is the theoretical stake that the security holder will have in the pool, if both he and all the other pool zo security holders will have all of their participating shares and participating options vested and valid when the proceeds are distributed. FIG. 4 and FIG. 5 both cover such issues and definition in detail . The MSDR is computed in step 370 by dividing the MIIV of the individual security holder by the sum of all the MIIV's of all of the pool security holders. Please note that the definition "all the pool is security holders" also includes the individual security holder himself.

In an additional embodiment the MSDR and/or MIIV are computed without first calculating the PPS and / or NOS. This approach is beneficial for security holders without accurate information about their securities, or without means to prove the reliability of such information. In those cases it may be s difficult to compute the PPS / NOS / NOES. An alternative approach is to use heuristics. For example every security holder participates with respect to 10%
of his respective securities, and the MIIV is determined as 1 for every participant.
This model is very naive, and can be greatly improved upon by taking into account information about the participating securities (absolute number or as a ~o percentage from the total securities per security holder or from the total securities of the company), information about the security holder (education, work experience, salary, job description, curriculum-vita, time of joining the participant company, organizational position etc.), information about the "participant"
company ( field of operation, financing information, business and R&D
~s milestones, subjective evaluation of the companies value and potential, etc.), and the relationship between all those factors at different time points (at the time of joining the pool, at the time of the security holder receiving his securities, etc.).
At step 380 all of the above mentioned values (MSDR, MIIV, NOS, PPS) are stored in the non-volatile database 1. The values are stored in the individual zo security holder's personal file, since all of such values are computed individually for each security holder. It is important to note that all of such values may vary from security holder to security holder. The only constant value is the sum of all the MSDRs of all the security holders, which is always equal to one.
Once all the values have been computed and stored, it is time to move on ?s to the proceeds collection and distribution phases 390.

Collecting And Distributing The Proceeds Refernng now to FIG. 4 we shall discuss the mechanisms for collecting and distributing the proceeds. The processes can be both "event-driven" or "time-driven". In the preferred embodiment, the collection is "event-driven" (E.g., after s "Exits" of participant companies), while the distribution process is "time driven"
(every six months). The beginning of the process is shown in step 400.
An "Exit" of the participant company will trigger a transfer of money from the security holder to the pool 401. The process of collecting the proceeds is supervised by the "proceeds from 'Exits' manager" 7, and will now be discussed ~o in detail.
Recall that in the "new investments" process, the security holder could either transfer/assign the options/shares to the pool 220 or undertake to transfer the proceeds in the event of a pool sale by such security holder 230. If the options/shares have been transferred to the pool 220, then the management is company 9 will sell them in connection with an Exit, or otherwise at the discretion of the management company. The proceeds will then be transferred to the "proceeds from 'Exits' pool account" 2. If the security holder has undertaken to sell his participating shares or the shares underlying his participating options, then the security holder will transfer the proceeds from his pool sale in connection with Zo an Exit or otherwise as instructed to sell by the management company to the pool's account 2.
Please note that because of various legal mechanisms (such as vesting terms), the security holder's participating shares and shares underlying his participating options may be subject to selling constraints. Whenever the security Zs holder is free to sell additional participating shares and shares underlying his participating options in connection with an Exit, then all of said shares must be sold immediately and the proceeds are transferred to the pool's account 2.
An additional embodiment will not require the security holder to sell all the participant shares immediately, if the shares that are not participant shares are still subject to selling constraints. In this additional embodiment, whenever the security holder is free to sell additional shares, then a certain proportional portion of shares must be sold from his overall holdings. We shall refer to that above-mentioned proportional portion of shares as the "pool's portion". The "pool's portion" is equal to the number of participating shares and shares underlying his ~o participating options divided by the total holdings in options/shares that the security holder had, at the time of joining the pool, in the participant company.
For example, if the security holder invested in the pool 2,000 shares, out of a total of 10,000 shares that he held in the participating company, at the time of joining the pool, then the "pool's portion" is 20%. In this example of the additional ~s embodiment, whenever additional shares are not subject to any underwriter "lock-ups" and may be sold in the open market, free of any vesting provisions, then 20%
of those shares must be sold and the proceeds must be transferred to the pool.
Please note that this paragraph is not part of the preferred embodiment, but rather an additional embodiment.
zo The exercise price of a security holder's participating options will be paid to his company by the security holder in order to exercise the option. The security holder will transfer to the pool the proceeds already net of any due payment or tax, if applicable. Therefore, effectively, the pool receives the proceeds as if there is no exercise price. In another highly advantageous embodiment, the pool za management will finance the payment of the exercise price by providing such payment to the security holder. This is best when the exercise terms of the options are incorporated into the evaluation process of the "price-per-share".
Refernng back to FIG. 4 the proceeds are collected in the proceeds account 410. The amount of proceeds collected, after the management company s deducts management fees, is deposited for the next periodical distribution among the security holders.
As previously mentioned, the distribution process is "time-driven"; in the preferred embodiment it is performed every six months. The first step in the distribution process is to load 411 the MSDR and NOS, which are stored in the ~o pool's database. Please recall that each security holder has different MSDR
and NOS values.
The next step 420 is to determine the Number Of Entitled Shares (NOES).
The Number of Entitled Shares is the number of shares (including shares underlying participating options) of such security holder that will be considered ~s when the proceeds are distributed. For example, if the security holder has lost all of his stake in the pool (for reasons explained in FIG. 5) then the NOES is zero.
The determination of the NOES is a complex process that will be discussed in detail later on with the assistance of FIG. 5.
Continuing with 421, the Member's Current Entitled Stake (MCES) is zo computed. The MCES holds no actual meaning and is just an auxiliary variable that is used later.
Continuing with 422, the Pool's Total Current Entitled Stakes (PTCES) is computed as the sum of the MCES's of all the pool's security holders. This too is just an auxiliary variable with no actual meaning. The PTCES will always be Zs equal to or smaller than one.

The actual amount of money that the security holder will receive from the proceeds distribution is computed in step 423. That amount is referred to as the Member's Entitled Amount of Proceeds (MEAOP). The MEAOP is computed by multiplying the total amount of proceeds for distribution (AOPFD) by the s individual security holder's current stake in the overall pool. That stake is computed by dividing the MCES by the PTCES. This mechanism takes into account factors such as different vesting terms, security holders who lose (fully or partially) their stake in the pool, etc. (see FIG. 5 for details).
Finally a portion of the proceeds (the MEAOP) is transferred to the ~o security holder 490. In the preferred embodiment, the money is transferred to the security holder's bank account. A printed report is also sent by mail (or E-mail) to notify him of this transfer. This transfer may represent a major benefit to the security holder, as he gets an actual monetary gain, even if is his own company failed and all of his options/shares are now utterly worthless.
~s Determining The Number OfEntitled Shares (NOES) Refernng now to FIG. 5 we shall explain the algorithm for determining the Number of Entitled Shares (NOES). The Number of Entitled Shares is the number of shares (including shares underlying participating options) of such security holder that will be considered when the proceeds are distributed. The Zo NOES represents an important aspect of the preferred embodiment, as it serves as a mechanism for dealing with the variable legal and business characteristics of the different security holders. The mechanism will become clear after reviewing the detailed descriptions set forth in the following paragraphs.

The process of determining the NOES starts at 500. Please recall that FIG.
represents a detailed explanation of step 420 of FIG. 4. Therefore it is actually an internal subroutine of the proceeds distribution process.
A preliminary step 501 of loading the NOS is performed. During this step s the file containing all the security holder's records is opened for easy future access.
The common options/shares pool includes a mechanism 510 that dismisses security holders whose participant companies, stopped functioning as a "going concern", within a year from the date the security holder joined the pool. The ~o purpose of this is to prevent employees of companies that are on the brink of bankruptcy/liquidation from joining the pool and enjoying proceeds collected from the other security holders, while contributing nothing.
The "going concern" status will be attributed to any company that is not involved in bankruptcy/liquidation proceedings, continues to employ at least four ~s full time employees and has not had a receiver appointed with respect to a material asset of the company. A "going concern" statement will be made by the participant company and certified by its auditor or lawyer. The statement will refer to its status with respect to being a "going concern" as of the date of the first anniversary of the participant joining the pool. The security holder's reports and zo status manager 6 will oversee this process. It will be understood that, in an embodiment of the invention, indications of continued operations other than a going concern statement will be used to fulfill this function, such as the minimum number of employees or a minimum predetermined amount of expenses per month.

Failure to comply with this requirement will result in the NOES being determined as zero 511. That means that the security holder will not be entitled to any proceeds from the pool.
Continuing with step 520, an additional mechanism is discussed. Before s the proceeds are distributed to a particular security holder, such security holder will have to prove that he is still entitled to his participating options/shares even if such options/shares remain subject to vesting or similar restrictions. In the preferred embodiment, the proof required is a letter signed by the participant company and confirmed by its attorney or accountant. The letter will be examined ~o by the security holder's reports and status manager 6, who will enter his approval to the member's database. The entry (like all the entries made by the management company's personnel) will include a time stamp. Such proof is required whenever proceeds are distributed (which is every 6 months in the preferred embodiment).
If the security holder has lost his entitlement to all of the participating ~ s options/shares which he received from his company, vested or unvested, the NOES will be determined as zero 521. This means that the security holder will not be entitled to any proceeds from the pool. Note that the NOES is re-computed whenever proceeds are distributed.
If the security holder has lost only part of the options/shares, then those zo lost options/shares will be treated as options/shares that have not been vested to the security holder. The mechanisms for dealing with such vesting issues are covered in the following paragraph.
Vesting terms are a common practice in employee options/shares plans, and are treated in the following step 530. The portion of participating zs options/shares that the security holder holds in the participant company and are already vested to him, at the time of the proceeds distribution, will be referred to as P VESTED. Please note that P VESTED is a fraction, so for example when 25% percent of the participating options/shares that the security holder holds in the participant company are already vested to him, the P VESTED is equal to s 0.25. Also note that the computation is done on the number of shares, and both shares and options to shares are treated identically The actual Number of Entitled Options (NOES) is the number of participating options that were already vested to the security holder and actual participating shares. The NOES can be computed by multiplying the NOS by i o P VESTED, as shown in step 531. In another embodiment, the issue of vesting may be dealt with by reflecting the relevant vesting provisions in the evaluation of the securities (e.g., the PPS in steps 301 and 302 ). In such other embodiment, steps 530 and 531 may be unnecessary.
Finishing the NOES determination algorithm is step 590, which stores the is NOES and returns the NOES to the calling program (which is described at FIG.
4).
Although a preferred embodiment of the invention has been disclosed for illustrative purposes, those skilled in the art will appreciate that many additions, modifications and substitutions are possible without departing from the scope and zo spirit of the invention. For example, a pool may be created for shares only, for options only, for vested shares/options only, for unvested options/shares only or for any similar sub-category or combination. In addition, the pool could be limited to shares/options of companies in a pre-determined field of activity or a combination of pre-determined fields of activity, such as biotechnology, Internet z, technology, computer technology, communication technology, etc.

It will also be appreciated that the method, method for conducting business and data processing system described hereinabove is not limited to a specific number of participants though it is especially suitable for a large number of participants.

Claims (117)

THERE IS CLAIMED:
1. A risk sharing method for securities of a plurality of companies, comprising:
pooling a first security by a first security holder of a first company and a second security by a second security holder of a second company not identical to said first company, said first security and said second security defining securities of a security pool;
making a first security evaluation relating to said first security;
making a second security evaluation relating to said second security;
providing to said first security holder a first stake in the proceeds of an exit of said first security and said second security based on said first security evaluation; and providing to said second security holder a second stake in the proceeds of an exit of said first security and said second security based on said second security evaluation.
2. The risk sharing method as set forth in claim l, wherein said step of pooling comprises:
making a pooling determination as to said first security; and approving said first security for said pooling only when said pooling determination is affirmative.
3. The risk sharing method as set forth in claim 2, wherein said step of making said pooling comprises making a determination as to whether said first company received an investment within a predetermined time period.
4. The risk sharing method as set forth in claim 2, wherein said step of making said pooling comprises making a determination as to whether said investment exceeded a predetermined amount from at least one of a set of investors meeting predetermined criteria, and making said pooling determination based on said determination.
5. The risk sharing method as set forth in claim 2, wherein said step of making said pooling comprises making a determination as to whether said first security has a value of at least a predetermined amount, and making said pooling determination based on said determination.
6. The risk sharing method as set forth in claim 2, further comprising making said determination based on also whether said first security has said value less than a predetermined limit.
7. The risk sharing method as set forth in claim 2, wherein said step of making said pooling comprises making a determination as to whether said first security represents less than a predetermined proportion of a holding of said first security holder in said first company, and making said pooling determination based on said determination.
8. The risk sharing method as set forth in claim 1, wherein said making of said first security evaluation precedes a step of closing said security pool to participation by additional security holders.
9. The risk sharing method as set forth in claim 8, wherein said closing of said security pool occurs when a predetermined number of security holders have a security in said security pool.
10. The risk sharing method as set forth in claim 9, wherein said predetermined number of security holders is selected on a statistical basis.
11. The risk sharing method as set forth in claim 8, wherein said closing of said security pool occurs in response to a time driven trigger.
12. The risk sharing method as set forth in claim 8, further comprising determining, at the election of said first security holder, said first stake based on an updated evaluation of said first security determined after said pooling of said first security and before said closing of said security pool.
13. The risk sharing method as set forth in claim 8, further comprising:
determining, for said first security holder:
a respective member initial investment value (MIIV) based on a respective number of securities (NOS) for said first security and an evaluation of each specific security of said first security;
a respective member stake determination ratio (MSDR) based on said respective MIIV for said first security holder and based on a respective MIIV for the other security holders;
storing said respective MSDR, MIIV, NOS, and said security evaluation values as first individual values for said first security holder; and computing and storing second individual values for said second security holder.
14. The risk sharing method as set forth in claim 13, further comprising receiving and distributing proceeds from said securities pool.
15. The risk sharing method as set forth in claim 14, wherein said step of distributing proceeds comprises:
determining, for each said security holder, a respective number of entitled shares (NOES);
determining, for each said security holder, a respective member current entitled stake (MCES) based on said respective individual values and said respective NOES;
determining, for said security pool, a pool total current entitled stake amount (PTCES); and determining, for each said security holder, a member entitled amount of proceeds (MEAOP) based on said proceeds and on said MCES and PTCES.
16. The risk sharing method as set forth in claim 15, wherein said step of distributing proceeds is performed on a predetermined periodic basis.
17. The risk sharing method as set forth in claim 15, wherein said step of determining said NOES comprises, for said first security holder:
setting said respective NOES to 0 when said first security holder is not entitled to hold or to exercise said first security ; and determining said NOES based on said respective NOS with respect to a proportion of said NOS already vested to said first security holder by said first company.
18. The risk sharing method as set forth in claim 17, further comprising setting said respective NOES for said first security holder to 0 in the absence, at a predetermined time, of an indication of continued operations by said first company.
19. The risk sharing method as set forth in claim 8, further comprising:
determining, for said first security holder:
a respective member initial investment value (MIIV);
a respective member stake determination ratio (MSDR) based on said respective MIIV for said first security holder and based on a respective MIIV for the other security holders;
storing said respective MSDR and MIIV values as first individual values for said first security holder; and computing and storing second individual values for said second security holder;
wherein said MSDR and MIIV are determined according to a heuristic approach.
20. The risk sharing method as set forth in claim 1, wherein said making of said first security evaluation occurs only after a step of closing said security pool to participation by additional security holders.
21. The risk sharing method as set forth in claim 20, wherein said closing of said security pool occurs when a predetermined number of security holders have a security in said security pool.
22. The risk sharing method as set forth in claim 21, wherein said predetermined number of security holders is selected on a statistical basis.
23. The risk sharing method as set forth in claim 20, wherein said closing of said security pool occurs in response to a time driven trigger.
24. The risk sharing method as set forth in claim 20, further comprising determining, at the election of said first security holder, said first stake based on an updated evaluation of said first security determined after said pooling of said first security and before said closing of said security pool.
25. The risk sharing method as set forth in claim 20, further comprising:
determining, for said first security holder:
a respective member initial investment value (MIIV) based on a respective number of securities (NOS) for said first security and an evaluation of each specific security of said first security;
a respective member stake determination ratio (MSDR) based on said respective MIIV for said first security holder and based on a respective MIIV for the other security holders;
storing said respective MSDR, MIIV, PPS, and NOS values as first individual values for said first security holder; and computing and storing second individual values for said second security holder.
26. The risk sharing method as set forth in claim 25, further comprising receiving and distributing proceeds from said securities pool.
27. The risk sharing method as set forth in claim 26, wherein said step of distributing proceeds comprises:
determining, for each said security holder, a respective number of entitled shares (NOES);
determining, for each said security holder, a respective member current entitled stake (MCES) based on said respective individual values and said respective NOES;
determining, for said security pool, a pool total current entitled stake amount (PTCES); and determining, for each said security holder, a member entitled amount of proceeds (MEAOP) based on said proceeds and on said MCES and PTCES.
28. The risk sharing method as set forth in claim 27, wherein said step of distributing proceeds is performed on a predetermined periodic basis.
29. The risk sharing method as set forth in claim 27, wherein said step of determining said NOES comprises, for said first security holder:
setting said respective NOES to 0 when said first security holder is not entitled to hold or to exercise said first security ; and determining said NOES based on said respective NOS with respect to a proportion of said NOS already vested to said first security holder by said first company.
30. The risk sharing method as set forth in claim 29, further comprising setting said respective NOES for said first security holder to 0 in the absence, at a predetermined time, of an indication of continued operations by said first company.
31. The risk sharing method as set forth in claim 20, further comprising:
determining, for said first security holder:
a respective member initial investment value (MIIV);
a respective member stake determination ratio (MSDR) based on said respective MIIV for said first security holder and based on a respective MIIV for the other security holders;
storing said respective MSDR and MIIV values as first individual values for said first security holder; and computing and storing second individual values for said second security holder;
wherein said MSDR and MIIV are determined according to a heuristic approach.
32. The risk sharing method as set forth in claim 1, wherein said security pool is restricted to only vested securities.
33. The risk sharing method as set forth in claim 1, wherein said security pool is restricted to only shares.
34. The risk sharing method as set forth in claim 1, wherein said securities are non-publicly traded securities or underlying securities pertaining to exercisable options.
35. The risk sharing method as set forth in claim 1, wherein said security pool is restricted to only options to acquire shares.
36. The risk sharing method as set forth in claim 35, wherein said options to acquire shares relate to only not publicly traded shares.
37. The risk sharing method as set forth in claim 1, wherein said first security holder is one or more of an employee, ex-employee, consultant, ex-consultant, adviser, ex-adviser, service provider, ex-service provider and founder of said first company.
38. The risk sharing method as set forth in claim 1, wherein said companies consist of start-up companies.
39. A computer program product for implementing a risk sharing method, comprising:
a computer readable medium, and instructions on said computer readable medium, adapted to enable a computer to implement:
pooling a first security by a first security holder of a first company and a second security by a second security holder of a second company not identical to said first company, said first security and said second security defining securities of a security pool;
making a first security evaluation relating to said first security;
making a second security evaluation relating to said second security;
providing to said first security holder a first stake in the proceeds of an exit of said first security and said second security based on said first security evaluation; and providing to said second security holder a second stake in the proceeds of an exit of said first security and said second security based on said second security evaluation.
40. The computer program product for implementing a risk sharing method as set forth in claim 39, wherein said step of pooling comprises:
making a pooling determination as to said first security; and approving said first security for said pooling only when said pooling determination is affirmative.
41. The computer program product for implementing a risk sharing method as set forth in claim 40, wherein said step of making said pooling comprises making a determination as to whether said first company received an investment within a predetermined time period.
42. The computer program product for implementing a risk sharing method as set forth in claim 40, wherein said step of making said pooling comprises making a determination as to whether said investment exceeded a predetermined amount from at least one of a set of investors meeting predetermined criteria, and making said pooling determination based on said determination.
43. The computer program product for implementing a risk sharing method as set forth in claim 40, wherein said step of making said pooling comprises making a determination as to whether said first security has a value of at least a predetermined amount, and making said pooling determination based on said determination.
44. The computer program product for implementing a risk sharing method as set forth in claim 40, further comprising instructions for making said determination based on also whether said first security has said value less than a predetermined limit.
45. The computer program product for implementing a risk sharing method as set forth in claim 40, wherein said step of making said pooling comprises making a determination as to whether said first security represents less than a predetermined proportion of a holding of said first security holder in said first company, and making said pooling determination based on said determination.
46. The computer program product for implementing a risk sharing method as set forth in claim 39, wherein said making of said first security evaluation precedes a step of closing said security pool to participation by additional security holders.
47. The computer program product for implementing a risk sharing method as set forth in claim 46, wherein said closing of said security pool occurs when a predetermined number of security holders have a security in said security pool.
48. The computer program product for implementing a risk sharing method as set forth in claim 47, wherein said predetermined number of security holders is selected on a statistical basis.
49. The computer program product for implementing a risk sharing method as set forth in claim 46, wherein said closing of said security pool occurs in response to a time driven trigger.
50. The computer program product for implementing a risk sharing method as set forth in claim 46, further comprising instructions for determining, at the election of said first security holder, said first stake based on an updated evaluation of said first security determined after said pooling of said first security and before said closing of said security pool.
51. The computer program product for implementing a risk sharing method as set forth in claim 46, further comprising instructions for:
determining, for said first security holder:
a respective member initial investment value (MIIV) based on a respective number of securities (NOS) for said first security and an evaluation of each specific security of said first security;
a respective member stake determination ratio (MSDR) based on said respective MIIV for said first security holder and based on a respective MIIV for the other security holders;
storing said respective MSDR, MIIV, NOS, and said security evaluation values as first individual values for said first security holder; and computing and storing second individual values for said second security holder.
52. The computer program product for implementing a risk sharing method as set forth in claim 51, further comprising instructions for receiving and distributing proceeds from said securities pool.
53. The computer program product for implementing a risk sharing method as set forth in claim 52, wherein said step of distributing proceeds comprises:
determining, for each said security holder, a respective number of entitled shares (NOES);
determining, for each said security holder, a respective member current entitled stake (MCES) based on said respective individual values and said respective NOES;
determining, for said security pool, a pool total current entitled stake amount (PTCES); and determining, for each said security holder, a member entitled amount of proceeds (MEAOP) based on said proceeds and on said MCES and PTCES.
54. The computer program product for implementing a risk sharing method as set forth in claim 53, wherein said step of distributing proceeds is performed on a predetermined periodic basis.
55. The computer program product for implementing a risk sharing method as set forth in claim 53, wherein said step of determining said NOES comprises, for said first security holder:
setting said respective NOES to 0 when said first security holder is not entitled to hold or to exercise said first security ; and determining said NOES based on said respective NOS with respect to a proportion of said NOS already vested to said first security holder by said first company.
56. The computer program product for implementing a risk sharing method as set forth in claim 55, further comprising instructions for setting said respective NOES for said first security holder to 0 in the absence, at a predetermined time, of an indication of continued operations by said first company.
57. The computer program product for implementing a risk sharing method as set forth in claim 46, further comprising instructions for:
determining, for said first security holder:
a respective member initial investment value (MIIV);
a respective member stake determination ratio (MSDR) based on said respective MIIV for said first security holder and based on a respective MIIV for the other security holders;
storing said respective MSDR and MIIV values as first individual values for said first security holder; and computing and storing second individual values for said second security holder;
wherein said MSDR and MIIV are determined according to a heuristic approach.
58. The computer program product for implementing a risk sharing method as set forth in claim 39, wherein said making of said first security evaluation occurs only after a step of closing said security pool to participation by additional security holders.
59. The computer program product for implementing a risk sharing method as set forth in claim 58, wherein said closing of said security pool occurs when a predetermined number of security holders have a security in said security pool.
60. The computer program product for implementing a risk sharing method as set forth in claim 59, wherein said predetermined number of security holders is selected on a statistical basis.
61. The computer program product for implementing a risk sharing method as set forth in claim 58, wherein said closing of said security pool occurs in response to a time driven trigger.
62. The computer program product for implementing a risk sharing method as set forth in claim 58, further comprising instructions for determining, at the election of said first security holder, said first stake based on an updated evaluation of said first security determined after said pooling of said first security and before said closing of said security pool.
63. The computer program product for implementing a risk sharing method as set forth in claim 58, further comprising instructions for:
determining, for said first security holder:
a respective member initial investment value (MIIV) based on a respective number of securities (NOS) for said first security and an evaluation of each specific security of said first security;
a respective member stake determination ratio (MSDR) based on said respective MIIV for said first security holder and based on a respective MIIV for the other security holders;
storing said respective MSDR, MIIV, PPS, and NOS values as first individual values for said first security holder; and computing and storing second individual values for said second security holder.
64. The computer program product for implementing a risk sharing method as set forth in claim 63, further comprising instructions for receiving and distributing proceeds from said securities pool.
65. The computer program product for implementing a risk sharing method as set forth in claim 64, wherein said step of distributing proceeds comprises:
determining, for each said security holder, a respective number of entitled shares (NOES);
determining, for each said security holder, a respective member current entitled stake (MCES) based on said respective individual values and said respective NOES;
determining, for said security pool, a pool total current entitled stake amount (PTCES); and determining, for each said security holder, a member entitled amount of proceeds (MEAOP) based on said proceeds and on said MCES and PTCES.
66. The computer program product for implementing a risk sharing method as set forth in claim 65, wherein said step of distributing proceeds is performed on a predetermined periodic basis.
67. The computer program product for implementing a risk sharing method as set forth in claim 65, wherein said step of determining said NOES comprises, for said first security holder:
setting said respective NOES to 0 when said first security holder is not entitled to hold or to exercise said first security ; and determining said NOES based on said respective NOS with respect to a proportion of said NOS already vested to said first security holder by said first company.
68. The computer program product for implementing a risk sharing method as set forth in claim 67, further comprising instructions for setting said respective NOES for said first security holder to 0 in the absence, at a predetermined time, of an indication of continued operations by said first company.
69. The computer program product for implementing a risk sharing method as set forth in claim 58, further comprising instructions for:
determining, for said first security holder:
a respective member initial investment value (MIIV);
a respective member stake determination ratio (MSDR) based on said respective MIIV for said first security holder and based on a respective MIIV for the other security holders;
storing said respective MSDR and MIIV values as first individual values for said first security holder; and computing and storing second individual values for said second security holder;
wherein said MSDR and MIIV are determined according to a heuristic approach.
70. The computer program product for implementing a risk sharing method as set forth in claim 39, wherein said security pool is restricted to only vested securities.
71. The computer program product for implementing a risk sharing method as set forth in claim 39, wherein said security pool is restricted to only shares.
72. The computer program product for implementing a risk sharing method as set forth in claim 39, wherein said securities are non-publicly traded securities or underlying securities pertaining to exercisable options.
73. The computer program product for implementing a risk sharing method as set forth in claim 39, wherein said security pool is restricted to only options to acquire shares.
74. The computer program product for implementing a risk sharing method as set forth in claim 73, wherein said options to acquire shares relate to only not publicly traded shares.
75. The computer program product for implementing a risk sharing method as set forth in claim 39, wherein said first security holder is one or more of an employee, ex-employee, consultant, ex-consultant, adviser, ex-adviser, service provider, ex-service provider and founder of said first company.
76. The computer program product for implementing a risk sharing method as set forth in claim 39, wherein said companies consist of start-up companies.
77. A computer system for implementing a risk sharing method, comprising:
a processor, and a memory holding instructions adapted to enable said processor to implement:

pooling a first security by a first security holder of a first company and a second security by a second security holder of a second company not identical to said first company, said first security and said second security defining securities of a security pool;
making a first security evaluation relating to said first security;
making a second security evaluation relating to said second security;
providing to said first security holder a first stake in the proceeds of an exit of said first security and said second security based on said first security evaluation; and providing to said second security holder a second stake in the proceeds of an exit of said first security and said second security based on said second security evaluation.
78. The computer system for implementing a risk sharing method as set forth in claim 77, wherein said step of pooling comprises:
making a pooling determination as to said first security; and approving said first security for said pooling only when said pooling determination is affirmative.
79. The computer system for implementing a risk sharing method as set forth in claim 78, wherein said step of making said pooling comprises making a determination as to whether said first company received an investment within a predetermined time period.
80. The computer system for implementing a risk sharing method as set forth in claim 78, wherein said step of making said pooling comprises making a determination as to whether said investment exceeded a predetermined amount from at least one of a set of investors meeting predetermined criteria, and making said pooling determination based on said determination.
81. The computer system for implementing a risk sharing method as set forth in claim 78, wherein said step of making said pooling comprises making a determination as to whether said first security has a value of at least a predetermined amount, and making said pooling determination based on said determination.
82. The computer system for implementing a risk sharing method as set forth in claim 78, further comprising instructions for making said determination based on also whether said first security has said value less than a predetermined limit.
83. The computer system for implementing a risk sharing method as set forth in claim 78, wherein said step of making said pooling comprises making a determination as to whether said first security represents less than a predetermined proportion of a holding of said first security holder in said first company, and making said pooling determination based on said determination.
84. The computer system for implementing a risk sharing method as set forth in claim 77, wherein said making of said first security evaluation precedes a step of closing said security pool to participation by additional security holders.
85. The computer system for implementing a risk sharing method as set forth in claim 84, wherein said closing of said security pool occurs when a predetermined number of security holders have a security in said security pool.
86. The computer system for implementing a risk sharing method as set forth in claim 85, wherein said predetermined number of security holders is selected on a statistical basis.
87. The computer system for implementing a risk sharing method as set forth in claim 84, wherein said closing of said security pool occurs in response to a time driven trigger.
88. The computer system for implementing a risk sharing method as set forth in claim 84, further comprising instructions for determining, at the election of said first security holder, said first stake based on an updated evaluation of said first security determined after said pooling of said first security and before said closing of said security pool.
89. The computer system for implementing a risk sharing method as set forth in claim 84, further comprising instructions for:
determining, for said first security holder:
a respective member initial investment value (MIIV) based on a respective number of securities (NOS) for said first security and an evaluation of each specific security of said first security;
a respective member stake determination ratio (MSDR) based on said respective MIIV for said first security holder and based on a respective MIIV for the other security holders;
storing said respective MSDR, MIIV, NOS, and said security evaluation values as first individual values for said first security holder; and computing and storing second individual values for said second security holder.
90. The computer system for implementing a risk sharing method as set forth in claim 89, further comprising instructions for receiving and distributing proceeds from said securities pool.
91. The computer system for implementing a risk sharing method as set forth in claim 90, wherein said step of distributing proceeds comprises:
determining, for each said security holder, a respective number of entitled shares (NOES);
determining, for each said security holder, a respective member current entitled stake (MCES) based on said respective individual values and said respective NOES;
determining, for said security pool, a pool total current entitled stake amount (PTCES); and determining, for each said security holder, a member entitled amount of proceeds (MEAOP) based on said proceeds and on said MCES and PTCES.
92. The computer system for implementing a risk sharing method as set forth in claim 91, wherein said step of distributing proceeds is performed on a predetermined periodic basis.
93. The computer system for implementing a risk sharing method as set forth in claim 91, wherein said step of determining said NOES comprises, for said first security holder:
setting said respective NOES to 0 when said first security holder is not entitled to hold or to exercise said first security ; and determining said NOES based on said respective NOS with respect to a proportion of said NOS already vested to said first security holder by said first company.
94. The computer system for implementing a risk sharing method as set forth in claim 93, further comprising instructions for setting said respective NOES
for said first security holder to 0 in the absence, at a predetermined time, of an indication of continued operations by said first company.
95. The computer system for implementing a risk sharing method as set forth in claim 84, further comprising instructions for:
determining, for said first security holder:
a respective member initial investment value (MIIV);
a respective member stake determination ratio (MSDR) based on said respective MIIV for said first security holder and based on a respective MIIV for the other security holders;
storing said respective MSDR and MIIV values as first individual values for said first security holder; and computing and storing second individual values for said second security holder;
wherein said MSDR and MIIV are determined according to a heuristic approach.
96. The computer system for implementing a risk sharing method as set forth in claim 77, wherein said making of said first security evaluation occurs only after a step of closing said security pool to participation by additional security holders.
97. The computer system for implementing a risk sharing method as set forth in claim 96, wherein said closing of said security pool occurs when a predetermined number of security holders have a security in said security pool.
98. The computer system for implementing a risk sharing method as set forth in claim 97, wherein said predetermined number of security holders is selected on a statistical basis.
99. The computer system for implementing a risk sharing method as set forth in claim 96, wherein said closing of said security pool occurs in response to a time driven trigger.
100. The computer system for implementing a risk sharing method as set forth in claim 96, further comprising instructions for determining, at the election of said first security holder, said first stake based on an updated evaluation of said first security determined after said pooling of said first security and before said closing of said security pool.
101. The computer system for implementing a risk sharing method as set forth in claim 96, further comprising instructions for:
determining, for said first security holder:
a respective member initial investment value (MIIV) based on a respective number of securities (NOS) for said first security and an evaluation of each specific security of said first security;
a respective member stake determination ratio (MSDR) based on said respective MIIV for said first security holder and based on a respective MIIV for the other security holders;
storing said respective MSDR, MIIV, PPS, and NOS values as first individual values for said first security holder; and computing and storing second individual values for said second security holder.
102. The computer system for implementing a risk sharing method as set forth in claim 101, further comprising instructions for receiving and distributing proceeds from said securities pool.
103. The computer system for implementing a risk sharing method as set forth in claim 102, wherein said step of distributing proceeds comprises:
determining, for each said security holder, a respective number of entitled shares (NOES);
determining, for each said security holder, a respective member current entitled stake (MCES) based on said respective individual values and said respective NOES;
determining, for said security pool, a pool total current entitled stake amount (PTCES); and determining, for each said security holder, a member entitled amount of proceeds (MEAOP) based on said proceeds and on said MCES and PTCES.
104. The computer system for implementing a risk sharing method as set forth in claim 103, wherein said step of distributing proceeds is performed on a predetermined periodic basis.
105. The computer system for implementing a risk sharing method as set forth in claim 103, wherein said step of determining said NOES comprises, for said first security holder:
setting said respective NOES to 0 when said first security holder is not entitled to hold or to exercise said first security ; and determining said NOES based on said respective NOS with respect to a proportion of said NOS already vested to said first security holder by said first company.
106. The computer system for implementing a risk sharing method as set forth in claim 105, further comprising instructions for setting said respective NOES
for said first security holder to 0 in the absence, at a predetermined time, of an indication of continued operations by said first company.
107. The computer system for implementing a risk sharing method as set forth in claim 96, further comprising instructions for:
determining, for said first security holder:
a respective member initial investment value (MIIV);
a respective member stake determination ratio (MSDR) based on said respective MIIV for said first security holder and based on a respective MIIV for the other security holders;
storing said respective MSDR and MIIV values as first individual values for said first security holder; and computing and storing second individual values for said second security holder;
wherein said MSDR and MIIV are determined according to a heuristic approach.
108. The computer system for implementing a risk sharing method as set forth in claim 77, wherein said security pool is restricted to only vested securities.
109. The computer system for implementing a risk sharing method as set forth in claim 77, wherein said security pool is restricted to only shares.
110. The computer system for implementing a risk sharing method as set forth in claim 77, wherein said securities are non-publicly traded securities or underlying securities pertaining to exercisable options.
111. The computer system for implementing a risk sharing method as set forth in claim 77, wherein said security pool is restricted to only options to acquire shares.
112. The computer system for implementing a risk sharing method as set forth in claim 111, wherein said options to acquire shares relate to only not publicly traded shares.
113. The computer system for implementing a risk sharing method as set forth in claim 77, wherein said first security holder is one or more of an employee, ex-employee, consultant, ex-consultant, adviser, ex-adviser, service provider, ex-service provider and founder of said first company.
114. The computer system for implementing a risk sharing method as set forth in claim 77, wherein said companies consist of start-up companies.
115. A method of obligating the realization of a security by a security holder, wherein said security holder is under an obligation preventing transfer of said security, comprising making an agreement with said security holder, said agreement obligating said security holder to undertake, when said security is a share, selling said security and then transferring proceeds of said sale to a security pool, and when said security is an option to acquire a share, exercising said option, selling the underlying share and transferring the proceeds thereof to said security pool, all in accordance with rules governing said security pool when said security holder is no longer prevented from transferring said security.
116. A method of obligating the transfer of a security to a security pool by a security holder, said security holder being under an obligation preventing transfer of said security, comprising making an agreement with said security holder, said agreement obligating said security holder to undertake to transfer said security to the pool management for realizing said security and distributing the proceeds therefrom in accordance with rules governing said security pool when said security holder is no longer prevented from transferring said security.
117. A method of risk sharing for a security holder of a start-up company, said security holder having securities of said start-up company, said method comprising:
undertaking a pooling transaction with respect to at least a portion of said securities, said pooling transaction relating to a security pool having securities from at least one other start-up company; and receiving from said pooling transaction a stake in proceeds of all securities in said securities pool.
CA002362959A 1999-03-29 2000-03-28 A system and method for data processing of option/share pooling, and a method for conducting business Abandoned CA2362959A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US12678499P 1999-03-29 1999-03-29
US60/126,784 1999-03-29
PCT/US2000/006433 WO2000058886A1 (en) 1999-03-29 2000-03-28 A system and method for data processing of option/share pooling, and a method for conducting business

Publications (1)

Publication Number Publication Date
CA2362959A1 true CA2362959A1 (en) 2000-10-05

Family

ID=22426642

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002362959A Abandoned CA2362959A1 (en) 1999-03-29 2000-03-28 A system and method for data processing of option/share pooling, and a method for conducting business

Country Status (4)

Country Link
EP (1) EP1212710A4 (en)
CA (1) CA2362959A1 (en)
IL (1) IL145407A0 (en)
WO (1) WO2000058886A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105556057B (en) 2013-10-22 2018-10-26 哈利伯顿能源服务公司 The hydraulic control of drill string tool

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5809484A (en) * 1993-10-08 1998-09-15 Human Capital Resources, Inc. Method and apparatus for funding education by acquiring shares of students future earnings

Also Published As

Publication number Publication date
IL145407A0 (en) 2002-06-30
EP1212710A4 (en) 2002-07-31
WO2000058886A1 (en) 2000-10-05
EP1212710A1 (en) 2002-06-12

Similar Documents

Publication Publication Date Title
US6112188A (en) Privatization marketplace
LoPucki et al. Bargaining over equity's share in the bankruptcy reorganization of large, publicly held companies
US7249075B1 (en) System and method for administering principal protected equity linked financial instruments
US5704045A (en) System and method of risk transfer and risk diversification including means to assure with assurance of timely payment and segregation of the interests of capital
US8595116B1 (en) System and method for setting up and managing retirement accounts of ETFs and index mutual funds
US20100094744A1 (en) Contracts exchange system
WO1996021903A9 (en) System and method for risk transfer and diversification through the use of assurance accounts
Perry A Model for Efficient Foreign Aid: The Case for the Political Risk Insurance Activities of the Overseas Private Investment Corporation
CA2362959A1 (en) A system and method for data processing of option/share pooling, and a method for conducting business
Riggs et al. Mutual Funds: A Banker's Primer
Loader Fund Custody and Administration
AUSTRALIA Information memorandum
Page et al. DATE: TO
Kroll et al. Fiduciary Responsibility and Prohibited Transactions Under ERISA
WO2003017164A1 (en) A system and method for data processing of option/share pooling, and a method for conducting business
Class et al. Financial highlights
WO2023020751A1 (en) Method of assets allocation and system thereof
Ackerman Innovative Uses of Employee Stock Ownership Plans for Private Companies
Kyle et al. On the Economics of Securities Clearing and Settlement
Audit et al. Investment Companies
Pianko et al. Special Issues Involving Broker-Dealers and Their Employee Benefit Plan Clients
Petersen Optimizing Retirement Funds: An Institutional Perspective
Certified Audits of Futures Commission Merchants, Introducing Brokers, and Commodity Pools
House PENSIONS TERMINOLOGY
Audit BENEFIT PLANS

Legal Events

Date Code Title Description
FZDE Discontinued
FZDE Discontinued

Effective date: 20060328