hemlock 0.1.6 → 0.1.7

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 2ce89ed44c176153a3c7794eb6b5622ff41a3f61
4
- data.tar.gz: c4ad7467b2c495dd49b64f6f35b0e19a5e41ca3d
3
+ metadata.gz: 923b9f9cb13d0b60fee08c277a83087397991b66
4
+ data.tar.gz: 2d182c8e339857ddd5e0945e61bc6a147e430332
5
5
  SHA512:
6
- metadata.gz: e1eb8b718dd653d0d377d26fd9ee69906b48f9cf58693f70fb13da413564157ddd67f9f3232ad10b6214174ae2b00534e18ce8476eac32427554ee8fcaf6887f
7
- data.tar.gz: 5d96d61a11cedee372e3e88e057e5ef9eec7c319c17990a66c4b009137c97ad7f0ea641e677cda1dcbfc23cce839338228043ae33c4b771ca35f5d8934609878
6
+ metadata.gz: aae24619e92ee0b08e6985bfde18916450b9a010da4b127944a78758e6dbc77ca35ee597488ebffee3cab49b01b43db0668238e9afe483388f6c3e82f8666e75
7
+ data.tar.gz: e004e8596fac03231dfe8c6c813222cc4dd4f2bc442d5aaf2f59b267c32dd61818280eca3b8ec04788dff96c1b5abce6a52d1c9e2abdc5005690f5b8446dc0b8
@@ -1,7 +1,7 @@
1
1
  PATH
2
2
  remote: .
3
3
  specs:
4
- hemlock (0.1.5)
4
+ hemlock (0.1.6)
5
5
  gli (= 2.9.0)
6
6
  rainbow (= 1.99.1)
7
7
 
@@ -1,3 +1,3 @@
1
1
  module Hemlock
2
- VERSION = '0.1.6'
2
+ VERSION = '0.1.7'
3
3
  end
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: hemlock
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.1.6
4
+ version: 0.1.7
5
5
  platform: ruby
6
6
  authors:
7
7
  - Nicholas Shook
@@ -68,7 +68,6 @@ files:
68
68
  - bin/hemlock
69
69
  - flashcards/Agency-Table 1.csv
70
70
  - flashcards/Commercial Paper-Table 1.csv
71
- - flashcards/Conflicts-Table 1.csv
72
71
  - flashcards/Conlaw-Table 1.csv
73
72
  - flashcards/Contracts-Table 1.csv
74
73
  - flashcards/Corporations-Table 1.csv
@@ -76,7 +75,6 @@ files:
76
75
  - flashcards/Partnership-Table 1.csv
77
76
  - flashcards/Professional Responsibility-Table 1.csv
78
77
  - flashcards/Property-Table 1.csv
79
- - flashcards/Secured Transactions-Table 1.csv
80
78
  - flashcards/Torts-Table 1.csv
81
79
  - hemlock.gemspec
82
80
  - hemlock.rdoc
@@ -1,9 +0,0 @@
1
- ,
2
- Full Faith and Credit Clause,"Another state’s decision must be recognized if 1) jurisdiction was propert in the court, 2) judgment was on the merits and 3) judgment was final. A decision can only be rebutted with a penal judgment or when the state was a plaintiff or if the judgment was incurred by extrinsic fraud, such as bribing a judge."
3
- Domicile,"An individual only has one domicile, which can arise by domicile by choice, or the physical presence and intent to be domiciled in that place or domicile by operation of law such as an infant or a mentally incompetent."
4
- Choice of Law,In issue is which state’s substantive law will govern the outcome of this litigation. It will be the law selected by the forum court using either the most significant relationship approach.
5
- Vested Rights Approach,"Under the vested rights approach the court will apply the law of the state mandated by the applicable vesting rule. This rule is selected according to the relevant substantive area of law, such as a tort, contracts, or real or personal property."
6
- Most Significant Relationship Approach,"Under the most significant relationship approach, the court will apply the law of that state which is most significantly related to the outcome of the litigation. The court will look at 1) the connecting facts and 2) certain polity principles."
7
- Connecting Facts,"Where did the facts occur and what are they, depends on the substantive area of law."
8
- Governmental Interest Approach,"Under the governmental interest approach, the court will apply its own law as long as it has a legitimate interest in the outcome of the litigation. If it does not, this is a false conflict case and it will apply the law of another state."
9
- Statute of Limitations,A forum will apply it’s own statute of limitations unless the forum borrows from a statute with a shorter time period or the statute conditions a substantive right.
@@ -1,18 +0,0 @@
1
- ,
2
- Governing law (Secured Transactions),Article 9 of the Uniform Commercial Code governs secure transactions in how they are attached and perfected.
3
- Secured Transaction,A secured transaction is a transaction intended to create a security interest in personal property or fixtures
4
- Security Interest,A security interest is an interest in personal property or fixtures which secures payment or performance of an obligation.
5
- Attachment,"Attachment refers to the legal process by which a secured party receives a security interest in collateral that is enforceable by law against the debtor. It is created through a 1) security agreement, 2) that the debtor gives value for, and 3) that the debtor has rights in the collateral subject to a security interest."
6
- Security Agreement,"A security agreement is an agreement between the debtor and the secured party that creates the security interest. The agreement must be 1) consensual, 2) that creates a conditional property right, 3) in described collateral."
7
- Perfection,Perfection refers to the legal process by which a secured party receives a security interest in collateral that is enforceable against any person.
8
- The 6 ways to perfect title ,"are 1) automatic perfection, 2) possession by a secure party, 3) control, 4) notation of lien on certificate of title, 5) filing a finance statement and 6) temporary perfection"
9
- Collateral,Collateral is property subject to a security interest
10
- Goods (for secured transactions),"1) Consumer Goods, 2) Farming Goods, 3) Inventory, 4) Equipment"
11
- Intangibles (for secured transactions),"1) Intangibles, 2) Chattel Paper, 3) Documents of Title, 4) Investment Property, 5) Accounts, 6) Deposit Accounts, 7) Commercial Tort Claims, 8) General Intangibles"
12
- Finance statement,"A financing statement is good for five years. If the secured party wishes to continue the financing statement, it must be filed within the last 6 months of the five year period. If the debtor relocates, the perfection is only good for four months and the secured party must re-file in the other state. If the property moves, the perfection is only good for 1 year before the secured party must file in another state. A financing statement must be filed with the secretary of state within 20 days and contain 1) the debtor’s name, 2) description of the collateral, 3) secured party’s name, 4) authentication by the debtor."
13
- A subsequent buyer of collateral,"A subsequent buyer of collateral is still subject to the security interest unless, the sale was authorized by the secured party for the interest not to attach or the sale was unauthorized in the course of business or in a consumer to consumer transaction, subject to the garage sale rule."
14
- Proceeds,"Proceeds are whatever is received upon the sale, exchange, collection or other disposition of collateral or proceeds."
15
- Intermediate Balance Test,"When proceeds are commingled with other funds in a deposit account, the lowest balance during time when funds are deposited to when the theist applied is the secured party’s identifiable proceeds."
16
- Sale of Collateral,"Must have reasonable notice, or at least 10-days notice given by the secured party to the debtor, and commercial reasonable. In Nevada there is a rebuttable presumption that the fair-market-value at the time of repossession was equal to the outstanding debt."
17
- Fixtures,"In order to file for perfection of a security interest in a fixture, the secured party must file in the office where a mortgage on the real estate would have been filed. If the debtor defaults, the secured party can repossess the fixture without being liable for any damages to the fixture."
18
- Accession,An accession is a good that is physically united with other goods in such a manner that the identity of the original goods is lost.