Why the Treasury's New Tax Inversion Tactics Miss the Mark

Before you go, we thought you'd like these...
Before you go close icon
France Burger King
Claude Paris/AP
Until April 15 approaches every year, it's hard for many Americans to pay much attention to tax issues. But the recent surge in the number of U.S. companies using a popular tax-cutting strategy known as a tax inversion has led to extensive controversy, with proponents of the strategy arguing that it's entirely legal while opponents worry about the loss of U.S. corporate tax revenue. Moreover, political fallout from having well-known companies like Burger King Worldwide (BKW), AbbVie (ABBV) and Medtronic (MDT) flee for foreign countries almost guaranteed that the U.S. government would take action.

Earlier this week, the Treasury Department finally fought back, with new rules designed to limit some of the most common ways that companies structure tax inversions, but they fail to address the deeper issue that led to the use of tax inversions and similar tax-saving devices in the first place.

What Tax Inversions Are and Why They're a Big Deal

The reason that tax inversions have generated so much controversy is that they effectively take away U.S. tax revenue without having much meaningful impact on the way a company does business. A tax inversion involves a U.S. company buying out a foreign company, with the resulting combined business taking the tax home of the foreign company. Because most foreign tax systems have lower tax rates on businesses than the U.S. corporate tax rate of 35 percent, major corporations can save billions of dollars over the long run by moving abroad.

Until now, moreover, it was relatively easy for companies to do tax inversions. Despite rules designed to limit their use, tax inversions involved huge U.S. companies merging with much smaller foreign companies. For instance, AbbVie is almost twice as big as its target, Shire, even after Shire shares soared following the buyout announcement. Medtronic has a similar size advantage compared to target Covidien (COV).

What the Treasury Did

In its notice to the public, the Treasury took a hard stance on trying to eliminate tax inversions. Treasury Secretary Jacob Lew characterized the new rules as "meaningfully reducing the economic benefits of inversions after the fact, and when possible, stopping them altogether."

The rules themselves are complicated, but they seek to make tax inversions harder to structure. One rule change essentially doubles the required size of the foreign target company, with potential adverse consequences if shareholders of the U.S. company own as little as 60 percent of the combined company's stock. Another prevents a U.S. company from using tactics like paying special dividends to reduce its relative size or moving assets into a foreign subsidiary that it then spins off to its shareholders. Other rules go beyond the tax inversion strategy, limiting the ability of companies to access cash from their foreign subsidiaries through loans.

Why the Treasury's Moves Aren't Enough

Yet critics were quick to note that the new rules don't go far enough. CNBC commentator Josh Brown pointed out that the rules do nothing to stop U.S. companies from accumulating assets in overseas subsidiaries and keeping them outside the U.S. indefinitely. Under current tax law, such moves never require the U.S. parent company to pay taxes on the foreign income.

Even the Treasury admits that these measures won't solve the true problem involved in enforcing U.S. tax rules in a global economy. As Lew said, "comprehensive business tax reform that includes specific anti-inversion provisions is the best way to address the recent surge of inversions," but the Treasury felt that taking what action it could now would be better than doing nothing.

More broadly, the global economy makes it easier than ever for companies to shop for countries that offer the best tax incentives. Just as U.S. companies routinely get large tax breaks from state and local governments that want to lure new business prospects to their areas, so too have entire nations sought the business of the largest multinational corporations, touting their much-lower corporate tax rates and the availability of legal tax laws to help them minimize their worldwide tax liability.

The Treasury's efforts to control tax inversions are an important first step. But without full-blown tax reform to align the U.S. foreign tax system with the rest of the world, the Treasury's move won't solve the larger problem and will instead give companies an incentive to find other innovative methods to cut their tax bills.

You can follow Motley Fool contributor Dan Caplinger on Twitter @DanCaplinger or on Google Plus. He has no position in any stocks mentioned. The Motley Fool recommends Burger King Worldwide and Covidien and owns shares of Medtronic. To read about our favorite high-yielding dividend stocks for any investor, check out our free report.

The 5 Worst Retail Data Breaches
See Gallery
Why the Treasury's New Tax Inversion Tactics Miss the Mark

Affected: 56 million cards.

Duration of compromise: Five months.

Tactic: Malware was installed to skim payment card data; unclear how hackers found an entry into the company's network.

Analysis: "Home Depot's situation is not only a PR nightmare for the home improvement colossus, but it is becoming the poster child for poor security practices across the board. Based upon the enormity of their footprint and alleged poor security, I'm mystified that it took as long as it did for them to be breached. Clearly, they did not heed Target's Paul Revere moment with sufficient urgency."

Affected: 40 million payment card numbers and 70 million other pieces of customer data; 98 million people.

Duration of compromise: Nov. 30 to Dec. 15, 2013.

Tactic: Used credentials of a heating, ventilating and air conditioning vendor to get into Target's network to install the malware to point of sale systems.

Analysis: "In a nation where everything is super-sized, Target (TGT) was one of the first true big-box retailers thrust into the spotlight after their mega breach. While a number of their executive team members have walked the plank and their board is the target of litigation, and their bottom line and share price have taken a hit, the breach highlights the importance of scrutinizing every vendor's security practices – or at least looking into cyber insurance to mitigate the damage of a vendor caused breach. This was a Paul Revere moment for the retail industry. Unfortunately, recently announced retail mega breaches indicate that not enough organizations have taken it as seriously as they should have."

Affected: As many as 200 of its grocery and liquor stores and millions of cards; credit/debit account information possibly stolen.

Duration of compromise: Almost one month.

Tactic: Network access to system that processes transactions.

Analysis: "Little information about this breach has surfaced, but one can only suspect the tactic was similar to that of other big breaches -- POS malware. And according to Avivah Litan, a fraud analyst at information technology firm Gartner, when someone uses a debit or credit card, there's a one in five chance malware is capturing that information. Although Supervalu  (SVU) execs say it's not clear if account information has been stolen, scary stats like this suggest otherwise."

Affected: 3 million customer credit and debit cards (they also had a breach in 2011 where skimmers were installed on about 70 POS systems and financial information was stolen). Affected systems contained certain payment card information, such as credit/debit card number and expiration date, about both Michaels and Aaron Brothers customers. The company says there is no evidence that other customer information, such as name, address or debit card PIN, was at risk in connection with this issue, however, current automated bank systems make it all to easy to change debit card pin numbers.

Duration of compromise: Two separate eight-month-long security breaches.

Tactic: POS malware.

Analysis: "Unfortunately, in the breach lottery Michael's hit the exacta -- old-school skimmers installed in the dead of night on their POS systems did the trick in the first breach, and the now-popular POS malware scorched them for a second time -- for 3 million. Two high-profile breaches in a couple of years isn't a goodwill builder for the craft giant."

Affected: Usernames and passwords of employees and users.

Duration of compromise: Unknown.

Tactic: The origin of the breach comes from hackers compromising a small number of employee log-in credentials, which gave access to eBay's (EBAY) corporate network. EBay says it is working with law enforcement and leading security experts to "aggressively" investigate the matter. Appears to be from a phishing email.

Analysis: "Sophisticated spear phishing scams can turn even the most savvy and sophisticated employee into an unwitting co-conspirator. Comprehensive, continuous security training for all employees, implementation of tough security protocols, use of intricate passwords and rigorous outside testing and monitoring can help avoid a reputation damaging breach."

Read Full Story

People are Reading