Key Takeaways
- The Model Timing Agreement governs the pace of the entire Second Request process and should be negotiated before custodian and search term discussions begin. Its terms directly determine the investigation's effective timeline.
- Search term and date range negotiations offer the most practical lever for reducing document volume. Hit rate analysis on sample custodian data is the most effective tool for demonstrating overbreadth and supporting a request for term modifications.
- Front-office engagement through white papers and economic submissions should run in parallel with document productions, not after them. Early advocacy shapes how the bureau staff frames the competitive analysis before the record is fully assembled.
- Divestiture remedy negotiations require the parties to identify and secure a qualified buyer before closing. Buyer approval timelines add significant post-consent order duration and must be incorporated into the merger agreement's outside date provisions.
An HSR Second Request is the Federal Trade Commission's or Department of Justice's tool for obtaining the information it needs to fully investigate a proposed merger that raises antitrust concerns. Unlike the initial HSR filing, which covers basic deal structure and financial data, a Second Request is a comprehensive demand for documents, data, and testimony covering the competitive dynamics of the relevant markets, the parties' internal assessments of the transaction's competitive effects, and the economic evidence bearing on whether the merger would substantially lessen competition.
This sub-article is part of the HSR Act Filings and Antitrust Merger Review in M&A: A Deal Lawyer's Field Guide. It covers the full arc of a Second Request investigation: recognizing the signals that a Second Request is coming before it is issued; understanding the anatomy of the specifications and what the agency is actually looking for; negotiating the Model Timing Agreement that governs the process; selecting custodians and coordinating with corporate counsel; negotiating search terms and date ranges to manage document volume; producing documents, maintaining a defensible privilege log, and deploying technology-assisted review efficiently; preparing for and conducting investigational hearings and depositions; certifying substantial compliance; securing scope reductions through modified Second Requests; engaging the front office and bureau through white papers and economic submissions; navigating consent order and divestiture remedy negotiations; and evaluating litigation posture when the agency moves to block.
Acquisition Stars advises acquirers and targets on HSR compliance and antitrust merger review strategy from initial filing through clearance or remediation. Nothing in this article constitutes legal advice for any specific transaction.
Signals That a Second Request Is Coming
Experienced antitrust counsel can often identify, before a Second Request is issued, whether a transaction is likely to receive one. The most reliable signal is horizontal overlap in a market segment where the combined shares of the parties exceed levels that historically draw scrutiny, typically above thirty percent combined share in a market the agency defines narrowly. But market share alone is not determinative. The agency also considers whether the parties compete directly for the same customers, whether internal documents reflect the parties' views of each other as competitive constraints, and whether third parties (customers, competitors, trade associations) have raised concerns with the agency during its initial review.
The agency's pre-Second Request contact with the parties is itself an indicator of investigative intensity. A request for a technical assistance meeting or a voluntary submission of additional information is not the same as a Second Request, but it signals that the staff is not yet satisfied with the initial filing materials and is developing a more detailed theory of competitive harm. If the agency reaches out to customers or competitors through informal interviews during the initial waiting period, that is a strong signal that a Second Request is likely, because the staff only invests in those interviews if it believes there is a cognizable competitive concern worth investigating further.
Counsel should begin Second Request preparation as soon as the transaction is announced for any deal involving horizontal overlap in a concentrated market. That preparation includes identifying likely custodians, anticipating the specification categories that will be issued (documents about competitive conditions, customer relationships, internal competitive assessments, pricing, and market analysis are invariably covered), preserving potentially relevant documents under a litigation hold, and developing the economic framework the parties will use to defend the transaction's competitive effects. Early preparation compresses the time between issuance and the ability to begin substantive scope negotiations, which is where the real leverage lies.
The agency's assignment of the investigation to a particular bureau or division is also informative. At the FTC, assignment to the Bureau of Competition's Mergers IV division (which handles healthcare) or Mergers I or II (which handle technology and general commercial matters respectively) carries different implications about the staff's familiarity with the relevant market dynamics. At the DOJ, assignment to the Antitrust Division's relevant industry section similarly signals which economic and legal frameworks are likely to guide the analysis.
Anatomy of a Second Request Specification
A Second Request is organized into definitions, instructions, document requests (specifications), and interrogatories. The definitions section establishes the meaning of key terms used throughout the document, including the scope of "documents" (which typically covers all forms of electronically stored information and hard copy materials), the time period covered by the request (typically five to seven years prior to the filing date), and the identity of the parties and their affiliates. The definitions are drafted broadly, and many scope negotiations begin with challenging overly inclusive definitions.
The instructions section specifies the format requirements for document productions, including the electronic format (typically TIFF images with extracted text and metadata in a specified load file format), the privilege log format and required fields, the method for designating materials as confidential under the agency's protective order, and the procedure for asserting objections. Instructions also address how to handle documents that exist in foreign languages, how to treat custodians outside the United States, and how to handle third-party materials that are subject to confidentiality agreements. Compliance with the instructions is not negotiable in the same way that substantive scope is, but the parties can seek clarification on format requirements that are ambiguous or technically impractical.
The specifications themselves are organized into thematic categories that track the agency's competitive analysis framework. Category one typically covers documents about the relevant product or service markets, including how the parties and their competitors define and segment the market. Category two covers competitive conditions, including the parties' views of their competitors, customer switching behavior, and pricing dynamics. Category three covers internal assessments of the proposed transaction, including board presentations, management analyses, and any documents that discuss the competitive effects of the combination. Category four covers customer and supplier relationships, including pricing data, contracts, and communications. Categories five and beyond may cover regulatory filings, financial data, and specific geographic markets.
The interrogatories require the parties to provide structured factual responses to specific questions about market participants, competitive conditions, and the transaction's rationale. Interrogatory responses are sworn, which means they must be reviewed with the same care as deposition testimony. Errors or omissions in interrogatory responses can be used by the agency's staff to challenge the credibility of the parties' advocacy submissions later in the investigation.
The Model Timing Agreement
The Model Timing Agreement (MTA) is the contract between the parties and the reviewing agency that establishes the schedule for the Second Request compliance process and the agency's subsequent review. The MTA supersedes the statutory waiting period framework for purposes of determining when the agency must make its clearance decision, and its terms directly determine how long the investigation will last from issuance to resolution.
The MTA's core provisions establish the deadline by which the parties will certify substantial compliance, the period the agency has after certification to review the production and issue a decision, and the conditions under which the MTA can be extended. A standard MTA might give the parties ninety to one hundred twenty days from issuance to certify substantial compliance and give the agency sixty to ninety days after certification to complete its review. Those timelines can be adjusted through negotiation, and the parties' leverage in those negotiations depends on how urgently they need to close, how cooperative they have been in the pre-MTA scope discussions, and whether the agency is under institutional time pressure.
The MTA also typically contains provisions addressing the schedule for investigational hearings, the timing of any remedy discussions, and the protocol for front-office meetings. If the parties want the opportunity to present their competitive analysis to senior agency leadership before the staff makes a recommendation, the MTA should include a provision guaranteeing that meeting. Without an explicit MTA provision, the agency's front office has no obligation to meet with the parties before the staff issues its recommendation.
The MTA negotiation is also the appropriate moment to raise the possibility of a modified Second Request, discussed in more detail below. If the parties believe the initial specifications are overbroad, agreeing to a modified production schedule in exchange for a more targeted scope can shorten the compliance period and reduce the total cost of the investigation. Agreeing to ambitious compliance timelines without first securing scope modifications can lock the parties into a production obligation they cannot meet without enormous cost.
Custodian Selection and Counsel Coordination
The agency's initial custodian list is based on its review of the HSR filing materials, public information about the transaction, and the agency's general knowledge of how businesses in the relevant industry are organized. The list typically names senior executives (CEO, CFO, Chief Strategy Officer, General Counsel, heads of the relevant business units), salespeople and account managers who work directly in the competitive overlap, product development and pricing personnel, and any individual the agency has identified as having made public statements about the competitive significance of the deal.
Custodian negotiations proceed in parallel with search term and date range negotiations. The parties' initial response should be a custodian-by-custodian analysis of the relevance of each named individual's role to the competitive issues in the investigation. For individuals who are clearly relevant (the head of the business unit that directly competes with the other party), the argument is not for elimination but for date range limitations. For individuals who are tangentially relevant (a regional sales manager in a geography that is not part of the competitive overlap), the argument is for outright elimination from the custodian list.
Coordination between outside antitrust counsel and corporate counsel is essential during the custodian selection phase. Corporate counsel understands the organizational structure and can identify which custodians are likely to have genuinely relevant documents versus those who are named because of title rather than function. Outside counsel understands the agency's competitive theory and can map the custodian list to that theory, identifying arguments for exclusion based on the mismatch between a custodian's role and the specific competitive issues the agency is investigating.
The parties should also identify potential additional custodians who are not on the agency's initial list but whose documents may be highly relevant to the investigation. Proactively adding custodians whose materials support the parties' competitive narrative can be a credibility-building move, demonstrating cooperation and allowing the parties to shape the record by ensuring that materials favorable to their position are included in the production.
Search Terms and Date-Range Negotiations
Search terms define the universe of documents that will be collected from each custodian and reviewed for production. The agency typically provides initial search term proposals alongside the Second Request, and those proposals are almost always broader than necessary to capture genuinely relevant materials. Common overbreadth problems include terms that use generic product or service names as standalone search strings (capturing every document that mentions the word regardless of context), proximity operators that are too wide (identifying documents where two terms appear within fifty words of each other rather than in the same sentence), and date ranges that extend back further than the period in which the relevant competitive conditions were established.
Hit rate analysis is the most powerful tool for negotiating search term modifications. By running the proposed terms against a sample of custodian data and generating a hit rate report showing what percentage of documents are captured by each term, counsel can demonstrate empirically which terms are producing predominantly irrelevant results. Terms with hit rates above seventy percent are generally producing too many documents to be useful as a filter. The hit rate analysis provides an objective basis for proposing modifications: narrowing a term by adding a proximity connector, requiring co-occurrence with another relevant term, or limiting the term to specific file types or communication channels.
Date range negotiations often focus on the period most relevant to the competitive analysis. The agency typically requests documents covering five to seven years, but the competitive conditions in many markets change rapidly and documents from the early portion of the requested period may have minimal relevance to current competitive dynamics. Arguments for date range limitations are strongest when the parties can demonstrate that the market structure, the competitive set, or the products at issue changed materially during the requested period, making early-period documents poor indicators of current competitive conditions.
Technology-assisted review (TAR) can be deployed after initial collection to further reduce the review burden by using a machine-learning model trained on a seed set of reviewed documents to prioritize the review queue. The agency's acceptance of TAR methodologies varies by office and by staff, and the parties should address the acceptability of TAR and the required validation protocol in the MTA rather than assuming it will be permitted. Some agency offices require the parties to disclose the TAR vendor, the seed set methodology, and the recall and precision metrics achieved before accepting a TAR-assisted production as compliant.
Document Productions, Privilege Logs, and TAR
Document productions in a Second Request investigation are typically made in rolling waves over the course of the compliance period, with early productions covering higher-priority specifications and later productions covering the full responsive universe. Rolling productions allow the agency's staff to begin their review before the compliance period ends and can shorten the post-certification review period if the staff has already processed a significant portion of the materials. The production schedule should be coordinated with the agency's preferences, as some offices prefer front-loaded productions while others prefer a single comprehensive production at the end of the compliance period.
Privilege log preparation is a significant undertaking in a Second Request investigation. The log must identify each withheld document with sufficient specificity to allow the agency to evaluate the privilege claim without disclosing the privileged content, including the date, author, recipients, document type, and a description of the subject matter that reveals enough to assess the privilege without waiving it. Attorney-client privilege and work product protection are the primary bases for withholding documents, but common interest privilege (for communications between co-parties in a transaction or among counsel for parties with aligned legal interests) may also apply to certain transaction-related communications.
The privilege log must be internally consistent. A communication logged as privileged because it reflects legal advice must actually reflect legal advice from an attorney acting in a legal capacity, not business advice from an attorney acting in a business role. Agency staff review privilege logs carefully and will challenge entries that appear to sweep in non-privileged business communications. A privilege log challenge can result in an in camera review by the agency's staff or, in extreme cases, a court order compelling production of improperly withheld documents.
Clawback provisions in the protective order governing the investigation should be negotiated to include Federal Rule of Evidence 502(d) language providing that inadvertent production of privileged materials does not constitute a waiver of privilege in the investigation or in any other proceeding. Without a strong clawback provision, an inadvertent production of a privileged communication can create waiver arguments that significantly expand the scope of the required privilege log and potentially require production of additional communications on the same subject.
Investigational Hearings and Depositions
Investigational hearings (IHs) are sworn testimony sessions conducted by the FTC under Section 9 of the FTC Act, the agency's administrative investigational authority. At the DOJ, the equivalent process is a formal Civil Investigative Demand (CID) for testimony. Both processes produce a sworn transcript that becomes part of the investigative record and can be used by the agency as evidence in subsequent administrative or court proceedings.
Witness selection and preparation are among the highest-stakes decisions in a Second Request investigation. The agency typically requests testimony from senior executives with knowledge of the competitive overlap (the head of the relevant business unit, the Chief Strategy Officer who led the transaction analysis) and from individuals whose documents have been identified in the review as particularly relevant or potentially problematic. Counsel should prepare witnesses to testify accurately and consistently with the documents in the record, because inconsistencies between testimony and documents are one of the agency's primary tools for challenging the credibility of the parties' competitive narrative.
Preparation for an investigational hearing should include a thorough review of the witness's custodial documents before the session, identification of the documents the agency's staff is most likely to use as exhibits, and extensive mock examination covering the competitive issues in the investigation. The witness should understand the agency's theory of harm and be prepared to address it directly rather than deflecting. A witness who appears evasive or unfamiliar with their own organization's competitive strategy can significantly damage the parties' advocacy position.
Counsel can be present at investigational hearings and can object to questions on privilege grounds, but cannot instruct the witness not to answer a non-privileged question. The hearing record is confidential during the investigation but can become public in litigation. The parties should assume that any significant testimony will eventually be available to the agency in subsequent proceedings and prepare accordingly.
Certifying Substantial Compliance
Substantial compliance certification is the procedural step that restarts the HSR waiting period and triggers the agency's post-certification review clock. The certification is a sworn statement by an officer of each party that the party has complied in all material respects with the Second Request's requirements. Substantial compliance does not require perfect compliance; the standard permits the parties to certify even if minor categories of documents have not been produced, provided the certification accurately reflects the state of compliance and the omissions are disclosed.
The decision to certify substantial compliance is a legal judgment that requires careful review of the production record against each specification. Counsel should prepare a specification-by-specification compliance matrix documenting what was produced in response to each request, identifying any specifications for which the production is incomplete, and assessing whether the identified gaps are material. A certification that overstates the completeness of the production can expose the certifying officer to false statement liability and can result in the agency's staff challenging the certification and demanding additional productions before it accepts the compliance clock as running.
The agency's acceptance of a substantial compliance certification is not automatic. Agency staff may review the certification, compare it to the volume and scope of materials received, and request supplemental productions or clarifications before confirming that the post-certification review clock has started. Counsel should maintain open communication with the staff during the post-certification period to address any questions about the production's completeness before they escalate into a formal challenge to the certification.
The post-certification review period is also the time during which the agency's economic staff is most intensively analyzing the quantitative evidence: pricing data, customer switching records, internal rate of return analyses, and any third-party market data produced in the investigation. Counsel should anticipate the economic arguments the staff is likely to make based on this data and prepare responsive economic submissions that can be delivered during the post-certification period while the staff's analysis is still being formulated.
Modified Second Requests and Scope Reduction
A modified Second Request is a formal agreement between the parties and the agency to limit the scope of the original Second Request in exchange for the parties' commitment to comply with the modified scope on an accelerated timeline. Modified Second Requests are negotiated by agreement rather than imposed by either party, and they represent a middle ground between full compliance with the original specifications (which can take a year or more and cost millions of dollars) and a litigation challenge to the Second Request's enforceability.
The scope reductions available in a modified Second Request are driven by the agency's assessment of what information it actually needs to complete its competitive analysis. If the agency's core theory of harm focuses on three specific product categories within a broader specification covering all of the parties' business lines, the agency may be willing to narrow the specifications to focus exclusively on those three categories in exchange for faster compliance. The parties' ability to articulate a clear and credible competitive narrative explaining why certain specifications are not necessary to the agency's analysis is the key to securing meaningful scope reductions.
Scope reduction negotiations should be conducted at the staff level initially, with the parties presenting a written proposal identifying the specific specifications they believe are overbroad, the basis for that assessment (hit rate data, relevance analysis, competitive theory mismatch), and the proposed modified scope that would adequately address the agency's legitimate information needs. Staff-level agreement on scope reductions should be memorialized in writing, because informal understandings about what needs to be produced can evaporate as the investigation proceeds and different staff members become involved.
The timing of scope reduction requests matters. Requests made early in the compliance period, before significant document collection has begun, offer the most cost savings because they can prevent the collection and review of entire custodian data sets. Requests made after collection is complete but before review begins can still reduce review costs. Requests made after most of the review is complete offer minimal savings but may still be worth pursuing if they reduce the privilege log burden or eliminate specifications covering sensitive business information the parties prefer not to produce.
Front-Office Engagement and White Papers
Front-office engagement refers to the parties' advocacy directed at senior agency leadership, specifically the FTC's Bureau of Competition Director and Deputy Directors or the DOJ Antitrust Division's Assistant Attorney General and senior advisors, rather than the staff-level attorneys and economists conducting the day-to-day investigation. Front-office engagement is most effective when the parties have a strong substantive argument that the transaction does not raise competitive concerns, and when that argument can be presented coherently at a high level without requiring the front office to work through the full record.
White papers are the primary vehicle for front-office advocacy. A white paper is a structured written submission presenting the parties' competitive analysis, typically organized around the agency's standard merger review framework: market definition, competitive effects, counterfactual analysis, efficiencies, and entry conditions. A well-constructed white paper leads with the parties' strongest argument, supports that argument with data from the production record and publicly available sources, and anticipates and addresses the agency's most likely counterarguments. White papers should be calibrated to the audience: front-office readers have deep antitrust expertise and can identify superficial arguments quickly, so submissions that do not engage seriously with the competitive concerns are counterproductive.
The timing of white paper submissions is important. Submissions made during the production period can help shape the staff's analysis before the record is fully assembled. Submissions made after the post-certification review has begun should respond specifically to any competitive concerns the staff has communicated through the investigation process, including questions asked at investigational hearings, supplemental information requests, and informal conversations with the parties' counsel.
Expert economic testimony and analysis submitted to the front office can be particularly persuasive when the parties' competitive position turns on econometric questions, such as the definition of the relevant geographic market, the calculation of diversion ratios between the parties' products, or the expected efficiencies from the combination. Engaging a recognized antitrust economist to prepare a white paper or declaration for front-office submission signals that the parties have confidence in their analysis and are prepared to defend it rigorously.
Consent Orders and Divestiture Remedies
When the agency concludes that a transaction raises competitive concerns but that those concerns can be remedied through structural or behavioral conditions, it will propose a consent order as an alternative to litigation. Structural remedies, typically the divestiture of a business unit or product line that creates the competitive overlap, are the agency's preferred remedy because they eliminate the competitive concern through a market-based solution rather than relying on ongoing regulatory oversight. Behavioral remedies, such as supply obligations, licensing requirements, or firewall conditions, are used when structural remedies are not feasible or would eliminate the transaction's rationale.
Divestiture remedy negotiations focus on several key variables: the scope of the assets to be divested, the conditions under which the divestiture must be completed, the qualifications required for the divestiture buyer, the agency's role in approving the buyer, and the hold-separate and monitoring requirements that apply between the consent order's effective date and the divestiture's closing. The parties' first objective in remedy negotiations is to minimize the scope of the required divestiture. The agency's initial divestiture proposal is often broader than necessary to address the specific competitive concern, and narrowing negotiations can preserve significant business value.
Identifying a qualified divestiture buyer before the consent order is finalized is a significant strategic advantage. A proposed buyer who has already been vetted by the agency's staff and found acceptable can accelerate the post-consent order timeline materially, because the agency does not need to evaluate buyer qualifications after the consent order is signed. Pre-consent order buyer identification also reduces the risk that the divestiture cannot be completed at acceptable terms, which could trigger an upfront buyer requirement (the agency's insistence that the buyer be identified and approved before the consent order is signed and the main transaction is cleared to close).
Consent order negotiations should address the sunset provisions governing when the order's obligations expire. Structural orders are typically completed upon the divestiture's closing and have no ongoing obligations after the divestiture is completed. Behavioral orders may impose obligations for ten years or longer and should include sunset provisions tied to objective market conditions, such as the divestiture buyer reaching a specified market share, so that the parties can seek termination of the order if the competitive concern that gave rise to it no longer exists.
Litigation Posture If the Agency Sues to Block
When the agency concludes that the transaction poses an unacceptable competitive threat that cannot be remedied through consent order conditions, it files a lawsuit in federal district court seeking a preliminary injunction to prevent the transaction from closing while the agency prepares its full case. The preliminary injunction hearing is the critical battleground, because a court order blocking the transaction typically causes the parties to abandon the deal rather than endure an extended litigation process that may take a year or more to resolve at the merits stage.
The preliminary injunction standard in merger cases differs between the FTC and the DOJ. The FTC seeks a preliminary injunction under Section 13(b) of the FTC Act, which applies a modified standard that requires the agency to demonstrate a likelihood that it would succeed in a full administrative proceeding, plus that the balance of equities favors an injunction. Recent circuit court decisions have recalibrated the FTC's standard in some jurisdictions, and the applicable standard in the district where the complaint is filed must be carefully assessed. The DOJ seeks a preliminary injunction under the traditional four-factor test (likelihood of success on the merits, irreparable harm, balance of equities, public interest).
The parties' litigation preparation should begin well before the complaint is filed, because the evidentiary record from the Second Request investigation will form the foundation of both sides' case. Documents produced during the investigation that are unfavorable to the parties will be used as exhibits by the agency at the preliminary injunction hearing. Investigational hearing testimony that is inconsistent with the positions the parties take in litigation will be used for impeachment. A clear-eyed assessment of the Second Request record is essential to evaluating whether litigation is viable.
The decision to litigate should account for several factors beyond the merits: the deal's outside date and whether it can be extended to accommodate litigation; the financing commitments' durability through a contested litigation period; the target's willingness to remain under the merger agreement through an extended litigation process; and the reputational and regulatory relationship implications of litigating against the agency. Companies with significant ongoing regulatory exposure in other contexts must weigh the impact that adversarial litigation with the agency may have on other regulatory relationships. These considerations do not determine the outcome of the legal question, but they are material inputs to the business judgment about whether to pursue litigation.
Frequently Asked Questions
How long does a typical HSR Second Request investigation take?
The timeline from Second Request issuance to agency decision varies significantly depending on the transaction's competitive complexity, the volume of documents requested, the pace of negotiation over scope and custodians, and the parties' speed in producing materials. A straightforward investigation in a moderately concentrated market might resolve in four to six months from issuance. A complex investigation involving overlapping product markets, multiple overlapping geographies, or a transaction that raises genuine competitive concerns can take twelve to eighteen months or longer, particularly if the agency and the parties enter extended negotiations over remedies or if the agency files a preliminary injunction action. Parties should assume a minimum of six months from Second Request issuance before a clearance decision, and should structure the merger agreement's outside date and financing commitments accordingly.
What does a Second Request investigation typically cost in legal and compliance fees?
Second Request compliance is among the most resource-intensive processes in M&A. The cost depends on the number of custodians, the volume of documents collected and reviewed, whether technology-assisted review (TAR) is deployed, the complexity of privilege log preparation, and the extent of attorney involvement in investigational hearings and front-office submissions. A mid-complexity investigation involving twenty to forty custodians and a substantial production might cost between two and five million dollars in outside counsel and e-discovery fees combined. Large, contested investigations involving dozens of custodians, multiple productions, investigational hearings, and extended remedy negotiations have cost acquiring parties ten million dollars or more in total compliance and legal fees. These costs should be factored into deal economics when evaluating transactions in concentrated markets.
Can a Second Request be resisted or challenged in court?
Second Requests are not self-enforcing subpoenas. The agency must petition a federal court to enforce the Second Request if the parties fail to certify substantial compliance, and the court applies a relevance standard to determine whether the requested materials fall within the scope of a legitimate antitrust investigation. In practice, direct legal challenges to Second Request specifications are rare because the litigation itself extends the investigation timeline and may damage the party's relationship with the agency's staff. More commonly, parties negotiate scope limitations through the normal pre-compliance process rather than litigating enforcement. However, if the agency refuses reasonable scope accommodations and the Second Request is genuinely overbroad, counsel should evaluate whether a targeted court challenge to specific specifications is warranted, particularly in transactions where the agency's competitive theory is weak.
How many custodians are typically included in a Second Request?
There is no fixed number. The agency drafts custodian lists based on its initial analysis of the transaction, the parties' pre-merger notification filings, and publicly available information about the competitive overlap. Initial custodian lists in a mid-complexity transaction might identify twenty to forty individuals across both parties. Negotiations typically focus on removing custodians whose roles do not meaningfully intersect with the competitive overlap identified in the investigation, reducing the list based on organizational hierarchy (eliminating junior employees whose relevant documents would be captured by their supervisors), and adjusting date ranges to limit the collection period for custodians with long tenures. The final custodian list after negotiation is often forty to sixty percent of the initial list in transactions where counsel engages early and can demonstrate the relevance limitations of the excluded individuals.
What are the principal risks of privilege log errors in a Second Request?
Privilege log deficiencies in a Second Request can have serious consequences. If the agency determines that privilege has been improperly asserted, it may challenge the withholding and seek to compel production of the withheld documents. More critically, if a document is produced that reveals a communication that should have been privileged, the producing party may face arguments of subject-matter waiver under Federal Rule of Evidence 502, which could require production of additional communications on the same subject. In a contested investigation, the agency's staff may use privileged communications that are inadvertently produced as a basis for investigational hearing questions that expand the scope of the inquiry. Privilege review must be conducted by experienced counsel using a defensible protocol, and any inadvertent production should be clawed back immediately under the terms of the protective order governing the investigation.
When does it make sense to litigate rather than negotiate remedies?
The decision to litigate rather than accept a negotiated remedy depends on the strength of the agency's competitive theory, the cost and feasibility of the proposed remedy, and the deal's strategic value relative to the litigation timeline and uncertainty. Litigation is most warranted when the agency's theory of competitive harm is legally or factually weak, when the proposed divestiture would eliminate the transaction's strategic rationale, or when the agency is demanding a behavioral remedy that would impose ongoing obligations on the acquirer's business for a decade or more. Before committing to litigation, parties must assess whether a preliminary injunction is likely (because a preliminary injunction effectively kills most deals regardless of the ultimate merits), the cost and timeline of a full trial on the merits, and whether the deal's structure and financing commitments can survive the extended timeline of litigated resolution.
What role does a consent order monitor play after a divestiture remedy?
When a consent order requires the divesting party to operate the divested business as a viable, competitive entity pending the completion of the divestiture sale, the agency appoints a hold-separate monitor to oversee compliance. The monitor is typically a senior business executive or management consulting firm with relevant industry expertise who reports to the agency rather than to the parties. The monitor reviews financial results, operational decisions, capital expenditure approvals, and personnel decisions affecting the divested business, and has authority under the consent order to report violations and to recommend enforcement actions. After the divestiture closes to the approved buyer, the consent order may provide for an ongoing compliance monitor to verify that the acquirer is honoring any behavioral commitments or operational restrictions imposed as conditions of approval. Monitor fees are paid by the parties and can represent a significant ongoing cost during the divestiture period.
How long does divestiture buyer approval take and who controls the process?
The consent order's divestiture provisions specify that the proposed buyer must be approved by the agency before the divestiture can close. The agency's staff evaluates the proposed buyer's financial resources, operational capabilities, and independence from the acquirer to determine whether the buyer can operate the divested business as a viable competitive constraint. The approval process typically takes sixty to ninety days from the submission of the proposed buyer's qualifications, though complex situations involving regulated industries, international buyers, or buyers who themselves require antitrust analysis can take longer. The acquirer nominates the proposed buyer, but the agency retains veto authority. If the agency rejects the proposed buyer, the acquirer must identify and submit an alternative buyer within the timeframe specified in the consent order, which creates deal risk if the seller's pool of qualified buyers is limited.
Related Reading
Counsel for HSR Second Request Investigations
Acquisition Stars advises acquirers and targets through the full arc of HSR Second Request investigations, from scope negotiations and document productions through investigational hearings, remedy discussions, and litigation posture. Submit your transaction details for an initial assessment of your antitrust exposure and compliance strategy.
Related Practice Areas
Our attorneys handle M&A transactions and securities matters nationwide. Alex Lubyansky leads every engagement personally.