Inside information (EU/UK) and material nonpublic information, or MNPI (US), are issuer-specific facts that are not public and would likely move a security’s price once disclosed. Public information is what any investor can lawfully use because it is broadly available and not selectively shared. In distressed M&A, the hard work is keeping those two buckets from bleeding into each other while still getting to a price you can finance and close.
Distressed deals concentrate time pressure, motivated sellers, and uneven knowledge. That cocktail doesn’t make buying distressed assets improper. It makes it easy to trade, recommend trading, or share information in ways regulators view as unlawful. The practical job is boundary management: what can be learned, by whom, when, and under what basis, so the underwriting is real and the trading posture is defensible.
Definitions that change what you can trade
Inside information and MNPI aren’t identical, but the controls converge. The key payoff of getting definitions right is simple: you avoid accidental trading restrictions and you avoid preventable enforcement risk.
Under EU MAR and UK MAR, inside information is precise, not public, relates directly or indirectly to an issuer or instrument, and would likely have a significant price effect if released. “Precise” matters in distress because details arrive with dates, amounts, and actions, exactly the kind of facts markets react to.
In the US, MNPI sits inside Rule 10b-5 doctrine. The focus is materiality plus a duty breach or misappropriation. The legal architecture differs, but the operational consequence is similar: if you learn issuer-specific nonpublic facts that change value, you must assume trading risk in the issuer’s public instruments.
Distress manufactures that information quickly. Nonpublic liquidity runway, covenant forecasts, waiver terms, lender negotiations, rescue financing terms, customer churn, undisclosed liabilities, and the timing of a filing are common examples. When those items are quantified and time-bounded, they rarely stay gray for long.
Market abuse risk also travels farther than many teams expect. It can cover trading the target’s listed equity, bonds, or derivatives; trading a parent or subsidiary with linked cash flows; trading related derivatives like CDS or total return swaps; recommending trades to others; and disclosing information without a defensible basis and controls.
Loan claims may fall outside parts of MAR depending on structure, but the information you learn in loan diligence can still restrict you from trading the issuer’s listed securities. Contractual “cleansed” rules in the loan market often create a parallel discipline anyway.
The aim is not to pretend you can avoid nonpublic information. The aim is to decide when you will receive it, who will receive it, and what trading and communication limits follow, then document that reality.
Why distress amplifies the hazard (and how it shows up)
Distress turns information control into a moving target. The practical benefit of recognizing this early is that you design a process that survives messy facts and aggressive timelines.
In a healthy sale, sellers can package information carefully and stage it. In distress, they often can’t. Liquidity deadlines, vendor pressure, and covenant tripwires force early release of raw materials. Raw files often contain price-moving facts because they were built for survival, not for auction etiquette. As a result, a “public information only” approach usually collapses once real diligence begins.
The buy-side also tends to want optionality during the process. Distressed investors may build stakes in debt to influence the outcome, provide DIP or rescue financing, or position for credit bidding. They may hedge exposure in listed instruments. If the diligence stream turns into inside information, that trading plan can become restricted overnight, right when markets are most volatile and spreads are widest.
Then there’s the plumbing. Distressed processes run in parallel: financing, operational triage, stakeholder negotiation, regulator engagement, and sometimes court-driven steps. Each track adds counterparties, advisers, and emails. Every added node increases the chance of tipping and makes “who knew what when” harder to prove later. In enforcement and internal reviews, vague recollections lose to logs.
Map the instruments first so your restricted list isn’t missing doors
A serious program starts with an inventory. The benefit of this step is coverage: you stop treating “the stock” as the only tradable instrument that matters.
Start by asking what instruments could move on the information you expect to see. The question isn’t “are we trading the target.” The question is “what can be traded, directly or synthetically, that benefits from this information.”
Usually the first ring is straightforward: the target’s listed equity, convertibles, bonds, CDS, total return swaps, options, and any related OTC derivatives. The next ring is the structurally linked holding company, meaning parent securities that are effectively a claim on the same cash flows. In distress, that linkage can be tight, and MAR’s “indirectly” language is not decorative.
Further out are suppliers and customers in concentrated ecosystems. It’s less common, but not theoretical, that precise nonpublic facts about a key counterparty move another issuer’s price. Indices and ETFs usually sit at the edge: they are broad, but exposure, concentration, and position size can turn “broad” into “meaningful,” and internal policy often tightens there first.
If diligence reveals a liquidity cliff, an impending filing, or a signed rescue term sheet, treat the target’s public instruments and any linked holdco instruments as the highest-risk set. That mapping matters because restricted lists that omit derivatives or linked entities are like locks on only one door.
Cross-border rules differ, but the discipline should be unified
Jurisdictional differences are real, but the payoff is consistency. A unified approach reduces errors when teams trade across venues and service providers.
EU and UK MAR are broad, process-driven, and documentation-heavy. They prohibit insider dealing, recommending or inducing, and unlawful disclosure. Operationally, the most useful mindset is that inside information is a status you manage. Debating labels can be a sport; it is a poor risk control.
MAR also shapes issuer behavior. A listed issuer must consider public disclosure obligations and whether it can delay disclosure. In distress, that decision can change quickly as facts harden. A buyer’s plan should assume the issuer might announce something that resets the market’s information set, and your firm’s restrictions with it.
In the US, MNPI management sits in insider trading doctrine, and Reg FD can shape how issuers communicate with market participants. Deal diligence is common, but the issuer and counsel will control access, rely on confidentiality agreements, and sometimes use cleansing disclosures when appropriate.
In cross-border deals, the strictest regime usually wins. A framework that satisfies EU/UK expectations tends to reduce weak-link failures, especially when the deal team uses global custodians, prime brokers, and multi-venue execution.
Run two lanes (public-side vs private-side) so optionality is intentional
The cleanest operating model is two lanes with written walling, named rosters, and tight access controls. The benefit is predictable trading: the firm knows who is restricted before the first sensitive file is opened.
Public-side personnel work from public information and do not receive inside information. They can trade subject to general policy and any deal-specific watch list limits. Still, they may need to slow down if the firm expects to bring them over the wall later, because the moment of wall-crossing ends their flexibility.
Private-side personnel are wall-crossed. They receive inside information under confidentiality and accept trading restrictions in affected instruments until the information becomes public or is otherwise cleansed. The private-side lane usually includes the deal team, select underwriters, and relevant control functions.
A frequent mistake is partial wall-crossing. A senior portfolio manager sits in “just to listen,” or reads “just the model,” and the firm quietly loses its ability to trade when it matters most. If the person who approves trades sees Tier 3 materials, trading optionality is gone until a real cleansing event, and those can be rare in distress.
Use tiered diligence to control contamination without killing underwriting
Start with an information classification plan, not a data room. The benefit of tiering is speed with guardrails: you can move quickly early while containing who gets soaked later.
A practical structure uses three content tiers.
- Tier 1 (public): Public and high-level summaries with broad access, fast review, and minimal trading impact.
- Tier 2 (sanitized confidential): Confidential materials structured to avoid inside information where feasible, often including already-disclosed historical financials and aggregated operational metrics.
- Tier 3 (inside information): Restricted materials such as detailed liquidity schedules, near-term forecasts, waiver negotiations, and restructuring timelines, with logged access and strict need-to-know.
Clean teams help beyond antitrust. In distressed public deals, a clean team can review raw Tier 3 materials and produce decision-useful outputs for broader stakeholders without reproducing the sensitive facts verbatim. The point isn’t to keep your investment committee in the dark. The point is to keep people who must remain tradable from absorbing inside information.
Technical controls matter because they create evidence and reduce accidental spread. Use named-user access with MFA. Use view-only for the highest-risk folders. Apply dynamic watermarks. Restrict downloads with exception logs. Retain page-view and export logs on a defined schedule. These steps don’t stop a determined bad actor, but they reduce casual leakage and shorten incident investigations.
If you are running diligence through a virtual data room, align the protocol with transaction-specific controls rather than generic settings. For a practical checklist mindset, compare this approach to a controlled loan-sale data room framework such as loan sale virtual data rooms, where access, logging, and copying limits are treated as core deal terms.
Cleansing is a test of market equality, not a press release
Cleansing means information that was nonpublic becomes public through proper disclosure so the informational edge is removed. The benefit of treating cleansing as a test is that you avoid premature de-restriction.
In distress, cleansing is often incomplete. The issuer may delay disclosure if legal criteria are met. Announcements may be partial. The most value-relevant details may sit in projections, customer lists, covenant headroom schedules, or negotiated terms that management will not publish. Even after a press release, a firm may still hold nonpublic facts that keep restrictions in place.
If a reasonable investor would still feel outgunned without what you learned privately, treat the restriction as continuing. That’s not moralizing; it’s self-preservation.
Documentation and governance that survive “who knew what when”
Good intentions don’t survive first contact with a regulator’s document request. The benefit of strong documentation is defensibility: your story matches your logs.
Your core stack usually includes an NDA that defines permitted use, recipients, return or destruction, and inside information handling; a wall-crossing notice that records who crossed, when, for which issuer and instruments, and what the trading consequence is; a data room protocol that sets access rules, logging, copying limits, and breach escalation; adviser engagement letters that require consistent information barriers; and controlled distribution rules for financing materials.
Be careful with financing term sheets and commitments. They often embed inside information by referencing projections, liquidity, and restructuring steps. If those documents drift widely, you can wall-cross far more people than you planned, including lenders, co-investors, and internal teams who forward a “quick read” without thinking.
In creditor-led deals, intercreditor agreements and RSAs can carry nonpublic terms and timetables that create inside information even when the underlying claims are private. Don’t treat “loans are private” as a hall pass. If the strategy includes a claim position that could lead to ownership, review how that path works in credit bids and make sure information controls cover the full capital stack, not just the loan.
Incentives are the real stress test
Distress creates incentives to overshare. The benefit of naming incentives is that you can set rules that hold under pressure, not just in policy documents.
Sellers want competitive tension. Buyers want financing certainty. Advisers get paid for speed and closure. Compliance friction shows up as a push to broaden the circle of recipients for Tier 3 information.
Staple financing and lender education materials are common fault lines. Banks want syndication readiness, which can conflict with keeping the wall-crossed group narrow. Backstop, commitment, and ticking fees create urgency and encourage informal forwarding. Restructuring success fees reward velocity and can lead to aggressive distribution unless someone enforces protocol.
- Named recipients: Any Tier 3 distribution should require a named recipient list approved by legal and compliance.
- Stated purpose: Each distribution should state why the recipient needs it and what decision it supports.
- Time window: Access should expire unless renewed, so circulation doesn’t quietly expand.
A fresh angle: treat wall-crossing like a financing covenant
One practical way to improve outcomes is to treat information access as a covenant package, not a courtesy. In other words, you negotiate who gets Tier 3, what gets written down, and what gets shared the same way you negotiate covenants and reporting in a distressed financing.
As a rule of thumb, if a workstream can’t explain why it needs issuer-specific projections, it should not receive them. Conversely, if a workstream needs those projections to size liquidity support, it should be formally wall-crossed and restricted upfront. This framing reduces “accidental” recipients and keeps your trading posture aligned with your deal posture.
Scenarios that make the risk obvious
Examples help teams make faster calls. The benefit of scenario thinking is speed: you stop debating abstractions and start applying playbook triggers.
A fund is invited to provide rescue financing and receives a 13-week cash flow showing a liquidity shortfall in four weeks. That is nonpublic and precise. Trading the issuer’s bonds or CDS while holding that forecast is high-risk. The fix is wall-crossing the underwriting team, restricting all related instruments, and deciding whether any stake-building must occur before Tier 3 access begins.
A creditor group negotiates an RSA that contemplates equitization and a divisional sale. Even if the group trades only loans, those nonpublic terms can restrict trading in listed equity or bonds. Treat creditor negotiations as inside-information events and make sure the restricted list covers the listed stack and derivatives.
A public target shares more precise churn data with one bidder than another. That bidder receives inside information, and if it is also a shareholder, trading risk becomes immediate. The remedy is an explicit diligence protocol, consistent data release where feasible, and staffing that accepts the trading consequences upfront.
Close out the data room like you expect to be audited
When the deal ends, finish like a professional. The benefit of disciplined closeout is that you can prove what happened years later, even if people leave and systems change.
Archive the index, versions, Q&A, user lists, and full audit logs. Hash the archive so you can prove integrity later. Apply a retention schedule that matches legal and regulatory needs. Then instruct the vendor to delete remaining live data and provide a destruction certificate. If a legal hold applies, it overrides deletion, and the hold should be recorded and communicated.
Key Takeaway
Distressed M&A rewards speed and punishes sloppiness. If you treat public vs private information as an operating system, with lanes, tiers, rosters, logs, and disciplined distribution, you can underwrite hard situations and still keep your trading posture defensible. If you treat it as paperwork, the market will eventually collect its fee.