CLAIMS AGAINST THIRD-PARTY RECIPIENTS OF TRUST PROPERTY

被引:2
|
作者
Salmons, David [1 ]
机构
[1] Univ Aston, Aston Business Sch, Aston Law, Birmingham B4 7ET, W Midlands, England
来源
CAMBRIDGE LAW JOURNAL | 2017年 / 76卷 / 02期
关键词
trusts; third parties; proprietary claims; knowing receipt; restitution; unjust enrichment; Re Diplock;
D O I
10.1017/S0008197317000423
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
This article argues that claims to recover trust property from third parties arise in response to a trustee's duty to preserve identifiable property, and that unjust enrichment is incompatible with such claims. First, unjust enrichment can only assist with the recovery of abstract wealth and so it does not assist in the recovery of specific property. Second, it is difficult to identify a convincing justification for introducing unjust enrichment. Third, it will work to the detriment of innocent recipients. The article goes on to show how Re Diplock supports this analysis, by demonstrating that no duty of preservation had been breached and that a proprietary claim should not have been available in that case. The simple conclusion is that claims to recover specific property and claims for unjust enrichment should be seen as mutually exclusive.
引用
收藏
页码:399 / 429
页数:31
相关论文
共 50 条
  • [41] Armor Within: Defending against Vulnerabilities in Third-Party Libraries
    Ali, Sameed
    Anantharaman, Prashant
    Smith, Sean W.
    2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2020), 2020, : 291 - 299
  • [42] Using intellectual property agreements in the presence of supplier and third-party copycatting
    Ghamat, Salar
    Pun, Hubert
    Critchley, Greg
    Hou, Pengwen
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2021, 291 (02) : 680 - 692
  • [43] Federal Tort Claims Act administrative claims: Better than third-party ADR for resolving federal tort claims
    Axelrad, J
    ADMINISTRATIVE LAW REVIEW, 2000, 52 (04) : 1331 - 1344
  • [44] Ensuring Trust of Third-Party Hardware Design with Constrained Sequential Equivalence Checking
    Shrestha, Gyanendra
    Hsiao, Michael S.
    2012 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, 2012, : 7 - 12
  • [45] Start With Trust: Utilizing Blockchain to Resolve the Third-Party Data Breach Problem
    Shaverdian, Phillip
    UCLA LAW REVIEW, 2019, 66 (05) : 1242 - 1288
  • [46] Building Trust in Public and Nonprofit Networks Personal, Dyadic, and Third-Party Influences
    Lambright, Kristina T.
    Mischen, Pamela A.
    Laramee, Craig B.
    AMERICAN REVIEW OF PUBLIC ADMINISTRATION, 2010, 40 (01): : 64 - 82
  • [47] Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading
    Ikram, Muhammad
    Masood, Rahat
    Tyson, Gareth
    Kaafar, Mohamed Ali
    Loizon, Noha
    Ensafi, Roya
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2020, 23 (02)
  • [48] Risks of third-party data
    Schneier, B
    COMMUNICATIONS OF THE ACM, 2005, 48 (05) : 136 - 136
  • [49] Third-party verification on sustainability
    不详
    CANADIAN MINING JOURNAL, 2007, 128 (07) : 6 - 6
  • [50] THE CASE FOR THE THIRD-PARTY DOCTRINE
    Kerr, Orin S.
    MICHIGAN LAW REVIEW, 2009, 107 (04) : 561 - 601