Author: Marie Brilmyer
When a nonprofit organization combines with one or more other nonprofits, using the proper accounting treatment depends on if it is deemed a merger or an acquisition. Generally Accepted Accounting Principles (GAAP) differentiate between a merger and an acquisition as follows:
Author: Dennis Grady, Jr.
The technology industry has come a long way from the dot-com era of the mid-1990s to early 2000s. Since Silicon Valley’s rise to fame, research parks, technology centers, universities and incubators across the country have emulated its success — becoming breeding grounds for highly sophisticated start-ups and game-changing innovations across industries.
In late March, TIAG Member ESV Accounting and Business Advisors and TAGLaw Member Piper Alderman held a seminar on Doing Business in China, providing valued clients and guests of the two firms with an overview of the current business environment on the ground in China.
The seminar was presented by Russell Brown OBE, Director and Treasurer of the Australian Chamber of Commerce in China and Managing Partner of TIAG Member Firm, Lehman Brown, a China-focussed accounting, taxation and business advisory firm.
By: Bill Harrington
Hackers in the News
When large, brand-name companies like Target, Anthem and Home Depot are breached by hackers, they make front-page news and incur significant reputational losses. The amount of money that hacked companies spend to repair their reputation in the marketplace is staggering, which is why this is a topic of discussion on most Board agendas. Every day, hackers become faster and more sophisticated at exploiting newly-identified vulnerabilities in security architectures. These are not the hackers of the past, teenagers fishing around for information from a computer in their basement. They are highly educated and technically savvy individuals who hack into companies for the purpose of stealing information that can be resold on the “black market.” These breaches may also take the form of attacks from nation-states that seek to acquire industrial, military, or other confidential or classified information. What about your company? How prepared is your IT security plan to prevent such a breach?
Contact: Scott T. Ditman, Berdon LLP (New York, New York, USA)
In today’s world, it’s very likely you have significant digital assets that must be considered when creating your estate plan.
Your first step should be to conduct an inventory of all your digital assets, which should include any computers, servers, or handheld devices where these assets are stored. Next, speak with your estate planning advisor about strategies for ensuring that your loved ones or other representatives have immediate access to these assets in the event something happens to you.