Franchise Companies vs. Hackers: Twenty Questions on Cybercrime
February 24, 2009
The 21st century is clearly the age of cybercrime, and franchise companies should be especially concerned because, simplistically, there are only two types of computer systems: those that have been hacked, and those that will be hacked.
Compliance Now More Than Ever
February 23, 2009
In a profit- and loss-driven world, there is always a risk that companies facing an uncertain economic future may choose to cut compliance expenses," SEC Chairman Christopher Cox noted last November at the SEC's Compliance Officer Outreach National Seminar. Then he issued a stern warning: "When a company cuts compliance, violations will occur. And if violations occur, punitive actions should and will be taken."
How to Safeguard Employee Data
February 19, 2009
Employers should be aware of the rapid growth of data privacy and security laws, which may affect their methods of conducting business and handling personal employee information. The new laws carry with them a private right of action in some cases, civil penalties as much as $500,000 and in some states, administrative investigations.
Consider P-Cards to Directly Enhance the Bottom Line
January 30, 2009
In efforts to increase transparency, manage demand, and streamline back-office operations, law firms are looking at automation opportunities within the procure-to-pay cycle. A well-defined Purchasing Card ("P-Card") program is one tool available to law firms which requires little or no upfront investment, yet yields many of the controls, efficiencies, and transparencies that law firms and their clients seek.
Excess Lease Liability and Insolvency
January 30, 2009
Based on SFAS 5 and in the author's opinion, a law firm's excess lease liability is not an event or item that should be included as a liability for purposes of determining insolvency or for financial statements issued in compliance with generally accepted accounting principles.
The e-Discovery Balancing Act
January 29, 2009
Progressive corporations are starting to treat e-discovery as any other standard corporate business process: repeatable, defensible and measurable. This new dynamic raises an obvious question: What portions of the e-discovery process are best suited to be "in-sourced," and how do IT professionals within an enterprise work with their partners to ensure effective collaboration/communication?
Fraud, Fraud Everywhere (Nor Any Relief For the Victim)
January 28, 2009
From Wall Street executives, to Ponzi scammers like Bernard Madoff, to run-of-the-mill scammers easily exposed at sites such as Snopes.com, the Internet ' as we all should know ' has truly souped up, and made easier, frauders' ability to prey on others than ever before.