Business people shaking hands

If you are selling or acquiring an accounting practice, you need to read the AICPA’s new guidance “Transfer of Files and Return of Client Records in Sale, Transfer, Discontinuance or Acquisition of a Practice,” which clarifies the obligations of the selling and the acquiring parties and explains how to deal with clients that do not respond to the notification of the transaction.

Continue Reading

Magnifying glass keyboard_TS_147860345In the most recent “North America Top Technology Initiatives Survey Results,” CPAs responding to the poll ranked “securing the IT environment” as the number-one priority, followed by “managing and retaining data,” “ensuring privacy,” “managing IT risks and compliance,” and “preventing and responding to computer fraud.” The top five poll results all relate to securing, managing or protecting the information entrusted to CPAs. The poll results are largely consistent with prior years and not particularly surprising in a world where data breaches routinely make national headlines, and CPAs receive and store large amounts of highly personal and confidential data. What is surprising and potentially alarming is the seemingly low levels of confidence the poll respondents had in their ability to protect data.
Continue Reading

iStock_000039530454_LargeFor years, U.S. Department of Labor Chief Accountant Ian Dingwall has been advising employee benefit plan administrators to avoid using auditors who “dabble” in employee benefit plans. During this period, the DOL has consistently found that approximately one third of the employee benefit plan audits the agency reviews are deficient, and points to the firms that perform fewer than five of these audits as the most common offenders. Building on this public commentary, the DOL has worked vigorously to push out the dabblers, and the American Institute of Certified Public Accountants (AICPA) and a growing number of state boards of accountancy are supporting this effort.
Continue Reading

IRS Refund_479969589Nearly every day there’s another news story about another company suffering a data breach, either as a result of a lost or stolen device or because the company was hacked. Talk to any number of knowledgeable attorneys skilled in handling breaches, and each will guide you through a similar process for providing notice, obtaining credit monitoring or identity restoration, and complying with regulatory and other legal obligations. Yet no matter the recommendations, the antiquated processes in place at the IRS make it practically impossible for companies to protect someone from a fraudulently filed tax return.
Continue Reading

signing-two-contracts156223874TSAccounting firms often use post-employment restrictive covenants to prevent their clients and employees from being poached by departing partners and employees. As the number of accountants moving between firms has started to pick up again, so too has the number of disputes concerning the enforceability of the restrictive covenants those accountants signed at their former firms.
Continue Reading