The employer’s safety protocols are an essential tool to help reduce the community spread of COVID-19 in the workplace, prevent and defend against lawsuits, and demonstrate compliance with OSHA safety requirements. To help develop your organization’s written policies and protocols, use this self-inventory toolkit with best practices and tips as your guide.
Resource Search
As an employer, what do you do if you suspect that one of your employees has COVID-19? When is it safe and compliant for your employee to return to work after COVID-19; after a case that is suspected or confirmed? To support you in answering these questions, use this flowchart to help you enable a safe working environment, be in compliance, and reduce risk and liability for your business.
With the right tools and commitment, most businesses can make remote work just as productive, if not more productive, than in-person office work. Ultimately, remote work requires leaders to retune their managerial style to fit the situation. There are three powerful strategies that leaders can apply to help keep their remote employees engaged, and it begins with setting clear expectations and boundaries.
High net-worth families for whom privacy is a paramount consideration may be concerned that the Corporate Transparency Act, which became law on January 1, 2021, creates a risk of sensitive ownership information being exposed to the wrong persons. This may concern family offices; however, regulated private trust companies and trusts may be exempt.
Among its many provisions, the American Rescue Plan COVID relief addresses paid sick and family leave under the Families First Coronavirus Response Act (FFCRA) and makes temporary but significant changes to COBRA coverage. A short (and high-level) summary of the changes are provided to show the effect on covered employers and employees.
“I’m 100 percent not you, and you’re 100 percent not me.”— Find out why that powerful reminder from guest Cassie Atteberry is the key to making the “people stuff” easier for you, your family, and your organization. In this episode, Cassie joins host Damien Martin to share insights to help you to show up as the best version of yourself, build higher-performing teams, and deliberately create a healthy and successful organizational culture.
Singapore has been trending upward—becoming the place that is increasingly synonymous with family offices. Since 2019, Singapore has seen a growing number of high-profiled businesspeople establish family offices there. In addition to tax incentives, interest in Singapore is fueled by the potential growth in Asia, where many see the island nation as a gateway to the region. Apart from tax and other external driving forces, Singapore has attractive investment incentives available for family offices or family investment vehicles.
The COVID-19 pandemic has led to an acceleration of adoption of cloud solutions and other remote access tools. However, hasty adoption of any new technology that is not combined with robust security frameworks, policies, and controls can leave businesses vulnerable. A formal vendor management process and having specific controls in place can mean the difference between a cloud solution being a huge advantage to agile solutions or leaving the business open to attacks and unauthorized access.
With the IRS increasing their funding and enforcement, upper income taxpayers should expect the IRS audit coverage to increase dramatically on them. It’s important to prepare for the tax changes that are coming—and coming quickly. Along with having a team of professionals on your side, there are steps you can take to protect yourself. Now is the time to review and perhaps recalibrate your risk tolerance for tax strategies.To learn more about the coming changes, listen to the podcast recording here with Waller’s Leigh Griffith.
The more we use social media to share updates, pictures and videos with friends and family, the easier it can be for cybercriminals to steal our information. See how you can use social media safely to protect yourself and your private information from cybercriminals.