Commercial agreements come in a variety of types, but most have certain common provisions that should be carefully reviewed in the context of the underlying transaction covered by the agreement. When entering or reviewing one of these agreements, it is important to address the five key provisions that sometimes go unnoticed or are not given proper ...
We have the answers
Search Results
A significant step in the acquisition process is determining the structure of the deal. The two most common deal structures are: (1) the purchase of the ownership interests of the target (such as a stock deal), and (2) the purchase of substantially all of the target’s assets (or an asset deal). In an asset deal, the implication is that the ta...
The revolution of the “information age” has created tremendous advantages and helped accelerate innovation, but it has also brought with it new risks—namely cyber attacks. While the corporate attacks get most of the media attention, do not forget that individuals—especially the high net worth—need to be vigilant about cyber security. The good news ...
News reports show large-scale data breaches are on the rise and affecting large retailers and even consumer credit organizations. There are numerous categories of cyber crime, but the ones that affect the most victims include identity theft, credit card fraud, and social networking scams. However, there are actions you can take to better protect yo...
Travis Roy’s story is well known—in 1995, the rising college hockey star suffered an on-ice injury that left him paralyzed from the neck down after only 11 seconds of his first Boston University game. That tragic accident ended Travis’ hockey career, but it marked the beginning of his decades-long commitment to helping others thro...
The topic of wealth transfer to the next generation has been well documented. Accenture estimated that $30 trillion of financial and nonfinancial assets are ready to shift from baby boomers to their children in North America alone. At the same time, there is a large and growing appetite for using wealth to solve social challenges and help those in ...
Donors often ask how they can maximize their giving dollars when seeking to fulfill their charitable giving missions. A tax effective way is to donate appreciated securities to a donor advised fund, rather than selling the securities and donating the cash proceeds. So how does it work?
Estate-planning advisors should be aware that there are many creative planning opportunities for the use of Private Placement Life Insurance (PPLI) with trusts. PPLI is essentially a flexible premium variable universal life insurance transactions that occurs within a private placement offering. Previously, PPLI hadn’t been as appealing due to...
Business impersonation scams are a large and growing risk for high-net-worth individuals, closely held business owners, and institutions. Scams have claimed victims in all 50 states and more than 100 countries and there is every reason to believe the threat is growing. Learn seven steps that can help you protect yourself and your business from impe...
Ransomware will continue to be a top security concern in the coming years because of its ease of use and high profitability. For those unfamiliar with ransomware, it’s a type of malicious software (also known as malware) that, when downloaded to a computer, encrypts files so they can no longer be accessed without paying a ransom to the cybercrimina...
Strategic philanthropy is similar to intentional asset allocation in that it requires as much of the giver’s intellect as it does the bank account. A careful and disciplined approach to philanthropic giving combines purpose, practicality, and passion. In planning for charitable giving, families can review their choices with a planning matrix ...
We often think of Thanksgiving and Giving Tuesday as ushering in the year-end charitable giving season. Year end is not only a time for gratitude, as families gather for the holidays, but also a time to start organizing financially for the close of the calendar year. But year-end giving does not need to be short-term giving. So even as you strive t...
As the benefits and capabilities of the Internet of Things (IoT) accrue, so does the amount of data that must be collected, managed, and integrated with connected devices—and by enterprises everywhere. It’s a challenge that demands a new kind of digital trust and data sharing tradeoffs. For more insights from this IoT se...
The Internet of Things (IoT) has inspired unprecedented cooperation and coordination for the businesses and industries interested in ensuring a sustainable future for themselves. From the lens of eleven case studies, see how the IoT revolution is transforming the world in which we live in. For more insights from this IoT series, see:Part ...
The rise of the connected objects known as the Internet of Things (IoT) will rival past technological marvels, such as the printing press, the steam engine, and electricity. As IoT solves problems that have plagued businesses for decades, it will also create entirely new dilemmas across all sectors and for all industries. Concerns over privacy, cyb...