Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
In August 2010, the FASB and IASB issued a joint exposure draft ' Leases. The exposure draft creates a new accounting model for both lessees and lessors, and eliminates the concept of operating leases. All outstanding leases will be subject to the new lease accounting rules ' there will be no grandfathering of existing leases. The boards are expected to issue a final standard in June 2011, but they have not yet decided on an effective date for the new rules. This article summarizes the new accounting model for lessees and addresses the impact the new model may have on financial and other covenants typically found in financing agreements, where the lessee is the borrower. (The new accounting model for lessors is beyond the scope of this article.)
Summary of the New Accounting Model for Lessees
Example
There is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.
A trend analysis of the benefits and challenges of bringing back administrative, word processing and billing services to law offices.
Summary Judgment Denied Defendant in Declaratory Action by Producer of To Kill a Mockingbird Broadway Play Seeking Amateur Theatrical Rights
“Baseball arbitration” refers to the process used in Major League Baseball in which if an eligible player's representative and the club ownership cannot reach a compensation agreement through negotiation, each party enters a final submission and during a formal hearing each side — player and management — presents its case and then the designated panel of arbitrators chooses one of the salary bids with no other result being allowed. This method has become increasingly popular even beyond the sport of baseball.
Executives have access to some of the company's most sensitive information, and they're increasingly being targeted by hackers looking to steal company secrets or to perpetrate cybercrimes.