Friday, March 26, 2010
Estate Planning: Keep that Paperwork Organized!
The March 24, 2010 New York Times has a great article on the importance of making sure not only that your estate planning documents are in order and up to date, but also that your beneficiary designations, titling of assets and general paperwork are in order so that your heirs can easily manage your estate in the way you intend. It's worth reading this article, so click here: http://www.nytimes.com/2010/03/25/your-money/estate-planning/25ESTATE.html?emc=tnt&tntemail1=y. I do (of course) take exception to the statement that a Will can be easily facilitated by the use of an online do-it-yourself site; there is simply no substitute for the advice of a competent estate planning attorney who will do a comprehensive review of your assets and general needs, since there is far more to the process than just slapping some words down on paper and calling it a Will. The article does, however, give good food for thought. Have you done your estate plan yet? If not, call me and I can help make it happen in an efficient and complete manner.
Tuesday, March 9, 2010
Estate Planning as a Family Conversation
The March 4, 2010 edition of the New York Times has an interesting article encouraging adult children to help their parents ensure that their estate plans are up to date. Sometimes a loving prompt is needed to put things in order. Read this piece at http://www.nytimes.com/2010/03/04/business/04ESTATE.html?emc=tnt&tntemail1=y.
Tuesday, March 2, 2010
Privacy, Please
On March 1, 2010, new standards went into effect in Massachusetts for the protection of personal information in both paper and electronic records. Mass. CMR Section 17.00 applies to all persons that own or license personal information about a resident of the Commonwealth.
Every person that owns or licenses personal information about a Massachusetts resident is now required to develop, implement, and maintain a comprehensive WRITTEN information security program and physical safeguards that are appropriate to the individual business and the amount and type of personal data maintained. The regulation applies to those "engaged in commerce", i.e. those who collect and retain personal information in connection with the provision of goods and services or for the purposes of employment. Businesses are required to designate an employee to maintain the security program, to institute policies for safeguarding personal information, and to establish and maintain a secure computer/electronic system to the extent the personal information is stored electronically, including firewall and encryption capabilities. Important to those of us operating largely over the internet is the concept that any personal information transmitted wirelessly must be encrypted to bring about a "transformation of data into a form in which meaning cannot be assigned", meaning that the data must be altered into an unreadable form. Password protection alone is not sufficient and would not satisfy the encryption standard.
The new rule adopts a risk-based approach to information security, directing a business to establish a written security program that takes into account the particular business' size, scope of business, amount of resources, nature and quantity of data collected or stored, and the need for security.
The state Office of Consumer Affairs and Business Regulation developed a compliance checklist to assist small businesses comply with these regulations. These can be found at http://www.mass.gov/Eoca/docs/idtheft/compliance_checklist.pdf.
Every person that owns or licenses personal information about a Massachusetts resident is now required to develop, implement, and maintain a comprehensive WRITTEN information security program and physical safeguards that are appropriate to the individual business and the amount and type of personal data maintained. The regulation applies to those "engaged in commerce", i.e. those who collect and retain personal information in connection with the provision of goods and services or for the purposes of employment. Businesses are required to designate an employee to maintain the security program, to institute policies for safeguarding personal information, and to establish and maintain a secure computer/electronic system to the extent the personal information is stored electronically, including firewall and encryption capabilities. Important to those of us operating largely over the internet is the concept that any personal information transmitted wirelessly must be encrypted to bring about a "transformation of data into a form in which meaning cannot be assigned", meaning that the data must be altered into an unreadable form. Password protection alone is not sufficient and would not satisfy the encryption standard.
The new rule adopts a risk-based approach to information security, directing a business to establish a written security program that takes into account the particular business' size, scope of business, amount of resources, nature and quantity of data collected or stored, and the need for security.
The state Office of Consumer Affairs and Business Regulation developed a compliance checklist to assist small businesses comply with these regulations. These can be found at http://www.mass.gov/Eoca/docs/idtheft/compliance_checklist.pdf.
Subscribe to:
Posts (Atom)