Choose from the following categories to see the latest news in each category.

In order to determine whether an individual or entity is governed by the provisions of the FDCPA, you must first review some important definitions. Under the FDCPA, a communication is defined as “the conveying of information regarding a debt directly, or indirectly to any person through any medium.”Read More...

Collection agencies are often tempted to incorporate “attorney letterhead”, or legal talk, as a part of its collection methods. Several cases have prohibited the use of attorney letterhead by collection agencies when there is evidence that the attorney had no “meaningful involvement” in the actual review and collection of the account in question.Read More...

The FDCPA provides debt collectors with a bona fide error defense. The statue provides that a debt collector shall not be held liable for the violation if the debt collector can demonstrate by the preponderance of the evidence, that the violation was not intentional and the debt collector maintained procedures reasonably adapted to avoid such errors, as states in 15 U.S.C. Section 1692 (k)(c)Read More...

Liability under the Fair Debt Collection Practices Act enacted in 1977, otherwise known as FDCPA. Statutory damages under the FDCPA, are capped at a maximum of $1,000. per case, not per violation. The capped amount of $1,000 set in 1077 doesn't obviously hold the same value, as a $1,000 today, which has caused the consumer bars to push for a reevaluation of that figure. This statutory damages figure isn't a set fee, it is decided upon a sliding scale of different variables.Read More...

If you are collecting third party debts on behalf of another, the debts are for personal, family, or household use, and the debts are in default, then you can make the general assumption that the fair debt collections act does apply to your business operation. The first thing you need to do, as required by federal statute, is to send a written notice containing certain disclosures.Read More...

Who puts your business data at risk? There are four types of employees who put the workplace at risk for cybersecurity breaches. First we have the security softy, this is a person who knows very little about cybersecurity and poses a threat, by using their work computer at home, or by letting a family member use it unsupervised.Learn More

When we take a close look at the emerging trends and issues in cybersecurity, we realize how global the problem has become. In 2015 the Ponemon Study revealed that health care data attacks are on the rise. This report mirrors the statement that the Department of Justice released in terms of cyber security attacks, especially in healthcare. Learn More

In a digital world, threats to cybersecurity is a minute by minute concern. The Verizon 2014 data breach was one of the larges data breaches of our time. This was a devastating blow to Verizon, yet taught us much about the importance of cybersecurity. The data breach investigations that followed identified many threats. Hackers could not only breach your website, they could breach your POS (Point of Sale) terminals. Learn More

GIPS, the Global Investment Performance Standards, are industry standards utilized for calculating and presenting investment performance results to prospective clients. There is a significant overlap with the 1933 & 1934 Acts and Investor Advisers Act of 1940 requirements. Learn More