Efficient Technology Can Level the Pension Professional Playing Field
How can you as a third party administrator or pension professional compete with the company that is able to take on thousands and thousands more plans than you? With innovative technology, you can match the…
Read Moreabout Efficient Technology Can Level the Pension Professional Playing Field
How Can TPAs Best Ensure That No ERISA Bond Mistakes Have Been Made?
As a pension professional, you probably manage hundreds or thousands of employee benefit plans. You have to make sure that all plans have the required ERISA fidelity bond, should they need it, and are bonded…
Read Moreabout How Can TPAs Best Ensure That No ERISA Bond Mistakes Have Been Made?
Trusts Can Benefit Special Needs Children in New Jersey
Most people are aware of trusts as devices that hold assets or funds for the benefit of children of wealthy people. But a trust in New Jersey can benefit a special needs child as well! Once…
Read Moreabout Trusts Can Benefit Special Needs Children in New Jersey
Cyber Attackers Can Use Your Own Systems to Steal Your Data
It does not take a computer virus or public data mining for a cyber attacker to cause a data breach at your company. They can use your own systems against you to get what they…
Read Moreabout Cyber Attackers Can Use Your Own Systems to Steal Your Data
Cyber Attackers Can Steal from Your Older Files Too
You may think that cyber attackers are only going to go after your current information. However, just as small businesses are targets because they do not protect data as well as large companies, older information…
Read Moreabout Cyber Attackers Can Steal from Your Older Files Too
The New Jersey Guardianship Filing Process
The New Jersey rules for filing for guardianship are rather complex and extensive. As a result of amendments to the state court rules made effective on September 1, 2016, guardianship petitions must be initiated using specific forms prepared by…
Read Moreabout The New Jersey Guardianship Filing Process
Data Breach Costs Often Felt 2 or More Years After Hack
Cyber attacks can cause large amounts of sensitive and valuable data to be exposed via hackers. But cyber attack effects do not end as soon as the data is exposed soon after the attack. The…
Read Moreabout Data Breach Costs Often Felt 2 or More Years After Hack
An ERISA Plan Administrator’s Fiduciary Responsibilities
A person is a fiduciary under ERISA if they exercise discretionary control or authority over plan management or disposition of plan assets, provide investment advice for plan assets for a fee, or have discretionary authority…
Read Moreabout An ERISA Plan Administrator’s Fiduciary Responsibilities
Modular Building Speeds Up Construction Process
Some buildings and structures may have many uniform rooms or pieces within them and those, such as hospitals and hotels, may be candidates for modular construction. In modular construction, separately made parts of a building…
Read Moreabout Modular Building Speeds Up Construction Process