Liability

  • Local Vs Global Brand Article by SDCCPA

    Local Versus Global Brand for Auditing Firms

    On March 8, 2017, the Wall Street Journal published an article about KPMG being under fire for scandals in the U.S., South Africa, and the U.K. Although KPMG does face trouble on three fronts, the scandals involve three legally separate firms: KPMG, LLP, a New York-based U.S. partnership, is dealing with the indictment of former […]

  • Inventory 101 Article by SDCCPA

    Inventory 101

    When a company’s inventory count comes up short, the hunt for the missing inventory begins. Are employees are stealing from the warehouse in the middle of the night? Is a dishonest bookkeeper recording fictitious purchases and pocketing the difference? Possibly. But while employee theft may be the reason, less nefarious causes might be to blame. […]

  • What is Your Roomba Vacuuming Up Article by SDCCPA

    What is Your Roomba Vacuuming Up?

    Facebook, Bluetooth, the iPod, “smart” televisions: innovations in the past few years have transformed the way we live. Nearly two-thirds of Americans own a smartphone. By 2020, it is expected each person worldwide will have more than six connected devices on average. The “internet of things” is a technological development with an increasing presence in […]

  • The Face of Fraud Article by SDCCPA

    The Face of Fraud

    Crime tends to require three elements: motive, desire and opportunity. Employee theft is no different. Being aware of the reasons leading up to employee theft and learning to identify likely perpetrators can give employers a leg up on protecting their companies from theft. Motive & Desire Employees who steal usually have their motives. For example, […]

  • Keeping Hackers Out

    Cyber Liability & Prevention In April 2011, Sony’s online gaming network was hacked, compromising the personal and credit card information of 77 million users. The network outage lasted 23 days and cost Sony $171 million. A class action suit has charged Sony with negligent data security, unauthorized storage and retention of data, and failure to […]