Explore the latest shifts in U.S. accounting standards led by FASB, focusing on revenue recognition and lease accounting. Learn what these changes mean for businesses.
Read more...
Explore how accounting firms are embracing remote solutions, leveraging cloud technology, and enhancing client trust in the evolving digital landscape.
Read more...
This article explores the transformative impact of cloud technology on accounting practices, highlighting efficiency, security, and collaboration advantages.
Read more...
Explore how the shift toward digital commerce impacts sales tax compliance and the strategies businesses use to navigate these evolving regulations.
Read more...
Explore how leadership dynamics in accounting firms are changing due to technology and diversity trends, with insights into modern strategies and tools shaping the industry's future.
Read more...
How AI Is Reshaping Payroll: What Every Business Needs to Know The 2025 Payroll Special Report explores how artificial intelligence is revolutionizing payroll—transforming it from a back-office function into a strategic powerhouse. Discover how AI is enabling greater efficiency, accuracy, and compliance while unlocking real-time insights and cost-saving automation. With insights from industry leaders at ADP, Paychex, KPMG, and more,…
Massachusetts has set the gold standard when it comes to privacy regulations. Their new regulation, 201 CMR 17, is entitled Standards for The Protection of Personal Information of Residents of the Commonwealth and can be found here. The regulations apply to “all persons that own, license, store or maintain personal information about a resident of the Commonwealth”.
Essentially, the regulations apply to any company that employs residents of Massachusetts and any CPA firm that prepares returns for Massachusetts residents. The requirements of the regulation are comprehensive and will require organizations to devote significant amounts of time, money and energy to ensure compliance.
If the new regulations apply to your firm, you must review the regulation, determine how it impacts your organization, and implement the technologies required to ensure compliance. The regulations require that you develop and maintain a comprehensive written information security plan. In addition, you may need to implement technologies that include secure client communications, drive encryption, an “up-to-date firewall”, virus protection and “secure user authentication protocols”.
The effective date for the new regulations is January 1, 2010.