www.uppo.org Open in urlscan Pro
35.169.50.49  Public Scan

Submitted URL: http://458rl1jp.r.us-east-1.awstrack.me/L0/http:%2F%2Fwww.uppo.org%2Fblogpost%2F925381%2FUnclaimed-Property-Focus/1/0100017e590cc643-f81...
Effective URL: https://www.uppo.org/blogpost/925381/Unclaimed-Property-Focus
Submission: On January 14 via api from US — Scanned from US

Form analysis 5 forms found in the DOM

Name: QuickSearchForm /search/all.asp

<form id="QuickSearchForm" name="QuickSearchForm" action="/search/all.asp">
  <div id="QuickSearchFormInner1" class="ui-widget">
    <input id="QuickSearchForm_bst" name="bst" maxlength="50" value="Enter search criteria..." @"onfocus="QuickSearchForm_OnFocus();">
  </div>
  <div id="QuickSearchFormInner2"><a href="#" id="QuickSearchSubmit" onclick="return QuickSearchForm_DoSubmit();">Search&nbsp;»</a></div>
</form>

Name: FavoriteEditor

<form id="FavoriteEditor" name="FavoriteEditor" onsubmit="return FavoriteEditor_Submit(this)" style="display:none; margin: 0 10px 0 10px;">
  <input type="hidden" id="FavoriteID" name="FavoriteID" value="">
  <input type="hidden" id="strFavoriteTypeID_FK" name="strFavoriteTypeID_FK" value="">
  <input type="hidden" id="strFavoriteParameters" name="strFavoriteParameters" value="">
  <input type="hidden" name="strCommand" value="">
  <input type="hidden" id="blnFavoriteReload" value="">
  <table border="0" cellspacing="12" cellpadding="0">
    <tbody>
      <tr>
        <td align="center">
          <img src="/global_graphics/icons/star_32x32.gif" border="0" width="32" height="32">
        </td>
        <td>
          <h2 id="FavoriteEditorTitle"> Edit This Favorite </h2>
        </td>
      </tr>
      <tr>
        <td>Name:</td>
        <td><input type="text" id="strTitle" name="strTitle" value="" size="40" maxlength="100">
          <input type="hidden" name="ERR_strTitle" value="strTitle|Name|20|1||100">
        </td>
      </tr>
      <tr>
        <td>Category:</td>
        <td>
          <input type="text" id="strCategory" name="strCategory" value="" size="40" autocomplete="off" maxlength="100">
          <input type="hidden" name="ERR_strCategory" value="strCategory|Category|20|0||100">
        </td>
      </tr>
      <tr>
        <td>Share:</td>
        <td>
          <input id="blnIsPrivate0" type="radio" value="0" name="blnIsPrivate"><label for="blnIsPrivate0">Yes</label>
          <input id="blnIsPrivate1" type="radio" value="1" name="blnIsPrivate"><label for="blnIsPrivate1">No, Keep Private</label>
          <input type="hidden" name="ERR_blnIsPrivate" value="blnIsPrivate|Share -- Yes/No, Keep Private|20|1||0">
        </td>
      </tr>
      <tr>
        <td colspan="2" align="center" style="padding-top:10px;">
          <input type="submit" id="FavoriteEditor_btnSubmit" value="Submit" class="formbutton" onclick="return FavoriteEditor_btnSubmit_OnClick(this);">
          <input type="button" value="Cancel" class="formbutton" onclick="YAHOO.container.FavoriteOpts.hide();">
          <input type="submit" id="FavoriteEditor_btnDelete" value="Delete" class="formbutton" style="display:none;" onclick="return FavoriteEditor_btnDelete_OnClick(this);">
        </td>
      </tr>
    </tbody>
  </table>
  <input type="hidden" name="__ASPVIEWSTATE"
    value="c5ca47e58ec6ced1e95f5c611396daa49dbcc35bb6bdd34a27cee1aa19ec5a54f091771534ce2077af8af01603808e1e12a0f36f2200d778a4e6dc518178d54e0ee302f6a44c145da5bb3e51c734719f7685beacf687eb4fb2bb81e6bb5e2729fbd48c561fc0c7d5d1960ea1c5154fc9364e5010c1d6f41b1af80ea0ccc575add8a4584e2e">
</form>

Name: frmBlogPOST /members/blog_view.asp

<form name="frmBlog" action="/members/blog_view.asp" method="post">
  <input type="hidden" name="autCommentID" value="">
  <input type="hidden" name="btnSubscribe" value="">
  <input type="hidden" name="btnUnsubscribe" value="">
  <input type="hidden" name="autBlogID" value="">
  <input type="hidden" name="btnDeletePost" value="">
  <input type="hidden" name="btnDeleteComment" value="">
  <input type="hidden" name="btnApprovePost" value="">
  <input type="hidden" name="autPostID" value="">
  <input type="hidden" name="strPostAuthor" value="">
  <input type="hidden" name="strPostHeadline" value="">
</form>

GET /search/all.asp

<form id="SearchForm" action="/search/all.asp" method="get">
  <input type="hidden" name="c" value="1">
  <input type="hidden" name="bID" value="925381">
  <table border="0" cellpadding="0" cellspacing="0">
    <tbody>
      <tr>
        <td><b>Search all posts for:</b>&nbsp;</td>
        <td><input type="text" name="bst" size="30" maxlength="100" onkeypress="return SearchForm_q_OnKeyPress(event,this);">&nbsp;</td>
        <td><input type="submit" value="Find" class="formbutton" onclick="return SearchForm_Validate(this)"></td>
      </tr>
    </tbody>
  </table>
</form>

POST https://www.uppo.org/Login.aspx?returl=

<form id="LoginForm" action="https://www.uppo.org/Login.aspx?returl=" method="post"><a href="https://ws.yourmembership.com/Ams/SocialOAuth/facebook?Continue=%2fAms%2fFinalizeLogin%2ffacebook%3fReturnUrl%3dhttps%253a%252f%252fwww.uppo.org%252fsocial%252fconnect.aspx%26ClientID%3d13480%26UseReturnUrl%3dTrue" type="button" class="btn-connect facebook">
        <span class="facebook-icon">
            <img src="/global_graphics/facebook-icon.png">
        </span>
        <span class="facebook-text">Login with Facebook</span>
    </a><a href="https://ws.yourmembership.com/Ams/SocialOAuth/linkedin?Continue=%2fAms%2fFinalizeLogin%2flinkedin%3fReturnUrl%3dhttps%253a%252f%252fwww.uppo.org%252fsocial%252fconnect.aspx%26ClientID%3d13480%26UseReturnUrl%3dTrue" type="button" class="btn-connect linkedin">
        <span class="linkedin-icon">
            <img src="/global_graphics/linkedin-icon.png">
        </span>
        <span class="linkedin-text">Login with LinkedIn</span>
    </a>
  <div class="or-option">
    <span class="or-text">OR</span>
  </div><input type="hidden" name="ERR_u" value="u|Username|20|1||0"><input type="hidden" name="ERR_p" value="p|Password|20|1||0">
  <p></p>
  <div id="LoginUserName"><input class="small loginuser" type="text" name="u" size="20" maxlength="255" value="" placeholder="Username"></div>
  <div id="LoginPassword"> <br>
    <input class="small loginpass" type="password" name="p" size="20" maxlength="64" autocomplete="off" placeholder="Password">
  </div>
  <p></p>
  <p id="RememberMe"><input id="FrontendControls_RememberMe" type="checkbox" name="rememberme" value="true" checked=""><label for="FrontendControls_RememberMe">Remember Me</label></p>
  <p id="LoginSubmit"><input type="submit" name="btn_submitLogin" value="Sign In" class="formbutton">
    <img class="securesubmit" src="/global_graphics/icons/securesubmit.png" title="Secured with SSL encryption.">
  </p>
</form>

Text Content

Search »
Your Cart   |   Sign In


MENU
 * Join
 * About
   * Leadership
   * Strategic Plan
   * UPPO Governance Documents
   * Member Awards
   * Speaker's Registry
   * Navigating UPPO's Website
 * Member Resources
   * govWATCH
   * Jurisdiction Guide
   * Career Center
   * UPPO Scholarship
   * Unclaimed Property Basics
     * Life Cycle of Unclaimed Property for Holders
     * Life Cycle of Unclaimed Property for Owners
     * Glossary of Terms
     * Unclaimed Property FAQ
     * Unclaimed Property Links
   * Membership Support
     * Contact Us
     * Primary Member Change
     * Secondary Member Change
 * Events
   * Annual Conference
   * Industry Focus Calls
   * Live Webinars
   * Provider Events
 * Service Providers
   * Service Provider & Vendor Directory
   * Provider Spotlight
   * Claimants Representatives
 * Certificate
 * Blog
   * Blog Editorial Guidelines
 * Advocacy

 * Join
 * About
    * Leadership
    * Strategic Plan
    * UPPO Governance Documents
    * Member Awards
    * Speaker's Registry
    * Navigating UPPO's Website

 * Member Resources
    * govWATCH
    * Jurisdiction Guide
    * Career Center
    * UPPO Scholarship
    * Unclaimed Property Basics
       * Life Cycle of Unclaimed Property for Holders
       * Life Cycle of Unclaimed Property for Owners
       * Glossary of Terms
       * Unclaimed Property FAQ
       * Unclaimed Property Links
   
    * Membership Support
       * Contact Us
       * Primary Member Change
       * Secondary Member Change

 * Events
    * Annual Conference
    * Industry Focus Calls
    * Live Webinars
    * Provider Events

 * Service Providers
    * Service Provider & Vendor Directory
    * Provider Spotlight
    * Claimants Representatives

 * Certificate
 * Blog
    * Blog Editorial Guidelines

 * Advocacy





EDIT THIS FAVORITE

Name: Category: Share: Yes No, Keep Private

Unclaimed Property Focus Blog Home All Blogs
RSS


UNCLAIMED PROPERTY FOCUS is a blog written by and for UPPO members, featuring
diverse perspectives and insights from unclaimed property practitioners across
the U.S. and Canada. We welcome your submissions to Unclaimed Property Focus.
Please contact Tim Dressen via tim@uppo.org with any questions about submitting
a blog post for consideration and refer to our editorial guidelines when writing
your blog post. Disclaimer: Information and/or comments to this blog is not
intended as a substitute for legal advice on compliance or reporting
requirements.

 

Search all posts for:   

 

Top tags: unclaimed property  Compliance  education  UPPO  Delaware  audits 
litigation  due diligence  Advocacy  fall reporting  reform  RUUPA  legislation 
UPPO Annual Conference  Gift Cards  Members  ULC  VDAs  reporting  UP101  UP
Laws  california  Canada  Texas  Uniform Law Commission  Colorado  fraud 
Holders Seminar  UPPO Asks  Indiana 


UNCLAIMED PROPERTY NEWS ROUNDUP

Posted By UPPO, 23 hours ago
Updated: 23 hours ago

Unclaimed property often makes news headlines, and UPPO occasionally provides a
snapshot of some of the more interesting and entertaining stories receiving
coverage from local and national media outlets.

 

On Nov. 22, 2021, WCTV reported on a Louisiana man who allegedly attempted to
claim more than $138,000 in Florida unclaimed property that didn’t belong to
him. He faces 25 felony counts of theft, fraud, forgery and related charges.  

 

On Nov. 24, 2021, Dayton Daily News in Ohio published an article about the
state’s $3 billion in unclaimed property holdings and questioned why it hadn’t
implemented more proactive steps to return the funds. The report lists several
methods for identifying property owners that haven’t been implemented in Ohio.

 

On Dec. 13, 2021, shortly after severe storms devastates large parts of
Kentucky, WDRB reported that Kentucky Treasurer Allison Ball announced it her
office would accelerate unclaimed property claims from citizens in counties most
affected by the storm.

 

On Jan. 2, 2022, the Connecticut Mirror ran an extensive report questioning
Connecticut’s unclaimed property practices. The article suggests that some of
the state’s methods make it difficult for property owners to identify and claim
their property, and questions whether legislators hesitate to reform such
practices because they use the funds to “help pad” the general fund.



Tags:  fraud  unclaimed property 

AddThisShare | Facebook Twitter Pinterest Gmail

Permalink | Comments (0)

 


THIRD CIRCUIT STATEMENT IN SIEMENS RULING MUDDLES PRIORITY RULES

Posted By UPPO, Thursday, January 6, 2022
Updated: Thursday, January 6, 2022

In its October 2021 ruling in favor of Siemens USA in litigation over the
constitutionality of Delaware’s unclaimed property audit and escheatment
practices, the Third Circuit Court of Appeals included an unusual declaration
regarding the priority rules that left some unclaimed property professionals
puzzled.

 

The court took issue with Siemens’ assertion that the portion of the Texas
trilogy framework that gives priority to the state of the debtor’s incorporation
when the creditor’s last known address is in a state whose laws do not provide
for escheat is no longer relevant because all 50 states and the District of
Columbia now have escheat laws.

 

“We reject an interpretation foreclosing the state of corporate domicile from
claiming priority simply because the state of the creditor’s last known address
has an escheat regime, regardless of whether that regime would take the property
type at issue,” the court wrote. “We instead read the Texas trilogy to state
that, even if the state of the creditor’s last known address has an escheat
regime, if it does not provide for escheat of the specific property type at
issue, then the state of corporate domicile can still claim priority if its
broader escheat laws do provide for escheat of that specific property type.”

 

This interpretation raises questions about property exempted from escheatment in
some states but not others, such as business-to-business exemptions.

 

“I think the court’s statement about the priority rules is overly broad and
lacks context,” said Wilson Barmeyer, partner with Eversheds Sutherland. “The
court gives an accurate recitation of the language from Texas v. New Jersey,
which says that if there's property that's not escheated by the first state,
then it could go to the second state, but there are a lot more questions than
answers on whether and how this rule should be applied in practice or in future
disputes.” 

 

James Ryan, member attorney with Bailey Cavalieri, said, “I think the language
at the end of this case is something that lawyers refer to as dicta. That
basically means this is extraneous language  that wasn't necessary for the court
to make its decision. I don't think that the language at the end of
the Siemens case that the court recites was necessary for the court to make its
decision.”

 

If the court’s comments were indeed simply extraneous language regarding an
issue about which the court wasn’t briefed, it may not hold up if a state
attempts to enforce it, according to Ryan. The U.S. Constitution’s Full Faith
and Credit Clause generally specifies that one state cannot make a law that
overrules or ignores the law of another state.

 

“The Third Circuit seems to be saying that Full Faith and Credit Clause doesn't
apply here,” he said. “If Ohio creates a business-to-business exemption, for
example, that's fine, but only for Ohio incorporated or domiciled entities. It
doesn't apply to Delaware domiciled entities that, under the first rule, have
property that's governed by the law of the State of Ohio. So, it becomes a
constitutional mess.”

 

What could the fallout be from the Third Circuit’s statement regarding the
priority rules?

 

Conceivably, it could open the door for a state without a B2B exemption, such as
Delaware, to suggest it needs to see records of property that a holder under
audit previously reported and exempted in other states. Viewing those records,
in theory, would be necessary to determine whether it has the right to those
funds and to use that data to extrapolate estimated liability.

 

It could also lead a state to repeal statute language that says it won’t attempt
to collect unclaimed property specifically exempted by other states to repeal
such language and/or argue that the scope of “specifically exempted” property is
narrower than the statute’s drafters intended. 

 

If a state does attempt to use the Third Circuit’s statement as a basis for
claiming property exempted by another state, it will likely lead to additional
court battles.

 

“Fortunately, we're living in an era now where people aren't afraid to litigate
these unclaimed property issues,” Ryan said.

 

Does the Third Circuit statement affect holders’ procedures today?

 

“For holders who are identifying property and reporting it on an annual
basis, this decision likely does not impact their normal reporting obligations,”
said Barmeyer. “If a holder identifies property with an address in one state,
then they can report the property to that state, and if they don't have
an address, then they can report it to the state of incorporation. Holders
should continue to follow that practice. I think it becomes more difficult
where a holder doesn't have a strong reporting history or for items where the
reporting requirements are not clear in the first priority state.”

 

In situations involving audits and estimation with disputes over what is and
what's not reportable, the Third Circuit’s position creates potential
ambiguities and, eventually could bring about disputes between the states. 

 

“Unfortunately, the Third Circuit has muddied the water and potentially created
a situation where more than one state could have a claim to a particular
property,” Barmeyer said. “Although the language of the court in some ways comes
from statements in Texas v. New Jersey, the point of Texas v. New Jersey was
to establish that one state and only one state has the power to escheat a
particular property, and this decision unfortunately takes us to a place where
that's less clear.” 

 

 

The 2022 UPPO Annual Conference, March 27-30 in Orlando, includes the Litigation
Updates session, which will review recent legal actions, developments and
rulings, and their potential effects on unclaimed property operations. Learn
about the conference and register today.  



Tags:  litigation  priority rules 

AddThisShare | Facebook Twitter Pinterest Gmail

Permalink | Comments (0)

 


SAFEGUARDING ATTORNEY-CLIENT PRIVILEGE

Posted By UPPO, Wednesday, December 22, 2021
Updated: Wednesday, December 22, 2021

An important part of the U.S. legal system, attorney-client privilege provides
individuals and companies with the ability to communicate openly with their
legal counsel. However, protecting this privilege and preserving confidentiality
requires a concerted effort by attorneys and their clients. Just because someone
shares information with a lawyer doesn’t automatically mean it’s protected. Here
are some practical tips for ensuring confidentiality:

 

Mark privileged documents

One of the most basic steps to protect information shared with an attorney is
properly marking documents and communications. For physical documents, clearly
label pages with a stamp or include a page header that specifies the document is
confidential. For electronic documents, labeling may be included as part of the
file name. When possible, prevent documents from being opened without a
password.

 

Mark only documents where there is a legitimate privilege claim. Many items are
not subject to attorney-client privilege, including facts, public documents,
drafts of documents, attorney notes and invoices. As such, these should not be
marked as protected documents. Those that should be marked include
communications containing advice, strategy, liability estimates, and
observations, including discussions on data sufficiency and audit methodology.

 

Clearly label how the document relates to the provision of legal advice (“in
anticipation of litigation,” for example), and avoid mixing business and legal
advice. Because attorney-client privilege applies only to legal advice—not
business advice—explaining why the content is legal advice and segregating that
content from business advice helps protect the information.

 

Whatever system you choose to use for labeling privileged documents, apply it
consistently and accurately.

 

Keep documents confidential and discuss privilege with the team

Share confidential documents only with people who have a legitimate need to see
them. Labeling documents as “confidential” will not sufficiently provide
protection if they are widely available or shared with people who don’t need
access. Keep confidential documents in a secure location with limited access.
When sharing information by email, specify at the beginning of the message that
the communication should not be forwarded and additional people should not be
added to the chain of email responses.

 

Because unclaimed property touches so many areas of the company, designating the
lead in each area and having a serious, detailed discussion about maintaining
confidentiality is important. Educating everyone involved that limiting access
isn’t a personal afront, but rather a protection to maintain the right to
attorney-client privilege may reduce frustration.

 

Follow attorney guidance

If any questions or confusion exists regarding who should be brought into
discussions or given access to documents, follow guidance from legal counsel.
Whether it’s internal employees or external consultants, additional people may
occasionally need to be given access to some confidential information. Don’t
make assumptions. Let your attorney take the lead, and don’t discuss sensitive
issues with anyone unless directed to do so by the attorney.

 

Maintain a privilege log

To help demonstrate that sensitive documents have been properly protected, keep
a privilege log. Track who has seen or been given access to each document. If
questions arise about whether information is truly subject to attorney-client
privilege, the log will reflect that documents are not simply marked as
confidential, but have been accessible only by those who truly needed to see
them.

 

Attorney-client privilege is a valuable right. When undergoing an unclaimed
property examination, it’s important for companies to have open, frank
discussion with their attorneys without fear of the information being used
against them.

 

Attorney-client confidentiality is a very important privilege, as it allows you
to talk in confidence to someone you trust without any pushback from government
and within a zone of confidence. Taking steps to maintain this privilege helps
provide an safe environment have discussions without having to share them with
the world.

 



This post has not been tagged.

AddThisShare | Facebook Twitter Pinterest Gmail

Permalink | Comments (0)

 


BLOCKCHAIN: A COLOSSAL PARADIGM SHIFT

Posted By Christa DeOliveira & Ari Mizrahi, Friday, December 10, 2021


In May 2021, UPPO’s Board of Directors established the Virtual Currency Task
Force. The task force’s responsibilities include reviewing states’ treatment of
virtual currency and unclaimed property, creating UPPO position papers and draft
statutory language regarding virtual currency, and developing member resources
regarding virtual currency basics. This article, contributed by task force
member Christa DeOliveira, provides an overview of blockchain technology used
for virtual currencies.

 

Blockchain and distributed ledger technology represent paradigm shifts in how
data is stored, updated, and verified; this is markedly different from
centralized ledgers. Traditionally, data’s “single source of truth” was a
central repository complete with elements, primary keys, and pertinent details
in the database. Whereas, with blockchain there are multiple copies of the data
in multiple places and the truth or accuracy is determined by a consensus
algorithm across them.

 

There is a lot of information and definitions available online, in books,
articles, etc. on blockchain. One alternative for obtaining a primer on
blockchain is Wikipedia. Another alternative can be found on Investopedia.

 

Blockchain databases leverage distributed ledger technology. However, it is
important to note, distributed ledgers are not used exclusively for blockchain.
Distributed ledgers have shared and synchronized consensus of replicated data.
This data can be distributed across multiple sites, encompassing different
companies or institutions. Also, it can be distributed across geographical
regions and countries.

 

With distributed ledger technology there is no central administrator; rather,
the database is spread across multiple nodes on peer-to-peer networks. Nodes are
computing participants, such as computers or servers. (A full node contains a
full copy of the blockchain’s transaction history.) These computing devices are
all connected to each other and continuously exchange the ledger data with each
other, keeping all the nodes in sync and up to date. No single person or group
has control; instead, all users collectively retain control.

 

Depending on which respective blockchain, voting or proof of work occurs through
consensus algorithms on which replicated copies are verified and need to be
accepted as correct. For changes to be made, the nodes must agree on how to
update the blockchain before it can be updated. This occurs in a matter of
seconds or minutes and then any changes made to the ledger are manifested and
copied across all nodes.

 

At its core, a blockchain is a complete list of transactions that are
transparent so anyone can view and verify. For example, Bitcoin’s blockchain,
contains a full record of every Bitcoin transaction back to its inception. One
example of how blockchain works is to picture the chain of a ship’s anchor.
Instead of links being made from metal links, imagine the links of the chain as
chunks of information called blocks. These blocks contain the real-time,
chronological transaction records held together with cryptography.

 

At the top of the chain are the most recent transactions and all transactions
are timestamped. Moving down the chain, older transactions become visible – all
the way back to the inception. All decentralized blockchains are immutable;
therefore, the data entries are not reversible, and a full history is available.

 

Starting from the beginning with the first transaction, there is a cryptographic
hash function recording the transaction. This is generated based on the
transaction details and the encryption algorithm. Transaction two’s hash is
based on the transaction two’s details and the first hash. This continues, each
transaction contains a new hash using the previous hash and current
transaction’s details to generate the current hash. Therefore, to change any one
transaction, each previous transaction in the chain would have to be changed.
Keeping in mind the voting/proof of work transactions would still need to reach
consensus across all nodes to permit any changes. This intentional design is to
make blockchain immutable.

 

In the case of public blockchains, there is a fully transparent history of
transactions offering integrity and trust and the security works to thwart
manipulation attempts.

 

A centralized ledger can be prone to cyber-attacks and fraud, as there is a
single point of failure. In contrast, the need for a central administrator or
authority to guard against manipulation is eliminated using blockchain.

 

This article was originally published by Linking Assets Inc. and is republished
with permission. Christa DeOliveira is chief compliance officer for Linking
Assets Inc. Ari Mizrahi is information technology director for Linking Assets
Inc.



Tags:  blockchain  virtual currency 

AddThisShare | Facebook Twitter Pinterest Gmail

Permalink | Comments (0)

 


POLICIES AND PROCEDURES: COMPLIANCE’S FOUNDATION

Posted By UPPO, Thursday, December 2, 2021
Updated: Thursday, December 2, 2021

Unclaimed property policies and procedures serve as a foundation for compliance
with reporting requirements, and maintain an effective and efficient method to
process, report and remit unclaimed property. For an unclaimed property
compliance program to be carried out effectively and consistently, policies and
procedures must be documented and followed.



What are the basic building blocks needed to document the reporting function and
all of its responsibilities?



Understand reporting responsibilities for your company. Rules and regulations
vary significantly by jurisdiction and industries. Despite this multitude of
rules, look for opportunities to simplify. For many companies, the majority of
unclaimed property exposure reside in a handful of states. If that’s the case,
they may be able to base their procedures around what those states require.
Staying on top of the legal requirements in the states where the majority of
business occurs is typically the most effective use of limited resources.



More conservative companies may put practices into place that ensure blanket
compliance with the most stringent states’ requirements even if it means going
far beyond the requirements in other states.



Identify all potential sources of unclaimed property. Because states consider so
many different types of property as reportable, it’s important to leave no stone
unturned when outlining company policies and procedures.



Review types of accounts and activities within the general ledger. Identify
accounting activities for amounts reversed to income or expense, write-offs,
voided checks and clean-up reversals. Evaluate promotional programs and
contractual terms, loyalty programs, rebates and incentives programs, invoicing
and settlement practices. Determine whether owner names and addresses are
available.



Document not only what is considered unclaimed property in your company, but
also other areas that have been reviewed and determined to not require
reporting. Doing so helps ensure consistent application of policies and
procedures.



Build a team. Resources dedicated to unclaimed property may be scarce, so begin
with what you have and build on it. You may not have buy-in from all the
necessary people immediately, but as they become more familiar with what
unclaimed property is, why compliance matters and how their role in compliance
is important to the company’s goals, buy-in will increase.



Involve all entities, divisions and departments. Define and assign
responsibilities. For each area, establish department procedures, including:

 * Identifying unclaimed property.
 * Researching.
 * Setting materiality limits and time frames.
 * Detecting errors or irregularities.
 * Resolving with the owner.
 * Retaining adequate supporting documentation.

Address how mergers and acquisitions will impact annual reporting. When becoming
aware that a merger or acquisition has occurred, the holder must analyze the
specific terms of the agreement to know what’s being purchased and what’s being
retained – and whether there’s a provision addressing unclaimed property.
Addressing M&A activity in unclaimed property procedures can help avoid
confusion when such a transaction is under consideration or has recently
occurred.



Create an audit-ready one-stop shop. Actively following policies and procedures
will make things much easier if auditors or other stakeholders require
documentation of unclaimed property decisions. Recommended steps include:

 * Create a designated unclaimed property liability account.
 * Capture requisite details needed for reporting. Analyze data accessibility
   and evaluate the cost-benefit of automation.
 * Reconcile to a sub-ledger database.
 * Establish record retention provisions.
 * Safeguard unclaimed property, including data security controls, segregation
   of duties and internal controls and oversight.

Establishing policies and procedures is merely the beginning of their lifespan.
Unless they are followed, maintained and updated, guidelines and documentation
serve little purpose. Make sure to include provisions for regularly reviewing
and updating policies and procedures, and communicating changes to team members.





Tags:  compliance  Policies  procedures  unclaimed property 

AddThisShare | Facebook Twitter Pinterest Gmail

Permalink | Comments (0)

 

Page 1 of 90
1  |  2  |  3  |  4  |  5  |  6  >   >>   >| 

Close
Filter by this tag »
Show all posts with this tag »
Find everyone who has used this tag »

Close



 
Sign In
Login with Facebook Login with LinkedIn
OR









Remember Me



Forgot your password?
Haven't registered yet?
Latest News more

18 hours agoWisconsin Plans to Correct Error in A.B. 325

1/3/2022UPPO Alerts Wisconsin to Problematic Error in A.B. 325

1/3/2022Appeals Court Rules in Favor of Claimant Supported by UPPO Amicus Brief

12/27/2021UPPO Files Amicus Brief with U.S. Supreme Court

12/15/2021Get Back Together with UPPO – Safely and Securely, Only in Orlando

Upcoming Events & Education more
Business disruptions caused by the COVID-19 pandemic have left many companies
struggling. With some holders facing the need to file for bankruptcy, this
webinar will example unclaimed property obligations both before and after
filing. Cost: Free with membership. One CPE available.
The 2022 Annual Conference is the leading event for professionals responsible
for unclaimed property. It integrates networking and premier education into
every aspect of the 3.5 day agenda. You'll leave the conference with the
information and connections needed to minimize your company's risk, and achieve
and sustain compliance with unclaimed property laws and regulations. See rates
below.

2/16/2022
Bankruptcy Implications on Unclaimed Property Webinar

3/27/2022 » 3/30/2022
2022 Annual Conference










Privacy Policy Contact Us Website Help Social Media Policy © 2022
Membership Software Powered by YourMembership  ::  Legal