
Debunking Unclaimed Property Reporting Notions
We have found that many companies who think they are in compliance when it comes to unclaimed property laws and regulations are not fully compliant.
We have found that many companies who think they are in compliance when it comes to unclaimed property laws and regulations are not fully compliant.
Preparing and filing unclaimed property can be a horrifying and confusing task for some individuals. It requires attention to detail with each jurisdiction’s dormancy calculation and
Let’s face it, most companies have larger things to worry about than the dormancy period of uncashed payroll checks or researching state websites to determine
Many people hear about the exemptions that states allow for unclaimed property reporting, and they get very excited. Free money, right? What could go wrong?
The issue of online reporting is an important one. State legislation varies widely on when and how to submit unclaimed property reports, and many states now require
Finding the best way to manage unclaimed property risk is very challenging, especially if you are filing for the first time and not under state
Many people who are tasked with filing unclaimed property don’t have an idea where to start. The process itself isn’t so bad, but there are
We all know it, but few people express this in official circles. Unclaimed property filing is no fun. It isn’t glamorous or exciting. It is
Many times in my twelve years of providing customer support, I’ve heard “This is my first time reporting and I don’t know what to do.
Many companies like to report unclaimed property as soon as it shows up as abandoned on their books. I understand the desire to get the
States continue to move away from paper reporting in favor of electronic reporting. First, let me describe the true difference between the two types of
Article written By Bill Dadmun, Records and Receipts Manager; State of Virginia How many of you use the aggregate function when reporting? Does it make your life
In these modern times, security of sensitive data is at the forefront of everyone’s minds. Clients, vendors, and employees should be able to trust that