Search Results

    Page  1 2 3
    Showing results 1 - 10 of 24
    Order by:

    Five Steps to Creating a Paperless Tax Process

    Presentation This session will cover the 5 steps to creating a paperless tax process
    Published on November 21, 2012

    Internal Revenue Code

    Overview IRC Section 7216 prohibits anyone who is involved in the preparation of tax returns from knowingly or recklessly disclosing or using tax-related information
    Published on March 07, 2013

    2008 TTI Case Studies Best Practices Yield Results

    Member Profile Scott Cytron interviews Dan Ramey on the 2008 Top Technology Initiatives list.
    Published on February 19, 2013

    Marketing Trust Services

    Guide Developing a Market Plan and knowing the clients need for trust services will help the CPA market Trust Services to current and prospective clients.
    Published on March 12, 2013

    2008 Top Technology Initiatives Case Studies

    Case Study Scott Cytron interviews three users of the Top Technology Initiatives list to help drive their work decisions and prioritize their projects.
    Published on January 30, 2013

    2011 Top Ten Technology Initiatives for Public Accounting

    Survey The 2011 TTI list reflects the top 10 initiatives identified by CPAs.
    Published on February 14, 2013

    2011 Top Technology Initiatives for Public Accounting

    Survey 2011 TTI list reflects the complete listing of the initiatives identified by CPAs in Public Accounting.
    Published on February 14, 2013

    Identity Theft Resources

    Link Identity theft occurs when someone steals key pieces of personal identifying information. Read  more about identity theft by visiting sites on this page.
    Published on January 13, 2014

    AICPA Conference Presentations

    Conference Materials These presentations, from recent and/or previous AICPA conferences, are specific to vital, important topics for CPAs specializing in Information Technology.
    Published on January 29, 2013

    Critical Security Audit Considerations

    Article This article will address specific policies, procedures, and methods related to the security portion of an information technology internal audit.
    Published on February 25, 2013

    Page  1 2 3
    Showing results 1 – 10 of 24
    Show Results per page
    Copyright © 2006-2014 American Institute of CPAs.