StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Response to Client Request II - Essay Example

Cite this document
Summary
ASC 450 – 20 provides for three different outcome: remote, reasonably possible and probable.
If the loss contingency is probable but the amount…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91% of users find it useful
Response to Client Request II
Read Text Preview

Extract of sample "Response to Client Request II"

Running head: ACCOUNTING FOR LOSS CONTINGENCIES ACCOUNTING FOR LOSS CONTINGENCIES OF INSTITUTE) Running head: ACCOUNTING FOR LOSS CONTINGENCIES 2 Accounting for loss contingencies will depend upon the judgment on the possible outcome of the event resulting to the contingency. ASC 450 – 20 provides for three different outcome: remote, reasonably possible and probable.If the loss contingency is remote, there is no need to disclose the said contingency or accrue any amount for the loss.If the loss contingency is reasonably possible, there is also no need to accrue the amount of the loss but a disclosure is required (ASC 450-20-55-13).

If the loss contingency is probable but the amount cannot be reasonably estimated, only a disclosure is required. If the loss contingency is both probable and the amount of loss can be estimated, paragraph 450 – 20 – 25 – 2 of the ASC requires the company to accrue the estimated loss (with a charge to income) and make the necessary disclosures. If the estimated loss is actually composed of a range of amounts, and no amount is a better estimate within this range, the requirement is to accrue the lowest amount and disclose the difference between the highest amount in the range and the amount accrued as this will inform the financial statement reader that more losses may be paid in the future (ASC 450 – 20 – 55 – 18 and ASC 450 – 20 – 55 – 36).

Regarding the mortgage of the company, any disclosure or adjustment in the balances will depend upon the results of the company’s negotiation with its mortgage lender. Any gain or loss resulting from the negotiation needs to be recognized in the current period in accordance with ASC 60 – 35. If the company files for a Chapter 11 or if the mortgage is rewritten, rewriting or writing off of the mortgage will still depend on the outcome of such negotiations.As to the intangible asset, namely the patent, if the loss contingency becomes probable, the company will need to record an impairment for the patent, such impairment will be charged to the company’s current income as loss (ASC 350 – 30 – 35 – 11).

On the other hand, the hedge (assuming that it does meet the requirements for it to be designated as a hedge under ASC 815 – 20), the net gain related to the patent, which was originally recognized under accumulated other comprehensive income, shall be reclassified and recognized as part of the company’s earnings under ASC 815 – 30 – 35 - 43.ReferencesFinancial Accounting Standards Board. ASC 450 – 20: Loss Contingencies. Retrieved from: http://asc.fasb.org/section&trid=2127173%26analyticsAssetName=subtopic_page_subsection%26nav_type=subtopic_page#topic-450-20-25-subsect-01-108346.

Financial Accounting Standards Board. ASC 350 – 30: General Intangibles Other than Goodwill. Retrieved from: http://asc.fasb.org/subtopic&trid=2144471&nav_type=left_ nav&analyticsAssetName=subtopic_page_left_nav_subtopic. Financial Accounting Standards Board. ASC 815 – 30: Cash Flow Hedges. Retrieved from: http://asc.fasb.org/subtopic&trid=2229291&nav_type=left_nav&analyticsAssetName=subtopic_page_left_nav_subtopic.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Response to Client Request II Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Response to Client Request II Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/finance-accounting/1580319-response-to-client-request-ii
(Response to Client Request II Essay Example | Topics and Well Written Essays - 500 Words)
Response to Client Request II Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/finance-accounting/1580319-response-to-client-request-ii.
“Response to Client Request II Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/finance-accounting/1580319-response-to-client-request-ii.
  • Cited: 0 times

CHECK THESE SAMPLES OF Response to Client Request II

Simple Network Time Protocol

It has been described by Network Working Group in their request for Comments: 1305 specifications.... These protocols SNTP has been described by Network Working Group in their request for Comments: 1305 specifications.... Other than the selection of address in the request, the operations of anycast and unicast clients are identical.... A unicast or anycast client initializes the NTP message header, sends the request to the server and strips the time of day from the Transmit Timestamp field of the reply....
11 Pages (2750 words) Essay

Protocols Used in World Wide Web

Each request from client consists of one or more lines of ASCII text.... GET: The GET method is used to make a request to the server for send a page and this page is suitably encoded by MIME.... The internet is a world wide network that provides electronic connection among computers and the web is distributed system that runs on top of it. Internet consents to exchange of information among In a distributed system, interconnections between the systems are in a client-server model....
6 Pages (1500 words) Essay

The Development and Implementation of an Inventory Management System

The purpose of this study "The Development and Implementation of an Inventory Management" is to understand how companies operating in the pharmaceutical sector can harness opportunities that information technology presents to make their operations more efficient, satisfying, and profitable.... hellip; The order processing system will handle order management right from placement to processing, while concurrently updating the inventory automatically....
11 Pages (2750 words) Research Proposal

Security in Short Range Wireless Networks

The paper "Security in Short Range Wireless Networks" argues security can be achieved through the establishment of a secure channel.... The speed and is ease of access are a positive feature of this technology.... Short-range networks offer good avenues for data exchange, communication, and development....
12 Pages (3000 words) Case Study

What is a wireless pineapple and how does it work

ii.... The Karma method often sends out probe request to want information from a specified point by SSID or access points that are specified by the broadcast SSID.... This reduces Karma attack by sending Broadcast probe request only instead of all the SSIDs.... ifi Pineapple Mark V is Equipped with 2 radios it can work in client mode meaning it can piggyback on a nearby WiFi network and bridge the victims connections .... he correct access point-AP,will always probe a response in which the client will initiate an association thus connection to home networks....
2 Pages (500 words) Essay

Distributed Web Service

These are request Dispatch Module, which has a router that accepts connections normally in the form of TCP connection on which HTTP will be used to issue the actual requests.... The request will be encoded using the SOAP standard, and dispatches the request to an appropriate server or other back-end process.... Normally, the server will be external to the request dispatcher, although perhaps on the same computing platform.... Binding occurs when a process that needs to talk to a distributed service becomes associated with a specific server that will perform request on its behalf....
8 Pages (2000 words) Assignment

Business Proposal for AMP Co

With a wide client base and diversified financial services, AMP boasts of an excess of one hundred Australian Dollars in assets under the management of AMP.... … Assessment Task 1Log IDDate –Time LoggedName of ClientName of OperatorProblem DeterminedPriorityL519:15 amJohn Smith(Accounts Dept)ABCInstallation of Network printer LOWL529:45 amBrian Barnaby(Finance Dept)ABCOCR (optical character recognition) Assessment Task 1Log IDDate –Time LoggedName of ClientName of OperatorProblem DeterminedPriorityL519:15 amJohn Smith(Accounts Dept)ABCInstallation of Network printer LOWL529:45 amBrian Barnaby(Finance Dept)ABCOCR (optical character recognition) Scanning text to the computer....
12 Pages (3000 words) Assignment

Client Support in the IT Sphere

Availing any tools or IT equipment that the IT personnel need within 24 hours after the formal request is submitted in order to facilitate smooth handling of assigned IT work.... … Agreement OverviewThis Service Level Agreement represents an agreement between PeopleSource and the Facilitator (representing the employees) on the provision of IT services that are required in supporting the client's services.... It should be noted Agreement OverviewThis Service Level Agreement represents an agreement between PeopleSource and the Facilitator (representing the employees) on the provision of IT services that are required in supporting the client's services....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us