Breaking Down Bill-and-Hold Arrangements

What are Bill-and-Hold ArrangementsLooking at accounting and journal entry considerations, if accounts receivables are debited and revenue is credited, it can be interpreted as the business recognizing revenue without the customer paying. As such, the U.S. Securities and Exchange Commission (SEC) sees the potential for intentional manipulation of earnings. It is important to review this type of transaction to see how the U.S. government and accounting standards treat deviations from these activities.

Defining Bill-and-Hold Arrangements

This type of agreement permits sellers to recognize revenue before delivery is made. Instead of shipping the product first, the seller bills the customer first, and delivery is arranged for a future date.

Based upon Accounting Standards Codification (ASC 606-10-55-83) and the U.S. Securities and Exchange Commission (SEC), for a customer to have obtained control of a product in a bill-and-hold arrangement, they must meet all of the following in order to move ownership of the product to the customer, with the seller still in custody of it.

  • Customers have explicitly asked for such an arrangement. Purchasers have to demonstrate a material reason for buying the goods through this route.
  • The goods must be sequestered explicitly for and attributed exclusively to the customer.
  • Customers must be able to physically receive the goods.
  • The separated goods are expressly prohibited from being used for any other purposes, including those of other customers.
  • Purchasers assume all risk.
  • There’s a written, fixed commitment to buy the goods.
  • The ultimate delivery of goods must be done according to a set timeline that follows realistic commercial uses.
  • The finished goods shall be 100 percent finished and be transit prepared.

Illustrating a Bill-and-Hold Arrangement

Companies in commodity-intensive establishments (miners, farmers, etc.) often use heavy equipment to recover and produce outputs. Since a mining or energy company is unsure of the profitability when recovering resources that are price-dependent on dynamic economic conditions, they often enter into a bill-and-hold arrangement with their supplier. Since the steel producer and the drilling company have an existing arrangement with standard terms, there’s an established history of bill-and-hold transactions. If machinery or drilling equipment is fully built for one of these companies, the equipment manufacturer will sequester the equipment and prohibit it from being shipped to any other buyer. Similarly, the invoice for the equipment must be satisfied by the customer in full within 30 days of the equipment being placed and waiting for the resource company buyers. The last step is for the buyer to arrange delivery in a reasonable manner.   

Based on this real-world example, revenue should be recognized once it’s set aside exclusively for a particular mining or natural resource extraction company.

Considerations Beyond the Goods Themselves

Goods producers also must determine if there’s a custodial component during a bill-and-hold arrangement. If a custodial arrangement exists, either part of the original cost of goods sold to the customer needs to be determined or a separate charge, and therefore, exclusive recognition of revenue for the custodial services provided should be addressed outside of the bill-and-hold arrangement.

When it comes to revenue recognition under certain circumstances, goods producers may be able to recognize revenue despite the traditional requirement that goods have left a business, and the seller has materially satisfied their traditional requirement for accounting standards.

5 Tips to Keep End-of-Year Spending Under Control

5 Tips to Keep End-of-Year Spending Under ControlIt’s that time of year again. Halloween has just come and gone – and now we’re hurtling headlong into Thanksgiving and Christmas. For holiday shopping, it’s tempting to turn a blind eye and put everything on your credit cards. However, if you don’t want to have a financial hangover in January, February (and so on), you might want to take a look at these tips.

Create a Budget and Stick To It

The earlier you sit down and do this, the better. Decide on a financial cap per gift per person, then shop. Then, get creative. For instance, what if you bought a pre-loved item for someone? Made something for someone? You might also decide on a gift, then shop around and compare. So, when Black Friday and Prime Days raise their heads, you’ll already have made your selections. More on that below.

Put a Lid on Impulse Buying

This is a tough one. As mentioned above, Prime Day and Black Friday are hard to avoid. They scream at you on your TV and phone scroll, so it’s easy to get off track. If you want to avoid runaway spending, here are two ways to approach these retail spectacles. First, you can keep an eye on which item you want – then plan and research. Buy it when the price is crazy low, and walk away from all the frenzy, all the while tracking your spending. Second, you can dive right in, browse all you want, then put some things in your cart. But don’t buy it then. Come back a day later and decide if the purchase is really necessary. At this moment, you might also imagine the pain you could feel in 2025 with a bunch of debt hanging over your head. Employing this mindset could make all the difference.

Use Your Credit Cards Wisely

According to Jennifer Ellis, senior consumer manager at BOK Financial, credit card debt is on the rise. And with high interest rates, if you do have a balance, you’re going to pay more for your items. Before you set out to buy gifts, try to pay your credit card balances in full to avoid big fees. This way, you won’t carry the burden of a lot of debt into the new year.

Try Envelope Stuffing

This is an old trick, but a good one. Get envelopes, put the name of your giftee on the front, then put the amount of money you’re going to spend in it. Once you’ve used up the cash in the envelope for said person, you’re done. Also, using cash is more startling – you see the money go bye-bye! It’s so easy to gloss over the actual cash amount when you’re using plastic, as it almost doesn’t seem real. Working with real moolah is a tried-and-true technique, a wake-up call that you’ll appreciate.

Plan Early for Travel

Buy your tickets early for Thanksgiving and the December holidays. Monitor airline, bus, and train websites. Set alerts to notify you when the prices go up or down. All it takes is a little time and elbow grease. In the end, it’s worth it.

Most importantly, having a financial plan during this time of year is key. Yes, life is busy, but if you want to step into the new year without carrying the shackles of debt, using some of these ideas might be your saving grace.

Sources

https://thestatement.bokf.com/articles/2024/10/the-spookiest-trend-spending-too-much-on-the-holidays 

 

2025 Federal Income Tax Brackets

2025 Projected Tax BracketsAccording to estimates, inflation adjustments to the Internal Revenue Code are expected to yield increases of 2.8 percent compared to 2024 amounts. This means wider tax brackets and increased exemptions, among other things. With the U.S. Bureau of Labor Statistics consumer price index (CPI) moderating, this increase is about 50 percent less than 2024’s inflation adjustment. Below, we’ll look at what the projected 2025 inflation adjustment means in terms of dollars and cents for you and your taxes.

Individual Income Tax Brackets

The tables below illustrate the individual income tax rates and brackets for 2025.

Individual Income Tax Brackets & Rates: Tax Year 2025

Single Taxpayers
10% 0 – $11,925
12% $11,926 – $48,475
22% $48,476 – $103,350
24% $103,351 – $197,300
32% $197,301 – $250,525
35% $250,526 – $626,350
37% $626,351 and Over

 

Married Filing Jointly
10% 0 – $23,850
12% $23,851 – $96,950
22% $96,951 – $206,700
24% $206,701 – $394,600
32% $394,601 – $501,050
35% $501,051 – $751,600
37% $751,601 and Over

 

Married Filing Separately
10% 0 – $11,925
12% $11,926 – $48,475
22% $48,476 – $103,350
24% $103,351 – $197,300
32% $197,301 – $250,525
35% $250,526 – $375,800
37% $375,801 and Over

 

Heads of Household
10% 0 – $17,000
12% $17,001- $64,850
22% $64,851 – $103,350
24% $103,351 – $197,300
32% $197,301 – $250,500
35% $250,501 – $626,350
37% $626,351 and Over

 

Trusts & Estates Tax Brackets

The table below illustrates what the income rates and brackets are expected to look like for Trusts and Estates in 2025.

Projected Trusts and Estates Tax Brackets & Rates: Tax Year 2025
10% 0 – $3,150
24% $3,151- $11,450
35% $11,451 – $15,650
37% $15,651 and Over

 

Standard Deduction Amounts

The table below illustrates what the projected standard deduction amounts will be for 2025, with a comparison to 2024.

Projected Standard Deduction Amounts
  2024 2025
Single $14,600 $15,750
Married Filing Jointly $29,200 $31,500
Married Filing Separately $14,600 $15,750
Head of Household $21,900 $23,625

 

Alternative Minimum Tax (AMT)

The table below illustrates the anticipated AMT exemptions for 2025.

AMT Exemption Amounts
Tax Year 2025
Single $88,100
Married Filing Jointly $137,000
Married Filing Separately $68,500
Trust & Estates $30,700

 

Capital Gains

The rates applied to long-term capital gains are not expected to change for 2025; however, the brackets that apply to different rates will expand. Note that, in considering the table below, a 20 percent tax rate applies to capital gains that are over the 37 percent ordinary tax rate threshold. Furthermore, capital gains on art and collectibles are subject to other exceptions.

Maximum Capital Gains Rates for 2025
  Zero Rate 15% Rate
Single $48,350 $533,400
Married Filing Jointly $96,700 $600,050
Married Filing Separately $48,350 $300,000
Head of Household $64,750 $566,700
Trusts & Estates $3,250 $15,900

 

Conclusion

First, it’s important to remember that all the figures above are only projections. The IRS will not publish the official numbers until later this year. Moreover, as these rates and brackets have increased, they have done so significantly less than in 2024 and 2023, largely driven by lower inflation.

Cash Conversion Cycle (CCC) Defined

Cash Conversion Cycle (CCC) DefinedThis metric, which is also referred to as the cash cycle or the net operating cycle, looks at the time a business takes to recover its investment in inventory to eventually sell. The process starts from selling its goods, collecting on outstanding receivables or invoices, and satisfying its operating costs with the sale proceeds. It’s normally measured in days to determine the company’s financial health.

The less time necessary to complete the CCC, the healthier a company is financially because it means the business’ money spends less time tied up in inventory or collecting on outstanding inventory. It’s important to be mindful that different industries have different CCC time frames. Generally speaking, most calculations are done on either a quarterly (90 day) or an annual basis (365 days).

How to Calculate CCC

The formula is as follows:

(CCC) = Days Inventory Outstanding (DIO) + Days Sales Outstanding (DSO) − Days Payable Outstanding (DPO)

It can be broken down into three different stages:

Stage 1

Days Inventory Outstanding (DIO) looks at how many days the inventory takes to sell to customers. It’s calculated as follows:

DIO = (Average Inventory (AI) / COGS) x Time-Frame (In Days)

AI = 1/2 x (BI + FI)

BI = Beginning Inventory

FI = Final Inventory

It’s important to define COGS, taken from the Income Statement, which is Cost of Goods Sold or the costs personally connected to creation of goods or services (raw materials, labor or electricity). The lower the number, the faster a business is selling its goods.

Stage 2

Days Sales Outstanding (DSO) measures the time it takes the business to collect payment from all outstanding sales completed.

DSO = Average Accounts Receivable (AAR) / Daily Revenue

AAR = 1/2 x (SAR + FAR)

SAR = Starting AR

FAR = Final AR

Accounts Receivable are what companies record on their balance sheet to keep track of what customers owe for the goods delivered or services rendered. The lower the results, the better the company’s cash position is because they’re able to satisfy outstanding invoices.

Stage 3

Days Payable Outstanding (DPO) is the third and final stage that calculates how much businesses owe to their suppliers the business has sourced input materials from, within the time frame the suppliers’ invoices are due.  

DPO = Average Accounts Payable (AAP) / Daily COGS

Where:

AAP = 0.5 x (SAP + FAP)

SAP = Starting AP

FAP = Final AP

COGS = Cost of Goods Sold

There are different ways to interpret the DPO result. A low DPO means the business is taking care of its bills from suppliers. However, potential investors, internal managers, and supervisors can see if the business can either negotiate lengthier payment terms while still maintaining good terms or if the company negotiates early payment terms or invests the money on a short-term basis to earn more for the company before paying suppliers’ bills. A high DPO, after an investigation of a company’s financials, might show the company is taking longer than its peers to pay creditors.

While calculating the CCC is relatively straightforward, the more complex process is interpreting it correctly and using judgment for a business based on industry averages and how the numbers relate to current economic conditions.

Zero Trust Security Models: The New Standard Against Data Breaches?

Zero Trust Security Models: The New Standard Against Data Breaches?As technology evolves, so have data breaches, which have become a significant threat to businesses of all sizes. We frequently hear reports of high-profile attacks on major organizations, global corporations, and even government agencies. Emerging technologies such as generative artificial intelligence and machine learning make cybersecurity more challenging. They enable cybercriminals to automate attacks, create sophisticated phishing schemes, and develop advanced malware to evade traditional security measures. Hence, companies have no choice but to change how they approach cybersecurity.

To deal with these modern threats, Zero Trust security models are gaining widespread adoption as the preferred standard for effectively protecting against data breaches.

What is Zero Trust?

Zero Trust is a cybersecurity framework based on the “never trust, always verify” principle. Unlike traditional models that grant access based on network location, Zero Trust requires continuous verification of each user, device, and application attempting to access resources.

Instead of assuming that someone within the network can be trusted, Zero Trust demands constant authentication and least-privilege access. This means users are granted access to only the data and resources they need to perform their tasks. Basically, every interaction is assumed to be a breach.

How Zero Trust Differs from Traditional Security Models

Historically, businesses operated on a “perimeter-based” approach – trusting everything inside their network and guarding against threats from the outside. However, the once-clear network boundary has become unclear with the rise in remote work, cloud computing, and mobile devices. Breaches today can occur internally, often by compromised accounts, rogue insiders, or lateral movement of malware.

Cyberthreats have become such a huge problem that the U.S. government issued an executive order to help improve the nation’s cyber security by mandating that federal agencies adopt the Zero Trust architecture. This further pushes businesses to rethink their cybersecurity strategies.

Key Components of a Zero Trust Model

Zero Trust models are built on several core principles:

  • Continuous verification – Authentication is ongoing, requiring verification for every request made by a user or device.
  • Least-privilege access – Users receive only the minimum level of access needed to perform their jobs.
  • Micro-segmentation – Networks are divided into smaller zones, limiting the lateral movement of potential threats.
  • Contextual monitoring – Continuous monitoring of users and devices based on context – such as location, device health, and behavior – to identify abnormal activities.
  • Multi-factor authentication (MFA) – MFA requires users to provide two or more forms of authentication, such as a password combined with a biometric factor or a security token.
  • Encryption – All data must be encrypted to protect it from unauthorized access or interception. Encryption ensures that even if attackers manage to capture data, they cannot read or exploit it without the appropriate decryption keys.
  • Access Controls – Applying strict policies to determine who can access specific data and systems based on their role and identity.

Benefits of Zero Trust

  1. Stronger protection against data breaches – Zero Trust models significantly reduce the risk of data breaches by enforcing strict identity verification and limiting access to only necessary resources. Even if an attacker gains entry, micro-segmentation ensures limited movement, containing threats, and minimizing damage.
  2. Enhanced regulatory compliance – Zero Trust helps businesses meet regulatory requirements like GDPR and HIPAA by enforcing strict access controls and continuous monitoring. This approach simplifies compliance and ensures that only authorized users can access sensitive data, reducing the risk of fines.
  3. Improved visibility and control – With continuous monitoring, Zero Trust provides better visibility into network activity, making detecting suspicious behavior in real-time easier. This added control enhances security and operational efficiency, allowing immediate responses to potential threats.
  4. Reduction of insider threats – Zero Trust minimizes insider threats by requiring strict identity verification and limiting access, even for internal users. This makes it harder for malicious insiders or compromised accounts to cause significant damage within the network.
  5. Support for remote work and cloud environments – Zero Trust offers safe access to resources from any location. This flexibility ensures that businesses maintain strong security for both in-office and remote teams.

Conclusion

Zero Trust security models represent a significant shift from traditional perimeter-based defenses to a more dynamic and resilient approach. For business owners, adopting Zero Trust principles can provide peace of mind and enhanced protection in today’s unpredictable cyber landscape. With time, emerging technologies like artificial intelligence, IoT, and cloud computing will continue to shape the evolution of Zero Trust, making it an essential part of a robust cybersecurity strategy.