The Swier Law Firm Corporate and Business Law FAQs

Corporate and Business Law FAQs The Swier Law Firm

 

Have questions? We have answers! Our South Dakota attorneys answer the questions they hear most often from clients just like you.

  • Page 1
  • What Will Be The Required Application Documents For The PPP?

    Here is a list of what we believe you'll need for a lender to process your PPP application:

    • Completed Application
    • Completed SBA Paycheck Protection Program Application Form (SBA Form 2483)
    • Articles of Incorporation/Organization of each borrowing entity
    • By Laws/Operating Agreement of each borrowing entity
    • All owners Driver’s Licenses (front and back)
    • Certification Form executed by the recipient
    • Payroll Expense verification documents may include, but not limited to, the following (subject to change once SBA guidelines have been released): 
    •  
      • IRS Form 940 and 941
      • Payroll Summary Report with corresponding bank statement
      • If a Payroll Summary Report is not available, Employee Pay Stubs as of February 15, 2020 (or corresponding period) with corresponding bank statement
      • Breakdown of payroll benefits (vacation, allowance for dismissal, group healthcare benefits, retirement benefits, etc.)
      • 1099s (if Independent Contractor)
      • Certification that all employees live within the United States. If any employees do not live in the Unites States, provide a detailed list with corresponding salaries of all employees outside the United States
      • Trailing twelve-month profit and loss statement (as of the date of application) for all applicants.
    • Most recent Mortgage Statement or Rent Statement (Lease)  
    • Most recent Utility Bills (Electric, Gas, Telephone, Internet, Water) 

  • As a new business owner in Sioux Falls, I've been told that I should consider all of my workers to be "independent contractors." Is this true?

    No. Most small business owners worry about initial start-up costs and continuing overhead expenses.

    One popular "myth" that small business owners often hear is that designating your workers as "independent contractors" and not as "employees" is a great money-saving technique.

    However, there are strict legal definitions of employees and independent contractors.  And any business that incorrectly classifies its workers can create significant legal liability relating to taxes, workers’ compensation, wage-and-hour issues, and unemployment insurance.

  • How do I start a business in South Dakota?

    In business, there are no guarantees. There is simply no way to eliminate all of the risks associated with starting a business, but you can improve your chances of success with good planning, preparation, and insight. In particular, knowing how the law affects your business can help you avoid many costly risks. More and more, the law affects every aspect of a business operation - from relationships with landlords, customers, and suppliers to dealings with governmental agencies over taxes, licenses, and zoning.

    In The 11 Essential Tips To Starting And Running A Business in South Dakota™, Swier Law Firm's Business & Corporate Law Practice Group provides a step-by-step process to starting your business in our state.

    For more information - click here.

  • What is the Family and Medical Leave Act (FMLA)?

     

    The FMLA prohibits an employer from taking adverse action against an employee because the employee exercises a right to which she is entitled. Taking FMLA leave, however, does not give an employee greater protections against termination for reasons unrelated to the FMLA than was available before. In other words, termination is actionable under the FMLA only if the employee was discharged because of her FMLA leave. To proceed with a claim, an employee must present sufficient evidence for a jury to find that her termination was motivated by her exercise of rights under the FMLA.

  • What is a data breach under South Dakota's Data Breach Notification Law?

     

    South Dakota's Data Breach Notification Law defines a “breach of system security” as the unauthorized acquisition of unencrypted computerized data or encrypted computerized data and the encryption key by any person that materially compromises the security, confidentiality, or integrity of personal or protected information maintained by the information holder.

    The term does not include the good faith acquisition of personal or protected information by an employee or agent of the information holder for the purposes of the information holder if the personal or protected information is not used or subject to further unauthorized disclosure.

  • How Can I Enhance My Website's Domain Name?

    A website is a basic element for any business today. When creating a domain name, many businesses settle on something that fits their product, but fail to reap the full potential of domain-naming by failing to make it a trademark. If you want to make dual use of your domain name, as not only a place in cyber space and but also as a trademark in which your have an ownership interest, keep the following in mind:

    • The standards for acquiring a domain name and a trademark are different. Just because a domain name is available doesn't mean it's capable of being trademarked. Trademark is governed by state and federal law and has completely different requirements.

     

    • The purpose of trademark is to distinguish your business from competitors. Don't get fixated on a domain name that's identical to your business name. If it's available, great. But if it's not, you can probably come up with a domain name that echoes your business name and that is distinct enough to earn trademark protection. 

     

    • Think about trademarking early. Trademarking in cyber space is competitive. Tons of businesses establish an online presence every day. Business in cyber space happens so fast that your opportunity could be gone in an instant. 

    The above considerations are provided for informational purposes only. To find out the requirements for trademark, and whether your domain name could become intellectual property, it is best to consult with an attorney.  

  • What is the Computer Abuse and Fraud Act?

     

    The Computer Abuse and Fraud Act (CFAA) is a broad federal law that criminalizes numerous activities related to computers and computer networks. The CFAA is not only a criminal law, but also gives private individuals and corporations the right to sue to recover damages.

    The Act forbids anyone from accessing a computer "without authorization." The courts have interpreted this to mean that violating a company's terms of service is equivalent to "accessing that company's computers without authorization." Because the law threatens to burden free expression conduct (such as journalists or researchers using automated web browsing tools), some critics, including free speech advocates have voiced criticism of the CFAA's role in social media censorship.

  • South Dakota Cyber Law - What is the Digital Millennium Copyright Act?

     

    The Digital Millennium Copyright Act of 1998 (DMCA) was the foundation of an effort by Congress to implement United States treaty obligations and to move the nation's copyright law into the digital age. But as Congress recognized, the only thing that remains constant is change. The enactment of the DMCA was only the beginning of an ongoing evaluation by Congress on the relationship between technological change and U.S. copyright law. 

    The DMCA is divided into five titles:

    • Title I, the “WIPO Copyright and Performances and Phonograms Treaties Implementation Act of 1998,” implements the WIPO treaties.  
    • Title II, the “Online Copyright Infringement Liability Limitation Act,” creates limitations on the liability of online service providers for copyright infringement when engaging in certain types of activities.
    • Title III, the “Computer Maintenance Competition Assurance Act,” creates an exemption for making a copy of a computer program by activating a computer for purposes of maintenance or repair.
    • Title IV contains six miscellaneous provisions, relating to the functions of the Copyright Office, distance education, the exceptions in the Copyright Act for libraries and for making ephemeral recordings, “webcasting” of sound recordings on the Internet, and the applicability of collective bargaining agreement obligations in the case of transfers of rights in motion pictures.
    • Title V, the “Vessel Hull Design Protection Act,” creates a new form of protection for the design of vessel hulls. 

  • What Are The Three Types of Cyber Crimes?

     

    There are three major categories of cyber crimes:

    1. Crimes Against People 

    These crimes include cyber harassment and stalking, distribution of child pornography, credit card fraud, human trafficking, spoofing, identity theft, and online libel or slander.

    2. Crimes Against Property 

    Some online crimes occur against property, such as a computer or server. These crimes include DDOS attacks, hacking, virus transmission, cyber and typo squatting, computer vandalism, copyright infringement, and IPR violations.

    3. Crimes Against Government 

    When a cybercrime is committed against the government, it is considered an attack on that nation's sovereignty. Cybercrimes against the government include hacking, accessing confidential information, cyber warfare, cyber terrorism, and pirated software.

  • Protecting Your Ideas - What other social media platforms should I protect?

     

    Few things are worse than taking the time to register your business name and obtain your trademark but losing the ability to have matching social profiles. A large portion of digital marketing takes place on your social media accounts and having identical names can be the difference between a customer finding you or finding your competitor.  For example, you should register “@mycompany” on Twitter and Facebook.com/”mycompany” to maintain the rights to them. You should consider claiming these online account profiles:

    • Facebook
    • Twitter
    • Instagram
    • Snapchat
    • Reddit
    • LinkedIn
    • Google+
    • YouTube