Decision Making

How (not?) to make decisions

The idea I follow is that a decision is a choice made with insufficient information. Of course the information may be so scant that in reality it’s sheer guesswork. In this last case the spin of a coin will be as effective if not more so.

Decision or choice or guess?

Guess

So, spin the coin, guess the side before it lands. You KNOW you are guessing. This is what guessing feels like. It’s exciting and fun, in this scenario. It’s that fear of not knowing what’s about to happen, the thrill.

Conversely consider the stock market. Ordinary folk usually lose money because they are guessing despite thinking they are not (yes me too).

How to know the difference? Hindsight is a great tool, albeit far too late. However, looking back at how one was feleing when now it has become apparent we had no idea what we were doing and were therefore just guessing. That’s useful if you can recall such an occasion(s). You need to get to know that feeling and use it, recognise it.

An intellectual way to identify if we are guessing is to ask oneself a few questions:

  • Have I done this before? No.
  • Have I had training in this? No.
  • Do I know what someone else, say George, is thinking? No. Really not.
  • Do I know how George will deal with this? No - and do not confuse this with how you would deal with it or feel about it and assume (guess!) George would be the same as you; that’s highly unlikely as they are not you. (Remember this is in business and is not about extremes where pretty much everyone is the same.).
  • have I asked George? No.
  • I think x”. Why? I just think”x”. THAT is unfounded guesswork, wild guessing.
  • I feel hesitant. Why? Unsure about how George will react/feel/think/etc? As above, that means don’t know” which means have no idea” which means guessing.
  • I feel uncertain. Why? Same as hesitant above.
  • DO NOT GUESS. This is known as having no idea what one is doing”. Please do not be that person - in business. Find someone who knows, for a start Mrs Google. Ask the right professionals the right questions and you will get the right answers, without it costing a fortune.
  • The right professionals? Those recommended to you by people whose opinions you can respect.

Decision

A decision is a choice made with insufficient information. Now then, uncertainty” clicks in here. We have loads of info, but still do not feel right about it. First we run down the Guess checklist. If we survive that and indeed if we do not, we need to collect more information and if totally guessing thus far, lots of it.

Choice

Easy. The common phrase these days is it’s a no brainer”. You have all the necessary information and the choice is obvious.

The difference is how each feels

That’s it. Learn the difference and use it.

Judgement calls

There is ONE thought. Faced with making a judgement call”, which means deciding now as regards a future matter. No one knows the future, so yes, this is a form of guess.

Let’s make it as informed as possible.

Collect all the info - not least the judgement of others; for example will the government legislate on a matter this way or that way and when? There’s always lots of opinion out there.

Do I have experience in this area? Yes many years.

Is it wise to do nothing? Consequences?

Doing nothing usually means accepting unknown consequences through not being prepared. Of course if a person cannot see that’s another story. Sweeping up at the year end is to make oneself a victim of the absense of management. That is otherwise known as seat of the pants” management. I call that negligence, or wilful neglect. Nuisance matters are easily reduced to simple processes that need next to no attention. Being too busy” is absolutely no excuse; to either me or the law of the land. Business is all about priorities (busy ness). I use the Eisenhower Method

The Eisenhower Method

The plan in this is NEVER to have anything that is both urgent and important; this is called fire fighting”. The idea is always to deal with important matters BEFORE they become urgent. This way lies peace and tranquility. The trick is proper planning; the fives p’s etc. pppppp ok so that’s 6. What do I do? I deal with important matters immediately, so my diary stays empty. Leaving our taxes until a month after the deadline is downright foolish, not to mention stressful for the many months leading up to it. JFDI. Just Do It.

So, what is information?

Hmm. Good question. These days we suffer from information overload and the modern currency is our attention, which is being actively sought every second. This attention seeking puts any attention seeking child to shame. However, these seekers of our attention are all trying to make a profit out of our attention, so their motives are in their own interests, and absolutely not ours. They give not one jot for us.

Sources of information are endless. Start with identifying your questions, this makes us focus on the problem rather than worrying about solutions.

Constructing google queries is definitely a skill in itself, so use google (etc. I use DuckDuckGo) to fashion your questions. Identify key words and jargon that begin to generate suitable looking answers. Then validate them. The internet is full of fake news, misinformation, disinformation and general rubbish. Not to mention malicious web sites. If you are not very good at this find someone who is, they may be closer than you think.

Ask your advisers. By all means validate what they say. Do ask their experience and training if you do not already know; people are usually very happy to explain these things. These being advisers you selected based on recommendations from trusted parties - not google.

My best advice? Sleep on it. Literally. See how it feels in the cold light of day. The converse of this is act in haste, repent at leisure”.

Combatting the constant attention seeking

Notifications OFF.

Really. Arrange your apps so that all the ones you might wish to monitor are in the same place; each one set to display how many new messages” it has waiting. Watch out for apps that ignore this, like Whatsapp, and set it in its own settings to be silent”. Wait until YOU are ready to check. Take control over your attention and where it goes; focus it for your own benefit and not someone else’s.

Phone set to SILENT

Maybe let it vibrate. Again, check recent calls” when YOU are good and ready. Of course if you are an emergency responder this is not for you. Clearly. It is for everyone else where every random caller behaves as if they should be responded to as an emergency.

Use do not disturb” (DND)

Consider using do not disturb” (DND) and set settings to specify who can break through and/or how. I do this 10pm to 10am; your times will be different, or even 24 hours a day etc. Of course also you can switch DND on and off as desired.

Silence unknown callers

Consider silencing all unknown callers, meaning any number not in your address book. Sure, not good for a taxi driver or hairdresser etc. Likewise this can be switched off when thought necessary - such as an expected unknown call from your bank etc. Later unknown calls will remind us to re-enable the block - it’s not a block”, it just stops the ringing noise and lists them in missed calls so none need be unseen.

Email - books are written about this one.

Unique emails and passwords (separate page as it’s long, use back” button to come back here.)

If your email address is going in to someone’s database, give only a unique as above. If it is going ONLY in to a person’s address book, then we can use our usual email address, but do have different ones for work and private. This may mean having two domains. Domains these days can be very cheap at well under £5 a year. If you choose free” then YOU are the product being sold. In my opinion you are better being business like if you are in business on your own account. Free, just isn’t free. No such thing as a free lunch. So if we are going to pay, we may as well get some benefits.

About having two domains

To avoid runnib two domains we could have one and use a sub” domain for personal emails, or indeed use one of the free providers like gmail/hotmail etc and use the business domain to filter unique emails with different filters. For example listsme. and listsbiz. at mydomain.com. Whatever works for you to implement these ideas. Maybe your accountants can offer you these benefits as part of their service. They may offer free limited companies so why not associated services? The answer being a free company is a one off give away and all associated services get charged for.

August 25, 2025

Cyber Threats No1 Ransomeware

Ransomeware is cyber threat No1

It is notable that one of Dr Who’s worst enemies was the Cybermen; Emotionless Machines (i.e. computers).

Here is how RANSOMEWARE operates - described as metaphor

Imagine someone steals your computers, and offers to return them in exchange for an amount of money. The amount may be small or enormous. They have also destroyed all your backups. IF you pay them, they may or may not actually return all your gear. When all is said and done these are crooks so cannot be trusted, of course.

and without the metaphor

They do not physically steal your kit. Via the internet they gain access to your computers’ data and make it inaccessible to you until you pay them for the secret code needed to gain access. The process is called encryption”, and that needs a key” to de crypt it. What you pay for is that key”, which may or may not work. When all is said and done, these are crooks so cannot be trusted, of course.

To pay or not to pay?

IF you pay them, they may or may not actually return all your gear / give you the decryption key. As I have said above, they are crooks so cannot be trusted. On top of this they may engage in further extortion by demanding payments to not publish your data on the internet; in other words blackmail.

My system is secure they cannot gain access”. Yes. They can with frightening ease.

Here’s the problem, they gain access by acquiring internal credentials. They do this by various methods, the two most common are phishing” and man in the middle” (MITM) attacks.

https://en.wikipedia.org/wiki/Phishing

https://en.wikipedia.org/wiki/Man-in-the-middle_attack

Where large sums of money are involved they will even acquire physical access to systems such as those in data centres, for example by renting the rack next door so all they need is to crack a lock. Similarly physical access to server rooms at your site by using staff credentials etc.

Identity theft

Theft of your data allows the opportunity for identity theft.

https://en.wikipedia.org/wiki/Identity_theft

That link is salutary reading.

So they can empty your bank accounts, make purchases in your name, buy cars (etc) and take out loans and overdrafts pretending to be you. They will brazenly use the telephone masquerading as you and even present themselves in person (not to you of course).

Beware who has your details capable of being used like this, your nearest and dearest (especially the elderly) and your employees can be vulnerable innocent targets for giving away your identity data. There is no substitute for training, but having it taken seriously can be a challenge.

What is the first thing banks ask for? Date of Birth. What does everyone disclose to Facebook and others? Date of Birth. And so on.

August 25, 2025

Cyber Defences

RANSOMEWARE

There is no defence against the malware known as Ransomeware. There are now many many attempts at defence, but ANYTHING attached to the internet is vulnerable.

UPDATE: it may be a defence against phishing to activate your firewall’s family” protection which can block access to bad” web sites. It’s unlikely to be foolproof, but very much better than nothing.

UPDATE 2: It has become more common to defeat attacks with good backup and restores processes; so now crooks will say ok, so you survived that, well done. If you do not pay us x,000,000 we will publish all your data on the dark web”. That means exposure to identity theft and much else. So this is a heads up” to take great care what unencrypted personal or indeed business data available to steal. Note I said unencrypted”; explore keeping your data or at least some of it encrypted - it’s called encryption at rest” I believe.

Search Here: https://duckduckgo.com/?q=encryption+at+rest&t=brave&ia=web

Therein lies the key

Forgive the intended pun, which is that ransomeware works by demanding payment for a decryption key” and we are looking for the key” to defending against these attacks.

There is only one defence that cannot be attacked, which is:

OFFLINE COPIES / BACKUPS.

OFFLINE means disconnected from the internet and in the event, not attached to computers at all. Think of the ancient floppy disk” and more corporately offline tape backups”.

Crucial to all discussions about offline backups/copies” is how long, how many days back in time these go. For example a simple daily backup will fail by being overwritten by the ransomed data. My last update said this malware is typically resident for several days, two or three, while it carries out its work before declaring itself and demanding the ransom - which demand is usually very polite. Apparently this malware can be in place for months before it activates/attacks so watch out what you restore. Restore data not programs.

I do like the idea of ransomeware detection software that works by placing honeypot” (i.e. attractive to the malware) files which it then monitors for encryption so as to provide early warning. It is however an ongoing battle, so offline is the current established defence. Problem is of course one does lose data even if only” a few days worth.

Large businesses have dedicated departments to engage in active defences, so I am speaking only in the context of small businesses who do not have any or much of a budget for cyber defence. Indeed there are some small businesses who could drop their computers and lose everything and it would not be any loss. We have to consider our position and make choices accordingly.

LAN

Defences

Offline Defence list

CAVEAT

I think it is safe to say nothing in my ideas is free. However, the costs are generally one time, such as buying say 14 SD cards, or if annual then also useful in other regards such as cloud storage services like sync and dropbox etc.

Hard disk drives

HDDs vary from one to 12 or more terrabytes. Note that archive” designated disks are designed to be written to as archives so are cheaper sometimes, but not for desktop or NAS type daily use. Remember these are OFFline which means disconnected and sitting on a safe shelf somewhere (off-site being ideal, but that is another defence story)

SD Cards

250gb Like HDs these are increasing in size. Except for the smallest drives their use requires careful selection of one’s critical data.

Dropbox 3TB et al

Dropbox 3 terrabytes. Sync.com, Google Drive, Apple iCloud Drive, Tresorit and others. SOME and by no means all offer data recovery from a point back in time. Have great care how far back in time and different memberships” have different rewind” times.

S3 Immutable Storage

https://en.wikipedia.org/wiki/Amazon_S3

https://en.wikipedia.org/wiki/Immutable_object

IMMUTABLE is the critical word here. It means the data can be written (saved) only once and cannot be overwritten. Changes are saved as incremental” later additions. This means the earlier saved data cannot be overwritten by ransomeware encryption. This assumes the account itself cannot be deleted or disabled by the ransomeware malware.

Tape backups

These can be expensive, but offer large data storage which is kept offline.

Related links and searches

In searches below make sure to scroll down past the ADverts which can be a whole screen full.

dropbox.com

Backblaze.com

SD Cards search

Big HDDs

Immutable cloud storage

S3 Storage

Backup software to immutable storage

Arq

CASE STUDY - mostly about data sizes and storage sizes.

Describing a real life scenario.

This user has a LAN consisting of several computers, mobile devices and NAS drives.

While calling these backups” (which they are) these are simple copies of files, they are not stored using any dedicated backup software. This means they can be tested directly by checking files are not corrupted. Untested backups that turn out to be corrupted in some way are the cause of many a failed disaster recovery. TEST YOUR BACKUPS.

Video and photos take the most space = TERABYTES

Massive volume of tera bytes of videos and photographs. These by their nature are fixed and do not change, therefore after organising them in suitable fashion they can be saved to one preferably more hard disks and stored both off-site and locally, in suitable packaging bearing in mind the shelf life of unused hard disks up to ten years. He uses a disk cataloguing app to keep track of what is stored where, including all the other backups we mention. This is really like we used to use floppy disks 40 years ago, but those stored only 360k (kilo bytes)

Next come old files, archives and the like = GIGABYTES

Even if over a tera byte I still view this as in giga byte territory. Over a decade or two these can occupy significant amounts of space and they belong on the same type of unchanging storage as the Videos and photos above, but separate because they have a possible probability of being needed, not least for earlier versions of the same work files, data corruption being by far the most usual reason for needing to refer to backups.

Live data - several gigabytes only” 250gb SD Cards

This is where the SD cards come in to play. These are the tiny things we see in mobile phones (NOT Apple) and cameras. Current sizes rise to 250 gigabytes at the time of writing and increasing. So our case study has 14 250gb SD cards and copies to one every day or two, so not necessarily every day at all. This is because given a ransom attack takes say two or three days taking a copy so even taking a copy every day will require going back at least three days to find clean data, bearing in mind we have cloud storage as our first line defence in any case.

Whole system backups to 6tb HDDs

He has six 6TB hard disks and standard” backup software operating with hourly incremental backups. Every few days he switches to the next disk. They are in a caddy” so can be inserted and removed at will by hand.

Whole data cloud backups such as dropbox

This means the likes of dropbox and Sync. However in their business forms so not a mere 5 gigabytes. Subscriptions will be required also to ensure sufficient rewind” history to offer comfort. 30 days can be standard but I prefer 180 days or a year. Our case study has all data synchronised to dropbox with a 180 day rewind facility.

Whole system backups to S3 Immutable storage.

and finally, recently implemented Arq backups to Backblaze S3 compatible immutable storage. These whole systems” differ from the above backups to hard disks because they have very long lists of excluded file types and folders. They do not include the archives of photos and videos.

CASE STUDY NOTES

Beware reliance on duplicated backups

I once had both fail with physical hard disk failure. However, these were in daily use. One lesson I took from that was to consider using different manufacturer’s disks - though granted I don’t currently do that. I do still find disks in use fail with monotonous regularity, when my only remaining backup would be the original data. These days the likes of dropbox, Gdrive and Sync et al offer a defence against this, as ordinary backup copies, but these vary a lot as regards the ability to rewind in time”. Apple appears to offer none at all. None of this considers GDPR.

SD Cards 250gb comment

I have seen bigger ones up to two terabytes, but have no information about their reliability. If this live data is much bigger then small hard drives and indeed SSDs are relatively cheap, it’s just that they take more space. I see on a quick search 2.5” HDDs of one TB costing around £35. That competes well with SD cards. However, SD cards can be carried about in a person’s wallet (thus off-site). That said I used to keep one backup copy in my car door pocket, so depending where I was in the car depended how off site” it was. That was back in the 1980s long before modern day problems. I had a fire safe with backups in it and it was stolen by a burglar (screw it down!). You just never know so multiple types are a must.

Cost types

Physical storage costs a one-off £x per unit and no more. So this is the first 4 types listed opposite. Budget may affect how many of each, but over time suitable numbers should be attainable.

The last two require online subscriptions and licence payments for the software. Of these two the synchronising cloud storage has many other daily useful advantages whereas the S3 storage is straight ransomeware defence cost.

Online backups also

CarboniteMozy,CrashPlan, and BackBlaze are a few online backup services 

Veeam_Ransomware_Retrospective.indd

Successful backups are the last line of defense for cyberattacks and can be the deciding factor to prevent considerable downtime, data loss and paying a costly ransom.

and from VEEAM to quote:

Veeam_Ransomware_Retrospective.indd

Mitigating ransomware attacks

End-user education (20%), bolstering backup storage resiliency (19%) and securing internet access (16%) are the top choices of ransomware mitigation globally. Similar results are seen from a geo perspective where NA, LATAM and EMEA/MEA are more apt to invest in detection, while NA was more likely to use additional network monitoring for mitigation.
To better mitigate ransomware vulnerabilities, customers are now focused on bolstering backup storage resiliency, through immutability, investing in end-user education and securing internet access.

MY OPINION

See above where it says immutability?” It has seemed to me for some time that aside from totally offline (that means disconnected sitting on a shelf) this is the ONLY type of backup defence that can be viewed as likely to be effective. It looks like the experession backup resiliency” (which means nothing at all unless defined) is used to mean immutability”. Ok adding in to it expressions like education” and securing access” are not in my view backup methods, they are defences, for sure, but they are not part of backups. So my whole paragraph here reduces all online defences that are capable of being effective are solely only and nothing else except immutabilty. That means copying your data to a W O R M drive. And no one can have rights to that drive, bceause if someone physically steals it all is for nought. So it needs to be off site and in the cloud so no one actually knows where it is. In reality this leaves small businesses etc with Amazon S3 type storage as the only current provider I am aware of. Backblaze offers compatible resources.

All of that said I think what surprises me is the absence from common knowledge about immutable storage

W O R M stands for Write Once Read Many; so once written it can be read but never deleted (written again). That means immutable”. I plan to have another look at Veeam, but I THINK they are not aimed at small biz.

August 25, 2025

Core Systems And Their Integrations

Sage Business Cloud
• Sage Business Cloud can integrate with a range of third-party applications for various business functions. It has built-in integrations for:
• Bank feeds (automatically sync transactions)
• Payroll (e.g., Xero Payroll, QuickBooks Payroll)
• Inventory management (e.g., TradeGecko, Zoho Inventory)
POS systems (e.g., Lightspeed, Vend, Square POS)
CRM (e.g., HubSpot, Salesforce)
• E-commerce platforms (e.g., Shopify, WooCommerce, Magento)

Sage Business Cloud also supports integration via API, which allows it to connect to additional third-party tools not already listed.

QuickBooks
• QuickBooks has a broad integration ecosystem and works well with many other tools:
• Bank feeds for automatic syncing of transactions.
• Payroll integrations (e.g., Xero Payroll, Gusto, QuickBooks Payroll).
• Inventory management (e.g., TradeGecko, Zoho Inventory).
POS systems (e.g., Lightspeed, Vend, Square POS).
CRM (e.g., HubSpot, Salesforce).
• E-commerce (e.g., Shopify, WooCommerce, Magento).

Additionally, QuickBooks has an extensive marketplace of integrations and API support to connect with other third-party services.

Xero
• Xero supports integrations across various business areas:
• Accounting and bookkeeping (it’s already an accounting tool).
• Payroll software (e.g., Xero Payroll, QuickBooks Payroll).
• Inventory management (e.g., TradeGecko, Zoho Inventory).
POS systems (e.g., Lightspeed, Vend, Square POS).
CRM tools (e.g., HubSpot, Salesforce).
• E-commerce platforms (e.g., Shopify, WooCommerce, Magento).

Like Sage and QuickBooks, Xero has open API support, enabling it to integrate with many other systems.

TradeGecko
• TradeGecko (now QuickBooks Commerce) is a comprehensive inventory and order management system. It integrates with:
• Accounting systems (e.g., QuickBooks, Xero, Sage Business Cloud).
POS systems (e.g., Lightspeed, Vend, Square POS).
CRM tools (e.g., HubSpot, Salesforce).
• E-commerce platforms (e.g., Shopify, WooCommerce, Magento).

TradeGecko offers API access for further integrations with other third-party applications, making it highly flexible.

Integration Systems and Their Cross-Compatibility:

The other systems (e.g., Lightspeed, HubSpot, Shopify, Salesforce, etc.) are third-party tools that are commonly used in conjunction with the core systems for specific business functions. Many of them have extensive integration capabilities as well, allowing them to connect with not only the core systems listed but also other tools you may use. Here’s an overview of some of the integrations’ integration capabilities:

POS Systems (e.g., Lightspeed, Vend, Square POS)

•  These can integrate with accounting systems like QuickBooks, Xero, or Sage.
•   They can also work with inventory management (e.g., TradeGecko, Zoho Inventory).
•   Many POS systems also support APIs or middleware (e.g., Zapier, Integromat) to integrate with other platforms, enhancing flexibility.

CRM Systems (e.g., HubSpot, Salesforce)

•  CRMs can integrate with accounting systems (e.g., Xero, QuickBooks, Sage).
•   They can also connect to POS systems (e.g., Lightspeed, Vend).
•   HubSpot and Salesforce also support API integrations for connecting with a range of other platforms beyond accounting and POS systems.

E-commerce Platforms (e.g., Shopify, WooCommerce, Magento)

•  E-commerce platforms often integrate with inventory management systems (e.g., TradeGecko, Zoho Inventory).
•   They can also integrate with accounting systems (e.g., QuickBooks, Xero, Sage).
•   Shopify, for example, has a rich marketplace of integrations and APIs to connect with third-party tools across various categories.

Cloud Storage and Document Management (e.g., Google Workspace, Microsoft OneDrive)

•  These can integrate with accounting systems (e.g., Sage Business Cloud, Xero, QuickBooks).
•   Also compatible with POS systems, CRM systems, and e-commerce platforms for document sharing and management.

Conclusion:

•  The core systems (Sage Business Cloud, QuickBooks, Xero, and TradeGecko) are all highly integrable with a wide variety of other tools (e.g., POS systems, inventory management, CRM systems, e-commerce platforms).
•   Many of these third-party integrations also have API capabilities or use middleware solutions like Zapier or Integromat, providing additional flexibility for connecting with other systems.
•   Cloud-based solutions generally support more integrations compared to traditional systems, which is why they are being considered for this business.

Flexible, scalable systems that can connect all aspects of the business while keeping things cloud-based and cost-effective.

August 25, 2025

Contracting Where Did It Come From

These are my private views so I choose not to quote my sources and authorities. This is simply what I think and in a historical sense, why.

Audio version read by me, with extra comments

Contractors are special

Contractors have the dubious privilege of having statute law aimed directly at them in an attempt to reclassify them as employees and thus to charge pay as you earn (p.a.y.e.) tax and nic (employee AND employer) on what they see as their sales turnover.

HMRCs general view is 100% of contractors should be treated as employees. They may claim differently, but their actions say otherwise.

Grossing up - a financial killer

As a very rough rule of thumb I have always used 100% as an instant estimate of how much tax/nic that will involve. So if your sales are £100,000 then your tax bill on that will be a further £100,000. So we are saying you need £200,000 to have £100,000 left after taxes. Regardless of exactly how accurate this is, the amounts involved can be enough to cause serious financial difficulty and if replicated in to the past for say 4 years in this case that is a £400,000 tax bill.

This deadly method” is what is called grossing up” where the money you have received is treated as your net pay” and then your gross pay is worked backwards up to what it needs to be to generate these net pay amounts. This practice is as old as the hills and was not invented for contractors.

HMRC and the rule of law

This is us:

https://en.wikipedia.org/wiki/Democracy

and we have an unwritten constitution in which we define the balancing of power as between:

Elected Parliament creates our laws

The police enforce those laws

The Judges decide what parliament meant and rule on police action.

HMRC are an enforcement arm like the police and therefore are also subject to the Judiciary’s rulings (as we all are) . HMRC are NOT all three arms in one, contrary to the way they often apparently behave; note it is established in law (House of Lords) that their guidance CANNOT be relied upon whereas Statute Law can be.

Sometimes HMRC will say : this has the force of law”: all that means is they are quoting from a Statute.

Where HMRC find criminal law has been broken then they can engage the Police and others, but this has then become a police action and is as ever always subject to what our judges have to say about the matter.

So then, who created that IR35 and MSC law?

HMRC did? No. Parliament did. However, these laws are put forth by the Treasury who are guided by and listen to HMRC. There is a consultation” process to allow the public including professions to have their say. However, it seems to me this is not at all the same as the ear of government” owned by HMRC. When Parliament clearly gets it wrong HMRC still continue to chase the maximum amount of tax, presumably because of pressure to collect as much tax as possible. Regrettably the iniquities caused by bad law seem to be seen as mere collateral damage and not worthy of rectification. This IS a problem with rule by the majority when a minority is opressed, especially when the minority are not poor. The more so when this oppression is to the advantage of HMRCs statistics.

There is clearly a problem with one of the oldest tax problems in the book, which originally was known as the Friday Monday Man”. This is where an employee leaves work on Friday and returns on Monday to exactly the same job, but working via his new Limited Company. There was law and case law in place to manage this. However, when it became apparent that agency workers were claiming to be self employed, instead of attacking these claims, HMRC persuaded politicians (who frankly had no idea about such tax matters) to change the law to enforce the operation of p.a.y.e. by agencies on workers working through them. I am sure it sounded like common sense.

However, what they did was to give birth to contracting”. Those workers simply offered their services via Ltd companies. HMRC at the time were not concerned because to extract money from a company can only be done via salary, dividends or loan and they were satisfied this was not a threat to the treasury”.

How wrong that was. I can never remember which year this was, but in the 1990s, so ancient history to many.

What happened then was half a dozen huge employment agencies (note that word employment”) started putting hundreds of thousands of (typically) domestic, health and other previously temp” workers through limited companies. Apparently none of the tax benefits were being passed on to these workers and were being retained by these agencies. It seems clear these (legal) business methods were an abuse of the law, even if legal. Parliament very quickly wrote and enacted a law to outlaw the abuse. It was, and still is, called the Managed Service Company” (MSC) law. It had a 14 day deadline and all the agencies exited working in those ways within the 14 days, issuing press releases about how they were offering excellent services to these workers as alternatives. Such is P.R.”.

So that was HMRC identifying and calling on parliament to avert a threat to the treasury, sucessfully. Sounds good to me.

Ironically HMRC has now more recently used this law against businesses that are not engaged in a threat to the treasury” and against workers who are receiving the benefits of contractor” type working. As such I view this as the reverse of the preceding action where it is now HMRC engaged in an abuse of the will of parliament, which was to avert the threat to the treasury, not to give HMRC a very blunt weapon to destroy businesses and lives. I recall one case against a firm of accountants where there were only three contractors. Three? The MSC law was to attack cases of hundreds of thousands of workers, not just three.

The problem here is the vagueness of the law. It was written very quickly for immediate effect and never later polished for precision. As I have said above, getting iniquities fixed takes years and HMRC are not interested in having their wings clipped to achieve fairness involving moves towards the right amount of tax rather than the maximum regardless of equity.

Of course the underlying problem is the legal minds outside HMRC are more clever than those within - if these are the same minds then when inside HMRC they note how they can work around what they have implemented when later working on the outside.

Do HMRC have a point? Are all contractors employees?

That’s the heart of the matter.

Indeed one can see many contractors” are in reality are employees”. Remember the temp agency workers claiming to be self employed? And Remember Friday Monday Man”. Temps” clearly are employees. So is Friday Monday Woman”.

However, they are not everybody.

The courts (HMRC) have derived the idea that to not be an employee one must be in business on one’s own account”. Here is one Barrister view:

https://www.devereuxchambers.co.uk/resources/articles/view/business-on-own-account

Judgements are the key

What I find endlessly useful are the judgements the judges hand down to us. They were very interesting reading and often provide us with what amount to sets of instructions about how to do and how not to do things. That said, to identify them can be time consuming and then to read these very long judgements is even more time consuming so most of us have to rely on the summaries written by other professionals or journalists. Both can be interesting and indeed direct attention for further reading - immediate reliance on them is not wise and to be fair they always say to get professional advice.

Be aware that professionals writing for the public are essentially writing to market their services and journalists are writing in ways to attract attention rather than to communicate the law. Nothing wrong with either of these, we should just be aware.

It’s worth noting that Barristers are extremely clever people who work in infinite detail to persuade judges to their client’s view. So the judges have to be even more clever.

Our judges on the other hand are writing directly to us for our benefit in understanding the will of parliament; that’s why their judgments are far far longer than published articles in the general or even specialised press. Reading these takes many hours.

August 25, 2025

Contract Acceptance

or when does a document arrive and where from? Isn’t it just obvious?

PAPER DOCUMENTS

A letter is presumed delivered three days after being posted and in contract law acceptance” is at the time of posting.
https://en.wikipedia.org/wiki/Posting_rule
Note the above says US Law but is also British law and gives English case law further down.

A post office certificate of posting” is a very good idea. One can wryly note this does NOT certify the contents (or lack of) of the envelope.

Sending it signed for” is sometimes wise.  I advocate also sending a like copy by normal unsigned for post, so if there is no one there to sign for it, a copy will nevertheless land on the doormat. Get a certificate of posting” of course.

Certain documents have to be delivered to the person so this is where the famous you have been served” comes from.
https://www.moneyclaimsuk.co.uk/process-serving.aspx
interesting reading (I have NOT verified that site and I do not know them).

FAX The location of the above physically posted document contract acceptance is the destination (country) location of the document.
The location of the FAXED document contract acceptance is the departure location of the document i.e. where the sending fax machine is located. Certain international matters are deeply affected by WHERE the contract was accepted.

EMAIL

No rules. Yet. However, unless challenged in court they are being accepted as true evidence - I like to think such things are checked for authenticity as a matter of course. I await due recognition in law and case law. If it has happened already I have not yet seen it. I could surmise that if email is treated the same as fax (electronic transmission\ then the fax rule will apply; which would be a fundamental shift in how we are doing business, albeit in a very subtle and usually not relevant way. It makes sense to me that acceptance should be wherever one happens to be at that time, not where someone else (the other party) is. That said, acceptance when on holiday might then be capable of being interesting.

SMS / IM / Social media / Telex / Teletype

Ditto.

Instant transmission further research Q1

Q1 The principle in law appears to be the instantaneous communication advantage.

Here is one view

https://www.grin.com/document/302312

and another written by a law student:

Quoted from here https://www.lawteacher.net/free-law-essays/contract-law/contractual-acceptance-by-email.php

Instantaneous communication

It is notable, that the postal rule is often not active when it comes to instantaneous communication (Beale, 2014: 2-049). 

For instance, telephone and telex communication is not covered (Entores Ltd v Miles Far East Corp. [1955] 2 Q.B. 327; Brinkibon Ltd v Stahag Stahl und Stahlwarengesellschaft mbH [1983] 2 A.C. 34; N.V. Stoomv Maats De Maas” v Nippon Yusen Kaisha (The Pendrecht) [1980] 2 Lloyd’s Rep. 56, 66; Gill & Duffus Landauer Ltd v London Export Corp GmbH [1982] 2 Lloyd’s Rep. 627).

The reason why the postal rule is not, generally, applied in cases with instantaneous forms of communication is that in such situations the offeree normally knows straight away that delivery has failed and can, therefore, make alternative arrangements to ensure that his acceptance is properly communicated (Entores Ltd v Miles Far East Corp.; Brinkibon Ltd v Stahag Stahl und Stahlwarengesellschaft mbH; Beale, 2014: 2-050).

This is contrasted to the situation, in which an offeree who uses post may find himself, since he may be unaware of the failure of delivery until it is too late to accept; before the offer expires or is revoked (Beale, 2014: 2-050). [Ed

The way fax communication” is approached, could shed some light on how email should be approached. The sender of a fax knows immediately whether the fax has been received, which could place faxes in the instant communications bracket (Beale, 2014: 2-051). Indeed, it has been held that faxes are instantaneous communication” (JSC Zestafoni Nikoladze Ferroalloy Plant v Ronly Holdings Ltd [2004] EWHC 245 (Comm), [2004] 2 Lloyd’s Rep. 335) and that if the sender knew that his fax was not delivered in full or at all, the mere sending of a fax could not amount to acceptance (JSC Zestafoni Nikoladze Ferroalloy Plant v Ronly Holdings Ltd). While a fax might appear to be delivered properly, it may have arrived in an illegible format; therefore, it has been argued that, in such cases a fax may constitute valid acceptance (as the instantaneous communication advantage is nullified) (Beale, 2014: 2-051). It has been argued that the same logic should apply to email acceptance (Beale, 2014: 2-051). Q1

E-mail as non-instantaneous communication Q1

Q1 Whether or not the Postal rule should apply to email communication arguably turns on whether or not it is qualitatively instantaneous, that is to say, whether it displays the characteristic of instantaneous communication which would make it unfair for the Postal rule to apply (such as the ability to instantly know if receipt has occurred).

On the point of whether e-mail is instantaneous, it has been said that it is

almost’ instantaneous (Counts and Martin, 1996: 1086),

more or less’ instantaneous (Carter, 2002: 03-360 and 03-390),

nearly’ instantaneous (Burnstein, 1996: 76),

virtually’ instantaneous (Carter and Harland, 2007: 232) and

absolutely’ instantaneous (Norman, 1996: 86).  

(Ed The law(yers) tend to not be very tech” - though one wonders if this is when it suits their argument. Ever since the dawn of the internet the modus operandi have always been never assume anything has arrived”, because there are endless technical reasons why it may not have. Modern system defences involve a vast array of checks which if failed, will cause the message to not be delivered and this is in addition to all the reasons a system simply fails to work as designed. There is no guarantee a bounce message” will be sent.)

Furthermore, the high court - see next Q1

 

The High Court Q1

Q1 High Court held; the Postal rule should not apply to email communication since such communication was instantaneous’

(David Baxter Edward Thomas and Peter Sandford Gander v BPE Solicitors (a firm) [2010] EWHC 306 (Ch)). Q1

about the High Court judgement Q1

Q1 However, some commentators (Ed such as me) point out that instantaneousness” may not be the correct way to approach the issue(Mik, 2009: 17). It has been argued, the way some commentators approach instantaneousness” is linguistically illogical since instantaneous” should by definition mean no delay whatsoever; therefore qualifications such as almost” or nearly” allow for the possibility of delay, which means that instantaneousness” is the wrong term to use (Mik, 2009: 16-18). 

This is because if one begins to consider, how much delay would render a communication non- instantaneous, then this becomes an issue of control (over the communication on the part of the sender/ offeree ) and not one of instantaneousness” (Mik, 2009: 17). (Ed I agree)

If control is the operative factor, (Ed that is a very perspicacious point) then the Postal rule should apply, in situations where the sender loses control over the communication (cannot confirm successful delivery) at the point of sending (Mik, 2009: 18).

In terms of emails, it has been argued that email senders can determine whether delivery was successful; however, analysis of common email protocols has demonstrated a number of flaws on this argument. (Ed I’ll say!)

For instance, notifications of failed delivery (Ed i.e. a bounce message) are not automatic and depend on the sending system being set up to request them and the receiving system being set up to provide them (Mik, 2009: 19).  Further, there are noted delays in the actual issuance of failed delivery messages (Mik, 2009: 19).

Moreover, even if one focuses on instantaneousness” rather than control, email communication could hardly be called instantaneous, since it features many steps and relays (often across the globe) and there is often a notable delay between sending and receipt (Christensen, 2001) (Ed not to mention that email sending SMTP servers often do not send immediately). Q1

so in disagreement we have
the Singapore High Court judgement Q1

Q1 In line with this (Ed listed in the above ) reasoning and in stark contrast to the decision of the English High Court in Thomas v BPE Solicitors, Rajah JC of the Singapore High Court  held in Chwee Kin Keong v Digilandmall.com Pte Ltd, [2004] 2 SLR 594; [2004] SGHC 71, that:

… unlike a fax or a telephone call, it is not instantaneous. Emails are processed through servers, routers and internet service providers. Different protocols may result in messages arriving in an incomprehensible form. Arrival can also be immaterial unless a recipient accesses the email, but in this respect email does not really differ from mail that has not been opened.”  (Digilandmall:97). Q1

(Ed mine too) Conclusion Q1

Q1 It is submitted that the position of the Singapore High Court is much more in tune with technical realities than the English High Court. (Ed and I heartily concur)

Please note that all this section’s Instant transmission further research” content to this point comes from here https://www.lawteacher.net/free-law-essays/contract-law/contractual-acceptance-by-email.php Q1

Other messaging systems like instant messaging im” (Whatsapp, Signal, Telegram and many others)

These DO indicate when an im message has been delivered, although how reliable that is for the purpose of court decisions I think remains to be seen. I might observe that like fax machines (most) im systems will not function without a mobile telephone number. That seems to make them akin to fax machines, that require a receiving telephone number with a fax machine attached and ready and wllling to answer 24/7. Given the absence of reliability of internet data connections, regardless of the particular im protocol, it seems to me any control over receipt is suspect. In fact I begin to wonder if any internet system that relies on technology in place of human beings is losing any reliable control over delivery. So if delivery is not instantaneous” the postal rule must apply. Now if that were true, it gives new meaning to checking one’s messages when contract offer and acceptances are in play.

Back in the 1980s I remember a fax coming in giving 8 minutes notice of an overdraft being payable on that demand. Back then we had telegraphic transfer” and so the settlement was made in time. How about if it was delivered by instant message”? That thought chills me because fax machines are/were managed by everyone present in the location of the machine. Instant messages are managed solely by the owner (holder) of the mobile device (could be a digital pad (e.g. iPad) not a phone as such) who may or may not be at work that day or week etc. Fax machines are/were not mobile and not personal, in the same way a physical mail box is neither mobile nor personal (discuss).

Ok so a fax machine could be off or out of order, but then the sender is/was immediately informed by the fax send failure. In that case we the prospective sender would then often, using our wired telephone, call the recipient to say there was something wrong with their fax machine and typically they would fix it immediately. So fax is/was fixed location device direct to fixed location device, with immediate feedback. None of today’s devices are like that. They could be, but we would not know, and in an case they most probably are not. These days even fax send and receive can be using virtual fax machines that don’t exist in real life.

It seems technology cannot beat human delivery, hence process serving.

August 25, 2025