Any adult in Pennsylvania could benefit from creating an estate plan. If you have been on the fence about whether to create a plan of
The accumulation of assets can have a more significant effect on the futures of loved ones and other parties than some Pennsylvania residents may initially
When two people who already have children get married, they are typically happy to combine their families. The transition may be rocky at first, and
Though you certainly hope that you will never end up facing an incapacitating medical scenario, you know that the possibility exists. Just like all other
The information you obtain at this site is not, nor is it intended to be, legal advice. You should consult an attorney for advice regarding your individual situation. We invite you to contact us and welcome your calls, letters and electronic mail. Contacting us does not create an attorney-client relationship. Please do not send any confidential information to us until such time as an attorney-client relationship has been established.
Information Collection, Use, and Sharing
We are the sole owners of the information collected on this site. We only have access to/collect information that you voluntarily give us via email or other direct contact from you. We will not sell or rent this information to anyone.
We will use your information to respond to you, regarding the reason you contacted us. We will not share your information with any third party outside of our organization, other than as necessary.
Your Access to and Control Over Information
You may opt out of any future contacts from us at any time. You can do the following at any time by contacting us via the email address or phone number given on our website:
We take precautions to protect your information. When you submit sensitive information via the website, your information is protected both online and offline.
We also protect your information offline. Only employees who need the information to perform a specific job (for example, billing or customer service) are granted access to personally identifiable information. The computers/servers in which we store personally identifiable information are kept in a secure environment.