Skip to main content

标  题: Warning:RSU的cost base可能的确为0

http://gengwg.blogspot.com/发信人: nihewan (泥河湾·河北), 信区: SanFrancisco
标  题: Warning:RSU的cost base可能的确为0
发信站: BBS 未名空间站 (Wed Apr  8 03:27:22 2015, 美东)

Warning:一定不要搞错。因为RSU的数额一般都不小。如果该是0填了不是0而多退几千块
,可能有刑事问题。你要向IRS、法庭解释你不是蓄意逃税。

为了这个问题浪费了我还几个小时。还question了会计师1个多小时。结论是至少我们
的RSU的cost base全是0。

每个brokerage和上市公司处理可能不一样。关键点在于:你确认RSU交易已经列入W2的
总额?自己的base、bonus自己清楚,加起来如果没有RSU留的地,那么你的RSU就没算
到W2里面。意味着cost base的确为0。这个问题对short term交易尤为明显。如果是
long term RSU交易,应该会包在W2里面。

其次RSU包在W2里面的会有一行一行的明细,不会只有一个笼统的数字。

我的理解是IRS改了1099也改了W2和Schedule D。我自己笨还要逐行核对税表。1040报
表自己签名自己要小心。

--
活着就是为了改变世界,难道还有其他原因吗?

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...