450 Gross Acres Apple Orchards Available

450+/- Gross Acres w/ Apple Orchards
6 Tracts Offered Separately
Thursday, June 24, 2010 – 2 pm
Auction Location: Red Lion Hotel, 607 E Yakima Avenue, Yakima, WA 98901

Seller: Cervantes Orchards & Vineyards under US Bankruptcy Court Order

Abbreviated Sale Terms:
• Bidding requires pre-qualification

• A 10% Buyer Premium will be added to the high bid to determine the selling price, per Tract.

• Bidder Deposits – Per Tract, will be required at bidder registration made payable to Fidelity Title Co. and according to the complete terms and conditions.

• Earnest Money Deposit – Successful bidders will be required to provide a minimum earnest money deposit of ten percent (10%) of the purchase price payable to Fidelity Title Co. at the close of the real estate auction. The cashier’s check Bidder Deposit will be applied to that percentage. Buyers must be prepared to issue a personal check for the balance due in excess of the bidder deposit to be made payable to Fidelity Title Co. to complete the earnest money deposit requirement.

• Early Possession – Successful bidders will be required to take possession of the Property being purchased within 48 hours post auction. Prior to taking possession the Buyers shall be required to increase the earnest money deposits to 25% or 30% respectively, according to complete terms and conditions.

• Growing Costs – Buyer will be responsible for paying for all 2010 costs associated with the maintenance and operation of the property as well as all costs associated with the growing and harvesting of any crops growing thereon.

• Terms – Cash at closing on or before August 6, 2010. Closing at Fidelity Title Co. located at 117 North 4th Street, Yakima, Washington 98901

• All sale offers are subject to confirmation & acceptance by Bankruptcy Plan Liquidating Agent.

• Auction Tracts are being sold by legal descriptions, not acres. Learn more at AuctionServicesNearMe.com

Property Information: Complete sale terms, bidder information & property information package is available at www.WREAONLINE.com or by contacting (509) 297-9294.

Property Inspection At Viewer Discretion: Please contact Western Real Estate Auctions at (509) 297-9294 for inspection of residential improvements.

Disclaimers: Buyer and his agent are responsible for independently verifying all presented information. No warranty or representation, expressed or implied, is made as to the accuracy of the information contained herein, including but not limited to: acreages, dimensions and or square footage of buildings, or the condition of any of the aforementioned. The same is submitted subject to errors, omissions, change of price, rental or other conditions and withdrawal without notice.

In regard to fruit trees, no warranty is made as to variety, health, or appropriateness for location. Further, Broker and Seller make no warranty as to whether or not the origin of the trees had the appropriate fees paid to the patent holder(s). Additionally, Broker and Seller make no warranties as to the condition of the wind machines or the irrigation system, including but not limited to the pumps, main lines, laterals, sprinkler heads, or any other element. Buyer agrees to purchase the property in “AS IS” condition and by signing the purchase agreement, releases Broker and Seller from all responsibility and liability related to any issue on these properties.

Preliminary Orchard Information

TRACT 1 ~ Home Place Orchard

157+/- Gross Acres, 124+/- Ac. Braeburn, Gala & Fuji Apples plus 4+/- Ac. Mother Block

TRACT 2 ~ Edison/Veldhuis Place Orchard

167+/- Gross Acres,  157+/- Ac. Granny Smith Apples


TRACT 3 ~ Simmons Place Orchard

71+/- Gross Acres,  60+/- Ac. Fugi & Braeburn Apples

TRACT 4 ~ Asbel Place Orchard

24+/- Gross Acres, 22+/- Ac.  Braeburn Apples

TRACT 5 ~  Schinmann Place Orchard

11+/- Gross Acres, 11+/- Ac. Granny Smith Apples

TRACT 6 ~ Freeburn Orchard

22+/- Gross Acres, 18+/- Ac. Gala Apples

Thursday, June 24, 2010 – 2 PM

Auction Location:  Red Lion Hotel – 607 E. Yakima Avenue – Yakima, WA 98901


Irrigation District Allocation

June 23, 2010 – Subsequent to review and clarification by all creditor legal advisors, all current and delinquent real property taxes will be purchaser’s responsibility and will be added to closing costs for each auction tract. See summary of Buyer Costs table directly below.

Growing Costs – estimated as of June 17, 2010

Taxes assume closing date of August 6, 2010

T-1 Home T-2 Edison T-3 Simmons T-4 Asbell T-5 Schin. T-6 Freeburn
Crop Acres 124.4 159.9 63.5 22.8 11.0 18.23
Growing costs $260,000 $313,500 $92,000 $42,450 $17,650 $48,500
Back Taxes 36,352 55,605 12,776 5,241 2,260 7,323
Total $296,352 $369,105 $104,776 $47,691 $19,910 $55,823
Per Acre T-1 Home T-2 Veldhuis T-3 Simmons T-4 Asbell T-5 Schin. T-6 Freeburn
Growing costs $2,090 $1,959 $1,449 $1,862 $1,605 $2,660
Back Taxes 292 348 201 230 205 402
Total Per acre $2,382 $2,307 $1,650 $2,092 $1,810 $3,062

Multiple Peril Crop Insurance – Summary of Coverage

Orchard I.D. Acres Total Guarantee Price Liability Premium
T-1 Home Place 124.6 77,663 $10.10 $784,396 $48,866
T-2 Edison/Veldhuis 153.9 113,578 8.85 1,005,165 62,620
T-3 Simmons 63.6 26,903 8.85 238,092 15,581
T-4 Asbel 22.80 9,628 10.10 97,243 5,785
T-5 Schinmann 9.90 26,903 8.85 26,435 851
T-6 Freeburn 18.5 12,419 $10.10 $125,432 $9,414


TRACT  1 ~ Home Place – Documents

APN Tract 1 – Home

Preliminary Title Commitment T-1 Homeplace

Preliminary Title Commitment T-1 Homeplace – Maps

T-1 NRCS Soil Survey

TRACT 2 ~ Veldhuis Place – Documents

APN Tract 2 – Veldhuis

Preliminary Title Commitment T-2 Veldhuis

Preliminary Title Commitment T-2 Veldhuis – Maps

T-2 NRCS Soil Survey

TRACT 3 ~ Simmons Place – Documents

APN Tract 3 – Simmons

Preliminary Title Commitment T-3 Simmons

Preliminary Title Commitment T-3 Simmons – Maps

T-3 NRCS Soil Survey

TRACT 4 ~ Asbel Place – Documents

APN Tract 4 – Asbel

Preliminary Title Committment T-4 Asbel

Ingress-Egress Access T-4

T-4 NRCS Soil Survey

TRACT 5 ~ Schinmann Place – Documents

APN Tract 5 – Schinmann

Preliminary Title Commitment T-5 Schinmann

Preliminary Title Commitment T-5 Schinmann – Maps

T-5 NRCS Soil Survey

Reierson Water Report

TRACT 6 ~ Freeburn – Documents

APN Tract 6 Freeburn

Preliminary Title Commitment T-6 Freeburn

Preliminary Title Commitment T-6 Freeburn – Maps

T-6 NRCS Soil Survey

Wind Machine Locations & Serial Numbers

(courtesy of Cascade Wind Machine Service – Virgil Anders)

Tract 1 – Home Place Orchard

Tract 2 – Veldhuis Place Orchard

Tract 6 – Freeburn Orchard


Continue Reading

Why Do Information Violations Occur & How Can They Be Protected Against?

As recent as April 2011, Sony PlayStation Network was breached and an estimated 77 million user accounts were compromised. Sadly, such reports of info breach are ending up being common to the point that they do not make for interesting news anymore, but effects of a breach on an organization can be serious. In a scenario, where data breaches are becoming common, one is obliged to ask, why is it that organizations are ending up being vulnerable to a breach?

Siloed technique to compliance a possible cause for data breachOne credit repair of the possible reasons for data breach could be that organizations are managing their regulations in silos. And while this might have been a feasible technique if the organizations had one or two guidelines to handle, it is not the very best idea where there many policies to abide by. Siloed technique is expense and resource intensive as well as causes redundancy of effort in between various regulative assessments.

Prior to the massive surge in regulatory landscape, many companies taken part in an annual thorough risk assessment. These evaluations were complex and pricey however because they were done when a year, they were workable. With the surge of guidelines the expense of a single extensive evaluation is now being spread thin throughout a variety of fairly shallow assessments. So, instead of taking a deep look at ones organisation and determining risk through deep analysis, these assessments tend to skim the surface. As an outcome locations of danger do not get recognized and dealt with on time, resulting in data breaches.

Though threat evaluations are expensive, it is important for a company to uncover unidentified data streams, revisit their controls system, audit peoples access to systems and procedures and IT systems throughout the organization. So, if youre doing a great deal of assessments, its much better to consolidate the work and do deeper, meaningful assessments.

Are You Experiencing Evaluation Fatigue?

Growing number of guidelines has likewise caused business experiencing evaluation fatigue. This happens when there is queue of evaluations due throughout the year. In rushing from one assessment to the next, findings that come out of the very first evaluation never really get attended to. Theres absolutely nothing worse than examining and not fixing, since the company ends up with too much procedure and inadequate results.

Protect your information, adopt an integrated GRC option from ANXThe objective of a GRC option like TruComply from ANX is that it provides a management tool to automate the organizational risk and compliance procedures and by doing so permits the company to accomplish genuine benefits by method of minimized expenditure and deeper visibility into the organization. So, when you wish to cover danger protection throughout the organization and recognize prospective breach locations, theres a great deal of information to be properly gathered and analyzed first.

Each service has been developed and developed based upon our experience of serving thousands of clients over the last eight years. A brief description of each service is consisted of below: TruComply – TruComply is an easy-to-use IT GRC software-as-service application which can be fully executed within a few weeks. TruComply credit check monitoring currently supports over 600 industry guidelines and standards.

Handling Data Breaches Prior to and After They Happen

The key thing a company can do to safeguard themselves is to do a risk assessment. It might sound in reverse that you would take a look at what your challenges are before you do a plan on the best ways to fulfill those challenges. But till you evaluate where you are vulnerable, you really do not know what to protect.

Vulnerability comes in different areas. It could be an attack externally on your data. It could be an attack internally on your information, from an employee who or a momentary staff member, or a visitor or a vendor who has access to your system and who has an agenda that’s different from yours. It might be a basic accident, a lost laptop, a lost computer file, a lost backup tape. Looking at all those various circumstances, assists you determine how you need to construct a threat assessment plan and an action strategy to fulfill those prospective risks. Speed is essential in responding to a data breach.

The most important thing that you can do when you find out that there has been an unauthorized access to your database or to your system is to isolate it. Detach it from the internet; disconnect it from other systems as much as you can, pull that plug. Ensure that you can isolate the part of the system, if possible. If it’s not possible to separate that one portion, take the entire system down and make sure that you can maintain exactly what it is that you have at the time that you understand the occurrence. Getting the system imaged so that you can protect that proof of the intrusion is likewise important.

Unplugging from the outside world is the very first important step. There is truly not much you can do to avoid a data breach. It’s going to take place. It’s not if it’s when. But there are steps you can take that aid discourage a data breach. Among those is encryption. Securing details that you have on portable gadgets on laptop computers, on flash drives things that can be disconnected from your system, including backup tapes all should be secured.

The number of data occurrences that involve a lost laptop computer or a lost flash drive that hold individual details could all be prevented by having actually the information encrypted. So, I believe file encryption is a key component to making sure that a minimum of you lower the incidents that you may come up with.

Id Information Breaches May Lurk In Workplace Copiers Or Printers

Lots of physicians and dental experts offices have embraced as a regular to scan copies of their clients insurance cards, Social Security numbers and motorists licenses and add them to their files.

In case that those copies ended in the trash can, that would plainly be thought about a violation of patients personal privacy. However, physician offices might be putting that patient data at just as much risk when it comes time to change the photocopier.

Office printers and copiers are typically overlooked as a significant source of personal health info. This is probably due to the fact that a lot of people are uninformed that many printers and photo copiers have a hard disk, just like your home computer, that keeps a file on every copy ever made. If the drive falls into the wrong hands, somebody might gain access to the copies of every Social Security number and insurance card you have actually copied.

Therefore, it is extremely important to keep in mind that these gadgets are digital. And just as you wouldn’t simply throw away a PC, you must deal with photo copiers the very same way. You should constantly strip individual info off any printer or copier you plan to discard.

John Shegerian, chair and CEO of Electronic Recyclers International, a Fresno, Calif.-based e-recycling business that runs seven recycling plants across the nation, said he entered the business of recycling electronic equipment for environmental reasons. He says that now exactly what has taken the center spotlight is privacy concerns. Cellular phones, laptop computers, desktops, printers and photo copiers have actually to be handled not just for ecological finest practices, but also best practices for privacy.

The primary step is inspecting to see if your printer or photo copier has a disk drive. Machines that function as a central printer for a number of computer systems usually use the disk drive to produce a queue of jobs to be done. He said there are no difficult and quick guidelines although it’s less likely a single-function maker, such as one that prints from a sole computer system, has a tough drive, and most likely a multifunction maker has one.

The next action is discovering whether the device has an “overwrite” or “wiping” function. Some machines instantly overwrite the information after each task so the data are scrubbed and made ineffective to anyone who might get it. Many makers have directions on how to run this function. They can be discovered in the owner’s manual.

Visit identity theft cast for more support & data breach assistance.

There are suppliers that will do it for you when your practice needs help. In truth, overwriting is something that needs to be done at the least before the machine is sold, disposed of or gone back to a leasing representative, specialists stated.

Since of the attention to personal privacy concerns, the vendors where you buy or rent any electronic devices ought to have a plan in place for dealing with these problems, specialists said. Whether the difficult drives are ruined or gone back to you for safekeeping, it depends on you to learn. Otherwise, you might discover yourself in a situation just like Affinity’s, and have a data breach that must be reported to HHS.

Continue Reading

Ways Identity Thieves Can Obtain Your Personal Information

A criminal can obtain personal information on another person in order to commit identity theft in many ways. “Dumpster Diving” is a method perpetrators use by going through a person’s garbage, communal dumpsters, or trash bins. These criminals can obtain copies of checks, credit card statements, bank statements, receipts, and carbons. The criminal will search for anything bearing your name, address, telephone number, and social security number.

credit-card-fraudAnother way identity thieves can obtain information is through “Shoulder Surfing”. This is a method perpetrators use by looking over an individual’s shoulder while in a checkout lane and memorizing the information on a check or a credit card. The perpetrator can also get calling card information or credit card information by looking over the shoulder of a person on a public telephone or just by eavesdropping if someone is giving their credit card information over the phone.

“Skimming” is another way for information to be obtained. There are different types of skimming. A waiter at a restaurant may take a person’s credit card to process their bill and then make a copy of the card. A store clerk can copy a credit/ debit card number from the carbon that the store keeps from a person’s receipt. Also, skimming can occur when a criminal attaches a small skimmer device to an ATM machine and when the individual slides their card through, it records the magnetic stripe details.

The internet has become an appealing place for criminals to obtain personal data. The novelty of the internet encourages people to explore. They often respond to unsolicited emails that promise them something but require personal data from the person to process the request. In most cases, there is no intention of giving out anything. Today, half of all credit card fraud is conducted on-line. (Department of Justice, 2013)

“Phishing” is yet another method to obtain someone else’s personal data. Phishing is the act of emailing a person and stating there is a problem with their account, then requesting personal information so the problem can be corrected. A new phishing scam that banks must face, which is hard to identify, is when a bank customer opens an email or even deletes the email without clicking on any embedded links, there is an program attached to the email by the criminal who silently runs a script. When the banking customer logs onto there bank website the code redirects the person to a fraudulent web site. (Federal Trade Commission, Ramsaran)

“Pretexting” is the act of calling a victim on the phone and stating they have a problem with their account and they need to verify information to fix the problem. (Federal Trade Commission)

“Spoofing” is when an individual receives fake email messages from a recognizable company requesting an update on their information. The website is hyper-linked and when accessed the criminal is able to obtain the individuals logon and password. (Urrico)

“Pharming” is a technique criminals use by setting up a phony web server and intercepting user names and PIN numbers. (Urrico)

Perpetrators can also obtain personal information by bribing employees who have access to personal records, stealing records while on the job, conning information out of employees, hacking personal records, stealing your wallet or purse, or stealing from your home. (Collins, Federal Trade Commission)

Criminals can also pose as a legitimate business and buy personal information from companies that collect personal data to be sold for verification purposes such as a background check on a potential employee. (Data Security)

When criminals use the skimming technique that copies the magnetic stripe of a credit card, they can sell the stripe on the black market and from there the stripe can be cloned to make several cards. (Credit Card)

  • Criminals can use credit cards or debit cards to go on shopping sprees. They will often buy large, expensive items such as computers, TVs, and stereos that are easily sold.
  • Criminals can open new credit card accounts or loans in the victim’s name and when the bills are not paid, the delinquent accounts are reported on the victim’s credit report.
  • Criminals can open wireless services or establish a phone in the victim’s name.· Criminals can open bank accounts and write bad checks or authorize electronic transfers and drain the victim’s bank account.
  • Criminals may buy a car in your name or file for bankruptcy for debt they have incurred using your personal information.· Criminals can avoid law enforcement by using a victim’s name during an arrest. When the victim does not show up to court, because they were unaware, there is a warrant issued in the victim’s name.
  • Criminals can fraudulently use calling cards. (Hamilton)
  • Criminals can submit a change of address form redirecting mail to the perpetrators address so victims do not know there is a problem until it is too late.
  • Criminals can establish false identities by obtaining a driver’s license with their picture and the victim’s information.
  • Criminals can get a job or file for fraudulent tax returns. (Federal Trade Commission)

While you can’t prevent identity theft entirely, you can lower the chances of becoming a victim by making smart daily decisions regarding who sees your personal information.  You can also enlist a paid or free credit monitoring service from a trusted provider to alert you in the event your identity was compromised.

Continue Reading

Debt Reduction – The First Step to Wealth Creation

590976_money_man_3Many financial guru’s will tell you to forget about cutting back and reducing debt. They want you to create a prosperity consciousness. You may be told that if you think about your debt and look for ways to reduce your spending you will only further entrench your poverty consciousness.

With respect to these guru’s it is a complete load of rubbish. That’s my opinion anyway, and I will seek to explain why.
If you have had a long term poor relationship with money, i.e. you are broke and getting further in debt you may have several issues to deal with.

1. To this point you have made some bad decisions regarding debt, and just buying a self help programme will add to that debt. Sure many of these programmes potentially offer great benefit, but the transition from debt to wealth thinking requires some important steps.

2. If you have tried systems before which offered great promise, real estate, money markets or the internet and you are still in struggle mode then something important was overlooked in your education.

3. If you have started a business which failed or struggles along and you haven’t clearly
identified what the problem was, you need to take a good long hard look. If you blamed your employees, if you blamed the economy, if you blamed your product or suppliers, then you are pointing the finger in the wrong direction.

Get Real.
Get real about your situation, acknowledge your problem and start a program to reduce debt and start taking your credit seriously. If you really want to purchase a system for wealth creation, then save the money first.
Most people who start an exciting work from home business won’t succeed and many will be financially worse off than before they started. This applies equally to network marketing, shares property etc. The only difference is that some will have a higher start up cost and some will have a larger potential downside.

Take stock.
Now you are reducing your debt, start to take stock of your financial, emotional, mental and educational value. Having a great education dosn’t guarantee you success, and having a poor education doesn’t hold you back.

I know a fellow who did an apprenticeship in printing. This trade died out early in his career. He did a six month computer course and to cut a long story short years latter heads up a multinational IT team.

Do a SWOT analysis.

S Strengths
W Weaknesses
O Opportunities
T Threats

Be brutally honest with yourself. Know yourself, but don’t impose artificial barriers. If you attend a seminar and you are offered a property development educational package. Don’t let your excitement at the great riches on offer cause you to make a rash decision. One which you will latter regret. Don’t ask yourself if you could do it, ask yourself if you will do it.

Once the hype of the moment is over, will you follow through, will you make it happen. If the answer is absolutely yes then perhaps it is good for you, if not then keep your credit card in your pocket!

So the process is a number of steps.

1. Get Real about your situation
2. Start to reduce debt even if it hurts.
3. Take stock.
4. Read positive material and speak with positive people.
5. Create a clear mental image of what you want.
6. Create a game plan.
7. Create a schedule of activities that will move you forward.
8. Take action now

Your path to wealth will be greatly enhanced once you have sorted out your situation, identified your areas of negative resistance, created clarity around your goals, and move forward with great expectation of success.

Continue Reading

Benefits Of A Trusted Credit Monitoring Service

credit-card-chip-1433A credit monitoring system allows a number of benefits to its customers including protection against identity theft, and regular updates of credit reports.  Choosing the best identity theft protection should be a top priority for all consumers, considering the frequency of identity theft, data breaches and fraud in recent years.

There are a large number of scams and frauds that are constantly striving to get hold of personal data in order to benefit at someone else’s expense. There are large numbers of people nowadays, who have become victim of some kind of fraud, without even knowing about it.

The most worrying part is people assume that by being careful and cautious, they can avoid any type of fraud or scam. But, they are oblivious to the fact that there are many ways to get scammed, and it is not a matter of their caution, but time before they become victims of a fraudulent activity.

This is exactly why you need to realize the benefits and effectiveness of a credit monitoring system. This is the right solution for all type of frauds, known or unknown to you. By using such service, you are given the ability to keep a close check on your credit standings and become aware of any access, whether authorize or not. CreditSesame.com is a good website for keeping good track of your credit report & scores.

A monitoring system notifies individual whenever someone accesses their credit file or seek to make changes. This helps in avoiding any kind of fraud before its damaging affects takes place. However, the task of finding the right solution is not easy, and requires careful consideration of all possibilities in terms of their services, features and ability to meet you requirements and budget.

It is essential that you evaluate each option before taking any decision. You should evaluate the ability to use fraud alerts on credit reports and should have the option of putting a credit freeze on accounts, in case of any unauthorized access. The credit monitoring system should also be able to assist during recovering money lost to frauds.

Essential details that are a must for any credit monitoring service include being able to access your credit record and report, protection against identity theft and other services such as obtaining a complete picture of what is happening with your credit standings. You can read even more in depth reviews of the top credit monitoring companies at StopIdentityFraud.org. This will really help you in safeguarding your sensitive data against unauthorized access. It is wise to use such services, or otherwise you may end up find yourself burden by debt or loans that you did not obtain.

Some people are of the view that all the credit monitoring systems are scams, and are not useful at all. Well, this is not true, as there are many useful monitoring systems out there that can be successfully used to protect your credit and identity.  Waiting until your identity has been stolen is a poor plan.  Get protected today and have peace of mind that someone is watching your back…and identity.

Continue Reading