Protecting Your Subcontracting Firm from Retainage
What is Retainage? One of the outdated tools in the construction industry is retainage. This is when owners and prime contractors retain a percentage of
What is Retainage? One of the outdated tools in the construction industry is retainage. This is when owners and prime contractors retain a percentage of
Use ASA’s Prime Contractor Factor when considering whether to bid on or sign a subcontract for a construction project It’s easy to focus on just
The ability to clearly link costs incurred with specific causes often leads to a quick resolution of change order requests and claims. To do this
ASA Chief Advocacy Officer E. Colette Nelson answers the most frequently asked questions she gets from ASA members on the issue of a national Infrastructure Bill
ASA of SC Charleston Chapter meets to hear about LEAN Construction and subcontractor best practices from Bill Stevens, Senior Superintendent for Robins & Morton
Protect your rights by fully understanding the contracts you sign.
Cyber security researchers recently announced the discovery of two major security flaws that could allow hackers to bypass regular security measures and obtain normally inaccessible
What is Retainage? One of the outdated tools in the construction industry is retainage. This is when owners and prime contractors retain a percentage of
Use ASA’s Prime Contractor Factor when considering whether to bid on or sign a subcontract for a construction project It’s easy to focus on just
The ability to clearly link costs incurred with specific causes often leads to a quick resolution of change order requests and claims. To do this
ASA Chief Advocacy Officer E. Colette Nelson answers the most frequently asked questions she gets from ASA members on the issue of a national
ASA of SC Charleston Chapter meets to hear about LEAN Construction and subcontractor best practices from Bill Stevens, Senior Superintendent for Robins & Morton
Protect your rights by fully understanding the contracts you sign.
Cyber security researchers recently announced the discovery of two major security flaws that could allow hackers to bypass regular security measures and obtain normally inaccessible