Welcome!

News Feed Item

Deadline Approaching to Apply for SBA Working Capital Disaster Loans Due to Drought in Indiana is March 12

ATLANTA, Feb. 13, 2013 /PRNewswire-USNewswire/ -- The U.S. Small Business Administration is reminding small businesses, small agricultural cooperatives, small businesses engaged in aquaculture and most private non-profit organizations of all sizes that March 12 is the filing deadline for federal economic injury disaster loans available in Gibson, Knox and Posey counties in Indiana as a result of the drought that began on June 19, 2012.  

(Logo: http://photos.prnewswire.com/prnh/20110909/DC65875LOGO)

"These counties are eligible because they are contiguous to one or more primary counties in Illinois.  The Small Business Administration recognizes that disasters do not usually stop at county or state lines. For that reason, counties adjacent to primary counties named in the declaration are included," said Frank Skaggs, director of SBA's Field Operations Center East in Atlanta.

"When the Secretary of Agriculture issues a disaster declaration to help farmers recover from damages and losses to crops, the Small Business Administration issues a declaration to eligible entities affected by the same disaster," Skaggs added.

Under this declaration, the SBA's Economic Injury Disaster Loan program is available to eligible
farm-related and nonfarm-related entities that suffered financial losses as a direct result of this disaster.  With the exception of aquaculture enterprises, SBA cannot provide disaster loans to agricultural producers, farmers, or ranchers.  Nurseries are eligible to apply for economic injury disaster loans for losses caused by drought conditions.

The loan amount can be up to $2 million with a 4 percent interest rate for eligible small businesses and
3 percent for non-profit organizations with terms up to 30 years.  The SBA determines eligibility based on the size of the applicant, type of activity and its financial resources.  Loan amounts and terms are set by the SBA and are based on each applicant's financial condition.  These working capital loans may be used to pay fixed debts, payroll, accounts payable, and other bills that could have been paid had the disaster not occurred.  The loans are not intended to replace lost sales or profits.

Applicants may apply online using the Electronic Loan Application (ELA) via SBA's secure website at https://disasterloan.sba.gov/ela.

Disaster loan information and application forms may also be obtained by calling the SBA's Customer Service Center at 800-659-2955 (800-877-8339 for the deaf and hard-of-hearing) or by sending an email to [email protected].  Loan applications can be downloaded from the SBA's website at www.sba.gov. Completed applications should be mailed to: U.S. Small Business Administration, Processing and Disbursement Center, 14925 Kingsport Road, Fort Worth, TX 76155. 

Completed loan applications must be returned to SBA no later than March 12, 2013.

For more information about the SBA's Disaster Loan Program, visit our website at www.sba.gov.

Contact: Michael Lampton
Phone: 404-331-0333

Release Number: 13-285, IL 13140

SOURCE U.S. Small Business Administration

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
SYS-CON Events announced today that Niagara Networks will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
SYS-CON Events announced today that Secure Channels will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The bedrock of Secure Channels Technology is a uniquely modified and enhanced process based on superencipherment. Superencipherment is the process of encrypting an already encrypted message one or more times, either using the same or a different algorithm.
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning...
If you had a chance to enter on the ground level of the largest e-commerce market in the world – would you? China is the world’s most populated country with the second largest economy and the world’s fastest growing market. It is estimated that by 2018 the Chinese market will be reaching over $30 billion in gaming revenue alone. Admittedly for a foreign company, doing business in China can be challenging. Often changing laws, administrative regulations and the often inscrutable Chinese Interne...
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes ho...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addres...
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management solutions, helping companies worldwide activate their data to drive more value and business insight and to transform moder...
SYS-CON Events announced today that eCube Systems, a leading provider of middleware modernization, integration, and management solutions, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. eCube Systems offers a family of middleware evolution products and services that maximize return on technology investment by leveraging existing technical equity to meet evolving business needs. ...
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will look at the protocols that communicate data and the emerging data analy...