This program will explore the best practices for companies that manage vendors and cybersecurity concerns. Some of the significant questions to be addressed include: What are some best practices for vendor due diligence? How can vendor cybersecurity risks be addressed and mitigated, both contractually and otherwise? What role, if any, should in-house counsel have in vendor management?
This is a sample employee privacy policy.
This brief resource (Top Ten) outlines tips for evaluating relevant issues and recommendations for proceeding through bankruptcy issues.
Current legislation creates several cost obstacles for parties seeking to purchase residential property together. One group of buyers that may be very much affected are married couples and families seeking to jointly purchase property. The reality is that for as long as such rules are in place, the practical approach by couples and families may prevail, in that, they may try to see how they can navigate the rules and hold their real estate with whatever tax savings; and to be less sentimental about what a matrimonial home and family home represents.
In this multi-country guide, learn about the rules regarding popular investment vehicles in a wide range of jurisdictions (including many European countries).
If you are wondering which inexpensive or free technology-related solutions are available for your legal department, this session is for you. The panel will cover solutions ranging from workflow efficiencies to professional/social collaboration and networking. This session will also include multi-media demonstrations and tips on how to customize these solutions to meet your individual and department needs.
This guide covers common issues in public investment funds – including registration, regulatory framework, marketing of public funds, and tax treatment – in 19 jurisdictions.
This Leading Practices Profile, an update to ACC’s 2009 The Role of the General Counsel in Canada LPP, describes practices implemented by the law departments of six organizations in Canada regarding law department structure, the professional development of their in-house lawyers, the selection and management of external service providers and the use of technology. Those practices were designed and intended to enable those departments to provide higher-value legal service to their respective organizations. Four of those organizations are private enterprises; one is an international, not-for-profit corporation and one is a statutory agency of a provincial government.
These are supplemental materials and notes on public disclosures with a focus on 990.
Your customers and fans can be your biggest assets when it comes to championing your brand or products, or they can be your harshest critics, infringe on your IP rights and damage your brand. How do you take advantage of positive content they create and share without putting your company at risk? How do you protect yourself from the negative content? This panel will address the liability concerns around the use of user-generated content, including IP protection and infringement, Federal Trade Commission guidelines, rights of publicity and defamation. It will provide insights into safe harbors of the Digital Millennium Copyright Act and Communications Decency Act, and ways to obtain consent. It will also address factors to consider based on the terms and conditions of the most popular social media sites (Facebook, Twitter, Instagram).
An effective anti-corruption program deters the risk of wrongdoing, positively affects corporate culture, improves the company’s relationship with regulatory authorities and provides the company with options for remedial measures should they need to be undertaken quickly. Read this article to learn how to achieve these benefits.
This article defines the term copyright, who can claim copyright, what works are protected, how to secure a copyright, etc.
This guide provides corporate counsel and international practitioners with comprehensive jurisdiction-by-jurisdiction guidance to digital health laws and regulations around the world.
Topics covered include digital health technologies, data use, data sharing, intellectual property, commercial agreements, AI and machine learning, and liability.
This Charity Law Bulletin reviews the exemption under CASL for registered charities in the recently published final regulations, together with a summary of information contained in earlier Charity Law Bulletins, as well as a brief review of practical steps charities and non-profit organizations can take to prepare for CASL.
This article summarises the legislative framework for the protection of personally<br />identifiable information (PII).
This course will explain our policy regarding the privacy and security of electronic healthcare information in compliance with HIPAA, the Health Insurance Portability and Accountability Act. (Licensed for use in classroom settings only and not for distribution in any form.)
The Eversheds Sutherland European Dictionary of Selected Legal Terms has been specifically designed with US and UK corporate counsel in mind. It brings together in a handy pocket format a guide to more than 1000 legal and commercial expressions commonly encountered or used by US and UK corporate counsel in business and in litigation situations in Europe. By covering these terms in English, French, German, Italian and Spanish, it extends to the European markets which directly serve more than 300 million people.
This report is a summary of the Committee findings to date and an overview of the key issues identified which have implications for the health care system as a whole.
This article discusses the US Department of Health and Human Services (HHS) final rule amending Health Insurance Portability and Accountability Act (HIPAA) privacy regulations to provide significant additional protections for protected health information relating to reproductive health care.
This article offers an overview of state and federal laws that address data privacy and security issues to help you stay compliant with changing regulation and your customers’ needs. It will prepare you to address the legal, procedural and public relations aspects of a data security breach.
Discusses the general ways costs associated with ediscovery can be minimized including a records retention policy, a data map and establishing partnerships.
PowerPoint presentation related to process and project management.
Presentations delivered by law departments do not always evoke the most welcoming of reactions. However, with such low expectations, giving a memorable performance should not be too difficult, if you follow the advice offered in this feature article.
As the world prepares to enter a period of increasing isolationism, one effect is indisputable: It will slow down global commerce. From conducting a large-scale international acquisition to simply sending an email, in-house counsel can expect to encounter a wide array of new legal considerations that will directly impact cross-border business operations.
Trade secret owners are faced with a myriad of issues, especially with the increasingly global marketplace. Business owners and leaders must address the risk of outright theft of their intellectual property by competitors or would-be competitors. International communication networks that make the theft of trade secrets as easy as pushing the “send” button magnify this trend. This interactive workshop will allow the attendees to work in groups and act as business leaders facing a trade secret crisis in their companies. The attendees will then choose how to address their crisis and which legal actions to take. Each team will take turns presenting their strategy to the entire group and, if necessary, the presenter will make recommendations for additional ways the teams could have protected their trade secrets.
This case law is on the issue of whether the equitable defenses of laches should apply in this case to bar the recovery of any pre-filing damages for infringement that NexTag might owe LendingTree and whether LendingTree should be equitably estopped from obtaining any relief on its infringement claims against NexTag.
Show results exclusively from the ACC Resource Library with customizable filters