Our 2014 update explores objectives, content and coordination of board education and training programs, as well as the process of on-boarding new directors. This Leading Practices Profile also identifies the role of the legal department, corporate secretary and board committees in coordinating content and managing logistics.
A sample course for trainers giving information to employees on appropriate internet use in the office.
Read this article to learn how to make your company's code of conduct effective.
Employees are the front line of your information security defense. While technological protections are essential (for example, antivirus software, firewalls, spam filters, etc.), none are as effective as a vigilant end user. These are checklists of measures of which every user should be aware.
This InfoPAK (now known as ACC Guides) provides a standard document for a two-party 50:50 joint venture agreement for use in international join ventures where both parties transfer businesses to the joint venture company (JVC) in consideration for the issue of shares in the JVC.
The author walks you through how the corporate attorney-client privilege is eroding in today's world of corporate transparency, discusses the effects of these changes on companies, and concludes with a call to arms.
This code is designed to encourage continued high standards so that California wine advertising may increasingly be viewed as a positive contribution to society.
This course will help you understand and recognize the differences between (1) "independent contractors" and "employees" and (2) "exempt" and "non-exempt" employees. Classifying workers correctly in each of these respects is extremely important under both federal and state laws. (Licensed for use in classroom settings only and not for distribution in any form.)
This is a sample code of business conduct of company and its subsidiaries.
A presentation on information management and records retention programs.
This policy describes general social networking/media guidelines that are important for you to follow as you share your thoughts, views and perspectives-as a company representative-in the virtual world.
In-house counsel at brand-owning companies are already well aware of the importance and value of any major company trademark but often lack a consistent policy for handling less critical marks. Third-party infringement of a lesser mark can still cause significant headaches. Prevent the nightmare situation of infringing on someone’s prior trademark, which can result in litigation, lost inventory and more.
Tweet, tweet. Chances are, the development of social media has outpaced your client’s employee policy. Learn what to be cautious of, and how to address this trend reasonably and realistically. Create a policy that protects your company while still encouraging use to your company’s advantage.
This is a sample company mobile application privacy policy.
An effective corporate intellectual property program provides protection for valuable intangible assets, generates income, and enhances a company's value. It is one that protects both a company's rights and minimizes risk that the company may infringe on the rights of others. What's not to like? Yet too often, companies neglect doing an IP audit until there's a cease-and desist letter on the GC's desk. Learn how to perform an IP audit and find ways to maximize revenues while minimizing exposure. It's every in-house lawyer's dream, isn't it?
Building upon the lessons learned in Part I (Session 911), faculty will further discuss the practical application of financial decision making practices to your everyday work. Faculty will also explain important analytical tools that indicate whether a new project will create value, such as: Net Present Value (NPV), Internal Rate of Return (IRR), Payback Period and Economic Value Added (EVA).
At first glance, devising and negotiating payment term policies may appear to be a purely financial endeavor. However, a knowledgeable in-house counsel could craft these policies to help anticipate certain problems, while appeasing parties on both sides of the negotiation. Learn how different policies work and what terms are used to better meet the requirements
of your organization in the United States.
Sharing sensitive data with ChatGPT for work, such as source code and meeting minutes, may be labeled a “data leak” due to fears that ChatGPT can disclose the data to the public once it is trained on the data. In response, many companies took action, such as banning or restricting access, or creating ChatGPT data disclosure policies. This resource from Seyfarth and Shaw discusses the implications of ChatGPT on trade secrets, disclosures, and provides key takeaways to consider with AI tools.
This article speaks about when purchasing or leasing residential or commercial real estate the dimensions of the building are an important aspect and if you can rely on the information provided by the seller or real estate agent?
Blockchain companies having been operating without much government oversight, but those days may be coming to an end after the US Securities and Exchange Commission served a notice on Coinbase in September 2021, that the agency is suing the company. Blockchain technology raises legal issues about whether assets on a blockchain constitute securities or commodities that are subject to government regulation.
Ellen Pekilis is general counsel of CSA Group, an internationally- accredited standards development, and testing and certification organization headquartered in Toronto, Canada. In this article, she shares her experience working for an independent, not-for-profit member-based association dedicated to advancing safety, sustainability and social good.
This is a two-party master escrow service agreement where the company provides flexible, comprehensive escrow services that generate the type of agreement that gives our customers the right level of protection in each unique situation.
This top ten lists ten tips when implementing a record policy for electronic information including emails, files and records in databases.
This guide is part of the Lex Mundi Guides to Doing Business series and provides general information about legal and business infrastructures in South Africa.
Social media often blurs the line between on-and off-duty. Use these best practices when considering responding to an employee’s social media use.
This Wisdom of the Crowd, compiled from questions and responses posted on the Intellectual Property, IT, Privacy & eCommerce, and Small Law Departments eGroups, addresses issues involving software license agreements and digital contracts in general. The issues discussed include acceptance of software license agreements, requirement of acceptance and click-wrap agreements.
This toolkit provides a guide to some of the basics of financial accounting terms and concepts that are key to in-house lawyers for understanding the company's financial statements as well as a guide to establishing a law department from scratch.
Show results exclusively from the ACC Resource Library with customizable filters