This article describes very basic legal concepts that are very straightforward knowledge for Brazilian lawyers and transactional personnel.
A Preparation Workbook: a typical checklist to help condition stakeholders to the change while managing expectations and making change happen (and stick!).
Learn how to develop a powerful, scalable, flexible, feature-rich policy management system enables organizations to manage policies throughout all of the stages of the policy life cycle.
These guidelines are designed to communicate with investee companies regarding the objectives of engagement activities and to facilitate a better understanding of preferred terms of engagement.
Following the United States Supreme Court's recent opinion in Burwell v. Hobby Lobby Stores, Inc., recognize that certain closely-held, for-profit stock corporations can hold religious beliefs.
510 - Welcome to Rookie Camp: 10 Things New In-house Lawyers Should Know
This statement is intended to alert financial institutions of specific risk mitigation related to cyber attacks compromising credentials.
Non-disclosure and confidentiality agreements are ubiquitous and used daily in a variety of contexts, from mergers and acquisitions to more ordinary course commercial transactions. Faculty will cover recent case law regarding confidentiality agreements in the acquisition context and describe some broader implications. We will provide a walk-through of common confidentiality provisions, and tips and perspectives for both the disclosing and recipient parties. Although most in-house counsel have experience with confidentiality agreements, this presentation will drill down on some of the pitfalls and important provisions that get missed. We will provide a confidentiality agreement form, marked to show different provisions and negotiating positions to serve as a useful guide.
Trade secret owners are faced with a myriad of issues, especially with the increasingly global marketplace. Business owners and leaders must address the risk of outright theft of their intellectual property by competitors or would-be competitors. International communication networks that make the theft of trade secrets as easy as pushing the “send” button magnify this trend. This interactive workshop will allow the attendees to work in groups and act as business leaders facing a trade secret crisis in their companies. The attendees will then choose how to address their crisis and which legal actions to take. Each team will take turns presenting their strategy to the entire group and, if necessary, the presenter will make recommendations for additional ways the teams could have protected their trade secrets.
This case law is on the issue of whether the equitable defenses of laches should apply in this case to bar the recovery of any pre-filing damages for infringement that NexTag might owe LendingTree and whether LendingTree should be equitably estopped from obtaining any relief on its infringement claims against NexTag.
A social media policy is highly desirable for setting clear standards in the workplace, but employer regulation of employees' out of work activities must be reasonable. Read this article to learn how you can use a social media policy for your employees.
This article will show you how to determine whether ebilling is a good move for you, and if so, how to select a system that is a good fit for both your law department and your outside law firms.
The increasingly globalized practice of law remains riddled with local idiosyncrasies. This Toolkit offers practical pointers to help you successfully cross the Pond.
This 4th annual LegalSEC study provides key insights into the InfoSec programs and practices specific to legal firms.
The US Federal Communications Commission recently adopted modified “open Internet” rules intended to protect the ability of consumers and content producers to send and receive legal information on the Internet, a concept also known as “network neutrality.” In order to strengthen its authority to adopt the rules, the FCC reclassified fixed broadband Internet access services under Title II of the Communications Act of 1934. This article explains which sections of Title II will and will not apply to broadband Internet access services.
This is a sample employee handbook with state specific appendices.
This case law is Federal Trade Commission v. Toysmart.com, LLC.
This article discuses the Federal Trade Commission (FTC) finalized amendments to the Negative Option Rule, now retitled the “Rule Concerning Recurring Subscriptions and Other Negative Option Program.“
The rule represents a significant overhaul of the regulatory framework governing how companies handle subscription services and automatic renewals.
This is a template master marketing services agreement.
This sample stresses to be mindful that YOU AND YOU ALONE are personally responsible for the content that you publish on the Internet.
Depending on the nature of your industry, and especially if litigation is anticipated, it makes sense to have a standardized (yet customizable) plan of action at the ready. This article contains pointers to help this process along.
Career Path columnist Bill Mordan discusses the role of computer judges in the future of law.
The article discusses three risk areas associated with investing in China, including a pervasive undermining of the legal system because of direct personal relationships, or “guanxi.”
Sample Outside Counsel Billing Guidelines Contributed by ACC Legal Operations Members
Show results exclusively from the ACC Resource Library with customizable filters