Dan Goldstein, chief legal and compliance officer at Pitney Bowes, discusses risk management.
This case law is Federal Trade Commission v. Toysmart.com, LLC.
This article discuses the Federal Trade Commission (FTC) finalized amendments to the Negative Option Rule, now retitled the “Rule Concerning Recurring Subscriptions and Other Negative Option Program.“
The rule represents a significant overhaul of the regulatory framework governing how companies handle subscription services and automatic renewals.
This is a template master marketing services agreement.
This sample stresses to be mindful that YOU AND YOU ALONE are personally responsible for the content that you publish on the Internet.
Depending on the nature of your industry, and especially if litigation is anticipated, it makes sense to have a standardized (yet customizable) plan of action at the ready. This article contains pointers to help this process along.
Career Path columnist Bill Mordan discusses the role of computer judges in the future of law.
The article discusses three risk areas associated with investing in China, including a pervasive undermining of the legal system because of direct personal relationships, or “guanxi.”
How do you put a price on intellectual property? A thorough IP due diligence effort is key. When dealing with intangible assets, in- house counsel must examine every facet of commercial transactions. Unaddressed issues — base technology, scope of protection and pre-existing contracts, to name a few — could prove catastrophic. read this feature and prepare yourself for an IP negotiation.
As the environmental debate enters uncertain territory, companies are beginning to look to the legal department to provide clarity regarding impending legislation, such as the US Clean Water Act. Although it may take years to reach a resolution, it is imperative that in-house counsel understand the potential ramifications on company practices.
Work smarter, not harder. A recent study from the Project for Attorney Retention supports this maxim. Focusing on value and efficiency, as opposed to hours, attorneys are finally achieving the elusive work-life balance they have sought for years. In turn, companies that promote this balance are rewarded with loyal employees and added value.
This is a discussion of key securities law considerations for start-up or early-stage companies preparing to grant compensatory equity awards to employees, directors or other service providers.
What happens when an employee calls the CEO an incompetent jerk in front of others at your non-union company? Is he subject to disciplinary action? Explore the 12 NLRB rules that your employer - and you as their legal leader - should know.
It’s difficult enough when an integral employee decides to leave — clients must be maintained, coverage ensured and investor relations handled. this departure can become even more of a problem when confidential company information is misappropriated. Non-compete agreements are no longer enough to deal with such a situation; learn what to do in order to protect your business’s electronic secrets.
In a digital age with a free flow of information, it is easy to diminish the value of personal data. The European Commission, however, is set to solidify and unify data protection laws within the European Union under the General Data Protection regulation, and American companies with operations or customers in the European Union will soon find themselves having to comply with a new set of laws that could increase the cost of doing business, as well as significantly impact business operations.
Without the guarantee of privileged communication, it is difficult for in-house counsel to effectively render legal advice to management. It is absolutely essential that counsel consider how a court will analyze privilege in order to ensure that sensitive communications remain confidential. If not, prepare to wave that privilege goodbye.
Companies can use legal analytics to select and manage outside counsel, craft successful case strategy and drive results. Learn how to use data in the context of patent litigation and prosecution activity.
The key to networking is not who can get the most business cards, but rather who can develop meaningful relationships that will ultimately contribute to long-term success.
Sample employee intellectual property assignment agreement
There’s training, and then there’s effective training. This course will look at the three main characteristics of effective training: risk based, business based, and accommodating adult learning styles. Experienced faculty will address how to build an effective training plan based on these three components. The course will also look at the practical aspects of balancing e-learning with live training to make the best use of your budget and employee time; creating “mix and match” modules and facilitator guides to get the most use from your efforts; leveraging internal resources to deliver training that is meaningful to the audience; and measuring and acting on training effectiveness.
What strategies and resources are needed for developing a legal department? What do you do first to set up a legal function? How do you get a seat at the table and stay there? How do you communicate with management? How do you get your piece of the budget pie and how do you control your costs? What tools/resources do you need? Where can you go for help? Learn practical strategies and pointers from this panel of legal experts who focus on how to build and maintain a legal department.
Google was recently ordered to produce a “smoking gun” email that it claimed to be protected by the attorney-client privilege. The Federal Circuit’s ruling represents a troubling trend. It seems that privileged communications are disappearing in the digital age. This article discusses how to mitigate the undermining of privilege in electronic communications.
The scope of due diligence is expanding in response to the focus on data privacy and security. Find out what you need to know about privacy (through the information lifecycle) for due diligence in mergers and acquisitions and the barriers to collecting and reviewing private information in due diligence. Examine due diligence requests (privacy policies, guidelines, data classifications, security controls) and get suggestions on which members of your due diligence team need to be involved in this effort. Examine limits to gathering, processing and reviewing all of the information you would like to see as you make your decision on whether the deal presents (too much) risk.
Show results exclusively from the ACC Resource Library with customizable filters