This program will build on Part I, Risk Assessment, and offer guidelines and tips for creating a compliance program, best practices for maintenance and updating the program once it is in place.
Media and security experts focus so much attention on hackers and external threats that companies have a false sense of reality. The more likely threat, and one that could cause damage on a larger scale is the insider — the individual who has been given clearance to enter the building, and access your IT system, products, and customers. This session will highlight why you should have a program to proactively identify and mitigate insider threats. It will focus on developing an awareness of the common types of insider threats; providing an understanding of the security risks posed by insiders to your company and customers; sharing several easy steps for building a program to detect and prevent insider threats; identifying the legal and privacy risks domestically and globally when developing and implementing a program; and discussing the global considerations when developing a program.
This country-specific question & answer formatted paper provide an overview of blockchain laws and regulations applicable in Hong Kong. This resource was published in 2019.
This issue provides what you need to know about European Insolvency Regulation 1346/2000, Italian insolvency laws, U.K. corporate insolvency law, new insolvency and bankruptcy legislation in Italy, and courting justice.
Overview of best practices in risk management. Includes discussion of enterprise risk, advising the board on risk, risk mitigation planning, cybersecurity, and third party risk from vendors and suppliers.
This is a sample employee handbook.
This is a sample agreement of sale with attached lease to purchaser.
This is a sample code of business conduct and ethics policy.
The purpose of this guide is to provide an overview of international and national anti-corruption regimes within an Asia Pacific context. It highlights how corporations should best approach anti-corruption compliance, transactional and third party due diligence and corruption investigations. It also examines related issues from anti-money laundering and whistleblowing regimes.
This resource is an overview on cartel regulations in Spain.
This article is a review of the public competition enforcement in Switzerland.
Rulings on attorney-client privilege and the work product doctrine occur daily in the federal and state courts. New law is continually being made on the scope of these protections for companies and their counsel in areas like internal investigations, the legal vs. business advice distinction, the crime-fraud and fiduciary exceptions, subject-matter and at issue waiver, the common interest and joint client exceptions, global privilege issues and intra-law firm privilege. In a Jeopardy! format, this interactive presentation will examine the latest developments in privilege law as well as the professional ethics rules governing confidentiality (i.e., ABA Model Rules 1.6 and 1.13) — including cases in which ACC has weighed in as amicus — and recommend best practices to preserve the attorney-client privilege and the confidentiality of work product.
"the "Getting the Deal Through" reference guide for M&A professionals"
"the "Getting the Deal Through" reference guide for M&A professionals"
Learn best practices and receive actionable advice on compliance program benchmarking and monitoring, including: how to compile critical compliance program data to accurately assess and measure program effectiveness; key takeaways that can (and should) be gleaned from a benchmarking exercise; and using compliance software to establish and maintain a cost-efficient and effective compliance program (includes meeting the “Morgan Stanley” defense). Learn how to design quantifiable, meaningful metrics that your Audit Committee and enforcement agencies will understand and appreciate. Discuss the criteria you should be benchmarking your program against, as well as the key monitoring priorities. Learn how to collect the data and begin using it to improve your compliance program.
This "Getting the Deal Through" reference guide reviews M&A legislation and procedures in China.
Sound marks, holographic marks, three dimensional marks, scent marks and other non-traditional trademarks have become an important means for marketing departments to build and exploit their company’s brand — in addition to logos, phrases and other more traditional marks. In-house counsel need to stay informed about developments in non-traditional marks in order to keep up with business realities and protect their company’s interests. Many countries have regimes that regulate non-traditional marks, and understanding the procedures required to protect a brand’s unique shapes, sounds and smells can provide an important competitive advantage. This program will address: (1) the types of non-traditional marks that may currently be registered, and what lies ahead; (2) clearance procedures; (3) applications to register; and (4) enforcement proceedings.
There are positive rewards for teambuilding, but with hectic workdays, the concept is often only revisited during retreats or special events. This article discusses new ways of thinking about the concept and offers suggestions for bringing it into your office.
This article focuses on the main vulnerabilities and best practices in data protection - a view from the inside.
This sample is a ten-point checklist for avoiding and resolving workplace conflict.
Show results exclusively from the ACC Resource Library with customizable filters