Government contractors have been increasingly met with scrutiny, particularly since ex- government officials often go to work in that sector. Several legislative and regulatory initiatives have been implemented in order to prevent conflicts of interest on the part of government contractors. Given the current climate, it is more important than ever for those seeking a bid to identify, address and mitigate these “conflict of interest” issues.
Today’s data security environment is hostile. CLOs now supervise information security officers and compliance officers; therefore they must be aware of developing threats to cybersecurity. A new actor in this realm is the “Advanced Persistent Threat,” well-financed groups that may be sponsored by foreign governments, often carrying out strategic national objectives. From spear-phishing to zero day exploits, attempts to infiltrate corporate data are sophisticated and persistent.
Many products — from lipsticks to mobile phones — either cross- license patents or incorporate industry standards. Patent pools and standard-setting organizations differ in fundamental ways. Get an overview of both, and learn about some of the litigation trends in these areas.
Lawyers working in law firms and in corporate law departments reported several personal challenges to developing their careers during the pandemic. One year after the start of the pandemic, the biggest barrier to career progression for lawyers continued to be limited to no in-person contact. Read this important article to learn more about the professional impact of the pandemic.
What legislation is applicable to insolvencies and reorganisations? What criteria are applied in your country to determine if a debtor is insolvent?
The 2015 Litigation Trends Annual Survey collects and presents the experiences and opinions of corporate counsel regarding various aspects of litigation and disputes-related matters.
This primer provides a basic overview of tendering, including the tendering process, typical documentation and potential issues which may arise.
The challenge: do more, do it well, do it quickly, and keep costs down. This is a reality facing law departments today. This practice profile explores how nine companies are stepping up to this challenge. Learn about practices utilizing non-lawyer personnel at companies such as 3M Company, ConocoPhillips, DuPont, FMC Technologies, Inc., McDonald's Corporation, Monsanto Company, Southwest Airlines, and Starbucks Coffee Company.
This informative presentation addresses the question of whether your company needs a compliance program, what makes an effective compliance program, and what compliance obligations apply to your company.
Cybersecurity touches every aspect of consumer and corporate culture today. Preventing, preparing for and responding to data breaches in real time is a chief concern for individuals, corporate leaders and government regulators. Download the 2015 ACC Foundation: the State of Cybersecurity Report, underwritten by Ballard Spahr LLP, and learn what more than 1,000 corporate counsel say about their cybersecurity experiences, role and practices. The full report includes industry and regional trends, common preventative tactics, lessons learned from those who experienced a breach (including how the breach occurred and who was affected), the impact of regulatory requirements, insurance decision making and coverage information, and managing risk through outside support such as forensic and outside counsel retainers and more.
With the explosion of high technology, communication is getting faster, but not necessarily better. All employees who use company computers, telephones and stationery should be trained to think defensively about the legal consequences of what they write or say. Formulating an effective document and e-mail management policy can reduce the risk of costly litigation.
This InfoPAK (now known as ACC Guides) provides a Q&A which gives a high level overview of the key practical issues including the level of activity and recent trends in the Hong Kong market.
What compensation do your in-house peers get? Check out the 2023 Law Department Compensation benchmarking survey results.
This article examines the key disclosure issues and challenges facing companies during the 2013 proxy season and provides examples of company responses to these issues taken from proxy statements filed during the first half of 2013.
The COVID-19 pandemic has led many employees to work remotely. In light of statistics from Australian authorities, this article explores how this context increases the risk of data exposure and Intellectual Property (IP) loss or theft.
For almost 250 years, our federal system has allowed each state to “serve as a laboratory; and try novel social and economic experiments without risk to the rest of the country.” Nowhere have states more clearly operated in this role in recent years than in the area of protecting the privacy of consumers’ data. Forty-seven states and the District of Columbia have their own data breach notification laws. While these laws have similarities, together they require companies that have experienced a data breach to comply with multiple different, and sometimes contradictory, standards, if those companies do business across state lines. This article provides an overview of the current State Attorneys General privacy enforcement landscape.
These retention guidelines are designed to provide transparency on PRUSA’s expectations regarding the provision of legal services by external counsel.
Hewlett-Packard's sample checklist for a new attorney onbaording, education and development program.
A sample agreement between a company and a vendor. The company may be/has been awarded GSA delivery orders for supplying information technology products and services to U.S. Government Agencies and other organizations eligible to use GSA sources of supply. The company does not have the vendor products and services desired by the government on its GSA FSS contract, and as authorized, vendor and the company desire to team their GSA FSS contracts.
Another process server. Someone else is suing your company. How tiresome. Let's see the complaint. Wait -isn't that our counsel who appears to be the plaintiff's counsel? Is that possible? Is it ethical? Here comes the head of litigation trotting in with their retainer letter-containing an advance waiver. Now you remember. The law firm did discuss this with you. But the question remains: Is it enforceable?
Read the interview with Phil Crowley, Assistant General Counsel with Johnson & Johnson.
ACC's comments to the Standing Committee examining changes to the Federal Rules of Evidence regarding proposed amendments to Rule 502 on limited waiver.
This article delves into the use of trade secrets to protect Artificial Intelligence (AI) and the unique challenges to trade secret protection presented by AI in general.
This program will review how to manage a defensible records retention and data management program, considerations related to disposition of items that are not required to be kept by law or policy in the normal course of business and how to effectively manage legal holds when they come into play.
So your CEO has finally recognized that the company needs a compliance program, and naturally turns to you, the lawyer. Where do you start? How do you determine that you've identified the compliance risks, complied with all the applicable laws and regulations, and adequately addressed the risks? This session will describe the essentials of a compliance program including risk assessments, policy development, communications, training, establishment of controls and monitoring and testing of controls. Presenters will offer firsthand experiences (some positive) and best practices, incorporating MRCP 3, A-C privilege, MRCP 1.16 and MRCP 1.13 for ethics.
This program will review the management of compliance along the spectrum of management compliance, from legal and voluntarily adopted standards, to areas where business partners or outside organizations pressure companies to meet certain standards while weighing the costs against use of non-renewable resources (slavery, child labor, etc.) in the name of corporate social responsibility. Is it possible to create a proper and workable integration of the two efforts? Can it be within the compliance office or a joint effort of two or more corporate units?
Show results exclusively from the ACC Resource Library with customizable filters