This memorandum provides an overview of the legal and strategic issues that should be considered by a Company before it engages in an open market common stock repurchase program.
This is an outline for the session CLOLL2
This checklist helps businesses ensure that they're meeting (American Disabilities Act) ADA-related expectations for their venues.
This policy sets out the acceptable and unacceptable uses of company credit cards.
Small Law Columnist Maryrose Delahunty expands on taking a break to enjoy the little things in life, like baking bread.
Columnist Jeffrey W. Wheeler opens about how finding a job can't happen without the care and support of family and friends.
How effectively in-house counsel can advise on risk-related issues and steer the business towards practical commercial risk mitigation solutions depends on our access to the C-suite.
Here’s the thing: You are a “computer person,” just like you’re a “telephone person” and a “doorknob person.” You may not love it, and it may exasperate you daily, but it’s integral to your life, and a few minutes’ effort can go a long way toward tamping down chaos.
Jeffrey W. Wheeler, Small Law columnist, discusses the importance of having soft skills being second-nature in case a work issue should arise.
ACC Board Chair John Page introduces the September Technology and IP Issue.
The report, Technology’s Transformation of the Legal Field, is part of Robert Half Legal’s 12th annual Future Law Office project. Following are highlights from the research.
This article contains information on the research initiative that highlights key trends and provides timely advice to help you recruit and retain talented employee teams of all generations.
This is a sample agreement for the supply of corrugated materials.
Key things you need to know about public inquiries that businesses and other organizations can face in the United Kingdom.
The UK's Employment Appeal Tribunal held that dismissing an employee, who refused to attend work over COVID-19 risks to his children, is not automatically unfair. Read the details in this article.
Litigation — everyone’s doing it. But a patent infringement suit has a specific set of consequences, some of them looming gloomy and dark over the future of your company if you find yourself engulfed in a case. Are there any other options for resolution aside from this pensive and painstaking process? Read on to explore the alternate road.
This guide provides corporate counsel and international practitioners with comprehensive jurisdiction-by-jurisdiction guidance to product liability laws and regulation.
Topics covered include causation, defenses and estoppel, procedure, time limits, remedies, and costs/funding.
Does the recent Business Roundtable show hope for “conscious capitalists”? Or is it just a façade?
This paper examines the role that the Common Market for Eastern and Southern Africa (COMESA) plays as a multi-national organization that enforces competition law.
In-house counsel today exist in a vortex of competing and ever-changing legal requirements, regulatory schemes, technological developments, and budgetary constraints. This article tells you how to integrate technology into your legal department to simplify the task of thriving among these diverse and often contradictory forces, how to examine your internal processes, and how to implement technology to solve existing problems.
Learn about developments in German case law on the protection of trade secrets.
An overview of software copyrighting.
This material discusses how to be an effective manager, managing the legal department workload, and managing the individual workload.
ACC Amicus in Pacific V. Mayer Brown (PIMCO) filed 9/15/09
This Wisdom of the Crowd / Member discussion, addresses the concerns associated with a company allowing independent contractors to appear as representatives of the company at customer sites. This resource was compiled from questions and responses posted on the forum of the Employment & Labor Law ACC Network.
This article summarises the legislative framework for the protection of personally<br />identifiable information (PII).
This study aims to provide a snapshot of the current state of cybersecurity practices across leading global organizations, and to advise organizations in improving their cybersecurity programs.
Show results exclusively from the ACC Resource Library with customizable filters