With a basic understanding of privacy principles under your belt, focus on the practical steps that organizations should take from the moment that the enforcement agency calls through the publication of the report of findings. Discuss the meaning of “cooperation” and international differences regarding credit for cooperation. Highlight types of conduct to avoid when dealing with regulators that could raise red flags. Explore the latest trends in international data protection regulator cooperation. Leave with detailed checklists and materials designed to equip attendees with the answers to common questions from internal stakeholders.
This practical guide provides an overview of common wage and hour issues under US law, including the 2016 changes to the overtime regulations that will dramatically expand the group of employees who subject to overtime requirements under the US Fair Labor Standards Act (FLSA).
In Mexico, as in the rest of the world, trademarks that are duly registered may be enforced against third parties who attempt to use or copy them. It is advisable to take certain measures with respect to their use and maintenance. This article offers several recommendations, including the following: Always use marks in the manner in which they were registered.
In order to support the creation of start-ups in Germany, legislators have been working to develop special fixed-term contracts for employee hiring.
This is a sample document collection checklist.
Mexico ardently protects the privacy of its individual citizens' personal data and sensitive personal information. This protection is enforced though the Federal Personal Information Protection Law and its regulations. The Federal Institute for Access to Public Information and Protection of Information (IFAI) is the agency in charge of enforcement. This article reviews the eight main principles of this law.
NEW COUNTRIES ADDED!!
This multi-PAK provides a high level overview of merger control, restrictive agreements and practices, monopolies and abuse of market power, and joint ventures in various jurisdictions. In particular, it covers relevant triggering events and thresholds, notification requirements, procedures and timetables, third party claims, exclusions and exemptions, penalties for breach, and proposals for reform.
This report examines what is known about (1) the size of the contingent workforce, (2) the characteristics and employment experiences of contingent versus standard workers, and (3) any differences in earnings, benefits, and measures of poverty between contingent and standard workers.
Mobile devices are now key features of both personal and on-the-job life. Given their proliferation, it’s natural for employees to want to use the same ones both privately and professionally. In the first part of this session, technology experts will provide an overview of the key technology and security risks associated with mobile computing that will enable you to have an informed discussion with your CIO about current issues with Bring your own device (BYOD) for use at work and Corporate-owned, personally enabled (COPE) devices that the employee can take home programs. In the second part of the session, our panel will discuss some of the best practices around policies, procedures and training when implementing a BYOD or COPE program. The panel will also touch on the legal implications of such programs with respect to your employees and your regulatory obligations and litigation concerns.
This article discusses real estate and anti-money laundering legislation in Mexico.
This presentation addresses how to respond when management requests access to key documents.
Considers the duties owned by individuals and organizations in the course of supplying goods and services to members of the public under the UK's Disability Discrimination Act 1995 (DDA).
A company can maximize the value of its intellectual property by keeping current inventory and proper protection of its trademarks and copyrights. In addition, in order to strengthen partnerships and avoid legal sanctions, companies should keep a current inventory of third-party IP use. This article offers a step-by-step approach for companies looking to protect their IP assets.
This article discusses whether the United States Safe Harbor framework provides an adequate level of protection for European Union businesses that transfer personal data to U.S. companies.
This resource is part of the Lex Mundi Guides to Doing Business series which provides general information about legal and business infrastructures in jurisdictions around the world. In this edition, Lex Mundi explores business entities, trade regulations, tax laws, labor & employment laws, and the Mississippi court system.
This guide is part of the Lex Mundi Guides to Doing Business series which provides general information about legal and business infrastructures in jurisdictions around the world.
This booklet contains two discrete but complementary dispute resolution procedures offered by the International Chamber of Commerce (ICC).
The CMS Guide to Shareholder Litigation (CMS Guide) aims to give an overview of the most important civil actions that shareholders can use to exercise their shareholder rights in The Netherlands.
This article discusses the purpose of the National Energy Retail Law (NERL) in Australia.
This article accounts for major changes in Intellectual Property (IP) law—addressing both COVID-related and unrelated changes. This article also provides practical guidance when addressing these types of issues, and include resources for further reading.
The Apostille Convention facilitates the use of public documents abroad through the use of a simplified one-step process, the apostillisation. This article compares the simplified process under the Act with the current procedure for the authentication and legalisation of public documents for recognition outside of Singapore. The latter will remain applicable for countries that are not signatories to the Apostille Convention.
On 20 October 2011, the European Commission proposed a new directive on criminal sanctions for insider dealing and market manipulation. This proposal was approved by the European Parliament on 4 February 2014. In this legal alert, we outline the main changes.
This is a checklist for Product Recall: how to be ready, problem solving and aftermath.
Show results exclusively from the ACC Resource Library with customizable filters