This article points out that in all rent regimes (retail space, business accommodation space and housing accommodation) changes in rent are possible with the cooperation of the counterparty or through a procedure before an independent body in the Netherlands.
This is a checklist of state by state driving records backgrounds.
Information Governance Life Cycle - Expected and Unexpected Challenges
Corporate social responsibility (CSR) goes beyond being compliant and ethical in today's business world. While more and more companies may just be realizing the value of CSR, The Timberland Company has been involved in this area for some time. This article describes their commitment to CSR.
This article addresses those who are novices to the UNIDROIT Principles of International Commercial Contracts (“UNIDROIT Principles”) or skeptics to using a different legal regime than (i) their home law or (ii), if they cannot impose their home law, to using something else than a ‘neutral’ state law such as English or Swiss national law.
This is a sample warehousing and fulfillment agreement.
On 22 January 2014 the European Commission adopted a Recommendation with non-binding minimum principles for shale gas instead of the binding Directive as initially sought. Read this article to find out more.
This article covers why building a diverse and inclusive legal team is essential to obtaining superior results.
The Financial Conduct Authority (FCA) has recently emphasised the importance of its responsibilities in relation to the prevention of financial crime within those sectors of the UK financial services industry that it regulates. The term “financial crime” encompasses a broad range of areas that are relevant for UK and international financial institutions, including: data security, money laundering, terrorist financing, bribery and corruption, fraud and sanctions breaches.
When would it be considered unethical for an attorney to enlist the aid of an undercover investigator? Learn what is and is not considered ethical conduct in this situation.
A confidentiality agreement between a company and a potential buyer. In consideration of a possible transaction between the two, information concerning the company's business, financial condition, operations, and assets is furnished to the potential buyer. This agreement ensures such information remains confidential and is used for the sole purpose of a transaction between the two. This agreement must be signed by the potential buyer.
In the in-house world, sometimes you need to strike your own path to success. In this Top Ten, find the most valuable and critical characteristics you can learn in order to succeed.
This is a checklist of state by state background checks.
Information regarding tax liabilities of liquidators and receivers.
A useful timetable to use when dealing with a takeover.
When Is Counsel's Review of Materials "in Anticipation of Litigation?"
This presentation addresses how to respond when management requests access to key documents.
While the Cybersecurity Regulations require several technical controls (e.g., monitoring network activity and implementing multi-factor authentication and encryption), most of the requirements involve instituting information governance (“IG”) practices and structures to manage cyber risks. In the following, we set out five steps which address the key IG issues and requirements that can help your organization come into compliance with the Cybersecurity Regulations.
This is a sample non-compete agreement between a company and its employee.
This article provides some tips for using your mobile device more safely and securely to help you achieve your financial goals.
This program originally aired on March 7, 2023. Please note that the on-demand format of this program is not eligible for CLE/CPD credit.
ChatGPT and other human-language information models promise to revolutionize how we interact with technology and information. Like any new innovation, the use and misuse of ChatGPT and other AI programs pose serious questions about companies' legal, privacy, data and security initiatives.
Show results exclusively from the ACC Resource Library with customizable filters