With data breaches and security vulnerabilities on the rise, it is essential that your company develop an effective information security and data protection program. First, legal and business stakeholders must collaborate to form a comprehensive yet accessible policy. This article outlines a three-step process and 10 lessons learned that can help with facilitated policy development.
This is a sample drug and alcohol policy for FMCSA-covered employees
This is a sample temporary employment services agreement where Company 2 is in the business of providing temporary personnel, skilled, unskilled, and professional, as required.
Learn about the metaverse and related legal issues.
Imagine you are in house at a digital/eCommerce company and your business team approaches you with plans to start selling internationally. They regale you with grand promises from global payment providers: "They'll take care of everything—local website, language translation, exchange rate, payment facilitation, etc. It's plug and play!" Not so fast. Before you get moving, there are a myriad of other essential pieces to consider: Will you be shipping physical products - if so, how and from where? Have we thought about customs duties, local product regulations, corporate tax implications, terms and conditions, and IP rights? Are there marketing and advertising restrictions in local countries? What data protection and security issues will we face? Join this session to delve into the many issues consumer-facing companies should address when seeking to expand globally.
This QuickCounsel (Quick Overview) outlines what companies could have done and should be doing to protect their data against cybersecurity threats.
In this Quick Overview, in-house counsel can learn about important Intellectual Property terms that are often used when working with outside counsel in the United States.
This article contains issues related to using social media in hiring that in-house counsel should consider.
Personal brand equity is a vital component of successful business — even for busy in-house attorneys. Luckily, social media tools such as LinkedIn and Twitter are invaluable assets when it comes to efficiently enhancing your brand. Make sure your brand isn’t in the bargain bin.
Michael Wu, general counsel of Rosetta Stone Inc., discusses anti-bribery law, IP and enforcement issues, and the office as a global meeting place.
Learn tips on selecting, evaluating, comparing and retaining the outside counsel that best suit the organizational needs of your company.
This Wisdom of the Crowd (ACC member discussion) discusses how to address an elderly employee's request to be provided with a scooter, and related questions pertaining to reasonable accommodation under the US Americans with Disabilities Act (ADA) and potential claims of unequal treatment. This resource was compiled from questions and responses posted on the forum of the Employment & Labor Law ACC Network.
This is a Bloomberg article addressing the real estate crowdfunding land rush.
While you can put off your work until later, do your future self a favor and follow these tips to finish it sooner.
These are Title 15, Commerce and Trade statutes and regulations.
Legal departments must stay abreast of the risks of collecting and using Big Data. An unsecured stockpile of consumer data, for instance, is a treasure trove for hackers. If issues of privacy, over-collection and data decay — among others — are not given thorough attention, your organization’s Big Data policy could prove to be a significant liability.
This article summarises the legislative framework for the protection of personally<br />identifiable information (PII).
Baker & McKenzie's contribution to the debate on the reform of the Verticals Block Exemption and Guidelines.
A stolen company laptop these days is much more than a nuisance, if customer information resided on the computer. The law in this area is fast-developing, with different schemes evolving in California, other states, and throughout Europe. Learn what advice to give your clients in the case of identity theft, what further actions they should take, and whether there is a difference between the practical business actions and the legally required actions when their databases are breached and customer information is stolen.
Privacy laws are proliferating. This session will discuss how to implement a global privacy compliance program to address the EU Directives, as well as current updates and implementation of key country privacy laws, such the Personal Information Privacy Act in South Korea and similar laws in Malaysia and other Asian countries. This session will also address equally important US state law privacy developments.
The NLRB has upheld the following social media policy in its entirety. It remedies several deficiencies found in other policies. Notably, the NLRB determined that this policy is neither overbroad nor ambiguous; rather, it provides sufficient examples of prohibited conduct so that, in context, employees would not reasonably read the rules to prohibit Section 7 activity.
A brand communicates a message and elicits emotion. It is a philanthropic organization’s main asset, and must be assessed regularly. Read this article to learn more about creating and maintaining your brand effectively through trademark registration, brand management and trademark infringement prevention, and licensing your mark.
Show results exclusively from the ACC Resource Library with customizable filters