Pixels, cookies, and trackers continue to be front of mind for HIPAA regulated entities seeking clarity on their ability to advertise, market, and engage with existing and prospective patients. On March 18, 2024, the U.S. Department of Health and Human Services (HHS) issued updated guidance on the topic.
Learn about Quebec's strengthening of the French language with the May 2022 adoption if Bill 96 and its effects on business.
Read this article to gain insight into EU privacy restrictions and to evaluate how you can best avoid a situation of noncompliance with these data protection requirements.
How can businesses ensure they are in compliance with the new and expansive California Consumer Privacy Act (CCPA)? Find out more about how to get your business compliant with CCPA.
This article discusses some of the key issues nonprofit organizations encounter with copyrights.
This guide covers common issues in restructuring and insolvency, including issues that arise when a company is in financial difficulties, restructuring options, insolvency procedures, and cross-border issues.
This multi-jurisdictional resource addresses several real estate topics including fee simple ownership; the most common forms of investment vehicles available; and what state or local transfer, stamp, or similar taxes are levied on sellers or buyers.
On May 19, 2022, the US Department of Justice (“DOJ”) announced significant clarifications to its policy on charging Computer Fraud and Abuse Act (“CFAA”) violations that give some comfort to cyber security consultants who engage in network testing and related operations. Such activity has long been a gray area for “white hat” hackers.
Public market, friendly M&A transactions in the United Kingdom can throw some surprises at non-UK attorneys. Learn about issues that are vital for making the deal go smoothly and for ensuring that you and your company are not caught out.
A report reviewing significant wage and hour developments at both the federal and state level.
In today’s streamlined market, negotiating contracts is increasingly viewed as a superfluous step in the transactions between buyers and sellers. If one party’s expectations fall short, both may find themselves demanding court-supplied justice. Learn the fundamentals of sales negotiations on both sides of the deal.
Corporations often use media to enhance their employees’ environment. Music can soothe or energize the listener, while movies can educate or inspire the viewer. However, no amount of relaxation or inspiration will protect you from being sued for copyright infringement. Learn when to license a performance or be prepared to face the music.
Provides key questions to ask yourself before embarking on an international transaction and discusses disclosure law in England and Wales, trademark and patent filings in Chile, and business visas for Australia.
In this resource, learn practical tips and tricks about how contracts are structured and a strategy for effective contract reviews.
Law is the original outsourced function. Yet the question of what gets in-sourced and what gets outsourced has really never been systematically addressed. Rather than focusing on meaningful measures of law firm productivity and efficiency, law departments have emphasized scrutinizing the bill. Five key questions can help your department get service that is more attuned to your company's competitive environment.
This article explores how increased opportunities and regulation surrounding data has impacted Hong Kong businesses. This resource was produced in March 2019.
Learn how to establish a "Made in USA" compliance program and avoid liability.
The Digital Marketers Act published 11 May 2022 will have consequences for the EU on the following: more information on costs and metrics with digital advertising, limitations in targeting, and limitations on targeting minors and profiling based on sensitive data.
In-house counsels are under increasing pressure (especially from procurement colleagues) to run formal RFPs (Requests for Proposals), or tenders, in order to compare offers from law firms and select on an "objective" basis. In this session our speakers will lead a discussion on the pointers and pitfalls in running an RFP when selecting a law firm.
This guide addresses key labor and employment laws in a number of jurisdictions.
Hurdles await any company seeking to expand its footprint outside of currently-known geographic territories. Explore key potential pitfalls and means to navigate your way to success by leveraging a global mindset at all phases of your next multinational contract negotiation.
A Checklist of best practices for public companies and their counsel to consider when the company and its employees are active in social media. This Checklist offers suggestions in dealing with the limitations and challenges that federal securities laws place on the use of social media and avoiding violations of the securities laws. This Checklist also covers social media use during sensitive disclosure periods, such as during securities offerings and proxy solicitations.
Are you an old-story leader or a new-story leader? Find out where you stand in the spiritual awakening that is stirring in the workplace and why you should care.
Learn cybersecurity measures businesses can consider taking in order to better safeguard their systems and data against potential cyber threats, following Russia's invasion of Ukraine.
Learn about international soft law frameworks - standards, laws, and proposed laws regarding digitization and digital tools.
Increasingly, non-IT companies are becoming "accidental" licensors, licensing their internally built accounting, inventory, human resources, supply chain, or other software systems in order to capitalize on these developments. If your company becomes a software licensor, you may encounter many important and problematic legal issues relevant to the modification, distribution, and protection of your code. They include the permitted use of open source code in commercial applications, clean room development, government rights in software created with government funds, intellectual property protection for software, reverse-engineering, and encryption export controls. This article analyzes these questions and more through familiar hypothetical scenarios.
Show results exclusively from the ACC Resource Library with customizable filters