Review these event contract considerations and checklists for: Identifying the Location, Contract Review
Maturity stages and foundational tools to benchmark the maturity of an organization's compliance function.
Consider this checklist to help you assess compliance with the Personal Information Protection Law of China ("PIPL") adopted on 20 August 2021.
The ACC/ACC Foundation DEI Maturity Model has been designed for use by legal departments around the world to benchmark maturity of their efforts regarding diversity, equity, and inclusion (DEI)
Learn what key trends and issues Chief Legal Officers have identified as top of mind.
The following checklist represents a high-level overview of potential issues to guide an organization’s thinking about reopening most effectively while mitigating business and compliance risks. Reopening orders at the state and local levels can vary significantly, and planning should take those requirements into account.
As employers increasingly choose to allow employees to work remotely, even as the workplace restrictions caused by the Covid-19 pandemic wane, in many cases those workers are located outside of the employer’s regular work state. As a result, questions arise as to what laws, and state and local compliance obligations, apply.
Employers monitor off-site employees for numerous reasons—not simply to ensure productivity, but to protect trade secrets, avoid data breaches, track an employee’s physical location, and generally discourage or identify misconduct. Most recently, monitoring has been used for COVID-19-related contact tracing purposes. However, privacy-related legal pitfalls abound.
As the pandemic has compelled more employers to undertaking the hiring process remotely, what are the privacy and security risks inherent in conducting job interviews online, and what may employers do to mitigate those risks? Learn some actions to take in this checklist in order to protect employer and potential employees.
The COVID-19 pandemic sparked an exponential increase in remote work, as employers were forced to shut down offices with little notice and little opportunity to plan for the significant data security vulnerabilities of working from home. Post-pandemic, the virtual workplace likely will remain a permanent fixture of daily work life for many organizations. The challenge for employers that embrace a virtual work model will be to ensure the continued security of their data as new risks emerge.