This check card is a printable resource with practical advice for the dos and don'ts of smart information security.
This InfoPAK is a primer for in-house counsel starting, building, executing, and refining an Information Governance program.
For many companies, the potential of big data is clouded by uncertainty as to how programs should be designed and maintained to avoid legal and regulatory risk. This is especially true because the ...
Sep 2011
QuickCounsel
This QuickCounsel will review federal and state privacy and security laws as well as offer brief guidance on compliance efforts.
Sep 2010
QuickCounsel
One of the most comprehensive shifts in information technology over the past decade is the emergence of cloud computing as a strategy for IT systems management. Cloud computing puts the company’s ...
Apr 2010
QuickCounsel
Information regarding data privacy and protection in the European Union with a comparison to the United States.
Hear ACC members discuss the expectations and fiduciary duty placed on the board of directors regarding the organization's compliance, and the role of in-house counsel in providing the right level ...
Hear ACC members discuss practical tips and strategies for in-house counsel to educate the board of directors regarding compliance, and to report to the board regarding the organization's risk and ...
This short vignette focuses on a hypothetical situation that could occur in any office. Use it as a training tool in your compliance program education efforts. (Licensed for use in classroom settings ...
The FTC will not hesitate to pursue companies that fail to implement reasonable security standards into their technology development cycle. This article reviews recent FTC settlements and offers ...
You may not know it, but intellectual property considerations and implications are everywhere in your company. And if you think you are immune, or it is someone else’s job because you practice real ...
Members respond with a note of caution to the question of whether to use email disclaimers. The consensus is that disclaimers should be tailored and relevant.
This is a sample document retention policy which provides recommended minimum retention periods based on legal requirements and practical considerations.
Aug 2010
Leading Practices Profile
Members Only
This Leading Practices Profile examines data protection and privacy practices of six companies and two associations. Organizations featured in this Profile described practices and approaches for ...
Aug 2009
Top Ten
Top ten tips on why data security compliance is an urgent matter for the corporate counsel. Includes account of existing laws and regulations, potential legal developments, tips on monitoring computer ...
This quick reference provides checklists for the five key principles of building a sound data security plan. The five key principles are: take stock, scale down, lock it, pitch it, and plan ahead.
Read this 2010 Apex Award-winning article!
The revolution has not only been televised - it's been beamed, emailed and scanned. Technological advancements aren't without their risks, however. The ...
This webcast transcript examines digital issues in the workplace in light of the "Millennial" generation of employees.
Data security laws are rapidly changing the way organizations manage information worldwide. Breach investigations are becoming increasingly complex and pose greater risk including potential international ...
Is a data theft or breach one of your company’s worst nightmares? Read the daily paper to see the serious ramifications that can occur under such a breach. What can and should you know about this ...
May 2008
Quick Reference
Members Only
Provides safeguard practices to protect personalized information from unauthorized access. Includes a list of practices that should be included in an incident response plan to ensure timely notice ...
Provides a how-to-guide for responding to and managing data security breaches.
A sample of FAQ's and answers regarding data privacy of a company.