New security measures to protect company's information are being tested throughout the world. With General Data Protection (GDPR), employees have a right to see where privacy and security meet. In this article, new security measures are discussed within the frame of GDPR.
In this Top Ten, learn tips as to how to organize your data protection practices. Now more than ever, companies are under pressure to create, implement, and maintain effective data protection plans.
Data breaches happen to companies across the globe. In this article, in-house counsel can learn how to plot a successful plan that will protect their company's data. Each section of this article is dedicated to a specific country or region including Hong Kong, China, Europe and the United States. This resource was published by Meritas in 2019.
This is a sample external communications and social media policy.
These are key issues and provisions to consider for each of a traditional software license and a hosted software-as-a-service agreement.
Digital identities are a set of attributes that can allow an individual to be represented in a digital form in a online environment. In this article, in-house counsel will learn the basics of how digital identities interact and why they're so important in a global environment. This resource was published in March 2019.
In this article, Hong Kong's developing drone regulations are discussed. Since the proliferation of inexpensive materials and applicable projects are skyrocketing, Hong Kong is reckoning with rapid advancement in this technology sector. This resource was produced in 2019.
There are a variety of reasons why companies move their data to the Cloud. In this article, issues with software asset management, use of external electronic data storage, and IT teams capabilities are discussed for Hong Kong-based companies. This resource was produced in December 2019.
This article explores how increased opportunities and regulation surrounding data has impacted Hong Kong businesses. This resource was produced in March 2019.
Data regulation has increased in recent years. In this article, specific regulations and their impact on Hong Kong businesses are discussed. This resource was produced in April 2020.
This sample outlines the acceptable use policy concerning network services and computer services, including e-mail and internet.
This cross-border checklist highlights distinctive legal, business and regulatory issues when doing a deal in Canada.
Take a short introductory quiz and learn 12 Dos and Don't for a company's outbound calling practices under the US Telephone Consumer Protection Act (TCPA).
This is a sample cloud privacy and data security addendum.
This is a sample information technology data classification and handling policy.
This is a sample computer, e-mail and internet usage policy.
This article was published in the Tech Toolbox column of the ACC Docket, ACC's award-winning publication. If you work for a multinational company, your department should be striving to harness all of the global resources to manage data transfer across borders.
Cybersecurity touches every aspect of global consumer and corporate culture today. Preventing, preparing for, and responding to data breaches in real time is a chief concern for individuals, corporate leaders, and government regulators. Download the 2018 ACC Foundation: the State of Cybersecurity Report, underwritten by Ballard Spahr LLP, and learn what more than 600 corporate counsel say about their cybersecurity experiences, role, and practices.
This is a sample master software license and services agreement.
This article discusses the rules of taxation aligning e-commerce business with international tax rules and standards under the Departmental Interpretation and Practice Notes (DIPN 39 (Revised)) issued by the Inland Revenue Department (IRD) in late March 2020.
For many companies, the potential of big data is clouded by uncertainty as to how programs should be designed and maintained to avoid legal and regulatory risk. This is especially true because the concept of what constitutes consumer harm – in the field of privacy generally but especially with regard to big data analytics – is rapidly evolving. This InfoPAK provides an overview of legal and regulatory considerations businesses should contemplate when developing programs that rely on big data coupled with tools that help apply those legal and regulatory considerations to real world situations.
This is a list of some basic action items to consider, given the widespread and ongoing impact of WannaCry ransomware, along with the likelihood of spin-off ransomware coming in the near future.
Technology Planning for Legal Operations session resource