Whistleblowing
This course explains your responsibility to report suspected violations of the securities laws and how to do so through our company's internal mechanisms, externally to the Securities and Exchange Commission (SEC), or both.
This course explains your responsibility to report suspected violations of the securities laws and how to do so through our company's internal mechanisms, externally to the Securities and Exchange Commission (SEC), or both.
This is a sample unsecured convertible promissory note where the borrower is a Nevada based corporation.
This course explains our policy on giving business courtesies — gifts, meals and entertainment — to those with whom we do business, as well as our policy on accepting business courtesies. (Licensed for use in classroom settings only and not for distribution in any form.)
Panelists will review common pitfalls when transacting with foreign governments, including governing law/dispute resolution, tax issues and intellectual property, and will discuss strategies for avoiding those pitfalls.
Faced with new adopters of technology — or perhaps “never adopters”? Technology is rapidly evolving, and in the healthcare world, companies constantly encounter dilemmas when faced with the business need to implement new technologies in harmony with archaic legal standards. This session will address numerous technology issues, including those with medical devices, software as a device, mobile applications, risks, benefits, and the global element. Come learn the legal risks and benefits around emerging technology (such as mobile health) and how to best partner with your IT and business colleagues without betting the company.
This roundtable discussion will include regulators from the US Department of Justice, Securities & Exchange Commission, and the Consumer Financial Protection Bureau, along with your in-house counsel peers. With the regulators, we will cover ongoing and emerging compliance and examination issues, provide updates on regulatory changes, and keep ACC members in tune with regulators’ views, recent findings, and consent orders and compliance trends. The regulators will be asked to discuss their approaches to examinations and investigations and suggest best practices for compliance in the current environment.
A panel comprised of Supreme Court experts will highlight current key issues and cases for the U.S. Supreme Court. Join these esteemed faculty as they delve into significant legal topics that are relevant across the spectrum of in-house lawyers.
In 2016, employers should expect to see US Occupational Safety and Health Administration (OSHA) fines that are as much as 80 percent higher than in the past as a result of a budget provision signed into law by President Obama that will significantly increase OSHA fines for the first time since 1990. Fines will place greater emphasis on getting OSHA compliance right. In this program, OSHA experts will address the agency’s new penalties and provide a checklist for specific compliance steps that employers can use to better insulate their companies from those penalties. Presenters will address OSHA’s increased focus on new recordkeeping and reporting responsibilities; temporary works; Voluntary Safety and Health Program management guidelines; workplace violence; and joint employer responsibility.
Considering the increasingly active role general counsel play in cybersecurity strategy, risk assessment and prevention, the ACC Foundation recently released an unprecedented study of the state of cybersecurity in the corporate sector. The largest study of its kind, the report serves as a resource for in-house lawyers, corporations and boards of directors directly impacted by one of the greatest challenges and reputational risks facing companies today. This plenary session will provide key takeaways from the report that you can put into action today, as well as guidance on preserving privilege, budget allocation and collaborating with law enforcement or government agencies. Learn what general counsel experienced in data breaches wish they had known before the breach occurred and other important lessons learned.
This presentation provides supplemental guidelines for the session.