Blogging and Social Networking Policy
These are sample rules and guidelines for communicating company-related information via social networking forums whether used in or outside the workplace.
These are sample rules and guidelines for communicating company-related information via social networking forums whether used in or outside the workplace.
In this column, the author makes three suggestions for adding value to your small law department.
NEW COUNTRIES ADDED!!
This multi-PAK provides a high level overview of merger control, restrictive agreements and practices, monopolies and abuse of market power, and joint ventures in various jurisdictions. In particular, it covers relevant triggering events and thresholds, notification requirements, procedures and timetables, third party claims, exclusions and exemptions, penalties for breach, and proposals for reform.
This is an outline for the session CLOLL2
Corporate art collections, private individuals and museums lend art to one another. This brief article discusses the
benefits and risks involved in lending art.
The author discusses new innovations in software-generated text and how current and future attorneys can remain relevant to their clients.
An ACC letter supporting Ohio's adoption of ABA Model Rule 5.5, which covers multi-jurisdiction practice.
In order to bypass the hazards and strains of litigation, many have chosen to resolve conflict through mediation. this article offers tips on how to prepare for mediation, including strategies for selecting an excellent mediator.
Today’s data security environment is hostile. CLOs now supervise information security officers and compliance officers; therefore they must be aware of developing threats to cybersecurity. A new actor in this realm is the “Advanced Persistent Threat,” well-financed groups that may be sponsored by foreign governments, often carrying out strategic national objectives. From spear-phishing to zero day exploits, attempts to infiltrate corporate data are sophisticated and persistent.