When the Only Constant Is Change: A Health Care Counsel's Story
Christy Neuhoff, system VP general counsel of St. Luke's Health System, discusses dealing with change in her industry, career and life in general.
Christy Neuhoff, system VP general counsel of St. Luke's Health System, discusses dealing with change in her industry, career and life in general.
Sometimes, there is a disconnect between certain truths patent attorneys<br />hold dear and what corporate counsel understand about patents. This article aims to close those gaps.
In this article, the skills and expertise need to succeed as a 21st century General Counsel (GC) as are examined.
Planning the integration of an acquired company’s legal department into an acquiring company’s legal department can be a grueling process. Based on past M&A experiences, here are 200 practical issues that ensure a smooth transition when considered and addressed prior to the closing of the acquisition.
In this interview with Michelle H. Gluck, EVP and CLO at LandAmerica, learn how she and her company took advantage of the housing crisis to better their business processes and practices.
This article outlines GE's view on corporate social responsibility and its approach to creating and adopting new corporate governance standards in response to the Sarbanes-Oxley Act and the proposed New York Stock Exchange listing requirements. It explains how GE intends for these new standards to be a positive model for the corporate community to review and debate.
This is a sample severance agreement setting out the terms of the benefits provided by the employer in exchange for claims relinquished by the departing executive.
This program will explore the best practices for companies that manage vendors and cybersecurity concerns. Some of the significant questions to be addressed include: What are some best practices for vendor due diligence? How can vendor cybersecurity risks be addressed and mitigated, both contractually and otherwise? What role, if any, should in-house counsel have in vendor management?
Media and security experts focus so much attention on hackers and external threats that companies have a false sense of reality. The more likely threat, and one that could cause damage on a larger scale is the insider — the individual who has been given clearance to enter the building, and access your IT system, products, and customers. This session will highlight why you should have a program to proactively identify and mitigate insider threats. It will focus on developing an awareness of the common types of insider threats; providing an understanding of the security risks posed by insiders to your company and customers; sharing several easy steps for building a program to detect and prevent insider threats; identifying the legal and privacy risks domestically and globally when developing and implementing a program; and discussing the global considerations when developing a program.