This is a checklist for employers to use when responding to to a subpoena duces tecum for the employment records of a current or former employee.
Discuss provisions in cloud computing agreements that address sensitive issues, such as data ownership and protection, privacy and intellectual property. Obtain tips on negotiating liabilities and risks in cloud computing contracts — what provisions SaaS providers commonly include in agreements, provisions large customers typically request, which are negotiable and how to mitigate the impact of terms you cannot change.
Considering the increasingly active role general counsel play in cybersecurity strategy, risk assessment and prevention, the ACC Foundation recently released an unprecedented study of the state of cybersecurity in the corporate sector. The largest study of its kind, the report serves as a resource for in-house lawyers, corporations and boards of directors directly impacted by one of the greatest challenges and reputational risks facing companies today. This plenary session will provide key takeaways from the report that you can put into action today, as well as guidance on preserving privilege, budget allocation and collaborating with law enforcement or government agencies. Learn what general counsel experienced in data breaches wish they had known before the breach occurred and other important lessons learned.
Discuss recent developments in the global regulatory landscape that impact cybersecurity compliance in the financial industry, and the sources of authority or reference for defining legal standards in this domain. Review regulatory guidance that both identifies and raises questions on what is enough to satisfy an organization’s responsibilities to customers, employees, business partners and other stakeholders with respect to cybersecurity. Identify best practices for effective implementation of cybersecurity measures. Explore how a multinational financial institution can structure its cybersecurity program at the enterprise level without running afoul of foreign jurisdictions’ regulators. Review the state of play in civil litigation over data breaches, including plaintiff strategies for overcoming motions to dismiss based on inadequate pleadings or standing. Discuss recent settlements of major data breach class actions and their impact on future cases.
This is a sample procurement contract review process map.
This is a sample fall-back utilization analysis.
This is a sample questionnaire for classifying contracts according to risk.
This is a sample employee non-disclosure, non-solicitation and intellectual property agreement.
This checklist provides an overview of the U.S. E-Sign Act and the Uniform Electronic Transactions Act (UETA) and lists practice points for using electronic records and signatures.
In four separate decisions, the US Court of Appeals for the Federal Circuit (CAFC) either affirmed findings of non-infringement or reversed findings of infringement. This article reports on those decisions, and specifically the issue of patent infringement and the importance of claim construction.