Close
Login to MyACC
ACC Members


Not a Member?

The Association of Corporate Counsel (ACC) is the world's largest organization serving the professional and business interests of attorneys who practice in the legal departments of corporations, associations, nonprofits and other private-sector organizations around the globe.

Join ACC

ACC Member Portal and Web Services are back online
ACC's member portal and web services are available following a scheduled upgrade. However, our team is monitoring and resolving issues promptly. Please be sure to reset your password here.
Thank you for your patience. Please contact our team with any questions.

Search Filters
Shaka Johnson, Jonathan Jung, Simon Seidler

This is a course outline for the session.

Resource Details
Source: Resource Library
Shaka Johnson, Jonathan Jung, Simon Seidler

Imagine you are in house at a digital/eCommerce company and your business team approaches you with plans to start selling internationally. They regale you with grand promises from global payment providers: "They'll take care of everything—local website, language translation, exchange rate, payment facilitation, etc. It's plug and play!" Not so fast. Before you get moving, there are a myriad of other essential pieces to consider: Will you be shipping physical products - if so, how and from where? Have we thought about customs duties, local product regulations, corporate tax implications, terms and conditions, and IP rights? Are there marketing and advertising restrictions in local countries? What data protection and security issues will we face? Join this session to delve into the many issues consumer-facing companies should address when seeking to expand globally.

Resource Details
Source: Meetings
Richard Gottuso, Nora Kurzova, Marty Provin, Jeff Stites

The over-retention of information is the No. 1 information governance challenge companies face. Keeping too much information needlessly drives up discovery costs and creates unnecessary risk of a data breach. But why is it so difficult to hit the delete button? How do companies and in-house counsel get comfortable actually deleting information? This session will discuss how in-house counsel can lead an initiative to reduce the amount of data their companies retain by 50 percent or more. The panel will lead a non-technical discussion on who should be involved, what existing IT resources are required, decision points, and, most important, results.

Resource Details
Source: Meetings
Region: United States
Mark Diamond, Brian Hayle, Emma Wheatley

Information governance (IG) overwhelms companies, creating compliance risks, increased discovery costs, privacy threats, and lower employee productivity. Siloed approaches to information governance fall short. This program explores building the case for a cross-functional approach to information governance. After this session, attendees will be able to list IG compliance risks and related in-house counsel’s ethical responsibilities; identify messaging strategies to get C-suite support for IG; list the ideal composition of an IG committee; obtain a seven-step project plan for launching an IG program; and quantify the benefits of an IG program. Attendees will also receive a business case outline to present to the C-suite, sample committee charter, and checklist of do’s and don’ts in building your case.

Resource Details
Source: Meetings
Region: United States
62 pages

This Essay examines the concerns of big data disparate impact through the lens of American antidiscrimination law—more particularly, through Title VII’s prohibition of discrimination in employment.

Resource Details
Source: Resource Library
Region: United States
29 pages

This report examines several case studies from the spheres of credit and lending, hiring and employment, higher education, and criminal justice to provide snapshots of opportunities and dangers, as well as ways that government policies can work to harness the power of big data and avoid discriminatory outcomes in the United States.

Resource Details
Source: Resource Library
Region: United States
Jason R. Baron, Courtney Barton, Shawn Cheadle

As noted in a recent New York Times article, “there is a widespread belief that software and algorithms that rely on data are objective. But, software is not free of human influence. Algorithms are written and maintained by people, and machine-learning algorithms adjust what they do based on people’s behavior.” In an era where big data is used for decision-making purposes, the legal profession grapples with possible hidden bias and the need for greater transparency in the use of black-box algorithms. This session will explore data ethics and the need for its inclusion in information governance conversations within corporations as entities collect, use, and monetize client data. The session will explore C-suite transparency in connection with software used for insider threat monitoring and surveillance, making hiring decisions, and monitoring various forms of employee behavior.

Christine Binotti, Sam Facey, Kristen Hardy

Media and security experts focus so much attention on hackers and external threats that companies have a false sense of reality. The more likely threat, and one that could cause damage on a larger scale is the insider — the individual who has been given clearance to enter the building, and access your IT system, products, and customers. This session will highlight why you should have a program to proactively identify and mitigate insider threats. It will focus on developing an awareness of the common types of insider threats; providing an understanding of the security risks posed by insiders to your company and customers; sharing several easy steps for building a program to detect and prevent insider threats; identifying the legal and privacy risks domestically and globally when developing and implementing a program; and discussing the global considerations when developing a program.

Roger Bickerstaff, Michelle Chan, Martin Felli, David Kennedy

This is a program outline for the session.

Mark Harrington, Debbie Hoffman, Alex Santos, Lance Wolf

This program will explore the best practices for companies that manage vendors and cybersecurity concerns. Some of the significant questions to be addressed include: What are some best practices for vendor due diligence? How can vendor cybersecurity risks be addressed and mitigated, both contractually and otherwise? What role, if any, should in-house counsel have in vendor management?

Resource Details
Source: Meetings
Region: United States
Subscribe to Data Protection and Cybersecurity