Close
Login to MyACC
ACC Members


Not a Member?

The Association of Corporate Counsel (ACC) is the world's largest organization serving the professional and business interests of attorneys who practice in the legal departments of corporations, associations, nonprofits and other private-sector organizations around the globe.

Join ACC

ACC Member Portal and Web Services are back online
ACC's member portal and web services are available following a scheduled upgrade. However, our team is monitoring and resolving issues promptly. Please be sure to reset your password here.
Thank you for your patience. Please contact our team with any questions.

Search Filters

This article addresses the three broad topics that many Boards of Directors are examining as they review and assess cybersecurity issues.

Derede McAlpin, Reginald B. McKnight, Bruce Strothers, Michael Whitlock

It’s a bad day, the eve of your company’s merger. You are a high-profile corporate lawyer working for a global brand and you just learned that personal data believed to have been stolen from your cloud computing account has been posted on WhoNeedsTheLaw.com, apparently exposing your name, entire work email inbox, phone number and scandalous images secured by a hacker accessing the camera on your laptop computer. The data includes a private dialogue between you and the outside company about the liabilities of taking on the merger. What would you do? This interactive session will cover emerging executive liability issues and test how effectively you can navigate risk with real-life scenarios and video vignettes.

Arent Fox LLP
54 pages

In this ACC guide (InfoPAK) for advanced practitioners with a basic understanding of technology agreements, employment agreements, and commercial lease agreements, learn practical tips for addressing important issues that frequently arise in these areas, and gain critical guidance and necessary best practices designed to help businesses achieve their commercial goals.

Resource Details
Source: Resource Library
Collection: Contract Negotiation Skills
Region: Global
Patrick Fair, Partner and Sanil Khatri, Associate at Baker & McKenzie

Proper management of personal information is key to customer confidence, trust and business reputation. This Top Ten presents key tips regarding data privacy in Australia.

Resource Details
Source: Resource Library
Region: Australia
Peter C. Quittmeyer, Partner, Sutherland Asbill & Brennan LLP

This Top Ten presents practical tips for preparing and managing a software audit in the United States.

Resource Details
Source: Resource Library
Region: United States
Richard Kessler, UBS

The Relationship of Big Data, Information Governance, and Data Governance presentation to the Information Governance Committee on July 16, 2015.

Michael Overly, Foley & Lardner

Employees are the front line of your information security defense. While technological protections are essential (for example, antivirus software, firewalls, spam filters, etc.), none are as effective as a vigilant end user. These are checklists of measures of which every user should be aware.

The purpose of this table is to: 1) list the countries in the European Union that have a comprehensive data protection law (columns 1 and 2); 2) summarize the notification and/or registration requirements with the competent data protection authority in these countries and explain where exemptions to notify/register may exist (columns 3 and 4); and 3) specify the countries where it is required to notify individuals about the collection and processing of their personal data (column 5).

Resource Details
Source: Resource Library
Region: European Union
47 pages

This Leading Practices Profile, which updates 2010’s Leading Practices in Privacy and Data Protection: What Companies Are Doing, examines the data security and privacy practices of six companies with operations spanning the globe.

Gerard Chan, David Eveleigh, Tim Fitzgerald, Nick Holland

In this interactive workshop a panel of experts provides practical tips and guidance on data breach obligations and associated notification requirements, how to address data breach in contracts, how to deal with bad leavers and protect trade secrets, corporate spying and the impact of European human rights legislature.

Subscribe to Data Protection and Cybersecurity