In this multi-jurisdictional guide, explore an overview of key legal issues, rules and developments regarding renewable energy across a range of jurisdictions.
Learn how to deal with adversity and negative feelings that can lead a person to question their self-worth.
Increasing cybersecurity attacks and fast-evolving data privacy and security law mean there's so much more data for in-house legal departments to track. Learn how to gauge a "reasonable" data security request and integrate that into your work.
In this multi-jurisdictional guide, explore an overview of key legal issues, rules and developments regarding corporate tax across a range of jurisdictions.
This resource is a summary of the Opening Plenary of the Virtual Global General Counsel Summit 2021, titled "Championing Trust in Business in a Brave New World". It contains takeaways distilled from that session's discussion.
Cloud computing is an environment where a business outsources the development, hosting, or running of all or part of its applications and information to a third party, and away from the business’s hardware and premises. In this Top Ten, learn how to utilize this technology for your in-house contract needs.
This template can be used to plan out the onboarding, tracking, and achievement of a new hire over a 30, 60, and 90 day period.
When there's a new in-house counsel added to your team, or you might be the new one, you can follow these top ten suggestions to increase the probability of success in such a transition.
Because of the increased presence of the internet in everyone’s daily lives, a need has emerged for government authorities to respond to the unique challenges of a digital world. Accordingly, this article provides an overview of the Australia’s eSafety Commissioner, the world’s first regulator dedicated to online safety.
This article provides an analysis of how the Covid-19 pandemic has impacted companies specifically with so many companies having distributed workforces. In particular, the article examines the difficulties of applying vicarious liability to a distributed workforce, specifically with regards to when data breaches take place.