These are the official guidelines for social media if you're an employee or contractor creating or contributing to blogs, wikis, social networks, virtual worlds, or any other kind of social media
These guidelines have been developed for all to follow whenever contributing to online social computing platforms where there are references to or a potential impact on the corporation.
This is a sample corporate blog outlining the discussion guidelines and rules of engagement.
This questionnaire and guide to law firm cybersecurity has been prepared to assist corporate counsel in thinking about the key issues and addressing them with outside counsel.
When a significant data breach happens, first responders face significant challenges under extreme pressure. This panel will provide an overview of the current environment in which data breaches are addressed in litigation and regulatory investigations. The panelists will walk you through what happens behind the scenes when a potential breach is identified, investigated and notified and the ensuing regulatory investigations and class action litigation proceedings. Having provided a real-world perspective, the panel will then discuss effective ways to prepare now, so that your company is ready to handle a breach situation well. Panelists will provide concrete examples of measures taken in advance of a breach that make a difference when it happens, including evaluating exposures, reserving and insurance to protect the bottom line; managing vendors and coordinating with others when sensitive data is shared and effective ways to keep your board informed about cybersecurity.
This is a comparison chart that highlights the various structure, liability, tax and management differences among C-corporations, S-corporations, limited liability companies and partnerships.
Developing technologies and our increasingly mobile and global society enhance the logistical ease and potential benefits of multi-jurisdictional practice. However, inconsistent licensing and unauthorized practice of law rules and the fundamental need to protect privilege and privacy may limit its usefulness and efficiency. In this session, in-house counsel from organizations with multi-jurisdictional presence will share ideas about how their companies and others might use available technology to better leverage resources across jurisdictions. Just as importantly, they will identify some potential pitfalls — ethical and otherwise — to help participants understand the practical and legal parameters of such practices involving MRCP 5.5.
Who knows better than we in the trenches the many tools and tips out there to manage a small department for maximum efficiency on a modest budget. This Town Hall meeting will share best practices and practical tips on the following subjects: the practical aspects of staffing (range of positions, non-legal positions, outsourcing); budgeting (templates, budgeting for litigation, cost allocation, common budget busters); research options (Westlaw, Practical Law, ACC, other knowledge management systems, good blogs and listservs) and technology tools (systems for small departments, cloud services, video conferencing, e-signature systems, systems that allow you to work from anywhere (phone tethering, Adobe, MiFis, FedEx Kinkos, Regus, etc.).
Bad news hits front pages and TV screens every week: Ever-larger data breaches affect millions of trusted companies' customers. The good news is the buyer’s market for cyber insurance; businesses can shop not only on the basis of price but for policy terms that cover actual risks. Traditional lines of coverage (including crime, property, general liability and directors and officers) can provide coverage when a breach occurs, although new exclusions are pushing more businesses toward specialty policies. In this evolving market, it’s essential to analyze existing coverage and terms offered in competing cyber policies. This session will spotlight key policy provisions to demand and others to avoid. The panelists will view cyber insurance in the risk management context, including prevention and post-breach planning. They will outline an approach to cyber security equally focused on human factors: building staff awareness and the right protocols.