Frank Fletcher discusses how understanding the underlying technology of your business can help make you a better service provider.
Frank Fletcher discusses how implementing a wiki can benefit some legal departments.
This Top Ten focuses on the important inquiries counsel should make when entertaining the idea of an automated management system for outside counsel work.
Currently, the three most popular social networking online tools are LinkedIn, Twitter and Facebook. Here are some suggestions for how you can best use these sites to enhance your job search.
It’s not how you negotiate, but how you reduce negotiations. This program will cover the major issues in technology contracts and practical advice on what you can negotiate with the giants of the IT world. Learn how to work with large and small vendors in collaborating and negotiating common terms that are applicable throughout the industry.
This InfoPAK is designed to provide corporate counsel with a general overview of compliance training and e-learning programs and to suggest useful practices for the handling of such training in the corporate setting.
Tweet, tweet. Chances are, the development of social media has outpaced your client’s employee policy. Learn what to be cautious of, and how to address this trend reasonably and realistically. Create a policy that protects your company while still encouraging use to your company’s advantage.
A discussion on how the iPhone promotes succinct communication lines and cognitive fluency.
This CLO Perspective highlights some of the technology, tools and practices Christopher Barnard, General Counsel for Coca-Cola Europe, implements within his virtual legal team to help them stay connected, and provides insights on how the team uses technology to provide productive and efficient legal services for their corporate client.
Companies need to make their clients, colleagues and customers feel that their information is private and secure. That's just good business. But instituting relevant privacy policies and implementing new technologies is just the tip of the data security iceberg. Risk assessments, when performed regularly, are also a critical component to ensuring the effectiveness of a privacy compliance program.