Close
Login to MyACC
ACC Members


Not a Member?

The Association of Corporate Counsel (ACC) is the world's largest organization serving the professional and business interests of attorneys who practice in the legal departments of corporations, associations, nonprofits and other private-sector organizations around the globe.

Join ACC

ACC Member Portal and Web Services are back online
ACC's member portal and web services are available following a scheduled upgrade. However, our team is monitoring and resolving issues promptly. Please be sure to reset your password here.
Thank you for your patience. Please contact our team with any questions.

Search Filters

This sample outlines the provisions that are applicable to company employees who are authorized to connect a smartphone or other mobile computing device to the company network.

Dechert LLP
24 pages

In this article, learn the more material changes brought about by the GDPR (those likely to have a bigger impact), comments on the likely impact of the proposal on businesses, and suggests action points that businesses can begin to address in the lead-up to the measure coming into force.

Resource Details
Source: Resource Library
Region: European Union
María Alejandra De Los Ríos Rueda, Lloreda Camacho & Co.

This Top Ten addresses aspects of Colombian data protection law that your company should take into account when establishing a business in Colombia, since most of the companies will handle Personal Data (at least employees data) and therefore will have to comply with the Data Protection Law and its regulations.

Resource Details
Source: Resource Library
Region: Colombia
Kimberleigh Dyess, University of Maryland

This Quick Overview discusses how businesses must be prepared to handle the risks and consequences of storing large quantities of customer and client personal information digitally in the United States.

Resource Details
Source: Resource Library
Region: United States

This checklist consists of a non-exhaustive set of questions that in-house counsel may wish to know the answers to prior to approving any technology agreements for their clients.

Resource Details
Source: Resource Library
Region: United States

The type of reports that may be requested from consumer reporting agencies under this policy include but are not limited to criminal records, motor vehicle reports, credit checks, reference checks, education verification, employment verification, and professional license or certification verification.

Resource Details
Source: Resource Library
Region: United States

This sample is divided into three sections: (1) the formal company requirements related to company data, the internet and email, (2) the company portal site (intranet), and (3) social media guidelines when posting or reacting to comments or pictures about the company on collaborative websites (i.e., Facebook, Twitter, You Tube, My Space, Flickr, etc.)

Resource Details
Source: Resource Library
Region: United States
Evan Slavitt, Kerry Childe, Mary Clarke, Jennifer Mailander, Edward Paulis, Rachel Reid, and Linda Rush

This questionnaire and guide to law firm cybersecurity has been prepared to assist corporate counsel in thinking about the key issues and addressing them with outside counsel.

Resource Details
Source: Resource Library
Michael Deer, Phil Lee, Partner, Allison Malin, CM Tokë Vandervoort

To create a privacy program that meets compliance demands and customers’ expectations, there are four main areas you will need to address: getting your C-suite’s attention without the “help” of law enforcement or regulators, determining what resources are already in place to prevent the worst, prioritizing what is most important for your company to avoid disaster and putting together a long-term, defensible strategy. In this session, learn ways to build trust, design a defensible program and create a lasting privacy culture.

Resource Details
Source: Meetings
Region: United States
Jenny Barnes, Chanley Howell, Jason Stevens

Taking a cue from the popular TV show 24, the Health Law Committee plans to solve a US Health Insurance Portability and Accountability Act (HIPAA) breach in 90 minutes. In this interactive session, panelists will take on various roles, like CEO, CIO, security officer, privacy officer, compliance officer and general counsel, as they take the audience through simulated breach scenarios involving protected health information. Garner substantive information and practical tips for managing HIPAA incidents and data breaches as the speakers are challenged in real time to address the details provided by attendees.

Resource Details
Source: Meetings
Region: United States
Subscribe to Privacy & Security Issues