Close
Login to MyACC
ACC Members


Not a Member?

The Association of Corporate Counsel (ACC) is the world's largest organization serving the professional and business interests of attorneys who practice in the legal departments of corporations, associations, nonprofits and other private-sector organizations around the globe.

Join ACC

ACC Member Portal and Web Services are back online
ACC's member portal and web services are available following a scheduled upgrade. However, our team is monitoring and resolving issues promptly. Please be sure to reset your password here.
Thank you for your patience. Please contact our team with any questions.

Search Filters
Stephen Herbes, Lauren Neiswender, Lori Nugent, Shareholder

When a significant data breach happens, first responders face significant challenges under extreme pressure. This panel will provide an overview of the current environment in which data breaches are addressed in litigation and regulatory investigations. The panelists will walk you through what happens behind the scenes when a potential breach is identified, investigated and notified and the ensuing regulatory investigations and class action litigation proceedings. Having provided a real-world perspective, the panel will then discuss effective ways to prepare now, so that your company is ready to handle a breach situation well. Panelists will provide concrete examples of measures taken in advance of a breach that make a difference when it happens, including evaluating exposures, reserving and insurance to protect the bottom line; managing vendors and coordinating with others when sensitive data is shared and effective ways to keep your board informed about cybersecurity.

Resource Details
Source: Meetings
Region: United States

This article shows 10 things you should know about EU data protection reform.

Resource Details
Source: Resource Library
Region: European Union
Shawn Cheadle, Melissa Drennan, Matthew Nelson

In-house counsel will optimize their role as leaders in information governance by attending this session as they learn the lifecycle of data (collection, use, storage, archiving and destruction) and acquire tools to educate their companies on the risks and benefits associated with data as it travels through that lifecycle. Learn to resolve your company’s information management and governance issues and to add business value by finding information management systems that lower costs and improve efficiencies. Become “litigation-ready” in the face of complex discovery requests.

Ted Claypoole, Charles Kallenbach, Michael Levin, Charles McGimsey, Claire Rauscher,

Trade secrets, customer data, financial records and other confidential information increasingly is under attack. But while most companies focus their security efforts on external threats (i.e. hackers), their greatest security risks may lie within their own company. Employees have access to confidential information, and may understand how to avoid internal security measures. This session will reveal the best practices to protect your company from internal thieves.

This statement is intended to alert financial institutions to specific risk mitigation related to the threats associated with destructive malware.

Resource Details
Source: Resource Library
Region: United States

This is a sample business associate flow chart.

Resource Details
Source: Resource Library
Region: United States
Wexner Medical Center, Ohio State University
5 pages

This is an Ohio State University Wexner Medical Center HIPAA breach analysis form.

Resource Details
Source: Resource Library
Region: United States
Derede McAlpin, Reginald B. McKnight, Bruce Strothers, Michael Whitlock

It’s a bad day, the eve of your company’s merger. You are a high-profile corporate lawyer working for a global brand and you just learned that personal data believed to have been stolen from your cloud computing account has been posted on WhoNeedsTheLaw.com, apparently exposing your name, entire work email inbox, phone number and scandalous images secured by a hacker accessing the camera on your laptop computer. The data includes a private dialogue between you and the outside company about the liabilities of taking on the merger. What would you do? This interactive session will cover emerging executive liability issues and test how effectively you can navigate risk with real-life scenarios and video vignettes.

Nick Holland, Kimberley Overs, Troy Sauro, Ruby Zefo

We live in a world where a wearable fitness tracker can tell you how many steps you’ve walked; your thermostat magically knows how to adjust the temperature in your house when you come home; you can control devices in your home with your phone; medical devices connect to insulin pumps wirelessly and your car logs everything from where you’re going to how many miles you’ve driven on public roads. While the possibilities are endless, they come with myriad legal concerns. This panel will delve into the key legal issues associated with the Internet of Things: privacy, data security and the regulatory perspectives from the Federal Trade Commission, the Food & Drug Administration and the Federal Communications Commission.

Jeremy Batterman, Erez Liebermann, Korin Neff, Miriam Wugmeister

There are two kinds of companies: those that have had a security breach and those that will have a security breach. Security incidents present numerous significant risks to companies, including negative brand and reputation attention, loss of sales or customer churn, financial penalties and legal exposure. This session will provide practical guidance from an in-house perspective on the multiple challenges posed by cybersecurity issues, best practices for data protection and steps to take in the event of an information security breach. Topics will also include insurance and vetting third-party vendors.

Subscribe to Data Protection