This policy describes how the use of Devices for work purposes is subject to the Company’s approval and its rules and conditions concerning the use and maintenance of such devices.
This sample policy describes how eligible employees are permitted to use certain of their personally-owned computing or mobile devices (“POMD”) for work.
The purpose of this policy is to outline the guidelines on distribution and monitoring of Company-Issued Wireless Devices and proper use of all Wireless Devices in the workplace.
Discuss the role of the in-house attorney as a privacy professional; Learn the valuable role the information security officer plays in developing and maintaining data privacy, and the importance of creating a cooperative relationship; Understand the legal and regulatory landscape of data privacy, specifically how it relates to the transfer of data across borders; Understand the interplay of cybersecurity and data privacy; discuss which components of the data protection umbrella are in the domain of the info security (tech) team, and which are the domain of the data privacy team (legal); and Learn to assess the risks of your current data privacy and information security protocols, and to address these risks using internal and external tools (e.g., ongoing internal controls, external audit and insurance).
This brief overview (Quick Counsel) describes common mistakes customers and service providers make, and should be aware of, when negotiating cloud services agreements (but is not meant to be an exhaustive list).
Gain a more fluent knowledge of global privacy issues and data sharing challenges through an experiential learning session. Learn more about where technology is leading the law on privacy issues. Understand how in-house counsel can better anticipate and plan for shifts and developments in the area of data privacy. Learn by participation and peer interaction. Participants will represent the many countries involved in the operations of a hypothetical global company that wants to gather and share employee data internally. As company representatives within their jurisdiction, they will negotiate with the regulators (faculty) on proposed cross-border solutions for data sharing.
This sample form deals with authorization for release of health information.
This Wisdom of the Crowd (ACC member discussion) addresses how to protect privileged information in internal email communication, under US law. This resource was compiled from questions and responses posted on the community of the New to In-house Network.
The purpose of this research is to understand how organizations qualify and quantify the financial risk to their tangible and intangible assets in the event of a network privacy or security incident.
This multi-jurisdictional resource provides practical information on cross-border data protection issues, including regulations, data controller obligations, rights to access personal data, international transfer of data, and data processing by third parties.