An important function of every in-house legal department is to provide compliance and ethics training to its non-legal clients – that is, the organization's employees. Effective training on pertinent laws and regulations can help prevent and detect legal problems, and can also limit or mitigate the organization's exposure if violations occur. This program will provide practical guidance for (i) developing training content that conveys the essential information to the employees who need it, (ii) delivering that information in a comprehensible and engaging manner, (iii) ensuring that all employees who should be trained actually receive their training, and (iv) tracking these activities in order to prove up each employee's training participation if/as needed. Attendees will leave this program with ACC resources that will jump-start your training and save you time and money.
For more compliance and ethics training resources, visit ACC's new Compliance Training Portal at <a href=http://www.acc.com/compliance>www.acc.com/compliance</a>.<br/>
A sample course for trainers giving information to employees on appropriate internet use in the office.
This article offers an overview of state and federal laws that address data privacy and security issues to help you stay compliant with changing regulation and your customers’ needs. It will prepare you to address the legal, procedural and public relations aspects of a data security breach.
It's pretty safe to say that most attorneys do not specialize in IT. Although technology makes the responsibilities of an in-house lawyer much easier, its implementation comes with a completely separate set of issues and concerns, including maintenance and support. Learn about the principal concepts that should be addressed, as well as their key terms and issues.
The new millennium has ushered in an era of lighting fast communication and commerce. As in-house counsel work to protect their most valuable asset - their company's intellectual property - there are new elements to consider when thwarting competitors' ability to use your top-secret information to their advantage. Are restrictive covenants the solution?
A non-exhaustive list of provisions to consider in connection with preparing a policy, agreement or legal notice for use with members and others that connect, or wish to connect, with an association through an online social networking site or in connection with a more formal terms of service or legal notice for a page, site or blog on a social networking site.
Increased online trading between the United States and Europe has also heightened the need for increased caution in matters of privacy and data protection. And while there are no hard and fast rules about ecommerce between the two unions, the smooth sailing of trans-Atlantic transactions may become a bit bumpy. Enter the EU Safe Harbor as a possible solution.
It may sound like an odd declaration to make, but in the present state of the economy there is no such thing as a secret. This article discusses the vulnerability of a failed businesses’ private data. What happens to the once personal — and considerably privileged — information of former clients, customers, employees and patients?
This document provides best practices for developing a social media policy.
With so much electronically stored information (ESI), it can be difficult to find the specific answers you are looking for. "Keyword searching" has emerged as a solution to this issue. This article discusses the complicated nature of this solution.