This article discusses European General Data Protection Regulation (GDPR) implications and compliance for Asia Pacific (APAC) region businesses.
In this ACC Guide, in-house counsel will learn how to organize their physical and electronic records to create a more efficient legal environment. While automation can be challenging, there are many systems that departments can use to find success.
In order to successfully transition to Office 365, in-house lawyers at corporations large and small must plan ahead. This article will address the top ten things to consider when rolling out Microsoft Office 365.
Litigation is a complicated game of claims and defenses, requiring the court’s attention on the merits. Requesting parties frequently attempt to distract the court with claims unrelated to the merits in an effort to take their eyes off the ball. Parties are seeking discovery of unrelated, overbroad information that courts have repeatedly found to be outside the bounds of what is permitted by the Federal Rules of Civil Procedure. Be prepared to blow the whistle.
A free service to in-house counsel developed by ACC, the ACC Data Steward Program (DSP) offers a standardized SaaS-based framework for assessing law firms’ data security protocols and scoring their ability to protect sensitive client information. The DSP provides a centralized repository to gather and validate the data security protocols of all outside counsel hired by a legal department. An optional ACC Accreditation of individual law firms is available.
This article explains how electronic signature laws and principles in the United States laid the foundation for the advent of remote online notarization.
In many states, notaries public can take advantage of electronic signature related technologies to remotely notarize documents. In this article, find out how remote online notarization (RON) helps businesses function safely and more efficiently.
Keep learning with an ACC-curated selection of resources on hot topics.
The ACC Records Management Program Maturity model provides a detailed maturity model for all aspects of an organization's records program. It seeks to gauge program effectiveness across a variety of program elements, taking a "big picture" view to increase program value.
This is a glossary of Information Governance terms.
In this Quick Overview, learn how to calibrate your organization's efforts to comply with the California Consumer Privacy Act (CCPA) in regards to data security, unstructured data, paper information, privacy maturity and more.
In this Quick Overview, the basic elements of the California Consumer Privacy Act (CCPA) are explained as well as practical steps that can be taken to comply with this new regulation.
In this Quick Overview, learn more about the guidelines, coverage, compliance responsibilities, and personal information qualifications present in the California Consumer Privacy Act (CCPA).
The California Consumer Privacy Act (CCPA) is intended to give consumers greater control on how their personal information is collected, managed and shared. Proposed regulations within this guideline are complex and have far-reaching impact on businesses and consumers alike. In this Quick Overview, draft regulations are explained so in-house counsel can educate and prepare their business and IT departments.
As digital transformation initiatives continue to drive the business world, legal departments are often woefully unprepared. However, there are measures that can be taken to lessen the blow.
How effectively in-house counsel can advise on risk-related issues and steer the business towards practical commercial risk mitigation solutions depends on our access to the C-suite.
The Schrems II decision invalidated the US/EU Privacy Shield program for data transfers, but a replacement has not yet been negotiated for US companies. Schrems II will impact US data transfers eventually, but in the meantime US companies can prepare for the changes.
Investors and the wider public are increasingly gravitating towards businesses that prioritize ESG credentials. This article is about the importance of data protection in this context and why it should not be overlooked.
Records management processes need to follow the “five second rule:” All record identification, classification, retention period research, storing, and tagging processes altogether cannot take longer than five seconds.
This site uses cookies to store information on your computer. Some are essential to make our site work properly; others help us improve the user experience.
By using the site, you consent to the placement of these cookies. For more information, read our cookies policy and our privacy policy.