• Vinayak Kohli
    Vinayak Kohli
    • over 7 years ago
    • Practical Guidance Journal
    • pa

    What Companies Need to Know about Protecting Confidential Information under the New ACC Guidelines

    By: Stephen E. Reynolds and Nicole R. Woods ICE MILLER LLP In response to the increased concern surrounding cybersecurity, the Association of Corporate Counsel (ACC) has released the Model Information Protection and Security Controls for Outside Counsel...
  • Vinayak Kohli
    Vinayak Kohli
    • over 8 years ago
    • Practical Guidance Journal
    • pa

    Drafting Privacy Policies

    By: Elizabeth C. Rogers , Greenberg Traurig, LLP.                  While there is no universal legal requirement that every company have a published privacy policy, consumers have become increasingly sensitized...
  • Vinayak Kohli
    Vinayak Kohli
    • over 8 years ago
    • Practical Guidance Journal
    • pa

    A Look into Digital Media’s Influence on Brand Identity and Intellectual Property Rights

    Q&A with Po Yi , Partner at Venable LLP. Please provide some general background on the types of transactional work you do currently. I counsel and work with clients on the front end of their marketing activities. My practice focuses on business...
  • Vinayak Kohli
    Vinayak Kohli
    • over 7 years ago
    • Practical Guidance Journal
    • pa

    Cyber Risks in the Workplace: Guidance for Employers on Managing Insider Threats

    By: Lindsay Burke and Moriah Daugherty Covington & Burling LLP Today, among the most critical risks a company can face are the cyber risks associated with its own employees or contractors. Companies are confronting an increasingly complex series...
  • Vinayak Kohli
    Vinayak Kohli
    • over 8 years ago
    • Practical Guidance Journal
    • pa

    Planning & Managing a Data Breach

    By: Elizabeth C. Rogers , Greenberg Traurig, LLP. A data breach occurs when sensitive, protected, and/or confidential information is stolen, accessed, or used without authorization. The information may include an individual’s personally identifiable...
<>