Spelling suggestions: "subject:"compliance, internal 1nvestigation"" "subject:"compliance, internal anvestigation""
1 |
When compliance failsBergmann, Jens 09 March 2016 (has links)
No description available.
|
2 |
Compliance Elliance Journal09 March 2016 (has links)
CEJ is an open access e-journal that publishes engaging articles geared towards practitioners, scholars, and students in the compliance field. It offers a platform for compliance experts to share their innovative ideas with others who are interested or are already involved in the compliance industry.
|
3 |
Internal investigations and the evolving fate of privilegeDervan, Lucian E. January 2016 (has links)
In 1981, the United States Supreme Court delivered a landmark ruling in Upjohn Co. v. United States. The decision made clear that the protections afforded by the attorneyclient privilege apply to internal corporate investigations. This piece examines the fundamental tenets of Upjohn, discusses some recent challenges to the applicability of privilege
to materials gathered during internal investigations, and considers the manner in which the international nature of modern internal investigations adds complexity and uncertainty to the field.
|
4 |
Ambiguities in international internal investigationsPelz, Christian January 2016 (has links)
No description available.
|
5 |
Collecting evidence in internal investigations in the light of parallel criminal proceedingsSüße, Sascha, Püschel, Carolin January 2016 (has links)
No description available.
|
6 |
How to conduct e-mail reviews in Germany: practical guidance to avoiding fines, exclusion of evidence and other risksWybitul, Tim January 2016 (has links)
Information from business emails is often very important for investigating breaches of rules or for court proceedings. However, strict legal requirements apply to the analysis and inspection of emails. The following overview sets out these requirements and describes the risks resulting from failure to comply with them, while focusing primarily on more recent
court rulings. The article also shows how employers can effectively mitigate or avoid legal risks when monitoring emails. One of the main focuses of the overview is on recommended actions to take in practice and a checklist for preparing for and implementing access to business email accounts.
|
7 |
Compliance tech: tools for a modern compliance frameworkBues, Micha-Manuel January 2016 (has links)
No description available.
|
8 |
Editorial: ambiguous legal issues in internal investigations and auditsDeStefano, Michele, Schneider, Hendrik January 2016 (has links)
It gives us great pleasure to introduce you to our second edition of the Compliance Elliance Journal (CEJ).
|
Page generated in 0.1835 seconds