Spelling suggestions: "subject:"interne nachuntersuchungen"" "subject:"interne erstuntersuchungen""
1 |
Compliance Elliance Journal - 2016,109 March 2016 (has links) (PDF)
CEJ is an open access e-journal that publishes engaging articles geared towards practitioners, scholars, and students in the compliance field. It offers a platform for compliance experts to share their innovative ideas with others who are interested or are already involved in the compliance industry.
|
2 |
When compliance failsBergmann, Jens 09 March 2016 (has links) (PDF)
No description available.
|
3 |
Internal investigations and the evolving fate of privilegeDervan, Lucian E. 09 March 2016 (has links) (PDF)
In 1981, the United States Supreme Court delivered a landmark ruling in Upjohn Co. v. United States. The decision made clear that the protections afforded by the attorneyclient privilege apply to internal corporate investigations. This piece examines the fundamental tenets of Upjohn, discusses some recent challenges to the applicability of privilege
to materials gathered during internal investigations, and considers the manner in which the international nature of modern internal investigations adds complexity and uncertainty to the field.
|
4 |
Ambiguities in international internal investigationsPelz, Christian 09 March 2016 (has links) (PDF)
No description available.
|
5 |
Collecting evidence in internal investigations in the light of parallel criminal proceedingsSüße, Sascha, Püschel, Carolin 09 March 2016 (has links) (PDF)
No description available.
|
6 |
How to conduct e-mail reviews in GermanyWybitul, Tim 09 March 2016 (has links) (PDF)
Information from business emails is often very important for investigating breaches of rules or for court proceedings. However, strict legal requirements apply to the analysis and inspection of emails. The following overview sets out these requirements and describes the risks resulting from failure to comply with them, while focusing primarily on more recent
court rulings. The article also shows how employers can effectively mitigate or avoid legal risks when monitoring emails. One of the main focuses of the overview is on recommended actions to take in practice and a checklist for preparing for and implementing access to business email accounts.
|
7 |
Compliance techBues, Micha-Manuel 09 March 2016 (has links) (PDF)
No description available.
|
8 |
EditorialDeStefano, Michele, Schneider, Hendrik 10 March 2016 (has links) (PDF)
It gives us great pleasure to introduce you to our second edition of the Compliance Elliance Journal (CEJ).
|
9 |
When compliance failsBergmann, Jens 09 March 2016 (has links)
No description available.
|
10 |
Compliance Elliance Journal09 March 2016 (has links)
CEJ is an open access e-journal that publishes engaging articles geared towards practitioners, scholars, and students in the compliance field. It offers a platform for compliance experts to share their innovative ideas with others who are interested or are already involved in the compliance industry.
|
Page generated in 0.094 seconds