Magazine Article
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Final): Non-Work-Related Criminal Acts"

Details

Civil Disputes:Publications

Book
"Legal Guidebook: Learn through Case Studies (Second Edition)"
Magazine Article
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Vol. 5): Unauthorized Use of Software, Etc."
Magazine Article
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Vol. 4): Trade Secret Infringement"
Magazine Article
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Vol. 2): Kickbacks"
Magazine Article
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Vol. 1): Issues Related to Employee Fraud"

View All

Crisis Management:Publications

Book
"Insider Trading (Second Edition)"
Magazine Article
"Business and Human Rights - Understanding the Essence of Initiatives from a Practical Perspective Part 2: Ryusuke Tanaka, ILO Japan Office"
Magazine Article
"Key Practical Points in Information Management, in the Form of Dialogue (3): Trade Secret Infringement Offenses and Secondary Offenses"
Magazine Article
"Common Misunderstandings and Key Points for Initiatives in Human Rights Due Diligence"
Magazine Article
"Business and Human Rights - Understanding the Essence of Initiatives from a Practical Perspective Part 1: Mizuno Corporation"

View All

Internal Investigations/Investigations by Committees:Publications

Magazine Article
"(Editorial) Whistleblower System Issues that Emerge from Investigation Reports"
Magazine Article
"Cross-Sector Cybersecurity Laws (Vol. 9): Cybersecurity and Crisis Management - Focusing on External Cyberattacks"
Book
"Practical Manual for Responding to Product Accidents and Corporate Scandals - From Preventive Measures and Initial Responses to Restoring Reliability Based on Actual Case Samples"
Magazine Article
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Vol. 5): Unauthorized Use of Software, Etc."
Magazine Article
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Vol. 4): Trade Secret Infringement"

View All

Employee Fraud (Embezzlement/Fraudulent Transactions, etc.):Publications

Book
"Insider Trading (Second Edition)"
Magazine Article
"Rules for Dinners and Gift-Giving Between Companies: Key Points for 'Gift Compliance'"
Magazine Article
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Vol. 5): Unauthorized Use of Software, Etc."
Magazine Article
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Vol. 4): Trade Secret Infringement"
Magazine Article
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Vol. 3): Improper Posts by Employees"

View All

Corporate Criminal Defense/White Collar Crime:Publications

Book
"Insider Trading (Second Edition)"
Magazine Article
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Vol. 5): Unauthorized Use of Software, Etc."
Magazine Article
"Overview and Key Points of the Revisions to the Anti-Espionage Law in China"
Magazine Article
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Vol. 4): Trade Secret Infringement"
Article
"Whistleblower Protection Act - Operational Key Points that are Likely to be Overlooked when Reading Provisions (Part 6): Operational Key Points Regarding Persons Engaged in Whistleblowing System Operations (6)"

View All

Trade Secrets/Information Leaks:Publications

Magazine Article
"Key Practical Points in Information Management, in the Form of Dialogue (3): Trade Secret Infringement Offenses and Secondary Offenses"
Magazine Article
"Key Practical Points in Information Management, in the Form of Dialogue (2): What are Trade Secrets? (1)"
Magazine Article
"Special Feature 1: Cybersecurity - Overview and Issues of Legislation on Cybersecurity"
Magazine Article
"Measures Against Taking out and Bringing in Trade Secrets"
Magazine Article
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Vol. 5): Unauthorized Use of Software, Etc."

View All

Cyber Security/Data Privacy:Publications

Magazine Article
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (5) Unauthorized Account Log-ins"
Magazine Article
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (4) Phishing Scams and Unlawful Cash Transfers"
Magazine Article
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (3) Information Divulgence by Internal Wrongdoing"
Magazine Article
“Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (2) Information Divulgence by Contractors”
Magazine Article
“Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (1) Ransomware Attacks”

View All

Litigation related to Corporate Misconduct:Publications

Magazine Article
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Vol. 5): Unauthorized Use of Software, Etc."
Magazine Article
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Vol. 1): Issues Related to Employee Fraud"
Article
"Whistleblower Protection Act - Operational Key Points that are Likely to be Overlooked when Reading Provisions (Part 6): Operational Key Points Regarding Persons Engaged in Whistleblowing System Operations (6)"
Article
"Whistleblower Protection Act - Operational Key Points that are Likely to be Overlooked when Reading Provisions (Part 5): Operational Key Points Regarding Persons Engaged in Whistleblowing System Operations (5)"
Article
"Whistleblower Protection Act - Operational Key Points that are Likely to be Overlooked when Reading Provisions (Part 4): Operational Key Points Regarding Persons Engaged in Whistleblowing System Operations (4)"

View All

Data Protection and Privacy:Publications

Magazine Article
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (5) Unauthorized Account Log-ins"
Magazine Article
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (4) Phishing Scams and Unlawful Cash Transfers"
Magazine Article
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (3) Information Divulgence by Internal Wrongdoing"
Magazine Article
“Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (2) Information Divulgence by Contractors”
Magazine Article
“Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (1) Ransomware Attacks”

View All

Cybersecurity:Publications

Magazine Article
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (5) Unauthorized Account Log-ins"
Magazine Article
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (4) Phishing Scams and Unlawful Cash Transfers"
Magazine Article
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (3) Information Divulgence by Internal Wrongdoing"
Magazine Article
“Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (2) Information Divulgence by Contractors”
Magazine Article
“Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (1) Ransomware Attacks”

View All

Jiro Kiyama:Publications

Magazine Article
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Vol. 5): Unauthorized Use of Software, Etc."
Magazine Article
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Vol. 4): Trade Secret Infringement"
Magazine Article
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Vol. 3): Improper Posts by Employees"
Magazine Article
"Current Status and Future Outlook of the Carbon Credit Market"
Magazine Article
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Vol. 2): Kickbacks"

View All

Ryoko Akizuki:Publications

Book
"JVCA Compliance Handbook for members of Japan Venture Capital Association”
Book Other
"Basics of Restructuring Employment and Human Resources - How to Properly Reduce Personnel Expenses and Workforce"

View All

Hiroki Kuwahara:Publications

Book
"Annual Summary of Labor-Related Court Decisions and Orders (2024 Edition)"
Book
"Generative AI and Intellectual Property / Personal Information Q&A"
Book
"Annual Summary of Labor-Related Court Decisions and Orders (2023 Edition)"
Book Article
"Q&A Legal, Labor, and Tax Guidebook for Cross-border Work"

View All