Magazine Article
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Vol. 5): Unauthorized Use of Software, Etc."

Details

Civil Disputes:Publications

Book
"Legal Guidebook: Learn through Case Studies (Second Edition)"
Magazine Article
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Final): Non-Work-Related Criminal Acts"
Magazine Article
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Vol. 4): Trade Secret Infringement"
Magazine Article
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Vol. 2): Kickbacks"
Magazine Article
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Vol. 1): Issues Related to Employee Fraud"

View All

Crisis Management:Publications

Book
"Insider Trading (Second Edition)"
Magazine Article
"Business and Human Rights - Understanding the Essence of Initiatives from a Practical Perspective Part 2: Ryusuke Tanaka, ILO Japan Office"
Magazine Article
"Key Practical Points in Information Management, in the Form of Dialogue (3): Trade Secret Infringement Offenses and Secondary Offenses"
Magazine Article
"Common Misunderstandings and Key Points for Initiatives in Human Rights Due Diligence"
Magazine Article
"Business and Human Rights - Understanding the Essence of Initiatives from a Practical Perspective Part 1: Mizuno Corporation"

View All

Internal Investigations/Investigations by Committees:Publications

Magazine Article
"(Editorial) Whistleblower System Issues that Emerge from Investigation Reports"
Magazine Article
"Cross-Sector Cybersecurity Laws (Vol. 9): Cybersecurity and Crisis Management - Focusing on External Cyberattacks"
Magazine Article
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Final): Non-Work-Related Criminal Acts"
Book
"Practical Manual for Responding to Product Accidents and Corporate Scandals - From Preventive Measures and Initial Responses to Restoring Reliability Based on Actual Case Samples"
Magazine Article
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Vol. 4): Trade Secret Infringement"

View All

Employee Fraud (Embezzlement/Fraudulent Transactions, etc.):Publications

Book
"Insider Trading (Second Edition)"
Magazine Article
"Rules for Dinners and Gift-Giving Between Companies: Key Points for 'Gift Compliance'"
Magazine Article
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Final): Non-Work-Related Criminal Acts"
Magazine Article
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Vol. 4): Trade Secret Infringement"
Magazine Article
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Vol. 3): Improper Posts by Employees"

View All

Corporate Criminal Defense/White Collar Crime:Publications

Book
"Insider Trading (Second Edition)"
Magazine Article
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Final): Non-Work-Related Criminal Acts"
Magazine Article
"Overview and Key Points of the Revisions to the Anti-Espionage Law in China"
Magazine Article
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Vol. 4): Trade Secret Infringement"
Article
"Whistleblower Protection Act - Operational Key Points that are Likely to be Overlooked when Reading Provisions (Part 6): Operational Key Points Regarding Persons Engaged in Whistleblowing System Operations (6)"

View All

Trade Secrets/Information Leaks:Publications

Magazine Article
"Key Practical Points in Information Management, in the Form of Dialogue (3): Trade Secret Infringement Offenses and Secondary Offenses"
Magazine Article
"Key Practical Points in Information Management, in the Form of Dialogue (2): What are Trade Secrets? (1)"
Magazine Article
"Special Feature 1: Cybersecurity - Overview and Issues of Legislation on Cybersecurity"
Magazine Article
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Final): Non-Work-Related Criminal Acts"
Magazine Article
"Measures Against Taking out and Bringing in Trade Secrets"

View All

Cyber Security/Data Privacy:Publications

Magazine Article
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (5) Unauthorized Account Log-ins"
Magazine Article
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (4) Phishing Scams and Unlawful Cash Transfers"
Magazine Article
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (3) Information Divulgence by Internal Wrongdoing"
Magazine Article
“Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (2) Information Divulgence by Contractors”
Magazine Article
“Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (1) Ransomware Attacks”

View All

Litigation related to Corporate Misconduct:Publications

Magazine Article
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Final): Non-Work-Related Criminal Acts"
Magazine Article
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Vol. 1): Issues Related to Employee Fraud"
Article
"Whistleblower Protection Act - Operational Key Points that are Likely to be Overlooked when Reading Provisions (Part 6): Operational Key Points Regarding Persons Engaged in Whistleblowing System Operations (6)"
Article
"Whistleblower Protection Act - Operational Key Points that are Likely to be Overlooked when Reading Provisions (Part 5): Operational Key Points Regarding Persons Engaged in Whistleblowing System Operations (5)"
Article
"Whistleblower Protection Act - Operational Key Points that are Likely to be Overlooked when Reading Provisions (Part 4): Operational Key Points Regarding Persons Engaged in Whistleblowing System Operations (4)"

View All

Data Protection and Privacy:Publications

Magazine Article
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (5) Unauthorized Account Log-ins"
Magazine Article
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (4) Phishing Scams and Unlawful Cash Transfers"
Magazine Article
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (3) Information Divulgence by Internal Wrongdoing"
Magazine Article
“Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (2) Information Divulgence by Contractors”
Magazine Article
“Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (1) Ransomware Attacks”

View All

Cybersecurity:Publications

Magazine Article
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (5) Unauthorized Account Log-ins"
Magazine Article
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (4) Phishing Scams and Unlawful Cash Transfers"
Magazine Article
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (3) Information Divulgence by Internal Wrongdoing"
Magazine Article
“Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (2) Information Divulgence by Contractors”
Magazine Article
“Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (1) Ransomware Attacks”

View All

Jiro Kiyama:Publications

Magazine Article
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Final): Non-Work-Related Criminal Acts"
Magazine Article
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Vol. 4): Trade Secret Infringement"
Magazine Article
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Vol. 3): Improper Posts by Employees"
Magazine Article
"Current Status and Future Outlook of the Carbon Credit Market"
Magazine Article
"Approaches for Handling Employee Improprieties with an Eye Toward Pursuing Liability (Vol. 2): Kickbacks"

View All

Shun Watanabe:Publications

Magazine Article
"Reviewing and Handling Legal Issues When Using Cloud Services – Focusing on Issues under the Act on the Protection of Personal Information"
Book Article
"Legal and Tax Affairs in Business Successions and M&As for Family Businesses – Second edition"
Book
"Series on Practical Issues of Corporate Litigation: Software Litigation (2nd ed.)"
Book
"Practical Guidance on Financial Service Intermediary Business"
Magazine Article
"Q&A Systems and Practices of Financial Service Intermediary Businesses (Part 7): Analysis Based on Public Comments on Government Ordinances and Supervision Guidelines"

View All

Takashi Baba:Publications

Book
"Generative AI and Intellectual Property / Personal Information Q&A"
Magazine Article
"Contracts Created with Generative AI and Consumer Protection"

View All