legal-compliance

Legal and compliance expertise for corporate governance, contract analysis, regulatory compliance (SOX, GDPR, HIPAA), risk assessment, intellectual property, and litigation management. Use when reviewing contracts, ensuring compliance, or managing legal risk.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "legal-compliance" with this command: npx skills add travisjneuman/.claude/travisjneuman-claude-legal-compliance

Legal & Compliance Expert

Comprehensive legal frameworks for governance, contracts, regulatory compliance, and risk management.

Corporate Governance

Board Structure & Responsibilities

BOARD COMPOSITION:
- Independent directors (majority required for NYSE/NASDAQ)
- Lead independent director
- Committee structure
- Board diversity requirements
- Skills matrix

KEY COMMITTEES:
1. Audit Committee (all independent)
2. Compensation Committee (all independent)
3. Nominating/Governance Committee (all independent)
4. Risk Committee (financial institutions)

Fiduciary Duties

DutyDefinitionKey Considerations
Duty of CareAct with reasonable prudenceInformed decisions, due diligence
Duty of LoyaltyAct in corporation's best interestAvoid conflicts, corporate opportunity
Duty of Good FaithAct honestly and fairlyNo intentional harm, follow law
Duty of DisclosureFull and fair disclosureMaterial information, no omissions

Business Judgment Rule

PROTECTION REQUIREMENTS:
1. Decision made in good faith
2. No personal interest in outcome
3. Reasonably informed decision
4. Rational belief action is in company's best interest

ENHANCED SCRUTINY (Revlon Duties):
- Triggered in change of control
- Duty to maximize shareholder value
- Active market check required

Regulatory Compliance

Sarbanes-Oxley (SOX) Compliance

KEY SECTIONS:

Section 302: CEO/CFO Certifications
- Certify financial statements
- Certify disclosure controls
- Report control deficiencies

Section 404: Internal Control Assessment
- Management assessment required
- External auditor attestation (accelerated filers)
- Material weakness disclosure

Section 906: Criminal Penalties
- Criminal certification of financial reports
- Up to $5M fine / 20 years imprisonment

COMPLIANCE FRAMEWORK:
- COSO Internal Control Framework
- Documentation of key controls
- Testing program (design + operating effectiveness)
- Deficiency evaluation process
- Remediation tracking

GDPR Compliance

RequirementDescriptionPenalties
Lawful BasisConsent, contract, legitimate interestUp to 4% global revenue
Data Subject RightsAccess, rectification, erasure, portabilityUp to 4% global revenue
Data Protection OfficerRequired for large-scale processingAdministrative fines
Breach Notification72 hours to authority, without undue delay to subjectsUp to 4% global revenue
Privacy by DesignBuilt-in privacy controlsUp to 4% global revenue
Data Processing AgreementsRequired with all processorsUp to 2% global revenue

HIPAA Compliance

PRIVACY RULE:
- Protected Health Information (PHI) protections
- Minimum necessary standard
- Patient rights (access, amendment)
- Business Associate Agreements

SECURITY RULE:
- Administrative safeguards
- Physical safeguards
- Technical safeguards
- Risk assessment requirement

BREACH NOTIFICATION:
- Individual notice within 60 days
- HHS notification (>500 individuals: immediate)
- Media notification if >500 in state

PENALTIES:
Tier 1: Unaware - $100-$50,000/violation
Tier 2: Reasonable cause - $1,000-$50,000/violation
Tier 3: Willful neglect (corrected) - $10,000-$50,000/violation
Tier 4: Willful neglect (uncorrected) - $50,000/violation

Anti-Corruption (FCPA/UK Bribery Act)

FCPA ELEMENTS:
Anti-Bribery:
- No payments to foreign officials
- For purpose of obtaining business
- Includes third-party payments

Books & Records:
- Accurate books and records
- Internal controls over assets
- Applies to all issuers

UK BRIBERY ACT:
- Broader than FCPA
- Includes commercial bribery
- Facilitation payments prohibited
- Adequate procedures defense

COMPLIANCE PROGRAM:
- Risk assessment by geography/business
- Third-party due diligence
- Training program
- Gift and hospitality policy
- M&A due diligence
- Reporting mechanism
- Audit and monitoring

Contract Management

Contract Review Checklist

ESSENTIAL TERMS:
- [ ] Parties correctly identified
- [ ] Scope clearly defined
- [ ] Price/payment terms
- [ ] Term and termination rights
- [ ] Representations and warranties
- [ ] Limitation of liability
- [ ] Indemnification
- [ ] Insurance requirements
- [ ] Confidentiality
- [ ] IP ownership/license
- [ ] Governing law
- [ ] Dispute resolution
- [ ] Assignment restrictions
- [ ] Force majeure
- [ ] Notice provisions
- [ ] Entire agreement clause

Key Contract Provisions

ProvisionPurposeNegotiation Points
Limitation of LiabilityCap damages exposureDirect vs. consequential, cap amount
IndemnificationAllocate third-party riskScope, procedure, caps
IP OwnershipDefine ownershipWork product, background IP, licenses
ConfidentialityProtect informationDefinition, term, exceptions
TerminationExit rightsFor cause vs. convenience, notice period
WarrantiesQuality assuranceScope, disclaimers, remedies

Contract Risk Matrix

Risk LevelContract ValueApproval Level
Low< $100KDepartment manager
Medium$100K - $1MDirector/VP
High$1M - $10MSVP/EVP
Critical> $10MC-Suite/Board

Intellectual Property

IP Portfolio Management

PATENT STRATEGY:
- Freedom to operate analysis
- Competitive patent landscape
- Filing strategy (utility, design, provisional)
- Geographic coverage
- Prosecution management
- Licensing opportunities
- Enforcement program

TRADEMARK STRATEGY:
- Brand clearance searches
- Registration program
- Monitoring and enforcement
- Domain name portfolio
- Social media handles

TRADE SECRET PROGRAM:
- Identification and classification
- Protection measures (physical, technical, contractual)
- Need-to-know access
- Exit interview protocols

IP Due Diligence (M&A)

AreaReview Items
PatentsOwnership, encumbrances, validity, infringement claims
TrademarksRegistrations, common law rights, oppositions
CopyrightsWork for hire, assignments, licenses
Trade SecretsProtection measures, potential misappropriation
LicensesInbound/outbound, change of control provisions
LitigationPending/threatened, settlements

Litigation Management

Litigation Hold Process

TRIGGER EVENTS:
- Receipt of complaint or demand letter
- Reasonable anticipation of litigation
- Government investigation notice
- Internal investigation findings

HOLD PROCESS:
1. Issue litigation hold notice
2. Identify custodians and data sources
3. Suspend routine destruction
4. Interview key custodians
5. Collect and preserve documents
6. Monitor compliance
7. Update as needed
8. Release when appropriate

Litigation Budget Management

PhaseActivitiesCost Factors
Pre-litigationInvestigation, demand lettersLimited
PleadingsComplaint, answer, motionsModerate
DiscoveryDocument production, depositionsHighest
Pre-trialExpert reports, motionsHigh
TrialPreparation, testimonyVery High
AppealBriefing, oral argumentModerate

Settlement Analysis

SETTLEMENT VALUE FORMULA:
Expected Value = P(win) × Expected Recovery - Legal Costs

CONSIDERATIONS:
- Probability of liability
- Range of potential damages
- Litigation costs (both sides)
- Management distraction
- Reputational impact
- Precedent setting
- Insurance coverage
- Business relationship preservation

Risk Assessment Framework

Legal Risk Categories

CategoryExamplesImpact
RegulatoryEnforcement, fines, license revocationHigh
ContractualBreach, termination, damagesMedium-High
LitigationClass actions, IP disputes, employmentHigh
ComplianceSOX, FCPA, data privacyVery High
TransactionalM&A, JV, financingMedium
ReputationalPublic relations, brand damageHigh

Risk Assessment Matrix

PROBABILITY × IMPACT = RISK SCORE

         Impact
         Low   Medium   High
Prob
High     3      6        9
Medium   2      4        6
Low      1      2        3

RISK RESPONSE:
9: Immediate mitigation required
6: Active management plan
3-4: Monitor and review
1-2: Accept risk

Compliance Program Framework

Effective Compliance Program Elements (DOJ)

1. STANDARDS AND PROCEDURES
   - Code of conduct
   - Policies for risk areas
   - Clear and accessible

2. COMPLIANCE LEADERSHIP
   - Board oversight
   - Senior management commitment
   - Adequate resources

3. TRAINING AND COMMUNICATION
   - Risk-based training
   - Regular updates
   - Accessible channels

4. REPORTING MECHANISMS
   - Hotline/helpline
   - Non-retaliation policy
   - Investigation procedures

5. RISK ASSESSMENT
   - Regular assessment
   - Emerging risks
   - Control mapping

6. MONITORING AND AUDITING
   - Testing program
   - Third-party audits
   - Data analytics

7. INCENTIVES AND DISCIPLINE
   - Performance integration
   - Consistent enforcement
   - Root cause analysis

8. THIRD-PARTY MANAGEMENT
   - Due diligence
   - Contractual protections
   - Ongoing monitoring

9. CONTINUOUS IMPROVEMENT
   - Root cause analysis
   - Lessons learned
   - Program updates

Whistleblower Programs

SEC WHISTLEBLOWER PROGRAM:
- 10-30% of sanctions > $1M
- Anti-retaliation protections
- Confidentiality protections

DODD-FRANK PROTECTIONS:
- Broad retaliation prohibition
- Reinstatement, back pay, attorney's fees
- Two-year statute of limitations

INTERNAL REPORTING:
- Anonymous reporting option
- Clear escalation path
- Timely investigation
- Communication of outcomes

Data Privacy Framework

Privacy Program Components

ComponentDescription
GovernancePrivacy officer, steering committee, policies
Data InventoryWhat data, where, purpose, retention
Legal BasisConsent management, legitimate interest
Rights ManagementDSR process, verification, response
Vendor ManagementDPAs, assessments, monitoring
SecurityTechnical measures, breach response
TrainingRole-based, regular updates
AuditingCompliance testing, gap remediation

Data Classification

LevelDefinitionHandling
PublicApproved for public releaseStandard controls
InternalGeneral business informationAccess controls
ConfidentialSensitive business dataEncryption, access limits
RestrictedHighly sensitive (PII, PHI, etc.)Strict controls, audit

See Also

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Research

ui-research

No summary provided by upstream source.

Repository SourceNeeds Review
Research

research-presenter

No summary provided by upstream source.

Repository SourceNeeds Review
General

document-skills

No summary provided by upstream source.

Repository SourceNeeds Review
General

brand-identity

No summary provided by upstream source.

Repository SourceNeeds Review