Law Practice Management

The Tennessee Bar Association has a variety of resources and practical information on law office management issues available to help members better serve clients and practice more efficiently and effectively.

Below you will find the Practice Management Advisor Pipes Feed, brought to you by the Law Office Technology & Management Section of the Tennessee Bar Association. "PMA Pipes" is an RSS newsfeed that was designed by the ABA's Legal Technology Resource Center. It combines posts from the blogs of Practice Management Advisors from across the United States, as well as the ABA's Site-tation blog, into one convenient location. The blogs brought to you by this feed include: Law Practice Matters, Reid My Blog, Law Practice Tips, Law Practice Advisor, The Last Word, Thoughtful Legal Management, and Compujurist, among others.

Practice Management Advisor Pipes Feed

[Oregon Law Practice Management] Rules of the Road for Sharing Fees
Lawyers who are not members of the same firm may only divide fees under Oregon RPC 1.5(d) if the client gives informed consent and the total fee of the lawyers for all services is not clearly excessive. Sound easy?  It is … Continue reading →
[Law Practice Advisor] 99 Passwords, But It Isn’t One: Managing Applications Access
English: The door to the walk-in vault in the Winona Savings Bank in Winona, Minnesota, United States (Photo credit: Wikipedia) The chief difficulty in having so many programs and applications that we use in our work and personal lives is that we wish to secure much of data we put online — or, if not the data, certainly the accounts which we use to post the data: privately, publicly or semi-publicly. In sum: that’s a lot of passwords to memorize, assuming they’re all different, which...

Read Full Original Article:
http://masslomap.org/99passwords/

[Law Technology Today] Quick Hits Friday: PowerPoint Presentations on the iPad, Google Hangouts
With ABA TECHSHOW next week, Conference Season is here! The wonderful season for added networking, learning and, yes, giving PowerPoint presentations. Since the iPad, however, the experience of presenting has changed. No longer are presenters tied to the stage, tied to a podium or even tied just to using PowerPoint. As speaking veteran Paul Unger points out in the opening of the first of a two-part series, speakers using iPads  are free to move about the stage, or the court room, and engage in...
[Avoid a Claim] Cybersecurity tip: The ‘S’ in https means you are on a safe and secure connection
When logging in on any website, you should always check for a secure connection by checking to see if the web address begins with https://…, as opposed to http://… Look for the “s” which signals that your connection to the website is encrypted and more resistant to snooping or tampering.
[Avoid a Claim] Separation agreement scam using the name Angela Richardson
An Ontario firm notified us that they received an email from the purported Angela Richardson looking to retain them with regards to a collecting overdue payments resulting from a separation agreement. This is a classic bad cheque scam that presents as legal matter requiring the assistance of a lawyer. In this scam lawyers will be duped into wiring real funds from their trust accounts after depositing a fake cheque received as payment from the debtor (who is part of the fraud). See our Confirmed...
[Law Technology Today] Calling All iPad Users at ABA TECHSHOW: Don’t Miss this Special Event
Coming to Chicago for ABA TECHSHOW 2014 next week? Learn helpful iPad tips and network with other legal professionals on the Mag Mile the night before the conference opens! ABA Law Practice Division author and iPad expert Tom Mighell will be speaking at the Apple Store on Michigan Avenue on Wednesday, March 26 at 6:00pm. Don’t miss this excellent program about how lawyers can use their iPads at work to save time and simplify their tasks. The event is free, but advance registration is...
[Avoid a Claim] Cybercrime: Know your malware!
Malware is classified by how it propagates itself or what it does. The names and a brief description of the common types of malware appear below: Viruses: Viruses are one of the most common types of malware. Like their biological namesakes, computer viruses propagate by making copies of themselves. When an infected program runs, the virus will attempt to replicate itself by copying itself into other programs, usually while completing the malicious actions it is designed to do. Viruses often...
[Avoid a Claim] Commercial debt collection scam using the names Kosuke Yamato
Two Ontario firms notified us that they received an email from the purported Kosuke Yamato looking to retain them with regards to a commercial debt collection. This is a classic bad cheque scam that presents as legal matter requiring the assistance of a lawyer. In this scam lawyers will be duped into wiring real funds from their trust accounts after depositing a fake cheque received as payment from the debtor (who is part of the fraud). See our Confirmed Fraud Page for more of an explanation of...
[Avoid a Claim] Commercial debt collection scam using the names Billy Woodley and Ace Vision Ltd
A New York firm notified us that they received an email from the purported Billy Woodley of Ace Vision Ltd looking to retain them with regards to a commercial debt collection. This is a classic bad cheque scam that presents as legal matter requiring the assistance of a lawyer. In this scam lawyers will be duped into wiring real funds from their trust accounts after depositing a fake cheque received as payment from the debtor (who is part of the fraud). See our Confirmed Fraud Page for more of...
[Law Technology Today] Video: Beyond the Buzzwords – Applying Technology to Your Litigation Workflow
When looking into e-discovery, you can quickly end up lost in a sea of buzzwords. Watch this webinar from the Legal Technology Resource Center, sponsored by LexisNexis to gain an understanding and learn how to efficiently apply the right technology to your litigation workflow. Thank You to Our Sponsor! The post Video: Beyond the Buzzwords – Applying Technology to Your Litigation Workflow appeared first on Law Technology Today.