Law Practice Management

The Tennessee Bar Association has a variety of resources and practical information on law office management issues available to help members better serve clients and practice more efficiently and effectively.

Below you will find the Practice Management Advisor Pipes Feed, brought to you by the Law Office Technology & Management Section of the Tennessee Bar Association. "PMA Pipes" is an RSS newsfeed that was designed by the ABA's Legal Technology Resource Center. It combines posts from the blogs of Practice Management Advisors from across the United States, as well as the ABA's Site-tation blog, into one convenient location. The blogs brought to you by this feed include: Law Practice Matters, Reid My Blog, Law Practice Tips, Law Practice Advisor, The Last Word, Thoughtful Legal Management, and Compujurist, among others.

Practice Management Advisor Pipes Feed

[Law Practice Advisor] Advanced Placement: How To Locate Your Law Practice
View image | gettyimages.com   Even in an increasingly cloud-based world, physical location still matters. The cloud itself, after all, is really just access to remote servers, hosted by someone, somewhere . . . hopefully not in North Korea. Most virtual practices, even, have a mostly local, decidedly not virtual client base, probably because most of us still prefer in-person communication, at at least some basic level — save for our interactions across Amazon Prime. That other...

Read Full Original Article:
http://masslomap.org/law-office-location/

[Avoid a Claim] Commercial debt collection scam using the names James Masaaki and Xinying Group Holdings
Firms in Georgia and Louisiana notified us that they received an email from the purported James Masaaki of Xinying Group Holdings looking to retain them with regards to a commercial debt collection. This is a classic bad cheque scam that presents as legal matter requiring the assistance of a lawyer. In this scam lawyers will be duped into wiring real funds from their trust accounts after depositing a fake cheque received as payment from the debtor (who is part of the fraud). See our Confirmed...
[Law Technology Today] Why You Want to Measure Lifetime Customer Value
In the last post I outlined the importance of measuring Client Acquisition Cost (CAC) and the necessity of including non-billable time at full value or opportunity cost. However, measuring CAC alone is not enough; it’s important to keep track of the customer long-term, otherwise known as the lifetime value (CLTV) of each client. This measurement is part of the simple set of Key Performance Indicators (KPIs) that will help you run your legal practice. $ CAC <  $ CLTV Spending more money to...
[PA Law Practice Management] Job opening – Law Firm Staff Accountant
MacElree Harvey, LTD, a mid-sized law firm based in West Chester, PA has an excellent opportunity available for a Staff Accountant. This position is responsible for supporting the CFO/COO to ensure accurate, appropriate, effective, and efficient operations in Finance and other areas of the Firm including general office administration duties. Responsibilities include: Assists in creating, implementing and maintaining budgets. Maintains cash flow projections to meet cash requirements. Assists...
[Avoid a Claim] Turning fraud emails into a Word Cloud
Lawyers forward a lot of emails they suspect are fraudulent to AvoidaClaim; nearly 300 a month, as detailed in our annual summary of fraud posts. We look at each one to see if the name or scenario is new and requires a new post on our blog. After a while, it sometimes feels like the same email text over and over. And it turns out, that’s largely the case. By compiling the text of several of the more recent fraud emails provided to us, we were able to create a “word cloud”,...
[Avoid a Claim] Commercial debt collection scam using the names Hiroaki Kimura and Sankyo & Co Ltd
An Oklahoma firm notified us that they received an email from the purported Hiroaki Kimura and Sankyo & Co Ltd looking to retain them with regards to a commercial debt collection. This is a classic bad cheque scam that presents as legal matter requiring the assistance of a lawyer. In this scam lawyers will be duped into wiring real funds from their trust accounts after depositing a fake cheque received as payment from the debtor (who is part of the fraud). See our Confirmed Fraud Page for...
[Law Technology Today] Data Breaches: War and Terrorism in Cyberspace
The phrase”data breach” now seems common, and looking at this infographic, data breaches are more common than we think. These days, we’re more inclined to wonder when we’ll be hacked, not if, and perhaps we wonder where, or what service we use, will be next. Then there is the issue or ransomware. Data breaches that are familiar, like the ones at Target, JP Morgan, and Home Depot, are usually organized by hackers working towards financial gain. All of that customer data...
[Avoid a Claim] Commercial debt collection scam using the names Liu Qiang and Xinying Group Holdings
An Ontario firm notified us that they received an email from the purported Liu Qiang of Xinying Group Holdings looking to retain them with regards to a commercial debt collection. This is a classic bad cheque scam that presents as legal matter requiring the assistance of a lawyer. In this scam lawyers will be duped into wiring real funds from their trust accounts after depositing a fake cheque received as payment from the debtor (who is part of the fraud). See our Confirmed Fraud Page for more...
[Avoid a Claim] Commercial debt collection scam using the names Susumo Katsuro and Eikoh Trading
Two Maryland firms notified us that they received an email from the purported Susumo Katsuro of Eikoh Trading looking to retain them with regards to a commercial debt collection. This is a classic bad cheque scam that presents as legal matter requiring the assistance of a lawyer. In this scam lawyers will be duped into wiring real funds from their trust accounts after depositing a fake cheque received as payment from the debtor (who is part of the fraud). See our Confirmed Fraud Page for more...
[Law Technology Today] How to Encrypt Data on Your Mac in a Few Simple Steps
Back by popular demand: Encryption! In 2013, I wrote an article for this blog on how to encrypt data using your Mac computer. Since then, I’ve given numerous presentations and spoken to many attorneys about data security and, in particular, using encryption as a means of protection. As attorneys rely more heavily on electronic communications and storage, encryption, as I see it, is far from going out of style. And, if the National Security Agency uses it to protect their “top secret...