Law Practice Management

The Tennessee Bar Association has a variety of resources and practical information on law office management issues available to help members better serve clients and practice more efficiently and effectively.

Below you will find the Practice Management Advisor Pipes Feed, brought to you by the Law Office Technology & Management Section of the Tennessee Bar Association. "PMA Pipes" is an RSS newsfeed that was designed by the ABA's Legal Technology Resource Center. It combines posts from the blogs of Practice Management Advisors from across the United States, as well as the ABA's Site-tation blog, into one convenient location. The blogs brought to you by this feed include: Law Practice Matters, Reid My Blog, Law Practice Tips, Law Practice Advisor, The Last Word, Thoughtful Legal Management, and Compujurist, among others.

Practice Management Advisor Pipes Feed

[Slaw: Dan Pinnington] How Simple Mistakes Can Lead to Large Claims
It’s easy to think that, at least in your office, a major claim couldn’t possibly happen. But LAWPRO’s experience shows that errors, innocent oversights and gaffes in any type of practice can lead to big problems. And if you or your firm don’t have adequate insurance in place to address the claim, you could be facing personal exposure. The number of LAWPRO claims with values that exceed $100,000 has risen sharply in recent years and often the mistakes that lead to such claims result from very...
[Law Technology Today] Bring it Together: Johnson & Vines, PLLC, American Injury Attorney Group
The final post on my entrepreneur-lawyer journey. Read parts one and two.  After the startup gut shot, I only had a year left in law school and coincidentally, my final clerkship that I had lined up was about to conclude. So, at the suggestion of my tech startup partner, I joined his search engine marketing company and we decided to focus on that business until our next idea came to us. This situation was ideal for me because I could make good money and continue to hone my computer skills, all...
[Law Practice Advisor] New Massachusetts Ethics Rules? When and What You Need to Know
Credit: Joseph Gilbert, Flickr.com In case you’re still digging yourself out of the snow, I thought I’d save you some time with an update on forthcoming changes to the Massachusetts Rules of Professional Conduct. If you haven’t been following along, take a look at Jared’s post providing a history of the Rule changes and highlights of the proposals. Here is where we are to-date: July 1, 2013 – SJC’s Standing Advisory Committee on the Rules of Professional Conduct publishes proposed...
[Avoid a Claim] Four digital security risks at law firms
Joyce Brafford, a Law Practice Management Advisor, reminds lawyers in this LinkedIn article that keeping client information confidential “goes beyond just locked filing cabinets.” She lists four areas in which law firms may not be doing enough to ensure security: passwords, security programs, segregation of data, and encryption. The increased cybersecurity steps she recommends are also covered in LAWPRO’s Cybercrime and Law Firms: The Risks and Dangers Are Real and Protecting...
[Law Technology Today] How Lawyers Will Modernize Their Firms in 2015
At the end of each year, MyCase conducts a survey of solo and small firm attorneys with an eye toward better understanding their priorities and challenges in the upcoming year. This year we asked them to share with us the steps they would be taking to modernize their firms in 2015. From the nearly 800 responses that we received, it was clear that many solo and small firm lawyers shared the same technology goals for their practices. Here are a few of our findings and you can learn more about the...
[Avoid a Claim] Giving Up Solo Practice for Firm Life
When lawyers decide to change the way they practice, it seems to be a more common story that they leave a big firm to strike out on their own, rather than the other way around. LAWPRO even has a questionnaire designed to help those considering sole practice. However, some lawyers do make the opposite change. Ruth Carter, writing in Attorney at Work, describes her very positive experience swapping solo life for a mid sized firm. There were some pretty clear advantages (admin staff, colleagues...
[Law Technology Today] From Law School to Clerking to Startup
Second in a series on my entrepreneur-lawyer journey. Read part one here.  After two years in finance, I began to realize that I was more interested in how my financial clients built and grew their businesses than how they planned to retire and wind down those businesses. That notion was compounded by the fact that the LSAT I took during my last year of undergrad was about to expire, so I decided to apply to UALR law school and attend part time. I never wanted to practice law, but rather...
[Thoughtful Legal Management] What Are You Going to Do in Your Retirement?
♫  Look at that sky, life’s begun Nights are warm and the days are young Come get up my baby Golden years, gold, whop whop whop Golden years, gold, whop whop whop…♫ Lyrics, Music and recorded by David Bowie. So many  articles on retirement all deal with the issue of finances and how to plan so you are not caught off guard on the money side.  Since that aspect has been explored in detail, this article is going to take us in a totally different direction. As lawyers, we get so much...
[Law Technology Today] 5 Steps to Safeguard Your Data from Cyber Threats
5 Steps to Safeguard Your Data from Cyber Threats Security breaches and data leaks will always be a huge concern for law firms and lawyers. Most often when we think of cyber threats our minds jump to external attacks. However, a recent study found that over 30% of all data breaches are caused by negligent employees. How can you ensure your firm’s data, programs and servers are safe from hackers, phising and emerging threats? Join us for 5 Steps to Safeguard Your Data from Cyber Threats to learn...
[Law Technology Today] The Sony Hack: You Can’t Keep the Barbarians Outside the Gate
In November of 2014, hackers infiltrated Sony’s computer network lifting terabytes of corporate data, human resources information, internal intel, films, corporate emails, and other valuable information. This led the corporate world to question how protected we really are from cyber attacks. In the 1990’s, the only computer issues were viruses, but the attack vectors have since changed. Companies and individuals are now subject to spear phishing, spyware attacks, malware, drive-by downloads,...