Law Practice Management

The Tennessee Bar Association has a variety of resources and practical information on law office management issues available to help members better serve clients and practice more efficiently and effectively.

Below you will find the Practice Management Advisor Pipes Feed, brought to you by the Law Office Technology & Management Section of the Tennessee Bar Association. "PMA Pipes" is an RSS newsfeed that was designed by the ABA's Legal Technology Resource Center. It combines posts from the blogs of Practice Management Advisors from across the United States, as well as the ABA's Site-tation blog, into one convenient location. The blogs brought to you by this feed include: Law Practice Matters, Reid My Blog, Law Practice Tips, Law Practice Advisor, The Last Word, Thoughtful Legal Management, and Compujurist, among others.

Practice Management Advisor Pipes Feed

[Oregon Law Practice Management] What Lawyers Can Learn from the Yahoo Email Hack
Yahoo, the second largest email service worldwide, reported a security breach last week which exposed personal information from sent email folders. The Associated Press reports: Yahoo Inc. said in a blog post on its breach that “The information sought in … Continue reading →
[Avoid a Claim] Prison sentence for fraudster who targeted lawyers in bad cheque scams
We were recently made aware of a September 2013 news release from the FBI, stating that a lawyer-targetting fraudster had pleaded guilty and received hefty fines and a prison sentence. Nice to see a victory in the struggle against online scams. The number of law enforcement agencies involved shows how international these scams are, and how much cooperation is required to bring the fraudsters to justice. Here is the text of the release: The United States Attorney’s Office for the Middle District...
[Law Practice Advisor] Practicing with Professionalism is No Longer Optional: New Admittees Must Attend Course within 18 Months of Admission
English: An exhaust plume surrounds the mobile launcher platform on Launch Pad 39A , Kennedy Space Center, Fla., as space shuttle Atlantis lifts off on the STS-132 mission on May 14. STS-132 is the 132nd shuttle flight, the 32nd for Atlantis and the 34th shuttle mission dedicated to International Space Station assembly and maintenance. (NASA) (Photo credit: Wikipedia) Did you just pass the bar exam? Congratulations! Now, then: I have some good news, and I have some bad news. Want the good news...
[Slaw: Dan Pinnington] Protecting Yourself From Cybercrime Dangers: Beware the Dangers of BYOD and the Family Computer
Cybercrime dangers are many, complex and ever-changing. Hardly a day goes by without another news report of a data breach or other cyber-related scam or theft. Cyber criminals have considerable resources and expertise, and can cause significant damage to their targets. Cyber criminals specifically target law firms as law firms regularly have funds in their trust accounts and client data that is often very valuable. This article, from the December 2013 issue of LAWPRO Magazine, reviews the...
[Avoid a Claim] Beware the “too quiet” file (and Rule 48)
If you are lucky enough to have a busy practice, you may welcome the brief respite you get when a legal matter goes temporarily dormant. There are three rules for taking advantage of these lulls, however: first, any such periods must in fact be brief and temporary; second, you must understand the reason for the pause (and inform the client of the reason); and third, you must be aware of how long of a pause in the action is too long. In other words, you can only allow files to go quiet if...
[PA Law Practice Management] Coaching for PA Lawyers to Improve Marketing and Other Skills
My first major step onto the coaching soapbox came in the form of an article entitled “Coaching to Improve Skills,”  which appeared in the December 3, 2007 issue of The Pennsylvania Bar News.  I wrote it because I was sick and tired of hearing attorneys say that if an attorney did not instinctively know how to market, they would never learn.  It’s just wrong. Most attorneys are not instinctively good at marketing.  However, marketing is very much a learned skill.  Any attorney...
[PA Law Practice Management] Twitter username worth $50k?
A very interesting article on CNET News caught my attention.  The headline “Coveted $50,000 Twitter username swiped in tale of woe” intrigued me on more than one level.  First, of course, are the security issues.  Definitely read the article, and track back to the blog post, to get an idea of how vulnerable your online accounts can be. Second, was the fact that a username could have such a value.  Maybe it’s time to start thinking creatively and reserving free account names...
[Avoid a Claim] Order a practicePRO Resources poster for your office
practicePRO has created a 20″ by 30″ poster which highlights all the risk and practice management resources we have to offer lawyers and law firms. We have sent copies to all the law libraries in Ontario, and still have a number left over to offer to Ontario firms. If you would like a copy sent to your firm, please email tim.lemieux@lawpro.ca ">tim.lemieux@lawpro.ca to request one. Click on the image below to see an enlarged version.
[Avoid a Claim] Real estate bad cheque scam using the names Kenneth Hang and John Adams
Two firms, one in Illinois and one in Florida, appear to have been targeted by a real estate deposit bad cheque scam by the purported Kenneth Hang. In this type of scam the fraudster pretends interest in a property (often contacting a realtor first)and sends a certified cheque or bank draft as a deposit or full payment that will be deposited in the lawyer’s trust account. Soon after, some reason will be given for backing out of the deal and the fraudster will ask for the deposit or payment back...
[Avoid a Claim] Cybercrime: Be Ready with an Incident Response Plan
Because a cybercrime attack can cause irreparable harm, law firms should be prepared to take action immediately. Being able to do this requires an Incident Response Plan (IRP). An effective IRP can put a firm in a position to effectively and efficiently manage a breach by protecting sensitive data, systems, and networks, and to quickly investigate the extent and source of the breach so that operations can be maintained or promptly restored. Many firms design IRPs so that they address...