Law Practice Management

The Tennessee Bar Association has a variety of resources and practical information on law office management issues available to help members better serve clients and practice more efficiently and effectively.

Below you will find the Practice Management Advisor Pipes Feed, brought to you by the Law Office Technology & Management Section of the Tennessee Bar Association. "PMA Pipes" is an RSS newsfeed that was designed by the ABA's Legal Technology Resource Center. It combines posts from the blogs of Practice Management Advisors from across the United States, as well as the ABA's Site-tation blog, into one convenient location. The blogs brought to you by this feed include: Law Practice Matters, Reid My Blog, Law Practice Tips, Law Practice Advisor, The Last Word, Thoughtful Legal Management, and Compujurist, among others.

Practice Management Advisor Pipes Feed

[Law Practice Management & Technology - Chicago Bar] Layering Security: Two Factor Authentication
“In the space of one hour, my entire digital life was destroyed. First my Google account was taken over, then deleted. Next my Twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, my AppleID account was broken into, and my hackers used it to remotely erase all of the data on my iPhone, iPad, and MacBook.” Thus starts the story of Mat Honan, a writer for Wired Magazine. Mat’s story should be a cautionary tale for...
[Law Technology Today] Tech E-book Roundup, Part 2
Last week, we reviewed some of LPM’s latest tech e-books. Here are a few more titles you should consider for your e-reader or iPad collection. LPM e-books are available on the ABA Webstore (for reading on all your devices and readers) and the iBookstore or iTunes (for Apple devices).  Download these titles today to enhance your understanding of tech security, Microsoft Office, and more.   Locked Down: Information Security for Lawyers In an age where lawyers frequently conduct...
[PA Law Practice Management] Supply and Demand
Supply and demand.  Buyer’s vs Seller’s market.  These fundamental economic concepts are learned early. Where’s the legal industry now?  Where is it headed?  We know that we headed into a Buyer’s market long before the economic downturn.  As we entered the new century, we encountered increasing numbers of client RFPs which boldly laid out the new terms of engagement.  We endured beauty contests.  We submitted to electronic billing and auditing.  We modified billing...
[Thoughtful Legal Management] Consider the Little Ones
♫ Now’s the time that we need to share So find yourself, we’re on our way back home… ♫ Lyrics and music by: Rick Davies and Roger Hodgson; recorded by Supertramp.   Lauren Bilinsky's Team in Training Campaign   At the present time, there are large corporate fund raising events going on to benefit large united charitable institutions and programs.  These fundraising programs have large and well-organized marketing and corporate donation programs and volunteer events...
[Law Technology Today] Encryption: A Guide for Lawyers
Attorneys have an obligation to protect their client’s data from unauthorized access, and there are few methods of protection more effective than encryption. When communicating over the Internet on wired/wireless networks, or on multiple devices, you risk losing valuable information to unwanted guests. Not protecting your data is dangerous, and while encryption sounds complicated, it’s an easy solution that will protect your law practice for years to come. Get simple overview of encryption, how...
[Avoid a Claim] Employee injury settlement agreement scam by Justine Rivers
Two lawyers in California have notified us that they’ve been contacted by the purported Justine Rivers with regards to an employee injury settlement scam. In this type of fraud the lawyer is retained to help collect on an employee injury settlement. The fraudster will claim that they are overseas, but the employer is in their jurisdiction. For details on how this fraud works and to see other names associated with it, see our Confirmed Fraud page. Here is the initial email: From: Justine...
[Oregon Law Practice Management] Data Breach Coverage for Law Firms
In the October 2012 issue of In Brief , the Professional Liability Fund (PLF) announced the addition of data breach and cyber liability coverage for law firms covered by the PLF Claims Made Excess Plan beginning January 1, 2013.  Here is the announcement: The number of businesses suffering data breach losses has been increasing in [...]
[Slaw: Dan Pinnington] What Keeps Family Law Lawyers Up at Night?
Like many areas of practice, family law is going through a period of change. Both clients and their lawyers are questioning traditional modes of practice. Economic woes both cause legal problems, and leave clients with limited resources with which to resolve them. Stress – for both families in crisis and for their lawyers – is a constant reality. Still, within this challenging climate, family lawyers are expected to work diligently and professionally in the service of their clients’ interests....
[Avoid a Claim] Commercial debt collection scam by Shigehiko Hirota of Leader Electronics Corp
Two lawyers in Ontario and one in North Carolina have notified us that they have received an email from the purported Shigehiko Hirota of Leader Electronics Corp with regards to a commercial debt litigation scam. For examples of other names attached to this kind of fraud see our Confirmed Fraud Page. For an explanation of how this fraud works see our Fraud Fact Sheet. Here is the initial email: From: Shigehiko Hirota [mailto:hirotashigehiko@yahoo.com.hk] Sent: Monday, November 12, 2012 6:08 PM...
[Law Technology Today] Tech Mysteries: Why Can’t My Smartphone Keep a Charge?
Using your smartphone heavily for either voice or data functions will obviously drain the battery, and over time batteries can gradually deteriorate, but why do new smartphones sometimes lose their charge even when they aren’t being actively used? The answer, usually, is that some quiet but resource-intensive function is running in the background even when the phone is buried in your pocket. The most common process is retrieving email. If you have “push” email enabled, your smartphone will...