Law Practice Management

The Tennessee Bar Association has a variety of resources and practical information on law office management issues available to help members better serve clients and practice more efficiently and effectively.

Below you will find the Practice Management Advisor Pipes Feed, brought to you by the Law Office Technology & Management Section of the Tennessee Bar Association. "PMA Pipes" is an RSS newsfeed that was designed by the ABA's Legal Technology Resource Center. It combines posts from the blogs of Practice Management Advisors from across the United States, as well as the ABA's Site-tation blog, into one convenient location. The blogs brought to you by this feed include: Law Practice Matters, Reid My Blog, Law Practice Tips, Law Practice Advisor, The Last Word, Thoughtful Legal Management, and Compujurist, among others.

Practice Management Advisor Pipes Feed

[Law Practice Management & Technology - Chicago Bar] Asana vs. Trello: Checklist Collaboration Tools Compared
My new article in Attorney at Work: Asana vs. Trello: Checklist Collaboration Tools Compared In his book The Checklist Manifesto, surgeon Atul Gawande asserts that checklists are a “cognitive net,” a mechanism that can help prevent experienced people from making errors due to flawed memory and attention, and ensure that teams work together. Or, as Steven Levitt of Freakonomics fame put it, “the [...]
[Avoid a Claim] Separation agreement scam by Heather Kobayashi Brogren
A lawyer in Ontario and one in California have notified us that they’ve been contacted by the purported Heather Kobayashi Brogren with regards to a to a collaborative family law agreement dispute. This is a fraud we have seen before under several other names and similar scenarios. For details on how this fraud works and a full list of names attached to it see our Confirmed Fraud page. Here is the initial email: From: Heather Kobayashi Brogren Subject: Good Morning Date: October 8, 2012 2:39:27...
[Slaw: Dan Pinnington] Social Media Security Basics [Infographic]
We all should do more to protect our social media accounts from being compromised. On an almost daily basis you hear about a celebrity that has had their account or smartphone hacked – and no doubt – there are thousands of otherwise anonymous non-celebrities that suffer the same fate each and every day. So what can you do to protect yourself? Yes, a stronger password is a start, but there is a lot more you can do. A ReadWriteWeb post I came across today has a fantastic infographic that...
[Oregon Law Practice Management] 15 Steps You Can Take Now to Protect Sensitive Data
The October issue of the Oregon State Bar Bulletin contains a must-read article entitled The Data Dilemma: Law Firms Strive to Strengthen E-Security as Potential Threats Continue to Rise.  To understand why you should be concerned, read the article.  To take steps now to protect your firm, read John Simek and Sharon Nelson’s sidebar, “E-Security Pros [...]
[Compujurist] Gizmos, Gadgets and Widgets
Gizmos, Gadgets 7 Widgets is one of my favorite presentations, especially when I get a chance to present it with a great friend and speaker like Bryan Sims, at the 2012 Illinois Solo & Small Firm Conference in September 2012. In this fast-paced conference favorite, Bryan and I share a look at the lighter side of technology, tips and gadgets for your law office and your life. I'ts a fast and furious presentation in person, but even the slides are fun and useful.
[Oregon Law Practice Management] 2012 Oregon House of Delegates – What is at Stake?
The 2012 meeting of the Oregon State Bar House of Delegates is scheduled for November 2, 2012.  The deadline for submitting resolutions has passed, but all bar members are welcome to attend the meeting and participate.  Only delegates may vote, but if you feel strongly about a particular resolution, make your views known to your [...]
[Law Practice Management & Technology - Chicago Bar] Five Steps for Added Security
My new article in “Five Steps for Added Security“: Most lawyers and law firms know what they should be doing to maintain a secure computing environment in order to comply with ethics rules regarding confidentiality, as well as data breach notification laws. This list includes maintaining firewalls and up-to-date anti-virus and anti-malware, maintaining vigilance [...]
[Law Practice Advisor] Communication Breakdown: The Two Things You Can Do on Twitter
This week’s Massachusetts Bar Association Lawyers E-Journal Law Practice Management Section Featured Practice Tip comes from LOMAP. In this week’s tip, we’re relaying an effective double-barreled technique for engaging on Twitter. Read the Tip here.
[Avoid a Claim] Scam emails threatening Ontario lawyers
Four Ontario lawyers have reported to us that they have received emails claiming to be from a person hired by a disgruntled convict to “eliminate” them for their firm’s part in having them convicted of some crime. The message offers to spare the lawyer in return for payment. These emails are a lawyer-specific variant of an email scam that appears from time to time, in which the recipient is told that a hit has been taken out on them by someone anonymous that they’ve...
[Law Technology Today] Coming soon from LPM Publishing: “Blogging in One Hour for Lawyers”
LPM will publish Blogging in One Hour for Lawyers by Ernie Svenson later this month! Pre-order your copy with a 15% discount today. Until a few years ago, only the largest firms could afford to engage an audience of millions. Now, lawyers in any size firm can reach a global audience at little to no cost–all because of blogs. An effective blog can help you promote your practice, become more “findable” online, and take charge of how you are perceived by clients, journalists and...