Law Practice Management

The Tennessee Bar Association has a variety of resources and practical information on law office management issues available to help members better serve clients and practice more efficiently and effectively.

Below you will find the Practice Management Advisor Pipes Feed, brought to you by the Law Office Technology & Management Section of the Tennessee Bar Association. "PMA Pipes" is an RSS newsfeed that was designed by the ABA's Legal Technology Resource Center. It combines posts from the blogs of Practice Management Advisors from across the United States, as well as the ABA's Site-tation blog, into one convenient location. The blogs brought to you by this feed include: Law Practice Matters, Reid My Blog, Law Practice Tips, Law Practice Advisor, The Last Word, Thoughtful Legal Management, and Compujurist, among others.

Practice Management Advisor Pipes Feed

[Avoid a Claim] Separation agreement scam using the name Miwa Gorou
Two Ontario firms notified us that they received an email from the purported Miwa Gorou looking to retain them with regards to a collecting overdue payments resulting from a separation agreement. This is a classic bad cheque scam that presents as legal matter requiring the assistance of a lawyer. In this scam lawyers will be duped into wiring real funds from their trust accounts after depositing a fake cheque received as payment from the debtor (who is part of the fraud). See our Confirmed...
[Avoid a Claim] Separation agreement scam using the name Kimberly Sarmiento
Two Ontario firms notified us that they received an email from the purported Kimberly Sarmiento looking to retain them with regards to a collecting overdue payments resulting from a separation agreement. This is a classic bad cheque scam that presents as legal matter requiring the assistance of a lawyer. In this scam lawyers will be duped into wiring real funds from their trust accounts after depositing a fake cheque received as payment from the debtor (who is part of the fraud). See our...
[Law Technology Today] 3 Steps to Producing Powerful Passwords
What do you do when that dreaded moment comes when you have to come up with another password? Maybe they are out there but I don’t know anyone who thinks coming up with passwords and remembering them is fun. On the one hand, if you use a password that is easy to remember it will likely be easy to hack (and probably won’t meet the password requirements). On the other hand, if you use a complicated password it will be difficult to remember. Let’s take a look at how you can easily balance these...
[Thoughtful Legal Management] Lawyers and Pricing – Part 2
♫ Keep moving, never stopping sharks Keep moving…♫ Music, lyrics and recorded by Further Seems Forever.   In the first column in this series we dealt with the issue that price is but one part of the 7 components of the legal marketing mix. Unfortunately many lawyers (and clients) tend to overly focus on price and not appreciate the other 6. The theme of this post will be to look at the product mix and the role that it plays in marketing (and pricing!) of legal services. One law...
[Law Practice Tips Blog] My Mother's Maiden Name was XK37B_PWRD!
David Pogue has a great post about all of the discussion of stolen celebrity nude photos - You’re Reacting to Celebgate Wrong. It is good reading for anyone since about everyone uses the cloud in some way today, intentionally or...
[Avoid a Claim] Hackers fast to take advantage of fears created by celebrity nude photo leak
This morning I got the following email, purportedly from Apple Support, telling me to take steps to update my Apple ID information: It is a text book example of a phishing scam – the very type of scam that was likely used for tricking some of the celebrities caught in the nude photo leak into disclosing their personal account login information to hackers. (see this Verge article for a detailed timeline and explanation on how the celebrity nude photo leak likely happened.) Wow – that didn’t...
[Slaw: Dan Pinnington] Hackers Fast to Take Advantage of Fears Created by Celebrity Nude Photo Leak
This morning I got the following email, purportedly from Apple Support, telling me to take steps to update my Apple ID information (click ‘more’ to expand this post and see the screenshot): It is a text book example of a phishing scam – the very type of scam that was likely used for tricking some of the celebrities caught in the nude photo leak into disclosing their personal account login information to hackers. (see this Verge article for a detailed timeline and explanation on...
[Law Technology Today] Modern Trends in Data Collection and Analysis
In this episode of Digital Detectives, Sharon Nelson and John Simek interview e-discovery solutions expert Aaron Lawlor about what is involved with ESI and data collection, current trends in data analysis, and future advances in technology and process. Lawlor urges every litigator to become experienced with the state and federal rules involving e-discovery in order to better serve their clients. He explains the process of research and documentation of key players in the case, and then...
[Avoid a Claim] Monthly fraud summary for August 2014
August was a somewhat quieter month for fraud reports, with many lawyers (and maybe some fraudsters) on holiday. However we still received 235 emailed reports and posted 13 new warnings. 64% of the emails this month came from the U.S., 23% from Ontario, 4% from elsewhere in Canada and 9% from overseas. Here is the latest that map showing where emails to ‘fraudinfo@lawpro.ca’ orginated. (click to enlarge) Here are the email fraud posts we did in June sorted by scenario: Commercial debt...
[Avoid a Claim] Commercial debt collection scam using the name John Peart
A California firm notified us that they received an email from the purported John Peart looking to looking to retain them with regards to a commercial debt collection. This is a classic bad cheque scam that presents as legal matter requiring the assistance of a lawyer. In this scam lawyers will be duped into wiring real funds from their trust accounts after depositing a fake cheque received as payment from the debtor (who is part of the fraud). See our Confirmed Fraud Page for more of an...