Skip to main content

Ethics

Document Generation, Email Management, Ethics, Management, Productivity, Security, Wellness

Some Best Practices from Law Firm Associates

A recent Reddit thread posed the question “what are some examples of best practices you employ in your daily routine or have learned from more senior attorneys?”. The following is a summary of the responses, edited for repetition and some negative advice removed. In some cases, more senior attorneys submitted their thoughts. These are helpful suggestions whether you are a…

Ethics, Financial Management

New NC Ethics Opinions Related to Practice Management

Brian Oten and Peter Bolac provided their annual update on what is happening at the North Carolina State Bar during their recent Expert Series CLE.  In addition to topics such as legal deserts, changes to CLE rules, the new random audit selection process, and much more, they discussed two recently adopted ethics opinions related to billing and handling of aged…

Center For Practice Management, Document Generation, Ethics, Question of the Month

Documenting File Destruction

Are you documenting your file destruction based on record retention requirements? Depending on the number of variables there are several methods to make sure that you have the necessary information to verify what has been destroyed and when. How Long Do I Have to Keep Client Files? As is the case with so many things having to do with the…

Center For Practice Management, Ethics, Marketing, Social Media

Facebook Page Options for Law Firms and Lawyers

Facebook, the popular social media platform, has many options for businesses as well as individuals. If you or your firm has a Facebook presence, there are some options to consider about how you can leverage this platform effectively and ethically. Is It the Right Place to Be? A law firm Facebook page can help promote the firm’s work and connect…

Backup, Center For Practice Management, Ethics, Productivity, Security, Smartphones, Technology

Early Spring Cleaning for Your Technology

While we aren’t yet in meteorological spring, on the next chilly, rainy day while you are waiting for the last frost before you start your garden or outdoor activities, take some time do some technology “spring cleaning”. Whether optimizing your devices, adding some automation, or finally unsubscribing from all the unread emails, there are lots of things to do to…

Center For Practice Management, Cloud Computing, Ethics, Security, Smartphones

Redux: Is a Password Enough to Keep Your Sensitive Information Safe?

Are you using two factor/multi-factor authentication (2FA/MFA)? You should be! Passwords alone are not enough anymore to thwart motivated hackers from accessing your accounts. MFA adds strength to your passwords by using something you know (your username/password) and something you have. However, as we get more sophisticated so do the bad guys. What are today’s best practices? For the uninitiated,…

Center For Practice Management, Cloud Computing, Ethics, Security

Lessons from the LastPass Breach

LastPass, the popular password manager, has suffered a breach. If you are a LastPass user it is time to decide if you will stay or go. If you stay, what steps should you take to protect your LastPass vault? If you go, where to? What are best practices to consider when using password managers in the harsh light of breach…

Center For Practice Management, Ethics, Management, Productivity, Question of the Month

Tools to Monitor Texts with Clients

Many clients want to text with their attorneys, but firms may be wary for many reasons. However, there are ways to meet in the middle. Texting reminders of deadlines and appointments, directions, and other short messages may make it easier for clients to be responsive. Attorneys also want to keep a record of these texts, especially to monitor communication between…

Center For Practice Management, Ethics, Security

Testing and Training for Cybersecurity in Law Firms

What should firms be doing to increase their cybersecurity stance right away? What are some of the other ways firms can harden their defenses with PEN testing, zero knowledge architecture and the new FIDO passwordless protocols? How can you keep your team security aware? Join us for a conversation with Conor Egan, security consultant at 10X Consulting Group out of…

Backup, Center For Practice Management, Cloud Computing, Ethics, Security, Smartphones

Protecting Portable Devices

All firm-owned portable computing and storage devices used for firm business should be secured with encryption. Malpractice and cyber liability insurance applications are increasingly asking for information about how firms are securing data, including device encryption. If your firm works with clients in the financial or health-care sectors they may request an audit, or evidence of security protocols and standard…