24May, 2018

2018 Tax Reform Essentials for Lawyers [Guest Post]

Tax reform made effective January 1, 2018 brought big changes to the system. Find out how your work and income as a lawyer fits with these provisions until they expire in 2025.
We thank Brad M. Capland, CPA for writing and contributing this post. Brad is a Certified Public Accountant and a Registered Representative (series 7 and 66 […]

3May, 2018

Technology Competence for Lawyers: Ethical Duties in Two Rules

Lawyers are required to demonstrate competence with technology. Here’s the latest publication from the Massachusetts BBO and our best tips to help you to use tech right and stay ethically compliant.
The Massachusetts SJC created new ethical obligations for lawyers on July 1, 2015 in its amendments to Rules 1.1 and 1.6, bringing relevant parts current […]

27April, 2018

Quick Tips for Lawyers to Beat Stress, Build Happiness, and Boost Productivity [Webinar]

In this edition of Webinars for Busy Lawyers, Anne Brafford will show you where to shift your focus to feel better and work better – in 30 minutes or less.
On May 30th at 12pm (eastern), Anne Brafford will present
Quick Tips to Beat Stress, Build Happiness, and Boost Productivity
How often do you experience stress without […]

11April, 2018

How to Use Evernote as a Law Practice Tool

Data Overload is real for almost everyone in 2018, but lawyers have exceptionally high ethical standards on their ability to manage it. Tool Option Overload is real too, so get control now with this practical approach to Evernote.
Attorneys are bombarded from every direction, many times with competing demands from clients, colleagues, staff, and family. If […]

21March, 2018

Best Practices for Law Firm Data Security and Client File Privacy [Guest Post]

Data security is critical for lawyers. Here’s how to start managing this risk as proactively as your clients and ethics standards deserve.
We thank the team at Lawyerist.com for this helpful guest post. Before jumping into this practical primer, check out the extensive writing on data security Heidi has published here on our blog, and plan […]

7February, 2018

Standing Firm Against Harassment: Policy Guidelines for Law Firms

Law firms should take – and understand – these 5 minimum steps to effectively address sexual harassment.
This article was written collaboratively by Heidi S. Alexander, Justin L. Kelsey and Melissa Levine-Piro and was originally published in the November/December edition of the Massachusetts Bar Association’s Massachusetts Lawyers Journal.

Before reading these guidelines, please consider participating in the […]

2February, 2018

Law Practice Startup: Operations Best Practices for Solo and Small Firms

To operate a sustainable law practice, you have to do more than practice law well. You have to run your practice like a business – and do that well, too. Our Best Practices for Solo and Small Law Firm Operations are outlined here, covering all the essentials from IOLTA to Paperless Intake.
Our law practice advisors […]

10July, 2017

5 Steps to Minimize Data Breach Risks in Your Law Practice

Follow these steps to avoid data breaches in your law practice that would make you WannaCry.
WannaCry. WannaCry. WannaCry. Yes, that’s how many lawyers feel when they think about digital data security, especially the folks over at DLA Piper who were recently hit with a type of ransomware similar to WannaCry, known as Petrwrap/Petya.

Let’s face it, […]

22February, 2017

How to Vet Cloud Technology Providers

Deciding to use cloud technology in your law practice is only the first step. It’s a great first step – but you still need to vet those cloud technology providers!
If you’ve ever heard me speak, you’ll know that I advocate for the use of cloud technology in today’s law firms. There are at least three rock […]

6September, 2016

How to Avoid a Data Breach: Best Practices for the Small Law Firm

We’ll be at Social Law Library on December 8th with practical guidance on data security for small law firms.
If you’re wondering exactly what your small law firm needs to do to protect against threats to your data, this program is for you. Bring your specific security needs, and work with experts who can give you […]