Many readers are aware that I am a proponent of using checklist-style office procedures manuals in the law office. I urge all lawyers to read Atul Gawnde's The Checklist Manifesto.

But sometimes it is difficult to convince busy people that they should prepare checklists for tasks that they already know how to do and

Today I’m going to be a bit presumptuous. I’m going to strongly suggest that your law firm needs a retreat to better focus on changes in the legal service marketplace and how law firms should be using their technology today. This is presumptuous to some because many forward thinking lawyers who follow my blog have

If you are wondering how something can be both a cliché and a big new idea, I'll concede that is a good question. Bear with me.

Big ideas cover 2016Since 2013, Law Practice Magazine has featured its "Big Ideas" themed issue in July. I was the issue editor on the first issue and, since then, that has been

Information Security is an increasingly important topic. It is also a subject matter where relatively few lawyers have much background or training. Lawyers do have great experience learning from the experts where all types of subject matters are concerned. My friends and colleagues, Sharon Nelson, David Ries and John Simek are experts in this field.

No PhishingHere is a guest post from my colleague Laura A. Calloway, Director of Service Programs for the Alabama State Bar. She has been a practice management advisor for a few weeks longer than I have (and, even after all these years, she never lets me forget it.) These latest spear phishing attacks that purport to

When I speak to lawyers about cloud computing, I still often get the question "But how do I know who is holding my client's information and whether I can trust them?" Generally speaking I tell them there are contractual safeguards so that they should read those providers of the provider agreement closely. I also note