Common reasons lawyers close their practices include a medical disability, wanting to retire, a move out-of-state, or a career change. While the specific steps that need to be taken and the time frame involved can vary significantly depending upon the reasons driving the closure and the type of practice being closed, the following checklist covers the basics of what most lawyers will need to think about.
I recently asked several of our claims attorneys to identify the top habits they felt new lawyers should develop from day one. Most of what they shared was what I anticipated claims attorneys would say; but one item caught my attention, and the more I thought about it, the more I realized how right they were. In short, all lawyers, not just new lawyers, need to know how to write well. Do you?
I could hear it in his voice, the frustration over trying to figure out how to deal with a never-ending flow of email was palpable. Unfortunately, before I could share a few thoughts, the elevator door opened and I had to walk away wishing I could have had a little more time. That’s the real issue, isn’t it? It’s always about time. There never seems to be enough of it. I suspect you can relate because I can’t imagine there are many out there who haven’t felt overwhelmed at some point by a cluttered inbox, a stack of phone messages, sticky notes posted all over the place (you should see my office!), the pile of files on their desk, and/or all the overdue items on their reminder list. So what do you do?
The belief that “The odds of a computer or network breach isn’t an if, it’s only a when” is practically dogma now. Given this reality, every law practice, to include solo attorneys, should have a data security plan in place. Yes, I know the task can seem a bit daunting, particularly if you have no idea where to start; but failing to do this is no longer an acceptable choice. Putting our ethical duties and various state and federal regulations aside, every client expects to have whatever sensitive and personally identifying information they provide to you properly safeguarded. That’s the bottom-line. Here’s a guide put out by the FCC to help you fulfill your ethical duties.
As with any cyber threat, prevention starts with awareness of the risk and, as a road warrior, I see people taking an unnecessary risk far too often. This one involves smart phones.
Here’s the problem. The cable you use to charge your phone is the same one you use to transfer or sync your data. This reality creates an attack vector that someone could take advantage of during the charging process. Read on.
Boundaries are important. In sports, they define the area of play. In real estate, they designate what one owns. And in personal relationships, they mark the emotional and physical limits everyone establishes in order to protect themselves from being manipulated, used, or violated by someone else. In short, personal boundaries mark the place where one individual ends and another begins. Why is this important in the context of practicing law? Because when two people enter an attorney-client relationship……
Now, I will readily admit that many times co-counsel relationships work out just fine. At the conclusion of representation everyone, including the client, feels satisfied in how it all went. My interest, however, is in looking at the times when it doesn’t go well and Betty’s story is one worthy of discussion.
As a backup, redundant calendars certainly have their place; however their real value can only be realized when they become independent from the primary calendar because mistakes happen. Calendaring errors are behind a significant percentage of malpractice claims across the country and a common calendaring misstep is simply a data entry error, be it an incorrectly entered date or a date that never made it into the calendar.
One common concern I continue to hear from lawyers trying to do so is frustration over not knowing the specifics of what to do. While our Rules of Professional Conduct and various ethics opinions mandate all kinds of things to include requiring lawyers to take steps to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client [See ABA Model Rule 1.6 (c)], these rules and opinions often fail to provide any meaningful guidance.
In order to try and address this problem, I have put together the following checklist. It is intended to help those of you who have a desire to become more cyber secure know where to start.
In the middle of a conversation with one of our insureds on the topic of the difficulty of learning to say no, the fine gentleman I was conversing with did a jump shift on me. For whatever reason, he felt it was important to acknowledge that he was cognizant of his age and he wanted me to know he had taken steps to make sure he continues to practice law competently. What really struck me, however, was his desire to also share he had instructed others at his firm to let him know if they were to ever see him start to mentally slip, because in his words “the day will come when…” How will you proceed when day comes when….?