SlideShare una empresa de Scribd logo
1 de 61
TRENDS IN LAW PRACTICE
MANAGEMENT -
CALCULATING THE RISKS


NICOLE GARTON-JONES
DAVID J. BILINSKY
WHAT QUESTIONS DO
YOU WANT ANSWERED?
   What:
    • Issues
    • Topics
    • Questions
   do you want
   answered to make
   this session a
   HIT?
   Speak up now!!!
LET’S MAKE THIS
INTERACTIVE!!!
    Please don‟t
    hesitate to add a
    comment,
    suggestion or ask a
    question!
    Aiming at sharing
    some „out of the
    box‟ ideas!
    The more we share
    today, the more we
    all get out of the
    day!
ON WITH THE
PRESENTATION!!
   The world hates
   change, yet it is
   the only thing that
   has brought
   progress.
   Charles Kettering
TOPICS TO BE
COVERED
1. Why focus on new
   technologies?
2. What are the new
   technologies?
3. What are the
   opportunities and
   risks of the new
   technologies?
WHY THE FOCUS ON NEW
TECHNOLOGIES?
•The democratization of
information and forms on the
internet, client demands for more
cost effective solutions and the
increasing encroachment on the
profession by non-lawyers using
new technologies are all driving
significant changes to the legal
profession
WHY THE FOCUS ON NEW
TECHNOLOGIES?
•Lawyers, in addition to keeping
current with their practice areas,
increasingly must also keep up to
date with new developments in
business and technology in order to
effectively compete in a rapidly
evolving and competitive legal
marketplace
WHY THE FOCUS ON NEW
TECHNOLOGIES?
•Professional responsibility in the
context of new technology is often
discussed in reactive terms, for example
ensuring the preservation of
confidential and privileged information
in the use of cloud computing (which we
will cover)
WHY THE FOCUS ON NEW
TECHNOLOGIES?
•There is also a pro-active
professional responsibility in regards
to technology, specifically a duty to
keep abreast of innovation to ensure
that you are delivering the most cost
effective, timely and high quality legal
services possible
WHERE DOES INNOVATION
COME FROM?
•An idea is not a single thing.
Rather, new idea is a network on
the most elemental level – a new
network of neurons firing in synch
with each other inside your brain.
It‟s a new configuration that has
never formed before.
•How do you get your brain in
these environments where these
new networks will form?
Specifically, what is the space of
creativity?
WHERE DOES INNOVATION
COME FROM?
• the “slow hunch” - important
ideas take a long time to evolve
•the process is to borrow from
other people‟s hunches, combine
them with our own hunches and
then create something new
•“chance favours the connected
mind”
•To differentiate your firm and
practice from competitors,
consider trying new technologies
and tools that expose you to lots
of new and different ideas
THE CYCLE

•Columbia University law professor
Tim Wu weaves together stories of
information empires to examine how
disruptive technologies enter and
develop within society
•Ultimately, new companies that
champion new and superior
technologies win out
•Wu relies on Joseph Schumpeter‟s
concept of “creative destruction” and
Clayton Christensen‟s notions of
disruptive and sustaining innovations
to explain the eventual supplanting of
the old dinosaurs by robust,
entrepreneurial newcomers
THE CYCLE

•The cost of delay for innovation
and for consumers is often
substantial
•Think shrinking profit margins for
traditional law firms and the
access to justice crisis facing
general society
•Who will solve these problems?
Lawyers, or our non-lawyer
competitors?
THE END OF LAWYERS?

•Richard Susskind poses a
challenge for legal readers to
identify the capabilities that they
possess that cannot, crudely, be
replaced by advanced systems or
by less costly workers supported
by technology or standard
processes, or by lay people armed
with online self-help tools
THE END OF LAWYERS?

•four main pressures that lawyers
now face: to charge less, to work
differently, to embrace technology
and to deregulate
•Susskind predicts that many
traditional law jobs will be eroded
or changed by two forces: a
market pull towards
commoditization and a pervasive
development and uptake of
information technology
THE MEDIUM IS THE MESSAGE

•Independent of concerns of
profitability and business survival,
it is also important to note that
innovations in practice
management and specifically legal
technology are not peripheral to
the fundamentals of legal thought
and practice
• Rather, commentators have
harkened back to Marshal
McLuhan‟s aphorism that “the
medium is the message” and have
noted that changes in the structure
and delivery of legal information
are also changing the legal mind
THE MEDIUM IS THE MESSAGE

•Legal practice is increasingly
more about editing existing
electronic precedents, managing
e-discovery and mining for
information held in private and
public knowledge management
systems
•Add the ever presence of social
media, and the assault on
traditional legal thought and
reflection is magnified
2. WHAT ARE THE NEW
TECHNOLOGIES?
Today, we are going to focus on:
•Cloud Computing (SaaS, Storage
Clouds, IaaS)
•Virtual law practice, including
unbundling of legal services
•Social Networking
THE CLOUD
TYPES OF CLOUDS
TYPES OF CLOUDS
             “Traditional”
             Hosted by 3rd party
             Accessible via the
             Internet
TYPES OF CLOUDS
Internally hosted
Appear to be on the
cloud
Remain at all times
within the control
of the enterprise
“Virtual Cloud”
Microsoft
Sharepoint enabled
TYPES OF CLOUDS

Blend of „public‟ and „private‟ applications
Typical for most organizations
TYPE OF CLOUD
SERVICES
Software as a Service (SaaS):
  • Gmail or Clio or RocketMatter
Storage Cloud:
   • Dropbox or SpiderOak
Infrastructure as a Service (IaaS):
  • Rackspace, i-worx
SAAS: PROTECTING
CLIENT DATA ONLINE
•lawyers must ensure that
client information is
protected in the hands of
the technology provider or
the hosting company the
firm chooses
SAAS: PROTECTING
CLIENT DATA ONLINE
•Companies providing practice
management technology will host
application data either in their own
servers or will have a relationship
(usually a lease) with a third party
provider that owns the data centre
where it houses the data on its
servers
•If the provider offers geo-
redundancy, then the law office data
will be housed in two different data
centres in different geographic
locations
SAAS: PROTECTING CLIENT
DATA ONLINE CON’T
•Research the technology
provider and understand the
terms of service agreement
•Understand the relationship
and review any agreement
covering data access and
confidentiality that may exist
between the service provider
and the hosting company
SAAS: PROTECTING CLIENT
DATA ONLINE CON’T
•Understand: data return and retention
policies, transferring data and
compatibility issues for restoring
data, backups, export features and
offline versions of the software, third
party hosting, server locations and geo-
redundancy, international laws that may
apply if the services are located in
another country, response time of the
provider and tech
support, confidentiality of law office data
(including who has access, procedures
for government and civil search and
seizure actions, procedures for potential
breach of confidentiality) and the
provider‟s industry reputation and
infrastructure to support growth
SAAS: PROTECTING CLIENT DATA
ONLINE FURTHER READING

•Black, Nicole, Cloud Computing for Lawyers, ABA/LPM, January
2012
•Law Society of British Columbia, Report of the Cloud Computing
Working Group, July 15, 2011
ETHICS OF PRACTICING
ON THE CLOUD
Cloud is moving ahead of the
ethics curve
ABA Ethics 20/20 Commission
“Impact of Internet technology
on the delivery of legal services,
both globally and within the
United States”
Law Society of BC Cloud
Computing Working Group Final
Report - hailed as a leading
thoughtful document
LSBC CLOUD REPORT
GUIDELINES
Lawyers must ensure:
 • Confidentiality and privilege are
   protected
 • Ascertain where the data will be
   stored
 • Ownership of data does not pass
What happens if:
  • Cloud provider goes out of service?
  • Circumstances under which a cloud
    provider cuts off access?
  • Access to source code/software?
LSBC CLOUD GUIDELINES

Does the Cloud provider:
  • Support e-discovery and forensic
    investigations?
  • Sell or commoditize the data?
  • Releases independent audits of their
    security?
LSBC CLOUD GUIDELINES

Compare:
  • Cloud service with existing
    services
  • Determine if cloud is appropriate
Document all this due diligence!
  • May be important if something
    goes Wrong
LSBC CLOUD
GUIDELINES
Ask Yourself:
  • How easy can you migrate the data to
    a different provider?
  • Who has access to the data?
  • Under what circumstances do they
    gain access?
  • What are the archive times for the
    provider? Do they match the LSBC
    requirements?
  • Is data „deleted‟ or „erased‟?
  • What are your remedies if they breach
    the SLA, privacy policy, terms of
    service, security policy?
WHAT IS A VIRTUAL
LAW FIRM?
1.   A law firm where legal services
     are delivered to clients entirely
     online through a secure web-
     based portal;
2.   A law firm with a centralized
     administration, management
     and brand but the lawyers work
     remotely (at client
     sites, home, satellite offices
     etc.)
PRACTICING ENTIRELY ONLINE:
EXAMPLES
Online Firms:
https://www.kimbrolaw.com/
http://www.marylandfamilylawyer.com/divorce.asp
http://www.heritagelawonline.com/ - shut down in 2011


Vendors of Online Platforms:
http://www.vlotech.com/
http://www.directlaw.com/
CENTRALIZED IT, MANAGEMENT &
BRAND BUT REMOTE LAWYERS:
EXAMPLES
http://www.fsblegal.com/
http://www.virtuallawpartners.com/
http://www.rimonlaw.com/
http://www.valkyrielaw.com/index.html
UPL RISKS IN ELAWYERING/VIRTUAL
LAW FIRMS
•When using online methods of
elawyering, a lawyer must ensure that
geographic boundaries are monitored
to avoid the risk of unauthorized
practice of law in a particular
jurisdiction
•The firm website and online
advertising should clearly define the
scope of the firm‟s practices and
contain disclaimers explaining the
reach of the firm and how technology
will be used to deliver legal services
online
USING TECH TO UNBUNDLE
LEGAL SERVICES
•Unbundling or limited scope
representation is a growing trend in
the delivery of legal services as new
technologies for online practice
management make unbundling
easier for traditional firms
•Entire web-based practices can be
created providing only unbundled
legal services online
•Document assembly and
automation programs may be used
to streamline the creation of legal
documents for review by the lawyer
UNBUNDLED LEGAL SERVICES
BEST PRACTICES
Lawyers should understand the
following:
•How to draft a limited scope agreement,
how to define the scope of unbundled
services online, using document
assembly and automation programs,
how to deliver clear guidance and
instructions to the client on how to
complete their matter, how to use fixed
fee or value billing, how to integrate
unbundled services into a full service
firm by offering existing clients
additional services online and other
best practices
UNBUNDLED LEGAL
SERVICES READING LIST
Kimbro, Stephanie, Limited Scope
Legal Services: Unbundling and
the Self-Help Client, ABA/LPM 2012
Kimbro, Stephanie, Serving the
DIY Client: A Guide to Unbundling
Legal Services for the Private
Practioner (April 2012) – e-book
INTERNET SECURITY
•Lawyers need to understand basic
Internet security in order to
responsibly communicate with
clients and collaborate with others
online (for e.g,, how a hacker
accesses unsecured data from a
public hotspot and how to safely
work on a wireless network)
•Know best practices for securing
hardware and mobile devices as
well as safe practices for using web-
based or cloud computing
applications to protect clients‟
confidential information
INTERNET SECURITY
•Things to know: encryption, secure
socket layer (SSL) and https, wireless
networks, remote access to firm
computers, mobile device security,
security of cloud-based services, VPNs,
security risks on public computers and
networks, the most common online
security breaches and computer
vulnerabilities, enabling encryption
hardware and software firewalls,
password protections and disposing of
hardware when upgrading
INTERNET SECURITY
FURTHER READING
Legal Technology Resource Centre.
Resources on Wireless Networking
and Security. American Bar
Association, Web.
Securing Your Clients‟ Data While on
the Road, David Ries and Reid Trautz
http://apps.americanbar.org/lpm/lpt/arti
cles/tch10081.shtml
Cyberspace Under Siege: Law firms
are likely targets for attacks seeking to
steal information off computer
systems, Ed Finkel
http://www.abajournal.com/magazine/
article/cyberspace_under_siege/
SOCIAL NETWORKING
•Microblogging - Twitter
•Social Networking - Facebook,
LinkedIn, Legal OnRamp, Martindate
Hubbell Connected
•Videos – YouTube, Vimeo
•Slides & document sharing: SlideShare,
Docstoc, JD-Supra
• Location sharing – FourSquare
•Review & rating sites: Avvo, Yelp
SOCIAL NETWORKING
RISKS
•Drawing the line between
personal and professional
networking in online social
environments is difficult because
the applications were created
with the purpose of sharing with
as many people as possible
•User error: imprudent posts,
breaching client confidentiality,
“friending” a judge
SOCIAL NETWORKING
RISKS
•At each step, the user must consider
who has access to and control of the
account info he or she is providing to the
social media application
•Applications change privacy and
account options and the user will need to
monitor his or settings regularly, as well
as the content posted
•Be wary of third party applications; may
be third party applications running on
social networking websites that request
access to user information and contact
databases
SOCIAL NETWORING
FURTHER READING

• Nicole Black and Carolyn Elefant,
  Social Media for Lawyers: The Next
  Frontier, American Bar Association,
  2010
• Steve Bennett, Ethics of Lawyer Social
  Networking, 73 Alb. L. Rev. 113 (2009)
• Adrian Dayton, Social Media for
  Lawyers: Twitter Edition, Ark Group,
  2009
MS SHAREPOINT




All about team collaboration
 • “War rooms” containing: shared
   documents, tasks, calendars, to-do‟s, integrated with
   Office 2010 and enabled by remote access etc…
PBWORKS
PBWORKS

Secure, encrypted
collaborative workspaces
Inside and outside the firm
Case management, client
extranets, knowledgebases,
deal rooms, document hosting
and more…
*Wish* it had the
online/offline “Box” capability
of Dropbox
PBWORKS
          Craft a separate workspace for
          every file
          Upload documents, assign and
          track tasks, have chats and
          conferences and share
          documents
          Customizable security settings
          Craft dealrooms and share
          documents without email
SPIDEROAK
Mac, Windows or Linux
“free online backup, synchronization,
sharing, remote access, and storage.”
„zero knowledge‟
You create your password on your own
computer
no trace of your original password is ever
uploaded to SpiderOak
SPIDEROAK
SpiderOak cannot know even the names
of your files and folders. All that
SpiderOak can see: sequentially
numbered containers of encrypted data.
You alone have responsibility for
remembering your password!
SPIDEROAK VS DROPBOX

Dropbox                    Spideroak
price:                     price:
 • 2GB free                 • 2GB free
 • 50GB $9.95/mth           • 100GB increments
 • 100GB $19.95/mth           $10/mth or $100/yr
easy to use                more powerful
Security                   Security
 • staff: see file names    • staff: see #'d
 • reset password             containers
   online                   • can't reset password
                              online
CLOUD SUPPORT QUESTIONS:

Are the servers in
Canada?
Review SLA with Cloud
provider
Review Privacy statement
Review Security audits
CLOUD QUESTIONS
Uptime record (reliability)?
Availability (support)?
Proprietary software?
Bandwidth (capacity)?
Reporting (feedback)?
Capacity?
Security:
 • By user, employee & in-transit
BACKUP AND DISASTER
RECOVERY
Help desk hours
Emergency contact list and
procedures to recover data
Backups and recovery
 • Recovery Point and Time to
   Restore
LSBC or other regulatory
compliance
What is/are your
role/duties?
COMMENTS AND
QUESTIONS
QUESTIONS?
Nicole Garton-Jones
•   Heritage Law
•   nicole@bcheritagelaw.com
•   778 786 0615
•   http://twitter.com/NGartonJones
•   www.bcheritagelaw.com


Dave Bilinsky
    •   Practice Management Advisor
    •   Law Society of British Columbia
    •   daveb@lsbc.org
    •   604 605 5331
    •   http://twitter.com/ david_bilinsky
    •   www.thoughtfullaw.com

Más contenido relacionado

La actualidad más candente

Governance & Ediscovery
Governance & EdiscoveryGovernance & Ediscovery
Governance & EdiscoveryLouise Spiteri
 
Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...
Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...
Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...FIA2010
 
How Personal Cloud Networks Enable New Business Models
How Personal Cloud Networks Enable New Business ModelsHow Personal Cloud Networks Enable New Business Models
How Personal Cloud Networks Enable New Business Modelsdrummondreed
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...mkeane
 
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014Adrian Wright
 
2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video DataMrsAlways RigHt
 
Secure and Smart IoT
Secure and Smart IoT Secure and Smart IoT
Secure and Smart IoT Ahmed Banafa
 
Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Louise Spiteri
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) Ahmed Banafa
 
Ethics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersEthics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersRobert Ambrogi
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain ConvergenceAhmed Banafa
 
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...Ahmed Banafa
 
"We're all in this together" - educating users on the importance of cyber sec...
"We're all in this together" - educating users on the importance of cyber sec..."We're all in this together" - educating users on the importance of cyber sec...
"We're all in this together" - educating users on the importance of cyber sec...Jisc
 
HvA Legaltech Lab Opening
HvA Legaltech Lab OpeningHvA Legaltech Lab Opening
HvA Legaltech Lab Openingjcscholtes
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondAhmed Banafa
 
The Online Court - CTC 2017
The Online Court - CTC 2017The Online Court - CTC 2017
The Online Court - CTC 2017David Harvey
 
Internal Investigations and the Cloud
Internal Investigations and the CloudInternal Investigations and the Cloud
Internal Investigations and the CloudDan Michaluk
 
Proposal: A new City of Oakland Technology Commission
Proposal: A new City of Oakland Technology Commission Proposal: A new City of Oakland Technology Commission
Proposal: A new City of Oakland Technology Commission Phil Wolff
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT Ahmed Banafa
 

La actualidad más candente (20)

Governance & Ediscovery
Governance & EdiscoveryGovernance & Ediscovery
Governance & Ediscovery
 
Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...
Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...
Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...
 
eDiscovery for the Small or Solo Law Firm
eDiscovery for the Small or Solo Law FirmeDiscovery for the Small or Solo Law Firm
eDiscovery for the Small or Solo Law Firm
 
How Personal Cloud Networks Enable New Business Models
How Personal Cloud Networks Enable New Business ModelsHow Personal Cloud Networks Enable New Business Models
How Personal Cloud Networks Enable New Business Models
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
 
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
 
2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data
 
Secure and Smart IoT
Secure and Smart IoT Secure and Smart IoT
Secure and Smart IoT
 
Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
 
Ethics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersEthics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for Lawyers
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain Convergence
 
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
 
"We're all in this together" - educating users on the importance of cyber sec...
"We're all in this together" - educating users on the importance of cyber sec..."We're all in this together" - educating users on the importance of cyber sec...
"We're all in this together" - educating users on the importance of cyber sec...
 
HvA Legaltech Lab Opening
HvA Legaltech Lab OpeningHvA Legaltech Lab Opening
HvA Legaltech Lab Opening
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and Beyond
 
The Online Court - CTC 2017
The Online Court - CTC 2017The Online Court - CTC 2017
The Online Court - CTC 2017
 
Internal Investigations and the Cloud
Internal Investigations and the CloudInternal Investigations and the Cloud
Internal Investigations and the Cloud
 
Proposal: A new City of Oakland Technology Commission
Proposal: A new City of Oakland Technology Commission Proposal: A new City of Oakland Technology Commission
Proposal: A new City of Oakland Technology Commission
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 

Destacado

Albero genealogico
Albero genealogico Albero genealogico
Albero genealogico Caro Monti
 
Letter from Andrew Dilnot to Joanne McCartney AM 18032013
Letter from Andrew Dilnot to Joanne McCartney AM 18032013Letter from Andrew Dilnot to Joanne McCartney AM 18032013
Letter from Andrew Dilnot to Joanne McCartney AM 18032013CityHallLabour
 
Tipos de brochas maquillaje
Tipos de brochas maquillajeTipos de brochas maquillaje
Tipos de brochas maquillajersvierco
 
Top leaf 1 info virtual mayo 2013
Top leaf 1 info virtual mayo 2013Top leaf 1 info virtual mayo 2013
Top leaf 1 info virtual mayo 2013Novarum México
 
Boletín. Convive Raquel Jiménez con adultos mayores
Boletín. Convive Raquel Jiménez con adultos mayoresBoletín. Convive Raquel Jiménez con adultos mayores
Boletín. Convive Raquel Jiménez con adultos mayoresUNAM
 
Transformación Digital en Salud. Un cambio de paradigma en la medicina moderna.
Transformación Digital en Salud. Un cambio de paradigma en la medicina moderna.Transformación Digital en Salud. Un cambio de paradigma en la medicina moderna.
Transformación Digital en Salud. Un cambio de paradigma en la medicina moderna.Inma Zambade
 
Libro arte sanador
Libro arte sanadorLibro arte sanador
Libro arte sanadorCualla Ari
 
Ahorrar invirtiendo, los beneficios de una buena gestión TIC
Ahorrar invirtiendo, los beneficios de una buena gestión TICAhorrar invirtiendo, los beneficios de una buena gestión TIC
Ahorrar invirtiendo, los beneficios de una buena gestión TICNextel S.A.
 
Englishpresentation sofrengroup Private
Englishpresentation sofrengroup PrivateEnglishpresentation sofrengroup Private
Englishpresentation sofrengroup Privatedfollet
 
Te quiero valero la portellada
Te quiero valero la portelladaTe quiero valero la portellada
Te quiero valero la portelladasara
 
Proyecto tenaza
Proyecto tenazaProyecto tenaza
Proyecto tenazaSofia Luna
 
Oldies but goodies part II
Oldies but goodies part IIOldies but goodies part II
Oldies but goodies part IIanneweinell
 
06 Nom.Y Generalidades Qca.Org.2009
06 Nom.Y Generalidades Qca.Org.200906 Nom.Y Generalidades Qca.Org.2009
06 Nom.Y Generalidades Qca.Org.2009Miguel Neira
 
Borang permohonan bagi pelupusan rekod elektronik (yang tidak di nyatakan dal...
Borang permohonan bagi pelupusan rekod elektronik (yang tidak di nyatakan dal...Borang permohonan bagi pelupusan rekod elektronik (yang tidak di nyatakan dal...
Borang permohonan bagi pelupusan rekod elektronik (yang tidak di nyatakan dal...Arkib_Negara_Malaysia
 

Destacado (20)

Albero genealogico
Albero genealogico Albero genealogico
Albero genealogico
 
Letter from Andrew Dilnot to Joanne McCartney AM 18032013
Letter from Andrew Dilnot to Joanne McCartney AM 18032013Letter from Andrew Dilnot to Joanne McCartney AM 18032013
Letter from Andrew Dilnot to Joanne McCartney AM 18032013
 
All Phase Intro PPT
All Phase Intro PPTAll Phase Intro PPT
All Phase Intro PPT
 
Tipos de brochas maquillaje
Tipos de brochas maquillajeTipos de brochas maquillaje
Tipos de brochas maquillaje
 
Results all
Results allResults all
Results all
 
Top leaf 1 info virtual mayo 2013
Top leaf 1 info virtual mayo 2013Top leaf 1 info virtual mayo 2013
Top leaf 1 info virtual mayo 2013
 
Boletín. Convive Raquel Jiménez con adultos mayores
Boletín. Convive Raquel Jiménez con adultos mayoresBoletín. Convive Raquel Jiménez con adultos mayores
Boletín. Convive Raquel Jiménez con adultos mayores
 
Transformación Digital en Salud. Un cambio de paradigma en la medicina moderna.
Transformación Digital en Salud. Un cambio de paradigma en la medicina moderna.Transformación Digital en Salud. Un cambio de paradigma en la medicina moderna.
Transformación Digital en Salud. Un cambio de paradigma en la medicina moderna.
 
Libro arte sanador
Libro arte sanadorLibro arte sanador
Libro arte sanador
 
Ahorrar invirtiendo, los beneficios de una buena gestión TIC
Ahorrar invirtiendo, los beneficios de una buena gestión TICAhorrar invirtiendo, los beneficios de una buena gestión TIC
Ahorrar invirtiendo, los beneficios de una buena gestión TIC
 
Reitu's CV
Reitu's CVReitu's CV
Reitu's CV
 
Englishpresentation sofrengroup Private
Englishpresentation sofrengroup PrivateEnglishpresentation sofrengroup Private
Englishpresentation sofrengroup Private
 
Te quiero valero la portellada
Te quiero valero la portelladaTe quiero valero la portellada
Te quiero valero la portellada
 
Denhubrem
DenhubremDenhubrem
Denhubrem
 
Horario Anual 2015 2016
Horario Anual 2015 2016Horario Anual 2015 2016
Horario Anual 2015 2016
 
De beirut a jerusalen a 32 años de sabra y chatila
De beirut a jerusalen a 32 años de sabra y chatilaDe beirut a jerusalen a 32 años de sabra y chatila
De beirut a jerusalen a 32 años de sabra y chatila
 
Proyecto tenaza
Proyecto tenazaProyecto tenaza
Proyecto tenaza
 
Oldies but goodies part II
Oldies but goodies part IIOldies but goodies part II
Oldies but goodies part II
 
06 Nom.Y Generalidades Qca.Org.2009
06 Nom.Y Generalidades Qca.Org.200906 Nom.Y Generalidades Qca.Org.2009
06 Nom.Y Generalidades Qca.Org.2009
 
Borang permohonan bagi pelupusan rekod elektronik (yang tidak di nyatakan dal...
Borang permohonan bagi pelupusan rekod elektronik (yang tidak di nyatakan dal...Borang permohonan bagi pelupusan rekod elektronik (yang tidak di nyatakan dal...
Borang permohonan bagi pelupusan rekod elektronik (yang tidak di nyatakan dal...
 

Similar a Trends in Law Practice Management – Calculating the Risks

Mediating with Technology.: Opportunities and Risks
Mediating with Technology.: Opportunities and RisksMediating with Technology.: Opportunities and Risks
Mediating with Technology.: Opportunities and RisksNicole Garton
 
Legal education of the future is information and technology
Legal education of the future is information and technologyLegal education of the future is information and technology
Legal education of the future is information and technologyOmar Ha-Redeye
 
UTSpeaks Public Lecture: Clearing up the Cloud -19th July 2011 - Rob Living...
UTSpeaks Public Lecture:  Clearing up the Cloud  -19th July 2011 - Rob Living...UTSpeaks Public Lecture:  Clearing up the Cloud  -19th July 2011 - Rob Living...
UTSpeaks Public Lecture: Clearing up the Cloud -19th July 2011 - Rob Living...Livingstone Advisory
 
Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Catapult
 
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...MicheleNati
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safewoodsy01
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
Machine learning presentation in using pyhton
Machine learning presentation in using pyhtonMachine learning presentation in using pyhton
Machine learning presentation in using pyhtonmasukmia.com
 
AWS re:Invent 2016: Blockchain on AWS: Disrupting the Norm (GPST301)
AWS re:Invent 2016: Blockchain on AWS: Disrupting the Norm (GPST301)AWS re:Invent 2016: Blockchain on AWS: Disrupting the Norm (GPST301)
AWS re:Invent 2016: Blockchain on AWS: Disrupting the Norm (GPST301)Amazon Web Services
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?Kurt Hagerman
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to BlockchainJordan Harris
 
Small and solo in the cloud
Small and solo in the cloudSmall and solo in the cloud
Small and solo in the cloudOmar Ha-Redeye
 
Getting Started in the Nonprofit Cloud
Getting Started in the Nonprofit CloudGetting Started in the Nonprofit Cloud
Getting Started in the Nonprofit CloudAbila
 
One network-bridge-to-blockchain-whitepaper
One network-bridge-to-blockchain-whitepaperOne network-bridge-to-blockchain-whitepaper
One network-bridge-to-blockchain-whitepaperGeoff Annesley
 
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEMMIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEMShehanperamuna
 
Business Drivers of SDN by Paul Wiefels, Chasm Group
Business Drivers of SDN by Paul Wiefels, Chasm GroupBusiness Drivers of SDN by Paul Wiefels, Chasm Group
Business Drivers of SDN by Paul Wiefels, Chasm GroupSDxCentral
 
The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think Uni Systems S.M.S.A.
 

Similar a Trends in Law Practice Management – Calculating the Risks (20)

Mediating with Technology.: Opportunities and Risks
Mediating with Technology.: Opportunities and RisksMediating with Technology.: Opportunities and Risks
Mediating with Technology.: Opportunities and Risks
 
(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice
 
Legal education of the future is information and technology
Legal education of the future is information and technologyLegal education of the future is information and technology
Legal education of the future is information and technology
 
Your data is your business: Secure it or Lose it!
Your data is your business: Secure it or Lose it!Your data is your business: Secure it or Lose it!
Your data is your business: Secure it or Lose it!
 
UTSpeaks Public Lecture: Clearing up the Cloud -19th July 2011 - Rob Living...
UTSpeaks Public Lecture:  Clearing up the Cloud  -19th July 2011 - Rob Living...UTSpeaks Public Lecture:  Clearing up the Cloud  -19th July 2011 - Rob Living...
UTSpeaks Public Lecture: Clearing up the Cloud -19th July 2011 - Rob Living...
 
Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Transformation Business Evolution
Digital Transformation Business Evolution
 
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
 
Risks and Benefits of Cloud Computing
Risks and Benefits of Cloud ComputingRisks and Benefits of Cloud Computing
Risks and Benefits of Cloud Computing
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Machine learning presentation in using pyhton
Machine learning presentation in using pyhtonMachine learning presentation in using pyhton
Machine learning presentation in using pyhton
 
AWS re:Invent 2016: Blockchain on AWS: Disrupting the Norm (GPST301)
AWS re:Invent 2016: Blockchain on AWS: Disrupting the Norm (GPST301)AWS re:Invent 2016: Blockchain on AWS: Disrupting the Norm (GPST301)
AWS re:Invent 2016: Blockchain on AWS: Disrupting the Norm (GPST301)
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 
Small and solo in the cloud
Small and solo in the cloudSmall and solo in the cloud
Small and solo in the cloud
 
Getting Started in the Nonprofit Cloud
Getting Started in the Nonprofit CloudGetting Started in the Nonprofit Cloud
Getting Started in the Nonprofit Cloud
 
One network-bridge-to-blockchain-whitepaper
One network-bridge-to-blockchain-whitepaperOne network-bridge-to-blockchain-whitepaper
One network-bridge-to-blockchain-whitepaper
 
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEMMIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
 
Business Drivers of SDN by Paul Wiefels, Chasm Group
Business Drivers of SDN by Paul Wiefels, Chasm GroupBusiness Drivers of SDN by Paul Wiefels, Chasm Group
Business Drivers of SDN by Paul Wiefels, Chasm Group
 
The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think
 

Más de Nicole Garton

Family Offices in Canada: Current Trends and Applications for Transgeneratio...
Family Offices in Canada:  Current Trends and Applications for Transgeneratio...Family Offices in Canada:  Current Trends and Applications for Transgeneratio...
Family Offices in Canada: Current Trends and Applications for Transgeneratio...Nicole Garton
 
Effective Blended Family Planning
Effective Blended Family PlanningEffective Blended Family Planning
Effective Blended Family PlanningNicole Garton
 
Estate Planning Basics
Estate Planning BasicsEstate Planning Basics
Estate Planning BasicsNicole Garton
 
Conflict analysis and intervention selection for the parenting coordinator
Conflict analysis and intervention selection for the parenting coordinatorConflict analysis and intervention selection for the parenting coordinator
Conflict analysis and intervention selection for the parenting coordinatorNicole Garton
 
Family Business Succession: What You Need to Know to Effectively Advise Busin...
Family Business Succession: What You Need to Know to Effectively Advise Busin...Family Business Succession: What You Need to Know to Effectively Advise Busin...
Family Business Succession: What You Need to Know to Effectively Advise Busin...Nicole Garton
 
Methodologies for Elder Mediation
Methodologies for Elder MediationMethodologies for Elder Mediation
Methodologies for Elder MediationNicole Garton
 
Elder & Guardianship Mediation in BC
Elder & Guardianship Mediation in BCElder & Guardianship Mediation in BC
Elder & Guardianship Mediation in BCNicole Garton
 

Más de Nicole Garton (7)

Family Offices in Canada: Current Trends and Applications for Transgeneratio...
Family Offices in Canada:  Current Trends and Applications for Transgeneratio...Family Offices in Canada:  Current Trends and Applications for Transgeneratio...
Family Offices in Canada: Current Trends and Applications for Transgeneratio...
 
Effective Blended Family Planning
Effective Blended Family PlanningEffective Blended Family Planning
Effective Blended Family Planning
 
Estate Planning Basics
Estate Planning BasicsEstate Planning Basics
Estate Planning Basics
 
Conflict analysis and intervention selection for the parenting coordinator
Conflict analysis and intervention selection for the parenting coordinatorConflict analysis and intervention selection for the parenting coordinator
Conflict analysis and intervention selection for the parenting coordinator
 
Family Business Succession: What You Need to Know to Effectively Advise Busin...
Family Business Succession: What You Need to Know to Effectively Advise Busin...Family Business Succession: What You Need to Know to Effectively Advise Busin...
Family Business Succession: What You Need to Know to Effectively Advise Busin...
 
Methodologies for Elder Mediation
Methodologies for Elder MediationMethodologies for Elder Mediation
Methodologies for Elder Mediation
 
Elder & Guardianship Mediation in BC
Elder & Guardianship Mediation in BCElder & Guardianship Mediation in BC
Elder & Guardianship Mediation in BC
 

Último

Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 

Último (20)

Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 

Trends in Law Practice Management – Calculating the Risks

  • 1. TRENDS IN LAW PRACTICE MANAGEMENT - CALCULATING THE RISKS NICOLE GARTON-JONES DAVID J. BILINSKY
  • 2. WHAT QUESTIONS DO YOU WANT ANSWERED? What: • Issues • Topics • Questions do you want answered to make this session a HIT? Speak up now!!!
  • 3. LET’S MAKE THIS INTERACTIVE!!! Please don‟t hesitate to add a comment, suggestion or ask a question! Aiming at sharing some „out of the box‟ ideas! The more we share today, the more we all get out of the day!
  • 4. ON WITH THE PRESENTATION!! The world hates change, yet it is the only thing that has brought progress. Charles Kettering
  • 5. TOPICS TO BE COVERED 1. Why focus on new technologies? 2. What are the new technologies? 3. What are the opportunities and risks of the new technologies?
  • 6. WHY THE FOCUS ON NEW TECHNOLOGIES? •The democratization of information and forms on the internet, client demands for more cost effective solutions and the increasing encroachment on the profession by non-lawyers using new technologies are all driving significant changes to the legal profession
  • 7. WHY THE FOCUS ON NEW TECHNOLOGIES? •Lawyers, in addition to keeping current with their practice areas, increasingly must also keep up to date with new developments in business and technology in order to effectively compete in a rapidly evolving and competitive legal marketplace
  • 8. WHY THE FOCUS ON NEW TECHNOLOGIES? •Professional responsibility in the context of new technology is often discussed in reactive terms, for example ensuring the preservation of confidential and privileged information in the use of cloud computing (which we will cover)
  • 9. WHY THE FOCUS ON NEW TECHNOLOGIES? •There is also a pro-active professional responsibility in regards to technology, specifically a duty to keep abreast of innovation to ensure that you are delivering the most cost effective, timely and high quality legal services possible
  • 10. WHERE DOES INNOVATION COME FROM? •An idea is not a single thing. Rather, new idea is a network on the most elemental level – a new network of neurons firing in synch with each other inside your brain. It‟s a new configuration that has never formed before. •How do you get your brain in these environments where these new networks will form? Specifically, what is the space of creativity?
  • 11. WHERE DOES INNOVATION COME FROM? • the “slow hunch” - important ideas take a long time to evolve •the process is to borrow from other people‟s hunches, combine them with our own hunches and then create something new •“chance favours the connected mind” •To differentiate your firm and practice from competitors, consider trying new technologies and tools that expose you to lots of new and different ideas
  • 12. THE CYCLE •Columbia University law professor Tim Wu weaves together stories of information empires to examine how disruptive technologies enter and develop within society •Ultimately, new companies that champion new and superior technologies win out •Wu relies on Joseph Schumpeter‟s concept of “creative destruction” and Clayton Christensen‟s notions of disruptive and sustaining innovations to explain the eventual supplanting of the old dinosaurs by robust, entrepreneurial newcomers
  • 13. THE CYCLE •The cost of delay for innovation and for consumers is often substantial •Think shrinking profit margins for traditional law firms and the access to justice crisis facing general society •Who will solve these problems? Lawyers, or our non-lawyer competitors?
  • 14. THE END OF LAWYERS? •Richard Susskind poses a challenge for legal readers to identify the capabilities that they possess that cannot, crudely, be replaced by advanced systems or by less costly workers supported by technology or standard processes, or by lay people armed with online self-help tools
  • 15. THE END OF LAWYERS? •four main pressures that lawyers now face: to charge less, to work differently, to embrace technology and to deregulate •Susskind predicts that many traditional law jobs will be eroded or changed by two forces: a market pull towards commoditization and a pervasive development and uptake of information technology
  • 16. THE MEDIUM IS THE MESSAGE •Independent of concerns of profitability and business survival, it is also important to note that innovations in practice management and specifically legal technology are not peripheral to the fundamentals of legal thought and practice • Rather, commentators have harkened back to Marshal McLuhan‟s aphorism that “the medium is the message” and have noted that changes in the structure and delivery of legal information are also changing the legal mind
  • 17. THE MEDIUM IS THE MESSAGE •Legal practice is increasingly more about editing existing electronic precedents, managing e-discovery and mining for information held in private and public knowledge management systems •Add the ever presence of social media, and the assault on traditional legal thought and reflection is magnified
  • 18. 2. WHAT ARE THE NEW TECHNOLOGIES? Today, we are going to focus on: •Cloud Computing (SaaS, Storage Clouds, IaaS) •Virtual law practice, including unbundling of legal services •Social Networking
  • 21. TYPES OF CLOUDS “Traditional” Hosted by 3rd party Accessible via the Internet
  • 22. TYPES OF CLOUDS Internally hosted Appear to be on the cloud Remain at all times within the control of the enterprise “Virtual Cloud” Microsoft Sharepoint enabled
  • 23. TYPES OF CLOUDS Blend of „public‟ and „private‟ applications Typical for most organizations
  • 24. TYPE OF CLOUD SERVICES Software as a Service (SaaS): • Gmail or Clio or RocketMatter Storage Cloud: • Dropbox or SpiderOak Infrastructure as a Service (IaaS): • Rackspace, i-worx
  • 25. SAAS: PROTECTING CLIENT DATA ONLINE •lawyers must ensure that client information is protected in the hands of the technology provider or the hosting company the firm chooses
  • 26. SAAS: PROTECTING CLIENT DATA ONLINE •Companies providing practice management technology will host application data either in their own servers or will have a relationship (usually a lease) with a third party provider that owns the data centre where it houses the data on its servers •If the provider offers geo- redundancy, then the law office data will be housed in two different data centres in different geographic locations
  • 27. SAAS: PROTECTING CLIENT DATA ONLINE CON’T •Research the technology provider and understand the terms of service agreement •Understand the relationship and review any agreement covering data access and confidentiality that may exist between the service provider and the hosting company
  • 28. SAAS: PROTECTING CLIENT DATA ONLINE CON’T •Understand: data return and retention policies, transferring data and compatibility issues for restoring data, backups, export features and offline versions of the software, third party hosting, server locations and geo- redundancy, international laws that may apply if the services are located in another country, response time of the provider and tech support, confidentiality of law office data (including who has access, procedures for government and civil search and seizure actions, procedures for potential breach of confidentiality) and the provider‟s industry reputation and infrastructure to support growth
  • 29. SAAS: PROTECTING CLIENT DATA ONLINE FURTHER READING •Black, Nicole, Cloud Computing for Lawyers, ABA/LPM, January 2012 •Law Society of British Columbia, Report of the Cloud Computing Working Group, July 15, 2011
  • 30. ETHICS OF PRACTICING ON THE CLOUD Cloud is moving ahead of the ethics curve ABA Ethics 20/20 Commission “Impact of Internet technology on the delivery of legal services, both globally and within the United States” Law Society of BC Cloud Computing Working Group Final Report - hailed as a leading thoughtful document
  • 31. LSBC CLOUD REPORT GUIDELINES Lawyers must ensure: • Confidentiality and privilege are protected • Ascertain where the data will be stored • Ownership of data does not pass What happens if: • Cloud provider goes out of service? • Circumstances under which a cloud provider cuts off access? • Access to source code/software?
  • 32. LSBC CLOUD GUIDELINES Does the Cloud provider: • Support e-discovery and forensic investigations? • Sell or commoditize the data? • Releases independent audits of their security?
  • 33. LSBC CLOUD GUIDELINES Compare: • Cloud service with existing services • Determine if cloud is appropriate Document all this due diligence! • May be important if something goes Wrong
  • 34. LSBC CLOUD GUIDELINES Ask Yourself: • How easy can you migrate the data to a different provider? • Who has access to the data? • Under what circumstances do they gain access? • What are the archive times for the provider? Do they match the LSBC requirements? • Is data „deleted‟ or „erased‟? • What are your remedies if they breach the SLA, privacy policy, terms of service, security policy?
  • 35. WHAT IS A VIRTUAL LAW FIRM? 1. A law firm where legal services are delivered to clients entirely online through a secure web- based portal; 2. A law firm with a centralized administration, management and brand but the lawyers work remotely (at client sites, home, satellite offices etc.)
  • 36. PRACTICING ENTIRELY ONLINE: EXAMPLES Online Firms: https://www.kimbrolaw.com/ http://www.marylandfamilylawyer.com/divorce.asp http://www.heritagelawonline.com/ - shut down in 2011 Vendors of Online Platforms: http://www.vlotech.com/ http://www.directlaw.com/
  • 37. CENTRALIZED IT, MANAGEMENT & BRAND BUT REMOTE LAWYERS: EXAMPLES http://www.fsblegal.com/ http://www.virtuallawpartners.com/ http://www.rimonlaw.com/ http://www.valkyrielaw.com/index.html
  • 38. UPL RISKS IN ELAWYERING/VIRTUAL LAW FIRMS •When using online methods of elawyering, a lawyer must ensure that geographic boundaries are monitored to avoid the risk of unauthorized practice of law in a particular jurisdiction •The firm website and online advertising should clearly define the scope of the firm‟s practices and contain disclaimers explaining the reach of the firm and how technology will be used to deliver legal services online
  • 39. USING TECH TO UNBUNDLE LEGAL SERVICES •Unbundling or limited scope representation is a growing trend in the delivery of legal services as new technologies for online practice management make unbundling easier for traditional firms •Entire web-based practices can be created providing only unbundled legal services online •Document assembly and automation programs may be used to streamline the creation of legal documents for review by the lawyer
  • 40. UNBUNDLED LEGAL SERVICES BEST PRACTICES Lawyers should understand the following: •How to draft a limited scope agreement, how to define the scope of unbundled services online, using document assembly and automation programs, how to deliver clear guidance and instructions to the client on how to complete their matter, how to use fixed fee or value billing, how to integrate unbundled services into a full service firm by offering existing clients additional services online and other best practices
  • 41. UNBUNDLED LEGAL SERVICES READING LIST Kimbro, Stephanie, Limited Scope Legal Services: Unbundling and the Self-Help Client, ABA/LPM 2012 Kimbro, Stephanie, Serving the DIY Client: A Guide to Unbundling Legal Services for the Private Practioner (April 2012) – e-book
  • 42. INTERNET SECURITY •Lawyers need to understand basic Internet security in order to responsibly communicate with clients and collaborate with others online (for e.g,, how a hacker accesses unsecured data from a public hotspot and how to safely work on a wireless network) •Know best practices for securing hardware and mobile devices as well as safe practices for using web- based or cloud computing applications to protect clients‟ confidential information
  • 43. INTERNET SECURITY •Things to know: encryption, secure socket layer (SSL) and https, wireless networks, remote access to firm computers, mobile device security, security of cloud-based services, VPNs, security risks on public computers and networks, the most common online security breaches and computer vulnerabilities, enabling encryption hardware and software firewalls, password protections and disposing of hardware when upgrading
  • 44. INTERNET SECURITY FURTHER READING Legal Technology Resource Centre. Resources on Wireless Networking and Security. American Bar Association, Web. Securing Your Clients‟ Data While on the Road, David Ries and Reid Trautz http://apps.americanbar.org/lpm/lpt/arti cles/tch10081.shtml Cyberspace Under Siege: Law firms are likely targets for attacks seeking to steal information off computer systems, Ed Finkel http://www.abajournal.com/magazine/ article/cyberspace_under_siege/
  • 45. SOCIAL NETWORKING •Microblogging - Twitter •Social Networking - Facebook, LinkedIn, Legal OnRamp, Martindate Hubbell Connected •Videos – YouTube, Vimeo •Slides & document sharing: SlideShare, Docstoc, JD-Supra • Location sharing – FourSquare •Review & rating sites: Avvo, Yelp
  • 46. SOCIAL NETWORKING RISKS •Drawing the line between personal and professional networking in online social environments is difficult because the applications were created with the purpose of sharing with as many people as possible •User error: imprudent posts, breaching client confidentiality, “friending” a judge
  • 47. SOCIAL NETWORKING RISKS •At each step, the user must consider who has access to and control of the account info he or she is providing to the social media application •Applications change privacy and account options and the user will need to monitor his or settings regularly, as well as the content posted •Be wary of third party applications; may be third party applications running on social networking websites that request access to user information and contact databases
  • 48. SOCIAL NETWORING FURTHER READING • Nicole Black and Carolyn Elefant, Social Media for Lawyers: The Next Frontier, American Bar Association, 2010 • Steve Bennett, Ethics of Lawyer Social Networking, 73 Alb. L. Rev. 113 (2009) • Adrian Dayton, Social Media for Lawyers: Twitter Edition, Ark Group, 2009
  • 49. MS SHAREPOINT All about team collaboration • “War rooms” containing: shared documents, tasks, calendars, to-do‟s, integrated with Office 2010 and enabled by remote access etc…
  • 51. PBWORKS Secure, encrypted collaborative workspaces Inside and outside the firm Case management, client extranets, knowledgebases, deal rooms, document hosting and more… *Wish* it had the online/offline “Box” capability of Dropbox
  • 52. PBWORKS Craft a separate workspace for every file Upload documents, assign and track tasks, have chats and conferences and share documents Customizable security settings Craft dealrooms and share documents without email
  • 53.
  • 54. SPIDEROAK Mac, Windows or Linux “free online backup, synchronization, sharing, remote access, and storage.” „zero knowledge‟ You create your password on your own computer no trace of your original password is ever uploaded to SpiderOak
  • 55. SPIDEROAK SpiderOak cannot know even the names of your files and folders. All that SpiderOak can see: sequentially numbered containers of encrypted data. You alone have responsibility for remembering your password!
  • 56. SPIDEROAK VS DROPBOX Dropbox Spideroak price: price: • 2GB free • 2GB free • 50GB $9.95/mth • 100GB increments • 100GB $19.95/mth $10/mth or $100/yr easy to use more powerful Security Security • staff: see file names • staff: see #'d • reset password containers online • can't reset password online
  • 57. CLOUD SUPPORT QUESTIONS: Are the servers in Canada? Review SLA with Cloud provider Review Privacy statement Review Security audits
  • 58. CLOUD QUESTIONS Uptime record (reliability)? Availability (support)? Proprietary software? Bandwidth (capacity)? Reporting (feedback)? Capacity? Security: • By user, employee & in-transit
  • 59. BACKUP AND DISASTER RECOVERY Help desk hours Emergency contact list and procedures to recover data Backups and recovery • Recovery Point and Time to Restore LSBC or other regulatory compliance What is/are your role/duties?
  • 61. QUESTIONS? Nicole Garton-Jones • Heritage Law • nicole@bcheritagelaw.com • 778 786 0615 • http://twitter.com/NGartonJones • www.bcheritagelaw.com Dave Bilinsky • Practice Management Advisor • Law Society of British Columbia • daveb@lsbc.org • 604 605 5331 • http://twitter.com/ david_bilinsky • www.thoughtfullaw.com

Notas del editor

  1. Examples: Rocket Matter, Hosted Exchange/Office from MS, Google Docs and Gmail, Salesforce.com, Software as a Service (SaaS) – (examples: Gmail or Salesforce.com)This is a model of software deployment whereby the provider licenses an application to customers for use as a service on demand. SaaS software vendors usually host the application on their own web servers with access provided to the customer through her browser. Platform as a Service (PaaS)—(examples: Amazon EC2, Google App Engine or Microsoft Azure) This model delivers both hardware and software. Typically the software offering is a Web server or service that must be configured by the customer to provide the final service to her customers. In other words the Cloud provider supplies hardware, operating systems, and Application Protocol Interfaces (APIs) that allow customers to write their applications to be run on the platform being offered. Storage Cloud—(examples: Atmos and Mozy)Offers storage or backup in the cloud. Often the most straightforward Cloud offering for law firms or legal departments especially where the data can be stored in encrypted form.Infrastructure as a Service (IaaS)—(examples: Rackspace, Savvis and Terremark)Delivers hardware and base levels of software, usually including operating systems and a virtualization platform as a service. Rather than purchasing servers, software, data center space and network equipment, customers instead buy/rent those resources as a fully outsourced service.