From using technologies in a new way to embracing the changing model of how to practice law, young lawyers are in the best position to drive where the future of the legal system is headed, says Chad Burton, a keynote speaker at the recent 2017 Young Lawyers Conference and Young Lawyers Leadership Summit.
SCR 20:4.4 governs lawyers’ behaviors and obligations when they receive a document or electronically stored information that was inadvertently sent. Read about the types of behavior the rule proscribes, examples of cases in which lawyers have been sanctioned, and a new provision that directs lawyers how to respond if they receive privileged information or work product.
This annual report looks at what’s going on in the legal profession in the United States and in other parts of the world. The legal profession will survive, says the author, if the profession recognizes the change that is occurring and turns it to an advantage.
Lawyers have an ethical obligation to understand core principles surrounding the preservation and production of electronically stored information, including steps that can be taken to preserve confidential and privileged data. The author outlines some of the most relevant rules of professional conduct and ethics opinions for litigators dealing with 21st-century technology.
Do you have hundreds or thousands of emails sitting in your inbox? Does a constant flow of incoming email interrupt your day? This article, from an email management expert, explains a simple system to clear the clutter, and take control of your workday.
Lawyers who fail to recognize legal malpractice might, even with the best of intentions, end up committing it. Learn more here about identifying and adhering to the applicable standard of care for your legal work.
Cyberattacks are inevitable. Setting up effective preventive measures need not be either prohibitively expensive or time consuming, even for lawyers practicing on their own or in small firms, if you know the basics concerning ethical responsibilities and the most common types of attacks.