Start Your FREE Membership NOW
 Discover Proven Ways to Be a Better Law Office Manager
 Get Our Weekly eNewsletter, Law Office Manager Bulletin,
    and MUCH MORE
 Absolutely NO Risk or Obligation on Your Part -- It's FREE!



Upgrade to Premium Membership NOW for Just $27!
Get 3 Months of Full Premium Membership Access
Includes Our Monthly Newsletter, Office Toolbox, Policy Center, and Archives
And MUCH MORE!
PROS AND CONS

Should you outsource your IT department?

It’s a question many law firm administrators face at some point, particularly when discussing workforce restructuring: Is it time to…


. . . read more

INFORMATION SECURITY

January 26 is Data Privacy Day. Learn how to safeguard your data

Do your employees how their information is collected, used, and stored by the devices, apps, and websites they use…


. . . read more

CLOUD SERVICES SECURITY

The opportunities, concerns, and challenges related to adopting cloud services

According to the New Jersey Institute of Technology, by 2017 two-thirds of all workload will be processed in cloud data centers. Will your firm’s workload be there? Or are you hesitating due to concerns about…

 

 

 

. . . read more

CYBERSECURITY

Two quick tips from a cybersecurity expert

By John W. Simek  bio
1. You are the product: default settings to “steal” your privacy data
It amazes me that nobody seems to read the terms of service or the permission settings when installing software or configuring devices. In this day of instant gratification it seems as though the normal actions are click, click, click on the “I accept” button.
That seems to be what Apple is counting on too. The latest version of Mac OS X Yosemite defaults to send your location information and search query to Apple whenever you use…

. . . read more

CYBER SECURITY

How secure is your content in cyber space?

www.Hackmageddon.com has released its timeline of the most notable cyber security breaches that occurred in the first half of October 2014. According to the…

 

. . . read more

OFFICE PROCEDURES

Use a standard calendar entry format firm-wide

Once you’ve established a policy that all calendar events are to be entered into your centralized calendar system, go one step further and create a standard entry format. After all, there’s no point having a calendar that everyone can access if only a handful of people can understand the entries.

Here’s one format you can implement:

[Professional’s initials] – [Case]: [Manner of Appearance]; [Attorney’s initials]-[scheduler’s initials]

So if Kara E. Smith’s assistant…

. . . read more

OFFICE PROCEDURES

5 benefits of rules-based calendaring software

1. Use of automated rules-based calendaring software may entitle your firm to discounts for malpractice insurance coverage. Talk to your provider; 

2. Automated rules-based systems reduce human errors; 

3. The software adjusts for local court rules and…

 

. . . read more

ELECTRONIC WORKPLACE

HR law and employee social networking

Can you discipline employees for social networking offenses?
Answer: It depends.
Explanation: Frittering away time, disclosing patient records, bad mouthing the practice and other offenses are grounds for discipline when they occur “off line.” So why should it make a difference if employees do these things online while social networking?
In theory, it shouldn’t.
The problem, of course, is that the HR laws were forged in a different era and haven’t yet caught up with the realities of social networking.
Eventually they will. But until then, you face the challenge of applying 20th…

. . . read more

EMPLOYEE BENEFITS

Some FMLA questions on using vacation time and counting to 50

Here are three questions on the Family and Medical Leave Act.
They are answered by Morganville, NJ, management consultant John McNamara.
Briefly, the FMLA requires that employers with 50 or more employees allow up to 12 weeks’ unpaid, jobprotected leave for medical and family reasons.
FMLA time on top of vacation time
A staffer returns from a two-week vacation and asks for the full 12 weeks of FMLA leave.
Can the office count the two weeks of vacation as part of the…

. . . read more

ELECTRONIC WORKPLACE

Employees fired for social networking offenses

Here are a few examples of cases in which a court or arbitrator upheld the decision to fire an employee for social network abuses. Note that the existence of a clearly written, specific social networking policy was a factor in each of these cases:…




. . . read more


(-0)