Small Firm Accelerator

Small Firm Accelerator offers education and networking opportunities to members of the Small Firm & Technology Section. Formerly called Starting out Solo, we have changed the name to Small Firm Accelerator to appeal to a larger group of members and offer a higher level of accessibility to our programming and events.

If you are part of a small firm or solo firm, just passed the Bar, or have been practicing for 5, 10, or 20 years and want to evolve your practice, you can benefit from the Small Firm Accelerator content and networking opportunities.  Topics include practice management, marketing, and technology.

The Small Firm & Technology Section serves members from across the state, but we realize that it is not always reasonable to travel to the live presentations and events held at the North Carolina Bar Center in Cary. To maximize the benefit to all our members, we will be live streaming and recording the live events at the North Carolina Bar Center making that content available under the Small Firm Accelerator section on the NCBA Small Firm & Technology webpage. We also encourage member firms to hold regional meetings across the state to broadcast the presentations and host networking events.  With your NCBA Small Firm & Technology Section membership, you can access these presentations at your own convenience by logging in to your NCBA account on the website.

For more information on upcoming events and newly posted content, visit https://www.ncbar.org/members/sections/small-firm-technology/.

Enduring Tedium: The Future of Fights Over Electronically Stored Information

Photo by Markus Spiske/temporausch.com from Pexels

By Sean F. Herrmann

“Seeking justice often involves enduring tedium.” It’s fitting that North Carolina’s first substantive legal decision on eDiscovery begins with this pithy observation. Employment litigators often lament the virtual hellscape of discovering electronically stored information (“ESI”). But the era when paper was king is long dead, and the fight is now firmly in the cyber world of custodians, native formats, and keyword searches.

For those in federal court, at least rules and precedent exist to help guide them through the dark ESI forest (especially those that find themselves before Chief Judge Frank Whitney in the Western District of North Carolina). North Carolina state court practitioners haven’t been so lucky. That is until this week. On Aug. 6, 2019, the North Carolina Court of Appeals issued its first substantive decision on ESI in Crosmun v. Trustees of Fayetteville Technical Cmty. Coll. (No. COA18-1054). Judge Lucy Inman, who authored the opinion, put it well: “This appeal presents this Court with our first opportunity to address the contours of eDiscovery within the context of North Carolina common and statutory law regarding the attorney-client privilege and work-product doctrine.” The Court ultimately reversed the trial court’s order granting Plaintiffs’ forensic expert direct access to Defendants’ ESI, but the way the Court got there and its recommendations on remand are far more important than the holding itself.

Read more

Hello SFT Members!

By Ashley Felton

For those of you who are new to this section, welcome! I am delighted to serve as your Chair for the upcoming fiscal year.  Following Matt Van Sickle’s and Pegeen Turner’s leadership from the last two years, I hope to continue to grow our section and add value for our members.  Our Committees are working diligently to provide content to the section for the upcoming year, as well as plan networking and CLE events.  With the NCBA’s new pricing structure allowing members to choose one free section, I am hoping we can attract new SFT members, which will hopefully bolster our presence as a section within the larger organization.  This section truly serves the needs of its members so to the extent you have suggestions or ideas, please let me know.

Our first networking event will take place on September 12, 2019 from 4:30p – 6:00p at Der Biergarten.  This event will follow our first SFT Council meeting of the fiscal year.  If you are interested in serving on one of the SFT Committees, please submit a form on our Section page.  Such Committees include:

  • CLE – led by Riana Smith
  • Communications/Blog – led by Deirdre Stephenson
  • Legislative/Ethics – led by Seth Barefoot and John Szymankiewicz
  • Membership – led by Alicia Lewis and Josh Kalish
  • Technology – led by Sarah Wesley Weaton

The SFT Committee Chairs have fantastic ideas brewing so the more the merrier!

As ideas develop and more events are planned, I will be sure to update you.  In the meantime, I encourage everyone to attend the networking event on September 12 to enjoy great food, drink, and even better company!

On behalf of myself and the remaining SFT officers, we thank you for your membership and hope to meet you soon!

Sincerely,

Ashley Felton, Chair
NCBA Small Firm & Technology Section 2019-2020

 

Enduring Tedium: The Future of Fights Over Electronically Stored Information

, ,

By Sean F. Herrmann

“Seeking justice often involves enduring tedium.” It’s fitting that North Carolina’s first substantive legal decision on eDiscovery begins with this pithy observation. Employment litigators often lament the virtual hellscape of discovering electronically stored information (“ESI”). But the era when paper was king is long dead, and the fight is now firmly in the cyber world of custodians, native formats, and keyword searches.

For those in federal court, at least rules and precedent exist to help guide them through the dark ESI forest (especially those that find themselves before Chief Judge Frank Whitney in the Western District of North Carolina). North Carolina state court practitioners haven’t been so lucky. That is until this week. On Aug. 6, 2019, the North Carolina Court of Appeals issued its first substantive decision on ESI in Crosmun v. Trustees of Fayetteville Technical Cmty. Coll. (No. COA18-1054). Judge Lucy Inman, who authored the opinion, put it well: “This appeal presents this Court with our first opportunity to address the contours of eDiscovery within the context of North Carolina common and statutory law regarding the attorney-client privilege and work-product doctrine.” The Court ultimately reversed the trial court’s order granting Plaintiffs’ forensic expert direct access to Defendants’ ESI, but the way the Court got there and its recommendations on remand are far more important than the holding itself.

Read more

Going Paperless: How Long Should I Keep Client Files?

,

By Jared Pierce

I would be lying if I said that going paperless was easy. Making the journey to a mostly digital office has been troubling in so many ways that one article would not be enough to cover the multitude of ways that my staff and I have been inconvenienced. However, of the many issues and concerns we have experienced along the way, none compare to the knee-shaking anxiety of creating a paperless practice while trying to steer clear of violating the North Carolina Rules of Professional Conduct.

Going paperless sounds fun and exciting, but the most significant misconception, in my opinion, is evaluating how much paper you have gathered over the years. Every file, intake form, retainer, background check, medical record and medical bill adds up to a verifiable mountain of paper. However, when we began discussing the need to go paperless we didn’t just sit down and create a rough outline; we spent time planning for success.

Read more

A Day In the Life Of a Beer Lawyer

By John Szymankiewicz

Me: I’ve got the coolest job ever. I’m a beer lawyer.

Literally Anyone Else in the World: Wow! That is really cool. Uh, so, er, what do you do? DWIs?

Sorry, nope. Keep your “alleged” criminal charges to yourself. I don’t do “DWIs.” In fact, I try really hard not to do any litigation at all. My practice is almost entirely transactional and, as I tell my clients, my job is to keep you in compliance and out of the courtroom. So, what do I do? Well …

Read more

What You and Your Employees Need to Know About Phishing Attacks

By Chris Michalec

Phishing is just one of many tools in a cyber hacker’s repertoire and it happens to be one of their most effective.  Through phishing, hackers dangle their bait in front of preoccupied employees who would never dream that their PC could provide an open door for a hacker.  That’s why it is so important that employees understand how phishing works, how costly it can be, and what they can do to avoid letting themselves become an unwitting accomplice to a hacker’s attack on their company.

Read more

Giving the People What They Want: The Ability To Contact Their Lawyer Even When You Aren’t At Your Desk

By Samantha Duncan

My clients have the ability to get a hold of me on the telephone, even when I’m not at my desk. Furthermore, they can even contact me when I am not even in the office. However, this does not mean that I have succumbed to breaking my golden rule of never willingly giving out my personal cell phone number to my clients. Instead, my firm uses a cloud-based phone system called RingCentral.

RingCentral allows us to access our office lines through our cell phones through the company’s app which is available for PC, Mac, Android, and iOS systems. RingCentral is not the only cloud-based phone system on the market, there are many competitors such as Grasshopper, Vonage, Nextiva, and more. These systems also give you the ability to text message your clients using your office telephone number through the app so that you do not have to break my golden rule mentioned above. Talking on the phone with a client and text messaging a client is not the only benefit of these systems, as they also allow you to fax documents over your firm’s internet connection. Bottom line is, these systems allow you to be at your “desk” in your bed, in your car, at the courthouse, or anywhere else that you are able to access the internet.

Read more

Turning On Two-Factor Authentication for Office 365

By Pegeen Turner

In the age of technology, stolen identities, compromised credit cards and all things online, technology companies like Google, Facebook, Microsoft, and others are trying to help us. These companies have come to recognize that they cannot force their users to use strong passwords and change them frequently.

Welcome to two-factor authentication.

You may have heard the term two-factor authentication and you may know it has something to do with security. It is also referred to as two-step or multi-step verification or authentication. You may even be using it if you bank online, use an Apple ID and any number of other places you access online. Two-factor authentication comes in many forms including a text message, a secondary question about when you were married or your pets name or a prompt to say YES on your phone.

What is two-factor authentication?

Some of you have probably heard about the concept but aren’t quite sure what it is and if you need it. Two-factor authentication is an extra layer of security to make sure that you are the only person who can access your online account, even if someone knows your password. It is a security feature that is available on most cloud-based programs that law firm use today including Office 365, G-Suite for Business (or Gmail), Dropbox for Business, Box.com, almost every cloud-based practice management, and document management system geared for law firms today.

Two-factor authentication will (as Google describes it) “Help keep the bad guys out of your account by using both your password and your phone.”  The process forces you to identify yourself by not only a username and password but also something that is in your physical possession, like a cell phone (that is the two-factor part).

Should I use two-factor authentication?

In short, you need it – wherever you can get it. No matter what type of account that you are using, if it has two-factor authentication, turn it on.

How do I use two-factor authentication?

The name says it all. You need two different ways (two factors) to confirm access to your account – your password and another device that you use, typically, your cell phone. The process is similar no matter which program you are setting up. Here are the basic steps:

Set up two-factor authentication. The program will walk you through the setup process and send a test message via text or phone to your cell phone.

Turn on two-factor authentication. Once the test process is complete, the program will help you turn on two-factor authentication.

Use two-factor authentication. By accessing your online account, you will be prompted for your username (email address) and password as normal. After entering the password, a secondary prompt will ask you for a response with a code, or a prompt or whatever authentication method you choose in Step #1.

Setting up two-factor authentication for Office 365

With the popularity of Office 365 and online email access, security should be a top concern for all law firms. The steps below outline the steps necessary to set up two-factor authentication (called multi-factor authentication by Microsoft) for Office 365.

If you are the Office 365 administrator, you can use the instructions here to turn on multi-factor authentication, then follow the steps below:

a. If you have Outlook open on your local computer, close Outlook.

b. Check whether your Office 365 admin has turned on multi-factor authentication for your account. If they haven’t, when you try to do these steps you won’t see the options in Office 365.

c. Log into your Office 365 email account by going to outlook.office365.com.

d. With the two-step authentication turned on, you will be prompted to “Set it up now”. Choose Set it up now.

e. How should we contact you?

a. Choose authentication phone.

b. If your prepopulated cell phone number is not correct, please put in the correct phone number.

c. Choose to “Send me a code by text message” or “Call me.” Choose whichever is more convenient for you.

d. Choose Next and Microsoft with call you or text you for verification.

Setting up an app password

Some older versions of Outlook and Apple Mail on iOS devices will require a secondary password called an app password. The steps below will help you generate your app password.

a. After verifying your contact method, a screen will appear to generate the app password.

b. Choose the copy icon to copy this password to your Clipboard.

c. If you already have Outlook on your computer, open Outlook.

d. Paste the app password in the password field.

e. Choose OK and Outlook will open as normal.
f. You are done!

NOTE: After adding two-step authentication to your Office 365 account, depending on the make and model of your cell phone, it will either prompt you to log into your Office 365 account (and prompted for a code) or use the app password above for your new phone password.

Next steps

The next time you log in to Office 365 online, you will see the two-step authentication kick in. You will be prompted to enter the code that was sent to you via text message, phone call, etc.  Enter the code you receive in the text message in the field below and choose Sign In.

With that, you will be well on your way to securing your email from “the Bad Guys.” Your email and all your client confidential email messages will now be more secure with two-factor authentication set up. Enjoy the peace of mind knowing your data is safe and sound.

Post-Project Review: How Lawyers Can Leverage Mistakes

,

By Alicia Mitchell-Mercer

Mistakes happen. They happen to brand new attorneys. They happen to attorneys who have been practicing for 30 years. Fear of reprisal can cause competent lawyers to correct and brush those mistakes under the rug so quickly that they do not take time to learn from them. They are a fact of law practice because, despite public opinion, lawyers are human. Instead of dismissing those opportunities for improvement, what if you could find a way to leverage those mistakes and make them work for you instead of against you?

 

Read more