CAFC Chronicles: Costly Tales of Claim Construction Fails
Â
Intentional Technology Management
1. Jared D. Correia, Esq.
Assistant Director, Senior Law Practice Advisor
Massachusetts Law Office Management Assistance
Program
2. ï§ âThey Had Relationsâ
ï§ How Do You Relate to Technology?
ï§ How Does the Technology within Your Office Interact?
ï§ How Do You Work under a Framework?
ï§ The Digital Native is NOT (NECESSARILY) an Advantaged Law Firm
Owner/Employee
ï§ Competence as an Attorney, includes Competence in Legal Tech
ï§ The ABA Says So, Thatâs Who
Maintaining Competence
[8] To maintain the requisite knowledge and skill, a lawyer should keep abreast of changes in the law
and its practice, including the benefits and risks associated with relevant technology, engage in
continuing study and education and comply with all continuing legal education requirements to
which the lawyer is subject.
3. ï§ Intentional Law Firm Management
ï§ Needs vs Wants vs Naked Desires
ï§ Establishing Buy-In
ï§ Vetting
ï§ Choice Matrices
4. ï§ Subscription Service vs Annual Payment vs One-Time Payment
ï§ Premise-Based v Virtual
ï§ Virtual Private Network
ï§ Remote Control Access
ï§ SaaS
ï§ DaaS
5. ï§ Master Case List/Matter Manager
ï§ Holistic Practice Dashboard
ï§ Email/Calendar Integration
ï§ Document Management
ï§ Time + Billing/Accounting
ï§ Apps
7. ï§ File Structure
ï§ Naming Conventions
ï§ Version Control
ï§ Access Control
ï§ Collaboration
ï§ Loading Contact Information
ï§ Clause Library
ï§ Increase: Efficiency
8. ï§ Contemporaneous
ï§ Complete
ï§ Compelling
ï§ Stand-Alone vs Built-In/Integrated
ï§ Manual vs Automated
ï§ Generic Business vs Law Firm Specific
ï§ Operating Accounting
ï§ Trust Accounting
9. ï§ Business Plan
ï§ Marketing Plan
ï§ Budget
ï§ Revenue Projections
ï§ Non-Narrative
ï§ Integration w/ Calendar + Tasks
ï§ Scheduled Review
ï§ Return on Investment
ï§ Revision
10. ï§ Massachusetts Rules of Professional Conduct, 1.6
ï§ Massachusetts General Laws Chapters 93H + 93I, 201 CMR 17
ï§ Encryption
ï§ Vetting
ï§ Contracting
ï§ WISP
ï§ BYOD
ï§ Simple, Personal Security Safeguards
ï§ Strong Passwords
ï§ Pre-Encryption
ï§ PDF