by PeterK

Lawyer Reviewing Jurors’ Internet Presence

May 6, 2014 in ABA, Internet Use, Social Networking by PeterK

A lawyer may review a juror’s or potential juror’s Internet presence, which may include postings by the juror or potential juror in advance of and during a trial, but a lawyer
…read more

by PeterK

Lawyers’ Use of Deal-of-the-Day Marketing Programs

November 6, 2013 in ABA, Advertising, Conflicts, Disclaimers, Internet Use, Websites by PeterK

Lawyers may use deal-of-the-day or group-coupon marketing programs as a way  to sell goods and services. However, lawyers hoping to market legal services using these programs must comply with various
…read more

by PeterK

Final Ethics 20/20 Resolutions

February 20, 2013 in ABA, UPL by PeterK

On February 11, 2013, the ABA Commission on Ethics 20/20 filed revised resolutions 107 A & 107 B relating to limited practice authority for foreign In-House Counsel.

by PeterK

Lawyers who electronically record a conversation without the knowledge of the other party to the conversation does not necessarily violate the Model Rules

August 31, 2006 in ABA, Electronic Files by PeterK

A lawyer who electronically records a conversation without the knowledge of the other party or parties to the conversation does not necessarily violate the Model Rules. See ABA Formal Opinion
…read more

by PeterK

ABA Litigation section e-Discovery standards posted

April 23, 2004 in ABA, e-Discovery by PeterK

The American Bar Association’s Section of Litigation’s Task Force on Electronic Discovery Standards posted updated Civil Discovery Standards. The Task Force is soliciting comments, and intends to present the revised
…read more

by PeterK

ABA Technology Resource Center’s 2002 survey concludes that small firms and solo practitioners using Windows operating systems are most vulnerable to hacking

January 11, 2004 in ABA by PeterK

The ABA Technology Resource Center’s 2002 survey (released in late 2003) concludes that small firms and solo practitioners using Windows operating systems are most vulnerable to hacking and other computer
…read more