Requests for information about validity of will

12 December, 2018

Have you been asked to provide a statement as to the circumstances surrounding the preparation and execution of a will and to also provide copies of the will file? Did the request refer to Larke v Nugus? Larke v Nugus is an English case concerning resistance to a grant of probate of a will on […]

Continue Reading

Retainer going nowhere? Don’t let it drift!

30 November, 2018

What steps should you take to ensure your potential new client provides complete instructions? What if the proposed work is complicated by the involvement of an intermediary purporting to have the client’s authority, such as a spouse, child, relative, friend or another advisor? It is risky to just let the matter drift without proactively managing […]

Continue Reading

When seven years isn’t long enough

16 November, 2018

How long should you keep your file after a matter has concluded? Some practitioners routinely destroy files seven years after closure with client authorisation. In some instances experience tells us you should keep files for longer, especially where a cause of action can accrue more than six years after the retainer has ended. Retaining files […]

Continue Reading

Addition to Local Govt. Act 1989 (Vic): potential effects of cladding rectification agreements and charges on land

9 November, 2018

  New service charges may be placed on land pursuant to a new part 8B in the Local Government Act 1989 (Vic) inserted by the Building Amendment (Registration of Building Trades and Other Matters) Act 2018 (Vic). The new part came into operation on 30 October 2018 and provides for: councils to enter into agreements […]

Continue Reading

Fraudsters: don’t let them in!

26 October, 2018

If a complete stranger appeared at your door and invited themselves into your home, would you let them in? Probably not. Then why do so many people open the door to cyber-criminals on their computers? A common misconception is that most cyber-crimes involve hacking: the use of computer technologies to gain access to computers and […]

Continue Reading