Lkm 2011
Upcoming SlideShare
Loading in...5
×
 

Lkm 2011

on

  • 250 views

Technological intervention in Legal Knowledge Management

Technological intervention in Legal Knowledge Management

Statistics

Views

Total Views
250
Views on SlideShare
241
Embed Views
9

Actions

Likes
0
Downloads
0
Comments
0

2 Embeds 9

http://www.linkedin.com 7
https://www.linkedin.com 2

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Lkm 2011 Lkm 2011 Presentation Transcript

  • LEX WITNESS
    • Legal Knowledge Management, 2 nd Edition
    • 8-9 SEPTEMBER,2011, MUMBAI.
  • Technological Interventions for LKM
    • BY
    • K.Anandavasagan,
    • Head Legal
    • DHFL
  • Technological Interventions for LKM
    • Document management – Work Product retrieval (profiling and searching)
    • Need to develop rules-based searches to identify specific types of work and transactions, critical documents, etc.,
    • Data Management and Data Security – Issues and concerns
    • E-mail Platforms- Single e-mail platforms
    • Software packages across all offices for scheduling, time and billing, accounting and invoicing.
  • Document Management
    • Law Firms/Legal Offices today have so much documents that flows in and out of the office that they need an effective system in place to manage all this data in a way that makes sense and from which all employees benefit.
    • Document Management is becoming more and more important as the volume of data that a company deals with on a daily basis needs to be sorted, delivered, and utilized.
    • For small firms this isn’t an issue as they can easily manage and store their data on computer servers. However, large firms have too much data to store in one place so that all employees can access it when necessary. This is where data management becomes crucial to the company.
  • Document Management – Work Product retrieval –Profiling
    • Profiling:
    • Every year, Advocates/Law firms generate thousands of documents that must be archived for future reference.
    • Law firms typically use a DMS to accomplish this task. Document profiling enhances the value of a law firm’s document collection by profiling and classifying documents automatically, making them available for reference and re-use on demand.
    • It also identifies documents that require special security measures; identifies and eliminates duplicate work product; and allows accounting and leadership personnel to track trends across profile data to provide insights into individual, practice area and firm performance.
  • Document Management – Work Product retrieval -searching)
    • Searching:
    • Find relevant prior work product, such as case-laws, memos, briefs, motions filed, pleadings, depositions, deal documents, etc., to help complete a research or drafting assignment , together with cases and codes, news and business sources, analytical content, and the authoritative verification
  • Data Management and Data Security – Issues and concerns  
    • Date Management:
    • There are many ways to achieve data management in these days of high technology. One of the most common methods of data management is to purchase software (DMS) that does the managing for you.
    • There are software available that will organize data into categories and divisions that have been designated by the company.
    • This software can be installed on as many company computers as needed so that no data has the potential to get lost.
  • Data Management and Data Security – Issues and concerns
    • Data Security :
    • Data security is commonly consist of three properties:
    • Confidentiality,
    • Integrity, and
    • Availability,
    • confidentiality is controlling who gets to read information,
    • integrity assures that data and programs are changed only in a specified and authorized manner, and
    • availability assures that authorized users have continued access and resources.
  • Data Management and Data Security – Issues and concerns
    • Issues and concerns:
    • The Top 6 concerns are as :
    • Limits on Scalability,
    • Constantly changing landscape
    • Data Recovery
    • Increasing Data Volumes
    • Lack of trained people & Inefficient use of
    • Resources
    • Decentralized Data Management
  • E -mail Platforms- Single e-mail platform for a Firm’s communications and a network of dedicated lines connecting its offices
    • Single E-mail Platform:
    • Legal business is built on relationships as much as it is built on information.
    • Today every communication by email or con-calls or chatting.
    • Single e-mail platform will be safe, secure and easily accessible.
  • E-mail Platforms- Single e-mail platform for a Firm’s communications and a network of dedicated lines connecting its offices
    • Trojan horses, viruses and worms are the most typical attacks on the integrity of data that is stored in systems and communicated across networks.
    • There are three first level of defenses :
    • Passwords,
    • Firewall technology and
    • Encryption.
  • Thank you Contact details: [email_address] . [email_address] Mob:09322185783