Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Lkm 2011


Published on

Technological intervention in Legal Knowledge Management

  • Be the first to comment

  • Be the first to like this

Lkm 2011

  1. 1. LEX WITNESS <ul><li>Legal Knowledge Management, 2 nd Edition </li></ul><ul><li>8-9 SEPTEMBER,2011, MUMBAI. </li></ul>
  2. 2. Technological Interventions for LKM <ul><li>BY </li></ul><ul><li>K.Anandavasagan, </li></ul><ul><li>Head Legal </li></ul><ul><li>DHFL </li></ul>
  3. 3. Technological Interventions for LKM <ul><li>Document management – Work Product retrieval (profiling and searching) </li></ul><ul><li>Need to develop rules-based searches to identify specific types of work and transactions, critical documents, etc., </li></ul><ul><li>Data Management and Data Security – Issues and concerns </li></ul><ul><li>E-mail Platforms- Single e-mail platforms </li></ul><ul><li>Software packages across all offices for scheduling, time and billing, accounting and invoicing. </li></ul>
  4. 4. Document Management <ul><li>Law Firms/Legal Offices today have so much documents that flows in and out of the office that they need an effective system in place to manage all this data in a way that makes sense and from which all employees benefit. </li></ul><ul><li>Document Management is becoming more and more important as the volume of data that a company deals with on a daily basis needs to be sorted, delivered, and utilized. </li></ul><ul><li>For small firms this isn’t an issue as they can easily manage and store their data on computer servers. However, large firms have too much data to store in one place so that all employees can access it when necessary. This is where data management becomes crucial to the company. </li></ul>
  5. 5. Document Management – Work Product retrieval –Profiling <ul><li>Profiling: </li></ul><ul><li>Every year, Advocates/Law firms generate thousands of documents that must be archived for future reference. </li></ul><ul><li>Law firms typically use a DMS to accomplish this task. Document profiling enhances the value of a law firm’s document collection by profiling and classifying documents automatically, making them available for reference and re-use on demand. </li></ul><ul><li>It also identifies documents that require special security measures; identifies and eliminates duplicate work product; and allows accounting and leadership personnel to track trends across profile data to provide insights into individual, practice area and firm performance. </li></ul>
  6. 6. Document Management – Work Product retrieval -searching) <ul><li>Searching: </li></ul><ul><li>Find relevant prior work product, such as case-laws, memos, briefs, motions filed, pleadings, depositions, deal documents, etc., to help complete a research or drafting assignment , together with cases and codes, news and business sources, analytical content, and the authoritative verification </li></ul>
  7. 7. Data Management and Data Security – Issues and concerns   <ul><li>Date Management: </li></ul><ul><li>There are many ways to achieve data management in these days of high technology. One of the most common methods of data management is to purchase software (DMS) that does the managing for you. </li></ul><ul><li>There are software available that will organize data into categories and divisions that have been designated by the company. </li></ul><ul><li>This software can be installed on as many company computers as needed so that no data has the potential to get lost. </li></ul>
  8. 8. Data Management and Data Security – Issues and concerns <ul><li>Data Security : </li></ul><ul><li>Data security is commonly consist of three properties: </li></ul><ul><li>Confidentiality, </li></ul><ul><li>Integrity, and </li></ul><ul><li>Availability, </li></ul><ul><li>confidentiality is controlling who gets to read information, </li></ul><ul><li>integrity assures that data and programs are changed only in a specified and authorized manner, and </li></ul><ul><li>availability assures that authorized users have continued access and resources. </li></ul>
  9. 9. Data Management and Data Security – Issues and concerns <ul><li>Issues and concerns: </li></ul><ul><li>The Top 6 concerns are as : </li></ul><ul><li>Limits on Scalability, </li></ul><ul><li>Constantly changing landscape </li></ul><ul><li>Data Recovery </li></ul><ul><li>Increasing Data Volumes </li></ul><ul><li>Lack of trained people & Inefficient use of </li></ul><ul><li>Resources </li></ul><ul><li>Decentralized Data Management </li></ul>
  10. 10. E -mail Platforms- Single e-mail platform for a Firm’s communications and a network of dedicated lines connecting its offices <ul><li>Single E-mail Platform: </li></ul><ul><li>Legal business is built on relationships as much as it is built on information. </li></ul><ul><li>Today every communication by email or con-calls or chatting. </li></ul><ul><li>Single e-mail platform will be safe, secure and easily accessible. </li></ul>
  11. 11. E-mail Platforms- Single e-mail platform for a Firm’s communications and a network of dedicated lines connecting its offices <ul><li>Trojan horses, viruses and worms are the most typical attacks on the integrity of data that is stored in systems and communicated across networks. </li></ul><ul><li>There are three first level of defenses : </li></ul><ul><li>Passwords, </li></ul><ul><li>Firewall technology and </li></ul><ul><li>Encryption. </li></ul>
  12. 12. Thank you Contact details: [email_address] . [email_address] Mob:09322185783