Issue link: https://epubs.iltanet.org/i/45522
SIX KEY AREAS OF INTELLIGENT LEGAL INFORMATION MANAGEMENT automated clustering and visualization can help increase review speed dramatically. Processing and Production: In addition to the review process, data must be delivered to the review platform in near-native form, in the form of load files and/or produced for opposing counsel or an investigatory agency. Processing and production tools can provide additional cost savings to counsel by eliminating fees for outsourcing. REAL-TIME, POLICY-BASED MANAGEMENT The realities of a constantly connected and regulatory- laden world are further complicated by the explosion of information growing at unprecedented rates. Gartner predicts that by 2013, video and audio will constitute more than 50 percent of all business content. As a result, organizations need a way to unify and anchor all of their processes to better comprehend the meaning of any type of content, regardless of format, language or location. The sheer volume of unstructured information such as email, instant messages, office documents, SharePoint environments and voice recordings — all unstructured content stored outside a formal database — signals the need for new, more automated and integrated approaches to proactively complying with legal and regulatory guidelines by enforcing policies in real time. Through automation, organizations can transform slow, reactive processes into those that reduce redundancy and risk. The enforcement of corporate and regulatory requirements can be simplified by deploying technology that uses an intelligent, policy-based management approach for information security and compliance, enabling counsel to protect sensitive information through data masking, muting, triggers and alerts. Systems that can understand the meaning of all content in the enterprise can also leverage that intelligence to enforce policy in real time, based on the context and concepts held within the information. Policy-based management is best tackled with a solution that enables the organization to: • Understand and act on all types of content, including audio recordings, electronic communications and customer-sensitive interactions to prevent malfeasance before it happens; • Monitor server and desktop events and take the appropriate action on the interactions based on predefined policies and an understanding of the interaction; • Focus on all types of social media transactions in a completely invisible manner for the end user; • Enforce ethical walls integrated with the organization's security guidelines; • Enable compliance with industry regulations, data privacy laws and litigation requirements by understanding the meaning of employee interactions with customers, websites or desktop applications; and • Provide a level of assurance to customers, regulatory and legal agencies that the organization is operating ethically and responsibly. www.iltanet.org Risky Business 13