Issue link: https://epubs.iltanet.org/i/45522
"The practice of vetting conflicts of interest has become more complex." must all be considered when deploying a complete and secure solution. Counsel should evaluate providers to ensure they offer top-tier security that integrates seamlessly with all mobile devices being used. Data encryption, as well as authentication, authorization and transmission security should combine to provide a layered approach that protects sensitive data contained in mobile business intelligence applications. NEW BUSINESS INTAKE AND CONFLICTS MANAGEMENT Lawyers have an ethical duty to uphold the interests of their clients and avoid representation that compromises this loyalty. Although fairly simple in principle, the practice of vetting conflicts of interest has become more complex as law firms operate globally, representing an increasingly broad constituency. The rise of mergers and acquisitions within firms and corporations has also led to conflicts that might not have been foreseen at the outset of the 10 Risky Business ILTA White Paper matter; an increase in lateral hiring across firms further complicates the issue. Legacy Systems: Traditional approaches to conflicts management have simply not kept up with the complexity and speed of today's legal practice. Legacy systems are based on relational databases that use rudimentary search technology based on keywords and wildcards, requiring conflicts analysts to embed all possible permutations of parties, affiliates and subsidiaries in the search query strings. The resulting conventional conflicts reports are slow to produce, unwieldy, difficult to process and rigid in structure, as well as polluted with false hits. Older conflicts systems do not capture critical communications that surround the conflicts process, resulting in a manual tracking system that has the potential for an incomplete audit trail. Another shortfall of legacy systems is their inability to understand meaning beyond the superficial metadata level.