The quarterly publication of the International Legal Technology Association
Issue link: https://epubs.iltanet.org/i/549141
PEER TO PEER: THE QUARTERLY MAGA ZINE OF ILTA 26 ASK THE VENDOR IMPROVE SEARCH CAPABILITIES name . . . . . . . . . . . . . . . . . . . . . . David Kiefer company . . . . . . . . . . . . . . . . . . . . . . DocAuto website . . . . . . . . . . . . . . www.docauto.com Search components of content management systems are as mission- critical as the storage, sharing and security of these systems; however, the search components often go ignored. Providing a reliable and accurate search solution can increase productivity and ensure your users have access to relevant and up-to-date information. A healthy search infrastructure and actual user adoption of the search component are critical to the success of this business process. EVALUATE BILLING PRACTICES AND TECHNOLOGY name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Rosemary Kupfert company . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . BQE Software website . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . www.bqe.com Billing processes must be accurate, efficient and comprehensive to capture the correct information and appropriate amounts. If this doesn't happen, then your firm can suffer from lower (or no) profits, poor cash flow and more time spent with clients addressing inaccurate bills. Further, if your law firm doesn't thoroughly examine and strengthen its billing processes, it is jeopardizing its ability to keep up with changing trends and client preferences. It could also lose an important competitive advantage. Law firms must also be ready to thoroughly evaluate the technology that supports their billing. Is the current system flexible enough to accommodate different billing arrangements? Can attorneys use apps to record time from their smartphones? Does the software create invoices in the format the client needs? Taking the two-pronged approach of evaluating billing processes along with the technology that supports it can lead to long-term rewards and greater profits. LEVERAGE THE FIRM'S COLLECTIVE KNOWLEDGE name . . . . . . . . . . . . . . . . . Mark R. Torchiana company . . . . . . . . . .Courtroom Insight, Inc. website . . . . . . www.courtroominsight.com Firms often fail to leverage the collective knowledge and experience of their members and share critical information about the experts, arbitrators and judges who directly affect case outcomes. This failure significantly increases litigation risk for the firm's clients. In recent years, many firms have made great progress to collect and index useful documents and member expertise into searchable central repositories. However, attorneys in those firms often still rely upon the archaic system of circulating email messages to solicit information. It's time to develop a better process for capturing and sharing information about expert witness performance, arbitrator experiences and judicial appearances to greatly increase litigation preparedness and your probability of success. SECURE THIRD-PARTY REMOTE ACCESS name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Justin Strackany company . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SecureLink, Inc. website . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .www.securelink.com Sixty-three percent of security breaches involve third-party access to a customer's network. While the trend toward acquiring new vendor services remains continuous, the risks associated are evolving, and a firm's business process must evolve simultaneously. Firms should: • Integrate remote access methodologies into the contract when the product is purchased, before there is an issue • Never share network credentials — vendors and privileged users should be given single sign-on access methods that prevent them from ever knowing the credentials they are using • Use two-factor authentication to verify the individual and confirm they still work for the vendor, and restrict access to only approved systems • Monitor and audit vendor remote access to ensure accountability and compliance