Blogs

Be the first person to like this post.
Every few months someone comes to the Information Management Content team and asks why we're not doing programming on closed document management systems or "pessimistic" security, where access to client/matter documents is restricted to only those assigned to that matter. Firms who are used to an open DMS may need to rethink their collaboration and knowledge management strategies. ILTA members and our vendor sponsors have been generating content on that topic for several years, but it's not always easy to find, so we thought we'd collect it in one place.  We don't have any easy answers, but below are some links help you consider the questions in fresh ways. ...
0 comments
Be the first person to like this post.
We've all heard it before from our users. " Not another email from the HelpDesk " or " Anytime I see an email from the HelpDesk, I just hit delete "  While communication is paramount, at what point do we over communicate to our users.  And, do we need to communicate everything.   Not every incident requires widespread disclosure.  One could argue that it is better to over communicate, however, I wonder if sending too many emails delivers a wrong message.  We want our users to feel confident that our systems are online and without issues.  On the flip side, proactively letting our users know about the incident can go a long way to build trust. Perhaps email is ...
0 comments
Be the first person to like this post.
A Corporate Legal Client Perspective Using the example of a routine litigation matter, staffing first occurs within the law department. Generally, the size and complexity of a given legal department will dictate to what extent internal teams of attorneys and paralegals are dedicated to specific business units, divisions, or departments of the greater organization. One of the first questions for the internal team is whether or not any outside legal service providers are necessary; standardized processes around early case assessment often enables the team to quickly resolve matters without incurring any external defense spend whatsoever. ...
0 comments
Be the first person to like this post.
Excel always prompts me to SAVE! But I didn’t DO anything! File > Options > Advanced, under General make sure that Ignore other applications is not ticked.   https://support.microsoft.com/en-us/help/274500/-save-changes-in-filename-prompt-even-if-no-changes-are-made   Symptoms When you close a workbook in Microsoft Excel, you may be prompted to save changes to the workbook even if you have not made any changes Do you want to save the changes to Filename.xls ? Cause This behavior occurs when something in the file has changed. Many times the user doesn't realize there are elements in the file that have been updated or calculated. ...
0 comments
Be the first person to like this post.
​ How and why are KM priorities changing? This was the topic of an ILTA virtual roundtable I moderated on July 6, 2017. I report here on the survey administered in advance and the flavor of the discussion (as moderator, I was not able to take good notes). An appendix contains survey results we did not have time to discuss.  The panelists were: Jason Barnwell ,  Assistant GC for Law Firm Engagement Strategy, Microsoft Camille Reynolds , Senior Director of KM, Fenwick & West Rich Robbins , Director of KM, Sidley Austin KM Priority Survey We opened with poll results on KM priorities. The poll was completed by 39 of 115 registrants; ...
0 comments
6 people like this.
​While it did not receive a significant amount of coverage in the legal technology press, cloud-based document management company NetDocuments took a significant step forward when it was acquired by Clearlake Capital in early March.  Once the dust settled, I talked to Matt Duncan, NetDocuments’ CEO and Marriott Murdock, Senior Director of Marketing, about how the deal came about, and what it means for NetDocuments customers. “It's been exciting.  We were thrilled to find a partner like Clearlake Capital,” Murdock said.  “There were others in the mix, there were several offers on the table,” he says, but the Clearlake deal “was the best in terms of continuing ...
0 comments
Be the first person to like this post.
Deleting All Fields in a Document If you want to remove all the fields quickly in a document, it is easy to do using the Replace feature. Press Alt F9 to display all the field codes in the document. Click on the Home tab and click on Replace in the Editing group. In the Find What box, type ^d (make sure you use a lowercase d). This is the code to indicate "any field." Make sure the Replace With box is empty. Click on Replace All . All the fields are now delete
0 comments
Be the first person to like this post.
Last week members discussed conflicts clearing policies, staying abreast of security issues and more. Jump to the “Something Extra” section for blah. Explore curated sources on these topics including some from ILTA’s treasure chest. Conflicts Conflicts – the name itself is a bit of a kill joy but we all know that without this important function in a law firm, the business would face a much greater kill joy. Speed, cautiousness and accuracy are needed. A policy and workflow process can assist with the contradictions of speed and cautiousness. The fall 2016 Peer to Peer article, “The Business of Avoiding Business Conflicts” offers best practices ...
0 comments
1 person like s this.
ILTA’s Information Management Content Committee recently conducted an informal survey regarding eDiscovery certifications.  We thought you would appreciate a brief summary of the results. A total of 37 respondents completed the survey, with the vast majority of respondents coming from the law firm environment with significant years (10+) of experience in the industry.  When asked what certifications were held by the respondents, roughly one-third named CEDs and another handful indicated they were Relativity Certified Administrators.  Interestingly, almost 75% of the respondents named other certifications, primarily software-specific certifications including ...
0 comments
Be the first person to like this post.
Kate Boyd of Kira Systems has blogged about ILTA's recent London event   on the subject of machine learning: Kira Systems recently had the pleasure of sponsoring an ILTA Lunch and Learn session, hosted by Clyde & Co in London, UK. In this session, moderated by Richard Tromans of Artificial Lawyer, a panel of Kira customers, discussed how Kira has helped their respective firms optimize legal service delivery, be more competitive through the use of technology and meet client demands more effectively. The session kicked off with a quick discussion of the shifting legal landscape, the different technologies law firms might consider as part of their ...
0 comments
2 people like this.
I have absolutely no statistics to back this up, but I am going to go ahead and confidently assert that there is a greater proportion of completionists within the population of video game playing lawyers than there are in the video game playing population at large.  A completionist, for those of you who are unfamiliar, is a gamer for whom winning a game is not nearly enough. Within the game, a completionist must achieve every available goal, receive every award, speak to every character, and slay every monster.  A game cannot be put down by a completionist until it has been ‘completely completed’.  Anything less is…well, incomplete. I’m confident in the ...
0 comments
Be the first person to like this post.
Printing a Result Set in NetDocuments If you are in a workspace or have performed a search, it is often helpful to be able to print that set of results or to export it to Excel.  You can do that easily in NetDocuments!   Click Search Result Options (or Workspace Filter Options or Folder Options , depending on what type of list is displaying at the time). Select Print List . The following screen will appear: Select the format of the report – Formatted report (printable) or Delimited ASCII (CSV) (which will likely open in Excel). Click O
0 comments
Be the first person to like this post.
Q.)  I have one table, that should really be two separate tables. How do I separate them, without creating a second table, and doing a lot of copying and pasting?   A.)  If your table is currently empty, you're ready to break it into two.   If not, you'll first have to split the data into two halves. That is, all the data for one table on top and all the data for the other on the bottom. Now, that may take some work. It all depends on your new thoughts for organizing your tables and how it was set up previously. If you're really lucky, you may not have to rearrange anything or maybe you'll just need to complete a data sort.   - Start by placing ...
0 comments
1 person like s this.
Life Cycle of a Matter – Setting Yourself up to Not Fail   So why didn’t I title this “Setting Yourself up to Succeed?” When it comes to the Client Intake steps of matter creation, “success” is measured by getting through a repetitive process as quickly and efficiently as possible, so that the legal teams can move on to the client service (and revenue) generating Step 3: Delivering the Work . But those that deliver the work may not see the setup as directly tied to the success of the legal work; they should see it as a transparent administrative function.  And the only time they’ll really notice the client intake function is if it fails. ...
0 comments
2 people like this.
Yesterday the latest ransomware, Petya, took center stage. Do you have a meeting invite to discuss security with the leaders of your organization? Review ILTA’ ransomware resources. Jump to the “Something Extra” section tips on career growth advice from the Women Who Lead. Explore curated sources on these topics including some from ILTA’s treasure chest. Ransomware Resources As you prepare for that meeting with your organization’s leaders, look at recent ILTA resources on ransomware and security practices to make certain your i’s are dotted and your t’s are crossed. Anatomy of a Ransomware Attack (from the recent LegalSEC Summit (login required) ...
1 comment
Be the first person to like this post.
Assigning Shortcut Keys to Styles If there are some styles that you use frequently, it may be time-saving to assign a shortcut key to those styles following the steps below. Click on the Home tab and click on the Styles group dialog box launcher (the small arrow in the lower-right corner of the Styles group) to open the Styles pane. Hover the mouse over the name of the style. A drop-down arrow should display to the right of the style name. Click on the down arrow and choose Modify . Click on Format and then choose Shortcut key . Press the key combination you want to use for this style. If any current assignments for that key combination ...
0 comments
1 person like s this.
Last week members discussed budgeting for security and more. Jump to the “Something Extra” section tips on finding just the right sessions for you at ILTACON. Explore curated sources on these topics including some from ILTA’s treasure chest. Spending on Security We all know we need to invest in security. How do we find the balance of sufficient security without exceeding the budget? How do we know what to propose for a reasonable budget amount? Skip Lohmeyer, ILTA Board Member and Treasurer, spoke at the LegalSEC Summit this month. He provided a terrific spreadsheet for prioritizing security spending in “Budgeting and Prioritizing: A Decision Matrix ...
0 comments
Be the first person to like this post.
​Hello ILTA friends, I was leading an ILTA Emerging Tech roundtable call recently and Surface peripherals came up.   One thing we discussed was the Brydge keyboard for the Microsoft Surface Pro 3 & 4.      I got one and share with you my experience with it. The keyboard has a few models -  The Brydge 12.3 with a $150 price tag and the Brydge Pro 12.3 with a $300 price tag and features and integrated 128GB high speed SSD card (there also French and German keyboards available on the Brydge website).  I chose the standard model and have been using it as my primary keyboard for the past week.  Pairing:  I paired it to Bluetooth easily and had complete control ...
0 comments
Be the first person to like this post.
Disable Feature That Adds a Pen/Paper Icon to Highlighting in Nuance In Nuance, click File , Options . Click Comments , Commenting .  The following screen will appear: Make sure that the only box checked is the first one. Click OK . NOTE:  If you need to fix this in an existing document, you need to follow these directions, delete the highlighting, and re-highlight. Submitted by Denise Ash | Training Manager | Jackson Kelly PLL
0 comments
Be the first person to like this post.
If you were unable to attend the 2017 LegalSEC Summit in DC this past week, or attended and had to choose between the great sessions being offered, we've now uploaded the recordings and presentation materials to the LegalSEC Resource Library under the 2017 LegalSEC Summit folder .  Also included are the materials from the pre-summit workshops.  Please note that due to the nature of the content - the access to the materials and recordings will be restricted to members only so members must be logged in when clicking on the links below. The list of sessions (and materials as they become available) for this year are below: Pre-Summit Workshop ...
0 comments