Corporate Law Office Necessities Natashia Johnson Intro to Legal Technology Professor B Grim August 30, 2009.

Slides:



Advertisements
Similar presentations
A Reliable and Secure Network TM105: ESTABLISHING SANE TECHNOLOGY POLICIES FOR YOUR PROGRAM.
Advertisements

Online Learning and the Laptop Initiative Hidden Valley High School Roanoke County Public Schools 2006.
Materials Prepared by Kelly Bulsak Presented by Carol L. Schlein Newark NJ February 22, 2013.
CLEARSPACE Digital Document Archiving system INTRODUCTION Digital Document Archiving is the process of capturing paper documents through scanning and.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Case Franchise Support & Training. Case Support Who? Who do I call for support? What? What types of questions can be answered by the corporate support.
Computing in the Modern World
Data Storage and Security Best Practices for storing and securing your data The goal of data storage is to ensure that your research data are in a safe.
1 Legal-Specific Practice Management Software in 2010: Demo of Three Leading Software Susan L. Traylor, Practice Management Advisor, Law Office Management.
CONDO MANAGER The Leader in Association Accounting and Management Software Mailing Address: P.O. Box Charlotte, North Carolina Web Site
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
COMPUTER CONCEPTS Computer Information Systems. COURSE COMPETENCIES Explain the functions of computer system components. Describe the information processing.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Living in a Digital World Discovering Computers 2011.
IS Organization Peter E. Lesser Kraft Kennedy & Lesser (212) LawNet 2001.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Life Beyond Pro-Track Tools, Tricks and Tips to keep your SUCESSFUL Speaking business humming. LeLes Leslie Canham, CDA, RDA.
Legal Administration and Technology ©2007 Thomson Delmar Learning. ALL RIGHTS RESERVED. Chapter 2 Practical Law Office Management, 3 rd Edition, Thomson.
Setting Up Your Home Office: Equipment Home Office Equipment: Computer (Laptop) Dual Monitors Scanner & Printer High Speed Internet Get the fastest speed.
Protecting ICT Systems
Microsoft Office 2010 Introduction to Computers and How to Purchase Computers and Mobile Devices.
Calendaring, Docket Control, and Case Management Chapter 7 Practical Law Office Management, 3 rd Edition, Thomson Delmar Learning ©2007 Thomson Delmar.
Working for a hospital at home (Teleworking). Teleworking Home working or teleworking for hospitals staff is the process where they work from home using.
Introduction to Windows 7. Desktop Maximize, Minimizing, and Restoring.
HOME-BASED AGENTS Welcome to Unit 7. Review of unit reading material from textbook: Travel Career Development 8 th ed. Authors: Gagnon,P. & Houser, S.
Logistics and Systems Rabby Q. Lavilles. Supply chain is a system of organizations, people, technology, activities, information and resources involved.
Objectives Overview Identify the qualities of valuable information Describe various information systems used in an enterprise Identify the components of.
Explain the purpose of an operating system
THE CVR NETWORK. The CVR Local Area Network (LAN)  The purpose of the network is to enhance productivity, provide users with access to resources, and.
Software Writer:-Rashedul Hasan Editor:- Jasim Uddin.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Business Software What is database software? p. 145 Allows you to create, access, and manage data Add, change, delete, sort, and retrieve data Next.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Networks. A network is formed when a group of computers are connected together. Computers in a Local Area Network (LAN) are fairly close together, generally.
Unit 8: Specialty Legal Software. Topics for Seminar Assignments this week LexisNexis Westlaw Special law firm management software SmartDraw.
University Health Care Computer Systems Fellows, Residents, & Interns.
Leveraging Technology to Protect & Grow Your Business… Could Your Business Survive a Disaster? Presented by Dan Jenkins, Vice President, eAgency Systems.
Your Interactive Guide to the Digital World Discovering Computers 2012.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
As a student in the NCCVT school district, you are privileged to have access to your own individual account on the District network. Your account.
IT tools to communicate By Suleman Kalam. Podcast What is Podcasts? A podcasts is a downloadable media file which can be downloaded into many electronic.
April 28, A shared commitment to provide the most effective education to all students so they live successful lives. In order to accomplish the.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Introduction TO Network Administration
Windows Small Business Server 2003 R2 Powering Small Businesses.
SOFTWARE. Software… Instructions that are stored electronically that tell the computer what to do.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Georgia Legal Services Program THE VIRTUAL LEGAL SERVICES OFFICE.
Chapter 19 Basics of Computers. Chapter 19 examines computer hardware and the software19 programs businesses use.
RECORDS MANAGEMENT Judith Read and Mary Lea Ginn Chapter 12 Electronic Media and Image Records 1 © 2016 Cengage Learning ®. May not be scanned, copied.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
DISCOVERING COMPUTERS 2018 Digital Technology, Data, and Devices
Technology Department Annual Report
Common Methods Used to Commit Computer Crimes
CORPORATE PROFILE MUSTARD SEED SYSTEMS CORPORATION
Store, Share, Sync and Collaborate
SCF:113, Sec 65, Phase-11, Mohali (Chandigarh)
System And Application Software
Unit# 5: Internet and Worldwide Web
Unit 4 IT Security Kerris Davies.
G061 - Network Security.
Presentation transcript:

Corporate Law Office Necessities Natashia Johnson Intro to Legal Technology Professor B Grim August 30, 2009

Building For Success Technology can be a powerful partner in a law office. What type of Hardware and software is needed? What areas need to be addressed? What are the basic needs for the Corporate Legal Department (CLD)? What will enhance the productivity of the CLD? Where could we be in the years of growth?

Top Ten Areas to Address Case Management Case Management Document Assembly Document Assembly Document Management Document Management Billing and Accounting Billing and Accounting Software Software Security Networking Accessibility Communication Hardware

Basic Office Hardware Necessities Desktop Computer Desktop Computer for maintaining the workings of the office for all necessary management skills as a hard location and back system for maintaining the workings of the office for all necessary management skills as a hard location and back system Laptop Laptop for the ease of portability when traveling out of office, using for court, communication, drafting and preparing cases, and syncing with desktop workstation for the ease of portability when traveling out of office, using for court, communication, drafting and preparing cases, and syncing with desktop workstation Phone System Phone System is necessary form conferencing and communications to various individuals in/out the office is necessary form conferencing and communications to various individuals in/out the office 4-in-1 Printer System 4-in-1 Printer System would allow for managing documents ( print, fax, scan, and copy) and assist in going green would allow for managing documents ( print, fax, scan, and copy) and assist in going green

Basic Office Software Necessities MS Office Suites MS Office Suites Creating, editing, and managing documents, presentations, creating presentations, Creating, editing, and managing documents, presentations, creating presentations, Amicus Attorney Amicus Attorney organizing software for calendars, to-do lists, deadlines, and documents organizing software for calendars, to-do lists, deadlines, and documents Amicus Accounting Amicus Accounting Track time, generate bills, manage receivables, print checks, administer trusts, financial reporting, & payroll Track time, generate bills, manage receivables, print checks, administer trusts, financial reporting, & payroll

Basic Office Software Necessities Norton Virus Norton Virus Keeps the computers running efficiently and free of viruses Keeps the computers running efficiently and free of viruses Internet Internet Performing searches, performing research, sending Performing searches, performing research, sending

A Step Above the Rest LexisNexis, WestLaw LexisNexis, WestLaw Online research tool for cases, statues, and etc. Online research tool for cases, statues, and etc. Voice Recognition Software Voice Recognition Software Typing alternative for dictation Typing alternative for dictation Conflict Checker Conflict Checker analysis of info on prospective, current, and former clients and staff analysis of info on prospective, current, and former clients and staff Photoshop Editor Photoshop Editor uploading and preparing the various media to be used and interfaced with other desktop software programs uploading and preparing the various media to be used and interfaced with other desktop software programs Response Point Software Computer based phone system Networking System To group all workstation, servers, and peripherals Advanced Peripherals Laser dot printer Audio Visual Equip Digital camera, video camera, recording devices Visioneer PaperPort Optical character recognition for document duplication

Future items to consider Complete In-House Library For research purposes Website Public use and information Intranet for employees for managing projects while traveling

Concerns CONCERNSWHY THIS IS A CONCERNSUGGESTIONS Accessing/downloading Files through cellular devices If the device is lost or stolen unauthorized persons may be able to retrieve sensitive information Only utilize devices that can be password-protected and its content can't be erased from a remote location when lost or stolen The abundance of massive paper files In case of a disaster, the reproduction of files may not be available Trying to go paperless would be beneficial. All files should be scanned and backed up Losing access to data files Data files can be destroyed or lost due to minor problems, fire or water damage or a hardware problem. Files should be backed up in two locations: stored in the office site in a secure, fireproof, location and complete copy should be stored off-site. Computer systems set-up If the hard drive is fried or software is lost the law office will fail by not being able to function completely Computer systems should be mirrored with two copies: stored in the office site in a secure, fireproof, location and a copy should be stored off- site.

Concerns cont… CONCERNSWHY THIS IS A CONCERNSUGGESTIONS Accessing and opening outside for office computers Outside s are a potential threats of containing virus All files must be scanned before opening or downloading to computer Unsecured desktop and laptops Any persons that are not authorized to access information will be able to have full access to computer systems, files, and clients. Password at startup/password protected screensaver, tether to desk, use a non-descript travel bag and keep an eye on it (laptop) Interactive and query of the office website that uses web applications and employee credential logons Hackers can have unlimited access and create devastating issues separate the Web and SQL servers, add application firewalls and use security tools called Security software and updates Not maintaining the latest security bundles and updates will leave the system vulnerable Combine security software and accept automatic updates

Model Rules of Professional Conduct Client-Lawyer Relationship Rule 1.1 Competence A lawyer shall provide competent representation to a client. Competent representation requires the legal knowledge, skill, thoroughness and preparation reasonably necessary for the representation.

QUESTIONS? This proposal brought to you by: Natashia Johnson Kaplan University Introduction to Legal Studies Professor B. Grim