Is Microsoft Gaining A Foothold In The Legal Industry?

Is Microsoft Gaining A Foothold In The Legal Industry?

Is Microsoft Gaining A Foothold In The Legal Industry?

The global legal services market, according to MarketLine had total revenues of $610.4bn in 2013, representing a compound annual growth rate (CAGR) of 3% between 2009 and 2013. Market volume increased with a CAGR of 2.7% between 2009 and 2013, to reach a total of 4,082.1 thousand legal professionals in 2013. The performance of the market is forecast to accelerate, with an anticipated CAGR of 4.2% for the five-year period 2013 – 2018, which is expected to drive the market to a value of $750.9bn by the end of 2018.

Having said that, the sheer size of global legal market could attract many new entrants. Cloud computing is changing how information is disseminated, accessed, processed, and governed. Multinational companies with global IT infrastructure spend millions in managing their network infrastructure, and have sizeable budget allocated for potential litigation and compliance work. The real issue is not the size of the cost to maintain – it’s ‘Big Data’.

e-discovery

Product innovation is at the heart of Microsoft’s work. Undoubtedly, a true innovative market player since 1975. In a refined manner, Microsoft recently introduced the e-Discovery module in one of its flagship product SharePoint. The rationale behind is quite simple. To cater to the growing needs to information governance and compliance functions. The Electronic Discovery Reference Model (EDRM) has been recently amended to include ‘Information Governance’ as a key component. EDRM is a framework that outlines standards for the recovery and discovery and of digital data. It is designed to serve as guidance for gathering and assimilating electronic data during the litigation process, and acts as a conceptual standard for the e-Discovery process. In case you are not familiar with e-Discovery, it is the process of finding, preserving, analyzing, and producing content in electronic formats as required by litigation or investigations.

An organization typically has vast amount of digital and social data. There are significant legal risks associated with preserving, searching, and producing data when legal events occur. How do you search within your existing data to comply with e-Discovery requests? How do you export is in an appropriate format? The answer lies within SharePoint 2013. SharePoint 2013 introduces the eDiscovery Center site collection, which has features to help with the first half of the eDiscovery Reference Model (EDRM)— Information Governance, Identification, Preservation, Collection, Processing, and Analysis.

In the e-Discovery Center you can create e-Discovery Case sites, which are used to organize in-place holds, queries, and exports for a particular case. The e-Discovery Case site is designed for in-house legal teams to perform their e-Discovery work. The new e-Discovery capabilities within SharePoint 2013 have three key advantages to help you get through during a lawsuit:

  1.  In-Place Hold—Preserve and search across content in native stores. This is faster, easier, and provides higher fidelity than the processes in use today. Plus, with our in-place approach, you can reduce the storage space you use.
  2.  Near real-time search—Built-in search system of SharePoint and Exchange, content is always up-to-date and you can run searches anytime.
  3.  More content—Preserve, search, and export OneNote files, webpages, communities, microblogs, Lync IMs, Lync meetings, and more.

SharePoint e-Discovery capabilities give a promising answer for handling compliance and information governance related functions. Microsoft’s route towards the legal industry and strategically positioning itself with its SharePoint product may be a step towards entering and capturing the multi-billion dollar global legal industry.

By Syed Raza

About Syed Raza

With over 20 years of combined experience in the fields Law, Management, and IT, Syed has impeccable reviewing and strong editing skills with a long track record of writing technical, legal, and management articles that make readers stop and think.. Being a serial entrepreneur and attorney, he provides consultancy and project management in e-Discovery issues in complex civil litigation. As, a trial attorney with significant experience in matters relating to patent infringement, defense and prosecution in the pharmaceutical industry, contracts disputes, real estate, criminal matters, and international human rights law. Syed provides guidance and counsel to attorneys and clients on all aspects of discovery, including information management, data preservation and collection, early case assessment, comprehensive managed review and production. He also holds a PhD (management sciences) and MBA degree as well.

View All Articles

One Response to Is Microsoft Gaining A Foothold In The Legal Industry?

  1. SharePoint provides few of the capabilities required for firms dealing with any significant volume of eDiscovery or complex regulatory environments. Track content contained within SharePoint sites for proper information governance? No. Collect from multiple legacy repositories and locations? No. Retain immutably for those with requirements such as SEC 17a-4? No. Index and search against non-MSFT content (e.g. social)? Not really. Run investigative search against concurrent matters against the corpus of data? Kind of, via batch searches. The list goes on. Best to map one’s pattern of litigation and ask to see how it can handle your use cases – not just slideware.

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

The Future of M2M Technology & Opportunities

The Future of M2M Technology & Opportunities

The Future Of The Emerging M2M Here at CloudTweaks, most of our coverage is centered around the growing number of exciting and interconnected emerging markets. Wearable, IoT, M2M, Mobile and Cloud computing to name a few. Over the past couple of weeks we’ve talked about Machine to Machine (M2M) such as the differences between IoT and…

5 Considerations You Need To Review Before Investing In Data Analytics

5 Considerations You Need To Review Before Investing In Data Analytics

Review Before Investing In Data Analytics Big data, when handled properly, can lead to big change. Companies in a wide variety of industries are partnering with data analytics companies to increase operational efficiency and make evidence-based business decisions. From Kraft Foods using business intelligence (BI) to cut customer satisfaction analysis time in half, to a…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Low Cost Cloud Computing Gives Rise To Startups

Low Cost Cloud Computing Gives Rise To Startups

Balancing The Playing Field For Startups According to a Goldman Sachs report, cloud infrastructure and platform spending could reach $43 billion by 2018, which is up $16 billion from last year, representing a growth of around 30% from 2013 said the analyst. This phenomenal growth is laying the foundation for a new breed of startup…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth The Internet of Things is the latest term to describe the interconnectivity of all our devices and home appliances. The goal of the internet of things is to create universal applications that are connected to all of the lights, TVs, door locks, air conditioning, and…

Surprising Facts and Stats About The Big Data Industry

Surprising Facts and Stats About The Big Data Industry

Facts and Stats About The Big Data Industry If you start talking about big data to someone who is not in the industry, they immediately conjure up images of giant warehouses full of servers, staff poring over page after page of numbers and statistics, and some big brother-esque official sat in a huge government building…

5 Surprising Ways Cloud Computing Is Changing Education

5 Surprising Ways Cloud Computing Is Changing Education

Cloud Computing Education The benefits of cloud computing are being recognized in businesses and institutions across the board, with almost 90 percent of organizations currently using some kind of cloud-based application. The immediate benefits of cloud computing are obvious: cloud-based applications reduce infrastructure and IT costs, increase accessibility, enable collaboration, and allow organizations more flexibility…

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus Shadow IT, a phenomenon defined as building internal IT systems without the official organizational approval has been a growing concern for CIOs over the last few years. In 2015, it climbed to the top of the list of the emerging IT threats, with as much as 83% CIOs reporting…