Browse Definitions :
Definition

legal analytics

Contributor(s): Matthew Haughn

Legal analytics is the application of data analysis methods and technologies within the field of law to improve efficiency, gain insight and realize greater value from available data.

Similar to business analytics (BA) in other sectors, legal analytics are used to yield actionable information that can improve processes and increase efficiency. Legal analytics are implemented to give a law firm a competitive advantage and drive corporate profits.

Analytics applications can be used to mine and aggregate data from past cases to explore the information from various perspectives. Analytics software could be used, for example, to compare patterns in the decisions of judges in particular types of cases or the prevalence of particular types of cases over a given period of time. An analysis of past litigation can be applied to inform strategy in the future.

Advanced analytics tools can be used to predict future events and trends. Legal professionals can use big data analytics, predictive analytics and other advanced tools to conduct informed speculation about the effects of potential changes in business strategies.

Legal analytics are complementary to legal reasoning and not meant replacing it. Legal analytics applications still require judgment about their inputs and intelligent interpretation of their output.

This was last updated in August 2017

Continue Reading About legal analytics

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

  • juice jacking

    Juice jacking is a form of hacking that compromises a device's USB charging port or charging cable, allowing hackers to break ...

  • DNS attack

    A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system (DNS).

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close