Lighthouse PrivSmart uses automation to deliver efficiency and consistency across the entire privilege review and privilege log creation workflow.
Privilege review and the creation of a privilege log are inefficient, involving tedious and error-prone data entry. And due to the sensitive nature of the content, this work is currently performed by more experienced attorneys, incurring costs disproportionate to the number of documents being addressed. Also, relying on multiple reviewers to make independent decisions on whether documents contain privilege lends itself to inconsistency and even to missing privilege calls. That’s where PrivSmart comes in. Lighthouse PrivSmart brings automation to the privilege review and privilege log creation workflow for faster review, lower costs, and increased consistency.
PrivSmart automates steps that aren’t a good use of attorney time and organizes information for quick validation and execution.
Achieve better consistency across the entire review workflow with automated data entry and privilege log creation – including privilege log version control.
PrivSmart is a combination of complementary technologies built to make your privilege workflow more efficient and consistent: Privilege Categorization and Privilege Log.
has a user-editable privilege search term list to identify and group potentially privileged documents based on their likelihood to be privileged. These groups can then be assessed and prioritized for further evaluation.
normalizes names based on metadata and generates a log of privileged materials in a matter of minutes. A user-friendly interface allows users to customize and manage their final privilege logs, including managing version control and excluding documents from subsequently generated logs.
Predict, populate, and organize privilege names with PrivSmart so your team can validate, revise, and normalize privilege names with our easy-to-use interface.
Search metadata, email addresses, and document content for potentially privileged documents using a user-editable search term list, and then group them by their likelihood to be privileged. These groups can be used to determine the treatment of each set of documents.
Generate a customizable log in a matter of minutes, manage version control, and even exclude documents from subsequently generated logs with an intuitive interface.