Across
- 1. - Two-Factor Authentication requiring two verification methods
- 3. - Process of moving data from one system to another
- 5. - Process of identifying and collecting electronic data for legal proceedings
- 7. - Use of technology to perform tasks with minimal human intervention
- 12. - Practices protecting computers and data from attacks
- 15. - Legal case or transaction in practice management software
- 16. - Software as a Service model of accessing programs via internet subscription
- 17. - Internet-based computing providing shared processing resources
- 18. - Technology that converts text in images into machine-readable data
- 19. - Hidden information about a document, like author and creation date
- 20. - Virtual Private Network providing secure remote access
- 21. - Official record of proceedings in a court case
- 23. - Secure, decentralized digital ledger technology
- 25. - Healthcare privacy regulation affecting legal handling of medical information
- 30. - Standard document format that preserves formatting across devices
- 31. - Process of verifying a user's identity
- 34. - System where data is stored in one primary location
- 35. - Document Management System for storing and tracking documents
- 36. - Reusable document pattern with placeholders for information
- 37. - Process of collecting initial client and case information
- 41. - System where data is distributed across multiple locations
- 42. - Modern version of the federal court's electronic filing system
- 43. - Fraudulent attempt to obtain sensitive information
- 46. - Security system preventing unauthorized access to networks
- 47. - Process of encoding information to prevent unauthorized access
- 48. - Access rights granted to different users of a system
- 49. - Visual display of key information in software
Down
- 2. - Arranging document appearance to meet requirements
- 4. - Automated system for reminding of upcoming deadlines
- 6. - Enterprise Legal Management for large firms/departments
- 8. - Connection between different software systems to share information
- 9. - Adapting software to specific firm requirements
- 10. - Removing confidential information from documents before sharing
- 11. - Process of recording time and expenses for client invoicing
- 13. - Process of scrambling data to protect it from unauthorized access
- 14. - Sequence of processes through which work passes from initiation to completion
- 22. - Organized collection of structured information
- 24. - Case Management/Electronic Case Files system used for federal court filing
- 26. - Interface allowing different software applications to communicate
- 27. - Public system for accessing federal court records electronically
- 28. - Process of organizing information for easy retrieval
- 29. - Adherence to legal and regulatory requirements
- 30. - Secure website for client access to case information
- 32. - Transport Layer Security protocol securing data transmission
- 33. - Advanced Encryption Standard used to secure digital information
- 38. - Submitting court documents electronically instead of on paper
- 39. - System that calculates deadlines based on court rules
- 40. - European data protection regulation with global implications
- 44. - Structured Query Language used to manage database information
- 45. - Central location where documents are stored and managed
