The papers of Supreme Court justices, as is the case for all federal judges, are not subject to regulation. The speakers present background information on justice papers, illustrate their value for historians and the public, and discuss challenges that arise for repositories in processing and managing them. They also discuss how regulation would help increase the amount of information preserved, make access decisions ...more »
Don't think we've done anything on conflicts in years.
Dont think we've done anything on records management for yeard.
So much of the writing and presentations on KM today come from Big Law that can staff Big KM teams with lawyers, MBAs, librarians. But how do you implement KM initiatives at small and mid-size organization? The program could review "low-hanging fruit" - easy wins, with the least resources needed. The speaker(s) would explain how to prioritize KM projects. If your firm can't hire practice support lawyers, how do you manage ...more »
Use SAML SSO authentication to support reduced friction database access for Westlaw/Lexis Advance/Bloomberg. SAML SSO bypass password authentication, navigation of platforms to find treatises, and client matter validation to take attorneys directly to the electronic treatise table of contents. I pitched this idea to win the audience vote in the 2019 AALL Innovation Tournament. I would like to collaborate with other librarians ...more »
So far wikidata may be the best approach for a person without linked data background to understand linked data.
Programs or a workshop can be set up for the topic to let legal community get in touch with the tool and get some inspirational idea about possible usage for the library projects.
Law libraries are more than reference and research - librarians work in tech services, knowledge management, circulation, ILL, systems, special collections and more. While we perform essential roles we may not get our issues addressed in AALL programs because there isn't enough interest or content in any one topic to warrant a full session. But we still need to find out how someone else is doing something, get an answer ...more »
A program to focus on the best practices and workflows of the relationship/partnership between Foreign and International (FCIL) collection development librarians and the acquisitions, serials, cataloging and e-resources departments of the library. A panel discussion with FCIL and Tech Services librarians discussing the often under-discussed issues of procuring and accessing foreign legal materials, focusing on international ...more »
As more and more institutional history is being digitized, skeletons are jumping out of the closets. More often than not, yearbooks--those holders of memories that many didn't think would ever be available for public consumption--are leading to resignations. Attempts to withhold or proactively take down the yearbook collections leads to backlash, but leaving them as is leads to scandal. What's a library to do? This session ...more »
Creating a knowledge management solution that offers both personalization and customization can be challenging but the reward is relevant and timely shared knowledge that can be immediately impactful. Whether it is just in time integrations to client and matter pages or a research tool that helps lawyers and teams learn, a good KM solution pulls together content and tools in context and makes working and learning stress ...more »
An update on what The California Consumer Privacy Act and The State Bar of California's proposals that would allow legal technicians to offer legal advice and nonlawyers to hold a financial interest in law firms. As librarians what do we need to know, to look for? What impact does this have on our vendor relationships? What impact does this have on our firms? What impact does this have on our profession?
Just in the last few weeks, major government entities have been hit by security breaches. This program would run through one of those breaches (eg the Georgia courts, the Louisana schools, or another contemporary attack). It would explore how the attack was discovered, how the attack occurred, how the entity responded, and how it was resolved. The program would also discuss the policies that were in place before the ...more »
A low cost (no cost?) procedure for conducting a collection inventory using Sierra and Excel.
Discussion on data and providing all information on statistics. "crap data equals crap results and a skewed result"
The amount and types of materials librarians are storing in repositories has increased exponentially and shows no rate of slowing. As workflows shift and workloads climb innovative means of adding items to our institutional repositories are more valuable and necessary than ever before. This session will share methods for automating the creation of large numbers of similar records in Digital Commons, providing a real life ...more »