Heading

Heading

Heading

Heading

Heading
Heading
Heading Style H1
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
Heading Style H6
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
Statue of Lady LibertyA desktop screen and a laptop screen showcase an example of online legal meetings and proceedings.

Your single end-to-end platform for

privileged attorney-client communication and legal proceedings.

for correctional facilities

Your solution for
legal mail

Digital evidence review and remote attorney meetings for incarcerated individuals. Enhanced safety and efficiency through reduced paper entering your facility. Time conservation for staff and clients with digital tools like digital signatures. Real-time presentation of plea deals and accessible client data.

NO MATTER WHAT ROLE YOU PLAY,

Lightning Law™ has a solution for your workflow needs!

Everyone wants a judicial system that proceeds without delay. Everyone wants to expedite justice. At Lightning Law, we offer tools to make remote attorney-client meetings and proceedings more efficient, while lightening the burden on the courts.

We emulate the experience of an in-person legal meetings and proceedings.

The Features You Need

Each step in our remote meeting process has been carefully crafted to ensure fast and efficient use.

Attorney-client
video consultations
  • Video call with your clients while viewing their documents and obtaining e-signatures.

  • All in real time and all in the same secure place.

  • No more tabbing through a patchwork of applications to manage, show, share, sign, and annotate videos and documents.

  • Your materials and notes stay with the meeting, so you can easily return to continue your work during your next video call.

Mediations designed
by Mediators
  • Get paid the same day for mediating a case on Lightning Law.

  • Advanced tools like "offer and demand tracking" expedite your workflow.

  • Collaborative mediation agreement drafting and e-signing for lawyers.

  • Move between virtual rooms using our proprietary door knock feature, so you never enter uninvited.

Access to justice
with pro-bono
  • We believe that advanced remote legal software is far too important to be accessible only to those who can pay.

  • So, we give our software to lawyers offering pro-bono services.

  • Please get in touch if you believe that your pro bono organization would benefit from a partnership.

Lightning Law is a no-brainer for every jail. It improves staff lives and keeps them safer. With Lightning Law, there is no more legal mail processing, fewer security checks for lawyers, less paper in the cells, and a decrease in complaints filed. Lighting Law removes the jail staff from being the middleman.  I only wish I had this ten years ago.
Captain Sean Stewart
Retired Jail Commander, Prima, AZ

Ongoing Monitoring:
Staying One Step Ahead

The following content lists the security techniques and technologies that protect our customer data and actions. Lightning Law™ uses Microsoft Azure's government-level servers to store our clients' sensitive documents and information. When using the platform, you can be certain that all servers are CJIS, ISO, HIPAA, and ITAR certified. We also utilize Microsoft Defender in the cloud to provide additional security checks and protections.

Learn More
  • Microsoft Defender for Cloud for suspicious activity alerts
  • Azure Active Directory for strong user authentication via SSO and MFA.
  • Azure Active Directory for password controls. 
  • Azure Active Directory to identify lifecycle management. 
  • Role-based security (RBAC) for granular application scopes
  • Azure Cosmos Database Storage functionality and Azure Storage functionality for  AES 256-bit encryption
  • Role-based security (RBAC) user-friendly role sharing. 
  • Microsoft Defender for Cloud for ransomware detection
  • Azure Application Insights and Azure Log Analytics for centralized application and  system audit logs
  • Azure Microsoft Defender for Cloud and Azure Sentinel for (CASB) and SIEM functionality. 
  • Files-at-rest are encrypted using Azure Storage and Azure Cosmos Database  Storage functionality. 
  • Azure Application Services for protecting data-in-transit between our application and our servers. 
  • Applications and infrastructure are regularly tested for security vulnerabilities and hardened to enhance security and protect against attacks using Azure  Defender for Cloud. 
  • During the sign-up process there is a multifactor (MFA) verification process.
  • Role-based security (RBAC) allows only users with administrator rights to change security settings and access. 
  • TLS protocols to protect client authentication, authorization, and file transfers  using Azure Application Services
  • Download links are uniquely and randomly generated using strong hash-based  message authentication codes. Technical countermeasures are provided to  protect links from guessing attacks using Azure Storage Functionality. 
  • Microsoft Azure Cloud is certified with SOC 1/SOC 2/ ISO 27001 datacenters to  host the SaaS application and metadata. All files are stored in SOC1, SOC2 datacenters that also enable users to use the secure environment to process,  maintain, and store PHI. 
  • Files are processed using systems protected by firewalls and effectively limiting  control access to network segments using Azure Networking functionality.
  • Files are stored in replicate and backed up with Microsoft Azure Storage ensuring high file durability
  • Customers have the options of configuring password policies, including password  history, expiration, and complexity using Azure Active Directory.
  • The application supports SAML 2.0 using single sign on and integrates with most  SAML-compatible identity management solutions using Azure Active Directory.
  • Terms and conditions are to be accepted by the user on the first login, that must  be marked to indicate compliance with the terms before logging in.
  • Utilizes account lockout policies to prevent account tampering. These controls  can be customized to meet customer compliance needs using Azure Active  Directory. 
  • Users can choose to have notifications sent on login email. 
  • Downloaded files can be accessed on IOS and Android mobile devices even when offline. 
  • Customizable watermarking is available whenever documents are viewed,  downloaded, or printed to discourage unauthorized distribution of data using  application functionality. 
  • Use “view-only” permissions to ensure that files cannot be downloaded,  printed, or saved limiting access to your documents to web-based viewer in the  application.