Highlights : About Contract Analyst

Contract Repository

Automatic Alerts

Contract Workflow

Contract Management Reports

Unlimited users

Access Controls
Product Details
Features
Contract Repository
All of your contracts are in one place: the central repository. The software repository is a snapshot of the most important contract details.
Contract Documents
Use the contract record to collect all the contract documents in one place. The original agreement, all exhibits, all schedules, and all amendments are linked to the main contract record.
Automatic Contract Alerts
Automatic alerts are critical to keep your organization in compliance and to monitor the other party's performance. Schedule alerts to be recurring in the software whenever you want.
Contract Collaboration
Contract management is a team sport. Over the life of a contract, many people and departments get involved with management of a contract: legal, procurement, contract management, and business units. Lextree helps teams collaborate on contracts.
Contract Workflow
Create custom workflows for contract and document requests easily. Configure each step, designate the people responsible, and let Lextree handle the rest.
Contract Approvals
Need to improve the contract approval process? Easily create different paths for contract approval in Lextree.
Contract Tasks
Contract management tasks are more than a simple to do list. Tasks make contract collaboration better.
Contract Management Reports
Gain fresh insights into your contract portfolio. With your contracts and documents in one place, Lextree’s built-in reports provide data for quick analysis of contract risk.
Unlimited Users
Yes, unlimited users. You can work with as many people as you want. You control their access so each user only sees certain information.
Access Controls
Control access to your data with flexible and powerful access controls. Create custom security groups.
Global and Local
Large and small organizations all over the world use Lextree to manage contracts and control risk.
Secure
All data is encrypted and transmitted over SSL (HTTPS). Configure user permissions and roles to restrict access.