Blog.

Blog
Four Strategies to Navigate Data Privacy Obligations for Compliance, Litigation, and E-Discovery Professionals
Four Strategies to Navigate Data Privacy Obligations for Compliance, Litigation, and E-Discovery Professionals

Modern businesses are caught in a perfect storm. Data privacy laws are proliferating at the state, federal, and international levels, requiring companies to know where they are storing personally identifiable information (PII) and personal health information (PHI) and wrap tight controls around the…

Read More
Blog
Compliance Investigations
Compliance Investigations

Haz clic aquí para leer en español

Read More
Blog
Automating Discovery, Not Just Review
Automating Discovery, Not Just Review

The majority of e-discovery costs are incurred during review, so it’s no surprise that review is often the focal point of legal innovation. Predictive coding is now accepted by the Australian court under Victoria Practice Note SC Gen 5. Continuous active learning (CAL) models streamline even small…

Read More
Blog
M&A and Investments in Central and Eastern Europe
M&A and Investments in Central and Eastern Europe

This summer, TLS attended the “M&A Spotlight: Central and Eastern Europe (CEE)” breakfast seminar hosted by Wolf Theiss and Mergermarket in London. Our attention was refocused on this emerging yet developed region, where businesses are reaping the rewards of an active mergers and acquisitions (…

Read More
Blog
Wrapping Your Head around Multi-Language E-Discovery
Wrapping Your Head around Multi-Language E-Discovery

The rate information is generated continues to increase exponentially. By 2020, the digital universe will be 44 zettabytes large, meaning there will be “40 times more bytes than there are stars in the observable universe.” [i] Concurrently, traditional information borders disintegrate or cease to…

Read More
Blog
Cybersecurity: Five Tips to Ensure You’re Prepared
Cybersecurity: Five Tips to Ensure You’re Prepared

fn{ vertical-align:super; font-size:12px; } During the first year since Australia’s Notifiable Data Breaches (NDB) scheme was rolled out in early 2018, there have been 964 data breaches reported.1 Of those, 60% were reported as malicious or criminal in nature, and another 30% related to human…

Read More
Blog
Key Takeaways from the 2019 General Counsel Summit
Key Takeaways from the 2019 General Counsel Summit

One of our experts was lucky enough to attend the annual General Counsel (GC) Summit in Sydney, Australia, in early May. It was a genuinely enthralling event, with senior speakers from a variety of industries walking through their challenges, failures, solutions and lessons learned. We have…

Read More
Blog
Recapping the 2019 Boston IP Forum, Hosted by TLS and Suffolk Law School
Recapping the 2019 Boston IP Forum, Hosted by TLS and Suffolk Law School

On June 5, 2019, TransPerfect Legal Solutions (TLS) teamed up with Suffolk Law School to host an educational event filled with lively conversations about the most important issues affecting the intellectual property (IP) community here in Boston. As a leading provider of legal technology solutions…

Read More
Blog
GDPR: New Considerations and Shared Experiences for Life Sciences Companies
GDPR: New Considerations and Shared Experiences for Life Sciences Companies

Clinical trial subjects will have new privacy rights with the implementation of the EU’s upcoming data privacy regulation—GDPR.

Read More
Blog
The GDPR – What It Means and How to Comply
The GDPR – What It Means and How to Comply

For many businesses, the acronym GDPR has become synonymous with “greatest operational and legal challenge over the next five years.” In turn, you have probably been targeted with buckshot marketing campaigns introducing solutions that will supposedly save you and your loved ones from impending…

Read More
Blog
hipaa-lifesci
Handling HIPAA: Keeping Patient Information Safe

As patients, we expect healthcare providers to keep our personal information safe and secure. We also expect them to make healthcare as accessible as possible. Providers have responded to demand by offering mobile apps, paperless transfer of medical records, online bill payment, and email-based…

Read More
Blog
Cybersecurity and Arbitration: Protecting Your Documents and Ensuring Confidentiality
Cybersecurity and Arbitration: Protecting Your Documents and Ensuring Confidentiality

One of the core advantages that drives parties to arbitrate is the promise of confidentiality. Unlike court proceedings, which are open to the public, arbitrations provide parties with a private forum through which to air and resolve their disputes. This advantage, however, is threatened by…

Read More