Blog.

Blog
tls-blog-spotlight
TLS Project Manager Spotlight: From Economics to E-Discovery

Meet Rajuan Pasha, a TLS Director with over 10 years’ experience in e-discovery. TLS London and Dubai’s Director of Business Development Mike Deeker, sat down with him to learn more about how he got into the world of legal technology, his insight into e-discovery, and his predictions for the future…

Read More
Blog
edisco-101
What is E-Discovery

The universe of electronic documentation continues to grow astronomically. This is especially obvious when considering the popularity and increased usage of mobile devices, web-based applications, and cloud-based platforms in today’s digital world. Whether we are communicating or conducting…

Read More
Blog
modern-legal-practice
The Modern Legal Practice

Legal practice has changed considerably in the last decade or so. New models, arrangements, and tools have taken hold in the industry and begun, in some instances, to challenge the primacy of the traditional law firm. Legal professionals have tried to find ways to increase efficiencies and make…

Read More
Blog
ediscovery technology
How to Drive E-Discovery Outcomes with Human Experience and Technology

For the third year in a row, readers of the New York Law Journal chose TransPerfect Legal Solutions (TLS) as their #1 End-to-End E-Discovery Provider. This time, the award came alongside recognition as the #1 service provider in five additional categories:

Read More
Blog
tls spotlight
TLS Project Manager Spotlight: London Forensic Consultant

Meet Pradeep Selvarajan, a TLS London Senior Forensic Consultant with 15 years of forensics experience. TLS London’s Director of Business Development Adam Kemeny sat down with him to discuss how he got into the discipline, how it’s evolved over the years, and some of the constant challenges he…

Read More
Blog
self collection and best evidence
Self-Collection and the Best Evidence Rule

In a case that has particular salience in today’s era of social media, the Eastern District of Texas in Edwards v. Junior Sate of Am. Found., CIVIL NO. 4:19-CV-140-SDJ (E.D. Tex. Apr. 23, 2021), excluded screenshots and other evidence of a purported Facebook message conversation because it failed…

Read More
Blog
E-Discovery Best Practices: Hyperlinks vs. Attachments
E-Discovery Best Practices: Hyperlinks vs. Attachments

One of the most important emerging questions in e-discovery concerns how courts should treat emails containing hyperlinks that reference other documents. Should such emails be produced with a familial relationship, akin to traditional emails and their attachments? While this issue is far from…

Read More
Blog
dynamics driving mergers
Dynamics Driving Mergers and Acquisitions in the COVID Era

Head of TransPerfect’s TransCEND Virtual Data Room Solutions Group, John Beeman, sat down with Chris Petrossian, Co-Head of Consumer for Lincoln International, to discuss Chris’s view on the mergers and acquisitions (M&A) markets today, COVID-19’s impact, taxes, and wh

Read More
Blog
How to Improve Information Governance and Cyber Security
How to Improve Information Governance and Cyber Security

Australian government research shows cyber-crime is costing the Australian economy approximately $3.5 billion a year.

Read More
Blog
Three Ways a Multi-Matter Repository Improves E-Discovery Efficiency
Three Ways a Multi-Matter Repository Improves E-Discovery Efficiency

A multi-matter repository (MMR) is a processing database that houses electronically stored information (ESI) that is potentially relevant to more than one matter. Sharing and repurposing past work for present and future matters unlocks substantial e-discovery savings and reduces project management…

Read More
Blog
Choosing Machine Translation: The Trade-Off Triangle
Choosing Machine Translation: The Trade-Off Triangle

Language service and e-discovery decision making is governed by a trade-off triangle of three basic business constraints: 1) quality, 2) speed, and 3) cost. Are you looking for a low-cost solution? A fast turnaround? The highest possible quality? Well, choose two.

Read More
Blog
The Colonial Pipeline Ransomware: Know Where Your Key Data Lives, Decrease Your Threat Footprint
The Colonial Pipeline Ransomware: Know Where Your Key Data Lives, Decrease Your Threat Footprint

The Colonial Pipeline ransomware attack was the largest in the energy sector to date. With cybercrimes up 100% from 2019 to 2020, this is only the beginning for 2021. Many organizations are taking on digital transformation by moving to the cloud and creating a more connected world. The problem is…

Read More