Key Discovery Points: Do Your Best to Avoid Discovery Shenanigans!
Key Discovery Points: Be Willing to Agree and Compromise When It Comes to Hyperlinks
Navigating the Maze: eDiscovery Essentials for Employers — Hiring to Firing Podcast
Harnessing the Power of eDiscovery: The Revolution of AI and Technology in Litigation and Investigations - The Consumer Finance Podcast
Key Discovery Points: Don’t Rush in as an AI Fool!
Key Discovery Points: If You Dispose of Relevant Hard Drives You Will Face (Some) Consequences
Key Discovery Point: Collecting Hyperlinked File Versions – Contemporaneous or “As Sent”?
Key Discovery Points: Timing is Mostly Everything in eDiscovery
Key Discovery Points: AI Says AI Will Replace Paralegals… But Not So Fast!
Key Discovery Points: Get Your Copy of the 2025 eDiscovery State of the Industry Report
What are Some of the Concerns With Applying AI to Document Review?
Biggest Benefits of Applying AI to Document Review
All in the Family: What’s Next for Cloud Attachments in eDiscovery?
Key Discovery Points: Even AI Experts Can Get Faked Out
Innovation in Second Requests: Data is Your Greatest Asset
Key Discovery Points: No Need to Be Leery About AI
Key Discovery Points: Timing Sweet Spots for Spoliation Motions
Key Discovery Points: Should Hyperlinked Files Be Treated as Modern Attachments?
Podcast: Are Legal Holds Protected by Privilege? Insights from the FTC's Battle with Amazon
Podcast: How Delaying Third Party Discovery Can End Up Costing You Dearly
Two AI heavyweights step into the ring: ChatGPT 4o, the reigning champion of fluency and speed, and the new challenger, ChatGPT 4.5, boasting an upgraded intellect and sharper wit. But which one is truly the best? To find...more
In 2025, technology holds a well-established place in the legal profession. And even though there are headlines about emerging tech itself being on trial, the pros of Artificial Intelligence (AI), Machine Learning (ML), and...more
Is AI too expensive for document review? Read about the key issues raised in the current debates about the ROI of AI, including initial setup costs and quality control, and how you can assess the technology’s value for you....more
Generative AI is quickly transforming many industries—including legal services. Many of us are already using (or at least experimenting with) Generative AI, with impressive results. Allow me to introduce the next leg in our...more
As law firms and legal departments race to leverage artificial intelligence for competitive advantage, many are contemplating the development of private Large Language Models (LLMs) trained on their work product. While the...more
As we step into 2025, the legal tech landscape continues to evolve rapidly, shaped by advancements in artificial intelligence, shifts in communication tools, and an increasing focus on governance and compliance. Last year, we...more
In the early days of first-generation AI models, legal industry technology providers did not frequently encounter the question, “Where do my models live?” The assumption has always been that the models live where the data...more
Amid the tidal wave of technological innovation, the legal industry finds itself grappling with an essential question: how can it transform the overwhelming chaos of digital data into a wellspring of actionable insights? The...more
The integration of artificial intelligence (“AI”) into legal practice is no longer a future prospect. It’s a reality that many attorneys are facing today. As law firms and legal departments begin to adopt AI tools to enhance...more
Introduction - The year 2024 marked a pivotal time in artificial intelligence, where aspirations transformed into concrete achievements, cautions became more urgent, and the distinction between human and machine began to...more
At TransPerfect Legal's fifth annual Antitrust Clearance and Merger Enforcement Conference (ACME), hosted by the TransPerfect Legal Antitrust Practice Group, industry experts gathered to discuss evolving regulatory changes....more
In today’s fast-paced business environment, efficient contract lifecycle management (CLM) is essential for maintaining operational integrity and ensuring compliance. At the heart of effective CLM implementations lies data...more
Defining the role of inherent risk in cybersecurity - Inherent risk is a concept that while fundamental to cybersecurity, has largely been disregarded by popular cybersecurity risk guidelines and standards and remains arcane...more
Cybersecurity is one of the biggest challenges facing contemporary society. With the advancement of digital technologies and the ever-increasing dependence on information systems to perform the most diverse activities, the...more
Join us for an exciting online event that explores the challenges and risks associated with the new work from home reality in the professional services industry. Discover how professionals are adapting to remote work and...more
Join us for an exciting in-person event at Covington & Burling LLP, New York Times Building, 8th Avenue, New York, NY 10018, USA. Discover the new reality of professional services work from home and the associated risks....more
In a landmark move towards the regulation of generative AI technologies, the White House brokered eight “commitments” with industry giants Amazon, Anthropic, Google, Inflection, Meta, Microsoft, and OpenAI. The discussions,...more
In the digital age, law firms have faced increased pressure to protect exponentially growing amounts of data under their management, especially since they have become major targets for bad actors seeking to profit by stealing...more
Legal professionals often play a crucial role in advising organizations on information governance matters, particularly when it relates to legal and regulatory compliance, data privacy, and risk management. They may provide...more
Let’s talk about the “New Cybersecurity Triad.” We’re all pretty familiar with the venerable C-I-A Triad whereby secure data exhibits the characteristics of Confidentiality, Integrity, and Availability. But today’s...more
Cybersecurity programs must be tested on a routine basis. It takes significant time and effort to develop a cybersecurity program. The efficacy of a program is only theoretical until thorough testing is conducted. One of...more
Businesses are facing more uncertainty around talent and employee management than ever before. Whether it’s challenges around working from home, employee burnout, the “Great Resignation,” or the threat of recession-fueled...more
As the corporate workplace continues to evolve—encompassing hybrid work environments, bring your own device policies, and cloud-based storage—companies are well-advised to consider areas of increased vulnerability and whether...more
Risk management is the process of minimizing or mitigating risk. It begins with identification and evaluation of the various types of risk that an organization faces, determining the probability that these risks will occur,...more
A New Approach to Security in the WFH (home) and WFC (cloud) Era - In the Middle Ages, kings and other nobles secured their fiefdoms with a high-walled castle and a moat. The moat was designed to make it difficult for...more