News and Insights from T-Scan

Keep informed on all things record retrieval with T-Scan's blog.

Subscribe and receive the latest updates from T-Scan

October 29, 2020

The Professors of Record Retrieval

As the Professors of Record Retrieval, we know the complexities and challenges involved in providing cost-effective, reliable and expert retrieval experience to demanding professionals. From late night brainstorming sessions to rapid project completion, we’re proud to be the straight-A partners that don’t rest until your team has the information you need.

Read On...
September 30, 2020

T-Scan's Latest Concoction: Personal HITECH Medical Record Retrieval

There are two kinds of people in the world.

Read On...
May 1, 2020

How T-Scan Infrastructure is Helping Firms Navigate Through the Current Environment

The unexpected arrival of COVID-19 has required legal departments nationwide to rapidly shift, adopting remote work and adjusting to a new “normal” defined by technology. As firms work to cut overhead costs and improve efficiency, the use of online litigation support services provides an opportunity to future-proof against uncertainty. For legal departments seeking immediate solutions to their changing environments, online services are becoming key to maintaining business continuity.

Read On...
December 27, 2019

Record Retrieval is Important. Enlist the Experts.

If your office retrieves records, you know there are three facts inherent in gathering personally identifiable information:

Read On...
November 21, 2019

Is Your Data Security Real or Imagined?

Data security is a complicated task requiring constant updating and monitoring against threats both large and small. The majority of us need to take the word of the companies housing our data that it is safe and secure, unfortunately, many companies fall short of this. Security surrounding data is often a modern-day version of The Emperor’s New Clothes. Like Hans Christian Andersen’s short tale, we are left to the word of the security tailors that the data is clothed in security that we could not possibly understand. The best security, we are told, is the security we cannot see. It is not until a child, or a hacker in our modern update of the tale, looks at the nonexistent security and yells out that there is no security, accesses the data and causes embarrassment to the emperor, the tailors, and the company holding that data cloaked in invisible security. The exposure can be costly and embarrassing.

Read On...