All Things Investigations: Episode 37 – Privileges in Document Production with Mike Huneke
Sitting with the C-Suite: eDiscovery Observations – Historical Lookback to 1990s and 2000s
So you are ready to divorce...what is the process?
Sitting with the C-Suite: In-House Counsel - Leveraging Text Classification to Problem Solve
Video | Tips for Managing the Preservation of Mobile Device Data
PODCAST: Williams Mullen's Benefits Companion - Government Investigative Demands
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
I have never heard of a “destruction/unavailable” log; however, in the comprehensive – indeed, exhaustive – decision of Leprino Foods Co. v. Avani Outpatient Surgical Center, Inc., 2024 WL 4488711 (C.D. Ca. Sep. 30, 2024),...more
Afraid you won’t be up to date on important case law? Our October 2024 monthly webinar of cases covered by the eDiscovery Today blog will remove all your fears! During the webinar we will discuss disputes related to relevance...more
Given the bare bones nature of many privilege logs, courts sometimes may be called upon, or themselves decide, to review withheld documents in camera to assess the grounds for the documents’ withholding. A handful of courts...more
Vault Reciprocal Exchange v. Luria, et al., 2024 WL 948632 (Fla. 3rd DCA 2024) - During discovery, Vault Reciprocal Exchange responded to Luria’s request for production and preemptively filed a privilege log, which objected...more
In Linet Americas, Inc. v. Hill-Rom Holdings, Inc., 2024 WL 3425795 (N.D. Ill. Jul. 15, 2024), the court held that “attachments to attorney client communications may be withheld as privileged without an independent basis for...more
[Editor’s Note: This article was first published July 24, 2024 and EDRM is grateful to Tom Paskowitz and Robert Keeling of our Trusted Partner, Sidley, for permission to republish. The opinions and positions are those of the...more
In Linet Americas, Inc. v. Hill-Rom Holdings, Inc., 2024 WL 3425795 (N.D. Ill. Jul. 15, 2024), the court enforced an ESI Protocol that called for a “metadata-only” privilege log, even though parts of the metadata were...more
The purpose of a privilege log is to provide sufficient information for the recipient of the log to determine whether the withheld information is, at least on its face, privileged. In short: “Trust, but verify.” See,...more
Every court seems to require litigants to log documents they withhold based on privilege or work product claims. Perhaps not surprisingly, hardly any log goes unchallenged by the adversary. Most of these disputes eventually...more
In Melton Properties, LLC v. Ill. Central R. Co., 2024 WL 3015749 at *5 (N.D. Miss. June 14, 2024), the court listed the factors to consider in deciding when the failure to provide a timely privilege log is – or is not – a...more
[Editor’s Note: This article was first published June 18, 2024 and EDRM is grateful to Tom Paskowitz and Robert Keeling of our Trusted Partner, Sidley, for permission to republish. The opinions and positions are those of the...more
[Editor’s Note: This article was first published May 15, 2024 and EDRM is grateful to Tom Paskowitz and Robert Keeling of our Trusted Partner, Sidley, for permission to republish. The opinions and positions are those of the...more
Last week’s Privilege Point described one court’s incredible requirement that litigants identify everyone who learned of a withheld document’s content — even if they were not shown as a recipient....more
Privilege logging is one of the most time-consuming, expensive, and contentious components of discovery. Federal Rule of Civil Procedure 26(b)(5)(A), which governs the withholding of privileged material, provides little...more
In Rayome v. ABT Electronics, 2024 WL 1435098 (N.D. Ill. Apr. 3, 2024), the court wrote that “it would be in the parties’ interest to reach a negotiated result. It should not be forgotten that a party could be ‘right,’ but...more
In Kyle Rayome v. ABT Electronics, 2024 WL 1435098 (N.D. Ill. 2024), the court wrote that it “would prefer this case not go to the dark place where attorneys on one side demand that the attorneys on the other side provide...more
Privilege logs have been getting a lot of attention, with good reason. “Privilege logging is arguably the most burdensome and time consuming task a litigant faces during the document production process.” The Sedona...more
Time to “spring” – into more eDiscovery case law! Our March 2024 monthly webinar of cases covered by the eDiscovery Today blog discusses disputes over in camera review of privilege logs, waiver of privilege over failing to...more
On February 9, at the Rubenstein-Walsh CLE on Ethics and Professionalism for the Delaware State Bar Association, a panel of experts, including Vice Chancellor Cook, discussed the importance of these logs, and the care and...more
In Episode 131 of Case of the Week, CEO and Founder of eDiscovery Assistant, Kelly Twigger, discusses how the failure to produce a privilege log for withheld documents resulted in a waiver of privilege and sanctions under...more
January is a time to set goals and ponder what the new year will bring. It is also a time to think about what happened last year. In the world of litigation, it is important for lawyers and eDiscovery professionals to take...more
[Editor’s Note: This article has been republished with permission. It was originally published November 9, 2023 on the eDiscovery Assistant Blog] This week’s decision comes to us from the case titled 6340 NB LLC v. Cap. One,...more
The difficulty of handling privilege disputes can be especially pronounced in cases involving a prolonged discovery period and large corporate defendants with different document custodians. When a party chooses to withhold...more
Attorney-client privilege protection depends on content, and some work product claims also depend in part on content. Because a litigant's privilege log obviously does not disclose withheld documents' content, the adversary...more
The ESI protocol is a negotiated document that expressly states how the parties to a litigation should produce electronically stored information (ESI). The ESI protocol assures against surprises and commands that ESI is...more