The purpose of a privilege log is to provide sufficient information for the recipient of the log to determine whether the withheld information is, at least on its face, privileged. In short: “Trust, but verify.” See,...more
This Sidley Update addresses the following recent developments and court decisions involving e-discovery issues: 1. an order from the U.S. District Court for the Eastern District of California granting a motion to compel...more
What is Document Review for eDiscovery? Let’s dive into the captivating realm of Electronic Discovery (eDiscovery) document review! (No, I am not being sarcastic!) This critical stage involves examining gathered documents to...more
Federal and state rules of civil procedure are intended to secure the just, speedy and inexpensive determination of every action. However, one activity that can thwart that goal is discovery, because the discovery process is...more
In Short - The Situation: Insolvency officeholders increasingly find their investigations into a company's affairs frustrated by the comingling of records on a "group" server. Claims to privilege by other group entities (or...more
Expert advice on the pricing of forward freight agreements, used to “make good any legitimate grievance” and “add ballast” in correspondence concerning alleged corporate mismanagement, was not covered by litigation privilege...more
In Xyngular Corp. v. Schenkel, a shareholder and director suspected that his colleagues on the board of directors were engaging in improper self-dealing, so he asked an IT department employee to download documents disclosing...more
Federal litigators aren’t taking sufficient advantage of 2008 amendments to Federal Rule of Evidence 502, which gives them the authority to obtain protective orders that can stem the damage from inadvertent disclosure of...more