Bar Exam Toolbox Podcast Episode 204: Listen and Learn -- Scope of Discovery and the Work-Product Privilege
Internal Investigations in the Asia-Pacific Region
Cyberside Chats: Preserving Legal Privilege After a Cybersecurity Incident
Jones Day Presents: Strategies for Dealing with the IRS: The IRS Examination
Day 15 of One Month to Better Investigations and Reporting-the Parameters of Privileges
In a rare exercise of authority through a sua sponte director review, US Patent and Trademark Office (USPTO) Director Kathi Vidal affirmed the Patent Trial and Appeal Board (PTAB)’s decision to sanction patent owner Longhorn...more
Communication during a data breach is challenging in the best of circumstances, and control of information, especially early in a breach response, is critical. Below are some DOs and DON’Ts for communicating during a data...more
With the recent wave of ransomware and other security incidents, it is now more important than ever for impacted organizations to have a thorough understanding of each element of a proper data breach response. That includes...more
Normally a third party does not have standing to challenge a document subpoena. But what if the subpoena seeks discovery of the third party’s privileged or work product-protected documents in the subpoena target’s possession?...more
Last week’s Privilege Point described an S.D.N.Y. opinion rejecting privilege and work product claims for a document that on its face did not contain legal advice or any allusion to or analysis of anticipated litigation....more
Last week’s Privilege Point described two cases finding that successful plaintiffs had waived work product protection covering their invoices and other attorney’s fees billing documents because they sought attorney’s fees as...more
Seyfarth Synopsis: In its seminal decision, Bostock v. Clayton County, Georgia, the Supreme Court held that discrimination on the basis of sexual orientation or gender identity is tantamount to discrimination on the basis of...more
Under what is called the American Rule, winning litigants normally pay their own attorneys’ fees. But in some situations, they can seek recovery of those fees from the losing adversary. Not surprisingly, such efforts...more
Martz v. Polaris Sales Inc., Case. No. 4:22-CV-01390, 2024 WL 199550 (M.D. Pa. Jan. 18, 2024) - In this product liability case, the plaintiff’s wife lost control of the ATV she was operating and died in a fatal accident. A...more
As anyone faced with discovery requests knows, one of the most important parts of producing documents is determining what documents are subject to attorney-client privilege or work product doctrine and must therefore be...more
Recently, in Lewis v. Crochet et al., the United States Court of Appeals for the Fifth Circuit rejected an attempt by a plaintiff to use the crime-fraud exception to the attorney-client privilege to compel two lawyers’...more
In both the federal and state judicial systems, judges assess privilege and work product protection claims — sometimes coordinating with judges at other levels. But there is a lurking unspoken risk that some lawyers may...more
3: Preparing Your Inside Team - Preservation, Privilege, Potential Pitfalls -This is the third in a series of articles that explores considerations and suggested actions for in-house counsel who are inexperienced in patent...more
All or nearly all courts require litigants to log documents withheld on privilege or work product grounds (with an exception discussed next week). But they disagree about what the log should include — with some courts taking...more
For obvious reasons, the law encourages settlements. During settlement negotiations, participants may be tempted to disclose work product-protected documents or intangible communications. Can participants or even third...more
The last two Privilege Points (Part I and Part II) explained that the 1947 U.S. Supreme Court decision in Hickman v. Taylor, 329 U.S. 495 (1947), created a common law protection for litigation-related tangible and intangible...more
Last week’s Privilege Point explained that nearly every court extends work product protection beyond the “documents and tangible things” specified in Fed. R. Civ. P. 26(b)(3) and understandably mentioned in a recent Southern...more
A recent privilege dispute in E.D.N.Y. case La Liberte v. Reid provides a prime opportunity to review the law and practical aspects surrounding attorney-client privilege, work product protection, and the crime-fraud exception...more
The “work product” doctrine provides an entirely separate protection from the attorney-client privilege. Unlike the privilege, the work product doctrine is not ancient, normally not absolute, and not fragile. The many...more
With its origins in the 16th century, the attorney-client privilege is one of the oldest doctrines in our common law tradition. Even so, new issues do arise, like in the North Carolina Business Court case Hosie v. 8 Rivers...more
This Sidley Update addresses the following recent developments and court decisions involving e-discovery issues: 1. an order from the U.S. District Court for the Eastern District of California granting a motion to compel...more
Corporations risk waiving their fragile privilege protection by sharing protected communications with even the friendliest outsiders — such as their retained public relations consultants, etc. They must disclose some...more
The last two Privilege Points have described yet another losing effort to protect a data breach investigation and related communications. In Leonard v. McMenamins Inc., Case No. C22-0094-KKE, 2023 U.S. Dist. LEXIS 217502...more
Last week’s Privilege Point described a data breach victim’s latest losing effort to claim privilege protection for its consultant’s investigation report. Leonard v. McMenamins Inc., Case No. C22-0094-KKE, 2023 U.S. Dist....more
Companies and even law firms suffer data breaches, and usually claim privilege and work product protection for the inevitable resulting investigation. Unfortunately, courts seem to have rejected such protection claims in all...more