False Claims Act Insights - Is DOJ Allowed to Share Privileged Documents with Whistleblowers in FCA Disputes?
[Podcast] Defining Our Vision and Values
DE Under 3: OFCCP Walks Back Its Earlier “Pay Equity” Directive
JONES DAY TALKS®: International Litigation: Confidentiality and Legal Privilege under French Law
Writing a book as a Big Law partner - Legally Contented Ep. 2 - Christopher Ruhland
Internal Investigations in the Asia-Pacific Region
Cyberside Chats: Preserving Legal Privilege After a Cybersecurity Incident
CyberSide Chats: Yes, you needed a cyber attorney a long time ago (with Erik Weinick)
Client Confidentiality in the Age of Coronavirus [More with McGlinchey Ep. 2]
Jones Day Presents: Strategies for Dealing with the IRS: The IRS Examination
Day 15 of One Month to Better Investigations and Reporting-the Parameters of Privileges
Day 2 of One Month to Better Investigations and Reporting-Selection of Investigative Counsel
Your Cyber Minute: Attorney-client privilege in the midst of a cybersecurity breach
Insurance Companies and the Attorney-Client Privilege in Arizona
Attorney Client Privilege
Polsinelli Podcast - Social Media at Work - What's Allowed and What Isn't?
Do You Need A Lawyer for a Federal Grand Jury Subpoena?
Litigation adversaries often trigger privilege and work product disputes when they seek each other’s documents. But what if your client’s adversary subpoenas a third party holding your client’s privileged documents — whose...more
Artificial intelligence (AI) is transforming how organizations approach eDiscovery and internal investigations, offering faster insights and improved efficiency. However, integrating AI into legal workflows comes with...more
Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the period of January 5-11. Here’s what’s...more
New year, new case law! In our January 2025 monthly webinar of cases covered by the eDiscovery Today blog, we will discuss disputes related to whether emojis constitute contract agreement, privilege status of text messages,...more
Several courts have adopted a nonsensical principle that, as one court put it, “[w]hen documents are prepared for dissemination to third parties, neither the document itself, nor preliminary drafts, are entitled to immunity.”...more
In complex litigation, understanding when a document is protected by attorney-client privilege can be challenging, especially when privilege issues arise in multidistrict litigation (MDL) like the In re Uber Technologies,...more
Some readers have asked why Privilege Points have only rarely focused on work product issues in the insurance context. In addition to the sometimes dramatic differences between states’ handling of this issue, a recent case...more
With the growth of litigation funding as a mechanism for financing litigation, companies interviewing and ultimately selecting a funder inevitably share work product with them. In such circumstances, courts must assess (1)...more
I have never heard of a “destruction/unavailable” log; however, in the comprehensive – indeed, exhaustive – decision of Leprino Foods Co. v. Avani Outpatient Surgical Center, Inc., 2024 WL 4488711 (C.D. Ca. Sep. 30, 2024),...more
Some courts understandably conclude that the anticipation of litigation that can assure work product protection also requires the litigant to impose a litigation hold on pertinent documents. Perhaps that is not a perfect...more
Given the bare bones nature of many privilege logs, courts sometimes may be called upon, or themselves decide, to review withheld documents in camera to assess the grounds for the documents’ withholding. A handful of courts...more
Legal professionals in cybersecurity, information governance, and eDiscovery face escalating data volumes, data security challenges, high eDiscovery costs, and information management inefficiencies. With AI-enabled workflows,...more
Normally a third party does not have standing to challenge a document subpoena. But what if the subpoena seeks discovery of the third party’s privileged or work product-protected documents in the subpoena target’s possession?...more
Last week’s Privilege Point described an S.D.N.Y. opinion rejecting privilege and work product claims for a document that on its face did not contain legal advice or any allusion to or analysis of anticipated litigation....more
In Linet Americas, Inc. v. Hill-Rom Holdings, Inc., 2024 WL 3425795 (N.D. Ill. Jul. 15, 2024), the court held that “attachments to attorney client communications may be withheld as privileged without an independent basis for...more
Every court seems to require litigants to log documents they withhold based on privilege or work product claims. Perhaps not surprisingly, hardly any log goes unchallenged by the adversary. Most of these disputes eventually...more
In federal courts, it is nearly impossible to successfully file an interlocutory appeal of a trial court’s order requiring production of privileged documents — despite the obvious “cat out of the bag” nature of such rulings....more
Bien que le secret professionnel de l’avocat remonte au XVIe siècle, le droit relatif aux privilèges continue d’évoluer. Dans le contexte complexe actuel des litiges commerciaux, les privilèges doivent recevoir la plus grande...more
While solicitor-client privilege dates to the 16th century, the law regarding privilege continues to evolve. In today’s complex commercial litigation landscape, privilege requires careful consideration and rigorous protection...more
Aggressive plaintiffs sometimes try to generate a “side show” by challenging corporate defendants’ discovery responses (usually their document productions). Although federal courts have thankfully moved in the direction of...more
[Editor’s Note: This article was first published May 15, 2024 and EDRM is grateful to Tom Paskowitz and Robert Keeling of our Trusted Partner, Sidley, for permission to republish. The opinions and positions are those of the...more
3: Preparing Your Inside Team - Preservation, Privilege, Potential Pitfalls -This is the third in a series of articles that explores considerations and suggested actions for in-house counsel who are inexperienced in patent...more
Last week’s Privilege Point described one court’s incredible requirement that litigants identify everyone who learned of a withheld document’s content — even if they were not shown as a recipient....more
All or nearly all courts require litigants to log documents withheld on privilege or work product grounds (with an exception discussed next week). But they disagree about what the log should include — with some courts taking...more
The last two Privilege Points (Part I and Part II) explained that the 1947 U.S. Supreme Court decision in Hickman v. Taylor, 329 U.S. 495 (1947), created a common law protection for litigation-related tangible and intangible...more