False Claims Act Insights - Is DOJ Allowed to Share Privileged Documents with Whistleblowers in FCA Disputes?
[Podcast] Defining Our Vision and Values
DE Under 3: OFCCP Walks Back Its Earlier “Pay Equity” Directive
JONES DAY TALKS®: International Litigation: Confidentiality and Legal Privilege under French Law
Writing a book as a Big Law partner - Legally Contented Ep. 2 - Christopher Ruhland
Internal Investigations in the Asia-Pacific Region
Cyberside Chats: Preserving Legal Privilege After a Cybersecurity Incident
CyberSide Chats: Yes, you needed a cyber attorney a long time ago (with Erik Weinick)
Client Confidentiality in the Age of Coronavirus [More with McGlinchey Ep. 2]
Jones Day Presents: Strategies for Dealing with the IRS: The IRS Examination
Day 15 of One Month to Better Investigations and Reporting-the Parameters of Privileges
Day 2 of One Month to Better Investigations and Reporting-Selection of Investigative Counsel
Your Cyber Minute: Attorney-client privilege in the midst of a cybersecurity breach
Insurance Companies and the Attorney-Client Privilege in Arizona
Attorney Client Privilege
Polsinelli Podcast - Social Media at Work - What's Allowed and What Isn't?
Do You Need A Lawyer for a Federal Grand Jury Subpoena?
In a fairly short opinion and order, the district court in Weston v. DocuSign, Inc. analyzed whether the parties were entitled to the production of text messages from former employees’ personal devices and potential piercing...more
As explained in previous Privilege Points, courts frequently must decide which state’s privilege law applies to communications involving several states. Fed. R. Evid. 501 states that federal courts should apply state law but...more
In Linet Americas, Inc. v. Hill-Rom Holdings, Inc., 2024 WL 3425795 (N.D. Ill. Jul. 15, 2024), the court held that “attachments to attorney client communications may be withheld as privileged without an independent basis for...more
[Editor’s Note: This article was first published May 15, 2024 and EDRM is grateful to Tom Paskowitz and Robert Keeling of our Trusted Partner, Sidley, for permission to republish. The opinions and positions are those of the...more
Because privilege logs necessarily contain logistical but not content-based information about withheld documents, adversaries sometimes challenge privilege protection because no lawyer sent or received a withheld document....more
Organizations are feeling the pinch of compliance like never before as government agencies at every level are scrutinizing their business affairs more closely and issuing more regulations. To meet their compliance...more