False Claims Act Insights - Is DOJ Allowed to Share Privileged Documents with Whistleblowers in FCA Disputes?
[Podcast] Defining Our Vision and Values
DE Under 3: OFCCP Walks Back Its Earlier “Pay Equity” Directive
JONES DAY TALKS®: International Litigation: Confidentiality and Legal Privilege under French Law
Writing a book as a Big Law partner - Legally Contented Ep. 2 - Christopher Ruhland
Internal Investigations in the Asia-Pacific Region
Cyberside Chats: Preserving Legal Privilege After a Cybersecurity Incident
CyberSide Chats: Yes, you needed a cyber attorney a long time ago (with Erik Weinick)
Client Confidentiality in the Age of Coronavirus [More with McGlinchey Ep. 2]
Jones Day Presents: Strategies for Dealing with the IRS: The IRS Examination
Day 15 of One Month to Better Investigations and Reporting-the Parameters of Privileges
Day 2 of One Month to Better Investigations and Reporting-Selection of Investigative Counsel
Your Cyber Minute: Attorney-client privilege in the midst of a cybersecurity breach
Insurance Companies and the Attorney-Client Privilege in Arizona
Attorney Client Privilege
Polsinelli Podcast - Social Media at Work - What's Allowed and What Isn't?
Do You Need A Lawyer for a Federal Grand Jury Subpoena?
In complex litigation, understanding when a document is protected by attorney-client privilege can be challenging, especially when privilege issues arise in multidistrict litigation (MDL) like the In re Uber Technologies,...more
As explained in previous Privilege Points, courts frequently must decide which state’s privilege law applies to communications involving several states. Fed. R. Evid. 501 states that federal courts should apply state law but...more
[Editor’s Note: This article was first published May 15, 2024 and EDRM is grateful to Tom Paskowitz and Robert Keeling of our Trusted Partner, Sidley, for permission to republish. The opinions and positions are those of the...more
The volumes of evidence available for litigation are such that privileged documents – a small but important subset of any evidence collection – can easily be overlooked, commingled, misplaced, or simply lost. In addition, the...more
Because privilege logs necessarily contain logistical but not content-based information about withheld documents, adversaries sometimes challenge privilege protection because no lawyer sent or received a withheld document....more
Citing new deposition testimony, actor Justin Theroux in a recent motion asked the New York Supreme Court to reconsider its December 2020 denial of Theroux’s motion to compel production of emails that his neighbor, Norman...more
What starts online won't stop there - There aren't many college basketball games that change the share price of a Fortune 100 company. But in February 2019, Duke University freshman star Zion Williamson blew out one of his...more
When we hear about discovery abuses in litigation, we often think of overzealous lawyers using obstructionist tactics. Such behavior, however, rarely involves litigants “improperly accessing” the email communications of an...more
Corporations claiming attorney-client privilege protection for their emails must prove that the emails were primarily motivated by their need for legal advice. Simply adding lawyers' names as direct or copy recipients does...more
Companies have always taken the position that an employee’s use of company e-mail is not private, and can be accessed and reviewed by the company at any time. There have been a large number of court cases, which have held...more
The ninth edition of The E-Discovery Digest focuses on recent decisions addressing the scope and application of the attorney-client privilege and work-product doctrine, spoliation, and discovery responses....more
Electronic discovery cases that made headlines in 2017 featured well-known names such as Taylor Swift and Lynyrd Skynyrd, and reached all the way to the U.S. Supreme Court. As the year draws to a close, it’s a good time to...more
The eighth edition of The E-Discovery Digest focuses on recent decisions addressing the scope and application of the attorney-client privilege and work-product doctrine, spoliation, and discovery responses....more
The seventh edition of The E-Discovery Digest focuses on recent decisions addressing the scope and application of the attorney-client privilege and work-product doctrine, spoliation, and discovery responses....more
On June 6, 2017, the First Department had an opportunity to apply—and reaffirm—last month’s decision in Peerenboom v. Marvel Entm’t, LLC, where the Court held that use of a company email system for personal purposes “does...more
The sixth edition of The E-Discovery Digest focuses on recent decisions addressing the scope and application of the attorney-client privilege and work-product doctrine, spoliation, and discovery responses. ...more
The fifth edition of The E-Discovery Digest focuses on recent decisions addressing the scope and application of the attorney client privilege and work-product doctrine, spoliation, and discovery responses. ...more