False Claims Act Insights - Is DOJ Allowed to Share Privileged Documents with Whistleblowers in FCA Disputes?
[Podcast] Defining Our Vision and Values
DE Under 3: OFCCP Walks Back Its Earlier “Pay Equity” Directive
JONES DAY TALKS®: International Litigation: Confidentiality and Legal Privilege under French Law
Writing a book as a Big Law partner - Legally Contented Ep. 2 - Christopher Ruhland
Internal Investigations in the Asia-Pacific Region
Cyberside Chats: Preserving Legal Privilege After a Cybersecurity Incident
CyberSide Chats: Yes, you needed a cyber attorney a long time ago (with Erik Weinick)
Client Confidentiality in the Age of Coronavirus [More with McGlinchey Ep. 2]
Jones Day Presents: Strategies for Dealing with the IRS: The IRS Examination
Day 15 of One Month to Better Investigations and Reporting-the Parameters of Privileges
Day 2 of One Month to Better Investigations and Reporting-Selection of Investigative Counsel
Your Cyber Minute: Attorney-client privilege in the midst of a cybersecurity breach
Insurance Companies and the Attorney-Client Privilege in Arizona
Attorney Client Privilege
Polsinelli Podcast - Social Media at Work - What's Allowed and What Isn't?
Do You Need A Lawyer for a Federal Grand Jury Subpoena?
In Abrego-Garcia v. Noem, __ F.R.D. ___, 2025 WL 1166402 (D. Md. Apr. 22, 2025)(Xinis, J.), plaintiffs notified the Court of “seemingly intractable discovery disputes….” The case is before the District Court after the United...more
Having taught Federal Rule of Evidence 502 (FRE 502) in my law classes for over a decade, I felt I had a firm grasp of its nuances. Yet recent litigation where I serve as Special Master prompted me to revisit the rule with...more
In complex litigation, understanding when a document is protected by attorney-client privilege can be challenging, especially when privilege issues arise in multidistrict litigation (MDL) like the In re Uber Technologies,...more
As explained in previous Privilege Points, courts frequently must decide which state’s privilege law applies to communications involving several states. Fed. R. Evid. 501 states that federal courts should apply state law but...more
In Stuart v. County of Riverside, 2024 WL 3086634, at *3 (C.D. Cal. Jun. 14, 2024), the District Court found a relationship between work product designations and triggering of the common-law duty to preserve....more
I have never heard of a “destruction/unavailable” log; however, in the comprehensive – indeed, exhaustive – decision of Leprino Foods Co. v. Avani Outpatient Surgical Center, Inc., 2024 WL 4488711 (C.D. Ca. Sep. 30, 2024),...more
In Linet Americas, Inc. v. Hill-Rom Holdings, Inc., 2024 WL 3425795 (N.D. Ill. Jul. 15, 2024), the court held that “attachments to attorney client communications may be withheld as privileged without an independent basis for...more
In November of 2022, ChatGPT upended our thinking about artificial intelligence with a new form of machine learning called Generative AI (GenAI). Since then, discussions about GenAI models like GPT have taken center stage in...more
[Editor’s Note: This article was first published May 15, 2024 and EDRM is grateful to Tom Paskowitz and Robert Keeling of our Trusted Partner, Sidley, for permission to republish. The opinions and positions are those of the...more
In Kyle Rayome v. ABT Electronics, 2024 WL 1435098 (N.D. Ill. 2024), the court wrote that it “would prefer this case not go to the dark place where attorneys on one side demand that the attorneys on the other side provide...more
James MacDonald vs. Sally Wagenmaker, et.al., 2024 IL App (1st) 230089 (March 1, 2024) - Brief Summary - An Illinois appellate court reversed a discovery order compelling the defendant law firm to produce privileged...more
In ‘Rust’ Armorer’s Phone Snafu Shows Risks Of Texting Clients – Law360 (Feb. 13, 2024), Phillip Bantz wrote: “A legal dust-up over compromised text messages between a movie prop weapons expert and her lawyer in the ‘Rust’...more
[Editor’s Note: This article has been republished with permission. It was originally published November 9, 2023 on the eDiscovery Assistant Blog] This week’s decision comes to us from the case titled 6340 NB LLC v. Cap. One,...more
The volumes of evidence available for litigation are such that privileged documents – a small but important subset of any evidence collection – can easily be overlooked, commingled, misplaced, or simply lost. In addition, the...more
Because privilege logs necessarily contain logistical but not content-based information about withheld documents, adversaries sometimes challenge privilege protection because no lawyer sent or received a withheld document....more
Organizations are feeling the pinch of compliance like never before as government agencies at every level are scrutinizing their business affairs more closely and issuing more regulations. To meet their compliance...more
The Court of Appeals of North Carolina's decision in Crosmun v. The Trustees of Fayetteville Technical Community College, ___ N.C. App. ___, 832 S.E.2d 223 (2019) provides much needed guidance to North Carolina courts on how...more
When we hear about discovery abuses in litigation, we often think of overzealous lawyers using obstructionist tactics. Such behavior, however, rarely involves litigants “improperly accessing” the email communications of an...more
Companies have always taken the position that an employee’s use of company e-mail is not private, and can be accessed and reviewed by the company at any time. There have been a large number of court cases, which have held...more
The ninth edition of The E-Discovery Digest focuses on recent decisions addressing the scope and application of the attorney-client privilege and work-product doctrine, spoliation, and discovery responses....more
While courts and the Federal Rules of Evidence take an increasingly pragmatic approach to the question of when inadvertent disclosure of privileged information results in waiver, a recent federal magistrate’s ruling serves as...more