Key Discovery Points: Navigating Clawbacks When In-House Counsel Are Included
False Claims Act Insights - Is DOJ Allowed to Share Privileged Documents with Whistleblowers in FCA Disputes?
[Podcast] Defining Our Vision and Values
DE Under 3: OFCCP Walks Back Its Earlier “Pay Equity” Directive
JONES DAY TALKS®: International Litigation: Confidentiality and Legal Privilege under French Law
Writing a book as a Big Law partner - Legally Contented Ep. 2 - Christopher Ruhland
Internal Investigations in the Asia-Pacific Region
Cyberside Chats: Preserving Legal Privilege After a Cybersecurity Incident
CyberSide Chats: Yes, you needed a cyber attorney a long time ago (with Erik Weinick)
Client Confidentiality in the Age of Coronavirus [More with McGlinchey Ep. 2]
Jones Day Presents: Strategies for Dealing with the IRS: The IRS Examination
Day 15 of One Month to Better Investigations and Reporting-the Parameters of Privileges
Day 2 of One Month to Better Investigations and Reporting-Selection of Investigative Counsel
Your Cyber Minute: Attorney-client privilege in the midst of a cybersecurity breach
Insurance Companies and the Attorney-Client Privilege in Arizona
Attorney Client Privilege
Polsinelli Podcast - Social Media at Work - What's Allowed and What Isn't?
Do You Need A Lawyer for a Federal Grand Jury Subpoena?
In this Key Discovery Points video, Brett Burney of Nextpoint and Doug Austin of eDiscovery Today break down a key antitrust ruling in De Coster v. Amazon.com, where a judge ordered 54 of 85 documents reviewed in camera to be...more
Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the period of May 11-17. Here’s what’s...more
Lawyers frequently represent multiple clients on the same matter. Absent some contractual arrangements to the contrary, those lawyers must share all confidential information with all the jointly represented clients and, of...more
In the chaos following a cyberattack, forensic reports are often pulled together under intense pressure and can assist companies in responding to and remediating the incident. However, if you're not careful, these reports...more
Last week’s Privilege Point described S.D.N.Y. Judge Lewis Liman’s conclusion that a company waived privilege protection for legal advice it received from its counsel by disclosing the advice to its financial advisor China...more
When it comes to eDiscovery, term translation isn't just about converting words from one language into another. It's a highly specialized process that requires a nuanced understanding of both linguistics and technical search...more
Concerns about claims of legal professional privilege over third-party investigation reports produced in the course of responding to cyberattacks, and the extent to which such reports can be shielded from disclosure in legal...more
A privilege log is a critical component of the discovery process,. It provides a line-by-line account of confidential communications, documents, and other materials that have been withheld or partially redacted due to claims...more
The common interest doctrine can sometimes protect as privileged communications between separately represented clients who share an identical legal interest in litigation, or in anticipation of litigation. But satisfying this...more
Last week’s Privilege Point described a court’s review of a lawyer’s conversation with a witness and its conclusion that none of the conversation deserved the heightened opinion work product protection. LaBudde v. Phoenix...more
By definition, a litigation hold notice is a communication from an attorney to a client regarding the duty to preserve potentially responsive information. In Homeland Ins. Co. of Del. v. Independent Health Ass’n., Inc., 2025...more
Not everything stamped “privileged” is safe from prying eyes. The Pennsylvania Superior Court recently ruled that interview notes compiled by a sorority’s leadership after a tragic incident were not shielded by...more
As recent high-profile litigation, government investigations, and large-scale data-security incidents have shown, organizations are often thrust into crisis mode, requiring rapid responses and close collaboration with third...more
Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the period of January 19-25. Here’s what’s...more
In the aftermath of the soap opera-like ethical scandal over an undisclosed romantic relationship between a Jackson Walker partner and a Texas bankruptcy judge, an Oregon federal court dealt with discovery of a renowned...more
Having taught Federal Rule of Evidence 502 (FRE 502) in my law classes for over a decade, I felt I had a firm grasp of its nuances. Yet recent litigation where I serve as Special Master prompted me to revisit the rule with...more
A privilege log is the absolute bane of an attorney’s existence. I don’t mean it isn’t important and a critical component of discovery, but the level of planning, analysis and detail required to complete such a log is...more
Host Jonathan Porter welcomes Husch Blackwell partner Kip Randall back to the program to dig deeper into Omni Healthcare, Inc. et al v. MD Spine Solutions LLC et al., a False Claims Act litigation in which the defendant...more
In a fairly short opinion and order, the district court in Weston v. DocuSign, Inc. analyzed whether the parties were entitled to the production of text messages from former employees’ personal devices and potential piercing...more
In complex litigation, understanding when a document is protected by attorney-client privilege can be challenging, especially when privilege issues arise in multidistrict litigation (MDL) like the In re Uber Technologies,...more
By now, companies across all industries have become familiar with the lifecycle and stages of a ransomware incident. Generally, once an attack is contained, remediation and rebuilding will follow. Shortly after, the crisis...more
Picture this: You’ve just been retained by a new client who has been named as a defendant in a complex commercial litigation. While the client has solid grounds to be dismissed from the case at an early stage via a...more
Transactional attorneys play a key strategic role in drafting essential documents, such as corporate formations and contracts, on behalf of corporate clients. With a client’s current needs at the forefront—often accompanied...more
There is no doubt that high-stakes litigation is a team sport. Among myriad experts that come to the table for the client, litigation communications professionals are becoming more essential than ever. To help manage the...more
Litigation attorneys are constantly bombarded with news of trial victories and defeats – millions of dollars awarded in damages in one case while a defense verdict is achieved in another. Although some attorneys may read...more