News & Analysis as of

Discovery Litigation Strategies Attorney-Client Privilege

TransPerfect Legal

Search Term Translation for eDiscovery: The Art & Science of Getting the ‘Technical Translation’ Right

TransPerfect Legal on

When it comes to eDiscovery, term translation isn't just about converting words from one language into another. It's a highly specialized process that requires a nuanced understanding of both linguistics and technical search...more

A&O Shearman

Medibank class action: navigating the legal privilege maze

A&O Shearman on

Concerns about claims of legal professional privilege over third-party investigation reports produced in the course of responding to cyberattacks, and the extent to which such reports can be shielded from disclosure in legal...more

McGuireWoods LLP

How Does Work Product Protection Apply to Lawyers’ Witness Interview Notes? Two Courts Disagree on the Same Day: Part II

McGuireWoods LLP on

Last week’s Privilege Point described a court’s review of a lawyer’s conversation with a witness and its conclusion that none of the conversation deserved the heightened opinion work product protection. LaBudde v. Phoenix...more

EDRM - Electronic Discovery Reference Model

Another Approach to Drafting and Discovery of Litigation Hold Notices

By definition, a litigation hold notice is a communication from an attorney to a client regarding the duty to preserve potentially responsive information. In Homeland Ins. Co. of Del. v. Independent Health Ass’n., Inc., 2025...more

Husch Blackwell LLP

Why a Sorority’s Interview Notes Didn’t Stay Private: Lessons in Legal Privilege

Husch Blackwell LLP on

Not everything stamped “privileged” is safe from prying eyes. The Pennsylvania Superior Court recently ruled that interview notes compiled by a sorority’s leadership after a tragic incident were not shielded by...more

McGuireWoods LLP

Another Decision Spawned by Ethical Scandal Highlights Wisdom of Considering All Evidentiary Protections

McGuireWoods LLP on

In the aftermath of the soap opera-like ethical scandal over an undisclosed romantic relationship between a Jackson Walker partner and a Texas bankruptcy judge, an Oregon federal court dealt with discovery of a renowned...more

EDRM - Electronic Discovery Reference Model

Tailor FRE 502(d) Orders to the Case

Having taught Federal Rule of Evidence 502 (FRE 502) in my law classes for over a decade, I felt I had a firm grasp of its nuances. Yet recent litigation where I serve as Special Master prompted me to revisit the rule with...more

Minerva26

Privilege Log, Privilege Log — It’s All About the Description

Minerva26 on

A privilege log is the absolute bane of an attorney’s existence. I don’t mean it isn’t important and a critical component of discovery, but the level of planning, analysis and detail required to complete such a log is...more

Kilpatrick

Blurred Lines: Personal Devices, Proportionality, and Piercing the Work Product Privilege

Kilpatrick on

In a fairly short opinion and order, the district court in Weston v. DocuSign, Inc. analyzed whether the parties were entitled to the production of text messages from former employees’ personal devices and potential piercing...more

Association of Certified E-Discovery...

Understanding the Dominant Purpose Test for Determining Whether Privilege Applies

In complex litigation, understanding when a document is protected by attorney-client privilege can be challenging, especially when privilege issues arise in multidistrict litigation (MDL) like the In re Uber Technologies,...more

Robins Kaplan LLP

Unintended Consequences: Don’t Forget the Litigation Risks When Getting a Deal Done

Robins Kaplan LLP on

Transactional attorneys play a key strategic role in drafting essential documents, such as corporate formations and contracts, on behalf of corporate clients. With a client’s current needs at the forefront—often accompanied...more

Jackson Lewis P.C.

To Be (Discoverable), or Not to Be: Notetaking During an Attorney’s Internal Investigation

Jackson Lewis P.C. on

Introduction- Picture this: you are on-site at a new client’s headquarters for a weeklong hostile work environment investigation into several internal complaints made against the CEO and CFO. This is the first engagement...more

Jenner & Block

Privilege Newsletter: Fitting Consultants Within the Attorney-Client Privilege and Work Product Protection – Cyber Breach...

Jenner & Block on

Cyber attacks are increasingly frequent and virulent. An intruder may lurk in a company’s computer system for years, or an attack may be sudden and catastrophic. Millions of people’s personal information and companies’...more

Nextpoint, Inc.

Ediscovery Checklist: How to Win the Rule 26(f) Meet and Confer

Nextpoint, Inc. on

Preparing for the Meet and Confer - Proper preparation and documentation during the Rule 26(f) meet and confer process will greatly improve efficiency in the ediscovery phase of your litigation....more

Searcy Denney Scarola Barnhart & Shipley

What is the Status of Discovery of an Expert Witness Relationship?

In Wirley v. Central Florida Young Men’s Christian Association, 228 So.3rd 18 (Florida, 2017), the Supreme Court ruled disclosure of a financial relationship between a party, a plaintiff’s attorney and an expert, is no longer...more

Proskauer - California Employment Law

House of Cards: What Employers Can Learn From Kevin Spacey’s Alleged Missteps

Kevin Spacey’s legal troubles have taken a costly turn as the production companies behind Netflix’s House of Cards recently asked a California court to confirm an arbitration award of almost $31 million against Spacey for...more

Esquire Deposition Solutions, LLC

Litigation Experts Encourage Wider Use of Privilege Protection Orders

Federal litigators aren’t taking sufficient advantage of 2008 amendments to Federal Rule of Evidence 502, which gives them the authority to obtain protective orders that can stem the damage from inadvertent disclosure of...more

Patterson Belknap Webb & Tyler LLP

Forensic Analysis and Privilege in the Wake of a Data Breach

In the wake of a data breach, counsel will often require the assistance of a forensic firm in order to provide legal advice to their client. The forensic analysis—which is often memorialized in a report to counsel—is crucial...more

Butler Snow LLP

Really? I Shouldn’t Bring My BFF to My Lawyer’s Office?

Butler Snow LLP on

The Pagliara divorce has given us much to talk about. In “Sex, Lies, (Drugs) and Videotape … and Malicious Prosecution”, we discussed the dismissal of Husband’s malicious prosecution claims against Wife’s former divorce...more

Proskauer - Minding Your Business

District Court Affirms Order Requiring Production of Cyber-Investigation Report after Considering Totality of Circumstances

As we previously reported, the Magistrate Judge in In re: Capital One Customer Data Security Breach Litigation, found that a forensic report that Capital One had claimed was protected by the privilege and work product...more

Proskauer - Minding Your Business

Maintaining Privilege and Work Product Protections in Dual Purpose (Legal and Business) Investigations

Requires More than Merely Adding Counsel’s Name to a Forensic Report. Technical investigations conducted following cyber-incidents often have both legal and ordinary-course business purposes. In certain jurisdictions,...more

Hogan Lovells

Protecting attorney work product in internal investigations: A cautionary tale

Hogan Lovells on

On May 1, 2020, the D.C. Circuit denied RPM International’s petition for a writ of mandamus to vacate a district court order compelling disclosure of interview memoranda prepared by outside counsel to the Securities and...more

Seyfarth Shaw LLP

UPDATE: New Decision Regarding Discovery in Aid of Foreign Litigation

Seyfarth Shaw LLP on

In a much-anticipated opinion, Judge George B. Daniels of the United States District Court for the Southern District of New York recently affirmed the decision of a magistrate judge regarding the scope of discovery in aid of...more

Troutman Pepper Locke

Evaluating Stand-Alone Privilege for Cybersecurity Info

Troutman Pepper Locke on

With cybercrime on the rise, organizations have increasingly found themselves subject to litigation or regulatory investigations related to breaches. Documents and information created before breaches, such as security...more

Akin Gump Strauss Hauer & Feld LLP

Dual-Purpose, Patent Analysis Documents Found Immune from Discovery under Work Product Doctrine

In Limestone Memory Systems LLC v. Micron Technology, Inc. et al., the Discovery Master ruled that, under 9th Circuit law, pre-suit, patent analysis documents qualified for immunity from discovery under the work product...more

30 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide