Bar Exam Toolbox Podcast Episode 305: Spotlight on Civil Procedure (Part 2 – Discovery)
Key Discovery Points: Lessons Learned from TikTok’s Redaction Fiasco
All Things Investigations: Episode 37 – Privileges in Document Production with Mike Huneke
Sitting with the C-Suite: eDiscovery Observations – Historical Lookback to 1990s and 2000s
So you are ready to divorce...what is the process?
Sitting with the C-Suite: In-House Counsel - Leveraging Text Classification to Problem Solve
Video | Tips for Managing the Preservation of Mobile Device Data
PODCAST: Williams Mullen's Benefits Companion - Government Investigative Demands
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
It’s the season of love – for eDiscovery case law! In our February 2025 monthly webinar of cases covered by the eDiscovery Today blog we will discuss disputes related to cross-border disputes and the Hague Convention,...more
The decision in Cook v. Meta Platforms, Inc., 2024 WL 251942 (N.D. Cal. Jan. 21, 2025), packs a lot into very few pages. In two instances, where Meta had offered a compromise solution, the court held Meta to that offer....more
Several courts have adopted a nonsensical principle that, as one court put it, “[w]hen documents are prepared for dissemination to third parties, neither the document itself, nor preliminary drafts, are entitled to immunity.”...more
In complex litigation, understanding when a document is protected by attorney-client privilege can be challenging, especially when privilege issues arise in multidistrict litigation (MDL) like the In re Uber Technologies,...more
In OL Private Counsel, LLC v. Olson, 2024 WL 4839277 (D. Utah Nov. 20, 2024), the court addressed recovery of expenses by non-parties for responding to a subpoena....more
I have never heard of a “destruction/unavailable” log; however, in the comprehensive – indeed, exhaustive – decision of Leprino Foods Co. v. Avani Outpatient Surgical Center, Inc., 2024 WL 4488711 (C.D. Ca. Sep. 30, 2024),...more
In Linet Americas, Inc. v. Hill-Rom Holdings, Inc., 2024 WL 3425795 (N.D. Ill. Jul. 15, 2024), the court held that “attachments to attorney client communications may be withheld as privileged without an independent basis for...more
In Melton Properties, LLC v. Ill. Central R. Co., 2024 WL 3015749 at *5 (N.D. Miss. June 14, 2024), the court listed the factors to consider in deciding when the failure to provide a timely privilege log is – or is not – a...more
In federal courts, it is nearly impossible to successfully file an interlocutory appeal of a trial court’s order requiring production of privileged documents — despite the obvious “cat out of the bag” nature of such rulings....more
[Editor’s Note: This article was first published May 15, 2024 and EDRM is grateful to Tom Paskowitz and Robert Keeling of our Trusted Partner, Sidley, for permission to republish. The opinions and positions are those of the...more
3: Preparing Your Inside Team - Preservation, Privilege, Potential Pitfalls -This is the third in a series of articles that explores considerations and suggested actions for in-house counsel who are inexperienced in patent...more
In Rayome v. ABT Electronics, 2024 WL 1435098 (N.D. Ill. Apr. 3, 2024), the court wrote that “it would be in the parties’ interest to reach a negotiated result. It should not be forgotten that a party could be ‘right,’ but...more
A recent privilege dispute in E.D.N.Y. case La Liberte v. Reid provides a prime opportunity to review the law and practical aspects surrounding attorney-client privilege, work product protection, and the crime-fraud exception...more
In Kyle Rayome v. ABT Electronics, 2024 WL 1435098 (N.D. Ill. 2024), the court wrote that it “would prefer this case not go to the dark place where attorneys on one side demand that the attorneys on the other side provide...more
James MacDonald vs. Sally Wagenmaker, et.al., 2024 IL App (1st) 230089 (March 1, 2024) - Brief Summary - An Illinois appellate court reversed a discovery order compelling the defendant law firm to produce privileged...more
[Editor’s Note: This article has been republished with permission. It was originally published November 9, 2023 on the eDiscovery Assistant Blog] This week’s decision comes to us from the case titled 6340 NB LLC v. Cap. One,...more
In this episode of All Things Investigations, host Tom Fox and guest Mike Huneke explore a complex legal case involving Cognizant Technologies and former executives facing criminal charges for alleged bribery. The court’s...more
No corporate lawyer wants to get drawn into a nasty litigation between an entity’s owners. But the reality is that corporate and general counsel often find themselves unwittingly ensnared in business divorce cases. Sometimes...more
Courts take differing positions on the "client's" identity in the government setting. Among other things, such differing positions might affect the waiver implications of one government agency disclosing its privileged...more
Under some arrangements, major shareholders appoint directors to companies those shareholders partially own. Does such a company waive its privilege by disclosing its privileged documents to a designating shareholder's...more
Last week's Privilege Point described courts' various standards for their in camera review of withheld documents. The vast majority recognizes the trial court's discretion, but some courts always conduct an in camera review...more
For the first time in 25 years, the U.S. Supreme Court is considering the scope of the attorney-client privilege in the case In re Grand Jury, No. 21-1397. The Court heard oral arguments earlier this week about when the...more
Courts' application of the attorney-client privilege to government lawyers' communications reflects the tension between the public interest in government transparency and the societal benefit of public officials and employees...more
The Supreme Court recently granted certiorari in In re Grand Jury to resolve a circuit split regarding what standard governs the application of the attorney-client privilege to dual-purpose communications, that is...more
Given the vulnerability of electronic communications to intrusion, lawyers sometimes obtain and may be tempted to use documents that their clients have inappropriately obtained from an adversary – even privileged documents....more