News & Analysis as of

e-Discovery Attorney-Client Privilege Evidence

Baker Donelson

Privilege Under Fire: Protecting Forensic Reports in the Wake of a Data Breach

Baker Donelson on

In the chaos following a cyberattack, forensic reports are often pulled together under intense pressure and can assist companies in responding to and remediating the incident. However, if you're not careful, these reports...more

TransPerfect Legal

Search Term Translation for eDiscovery: The Art & Science of Getting the ‘Technical Translation’ Right

TransPerfect Legal on

When it comes to eDiscovery, term translation isn't just about converting words from one language into another. It's a highly specialized process that requires a nuanced understanding of both linguistics and technical search...more

EDRM - Electronic Discovery Reference Model

Another Approach to Drafting and Discovery of Litigation Hold Notices

By definition, a litigation hold notice is a communication from an attorney to a client regarding the duty to preserve potentially responsive information. In Homeland Ins. Co. of Del. v. Independent Health Ass’n., Inc., 2025...more

Array

This Week in eDiscovery: Nonprivileged Documents Attached to Privileged Communications | New Social Media Frontiers

Array on

Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the period of January 19-25. Here’s what’s...more

EDRM - Electronic Discovery Reference Model

Tailor FRE 502(d) Orders to the Case

Having taught Federal Rule of Evidence 502 (FRE 502) in my law classes for over a decade, I felt I had a firm grasp of its nuances. Yet recent litigation where I serve as Special Master prompted me to revisit the rule with...more

Minerva26

Privilege Log, Privilege Log — It’s All About the Description

Minerva26 on

A privilege log is the absolute bane of an attorney’s existence. I don’t mean it isn’t important and a critical component of discovery, but the level of planning, analysis and detail required to complete such a log is...more

Nextpoint, Inc.

Attorney-Client Confidentiality: Practical Tips for Protecting Privilege

Nextpoint, Inc. on

The volumes of evidence available for litigation are such that privileged documents – a small but important subset of any evidence collection – can easily be overlooked, commingled, misplaced, or simply lost. In addition, the...more

Skadden, Arps, Slate, Meagher & Flom LLP

The E-Discovery Digest - June 2018

The 10th edition of The E-Discovery Digest focuses on recent decisions addressing the scope and application of the attorney-client privilege and work-product doctrine, spoliation, and discovery responses....more

8 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide