False Claims Act Insights - Is DOJ Allowed to Share Privileged Documents with Whistleblowers in FCA Disputes?
The decision in Cook v. Meta Platforms, Inc., 2024 WL 251942 (N.D. Cal. Jan. 21, 2025), packs a lot into very few pages. In two instances, where Meta had offered a compromise solution, the court held Meta to that offer....more
I have never heard of a “destruction/unavailable” log; however, in the comprehensive – indeed, exhaustive – decision of Leprino Foods Co. v. Avani Outpatient Surgical Center, Inc., 2024 WL 4488711 (C.D. Ca. Sep. 30, 2024),...more
[Editor’s Note: This article was first published July 24, 2024 and EDRM is grateful to Tom Paskowitz and Robert Keeling of our Trusted Partner, Sidley, for permission to republish. The opinions and positions are those of the...more
The purpose of a privilege log is to provide sufficient information for the recipient of the log to determine whether the withheld information is, at least on its face, privileged. In short: “Trust, but verify.” See,...more
[Editor’s Note: This article was first published June 18, 2024 and EDRM is grateful to Tom Paskowitz and Robert Keeling of our Trusted Partner, Sidley, for permission to republish. The opinions and positions are those of the...more
Privilege logs have been getting a lot of attention, with good reason. “Privilege logging is arguably the most burdensome and time consuming task a litigant faces during the document production process.” The Sedona...more
January is a time to set goals and ponder what the new year will bring. It is also a time to think about what happened last year. In the world of litigation, it is important for lawyers and eDiscovery professionals to take...more
The ESI protocol is a negotiated document that expressly states how the parties to a litigation should produce electronically stored information (ESI). The ESI protocol assures against surprises and commands that ESI is...more