False Claims Act Insights - Is DOJ Allowed to Share Privileged Documents with Whistleblowers in FCA Disputes?
Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the period of January 19-25. Here’s what’s...more
The decision in Cook v. Meta Platforms, Inc., 2024 WL 251942 (N.D. Cal. Jan. 21, 2025), packs a lot into very few pages. In two instances, where Meta had offered a compromise solution, the court held Meta to that offer....more
A privilege log is the absolute bane of an attorney’s existence. I don’t mean it isn’t important and a critical component of discovery, but the level of planning, analysis and detail required to complete such a log is...more
The construction industry faces unique challenges in eDiscovery, from managing vast data volumes to protecting sensitive communications and plans. HaystackID®’s upcoming webcast will explore practical and advanced artificial...more
I have never heard of a “destruction/unavailable” log; however, in the comprehensive – indeed, exhaustive – decision of Leprino Foods Co. v. Avani Outpatient Surgical Center, Inc., 2024 WL 4488711 (C.D. Ca. Sep. 30, 2024),...more
[Editor’s Note: This article was first published July 24, 2024 and EDRM is grateful to Tom Paskowitz and Robert Keeling of our Trusted Partner, Sidley, for permission to republish. The opinions and positions are those of the...more
The purpose of a privilege log is to provide sufficient information for the recipient of the log to determine whether the withheld information is, at least on its face, privileged. In short: “Trust, but verify.” See,...more
Get ready for some epic showdowns as Chicago ACEDS and Cimplifi present The Great eDiscovery Debate on July 16th!...more
[Editor’s Note: This article was first published June 18, 2024 and EDRM is grateful to Tom Paskowitz and Robert Keeling of our Trusted Partner, Sidley, for permission to republish. The opinions and positions are those of the...more
Privilege logs have been getting a lot of attention, with good reason. “Privilege logging is arguably the most burdensome and time consuming task a litigant faces during the document production process.” The Sedona...more
It’s never too early in the year for eDiscovery case law! Our January 2024 monthly webinar of cases covered by the eDiscovery Today blog discusses Rule 45 subpoena requests, in-camera review and categorical privilege logs,...more
January is a time to set goals and ponder what the new year will bring. It is also a time to think about what happened last year. In the world of litigation, it is important for lawyers and eDiscovery professionals to take...more
In modern litigation, more and more cases involve massive volumes of electronic data at the discovery phase, leaving legal teams to wade through a sea of documents to uncover relevant evidence. All this noise in the data can...more
The ESI protocol is a negotiated document that expressly states how the parties to a litigation should produce electronically stored information (ESI). The ESI protocol assures against surprises and commands that ESI is...more
DOC REVIEW PART II: ORGANIZING YOUR EVIDENCE & PROTECTING PRIVILEGE - Before we get too deep into our three part series on Document Review, let’s ask, why is document review even necessary? According to Rule 26 of the...more