False Claims Act Insights - Is DOJ Allowed to Share Privileged Documents with Whistleblowers in FCA Disputes?
A privilege log is a critical component of the discovery process,. It provides a line-by-line account of confidential communications, documents, and other materials that have been withheld or partially redacted due to claims...more
Afraid you won’t be up to date on important case law? Our October 2024 monthly webinar of cases covered by the eDiscovery Today blog will remove all your fears! During the webinar we will discuss disputes related to relevance...more
In Linet Americas, Inc. v. Hill-Rom Holdings, Inc., 2024 WL 3425795 (N.D. Ill. Jul. 15, 2024), the court held that “attachments to attorney client communications may be withheld as privileged without an independent basis for...more
[Editor’s Note: This article was first published July 24, 2024 and EDRM is grateful to Tom Paskowitz and Robert Keeling of our Trusted Partner, Sidley, for permission to republish. The opinions and positions are those of the...more
In Linet Americas, Inc. v. Hill-Rom Holdings, Inc., 2024 WL 3425795 (N.D. Ill. Jul. 15, 2024), the court enforced an ESI Protocol that called for a “metadata-only” privilege log, even though parts of the metadata were...more
Privilege logs have been getting a lot of attention, with good reason. “Privilege logging is arguably the most burdensome and time consuming task a litigant faces during the document production process.” The Sedona...more
Dive into the cutting-edge world of eDiscovery with EDRM's dynamic webinar on August 16th! This informative and interactive event will provide you with a front-row seat to the conversations shaping the future of eDiscovery...more
The difficulty of handling privilege disputes can be especially pronounced in cases involving a prolonged discovery period and large corporate defendants with different document custodians. When a party chooses to withhold...more
A detailed ESI protocol will simplify ediscovery and lead to smoother case planning in every step of the litigation process. Establishing an ESI protocol might seem daunting at first, but answering a few simple questions at...more
Privilege logs are often considered back-burner items in complex litigation and not addressed until discovery deadlines draw near. However, paying attention to privilege logs early on can be a hidden factor in in a successful...more
In This Issue: - - Attorney-Client Privilege/Work Product Decisions: ..Decisions Protecting Against Disclosure ..Decisions Ordering Disclosure - Spoliation and Preservation Decisions: ..Sanctions...more