Gone are the days when a lawyer would print out documents and prepare a privilege log by drafting individual descriptions — one privileged document at a time.
Privilege Logs: Strategy, Best Practices and Practical Advice
This article provides an overview of the different types of privilege logs, lays out best practices for negotiating ESI or privilege-log protocols, and discusses other issues that can occur with privilege logs in e-discovery.

This premium content is locked for LawJournalNewsletters subscribers only
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN LawJournalNewsletters
- Stay current on the latest information, rulings, regulations, and trends
- Includes practical, must-have information on copyrights, royalties, AI, and more
- Tap into expert guidance from top entertainment lawyers and experts
Already have an account? Sign In Now
For enterprise-wide or corporate access, please contact Customer Service at [email protected] or call 1-877-256-2473.






