Follow Us

Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Cybersecurity E-Discovery Technology Media and Telecom

Privilege Logs: Strategy, Best Practices and Practical Advice

This article provides an overview of the different types of privilege logs, lays out best practices for negotiating ESI or privilege-log protocols, and discusses other issues that can occur with privilege logs in e-discovery.

X

Thank you for sharing!

Your article was successfully shared with the contacts you provided.

Gone are the days when a lawyer would print out documents and prepare a privilege log by drafting individual descriptions — one privileged document at a time. Leveraging the latest technological tools, today’s e-data lawyers are as sophisticated and efficient in preparing privilege logs as they are in all other phases of discovery. Privilege-log planning should begin well before the first privileged document is logged. In fact, privilege-log strategy should be considered at the outset of a matter and included in early meet-and-confers with opposing counsel about the discovery process. In this article, we provide an overview of the different types of privilege logs; lay out best practices for negotiating ESI or privilege-log protocols; discuss what to do if an ESI or privilege-log protocol has not been entered in a matter; consider practical uses of technology to generate privilege logs; and address the inadvertent production of a privileged document.

This premium content is locked for Cybersecurity Law & Strategy subscribers only

Continue reading by getting
started with a subscription.

ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN CYBERSECURITY, PRIVACY, INFORMATION GOVERNANCE, LEGAL TECHNOLOGY AND E-DISCOVERY.
  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on cyber threats, data breaches, and legal technology
  • Tap into expert guidance from top legal tech lawyers and experts

SUBSCRIBE NOW

Subscribe Now For Unlimited Access

Read These Next