Latest Publications

Share:

Creating Privilege Logs: A Best Practices Guide

A privilege log is a critical component of the discovery process,. It provides a line-by-line account of confidential communications, documents, and other materials that have been withheld or partially redacted due to claims...more

Blueprint for Successful Second Request Document Review

The question, “Have you worked on a second request?” is often met by a sigh or a knowing glance and accompanied by a story that shows herculean strength or the agony of defeat. Or both. Because of the sheer number of...more

2 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide