Key Discovery Points: Navigating Clawbacks When In-House Counsel Are Included
False Claims Act Insights - Is DOJ Allowed to Share Privileged Documents with Whistleblowers in FCA Disputes?
[Podcast] Defining Our Vision and Values
DE Under 3: OFCCP Walks Back Its Earlier “Pay Equity” Directive
JONES DAY TALKS®: International Litigation: Confidentiality and Legal Privilege under French Law
Podcast - Finding the Balance
Writing a book as a Big Law partner - Legally Contented Ep. 2 - Christopher Ruhland
Podcast - A Tortured Journey with the Lying Witness
Internal Investigations in the Asia-Pacific Region
Cyberside Chats: Preserving Legal Privilege After a Cybersecurity Incident
CyberSide Chats: Yes, you needed a cyber attorney a long time ago (with Erik Weinick)
Client Confidentiality in the Age of Coronavirus [More with McGlinchey Ep. 2]
Jones Day Presents: Strategies for Dealing with the IRS: The IRS Examination
Day 15 of One Month to Better Investigations and Reporting-the Parameters of Privileges
Day 2 of One Month to Better Investigations and Reporting-Selection of Investigative Counsel
Your Cyber Minute: Attorney-client privilege in the midst of a cybersecurity breach
Insurance Companies and the Attorney-Client Privilege in Arizona
Attorney Client Privilege
Polsinelli Podcast - Social Media at Work - What's Allowed and What Isn't?
Do You Need A Lawyer for a Federal Grand Jury Subpoena?
Should California courts permit litigants to conduct discovery into litigation funding, namely whether a third party is funding their adversary’s litigation efforts?...more
Concerns about claims of legal professional privilege over third-party investigation reports produced in the course of responding to cyberattacks, and the extent to which such reports can be shielded from disclosure in legal...more
A recent court ruling related to Donald Trump’s attempts to overturn the 2020 presidential election serves as an evergreen reminder that the attorney-client privilege and work product doctrine do not insulate documents and...more
The location of the data is not sufficient to avoid a disclosure order. When it comes to personal devices, people increasingly communicate across multiple platforms, often in an informal and unguarded manner. ...more
A data security incident will always require a technical response, and usually that technical response will come from outside experts. Those experts are hired to investigate and remediate an incident. Since data incidents...more
A ruling issued by the North Carolina Business Court last month could have a significant impact on the ability of North Carolina companies and counsel to assert the attorney-client privilege over communications exchanged in...more
While much of the corporate legal world has been focused on the effects of the COVID-19 pandemic, a little-noticed case working its way through the federal courts in Washington, D.C. threatens to whittle down the scope of...more