Key Discovery Points: Navigating Clawbacks When In-House Counsel Are Included
False Claims Act Insights - Is DOJ Allowed to Share Privileged Documents with Whistleblowers in FCA Disputes?
[Podcast] Defining Our Vision and Values
DE Under 3: OFCCP Walks Back Its Earlier “Pay Equity” Directive
JONES DAY TALKS®: International Litigation: Confidentiality and Legal Privilege under French Law
Podcast - Finding the Balance
Writing a book as a Big Law partner - Legally Contented Ep. 2 - Christopher Ruhland
Podcast - A Tortured Journey with the Lying Witness
Internal Investigations in the Asia-Pacific Region
Cyberside Chats: Preserving Legal Privilege After a Cybersecurity Incident
CyberSide Chats: Yes, you needed a cyber attorney a long time ago (with Erik Weinick)
Client Confidentiality in the Age of Coronavirus [More with McGlinchey Ep. 2]
Jones Day Presents: Strategies for Dealing with the IRS: The IRS Examination
Day 15 of One Month to Better Investigations and Reporting-the Parameters of Privileges
Day 2 of One Month to Better Investigations and Reporting-Selection of Investigative Counsel
Your Cyber Minute: Attorney-client privilege in the midst of a cybersecurity breach
Insurance Companies and the Attorney-Client Privilege in Arizona
Attorney Client Privilege
Polsinelli Podcast - Social Media at Work - What's Allowed and What Isn't?
Do You Need A Lawyer for a Federal Grand Jury Subpoena?
In Gilbane Bldg. Co. v. School Bd. of Broward County, 2025 WL 1615553 (S.D. Fl. Jun 6, 2025), plaintiff moved to compel a “compliant” privilege log. The court decided six issues. The court wrote: “I agree that Defendant...more
In a fairly short opinion and order, the district court in Weston v. DocuSign, Inc. analyzed whether the parties were entitled to the production of text messages from former employees’ personal devices and potential piercing...more
Most lawyers know that state statutes or common law doctrines often protect communications between spouses – although there is wide variation in such approaches. But there is a lurking danger that all of us should keep in...more
Communication during a data breach is challenging in the best of circumstances, and control of information, especially early in a breach response, is critical. Below are some DOs and DON’Ts for communicating during a data...more
In Linet Americas, Inc. v. Hill-Rom Holdings, Inc., 2024 WL 3425795 (N.D. Ill. Jul. 15, 2024), the court held that “attachments to attorney client communications may be withheld as privileged without an independent basis for...more
[Editor’s Note: This article was first published May 15, 2024 and EDRM is grateful to Tom Paskowitz and Robert Keeling of our Trusted Partner, Sidley, for permission to republish. The opinions and positions are those of the...more
On January 9, 2023, the US Supreme Court heard oral argument in the matter of In re Grand Jury, No. 21-1397, which asked the Court to determine whether “dual-purpose” communications involving both legal and business advice...more
Because privilege logs necessarily contain logistical but not content-based information about withheld documents, adversaries sometimes challenge privilege protection because no lawyer sent or received a withheld document....more
Let us assume a company has done all the right things. Preemptive security was a concern, so the company tightened up its written cybersecurity controls and associated technical controls, including policies and...more