News & Analysis as of

Confidential Information Federal Rules of Civil Procedure Evidence

McGuireWoods LLP

What If an Adversary Subpoenas Your Client’s Privileged Documents That Are in Someone Else’s Possession?

McGuireWoods LLP on

Litigation adversaries often trigger privilege and work product disputes when they seek each other’s documents. But what if your client’s adversary subpoenas a third party holding your client’s privileged documents — whose...more

Minerva26

Privilege Log, Privilege Log — It’s All About the Description

Minerva26 on

A privilege log is the absolute bane of an attorney’s existence. I don’t mean it isn’t important and a critical component of discovery, but the level of planning, analysis and detail required to complete such a log is...more

EDRM - Electronic Discovery Reference Model

Court Denied Unopposed Motions for Protective Order and Approval of ESI Protocol

In Orlando Health, Inc. v. HKS Architects, Inc., 2024 WL 4025379 (M.D. Fl. Sept. 3, 2024), the court denied an unopposed motion to enter a protective order and an unopposed motion to enter an ESI Protocol....more

EDRM - Electronic Discovery Reference Model

March’s Notable Cases and Events in E-Discovery

This Sidley Update addresses the following recent developments and court decisions involving e-discovery issues: 1. an order from the U.S. District Court for the Eastern District of California granting a motion to compel...more

4 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide