ESI Best Practices

  • Lawyer handing a privileged document to another lawyer
    Legal Updates

    Taming the Privilege Log Beast

    There are few things more dreaded in discovery than the time-consuming, tedious, onerous, beastly privilege log – especially in complex litigation matters involving thousands of pages of documents. These logs, however, are a critical component of the E-Discovery process that requires careful attention to detail in planning, analysis, and preparation. In this blog post, we will explain what a privilege log is, discuss the various types of privilege logs, recommend pre-privilege review strategies, and address post-submission concerns.

  • Courthouse 2
    Legal Updates

    WARNING: Follow Your ESI Protocol Because the Court Will – Part TWO

    In Part Two of this blog series, I discuss a recent case regarding noncompliance with preservation provisions in an ESI protocol and provide best practices for negotiating and drafting an ESI protocol. In Part One of this series (which you can find here), I analyzed how courts have resolved ESI protocol disputes with TAR and metadata provisions.