Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
As any corporation or law firm will attest, the cost of litigation continues to rise and with it the need to identify efficient solutions while maintaining transparency and defensibility. Document review, specifically, has long burdened litigation budgets; however, recent trends in the acceptance of technology integration and more advanced managed review workflows is taking root in the legal landscape. Litigation teams have been tasked with striking the right balance between identifying creative solutions to reduce these budgetary concerns while delivering high quality and defensible work product.
Federal Rule 26(b)(5) governs privilege disclosure during the discovery process by allowing the claiming party to withhold privileged information so long as: 1) a claim is expressly made; and 2) the nature of the documents are disclosed in a manner such that the adverse party is able to assess claims for privilege without being provided access to the underlying sensitive information. This mechanism is commonly referred to as a privilege log. Traditional privilege logs can generally be defined as a log of responsive data to be withheld on the grounds of privilege where the following information is provided: custodian, recipient list, communication date, subject and a privilege description/assertion.
Below we will touch on the burdens of traditional privilege logs and also alternatives to consider.
Traditionally, one of the preferred methods in reducing costs has been to focus on the standardization of the privilege logging process to allay inherent inefficiencies; however traditional logs are burdensome in many ways including, but not limited to: 1) the time required in performing a privilege analysis; 2) structuring of the actual log; and 3) its impact on the overall e-discovery budget. The privilege analysis required in deciding whether communications should be withheld, redacted or produced is cumbersome and involves the balancing of several factors (e.g., potential waiver, agency relationships, fact vs. opinion work product, etc.).
The ability to communicate and balance these variables between clients, outside counsel and e-discovery partners can create a legal quagmire, particularly when dealing with complex litigation where nuances tend to be the rule rather than the exception. Traditional privilege logs also require the balancing of how much standardization should go into the actual log ' too much standardization and the court may deem it too mechanical and find you in non-compliance with Rule 26; too custom and you run the risk of spending more of your litigation budget on the privilege log review than the actual relevance review.
Other Alternatives
Starting with a couple of important assumptions, there are alternatives. Assuming first that all stakeholders in a matter agree and second that court rulings are supportive, there are a few alternatives to consider:
Disclosing metadata fields only is unlikely to be a fruitful option particularly in complex or contentious litigation as there is generally no substantive descriptor provided. e-Mail subject lines can disclose too much or too little of the content of a communication. Search-term based categorization would categorize and consolidate communication types based on carefully crafted search terms. This method tends to be fraught with indefensibility as a document may hit on the categorization term but in review may not be the reason a document should be withheld.
Review-Based Category Privilege Logs
Review-based categorization may be the most defensible of the alternatives. Where a traditional privilege log creates a separate entry for each document family to be withheld, a category privilege log would provide for a single entry for all documents containing a similar theme or category. This would significantly speed up the privilege review and logging process. For example, where the subject matter is complex mortgage litigation; we would anticipate a high volume of privileged documents to fall into the category “communications with counsel regarding HUD litigation impact and liability.” This category could be created and flagged during the workflow to reduce the amount of logging required. This exercise could be repeated for other anticipated categories and supplemented with more a custom descriptor where needed. Review based category privilege logging is a defensible alternative where the client is dealing with a complex litigation or government investigation requiring the review of several hundred thousand/millions of documents and also where the subject matter is such that categorization is easily designated.
How Technology Can Help
Combining technology with e-discovery experts can help your team create efficient workflows which can further reduce cost and time spent on creating a category privilege log. With larger data sets, advanced analytics and document management tools can improve accuracy and reduce the volume requiring attorney review. A few such efficiencies include:
These technological efficiencies will assist the attorney reviewer to be much more productive while mitigating exposure to risk. Your team's subject matter expertise working in concert with e-discovery experts and technology will allow you to maximize process optimization and reduce your costs or pass along cost savings to the end client.
Other Market Trends
There are bigger picture considerations and trends, which impact not only the privilege review and logging process, but e-discovery as a whole including:
Ultimately, courts are finding that considering cost efficient alternatives to an unduly burdensome process serves the interest of all. By considering the pros and cons of utilizing the category privilege log alternative, you will be able to: 1) significantly reduce your review spend through efficiently identifying privilege; and 2) greatly decrease e-discovery hours billed to your end client which may be better focused on pre-trial prep, fact development and other case work.
As any corporation or law firm will attest, the cost of litigation continues to rise and with it the need to identify efficient solutions while maintaining transparency and defensibility. Document review, specifically, has long burdened litigation budgets; however, recent trends in the acceptance of technology integration and more advanced managed review workflows is taking root in the legal landscape. Litigation teams have been tasked with striking the right balance between identifying creative solutions to reduce these budgetary concerns while delivering high quality and defensible work product.
Federal Rule 26(b)(5) governs privilege disclosure during the discovery process by allowing the claiming party to withhold privileged information so long as: 1) a claim is expressly made; and 2) the nature of the documents are disclosed in a manner such that the adverse party is able to assess claims for privilege without being provided access to the underlying sensitive information. This mechanism is commonly referred to as a privilege log. Traditional privilege logs can generally be defined as a log of responsive data to be withheld on the grounds of privilege where the following information is provided: custodian, recipient list, communication date, subject and a privilege description/assertion.
Below we will touch on the burdens of traditional privilege logs and also alternatives to consider.
Traditionally, one of the preferred methods in reducing costs has been to focus on the standardization of the privilege logging process to allay inherent inefficiencies; however traditional logs are burdensome in many ways including, but not limited to: 1) the time required in performing a privilege analysis; 2) structuring of the actual log; and 3) its impact on the overall e-discovery budget. The privilege analysis required in deciding whether communications should be withheld, redacted or produced is cumbersome and involves the balancing of several factors (e.g., potential waiver, agency relationships, fact vs. opinion work product, etc.).
The ability to communicate and balance these variables between clients, outside counsel and e-discovery partners can create a legal quagmire, particularly when dealing with complex litigation where nuances tend to be the rule rather than the exception. Traditional privilege logs also require the balancing of how much standardization should go into the actual log ' too much standardization and the court may deem it too mechanical and find you in non-compliance with Rule 26; too custom and you run the risk of spending more of your litigation budget on the privilege log review than the actual relevance review.
Other Alternatives
Starting with a couple of important assumptions, there are alternatives. Assuming first that all stakeholders in a matter agree and second that court rulings are supportive, there are a few alternatives to consider:
Disclosing metadata fields only is unlikely to be a fruitful option particularly in complex or contentious litigation as there is generally no substantive descriptor provided. e-Mail subject lines can disclose too much or too little of the content of a communication. Search-term based categorization would categorize and consolidate communication types based on carefully crafted search terms. This method tends to be fraught with indefensibility as a document may hit on the categorization term but in review may not be the reason a document should be withheld.
Review-Based Category Privilege Logs
Review-based categorization may be the most defensible of the alternatives. Where a traditional privilege log creates a separate entry for each document family to be withheld, a category privilege log would provide for a single entry for all documents containing a similar theme or category. This would significantly speed up the privilege review and logging process. For example, where the subject matter is complex mortgage litigation; we would anticipate a high volume of privileged documents to fall into the category “communications with counsel regarding HUD litigation impact and liability.” This category could be created and flagged during the workflow to reduce the amount of logging required. This exercise could be repeated for other anticipated categories and supplemented with more a custom descriptor where needed. Review based category privilege logging is a defensible alternative where the client is dealing with a complex litigation or government investigation requiring the review of several hundred thousand/millions of documents and also where the subject matter is such that categorization is easily designated.
How Technology Can Help
Combining technology with e-discovery experts can help your team create efficient workflows which can further reduce cost and time spent on creating a category privilege log. With larger data sets, advanced analytics and document management tools can improve accuracy and reduce the volume requiring attorney review. A few such efficiencies include:
These technological efficiencies will assist the attorney reviewer to be much more productive while mitigating exposure to risk. Your team's subject matter expertise working in concert with e-discovery experts and technology will allow you to maximize process optimization and reduce your costs or pass along cost savings to the end client.
Other Market Trends
There are bigger picture considerations and trends, which impact not only the privilege review and logging process, but e-discovery as a whole including:
Ultimately, courts are finding that considering cost efficient alternatives to an unduly burdensome process serves the interest of all. By considering the pros and cons of utilizing the category privilege log alternative, you will be able to: 1) significantly reduce your review spend through efficiently identifying privilege; and 2) greatly decrease e-discovery hours billed to your end client which may be better focused on pre-trial prep, fact development and other case work.
With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
In June 2024, the First Department decided Huguenot LLC v. Megalith Capital Group Fund I, L.P., which resolved a question of liability for a group of condominium apartment buyers and in so doing, touched on a wide range of issues about how contracts can obligate purchasers of real property.
The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.