In this article, we provide an overview of the different types of privilege logs; lay out best practices for negotiating ESI or privilege-log protocols; discuss what to do if an ESI or privilege-log ...
There are few things more dreaded in discovery than the time-consuming, tedious, onerous, beastly privilege log – especially in complex litigation matters involving thousands of pages of documents.