eDiscovery Daily Blog
The Sedona Conference Provides Guidance for Protection of Privileged ESI: eDiscovery Best Practices
As volumes of electronically stored information (ESI) stored in the world doubles every 1.2 years, it becomes more challenging to identify the ESI that is subject to a claim of attorney-client privilege or work product protection and log and exclude that ESI from production. Federal Rule of Evidence 502 was intended to address waiver of such privilege claims and reduce the discovery costs, but many attorneys and judges don’t realize the protections the rule offers. Now, The Sedona Conference® has issued a new final commentary to “breathe some needed life” into the understanding and use of Rule 502.
Last week, Working Group 1 of The Sedona Conference, announced the final release of The Sedona Conference Commentary on Protection of Privileged ESI, which reflects changes made after release of the public comment version in November 2014.
The Commentary attempts to “breathe some needed life” into the understanding and use of Rule 502 by:
- Reminding counsel of the basics of the law on privilege in the context of modern document productions;
- Encouraging parties, lawyers, and the courts to consider employing Rule 502(d)-type orders in every complex civil matter;
- Articulating a “safe harbor” presumption that protects parties from claims of waiver in connection with the inadvertent production of privileged materials, provided that there is adherence to certain basic best practices in the context of ESI privilege review;
- Encouraging cooperation among litigants to lower the cost and burden of identifying privileged information; and
- Identifying protocols, processes, tools, and techniques that can be used to limit the costs associated with identifying and logging privileged material, and avoiding or resolving disputes relating to the assertion of privileges.
The 64 page Commentary covers the four Principles on Protection of Privileged ESI, which are as follows:
- Principle 1: Parties and their counsel should undertake to understand the law of privilege and its appropriate application in the context of electronically stored information.
- Principle 2: Parties, counsel, and courts should make use of Federal Rule of Evidence 502(d) and its state analogues.
- Principle 3: Parties and their counsel should follow reasonable procedures to avoid the inadvertent production of privileged information.
- Principle 4: Parties and their counsel should make use of protocols, processes, tools, and technologies to reduce the costs and burdens associated with the identification, logging, and dispute resolution relating to the assertion of privilege.
The Commentary also provides appendices that include an Explanatory Note on Evidence Rule 502 Prepared by the Judicial Conference Advisory Committee on Evidence Rules, two model Rule 502(d) orders (including the one we previously discussed here from Hon. Andrew J. Peck (S.D.N.Y.)) and state law analogues of Federal Rule 502 adopted by several states.
You can download the Commentary here. Consider it an early Christmas present from The Sedona Conference!
So, what do you think? Do you use 502(d) orders in your cases? If not, why not? Please share any comments you might have or if you’d like to know more about a particular topic.
Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.