Protecting Confidential Information during Litigation | Practical Law

Protecting Confidential Information during Litigation | Practical Law

This Legal Update suggests ways to protect against the disclosure of confidential and privileged information and to reduce the risk of a privilege waiver when counsel inadvertently produce privileged documents.

Protecting Confidential Information during Litigation

Practical Law Legal Update 3-614-6245 (Approx. 4 pages)

Protecting Confidential Information during Litigation

by Practical Law Litigation
Published on 26 May 2015USA (National/Federal)
This Legal Update suggests ways to protect against the disclosure of confidential and privileged information and to reduce the risk of a privilege waiver when counsel inadvertently produce privileged documents.
Document discovery generally is the most expensive part of litigation. The cost of reviewing millions of potentially relevant documents forces many defendants to settle their cases, regardless of the merits of the claims, so they can avoid the more expensive discovery process. Defendants that choose to fight their claims and proceed with discovery consistently look for ways to reduce the costs of document discovery.
Many tools are available to parties to reduce document review costs. In selecting the appropriate technology for a case, however, defendants must weigh the risk of inadvertently producing privileged or confidential information against the cost of document review. This balancing act varies on a case-by-case basis, depending on the client's tolerance for risk and the sensitivity of its information. Counsel should consider the following:
  • Entering into a Rule 502(d) order. Federal Rule of Evidence (FRE) 502(d) permits a federal court to order that the disclosure of attorney-client privileged material, protected work product or other protected information does not waive those protections in the pending case or in any other federal or state proceeding (FRE 502(d)). A Rule 502(d) order typically is applicable to the production of all privileged material, regardless of whether the production was inadvertent. Parties that enter into a Rule 502(d) order should still use care when conducting a privilege review, but they can customize the privilege review based on the level of risk associated with the potential disclosure of substantive privileged documents.
    For more information about Rule 502(d) orders, see Standard Document, FRE 502(d) Order.
  • Entering into a confidentiality order with a claw-back provision. A confidentiality order identifies confidential information that a party would like to protect from disclosure and the persons that have access to it. Parties often stipulate to a confidentiality agreement and then have it ordered by the court. In a case involving particularly sensitive information (such as patent designs), the parties may agree to a two-tiered confidentiality order, limiting access to the most sensitive information to a select group of individuals, such as outside lawyers.
    Counsel may incorporate a provision for a privilege waiver with a claw-back into a confidentiality order. This provision sets out a process for recipients of privileged information to return privileged information that counsel inadvertently discloses during discovery. It also protects against the waiver of privilege resulting from inadvertent disclosure. In that respect, it is belt and suspenders for parties that also have entered into a Rule 502(d) order, as it does not afford any additional protection against privilege waiver than that afforded by Rule 502(d).
  • Understanding the available technology. To help a client make decisions about which technology best suits its risk tolerance and confidentiality concerns, a practitioner must be well-versed in the available technology. Counsel should be able to identify the pros and cons of using technology such as predictive coding, concept searching and keyword searching.
  • Knowing the vendors and their capabilities. Similar to understanding the available technology, counsel should be familiar with the vendors that offer document review technology to help ensure a successful review process. For example, some clients with extremely sensitive information may prefer to work with one vendor to handle all of their e-discovery needs.