Tips for successful privilege review setup

Lisa Moini, BridgeTower Media Newswires

Kicking off a managed document review requires many steps, from the drafting of the review protocol to setting up the coding panel for review. Attorneys who have set up managed review projects are familiar with many of the components that make up the “readiness factor” for review kickoff. When your review encompasses privilege, that is by far one of the most important elements of your review and by that, also of your setup. So what is the best way to get this setup?

When trying to get a review project off the ground and running in a short amount of time, the tendency is to compile a single list of legal names, terms, or domains that create — or make — privilege. However, looking only as far as these “privilege makers” begets problems down the road. A much better approach — one that saves time, money, and sanity for all — is to develop two additional lists at the outset of a review. One is a list of “privilege breakers,” or names/terms/domains that would render an otherwise privileged document not privileged. The other is a list of third-party consultants whose communications might land somewhere in the middle of privilege makers and breakers.

—————

Privilege Makers

We always encourage clients to be as inclusive as possible when putting together a list of legal names, terms, entities, and domains that may trigger a privilege claim. We also encourage reviewers to immediately notify us of any newly identified legal names they discover during their review work, so the master list can be updated with those names. This list of legal names, terms, entities, domains and more makes up the set of potential privilege makers and are an integral part of the review process because they help identify documents that may be privileged. The more comprehensive that list, the more effective it will be in facilitating both the initial and second-level privilege review processes.

—————

Privilege Breakers

Privilege “breakers” are just as crucial to the privilege review as the privilege makers. Breakers are names, entities, domains, or terms that can make an otherwise privileged document or email thread no longer privileged. For example, an email with a law firm and attorney in the top of an email thread may make that email privileged, but if that email also includes a third party, such as opposing counsel, that clearly breaks the privilege. Typically, there are a number of privilege breakers, including third-party business partners, vendors, and even the opposing party or opposing party’s counsel. All of these can be identified and utilized during a privilege review to quickly, efficiently, and unquestionably downgrade a document that would have otherwise been privileged.

—————

Third-Party Consultants

Now that we’ve provided a brief overview of privilege makers and breakers, let’s discuss the third-party consultants and the role they play in a privilege review. A third-party consultant falls somewhere in the middle of the privilege makers and breakers. Again, this can be a name, entity, term, or domain that does not create privilege on its own, but if present in an otherwise privileged document, might not break privilege either. An example of this may be a document, such as an email, where an attorney is discussing financial information in a case with an accountant. Although the communication between them may not be considered a direct attorney-client communication, the existence of the accountant alone, even as a third-party consultant, would not necessarily break privilege either. When a third-party consultant is present (in this case, the accountant), the privilege can extend to the third-party consultant. In such cases, the question then focuses on the purpose and overall intent of the document. Provided that the communication involves a privileged topic, the document would still be privileged, even though it involves a third-party consultant. By identifying such third-party consultants in advance (and throughout the review), you can help ensure that privileged third-party communications get identified for careful review and not considered privilege breakers by default. In addition, a third-party consultants list will help your reviewers determine which terms would be considered actual privilege breakers.

I hope that this provides attorneys with some helpful insight on what to consider when setting up the privilege portion of a managed document review project. Establishing these three separate categories of privilege terms at the beginning of a managed review will help the review and privilege log setup, improve coding accuracy, reduce QC hours, and minimize back-and-forth discussion with outside counsel about each new potential privilege term that pops up along the way. For a smoother, more efficient, and less costly managed review experience, attorneys should consider identifying and utilizing privilege makers, breakers, and third-party consultant lists in their review setup process — and keep them updated as the review progresses. Even small adjustments to these lists of terms can make a big difference in correct privilege determination and overall success of your project.

—————

Lisa Moini, Esq., is Document Review Team Lead for BIA, a leading national eDiscovery and digital forensic services provider.