Privilege Log Objections are Rising: How to Survive Rule 26(f)(3)(D) Challenges and Defend Your Entries
Webinar | 01.14.26, 1:00 PM EST - 3:10 PM EST | CLE Offered
Address
Virtual
John Davis, Genevieve Moreland, George D. Carry and Turkessa L. Brown to present "Privilege Log Objections are Rising: How to Survive Rule 26(f)(3)(D)". This in-depth training course provides legal professionals with essential knowledge and tools to effectively manage privilege logs and associated issues within the context of the Federal Rules of Civil Procedure (FRCP 26), the Federal Rules of Evidence (FRE 502) and ethical requirements. Participants will explore risks, best practices and compliance strategies for privilege logs, emphasizing both the strategic, legal and technological (think GenAI) aspects of modern discovery. Attendees will enhance their capabilities to construct, negotiate, and efficiently and ethically manage privilege logs, while remaining informed about recent legal developments.
Key topics to be discussed include:
- Setting the stage: The role of privilege logs in modern discovery
- Rules 26 and 502 and the governing framework
- Negotiating scope and reducing burden
- Quality control and risk mitigation
- Ethically leveraging advanced technology (like GenAI)
- Recent case law and enforcement trends
For more information, please visit these areas: E-Discovery and Information Management, Litigation and Trial, Investigations
Participants
Insights
Webinar | 05.14.26
Because of recent changes to Federal and State law regulations, companies that manufacture, import, sell, or distribute products or equipment with components that contain certain “PFAS” materials face imminent and overlapping compliance obligations. This webinar will provide actionable information companies can use to determine whether they are impacted by these State and Federal requirements as well as practical advice for complying with these obligations. Topics that will be covered include the following:
Webinar | 29 April 2026, 3:00-4:30 pm CEST
Webinar | 04.21.26
From Covert to Kinetic: Escalating Cyber Threats in a Time of Conflict


