opponents to the substance of attorney-client communications. Yet, in weighing these factors and
making the final decision, litigants need to be aware that failure to log each email may result in
sanctions that may include the compelled production of privileged emails.
Lucius T. Outlaw III is a partner with the Washington, D.C. office of Mayer Brown LLP. He litigates
complex civil and white collar matters. His recent engagements include representing individuals
and entities in insurance fraud prosecutions, accounting and securities fraud prosecutions,
internal investigations, shareholder class actions, False Claims Act matters, political corruption
investigations and Foreign Corrupt Practices Act prosecutions and investigations. He can be
reached at loutlaw@mayerbrown.com
. Janie McCutchen of Mayer Brown LLP contributed to this
article.
1
When referring to emails, the terms “chains,” “strings” and “threads” are used interchangeably in this
article.
2
Thompson v. Chertoff, No. 06-cv-00004, at *2 (N.D. Ind. Nov. 15, 2007).
3
There are, of course, many other important preceding privilege issues when reviewing emails, such as
does the email involving an attorney reflect a legal or business purpose? This article concerns the drafting of
a privilege log after the privilege determinations have been made.
4
Compare United States v. ChevronTexaco Corp., 241 F. Supp. 2d 1065, 1074 n.6 (N.D. Cal. 2002) (“With
respect to each series of emails for which Chevron asserts protection under the privilege, Chevron breaks
the series down into each discrete e-mail message. In our view, such a representation of the document is
misleading. Each e-mail/communication consists of the text of the sender’s message as well as all of the
prior e-mails that are attached to it. Therefore, Chevron’s assertion that each separate e-mail stands as an
independent communication is inaccurate.”) (emphasis in original) with In re Universal. Serv. Fund Tel.
Billing Practices Litig., 232 F.R.D. 669, 674 (D. Kan. 2005) (“the court strongly encourages counsel, in the
preparation of future privilege logs, to list each e-mail within a strand as a separate entry”).
5
Fed. R. Civ. P. 26(b)(5)(A)(ii).
6
See, e.g., In re Universal Service Fund, 232 F.R.D. at 672; see also, Rhoads Indus., Inc. v. Bldg. Materials
Corp. of Am., No. 07-4756, 2008 BL 264050
(E.D. Pa. Nov. 26, 2008) (“An email string may be analogous to
a meeting that takes place in a conference room between attorney and client for the purpose of seeking
legal advice.”).
7
241 F. Supp. at 1074 n.6 (N.D. Cal. 2002) (“With respect to each series of emails for which Chevron
asserts protection under the privilege, Chevron breaks the series down into each discrete e-mail message.
In our view, such a representation of the document is misleading. Each e-mail/communication consists of
the text of the sender’s message as well as all of the prior e-mails that are attached to it. Therefore,
Chevron’s assertion that each separate e-mail stands as an independent communication is inaccurate.”)
(emphasis in original).
8
In re Universal Service Fund, 232 F.R.D. at 673.
9
Id.
10
Id. at 674.
11
Id.
12
Id.
13
Chemtech Royalty Assocs., L.P. v. United States, Nos. 05-cv-00944, 06-cv-00258, 07-cv-00405, at *3
(M.D. La. Mar. 30, 2009) (“Asserting privilege for an entire e-mail thread in the privilege log, but only
describing the last message in the thread is deficient.”); Baxter Healthcare Corp. v. Fresenius Med. Care
Holding, Inc., No. 07-cv-01359, 2008 BL 229777
, at *1 (N.D. Cal. Oct. 10, 2008) (ordering defendants to
produce a privilege log that “separately identifies the author, recipient(s), copyee(s), and blind carbon
copyee(s) for each logged email communication regardless of whether the communication is part of an email
string”); Thompson, 2007 WL 4125770, at *2 (“each individual email in a string must be analyzed
separately”); In re Vioxx Prods. Liab. Litig., 501 F. Supp. 2d 789
, 812 (E.D. La. 2007) (“E-mail threads (a
series of e-mail messages) in which attorneys were ultimately involved were usually inappropriately listed on
the privilege log as one message.”); C.T. v. Liberal Sch. Dist.,Nos. 06-cv-02093, 06-cv-02360, 06-cv-02359,
2007 BL 21826
, at *5 (D. Kan. May 24, 2007) (ordering plaintiff to submit an amended privilege log that
listed each email in a string as a separate entry); see also Se. Pa. Transp. Auth. v. CaremarkPCS Health,
L.P., 254 F.R.D. 253, 264-65 (E.D. Pa. 2008) (analyzing emails in chain separately to rule on defendant’s
privilege claims).