In a The Legal Intelligencer article, partner Tara Lawler and associates Bansri McCarthy and Leonard Impagliazzo provide an overview of the different types of privilege logs, lay out best practices for negotiating electronically stored information (ESI) or privilege-log protocols, discuss what to do if an ESI or privilege-log protocol has not been entered in a matter, consider practical uses of technology to generate privilege logs, and address the inadvertent production of a privileged document.