Perspectives  ›  Privilege Review

Automating Privilege Review: What Courts Actually Expect

Naomi Ashford · Founder & CEO, Discovarc · · 9 min read
Amber privilege classification badge on a legal document concept for blog post on automated privilege review defensibility

Automated privilege detection has moved from a fringe workflow to a mainstream component of large-scale document review. Platforms across the market — Relativity's Privilege Analyzer, Everlaw's privilege classification tools, DISCO's machine learning classifiers — offer some form of automated privilege screening. Courts have not systematically objected to the use of these tools. But "courts haven't stopped us" is not the same as "courts have endorsed our specific implementation," and that distinction is where most privilege review defensibility arguments actually live.

This piece focuses on what courts have actually scrutinized in automated privilege review contexts, what your protocol documentation needs to address, and the error modes that create unnecessary clawback exposure after production.

What Courts Have and Have Not Accepted

No federal court has held that automated privilege screening is per se insufficient. The available case law is more nuanced: courts scrutinize the process, not the technology family. What draws judicial attention is usually one of three things — a pattern of unexplained clawback requests, a privilege log with entries too generic to support privilege assertions, or evidence that attorney review did not function as a meaningful backstop to the automated screening.

The attorney-client privilege framework under federal common law requires that the communication be between an attorney and a client, made for the purpose of obtaining or providing legal advice, and maintained in confidence. Work product protection under Rule 26(b)(3) requires showing the document was prepared in anticipation of litigation by or for a party or its representative. Automated privilege classifiers can identify text patterns associated with both categories — attorney names in To/From/CC/BCC fields, legal-advice-seeking language, litigation hold language, case file references — but the legal analysis of whether a specific document actually meets the elements remains a judgment call.

The Federal Rule of Evidence 502(b) clawback framework allows inadvertent disclosure to be remedied without privilege waiver if the holder took reasonable steps to prevent disclosure, promptly moved to assert privilege after discovery, and the court orders return or destruction. "Reasonable steps" is fact-intensive and has been evaluated in part by reference to the privilege review process documented in the matter's ESI protocol. A process that documented automated screening followed by attorney review of high-confidence privilege candidates has fared better in 502(b) motions than processes with no documented methodology at all.

The Protocol Documentation Requirements

A defensible automated privilege review protocol should address, at minimum, the following elements:

Classifier training basis. What training data was used to configure the privilege classifier? In a matter-specific training context, document the initial seed set of privileged documents (already known-privileged from prior productions or in-house, attorney-reviewed) and the non-privileged seed set. If the platform uses a pre-trained general model, document what that model was trained on and whether matter-specific fine-tuning was applied. Opposing counsel in contested matters have asked these questions in meet-and-confer.

Score-band review allocation. The most common production error in automated privilege review is treating classifier scores as binary: documents above a threshold go to privilege log, documents below get produced. The band around the threshold — documents the model is uncertain about — requires attorney review. Document your score-band cutoffs and what human review protocol applies to each band.

Attorney-in-the-loop structure. Courts that have addressed automated privilege review in any depth have consistently expected to see that attorneys made final privilege calls, not the algorithm. Document which attorney role reviews flagged documents, what training that reviewer received on the privilege classification criteria, and how privilege log entries are generated from their decisions.

Domain-specific attorney identification. Privilege classifiers that rely on attorney name detection require a complete and accurate attorney list for the matter. Missing an in-house attorney from the lookup table — particularly a business-embedded lawyer with a non-legal title on their email signature — is a common source of privilege log gaps. Document how the attorney list was compiled and what custodian interviews or HR data were used to build it.

The Privilege Log Itself

Automated privilege review that produces generic privilege log entries is one of the most litigated issues in this space. The standard that courts have applied, while varying by jurisdiction, generally requires that the privilege log entry contain enough document-level information to permit the opposing party to assess the assertion without obtaining the document itself: date, author, recipient(s), document type, and a non-conclusory description of the privileged content or communication purpose.

Entries like "Email chain re: legal advice" have been challenged and, in several instances, have resulted in in-camera review orders. The automated systems that fare best generate privilege log entries by populating metadata fields (Date, From, To, CC, Subject line with attorney instructions to replace any privileged subject content with a generic description) and then routing to attorney review for the narrative privilege basis field. That field cannot be auto-populated by a classifier without creating an attorney certification problem: the attorney certifying the privilege log under Rule 26(g) must be able to attest to the accuracy of each entry.

Consider a scenario from a complex commercial matter: a mid-market company facing a breach of contract dispute has 80,000 documents in its custodian population. The automated privilege classifier flags 4,200 documents. Of those, a senior attorney reviews a 10% random sample and validates the flag rate, but the privilege log entries are auto-generated from Subject line fields — many of which contain deal-specific project code names that provide no meaningful privilege description. When opposing counsel moves to compel more specific log entries, the producing party faces the burden of re-reviewing 4,200 documents to generate defensible descriptions. The automation saved time upstream and created a larger correction effort downstream.

We're not saying automated privilege log drafting is without merit — it substantially reduces the time required to populate date, custodian, and document-type fields. The point is that the privilege basis description field requires attorney judgment, and any workflow that bypasses that step creates log adequacy risk.

Clawback Agreement Integration

A well-drafted clawback agreement under FRE 502(d) provides the strongest inadvertent disclosure protection — a court order entered under 502(d) binds third parties and applies regardless of whether the disclosure was truly inadvertent. If your matter has a 502(d) order in place, the standards for what constitutes "reasonable privilege review" under 502(b) are less immediately critical (because 502(b) is the standard when there is no 502(d) order). But parties sometimes agree to clawback provisions without a 502(d) order, which means 502(b)'s reasonableness analysis applies — and the process documentation for your automated review becomes directly relevant to the motion outcome.

The practical recommendation: push for a court-ordered 502(d) clawback provision in your ESI protocol, not just a private clawback agreement between the parties. The Sedona Conference Principle 14 (3rd edition) addresses cooperation in managing inadvertent disclosure risk and is a useful reference point for meet-and-confer discussions on this issue.

Quality Metrics for Automated Privilege Review

The validation framework for privilege review accuracy is different from TAR validation. TAR elusion testing asks whether the documents the model classified as non-responsive contain actual responsive documents at an acceptably low rate. Privilege review validation asks a two-directional question: are we producing privileged documents (false negatives), and are we over-withholding non-privileged documents (false positives)?

Over-withholding is an underappreciated risk. Opposing counsel who receives a privilege log with an unusually high withholding rate will notice, and a motion to compel for in-camera review is a predictable outcome. Automated classifiers calibrated too conservatively — particularly when the attorney-list lookup table includes broad institutional email domains — can flag large volumes of non-privileged documents. Sampling from the privilege-flagged population to estimate over-withholding, alongside the standard elusion sample for under-withholding, creates a more complete quality picture.

Privilege determinations made in the context of automated review — including boundary cases where a document contains both legal and business content — remain counsel's decision. The role of the classifier is to surface candidates and prioritize attorney review allocation, not to make the determination. That distinction is fundamental to how these tools should be documented and described to courts, clients, and opposing counsel. Attorneys who need to discuss specific privilege review workflows for an upcoming matter are welcome to reach out directly.