In this year's final installment of our series on e-discovery basics, we delve into the world of privilege logs. Gone are the days when a lawyer would print out documents and prepare a privilege log by drafting individual descriptions—one privileged document at a time. Leveraging the latest technological tools, today's eData lawyers are as sophisticated and efficient in preparing privilege logs as they are in all other phases of discovery. Privilege-log planning should begin well before the first privileged document is logged. In fact, privilege-log strategy should be considered at the outset of a matter and included in early meet-and-confers with opposing counsel about the discovery process. In this article, we provide an overview of the different types of privilege logs; lay out best practices for negotiating ESI or privilege-log protocols; discuss what to do if an ESI or privilege-log protocol has not been entered in a matter; consider practical uses of technology to generate privilege logs; and address the inadvertent production of a privileged document.