It is axiomatic that privilege logging is one of the most time-consuming and risky aspects of e-discovery. I wrote about itemized and categorical privilege logs in M. Berman, et al., eds., “Managing E-Discovery and ESI: From Pre-Litigation Through Trial” (ABA 2011), Chap. 5. In an itemized log,