In-court confidentiality obligations are complex, demanding, and increasingly critical to dispute resolution proceedings. Confidentiality rings—court-approved mechanisms that restrict access to sensitive documents—have become a key tool for balancing transparency with the need to protect privileged information.
As legal teams navigate complex cases, the demand for confidentiality rings is expected to grow, requiring a proactive approach to managing documents. This article takes a closer look at what confidentiality rings are and best practices for setting up and managing them.
What are confidentiality rings?
Confidentiality rings are legal arrangements that allow certain parties access to confidential documents while restricting others. They are particularly prevalent in Competition Appeal Tribunal (CAT) hearings and commercial litigation, where sensitive financial or corporate information must be shielded from certain parties, such as shareholders or competitors.
Recent case law reinforces the growing significance of confidentiality rings. In November 2024, the English Commercial Court overturned the “Shareholder Rule” in Aabar Holdings S.à.r.l. v. Glencore Plc.
In the past, the Shareholder Rule allowed shareholders to access documents that would have been covered by privilege unless they were connected to litigation between the shareholders and the company. Now, it will be more challenging for shareholders to obtain a company’s privileged documents. Aabar Holdings has appealed the case to the Supreme Court.
As confidentiality rings become more commonplace, legal teams must refine their approach to handling restricted materials efficiently and in compliance with court requirements.
Best practices for setting up confidentiality rings
1. Plan document bundles carefully
Successful confidentiality management starts with meticulous preparation. Planning your bundle structure in advance ensures clarity, prevents confusion during hearings, and avoids last-minute scrambling.
First, separate documents by access levels. The two main approaches to restricting access are workspace-level and user-level.
Second, choose the right structure for your folders. There are three main structures which have proven effective: duplicate structure, standalone confidential bundles, and claim-specific bundles.
2. Engage experts early
Early discussions with legal and technology experts help streamline confidentiality arrangements. Key steps include these:
- Identify confidentiality requirements early in case preparation.
- Define access permissions to align with court rules and case strategy.
- Leverage technology to apply document-level restrictions efficiently.
3. Build extra time into the process
Confidentiality rings add logistical complexity to case preparation. Add time to your process to take these steps:
- Flag confidential documents during the upload process to prevent last-minute confusion.
- Grant user-specific or workspace-specific access, which can take more time than expected, especially in multiparty disputes.
- Give clear instructions to your team and electronic presentation of evidence (EPE) operators for handling restricted documents.
The future demand for confidentiality rings
In the wake of the Aabar Holdings decision, confidentiality rings are likely to become even more vital in litigation and arbitration hearings. Legal teams that proactively take steps to manage privileged documents will be best positioned to protect confidential and sensitive material.
By planning ahead, involving experts, and using proven protocols, you can confidently meet the demands of confidentiality rings, today and in the future. And Opus 2 can help at every step.
In 2024, Opus 2 applied special document permissions in 85 separate instances across 35 hearings spanning various hearing types and jurisdictions. While this represents a fraction of the cases served by Opus 2 Hearings, it reflects a trend: the future of legal proceedings will demand more robust confidentiality measures.
Our track record in confidentiality management—from extensive experience across hearings to proven software and services solutions—ensures your legal team is equipped to handle even the most complex cases. Contact us to learn more about how we can support you to protect confidentiality in your next hearing.