Part 3: What to do and when to do it. (See part one and part two.)
So your private information is being sought, what are you going to do to protect it? That depends on the manner in which information is being requested by the opposing party. Private information will either be (1) requested