google legal?

Recently came across the news (now somewhat dated) that Google has now incorporated some full-text legal decisions from the US into Google Scholar.

From the Official Google Blog:

Starting today, we’re enabling people everywhere to find and read full text legal opinions from U.S. federal and state district, appellate and supreme courts using Google Scholar. You can find these opinions by searching for cases (like Planned Parenthood v. Casey), or by topics (like desegregation) or other queries that you are interested in. For example, go to Google Scholar, click on the “Legal opinions and journals” radio button, and try the query separate but equal. Your search results will include links to cases familiar to many of us in the U.S. such as Plessy v. Ferguson and Brown v. Board of Education, which explore the acceptablity of “separate but equal” facilities for citizens at two different points in the history of the U.S. But your results will also include opinions from cases that you might be less familiar with, but which have played an important role.

Perhaps not surprisingly, the announcement seems to suggest less an emphasis on targeting lawyers as the primary audience, but rather the general public. In fact, in a recent ABA Journal article, Google’s representative even suggested that Google wouldn’t be of much value to lawyers:

Google, meanwhile, is not trying to compete with the likes of West, LexisNexis, Bloomberg, Fastcase or any other commercial legal research company, says lawyer Rick Klau, a project manager at Google who helped build the Scholar database.

“There is no attempt to slay anyone here,” Klau says. “Google’s mission is to organize the world’s information and make it useful. This was a collection of content that was not accessible and well-organized.” He says Google Scholar was designed to make the information accessible for ordinary citizens. The company has no current plans to do more with the information than what is already available.

Google’s database allows users to search its content against any words, concepts or citations and will pull up opinions related to the searcher’s query. The results are ranked by relevance. Citations in the opinions are hyperlinked to other opinions. The results also provide links to other Google databases, such as books and law reviews, to help searchers get context.

But Google Scholar does not provide any sort of system to check the validity of the case, nor does it offer any type of taxonomy of the case.

Klau goes so far as to question the value of Google Scholar to practicing lawyers: “The two primary for-pay services provide tremendous value to their users and help you better understand and consume information, like whether an opinion is still valid. Those are things that practitioners rely on and will continue to rely on.”

Despite Klau’s protestations, others in the legal information sector are watching Google. “You are always very conscious of what Google is doing because the company has immense resources available,” says Warwick of Thomson Reuters.

That same article also describes how LexisNexis and Westlaw, the two Microsofts of the legal information industry, will be implementing sweeping changes in their services. I imagine those changes were prompted less by Google’s foray into the legal information industry and more by the entrance of Bloomberg into the market, and the desire to capture a greater share of what seems to be a shrinking market.

In any event, Google isn’t really reinventing anything here but rather making it a bit more convenient to access and use – apparently all of this material had previously been available on various court and other web sites. Google’s value add was to consolidate it all and make it easier to search and use.

Too bad. It would have been interesting to see Google shake things up a bit in the legal information industry (or for that matter the information industry more generally). Then again, you never know…

love (and professional practice) means never having to say you’re sorry

On that note, apologies to my loyal readers whom I’ve forsaken for quite some time now. I’ve recently transitioned to another firm which always entails a fair bit of work. At least I can rest assured that now can rest assured that no one will sue me for apologizing, as Ontario passed into law last year the Apology Act, 2009.

Laws governing apologies are not the usual subject matter of this blog, but I thought it might be of some interest.

I’ve always inclined to apologize, not with any intent whatsoever of admitting fault, liability or wrongdoing, but rather as a question of polite and well-mannered. However, before the passage of this act, saying your sorry could lead to the very unfortunate result of being construed as the former. Even apart from the legal ramifications, I recall a few years ago some advice one of my colleagues (who I respected very much gave me), which was never to apologize in the course of negotiations, for anything, as it could be interpreted as a sign of weakness.

While I think the introduction of this act is a good thing, it seems to me to be rather unfortunate that the law and society generally have led to a situation where a statute must be enacted so that people can apologize to each other without fear of recrimination. As a lawyer, I understand why professionals should be advised not to apologize, but as a human being, I find it very unfortunate (and non-intuitive) that the law has evolved to equate (or at least run the risk of equating) an expression of sorrow with an admission of liability.  If a patient dies on the operating table due to no fault of the doctor performing the surgery, it would nonetheless seem perfectly human to me that the doctor would feel some sense of remorse or sorrow. In fact I’d probably find it somewhat disturbing if he or she didn’t. Expressing that sorrow would, to me, also seem to be a natural extension of that – not because of a desire to admit fault or liability, but because it is a natural extension for those that feel sorrow for the loss of a life and have some reasonable measure of empathy or compassion.

In any event, that’s just my $0.02 on the matter. It’s also perhaps worth mentioning that the Act doesn’t quite give you carte blanche to apologize – there are a number of exceptions, such as traffic violations or testifying at civil proceedings (PDF).

Sorry!

love is forever. copyright, not so much

Most folks who have a significant stake in copyrighted works probably will have already known about this years ago, but this story in Wired highlights the potential cultural impact of copyright termination in the US. A brief excerpt:

The Copyright Act includes two sets of rules for how this works. If an artist or author sold a copyright before 1978 (Section 304), they or their heirs can take it back 56 years later. If the artist or author sold the copyright during or after 1978 (Section 203), they can terminate that grant after 35 years. Assuming all the proper paperwork gets done in time, record labels could lose sound recording copyrights they bought in 1978 starting in 2013, 1979 in 2014, and so on. For 1953-and-earlier music, grants can already be terminated.

The Eagles plan to file grant termination notices by the end of the year, according to Law.com. “It’s going to happen,” said Eveline. “Just think of what the Eagles are doing when they get back their whole catalog. They don’t need a record company now…. You’ll be able to go to Eaglesband.com (updated) and get all their songs. They’re going to do it; it’s coming up.”

This isn’t just about music. “It’s every type of copyright,” said Bernstein. “It doesn’t distinguish between the types of copyright.”

The only exceptions, he said, are derivative works such as movies based on novels that include certain music in their soundtracks, because Congress decided it was unfair to ask publishers to give those licenses back to artists and authors.

This has already taken place for a number of high-profile works, such as those of Jack Kirby (who created or co-created a whole host of well-known comic characters for Marvel, such as X-Men and the Fantastic Four), Joel Shuster (Superman) and John Steinbeck.

Although the focus has been primarily on artistic works to date, it will be interesting to see what impact this might have on software authored in that same time frame by non-employees of software companies. Perhaps in this regard the (usually) relatively short lifespan of software due to technological obsolescence is a blessing. So far, I’ve not come across any news regarding termination notices related to software. I don’t expect to, either, though do admit I’m curious as to the possible size of the risk.

copyright infringement and irony

Interesting article in Wired about a lawsuit against Scribd, the document hosting service. The nub:

The novel lawsuit, filed by a children’s author in Texas last Friday, maintains that Scribd unlawfully copies the text of books and other publications to compare new uploads against the copyrighted work and to block those files from its server.

Without getting too much into the details, Scribd’s defence is that they are using the source materials in question to ensure that its services are not used to infringe copyright in those source materials.

Details aside, Camara speculated that Scribd is likely to license its filtering technology that includes an undisclosed number of digital fingerprinted works. That such filters are good for copyright owners is beside the point, he said.

“In a couple of years of developing this, Scribd might turn around and license it,” he said. “The profits generated from that should be shared.”

Illustrates, somewhat ironically, the dangers fraught with attempting to police infringement, rather than taking a more passive approach. Not that that is without risk either.

A copy of the claim can be found on Scribd.

norwich orders, part ii (an editorial of sorts)

<rant>

I was a bit surprised to find this article that covered the court orders that had required Google to disclose information on some Gmail users and the subsequent orders in Canada against certain Canadian ISPs, which was the subject of a previous post. The long and short of it is that the author considers Norwich orders to be some sort of grave, grave intrusion on privacy rights and personal liberty. Hence, this dire warning at the end of the article:

No matter how many precautions we take to remain private or cloak our identity, the authorities and other potential litigants usually have little difficulty obtaining this content. And they do it not by nefarious mean like hacking, but through our very own court system.

Internet users everywhere would do well to take heed. Your emails — and maybe even your Google searches — could be one subpoena away from the prying eyes of federal authorities, not to mention private litigants.

Why am I surprised? Because it seems to lack the most basic understanding of the legal system. I won’t get into all the details of the workings of Norwich orders – the original article by Omar Ha-Redeye that I had previously mentioned does a very good job at that, and I would certainly commend it to the author of this article so he may perhaps gain some insight.

The fact of the matter is that no, your privacy rights and right to anonymity have not suddenly disappeared altogether. However, as with all rights there are limitations. Thus, while U.S. citizens have the right to bear arms, they do not have the right to shoot people. If someone were to do that, they should reasonably expect their gun (and likely their liberty) to be taken away. Similarly, if someone uses their right to anonymity in an attempt to commit a crime or harm someone else, they should reasonably expect that right of anonymity to be taken away – at least to the extent it relates to the crime.

Remarkably, the author seems to suggest that the use of “subpoenas” (presumably he meant to refer to the Norwich orders) are almost the equivalent of, say, parking tickets, that the authorities or litigants can simply write up  if and when they choose to stomp on someone’s personal liberties for no good reason. What an unfortunate misperception of the legal system. The very reason why someone must go to the courts to obtain such as order is to ensure that the interests of the parties involved are balanced and safeguarded. If someone seeking the order does not have a reasonable and valid basis for doing so, it is likely that the order would not issue.

Regarding process, he cites Eric Goldman:

“People need to know that very little information that they give or make available to third parties [like Google] is unavailable to the government or private litigants,” says Eric Goldman, director of the High Tech Law Institute at Santa Clara University School of Law. “I think most people are surprised at how relatively easy it is for the government and private litigants to obtain ‘their’ information.”

I can’t speak to the process in the U.S. or what Mr. Goldman considers to be “relatively easy”. What I can say is that in Canada there is reasonable due process and consideration before such orders are issued. Just to cite one part of Mr. Redeye’s article:

A Norwich order is a pre-action discovery mechanism that is described by Spence J. in Isofoton S.A. v. The Toronto-Dominion Bank,

Requests for Norwich relief are largely unfamiliar to Canadian courts.  A Norwich order essentially compels a third party to provide the applicant with information where the applicant believes it has been wronged and needs the third party’s assistance to determine the circumstances of the wrongdoing and allow the applicant to pursue its legal remedies.

The 5 elements identified in this case for granting such an order include:

(i) Whether the applicant has provided evidence sufficient to raise a valid, bona fide or reasonable claim;
(ii) Whether the applicant has established a relationship with the third party from whom the information is sought such that it establishes that the third party is somehow involved in the acts complained of;
(iii) Whether the third party is the only practicable source of the information available;
(iv) Whether the third party can be indemnified for costs to which the third party may be exposed because of the disclosure, some [authorities] refer to the associated expenses of complying with the orders, while others speak of damages; and
(v) Whether the interests of justice favour the obtaining of disclosure.
[emphasis added]

The privacy interests of the alleged wrongdoer were overcome by the last element, the interests of justice, because of the applicant’s equitable right to information.  Spence J. pointed to Alberta v. Leahy and Bankers Trust Orders (from Bankers Trust Co. v. Shapira) indicating that court orders can override confidential information, even for financial records, and Glaxo-Wellcome PLC v. M.N.R. that the privacy interests of alleged wrongdoers is somewhat diminished.

Perhaps its just me, but this doesn’t sound particularly easy.

Of course, as with most things, the legal system is certainly not perfect, and there may well be instances where abuses might occur, or wrong decisions might be made by the courts where the scales of justice tip a bit. But to point at the sky and say it’s falling because of this case seems to me to be somewhat premature, to say the least.

Or at very least, as far as privacy concerns go, consider focusing more on things like the NSA and TIA than the courts.

</rant>

when not to use technology

I came across a link to a story where a South African company was using homing pigeons to transport data because it was faster than their broadband connection:

Workers will attach a memory card containing the data to bird’s leg and let nature take its course.

Experts believe the specially-trained 11-month-old pigeon will complete the flight in just 45 minutes – and at a fraction of the cost.

To send four gigabytes of encrypted information takes around six hours on a good day. If we get bad weather and the service goes down then it can up to two days to get through.

If you’re curious, doing the math on that works out to roughly 1.5 Mbps for the broadband connection and, if a 4GB card is used with the pigeon, just under 12 Mbps for the pigeon.

Of course, such a solution isn’t without risk:

‘With modern computer hacking, we’re confident well-encrypted data attached to a pigeon is as secure as information sent down a phone line anyway.

‘There are other problems, of course. Winston [the pigeon] is vulnerable to the weather and predators such as hawks. Obviously he will have to take his chances, but we’re confident this system can work for us.’

Though the story is amusing, the point it reinforces is I think a helpful one – namely, that the use of particular technology might not necessarily be the best solution to a business problem. It may just be due to the area I work in, but I have seen instances where organizations are so focused on the use of technology (or in some cases a particular type of technology) that they don’t consider alternatives that may achieve their goals better, cheaper or faster.

Certainly not necessarily advocating the widespread use of PigeonNets, but the story is an amusing example of someone overcoming the law of the golden hammer.

going to china? bringing technology? careful there…

This story in Wired serves as a good reminder that export control laws, particularly U.S. export control laws, do have teeth. In short: a retired US professor was sentenced to four years in jail for sharing his research with graduate students in China. Apparently, the U.S. government felt that the research he shared was restricted technical data, disclosure of which would put U.S. national security at risk.

In this particular case, the U.S. State Department had apparently warned him, but he disregarded the warnings and went ahead anyway. So, for most folks, it’s unlikely to be much of a risk, unless of course the State Department calls you up. That being said, if you are planning to travel to and/or do business in China, Iran, etc., it might be a good idea to think about what you might not want to bring over with you on your laptop, particularly if you will be presenting any of it to citizens of those countries or leaving anything there.

Unfortunately, export controls are not exactly straightforward, particularly those dealing with the type of things you can’t export. In Canada, this is particularly the for the what’s described as “dual-use” group. This group describes things that aren’t necessarily used for sensitive purposes, but could be, hence the “dual-use” moniker.

Just as an example, take a look at Category 5 – Part 2 of the Canadian Export Control List, which deals with cryptographic technology. Not exactly an easy read. Though thankfully over the years they have put in some common sense carve-outs. You’ll find them in the tiny, tiny notes at the beginning and end. Then there’s the U.S. Export Administration Regulations, which makes the Canadian requirements look comparatively straightforward.

anonymous e-mailers, forum posters, meet norwich orders

A very nice summary of a recent Ontario case on Norwich orders by Omar Ha-Redeye in Slaw. Within the context of anonymous internet communications (anonymous e-mail accounts, forum postings, etc.), a Norwich order can be used to compel a service provider (such as an ISP, a forum host or e-mail service provider) to provide information on its customer in an attempt to identify the individual who has sent an e-mail or posted a message that has given rise to a claim or potential claim.

The case noted by Omar related to a defamatory e-mail that was sent from an anonymous Gmail account. The person making the claim needed to take a few steps in order to attempt to identify the alleged wrongdoer. First, as it is possible to open a Gmail account without submitting full/accurate personal information, he would have needed to obtain a Norwich order from Google. That order likely would have requested from Google a listing of the IP addresses used to create and/or access the specified Gmail account and the times at which they were used. Once the IP addresses were obtained, it would be easy to identify the ISPs or organizations which were allocated those addresses through a WHOIS or similar enquiry (generally IP address allocations are public information). IP addresses typically are not sufficient to identify a particular individual since most (if not all) of them are allocated to organizations, who then either permit specific computers within their organization to use them on a permanent basis (static IP addresses), or allocate them on a dynamic basis. In the case of most ISPs, they will maintain a pool of IP addresses that are used as their customers switch on their computers and access their accounts, so that the address allocated to any particular customer may vary over time.

Consequently, one the wronged party had obtained the relevant IP addresses and identified the ISPs, he would have needed to file a Norwich order against the ISPs to obtain information regarding the account holders who had used the IP addresses at the indicated times. The ISP’s records would allow them to do this, as ISPs will usually need to validate the identity of their customers when they sign up. The case at hand involved this second step, and the wronged party was successful in having the Norwich order issued against the ISPs.

Norwich orders are very useful devices to help advance claims where a wrongdoer attempts to use the cloak of anonymity to protect him or herself from liability. That being said, technology being what it is, there are limits to what a Norwich order can do. For example, if a wrongdoer used cash-only web-cafes, free anonymous wifi connections or, anonymization proxies, IP spoofing or pirates third party wifi signals or hacks into a third party computer, it may be more difficult to successfully identify the wrongdoer (though even in these cases it may not be impossible). Along similar lines, the defence of a claim by an individual whose information was obtained in such a manner could also assert that, although the account with the ISP was in his or her name, it wasn’t that individual who actually initiated the wrongful communication – e.g. shared ISP connection with others or hacked computer or internet connection. In short, while a Norwich order will provide useful information that will likely lead in the right direction to track down a wrongdoer, ultimately the only information it will provide is the linkage between an IP address used for wrongdoing and the account holder allocated that IP address, and not necessarily the individual committing the wrongdoing.

depositing pictures into your bank account

Pictures of cheques, that is.

Brief blur from Gizmodo:

The bank’s VP tells The NY Times that once you hit the send button, the deposit is made just like any other check—you won’t have to mail it in later, either. As everything will be handled electronically, the bank will suggest customers simply void the check before either filing or discarding it.

Seems like a win-win idea. More convenience for customers. Lower costs for the bank.

feld on directors meetings

Helpful piece by Brad Feld on the characteristics of effective board meetings. A small excerpt:

What I mean by this is that most board meetings are 80% status updates, 10% strategy / issues, and 10% administration. I’m fine with the 10% administration, but the 80% / 10% split on status vs. strategy should be reversed. There are plenty of different ways to organize the “strategy” (I’m using “strategy” as shorthand for “forward looking discussion”) and strategy includes a blend of short, medium, and long term issues, as well as plenty of “tactical stuff” (for those that think “strategy” is too specific a word), but I imagine you get the idea.

He also sets out a detailed list of steps that contribute to successful meetings which certainly is worth a read.

One suggestion in particular that he echoed from Fred Wilson was that board meetings should be in person to be most effective. I’d perhaps go a bit further than that – wherever possible and where the issues to be discussed warrant the time and expense I always recommend that any meetings, discussions, negotiations, etc. be done in person or alternatively by videoconference and only by teleconference as a last choice. I recall reading somewhere in the past about studies that have concluded that the vast majority of communication at such meetings are non-verbal in nature – gestures, expressions, body position, etc. In my experience this is definitely the case. And perhaps for this reason negotiations done face to face typically yield better results – greater relationship building, fewer arguments and, generally, more diplomatic behaviour. My own personal theory on the latter is that people are much less inclined to be rude, snarky, argumentative or simply impolite when meeting with someone face to face – it’s much easier to behave that way to a disembodied voice. In addition to the fact that people are more likely to focus and less likely to “multitask” in face to face meetings than they are in teleconferences.

On a somewhat related note, on several occasions where I have seen board minutes drafted by clients, they have gone into a significant amount of detail regarding what was discussed, by whom, who agreed, who disagreed and so on – almost a blow by blow transcript of the entire meeting. Not recommended. Minutes should be short and concise, not a complete record of the discussion. A note that a discussion occurred is sufficient. Of course, if a decision is made, then the resolution should be recorded, including those voting in favour, against or abstaining. Consider picking up a copy of Wainberg’s Company Meetings, or ask your lawyer for sample minutes if you plan to record minutes yourself. You’ll likely be glad you did a few years down the road, when a small army of lawyers comes in to do due diligence before your major financing, IPO or acquisition, and crawls through each and every sentence in your minute book.

(hat tip to @RuddockMH for pointing me to the feld piece)