social media, privacy and discovery

I read with interest a story about a recent case in the US involving a personal injury claim. In short:

Campa Construction Corporation argued it should be granted access to Pedro Caraballo’s Facebook, Myspace and Twitter accounts, including to his deleted files.

The request was “overly broad” and not specific enough in what it was looking for, the court said.

Campa had argued that pictures, videos and posts on the sites were as important as medical records and that they could show Caraballo engaged in activities which would undermine claims about his injuries.Caraballo is suing Campa after a wall fell on top of him as he worked to connect sewer pipes in a trench.

The court indicated that “digital ‘fishing expeditions’ are no less objectionable than their analog antecedents” and therefore declined to grant the request.

It is interesting to compare the US case with a similar decision in Canada a few weeks ago, but with quite different results. In Sparks v. Dube, not only was the request granted, but granted ex parte for the following:

1)  A Preservation Order and, in the alternative, an Interlocutory Injunction are hereby made and issued compelling Erica Sparks: 1) to preserve and maintain without deletions or alterations the entire contents of her personal web page(s) on the social network Facebook including but not limited to photographs, text, links, postings, event details and video clips until further direction of the court, and 2) to participate in the carrying out of the following orders where her participation is required;

2)  The Interlocutory Injunction shall expire ten days after these orders take effect instituted;

3)  The Applicant-Defendant shall personally and immediately serve all orders and a copy of this judgment upon the Plaintiff’s solicitor, Mr. James Crocco, who shall not disclose any of the orders set out herein nor the contents of this judgment except on terms as they are allowed by these orders;

4)  Upon being served, Mr. James Crocco shall arrange for a solicitor in his firm or an agent lawyer of his choice to be appointed to carry out as soon as reasonably possible, and in the case of the Interlocutory Injunction within ten days of the taking effect of these orders, the orders set out that pertain to his client Erica Sparks subject to the following terms:

a)  The appointed solicitor shall be remunerated by the Defendant for his or her services;

b)  That solicitor shall immediately contact Ms. Sparks and, without disclosing the nature of the subject matter to be discussed, schedule a meeting with her at a location convenient to access and download data from the Internet and reduce it to usable form, such as hard copy for data so suited or memory stick or other such device for videos, as soon as reasonably practicable;

c)  Upon personally meeting with Erica Sparks at the location chosen the appointed solicitor shall apprise her of the terms and conditions of the Preservation Order and Interlocutory Injunction as well as the other orders contained herein that pertain to her;

d)  Immediately upon disclosure of the terms and conditions of the orders set out, Erica Sparks, in the presence of the solicitor engaged, shall create a permanent tangible records in hard copy, wherever possible, or to other suitable device, of the entire contents of her web page(s) on Facebook including, but not limited to, all photographs, text and links and shall record by a memory stick or other suitable device any videos posted or linked to Erica’s Sparks’ Webpage, one copy of which shall be sealed upon the carrying out of that part of these orders and delivered to Mr. James Crocco to be held and preserved by him until further direction of the court; but the delivering of a sealed copy of the entirety of her web page(s) shall not operate to preclude Erica Sparks from providing her counsel, Mr. James Crocco, or anyone else of her choosing with a copy of the entirety of her web page(s) in order to prepare for the Production Hearing or further proceedings;

5)  Upon complying with the said orders the solicitor appointed to supervise the downloading of the material referred to herein shall immediately review all of the material downloaded to ensure that the orders have been carried out in full and shall then certify to the court in writing that there has been strict compliance with the orders contained herein, and that the sealed packet represents the entire contents of the Facebook web page(s) of Erica Sparks as well as videos posted or linked to it or them;

6)  Upon the successful execution of the orders set out herein and the execution of the certification of strict compliance with the orders contained herein by the solicitor appointed to supervise the downloading of the material referred to herein  Erica Sparks shall be free to resume unrestricted access to her web page(s) on Facebook including its substantive composition;

7)  The Motion begun on December 9, 2010 shall be adjourned to a date to be fixed by the Clerk of the Court of Queen’s Bench for the Judicial District of Woodstock;

8)  The Defendant shall then file with this court and serve on the Plaintiff, in timely fashion, a Notice of Motion for the production and disclosure of the contents of the sealed packet of information/data;

9)  Once a date for a Production Hearing has been set Mr. James Crocco shall bring to that hearing the sealed packet of data retrieved from the Facebook web page(s) of Erica Sparks pursuant to the orders contained herein;

10)                     Upon completion of the execution of the orders contained herein, that apply to the retrieval of the entire contents of Erica Spark’s Facebook web page(s) on the terms as set out in these orders, the temporary oral sealing order sealing the entire file and court record in this matter that was imposed on December 9, 2010 at the conclusion of the ex parte hearing shall be lifted without further order of the court.

11)                     The Plaintiff shall upon execution of these orders and the holding of a Production Hearing, in timely fashion, file a further and better Affidavit of Documents.

(emphasis added)

Needless to say, quite a different outcome and much to the benefit of defendant, who was seeking evidence to disprove the plaintiff’s claims of damages for soft tissue injuries. Apparently, the case settled shortly after the information was downloaded.

Interesting how both cases involved similar situations, but resulted in quite different outcomes.

norwich orders, part ii (an editorial of sorts)

<rant>

I was a bit surprised to find this article that covered the court orders that had required Google to disclose information on some Gmail users and the subsequent orders in Canada against certain Canadian ISPs, which was the subject of a previous post. The long and short of it is that the author considers Norwich orders to be some sort of grave, grave intrusion on privacy rights and personal liberty. Hence, this dire warning at the end of the article:

No matter how many precautions we take to remain private or cloak our identity, the authorities and other potential litigants usually have little difficulty obtaining this content. And they do it not by nefarious mean like hacking, but through our very own court system.

Internet users everywhere would do well to take heed. Your emails — and maybe even your Google searches — could be one subpoena away from the prying eyes of federal authorities, not to mention private litigants.

Why am I surprised? Because it seems to lack the most basic understanding of the legal system. I won’t get into all the details of the workings of Norwich orders – the original article by Omar Ha-Redeye that I had previously mentioned does a very good job at that, and I would certainly commend it to the author of this article so he may perhaps gain some insight.

The fact of the matter is that no, your privacy rights and right to anonymity have not suddenly disappeared altogether. However, as with all rights there are limitations. Thus, while U.S. citizens have the right to bear arms, they do not have the right to shoot people. If someone were to do that, they should reasonably expect their gun (and likely their liberty) to be taken away. Similarly, if someone uses their right to anonymity in an attempt to commit a crime or harm someone else, they should reasonably expect that right of anonymity to be taken away – at least to the extent it relates to the crime.

Remarkably, the author seems to suggest that the use of “subpoenas” (presumably he meant to refer to the Norwich orders) are almost the equivalent of, say, parking tickets, that the authorities or litigants can simply write up  if and when they choose to stomp on someone’s personal liberties for no good reason. What an unfortunate misperception of the legal system. The very reason why someone must go to the courts to obtain such as order is to ensure that the interests of the parties involved are balanced and safeguarded. If someone seeking the order does not have a reasonable and valid basis for doing so, it is likely that the order would not issue.

Regarding process, he cites Eric Goldman:

“People need to know that very little information that they give or make available to third parties [like Google] is unavailable to the government or private litigants,” says Eric Goldman, director of the High Tech Law Institute at Santa Clara University School of Law. “I think most people are surprised at how relatively easy it is for the government and private litigants to obtain ‘their’ information.”

I can’t speak to the process in the U.S. or what Mr. Goldman considers to be “relatively easy”. What I can say is that in Canada there is reasonable due process and consideration before such orders are issued. Just to cite one part of Mr. Redeye’s article:

A Norwich order is a pre-action discovery mechanism that is described by Spence J. in Isofoton S.A. v. The Toronto-Dominion Bank,

Requests for Norwich relief are largely unfamiliar to Canadian courts.  A Norwich order essentially compels a third party to provide the applicant with information where the applicant believes it has been wronged and needs the third party’s assistance to determine the circumstances of the wrongdoing and allow the applicant to pursue its legal remedies.

The 5 elements identified in this case for granting such an order include:

(i) Whether the applicant has provided evidence sufficient to raise a valid, bona fide or reasonable claim;
(ii) Whether the applicant has established a relationship with the third party from whom the information is sought such that it establishes that the third party is somehow involved in the acts complained of;
(iii) Whether the third party is the only practicable source of the information available;
(iv) Whether the third party can be indemnified for costs to which the third party may be exposed because of the disclosure, some [authorities] refer to the associated expenses of complying with the orders, while others speak of damages; and
(v) Whether the interests of justice favour the obtaining of disclosure.
[emphasis added]

The privacy interests of the alleged wrongdoer were overcome by the last element, the interests of justice, because of the applicant’s equitable right to information.  Spence J. pointed to Alberta v. Leahy and Bankers Trust Orders (from Bankers Trust Co. v. Shapira) indicating that court orders can override confidential information, even for financial records, and Glaxo-Wellcome PLC v. M.N.R. that the privacy interests of alleged wrongdoers is somewhat diminished.

Perhaps its just me, but this doesn’t sound particularly easy.

Of course, as with most things, the legal system is certainly not perfect, and there may well be instances where abuses might occur, or wrong decisions might be made by the courts where the scales of justice tip a bit. But to point at the sky and say it’s falling because of this case seems to me to be somewhat premature, to say the least.

Or at very least, as far as privacy concerns go, consider focusing more on things like the NSA and TIA than the courts.

</rant>

chrome a windows killer? i doubt it

Read an article in eWeek that left me scratching my head a bit. The nub below:

Then later:

And that would spell doom for Microsoft. It’s one thing to squeeze Microsoft out of the Internet game by dominating search and Web services. It’s another entirely to come after the software giant’s core operating system business, wielding the Web as your platform.

Must admit I have a lot of trouble seeing that, as I would have thought in order to supplant Windows, it would need to be gone, and to go from a browser that sits on an o/s to replacing the o/s seems to be a rather large leap. A huge leap, actually.

What they’re suggesting might happen is already a possibility today. There is definitely something that can supplant Windows altogether, and provide access to all the web-oriented apps, etc. that Google offers. Its cheap (sometimes free), stable and has pretty good UIs – in fact, a selection of UIs and different flavours. Its called Linux. However, for a variety reasons, it hasn’t kicked Microsoft’s ass yet (at least on the desktop – there are a few areas where it definitely does, such as web and other server functions).

To suggest, then, that, because Google has come out with a browser, that that will lead to the supplanting of Windows seems, IMHO, to be a bit far-fetched. I’m not suggesting that Google wouldn’t have the wherewithal to try to go after the desktop. They may do so. Though I’m not sure if they’d want to – they have a pretty good business model already…

Anyway, if and when they do something like that it will be so much larger an undertaking than Chrome that the links between that and Chrome would be tenuous at best, other than possibly bundling Chrome within whatever o/s they create.

Even possibly on the application front, I can see Google putting some pressure on MS, and how this might tie with Chrome. But not the o/s on which the whole thing runs.

So I think for the time being, Bill and Steve probably don’t have much to worry about with Chrome’s introduction, at least when it comes to the o/s business (IE on the other hand, is another matter altogether…).

net neutrality – fcc order against comcast released

As most of you probably know, the US FCC and its members released a series of press releases at the beginning of August announcing its order against Comcast in respect of its “network management” activities in relation to P2P networks, but not releasing the order.

Well, apparently the order (PDF) has now been released. Haven’t had a chance to read it yet. Should be interesting, particularly given the same or similar developments with Bell and Rogers up here in Canada.

Noticed first on Lessig’s blog and of course in the time I’ve written a tiny little entry he has already churned out a five page letter thanking the FCC

I have a number of half finished posts on the question of net neutrality that haven’t been made public – mostly because they get unbearably long but still don’t do the topic justice. There are other reasons as well but perhaps I will get into it more if and when I decide to finally post something. Suffice it to say that I honestly don’t think the issue is black and white (and hopefully will not be caught in the “if you’re not for us, you’re against us” mentality).

regrettable absence

Apologies to all ten of my loyal readers for the absence. It has been a very, very busy summer and, unfortunately, when it comes to relative priorities, getting work done for clients, playing with my 2 year old, sleeping and then blogging take priority, in that particular order. I’ve also been surprised so far by some of the informal comments I’ve received (not on the blog but in person), most of which have been negative or have negative implications. I must say that has also played a bit of a role in my absence. So who knows, this little blog may not be around much longer. Still giving it some thought.

In any event, a brief quote from one of my colleagues that you may find amusing: “The practice of law is very much like a pie-eating contest where the prize for winning is more pie.”

Thoughts on Quantum Computing

Interesting article in Wired News where they interview David Deutsch who they refer to as the Father of Quantum Computing. He has a kind of low key but interesting take on the recent demonstration of a real, live 16 qubit quantum computer by D-Wave, a Canadian company based out of Vancouver.

Low key insofar as he doesn’t seem particularly enthused about the potential of quantum computers, other than perhaps their ability to be used to simulate quantum systems and of course encryption:

Deutsch: It’s not anywhere near as big a revolution as, say, the internet, or the introduction of computers in the first place. The practical application, from a ordinary consumer’s point of view, are just quantitative.

One field that will be revolutionized is cryptography. All, or nearly all, existing cryptographic systems will be rendered insecure, and even retrospectively insecure, in that messages sent today, if somebody keeps them, will be possible to decipher … with a quantum computer as soon as one is built.

Most fields won’t be revolutionized in that way.

Fortunately, the already existing technology of quantum cryptography is not only more secure than any existing classical system, but it’s invulnerable to attack by a quantum computer. Anyone who cares sufficiently much about security ought to be instituting quantum cryptography wherever it’s technically feasible.

Apart from that, as I said, mathematical operations will become easier. Algorithmic search is the most important one, I think. Computers will become a little bit faster, especially in certain applications. Simulating quantum systems will become important because quantum technology will become important generally, in the form of nanotechnology.

(my emphasis). Interesting thought about being retrospectively insecure. Particularly given spy agencies have, in the past, been sufficiently bold to transmit encoded messages on easily accessible shortwave frequencies.

I imagine the spook shops already have their purchase orders in for quantum crypto stuff (or have developed it already internally). Was a bit surprised by the statement above regarding existing technology for quantum computing. I had heard of some demos a while back, but didn’t realize that there are actually several companies offering quantum cryptography products.

Pretexting, Canadian Style

From one of my very smart colleagues at the firm – a recent Canadian case involving “pretexting” like activity a la HP.

The short story: A company hires an investigator to see what some former employees are up to, since they’ve started a competing business. Based on what they find out, they sue the employees. In discovery (in rough terms, the process through which each party gets to look at the information that the other side has supporting their case), the employees find out that the investigator has obtained their phone records and also has recorded them on video at their business premises, in both cases without their consent and without a court order.

Sound somewhat familiar?

So the employees countersue the company and the investigator. It turns our that the company wasn’t aware of the methods used by the investigator and so is left off the hook, but the action against the investigators is given the green light.

Whether or not the claim of the employees will succeed remains to be seen. In the meantime, folks thinking of using investigators, for whatever purpose, would be wise to give serious consideration to the nature of information that they want to collect.

Microsoft Patents RSS. Or Tries To. Maybe.

Interesting post on someone else’s blog about Microsoft apparently trying to patent RSS:

The applications, filed last June but just made public yesterday, cover subscribing and discovering what Microsoft calls “Web feeds.” That comes as a bit of a shock to anyone who’s been working on RSS, which has its origins in a format developed seven years ago at Netscape Communications.

Microsoft executive Don Dodge, while not involved in the patent applications, says he suspects the filings were made to defend the company against “patent trolls”. (The filings were made shortly before Microsoft announced plans to build RSS technology into its upcoming Vista operating system.) Still, if granted, the patents would give Microsoft a legal cudgel to wield against other companies using RSS.

Well. They do have a point. Generally speaking, I don’t think patent trolls (those that basically file overly broad patents and then sit on them in a dark cave until someone who actually does something useful, and therefore has deep pockets, unwittingly infringes, at which point the troll comes out and clubs them over the head with a lawsuit or settlement) are a good thing. That being said, its ironic that Microsoft feels the need to abuse the system in the same way as patent trolls in order to proactively defend itself. It will be interesting to see how things turn out.

Unfortunately, I’m not necesarily sure that prior art would necessarily invalidate these patents – after all, most of NTP’s patents were more or less considered invalid, but that didn’t stop them from collecting several hundred million from RIM. And its not like there haven’t been other, um, rather broad patents asserted in the past. You know, like back in 2002, when British Telecom asserted ownership of hyperlinks (which they lost) though of course BT doesn’t quite fit the description of a patent troll.

Then again, it begs the question as to who or what should or shouldn’t be considered a patent troll – for example, its well known that IBM has a huge, gigantic, enormous arsenal of patents at its disposal. IBM also actively licenses these patents (and of course threatens litigation where it believes its rights are being violated), but it isn’t necessarily the case that IBM would otherwise have exploited these patents in what I’ll call “active” business – i.e. making and selling something based on the patent as opposed to primarily seeking royalties and licenses from those do – even though IBM does do so in some cases. So does that make IBM a patent troll? What about Philo T. Farnsworth who, arguably, never started producing televisions but instead sought legal claims against others?

My perhaps overly simplistic take on this is that patent trolls are not inherently the problem, but rather the ability, primarily in the US, to register patents that should have never issued in the first place. If someone comes up with a smart, cool, inventive, and truly novel way of doing something, then they should certainly be free to either produce something with it, or sue the living daylights out of someone else who comes along and infringes the IP even if they don’t (or can’t) make productive use of it themselves. Not actively exploiting a patent is not necessarily tantamount to being a bad guy, IMHO.

It will be interesting to see what happens on this front, if anything. If nothing does, then I may well turn to drafting patents, the first being “Method of Utilizing a Rhythmic Cadence in the Expansion and Contraction of Multiple Muscular Groupings to Faciliate Indefinite Continuation of Metabolism of Cell Structures.” I like the sound of that. Yes indeed.