Lecture 8 Legal Issues in Computing Lecture 8 Legal Issues in Computing.
Legal Research in the Age of Cloud Computing
-
Upload
neal-axton -
Category
Education
-
view
98 -
download
2
description
Transcript of Legal Research in the Age of Cloud Computing
Advanced Legal Research
Week One:Law in the Internet Age
Neal R. Axton & Simon Canick,Information Resources
Introductions & Expectations• Instructors• Students• Auditors
• Technology– Gmail– Blackboard
• Quizzes• Research Assignments
• http://www.pewinternet.org/
Pew Internet & American Life Project (2010)
Tablet Ownership Exploding
Are you smarter than your phone?
Internet Citation• Typewriters – 1714 & 1867
• Bluebook
• Practitioner Style – Typewriters = Underlining
• Law Review Style– Type Setting
• Small Caps• Italics
• Font?• Size?
Online Resources
More formats• 18.2.2 Direct Citations to Internet Sources• 18.2.3 Parallel Cites – available at
• 18.3 Commercial Databases• 18.3.1 Cases
– Unreported• 18.3.2 Constitutions and Statutes• 18.3.3 Legislative, Administrative & Executive Materials• 18.3.4 Books, Periodicals, Other Secondary Sources
• 18.4 CD-Rom• 18.5 Microform• 18.6 Film• 18.7 Audio
– Podcasts
Websites
Other Sources
Direct Citations• Hard copy “practically unavailable”– e.g. Rule 18.1’s Conference Report
• Cite directly– Due Diligence Required? •Worldcat.org
– Hard Copy Not Cataloged and/or not Published (e.g. Press Release)
• Citing to Westlaw for current statues• Minn. Stat. Ann. 169
• Bluebook – Rules or Best Practices?
Some Legal Innovations• WestlawNext
– Federated Search
• Fdsys– Federated Search
• Electronic Court Filing System– PACER/ECF– Bloomberg’s Docket Search
– Minnesota moving online too…
• Save Money, Reduce Staff
Terrorists or Freedom Fighters?
We are Anonymous.We are Legion.We do not forgive.We do not forget.Expect us.
The Online Menagerie• Hacktivists• Hackerspaces• Black Hats• White Hats• Cypherpunks• Cyberpunks
• Wikileaks– Bradley Manning & Julian Assange
• 4chan, anonymous, lulzboat & lulzsec
• Edward Snowden & Glenn Greenwald
• Pirate Bay & Pirate Party
Attorney Job Security
What’s new [to the music industry] is this amazingly efficient distribution system for stolen property called the Internet — and no one’s gonna shut down the Internet.
— Steve Jobs, Rolling Stone, Dec. 3, 2003
http://wikileaks.org/
Julian Assange on Fear
“Fear exists largely in the imagination. That’s what powerful people prey on. It simply isn’t possible to police the world’s citizens, so what they rely on is fear.
Once you realise that fear exists largely in your own mind, then you are on the way to liberation. Also I have this righteous indignation. It spurs me on. Makes me feel invincible.”
Daily Mail: http://bit.ly/qCpYSx
Jurisdiction
The geometrically-enhanced capabilities of the emerging web technology spotlights the long-ignored issues of who owns the worldwide web, who manages the worldwide web, and who has jurisdiction over the worldwide web? The answer now is: nobody!- Gene Stephens, Future Challenges of Cybercrime 13 (2010) (FBI and Police Futurists Int’l Working Group) http://bit.ly/pA51OV.
•htt
p://bit.ly/12vQ4k1
Those leftists at the Economist…
A Higher Moral Order?
Ruminations1. States passive and reactive
2. NGO's running the show
3. Media autonomous of nation-state
4. States no longer in control of "normative frameworks"
5. Concept of Spying obsolete
6. Polycentric Governance
Implications• Global Citizens
cf. United Nations
• Information Wants to be Free!– What do We Want for Information?
• Technology Changes Us
– Information Technology
– Mass Communication
– Internet & Cell Phones
– Firearms?
Ethical Compliance
http://lprb.mncourts.gov/Pages/Default.aspx
MN LPRB Opinion 22
Tracked Changes Metadata
More on Metadata• Metadata
– Data about Data
– Industrial Strength Organizational Data
– Telephony Metadata• Originating Phone Number• Dialed Phone Number• Duration of Call• Call Waiting• Call Forwarding• Cell Phone Tower used during Call• Cell Phone Transfers During Call• Signal Strength During Call
Scintilla of Knowledge• Black Boxes– Irreducible Complexity– Invisible Data•Metadata
• Any sufficiently advanced technology is indistinguishable from magic.
- Arthur C. Clarke
Location Data
Distinctions with a difference
• Applying GPS device = 4th Amendment Violation– aka Bird-dogging
• Using Cell Phone Tower Metadata = Okey-Dokey
• Reasonable Expectation of Privacy
– Katz v. U.S., 389 U.S. 347 (1967)
– Fiat Declaration– One Size Fits All
Social Network Analysis• Pivot People & Opinion Leaders
Complex Social Networks
Cloud Computing
Search for Cloud Computing on LPRB site
Cloud Computing and Legal Ethics
Ethical Pitfalls
• [T]he use of technologies such as cloud storage will never lessen—and may, in fact, increase and make more complicated—an attorney’s obligations under the Rules of Professional Conduct.
• As an initial matter, an attorney must have at least a base-level comprehension of the technology and the implications of [cloud computing’s] use.
Head in the Clouds
• Cloud computing– Software as a service– Infrastructure & Bandwidth
• Client-Server Architecture
Computing Platforms• Thick Clients
– PC with local Central Processing Unit (CPU)
• Thin Clients – e.g. Smart Phones– Push Everything Possible to the Cloud
Root
DNS DNS DNS DNS DNS DNS DNS
ISP
Servers Users/Clients
IXP
Root Root
ISP ISPISP
FBI Intercepts• Communications Assistance for Law Enforcement Act, Pub.L.
103–414, 108 Stat. 4279 (1994) codified at • 47 USC §§ 1001-10.
• FBI’s older Carnivore system
• DCSNet and DCS-3000
– Captures VOIP– Mobile Cell Tower Vans
Combining Topics• Search Incident to Arrest
• Seize iPhone• Access iCloud
• Can law enforcement access contacts on a phone?
• Can law enforcement access everything on the defendant’s iCloud?
Lawyering in the 21st Century• E-Discovery
– Costs impact litigation– Smoking Gun
• Legal Blogging– Lawyer Advertising?– Blog Consultant
• Social Networking– Due Diligence– Discrimination?
• Social Networking Independent Reviewer• False and Misleading Statements• Unauthorized Practice• Privacy implications of email
Geek Speak and Lawyering“One of the primary reasons that electronic data is lost is ineffective communication with information technology personnel.
By taking possession of, or otherwise safeguarding, all potentially relevant backup tapes, counsel eliminates the possibility that such tapes will be inadvertently recycled…
Counsel failed to communicate the litigation hold order to all key players. They also failed to ascertain each of the key players' document management habits…
This case represents a failure of communication, and that failure falls on counsel and client alike.”
Zubulake v. UBS Warburg LLC, 229 F.R.D. 422 (S.D.N.Y.2004) (aka Zubulake V)
History of Mass Media• Typewriters• Telegraph• Teletype Machines
• Advertising• Female Typists
– Context of AMC’s Mad Men Show
• Newspapers• Postal Service
– Bribing Postmasters– Transit Fees– International Relations and Subservience
Theoretical Frameworks• Social Contract Theory• Rights Theory
– Rights Enforced by a Sovereign
• Ethics– Intentionalism vs Consequentialism
• Privacy– Secrecy
• Trade Secrets– Transparency
• Data Practices Act– Security
• Privacy
• Network Theory