Saturday, January 22, 2011

MIRLN --- 1-22 January 2011 (v14.01)


(supplemented by related Tweets: http://twitter.com/vpolley #mirln)

·      IBM Creates Cloud-Computing System for NATO Command
·      Nationwide Employee Sentenced To 2 1/2 Years For Counterfeit Video Games
·      Whether a Lawyer Who Maintains Some or All of a Former Client’s Records Solely in Electronic Form Must Provide the Former Client With Paper Copies of Such Records If Requested By the Former Client and, If So, Whether the Lawyer May Charge the Former Client For Providing the Files In Paper Form
·      Using What We Know: Turning Organizational Knowledge into Team Performance
·      MoFo Launches Newsletter Tracking Rapidly Shifting Social Media
·      Listening: First Step In Blogging By Lawyers
·      Cell Phones Can Be Searched After Arrest, CA Justices Say
·      US Racked Up 662 Reported Data Breaches In 2010
·      Quinn Emanuel $13 Million Facebook Fee Held Up While Ex-Clients Appeal in Calif.
·      Some Injuries Just Don’t Hurt
·      House.Resource.Org
·      Judge Blocks Gov’t From Upgrading Email System To Microsoft In Google Lawsuit
·      Obama To Hand Commerce Dept. Authority Over Cybersecurity ID
·      Privacy Policies Are Dead, Privacy Watchdog Says
·      Copyrighting Digital Images of Real People
·      Fifth Circuit Permits Warrantless Government Searches Based on Previous Private Search Not Known To Police
·      Twitter Shines a Spotlight on Secret F.B.I. Subpoenas
o   Social Media and Law Enforcement: Who Gets What Data and When?
·      New MIT OpenCourseWare Initiative Aims to Improve Independent Online Learning
·      How a Law Firm Website is Like a Cave or a Middle School Dance
·      Google Scholar Now Searches Cases by Jurisdiction and Court
·      E-Discovery Sanctions Reach All-Time High for Litigants and Lawyers
·      10 Reasons Law Blogs Are Preferable to Email Blasts and Newsletters
·      Court Rejects Claim of a First Amendment Right to Audio-Record Police Officers
·      New Task for Phone: File Taxes
·      Appeals Court Finds Attorney-Client Privilege Doesn’t Cover Work Emails
·      Appearing Virtually at a Store Near You
·      Pennsylvania Court Specifies Test for Unmasking Anonymous Online Speakers
·      Law Pivot Gets New Tool, More Funding to Crowdsource the Law
·      Lawyer Acting as Expert Witness Violated Child Porn Law With Court Exhibits, 6th Circuit Rules
·      U.S. Army Launches Social Media Handbook
·      EU, Stop Making Sense (Please)

NEWS | RESOURCES | COMMENTARY | FUN | LOOKING BACK | NOTES

IBM Creates Cloud-Computing System for NATO Command (Bloomberg, 22 Dec 2010) - International Business Machines Corp., the world’s biggest computer-services provider, is building a cloud-computing system for NATO in the first such deal for the international military alliance. The software and hardware will let NATO more quickly collect and analyze data, such as military intelligence in Afghanistan, said E.J. Herold, head of the project for IBM. NATO’s military command department in Norfolk, Virginia, will use the technology first, with the possibility it will expand to other divisions, he said. Terms of the accord weren’t disclosed. IBM gains a foothold for similar projects for NATO’s other departments, as well as its 28 member countries. The Armonk, New York-based company is betting cloud computing, which helps customers save money by letting them store and access data via the Internet, will be a $3 billion business by 2015. IBM will manage the North Atlantic Treaty Organization’s data from inside the Norfolk base, in a so-called private-cloud model, which lets customers put information on servers within their own security systems. The system will help the military command pull together information from sources such as radar systems, cameras or infrared images that had been separated. http://www.bloomberg.com/news/2010-12-22/ibm-to-create-cloud-computing-system-for-nato-military-command.html See also http://www.cloudtweaks.com/2010/12/nato-set-to-rule-the-cloud-with-ibm’s-help/ [Spotted by MIRLN reader Roland Trope.]

Nationwide Employee Sentenced To 2 1/2 Years For Counterfeit Video Games (Columbus Dispatch, 30 Dec 2010) - New monitoring software at Nationwide Insurance spelled the beginning of the end for an employee who had been counterfeiting and selling computer games for five years. The software alerted Nationwide officials to a spreadsheet that Qiang “Michael” Bi had sent from his personal e-mail account to his Nationwide e-mail account. The spreadsheet listed eBay accounts, credit-card numbers and false identity information that Bi used in a lucrative counterfeiting scheme. Yesterday, U.S. District Judge Algenon L. Marbley sentenced the 36-year-old Bi to 2 1/2 years in prison. Bi had pleaded guilty earlier this year to charges of mail fraud, copyright infringement and aggravated identity theft. The spreadsheet listed more than 50 eBay and PayPal accounts, all with different names. http://www.dispatch.com/live/content/local_news/stories/2010/12/30/nationwide-employee-sentenced-to-212-years.html?sid=101 [Editor: suspicious activity-detector systems might have flagged this because of the home-to-work email, but a spreadsheet? I’m guessing there was either manual inspection or some kind of DPI system.]

Whether a Lawyer Who Maintains Some or All of a Former Client’s Records Solely in Electronic Form Must Provide the Former Client With Paper Copies of Such Records If Requested By the Former Client and, If So, Whether the Lawyer May Charge the Former Client For Providing the Files In Paper Form. (DC Ethics Opinion 357, December 2010) - As a general matter, there is no ethical prohibition against maintaining client records solely in electronic form, although there are some restrictions as to particular types of documents. Lawyers and clients may enter into reasonable agreements addressing how the client’s files will be maintained, how copies will be provided to the client if requested, and who will bear what costs associated with providing the files in a particular form; entering into such agreements is prudent and can help avoid misunderstandings. Assuming no such agreement was entered into prior to the termination of the relationship, however, a lawyer must comply with a reasonable request to convert electronic records to paper form. In most circumstances, a former client should bear the cost of converting to paper form any records that were properly maintained in electronic form. However, the lawyer may be required to bear the cost if * * * http://www.dcbar.org/for_lawyers/ethics/legal_ethics/opinions/opinion357.cfm?emc=lm&m=141203&l=10&v=29949194

Using What We Know: Turning Organizational Knowledge into Team Performance (HBR, 31 Dec 2011) -- “This paper examines how teams draw on knowledge resources in the firm in the production of novel output. We theorize positive effects of team use of an organizational knowledge repository on two measures of team performance (quality and efficiency), and argue that these effects will be greater when teams face structural characteristics (team geographic dispersion and task change) that intensify the challenge of knowledge integration. Drawing on information processing theory, we distinguish between a team’s knowledge repository use and concentration of use (the extent to which use is limited to a few members versus more evenly distributed within the team). Using objective data from several hundred software development projects in an Indian software services firm, we find that knowledge repository use has a positive effect on project efficiency but not on project quality. Concentration of repository use, a form of within-team specialization, is negatively associated with project efficiency and positively related to project quality. Finally, as predicted, we find that in some cases the effects of both repository use and concentration of repository use are greater when teams are dispersed geographically or encounter changing tasks. Our findings offer insight for theory and practice into how organizational knowledge resources can improve knowledge workers’ productivity and help build organizational capability.” http://www.hbs.edu/research/pdf/11-031.pdf

MoFo Launches Newsletter Tracking Rapidly Shifting Social Media (ABA Journal, 1 Jan 2011) - It wasn’t long ago that clients came to Morrison & Foerster for help updating their employee handbooks to prohibit staff from blogging about their jobs. Then the San Francisco-based firm noticed a change. “Silicon Valley companies started to see value in loosening up,” says John Delaney, a MoFo partner. “Clients were asking about having their own Facebook pages. The guy in their mailroom was starting to Twitter.” As companies realized that social media was something more than “what they had seen looking over their daughter’s shoulder,” they turned to the firm for advice, says Gabriel Meister, also a firm partner. And Delaney and Meister, both New York City-based members of the firm’s technology transactions practice group, began to see a need for themselves to keep abreast of the rapidly changing world of social media. Last year the two decided to launch a newsletter that would help. In July they began publishing MoFo’s Socially Aware. The new monthly newsletter—distributed only in PDF format—examines social media issues such as malicious online impersonation and anonymous online postings, as well as broader First Amendment issues. http://www.abajournal.com/magazine/article/legally_aware_law_firm_newsletter_social_media/

Listening: First Step In Blogging By Lawyers (Kevin O’Keefe, 2 Jan 2011) - Imagine you’re an estate planning lawyer in Des Moines looking to grow your practice. The marketing folks at Principal Park, home of the Triple A Des Moines Cubs, call to tell you that you’ll have free use of a luxury box for five of next year’s ball games. Better yet, they tell you they’ll arrange for the food and drink and invite a who’s who in networking for a Des Moines estate lawyer. Would you go? Darn right you’d go. Would you wear ear plugs so you couldn’t hear anyone? Heck no. But that’s exactly what most lawyers do when they blog. Rather than listening to their target audience, lawyers shout information, updates, and news without listening to a word being said by the folks they ought to be networking with. All in an effort to showcase their intellect and build their personal brand. http://kevin.lexblog.com/2011/01/articles/blog-basics/listening-first-step-in-blogging-by-lawyers/ [Editor: Useful advice.]

Cell Phones Can Be Searched After Arrest, CA Justices Say (Law.com, 3 Jan 2011) - Delving into privacy concerns in the age of the smart phone, the California Supreme Court determined today that after police take a cell phone from a suspect during an arrest, they can search the phone’s text messages without a warrant. The majority in the 5-2 decision reasoned that U.S. Supreme Court precedents call for cell phones to be treated as personal property “immediately associated” with the suspect’s person. But in a dissenting opinion, Justice Kathryn Werdegar wrote that information stored on cell phones shouldn’t be examined without a warrant and warned that the majority sanctioned searches that violate the U.S. Constitution’s Fourth Amendment. In weighing whether perusing the text messages constituted an illegal search, the Supreme Court relied largely on United States v. Robinson , 414 U.S. 218, 224 (1973) — which held it was legal for an officer to search a cigarette pack found in an arrestee’s coat pocket — and United States v. Chadwick 433 U.S. 1, 14-15 (1977), which invalidated federal narcotics agents’ warrantless search of a 200-pound foot locker after they arrested the men loading it into a car. Diaz’s lawyer, Lyn Woodward of Pacific Grove, had argued that the quantities of personal data cell phones contain are “unrivaled” by items traditionally considered “immediately associated with the person of the arrestee,” such as clothing or a cigarette pack. She also argued that cell phones should be treated like the foot locker in Chadwick because they’re not necessarily worn on the person. Werdegar, joined by Justice Carlos Moreno in the dissent, argued there’s no need to search a cell phone immediately if it’s in police control, and that instead a warrant can be obtained to conduct the search properly. She wrote that the majority gave “police carte blanche, with no showing of exigency, to rummage at leisure through the wealth of personal and business information that can be carried on a mobile phone or handheld computer merely because the device was taken from an arrestee’s person.” And, in a footnote, Werdegar reasoned that the facts of the case — because of increasingly ubiquitous cell phones and handheld computers — differ enough that the precedents the majority cites “provide no basis for evading this court’s independent responsibility to determine the constitutionality of the search at issue.” http://www.law.com/jsp/ca/PubArticleCA.jsp?id=1202476909376

US Racked Up 662 Reported Data Breaches In 2010 (InfoSecurity, 4 Jan 2011) - The non-profit Identity Theft Resource Center (ITRC) has compiled its final tally of reported US-based data breach incidents in 2010. With 662 reported breach events, it’s a nearly 33% increase over 2009. A couple of noteworthy lowlights from the report include breaches affecting two of the ‘Holy Grails’ of personal information: Social Security numbers and credit/debit card details. Sixty-two percent of the reported incidents involved the loss of Social Security data, or 76% of the known records. A further 26% of the breaches involved payment card information, or 29% of the reportedly compromised records. ITRC’s analysis shows that 51% of publicly reported data breaches disclosed the total number of records compromised, coming in at 16.1 million records total. However, this means almost half of all reported data breaches failed to reveal the number of compromised records, a fact the ITRC claims is “another argument for mandatory reporting”. http://www.infosecurity-us.com/view/14910/us-racked-up-662-reported-data-breaches-in-2010/?elq_mid=12287&elq_cid=996107

Quinn Emanuel $13 Million Facebook Fee Held Up While Ex-Clients Appeal in Calif. (New York Law Journal, 5 Jan 2011) - When Manhattan Supreme Court Justice Richard Lowe III (See Profile) in November affirmed a$13 million fee award for Quinn Emanuel Urquhart & Sullivan against its onetime clients, Facebook Inc. rivals Cameron and Tyler Winklevoss, the firm’s litigator-in-chief John Quinn could not help but brag via his Twitter account: “Winklevoss twins lose again: QE paydaycometh” (NYLJ, Nov. 10).But four days before Christmas, a federal district judge in San Jose, Calif., James Ware, ruled that the $13 million must remain in an escrow account while the Winklevoss twins appeal the New York decision. And meanwhile, according to an exhibit filed with Judge Ware, Mr. Quinn has faced questioning by Justice Lowe, who wanted to know why Mr. Quinn made the fee decision available through a Twitter link, even though the ruling was sealed. http://www.scribd.com/doc/46419252/Quinn-Emanuel-Facebook-Fee-RE-Fraudulent-Facebook-Settlement-on-Hold-Pending-Appeal-by-Winklevosses-Twins

Some Injuries Just Don’t Hurt (Steptoe’s E-Commerce Law Week, 6 Jan 2011) - “Injury in fact” and “actual loss or damage” would seem, to the untrained eye, to be the same thing. But, as demonstrated in data breach cases, you can have the first without the second, and thus have standing to sue in federal court but not a cognizable negligence claim. In Krottner v. Starbucks, the Ninth Circuit found that the increased risk of identity theft constituted “injury in fact” and thus gave plaintiffs standing under Article III, Section 2 of the U.S. Constitution. It also found that a plaintiff’s alleged stress and anxiety arising from a data breach was sufficient to confer standing. But the court ruled, in a second, unpublished opinion, that the allegation of a risk of future harm did not constitute “actual loss or damage” necessary to make out a negligence claim under the law of Washington State. The Ninth Circuit’s decision that standing could be predicated on the risk of future identity theft appears to deepen a circuit split on this issue. http://www.steptoe.com/publications-7326.html

House.Resource.Org (Carl Malamud, O’Reilly Radar, 5 Jan 2011) -- For the past 5 years, I’ve haunted the halls of the U.S. Congress with a geeky ask: broadcast-quality video from all congressional hearings should be posted on the Internet. I gave a tech talk at Google, drew up business plans to start a new nonprofit, enlisted the help of the Public Printer, and harassed my friends in the mainstream media and my friends working for the former Speaker. My motivation has been a deeply felt belief that one should not have to live inside the Washington, D.C. beltway in order to observe the proceedings of the U.S. Congress. No matter what our political beliefs, no matter how much we disagree on the issues, we must all agree that the business of the Congress is the business of the People. Today, that means that business must be conducted so that it is visible on the Internet. Today, we are announcing a new site, House.Resource.Org. This site contains today over 500 hearings we obtained from C-SPAN from the proceedings of the House Committee on Oversight and Government Reform. Under an agreement reached with Chairman Darrell Issa and Speaker of the House John A. Boehner, we are now in receipt of several hundred more high-resolution files from 2009 and 2010 hearings that will be loaded on the site. In addition, the Committee has agreed to furnish us with high-resolution files from all hearings in 2011, which we will be posting on a weekly basis. Note that this is not a real-time service, we are posting big files after-the-fact. A letter received today from Chairman Darrell Issa and Speaker of the House John A. Boehner states that it is their hope “that this project is only the beginning of an effort to eventually bring all congressional committee video online.” On a technical note, house.resource.org serves the files as HTTP, RSYNC, and FTP. We’ve also put in place many of the official GPO transcripts as signed PDF and as raw text. If you’d like to view the files, you’ll be able to do so on YouTube, the Internet Archive, and on C-SPAN. We also expect other organizations to make use of this material. The C-SPAN video is licensed for non-commercial attribution use and the material from the Congress is in the public domain. http://radar.oreilly.com/2011/01/houseresourceorg.html?utm_medium=twitter&utm_source=twitterfeed

Judge Blocks Gov’t From Upgrading Email System To Microsoft In Google Lawsuit (TechDirt, 6 Jan 2011) - Back in November, we were one of the first to report that Google had sued the US government after the Department of the Interior had put out a Request for Quotation (RFQ) for an upgraded email system that stated upfront that the solution had to be based on Microsoft. Google, who had been talking to the Interior Department about using its own solution, had received promises that the RFQ would not be biased towards Microsoft -- and thus were shocked when it wasn’t just biased towards Microsoft, but restricted only to Microsoft. In the first phase of the lawsuit, it appears that Google has made a compelling enough case that the judge has issued an injunction, preventing the DOI from moving forward with the email upgrade. The LA Times headline and opening graf is a bit hyperbolic concerning this “victory.” Google certainly hasn’t won the lawsuit, and it’s hardly a “major victory” at this point, but it at least suggests that the judge finds Google’s basic claims credible. DOI can try to rewrite its RFQ to get out of the lawsuit or it can protest the injunction and the lawsuit will continue. http://www.techdirt.com/articles/20110105/12191512533/judge-blocks-govt-upgrading-email-system-to-microsoft-google-lawsuit.shtml

Obama To Hand Commerce Dept. Authority Over Cybersecurity ID (CNET, 7 Jan 2011) - President Obama is planning to hand the U.S. Commerce Department authority over a forthcoming cybersecurity effort to create an Internet ID for Americans, a White House official said here today. It’s “the absolute perfect spot in the U.S. government” to centralize efforts toward creating an “identity ecosystem” for the Internet, White House Cybersecurity Coordinator Howard Schmidt said. That news, first reported by CNET, effectively pushes the department to the forefront of the issue, beating out other potential candidates, including the National Security Agency and the Department of Homeland Security. The move also is likely to please privacy and civil-liberties groups that have raised concerns in the past over the dual roles of police and intelligence agencies. The announcement came at an event today at the Stanford Institute for Economic Policy Research, where U.S. Commerce Secretary Gary Locke and Schmidt spoke. The Obama administration is currently drafting what it’s calling the National Strategy for Trusted Identities in Cyberspace, which Locke said will be released by the president in the next few months. (An early version was publicly released last summer.) “We are not talking about a national ID card,” Locke said at the Stanford event. “We are not talking about a government-controlled system. What we are talking about is enhancing online security and privacy, and reducing and perhaps even eliminating the need to memorize a dozen passwords, through creation and use of more trusted digital identities.” Details about the “trusted identity” project are remarkably scarce. Last year’s announcement referenced a possible forthcoming smart card or digital certificate that would prove that online users are who they say they are. These digital IDs would be offered to consumers by online vendors for financial transactions. Schmidt stressed today that anonymity and pseudonymity will remain possible on the Internet. “I don’t have to get a credential, if I don’t want to,” he said. There’s no chance that “a centralized database will emerge,” and “we need the private sector to lead the implementation of this,” he said. Jim Dempsey of the Center for Democracy and Technology, who spoke later at the event, said any Internet ID must be created by the private sector--and also voluntary and competitive. http://news.cnet.com/8301-31921_3-20027800-281.html

Privacy Policies Are Dead, Privacy Watchdog Says (ReadWriteWeb, 7 Jan 2011) - Privacy policies are dead, says Fran Maier, President of privacy auditing firm TrustE, and it’s time for the web to move into an era of “just in time” notifications whenever new types of data are being collected or when our data is being used in new ways. At a time when online data about individuals and our actions is growing exponentially, when the potential for that data to drive innovation and monetization is just beginning to be understood, when users are wrestling to take control over new forms of communication and when government is looking to take action to protect the complex interests of its citizens - Maier’s forward looking statements, well informed by the history of online privacy practices, are well worth paying attention to. Maier’s statements were included in a 14 minute TedX talk posted on the TrustE company blog this week. (Full video embedded below as well.) In the talk, Maier provided an overview of evolving understandings of privacy from Match.com’s 1995 creation of a privacy policy before the practice was widespread, through Facebook’s controversial but highly granular policies today, the emerging European practice of notifying citizens when they enter an area watched by surveillance cameras and a future characterized by an Internet of Things, where user data is held not just online, but in our phones, our cameras, our electrical grid and elsewhere. Maier says we’ll soon start to see a system called a Forward Eye in advertisements online, which will tell us what information about us is being captured and how it will be used. We’ll then be given an option to opt-out. http://www.readwriteweb.com/archives/privacy_policies_are_dead_privacy_watchdog_says.php

Copyrighting Digital Images of Real People (Media Law Prof Blog, 10 Jan 2011) - Bryce Clayton Newell has published Independent Creation and Originality in the Age of Imitated Reality: A Comparative Analysis of Copyright and Database Protection for Digital Models of Real People at 6 Brigham Young University International Law & Management Review 93 (2010). Here is the abstract. “This Article addresses a few of the issues that confront digital artists and modeling companies in the context of copyright law’s requirements of originality and independent creation, and provides a comparative look at potential protection for these types of digital models under differing definitions of originality. In an age when animators deal with pixels as well as paint brushes, the laws of the United States potentially offer digital artists less protection in this context than do the laws of other countries, such as the United Kingdom and Australia. Specifically, the requirement of originality after Feist and the lack of sui generis database protection in the United States provide less protection for digital visual effects artists engaged in modeling reality than do the laws of these other jurisdictions. This Article examines some examples of recent advancements in digital imaging technology; specifically, the ability to create digital clones of preexisting things, such as living or deceased personalities and other, non-human, objects. The Article then provides a comparative analysis of copyright’s requirement of originality in the United States, United Kingdom, and Australia, followed by a brief look at sui generis protection under the European Union’s recent directive on the legal protection of databases.” http://lawprofessors.typepad.com/media_law_prof_blog/2011/01/copyrighting-ditigal-images-of-real-people.html

Fifth Circuit Permits Warrantless Government Searches Based on Previous Private Search Not Known To Police (Volokh Conspiracy, 9 Jan 2011; post by Orin Kerr) - Last week the Fifth Circuit handed down a significant decision on the “private search” doctrine in Fourth Amendment law, United States v. Oliver. Oliver permits warrantless searches under the private search doctrine even when the police who conducted the search didn’t know about the private search. I don’t think the private search doctrine can extend so far, and in this post I hope to explain why I think the decision is wrong. I also want to explain why a different Fourth Amendment rule, the “apparent authority” doctrine, very possibly applies to the facts of this case. The apparent authority doctrine was not litigated in the Oliver case, but it should have been. If I’m right about that, the Oliver decision may have reached a plausible result but did so using a rationale that is quite troubling and likely to cause more problems in the future. http://volokh.com/2011/01/09/fifth-circuit-permits-warrantless-government-searches-based-on-previous-private-search-not-known-to-government-when-search-occurred/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+volokh%2Fmainfeed+%28The+Volokh+Conspiracy%29&utm_content=Google+Reader

Twitter Shines a Spotlight on Secret F.B.I. Subpoenas (NYT, 9 Jan 2011) - The news that federal prosecutors have demanded that the microblogging site Twitter provide the account details of people connected to the WikiLeaks case, including its founder, Julian Assange, isn’t noteworthy because the government’s request was unusual or intrusive. It is noteworthy because it became public. Even as Web sites, social networking services and telephone companies amass more and more information about their users, the government — in the course of conducting inquiries — has been able to look through much of the information without the knowledge of the people being investigated. For the Twitter request, the government obtained a secret subpoena from a federal court. Twitter challenged the secrecy, not the subpoena itself, and won the right to inform the people whose records the government was seeking. WikiLeaks says it suspects that other large sites like Google and Facebook have received similar requests and simply went along with the government. http://www.nytimes.com/2011/01/10/business/media/10link.html Subpoena here: http://www.wired.com/images_blogs/threatlevel/2011/01/Subpoena-to-Twitter_WikiLeaks.pdf; Court order: http://www.wired.com/images_blogs/threatlevel/2011/01/Twitter_Unsealing_Order.pdf

- and -

Social Media and Law Enforcement: Who Gets What Data and When? (EFF, 20 Jan 2011) - This month, we were reminded how important it is that social media companies do what they can to protect the sensitive data they hold from the prying eyes of the government. As many news outlets have reported, the US Department of Justice recently obtained a court order for records from Twitter on several of its users related to the WikiLeaks disclosures. Instead of just turning over this information, Twitter “beta-tested a spine” and notified its users of the court order, thus giving them the opportunity to challenge it in court. We have been investigating how the government seeks information from social networking sites such as Twitter and how the sites respond to these requests in our ongoing social networking Freedom of Information Act (FOIA) request, filed with the help of UC Berkeley’s Samuelson Law, Technology & Public Policy Clinic. As part of our request to the Department of Justice and other federal agencies, we asked for copies of the guides the sites themselves send out to law enforcement explaining how agents can obtain information about a site’s users and what kinds of information are available. The information we got back enabled us to make an unprecedented comparison of these critical documents, as most of the information was not available publicly before now. We received copies of guides from 13 companies, including Facebook, MySpace, AOL, eBay, Ning, Tagged, Craigslist and others, and for some of the companies we received several versions of the guide. We have combed through the data in these guides and, with the Samuelson Clinic’s help, organized it into a comprehensive spreadsheet (in .xls and .pdf) that compares how the companies handle requests for user information such as contact information, photos, IP logs, friend networks, buying history, and private messages. And although we didn’t receive a copy of Twitter’s law enforcement guide, Twitter publishes some relevant information on its site, so we have included that in our spreadsheet for comparison. The guides we received, which were dated between 2005 and 2010, show that social networking sites have struggled to develop consistent, straightforward policies to govern how and when they will provide private user information to law enforcement agencies. The guides also show how those policies (and how the companies present their policies to law enforcement) have evolved over time. https://www.eff.org/deeplinks/2011/01/social-media-and-law-enforcement-who-gets-what

New MIT OpenCourseWare Initiative Aims to Improve Independent Online Learning (ReadWriteWeb, 12 Jan 2011) - MIT OpenCourseWare is launching five new courses today that mark a new model for one of the world’s premier open educational resources. These OCW Scholar courses are designed for use by independent learners, and like the other material made available through MIT OCW, are freely available for anyone to pursue. These aren’t distance learning classes - there is no instructor, no contact with MIT, no credit. But the courses are meant to be stand-alone offerings, not requiring any additional materials for learning. Although MIT OpenCourseWare may have become synonymous with the move to online education, it’s worth noting that the original expectation of the initiative was that by making the university’s course content freely and openly accessible, other educators would use the syllabi, lecture notes, tests, and assignments to design their other courses. It’s apparent, however, that the most of the people using the site are there as learners, not as teachers. The OCW Scholar courses are aimed at providing these learners with a more complete set of materials, so that those taking the courses needn’t turn elsewhere for other resources - such as journal articles - in order to complete the curriculum. These new OCW courses combine materials from multiple MIT courses, and the OCW team has worked with university faculty and teaching assistants to create new materials specifically designed for this project. The Physics 1 class, for example, contains a set of video lectures from MIT Physics Professor Walter Lewin, a set of course notes (replacing the need for a traditional textbook), a set of class slides, homework problems, homework help videos (in which Prof. Lewin helps learners through solving the problems), links to related materials, and an online study group at OpenStudy where you can connect with other independent learners. MIT OCW plans to publish 20 OCW Scholar courses over the next three years, all focused on introductory college-level science, math, engineering and other foundational subjects. This first set of courses that launch today include 8.01SC Physics I, 8.02SC Physics II, 18.01SC Calculus I, 18.02SC Calculus II and 3.091SC Introduction to Solid State Chemistry. http://rww.to/dRy4yb

How a Law Firm Website is Like a Cave or a Middle School Dance (Robert Ambrogi, 13 Jan 2011) - Think back to when our ancestors lived in caves and imagine yourself as your clan’s hunter-gatherer. Sit by the cave entrance all day and hope that a wooly mammoth might saunter by, and your clan will soon be clamoring for food. As a hunter-gatherer, you need to do just that – get out of your cave and hunt and gather. A law firm website is a lot like that cave. Sit idle by the entrance all day hoping that some wooly mammoth of a client will wander in, and your firm will soon be on a low-revenue diet. Like our cave-dwelling ancestors, if we want to eat, we can’t sit still and hope that food finds us. What that means, simply put, is that a law firm website is the beginning of your online marketing, but by no means the end. Think of it as your home base, a launching point, a point of reference and a sort of electronic brochure. It should provide the information that potential clients would want to know about you and your practice. Your job, as hunter-gatherer, is to get them interested enough that they will want to visit it. This is why it is critical to law firm marketing to engage in social media. Do not assume that potential clients will find you or your website. You need to get up off your virtual rock and go out to where they are. Engage with them. Let them get to know you. Contribute to their conversations. Maybe you will interest them enough that they will want to learn more about you. http://www.lawsitesblog.com/2011/01/how-a-law-firm-website-is-like-a-cave-or-a-middle-school-dance.html

Google Scholar Now Searches Cases by Jurisdiction and Court (Robert Ambrogi, 13 Jan 2011) - When I first wrote last year about the fact that Google Scholar had added case law research, I acknowledged it was still rough around the edges. Even so, I described it as “more than just a good start,” adding, “I expect there will be further refinements and enhancements to come.” A notable enhancement launched this week: Google Scholar added the ability to search court opinions and law journals by jurisdiction. Simply go to the advanced search page and, under “Collections” at the bottom of the page, pick your jurisdiction. The default choices are to search all courts within a federal circuit or within a state. But click the link that says, “Select specific courts to search,” and you open a menu that lets you pick individual courts. In fact, you can even “mix and match” specific courts from across multiple jurisdictions. Thus, you could, if you wanted, conduct a single search of just the U.S. District Court for Massachusetts and the Supreme Court of Rhode Island, or any other combination. Needless to say, this enhances the ability to use Google Scholar for more targeted research. Read more about this at the Google Scholar Blog. http://www.lawsitesblog.com/2011/01/google-scholar-now-searches-cases-by-jurisdiction-and-court.html

E-Discovery Sanctions Reach All-Time High for Litigants and Lawyers (ABA Journal, 13 Jan 2011) - E-discovery sanctions have reached an all-time high after three decades of litigation over alleged discovery wrongdoing, and lawyers are increasingly being targeted. A study by three King & Spalding lawyers identified 30 cases in which attorneys were sanctioned for e-discovery violations, seven of them in 2009, according to a summary on the Catalyst E-Discovery Blog. Overall, 46 sanctions were awarded in 2009, the last year covered by the study. Before 2009, the highest number of sanctions awarded against lawyers in a single year was five, in 2008 and 2007. “Sanction motions and sanction awards for e-discovery violations have been trending ever-upward for the last 10 years and have now reached historic highs,” according to the King & Spalding study, published in the Duke Law Journal (PDF). The King & Spalding lawyers analyzed 401 cases before 2010 in which sanctions were sought and found 230 sanctions awarded, including often severe sanctions of case dismissals, adverse jury instructions and significant money awards. Sanctions of more than $5 million were ordered in five cases, and sanctions of $1 million or more were awarded in four others. Defendants were sanctioned for e-discovery violations nearly three times more often than plaintiffs. When sanctions were awarded, the most common misconduct was failure to preserve electronic evidence, followed by failure to produce and delay in production. Courts rarely sanctioned lawyers for e-discovery violations without also sanctioning their clients. Usually the counsel sanctions were for a pattern of misconduct. Typically the sanction required the lawyers to pay attorney fees and costs, and the amount ranged from $500 to $500,000. http://www.abajournal.com/news/article/e-discovery_sanctions_reach_all-time_high_for_litigants_and_lawyers/

10 Reasons Law Blogs Are Preferable to Email Blasts and Newsletters (Kevin O’Keefe, 14 Jan 2011) - A marketing and communications director with a good law firm client of LexBlog’s asked this week to help her on the question of a law blog versus a email monthly blast. She’s working with a practice group looking to expand their marketing reach beyond a monthly email blast they had limited success with. The group liked the idea of a blog, but is now getting cold feet because of the “frequency” of publishing. The practice group is now thinking another monthly mass-email and purchasing mailing lists to extend its reach. The marketing and communications director believes a blog may be the better fit. She’s asked for my comments. Though email newsletters may still play a role in law firm marketing, here’s ten compelling reasons the practice group should consider a blog first: * * * http://bit.ly/f3TMg3 [Editor: This is a useful, actionable list.]

Court Rejects Claim of a First Amendment Right to Audio-Record Police Officers (Volokh Conspiracy, 14 Jan 2011) - From ACLU v. Alvarez (N.D. Jan. 10, 2011): “The American Civil Liberties Union of Illinois (“the ACLU”) sues Anita Alvarez, in her official capacity as Cook County State’s Attorney, seeking declaratory and injunctive relief with respect to the Illinois Eavesdropping Act, 720 ILCS 5/14 .... To assist in deterring and detecting police misconduct, the ACLU has developed a program to “audio record police officers, without the consent of the officers, when (a) the officers are performing their public duties, (b) the officers are in public places, (c) the officers are speaking at a volume audible to the unassisted human ear, and (d) the manner of recording is otherwise lawful.” ... [But t]he ACLU, Connell and Carter have not carried out the ACLU’s program due to fear of prosecution by the State’s Attorney under the Act. The Act provides that a first offense of nonconsensual eavesdropping is a Class 4 felony. “A person commits eavesdropping when he ... [k]nowingly and intentionally uses an eavesdropping device for the purpose of hearing or recording all or any part of any conversation ... unless he does so ... with the consent of all of the parties to such conversation, ...” The ACLU, Connell and Carter cite [nine] pending prosecutions of individuals under the Act .... The ACLU has cured the limited standing deficiencies addressed in the memorandum opinion dismissing the original complaint by sufficiently alleging a threat of prosecution. However, the credible, imminent threatened injury must implicate a constitutional right. The ACLU has not alleged a cognizable First Amendment injury. The ACLU cites neither Supreme Court nor Seventh Circuit authority that the First Amendment includes a right to audio record. Cf. Potts v. City of Lafayette, Indiana, 121 F.3d 1106, 1111 (7th Cir.1997) (“there is nothing in the Constitution which guarantees the right to record a public event” ‘). Amendment would therefore be futile.... The State’s Attorney argues that a “willing speaker” must exist to implicate the First Amendment’s right to free speech, Virginia State Bd. of Pharmacy v. Virginia Citizens Consumer Council, Inc., 425 U.S. 748, 756 (1976).... The ACLU intends to audio record police officers speaking with one another or police officers speaking with civilians. The ACLU’s program only implicates conversations with police officers. The ACLU does not intend to seek the consent of either police officers or civilians interacting with police officers. Police officers and civilians may be willing speakers with one another, but the ACLU does not allege this willingness of the speakers extends to the ACLU, an independent third party audio recording conversations without the consent of the participants. The ACLU has not met its burden of showing standing to assert a First Amendment right or injury....” http://volokh.com/2011/01/14/court-rejects-claim-of-a-first-amendment-right-to-audio-record-police-officers/

New Task for Phone: File Taxes (NYT, 15 Jan 2011) - Intuit, the company that makes TurboTax software, introduced an application on Friday that lets users automatically fill out the 1040EZ, the most basic of the I.R.S. personal tax forms. Filers simply photograph their W-2 and the app does much of the rest. Intuit’s SnapTax app, available for the iPhone and Android phones, relies on image-recognition technology to read salary and withholding information from the W-2. Users answer a few questions and review their return for accuracy before submitting it electronically by tapping a File Now button. Intuit charges $15 for each filing through the app, and it says that completing a return can take as little as 15 minutes. The app is intended for consumers who are increasingly using their mobile phones for everything, including shopping and banking. Taxes are just the next step, although it may take some getting used to for people who are accustomed to preparing their returns with a pencil and calculator or on a desktop computer. To use SnapTax, individuals must earn less than $80,000, while married couples must earn less than $100,000. The limit for individuals is lower than the $100,000 cap set by the Internal Revenue Service for those taxpayers using the 1040EZ but not filing by mobile phone. Intuit says it wants to make sure the app is not used by people who should be maximizing their savings by itemizing deductions, which is not allowed on the 1040EZ. Additionally, 1040EZ filers must have no dependents and be under age 65. Image-recognition technology, which for years was considered unreliable, is increasingly being put to use in online services. Technical advancements and the spread of smartphones have provided new opportunities for it. The technology is also being used to translate signs from Spanish into English, scan bar codes in stores and help solve Sudoku puzzles. http://www.nytimes.com/2011/01/15/technology/personaltech/15phone.html?_r=1&scp=1&sq=snaptax&st=cse

Appeals Court Finds Attorney-Client Privilege Doesn’t Cover Work Emails (ReadWriteBiz, 18 Jan 2011) - Attorney-client privilege does not extend to emails sent from a work email account, a California Court of Appeals has ruled. The unanimous decision was handed down by the Third Appellate District Court in Sacramento last week. The court’s decision means that a company has a right to access any email sent via a company computer - so use caution, perhaps, when using your work email account to consult with an attorney about suing your employer. These emails, writes the court, “were akin to consulting her lawyer in her employer’s conference room, in a loud voice, with the door open, so that any reasonable person would expect that their discussion of her complaints about her employer would be overheard .” There have been a number of important legal decisions recently about privacy and email. The New Jersey Supreme Court, for example, found that email sent from a personal web-based email account was private, provided that usage wasn’t covered by a company policy. But the U.S. Supreme Court found last summer that a police officer’s texts on department pagers were not private. Last week’s decision involved a secretary who sued her employer for wrongful termination. Her employer introduced some of her emails between she and her attorney in the court case, arguing that her attorney had urged her to file the suit. She had appealed the decision, arguing the emails should not have been admissible in court. The decision last week by the appeals court said that these emails were not confidential as her company had an explicit policy about company email, stating that it was for company business only and was not private. http://www.readwriteweb.com/biz/2011/01/appeals-court-finds-attorney-c.php

Appearing Virtually at a Store Near You (NYT, 18 Jan 2011) – Sexy may not be the first word that comes to mind to describe Barnes & Noble, but the sex appeal of the bookseller rose considerably this week among some readers of Esquire magazine. Beginning Tuesday, Brooklyn Decker, who was voted the sexiest woman alive by Esquire readers recently and is featured on the cover of its February issue, began appearing at the stores to pose for photographs with fans. Ms. Decker is not setting foot in the actual stores, but is appearing virtually through a novel use of GPS technology with broad marketing potential. Using an iPhone with a special app, visitors to the stores can select from among several poses by Ms. Decker, who then appears in the center of the viewfinder and is superimposed wherever the smartphone is pointed. Participants can pose beside her likeness, and some poses — like Ms. Decker blowing a kiss to her side — seem incomplete without an object of ardor in the frame. Users are prompted with the option of posting the images to Facebook or e-mailing them to friends. Ms. Decker will be able to be viewed in more than 700 Barnes & Noble locations. GoldRun, the fledgling New York agency that developed the application, can create GPS zones as large as 500 feet in diameter for such promotions, but in Barnes & Noble, the enabled area is only about 150 feet, pinpointing the magazine section — where, of course, Esquire is sold. Although it is not paying for the campaign, Barnes & Noble is helping to promote it through its Web site and through e-mail messages to customers. http://www.nytimes.com/2011/01/19/business/media/19adco.html?_r=1&scp=1&sq=goldrun&st=cse

Pennsylvania Court Specifies Test for Unmasking Anonymous Online Speakers (Perkins Coie, 19 Jan 2011) - Last week, the Superior Court of Pennsylvania vacated a trial court’s order directing the disclosure of the identities of six John Does who allegedly posted defamatory remarks on the internet and adopted a four-prong modified test for unmasking anonymous online speakers in the future. In Pilchesky v. Gatelli, 2001 Pa. Super. 3, Nos. 38 MDA 2009 and 39 MDA 2009 (Jan. 5. 2001), the appeals court reviewed the standards courts use to evaluate whether the identity of an anonymous online speaker should be disclosed, and concluded that “[t]here are four requirements which must be addressed [and which] are necessary to ensure the proper balance between a speaker’s right to remain anonymous and a defamation plaintiff’s right to seek redress.” These requirements, discussed further below, are (1) notification of the John Doe defendants, (2) sufficiency of evidence to establish a prima facie case for all elements of a defamation claim, (3) an affidavit from the plaintiff asserting that the information is sought in good faith and is necessary to secure relief, and (4) that the court has expressly balanced the defendant’s First Amendment rights against the strength of the plaintiff’s prima facie case. http://www.digestiblelaw.com/blog.aspx?entry=1170

Law Pivot Gets New Tool, More Funding to Crowdsource the Law (GigaOM, 19 Jan 2011) - Silicon Valley startup Law Pivot announced new funding and a new recommendation feature for its Quora-like Q&A service that aims to democratize access to quality legal advice. According to Nitin Gupta, Law Pivot co-founder and VP of business development, the new recommendation feature will add value to the service by helping companies target their queries to lawyers that best match their needs. Even before today’s news, though, Law Pivot has defied the odds by gaining traction in a notoriously technology-resistant profession. Law Pivot targets technology startups without large legal budgets by letting them pose questions via the web service, which are then answered by Law Pivot’s stable of qualified lawyers. It all sounds great, although Gupta himself — a former lawyer — acknowledges that the legal industry is typically among the last to adopt new technologies. An ongoing shift away from the traditional billable-hours model was accelerated by the economic downturn, however, and now Gupta says “[L]aw firms are realizing that they have to change their ways.” According to Gupta, Law Pivot has attracted participation from many skilled attorneys, including senior partners at large firms. I asked Gupta about a handful of ethical considerations — including conflict of interest and malpractice liability — that could negatively affect the quality of Law Pivot’s service, but he didn’t seem too concerned. He explained that attorneys understand the rules around concerns, and know that they need to take the appropriate steps to mitigate them, just like they would with in-person client consultations. Another issue that could arise revolves around payment for attorneys, as it’s possible they won’t prioritize Law Pivot questions when more-pressing or higher-paying work awaits with actual clients. http://gigaom.com/2011/01/19/law-pivot-continues-its-mission-to-crowdsource-the-law/ [Editor: interesting, but the ethical issues seem huge. Does anyone have experience here, or care to comment (email comments to me, or post them here: http://mirln.blogspot.com/]

Lawyer Acting as Expert Witness Violated Child Porn Law With Court Exhibits, 6th Circuit Rules (ABA Journal, 20 Jan 2011) - An Ohio lawyer serving as an expert witness appropriately became a defendant in criminal and civil cases when he created child pornography by digitally altering stock photo images of children engaged in innocent activities, a federal appeals court has ruled. A federal district court judge had said that attorney Dean Boland was shielded by Ohio state law from civil liability to the parents of the two children whose photos he used in court as an expert witness on behalf of his clients. But the Cincinnati-based 6th U.S. Circuit Court of Appeals overruled, holding yesterday that federal law contains no such expert witness exemption and instead expressly requires that any child pornography exhibits be closely supervised by the government, Courthouse News Service reports. Boland entered into a deferred prosecution agreement in 2007 with federal prosecutors in Cleveland and made a public apology in the Cleveland Bar Journal concerning his use of the exhibits as an expert witness in several criminal cases. For example, Boland took the head of one child from a photo, attached it to a photo of the body of a woman engaged in sexual activity, and then altered the woman’s body to look like a child’s body, according to CNS and the 6th Circuit’s written opinion (PDF). However, Boland was subsequently sued by the parents of the children whose images he altered for the exhibits, who can now proceed with their claims. http://www.abajournal.com/news/article/lawyer_acting_as_expert_witness_can_violate_child_porn_law/

U.S. Army Launches Social Media Handbook (Mashable, 20 Jan 2011) - The United States Army has officially announced the release of the 2011 Army Social Media Handbook, a document that’s meant to offer social media guidance for soldiers, personnel and families alike. The handbook is a follow-up to the 2010 Social Media Book, which was produced by the Army’s Online and Social Media Division. According to a post on Army Live, the official U.S. Army blog, the 2010 book “only scratched the surface of Army social media use,” which is why a new document was created. The new social media handbook now provides additional tips and best practices, along with information on operations security tips, branding information, checklists, regulations and frequently asked questions. http://mashable.com/2011/01/20/us-army-social-media-handbook/

EU, Stop Making Sense (Please) (Steptoe, 20 Jan 2011) - The European Union’s Article 29 Working Party last month issued an opinion that attempts to clarify which nations’ data protection laws apply to the processing of personal data. The opinion also recommends changes in the EU’s approach to jurisdictional issues as the Union considers how to improve its data protection framework. But the opinion does more to obfuscate the issues than to clarify them. It does illustrate, though, how complicated it is for ISPs, communications companies, websites, financial institutions, cloud computing services, and other entities that do business in the EU – whether they are “established” there or not – to figure out which nations’ laws they must comply with. http://www.steptoe.com/publications-7342.html Article 29 opinion here: http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/2010/wp179_en.pdf

**** RESOURCES ****
Best Practices in E-Discovery (KM World, January 2011) - As if designed to make life more difficult, the demands of e-discovery are altering the way we do our work, organize our workforce and maintain governance over the flood of email, social networking and traditional work documents and content. The driving forces behind e-discovery’s newfound stature are the amendments adopted to the Federal Rules of Civil Procedure (FRCP), which requires any electronically stored information to be available as part of a litigation. And it also, to make matters worse, instituted new processes for the way in which opposing counsels interact. In short, it messed everything up. In an effort to sort it all out, the current KMWorld White Paper, “Best Practices in E-Discovery,” addresses the many challenges posed by e-discovery, and offers the best advice on meeting them. http://www.kmworld.com/PDF/KMWhitePaper.aspx?IssueID=2557 (free registration required)

**** COMMENTARY ****
Security in 2020 (Bruce Schneier, 16 Dec 2010) - There’s really no such thing as security in the abstract. Security can only be defined in relation to something else. You’re secure from something or against something. In the next 10 years, the traditional definition of IT security— that it protects you from hackers, criminals, and other bad guys—­will undergo a radical shift. Instead of protecting you from the bad guys, it will increasingly protect businesses and their business models from you. Ten years ago, the big conceptual change in IT security was deperimeterization. A wordlike grouping of 18 letters with both a prefix and a suffix, it has to be the ugliest word our industry invented. The concept, though— the dissolution of the strict boundaries between the internal and external network—­was both real and important. There’s more deperimeterization today than there ever was. Customer and partner access, guest access, outsourced e-mail, VPNs; to the extent there is an organizational network boundary, it’s so full of holes that it’s sometimes easier to pretend it isn’t there. The most important change, though, is conceptual. We used to think of a network as a fortress, with the good guys on the inside and the bad guys on the outside, and walls and gates and guards to ensure that only the good guys got inside. Modern networks are more like cities, dynamic and complex entities with many different boundaries within them. The access, authorization, and trust relationships are even more complicated. Today, two other conceptual changes matter. The first is consumerization. Another ponderous invented word, it’s the idea that consumers get the cool new gadgets first, and demand to do their work on them. Employees already have their laptops configured just the way they like them, and they don’t want another one just for getting through the corporate VPN. They’re already reading their mail on their BlackBerrys or iPads. They already have a home computer, and it’s cooler than the standard issue IT department machine. Network administrators are increasingly losing control over clients. This trend will only increase. Consumer devices will become trendier, cheaper, and more integrated; and younger people are already used to using their own stuff on their school networks. It’s a recapitulation of the PC revolution. The centralized computer center concept was shaken by people buying PCs to run VisiCalc; now it’s iPads and Android smart phones. The second conceptual change comes from cloud computing: our increasing tendency to store our data elsewhere. Call it decentralization: our email, photos, books, music, and documents are stored somewhere, and accessible to us through our consumer devices. The younger you are, the more you expect to get your digital stuff on the closest screen available. This is an important trend, because it signals the end of the hardware and operating system battles we’ve all lived with. Windows vs. Mac doesn’t matter when all you need is a web browser. Computers become temporary; user backup becomes irrelevant. It’s all out there somewhere— and users are increasingly losing control over their data. http://www.schneier.com/blog/archives/2010/12/security_in_202.html [Editor: Article continues, and is worth reading; discusses coming “deconcentration”, “decustomerization”, and “depersonalization”.]

**** FUN ****
Texting Girl Falls Into Fountain, Microsoft Smiles? (CNET, 18 Jan 2011) - Some events make us stop and think. Then there are the events that make us stop, think, laugh, and propagate until we can’t think of anyone else to send them to. This, surely, is one of those events. The video shows a girl wandering around a mall, busily texting on her cell phone. And then, well, she falls into the mall fountain. http://news.cnet.com/8301-17852_3-20028751-71.html?tag=cnetRiver (video at: http://www.youtube.com/watch?v=mg11glsBW4Y&feature=player_embedded) She’s reportedly thinking of suing the mall: http://abcnews.go.com/US/fountain-falling-texter-cathy-cruz-marrero-dont-text/story?id=12685189

**** LOOKING BACK - MIRLN TEN YEARS AGO ****
AT&T Commercials From 1993 Eerily Comes True (Techland, 3 Jan 2011) - Happy New Year! While most of you are making resolutions and predicting what’s going to happen, Buzzfeed has uncovered this gem from 1993 about the future of technology according to AT&T. See if any of these “ideas” have become reality. The company said, “You will.” And, we did. http://techland.time.com/2011/01/03/att-commercials-from-1993-eerily-comes-true/

- and -

WARREN BUFFETT WARNS ON NEWSPAPERS VS. THE NET Investment guru Warren Buffett predicts hard times for the newspaper industry, warning that the Internet presents a major challenge to printed news publishers. Buffett says although he still reads newspapers, he often finds himself turning to his computer for news, and he suspects others do, too. Often, he says, he can get the next morning’s news stories from the New York Times or Boston Globe Web sites for free. “That cannot be a good thing for newspapers. It’s not a good idea to be charging a lot of money
for something you can get for free.” More significant than the loss of subscription dollars, however, is the siphoning of advertising revenues, says Buffett. “The idea that chopping down trees, running through million-dollar presses... is going to be competitive with some little click on a computer” is nonsense. (AP/Washington Post 29 Apr 2001) http://washingtonpost.com/wp-dyn/business/latestap/A20435-2001Apr29.html

**** NOTES ****
MIRLN (Misc. IT Related Legal News) is a free e-newsletter published every three weeks. You can subscribe to the MIRLN distribution list by sending email to Vince Polley (mailto:vpolley@knowconnect.com?subject=MIRLN) with the word “MIRLN” in the subject line. Unsubscribe by sending email to Vince with the words “MIRLN REMOVAL” in the subject line.

Recent MIRLN issues are archived at www.knowconnect.com/mirln. Get supplemental information through Twitter: http://twitter.com/vpolley)

SOURCES (inter alia):
1. The Filter, a publication of the Berkman Center for Internet & Society at Harvard Law School, http://cyber.law.harvard.edu
2. InsideHigherEd - http://www.insidehighered.com/
3. SANS Newsbites, sans@sans.org
4. NewsScan and Innovation, http://www.newsscan.com
5. BNA’s Internet Law News, http://ecommercecenter.bna.com
7. McGuire Wood’s Technology & Business Articles of Note
8. Steptoe & Johnson’s E-Commerce Law Week
9. Eric Goldman’s Technology and Marketing Law Blog, http://blog.ericgoldman.org/
10. Law.com
11. Readers’ submissions, and the editor’s discoveries.

This work is licensed under the Creative Commons Attribution-Share Alike 3.0 United States License. To view a copy of this license, visit or send a letter to Creative Commons, 543 Howard Street, 5th Floor, San Francisco, California, 94105, USA.

No comments: