Saturday, April 16, 2011

MIRLN --- 27 March – 16 April 2011 (v14.05)


MIRLN --- 27 March – 16 April 2011 (v14.05) --- by Vince Polley and KnowConnect PLLC (supplemented by related Tweets: http://twitter.com/vpolley #mirln)

**** MIRLN PODCASTS ****
The MIRLN podcasts now are on iTunes -- http://itunes.apple.com/us/podcast/mirln/id424352330 or search for “MIRLN”. Or, you can find them at http://www.knowconnect.com/mirln/podcast/, and an RSS feed is available.

·      Enabling Distributed Security in Cyberspace
·      Long-Form Journalism Finds a Home
·      Companies Pick and Choose Which Data Breaches to Report
·      Public Records And Court Dockets - Portal To The World – Courtport
·      Why the ABA Survey Gets it Wrong on Blogs
·      Taming Information Technology Risk: A New Framework for Boards of Directors
·      FBI Wants Public Help Solving Encrypted Notes From Murder Mystery
·      Is Righthaven Harming the News Industry?
·      Court Rules That Instant Message Conversation Modified the Terms of a Written Contract
·      NSA to Investigate NASDAQ Hack
·      Ninth Circuit Decides Cotterman Case, Reversing District Court on Laptop Seizure at the Border
·      Amazon Strong-Arms a Third-Party Kindle Service
·      App Called “Creepy” Pinpoints People’s Location Based On Their Social Networking Activity
·      Federal Courts Discuss Smartphone Policies
·      Online Applications Too Risky? One Firm Takes the Plunge
·      New Yorkers Hurt All Over
·      French High Court Upholds Company’s Review of Employees’ Email
o   Should Companies Restrict Web Access For Employees? Maybe a Little.
·      How Can a Law Firm Touting E-Discovery Expertise Screw Up a Litigation Hold?
·      The Cronon Case: Part II
·      Cloud Computing and Personal Data, Round Two
·      Major Law Firms Fall Victim to Cyber Attack
o   Law Firms Under Siege
o   Law Firm Loses $78K in Massive Malware Scheme That Was Disabled by Feds
·      2010: A Record Year for Domain Name Dispute Arbitrations
·      NLRB to Press Reuters Over Reaction to Twitter Post
·      Attack Sheds Light on Internet Security Holes
·      Feds Defend Twitter Dragnet On WikiLeaks Supporters
·      Announcing DoctoredReviews.com, a Website Against Doctors’ Efforts to Squelch Online Patient Reviews
·      Twitter In the Courtroom
·      “I’m from the NSA, and We Don’t Get Out Much”

NEWS | PODCASTS | RESOURCES | DIFFERENT | LOOKING BACK | NOTES

Enabling Distributed Security in Cyberspace (DHS, 23 March 2011) – Summary: This paper was prepared under the direction of Philip Reitinger, Deputy Under Secretary for the National Protection and Programs Directorate (NPPD), U.S. Department of Homeland Security, with support from the NPPD Cyber+Strategy Staff, the federally funded Homeland Security Systems Engineering and Development Institute (HS SEDI), and the NPPD Office of Cybersecurity and Communications (CS&C). In 2010, NPPD sponsored a government workshop to discuss a draft of this paper. Recommendations from that workshop have been incorporated. This paper explores a future – a “healthy cyber ecosystem” – where cyber devices collaborate in nearreal time in their own defense. In this future, cyber devices have innate capabilities that enable them to work together to anticipate and prevent cyber attacks, limit the spread of attacks across participating devices, minimize the consequences of attacks, and recover to a trusted state. This paper presents three building blocks as foundational for a healthy cyber ecosystem: automation, interoperability, and authentication. The paper then considers how these building blocks contribute to ecosystem maturity and explores incentives for creating such a system. It concludes with thoughts on the way ahead. The envisioned endstate is focused specifically on capabilities that can be achieved in the near and midterm by utilizing standardsbased software and information to strengthen selfdefense through automated collective action. This paper is meant to provoke discussion and further exploration of the topic. http://www.dhs.gov/xlibrary/assets/nppd-cyber-ecosystem-white-paper-03-23-2011.pdf

Long-Form Journalism Finds a Home (NYT, 27 March 2011) - In 2009, Evan Ratliff, a freelance writer for Wired, and Nicholas Thompson, a senior editor there, had just concluded a particularly satisfying article in which Mr. Ratliff tried to drop off the grid for a month and obscure his whereabouts in the digital age, while Wired magazine offered $5,000 to the person who could find him. It was a hit. But it was also the kind of deeply reported journalism that was going the way of the fax machine. “In the digital realm, there is infinite space, but somehow this hasn’t resulted in a flowering of long-form content,” Mr. Ratliff said. He had long considered building a Web site that would be more hospitable to long articles, but had also been spending a fair amount of time on his subway commute reading those pieces on his iPhone. The men called Jefferson Rabb, a programmer and Web designer known for building remarkable sites for books. In bars up and down Atlantic Avenue in Brooklyn, the three talked about whether there was a way to use these devices to make the Web a friend, not an enemy, of the articles they liked to work on and read. And, in what may be the first tangible result of journalists gathered in a bar to complain about the state of reading, they did something beyond ordering another round. The result is The Atavist, a tiny curio of a business that looks for new ways to present long-form content for the digital age. All the richness of the Web — links to more information, videos, casts of characters — is right there in an app displaying an article, but with a swipe of the finger, the presentation reverts to clean text that can be scrolled by merely tilting the device. “We wanted to build something that people would pay for,” said Mr. Thompson, who has since switched to being a senior editor of The New Yorker and has had to pull back to consulting for the project. “The Web is good at creating short and snappy bits of information, but not so much when it comes to long-form, edited, fact-and-spell-checked work.” Readers who buy an article from The Atavist and read it on an iPad — there are also less media-rich versions for the Kindle and the Nook — could begin reading the piece at home and then when driving to work, toggle to an audio version. In each item, there is a timeline navigation that seems natural and simple, and a place for comments that mimics the notes that people put in the margins of complicated, interesting pieces. Since opening for business at the end of January, The Atavist has published three long pieces that are native to the tablet in concept and execution, and it has had over 40,000 downloads of its app. Writers are paid a fee to cover reporting expenses and then split revenue with The Atavist. For the time being, an article costs $2.99 for the iPad and $1.99 for the Kindle or Nook. http://www.nytimes.com/2011/03/28/business/media/28carr.html?_r=1&ref=business [Editor: I’ve tried this, and think the package/tools are quite good, but the writing lacks.]

Companies Pick and Choose Which Data Breaches to Report (Network World, 28 March 2011) - One in 7 information technology companies have not reported data breaches or losses to outside government agencies, authorities or stockholders. In addition, only 3 out of 10 said they report all data breaches and losses suffered related to intellectual property, while 1 in 10 organizations will only report data breaches and losses that they are legally obliged to report, and no more. Six in 10 said they currently “pick and choose” the breaches and losses of sensitive data they decide to report, “depending on how they feel about them.” Those were some of the key findings from a McAfee and Science Applications International Corp. (SAIC) survey that queried 1,000 technology managers in the U.S., United Kingdom, Japan, China, India, Brazil and the Middle East on questions about intellectual property and security. The report, entitled “Underground Economies: Intellectual Capital and Sensitive Corporate Data Now the Latest Cybercrime Currency,” said the main reasons for not disclosing data breaches are fear of media coverage, damage to the brand and shareholder value. “The admission of a significant vulnerability could flag other attackers so very few companies are willing to be public about intellectual capital losses,” the report says. http://www.networkworld.com/news/2011/032811-mcafee-underground.html?source=NWWNLE_nlt_daily_pm_2011-03-28&elq_mid=13313&elq_cid=996107

Public Records And Court Dockets - Portal To The World – Courtport (FutureLawyer, 28 March 2010) - Public records, court dockets - Free Trial - Court port. I am on a legal research and court records research roll right now. Yesterday, I showed you how to research the law cheaply and efficiently, without a subscription to an expensive legal research service. (You know who they are). Today, we shift focus to over 10,000 court records databases, including full docket searching in the entire Federal case database. Criminal records searches, records in all State, Federal, State, County, and Municipal databases. Licensing and disciplinary records for every kind of professional, and detailed records about just about anyone. For $10 a month, the lawyer can know anything that is material to his client, witness, opponent, or do complete legal research for a fraction of the cost of more expensive systems. http://futurelawyer.typepad.com/futurelawyer/2011/03/public-records-and-court-dockets-portal-to-the-world-courtport.html

Why the ABA Survey Gets it Wrong on Blogs (Robert Ambrogi, 29 March 2011) - Let me ask you a question: Where are you more likely to buy a car, at a Superbowl commercial or at your local auto dealer? Given that most people would say auto dealer, it follows that Superbowl commercials must not be effective at selling cars, right? Of course not. The question, as phrased, makes no sense. You can’t buy a car from a TV commercial. Do Superbowl commercials help sell cars? I don’t know, but I do know that the above question doesn’t help me figure out the answer. Now consider the recent ABA survey that concluded that consumers do not rely on blogs to find a lawyer. If you’ve missed the debate about this, start with Kevin O’Keefe’s post, making sure to read the comments from Will Hornsby and Kevin’s replies, then read this post from Carolyn Elefant, and then this one from Scott Greenfield. Here is the question the ABA survey asked: “If you needed a lawyer for a personal legal matter, how likely would you be to use the following resources to find one?” Among the resources listed were websites, directories, social networking sites and blogs. Just fifteen percent said they were very or somewhat likely to use blogs. It follows, therefore, that blogs are ineffective as tools for client development, right? Of course not. The question makes no sense. No one would “use” a blog to find a lawyer, just as no one would “use” a Superbowl commercial to find a car. A blog is not a selection tool. It is not a directory. It is not somewhere anyone would go to “find” something. Kevin has it exactly right. “Rather than looking at blogs and social media as something new,” he writes, “look at blogs and social media as accelerators of relationships and your word of mouth reputation.” http://www.lawsitesblog.com/2011/03/why-the-aba-survey-gets-it-wrong-on-blogs.html

Taming Information Technology Risk: A New Framework for Boards of Directors (Oliver Wyman and NACD, March 2011) - A recent survey of 204 board members by Oliver Wyman’s Global Risk Center and the National Association of Corporate Directors (NACD) finds that nearly half (47%) of board members are dissatisfied with their boards’ ability to provide IT risk oversight. When you consider how much is riding on companies’ ability to use technology effectively, that figure is alarming. The world’s largest 500 companies lose more than $14 billion every year because of failed IT projects, according to an Oliver Wyman analysis. Therein lies an opportunity. Companies that receive valuable board direction and input on IT-related risk will have a significant competitive advantage over those that don’t. http://www.oliverwyman.com/ow/pdf_files/OW_EN_GRC_2011_PUBL_Taming_IT_Risk.pdf?elq_mid=13218&elq_cid=996107

FBI Wants Public Help Solving Encrypted Notes From Murder Mystery (Network World, 29 March 2011) - The FBI is seeking the public’s help in breaking the encrypted code found in two notes discovered on the body of a murdered man in 1999. The FBI says that officers in St. Louis, Missouri discovered the body of 41-year-old Ricky McCormick on June 30, 1999 in a field and the clues regarding the homicide were two encrypted notes found in the victim’s pants pockets. From the FBI: “The more than 30 lines of coded material use a maddening variety of letters, numbers, dashes, and parentheses. McCormick was a high school dropout, but he was able to read and write and was said to be ‘street smart.’ According to members of his family, McCormick had used such encrypted notes since he was a boy, but apparently no one in his family knows how to decipher the codes, and it’s unknown whether anyone besides McCormick could translate his secret language. Investigators believe the notes in McCormick’s pockets were written up to three days before his death.” http://www.networkworld.com/community/blog/fbi-wants-public-help-solving-encrypted-notes

Is Righthaven Harming the News Industry? (Citizen Media Law Project, 29 March 2011) - Righthaven, a copyright-enforcement entity that sues first and asks questions later, comes up a lot here at the CMLP, both on the blog and in the legal threats database. As a recent profile on CNN.com illustrates, Righthaven’s founder Steve Gibson thinks he is simply enforcing content owners’ rights within the digital landscape. In particular, Gibson thinks that fair use doesn’t cover “the kinds of reproduction that Righthaven is addressing”. Fortunately for bloggers, courts seem to be taking an increasingly critical look at Gibson’s views. Back in October, the federal court in Nevada threw out a case against a blogger who copied “only the first eight sentences of a thirty sentence news article” on fair use grounds. Just a few days ago on March 18, 2011, a different Nevada judge threw out yet another Righthaven case on fair use grounds. As Steve Green of the Las Vegas Sun reports, however, Righthaven LLC v. Center for Intercultural Organizing involved the re-posting of an entire news article. Of course, neither of these recent cases are binding legal precedent, and they may be overturned on appeal. The CMLP has written legal guides about using the works of others and fair use, which can be helpful in working through these issues. The tide may be turning against Righthaven. Indeed, as Green points out, it seems ironic that Righthaven may be undermining all newspapers’ case for copyright protection. Green’s analysis that Righthaven seems to have shot itself in the foot appears to be driving subsequent coverage, including analysis on websites from paid Content to Ars Technica. http://www.citmedialaw.org/blog/2011/righthaven-harming-news-industry

Court Rules That Instant Message Conversation Modified the Terms of a Written Contract (Goldman’s blog, 29 March 2011) - CX Digital Media, Inc. v. Smoking Everywhere, Inc., 09-62020-CIV-Altonga (S.D. Fl.; Mar. 23, 2011) - As contract cases go, this one is interesting. It’s more than interesting, it’s awesome! The court held that an instant message exchange effectively modified a written agreement which contained a “no-oral modification clause.” This resulted in a judgment in favor of a marketing agency against the seller of electronic cigarettes to the tune of $1,235,655 (along with fees, costs, and interest)! * * * It’s standard for contracts to restrict oral amendments. It’s also standard for business partners to “talk” using email, IM, text messages, Twitter @replies, comments to Facebook status reports, etc., etc. The default rules should be that all of these electronically-mediated communications qualify as writings. (But see John O’s post on an odd case from last summer). If you fear the legal effects of these communications, you could try to restrict contract amendments to terms printed on a piece of paper mutually signed in ink. But I think lawyers are fighting an uphill battle trying to denigrate the legal effect of these electronic communications. They are an integral part of the relationship, and there’s not much we as lawyers can do to change that. http://blog.ericgoldman.org/archives/2011/03/court_rules_tha.htm

NSA to Investigate NASDAQ Hack (Wired, 30 March 2011) - The National Security Agency has been called in to help investigate recent hack attacks against the company that runs the Nasdaq stock market, according to a news report. The agency’s precise role in the investigation hasn’t been disclosed, but its involvement suggests the October 2010 attacks may have been more severe than Nasdaq OMX Group has admitted, or it could have involved a nation state, according to sources who spoke with Bloomberg News. “By bringing in the NSA, that means they think they’re either dealing with a state-sponsored attack, or it’s an extraordinarily capable criminal organization,” Joel Brenner, former head of U.S. counterintelligence in the Bush and Obama administrations, told the publication. He added that the agency rarely gets involved in investigations of company breaches. Regarding the Nasdaq breach, in addition to the Secret Service, the FBI and the NSA, unidentified foreign intelligence agencies are also reportedly assisting in the probe. The Wall Street Journal reported in February that Nasdaq OMX Group had been repeatedly breached last year. Nasdaq later confirmed the report but insisted that computers involved in its trading platform were not compromised in the attacks. The company said the attacks were limited to a web application known as Directors Desk that allows board members of Nasdaq companies to hold online meetings and exchange confidential information — data that attackers would conceivably find useful to trade on. The Directors Desk, however, may not have been the target but simply an entry point for the hackers to gain further penetration into Nasdaq OMX’s network. According to Bloomberg News, investigators have acknowledged they still have no idea how far into the network the attack reached or what data the attackers may have stolen. http://www.wired.com/threatlevel/2011/03/nsa-investigates-nasdaq-hack/

Ninth Circuit Decides Cotterman Case, Reversing District Court on Laptop Seizure at the Border (Volokh Conspiracy, 30 March 2011) - Back in 2009, I blogged about United States v. Cotterman, a fascinating Fourth Amendment case from the District of Arizona involving a forensic search of a computer seized at the U.S./Mexico border. Ninth Circuit precedent holds that the government can search a computer at the border with no suspicion under the border search exception, just like it can search any other property. The question in Cotterman was whether the government could seize the computer, bring it to a forensic specialist 170 miles away, and have the forensic specialist search the computer there two days later. Is that still a border search? Or does the delay in time, or the change in location, mean that the border search exception doesn’t apply (or applies differently)? The District Court held that the delay in time and the moving of the computer required applying the ‘extended’ border search doctrine, which requires reasonable suspicion, instead of the traditional border search exception, which does not. As I noted here, the Government appealed but has not argued that the search was justified by reasonable suspicion. As a result, the case presents a pure legal question: Does the Fourth Amendment require reasonable suspicion in these circumstances, or is the seizure and subsequent search permitted without any cause? In a decision released this morning, United States v. Cotterman, a divided Ninth Circuit reversed and held that the seizure and search were permitted without cause. The majority opinion by Judge Tallman, joined by Judge Rawlinson, reasons that it is clear, under Ninth Circuit precedent, that the search would have been legal if it had occurred at the border without delay. The opinion reasons that Cotterman’s expectation of privacy is what matters, and that because Cotterman’s computer was taken to be searched at the border, Cotterman’s expectation of privacy is not impacted by where the computer was taken. The next question was how much delay is permitted. That is, for how long can the government hold a computer pursuant to the border search exception in order to search it? Because holding the computer was a seizure, the test was reasonableness: Specifically, whether the detention “was reasonably related in scope to the circumstances that justified the initial detention at the border.” In this case, it was: The Government proceeded quickly to bring the computer to an expert, the expert searched the computer pretty quickly, and worked through the weekend to get the search completed. Further, the fact that the computer was brought to the expert rather than the expert being brought to the computer was not only acceptable, but wise: “our common sense and experience inform us that the decision to transport the property to the laboratory, instead of transporting the laboratory to the property, resulted in a shorter deprivation.” http://volokh.com/2011/03/30/ninth-circuit-decides-cotterman-case-reversing-district-court-on-laptop-seizure-at-the-border/ http://www.ca9.uscourts.gov/datastore/opinions/2011/03/30/09-10139.pdf

Amazon Strong-Arms a Third-Party Kindle Service (Zittrain, 31 March 2011) - Amazon shut down Lendle, a popular Kindle service that allows users to lend their books to strangers, last week because it didn’t “serve the principal purpose of driving sales of products and services on the Amazon site.” Two days later, after customers tweeted their displeasure, Amazon informed Lendle of the specific feature that got the service blocked. That feature, Book Sync, scraped the Amazon site itself to determine which books in a user’s library were lendable (not all are). Lendle removed it and is now back up and running. Axing a company’s service to your platform without notice or an opportunity to address the issue is a severe sanction and may intimidate service providers to comply rather than publicly balking at your demands. Here, Lendle disabled the offending feature without a row. Then again, maybe the company knew all along that Book Sync violated Amazon’s policies. While Lendle could argue that Amazon shouldn’t restrict harmless features of third-party services, flagrantly violating those policies could lead Amazon to boot a service. http://futureoftheinternet.org/foi-topics-and-links-of-the-week-15

App Called “Creepy” Pinpoints People’s Location Based On Their Social Networking Activity (Boing Boing, 31 March 2011) - The creator of Creepy, Yiannis Kakavas, calls his application a “geolocation information aggregator.” It analyzes a person’s tweets, Facebook posts, and Flickr stream to generate a map of where that person is and where he or she goes. “You can enter a Twitter or Flickr username into the software’s interface, or use the in-built search utility to find users of interest. When you hit the ‘Geolocate Target’ button, Creepy goes off and uses the services’ APIs to download every photo or tweet they’ve ever published, analysing each for that critical piece of information: the user’s location at the time. While Twitter’s geolocation setting is optional, images shared on the service via sites like Twitpic and Yfrog are often taken on a smartphone - which, unbeknownst to the user, records the location information in the EXIF data of the image. Creepy finds these photos, downloads them, and extracts the location data. When the software finishes its run, it presents you with a map visualising every location that it found - and that’s when the hairs on the back of your neck go up. While the location of an individual tweet might not reveal much, visualising a user’s history on a map reveals clusters around their home, their workplace, and the areas they hang out.” http://www.boingboing.net/2011/03/31/app-called-creepy-pi.html

Federal Courts Discuss Smartphone Policies (CMLP, 1 April 2011) - The U.S. Judicial Conference, which helps set policy for federal circuit (appeals) and district (trial) courts, has issued a memo, first reported by Wired’s “Threat Level” blog, that is meant to help individual courts set policies on when and how smartphones and similar devices can be brought into and used in courthouses and in courtrooms. The memo outlines some of the issues that arise with smartphones and other electronic devices in courthouses, and informally surveys various federal courts’ existing policies regarding smartphones.

The survey found that 41 of the 94 district courts allow anyone to bring the devices into their courthouses, often with some restrictions on their use. Of these 41 courts, nearly a third prohibit the public from bringing the devices in the courtroom, while the remaining two-thirds require that devices be kept off or in silent mode without the judge’s permission. Forty-eight district courts ban devices, except for those possessed by judges, court personnel, and probation and pretrial officers, or with the express permission of a judge. Other courts ban only certain devices, such as devices that include cameras. In both types of situations, courts either check and store the devices or else simply bar individuals from entering with such a device. The memo also notes that many district courts have special policies allowing journalists to bring electronic devices into the courthouse, but also notes that only six district courts allow journalists to use these devices in courtrooms, which various restrictions. The memo notes that a consideration in adopting such a policy for journalists is “how to distinguish, if at all, between members of the traditional press and those who report solely through social media sites or other internet venues.” The memo lays out some of the arguments for and against allowing electronic devices in courthouses, including concerns about recording and broadcast of court proceedings (which the memo mistakenly states is barred in all federal district courts; more on that in this post); and the concern that “[t]hese common devices present security issues because some can be and have been converted for use as weapons, including explosives.” The Wired blog scoffs at this rationale. http://www.citmedialaw.org/blog/2011/federal-courts-discuss-smartphone-policies

Online Applications Too Risky? One Firm Takes the Plunge (ABA Journal, 1 April 2011) - Like anything new, cloud computing inspires both interest and caution in its users, and for the risk-averse legal business, even early adopters prefer to move a few applications online rather than commit entire operations to the ether. But then there’s Bradford & Barthel. Eric Hunter, director of knowledge management at the 12-office California law firm, is among the true believers. In the fall of 2009, his firm decided to move its e-mail, calendaring, document collaboration, intranets and extranets to the cloud via Google Apps for Business, and they’ve never looked back. Hunter cites “huge licensing cost savings,” Google’s relentless push for innovation and the service provider’s commitment to customer support as primary motivators for the switch, which involves a 24-month implementation period that is about halfway complete. But while the siren call of cloud computing is becoming ever more enticing, concerns about security and the loss of control over data have left much of the legal community wary of shifting computing to off-site service providers. “Think about it for a minute,” says Mike Lipps, a vice president and managing director for legal business software solutions for LexisNexis, which offers a number of cloud-based solutions for law firms. “I want you to take your most sensitive and personal data, and I want you to put it ‘out there.’ Out there on the Internet, in the cloud, in that place where scam artists rip off old ladies with wire transfers, where predators pose as kids in chat rooms, where people swap music for free until they get sued by the RIAA. “Put your data out there and I promise it will be safe, secure and there when you need it. And if you discontinue using my service, I’ll give it back to you nice and neat. What’s not to love about this concept?” http://www.abajournal.com/magazine/article/online_applications_too_risky_one_firm_takes_the_plunge?utm_source=maestro&utm_medium=email&utm_campaign=tech_monthly [Editor: Wow! Sounds like an enforceable promise to me, a very, very hard one to keep. Watch for LN to walk this back, fast.]

New Yorkers Hurt All Over (Steptoe, 2 April 2011) - ... at least when it comes to online copyright infringement. New York’s highest court has ruled in Penguin Group (USA) Inc. v. American Buddha that if a New York copyright owner’s work is uploaded on the Internet without authorization, an infringement suit may be brought in New York regardless of where the uploading occurred or whether anyone in New York downloaded the infringing material. This decision could greatly expand the jurisdiction of both state and federal courts in the Empire States over Internet piracy cases brought by New York copyright holders. http://www.steptoe.com/publications-7507.html

French High Court Upholds Company’s Review of Employees’ Email (Steptoe, 2 April 2011) - France’s highest court, the Cour de Cassation, has ruled in Securitas France v. M. X. that it was permissible for a company to fire an employee based in part on emails he had exchanged with another employee, with whom he had a personal relationship, in which the two employees referred to a supervisor in offensive terms. The court’s decision broadens a bit the scope of permissible monitoring by employers of their employees’ use of company networks. Companies must still exercise caution in reviewing employees’ email in Europe, since courts there are more prone than in the U.S. to regard employees’ emails as private in many situations. http://www.steptoe.com/publications-7507.html [Editor: this continues a slow move to employer-monitoring rights in France, begun nearly 15 years ago with a flat prohibition.]

- and -

Should Companies Restrict Web Access For Employees? Maybe a Little. (ReadWriteBiz, 6 April 2011) – Earlier today I was sitting in my office and, having crossed five tasks off the sticky note affixed to my laptop, checked in on Twitter, where amidst a slew other 140-character tidbits, lead New York Times tech blogger Nick Bilton had just shared a link to a rather interesting story in the New Yorker. The article, titled In Praise of Distraction, takes a look at the proliferation of Internet-fueled, at-the-office distractions and whether or not they pose a significant problem for businesses. Intuitively, yes, having employees spend all day on Facebook, YouTube and online shopping sites is bound to cut into productivity. But as the New Yorker article points out, some recent research suggests that restricting access to non-work-related content entirely can actually impede productivity. Additionally, as the article notes, restricting Web access “creates a tyrannical work environment” which can damage morale among employees who, let’s face it, are more empowered than ever thanks to the Internet and social media. Many of these employees, it’s worth remembering, are carrying around Internet-connected smart phones that operate outside the corporate firewall. Instead, some recommend a more measured approach in which employees are allotted pockets of time for browsing the Web, not unlike a coffee or smoking break. http://www.readwriteweb.com/biz/2011/04/should-companies-restrict-web-access-for-employees.php

How Can a Law Firm Touting E-Discovery Expertise Screw Up a Litigation Hold? (Ride the Lightning, 4 April 2011) - It seems that a prominent law firm in Detroit (Honigman, Miller, Schwartz and Cohn), which touts its e-discovery expertise on its “Services” page, utterly failed to institute a proper litigation hold when it was sued by a former executive assistant who had been discharged. The firm failed to institute a litigation hold after receiving an EEOC right to sue letter - and other facts suggest the firm was preparing for the lawsuit even earlier. The firm also failed to suspend the operation of an automated e-mail deletion program when the hold should have been instituted. It never surprises me when business clients fail to take the appropriate steps - often in ignorance of litigation holds and what they require. But seeing a law firm with supposed e-discovery expertise so thoroughly “get it wrong” is disturbing. Would the firm advise its clients to act as it apparently acted? I sure hope not. http://RideTheLightning.senseient.com/2011/04/how-can-a-law-firm-touting-e-discovery-expertise-screw-up-a-litigation-hold.html

The Cronon Case: Part II (InsideHigherEd, 4 April 2011) - “Scholars and scientists pursue knowledge by way of open intellectual exchange. Without a zone of privacy within which to conduct and protect their work, scholars would not be able to produce new knowledge or make life-enhancing discoveries. Lively, even heated and acrimonious debates over policy, campus and otherwise, as well as more narrowly defined disciplinary matters are essential elements of an intellectual environment and such debates are the very definition of the Wisconsin Idea.” Biddy Martin, Chancellor of the University of Wisconsin-Madison wrote this passage in an open message on academic freedom. This message comes in response to the Freedom of Information Act request for the emails of historian Professor William Cronon who holds an exalted position on that campus. On March 21 of this year, The New York Times published an op-ed piece by Professor Cronon on the current events on-going in Wisconsin politics. In particular, Professor Cronon criticized Governor Walker for a lack of transparency in the unfolding of those events. That concept, transparency, seems to be in political ascendency these days, being deployed by both parties and virtually every position in between. So it is either in keeping with that thread in American politics, or just pure irony, that Professor Cronon has become the subject of a state Freedom of Information Act request. The University of Wisconsin legal counsel, John C. Dowling, has honored that request. I recommend to any one interested in this case, and how legal counsel operates within institutions to protect our missions, the letter. It is a model of professionalism and honor. http://www.news.wisc.edu/19196 In short, it explains the process by which the institution went about complying with the request, and in so doing separated protected categories of mail from that which was released. Educational records, intellectual property, professional correspondence and personal mail remained outside the scope. I would have intellectually enjoyed the sections of the letter where Mr. Dowling parses terms such as “union” and “recall” were the underlying matter not so serious. That, my friends, is the law in action: A public statute that allows for the request, legal counsel’s response. Chancellor Martin’s message is institutional policy at its best. http://www.insidehighered.com/blogs/law_policy_and_it/the_cronon_case_part_ii [Editor: Bravo. This is the kind of thing that makes you proud to be a lawyer.]

Cloud Computing and Personal Data, Round Two (Media Law Prof Blog, 5 April 2011) - W. Kuan Hon, Christopher Millard, and Ian Walden, all of Queen Mary University School of Law, have published Who is Responsible for ‘Personal Data’ in Cloud Computing? The Cloud of Unknowing, Part 2. Here is the abstract: “In part one of this series, we considered what information is regulated as ‘personal data’ in the cloud. In this part two, we develop further the argument made in part one that it is not appropriate for infrastructure cloud providers, many of which are based outside Europe, to become subject arbitrarily to obligations under the EU Data Protection Directive due to choices made by their users.

EU data protection responsibilities and liabilities are imposed primarily on the ‘controller,’ who may employ ‘processors’ to process data for it. We suggest, as with the concept of ‘personal data,’ the binary nature of the controller/processor distinction is no longer tenable. In today’s environment of complex chains of actors, end to end accountability should replace the binary distinction. While cloud computing service providers are commonly considered processors or controllers, this paper further argues that many infrastructure cloud computing providers are not even ‘processors,’ but simply provide facilities and/or tools for use by the controller/cloud user. Infrastructure as a Service and Platform as a Service providers, and certain Software as a Service providers, who offer no more than utility infrastructure services, will often not know whether information stored or processed through their services is ‘personal data’ or not – hence, the ‘cloud of unknowing.’ Infrastructure cloud providers are qualitatively distinct from services such as social networking websites.” http://lawprofessors.typepad.com/media_law_prof_blog/2011/04/cloud-computing-and-personal-data-round-two.html

Major Law Firms Fall Victim to Cyber Attack (Globe & Mail, 5 April 2011) - Hackers have penetrated four major Bay Street law firms in the past seven months with highly sophisticated cyber attacks designed to destroy data or to steal sensitive documents relating to impending mergers and acquisitions. Daniel Tobok, president of Toronto-based Digital Wyzdom Inc., who investigated the attacks, would not name the firms. The attacks, which he said appeared to originate from computers in China, show that Canadian law firms are a target for hackers and potentially, state-sponsored cyber espionage. They follow similar attacks on governments and major corporations in recent years. “They were harvesting information,” Mr. Tobok said of the hackers who penetrated the computers of the four Toronto law firms. He said it was hard to say if any sensitive data actually went missing, but said the attacks were at least successful at getting inside the firms’ systems. “This was probably one of the most sophisticated attacks we have seen.” David Craig, national information security practice leader for PricewaterhouseCoopers Canada, said law firms are a natural target for hackers because they are storehouses of information of interest to everyone from organized crime to spouses in marital disputes. But he said law firms tend to be extra careful about confidential information. Large firms usually have sophisticated IT staff and policies in place to try to keep data secure. http://www.theglobeandmail.com/report-on-business/industry-news/the-law-page/major-law-firms-fall-victim-to-cyber-attacks/article1972226/

- and -

Law Firms Under Siege (DarkReading, 6 April 2011) - Law firms are increasingly getting hit by stealthy, low-profile targeted attacks going after intelligence on their corporate clients. Forensics investigators at Mandiant are working on twice as many targeted attacks by so-called advanced persistent threat (APT) adversaries against law firms than in years past; of the commercial victims Mandiant investigated during the past 18 months or so, 10 percent were law firms. And those are only the cases Mandiant sees: Its executives say many more go unnoticed by the victim organizations. Why are law firms joining the ranks of federal government agencies, defense contractors, and technology companies, like Google and RSA, as targets for APTs? “Law firms are a means to an end: a defense contractor or utility” that they represent, for example, says Steve Surdu, vice president of professional services at Mandiant. Surdu says while he worked on just a handful of cases where law firms were hit, he now sees a dozen to 15 at once. Attackers find law firms an attractive and relatively soft target for gathering the intelligence they want on a new weapons system or software, for example. Firms that represent clients in mergers and acquisitions, or civil litigation, are getting hit, including when their clients are involved with deals involving Chinese companies. Phishing attacks against law firms are nothing new -- the FBI warned firms back in November 2009 of a massive phishing attack aimed at firms. http://www.darkreading.com/advanced-threats/167901091/security/attacks-breaches/229401089/law-firms-under-siege.html

- and -

Law Firm Loses $78K in Massive Malware Scheme That Was Disabled by Feds (ABA Journal, 14 April 2011) - Federal authorities say they have disabled, with the help of Microsoft Corp., a massive “botnet” that is believed to have been operating for a decade and infecting nearly 2 million computers in the United States alone. Believed to have been run from Russia, it has allegedly been used to steal perhaps $100 million, including $78,421 from an unidentified South Carolina law firm’s bank account, according to Bloomberg. Relying on information from the Department of Justice, court filings, an internet security analyst and an unidentified agent of the FBI, the news service says the operation to shut down the so-called Coreflood botnet is the first time federal authorities have ever taken command of the network running such a scheme and sent instructions to victim computers to disable the malware. “There has been a real legal barrier to do this because essentially you are issuing instructions to someone else’s computer,” Alex Cox of the NetWitness Corp. cyber-security firm tells the news agency. “That is very, very significant.” http://www.abajournal.com/news/article/doj_says_massive_decade-old_botnet_helped_web_thieves_steal_millions/

2010: A Record Year for Domain Name Dispute Arbitrations (NLJ, 7 April 2011) - Arbitration cases involving allegations of cybersquatting, or improper use of trademarks in Internet domain-name registrations, hit record levels last year at the two organizations that handle most of the disputes. The National Arbitration Forum reported a 24% spike in new domain name dispute filings in 2010 to 2,177, up from 1,759 cases in 2009 and up 23% from the 1,770 cases filed in 2008. Much of the spike is driven by the “sheer volumetric increase in the number of domain names being registered,” said Kristine Dorrain, the forum’s Internet legal counsel. “The fact that the number of registrations continue to grow, means the number of disputes are going to continue to grow,” Dorrain said. The World Intellectual Property Organization reported 2,696 new case filings--a 28% spike over the 2,107 cases filed in 2009. Last year’s case filings also exceeded 2008 filings by 16%. That year’s 2,329 set the previous record for new WIPO cases. http://www.law.com/jsp/nlj/PubArticleNLJ.jsp?id=1202489436357

NLRB to Press Reuters Over Reaction to Twitter Post (NYT, 7 April 2011) - In what would be the first government case against an employer involving Twitter, the National Labor Relations Board told Thomson Reuters on Wednesday that it planned to file a civil complaint accusing the company of illegally reprimanding a reporter over a public Twitter posting she had sent criticizing management. The board asserts that the company’s Reuters news division violated the reporter’s right to discuss working conditions when her supervisor reprimanded her for posting a message on the Twitter service that said, “One way to make this the best place to work is to deal honestly with Guild members.” The author of the post, Deborah Zabarenko, the agency’s environmental reporter in Washington and the head of the Newspaper Guild at Reuters, sent that to a company Twitter address after a supervisor had invited employees to send postings about how to make Reuters the best place to work. “The next day the bureau chief called me at home,” Ms. Zabarenko said in an interview. “He told me that Reuters had a policy that we were not supposed to say something that would damage the reputation of Reuters News or Thomson Reuters. I felt kind of threatened. I thought it was some kind of intimidation.” http://www.nytimes.com/2011/04/07/business/media/07twitter.html?scp=1&sq=reuters%20twitter&st=cse

Attack Sheds Light on Internet Security Holes (NYT, 7 April 2011) - The Comodo Group, an Internet security company, has been attacked in the last month by a talkative and professed patriotic Iranian hacker who infiltrated several of the company’s partners and used them to threaten the security of myriad big-name Web sites. But the case is a problem for not only Comodo, which initially believed the attack was the work of the Iranian government. It has also cast a spotlight on the global system that supposedly secures communications and commerce on the Web. The encryption used by many Web sites to prevent eavesdropping on their interactions with visitors is not very secure. This technology is in use when Web addresses start with “https” (in which “s” stands for secure) and a closed lock icon appears on Web browsers. These sites rely on third-party organizations, like Comodo, to provide “certificates” that guarantee sites’ authenticity to Web browsers. But many security experts say the problems start with the proliferation of organizations permitted to issue certificates. Browser makers like Microsoft, Mozilla, Google and Apple have authorized a large and growing number of entities around the world — both private companies and government bodies — to create them. Many private “certificate authorities” have, in turn, worked with resellers and deputized other unknown companies to issue certificates in a “chain of trust” that now involves many hundreds of players, any of which may in fact be a weak link. The Electronic Frontier Foundation, an online civil liberties group, has explored the Internet in an attempt to map this nebulous system. As of December, 676 organizations were signing certificates, it found. Other security experts suspect that the scan missed many and that the number is much higher. Making matters worse, entities that issue certificates, though required to seek authorization from site owners, can technically issue certificates for any Web site. This means that governments that control certificate authorities and hackers who break into their systems can issue certificates for any site at will. http://www.nytimes.com/2011/04/07/technology/07hack.html?_r=1&scp=1&sq=an%20attack%20sheds%20light&st=cse

Feds Defend Twitter Dragnet On WikiLeaks Supporters (The Register, 9 April 2011) - Federal prosecutors on Friday defended their attempts to access the Twitter records of three WikiLeaks supporters, arguing their claims that the dragnet violates their constitutional rights should be rejected. In a 19-page filing in federal court, prosecutors said a ruling issued last month should be upheld despite the claims by WikiLeaks supporters Jacob Appelbaum, Birgitta Jónsdóttir, and Rop Gonggrijp that it violates their right to free speech. The filing came in an ongoing criminal investigation into Julian Assange, founder of the whistle-blower website. The March 11 order approved the government’s request for IP addresses the supporters used to access Twitter between November 2009 and last December and the email addresses they gave when registering with the micro-blogging website. US Magistrate Judge Theresa Buchanan said there were no constitutional violations because the information sought didn’t involve the content of any of the Twitter subscribers’ communications. Federal prosecutors agreed. “The subscribers’ claim that Twitter’s non-content records are subject to heightened protections under the First Amendment is baseless,” they wrote. The information demand was made in a confidential filing in December under the US Stored Communications Act. The Twitter users also argued that the secrecy of the motion violated their Fourth Amendment right protecting them from unreasonable searches and seizures. The government later agreed to make public most of the court documents filed in their demand, but withheld revealing one document that Buchanan said would reveal “sensitive nonpublic facts, including the identity of targets and witnesses.” Friday’s court filing is here. http://www.theregister.co.uk/2011/04/09/twitter_dragnet_wikileaks/ [Editor: the MIRLN podcast 14.02 addresses some of this.]

Announcing DoctoredReviews.com, a Website Against Doctors’ Efforts to Squelch Online Patient Reviews (Eric Goldman, 13 April 2011) - I’m pleased to announce the launch of DoctoredReviews.com, a website that addresses Medical Justice’s form contract that seeks to restrict patients’ online reviews of doctors by taking a prospective copyright assignment in the patients’ unwritten reviews. Medical Justice’s practices have bothered me for years, but I never had the chance to organize my thoughts fully. Fortunately, last August, Jason Schultz of the Samuelson Law, Technology & Public Policy Clinic suggested that I could work with him and two Berkeley law students on this issue. After evaluating our options, we decided to pursue an advocacy website. Should the website fail to curb the bad practices, we may need to reconsider more aggressive options. I have given some recent talks about Medical Justice and the misuse of copyright law to manage online reputations. See my talk slides and my related academic paper. I’d welcome the chance to discuss these issues in more detail. http://blog.ericgoldman.org/archives/2011/04/announcing_doct.htm

Twitter In the Courtroom (Media Law Prof Blog, 14 April 2011) - Adriana C. Cervantes, Hastings Law School, has published Will Twitter Be Following You in the Courtroom?: Why Reporters Should Be Allowed to Broadcast During Courtroom Proceedings, at 33 Hastings Communication & Entertainment Law Journal 133 (2010). Here is the abstract: “Thanks to micro-blogging and social networking tools, we no longer have to pick up a phone to call our friends and ask them what they are doing. Instead we turn to our laptop, BlackBerry, or iPhone to get instant information available to us through the Internet. Twitter is a key player in the Internet information exchange line-up. It has made its way into one of the oldest and most archaic forums: the courtroom. This article will discuss the history of prohibitions against broadcasting in the court, analyze the reasons why reporters should be allowed to use Twitter and other micro-blogging tools in the courtroom, and propose a solution for how their presence can be accounted for in order to maintain order in the court. This topic is significant because the digital era has presented new technology-in-the-court issues. People are entering courtrooms across America carrying electronic digital devices that can access blogging sites within seconds. The current law does not properly address whether reporters should be allowed to tweet, but this trend is becoming more prevalent. Twitter needs to be addressed with our current society in mind; a society wanting instant access to information. Legislatures and courts have both addressed the question of whether court proceedings should be broadcast differently. This note will examine whether broadcasting through websites like Twitter should be allowed during civil and criminal cases so that the public can have instant access to judicial proceedings.” http://lawprofessors.typepad.com/media_law_prof_blog/2011/04/twitter-in-the-courtroom.html

“I’m from the NSA, and We Don’t Get Out Much” (Lawfare, 14 April 2011) - It isn’t every day that a representative of the National Security Agency gives a public speech on the agency’s understanding of “Protecting Civil Liberties in a Cyber Age.” So I thought I would take good notes for Lawfare readers on Patrick Reynolds’ speech today at the Duke Conference. Reynolds is deputy general counsel at the NSA, and he gave a brief overview on the panel of the development of surveillance law. The panel included several other distinguished speakers, but I am focusing here only on Reynolds’ comments. It is a paraphrase, not an effort to transcribe. http://www.lawfareblog.com/2011/04/im-from-the-nsa-and-we-dont-get-out-much/ [Editor: pretty interesting, thorough, and useful historical discussion of applicable surveillance law, as against NSA’s evolving mission. Essentially serves as a counter-point to the Stanford podcast “Data Privacy - EPCA Revisited”, noted in MIRLN 14.04.]

**** NOTED PODCASTS ****
What Are the Ethics of Lawyer Review Sites Like Avvo? (ABA Journal, 4 April 2011; 20 minutes) - Some state attorney discipline agencies are heavily regulating how lawyers use rating sites for business development. But how do those rules jive with the less-stringent Communications Decency Act of 1996, which says users of such sites aren’t liable for content posted by others? ABA Journal podcast moderator Stephanie Francis Ward talks with guests to discuss, among other ethics issues, whether lawyers can/should face discipline for client-written “testimonials.” http://www.abajournal.com/news/article/podcast_monthly_episode_13/ [with Vincent Buzard, Eric Goldman, and Jamie Zysk Isani)

David Brooks: The Social Animal (TED Talk, March 2011) - Tapping into the findings of his latest book, NYTimes columnist David Brooks unpacks new insights into human nature from the cognitive sciences -- insights with massive implications for economics and politics as well as our own self-knowledge. In a talk full of humor, he shows how you can’t hope to understand humans as separate individuals making choices based on their conscious awareness. http://www.ted.com/talks/david_brooks_the_social_animal.html [Editor: what a disappointment; I used to esteem Brooks, but this is trite and sophomoric—not to mention mean-spirited in his discussion of yuppie-moms. He’s fallen such a long way – go watch instead Brooks at his best: “The Geography of American Politics”, delivered at the University of Arizona on 8 October 2003 here: http://www.law.arizona.edu/Events/McCormick/mccormick2004.cfm.]

**** RESOURCES ****
The Vault (FBI, April 2011) - The Vault is our new electronic reading room, containing more than 2,000 documents that have been scanned from paper into digital copies so you can read them in the comfort of your home or office. Included here are more than 25 new files that have been released to the public but never added to this website; dozens of records previously posted on our site but removed as requests diminished; and files from our previous electronic reading room. The Vault includes several new tools and resources for your convenience. http://vault.fbi.gov/ [Editor: pretty lame – 2000 documents? Almost sounds like an April Fools joke; one of the topic headings is “Unexplained Phenomenon”, which contains a one-page 1950 memo to the Director about 3 flying saucers recovered in New Mexico.]

**** DIFFERENT ****
Harvard Law School Exams, 1871 to 1998 (Volokh Conspiracy, 4 April 2011) - This is the time during the semester in which law professors often post old exams to help students prepare for upcoming finals. Harvard Law School has done one better: It has posted all of the law school exams at Harvard from 1871 to 1998. Pretty interesting to see how exams evolved over time. http://volokh.com/2011/04/04/harvard-law-school-exams-1871-to-1998/

**** LOOKING BACK – MIRLN 10 YEARS AGO ****
REBELS IN BLACK ROBES RECOIL AT SURVEILLANCE OF COMPUTERS (New York Times, 8 August 2001) -- A group of federal employees who believed that the monitoring of their office computers was a major violation of their privacy recently staged an insurrection, disabling the software used to check on them and suggesting that the monitoring was illegal and unethical. This was not just a random bunch of bureaucrats but a group of federal judges who are still engaged in a dispute with the office in Washington that administers the judicial branch and that had installed the software to detect downloading of music, streaming video and pornography. http://www.zdnet.com/zdnn/stories/news/0,4586,2803076,00.html?chkpt=zdnnp1tp02

TECHNOLOGY: TRAVEL WEB SITE FACES INTENSE SCRUTINY (June 3, 2001 08:17 p.m. EDT) - Officially launching on Monday, Orbitz is probably the only Internet start-up requiring employees to attend a four-hour seminar on antitrust law. The travel Web site, which is backed by $145 million in seed money from five major airlines, faces scrutiny from rivals, consumer advocates and federal authorities. The watchfulness is only going to intensify, said chief executive Jeffrey Katz, which is why “we’ve taken a lot of steps to make sure that we live within the bounds of the law.” Critics say Orbitz will reduce, if not eliminate, competition and pave the way for higher prices. Orbitz, which also lists vacation packages, hotel rooms and rental cars, denies the allegations. Katz said Orbitz will enhance competition by listing fares from all airlines without bias. http://www.nandotimes.com/technology/story/20212p-372327c.html

**** NOTES ****
MIRLN (Misc. IT Related Legal News) is a free e-newsletter published every three weeks by Vince Polley at KnowConnect PLLC. You can subscribe to the MIRLN distribution list by sending email to Vince Polley (mailto:vpolley@knowconnect.com?subject=MIRLN) with the word “MIRLN” in the subject line. Unsubscribe by sending email to Vince with the words “MIRLN REMOVAL” in the subject line.

Recent MIRLN issues are archived at www.knowconnect.com/mirln. Get supplemental information through Twitter: http://twitter.com/vpolley #mirln.

SOURCES (inter alia):
1. The Filter, a publication of the Berkman Center for Internet & Society at Harvard Law School, http://cyber.law.harvard.edu
2. InsideHigherEd - http://www.insidehighered.com/
3. SANS Newsbites, sans@sans.org
4. NewsScan and Innovation, http://www.newsscan.com
5. BNA’s Internet Law News, http://ecommercecenter.bna.com
7. McGuire Wood’s Technology & Business Articles of Note
8. Steptoe & Johnson’s E-Commerce Law Week
9. Eric Goldman’s Technology and Marketing Law Blog, http://blog.ericgoldman.org/
10. Law.com
11. Readers’ submissions, and the editor’s discoveries.

This work is licensed under the Creative Commons Attribution-Share Alike 3.0 United States License. To view a copy of this license, visit or send a letter to Creative Commons, 543 Howard Street, 5th Floor, San Francisco, California, 94105, USA.

Saturday, March 26, 2011

MIRLN --- 6-26 March 2011 (v14.04)

MIRLN --- 6-26 March 2011 (v14.04) --- by Vince Polley and KnowConnect PLLC
(supplemented by related Tweets: http://twitter.com/vpolley #mirln)

**** MIRLN PODCASTS ****
The MIRLN podcasts now are on iTunes -- http://itunes.apple.com/us/podcast/mirln/id424352330 or search for “MIRLN”. Or, you can find them at http://www.knowconnect.com/mirln/podcast/, and an RSS feed is available.

·      Dead.Ly URL’s and Authoritarian Social Network Tracking
·      Massive Intervention
·      Mass. AGO Web Communications Policies
·      Software Best Practices and Open Source Derivative Works
·      Michigan Town Split on Child Pornography Charges
·      New Report on Business Models for Scholarly Publishing
·      Cost of a Data Breach Climbs Higher
·      Hacking of DuPont, J&J, GE Were Undisclosed Google-Type Attacks
·      Judge: Debt Agency Can’t Contact or Search for Woman on Facebook
·      Important Ninth Circuit Ruling on Keyword Advertising
·      Researchers Show How a Car’s Electronics Can Be Taken Over Remotely
·      Google Again Sued Over Gmail Content Scanning
·      Law Enforcement Use of GPS Devices, and More from CRS
·      The “Adam Smith” Award for Innovation in Legal Service Delivery
·      Legal Industry Does Not Exist on ‘LinkedIn Today’
·      Radio Daze
·      Robots and the Law?
·      The Digital Pileup
·      As Law Student Readies Reverse Auction Site, Law Bloggers React to ‘eBay’ of Lawyering
·      What Auditors Are Saying About Compliance And Encryption
·      Web Host Liable For Contributory Infringement
·      New Site Offers Free Video ‘Nuggets’ of CLE
·      Righthaven Loses Second Fair Use Ruling Over Copyright Lawsuits
·      Crowdsourcing the Preservation of U.S. War Papers
·      Chin Decides Google Books Settlement Would ‘Go Too Far’
·      Spot Me If You Can: Uncovering Spoken Phrases In Encrypted VoIP Conversations
·      Cornell Library Rejects Non-Disclosures On Journal Pricing; Will Reveal All Prices
·      The Deplorable State of Law Firm Security

NEWS | PODCASTS | RESOURCES | FUN | LOOKING BACK | NOTES

Dead.Ly URL’s and Authoritarian Social Network Tracking (ZDnet, 27 Feb 2011) - The escalating unrest in North Africa and other parts of the world continues to make us wonder about the fundamental levers of control of the entire internet, and its uses for mass interactions and broadcasts. Bit.ly, the uniform resource locator (web site url address) shortener widely used by marketers and Twitter users relies on .ly, the Internet country code top-level domain (ccTLD) for Libya and it’s still far from clear who ultimately controls the off switch for those domains. According to Bit.ly they have five root nameservers for the .ly ccTLD: two in Oregon, one in the Netherlands and two in Libya. The Oregon and Netherlands servers are presumably reliant on obtaining updates from the .LY registry inside Libya. If they can’t, at some point they will consider the data they have stale/obsolete and stop providing information on the .LY domain. If the Libyan registry is cut off the internet the availability of .LY domains would be compromised somewhere between 0 and 28 days, with inconsistencies increasing as attempts to ‘phone home’ to the Libyan TLD servers got no response. http://www.zdnet.com/blog/collaboration/deadly-urls-and-authoritarian-social-network-tracking/1901

Massive Intervention (Der Spiegel, 28 Feb 2011; computer-translated version) - The businessman wanted to go home. Eight hours had taken the flight from India, but now delayed by the customs officials at the Munich Airport his return. A routine check, said. Personal, luggage, laptop. It did, but the conscience of the passengers was clear and there was nothing to declare. Only with his computer, the inspectors disappeared into the next room. Shortly after clear: everything is fine. Safe journey home. The little stopover at the airport “Franz Josef Strauss in mid-2009 has what it takes, in Berlin again ignite a debate on the powers of investigative authorities. It’s in the digital age is an issue that divides the black-yellow coalition in the federal government: when and how far the state may enter to combat crime in the computers of its citizens? For the merchant from Bavaria was under that control a little more baggage than the first. On his computer had the Bavarian State Criminal Police Office (LKA) a spyware hiding. The secret at the airport installed program secured by the police far-reaching access to the laptop. Once the device connects to the Internet, it sent every 30 seconds a photo of the screen to the investigators - some 60,000 in three months. http://translate.googleusercontent.com/translate_c?hl=en&ie=UTF-8&sl=auto&tl=en&u=http://www.spiegel.de/spiegel/0,1518,748110,00.html&prev=_t&rurl=translate.google.com&twu=1&usg=ALkJrhg1_RLZyagAwPEgnr94W2np3UjDUQ [Spotted by MIRLN reader Michael Fleming of Cray, Inc.]

Mass. AGO Web Communications Policies (Office of the Attorney General, March 2011) - The Attorney General’s Office uses several social media tools for outreach, education and information. These online tools help the office reach more residents with helpful consumer and safety information, and are intended to enhance, but not replace, the office’s interaction with constituents and the media. http://www.mass.gov/?pageID=cagoutilities&L=1&sid=Cago&U=Cago_web_communications [Editor: discussion of the AGO’s blog, Twitter, Flickr, YouTube, and e-newsletter communications vehicles]

Software Best Practices and Open Source Derivative Works (Citizen Media Law Project, 2 March 2011) - We received a request not long ago from one of the lawyers in our Online Media Legal Network who is looking for legal resources on a couple different issues tied to software development, particularly open source software development. And frankly, they’re the sorts of resources that we expect more and more lawyers will have need for. Thus, we’re reposting the requests here - along with my first stab at researching them - in the hopes of drumming up a bit of crowdsourcing to find the answers. The first request was for best practices, procedures, and policies relating to management of the software development function. Of particular concern is situations where developers are writing original code, licensing commercial code, and using open source code in developing software that is redistributed to nonprofits. What recommendations are out there for such best practices in complying with the various licenses? Next, the lawyer was wondering at what point the GNU General Public License (“GPL”) kicks in and “infects” other software. As the lawyer says, “Clearly derivative works are covered, but I am trying to get a better handle on how much linking, touching, combining, etc. gives rise to the viral requirement.” http://www.citmedialaw.org/blog/2011/software-best-practices-and-open-source-derivative-works [Editor: the story carries links to various relevant resources.]

Michigan Town Split on Child Pornography Charges (NYT, 7 March 2011) - People in this economically pressed town near Lake Michigan are divided into two camps: Those who think Evan Emory should pay hard for what he did, and those who think he should be let off easy. Mr. Emory, 21, an aspiring singer and songwriter, became a household name here last month when he edited a video to make it appear that elementary school children in a local classroom were listening to him sing a song with graphic sexual lyrics. He then showed the video in a nightclub and posted it on YouTube. Tony Tague, the Muskegon County prosecutor, stands firmly in the first camp: He charged Mr. Emory with manufacturing and distributing child pornography, a crime that carries a penalty of up to 20 years in prison and 25 years on the sex offender registry. Mr. Emory, who had gotten permission to sing songs like “Lunchlady Land” for the first graders, waited until the students left for the day and then recorded new, sexually explicit lyrics, miming gestures to accompany them. He then edited the video to make it seem as if the children were listening to the sexual lyrics and making faces in response. Mr. Emory’s supporters, including the almost 3,000 people who have “liked” the “Free Evan Emory” page on Facebook, say the charge is a vast overreaction to a prank gone astray, and a threat to free expression. Legal experts say the case — and the strong reactions it has drawn from places as far as Ireland and Australia— underscores the still evolving nature of the law when it comes to defining child pornography in the age of Facebook, YouTube and sexting. But with the rise of technology, said Carissa B. Hessick, an associate professor at the Sandra Day O’Connor College of Law at Arizona State and an expert on child pornography and criminal sentencing, “now we have situations where people are being arrested and charged” in connection with digitally altered images, where no child was abused. http://www.nytimes.com/2011/03/08/us/08muskegon.html?_r=1

New Report on Business Models for Scholarly Publishing (InsideHigherEd, 7 March 2011) - University presses need to consider new business models, and share information on successful new approaches, but no one model should be assumed to be correct for all, according to a report being released today by the Association of American University Presses. “[T]he simple product-sales models of the 20th century, devised when information was scarce and expensive, are clearly inappropriate for the 21st-century scholarly ecosystem. As the report details, new forms of openness, fees, subscriptions, products, and services are being combined to try to build sustainable business models to fund innovative digital scholarly publishing in diverse arenas,” the report says. The report stresses the role of university presses in vetting and improving scholarly writing, not just publishing it, and that emphasis turns up in several recommendations. “Open access is a principle to be embraced if publishing costs can be supported by the larger scholarly enterprise. University presses, and nonprofit publishers generally, should become fully engaged in these discussions,” the report says. Another recommendation: “Proposals and plans for new business models should explicitly address the potential impact of the new model on other parts of the press’s programs, as well as explicitly address the requirements, both operational and financial, for making the transition to a new model.” http://www.insidehighered.com/news/2011/03/07/qt#253189

Cost of a Data Breach Climbs Higher (Ponemon Institute, 8 March 2011) - Most privacy advocates and people in the data protection community believe that data breach costs will start coming down eventually because consumers will become somewhat immune to data breach news. The idea is that data breach notifications will become so commonplace that customers just won’t care anymore. But, that hasn’t happened yet. The latest U.S. Cost of a Data Breach report, which was just released today, shows that costs continue to rise. This year, they reached $214 per compromised record and averaged $7.2 million per data breach event. The fact is that individuals still care deeply about their personal information and they lose trust in companies that fail to protect it. It’s not only direct costs of a data breach, such as notification and legal defense costs that impact the bottom line for companies, but also indirect costs like lost customer business due to abnormal churn. This year’s study showed some very interesting results. In my view, there are a few standout trends.
·      Rapid response to data breach costs more. For the second year, we’ve seen companies that quickly respond to data breaches pay more than companies that take longer. This year, they paid 54 percent more. Fueling this rush to notify is compliance with regulations like HIPAA and the HITECH Act and the numerous state data breach notification laws. It seems that U.S. companies have this urgency to just get the notification process over with. Unfortunately, these companies are in such a hurry to do the right thing and notify victims that they end up over-notifying. This causes customers who are not actually at risk to lose trust in the company and abnormal customer churn increases. Companies that take a more surgical approach and spend the time on forensics to detect which customers are actually at risk and require notification, ultimately spend less on data breaches.
·      Malicious or criminal attacks are causing more breaches. This year malicious attacks were the root cause of 31 percent of the data breaches studied. This is up from 24 percent in 2009 and 12 percent in 2008. The significant jump in malicious attacks over the past two years is certainly indicative of the worsening threat environment. Malicious attacks come from both outside and inside the organization, ranging from data-stealing malware to social engineering. What’s more, these data breaches are the most expensive. Malicious attacks create more costs because they are harder to detect, the investigation is more involved and they are more difficult to contain and remediate. Another reason malicious attacks are so expensive is the criminal is out to monetize their work; they’re trying to profit off the breach. However, it’s not always the bad guys doing bad things that cause data breaches. It’s often your best employees making silly mistakes. Negligence is still the leading cause of data breaches at 41 percent.
http://www.ponemon.org/blog/post/cost-of-a-data-breach-climbs-higher [Editor: This is the definitive benchmark study of breach costs, conducted with the same methodology over several years. Well worth study.]

Hacking of DuPont, J&J, GE Were Undisclosed Google-Type Attacks (Bloomberg, 8 March 2011) - The FBI broke the news to executives at DuPont Co. late last year that hackers had cracked the company’s computer networks for the second time in 12 months, according to a confidential Dec. 9, 2010, e-mail discussing the investigation. About a year earlier, DuPont had been hit by the same China- based hackers who struck Google Inc. and unlike Google, DuPont kept the intrusion secret, internal e-mails from cyber-security firm HBGary Inc. show. As DuPont probed the incidents, executives concluded they were the target of a campaign of industrial spying, the e-mails show. The attacks on DuPont and on more than a dozen other companies are discussed in about 60,000 confidential e-mails that HBGary, hired by some of targeted businesses, said were stolen from it on Feb. 6 and posted on the Internet by a group of hacker-activists known as Anonymous. The companies attacked include Walt Disney Co., Sony Corp., Johnson & Johnson, and GE, the e-mails show. The incidents described in the stolen e-mails portray industrial espionage by hackers based in China, Russia and other countries. U.S. law enforcement agencies say the attacks have intensified in number and scope over the past two years. A Baker Hughes spokesman, Gary Flaharty, confirmed in an interview last month that his company’s networks were breached. Baker Hughes decided the intrusion was not a material event and so didn’t file a disclosure with U.S. regulators, he said. http://www.businessweek.com/news/2011-03-08/hacking-of-dupont-j-j-ge-were-undisclosed-google-type-attacks.html [Editor: on 5 Nov 2010 I tweeted from a DC symposium on law & national security: “FBI: every CEO in America knows that their company networks have been penetrated; often results in complete access.” There’s real, unreported, huge economic activity going on behind/under these penetrations.]

Judge: Debt Agency Can’t Contact or Search for Woman on Facebook [or other SM services] (AP, 9 March 2011) - A Florida judge has ordered a debt collection agency to not use Facebook or any other social media site in an attempt to locate a woman over a $362 unpaid car loan. Judge W. Douglas Baird also ordered Mark One Financial LLC of Jacksonville, Fla. to refrain from contacting the woman’s family or friends on Facebook. http://hosted2.ap.org/apdefault/f28cc4ac186b4036b3b4fa29caa6142b/Article_2011-03-09-Facebook%20Debt%20Collection/id-810548d5ef6d4030a3f8005e398943ef

Important Ninth Circuit Ruling on Keyword Advertising (Eric Goldman, 9 March 2011) - We’ve had surprisingly few appellate decisions involving keyword advertising generally, and almost none involving trademark owners’ lawsuits against keyword advertisers (as opposed to suing keyword sellers like search engines). On that basis alone, this ruling is important. The case is also remarkable because the opinion, written by highly regarded Judge Wardlaw, gets so many things right. Perhaps that sounds like damning with faint praise, but the reality is that the Ninth Circuit’s Internet trademark law has become horribly tortured due to deeply flawed opinions like the 1999 Brookfield case. This opinion deftly cuts through the accumulated doctrinal cruft and lays a nice foundation for future Internet trademark jurisprudence. The only sour note is that the opinion makes some unnecessary and empirically shaky “presumptions”--exactly the kind of unfortunate appellate court fact-finding that got the Ninth Circuit into trouble into the first place. Still, given how this opinion could have turned out, I still give this opinion very high marks. * * * I am often asked by other Internet Law professors for a single keyword advertising case they should consider teaching. Until now, I haven’t had a good answer. I’ve taught several keyword ad cases over the years. The last two years I’ve taught the Hearts on Fire case, which has been pretty good. Other folks have taught the Second Circuit’s Rescuecom case, a theoretically interesting case but a lousy teaching case. In my opinion, this ruling is clearly the best keyword advertising teaching case now available. Unless something better comes along, I’ll be substituting this case for the Hearts on Fire case in my Internet Law reader. Assuming many of my colleagues make the same choice, I expect this opinion will be an instant classic. http://blog.ericgoldman.org/archives/2011/03/important_ninth.htm

Researchers Show How a Car’s Electronics Can Be Taken Over Remotely (NYT, 10 March 2011) - With a modest amount of expertise, computer hackers could gain remote access to someone’s car — just as they do to people’s personal computers — and take over the vehicle’s basic functions, including control of its engine, according to a report by computer scientists from the University of California, San Diego and the University of Washington. Although no such takeovers have been reported in the real world, the scientists were able to do exactly this in an experiment conducted on a car they bought for the purpose of trying to hack it. Their report, delivered last Friday to the National Academy of Sciences’ Transportation Research Board, described how such unauthorized intrusions could theoretically take place. Because many of today’s cars contain cellular connections and Bluetooth wireless technology, it is possible for a hacker, working from a remote location, to take control of various features — like the car locks and brakes — as well as to track the vehicle’s location, eavesdrop on its cabin and steal vehicle data, the researchers said. They described a range of potential compromises of car security and safety. The new report is a follow-on to similar research these experts conducted last year, which showed that cars were increasingly indistinguishable from Internet-connected computers in terms of vulnerability to outside intrusion and control. That project tried to show that the internal networks used to control systems in today’s cars are not secure in the face of a potential attacker who has physical access to the vehicle. http://www.nytimes.com/2011/03/10/business/10hack.html?_r=1&ref=business

Google Again Sued Over Gmail Content Scanning (Information Week, 10 March 2011) - Attorneys representing former Gmail user Kelly Michaels of Smith County, Texas, have sued Google, claiming that its Gmail service violates users’ privacy by scanning e-mail messages to serve relevant ads. This is not the first time Google has faced such a suit. Another Texas resident, Keith Dunbar, made similar claims in November, 2010. It’s an issue Google has been dealing with since Gmail was introduced in 2004. At Google’s request, the Dunbar suit has been sealed. However, in a reply filed prior to the sealing of the case, Google’s attorneys provide highlighted terms of service and the company’s privacy policy as exhibits to show that users are informed about how Gmail operates. Michaels’s complaint takes the novel approach of arguing that while Google asks users to accept its terms of service, the company doesn’t require that users actually understand what they’re agreeing to. Such comprehension is all but impossible, the complaint suggests, because terms of service documents are difficult to read, if they’re read at all. The complaint bemoans how users who wish to read Google’s Terms of Service have to scroll through a small text box with something like 92 paragraphs or visit a 15-page print-friendly version. Then there’s a separate Program Policy and Privacy Policy, each on different Web pages, and the Privacy Policy includes some 55 external links. It’s widely known that people don’t read lengthy documents online, particularly dry legalese. There’s even Internet shorthand for the phenomenon: “TL; DR,” which stands for “too long; didn’t read.” Sadly for the plaintiff, there’s no legal recognition of “TL; DR,” even if companies like Google and Facebook recognize the problem. Both companies have acknowledged how difficult it is to read and understand lengthy privacy and terms of service documents, and have tried to make them less impenetrable. http://www.informationweek.com/news/security/privacy/showArticle.jhtml?articleID=229300677&subSection=Security [TMI?]

Law Enforcement Use of GPS Devices, and More from CRS (FAS, 10 March 2011) - When law enforcement agencies use a Global Positioning System device to track the motor vehicle of a potential suspect, is that a “search” that is subject to constitutional protections under the Fourth Amendment? Or is it comparable to visual inspection of public information that enjoys no such protection? The Supreme Court has not ruled on the subject, and lower courts have issued a range of opinions in different cases, according to a new report (pdf) from the Congressional Research Service that carefully delineated the issues. “Depending on how one reads the courts’ decisions, one could conclude that there is a split in the courts regarding whether law enforcement must first obtain a warrant before using a GPS device. Conversely, one could also conclude that the courts’ decisions are reconcilable and that the outcomes of the cases are fact-sensitive.” http://www.fas.org/blog/secrecy/2011/03/law_gps.html

The “Adam Smith” Award for Innovation in Legal Service Delivery (AdamSmithEsq, 10 March 2011) - A couple of weeks ago I learned that the legal department of Kraft Foods issued its “Adam Smith” award, for innovation in the delivery of legal services, to Clifford Chance, and Kraft intends it to be an annual award. I was curious to learn more. The first thing I learned was that the award was not named for the publication you’re reading, but for the original Adam Smith himself. Officially, the award is the “Kraft Foods Free Market Award,” but internally it’s known as the Adam Smith Award, and that is the name by which it will henceforth be known here, and in all right-thinking circles. The award goes to “the firm that best demonstrates the principles of free market competition.” Marc Firestone, Kraft Foods Executive Vice President, Corporate & Legal Affairs and General Counsel, said the genesis of the award was finding a way to lower costs for legal work and in the process they discovered that returning to basic economic principles was the key. Kraft has about 120 lawyers around the globe but they lack robust electronic connections other than email. Clifford Chance, by contrast, has a robust internal communications system. “After three years of spinning our wheels,” [DGC] Gerd reported, Clifford Chance was able to help Kraft’s legal department get truly connected globally in very short order. This makes great sense to me: Integrated global legal services are the core competence of Clifford Chance, but nowhere on the top 100 list for Kraft, nor should they be. The innovation was establishing internal blogs and discussion boards at Kraft addressing specific subject matter areas. The basic insight came from Clifford Chance but was adapted by Kraft for its own corporate culture, as I read it, and this could be an example of the most robust kind of innovation-sharing between firms and clients that we could imagine. The thinking must go as follows:
·      Law firm has practice X (Knowledge Management as an expertise, in this case)
·      Which client could use if it worked in their corporate environment (turning law firm KM theories into blogs and discussion boards)
·      So that both client and law firm “win,” in the sense that the both learn something from each other.
What Kraft did, then, plain and simple, was to set up those blogs and discussion boards, even though they were something Clifford Chance had never looked at internally in terms of its own KM efforts. http://www.adamsmithesq.com/archives/2011/03/the-adam-smith-award-for-innovation-in-legal-service-delivery.html [Editor: fascinating role-reversal – here it’s the law firm leading and the client following, in a classic implementation of knowledge management. I’m especially surprised that it’s Kraft – back in the mid-1990s they had a forward-thinking “knowledge management” culture. For more on KM implementation, and discussion of its implications for “Enterprise 2.0” see materials at KnowConnect: http://www.knowconnect.com/know/cat/km_presentations.]

Legal Industry Does Not Exist on ‘LinkedIn Today’ (Law.com, 11 March 2011) - LinkedIn announced Thursday that it has launched “LinkedIn Today,” which some have described as an effort to become the “The Wall Street Journal of social news.” LinkedIn describes LinkedIn Today as a site that “delivers the day’s top news, tailored to you based on what your connections and industry peers are reading and sharing.” Unless, of course, you are a lawyer or in the legal profession, in which case you get absolutely nothing. Yes, despite lawyers’ pretty heavy use of LinkedIn as a social media tool, LinkedIn Today seems to forget that we even exist. As Bob Ambrogi similarly observed Thursday on his LawSites blog, LinkedIn Today offers a lengthy list of industries you can choose to tailor your reading, but law isn’t one of them. In addition, he notes, the site does not draw on any legal-news sources. “Given the apparent widespread use of LinkedIn among legal professionals of all kinds, it is surprising that this new service would skip right over the entire industry,” Ambrogi adds. http://legalblogwatch.typepad.com/legal_blog_watch/2011/03/legal-industry-does-not-exist-on-linkedin-today.html

Radio Daze (Tablet, 11 Feb 2011) - Last year, a young man called in to a radio station with a problem. He’d recently attended a bachelor party, he said, and a friend of the groom-to-be, clueless of the unwritten etiquette of maledom, brought his girlfriend along, derailing what was supposed to be a weekend of gambling, girls, and general debauchery. The caller told his story with passion and verve, and then asked the station’s listeners for their advice on how to treat his clueless pal. Or at least he would have, had this been a real conversation. The young man—who asked to remain nameless in order to protect his chances for future employment—was an actor, and the staged call an audition. A short while later, he received the following email: “Thank you for auditioning for Premiere On Call,” it said. “Your audition was great! We’d like to invite you to join our official roster of ‘ready-to-work’ actors.” The job, the email indicated, paid $40 an hour, with one hour guaranteed per day. But what exactly was the work? The question popped up during the audition and was explained, the actor said, clearly and simply: If he passed the audition, he would be invited periodically to call in to various talk shows and recite various scenarios that made for interesting radio. He would never be identified as an actor, and his scenarios would never be identified as fabricated—which they always were. Curious, the actor did some snooping and learned that Premiere On Call was a service offered by Premiere Radio Networks, the largest syndication company in the United States and a subsidiary of Clear Channel Communications, the entertainment and advertising giant. Premiere syndicates some of the more sterling names in radio, including Rush Limbaugh, Glenn Beck, and Sean Hannity. But a great radio show depends as much on great callers as it does on great hosts: Enter Premiere On Call. “Premiere On Call is our new custom caller service,” read the service’s website, which disappeared as this story was being reported (for a cached version of the site click here). “We supply voice talent to take/make your on-air calls, improvise your scenes or deliver your scripts. Using our simple online booking tool, specify the kind of voice you need, and we’ll get your the right person fast. Unless you request it, you won’t hear that same voice again for at least two months, ensuring the authenticity of your programming for avid listeners.” The actors hired by Premiere to provide the aforementioned voice talents sign confidentiality agreements and so would not go on the record. But their accounts leave little room for doubt. All of the actors I questioned reported receiving scripts, calling in to real shows, pretending to be real people. Frequently, one actor said, the calls were live, sometimes recorded in advance, but never presented on-air as anything but real. http://www.tabletmag.com/life-and-religion/58759/radio-daze/ Follow-up stories began to emerge in early March: http://www.opednews.com/articles/Limbaugh-Hannity-Parent-Co-by-Gustav-Wynn-110305-942.html?show=votes

Robots and the Law? (Volokh Conspiracy, 12 March 2011) - I want to ask a follow-up to Orin’s post below on Judge Friendly and Air Law. I’ve taken an increasing interest in robotics — partly just robotics for its own interest, but also as a law professor from the standpoint of robots and the law. It started, in my case, from spending time on battlefield robotics, but it has morphed into a larger interest in robotics and the law, and perhaps future law. So I read Orin’s post, and the comments, and wonder whether there is a “there” to robotics and the law. I don’t mean from the standpoint of teaching a course; I tend to resist that kind of course on pedagogical grounds. I mean from the standpoint of a lawyer looking down the road and trying to anticipate what might be future areas of practice. I agree with Jay’s comment to Orin’s post that we academics often tend to underestimate just how much particular specialization occurs in law practice on account of the particulars of statutes and regulation and the complicated factual circumstances of usage — we academics tend to dismiss the crucial details by saying, well, it’s all just tort or products liability, whereas from the practicing lawyer’s standpoint, the devil, and the practice, are in the details. E.g., I mentioned robots and the law to a sophisticated law and economics professor, and he said, tell me if I’m wrong, but is there anything to this other than regular old tort and products liability law? What’s different about robots? I don’t know that there is — but I do wonder if that answer isn’t doing precisely what Jay warns against, correctly in my view — professorial reductionism. Sure, it’s all just tort, but will that be true from the practice perspective? My question is this: if you assume, as I do, that robots will increasingly enter ordinary life, in ways that involve important things such as nursing care, and at least partly autonomous activities as well as gross locomotion and other physical activities, in ordinary and routine life ... what, if any, practice specialities in law are likely to emerge from that? Speculate on ways in which this area might or might not become a genuinely distinct branch of law — but without simply engaging in pro forma reductivism of the “it’s all just products liability!” kind. Of course this involves some speculation on the direction of technology and the social uses of robots, too. (ps. Let me head off now any comments related to the 3 Laws and all that. Love Asimov too, but let’s not go there here. I want to know what, if anything, might emerge as a practical law speciality in this area.) http://volokh.com/2011/03/12/robots-and-the-law/

The Digital Pileup (NYT Op-Ed, 13 March 2011) – Some facts of life are just plain counterintuitive. It can be too cold to snow. Heavy things float. Martinis have calories. Here’s another one with significantly greater import: Electronic information is tangible. The apps we use, the games on our phones, the messages we incessantly tap — all of it may seem to fly through the air and live in some cloud, but in truth, most of it lands with a thump in the earthly domain. Because electronic information seems invisible, we underestimate the resources it takes to keep it all alive. The data centers dotting the globe, colloquially known as “server farms,” are major power users with considerable carbon footprints. Such huge clusters of servers not only require power to run but must also be cooled. In the United States, it’s estimated that server farms, which house Internet, business and telecommunications systems and store the bulk of our data, consume close to 3 percent of our national power supply. Seventy percent of the digital universe is generated by individuals as we browse, share, and entertain ourselves. And the growth rate of this digital universe is stunning to contemplate. The current volume estimate of all electronic information is roughly 1.2 zettabytes, the amount of data that would be generated by everyone in the world posting messages on Twitter continuously for a century. That includes everything from e-mail to YouTube. More stunning: 75 percent of the information is duplicative. By 2020, experts estimate that the volume will be 44 times greater than it was in 2009. There finally may be, in fact, T.M.I. Proliferating information takes a human toll, too, as it becomes more difficult to wade through the digital detritus. We’re all breeding (and probably hoarding) electronic information. Insensitive to our data-propagating power, we forward a joke on a Monday that may produce 10 million copies by Friday — probably all being stored somewhere. Despite the conveniences our online lives provide, we end up being buried by data at home and at work. An overabundance of data makes important things harder to find and impedes good decision-making. Efficiency withers as we struggle to find and manage the information we need to do our jobs. Estimates abound on how much productivity is lost because of information overload, but all of them are in the hundreds of millions of dollars yearly. In the corporate realm, companies stockpile data because keeping it seems easier than figuring out what they can delete. This behavior has hidden costs and creates risks of security and privacy breaches as data goes rogue. In addition, large corporations face eye-popping litigation costs when they search for information that may be evidence in a lawsuit — so-called e-discovery — that can add up to millions of dollars a year. Cases are often settled because it’s cheaper to just pay up. With so many resource challenges facing them, most companies postpone the effort and cost of managing their data. http://www.nytimes.com/2011/03/13/opinion/13podolny.html?_r=1&partner=rssnyt&emc=rss [Editor: Every page on www.knowconnect.com carries varying superscript tag-lines, like “Can we find what we need, just when we need it?” or “Could we save less information, and find more?”. Knowledge management addresses some of these challenges; click on one of these superscripts for more detail.]

As Law Student Readies Reverse Auction Site, Law Bloggers React to ‘eBay’ of Lawyering (ABA Journal, 14 March 2011) - Niznik’s graduation musings led him to contemplate the plight of indebted law students struggling to find jobs in a bleak economic climate as well as the expensive and largely inaccessible nature of the legal profession. His answer to both issues is at once goofy and serious. The New York Law School student founded Shpoonkle, a playfully named website that allows attorneys and law firms to bid on legal requests submitted by clients. The service is free for now, but Niznik said attorneys may be charged membership fees in the future. Though it has yet to officially launch, lawyers and clients have already started joining the site. According to Niznik, more than 20 attorneys joined Shpoonkle since the site opened Tuesday, and membership numbers are increasing daily. The idea behind Shpoonkle is relatively simple: Clients can sift through offers made by attorneys and pick the one that suits their budget. “Privacy shouldn’t be a concern” because only lawyers can view cases posted on the site, Niznik said. Shpoonkle’s motto is “Justice You Can Afford!” but it may not be the kind of justice some attorneys are willing to embrace. Last week, as news of the legal service hit the blogosphere, some law blogs disparaged the website, mocking everything from its name to its purpose. On his New York criminal defense blog Simple Justice, Scott Greenfield said, “Any lawyer who signs up for this service should be immediately disbarred, then tarred and feathered, then publicly humiliated.” Calling the site the “eBay of lawyering,” Greenfield argues the service will lower the integrity of the legal profession. http://www.abajournal.com/news/article/new_york_law_school_student_to_launch_reverse_auction_site/?utm_source=maestro&utm_medium=email&utm_campaign=weekly_email [Editor: reminds me of eLaw.com (Austin, Texas), and their early work in 2002.]

What Auditors Are Saying About Compliance And Encryption (Dark Reading, 15 March 2011) - In more than half of the audits they have conducted, both internal IT security and external auditors say the companies either failed or had serious deficiencies in their security compliance. And more than half say organizations are employing encryption purely for compliance reasons, according to a new report. The Ponemon Institute’s “What Auditors Think About Crypto” report, commissioned by Thales, is based on a survey of more than 500 auditors. Nearly half of them believe that audits and assessments should be mainly for rooting out risks and vulnerabilities, 42 percent say it should be for determining compliance for internal policies, and 34 percent say it should be for checking compliance with regulatory and legal mandates. http://www.darkreading.com/database-security/167901020/security/encryption/229301041/what-auditors-are-saying-about-compliance-and-encryption.html Report here: (requires registration) -- from the report itself:
“Following are some of the most salient findings of this research.
·      A large number of respondents say their organizations are not taking data security seriously, and may not be allocating enough resources to achieve a reasonable state of compliance with laws and regulations, as well as a high security posture.
·      In the world of compliance, business units rather than legal, IT or compliance, own the budget and thus determine whether or not to invest in audits.”

Web Host Liable For Contributory Infringement (Law.com, 15 March 2011) - A South Carolina jury’s recent $770,750 verdict against Bright Builders Inc. marks the first time a Web-hosting company has been found liable for contributory infringement without actual notice that a customer’s Web site lists fake products for sale. South Carolina District Judge Margaret Seymour’s March 14 judgment in Roger Cleveland Golf Company Inc. v. Prince followed the jury’s March 10 verdict. The jury returned a $28,250 statutory damages verdict against Web site owners Christopher Prince and Prince Distribution LLC for trademark counterfeiting and infringement. The verdict included damages against both sets of defendants for violating the South Carolina Unfair Trade Practices Act. The jury found that Bright Builders and Prince were both liable for Prince’s copycatclubs.com Web site, which sold counterfeit Cleveland Golf clubs. The total judgment was based on the Prince defendants’ infringement of 11 Cleveland Golf registered trademarks, plus post-judgment interest. According to court papers, Prince’s Web site claimed to be “your one stop shop for the best copied golf clubs on the Internet.” Cleveland Golf originally filed suit against the Prince defendants because the Web site name and its claims were so brazen, said Christopher Finnerty, a Boston partner at Columbia, S.C.-based Nelson Mullins Riley & Scarborough and lead counsel on the case. “Usually, there’s a little cloak and dagger when counterfeit goods are sold online,” Finnerty said. “Their Web sites don’t usually advertise that they’re selling counterfeit goods.” The plaintiffs discovered Bright Builders’ role during its deposition of Prince and filed an amended complaint naming the company as a defendant, Finnerty said. For other Internet intermediaries, the ruling means that once they know or should have known that their customers are selling infringing goods, “they can’t remain willfully blind and wait for the brand owner to provide notice,” Finnerty said. http://www.law.com/jsp/nlj/PubArticleNLJ.jsp?id=1202486298897

New Site Offers Free Video ‘Nuggets’ of CLE (Robert Ambrogi, 16 March 2011) - At the ACLEA annual meeting last summer, I gave a plenary talk, “10 Ways Technology is Rewiring Lawyers’ Brains … and What it Means for CLE.” Several times during that talk, when I wanted examples of online CLE sites that were engaged in social media, that were transparent about their products and pricing, that understood the concept of delivering value, and that highlighted consumer feedback and ratings, I kept coming back to one provider, Lawline.com. Again last month, I wrote about this company when it became the first CLE provider to offer video courses via a mobile phone. Now it has unveiled another feature that shows it to be a step ahead of the social media curve. This time, it has launched a completely free e-learning website for lawyers, Learn.Lawline.com. Borrowing from the hundreds of hours of video content Lawline has created, the site breaks up these videos into mini lessons that answer specific questions. Rather than sit through an entire CLE course, you can spend just a few minutes watching the segment that speaks to the particular issue you’re interested in. Perhaps you want a quick refresher on what constitutes an employee at will. Or you want to hear about the jurisdictional issues in setting up an online business. Or maybe you want to review the qualifications for an H1-B visa. There are hundreds of these to choose from. Of course, Lawline is a commercial enterprise, so it is not giving away all of every course. Rather, it has extracted from each course what it describes as the “golden nuggets” of information. Depending on the course, this can range from five short clips to more than 30. If at any point you decide that you want to purchase the full course, you can, of course, do that. Each “nugget” includes social media tools that allow you to share or e-mail the clip or embed it in a web page or blog post. Also, each short video is shown on a page that includes the relevant slides from the course presentation. http://via.pulsene.ws/15tvn [Editor: I’d appreciate hearing from users of this site.]

Righthaven Loses Second Fair Use Ruling Over Copyright Lawsuits (Las Vegas Sun, 18 March 2011) - An Oregon nonprofit did not infringe on copyrights when it posted without authorization an entire Las Vegas Review-Journal story on its website, a judge ruled Friday. U.S. District Judge James Mahan said during a hearing he planned to dismiss, on fair use grounds, a copyright infringement lawsuit filed against the Center for Intercultural Organizing (CIO), in Portland, Ore. The lawsuit was filed last year by Righthaven LLC of Las Vegas, the Review-Journal’s copyright enforcement partner that also enforces copyrights for the Denver Post. Mahan, who last year raised the fair use issue in the CIO case without being prodded to do so by CIO attorneys, said the copyright lawsuit would be dismissed because the nonprofit used it in an educational way, the CIO didn’t try to use the story to raise money and because the story in question was primarily factual as opposed to being creative. The judge also found there was no harm to the market for the story. Separately, Righthaven on Thursday filed at least its 250th lawsuit since March 2010. The latest suit, filed in U.S. District Court for Colorado, is over the Denver Post TSA pat-down photo. This brings to at least 46 the number of lawsuits over that photo. http://www.lasvegassun.com/news/2011/mar/18/righthaven-loses-second-fair-use-ruling-over-copyr/

Crowdsourcing the Preservation of U.S. War Papers (ReadWriteWeb, 18 March 2011) - The Center for History and New Media at George Mason University has joined forces with crowdsourcing document outfit Scripto, open source document transcription tool, to transcribe and share a piece of U.S. history thought to be lost. The project “Papers of the War Department, 1784-1800“ seeks to transcribe and digitize copies of papers from a formative part of American history, previously thought to be lost to fire. Projects like these rarely suffer from a surfeit of funding, so using Scripto to coordinate a crowdsourced transcription has made the project possible. The collection consists of 45,000 documents consisting of hundreds of thousands of individual pages from the records of what later came to be known as the Department of Defense. Volunteers register to become a Transcription Associate and then can browse to select whichever document they wish to transcribe or search the collection if they have particular interests. In addition to making it financially feasible, letting the public take a hand in such a project has the benefit of bringing history close to the volunteer and turning that volunteer into an evangelist for the importance of history to contemporary life. Also, it gives the historians involved a sense, as the documents are transcribed, for what the public finds the most compelling. The project is funded by the National Historical Publications & Records Commission of the National Archives and the National Endowment for the Humanities’ Office of Digital Humanities. http://www.readwriteweb.com/archives/crowdsourcing_us_war_papers.php?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+readwriteweb+%28ReadWriteWeb%29&utm_content=Google+Reader

Chin Decides Google Books Settlement Would ‘Go Too Far’ (NLJ, 23 March 2011) - Google’s attempt to build the world’s biggest digital library was sidetracked yesterday as a federal judge rejected a settlement between the Internet giant and authors and publishers who sued for copyright infringement. Judge Denny Chin said the settlement, which was reached in 2008 to resolve two lawsuits challenging the mass scanning of books and the display of “snippets” for online searching “would simply go too far.” The deal “would grant Google significant rights to exploit entire books, without the permission of the copyright owners,” said Judge Chin, a former Southern District judge who kept the case when he was elevated to the Second Circuit. “Indeed, the Amended Settlement Agreement would give Google a significant advantage over competitors, rewarding it for engaging in wholesale copyrighted works without permission, while releasing claims well beyond those presented in the case.” However, the judge said that many of his concerns could be addressed if the amended agreement was “converted from an ‘opt-out’ settlement to an ‘opt-in’ settlement” and he urged the parties to consider that as they return to negotiations. A central problem, Judge Chin said, was that the settlement “would transfer to Google certain rights in exchange for future and ongoing arrangements including the sharing of future proceeds, and it would release Google (and others) from liability for certain future acts.” The Justice Department submitted a statement of interest calling it an “attempt to use the class action mechanism to implement forward-looking business arrangements that go far beyond the dispute before the Court in this litigation.” Judge Chin said he was bothered because figuring “a mechanism for exploiting unclaimed books is a matter more suited for Congress than this court.” As for the concern that the settlement would release claims that go far beyond the pleadings, the judge made clear the case was brought to challenge “snippets” for online searching, with Google arguing it was fair use to make small portions of the works available through search requests. “The case was about the use of an indexing and searching tool, not the sale of complete copyrighted works,” he said. http://www.law.com/jsp/nylj/PubArticleNY.jsp?id=1202487454956&slreturn=1&hbxlogin=1

Spot Me If You Can: Uncovering Spoken Phrases In Encrypted VoIP Conversations (Paper by Johns Hopkins’ Charles Wright et al., March 2011) – Abstract: Despite the rapid adoption of Voice over IP (VoIP), its security implications are not yet fully understood. Since VoIP calls may traverse untrusted networks, packets should be encrypted to ensure confidentiality. However, we show that when the audio is encoded using variable bit rate codecs, the lengths of encrypted VoIP packets can be used to identify the phrases spoken within a call. Our results indicate that a passive observer can identify phrases from a standard speech corpus within encrypted calls with an average accuracy of 50%, and with accuracy greater than 90% for some phrases. Clearly, such an attack calls into question the efficacy of current VoIP encryption standards. In addition, we examine the impact of various features of the underlying audio on our performance and discuss methods for mitigation. http://cs.unc.edu/~fabian/papers/oakland08.pdf

Cornell Library Rejects Non-Disclosures On Journal Pricing; Will Reveal All Prices (TechDirt, 25 March 2011) - One of the more pernicious areas of locking up knowledge that we’ve seen and discussed involves academic journals. These tend to involve private publishers who get a tremendous amount of completely free labor in terms of content submissions and even reviewers/editors... and then demand the copyrights of the research, while charging universities ridiculously high fees. Those publishers have also gone to great lengths to try to block the US government from trying to make federally funded research available to the public at no cost after a limited amount of time. And, of course, the journals often rely on secrecy to get the most money -- including requiring universities to sign non-disclosure agreements (NDAs) that forbid them from revealing how much they’re paying for a journal. 

It’s nice to see some universities really starting to push back, and it’s even nicer when it’s a university that I attended and from which I received two degrees. My sister informs me that Cornell University has decided to take a stand and is refusing to sign any NDAs from various journals, and will make the prices they’re being charged for such journals public. As the University made clear in a statement about this policy, it feels these agreements go against the basic nature of openness and fairness * * * http://www.techdirt.com/articles/20110323/02473713592/cornell-library-rejects-non-disclosures-journal-pricing-will-reveal-all-prices.shtml

The Deplorable State of Law Firm Security (Sharon Nelson, 25 March 2011) - In our most recent Digital Detectives podcast for Legal Talk Network, John and I were happy to welcome Rob Lee, a Director with the information security firm Mandiant and the curriculum lead for digital forensic training at the SANS Institute, to discuss the deplorable state of law firm security. It resonated with us that Rob believes that law firm security is about five years behind the rest of the business world. That may be kind. Certainly we’ve never done a law firm security assessment without finding significant vulnerabilities and Rob’s experience has been the same. He talks extensively about Advanced Persistent Threats, the concept of defense in depth and the importance of security assessments. As he notes, hacking into law firms is so easy that the Chinese don’t even waste their “A” teams on it – the junior rookie squads can handle it. The attitude of many law firms is that “it can’t happen here.” What’s amazing is how many times it already has. If you’re interested in law firm security, Rob offers a wealth of information in this podcast - our thanks for his willingness to share his knowledge! http://RideTheLightning.senseient.com/2011/03/the-deplorable-state-of-law-firm-security.html

**** NOTED PODCASTS ****
The MIRLN podcasts now are on iTunes -- http://itunes.apple.com/us/podcast/mirln/id424352330 or search for “MIRLN”. You can also find them at http://www.knowconnect.com/mirln/podcast/, and an RSS feed is available. MIRLN 14.04 podcast: “Cybersecurity” (17 March 2011; 10 minutes) - Discussion of recently reported attacks on high-profile companies like GE, Sony, Johnson & Johnson, and the implications for cyber-integrity and data governance.

Susan Landau on Surveillance or Security? The Risks Posed by New Wiretapping Technologies (Berkman Center, 8 March 2011; 64 minutes) - The reliance of business and commerce on IP-based networks leaves the U.S. highly exposed and vulnerable to cyberattack, yet U.S. law enforcement remains focused on building wiretapping systems within communications infrastructure. By embedding eavesdropping mechanisms into communications technology itself, we build tools that could easily be turned against us. In this talk based on her new book, Susan Landau — currently a fellow at the Radcliffe Institute for Advanced Study at Harvard — asks: In a world that has Al-Qaeda, nation-state economic espionage, and Hurricane Katrina, how do we get communications security right? http://blogs.law.harvard.edu/mediaberkman/2011/03/08/book-talk-susan-landau-on-surveillance-or-security-the-risks-posed-by-new-wiretapping-technologies-audio/ [Editor: Superb, comprehensive discussion of IP infrastructure implications for communications security, ranging from EPCA to CALEA to FISA, from the FBI to the NSA to Northrop Grumman to Ericson, from the US to Greece to France to China – really terrific.] See also Susan Landau’s testimony before the House Judiciary Committee, Subcommittee on Crime, Terrorism, and Homeland Security on government eavesdropping. http://judiciary.house.gov/hearings/hear_02172011.html

Data Privacy - EPCA Revisited (Stanford CIS, 24 Jan 2011) - Does the Fourth Amendment protect the privacy of your webmail? Does the government have to get a search warrant before tracking the location of your phone? What are the latest electronic privacy developments in courts and in Congress? In connection with Data Privacy Day 2011, two experts will discussed the state of electronic communications law. Kevin Bankston, senior staff attorney at the Electronic Frontier Foundation, discussed recent cases he has litigated involving the Electronic Communications Privacy Act—the decades—old law that regulates electronic communications privacy—and EFF’s efforts as part of the “Digital Due Process” Coalition to update that law for the 21st century. Susan Freiwald, Professor of Law at University of San Francisco School of Law, focused on the constitutional tensions underlying these current debates over online and wireless communications privacy, with a special focus on her work defending the locational privacy of cell phone users and privacy in stored email. http://cyberlaw.stanford.edu/podcasts/20110124_CIS_DataPrivacy.mp3 [Editor: very useful discussion–aside from Prof. Freiwald’s annoying habit of constant, albeit useful, interruptions–of the history behind EPCA/SCA and geo-tracking; I’d love to hear the other side of the issue presented as thoroughly as in this presentation. The discussion of the Warshak case illuminates the MIRLN podcast 14.02 - http://www.knowconnect.com/mirln/podcast/]

**** RESOURCES ****
WIPO Launches New On-line Tool to Facilitate Brand Searche (WIPO, 8 March 2011) - A new on-line tool launched by WIPO on March 8, 2011, will make it easier to search over 640,000 records relating to internationally protected trademarks, appellations of origin and armorial bearings, flags and other state emblems as well as the names, abbreviations and emblems of intergovernmental organizations. The Global Brand Database allows free of charge, simultaneous brand-related searches across multiple collections. At present, the Global Brand Database search interface allows users to access three WIPO databases – international trademarks registered under the Madrid system for the international registration of marks; appellations of origin registered under the Lisbon system for the international registration of appellations of origin; and armorial bearings, flags and other state emblems as well as the names, abbreviations and emblems of intergovernmental organizations protected under Article 6ter of the Paris Convention for the Protection of Industrial Property – by means of one simple, user-friendly screen. http://www.wipo.int/pressroom/en/articles/2011/article_0007.html?sms_ss=twitter&at_xt=4d78e161e3a66511,0

**** FUN ****
Cleveland Browns Lawyer Letter Is Apparently Real (Lowering the Bar, 18 March 2011) - Occasionally you do come across things that seem just too good to be true, and like others I was suspicious of this correspondence that circulated recently. As you may recall, this purports to be (1) a 1974 letter from a lawyer and Cleveland Browns season-ticket holder threatening to sue the team if any person in his party sustained an injury from “the sailing of paper airplanes” by unruly fans, and (2) a rudely hilarious (or hilariously rude) response to this ridiculous threat, sent by the team’s general counsel. Turns out that the Cleveland Plain Dealer followed up on this, and managed to reach both of the people involved, who said that both the letters were real. This was good enough for the professional urban-legend checkers at snopes.com, so it’s good enough for me. The general counsel, James Bailey, now lives in San Diego. Bailey also confirmed he had copied Art Modell, the team’s owner, on the letter, which might not have been the best idea. “I should have been more cautious,” Bailey said. “After I wrote it, I heard about it right away from Art. He said something like, ‘What the hell are you doing?’ He was not a guy lacking passion.” The complainer, Dale Cox, has since moved to Idaho but is still practicing law (and, he says, is still a Browns season-ticket holder, which might show his judgment has not improved). He told the Plain Dealer he wasn’t mad about the response and that in fact he “thought it was pretty cool.” Whether he’s remembering that correctly or just doesn’t want to seem like a sore loser now, that’s the right response. He also claimed to have “used that letter a couple times myself since,” but if he did, he did not provide details. I came across a couple of posts suggesting that Mark Twain originally came up with this idea, but if he did, I couldn’t find it; and it would probably be public domain and/or fair use anyway, if like Mr. Cox you wanted to use this yourself. http://www.loweringthebar.net/2011/03/cleveland-browns-lawyer-letter-is-apparently-real.html

FBI Surveillance near ABA? -- see http://www.flickr.com/photos/16626231@N00/5551407594/ for a screen shot of nearby WiFi networks I took while at the ABA on 22 March 2011.

**** LOOKING BACK - MIRLN TEN YEARS AGO ****
FBI’S CYBERCRIME INFO-SHARING (Wired News, 5 Jan. 2001) The FBI announced Friday the completion of a program that seeks to combat cybercrime by encouraging companies to share information about Internet attacks they have experienced. Participating companies and the FBI would use encrypted e-mail and a secure website to warn each other about new hacking attempts, computer viruses and other Internet-based criminal activity. By encouraging communication among tech companies, the FBI hopes to reduce the impact of Internet crime, which according to one estimate takes a $1.6 trillion bite annually out of the global economy. http://www.wired.com/news/politics/0,1283,41030,00.html

PENTAGON BAFFLED BY HACKER FILE THEFTS (Commerce Times, 7 May 2001) -- A hacking group, most likely Russian-based, has stolen thousands of files in consistent attacks over the past three years from the Pentagon and other government agencies, according to an article written by a National Security Agency (NSA) consultant. The sophisticated attempts amount to “the most persistent and serious computer attack against the United States to date,” wrote James Adams. The attacks were first detected in March 1998, Adams reports, and have been investigated extensively since then in a project code-named Moonlight Maze. After researchers traced the attacks to seven Russian Internet addresses, a complaint was filed with

**** NOTES ****
MIRLN (Misc. IT Related Legal News) is a free e-newsletter published every three weeks by Vince Polley at KnowConnect PLLC. You can subscribe to the MIRLN distribution list by sending email to Vince Polley (mailto:vpolley@knowconnect.com?subject=MIRLN) with the word “MIRLN” in the subject line. Unsubscribe by sending email to Vince with the words “MIRLN REMOVAL” in the subject line.

Recent MIRLN issues are archived at www.knowconnect.com/mirln. Get supplemental information through Twitter: http://twitter.com/vpolley #mirln.

SOURCES (inter alia):
1. The Filter, a publication of the Berkman Center for Internet & Society at Harvard Law School, http://cyber.law.harvard.edu
2. InsideHigherEd - http://www.insidehighered.com/
3. SANS Newsbites, sans@sans.org
4. NewsScan and Innovation, http://www.newsscan.com
5. BNA’s Internet Law News, http://ecommercecenter.bna.com
7. McGuire Wood’s Technology & Business Articles of Note
8. Steptoe & Johnson’s E-Commerce Law Week
9. Eric Goldman’s Technology and Marketing Law Blog, http://blog.ericgoldman.org/
10. Law.com
11. Readers’ submissions, and the editor’s discoveries.

This work is licensed under the Creative Commons Attribution-Share Alike 3.0 United States License. To view a copy of this license, visit or send a letter to Creative Commons, 543 Howard Street, 5th Floor, San Francisco, California, 94105, USA.