The Maryland Court of Appeals issued a decision yesterday in Independent Newspapers, Inc. v. Zebulon J. Brodie protecting the identity of anonymous Internet posters and, for the first time, offering guidelines for that state’s courts to follow in libel cases before compelling disclosure of online commenters’ identities.

The five-step process the court adopted was borrowed from Dendrite Int’l, Inc. v. John Doe No. 3, 775 A.2d 756 (N.J. Super. Ct. App. Div. 2001) and explicated in detail in yesterday’s 43-page majority opinion. It seeks to help trial courts “balance First Amendment rights with the right to seek protection for defamation” by suggesting they:

•Require that plaintiffs notify anonymous parties that their identities are sought.•Give the posters time to reply with reasons why they should remain nameless.

•Require plaintiffs to identify the defamatory statements and who made them.

•Determine whether the complaint has set forth a prima facie defamation, where the words are obviously libelous, or a per quod action, meaning it requires outside evidence.

•Weigh the poster’s right to free speech against the strength of the case and the necessity of identity disclosure.

For further reading, see:

In a letter to the Chair, Hon. Lee Rosenthal, of the Committee on Rules of Practice & Procedure (Judicial Conference of the U.S.), Senator Joe Lieberman observes that “The goal of [Section 205(e) of the E-Government Act ] . . . was to increase free public access to these records,” and demands to know why access to PACER isn’t free and also why “not enough has been done to protect personal information contained in publicly available court filings.

Further reading: John Schwartz, An effort to upgrade a court archive system to free and easy, New York Times (Feb. 13, 2009)”

Under the Electronic Communications Privacy Act of 1986, ISPs based in the United States are already required to retain data affixed to an IP address for at least 90 days — upon the request of law enforcement.

However, the so-called  SAFETY Act of 2009 would, inter alia, require any, “provider of an electronic communication service or remote computing service” to “retain for a period of at least two years all records or other information pertaining to the identity of a user of a temporarily assigned network address the service assigns to that user.”

If enacted, Internet cafes, ISPs, hotels, universities, and employers would be required to keep logs of all data associated with IP addresses assigned individual users – from e-mail logins to search queries to visited Web sites.

Further reading:

In recent research presented at the Black Hat 2008 conference in Las Vegas, Greg Conti and Erik Dean from the United States Military Academy have adapted a new concept to computer forensics: visualization. The researchers demonstrated how visual computer forensic methods can dramatically reduce the time it takes to review files by substituting visual heuristics for traditional modes of file signature identification, file extension selection or hexadecimal searching.

By placing more data in front of the examiner in a smaller amount of screen space, the review speed of many file types is claimed to dramatically increase. In short, visual forensic tools have the potential to save an examiner a significant amount of analysis time.

“Visualization has the potential to dramatically change the field of computer forensics,” urge Conti and Dean.  “Each time we created a new visualization tool there were always surprising insights. Visualizations create windows on data that hasn’t ever been readily visible, much to the dismay of people trying to hide information in the dark corners of a computer.”

Full story at:
http://www.law.com/jsp/legaltechnology/pubArticleLT.jsp?id=1202428248638

The tools are available for free download.  I will experiment with them on data from an actual case and may report my findings here in a future post.

A litigant, who was subject to an order to produce his hard drive, argued in mitigation of spoliation of evidence by reason that he was a novice computer user who was having problems with his computer because it was severely infected with viruses, spyware and adware and that he sought professional help in correcting those problems.  The Oklahoma Supreme Court reversed an order declining to impose sanctions. The following is adapted from that court’s November 10, 2008 opinion.

The litigant first sought help from a friend, who was not successful in resolving the problems. He then hired a professional to repair the computer. Although he maintained that at no time were evidentiary materials intentionally deleted from the computer, the record reflected that at least three kinds of “wiping” software were downloaded onto the computer during the period that the parties were actively negotiating to obtain the information contained on the computer’s hard drive.

Specifically, AbsoluteShield File Shredder was used and a file named “cable.doc” was removed; later the programs CyberScrub 3.5 and Window Washer were installed and the Window Washer program ran several times thereafter. The record reflects that the CyberScrub 3.5 program was last accessed on the same date that a motion to compel was granted by the trial judge.

The record further reveals that, after the motion to compel was granted, the litigant contacted a computer security company, Jarvis Incorporated, and asked about hiring a computer expert to work on his computer. On Jarvis’s recommendation, the plaintiff hired another technician to work on his computer. The litigant told neither Jarvis nor the technician that the computer was the subject of a court order and/or that certain files needed to be preserved before it was worked on. The technician testified that he could have preserved the hard drive before working on it by making a “clone” of it if he had known it was needed. Indeed, the technician had removed the hard drive and worked on it for approximately one week and used a “drive wiper” program called Terminus 6 on the hard drive.

The litigant admitted that the technician used the Terminus program and admitted targeted destruction of specific files by the technician due to the desire to retain settings on his computer. Barnett says that it was the technician’s decision to use the wiping software.

A neutral court-appointed expert found no evidence that files associated with viruses had been destroyed with the Terminus program and further noted that a log identifying the files deleted by the Terminus program had itself been deleted. The expert’s report stated that there were six documents with links in the Recent Documents folder of plaintiff’s computer that had no matching document on the hard drive, indicating that those files had been deleted.

A concern that I have is that wiping utilities are becoming more and more commonplace, even being packaged with ordinary utilities that ship with new computers or come with ISP services (e.g., MSN, which makes SpySweeper, McAffee and a number of wiping & anti-forensic utilities available).  The popularity of these utilities, as well as encryption, has increased because of the growing awareness of identity theft, among other reasons.  Even disk defragmenting tools, such as DiskKeeper, create a nightmare for forensic analysists attempting to located deleted files on a target system.

Whereas, in the past, such utilities required a knowing use (mens rea), the use of such utilities today may not be an indication of intent to spoliate.  This means that the standard may shift more and more –as the case above illustrates– from scienter to negligence.  Therefore, counsel will increasingly need to observe strict data preservation protocols when litigation becomes reasonably forseeable and to communicate these obligations to clients promptly.

Some obvious questions that are often raised include:

  • Must clients be instructed to immediately cease using a computer –at the first hint of reasonably forseeable litigation– until the hard-drive can be forensically imaged?  If so, what about the accumulating data that is created after the imaging date?
  • If a client takes reasonable steps to preserve extant potentially-responsive data, must the client disable the use defragmenting utilities and other anti-forensic utilities that arguably are necessary for maintaining the optimum efficiency of a computer (especially considering that litigation may last several years)?
  • Assuming the h.d.d. wasn’t imaged, If a client has taken reasonable steps to preserve the obvious potentially-responsive data, should the client also have been expected to identify and preserve files that have been deleted but are still recoverable (given that further use of the computer will overwrite these files)?

For counsel seeking to discover ESI, the availability of that evidence may decrease as a result of the widespread use of anti-forensic utilities, but the shifting jurisprudence may allow for adverse jury instructions based on the missing evidence, which instructions possibly could be more damaging than the destroyed evidence, itself.

The Massachusetts Supreme Judicial Court granted permission to a valedictorian graduate of Concord Law School, waiving the requirement of graduation from an ABA accredited school.  A digest of the case, Mitchell v. Board of Bar Examiners, is reported at the Legal Profession Blog (here).


Previously, I had written about four grads from this same school, who’ve been admitted to SCotUS.  In fact, I recall meeting a local judge –can’t recall whether district or county– at the 2006 Bar Convention in Brainard who was an adjunct professor for Concord.

In re Bilski, __ F.3d __ (Fed. Cir. 2008)(en banc): The Federal Circuit affirmed the decision of the Board of Patent Appeals (BPAI) that Bilski’s claimed invention for a method of hedging risks in commodities trading does not satisfy the patentable subject matter requirements of 35 U.S.C. § 101.

Here’s the test for patentable subject matter: “A claimed process is surely patent-eligible under § 101 if: (1) it is tied to a particular machine or apparatus, or (2) it transforms a particular article into a different state or thing.” The Federal Circuit’s standard is different than the one articulated in State Street, which stated that the proper inquiry is whether the invention yielded a “useful, concrete, and tangible result”.  However, the Federal Circuit clearly took great pains to adhere to Supreme Court precedent.

Much has been written about In re Bilski, but go get the best analysis that money can’t buy: read if for yourself and see what you think (http://www.cafc.uscourts.gov/opinions/07-1130.pdf).

This is too strange.

Some clever miscreant hacked GoDaddy, transferred the makeuseof.com domain to a web registrar in Dubai, then demanded $2000 ransom from the domain’s owner to restore it.

The good news is that the domain is now back in the control of its rightful owner. Not sure if they had to dole out the money.

Methinks GoDaddy needs to bolster its security a bit, and revisit its policy of immediate domain transfers.

Patrick Oot, a lawyer for Verizon interviewed by The Economist, claims almost every case involves e-discovery and spits out “terabytes” of information—the equivalent of millions of pages.  Almost every case? That may be his experience, but as an industry professional, it’s not mine and I’m still amazed:  many lawyers –especially in family law– haven’t yet had a case where they’ve been asked to or found it necessary to image a single hard-drive.  Some tell me they’re holding out for as long as possible.


Recently, a few reports have been published, highlighting a phenomenon that I and, I suspect, many of us anticipated:  that the cost and burdens of e-discovery would become eventually become unwieldy  and unmanageable, even for the firms with an infrastructure and regular need to deal with it.  But, not everyone paints the picture as bleakly  –certainly not the EDD firms that benefit.

A telephone research survey sponsored by EDD firm Fios, Inc. concluded: technologists and lawyers are working more closely than previously thought; the most significant investments are being made in legal hold and archiving tools; and the 2007 amendments to the federal Rules didn’t have the impact feared.

However, a
joint survey, released in September, by the American College of Trial Lawyers and the Institute for the Advancement of the American Legal System reports that a majority of those surveyed found that the discovery system in particular is broken and “has become an end in itself,” and that “Electronic discovery clearly needs a serious overhaul.” Nearly a quarter of those surveyed characterized the civil justice system is “broken.” The report claims that 83 percent of nearly 1,500 lawyers responding found costs  –not the merits– of a case to be the deciding factor in settling.  A significant 68 percent of the college fellows disclosed that civil cases do not get filed because of the prohibitive litigation costs.

Frankly, I’m not so sure that surveying “college fellows” on the practicality of electronic discovery are the right people to ask these questions of.  So, I decided to ask a colleague, Sharon Nelson, for her perspective.  Nelson and her husband, John Simek, operate a computer forensics firm in Virginia.  She is an attorney, frequent lecturer and co-author of the Electronic Evidence and Discovery Handbook.

Nelson concludes –as I have, also– that, “The truth is often somewhere in the middle.” She recalls, “Discovery was a nightmare even in paper – because there was often so much. The problem has grown exponentially with ESI, because there is so much more data. However, a portion of the blame belongs to all of us. We don’t ‘take out the trash’ so our garbage heap of data expands constantly. It is just too cheap and easy to move it all to ever larger hard drives.”

As a result, e-discovery has led to a new boom industry of specialized service providers which  charge $125-600 an hour. George Socha (based here in Minnesota and who adminsters an annual survey regarded as the industry benchmark) estimates that their annual revenues have grown from $40m in 1999 to about $2 billion in 2006 and may hit $4 billion next year.

“Additionally, there are now at least two tiers of EDD companies – the whales, who are interested only in the mega-firms and their cases, and the smaller fish, who handle the small to mid-range cases of small to mid-range firms,” Nelson noted. She also observed that, “There is little interaction between those two worlds – and huge price point differences,” and believes that, “A continuing shake-out among vendors is probably likely, especially given the state of the economy.”

Further reading:

11/24/2008 Update: dead link (below) replaced with different link.  Also, plaintiff’s concerns about the damage to her reputation seem legitimate, as I recently discovered (hat tip to Sharon Nelson): On September 10th, CareerBuilder.com published the results of a survey that found one in five employers screen their job candidates online, double the amount of employers using social networking sites in 2006. Of the employers that used the sites, 34% dismissed the candidate after what they saw. The main concerns of the employer were candidates posting information about drinking or drugs, posting provocative information or photos, poor communication skills, and lying about qualifications. Conversely, 24% found that the social networking site solidified their desire to hire a person. Factors that made an employer hire a potential candidate were a background supporting the candidate’s qualifications, proof that they had good communication skills, and evidence that the candidate was a good fit for the office culture.



A DWI defendant in Nassau County. NY has sued, demanding that her name and photograph posted to the County’s Web page –dubbed “Wall of Shame”– be removed. Read story.  Defendant’s claim is based primarily on the prospective harm caused when potential employers and others find her name and photo on the Web.  Her attorney argues that publication to the “Wall of Shame” of persons who have not yet been found guilty of a crime is a form of punishment, noting “I don’t think you need a law degree to understand that this fundamentally goes against a system of justice in which punishment occurs after you’ve been found guilty.”

Last month, another woman sued the county over publication.  She had lapsed into a hypoglycemic shock1 and was subsequently arrested for DWI.

______________________
1 As I have witnessed first-hand, a person experiencing
hypoglycemia, when his or her blood sugar is too low, can appear to be drunk. They may sweat, talk confused, become disoriented, stumble, lose their bearings, become aggressive, even “ornery,” belligerent or pass out.

« Previous PageNext Page »