1 legal research, issues and practice in cyberspace - first amendment, digital discovery, data...

44
1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger March 25, 2013

Upload: aubrey-waters

Post on 15-Jan-2016

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

1

Legal Research, Issues and Practice in

Cyberspace-

First Amendment, Digital Discovery, Data Retention,

and Digital Security

Cyrus Daftary & Todd Krieger

March 25, 2013

Page 2: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

2

Agenda

Project / presentation discussion Online security First Amendment Data retention and digital discovery Questions and Answers

Page 4: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

4

Is Software Sold or Licensed? Ensure the software is properly licensed.

Unusual opinion in Vernor vs. Autodesk.Court looked at characteristics of transaction,

not how the transaction was described by the parties.

Appeals court reiterated the licensor’s rights.

Breaking Supreme Court News – Week 5 Revisited

Page 5: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

First Sale Doctrine Revisited

“Copyright © 2008 John Wiley & Sons (Asia) Pte Ltd[.] All rights reserved. This book is authorized for sale in Europe, Asia, Africa, and the Middle East only and may be not exported out of these territories. Exportation from or importation of this book to another region without the Publisher’s authorization is illegal and is a violation of the Publisher’s rights. The Publisher may take legal action to enforce its rights. . . . Printed in Asia.” J. Walker, Fundamentals of Physics, p. vi (8th ed. 2008 Wiley Int’l Student ed.).

Kirtsaeng vs. John Wiley & Sons, No. 11-697, 2013 BL 72102 (U.S. Mar. 19, 2013).

5

Page 6: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

6

Data Security is a Relatively New Area of Liability

Company computers may house sensitive consumer data and trade secrets.

Failure to adequately protect consumer data has led to high profile settlements with the FTC: Choicepoint: $15 million TJX BJs Wholesale Club Hannafords – 3/08 - 4 million credit card numbers

compromised.

Failure to adequately protect trade secrets can also create a corporate disaster.

Page 7: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

Sensitive Digital Data May Reside in Surprising Places

http://www.cbsnews.com/8301-18563_162-6412439.html

http://business.ftc.gov/documents/bus43-copier-data-security

7

Page 8: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

Nevada SB 267 Was Passed in Response

Section 4 of this bill requires a business entity or a data collector to ensure that any personal information which is stored on the data storage device of a copier, facsimile machine or multifunction device in the possession of the business entity or data collector is securely encrypted or destroyed by certain approved methods before the business entity or data collector relinquishes ownership, physical control or custody of the copier, facsimile machine or multifunction device to another person. http://openstates.org/nv/bills/76/SB267/documents/NVD00008333/

8

Page 9: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

9

Companies are Obligated to Protect Sensitive Data and

Report Breaches Most states require notification of residents if

personal data is compromised and many other states are not far behind. Massachusetts 93H http://www.mass.gov/ocabr/business/identity-theft/requirements-for-security-

breach-notifications.html

Hundreds of data breaches have been reported Reporting has led to bad publicity and fines. Marriott reported the loss of 200,000 names in

missing backup tapes. Some reporting requirements are exempted if the

data was encrypted.

Page 10: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

10

ID Theft Has Impacted Millions of Americans

U.S. consumers lost billions to identity theft in 2012

ID Theft consumes time and money. Consumers are more careful with their

personal information. Vulnerable to phishing attacks As safe as the company where they used their credit

card.

IRS Criminal Investigation Targets Identity Theft Refund FraudFS-2013-4, February 2013The IRS has seen a significant increase in refund fraud that involves identity thieves who file false claims for refunds by stealing and using someone's Social Security number.http://www.irs.gov/uac/Newsroom/IRS-Criminal-Investigation-Targets-Identity-Theft-Refund-Fraud-2013

Page 11: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

Phishing Attacks Can Be Cleverly Disguised

11

Page 12: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

12

Data Thieves Actively Target Websites and Corporate

Networks

May use e-mail viruses to crack networks

Target specific applications to get sensitive data Once the perimeter security is cracked, the entire

network may be available.

Hijack remote computers to anonymously attack sites.

Page 13: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

13

Reasonable Measures To Protect Sensitive Information

Policies http://www.mass.gov/ocabr/docs/idtheft/compliance-checklist.pdf

Encryption Intrusion detection Firewalls Password protection Anti-virus programs Physical security of laptops and portable media.

Page 14: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

14

First Amendment

The First Amendment mandates that “Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press, or the right of the people to peaceably assemble, and to petition the Government for redress of grievances.”

First Amendment protects citizens from the federal government, whereas the Fourteenth Amendment applies to state and local governments

Page 15: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

15

General Guidelines

Every citizen has First Amendment Rights. It makes no difference who you are, what you do, or what you believe.

Rarely can words alone get someone into trouble. There are situations where there is a need to punish

speakers for the harm their words might cause to others, or to compensate those harmed by their speech.

Technology has created new venues for communications.

Most messages in Cyberspace qualify for protection under the First Amendment. Fire!

Page 16: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

16

Speech that does not warrant protection

Clear and Present DangerRecall the Brandenburg test…1. Speech in question must be directed to inciting or producing imminent lawless action; and2. Speech must be likely to incite or product such action

Fighting Words - Hate crimes/speech Obscenity and Child Pornography False or Deceptive Advertising Defamation

Cyberspace defamation = libel since it is written

Page 17: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

17

Other Harmful Communication May Not Be Actionable

In 2006, 13 year old Megan Meier committed suicide after receiving cruel messages from an online friend, Josh, who she met on MySpace.

‘Josh’ turned out to be the mother of a girl who lived nearby.

Law enforcement officials could find no grounds to charge the mother.

Eventually convicted by a jury for misdemeanor unauthorized access of a computer.

Page 18: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

18

Courts have Recognized the Value of Online Communication

“[the Internet is the] most participatory form of mass speech yet developed…a far more speech-enhancing medium than print.” U.S. District Judge Stewart Dalzell (ACLU vs. Reno)

Page 19: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

19

Questions to Consider

Does an internet service provider violate 1st Amendment privileges when (s)he deletes content from a website? (A user could claim that an ISP who deletes a message has acted in an unconstitutional way)

Is Cyberspace a public forum?(consider who owns the Internet - Most of Cyberspace is considered nonpublic and is privately owned; hence the owners are free to exercise editorial control over any speech in any manner.)

Can you come up with a restriction that is content neutral and is aimed at the time, place, or manner of the activity.

Page 20: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

20

Challenges to First Amendment Rights - Defamation

An unfortunate byproduct of the Internet is the rapid rise of “cybersmearing” – which is the anonymous or pseudonymous defamation on the ‘Net of individuals, companies, and corporate executives.

Cause of action – actionable defamation or other torts. Need to obtain a broad ex parte order from the court

authorizing the issuance and service of an identification-seeking subpoena directed at the ISP to reveal the DOE defendant.

Anonymous Patent Troll Tracker blog author was ‘outed’ when a patent attorney criticized on the blog

offered a $15,000 award. Blogger subsequently sued for critical postings on the site.

Page 21: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

21

Challenges to First Amendment Rights Online – Reno vs. ACLU:

Reno vs. ACLU: Community Decency Act - 1996 - attempted to ban transmission of obscene or indecent material across the Internet. Unconstitutional, overbroad.

Reno vs. ACLU - COPA Designed to limit online information that could be ‘harmful to minors’ What is the presumption for a content based restriction? Overbroad definition relying on varying community

standards.

Page 22: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

22

The First Amendment Stops at the Border

Free speech rights vary by country. Yahoo! battled in French courts to allow

auction users to sell Nazi memorabilia. Egypt blocked Internet and cell phone access

when unrest began Facebook, Twitter and Google have facilitated

communication.

Pakistan’s ISP blocked YouTube and took down the site worldwide for over a day.

Page 23: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

23

Other Domestic Challenges to First Amendment Rights Online:

Unpopular criticism: Curzon-Brown vs. San Francisco Community College District: Criticized teacher trying to shut down online “teacher review.” (www.aclunc.org).

State laws (often declared unconstitutional). American Booksellers vs. Dean, PSINet vs. Chapman - VA Code (200 U.S. Dist. Lexis 11621 08/08/2000)

Mandatory filters (schools, libraries). (Mainstream Loudoun vs. Board of Trustees of the Loudoun County Library 24 F Supp 2 d 552 (E.D. Va. 1998)

Unprotected speech: is a program that decrypts protected DVDs protected speech? (DVD Copy Control Association vs. Bunner No. H021153)

Untested laws: USA Patriot Act – school removed local link to a violent Marxist insurgency in Columbia (U.C.S.D.)

Page 24: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

24

An Expensive Lawsuit Can Also Quell First Amendment Rights

Bally Fitness Centers sued the registrant of “Ballysucks.com” and failed. Walmart was able to prevail against Walmartsucks.com in arbitration.

The Church of Scientology sued Google.com and compelled the search engine to remove links to a supposedly infringing site.

Other examples available at www.chillingeffects.org

Page 25: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

25

Is Access to Wikileaks a First Amendment right?

The NY Times published some of the same information

How about Amazon hosting, Paypal, and other sites refusing access?

Page 26: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

26

Other First Amendment domain name issues

Anti-hate groups have registered many ethnic slurs as domain names, preventing others from exploiting the words.

Network Solutions had blocked registration of the 7 dirty words. Should (naughty word).com be permitted? What about other languages and terms that are offensive to other cultures. Not a free speech issue since other registrars do not filter

obscene words.

Name.Space Inc. vs. Network Solutions: Domain names are not protected speech.

Page 27: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

27

Internet Network and Service Providers also Regulate Content

Terms and conditions of many ISPs prohibit certain content and activities.

Genuity’s acceptable use policy for the Genuity Network: It is strictly prohibited to create, transmit, or distribute…material

which: (Illegal Activity)

• Infringes I.P.• Is obscene or child pornography• Is libelous, defamatory, hateful, or constitutes an illegal threat or abuse.• Violates export control laws or regulations• Encourages conduct that would constitute a criminal offense or give rise to civil liability.

(Abuse)• ..Violates the accepted norms and expectations of the Internet community at large.• Harassment, whether through language, frequency, or size of messages.

Page 28: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

6 Strikes From the ISP: CAS

Copyright Alert System Strike 1 & 2: E-mail from ISP Strike 3 & 4: Landing page requiring

agreement not to engage in illegal activity

Strike 5 & 6: Mitigation Measures

AT&T, Cablevision, Comcast, Time Warner, and Verizon are participating

28

Page 29: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

29

Is Net Neutrality an Oxymoron?

Comcast case discussion Netflix may be slower on Comcast

networks.Should Comcast be able to charge

content providers to deliver content to Comcast customers?

Antitrust concerns?

Page 30: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

30

Filtering content: how far should it extend?

Should students be able to access:Obscene words?Obscene images?Hate speech?Bomb making instructions?Unregulated chat rooms?

How about school hosted site with student postings? Should public libraries have the same restrictions? What about employers?

Page 31: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

31

Should Hate Speech be Permitted Online?

The Internet provides hate groups with a global reach.

While membership in hate groups has declined, online sales of supremacist CDs are exploding.

Hate content in the U.S. may violate laws of other countries.

Should hate groups be permitted to recruit online?

Page 32: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

32

Blogging: Anyone Can Be a Writer Online

Blogging: an online journal or newsletter that is frequently updated and publicly available, usually reflecting the personality of the writer.

Topics span every conceivable interest and subject.

Blog searching: http://blogsearch.google.com/

Blog about Suffolk: http://anonymouslawyer.blogspot.com/2006/02/i-seem-to-have-underestimated-students.html

Page 33: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

33

Blogs May Cross The Line into Journalism

Some popular news issues came to the mainstream media due to blogs

Blog writers may be anonymous and lack the accountability of journalists.

Legal Risks: Online defamation Privacy of the poster Trade secrets revealed Mainstream journalists can enjoy some degree of

protection of their sources• Apple Case

Page 34: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

34

Blogging has opened new avenues of expression and risk

Citizens world wide have a new means of addressing political issues.

Bloggers have been jailed in the Middle East, North Africa and Asia.

Overview of blogging liability concerns: http://www.eff.org/bloggers/lg/

Page 35: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

35

What is Discovery?

“Discovery” refers to the process of compelling another party to provide information, which may include documents, during the course of litigation.

Gives litigants access to information relevant to the dispute.

Discovery requests may be very broad and burdensome, especially in business litigation.

Facebook postings and other seemingly private information can be within the scope of a discovery request. Case discussion: McCann vs. Harleysville Ins. Co. of

N.Y.

Page 36: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

36

Digital Discovery and Data Retention

Most new information is electronic. Companies need codified policies for retention

of digital and printed information or they could be overwhelmed by a discovery request.

Define retention periods based on legal, business and personal obligations.

Must follow policies carefully. Third party solutions available.

Page 37: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

37

Federal Rules of Civil Procedure For Electronic Discovery

Implemented 12/06

Rules put in place process for party to demand access to information that is claimed to be ‘burdensome to access and produce.’

Companies may have hundreds of unorganized legacy back-up tapes with year of e-mails and other information

New rules provide exceptions for good faith inadvertent destruction.

Page 38: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

38

New Rules Harmonize Electronic Discovery Practices

Attorneys involved in litigation must address electronic discovery at the earliest stage of discovery planning.

New rules provide a framework for courts and easier guidance to assist clients.

Page 39: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

39

Some Specific Requirements:

Rule 26(a)(1)(B) changes ‘data compilations’ to ‘electronically stored information’. (similar amendments to other rules)

Rule 16(b) amended to require that scheduling order may include electronically stored information.

Rule 26(f) requires parties to confer and discuss issues related to electronic information.

Rule 26(b)(2)(B) addresses the burden for data that is not readily accessible. Party receiving request must establish unreasonableness of request.

Rule 37(f) accommodates the accidental loss or destruction during a routine operation of electronic information if the party took reasonable steps for preservation. Keep in mind other changes as well. http://www.ims-expertservices.com/newsletters/nov/eddrules-111406.htm

Page 40: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

40

Courts Have Defined Expectations of Digital Discovery

“Now that the key issues have been addressed and national standards are developing, parties and their counsel are fully on notice of their responsibility to preserve and produce electronically stored information.” Judge Shura Scheindlin, Zubulake vs. Warburg Final jury verdict: $29 million.

Complying with digital discovery requests may be very expensive, time consuming and implicating. Pension Committee of U of Montreal vs. Banc of America case

discussion

Page 41: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

41

High Profile Cases Have Led to Big Verdicts

Coleman vs. Morgan Stanley: $1.45 Billion jury verdict for overwriting e-mails, failing to timely process backup tapes, failure to produce relevant e-mails and attachments.

U.S. vs. Philip Morris , 327 F. Supp. 2d 21: $2.75 Million in sanctions for failure to follow order to preserve e-mails and other e-discovery violations.

Page 42: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

42

Meta-data May Be Critical

Metadata = ‘data about data’ Metadata must remain intact:

History (date of creation and modification) Tracking (who created the document and where does it

reside) Comments and annotation.

Metadata may leave an implicating trail. Previously deleted text Comments Identity of those who worked on document Dates and times of work. Changes in date in Windows may not be the same in the

underlying DOS.

Page 43: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

Electronic Discovery Can be Very Expensive

Average may be $1-3 million Litigants need efficient data search and

management strategies Law firms bill for searches on an hourly basis

Data may not be in a common or searchable format

43

Page 44: 1 Legal Research, Issues and Practice in Cyberspace - First Amendment, Digital Discovery, Data Retention, and Digital Security Cyrus Daftary & Todd Krieger

44

Questions and Answers