OBA TECHxpo 2013

By: Peter MacDonald · August 27, 2013 · Filed Under Technology · Comments Off 


The Ontario Bar Association is hosting a 1 day convention to learn about the technical and ethical issues involved in using technology in the practice of Law.  Students members get in at practically half price, and being tech savy is a great way to set yourself apart from your cohort, and get a leg up when you exit law school,  so check it out!

Program Details

Date: Monday, September 30, 2013
Agenda 8:15 am Registration and Coffee
9:00 am – 12:00 pm Program
Location: Twenty Toronto Street Conferences and Events (OBA Conference Centre)
20 Toronto Street, 2nd Floor | Toronto, ON | M5C 2B8

lawTechCamp 2012 is Looking for Students

By: Omar Ha-Redeye · March 26, 2012 · Filed Under Technology · Comments Off 

Are you interested in the intersection between law and technology? Here’s a message from the sponsors:

After the great success we had last year with lawTechCamp,we are back again this year and are looking for people to suggest, present sessions, and volunteers.

As a refresher, lawTechCamp is a BarCamp-style communityUnConference for new media and technology enthusiasts and legal professionalsincluding bloggers, twitters, technology lawyers, social networkers, and anyonecurious about new media and the law.

lawTechCamp is all about you, the participants. We want theparticipants, to dictate what sessions are covered at lawTechCamp, and topresent them. The only thing to rememberis that topics should bridge technology and law in some way. This could meantechnology that could help in the practice of law. Or legal issues that affectthe development of technology. Last year, we had sessions on knowledgemanagement for law firms, social media and the law, IP issues, and cloudcomputing.

If you would like to present, or volunteer lawTechcamp,please go to our website.

Cyber Offence as the Best Defence

By: Omar Ha-Redeye · November 9, 2010 · Filed Under International Law, Technology · Comments Off 

Jim Geovedi has this interesting presentation from the National Defence Technology Seminar 2010:

Conrad Black and Libel Tourism

By: Omar Ha-Redeye · October 4, 2010 · Filed Under Civil Procedure, International Law, Media Law, Technology · 2 Comments 

David Canton has a column in this week’s London Free Press, where he discusses the Conrad Black case:

The case deals with Internet defamation and how to determine where to sue for it. As with traditional defamation, a party alleging Internet defamation must demonstrate they suffered damages in Ontario and also that they have a significant connection to Ontario. Where Internet defamation differs from traditional defamation is that the alleged victim must prove the statements in question targeted Ontario.

In Black v Breedan, Black brought an action for libel against directors, advisers and a vice-president of Hollinger International for statements posted on the Hollinger website. Black argued his reputation was damaged in Ontario as a result of these defamatory statements that had been reproduced in a number of prominent Canadian newspapers, such as the Globe and Mail and the National Post.

Black v Breedan is noteworthy because of the online aspect of the alleged defamation. Because anything posted on the Internet can be seen anywhere in the world, it has led to “libel tourism” – where someone who thinks they have been defamed will try to sue in whatever jurisdiction they might be most successful in, and get the highest damage award.

Black v Breedan tells us that – at least in Ontario – libel tourists are not welcome.

The case is interesting to me because it’s one of the first looking at the reformulated real and substantial connection test in Van Breda v. Village Resorts Limited for libel cases over the Internet.

The motion judge found most of the Muscutt factors favoured Black. On appeal, the Defendants submitted that the judge erred in looking at the connection of Black to Ontario, instead of the connections of the claim to the province.

The alternative positions of the two parties are best set out in the following paragraphs:

[35]     The defendants submit that treating the lex loci delicti as the place in which allegedly defamatory statements were accessed is inappropriate in the context of Internet libel. An approach that looks to where the statements were accessed, they argue, is contrary to the principles of order and fairness, leads to libel tourism and the prospect of unlimited liability and has a chilling effect on freedom of speech.

[36]     The defendants advocate a different approach to a claim for libel originating on the Internet. They suggest that the focus of the analysis of where the tort of Internet libel is committed should be on whether the defendant targeted the statements to the forum rather than where they were downloaded and read.

The Ontario Court of Appeal upheld the presumption of a real and substantial connection under Rule 17.02(g), even though the Van Breda test was not applied, and held that the Defendants did target their statements to Ontario based on press release contact info for local media. Consequently, there was a real and substantial connection between both Black and the Defendants, even if they were in a different jurisdiction.

In assessing fairness, the court noted that even though there might be difficulties with enforcement of a judgment in the U.S., a favourable ruling would have some value in vindication for Black. But the court also tied this fairness element to the libel tourism issue raised by Canton,

[86]     I agree with the motion judge that it is not appropriate to label it forum shopping or libel tourism if the party has a real and substantial connection with the forum: see Amchem Products Inc. v. British Columbia (Workers’ Compensation Board), 1993 CanLII 124 (S.C.C.), [1993] 1 S.C.R. 897, at p. 920. Further, even if the judgment is not enforceable in the United States, it is enforceable in Ontario, and there is also value in the vindication of a defamation judgment regardless of the ability to collect damages.

Although Ontario courts have resisted libel tourism in the past, Black v. Breedan also reaffirms the proposition that where a case meets the Van Breda factors this is not in fact a case of forum shopping.

Implications of Social Media in IP Law

By: Omar Ha-Redeye · July 20, 2010 · Filed Under Intellectual Property, Technology · 1 Comment 

Recent presentation by Blaine Bettinger of Bond, Schoeneck & King, PLLC

Humans only

By: Pulat Yunusov · July 14, 2010 · Filed Under Diversity in Law, Technology · 2 Comments 

If you read Arthur C. Clarke’s 2001: A Space Odyssey or saw the film, you must know who Hal is. Good. Keep that in mind while reading this. So… South Korea “deploys robots to detect and kill intruders.” I don’t want to be a scaremonger by just waving Hal in your face. Let me give you two reasons why robocops, or battle robots, or judge robots for that matter are bad from the legal standpoint.

First, robots follow programs that cannot predict all real-life possibilities. Robots lack that uniquely human ability of discretion. The best a machine can do to emulate discretion is to generate a random number. A grenade-launching machine exercising discretion would be like you loading one round in a revolver, spinning the cylinder, and pulling the trigger. Yes, it is called the Russian roulette. Especially, if you point the gun at your own head or at an “intruder.”

Second, a robot is not accountable. It doesn’t care if you appeal and have its decision overturned. If the reviewing body sends the case to a human for reconsideration why use the machine in the first place? And sometimes, the case will be moot, especially if the robot’s decision involved using live fire.

Law assumes human actors. Our entire legal system and tradition is based on this premise. Law doesn’t micromanage because it routinely delegates to human discretion. Sometimes it doesn’t strike the right balance—as with the law of street protest in Canada, but I’ll go for unsophisticated humans in uniforms over armed robots any day. Human discretion rests on a thick layer of experience, learning, feelings, values, and responsibility. If the state is to make decisions affecting our fundamental rights and freedoms, only its human agents should have this power. No robocops, please.

Pulat Yunusov

(Post sponsored by AdviceScene)

Make More, Work Less

By: Omar Ha-Redeye · May 31, 2010 · Filed Under Law Career, Technology · Comments Off 

How can you make up to 173% more as a lawyer with flexible hours?

BC Heritage Law is doing just that.

Legal and Business Issues with Social Media

By: Omar Ha-Redeye · May 26, 2010 · Filed Under Technology · Comments Off 

Privacy Issues in the Workplace

By: Omar Ha-Redeye · May 12, 2010 · Filed Under Labour & Employment Law, Privacy Law, Technology · Comments Off 

The problem with electronic books

By: Pulat Yunusov · May 4, 2010 · Filed Under Intellectual Property, Technology · 1 Comment 

I love my Kindle. I love this thin, light tablet that I can read both at the desk and in bed. I love the ease of getting new books, and I love when the fresh issue of The New Yorker downloads itself. I have read more books in the last year because of the Kindle, but I also paid more for books that I otherwise would have borrowed from the library. On the balance, I think ebooks are great and the way of the future, but we must watch out for some problems with those ebooks that use closed, proprietary formats.

Regardless of format, ebooks have some compelling advantages over traditional printed books. First, ebooks can last infinitely. With printed books, it is entirely conceivable that a rare, out-of-print edition will simply disappear because its physical form is weak and vulnerable to wear and destruction. Ebooks are easy to back up. The cost of making each additional copy is practically zero. Ebooks after all are computer files like Word documents or JPEG images. That’s why ebooks are also enormously portable. A thousand-volume paper-based library is to a thousand ebooks as an elephant is to a pet lizard. The publishing costs are also much lower for new books because authors create them in an electronic form, and there is no need to typeset them or to buy thousands of pounds of paper to print them. There is also no need for expensive brick-and-mortar stores with a large sales staff. Ebooks are sold or given away for free online. This is especially handy if a single corporation dominates your country’s printed book market. In fact, anyone can publish an ebook online potentially reaching millions at a relatively miniscule cost. Finally, think of all the trees ebooks save.

But there are serious problems with ebooks, mostly when they come in closed, proprietary formats. A closed format means that its owner (e.g. a book distributor like Amazon) controls what you can do with the book. The proprietary format owner can hide the details of how the format works making it more difficult to build alternative ebook readers. For example, opening Word documents with non-Microsoft software is not as perfect as opening them with Microsoft Word. But most text editors are equally good at manipulating plain text or HTML files, which are open formats. The ebook format owner can enforce its control with the law (e.g. patents) or technology (e.g. encryption). In some jurisdictions, it is also unlawful to circumvent encryption of proprietary-format media. Amazon protects many of the books it sells with such technology also known as Digital Rights Management (DRM).

Because many ebooks have closed formats, publishers appear to license books to readers rather than sell them. It’s easier to control use of a licensed electronic product than of printed, physical books. We can’t easily share proprietary-format, protected ebooks. You can’t just email an ebook you bought from Amazon to your friend. Amazon locks each protected book to the Kindle of the person who bought it. Your friend can’t read your ebook on his or her Kindle. It’s also harder to overcome regional restrictions. Before, if a publisher sold a book only in the US, you could still bring it to Canada. Now, publishers can make it harder through DRM. Publishers can also use DRM to control libraries or to exclude them from certain books completely assuming some books are available only in electronic format. You can’t easily photocopy a page from an ebook if it’s in a closed format. Of course, if it uses an open format and it’s not DRM-protected, you can copy any text from the book anywhere and any number of times taking full advantage of its electronic nature. In some cases, if the book is in a proprietary format, the publisher or distributor can even delete your book remotely. The closed format and the need to protect digital content also strips most buyers of their anonymity. You cannot buy a book online anonymously. Usually, the book distributor has a record of every book you purchase. This could chill freedom of thought in a future where all ebooks are in a closed format because people would hesitate to buy books seen as dangerous to their reputation.

Finally, closed formats live only as long as their corporate owners. As I was enjoying The Black Swan on my Kindle last night, I wondered what would happen to my copy if Amazon were to go under. The reading device would eventually break down, and its battery would stop functioning even sooner. I would still be able to read the book with Kindle software on my Mac, but if Amazon disappeared, its software would eventually stop working on future computers. At the end, I would be left with a useless file that no one can read.  It’s not a huge loss for a $10 book, but what if I invested $10,000 in proprietary-format ebooks? What if some books are available only electronically and only through a single distributor in the future? Is it so far-fetched? Or is it far-fetched that a large bookseller could vanish one day? With closed, proprietary ebook formats, we could end up with a single point of failure in not so distant future endangering our investment in books and our literary heritage.

Pulat Yunusov

(Post sponsored by AdviceScene)

Warman v. Fournier et al: Balancing Disclosure, Privacy, and Freedom of Expression Interests in Internet Defamation Cases

By: Matthew Nied · May 4, 2010 · Filed Under Civil Procedure, Civil Rights, Constitutional Law, Media Law, Privacy, Privacy Law, Technology, Torts · 1 Comment 

While the internet provides users with an environment in which socially valuable anonymous speech can flourish, it also provides users with an opportunity to defame others behind a shield of anonymity. If these users can be identified, they may be held liable for defamation. Unfortunately for plaintiffs, the identities of these individuals are usually known only by the website or internet service provider (“ISP”) through which the statements were made, and these entities generally decline to disclose a user’s identity in the absence of a court order compelling them to do so. Faced with a growing stream of plaintiffs who seek these kinds of orders, courts have sought to craft approaches to evaluating applications for disclosure that strike an appropriate balance between the privacy interests of anonymous internet posters and the reputational interests of plaintiffs.

Yesterday, the Ontario Divisional Court released its decision in Warman v. Fournier et al, 2010 ONSC 2126 (Div. Ct.) rev’g (2009), 309 D.L.R. (4th) 227, 76 C.P.C. (6th) 155 (Ont. S.C.J.) (“Warman”). At issue was whether the disclosure provisions of the Rules of Civil Procedure, R.R.O. 1990, Reg. 194 (the “Rules”) automatically entitle plaintiffs in internet defamation cases to obtain the identifying information of anonymous posters from websites and ISPs, or whether courts must balance the interests of plaintiffs with the freedom of expression and privacy interests of anonymous posters. The decision is now the leading authority in Ontario for the proposition that the objectives of the disclosure obligations under the Rules must be balanced with the right of freedom of expression in internet defamation cases. This article discusses the background, holding, and implications of Warman.

1. Background

The Respondent commenced an action against the Appellants, the operators of an internet message board, and eight anonymous message board participants with respect to a series of allegedly defamatory postings. After commencing the action, the Respondent brought a motion for an order compelling the Appellants to comply with Rule 76.03 of the Rules which required the Appellants to file an affidavit of documents that disclosed the email and internet protocol (“IP”) addresses of the anonymous posters in order to allow the Respondent to identify the posters and serve them with the statement of claim.

The motions judge rejected the Appellants’ submission that the Respondent was required to establish a prima facie case of defamation before disclosure could be ordered. Instead, Justice Kershman concluded that Rule 76.03 of the Rules required the Appellants to disclose all documents in their power or control and that such disclosure should be automatic upon the issuance of a statement of claim because the information was relevant and not protected by privilege.

This decision stood in stark contrast with earlier cases that offered some protection to the privacy interests of internet users by requiring plaintiffs to demonstrate a bona fide or prima facie case of defamation before ordering disclosure (see: previous posting). The motions judge distinguished these cases on the basis that the Respondent was seeking to compel the Appellants to follow the Rules as required by named parties to the action, whereas the other cases involved discretionary orders for the production of documents from third parties.

2. Holding on Appeal

The Divisional Court unanimously allowed the appeal and remitted the matter to a different motions judge for re-consideration, recognizing that the anonymous posters’ right of freedom of expression under the Charter should have been taken into account in considering the Respondent’s request for disclosure under the Rules. Moreover, the Court noted that the posters’ express decisions to remain anonymous gave them a reasonable expectation of privacy that weighed in their favour.

In rejecting the notion that disclosure should be automatic, the Court also expressed concern for the ease by which a plaintiff could abuse the Rules by filing claims in a spurious manner simply to identify an anonymous poster:

If disclosure were automatic, a plaintiff with no legitimate claim could misuse the Rules of Civil Procedure by commencing an unmeritorious action for the sole purpose of revealing the identity of anonymous internet commentators, with a view to stifling such commentators and deterring others from speaking out on controversial issues. For this reason, the commencement of a defamation claim does not trump freedom of expression or the right to privacy.

[Warman, at para. 33]

After surveying previous decisions, Justice Wilton-Siegel set out four considerations, aimed at preventing abuse of the Rules and respecting the privacy of internet users, that should have been considered by the motions judge in deciding whether to order disclosure under the Rules

[Warman, at para. 34]

In concluding that plaintiffs should be required to meet a prima facie standard rather than a lower bona fide standard, the Court emphasized the importance of protecting freedom of expression and noted that there was no concern that the higher standard would deprive applicants of a remedy:

In para. 34 of BMG [2005 FCA 193], the Federal Court of Appeal expressed the concern that, in that case, imposition of a prima faciecase standard would effectively strip an applicant of a remedy because the plaintiff could not know the actual case it wished to assert against the defendants until it knew not only their identities but also the nature of their involvement in the [internet] file-sharing activities. Because the present proceeding is a defamation action, that concern does not arise. Unlike BMG, the respondent knows the details of precisely what was done by each of the unknown alleged wrongdoers. 

In addition, because this proceeding engages a freedom of expression interest, as well as a privacy interest, a more robust standard is required to address the chilling effect on freedom of expression that will result from disclosure. It is also consistent with the recent pronouncements of the Supreme Court that establish the relative weight that must be accorded the interest in freedom of expression. In the circumstances of a website promoting political discussion, the possibility of a defence of fair comment reinforces the need to establish the element of defamation on a prima facie basis in order to have due consideration to the interest in freedom of expression. On the other hand, there is no compelling public interest in allowing someone to libel and destroy the reputation of another, while hiding behind a cloak of anonymity. The requirement to demonstrate a prima facie case of defamation furthers the objective of establishing an appropriate balance between the public interest in favour of disclosure and legitimate interests of privacy and freedom of expression.

[Warman, at paras. 41 – 42]

3. Implications

Warman represents an important recognition that while internet users’ anonymity ought not to be protected absolutely, the mere commencement of a defamation action should not give rise to an automatic entitlement to information identifying a previously anonymous poster without a consideration of the interests of privacy and freedom of expression.

Nevertheless, there is still uncertainty with respect to the degree of protection that courts will afford to anonymous posters in the future. Under Canadian law, plaintiffs have two ways to seek disclosure in internet defamation cases. Apart from identifying anonymous defendants by seeking pre-action discovery or production of relevant information under procedural rules, as occurred in Warman, plaintiffs may also bring independent actions for disclosure of the identity of anonymous defendants by way of an equitable bill of discovery known as a “Norwich order”. Norwich orders were introduced in the decision of the House of Lords in Norwich Pharmacal Co. v. Customs and Excise Commissioners, [1974] A.C. 133 (H.L.) in which it was held that where a third party becomes involved in the tortious acts of others, that third party has a duty to disclose the identity of the tortfeasor so that the plaintiff may pursue its remedies. The Norwich factors were recently confirmed by the Ontario Court of Appeal in GEA Group AG v. Flex-N-Gate Corporation, 2009 ONCA 619 and applied in the internet defamation context by the Ontario Superior Court of Justice in York University v. Bell Canada Enterprises (2009), 311 D.L.R. (4th) 755 (Ont. S.C.J.) (“York University”): 

[York University, at para. 13]

Although the second and fourth Norwich factors were not relevant in Warman because they apply only to third party respondents rather than co-defendants [see Warman, at para. 39], some of the other Norwich factors are similar to the considerations set out in Warman that are now applicable to the question of whether a court should order disclosure under the Rules. However, an important difference remains. While the approach under Warman requires plaintiffs to demonstrate a prima facie case of defamation, Norwich jurisprudence has required plaintiffs to meet the lower bona fide standard. For example, even though the plaintiff in York University managed to establish a prima facie case of defamation, the court did not require the plaintiff to demonstrate more than a bona fide case. Although Warman provides compelling reasons to prefer the higher prima facie standard where the plaintiff seeks disclosure through a Norwich order, it remains open for courts to require plaintiffs to meet the lower standard instead.

Originally posted on Defamation Law Blog

Cloud computing tips for lawyers

By: Pulat Yunusov · April 29, 2010 · Filed Under Privacy, Technology · 1 Comment 

Cloud computing is one of the best technologies we’ve had in the last decade. It gives us mobility, versatility, security, and powerful ways to manipulate our data. It’s also cheap. Because it’s rooted in the Internet, some express legitimate concerns with cloud computing, mostly centred around data security and privacy. Lawyers may be particularly cautious to deploy clients’ data in the cloud because of lawyers’ unique responsibilities and duties. But a careful look at cloud computing shows that it’s safe for both the general public and lawyers. Its benefits greatly outweigh its costs and some of its features are so compelling, time-saving and economical that every lawyer should be considering cloud computing.

Cloud computing means keeping and processing your data online. For example, in Gmail, you read and write email in your browser’s window, but Google’s servers take care of storing, sending and receiving messages for you. Google Docs lets you do the same thing but with word processing. Ufile.ca handles your tax returns. Amazon S3 gives you unlimited file storage in Amazon data centres. All social media sites like Facebook, Twitter, LinkedIn, Youtube, Flickr, etc. are also examples of cloud computing. Whenever you delegate data storage and processing to a third party that grants you online access, you do cloud computing. “Cloud” means that the specific physical server on which the provider keeps and processes your data is obscure to you. All you care about is the Internet address of the provider and your own access credentials. Into the “cloud” goes some input, and out of the “cloud” comes some output. That’s how it works.

Benefits of cloud computing are enormous. I can think of ten: 1) you can access your data anywhere with an Internet connection; 2) you don’t have to troubleshoot or upgrade any software other than the access application, which is usually your browser; 3) instead of paying large sums for desktop software and its upgrades, you get a free or low-subscription-fee cloud service; 4) you subcontract data storage to professionals; 5) the cloud can give you a regular, frequent, and professional backup solution; 6) cloud services can come with search and data crunching capabilities that are unparalleled simply because of the massive cloud computing infrastructure; 7) cloud backup services can automatically keep previous versions of your data in a way that is unmatched again because of inadequacy of your home or office infrastructure; 8) the cloud can protect your data from undesired jurisdictions or it can keep the data in specific jurisdictions; 9) the cloud makes it easy to share any part of your data with chosen parties and to control their access; 10) the cloud lets you tap into social networks of billions of people.

But some have legitimate concerns with the cloud. And lawyers are among those voices as members of the legal profession have unique responsibilities and duties. There are two main attributes of cloud computing that cause people to worry. First, you appear to lose control over your data’s physical location. And second, you expose your data to the Internet apparently swarming with hackers (“cracker” may be a better word), spies, thieves, and viruses. All alleged issues of privacy, security, and reliability stem from these two things. Often, critics assume that keeping data and applications on home or office computers is a safe alternative. This assumption is probably the biggest fallacy in the cloud computing debate. Let’s review some solutions to issues associated with cloud computing. Read more

Next Page »