Saturday, January 29, 2005

6:30 Dinner Tonight--Cuban Food

We're going to have an informal gathering for dinner tonight. Elizabeth Bowles and her husband recommended a Cuban restaurant on California St. they ate at the other night. We're probably going to try that restaurant. Meet in the lobby of the Sheraton at 6:30.

An example of the Bayes Principle in Action

From the Wired article mentioned below. This sums it up pretty well:

In the language of statistics, Bayes' theorem relates phenomena observed in the present (the evidence) to phenomena known to have occurred in the past (the prior) and ideas about what is going to happen (the model). Mathematically, the formula is represented as


P(yt)P(t)
P(ty) = --------------
P(y)

For nonmathematicians, understanding the implications of the theorem without recourse to real-world metaphors is difficult. So imagine a short-order cook working in a busy café. In a din of conversation, clattering plates, and street noise, the waiters dash by the kitchen counter, shouting orders. What a customer actually ordered is t in the above equation. The garble the cook hears is y. A Bayesian decision process would allow the beleaguered chef to send out as many correct orders as possible.

He has some prior knowledge: Few customers order the smothered duck feet, while the steak frites is a perennial favorite. The cook can use information like this to calculate the prior probability that a given dish was ordered: P(t), or the probability of t. He also knows that one waiter tends to mispronounce any dish with a French name, that a bus roars past the restaurant every 10 minutes, and that the sizzling sounds from the skillets can obscure the difference between, say, ham and lamb. Taking these factors into account, he creates a complicated model of ways the orders might get confused: P(yt), the probability of y, given t. Bayes' theorem allows the chef to chain the probabilities of all possible influences on what he hears to calculate the probability, P(ty), that the order he heard was for the dish the customer chose.


It's pretty easy to see how this type of model could be helpful in constructing an application that could learn what's Spam and what's not Spam.

Who's This Guy Bayes Anyway?

At the SPAM working group, we spent a few minutes discussing the difference between a Turing Test and a Baysian filter. Here are some background articles that might be helpful.

The Quest for Meaning
In 2000, Wired Magazine ran a great article on the efforts of a UK company called Autonomy and how they were using the ideas of Reverend Thomas Bayes to build a next generation tool to extract meaning from unstructured text data. It's a good article.



The Turing Test

Snipped from http://cogsci.ucsd.edu/~asaygin/tt/ttest.html#intro. The Turing Test was introduced by Alan M. Turing (1912-1954) as "the imitation game" in his 1950 article (now available online) Computing Machinery and Intelligence (Mind, Vol. 59, No. 236, pp. 433-460) which he so boldly began by the following sentence:

I propose to consider the question "Can machines think?" This should begin with definitions of the meaning of the terms "machine" and "think."

Turing Test is meant to determine if a computer program has intelligence.

Many Spam Filters use a challenge response system to weed out automatically generated email messages. They respond with a challenge that can only be met by a human, thus defeating automated email programs that generate Spam.


Survey Ideas

By brainstorming with several of the members of different Subcommittees we've devised the following list of topic ideas for the Survey. Please add to the list. The general idea is to create Survey articles this year that a more broad than they are deep and that provide general business law practitioners with an update on developments in key areas of Cyberspace Law. Space is limited, and we'll need to narrow down the field quite a bit.

See me to talk about these topics.

Internet Law
  • eDiscovery developments (Zubulake and new federal rules of ediscovery)
  • J. Westermeier's (sp?) Computer Law Roundup
  • Internet Taxation (Moratorium extension and state taxation of Internet sales of goods)
  • EU Tax issues Electronic Voting

Privacy and Security

  • Disposal rules for consumer data (SEC, FTC, FDIC)
  • FACTA
  • State Roundup (e.g. California update on the new mandatory disclosure of security threats, SB1, etc.)
  • RFID (passport technology, Walmart, etc.)
  • FBI Abandoning Carnivore
  • Phishing
  • Case on ECPA (transient memory)
  • HIPAA Security Regs


Financial Services Issues

  • Check 21
  • Electronic payment systems
  • Phishing
  • Fin Srvcs patents


Intellectual Property

  • File Sharing (Grokster, Bittorrent)
  • Jay Monahan speech
  • Adware/Spyware update


CAIT

  • Spam Updates (German decision, Suits and criminal prosecutions,
  • Regulatory landscape for VOIP
  • Technology export
  • Electronic monitoring of employees
  • Advertising issues (?)


International

  • UNCITRAL developments
  • Recent defamation claims in UK; competitors
  • Arrest of Amazon guy in India
  • EU Data Privacy Developments (Set 2 of Model clauses, Work Group decisions)
  • EU Taxes

Friday, January 28, 2005

Global Jurisdiction and e-Commerce Subcommittee

The Internet Jurisdiction and Global eCommerce group met on Friday, January 28. Posted by Hello


The group discussed several topics, and John Gregory has produced a very detailed account of their activities. To review the detailed notes, you can access the summary here. The topics included:
  • Cross-border investment transactions – risks and solutions
  • Developments in the law relating to jurisdiction
  • VoIP – international regulation

Internet Law Explores the Esoterica and Risks of Using Email for Formal Communications

The Internet Law Subcommittee had a very well-attended meeting that included a lot of heat and light. Hank started the meeting with a description of a general problem--that there are numerous technological barriers to using email for formal communications--and launching a discussion of how to deal with the problem.

The list of technical problems included:
  • Filtering technologies that deal with spyware, adware, and spam
  • Blacklists of certain mailservers
  • Companies that require outgoing spam filters (recipients or recipients domains must be on a "whitelist")
  • Anti-virus software
  • Proposed changes
  • Firewalls
  • Technology that ads "signatures" or "footers" to outgoing email messages that state the email can't form a contract

The group then explored the impact of these technological barriers in the following contexts:

  • Contract formation
  • Notices of termination, default, etc.
  • Court filings
  • Ethical obligations to inform clients of certain events
  • Communications with co-counsel

Some of the solutions (a start on a list of best practices) the group identified included:

  • contract clauses that email is never an acceptable form of notice
  • contract clauses that override the presumptions in UETA and require acknowledgement of emails (but what does "acknowledgement mean? Does my "Out of Office" message constitute acknowledgement?)
  • use of technologies (like Web Bugs) to track receipt

The group also pondered several other issues:

  • Is UETA already outdated on this subject?
  • Can we describe these issues by creating a continuum of communciations that are more or less suitable to email as the means of transmission?
  • How significantly business people rely on email for all of their communications and how they are very reluctant to do anything in paper form (who has envelopes anymore?)

This discussion will likely blossom into a program idea.


Open Group and Transferable Records and Connectivity Join Forces

The Open Group joined with the Transferable Records group and the Connectivity group to discuss common issues. The Open Group gave an interesting presentation on their current and recent efforts. [A copy of the slides will be posted here soon!]

The discussion led quickly to the technology and legal intersections that are being dealt with in the transferable records (and electronic chattel paper) world. Many ideas -- few authoritative conclusions. Oops -- we don't even know what Authoritative means.

And so it goes...

Spring Meeting Deadlines

The ABA Business Law Section Spring Meeting is scheduled for March 31 to April 3rd in Nashville, TN.

Please note the following deadlines:

February 11
Early Registration

February 16
Materials Deadline


March 8
Hotel Registration Deadline

March 11
Advance Registration and Refund Deadline

March 18
Program materials available on the Web

The February 16 Materials Deadline is really a DEAD line. Talk to John Lunseth if you have questions about your materials.

ABA Cyberspace Intellectual Property Subcommittee

ABA Cyberspace Law Committee

Friday afternoon we will be jumpstarting our "open source" project and perhaps refocusing it or combining forces with other subcommittees and working groups.

Saturday morning co-chairs Eric Goldman and John Ottaviani will discuss their "top 10" Cyberspace IP decisions of 2004, with a number of honorable mentions. Mark Lemley and Jay Monahan touched on a number of these in their presentations Friday morning.

The remainder of the time Friday and Saturday will be spent brainstorming potential new projects and sending people off to start working on them.

Feel free to join us in Room 272!

Vince Polley speaks at the Opening Plenary


Vince Polley -- Grand PooBah of the Committee, speaks to the plenary session of the CLCC WWM on January 28, 2005

Vince pointed out that membership continues to grow -- we are currently at 1660 listed members in the Committee, an increase of 20% over the last year.



Candace Jones then updated us on the committee's primary information repository on all of our various and sundry project -- the "MATRIX." (No, not the Matrix.) She reminded all of the group leaders that they MUST get updates on their respective matrix entries to her regularly and quickly after the meetings. Please help us in this regard, because the Project Matrix is one of our primary resources when recruiting new members.

Get the "Passionate User" Perspective on TiVo

Check out the PVRBlog for the passionate user's perspective on TiVo and its competitors.

Matthew Zinn of TiVo


Matthew Zinn, General Counsel of TiVO speaks to the CLCC WWM plenary session, January 28, 2005.

Matthew gave us an overview of the TiVO technology, relating it to how the DVR industry is changing much of the landscape that our clients will be facing in the coming years. TiVO is moving it's technology to be able to use combinations of traditional broadcast/cable/satellite content providers as well as content that will be delivered through broadband connections. This will allow for personalized delivery to individual users. Among other things, this allows for micro-audiences that might not be able to justify a traditional TV channel (even in the brave new world of "57 Channels (and Nothing's On)").

The new broadband services, if they are to be commercially viable, pose numerous technology and legal challenges. The size of the files, and the need for big pipes, and the need to make 'ordering' easy enough for "anybody's grandfather" to order the shows, make the technology a bit of a challenge -- but not insurmountable. iTunes has shown how it might be done in the music world, so there are business models out there that can offer guidance. Any legal regime will probably have to deal with content owners' demands for DRM and/or encryption. (Digital Rights Management is really an expression of a user's rights in the content, which requires encryption as well as a control mechanism.) There will need to be an anti-piracy method. Patent-holders will certainly come out of the woodwork once this gets released, and the company needs to have a method to address this concern as well (which led to the interesting turn of phrase, the "patent terrorist").

Posted by Hello

More on City of Heroes

The EFF has a copy of the complaint and the motion to dismiss in the City of Heroes case I asked Professor Lemley about during his presentation.

Here's a good summary of the case by Fred van Lohmann.

Jay Monahan from eBay Speaks


Jay Monahan, Deputy General Counsel for eBay and primary IP counsel for the company, followed Prof. Mark Lemley. A copy of his slides from the presentation are posted here.

His first discussion concerned the problems that eBay has with automated robotic access to the eBay system, and how that has a direct economic impact on eBay users because of slow-downs on the eBay systems. The primary 'weapons' that they have been using are
  1. Technology -- helps, but not a panacea. IP addresses are easily changed, robots are getting better at hiding themselves, and the bot users are smart. There are some successes at using rate limiting filters, and GIF blocking (the fuzzy little pictures you see on a sign-up screen -- bots can't read them very well).
  2. Breach of Contract -- To get any account, one must agree upon a user agreement. This has been their best tool to date.
  3. Statutory -- The federal CFAA has been somewhat useful, given that it has a fairly broad definition of damages that trigger the law (but still need to meet the $5000 threshhold). There are state statutes that parallel the federal act -- in particular, California Penal Code Section 502(c), which has a much lower threshhold of entry, and allows for attorney fees as well (and there is a civil action under the statute as well).
  4. Common Law Trespass to Chattels -- the primary case is eBay v. Bidder's Edge. Court found that use of capacity and THREAT of future harm was adequate. eBay given an injunction. This line of analysis has been followed by others. Register.com vs Verio 356 F.3d 393 (2nd Cir 2004); Ticketmaster v Tickets.com (2004 L.L> 21406289 ( C.D. Cal) (court determined that there was insufficient showing of damage, using Bidder's Edge analysis); Intel v. Hamidi (30 Cal. 4th 1342 (2003).
The second primary issue Jay discussed is users who offer infringing items on the eBay system. eBay takes some actions to reduce the problem, but it does not purport to be an expert. There is less certainty in Europe. In the USA, the DMCA takedown process has been used frequently and successfully by eBay -- they have started actively monitoring their own site to police as well, but there is some discussion of how this alters the risk scenario. The company has set up a detailed process and procedure to deal with takedown demands.

Jay also discussed eBay's experience in the Hendrickson cases. An author complained about eBay's sale of unauthorized copies of a documentary about the Manson family. eBay agreed to follow its take down policy, but they asked the author to identify the infringing goods. The author refused and said it was eBay's obligation to find the infringing goods. The court ruled in eBay's favor and held that eBay wasn't required to monitor, the act of monitoring wouldn't expose eBay to liability, and that eBay was entitled to DMCA immunity. Hendrickson also sued eBay for Lanham Act violations alleging trade dress infringement. The court held that the sole remedy for the alleged claims was an injunction and because eBay had already removed the infirnging items, there was no need for court action.

Jay's presentation then routed through a summary of the recent history of DMCA cases, including Ellison v. AOL, and Corbis v. Amazon (December 21, 2004, DC WD Wash.).

The third problem is based on how eBay users can give each other ratings as sellers and buyers. The targets of these ratings will sometimes feel they have been defamed in the process, and will sometimes attach eBay for their damages. The Communications Decency Act 47 U.S.C. Section 230(c)(1) has been eBay's primary tool in this arena. In Stoner v. eBay -- a plaintiff sought damages on behalf of an uncovered class of all of humanity over eBay's alleged assistance in infringements of Led Zeppelin recordings -- the court tossed the case on CDA grounds. In Grace v. eBay, the California local court gave eBay a good CDA analysis, but the Court of Appeals gave an unfavorable reading of the CDA -- the Cal. Sup. Ct then de-published the Court of Appeals decision, so the issue has been left open.

The defamation concerns get more twists and turns once the defamed party comes from outside the USA. eBay has created a form 'remarkably similar' to a DMCA takedown notice, and has offered this mechanism to its non-USA users to ask for a takedown. So far, the process has worked well for the company.

The fourth issue for eBay is how users of their affiliate company PayPal will use the PayPal service to accept payments for illegal products. The Perfect 10 v Visa case (Dec 3, 2004 USDC N.D. Cal) has decided that Visa's connection to the allegedly infringing site was "too attenuated" to pose liability on Visa's part acting solely as a credit card merchant. Not enough to just show economic influence" over the infringer.

The fifth issue discussed was how competing auction sites use the "bay" phrase, and eBay's successes in that area. These are typically litigated under traditional trademark infringement tools.


Posted by Hello

Realtime Chat at WWM -- screen names listing

If you're interested in chatting with colleagues, please list your screennames here.

Vince Polley can be reached using vip54law (for AIM users) and vpolley@hotmail.com (for MSN users).

MSN
McGuire: msn@emcguire.com (don't use it for email)
Polley: vpolley@hotmail.com
Fleming: mfredric@hotmail.com


AIM
Steve Gold: sgold664
Vince Polley: vip54law

Add your screennames as comments to this posting?

UPDATE:

MSN has a new Webmessenger tool that allows anyone to join an MSN chat.

Prof. Mark Lemley speaks


Professor Mark Lemley of Stanford Law School kicks off our group's opening session.

Mark discussed the current controversies surrounding use of trademarks in the mechanisms behind targeted advertising systems -- where a set of keywords are used to trigger advertising responses. He laid out the diverging court views on whether or not this is even a trademark 'use' in the first place -- where it's not even a 'use' in the first place, one need not even step into the trademark infringement analysis. For sake of argument, if one presumes that this process steps into the 'use' realm, Mark suggested that there is not necessarily a single answer, but that a traditional set of trademark principles should apply to the analysis. "Just as I can set my bottle of generic Ibuprofen next to the bottle of Advil on the retailer's shelf..." He made clear that just as there are legitimate uses of other's trademarks (e.g., in the world of comparative advertising), there are just as well non-legitimate uses of other's marks (e.g., ads designed to intentionally confuse consumers).

This led to a discussion of the principles of initial interest confusion. Mark asked us to remember the differences between a situation where a consumer driven across town to retailer A where they really wanted to find retailer B versus the internet. In one case, the consumer may have invested enough in the initial visit to prompt her to just buy at the first store and miss the second store. In the other, the consumer merely needs to hit the back button. The People Eating Tasty Animals case which allowed the PETA organization to stop the use of the peta.com domain name under a concept of initial interest confusion. Mark suggested that the analysis failed to look for any essence of consumer "confusion," and stopped at the point of finding 'initial interest.'

Mark also asked us to ponder the points of liability -- contrast the advertisers versus the publishers (or, the search engines in this instance). The risks that the search engines have in this area have led the primary engine companies to set up rather bold policies of taking down once a complaint comes in. He suggested that this has something of a chilling effect on the advertising community, particularly because the status of a protected trademark is hardly a black-and-white question (worsened once we have to start looking at trademark legal systems outside of the USA, since different jurisdictions will provide different answers).

Welcome to the CLCC Winter Working Meeting for 2005!


The early morning mingling begins on Friday -- We're all ready to go! Posted by Hello

Dinner Tonight

The Committee dinner tonight at Il Fornaio (520 Cowper Street, 650-853-3888; map) is sold-out. You'll note that the restaurant also is about a 30 minute walk from the hotel. Those of you not going to Il Fornaio might want to check out one of my two all-time favorite area restaurants, MacArthur Park (650-321-9990), which is beside the train station behind the hotel, and all of 150 yards away.

We have VOIP Phones!!!!!

Lennie Nuara worked with his client Vonage to allow us to all play with some VOIP phones. There are 3 of them located throughout the meeting space. Feel free to play.

Thanks Lennie. Thanks Vonage.

WiFi Works (Thanks Jim)

Wifi is working in the main room. We'll extend the repeaters shortly to cover as much of the law school area as we can.

Weather today; Walking to/from the Law School

Bring an umbrella today (Friday), and *DO* plan to take the bus to the Law School. However, armed with an umbrella you'll be able to make the 30-minute walk back to the hotel if the shuttle bus doesn't match your schedule or needs. Current Palo Alto weather forecast calls for light rain.

Remember, busses leave this morning at 7:30. A map of the Campus is here.



Thursday, January 27, 2005

Whither Internet Explorer

So far, only 87% of our visitors are running Internet Explorer. The remainder are running Firefox or Apple's Safari.

Read the cover story on the latest issue of Wired about the birth and rapid growth of the new Firefox browser. Ahem....note the Minnesota connection.

Download Firefox. Just try not to download it using our WiFi connection at Stanford. You'll consume too much bandwidth.

UPDATE:
Warren Agin has the Firefox file on a USB Flash Drive.

View Statistics About Who's Visiting the Blog

Statcounter provides free counters for Web sites and Blogs. If you'd like to see the statistics on who's visitig the Blog, you can view various statistics here. You can view who's visiting by:

Wednesday, January 26, 2005

Map of Area Around Law School

Here (pdf) is map of the Stanford campus. The Law School is at grid coordinates I-8/9. Remember, don't try to park. We hear it's impossible. That's what the shuttles are for.

View Pictures of the Recent Cyberspace Excellence Award Winners

Click here to check our pictures of our recent winners of the Cyberspace Excellence Award.

Meeting Schedule

Here are the schedules for the meetings on Friday and Saturday

Tuesday, January 25, 2005

Really Cool Local Guests

This year, we're taking advantage of our location and have invited guest speakers that will surely catch your attention. Friday morning we'll hear from Mark Lemley of Stanford Law School, Jay Monahan, Deputy General Counsel to eBay, and Matthey Zinn, General Counsel to TiVo.

I'm dying to learn how I can get bumped up in the queue for my upgrade to the latest TiVo version so that I can play with TiVoToGo. Maybe we can learn a few tricks from Matthew while he's with us. And hey, they gave away free TiVos to Comcast customers a few weeks ago, maybe they'll have a few left-overs.

Shuttles from Hotel to Law School

UPDATED
Because parking at the Law School is nearly impossible, Jackie has arranged shuttles that will transport us from the hotel to the Law School and back again.

There will be two shuttles leaving the hotel at 7:30 am on Friday and Saturday and traveling to the law school. Shuttles will also pick up and return to the hotel at the end of each day of the meeting and will bring people to and from the Committee Dinner on Friday night

Monday, January 24, 2005

Agendas for Subcommittees at the Winter Working Meeting

Check out the LawHub for more detailed information and agendas for many of the subcommittees meeting at Stanford this weekend.

Take A Train from San Fran Airport to Palo Alto

If you want to take the train from SFO to Palo Alto, you can do so simply and inexpensively. Exit the terminal at SFO, following the signs to the AirTrain. Domestic Terminals 1, 2 and 3 each have an AirTrain station located on Level 5 of the Domestic Parking Garage. To access Terminals 1's station, take the elevators/escalators down to the tunnel connector to the parking garage. Terminal 3's station connects to the terminal via a passenger skybridge. Take the elevators/escalators to Mezzanine-Level 3. Take the AirTrain (free) to the Garage for International Terminal G and the BART (Bay Area Rapid Transit) station. For more specific information, go to http://www.flysfo.com/guide_nonflash/airportinfo/AirTrainBrochure.pdf .

Buy a ticket on BART at the kiosks near your exit from the Air Train. The fare to Millbrae is $1.50 each way per person. Buy enough credit for a round-trip ($3.00) ticket. Proceed through the BART entrance gates and down the escalator to the BART platform for Millbrae. Take the BART train to Millbrae.

At the Millbrae station, go over the CalTrain tracks and, before descending to ground level, buy a ticket at the vending machine. You will need a 2-zone ticket ($3.00, Senior/Disabled/Youth fares are half-price). Descend to ground level and take the next CalTrain southbound to Palo Alto. Disembark at the Palo Alto station. The Sheraton (a garden hotel) is southeast of the station, in the area bounded by the CalTrain tracks, University Avenue, and El Camino Real, as shown on the attached map. Simply walk across the street, enter the hotel through one of the side entrances, and proceed to the lobby.

Stanford University covers the area on the other side of El Camino Real. The Stanford Shopping Center (a major regional shopping center including national chains, such as Macy's, Nieman Marcus, Nordstrom's, et al.) is on university property.

If you have free time and want to visit San Francisco, you can take CalTrain all the way into San Francisco, to the station at the end of the line at 4th and King (near the Giant's stadium), cross the street, and take the Muni (streetcar) into downtown San Francisco or out to Fisherman's Wharf. Alternatively, take CalTrain to Millbrae, switch to BART, and take BART into downtown San Francisco.

For more information, check www.bart.gov <http://www.bart.gov/> or www.caltrain.org <http://www.caltrain.org/> , where you can find fare information, schedules, system maps, and more. For additional information about public transportation around the Bay Area, including inter-system travel and the ferries, check www.511.org <http://www.511.org/> .

[Information courtesy of member Tony Vittal]

Information About our Hotel

We're staying at the Palo Alto Sheraton.




General Directions (From the Hotel Web site)

From East

Take Highway 101 South to Embarcadero Road West. Proceed approximately two miles and turn right onto El Camino Real. The hotel is located three blocks down and on the right side.

From San Francisco International Airport

Take Highway 101 South and exit onto Embarcadero Road West. Proceed approximately two miles and turn right onto El Camino Real. The hotel is located three blocks down on the right side.

From Norman Y. Mineta San Jose International Airport

Take Highway 101 North and exit onto Embarcadero Road West. Proceed approximately two miles and turn right onto El Camino Real. The hotel is located three blocks down and on the right side.

From West

Take Interstate 280 East and exit onto Page Mill Road East. Proceed approximately two miles and turn left onto El Camino Real. The hotel is located two miles down and on the right side




Privacy Policy

We aren't planning on collecting any personally identifiable information about visitors to the Blog. However, the host (Blogger) may collect information about visitors and site traffic, and we are using a free statistics/counter service (StatCounter) to track information about visitors to the site via cookies and other commonly used methods to track things like (a) the public or company networks people have been using when they accessed the Blog, (b) what Web sites have been used to link to the Blog, (c) the IP address of visitors, and (d) other information about your computer (resoultion, operating system, etc.). To the extent we do collect any personally identifiable information about you (via the Comments feature, for example), we promise to treat it like we would want our own information treated. You'll have to look to Blogger and StatCounter's privacy policies to learn how they may treat your data.

Blogger Privacy Policy

StatCounter Privacy Policy

Prepare for Cold Weather and Rain

The weather reports call for temps in the 40s to 50s, with 30 - 40% chance of rain both Friday and Saturday.

[For the record, the forecast for Minneapolis only about 20 degrees cooler. And, we could have gone sledding. Once again, we should have gone to Minnesota for the Winter Working Meeting! Oh well, there's always next year.]

Electronic Financial Services Subcommittee Agenda

At the Winter Working Meeting we intend to follow-up on the lively open forum that we had at last year’s Fort Lauderdale meeting to discuss developments of interest throughout the area of electronic financial services. The discussion at the Fort Lauderdale meeting spurred the Getting Paid in the 21st Century program that was presented at 2004 Annual Meeting. We look forward to this portion of the program as an opportunity to exchange knowledge and ideas and inquiries on what’s new and what’s going to happen next in the areas of law, regulation, litigation, technology and product development, as well as an opportunity to identify and launch new projects.

The EFS program will also spotlight several areas which have been the focus of significant activity during the last year.

Check 21

The implementation of Check 21 is a major milestone in the move from paper to an electronic world. Sarah Jane Hughes will lead a discussion of the issues that Check 21 raises for depository institutions, merchants and consumers. We will consider whether the Subcommittee should pursue Check 21 related projects, such as consumer education materials.


Gift Cards

Both open and closed system gift cards continue to grow in popularity and to attract increasing attention in the legislative, regulatory and judicial arenas. EFS Subcommittee members Judith Rinearson and Chris Woods just published an article on the merchant perspective on gift cards titled “Beware Strangers Bearing Gift Cards” in the November/December issue of the Business Law Today [No Link Available Yet]. Judie will discuss recent developments in this area.


Stored Value Card Regulation

A major development in the federal regulation of stored value cards is pending with proposed regulations issued by two federal banking regulatory agencies. We will consider the FDIC’s proposal to clarify the deposit insurance treatment of stored value cards as well as the Federal Reserve Board’s proposal to apply Regulation E to payroll cards. We will also discuss the OCC’s guidance on payroll cards.

Robert Ledig
202 639-7016
ledigro <@> ffhsj.com

Current Committee Project Matrix

View the current Project Matrix for the Committee at the Cyberspace Law Hub.

NIST "voices" concerns over security of VOIP

We're planning to have some VOIP equipment at the Winter Working Meeting so that we can all explore the technology and have a better factual grounding for our conversations at the meeting. It is perhaps appropos that the National Institute of Standards and Technology recently issued a reported entitled "Security Considerations for Voice Over IP (VoIP) Systems." The report is available at the NIST Computer Security Resource Center, http://csrc.nist.gov/publications/nistpubs/#sp800-58.



Friday, January 21, 2005

We will have Wi-Fi

Michael Fleming has managed to work magic with the Stanford IT department. They have agreed to let us create our own Wi-Fi cloud using our own equipment at the Law School. We're not sure that we'll be able to have coverage for all of our meeting rooms, but we will have coverage at the law school.

Several of us were planning to bring our own Access Points, but Jim Frey of the ABA (our technology buddy) has agreed to bring ABA equipment and help us get things running smoothly. We'll be there early Friday morning to set things up. I'm sure there'll be a glitch or two, so be patient if the network isn't up and running right away.

Thanks to both Mike Fleming and Jim Frey for all their hard work. Thanks also to the Stanford IT guys who made it happen.

Thursday, January 13, 2005

How to Register for the Winter Working Meeting

January 28-29, 2005
Stanford University
Palo Alto, Ca

Dear Cyberspace Committee Member, Register now to attend the Cyberspace Law Committee Winter Working Meeting, January 28-29, 2005 in Palo Alto, CA. Hotel reservations must be made by January 3 to take advantage of the ABA group rate[NOTE: REPORTEDLY, THE HOTEL IS *STILL* TAKING RESERVATIONS AT THE NEGOTIATED RATE THROUGH JANUARY 14!]. Dinner reservations must be sent to the ABA no later than January 14.

The Winter Working Meeting offers a wonderful opportunity to network with Committee colleagues and industry leaders as we work towards the common goal of developing sound strategies and policies relating to Cyberspace Law. The Winter Working Meeting is a must-attend experience. We especially encourage everyone who has joined the Cyberspace Law Committee this year to attend the Winter Working Meeting. For a current list of Committee projects and leadership, please visit the Committee web page at http://maestro.abanet.org/trk/click?ref=zpqri74vj_0-cbx328cx1204. You should feel free to contact project leaders in advance of the Winter Working Meeting with any questions you may have. We will be circulating an agenda for the Winter Working Meeting shortly. If you have not already done so, I also encourage you to register for LawHub, a collaboration space for the Committee projects. Visit LawHub at http://lawplace.metadot.com/metadot/index.pl.
Welcome Letter ** Hotel Information ** On-Line Registration (Members Only) Registration Form ** ABA Travel Directions to Hotel **

(**Require Adobe Acrobat ® to view.) I look forward to seeing you at Stanford in January.

Vince Polley, Chair

Friday, January 07, 2005

Boundaryless Information Flow TM: Architecting Identity Management

This year, the Cyberspace Law Committee is working with the Open Group to encourage our members to learn about and perhaps attend the other group's meetings. The Open Group's meeting is in nearby San Francisco and partially overlaps with our meeting. Our Friday morning sessions will include a presentation by members of the Open Group.

More information about the Open Group meeting follows:

January 24-28, 2005
Hyatt at Fisherman's Wharf
San Francisco, CA

Speakers
• Keynote Speaker: Jamie Lewis, CEO and Research Chair, Burton Group
Dr. Gene Schultz, Principal Engineer, Lawrence Berkeley National Laboratory
Justin Taylor, Chief Strategist, Digital Identity, Office of the CTO, Novell Inc.
Steve Neville, Senior Manager Identity Management, Entrust

Identity management is a convergence of technology and business processes. There is no single approach to identity management as the strategy must reflect specific requirements within the business and technology context of each organization. Therefore, it is critical that enterprises take an IT enterprise architecture approach to addressing their need for identity management.

The Open Group is the leading consortium for architecture development methodology and is developing an extensive standards information base, technical reference model and resource base for IT enterprise architects to use as reference material. The information being developed is not only of benefit to IT enterprise architects but also to managers responsible for directing vendors engaged in identity management projects, to ensure an open-systems based solution which will avoid lock-in and unnecessary complexity.

The Open Group conference will spotlight the progress being made on enabling interoperable identity management solutions. The conference will provide valuable information on the current thinking in identity management (business value, security & technical perspectives) and will look at the roadmap for resolving issues:

• Architecting an identity management framework.
• The business requirement for identity, authentication and assurance.
• Progressing standards for identity management.
• Controlling the risk and securing your intellectual property.

For more details, please visit their conference website at http://www.opengroup.org/san-francisco2005/

Remember to Register

We hope you are planning to attend the Winter Working Meeting at Stanford January 28-29. (A number of you have made hotel reservations, but have not registered.) Please remember to complete the registration form (no fee, but we need a good count) and make your dinner reservations. The deadline for dinner reservations is January 14. The registration information appears below.


If you have any questions, do not hesitate to contact me.

Best,

Candace M. Jones
Hahn Loeser & Parks LLP
3300 BP Tower
200 Public Square
Cleveland, OH 44114
Ph: 216.274.2433
Fax: 216.241.2824
cmjones hahnlaw.com


Welcome to the Winter Working Meeting

This is the unofficial, official blog of the ABA's Cyberspace Law Committee. We'll post information about the meetings, changes to schedules, information about Wi-Fi access at Stanford, summaries of individual meetings, and more.

Stay tuned and check back regularly.