Free Essay

What Can Information Technology Do for Law?

In:

Submitted By linhbao76
Words 9086
Pages 37
Harvard Journal of Law & Technology Volume 21, Number 2 Spring 2008

WHAT CAN INFORMATION TECHNOLOGY DO FOR LAW?
Johnathan Jenkins∗

TABLE OF CONTENTS
I. INTRODUCTION ..............................................................................589 II. INCENTIVES FOR BETTER INTEGRATION OF INFORMATION TECHNOLOGY AND LAW ............................................................591 III. THE CURRENT STATE OF INFORMATION TECHNOLOGY IN LEGAL PRACTICE .......................................................................594 IV. THE DIRECTION OF LEGAL INFORMATICS: CURRENT RESEARCH .................................................................................597 A. Advances in Argumentation Models and Outcome Prediction ..............................................................................597 B. Machine Learning and Knowledge Discovery from Databases ..............................................................................600 C. Accessible, Structured Knowledge ...........................................602 V. INFORMATION TECHNOLOGY AND THE LEGAL PROFESSION: BARRIERS TO PROGRESS ......................................604 VI. CONCLUSION ..............................................................................607

I. INTRODUCTION
MUCH CURRENT LEGAL WORK IS EMBARRASSINGLY, ABSURDLY, WASTEFUL. AI-RELATED TECHNOLOGY OFFERS GREAT PROMISE TO 1 IMPROVE THAT SITUATION.

Many professionals now rely on information technology (“IT”) to simplify, automate, or better understand aspects of their work. Such software comes in varying degrees of sophistication: less sophisticated tools include word processors, e-mail and instant messaging systems, file servers, and the like, while more sophisticated tools reach into the analytical core of a professional’s work. Although modern law firms and courts are awash in these less sophisticated tools,

∗ Harvard Law School, Candidate for J.D., 2008. Special thanks to Paul O’Connell and Avi Pfeffer for fostering an interest in some of the topics discussed in this Note; and thanks to Doug Kochelek, Richard Heppner, and the Harvard Journal of Law & Technology Student Writing Committee for their many helpful comments on earlier drafts. 1. Marc Lauritsen, Artificial Intelligence in the Real Legal Workplace, in INFORMATION TECHNOLOGY AND LAWYERS 165, 175 (Arno R. Lodder & Anja Oskamp eds., 2006).

590

Harvard Journal of Law & Technology

[Vol. 21

legal practice often lacks analogues to the more sophisticated tools found in many other industries. A broad variety of industries have incorporated sophisticated data-manipulation techniques in recent decades. High-profile examples include the use of statistical data-mining techniques to detect credit card fraud,2 as well as the use of related anomaly-detection methods to identify potential terrorist activity.3 Businesses have shifted toward data-driven decision-making;4 this shift is reflected in the incorporation of data-mining techniques into leading relational database management systems.5 In addition to data-mining techniques, machine learning techniques6 are now central to applications ranging from cars that drive themselves,7 to spam filtering,8 to the classification of astronomical objects.9 Although modern legal practice has adopted IT in many areas, these legal tools do not typically match the sophistication of tools found in other industries. Besides basic office software like word processors and e-mail, law firms often have comprehensive, networked document retrieval systems,10 while courts and government agencies have electronic filing systems.11 However, these tools lack the analytical power of IT used in other sectors of the business world. Some case management systems do include automatic text processing
2. See Philip K. Chan et al., Distributed Data Mining in Credit Card Fraud Detection, IEEE INTELLIGENT SYS., Nov./Dec. 1999, at 67. 3. See JEFFREY W. SEIFERT, DATA MINING: AN OVERVIEW (Cong. Research Serv., CRS Report for Congress Order Code RL31798, Dec. 16, 2004), available at http://www.fas.org/ irp/crs/RL31798.pdf. 4. See generally IAN AYRES, SUPER CRUNCHERS (2007) (discussing examples of datadriven decision-making by modern businesses). 5. See, e.g., Oracle, Oracle Data Mining, http://www.oracle.com/technology/ products/bi/odm/index.html (last visited May 12, 2008). 6. Machine learning (or statistical learning) is a general term describing a variety of techniques for automatically finding patterns in data. See TREVOR HASTIE ET AL., THE ELEMENTS OF STATISTICAL LEARNING 1–2 (2001); see also infra Part IV.C. 7. The 2005 DARPA Grand Challenge, a competition sponsored by the U.S. Government, was a race of autonomous land vehicles across the Mojave Desert. The winning team used machine learning to train its vehicle’s driving algorithms. See Stanford Racing, http://cs.stanford.edu/group/roadrunner/old/index.html (last visited May 12, 2008). 8. See Mehran Sahami et al., A Bayesian Approach to Filtering Junk E-mail, in LEARNING FOR TEXT CATEGORIZATION: PAPERS FROM THE 1998 WORKSHOP 55 (AAAI Technical Rep. WS-98-05, 1998). In addition to Bayesian filtering, well-known spam filtering programs have used other machine learning techniques, such as genetic algorithms and feed-forward neural networks. See HowScoresAreAssigned — Spamassassin Wiki, http://wiki.apache.org/spamassassin/HowScoresAreAssigned (last visited May 12, 2008). 9. See Peter Cheeseman et al., The AutoClass Project, http://ic.arc.nasa.gov/ic/projects/ bayes-group/autoclass/ (last visited May 12, 2008). 10. See, e.g., Gretta Rusanow, Global Law Firm Knowledge Management Survey 2006, LLRX.COM, Nov. 3, 2006, http://www.llrx.com/features/kmsurvey2006.htm. 11. See, e.g., Admin. Office of the U.S. Courts, What is PACER?, http://pacer.psc.uscourts.gov/pacerdesc.html (last visited May 12, 2008) (describing the electronic public access system for U.S. federal court dockets); U.S. Securities & Exchange Comm’n, SEC Filings & Forms (EDGAR), http://www.sec.gov/edgar.shtml (last visited May 12, 2008) (describing SEC’s electronic filing system in detail).

No. 2]

What Can Information Technology Do for Law?

591

and classification systems, however, legal professionals have not yet widely adopted these systems.12 Given the extensive adoption of IT by other industries, it appears that modern legal practice has somewhat lagged behind. There are strong incentives for legal practitioners to break this trend. Attorneys are compelled to sift through an ever-growing volume of information; the relatively underdeveloped use of IT in legal practice has left room for significant efficiency gains by eliminating repetition and wasted human resources. However, currently several barriers stand in the way of such progress. Skepticism abounds about the efficacy of artificial intelligence applications, and many technical challenges to implementation remain. Additionally, cultural resistance by the bar and legal restrictions on who may practice law are slowing adoption. To emphasize the need for further technological development in the legal profession, this Note surveys recent developments in IT that have the potential to transform the practice of law. Part II describes some of the incentives for practitioners to adopt information technologies. Part III examines current uses of technology in the legal profession, including some recent developments of more sophisticated software. Part IV explores promising avenues of research into techniques for modeling, interpreting, and organizing information. Part V considers some of the more immediate barriers to integration of new technologies into the practice of law. Part VI concludes.

II. INCENTIVES FOR BETTER INTEGRATION OF INFORMATION TECHNOLOGY AND LAW
Legal professionals have two primary motivations for integrating new information technologies into the practice of law. First, the volume and diversity of data that attorneys must analyze in the course of their work have exploded. Second, the efficiency gains in other industries highlight the cost savings that can be achieved by adopting more sophisticated technology.13 Legal information takes a great variety of forms. Familiar examples from litigation practice include judicial opinions, court orders, dockets, briefs, transcripts, jury instructions, and verdict statistics. There is also an enormous, but less public, body of transactional legal
12. See discussion infra Part III. 13. See generally AYRES, supra note 4. One measure of the perceived value of technology in other fields is the existence of well-developed academic programs, as found in computational biology and computational finance. See, e.g., Yale University, Yale Computational Biology and Bioinformatics, http://cbb.yale.edu (last visited May 12, 2008); Purdue University, Computational Finance at Purdue, http://www.stat.purdue.edu/ purdue_comp_finance (last visited May 12, 2008). There is not yet any comparable programs in law.

592

Harvard Journal of Law & Technology

[Vol. 21

materials — such as contracts and licenses — that shape commercial practice, even if such documents are never used in court. In addition to the core materials that would universally be considered “legal” in nature, there are many types of documents that are highly relevant to legal practice. For example, medical textbooks or expert witness reports may be relevant in personal injury cases, while purchase receipts and spreadsheets may be relevant in tax refund suits. The breadth of information types means that legal software must concern itself with written language from a diversity of sources. Lawyers need a means for dealing with the increasing bulk of legal data. In common law jurisdictions, the body of case law expands each year: a large portion of new case law does not overrule old law, but instead refines or adapts old law to new circumstances.14 Moreover, lawyers now refer to more kinds of documents in conducting their research: whereas in the print era research was largely confined to appellate cases bound in official reporters, now legal data services provide online access to “unpublished” appellate cases, lower court orders, briefs, and extra-jurisdictional materials.15 In some circumstances, changes in the law itself have increased the amount of information lawyers and their clients must process. For example, in 2006, the U.S. Supreme Court approved amendments to the Federal Rules of Civil Procedure that required disclosure of a broad class of electronically stored information during litigation.16 This change has increased the volume of information available during discovery beyond the high levels that already result from the United States’ liberal discovery rules.17 Nor is the increase limited to litigation: the Sarbanes-Oxley Act of 200218 tightened the restrictions on the types of documents corporations must retain.19 Such records are kept in anticipation of

14. See, e.g., EDWARD H. LEVI, AN INTRODUCTION TO LEGAL REASONING 1–8 (1949) (describing how the common law builds on itself as a process of continuous refinement). Civil law jurisdictions use cases as well, albeit with less precedential force. See Kevin D. Ashley, Case-Based Models of Legal Reasoning in a Civil Law Context (Feb. 2004), http://www.lrdc.pitt.edu/Ashley/Mexico.pdf. 15. See, e.g., LexisNexis, Searchable Directory of Online Sources, http://w3.nexis.com/ sources (last visited May 12, 2008) (listing the types of publications available to search on LexisNexis). 16. See Amendments to Fed. Rules of Civil Procedure, 547 U.S. 1233, 1241 (2006). 17. See Eric Sinrod, E-Discovery: The Times, They Are a Changing, FINDLAW, Aug. 7, 2006, http://technology.findlaw.com/articles/00006/010189.html; see also Daniel Fisher, The Data Explosion, FORBES, Oct. 1, 2007, at 72; see generally Henry S. Noyes, Good Cause Is Bad Medicine for the New E-Discovery Rules, 21 HARV. J.L. & TECH. 49 (2007) (arguing that the 2006 amendments have done little to contain discovery). 18. See Pub. L. No. 107-204, 116 Stat. 745 (codified at 18 U.S.C. § 1520 (Supp. V 2005)). 19. Id. § 802(a), 116 Stat. at 800 (authorizing the Securities and Exchange Commission to promulgate regulations relating to document retention, and requiring accountants to retain audit and review workpapers of securities issuers for five years); see also Michele C.S. Lange, New Act Has Major Impact on Electronic Evidence, NAT’L L.J., Nov. 4, 2002, at C8,

No. 2]

What Can Information Technology Do for Law?

593

future use in regulatory compliance or litigation.20 This explosion in the number and type of documents with which attorneys must concern themselves is an open invitation for technological innovation. One of the primary problems for firms affected by the document explosion is processing and understanding the growing volume of information they manage. Because IT solutions are not available, firms increasingly rely on contract attorneys to assist with documentintensive matters, despite the considerable cost.21 In time, new computational techniques may supplement or supplant this practice. Although contemporary legal practice incurs significant costs because of repetitive inefficiencies, new technologies can potentially produce considerable savings. Some of the documents that lawyers currently handle are already structured in limited ways that are amenable to computer-reading — for instance, the federal district courts of the Northern District of California require motions to contain the case number, date and time of a hearing at particular locations in the document.22 For the most part, however, legal data is far less structured than the tabular data in a relational database or a spreadsheet.23 Newer, moderately sophisticated technologies like document assembly — the computer-assisted production of documents like contracts — can reduce the number of attorneys necessary to draft a given document.24 Researchers who develop new information technologies describe a future with intelligent computerized legal assistants that can scour databases and outline arguments in place of low-level associates,25 as well as sophisticated software agents that can negotiate contracts without the direct involvement of attorneys.26 The realization of such cost saving techniques could dramatically alter the land-

available at http://www.law.com/jsp/article.jsp?id=1039054510969 (describing the new retention requirements and their impact on electronic data management). 20. See Lange, supra note 19. 21. See Leigh Jones, More Firms Using Temp Attorneys, NAT’L L.J., Oct. 10, 2005, at 1, available at http://www.law.com/jsp/ihc/PubArticleIHC.jsp?id=1128947761813. 22. See N.D. CAL. CIV. R. 7-2(b) (describing the form of motions submitted to the court), available at http://www.cand.uscourts.gov/CAND/LocalRul.nsf. 23. Relational databases are similar to spreadsheets but have greater structural constraints while allowing for more sophisticated extraction of data. See PHILIP GREENSPUN, PHILIP AND ALEX’S GUIDE TO WEB PUBLISHING 333–44 (1999). 24. See RICHARD SUSSKIND, THE FUTURE OF LAW 215–17 (1996) (arguing that systematizing the legal knowledge and expertise necessary to draft a contract has the potential to fundamentally reshape the legal process); Darryl R. Mountain, Disrupting Conventional Law Firm Business Models Using Document Assembly, 15 INT’L J.L. & INFO. TECH. 170 (2007) (expanding Susskind’s argument by analyzing business models). 25. Kevin Ashley, Case-Based Reasoning, in INFORMATION TECHNOLOGY AND LAWYERS, supra note 1, at 23, 23–24. 26. Edwina L. Rissland, Kevin D. Ashley & R.P. Loui, AI and Law: A Fruitful Synergy, 150 ARTIFICIAL INTELLIGENCE 1, 15 (2003) (speculating on future legal applications of artificial intelligence).

594

Harvard Journal of Law & Technology

[Vol. 21

scape of legal practice by eliminating much of the wasteful repetition that many practitioners have observed.27 Thus, both the growth in the volume of documents attorneys must handle and potential cost-savings from efficiency gains offer significant motivations for legal practitioners to adopt better information technologies. The next Part discusses the current state of the legal profession’s adoption of technologies in light of these incentives.

III. THE CURRENT STATE OF INFORMATION TECHNOLOGY IN LEGAL PRACTICE
In addition to basic office automation software, lawyers already use a wide range of computational tools of varying sophistication. These tools include databases of legal materials, software for document assembly, and software for litigation support. A typical law firm uses software similar to that found in most organizations: word processors, e-mail systems, file servers, and the like. Since these tools can accommodate any sort of textual data, they are useful for working with even the most heterogeneous collections of legal materials. Also in widespread use, however, are a number of more law-specific technologies. Legal calendar software extends the basic project management software by including legal timing rules.28 Billing software tracks billable hours and integrates billing information into accounting and financial software packages.29 Conflict management software tracks potential conflicts of interest among a firm’s clients and potential clients.30 Electronic data services like LexisNexis and Westlaw have become firmly entrenched as legal research tools.31 The primary appeal of these services is likely their comprehensive coverage and compilation of legal documents, rather than any particular technological feature. The typical interface is a relatively straightforward keyword search, which allows users to search either the primary text of the various documents or a selection of fields, such as author, title, and other surface features.32 In addition to keyword search, these services
27. See, e.g., Lauritsen, supra note 1, at 175. 28. See, e.g., AbacusLaw, Legal Calendar Software — Popular Features, http://www.abacuslaw.com/products/abacus-law-software-features.html (last visited May 12, 2008) (describing a software calendar that automatically schedules according to the deadlines in a particular jurisdiction). 29. See, e.g., id. 30. See, e.g., id. 31. See, e.g., Linda M. Furlet & Craig B. Simonsen, Searching in Legal Databases on the Internet, in COMPUTER-AIDED LEGAL RESEARCH (CALR) ON THE INTERNET 79, 79–80 (Craig B. Simonsen & Christian R. Anderson eds., 2006). 32. Efficient keyword search of large databases is not a trivial task. Google based its successful search engine on an algorithm for ranking search results to favor websites linked to by other highly ranked websites. See Lawrence Page et al., The PageRank Citation Ranking:

No. 2]

What Can Information Technology Do for Law?

595

offer more sophisticated features for accessing and understanding legal documents. Online documents may link to the documents they cite, and may also provide indices of the documents that cite to them.33 These reverse-citation indices come with indications — prepared by humans — of whether the case or statute in question is cited favorably, overruled, or distinguished on some point of law or fact.34 Humans also prepare summaries of cases, subject classifications, and “headnotes” (concise statements of legal issues and holdings in a court opinion).35 Although generating such features is laborious, the features do encode a substantial amount of structured, semantic content into electronically-searchable material, which can be helpful not only for keyword searches but also for enabling some of the more advanced techniques discussed in Part IV. Legal data services have developed some additional tools that generate useful information in a more automated way. West’s Case Evaluator system uses a forms-based interface to collect information about a case and automatically assembles reports that include relevant case citations, verdict trends for similar cases in the jurisdiction, and excerpts from relevant expert materials.36 For transactional practice, West’s Deal Proof tracks certain key phrases in contracts — in particular defined terms and repeated, legally-significant phrases — and includes tools to ensure that those definitions and phrases are used appropriately and consistently throughout a document.37 West’s software also uses automatic text classification to identify and recommend documents likely to be related to other documents that the user has already located.38

Bringing Order to the Web (1998), http://dbpubs.stanford.edu/pub/1999-66. The legal data services use a different strategy to rank results, making use of Bayes’ Theorem to identify results most likely to reflect what the user sought based on the search terms. See Howard Turtle, Text Retrieval in the Legal World, 3 ARTIFICIAL INTELLIGENCE & L. 5, 31–34 (1995). It is also possible to submit queries in natural language. This feature is mostly offered as a convenience to users and does not allow users to search in ways that are fundamentally different from those of a more structured query. See West, Natural Language Searches, http://lawschool.westlaw.com/shared/marketinfodisplay.asp?code=RE&id=151& subpage=&rtcode=re&rtid=159 (last visited May 12, 2008). 33. See, e.g., LexisNexis, Shepard’s Citations Service, http://law.lexisnexis.com/shepards (last visited May 12, 2008). 34. See, e.g., id. 35. See, e.g., id. 36. See WEST, MATERIAL NO. 40687294, WESTLAW QUICK REFERENCE GUIDE: CASE EVALUATOR 1 (Feb. 2008), http://west.thomson.com/documentation/westlaw/wlawdoc/ wlres/caseeval.pdf. 37. See WEST, ITEM NO. 1-6136-5, DEAL PROOF QUICK REFERENCE GUIDE: DEAL PROOF TUTORIAL 3 (Oct. 2007), http://west.thomson.com/documentation/westlaw/wlawdoc/wlres/ wkmdptut.pdf. 38. See Peter Jackson, Generating Value from Textual Discovery, in COMPUTATIONAL SCIENCE — ICCS 2007: 7TH INTERNATIONAL CONFERENCE PROCEEDINGS, PART III, at 746, 749–51 (Lecture Notes in Computer Sci., Vol. No. 4489, 2007) (describing the mechanics of West’s ResultsPlus product).

596

Harvard Journal of Law & Technology

[Vol. 21

Among the most sophisticated computational tools used by law firms are document assembly tools like HotDocs and DealBuilder.39 Document assembly tools prompt the lawyer to enter information about the facts and issues involved in a matter.40 Unlike West’s Case Evaluator, which is also driven by input forms,41 these assembly tools use document templates to construct legal documents like complex contractual agreements, which can then be reviewed and edited by human lawyers.42 The Dutch and Flemish governments have already used similar legal drafting systems to assist lawmakers in drafting of statutes.43 In large firms, the document assembly systems often rely on in-house templates and model documents, and a great deal of effort goes into customizing the documents for general use.44 Perhaps indicating the direction of future developments, a British company offers drafting systems with built-in templates for a few well-defined areas of law.45 A number of commercial services attempt to streamline the discovery process in large-scale litigation.46 In some cases, the express goal is to replace the traditional discovery method, which consists of teams of junior attorneys working within a law firm.47 Practitioners have had some success with these services, reporting only small numbers of false positives and false negatives from searches through large sets of discoverable documents.48 Such litigation support systems use some of the same machine learning and legal ontology techniques
39. See Lauritsen, supra note 1, at 168; see also, e.g., Bus. Integrity Ltd., Law Firms Applications, http://www.business-integrity.com/applications-law-firms.html (last visited May 12, 2008). 40. See, e.g., Bus. Integrity Ltd., supra note 39. 41. See WEST, supra note 36, at 3. 42. See Bus. Integrity Ltd., supra note 39. 43. Marie-Francine Moens, Improving Access to Legal Information: How Drafting Systems Help, in INFORMATION TECHNOLOGY AND LAWYERS, supra note 1, at 119, 122–24. 44. See, e.g., HotDocs, HotDocs Products, http://hotdocs.com/products (last visited May 12, 2008) (describing a software application that converts word processor files into interactive templates). 45. See Practical Law Co., PLC — FastDraft, http://www.practicallaw.com/1-203-1674 (last visited May 12, 2008). Richard Susskind has suggested that this software may be a harbinger of a transition from individualized legal counseling to an off-the-shelf product, at least for relatively straightforward matters. See Richard Susskind, Podcasts for Desperate and Diligent Students, TIMES (London), Sept. 5, 2006, at Law 7, available at http://business.timesonline.co.uk/tol/business/law/columnists/richard_susskind/article62636 3.ece. 46. See, e.g., Discovery Mining, Discovery Mining Automated Discovery Platform, http://www.discoverymining.com/discovery/index.html (last visited May 12, 2008); H5, Services, http://www.h5technologies.com/services/index.html (last visited May 12, 2008) (describing services for outsourcing aspects of litigation discovery and regulatory compliance by using machine learning methods for document classification and information retrieval). 47. See, e.g., H5, DIFFERENTIATION 1 (2006), http://www.h5technologies.com/pdf/ differentiation.pdf. 48. See Anne Kershaw, Talking Tech: Automated Document Review Proves Its Reliability, DIGITAL DISCOVERY & E-EVIDENCE, Nov. 2005, at 10, 12.

No. 2]

What Can Information Technology Do for Law?

597

discussed in Part IV.B and IV.C.49 A typical application is to search through thousands of documents and to flag those sufficiently similar to a model document.50 As these examples suggest, there is a great deal of technology already in use in legal practice, some of it surprisingly forward-looking. Even the most sophisticated systems in use, however, depend on extensive human intervention to achieve useful results. Moreover, the systems generally restrict themselves to a relatively superficial analysis of the underlying legal texts and lack schemes for detailed knowledge representation or automatic processing of legal texts based on semantic content. The research systems described in Part IV aim to fill some of these gaps.

IV. THE DIRECTION OF LEGAL INFORMATICS: CURRENT RESEARCH
This Part describes three major threads of research in IT and law: models of legal argumentation with explicit mechanisms for representing knowledge, applications of machine learning techniques to legal data, and ways of organizing and distributing legal information. A. Advances in Argumentation Models and Outcome Prediction Computer tools for automating aspects of legal practice could take a number of forms. These forms might include more powerful document search mechanisms that consider the semantics of the documents51 as well as the plain text, software assistants that produce legal arguments corresponding to one litigant’s perspective, and predictive tools that assess the probabilities of several possible outcomes given information about a case.52 Much of the recent research in artificial intelligence and law has focused on techniques that could be useful for all of these purposes.53 Such techniques are typically described as “adversarial case-based reasoning systems”54 or argumentation systems.55
49. See infra Part IV.B–C; Kershaw, supra note 48, at 11. 50. See Kershaw, supra note 48, at 11. 51. An example of a semantic search involves limiting results to cases in which the plaintiff prevailed on the issue of interest. There is no easy way to do this unless either the search tool can infer who is the winning party from context, see infra Part IV.B (discussing machine learning and text mining), or issues are pre-marked with a tag indicating which party won, see infra Part IV.C (discussing semantic tagging). 52. See Ashley, supra note 25, at 26. 53. See id. at 23–25. 54. Id. at 25 (describing systems that consider “cases . . . to justify how a problem situation should be decided”). 55. See ANNE VON DER LIETH GARDNER, AN ARTIFICIAL INTELLIGENCE APPROACH TO LEGAL REASONING 38–41 (1987); Trevor Bench-Capon & Henry Prakken, Argumentation,

598

Harvard Journal of Law & Technology

[Vol. 21

Prior to the development of case-based reasoning systems, Anne von der Lieth Gardner developed a rule-based system for applying contract law to fact patterns.56 Gardner extracted substantive rules from the Restatement of Contracts and supplemented them with interpretive rules designed to allow the Restatement’s rules to be applied to facts.57 The system classified cases as “easy” if the rules yielded a unique result or “hard” if they did not; for the easy cases it provided outcome predictions.58 Gardner’s system resembles the rule-based expert systems that were popular in the 1970s and 1980s, both in artificial intelligence research and in industry.59 Although similar systems have proven moderately useful for assisting human decision-makers,60 they suffer from certain deficiencies. First, in order to create the legal precedent, rule-based systems require a laborious intermediate step in which a human assembles a coherent set of rules.61 Second, although the systems can identify issues and reach conclusions, they cannot generate arguments supporting a particular litigant’s position.62 Third, rule-based systems are not able to weigh factors or apply multi-part balancing tests.63 Fourth, the systems have difficulty evaluating legal arguments that depend on nuanced factual or procedural contexts.64 Recent case-based systems have achieved some success in mitigating these problems.65 The fundamental principle on which the case-based systems operate is that “[a] particular party in a given scenario should win a claim or an issue because a similarly situated party won such a claim or issue in a particular case whose facts are relevantly similar and where the same or similar law applied.”66 This principle parallels the rationale behind the treatment of precedent in the common law tradition. Two systems designed to implement this principle in research and teaching contexts are Hypo and CATO. Developed by Professor Kevin Ashley, Hypo uses precedents to construct arguments for one side in a trade secret dispute, and then in INFORMATION TECHNOLOGY AND LAWYERS, supra note 1, at 61, 62–63 (describing systems that use logical methods to model persuasive arguments). 56. See Bench-Capon & Prakken, supra note 55, at 63. 57. See id. 58. See id. at 63–64; GARDNER, supra note 55, at 38–41. 59. See, e.g., STUART J. RUSSELL & PETER NORVIG, ARTIFICIAL INTELLIGENCE: A MODERN APPROACH 22–24 (2d ed. 2003) (describing the rule-based expert systems of the 1970s and 1980s). 60. See, e.g., Bench-Capon & Prakken, supra note 55, at 64–65 (discussing a rule-based system designed to help officers decide whether to approve environmental permits). 61. See GARDNER, supra note 55, at 85–162 (describing the process of representing problems and defining legal rules). 62. See Bench-Capon & Prakken, supra note 55, at 65. 63. See id. 64. See id. An example of such an argument is a fact-specific inquiry into the legality of a religious display on public property. See, e.g., County of Allegheny v. ACLU, 492 U.S. 573 (1989). 65. See Bench-Capon & Prakken, supra note 55, at 65–66. 66. Ashley, supra note 25, at 35.

No. 2]

What Can Information Technology Do for Law?

599

constructs counter-arguments for the other side by citing alternative precedents and distinguishing the first side’s cases.67 Cases are represented as having a particular position with respect to a number of dimensions that might affect the plausibility of an argument.68 Because Hypo deals with trade secret law, relevant dimensions include the extent to which a plaintiff took security precautions to protect its secrets, and whether the secrets were disclosed to the defendant.69 Building on the same principles underlying Hypo, Vincent Aleven designed the CATO system as a teaching aid to help law students learn to argue from precedent.70 Although CATO uses only binary-valued factors, it organizes these factors in a case-specific hierarchy that “provides legal reasons why trade secret factors matter in terms of more abstract [f]actors.”71 Vincent Aleven designed CATO to account for background knowledge in a context-sensitive manner, such that the significance of a particular case depends on the purpose of the argument in which the case is used.72 CATO produces the text of an argument for one side of an issue in plain English, and includes a graphical representation of the argument structure it created.73 After Hypo and CATO, newer developments have included more detailed representation of arguments with precedential cases, increased emphasis on outcome prediction and argument generation, and improved predictive accuracy in simulations. For example, the GREBE system contains representations of the semantic structure of the rationales of the cases in its database.74 These representations allow the system to rearrange arguments that appear in precedential cases by extracting sub-rules and drawing structural analogies.75 No-

67. See id. at 39. Basically Hypo takes as its input a fact situation describing a trade secrets dispute . . . . The outputs show the best precedents to cite for each side on the claim, how those cases may be cited in legal points, how an opponent would respond to each point, and how a point or response could be strengthened by the addition or subtraction of crucial facts. KEVIN D. ASHLEY, MODELING LEGAL ARGUMENT 36 (1990). 68. See Ashley, supra note 25, at 37–38. 69. See id. 70. See Vincent Aleven, Using Background Knowledge in Case-Based Legal Reasoning: A Computational Model and an Intelligent Learning Environment, 150 ARTIFICIAL INTELLIGENCE 183, 184–90 (2003). 71. See Ashley, supra note 25, at 39. 72. Aleven, supra note 70, at 184. 73. See id. at 196 (showing sample output); id. at 221 (showing the graphical interface). 74. See L. Karl Branting, A Reduction-Graph Model of Precedent in Legal Analysis, 150 ARTIFICIAL INTELLIGENCE 59, 64–74 (2003); see also Ashley, supra note 25, at 43–46. 75. See Branting, supra note 74, at 76–77.

600

Harvard Journal of Law & Technology

[Vol. 21

tably, GREBE produces formatted sentences, rather than the condensed shorthand of some of the other research systems.76 Several of these systems have achieved relatively high prediction accuracy. Similar to Hypo, the Issue-Based Prediction (“IBP”) program models trade secret misappropriation arguments and predicts the winner of a dispute with 91.4% accuracy.77 A group of researchers based in New Zealand has developed a multi-step method for intelligent retrieval of precedents from a database; the method was able to identify 96.3% of the precedents cited in real judicial opinions.78 The majority of the precedents that the program did not successfully identify appeared in dicta or in distinguishing citations.79 Professor Ashley suggests that useful systems will likely combine many different techniques and will need the capacity to search databases for precedential authority, construct arguments, and predict outcomes.80 To succeed in the legal world, such systems will also have to integrate well with existing legal data services like LexisNexis and Westlaw.81 Ultimately, while IT has made considerable progress in modeling legal argument, it must still overcome additional obstacles before more practical implementations can be widely deployed. B. Machine Learning and Knowledge Discovery from Databases “Machine learning” usually refers to a panoply of techniques taken from artificial intelligence, statistics, and other fields.82 The goal is to glean non-obvious information from large data sets, where the structures are often more complex than in data sets that can be analyzed using traditional statistical regression models.83 Machine learning algorithms fall into three broad classes: supervised, unsupervised, and reinforcement learning.84 Supervised learning uses a “training” data set, in which certain inputs generate known outputs, and the
76. See, e.g., Ashley, supra note 25, at 46 fig.9 (showing an example of the humanreadable output produced by GREBE). 77. See id. at 53–55; see also Kevin D. Ashley & Stefanie Brüninghaus, Computer Models for Legal Prediction, 46 JURIMETRICS 309, 347 (2006). 78. Yiming Zeng et al., A Knowledge Representation Model for the Intelligent Retrieval of Legal Cases, 15 INT’L. J.L. & INFO. TECH. 299, 314 (2006). Zeng’s method narrows the search range in three ways: by identifying key issues in the fact pattern, by considering the presence of pro-claimant or pro-respondent factors, and by weighing neutral contextual features. Id. at 304–05. 79. Id. at 314. 80. Ashley, supra note 25, at 23–26. 81. See id.; supra notes 31–37 and accompanying text for a discussion of existing legal data services. 82. See, e.g., RUSSELL & NORVIG, supra note 59, at 712–88 (describing the concept using the equivalent phrase “statistical learning”). 83. Some common machine learning algorithms include decision trees, neural networks, and support vector machines. See id. 84. Id. at 650.

No. 2]

What Can Information Technology Do for Law?

601

learning algorithm minimizes error in output prediction.85 Supervised learning on categorical data is often called classification.86 In unsupervised learning algorithms, input-output pairs are unknown.87 Both supervised and unsupervised learning methods have been applied to legal problems.88 Andrew Stranieri and John Zeleznikow have emphasized the important role that machine learning can play in uncovering and quantifying the “open texture” of legal rules and the discretion of individual legal decision-makers.89 They claim that machine learning is especially well-suited to predicting outcomes dependent on “local stare decisis” (when the same decisions follow from similar fact patterns before the same court) or “personal stare decisis” (when the same decisions follow from similar fact patterns before the same judge), rather than on traditional stare decisis.90 In particular, machine learning more effectively predicts outcomes in ordinary cases that depend on judicial discretion than in cases that do not announce broader changes in legal doctrine.91 Other applications of machine learning include extraction of legal rules from databases,92 measurement of trends in the application of rules over time,93 and identification of clusters of related cases or documents.94 Some methods can be combined; for instance, machine learning techniques can be used to automate the data preparation for the argumentation systems discussed in Part IV.A.95 Systems such as Hypo currently require a human to enumerate the factors or delineate the argument structure for all of the cases in their databases.96 Thus, there are obvious scalability concerns for systems intended to be used with larger databases: the databases must be created by humans. A machine learning program that could extract factors and rules from cases in a sufficiently uniform and reliable way may be the only cost85. Id. 86. Id. at 653. 87. Id. at 650. 88. See generally ANDREW STRANIERI & JOHN ZELEZNIKOW, KNOWLEDGE DISCOVERY FROM LEGAL DATABASES (2005) (discussing numerous systems that have applied machine learning algorithms to legal problems). The third class, reinforcement learning, applies to problems in which the environment provides some feedback to the learning agent about how well it is performing. See RUSSELL & NORVIG, supra note 59, at 650. The author does not know of any applications of reinforcement learning methods to legal problems. 89. Andrew Stranieri & John Zeleznikow, Knowledge Discovery from Legal Databases — Using Neural Networks and Data Mining to Build Legal Decision Support Systems, in INFORMATION TECHNOLOGY AND LAWYERS, supra note 1, at 81, 82. 90. Id. at 87–88. 91. See id. at 84–87; see also STRANIERI & ZELEZNIKOW, supra note 88, at 214–16. 92. STRANIERI & ZELEZNIKOW, supra note 88, at 95–96. 93. See Stranieri & Zeleznikow, supra note 89, at 112–13. 94. See id., at 111–12; Turtle, supra note 32, at 26 (describing cluster-based models for document retrieval). 95. See Ashley, supra note 25, at 56–58. 96. See ASHLEY, supra note 67, at 25–34.

602

Harvard Journal of Law & Technology

[Vol. 21

effective way to deploy argumentation systems using large databases.97 Machine learning algorithms have also been used for more direct decision-making support. The “Judges on Wheels” program in Brazil sends police, an insurance adjustor, and a judge to the scene of traffic collisions.98 The judge is advised by a computer program that has been trained using past decisions of other judges.99 Although the judges are not obliged to accept the program’s recommendation, they do so 68% of the time.100 A drawback of the system is that the machine learning methods used frustrate extraction of the rationale that the program used to reach its recommendation: usually, the most one can say is that the decision accords with the decisions used to train the software.101 Machine learning algorithms have already demonstrated some capacity to assist legal decision-makers. Further development of these methods has the potential to reduce inefficiencies and bolster the productivity of legal practitioners. C. Accessible, Structured Knowledge For computerized applications, the unstructured character of most legal data presents a technical problem. Typically, unstructured documents require substantial pre-processing before they can be ana-

97. An early attempt to use automated information extraction methods to prime a casebased reasoning system is described in Stefanie Brüninghaus & Kevin D. Ashley, Improving the Representation of Legal Case Texts with Information Extraction Methods, 2001 PROC. 8TH INT’L CONF. ON ARTIFICIAL INTELLIGENCE & L. 42, 46–47. See generally Rosina O. Weber, Kevin D. Ashley & Stefanie Brüninghaus, Textual Case-Based Reasoning, 20 KNOWLEDGE ENG’G REV. 255 (2006) (discussing the state of the art of information extraction from textual sources). The amount of work to create a case-based reasoning system could be substantial. The CYC project was started by AI researcher Douglas Lenat in 1984 to develop a large database of commonsense background facts to serve as a foundation for future AI work. See Douglas B. Lenat, CYC: A Large-Scale Investment in Knowledge Infrastructure, 38 COMM. ACM 32, 33 (1995). Although the project now gets most of its new facts by data-mining the Web, for most of its two-decade history it employed people to enter millions of facts. See Cynthia Matuszek et al., Searching for Common Sense: Populating Cyc from the Web, in 2005 PROC. TWENTIETH NAT’L CONF. ON ARTIFICIAL INTELLIGENCE & SEVENTEENTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONF. 1430, 1430. The result is a system that answers natural-language queries about all sorts of information available on the Web, along with explanations of how the answers were derived. 98. See Stranieri & Zeleznikow, supra note 89, at 102. 99. See id. 100. Id. 101. See id.

No. 2]

What Can Information Technology Do for Law?

603

lyzed by computers.102 The emerging “Semantic Web” may help to alleviate the need for some of this pre-processing.103 The Semantic Web is a general framework wherein syntax is designed to model semantics more closely than conventional online markup languages like HTML currently allow.104 Such modeling better enables machine-readers to extract the information about which human users care.105 The framework comprises three main parts: first, a formal language that allows document creators to specify relationships among the concepts they employ; second, a high-level “ontology” that specifies the rules governing valid manipulations of the relationships within the relevant domain of knowledge; and third, a flexible format for storing data.106 Placing legal information — e.g., statutes, regulations, and judicial opinions — into the Semantic Web will enable search tools and decision support systems to operate on uniformly structured data, without relying on more uncertain methods for extracting information from plain text.107 Machine learning methods will be able to identify rules and patterns more accurately in such a data set.108 The Semantic Web approach does have disadvantages: the development of suitable ontologies and the formatting of appropriately structured documents can prove particularly difficult.109 Nevertheless, the potential rewards are great enough that there are a number of projects devoted to encoding whole areas of law in the structured language of the Semantic Web.110 In the United States, the Semantic Web has been employed as part of a broader movement to provide free access to legal informa102. See STRANIERI & ZELEZNIKOW, supra note 88, at 147–69 (describing the problem of extracting information from unstructured text); see also id. at 47–58 (describing techniques for dealing with missing and inconsistent data). 103. See V. Richard Benjamins et al., Law and the Semantic Web, an Introduction, in LAW AND THE SEMANTIC WEB 1, 2 (V. Richard Benjamins et al. eds., 2005). 104. See Tim Berners-Lee et al., The Semantic Web, SCI. AM., May 2001, at 34, 36–37. 105. See id. 106. See id. at 38–42 (describing a system that uses the Resource Description Framework (“RDF”) to define relationships among concepts in conjunction with the eXtensible Markup Language (“XML”) to structure data). Berners-Lee et al. provide an example of a simple, hypothetical Semantic Web agent that runs on a handheld computer and is able to schedule a medical appointment subject to constraints on location, time, other appointments in the user’s schedule, et cetera. The agent presumably makes use of a knowledge representation scheme capable of representing the relevant factors, and an inference mechanism to apply the constraints in the problem at hand. See id. at 36. 107. See Benjamins et al., supra note 103, at 4–5. 108. See STRANIERI & ZELEZNIKOW, supra note 88, at 204–09. 109. See Benjamins et al., supra note 103, at 9–10 (describing the greater complexity of developing legal ontologies than of developing medical or engineering ontologies); see also STRANIERI & ZELEZNIKOW, supra note 88, at 147–69 (describing the problem of extracting information from unstructured text). 110. See, e.g., Estrella, EstrellaWiki, http://www.estrellaproject.org/index.php? title=Estrella&oldid=2385 (as of May 12, 2008, 12:00 GMT) (describing a European project to encode legislation in machine-readable form, starting with European tax legislation).

604

Harvard Journal of Law & Technology

[Vol. 21

tion. The public interest organizations Creative Commons and Public.Resource.Org have recently made a large fraction of U.S. case law freely available in a structured form.111 Such projects are a new source of competition for established legal data services such as Westlaw and LexisNexis. Moreover, because these projects emphasize providing the public with broader access to legal sources, they may eventually compete with lawyers as well.112 In this way, research into better ways to structure legal information, better methods to extract latent patterns, and better systems for machine analysis offers the legal industry a significant opportunity. If realized, these nascent technologies may enable attorneys to reap substantial efficiency gains by eliminating much of the redundancy in contemporary legal work.

V. INFORMATION TECHNOLOGY AND THE LEGAL PROFESSION: BARRIERS TO PROGRESS
Despite growing pressure to find new ways to manage information,113 advocates of more widespread adoption of sophisticated IT in law face a number of potential barriers. Because the technologies applied to law are no different from other artificial intelligence technologies, the generalized criticisms that technology cannot replicate the human mind apply and will persist.114 Cyrus Tata has argued that legal decision-making is inherently holistic and context-dependent, and has suggested that modeling such decision-making requires more than simple legal rules and formal logic.115 However, the logical style of most legal writing and the predictive accuracy of some prototype systems seem to undercut this view.116 Other objections are based on the misconceived notion that artificial intelligence can do nothing but derive consequences from posited
111. See Press Release, Creative Commons & Public.Resource.Org, 1.8 Million Pages of U.S. Case Law Available Now for Developers: No Restrictions on Reuse (Feb. 11, 2008), available at http://bulk.resource.org/courts.gov/0_Press_20080211.pdf (“Practical access for all Americans to legal cases and material is essential to the rule of law. The Legal Commons is an important step in reducing the barriers to effective representation of average citizens and public interest advocates.”); see also AltLaw, About AltLaw, http://www.altlaw.org/v1/about (last visited May 12, 2008) (describing a related project to make recent U.S. Supreme Court and federal appellate case law freely available online). 112. See infra note 125 and accompanying text for a discussion of concerns relating to the unauthorized practice of law. 113. See supra Part II. 114. See generally John R. Searle, Chinese Room Argument, in THE MIT ENCYCLOPEDIA OF THE COGNITIVE SCIENCES 115 (Robert A. Wilson & Frank C. Keil eds., 1999) (arguing that computers cannot have minds in the sense that people do). 115. See Cyrus Tata, The Application of Judicial Intelligence and ‘Rules’ to Systems Supporting Discretionary Judicial Decision-Making, 6 ARTIFICIAL INTELLIGENCE & L. 203, 223–25 (1998). 116. See supra Part IV.A.

No. 2]

What Can Information Technology Do for Law?

605

sets of rules using deductive logic.117 Although such programs exist, other systems account for factual uncertainty using Bayesian statistics,118 legal indeterminacy using fuzzy logic,119 and other forms of open texture including categorical uncertainty and vagueness of terms.120 Moreover, argumentation systems can find support for a particular position, even when there is no unique, deterministic outcome.121 Objections based on the practical efficacy of using various computational techniques in a legal context are harder to dismiss. For example, some commentators have claimed that it is an empirical fact that neural networks are ineffective when applied to certain legal problems if not combined with human-generated doctrinal rules.122 Even if a method is theoretically possible, the costs of its development (i.e., the costs of adapting it to a particular legal domain and preparing the requisite databases) may be prohibitively high even when compared to the ongoing costs of human labor.123 It may simply take a great deal of investment to develop new systems of the complexity necessary to be useful, even if individual components have already proven effective in isolated research settings. Further investment will also be necessary to integrate new tools into mainstream legal research systems and conventional software. Apart from possible design challenges, legal barriers may stand in the way of a company or organization developing new legal software. Although the Internet provides easy access to data, and court documents are in the public domain in the United States, there are nevertheless copyright restrictions on compilations and databases. These restrictions inhibit easy access to complete sets of legal documents without expensive negotiations with copyright owners.124 More significantly, in some jurisdictions it may constitute the practice of law without a license to provide sophisticated self-help tools like those
117. See JOHN HAUGELAND, ARTIFICIAL INTELLIGENCE: THE VERY IDEA 9–12 (1985) (disputing the notion that the fact of having been programmed imposes a theoretical limitation on artificial intelligences). 118. See Ashley, supra note 25, at 31–34 (describing the use of Bayesian inference networks for retrieval of legal texts). 119. See STRANIERI & ZELEZNIKOW, supra note 88, at 111–15. 120. See id. at 25–31 (discussing tasks suitable for knowledge discovery from databases). 121. See Bench-Capon & Prakken, supra note 55, at 66–71. 122. See Dan Hunter, Looking for Law in All the Wrong Places: Legal Theory and Legal Neural Networks, in LEGAL KNOWLEDGE BASED SYSTEMS: JURIX ’94, at 55, 59–61 (H. Prakken et al. eds., 1994) (arguing that several implementations have used training sets that were too small to achieve statistically significant results and that successes were influenced by the designers’ implicit adherence to rule positivism). 123. Cf. Matuszek et al., supra note 97 at 1430 (describing the process of representing three million facts in the CYC knowledge base over the course of twenty years). 124. Cf. Key Publ’ns, Inc. v. Chinatown Today Pub. Enters., Inc., 945 F.2d 509, 512–14 (2nd Cir. 1991) (holding that a yellow pages directory was entitled to copyright protection as a compilation). But see supra Part IV.C (describing projects to make statutes, regulations, and case law freely available online).

606

Harvard Journal of Law & Technology

[Vol. 21

described in Part IV.125 Unlicensed practice concerns would not, however, apply for software designed for professional consumption. Finally, the legal community itself may resist adopting sophisticated tools. This resistance may derive from professional conservatism or from a general resistance to lay involvement in the legal process.126 Lawyers may feel that advanced IT techniques do not always address real problems. They may also find the tools too cumbersome to use or imperfectly integrated with existing IT infrastructure.127 Additionally, economic forces within the legal profession may make it difficult for new technologies to gain acceptance in traditional firms because there is little incentive to increase efficiency.128 Many new tools are designed to assist with the discovery process, however many firms pass on costs of discovery and legal research to their clients.129 Furthermore, currently many firms appear to insulate themselves from price competition such that they have little incentive to reduce costs to clients.130 Moreover, law firms usually have limited ability to raise outside capital and are hesitant to make significant capital investments in systemizing repetitive tasks.131 In the end, it may be client demands that drive firms to adopt new technologies, rather than initiatives from within firms themselves.132

125. See, e.g., In re Reynoso, 477 F.3d 1117 (9th Cir. 2007) (finding that the operation of a website which, in exchange for a fee, generated the forms for bankruptcy filings based upon user inputs, constituted unauthorized the practice of law). But cf. H&R Block TaxCut, Terms of Service Agreement, http://www.taxcut.com/universal/legal.html (last visited May 12, 2008) (disclaiming that any communications provide legal advice). Although the IRS permits the use of tax software, users of such software may be held responsible for errors resulting from bad inputs. See Maxfield v. Comm’r, T.C. Summ. Op. 2006-27, No. 8075-04S, 2006 WL 354656, at *3 (T.C. Feb. 16, 2006) (non-precedential) (holding that petitioners did not have reasonable cause for claiming improper deductions because their tax software depended on the entry of correct information and was not at fault for the error). 126. See PHILIP LEITH & AMANDA HOEY, THE COMPUTERISED LAWYER 315–17 (2d ed. 1998) (describing resistance to advisory and decision-support systems in the legal community). 127. See id. 128. See Darryl Mountain, Could New Technologies Cause Great Law Firms to Fail?, J. INFO. L. & TECH., Feb. 28, 2001, http://www2.warwick.ac.uk/fac/soc/law/elj/jilt/ 2001_1/mountain. 129. See Alan Cohen, Data, Data Everywhere, L. FIRM INC., Apr. 2007, at 16, 19–21, available at http://www.law.com/jsp/PubArticle.jsp?id=1179392701422 (describing the efforts of law firms to profit from the electronic discovery process). 130. See John Buley, Eight Things Keeping Law Firm Management Awake at Night, L. PRACTICE TODAY, Nov. 2005, http://www.abanet.org/lpm/lpt/articles/fin11051.html (noting current price insensitivities, but predicting an increase in law firm price competition). 131. See Lauritsen, supra note 1, at 173–74. 132. See Mark Chandler, Gen. Counsel of Cisco Sys., Inc., Luncheon Address at the 34th Annual Securities Regulation Institute: State of Technology in the Law (Jan. 25, 2007), available at http://blogs.cisco.com/news/2007/01/cisco_general_counsel_on_state.html (calling for firms to streamline legal processes by relying more heavily on IT and client selfhelp).

No. 2]

What Can Information Technology Do for Law?

607

VI. CONCLUSION
Although the legal profession already uses some computer technologies to automate law practice, and to store and retrieve documents electronically, there is a clear gap between the extent of adoption of sophisticated IT by other industries and by law firms. This gap has manifested itself as increasing costs and as unrealized efficiency gains. Fortunately, the research avenues surveyed by this Note, if realized, are likely to ameliorate these problems. New ways of constructing arguments, new methods for analyzing large sets of legal data, and new systems for representing that data will enable attorneys to reduce much of the repetitive waste they encounter in contemporary practice. Although there are a number of potential barriers to the adoption of new computer technologies in law, it seems inevitable that the large profit margins commanded by law firms, and the comparatively repetitive nature of some of their work, will lead clients to demand that more of the legal process be automated, streamlined, and put in their control. In addition to making legal practice cheaper and more efficient, some of the tools described in this Note may one day aid in the dispersal of legal knowledge beyond the current bounds of the profession, to clients and the lay public. At the same time, new technologies promise to remove some of the drudgery from the practice of law, and to allow lawyers to focus on analysis of unsettled or ambiguous issues. Although it is difficult to predict which technologies will emerge, or when they will do so, one can remain confident that the adoption of such technologies will almost certainly bring significant changes to the practice of law.

Similar Documents

Premium Essay

What Impact Does Technology Laws Have on Business in America?

...What Impact Does Technology Laws Have On Business In America? Tracy Bennett Herzing University 02/13/2015 What impact does technology laws have on business in America? We live in a world where laws control how America operates and how our society functions (Arndt, n.d.). We also live in a world where technology has taken over and for many it would be inconceivable to imagine living in a world without technology. Technology has changed the way we live and communicate (Winston & Edelbach, 2014, p. 2). Technology has also changed the way companies conduct business. It has opened up new opportunities for companies to gain more business but at the same time has also created new ethical problems and therefore lawmakers have had to design new technology laws that have had a major impact on American businesses. Technology laws can impact American businesses in a variety of ways from software licensing agreements, privacy issues, and the use of electronic signatures. In order to keep up the pace with changing technology businesses continuously change their operating software (Information Technology Law, n.d.). Continuously changing software programs has the benefit of greater profitability for the company but at the same time it can also create some major problems. Business managers and owners can run into legal issues if they do not fully understand the rules and laws of the licensing agreement which could result in a huge lawsuit against...

Words: 1009 - Pages: 5

Premium Essay

Cognitive Computing Project

...Law Assistants Co. Law Assistants Co. Law Assistants Co. Law Assistants Co. Prepared by: Maryam Arshad (212870234), Yueying Xu (212832747), Emilie Pryse (212740338), AmynaAmyna (212837373), and Constance Tomson (212804266) All Members from Section C Prepared by: Maryam Arshad (212870234), Yueying Xu (212832747), Emilie Pryse (212740338), AmynaAmyna (212837373), and Constance Tomson (212804266) All Members from Section C Table of Contents Executive Summary 2 General Information 3 Product Overview and Economic Justification 4 Risk Assessment and Mitigation 5 Marketing Plan 7 Marketing Mix 7 Application Development Plan 8 Application Development 8 Timeframe 8 Questions and Approach ……………………………………………………………………….…9 Summary 9 Conlusion 9 Bibliography 11 Appendix A – Crime Rates Comparison 14 Appendix B – SWOT Analysis 14 Appendix C – Estimated Costs 15 Appendix D – Estimated Revenues 15 Appendix E – The LawAssist Working Process 16 Appendix F – Implementation Process 17 Appendix G – Implementation Plan 17 Executive Summary In today’s world, technology is moving at an incredibly fast pace. Industries such as healthcare, retail and finance have all implemented one or another form of modern technology. Out of the many advancements in the past decade, the most significant is cognitive computing. Defined in simple terms, cognitive computing refers to a computer system that is modeled after the human brain (Cognitive Computing)...

Words: 7562 - Pages: 31

Free Essay

Ethics in Computing

...act. Technology will continue to advance and it’s our job to make sure that we always keep ourselves and our neighbors in mind when it comes to ethical behavior and computer technology. In this paper three article that touch on ethical concerns in computing in their own way. One will discuss how the concerns that we all may be very easily find ourselves in on a daily basis. One will look into more specific areas where ethics and computers intertwine, using cell phones to track pedestrians and home monitoring for the elderly. The other will hit on the risk and rewards of cloud computing and the ethics behind law firms and their move into the 21st century. Ethics surrounding computer technology are currently an ever evolving conversation. As technology advance so must the ethics and rules of how we handle our personal information and how others can and cannot used that information. With this evolution in technology there are many topics of concern that raise red flags and force people to reevaluate what needs to change in order to make sure that the very principals we hold as a country are not bent to meet the demands of changing technologies. Concerns over personal and private data who can see what and at what point is personal data no longer private. Identity theft is another issue as people become more and more willing to use computers to bank and pay bills they are more at risk of another person electronically stealing their information. Ethics surrounding information processing...

Words: 1690 - Pages: 7

Free Essay

Digital Crime

...The Future of Digital Crime and Digital Terrorism Introduction You will learn that law enforcement personnel that is just coming into this field needs to be trained with the upcoming technology. There is no need to train them on the old stuff and wait to train them on the new. They need to be able to be one step ahead of digital crime and digital terrorism. Right now, law enforcement is falling behind. Digital Crime Forecast The future of digital crime and digital terrorism is going to get worse than what it is right now. The laws and the law enforcement agencies cannot keep up with the ever changing technology. By the time they learn something to keep up with it now, something new is already out which puts law enforcement behind the power curve. Starting out as new personnel in the different law enforcement agencies you will have to get training on the technology that is already out and the one that is coming out. Technology is changing every day and is not going to stop. Learning from the past can help law enforcement forecast future trends in crime to facilitate creation of best practices for investigation and prosecution of computer crime along with researching all past, present, and future aspects of emerging methodologies in digital crime. There are eight forecasts that have been developed from the analysis and collection of data, in order to know the future of digital crime and digital terrorism. They are: Forecast 1: The number of offenses reported to the police...

Words: 1834 - Pages: 8

Free Essay

Technology and Privacy

...Running head: TECHNOLOGY AND PRIVACY 1 Technology and Privacy Shawna Greiner SOC 120 Jenna Soard April 22, 2012 Technology 2 There was not such a thing known of as technology back in the beginning of time, but now technology has become the biggest thing used; it is so powerful throughout the world, that it is the number one thing used for just about everything in our everyday life. People have to have technology at a majority of their jobs in order to complete their tasks, Hospitals have to have it in order to take care of people and most of all keep track of files and records of people, government offices are the biggest one to have the technology that keeps all or a majority of information about every single human being that has lived. Another big technology that is done, but has been taken out of proportion is the internet and privacy. People that want to steal, take advantage of another person’s personal information, whether their social security number, physical address, work and income information along with credit, and bank accounts, then it is used to the person stealing it for their own advantage which later destroys the victim a lot of times. Technology has advanced to our own freedom...

Words: 1852 - Pages: 8

Premium Essay

Digital Crimes

...The Future of Digital Crimes and Digital Terrorism Strayer University Assignment 4 Submitted in Partial Fulfillment Of the Requirements for the Course CIS 170 Information Technology in Criminal Justice Dr. Jacob Ogunlade Spring 2015 Table of Contents Certificate of Authorship 3 name 3 Purposes one (1) strategy that the U.S. could use in order to mitigate the challenges in question. 8 Explain the fundamental manner in which the U.S. could align the efforts of federal agencies in order to better protect the nation against digital crimes and terrorisms 9 Conclusion 10 References 12 Certificate of Authorship I have read and understand Strayer University's Academic Integrity Policy. I promise to conduct myself with integrity in the submission of all academic work to the University and will not give or receive unauthorized assistance on the completion of assignments, research papers, examinations or other work. I understand that violations of the Academic Integrity Policy will lead to disciplinary action against me, up to and including suspension or expulsion from the University. I know that all students play a role in preserving the academic integrity of the University and have an obligation to report violations of the Academic Integrity Policy committed by another student. In addition, I name certify that I am the author of this document and any assistance I received in preparing this report fully acknowledged. I have also cited in APA format for all...

Words: 2106 - Pages: 9

Free Essay

Information Technology Acts

...Information Technology Acts Paper Ryan Beland BIS/220 Mr. Vozella 7/28/2104 In today’s world we do not start our mornings with an essential meal, a cup of coffee, and reading the newspaper; but with the simple press of one of the most iconic buttons, the power button. The dramatic increase in technology demands the attention of almost every person across the globe as they connect, work, and coordinate daily plans and objectives with those close and far away. Information technology is one of the largest demanded and growing systems users have available. Information technology is the use of computer and telecommunication based systems; to store, send, manipulate, and retrieve data information across the various environments for the users utilizing the systems (Wikipedia, 2014). From professional, academic and personal situations these systems are more than ever present in the daily routine. The increased demand and use of these systems does make daily tasks easier and quicker to complete, but even the most beneficial tools can come with a cost. The information systems we utilize improve efficiency and effectiveness, but open doors for dangerous, illegal, and unethical actions. In order to control or limit these technological woes, various laws and procedures have been put in place to protect the users and societies that wish to implement these systems features into their lives. In this paper we will examine two laws specifically what they entail, the ethical dilemmas...

Words: 1432 - Pages: 6

Premium Essay

Ethical Theories in Information Technology

...Abstract This assignment will define and discuss the ethical theory of Kantianism. Kantian ethics is based on abiding by moral laws that are universal for everyone. It allows us to rationalize our decisions based on our duty to do what is right. This assignment will also discuss how Kantianism represents my personal principles. Kantianism provides moral laws that provide a sense of equality for all people. There are also several arguments that are against Kantianism and will dispute the theory. But the overall goal of Kantianism is to ensure that every person is treated with respect. In addition, this assignment will discuss and defend my position on a contemporary IT issue using a practical ethical theory. Unit 1 Assignment 1 Ethical Theory-Kantian The ethical theory that I have chosen that best represents my personal principles is Kantianism. This theory was named after the German philosopher Immanuel Kant. According to Quinn, “Kant believed that people’s actions ought to be guided by moral laws, and that these moral laws were universal” (Quinn, 2013, para. 2). The universal law is the belief that everyone tries to do the right thing and be a rational person and therefore rational decisions can be applied to everyone in the world. Kantianism does not consider the consequences of the ethical issues to be important, rather it is based on what should be done or doing the right thing regardless of the consequences. Kant’s decision is based on the theory that nothing is...

Words: 1571 - Pages: 7

Premium Essay

Information Technology Ethics Issues Article

...Information Technology Ethics Issues Article Georgeanna Chapman BIS/221 March 23, 2015 C. Randall Shirley Information Technology Ethics Issues Article Memorandum To: C. Randall Shirley From: Georgeanna L. Chapman Date: 4/26/2015 Re: Information Technology Ethics Issues Article Summary Laws and Ethics Can’t Keep Pace with Technology The article that I chose to use is from MIT Technology Review. In the article; it was discussed on how Ethics can’t keep up with the growing use of Technology. 1. Employers can get into trouble in interviews asking potential applicants about their sexual preference, religion or political affiliation, yet can find all this information on social media and it isn’t against the law. 2. Laws forbid lenders from discriminating on the basis of race, gender and sexuality, but if their work history on Facebook doesn’t match their work history on LinkedIn, they are socially undesirable. “We haven’t come to grips with what is ethical, let alone with what the laws should be, in relation to technologies such as social media.” (Wadhwa, 2014, p. 1) The laws and ethical practices are forever evolving. With the public uproar about the surveillance by the NSA this actually pales in association with the data that Google, Apple and Facebook are collecting and people don’t seem to be concerned about that. You give these sites permission to collect this information and store it. We will have similar debates about self-driving cars, drones...

Words: 434 - Pages: 2

Premium Essay

It Law and Ethics

...Chapter 11 Law and Ethics Chapter Overview Chapter 11 covers the topics of law and ethics. In this chapter readers will learn to identify major national and international laws that relate to the practice of information security as well as come to understand the role of culture as it applies to ethics in information security. Chapter Objectives When you complete this chapter, you will be able to: Differentiate between law and ethics Identify major national and international laws that relate to the practice of information security Understand the role of culture as it applies to ethics in information security Access current information on laws, regulations, and relevant professional organizations Set-up Notes This chapter could be completed in a single class session, if there is sufficient time to cover the material. Unless the students have not had the opportunity to read the material in advance (in some settings, the textbooks are not made available until the first class meeting), it may be prudent to have a general discussion of the topic, with detailed lecture to follow at the next class meeting. The subject matter can be covered in 1.25 to 2.5 hours. Lecture Notes and Teaching Tips with Quick Quizzes Introduction As a future information security professional, it is vital that you understand the scope of an organization’s legal and ethical responsibilities. To minimize the organization’s liabilities the information security practitioner must understand...

Words: 4470 - Pages: 18

Premium Essay

Criminolgy in the Future

...would be the advancement of technology and its impact that it will potentially have on crime fighting in the future. Technology is ever changing and it something that we have all witnessed advance over the course of time, whether that is the progression of a tape recorder, to a CD, a CD to a Mp3, and Mp3 to iPods and iPhones. The only difference is that with criminal justice technology takes them much further than to just being able to listen to music but rather to get ahead of crime and to get a grasp on the criminals who are committing the acts. Technology is insightful in every aspect of the criminal justice system, from the examination to the trial of crimes. The advancement of technology is already in its most profound stage of conformity. It is allowing us to be visually able to see individuals from space via satellite and target their intellect by viewing what it is they are arranging criminally and for us to use that information to our advantage. Other directions of crime fighting and its role in social policy implications suggest that we are also setting up to not only visually be ahead of the game and criminals in the future but also that we are asking it possible for us to listen more openly to conversations that are being exchanged between criminals. This alone is substantial information that sticks in the courtroom when it comes to putting these individuals behind bars for their criminal acts. There are so many forms of technology that we use such as surveillance...

Words: 2184 - Pages: 9

Premium Essay

A Machine to Think for Us.

...imagined that so much of the “technology” in the program would become a reality. Talking, thinking, responsive computers and tiny personal communication devices, for example, just seemed like science fiction. Now they are not only a reality, but they are an indispensable part of everyday life. I can hardly imagine the developments in technology that my children will experience. Thinking of the future and trends in technology, at this time I believe there is almost no limit to what humans are capable of creating. Technology developments happen faster and faster each day. This is especially true for computers, both personal and business and industry based models. My first computer was Commodore 64 and it was a neat thing to have but it didn’t do much. After I joined the Navy, I worked with an aircraft guidance radar system that was powered by a UNIVAC computer. In fact the Navy somehow kept that system running well past the year 2000. Now, we have progressed well past these dinosaurs. Computer developments are the wave of the future, and development in that respect will shape events worldwide. Moore’s Law, formulated in 1965, predicts that the number of components in an integrated circuit chip will double every 18 months (Shahan, 2013). Considering the power of computers today, if Moore’s Law continues to hold true, the developments in computing power will produce computers that are exponentially more powerful than today’s computers (Moore’s Law, n.d.). Considering this, I...

Words: 1303 - Pages: 6

Premium Essay

Critical Issues

...issues Mary E Rios CJS210 July 1, 2012 Amanda Dean Critical issues Criminals today are using technology to their advantage when committing crimes; therefore law enforcement must also use technology when taking down the criminal. Technology can be used to prevent crimes as well as to solve crimes after they have happened. Law enforcement today is focusing more on the less then lethal weapons whenever possible. Police officers are faced with many dangers in their daily jobs. Police officers are constantly faced with the unknown and the unpredictable. A routine call could turn out to be deadly or contamination of infectious disease. The Internet has changed how police officers can complete their daily jobs; the Internet has opened doors to so many technological advancements and if all departments are updating their processes and up with technology their jobs could be much more adequate and less room for error or delays. Major technological advancements include database technology, computer aid dispatch, record keeping, and mobile computing. What was once known as the card file index is now known as databases or COMPSTAT, these databases hold criminal information, management information, reports that can be used for statistics or analytical information, trends in crimes, and also can be used for staffing based on geographic crime history. All of this information is at the fingertips of an officers or management personnel to quickly make a decision when necessary...

Words: 3141 - Pages: 13

Premium Essay

Sterile Technology

...Farren and Gibb are correct when they say that the only things we can do about surveillance technologies is to get use to them. The advancement of the technology has come so far as to make it all but impossible to contain it. In a larger context this is because we depend on it in the first place. This dependence is encouraged by our own use of surveillance, tracking technologies and our voyeuristic desire to see ourselves and others. The need of these technologies in the commercial and governmental sectors is insatiable. The commercial aspect can be anything from security for your home to selling products on the internet. The desire for more information about consumers drives businesses to seek out more direct ways to target their customers and sell more products. This can be something as simple and personal as recommendations from websites such as Amazon, or Netflix (p. 42, Farren &ump; Gibb, 2007). Super markets use club/loyalty cards which provide discounts in exchange for tracking a person's or households purchases. All of these purchases are matched up to someones name and address. This information can than be cross checked with other records that can form an image of a person (p. 41, Farren &ump; Gibb, 2007) . This data can be sold or mined and reconfigured, it has even provided a tool to be used for political purposes. The political side of consumer purchases allow for direct targeting by political parties such as the Bush campaign in 2004 (p. 43, Farren &ump; Gibb, 2007)...

Words: 1670 - Pages: 7

Premium Essay

Contemporary Issues and Futures in Criminal Justice

...The evolution of technology directly affects the way the criminal justice system operates at fundamental levels. A wide range of technologies are employed in support of the justice system, including identification software, database management software, computers, automobiles, and weapons. The adoption and implementation of technology also directly shapes the policies and practices of the justice system. For example, the development of modern communications and transportation technologies in the early 1900s increased the response capability of police and changed citizen calls for service. Computers and cellular technologies have increased the capacity of data processing, information sharing, and communications within and across agencies. The increasing societal dependence on the Internet and computer-mediated communications have led law enforcement to develop tools to investigate offenses online. Thus, technology plays a pivotal role in the justice system, though a majority of researchers focus on the implementation and effect of technologies in law enforcement agencies. Over the last several decades’ technology has evolved in ways that most would never have imagined. Technology used to be something only seen in movies or The Jetson’s. Today, technology is used to operate in nearly everything we do throughout the day. The increased use of technology offers many pros and cons, when it comes to the criminal justice system, it can greatly impact and/or seriously hinder all in one...

Words: 1335 - Pages: 6