Party autonomy & the English Arbitration Act 1996

Just as there are international conventions guaranteeing recognition of party autonomy, there are mandatory rules (e.g. arbitrability, due process that limit and constraint on the types of issues that can be submitted to arbitration and the effectiveness and enforceability of the arbitral award) overarching the extent of party autonomy.

Mandatory provisions may vary from country to country, e.g. under the Arbitration Act 1996 of England, Section 3 and Section 4, the mandatory provisions cannot be fully superseded or contracted out by the parties if England is chosen as the seat of arbitration for the procedural framework.

So far as the English Arbitration Act 1996 is concerned, no specific definition is given for discovery or disclosure. However disclosure is provided under section 34(2)(d).

Whether it is electronic disclosure or not, party autonomy and arbitral authority are still subject to the mandatory rules provision of the law of the place of arbitration. For example, under the English Arbitration Act 1996, arbitrators have a mandatory duty to adopt procedures suitable to the circumstances of the particular case, avoiding unnecessary delay or expense, so as to provide a fair means for the resolution of the matters falling to be determined’.

Under the English law, a tribunal will face the dilemma of fulfilling its mandatory duty in an area, – inefficient court proceedings/procedures, which leads to the rules reforms observed in the UK and the US. With the procedural demands from electronic disclosure, the stakes for not meeting its mandatory duty is higher than a non-electronic disclosure case, as electronic disclosure is a fairly new phenomenon in the US and also in the UK. Potentially, a tribunal could face ‘manifest disregard of the law’ under the English law.

 

myth and reality – fearsome creatures

How Reality Made Myth in the shape of dragons and other beasts.

Read this not only for the interesting stories but also the nice pictures. Perhaps one can also identify who one is amongst the stories of the beautiful and fearsome creatures in our make belief world.

The Compliance, Security or Operability questions for E-Discovery

 

Last week I went to the infosecurity Europe event in London as I was attracted by the keynotes titles and the interactive theatre. Besides returning home with three different caps/hats, one even has a battery attached to it (stress balls seems to be out of fashion for the security nerds and herd, which is good for me because I love hats), I also found that security is no longer confined to ‘security policies’ or even ‘communications policies’. Information security is an industry itself even though having a secured information system/network is still a myth.

On the panel discussion: ‘Which is more important – Compliance, Security or Operability?’, the question then is Compliance or Operability?. ‘Compliance’ is compliance with an array of rules/regulations/standards and no debates there and since ‘Operability’ (the intended meaning here is that the system is functional/operable/available) is also one interesting ‘ilities’ (others are ‘traceability and trackability’) for ediscovery; I was hoping to hear more debates on ‘operability’. No debates whatsoever on operability, instead couple of enlightening questions were raised around ‘information asset’. Ah! back to security in terms of protecting assets. Questions raised are ‘How to identify information assets including assets in the ‘cloud’? ‘How to put information asset at appropriate risks to achieve maximum value?’ These questions are also relevant for ediscovery. Worth pointing out that asset identification is one key activity of risks management. How many organisations perform risks management on a regular or even a sporadic basis? How many organisations have security policies or communications policies in place? In place or not, policies are considered ‘given’ if organisation is not to be burdened with ediscovery.

Interestingly, the shift seems to be on the monitoring of systems/networks/e-mails etc (any conceivable ESI ) otherwise also referred to as ‘vulnerability management’ (replacing risk management?).

Monitoring of electronic communications was recently reported in the article, ‘E-Discovery Keeps an Eye on the Job’ by A. Michael Weber New York Law Journal April 25, 2008. Here, the assets (also potential sources of ESI) are not just e-mails but also physical assets. Now imagine working in an organisation whereby such assets are ‘classified as company secrets’?! Mmm I wonder what Bruce Schneier will write after ‘Beyond Fear’. I have not read the book, just what’s on http://www.schneier.com/book-beyondfear.html. How about ‘Beyond Reason’?

Before I get too carried away, back to the infosecurity show…

A striking reminder comes from the chair of ‘The Hacker’s Panel’ (which I also attended out of curiosity as I was attracted by the lack of disclosure on the topic which said ‘ for legal reasons the panellists will not be revealed) was the old adage, ‘you can’t control what you can’t measure’. The theatre (non interactive, capacity 100-200) was pretty full. I remembered having to queue to enter.

So the reminder further re-inforced that information security is a myth. Can’t measure, can’t control. Can’t measure because no (reliable/operable?) information is available on cybercrime. Some mumbling on human factors, change behaviour, ‘hacker’ mindset gaps all revealing that security is not just related to policies, codes, printers, e-mails or networks.

Also a good reminder for ediscovery/disclosure :-)

Just for the record – 2nd article on the IBA Rules

The other article (which was referenced in my dissertation) was posted here under the title: WHERE NEITHER THE IBA RULES NOR U.S. LITIGATION PRINCIPLES ARE ENOUGH

Just recently my friend, Martin (another ex-student of QM) pointed out another article in the International Journal of Arbitration, Mediation and Dispute Management, Vol 74, Number 1, February 2008 issue, the title; ‘Confronting the Matrix:Do the IBA Rules Require Amendment to Deal with the Challenges Posed by Electronically Stored Information? by Nicholas Tse and Natasha Peter.

As expected, the answer is a simple ‘yes, the IBA Rules require amendment’ (like the 1st article). The solutions though are not so simple. For me, the solutions are not within the IBA Rules. That’s another story.

Although the second article provided guidance from the English and US amendments and strategies for dealing with problems posed by ESI, the challenges posed by ESI for arbitrators and parties are still in the making or rather unconfronted.

Can one confront the Matrix and maintain a ‘flexible’ IBA Rules?

a collusion of laws,regulations & standards on e-mails

I wondered if the term, collusion to mean ‘interplay’ (or more precisely in the old etymological sense of playing fairly together?) could be used in the context of looking at the various laws, regulations and standards surrounding e-mails.

According to Prof. Tony Hoare at a BCS evening talk, the collusion of the Science of Programming with the Engineering of Software provides interesting areas for research in domain modelling and ontology related subject areas (e.g. ontology languages).

Maybe one day there will be a ‘perfect domain model’ to represent our ‘real world’ with unbounded boundaries and constraints. Until that day…the present reality is that there are hosts of all kinds of information sets to talk about and write about.

If one can create a ‘wall on collusion’ of all existing laws and regulations on data and information, what would it look like?
Daniel J. Langin, Attorney at Law LLC provided a sample just on e-mails, A Guide to Keeping E-mail Legal: Four Pillars of Compliance‘.

Fancy an MSc in E-discovery (and Computer Forensics)?

The Glasgow University is offering an MSc in Computer Forensics and E-discovery. The University is also looking for a lecturer, ‘ someone with professional and practical experience as well as the ability to take a leading role in teaching, development and research in dynamic academic environment.’

From the Serious Fraud Office (UK), investigation is an art.

For those in UK and able to attend the British Computer Society (BCS) evening event on 27th May : Large Scale and Complex Fraud:the Digital Forensics Approach’ hosted by BCS IRMA, please pre-book and do comment here if you get to attend. I will be in Geneva on that day.

Sounds an interesting presentation from the flyer which says ‘the presentation will explain in depth the approach taken by the Serious Fraud Office in the collection, analysis, investigation and presentation of digital evidence for the purposes of achieving successful criminal prosecutions. The presentation will also cover the interrelationships between digital forensics as a science, and the investigation as an art.’

discovery of ‘e-mail diary’ disallowed even by a mock panel of international (real) arbitrators

I was at the ICC Arbitration Day event in Paris last week. Thanks to Ms. Mireze Philippe at the ICC for her company and lunch.

The mock arbitration was well organised with two sittings comprising of well known arbitrators, lawyers and also a barrister. Only one of the parties was not a lawyer. The participants were mostly from law firms from various European cities.

The mock arbitration was conducted in English and French and the ‘fictitious’ case involved an English Software consulting firm (the Claimant) and a Greek Banking corporation (the Defendant number 1). The claim against the Greek Bank’s majority share owner, a German Bank (the Defendant number 2) was dismissed by the panel in the first hearing.

Besides dismissal of the 3rd party claim, the tribunal comprising of two French arbitrators (including the chairman) and a Swiss lady arbitrator also dismissed the claimant’s request ( an English Lawyer) for discovery of ‘e-mail diary’.

A mock case no doubt but a ‘real’ cultural show of who wants discovery and who objects to discovery. How interesting!

Recent March publication & activity from the Sedona Conference

I have just found the WG1 March 2008 publication at the Sedona Conference site. The title is Commentary on ESI Evidence & Admissibility. Have not read it yet.

Maybe there will also be a publication from the Spring Conference (March event):
THE SECOND ANNUAL PROGRAM ON GETTING AHEAD
OF THE eDISCOVERY CURVE: STRATEGIES TO REDUCE
COSTS & MEET JUDICIAL EXPECTATIONS

US cases & CREDO

In looking for articles on the Qualcomm v. Broadcom, 2008 WL 66932 (S.D.Cal. Jan. 7, 2008) and the Columbia Pictures v. Bunnell, No. 2:06-cv-01093 (C.D. Cal. Dec. 13, 2007) cases, I came across CREDO – Case Review and Enforcement of Discovery Obligations programme.

I do not know what CREDO programme entails and wondered if there is also an English CREDO programme.

Time to go snooping for English news and blogs…