Philippine Lawbytes 160: Technology Service Providers As Indispensable Parties in the Online MCLE and the Necessity for Understanding and Setting Standards (Copyright by Dr. Atty. Noel Guivani Ramiscal)

Last June of this year, I came out with an article that enumerated some of my comments on the Implementing Rules and Regulations of the Supreme Court on the Online Mandatory Continuing Legal Education (MCLE) seminars for lawyers. I circulated it with several entities and decided to publish it this month on this blogspace. I have gotten some comments to my comments since then, and I desire to highlight in this article one very important entity the Supreme Court missed in its enumeration of the parties involved in the provisioning of the online MCLE and their concomitant obligations, i.e., the technology service providers.

Perusing the IRR’s provision on the technical requirements, it was stipulated that:

a) Providers must have:

1) Reliable internet connection;

2) High bandwidth availability, able to scale and capable of supporting numerous simultaneous connections;

3) Encryption mechanism to protect users’ data;

4) High availability/uptime and low downtimes;

5) Data Retention and Destruction Policy;

6) Audit Trails and Logs;

7) Fast and reliable 24/7 Customer Service Support in case of technical glitches/issues [Rule 1, Section 2. Technical Requirements].

It was a mistake to exclude in the IRR any specific reference to technology service providers because most, if not all, the Supreme Court MCLE accredited government and private providers (hereinafter “accredited providers”) are not technologically and logistically equipped to provide all these technical requirements, and then some, to MCLE online participants. It is quite explicit that even in the accreditation process, these accredited government and private providers have to present a “working prototype of their online MCLE offering” [Rule 1, Section 1. c)], which requires a feasible proof of concept and evidence of viable technical capabilities that these accredited providers on their own, do not possess. So, in order to comply with these requirements, these accredited providers would have to outsource or seek the assistance of so-called “third party” technology providers who would be the ones that are actually equipped to provide the technology services and support to make the MCLE online seminars a reality.

The COMELEC example

One must be wary in treating technology providers as third parties, which are outside of the disciplinary purview of the Supreme Court. In my book “Cryptology: The Law and Science of Electronic Secrets and Codes” I dissected the contractual relationship between COMELEC and Smartmatic TIM and gave it as an example of a horrific relationship that had apparently served to oppress and disadvantage the Philippine electorate.

Cryptology Book of Dr. Atty. Noel G. Ramiscal

Cryptology Book of Dr. Atty. Noel G. Ramiscal

What happened in the inception? Well, we the Philippine electorate and citizens, through COMELEC, paid billions of pesos for the technology that was not yet tested when it was procured, and as it turned out Smartmatic TIM did not originally own the intellectual property rights to the technology, including the source codes, when they were procured way back in 2009. It was a mere licensee. The owner was Dominion Voting Systems, a third party, who was not involved in the contract between COMELEC and Smartmatic TIM.

Dr. Atty. Noel G. Ramiscal presenting his manuscript of "Cryptology: The Law and Science of Electronic Secrets and Codes" to then UP Institute of International Legal Studies Director, Atty. Harry Roque Jr. last January 27, 2015

Dr. Atty. Noel G. Ramiscal presenting his manuscript of “Cryptology: The Law and Science of Electronic Secrets and Codes” to then UP Institute of International Legal Studies Director, Atty. Harry Roque Jr. last January 27, 2015

This fact was not esoteric or hidden knowledge, and Atty. Harry Roque, in 2009 already warned that if the relationship between Smartmatic TIM and Dominion Voting Systems soured, COMELEC would just be a
bystander.

True enough, Smartmatic filed a complaint against Dominion Voting Systems in Delaware, USA last September 11, 2012, and in its complaint, one of its revelations was that Dominion Voting Systems never gave it access to the revised source codes of the election technologies, ever since the May 2010 e-elections in the Philippines because it was exacting more money from Smartmatic, which the latter apparently was not willing to pay. Due to the conflict between the two, COMELEC was reduced to waiting for the source codes to be given to it by Smartmatic TIM. The alleged revised source codes for the election technologies were given to COMELEC several days before the May 13, 2013 e-elections, which of course, made it impossible for any legitimate Philippine source code reviewers to conduct comprehensive source code reviews prior to the e-elections, which was provided by law.

Indispensable Parties and Accountability

The whole point of the above example is that the real actual technology providers for legitimate activities tinged with public interest, like the online MCLE seminars, cannot and should not be treated as unseen third parties. The IRR relegated them to the invisible sidelines. They are indispensable parties in the provision of services to what I still believe is an important sector of the public, i.e., the legal professionals.

The thing is, accountability must not be held to rest by implication. Technology providers must be properly named or included in the IRR, to be held accountable to certain technological and legal standards, and not merely on the data privacy aspects.

Also, it would certainly be inequitable that in situations where their services go awry, only the accredited providers would get the blame, primarily from the participants who deal directly with them, and who might not know the real technology providers. At the very least, by subjecting these technology providers to the administrative arm of the Supreme Court, they can be made to explain for the lapses in their service, and can be subject to fines and sanctions.

Technological Standards

In my first article, I insisted on certain technological standards that need to be spelled out by the Supreme Court which necessitate that its relevant personnel, researchers and officials that draft IRRs on technology related matters must be up to speed in technological developments that pertain to its legal and judicial activities. It is only by understanding and setting the relevant standards can accredited providers and the Supreme Court determine if, how, and when technological providers can be held accountable for their fault, negligence and outright breach of their responsibilities.

The Necessity for Setting or Defining Standards

Now one of the comments I have received from my first article sideswiped the need for establishing standards in favor of trust or belief in the technology provider’s services. Trust or belief in an IT system that will implement the online MCLE course offerings, cannot, and should not replace the compliance of such IT system with industry standards, evidenced by legitimate third-party certifications, coupled with proven good governance and customer satisfaction.

Finding out the relevant standards and insisting on their compliance, are as much a task for the accredited providers in their negotiation and dealings with the technology providers, and the Supreme Court MCLE Committee, in its oversight or supervisory role.

I must point out that technology providers, particularly those in the cloud industry, can be classified into several entities according to the NIST Cloud Computing Standards Roadmap.

The accredited providers are technically the “cloud consumers”, since they are the ones “that maintain a business relationship with, and uses the service from, a cloud provider”. The accredited provider is the one that “requests the appropriate service, sets up service contracts with the cloud provider, and uses the service” for the benefit of its end users, the MCLE participants.

The technology providers can be classed under the NIST Roadmap either as cloud providers or cloud brokers. A cloud provider is one “responsible for making a service available to cloud consumers. A cloud provider builds the requested software/platform/infrastructure services, manages the technical infrastructure required for providing the services, provisions the services at agreed-upon service levels, and protects the security and privacy of the services”. An example is the Amazon Web Services (AWS).

However, the accredited provider, as a cloud consumer, may not be able to create, and or manage all the services necessary to realize and deliver the MCLE online courses to the MCLE participants. This would probably be the case for most Philippine accredited providers. So, instead of dealing directly with the cloud provider, the accredited provider would enlist the services of a cloud broker. This entity would manage the use, performance, and delivery of cloud services, and negotiate the relationships between cloud providers and the accredited provider. The cloud broker would provide a single interface or platform for multiple cloud services that may be in public, private or hybrid clouds and provided by different providers. An example is the IBM Cloud Brokerage Managed Services.

Two other entities must be mentioned for the sake of completion. A cloud carrier provides connectivity or access between cloud consumers (and their ultimate customers), and cloud providers. The cloud carrier also distributes cloud services through the physical transportation of storage media like high capacity hard drives. It is actually the cloud provider that will contract with the cloud carrier for the appropriate services, including encryption of connections between cloud consumers and cloud providers.

The last is the cloud auditor which the NIST Roadmap designated as the party that can “conduct independent assessment of cloud services, information system operations, performance, and the security of a cloud computing implementation. A cloud auditor can evaluate the services provided by a cloud provider in terms of security controls, privacy impact, performance, and adherence to service level agreement parameters”. This entity is especially crucial for the cloud consumer like an accredited provider which seeks proof of the technical viability of a cloud broker or cloud provider, prior to securing their services.

The Baseline Standards

Currently, there are different standards touted by different organizations concerning the evaluation of cloud computing technologies and environments by cloud customers. This article is not the place to discuss all of these, but I would like to point out a few technological standards that have received many citations from various entities which address the crucial features of cloud services. These standards should be asked by cloud consumers to, and verified by, cloud service providers and cloud brokers, via certifications or at the very least compliance reports.

The Cloud Standards Customer Council advises cloud consumers like accredited providers to look for verification or certification of compliance by cloud service providers/brokers with several ISO/IEC standards.

ISO/IEC 27001 is an advisory standard that is meant to be interpreted and applied to all types and sizes of organizations according to the particular information security risks they face. This is not specific to cloud computing, but its principles can be usefully applied to the provision of cloud services. Some cloud service providers already claim conformance to ISO/IEC 27001, many of them through third-party certifications.

ISO/IEC 27002 is a collection of security controls (often referred to as best practices) that are often used as a security standard. Security controls described in ISO/IEC 27002 highlight the general features that need to be addressed, including asset management, access control and cryptography, to which specific techniques and technologies can then be applied. Accredited providers are advised to look for cloud service providers that conform to the ISO/IEC 27002 standard for physical and environmental security. A company can assert on its own behalf as to its compliance with this standard, but a 3rd party certification is a stronger form of attestation.

ISO/IEC 27017, is the Code of practice for information security controls based on ISO/IEC 27002 for cloud services. It provides guidelines for information security controls applicable to the provision and use of cloud services. Specific guidance is included in ISO/IEC 27017 to clarify cloud service customer and cloud service provider responsibilities. Since this standard is specific to cloud computing, accredited providers should seek cloud service providers with ISO/IEC 27017 certification.

ISO/IEC 27018 is the Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors. As its name entails, it sets specific guidelines, control objectives and controls aimed at protecting PII which is stored or processed by public cloud services. It uses as its bases the principles defined in ISO/IEC 29100 Privacy Framework. Both the Privacy Framework and ISO/IEC 27018 greatly complement the Philippine Data Privacy Law and should be consulted by accredited providers. Since ISO/IEC 27018 pertain to PII of online MCLE participants, accredited providers should verify if the cloud service provider has been certified as compliant of this standard. If not, accredited providers are advised to seek data compliance report from the cloud provider, reflecting the strength or weakness of controls, services, and mechanisms supported by the provider in all security domains.

When it comes to network security requirements, ISO/IEC 27033-1 — Network security overview and concepts; ISO/IEC 27033-2 — Guidelines for the design and implementation of network security; and ISO/IEC 27033-3:2010 — Reference networking scenarios – threats, design techniques and control issues, are quite pertinent. If the cloud service provider has an ISO/IEC 27001 certification, then its conformance to these standards would typically be included in the documentation of its adherence.

Digital certificates and encryption are important aspects of Information Asset Management, in support of public key infrastructure (PKI) and the establishment of trust when using cloud services. Accredited providers should be aware of the support that the cloud service provider has for digital certificates, including PKCS, X.509, and OpenPGP. However, I hasten to add that in the last two years, developments in quantum computing have accelerated, and I would tackle the subject of encryption in a separate article. Suffice it to say that we are now entering the age of quantum computing, and the quantum Internet, where the classical cryptographic systems employed now to protect e-data would no longer be safe.

I would also like to mention that Service Level Agreements (SLA) or Cloud Service Agreements (CSA), which are usually laid down by cloud providers/brokers need to be scrutinized and negotiated by accredited providers. It has been said that these agreements are “often the best indicator of how, and how often, the provider expects their service to fail. Therefore, CSCs (Cloud Service Customers) must remember that downtime, poor performance, security breaches and data losses are ultimately their risks to bear” [Object Management Group, Feb. 2019, Practical Guide to Cloud Service Agreements]. Thus, in my first Comments, I explained the significance of the “9”s in the percentages as they reflect in the expected uptimes and downtimes of a cloud provider service. The standard that should be imposed for this requirement, which should be reflected in the SLA between the accredited provider and the cloud service provider/broker should be 99.999%. This means that the online participant should never expect, and not experience any real downtime at all in accessing the online MCLE seminars 24/7, absent any force majeure or electricity outage that cannot be attributed to the fault or negligence of the cloud provider.

Conclusion:

The provision of MCLE online courses all over the Philippines must be professionalized. And this could only be done by adhering to technical and industrial standards that pertain to the delivery of services by technology providers, to which they must be held accountable. It is high time that the accredited providers and the Supreme Court, through its MCLE Committee, be cognizant of these standards that can ensure not only professionalism, but assist in meeting the needs of Philippine lawyers.

Philippine Lawbytes 157: No Slave to any Algorithm [Part 1]: Critiquing “Predicting Decisions of the Philippine Supreme Court Using Natural Language Processing and Machine Learning” (Copyright by Dr. Atty. Noel G. Ramiscal)

In 2018, several researchers/scientists (Michael Benedict L. Virtucio, Jeffrey A. Aborot, John Kevin C. Abonita, Roxanne S. Avinante, Rother Jay B. Copino, Michelle P. Neverida, Vanesa O. Osiana, Elmer C. Peramo, Joanna G. Syjuco and Glenn Brian A. Tan), hereinafter, the authors, from the Advanced Science and Technology Institute (ASTI), Department of Science and Technology (DOST), published a paper that should have made, at the very least, ripples in the Philippine judiciary and legal profession, but did not.

I came across the paper’s abstract and title while updating my “Cyber Law Ethics” and Judicial Ethics and Competence in Cyberspace” course modules in 2019. I hunted down a free copy of the paper online but could not find any, so I contacted two of the authors and several people from ASTI in February 2020, and Mr. Aborot promptly responded. I first discussed the ramifications of this paper in my February 22, 2020 and March 5, 2020 lectures for the UPIAJ Mandatory Continuing Legal Education (MCLE) seminars for lawyers at UP Diliman.

Since I am not aware of any written critique of this significant paper, I have decided to gather my thoughts and publish this as a way of enriching the knowledge base on this matter and opening new vistas for discussion, and further the development of work on this area.

Disclosure: I emailed the DOST ASTI people certain questions, several times prior to my February 22, 2020 and May 5, 2020 lectures, to clarify certain matters, but none of them responded back.

Published in the 2018 42nd IEEE International Conference on Computer Software and Applications, the paper breaks new ground as the first scientific paper that subjected selected available online decisions of the Philippine Supreme Court to a textual analysis using the Natural Language Processing (NLP) plus Machine Learning (ML)-based approach to supposedly predict the outcome of criminal cases that are appealed to the Supreme Court. The authors scraped from the Chan Robles Virtual Law Library (chanrobles.com) and the Lawphil Project (lawphil.net) online Supreme Court case decisions from 1987 to 2017 and narrowed their study to 6,483 cases. The authors created “datasets” which was termed “bag-of-words” model to analyze the content of the selected cases which were classified to crimes against persons, property, public order and drugs. The goal of the authors is to point to a solution in the reduction of case backlog in Philippine courts. Per the statistics presented by the authors, the Philippines has an average of 1 million annual cases filed per year, and 4000 cases per court per day are filed!

The articulated purpose of the study can be found in the statement that “(d)eciding on cases is a complicated and time-consuming task. It requires the court staff to sift through various records to identify supporting statements for any possible case outcomes. The possible outcome with the strongest support based on the statements in a case decision will be defined as the predicted outcome of the case.”

The use of algorithms, predictive coding software and analytics tools in the legal and judicial professions have been going on for quite some time. In Australia, several software products are used to help mediators and judges decide the division of marital assets of separated or divorcing spouses. The U.S., several types of software are used by law firms for e-discovery. In my 2019 tour of Rio De Janeiro and Sao Paolo, Brazil, I found out that Brazilian court judges have used certain software tools to help them decide certain cases like traffic collisions.

Dr. Atty. Noel G. Ramiscal in Sao Paolo, Brazil, 2019,

Dr. Atty. Noel G. Ramiscal in Sao Paolo, Brazil, 2019


Dr. Atty. Noel G. Ramiscal in Selaron Steps, Lapa, Rio de Janeiro, Brazil, 2019

Dr. Atty. Noel G. Ramiscal in Selaron Steps, Lapa, Rio de Janeiro, Brazil, 2019

Critique: Necessity & Utility

As a former Executive Assistant for one of Justices of the Court of Appeals, who later became a Supreme Court Justice, I completely appreciate the noble motive and the immense work done by the authors in this study. At the outset, the approach taken by the authors is not really novel.

The textual approach, though backed by science, follows an intuitive approach used by legal researchers and drafters of decisions. Way back in the 1990s, I participated in the Philippine Jurisprudence Program of the Philippine Supreme Court for all court researchers. We were trained to use and query a computer database containing all the Supreme Court decisions at the time. We inputted words or phrases in the database search engine relevant to our research and pertinent cases were presented to us in the form of an index containing the search words. If we look at the cases individually, we could find out if the reliefs prayed for were granted or denied, or if the lower court’s ruling was affirmed or reversed. This is the same mode of research that one can do using the lawphil.net, Chan Robles, and even the Supreme Court websites. There are software products available now that basically works in the same way.

Since jurisprudence is defined mostly by past precedents or stare decisis, lawyers and judges can rely on past cases to support their arguments and decisions. Often, one will discover strings of cases containing similar facts and law, decided by the Supreme Court similarly. It is not difficult to spot these cases and the Supreme Court would even cite in these cases, previous cases it had relied to come up with its ruling.

Dr. Atty, Noel G. Ramiscal's February 22, 2020 MCLE lecture where he discussed his critique of the DOST ASTI paper on predicting Supreme Court decisions

Dr. Atty, Noel G. Ramiscal’s February 22, 2020 MCLE lecture where he discussed his critique of the DOST ASTI paper on predicting Supreme Court decisions

The NLP approach used by the DOST ASTI people, would probably make the research faster. But strangely enough, the study itself did not contain any data that compared the time that an ordinary Philippine court researcher takes to research cases on a specific court case s/he is working on, in contrast with the NLP/machine learning research process of the DOST ASTI people. A perusal of the paper itself did not factor actual research speed as a specific variable into the study, which makes one wonder, about the paper’s utility.

To me, as a legal researcher, litigator and advocate of diverse rights and interests, what would be most useful is to come up with an algorithm that can guide judges, researchers and advocates of possible fair outcomes in cases where the facts and the issues they present are quite novel, or even in cases when the facts and issues are familiar, but following judicial precedent would bring injustice due to the changed circumstances and mores of society. Here, the NLP approach in the ASTI study would not be feasible because the textual approach ignores the historical, social, economic and political conditions that give birth to cases. In fact, the NLP approach would probably not be conducive in producing judicial progress and reform in cases of this nature.

Exclusion of stop words and Punctuation Marks

I take note of the fact that the authors excluded stop words that apparently do not add to the significance of the text, citing the “NLTK Library” and their own Tagalog stop words. The question is, was this “bag” of exclusionary words vetted and actually found inapplicable in the Philippine criminal legal context? If so, who deemed them inapplicable or useless?

Law has a branch of study called statutory construction, which contain rules that supposedly govern the reading, interpreting and deciding the application of laws to cases. Lawyers are taught that some words have specific legal connotations that may be different from their ordinary signification. The use of conjunctive words like “and”, and disjunctive words like “or” can change the meaning or interpretation of a legal provision. But these conjunctive and disjunctive words were excluded from the bag of relevant words because they do not apparently add to the meaning of the text.

The study also stated that it “remove(d) punctuation marks, numbers, and any other characters that were not letters” (p 133). But punctuation marks like “,” and “ ; ” can also change the import of legal provisions.

It is not clear from the study if such differences were actually considered in deciding what words were inputted into the “bag-of-words” fed to the NLP or ML framework adopted by the authors. This is a grave concern that goes into the accuracy and reliability of the framework they had adopted.

Philippine Lawbytes 158: No Slave to any Algorithm [Part 2]: Critiquing “Predicting Decisions of the Philippine Supreme Court Using Natural Language Processing and Machine Learning” (Copyright by Dr. Atty. Noel G. Ramiscal)

Limitations of the DOST ASTI Paper

The framework adopted by the DOST ASTI authors of the study excluded political, social, economic factors, in favor of the textual approach of past decided cases. As I have alluded to earlier, this is the study’s greatest flaw.

Spirit or Intent of the Law

One of the basic statutory construction rules that lawyers were taught when they were still studying the law, is that there is such a thing as the “spirit” or “intent” of the law in looking at, or in deciding a controversy. This is where a historical and philosophical appreciation of the law is needed.

A purely textual approach may not satisfy this type of inquiry. Examining the “intent” or “spirit” of the law would go beyond the text of the law. It would require going through, for example, the Minutes of House/Senate Committees’ meetings where the draft of the law was debated and deliberated upon. The algorithmic approach that excludes extraneous factors like these, that shape the way Justices or judges decide cases would certainly not be the right method.

Dr. Atty, Noel G. Ramiscal's February 22, 2020 MCLE lecture where he discussed his critique of the DOST ASTI paper on predicting Supreme Court decisions

Dr. Atty, Noel G. Ramiscal’s February 22, 2020 MCLE lecture where he discussed his critique of the DOST ASTI paper on predicting Supreme Court decisions

Evolving Nature of the Law

New laws and regulations are passed all the time that impact on the criminal jurisprudence. Laws are not frozen in time. Criminal acts can be decriminalized. Judicial principles can be changed or modified. A framework that does not provide for future developments may not yield accurate, reliable, nuanced outcomes, thus curtailing its relevance.

The Judge/Justice as an Unknown Factor

Law, unlike mathematics and statistics (which are the evident expertise of the authors of the study), is not an exact science that requires conformance to certain absolutely demonstrable principles. Apart from the acts of the parties that form essentially the facts of the case, upon which the legal outcome is largely dependent, there is also the judge who poses an unknown factor, which the study ignored.

The datasets, or in the authors’ words, the “bag-of-words model” that were formulated by the authors may be quite rudimentary, and may not fully cover the complexities and vagaries of Life that intrude into the actual decision making of Supreme Court Justices or even lower court judges.

Let us face it, the Supreme Court Justices decide the cases, en banc or by divisions, but in the end, each collective decision is the result of the individual acts of each Justice. The same can be said of any decision handed down by any lower court.

As an important consideration, there have been cases where judges and justices have been found guilty of judicial improprieties, and criminal acts including accepting bribes and corruption, pertaining to the exercise of their judicial functions, most especially, their decision making. A purely textual approach ignores all these crucial facts.

As I made this observation, I was reminded of one of the tasks I did when I was a Technical Consultant for the Commission on Higher Education (CHED). CHED had a Memorandum of Understanding with the International Business Machine (IBM) on “Smart Analytics course” which the latter desired to teach to Philippine State Universities and Colleges. I was tasked to review that MOA, which I did, and I attended a presentation of the IBM held at the UP Ayala Technohub on this matter, several years ago. In that presentation, I made a manifestation that smart analytics or essentially the use of algorithms to determine the behavior of individuals or even groups of individuals, can also be used to predict the decisions of judges based on their personal and professional circumstances, biases, beliefs and track record. I also stated that such technology can also potentially be used for unethical or legally dubious purposes, so that it would be best if IBM incorporate an ethics component in such course. Dr. Patricia Licuanan, who was the CHED Chairperson at the time, seconded my suggestion.

Philippine Lawbytes 159: No Slave to any Algorithm [Part 3]: Critiquing “Predicting Decisions of the Philippine Supreme Court Using Natural Language Processing and Machine Learning” (Copyright by Dr. Atty. Noel G. Ramiscal)

 

Erroneous Oversimplication

The authors of the study noted that formulating datasets for the study of lower court decisions would be different for Supreme Court decisions, citing their interview with a UP professor, where they were told that lower courts deal with questions of facts, and the Supreme Court only deals with questions of law.

But since the authors in this study dealt only with criminal cases, the information they were given by a UP academic is quite oversimplified and frankly, utterly erroneous, especially when it comes to criminal cases.

There are cases when findings of facts by lower courts are contradictory, or where questions of law and fact overlap, or inextricably linked with each other, or where the penalty for the crime is quite high, e.g.,, reclusion perpetua, that the Supreme Court has to review all the facts to come up with a decision that the Justices can live with.

Nowhere is this more evident than in criminal cases of rape committed by minors, where the criminal element of discernment must be decided. Here, the Supreme Court must look at all the facts, that were already passed upon by the lower court, to determine if the minor indeed committed the rape with discernment, i.e., at the time he committed the offense he knew the difference between right and wrong, and he knew that the act of rape is wrong, but decided to do it anyway.

So, in the end, formulating relevant datasets that would capture the complexities of the judicial decision process would even be more complicated than the authors realize.

The challenge for the authors or anyone involved in this venture, would be to come up with accurate datasets or “bag-of-words model” that capture all these factual, historical, legal and even philosophical complexities that I have discussed, that will be fed to an algorithm or framework that can yield reliable results.

Dr. Atty, Noel G. Ramiscal's March 5, 2020 MCLE lecture where he discussed his critique of the DOST ASTI paper on predicting Supreme Court decisions

Dr. Atty, Noel G. Ramiscal’s March 5, 2020 MCLE lecture where he discussed his critique of the DOST ASTI paper on predicting Supreme Court decisions

Another Critical Oversight

The result of the interview conducted by the authors of the study with the UP professor and the fact that none of the authors is a lawyer, highlight another fundamental oversight.

The authors clearly needed a lawyer collaborator, who must at least, had worked in the judiciary, or has a competent knowledge of the jurisprudential doctrines and theories discussed in the cases selected for the study, and most importantly, has a capable grasp of the technological concepts and processes that go into creating the datasets and the framework utilized in the study.

This is imperative, since non-lawyers and laymen, like the DOST ASTI researchers, have no knowledge and no understanding of the legal and ethical boundaries that legal researchers, judges and justices who draft and write decisions, are bound by, and must observe.

CONCLUSIONARY CAVEAT!

No matter how accurate any algorithm or predictive software can predict the outcome of any pending or future case, the drafters, judges and justices who actually sign these decisions, are legally and ethically obligated to factually check and cross check all the references they cite in support of their decisions.

While algorithms may make the task of evaluating the possible outcome of a case faster, judges and Justices, and their legal researchers, cannot and should not rely on algorithms to decide the cases for them.

So long as human judges are given by society the imprimatur to decide cases freely, they should not surrender their brain, faculty, judgment and discretion to a mathematical formula. In short, they should not be slaves to any algorithm.

Philippine Lawbytes 156: Comments on the Philippine Supreme Court Implementing Rules and Regulations on Online MCLE, by Dr. Atty. Noel Guivani Ramiscal

Due to the unusual and global circumstances we are living through, the Philippine Supreme Court’s (SC) grant, and release of the Implementing Rules and Regulations (IRR) governing the online Mandatory Continuing Legal Education (MCLE) last February of this year, is quite timely and truly useful for the thousands of lawyers all over the Philippines who are struggling to comply with their MCLE requirements. The online MCLE would revolutionize the way lawyers would learn, and it offers the best and safest way of complying with their legal and ethical duty of staying abreast with the developments of law, in the comforts of their home or office. It is also a cheaper alternative to the real time MCLE, where aside from the MCLE fees, lawyers who live in far flung areas or provinces, would also be forced to fly or travel great distances and pay for their accommodations in nearby hotels where the MCLE venue is located. This is a welcome development indeed. But I have been asked by several persons and entities for my take on the IRR on the online MCLE. I submit, that as is, the IRR missed on several important issues that truly need to be addressed fully and promptly, including the following:

1. Non-Clarity in the Availability of the Lectures/Course Modules

The provision:

    Forward streaming of course/module shall not be allowed and should only be available to the participant after finishing the whole course/module

. The participant may, however, review or go back to the previous slides at his/her convenience [Rule 2, Section 2, 3, italicized emphasis supplied]

is not clear.

What was the purpose of the italicized sentence? Does this sentence mean that the whole series of online lectures would be available to the participant for later reference or review after s/he finished the whole course or series of lectures? But isn’t it true, that when the participant actually participates in the online MCLE, the whole course is “streamed” to his/her computer, as part of his/her access right to the lectures that s/he paid to view and experience? In light of the absence of definition of “forward streaming” in the IRR, the whole provision does not make sense.

2. The Absence of Recognition of the Obligations and Duties of 3rd Party Technical Providers

The IRR does not recognize the strategic role and importance of technical providers that accredited providers may utilize in providing the online lectures. It mentions the technical requirements that accredited providers must have, but the reality is that many of these accredited providers will be partnering with 3rd party technical vendors or service providers.

The IRR mentioned the Data Privacy law as applicable to accredited providers as personal information controllers of the personal information of participants to the online lectures. But if 3rd party technical vendors or providers are the ones that will actually assist or process the personal information of the participants in the context of streaming the lectures, and in capturing the image of participants randomly, then these 3rd parties are to be considered personal information processors and are also subject to the provisions of the Data Privacy law. The accredited providers therefore have the legal task of ascertaining if these 3rd parties are compliant with this law, otherwise, they will also be liable for data privacy and security breaches that happen due to the fault of these 3rd parties.

3. No Reference to Standards for E-Data Storage

Another particular area of concern is the storage of the lectures and relevant data that the accredited providers are supposed to safeguard. The number of lectures will grow as the accredited providers continue to operate. In the U.S., there are several CLE providers that had amassed over 10,000 to 15,000 lectures that they offer to their customers at any given time. Would the accredited provider in the Philippines store all the lectures, and all the relevant data regarding their clients in their own data storage space or would such provider entrust all these to the cloud? If the accredited provider decides to be personally responsible for the storage of these e-data, then all the concomitant technical measures and safeguards including encryption, and 24/7 access to the e-data, particularly the lectures, would fall squarely on the shoulders of the accredited provider.

If the accredited provider decides to use the service of a cloud provider to store the e-data and have it accessed by participants on a 24/7 basis, the accredited provider would have to ensure that the cloud provider would comply with the requirements of the Data Privacy law and other Philippine laws and industry standards before the accredited provider enters into a contract with the cloud service provider. In this case, since the cloud provider would also be considered a personal information processor, the accredited provider must also inform and get the consent of the participants relative to the processing of their personal information by the cloud service provider.

The issue here is, the IRR does not even refer to any standards by which one can usefully assess the technical competence of the accredited provider or the cloud service provider.

Consider the technical requirement “High availability/uptime and low downtimes” [Rule 1, Section 2, a), 4)]. This would pertain to the easy and 24/7 access by the participants of the online lectures that have been uploaded on the server/s of either the accredited provider or the cloud service provider. The 24/7 access by participants of the accredited providers online MCLE lectures is implied by this requirement of “(f)ast and reliable 24/7 Customer Service Support in case of technical glitches/issues” [Rule 1, Section 2, a), 7)].

But what does this “uptime” and “downtime” actually mean?

In the industry standard, there are cloud providers who are offering 99% monthly uptime. Basically, what these providers are saying is that in any given month, its customers will experience around 7 hours of downtime or non-availability of their e-data per month. The downtime decreases, as the amount of “9”s increases. So, for example, if the cloud service provider is promising that it can offer 99.9% monthly uptime, it is representing that the participant will experience 45 minutes of downtime a month. Is that a high enough uptime and a low enough downtime? The IRR provides no guidance.

To me, it now depends on what the online MCLE lectures are represented to be. If the online MCLE lectures are touted to be available 24/7, then there should be no downtime at all. Or at the very least, the downtime should be reduced to the level that no participant could notice. So, let’s say, the cloud provider would promise that it can offer 99.99% monthly uptime, what that means is that the participant will experience about 4 minutes of downtime monthly. However, the ideal statistical uptime is 99.999% so that the MCLE participants will not experience any real downtime.

But, and this is a serious reality, there are so many security threats to cloud services that the monthly uptime promised may not be fulfilled. Verizon for example announced several years back that its cloud will be down for 48 hours in a month, and Azure experienced outages that totaled almost 40 hours in a month.

So, the lesson in all these is that the accredited provider must actually know the technical components and industry standards of providing the online MCLE lectures, and must disclose to their participants certain technical details that they must know, including cloud outages, to obviate customer dissatisfaction. The accredited provider should actually seek 99.999% uptime, and if the cloud provider does not actually deliver, the cloud provider must recompense the accredited provider for the cloud provider’s non-compliance with its representation.

4. No Provision Against the Copying of the Lecture by the Participants and Streaming it Online

There is no express and explicit prohibition on the attendees from recording a lecture as it progresses. This can be an issue, since the lecture as recorded by the participants can be uploaded to YouTube or other online services/forum. Participants can copy the streamed lectures with video capture streaming software, or even if they have a personal portal provided by the provider, the fact is, the lectures will still be streamed through the participants’ laptop, desktop or tablet, so they can surreptitiously record the lectures with a strategically placed hidden video camera.

The uploading of the recorded copy on a publicly and freely available online video service diminishes the value of the lecture as created by the lecturer, and as maintained by the provider. No participant to an online MCLE would choose a lecture that can be availed of, for free on YouTube.

5. Intellectual Property Rights of Lecturer, and his/her Relationship with the Provider and the Lecturer’s Fee

The IRR solely focused on the requirements and obligations of providers and participants. It forgot the most important element in the MCLE, whether provided online or in real time: the lecturers. They are the true content providers, not the MCLE providers accredited by the Supreme Court.

The implication of this crucial oversight cannot be overstated.

The IRR did not give any standard or model as to the intellectual property status of the lecturer to his/her lecture delivered online, and his/her relationship with the MCLE provider relative to the lecture that s/he created.

Before I go on, I must make certain disclosures.

I worked in the early 2000s as the Senior Director (AVP) for International Linkages and Labor Relations of a multinational company that had, as its main line of business, the provision of IT education. I piloted the e-Learning lectures of this company by doing the first online lecture on the topic of E-Commerce Law that I delivered at its control center. I sought and engaged the services of academics, particularly foreign IT specialists and scientists in doing lectures that were recorded and stored to be delivered online, or real time, for the benefit of the students of this corporation. We were clear that the academics still owned the copyright to their lectures and as far as I know, the corporation did not package their lectures for profit in any online setting. The lecturers were paid more than the average (Philippine) fee for an ordinary lecture.

Dr. Okyay Kaynak, the UNESCO Chair on Mechatronics, who accepted Dr. Atty. Noel G. Ramiscal's invitation and lectured for the AMAES Philippines

Dr. Okyay Kaynak, the UNESCO Chair on Mechatronics, who accepted Dr. Atty. Noel G. Ramiscal’s invitation and lectured for the AMAES Philippines

I also authored an online book for free available at one of my websites called “A Human Intellectual Property Right of Educators in Their Digital Creations: Exploring the Intersections Between Academic Freedom, Intellectual Property and Human Rights of Educators” with the URL:

EBOOK: “A HUMAN INTELLECTUAL PROPERTY RIGHT OF EDUCATORS IN THEIR DIGITAL CREATIONS: EXPLORING THE INTERSECTIONS BETWEEN ACADEMIC FREEDOM, INTELLECTUAL PROPERTY AND HUMAN RIGHTS OF EDUCATORS” BY DR. ATTY. NOEL GUIVANI RAMISCAL

This book discussed the intellectual property rights of educators over their online creations. Under the Philippine Intellectual Property Code’s stringent tangibility requirement, a lecturer whose lecture was recorded by someone else can forfeit his/her IP rights, like copyright, to the lecture, to the one who recorded the lecture. This requirement ignores the important moral rights attached to the economic rights that comprise the whole copyright over the lecture. In my book I argue that no stranger and no third party should ever be allowed to own the moral right to the lecturer’s voice, the lecturer’s phrasing and inflection of certain words, the lecturer’s appearance, body gestures, and performance, the lecturer’s education and experiences, the lecturer’s own pictures, and so on, that went into the totality of the lecture that s/he created and delivered.

Having said that, I would urge MCLE online providers to expressly clarify with the lecturers, who owns the IPR over the lectures. Would it be the accredited provider that will own the IPR, particularly the copyright, exclusively; or the lecturer; or would the lecturer and accredited provider co-own the IPR together?

The clarification of IPR ownership is also vital in the packaging, archiving, and grant of access by the accredited provider to the participants of the lectures created by lecturers.

In other jurisdictions, accredited providers offer a yearly or annual pass for a fee to participants who are granted access to the totality of the providers’ archives, so the participants can view the lectures they desire and require for their practice anytime, anywhere, within one year, while complying with the MCLE, or CLE requirements. This idea of having the participants take control of their learning is actually recognized in the SC IRR which proclaimed:

WHEREAS, online MCLE would provide a wide variety of course/topic choices to members of the Bar wherein they can adequately select courses/topics relevant to their practice and interest

Some providers also present tailored CLE offerings on certain subjects or themes that are “hot” in the legal field. These providers control the content that participants are allowed to see per CLE round. They charge a fixed fee for this.

These are all great for providers because they earn money, no matter what business model they adopt. These models allow them to reuse and repurpose the online lectures provided by lecturers, for years, until the content has become obsolete or need to be updated.

The big question is: what happens to the lecturer? Is s/he paid just one time for a lecture that the provider will use, reuse, package, repackage and offer countless times to participants in the course of a 3 year period, or until such time the content becomes outdated? Or will s/he get a license fee every time his/her lecture is included in the current offering of a provider? Or will s/he get a license fee anytime a participant chooses his/her lecture in the course of a 3 year period or beyond?

Owning, or even co-owning the IPR over the lecture would and should entitle the lecturer to be notified of the reusage, repackaging and reoffering of his/her lecture and to have an accounting of such by the provider.

I must also caution that the co-ownership model can be fraught with onerous conditions that are prejudicial to the lecturer. If it is an exclusive co-ownership arrangement, the accredited provider can prevent the lecturer from sharing, or licensing his/her lecture to a different provider. This would prejudice the sharing of knowledge in the online setting! This would also be unthinkable in the real time setting, where a lecturer can lecture to any MCLE provider which invited him/her, and there are no scheduling, travel or personal commitments on the part of the lecturer.

Online MCLE providers must also be made aware of the fact that online lectures are not the same as real time lectures. Online lectures require different skills and preparation. The multinational company I worked with provided some training for academics, and the payment package is different in terms of the higher rate of fees given to lecturers. MCLE providers must also pay in accordance with the length of the lecture. A 3 hour online lecture should not be compensated with the same rate as a 2 hour or 1.5 hour online lecture.

The Online MCLE IRR of the Supreme Court offers no guidance whatsoever on any of these matters.

Clearly, there has to be a fair and equitable way of treating and respecting the rights of lecturers, for without them, the online or real time MCLE would not exist.

Conclusion

I bring all these to the attention of those concerned, because these matters were pressing issues to me when I was an AVP, and are relevant now in the context of the new normal of Online MCLE, where the full value and presence of the human lecturer are not required.

DR. ATTY. NOEL G. RAMISCAL
IT Law Evangelist, Cyberlawyer