Håkon Wium Lie has many claims to fame — he not only created Cascading Style Sheets, an integral part of the web, but he also was the first person to publish the laws of Norway (which are public domain, but were behind a $1/minute paywall at the time) for free, online. Though the company that maintained this paywall threatened to sue, they eventually saw the light and put the laws up for free.
Decades later, Lie is once again at the centre of a battle over the publication of Norwegian laws — this time, it’s the decisions of Norway’s courts. These decisions are every much a part of the law as the statutes written by Norway’s legislature, and just like those laws, the court decisions are in the public domain. The same company that publishes the laws, Lovdata, also publishes these court documents.
Lie joined forces with the volunteers behind rettspraksis.no to create a free, public repository of Norwegian court decisions, only to find themselves sued by Lovdata, who falsely claimed that Rettspraksis had crawled its website to get the rulings (Lie got them by checking a set of rulings on CDROm out of the library).
Incredibly, the judge in Rettspraksis’s case ruled without hearing from Rettspraksis at all, and ordered Rettspraksis to take down the court rulings (they had already done so — apparently the judge didn’t even look at the site before ruling on it) and to pay Lovdata’s legal bills.
Rettspraksis is appealing, and they’re using the high-powered lawyer who defended Jon “DVD Jon” Lech Johansen.
I was happy to help the project by borrowing old Lovdata CD-ROMs in the National Library of Oslo. The old CD-ROMs are important for two reasons. First, they contain thousands of court decisions in one place and they are easy to read. Second, they have a definitive date of issue. While laws and verdicts are exempt from copyright, the EU has a directive on the legal protection of databases, which introduces a 15-year protection for databases. While I normally do not think that a stack of documents are a «database», it may be argued that the collection of decisions is protected by the directive. But a CD-ROM from 2002 is definitively not protected.
Being sued [Håkon Wium Lie]
Back in 2010, I linked to a superb infographic showing all the ways that official DVDs were worse than their pirate equivalents (unskippable ads and FBI warnings, etc); now Dnd01 has updated the graphic with a version highlighting all the ways that the games industry has encrufted their products with DRM that make them into […]
Muso is a London-based anti-piracy contractor, helping big entertainment companies conduct surveillance and legal threats against online infringers; in a new CitizenMe study they commissioned, 1,000 British internet users were surveyed; the headline finding: 83% of infringing downloads are triggered by an unsuccessful search for a commercially available version of the same work.
The European Union is updating its 2001 Copyright Directive, with a key committee vote coming up on June 20 or 21; on GDPR day, a rogue MEP jammed a mass censorship proposal into the draft that is literally the worst idea anyone in Europe ever had about the internet, ever.
From your apartment door to your bike lock, it’s not uncommon to carry a number of different keys on your keyring, but that doesn’t make it any more bearable when you’re fussing to find the right one or deal with the infamous pocket bulge. The KeySmart Pro’s smart design cuts down on key clutter and […]
You have a right to privacy, but whether or not it’s respected online is a different story. With hackers, shady third-party companies, and the government prowling the web for personal information, you can’t be too careful when it comes to protecting yourself online. VPNs have emerged as a popular solution, but not all are created […]
It might sound counterintuitive, but one of the best ways to bring down a hacker is with another hacker. Commonly known as “white hats,” or ethical hackers, these professionals use a cybercriminal’s tools against them, sniffing out network vulnerabilities and patching them up before they can be exploited. In today’s heightened cybersecurity climate, demand for […]