Hostname: page-component-78c5997874-ndw9j Total loading time: 0 Render date: 2024-11-08T14:49:02.384Z Has data issue: false hasContentIssue false

Why Authentication Procedures Matter for US and UK Public Legal Resources on the Web

Published online by Cambridge University Press:  25 March 2008

Abstract

Online legal resources are increasingly the sole official source. Authentication – the means to demonstrate that materials are what they purport to be – is inseparably interrelated with the official status of sources on the web. This article by Richard J. Matthews examines key features of the UK Statute Law Database, the US Government Printing Office future digital system (FDsys), and the Ohio Supreme Court database of judicial decisions that are relevant to assessing appropriate authentication procedures for those resources. Archival and computational authentication methods are reviewed. Overall findings of AALL's State-by-State Report on Authentication of Online Legal Resources and its recent national summit on authentic legal information on the web are analysed.

Type
Articles
Copyright
Copyright © The British and Irish Association of Law Librarians 2008

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

AALL, Access to Electronic Legal Information Committee and Washington Affairs Office. (2007a) State-by-State Report on Authentication of Online Legal Resources. Chicago, American Association of Law Libraries (as amended June 4, 2007). Available at http://www.aallnet.org/aallwash/authenreport.html.Google Scholar
AALL. (2007b) Authentic Legal Information in the Digital Age: AALL National Summit [webpage at http://www.aallnet.org/summit/default.asp]. Chicago, American Association of Law Libraries.Google Scholar
AALL, Government Relations Committee and Washington Affairs Office. (2003) State-by-State Report on Permanent Public Access to Electronic Government Information. Chicago, American Association of Law Libraries. Available at http://www.ll.georgetown.edu/aallwash/State_PPAreport.htm.Google Scholar
Association of Reporters of Judicial Decisions. (2007) Statement of Principles: Official On-line Documents. Available at http://arjd.washlaw.edu/ARJD_E-Pub_Committee_Authentication_Pos_Paper_FINAL_2–12–07.pdfGoogle Scholar
Black's Law Dictionary. 8th ed. (2004) St. Paul, MN, Thomson West (Bryan A. Garner, editor in chief).Google Scholar
Clinch, Peter. (2001) Using a Law Library: a Student's Guide to Legal Research Skills. 2nd ed.London, Blackstone Press.Google Scholar
Cullen, et al. (2000) Authenticity in a Digital Environment. Washington, DC, Council on Library and Information Resources. Available at http://www.clir.org/PUBS/reports/pub92/pub92.pdf.Google Scholar
Ford, Warwick and Michael, S. Baum. 2nd ed. (2001) Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption. Upper Saddle River, NJ, Prentice Hall.Google Scholar
GPO, Office of Information Dissemination, Program Development Service. (2005) Authentication [agency white paper]. Washington, DC, US Government Printing Office. Available at http://www.gpoaccess.gov/authentication/AuthenticationWhitePaperFinal.pdf.Google Scholar
GPO, Office of the Chief Technical Officer. (2006) Requirements Document (RD V2.1) for the Future Digital System (FDsys). [Washington, DC], US Government Printing Office. Available at http://www.gpo.gov/projects/pdfs/FDsys_RD_v2.1.pdf.Google Scholar
GPO. (2007a, as visited) Future digital system (FDsys), Current status [webpage at http://www.gpo.gov/projects/fdsys_status.htm]. Washington, DC, US Government Printing Office.Google Scholar
GPO. (2007b, as visited) GPO access, Authenticated public and private laws: Main page – beta release [webpage at http://fdlpdev.gov/plaws/index.html]. [Washington, DC], US Government Printing Office.Google Scholar
GPO. (2007c, as visited) GPO access, Authenticated public and private laws: About/help – beta release [webpage at http://fdlpdev.gov/plaws/index.html]. [Washington, DC], US Government Printing Office.Google Scholar
GPO. (2007d, as visited) GPO access, Authentication [webpage at www.gpoaccess.gov/authentication/]. [Washington, DC], US Government Printing Office.Google Scholar
Holborn, Guy. (2001) Butterworths Legal Research Guide. 2nd ed.London, Butterworths LexisNexis.Google Scholar
MacNeil, Heather. (2002) Providing grounds for trust II: The findings of the Authenticity Task Force of InterPARES. Archivaria 54 (Fall), 2458. Available at http://journals.sfu.ca/archivar/index.php/archivaria/article/viewFile/12854/14078.Google Scholar
Matthews, Richard J. (2006) The smart citizen's search for state law on the web: AALL authentication survey seeks to find out if there are official, authentic digital sources. AALL Spectrum 10(9), 20(5). Available at http://www.aallnet.org/products/pub_sp0607/pub_sp0607_Smart.pdf.Google Scholar
Matthews, Richard J. (2007) When is case law on the web the “official” published source? Criteria, quandaries, and implications for the US and the UK. Amicus Curiae: Journal of the Society for Advanced Legal Studies. 69 (Spring), 1925.CrossRefGoogle Scholar
Ministry of Justice. (2007a, as visited) Update status of legislation [on UK statute law database website at http://www.statutelaw.gov.uk/Revised.aspx]. London, the Ministry.Google Scholar
Ministry of Justice. (2007b, as visited) Disclaimer [on UK statute law database website at http://www.statutelaw.gov.uk/Disclaimer.aspx]. London, the Ministry.Google Scholar
Ministry of Labour and Citizens' Services. (2007, as visited) InterPARES 2 Symposium. Victoria, BC, Government of British Columbia, the agency.Google Scholar
NARA, Federal Public Key Infrastructure Steering Committee Legal/Policy Working Group. (2005) Records Management Guidance for PKI Digital Signature Authenticated and Secured Transaction Records. [Washington, DC, National Archives and Records Administration. Available at http://www.archives.gov/records-mgmt/pdf/pki.pdf.Google Scholar
Ohio Supreme Court. (2007, as visited) Ohio rules of court, Rules for reporting of opinions [as amended effective 1 May 2002]. Available at http://www.sconet.state.oh.us/Rules/reporting/.Google Scholar
US-InterPARES Project, Preservation Task Force. (2002) Preservation Task Force report. In Findings on the preservation of authentic electronic records: Final report to the National Historical Publications and Records Commission (grants # 99–073 and # 2001–005). US-InterPARES Project. Available at http://www.interpares.org/book/interpares_book_f_ part3.pdf.Google Scholar
Wrosch, Tom. (2207) Authentic legal information in the digital age: A national summit, Resources, Technologies [handout on file with author]. Chicago, American Association of Law Libraries. Bibliography identifies examples and further information on the following technologies: public record certification (e.g., technologies used by Kansas and Arizona to ensure authenticity of state-issued certificates of corporate good standing); high assurance/extended validation SSL certificates (e.g., Geotrust, Thawte, and Verisign); hashing and time-stamping (e.g., U.S. Postal Service Electronic Post Mark), PKI solutions (e.g., Adobe Acrobat).Google Scholar