Skip to content
Information Age

Information Age

Insight and Analysis for the CTO

  • Subscribe
  • Login
  • facebook
  • twitter
  • linkedin
  • RSS
  • News
    • People Moves
    • Major Contracts
    • Releases & Updates
    • The City & Wall Street
    • Events
  • Data & Insight
    • Webinars
    • Research
    • Whitepapers
    • Insight Guides
      • Buyers Guides
      • How it Works
      • What it Means
      • Business Skills
  • Sectors
    • Agriculture
    • Automotive
    • Aviation
    • Construction & Civil Engineering
    • Consumer Electronics & Mobile
    • Media & Marketing
    • Defence
    • Education
    • Energy
    • Financial Services
    • Government & Public Sector
    • Healthcare
    • Legal & Accountancy
    • Life Sciences
    • Manufacturing
    • Not for profit
    • Property
    • Retail
    • Technology
    • Telecoms
    • Transport & Logistics
    • Travel & Leisure
    • Utilities
  • Topics
    • AI & Machine Learning
    • Automation
    • Blockchain
    • Business Continuity
    • Business & Strategy
      • CIO and CTO
    • Cloud & Edge Computing
    • Communications & Networking
    • Cybersecurity
      • Cyber Innovation
    • Data Storage & Data Lakes
    • Data Analytics & Data Science
    • Data Protection & Privacy
    • Development & Programming
    • DevOps
    • Digital Transformation
      • Disruptive Innovation
      • Transformation in Action
    • Emerging Technology & Innovation
    • Governance, Risk and Compliance
    • Hardware & Peripherals
    • Immersive Technology
    • IoT and M2M
    • IT management
    • Legislation & Regulation
    • Outsourcing
    • Robotics
    • Smart Cities
    • Software and Applications
    • Start-up scene
    • Tech and Society
    • Tech Giants
  • Tech M&A
    • IPOs
    • M&A
    • PE & VC
  • Careers
    • Business Skills
    • Companies
    • Major Contracts
    • Releases & Updates
    • Recruitment
  • Jobs
  • Regions
    • Americas
    • Asia-Pacific
    • EMEA
  • News
    • People Moves
    • Major Contracts
    • Releases & Updates
    • The City & Wall Street
    • Events
  • Data & Insight
    • Webinars
    • Research
    • Whitepapers
    • Insight Guides
      • Buyers Guides
      • How it Works
      • What it Means
      • Business Skills
  • Sectors
    • Agriculture
    • Automotive
    • Aviation
    • Construction & Civil Engineering
    • Consumer Electronics & Mobile
    • Media & Marketing
    • Defence
    • Education
    • Energy
    • Financial Services
    • Government & Public Sector
    • Healthcare
    • Legal & Accountancy
    • Life Sciences
    • Manufacturing
    • Not for profit
    • Property
    • Retail
    • Technology
    • Telecoms
    • Transport & Logistics
    • Travel & Leisure
    • Utilities
  • Topics
    • AI & Machine Learning
    • Automation
    • Blockchain
    • Business Continuity
    • Business & Strategy
      • CIO and CTO
    • Cloud & Edge Computing
    • Communications & Networking
    • Cybersecurity
      • Cyber Innovation
    • Data Storage & Data Lakes
    • Data Analytics & Data Science
    • Data Protection & Privacy
    • Development & Programming
    • DevOps
    • Digital Transformation
      • Disruptive Innovation
      • Transformation in Action
    • Emerging Technology & Innovation
    • Governance, Risk and Compliance
    • Hardware & Peripherals
    • Immersive Technology
    • IoT and M2M
    • IT management
    • Legislation & Regulation
    • Outsourcing
    • Robotics
    • Smart Cities
    • Software and Applications
    • Start-up scene
    • Tech and Society
    • Tech Giants
  • Tech M&A
    • IPOs
    • M&A
    • PE & VC
  • Careers
    • Business Skills
    • Companies
    • Major Contracts
    • Releases & Updates
    • Recruitment
  • Jobs
  • Regions
    • Americas
    • Asia-Pacific
    • EMEA
  • Subscribe
  • Login
Home » NoSQL » The law is a luddite

The law is a luddite

Pete Swabeyby Pete Swabey10 May 2007

In May 2007, three men appeared before a British court, accused of inciting terrorist activity on a web forum frequented by Islamic fundamentalists. As a key witness was cross-examined, the judge presiding over the case was forced to interject.

“The trouble is I don’t understand the language,” admitted Judge Peter Openshaw. “I don't really understand what a website is.” Judge Openshaw later had to request that an expert “keep it simple. We’ve got to start with the basics.”

The problem for the judiciary is only going to get worse. Increasingly evidence presented before courts has some element of technology involved: as businesses and people use computers to store documents, the evidence being presented comes in the form of emails or other electronic documents.

In the US steps are already underway to address the lack of technical know-how among Judges. The University of Denver’s Institute for the Advancement of the American Legal System recently published a guidebook, advising judges on how to deal with the process of e-discovery.

No such training scheme yet exists in the UK. However, perhaps British judges can be excused for their reluctance to engage with technology: the Libra project, designed to national computer system for magistrates’ courts, was last year described as the “worst IT project” ever.

Pete Swabey

Pete Swabey

Pete was Editor of Information Age and head of technology research for Vitesse Media (now Bonhill Group plc) from 2005 to 2013, before moving on to be Senior Editor and then Editorial Director at The... More by Pete Swabey

Related Topics

Related Stories

Data Analytics & Data Science

Five steps to build a business case for data and analytics governance

Here are five steps for data leaders to take towards building a strong business use case for data and analytics governance

Governance, Risk and Compliance

CSRD and how it applies to UK tech firms

Governance, Risk and Compliance

How the Digital Markets Act will challenge big tech anti-competition

Cybersecurity

Why cyber security strategy must be more than a regulatory tick-box exercise

Helping you grow your business is our number one priority, if you would like to take your business to the next step just sign up!

sign up now

Related Stories

Cybersecurity

61,000 open source projects, vulnerable to 15-year-old flaw, now patched

Following discovery of a 15-year-old vulnerability affecting open source projects through Python, Trellix has managed to patch over 61,000 of the ventures affected

Cybersecurity

Cybersecurity predictions for 2023 

Cybersecurity

Over 200 million email addresses stolen in Twitter cyber attack

Cybersecurity

Why diversity matters when recruiting cybersecurity staff

We provide general intelligence for technologists in the information age. We support CTOs, CIOs and other technology leaders in managing business critical issues both for today and in the future.

Further Information

  • Privacy Policy
  • Terms & Conditions
  • Contact Us
  • About
  • Media Packs
  • Contributor Guidelines

Contact us

  • +44(0) 207 846 1378

Address

  • Stubben Edge
  • 77 Cornhill
  • London
  • EC3V 3QQ