EikhenomianxOjieifoxMastersxthesis

advertisement
DEMYSTIFICATION OF
CONTRACT FORMATION IN
ELECTRONIC DATA
INTERCHANGE;
A critical assessment of a course for legal
activism
Candidate: # 8019
Supervisor: Dr. Maryke S. Nuth
Deadline for submission: January/14/2011
Number of words: 16,269 (max. 18.000)
University of Oslo
Faculty of Law
DEMYSTIFICATION OF
CONTRACT FORMATION IN
ELECTRONIC DATA
INTERCHANGE;
A critical assessment of a course for legal
activism
II
© Candidate:
# 8019
2011
DEMYSTIFICATION OF CONTRACT FORMATION IN ELECTRONIC DATA
INTERCHANGE; A critical assessment of a course for legal activism
http://www.duo.uio.no/
III
IV
Content
1
2
3
4
INTRODUCTION ................................................................................................. 1
1.1
Background ................................................................................................... 1
1.2
Legal qestion: Is there a course for legal activism? ....................................... 2
HISTORY AND DEVELOPMENT OF EDI ........................................................... 5
2.1
What is Electronic Data Interchange ............................................................. 5
2.2
Structure of Communication Infrastructure in E-commerce in brief ............... 6
2.3
EDI; The bedrock for the development of E-Commerce. ............................... 8
2.4
Conclusion................................................................................................... 12
SYNOPTIC METAMORPHOSIS OF THE LAW OF CONTRACT ...................... 14
3.1
Definition of Contract ................................................................................... 14
3.2
Contract formation through Telephone and Fax .......................................... 14
3.3
An overview of Communication online......................................................... 21
3.4
An overview of Communication in Online Contract Formation .................... 24
3.5
Relevant Legislative overview ..................................................................... 29
3.6
Conclusion................................................................................................... 34
CONTRACT FORMATION IN EDI .................................................................... 36
4.1
Introduction.................................................................................................. 36
4.2
Sequence of Electronic Data Interchange Transaction................................ 36
4.3
Contract formation via Electronic Data Interchange .................................... 37
4.4
A Critique of Communication of Contract in Electronic Data Interchange .... 38
4.4.1
Automated EDI...................................................................................... 38
4.4.2
Non-Automated EDI .............................................................................. 40
4.5
Conclusion................................................................................................... 43
Recommendation ..................................................................................................... 45
References ............................................................................................................... 46
Annex I .................................................................................................................................... 50
V
1 INTRODUCTION
The transcendence of online commercial practice over its off line counterpart has
been an unprecedented success. Indeed most facets of human intercourse have
been invaded by the euphoria of this technological innovation to such an extent that
our traditional way of interaction has been activated to constantly shift lines to adjust
to the speed and vibrancy of this new and ingenious wave of communication. There
is obviously no need to truncate or stampede this natural adoption, even when its
influence is constantly posing serious challenges to the status quo. The technologies
manifest benefits of efficiency, convenience and cost effectiveness, just to mention a
few, are overwhelming indeed. In view of the above, heated debate has ensued on
the potency of our existing legislative mechanisms and dispute resolution institutions,
which are aimed at exacting effective control and management of rapid influence of
online commercial practices.
There are two main divergent views on the impact and regulation necessary to
regulate online commerce. First, that it is imperative new institutions, policies, and
regulations are created to regulate online commerce because the existing legal
regime lacks the capacity to adequately deal with such issues. Second, that although
the technologies are indeed novel, the legal principles on which their operations are
predicated are still the very old ones. It is the opinion of this second school of
thought, that what is needed is simply interpretation and transposition of the new
technologies, rather than a new round of regulation and institutions. Howbeit,
standardization, undertaken to accommodate new technologies, must be the
watchword and must thus become the result of the consummation between the
marriage of technology and the law.
1.1 Background
What is legal activism? Legal activism is not akin to judicial activism. It is derived
from two independent words law and activism. Law is generally defined as a system
of rules a society sets to maintain order and protect persons and property from harm.
While, activism consists of intentional action to bring about social, political, economic,
or environmental change. This action is in support of, or opposition to, one side of an
1
often controversial argument. Used together I would described legal activism as
“radical pragmatism” that is to say stretching the boundaries of law to it elastic limit
e.g.1 ., more like the application of the golden rule: one of the cannons of statutory
interpretation.
Legal activism as it relates to Electronic Data Interchange opens up for a
jurisprudential discourse of whether the enactment of law should be purely a
proactive exercise to provide a legal framework for anticipatory exigencies or merely
a reaction control measure to create standards to resolve existing issues. To
perceive law merely and only as a proactive control measure is to exterminate its
organic quality; it is therefore reasonable to argue that having recourse to the
innovation within the field of science and technology, with respect to its tremendous
speed and unpredictability which is very impressive but has sort of mitigated the
potency of law. These characteristics of technology are posing serious challenges to
our legal system because generally, the law making process is slow and
conservative. The resultant effect of this is that it becomes practically impossible for
the law to contemplate immediate and dynamic responses to these challenges
presented by technology. However, it would not be out of place to stretch the existing
legal principle to accommodate perceived new scenarios mostly when, the material
facts of the new system is in pari materia with the existing system. That is to say that
the applicable and existing rules are not inconsistent
1.2 Legal question: Is there a course for legal
activism?
This thesis shall concentrate on electronic contracting with special emphasis on
whether there is a justifiable course for legal activism within the field of EDI. EDI is
the automated exchange of commercial data between one application and another
1 http://en.euabc.com/word/620 [assessed 10th of January 2011]. An expression used to refer to the special role of the EU Court in Luxembourg.
The EU Court does not only interpret EU law as stated in the treaties, it also shapes the law by extending its own powers (competences) and the power
(competence) of the EU institutions generally.
2
between trading partners2. Electronic Data Interchange is used for the transmission
of business transactions in computer-readable form between trading partners in a
standard format.
Should the dematerialization of contract formation necessitate an entirely new regime
of law? In determining whether electronic commerce requires a new legal regime, the
following questions would be considered:
•
Should a contract that is formed electronically, be deprived legal of its status?
•
What are the legal status of offer, acceptance, consideration, intention to enter
legal relationship and capacity to contract within an online environment?
•
With respect to the peculiar nature of the online environment, should the
established legal principle on communication of offer in an offline environment
suffice?
•
Does the fact that there is no single global applicable law on contract formation
pose a threat to the universal accessibility of the Internet? In term of inter
jurisdictional formation of contract.
•
There are also issues relating to online security, electronic signature,
electronic evidence etc; are old laws impotent to guarantee protection?
•
There is also the issue with legal personality mostly with automated Electronic
Data Interchange transaction should this call for a redefinition of that legal
concept?
•
Ingenious ways have been developed to address some of this issue in
contract formation through Email Fax and Telephone etc. Can these forms of
innovation be transposed in contract formation through Electronic Data
interchange?
2 http://webjcli.ncl.ac.uk/1999/issue2/zekos2.html [Visited on the 17th of October, 2010].
3
•
Is the fact there has been a huge surge in businesses and profits and virtually
no reported case law yet, evidence that perhaps, the fears being expressed
are basically academic?
To provide a solid background for the analysis of this paper; a skeletal overview is
indispensable. Therefore, Chapter two shall concentrate on the history and
development of Electronic Data Interchange. Chapter three shall dwell on the
synoptic evolution of elements of the Law of contract. Chapter four, shall delve into a
critical analysis of the cogency or otherwise of legal activism in contract formation in
Electronic Data Interchange.
4
2 HISTORY AND DEVELOPMENT OF
EDI
2.1 What is Electronic Data Interchange
Electronic Data Interchange also referred to as (EDI) is the automated exchange of
commercial data between one application and another. EDI is used to communicate
the information between trading partners. EDI is used for the transmission of
business transactions in computer-readable form between trading partners in a
standard format.3 This akin in some ways to “Just-in-Time” (JIT), a technique of
managing inventory pioneered in Japan,4 which involves the channelling of materials
by suppliers to a manufacturer for production activities, rather than for storage or
inventory. With the advent of the web, a new strand of EDI was conceived. The new
strand was called “Web EDI” or “Open EDI”, which has the capacity to exchange EDI
transactions with trading partners over the web and avoids costly charges of trading
on a per transaction basis. EDI has been implemented in many organizations in order
to gain the advantage of increased efficiency and profits. EDI provides the following
benefits:
 Improved inventory management
 Excellent accuracy
 Minimize paper use and storage
 Reduce cycle times and costs
Accredited Standards Committee (ASC) X12 develops and maintains EDI standards
to work across all companies and industries in North America.
The United
Nations/EDI for Administration, Commerce, and Transport (EDIFACT) standards
supported by the United Nations Economic Commission for Europe (UN/ECE) also
3
G,
Zekos.
EDI:
Electronic
Techniques
of
EDI,
Legal
Problems
and
European
Union
Law
Greece
[1999]
at
http://webjcli.ncl.ac.uk/1999/issue2/zekos2.html [Visited on the 17th of October, 2010].
4 The Popular Encyclopaedia: Being a General Dictionary of Arts, Sciences, T. Literature, Biography, History, and Political Economy, (University of
Michigan Library), 2007 see also The Machine That Changed the World: The Story of Lean Production, P. Womack ... [et al.] Chicago, (Harper
Business), 2003.
5
regulates and standardizes EDI in Europe and other parts of the world. 5 Some of the
industries using EDI include retail, insurance, education, entertainment, financial, and
various government entities.
EDI works by relying on standards to allow different companies' systems to
communicate with one another. These standards are administered by a body called
American National Standards Institute (ANSI). ANSI ensures that standards like EDI
comply with an established set of rules and methods to make them accessible to
everyone.6 What results from the EDI standard is a common language for
exchanging data and thus minimizing the resources required to re-programme
internal data systems now and in the future, as technology changes. Network service
providers use standard communication protocols for the transmission of electronic
data. The protocols contain such features as positive and negative delivery,
notification, message tracing capability useful in audit trails, facilitation of encrypted
and authenticated data, and interconnectivity of the EDI system with the e-mail of the
user.7
2.2 Structure of Communication Infrastructure in Ecommerce in brief
The virtual environment generally, as opposed to the real environment, is a
manifestation of certain forms of interaction that allows remote and indirect contact
among people. It consists of three levels:
•
Infrastructure: hardware, software, databases, and telecommunications that
together deliver such functionality as the World Wide Web over the Internet, or
support EDI and other forms of messaging or over value-added networks;
5 Electronic Data Interchange: An Overview of EDI Standards for Libraries. The Hague, 1993
(In UDT Series on Data Communication Technologies and Standards for Libraries) http://www.ifla.org/VI/5/reports/rep4/42.htm#chap2 [Visited on the
17th of October 2010].
6 M, Cooper. ANSI Position Statement on Reference to Standards and Building Codes, New York (ANSI Public Document Library) 2008.
7
G.,
Zekos.
EDI:
Electronic
Techniques
of
EDI,
Legal
Problems
and
European
Union
Law
Greece,
1999
at
http://webjcli.ncl.ac.uk/1999/issue2/zekos2.html [Visited on the 17th of October, 2010].n 37.
6
•
Services: messaging and a variety of services enabling the finding and
delivery (on business terms, if desired) of information, as well as negotiation,
transacting business, and settlement;
•
Products and Structures: direct provision of commercial services to consumers
and business partners, intra-organizational information sharing and collaboration,
and organization of electronic markets and supply chains.8
The first level of EDI is the role of scientists and technologists in designing the
systems. We shall do little in discussing EDI`s operation in this work. It suffices to say
that this first level forms the foundation in Vladimir Zwass'9 framework of the structure
of e-commerce, such that the others are built on it. The advancement of the
technological infrastructure has been the basis of the global nature of e-commerce,
the bedrock on which jurisdictional questions are raised and answered, the essence
of the uniqueness of e-commerce.10 The Internet has become a pilot for e-commerce
as the World Wide Web has given information sharing an unprecedented speed and
it allows carving out of apparent real spaces from the virtual space for specialised
functions. It is in this regard that the first level is sometimes described as creating a
simulation of the real world by the computer and with a certain futuristic romanticism
attached. 11
E-commerce is basically, commerce supported by electronic communication, ranging
from simple and long established means of communication like telephone, telex, fax
through to more advanced, automated and modern forms of communication like
email, web and EDI. Prior to this transcendence, telecommunication used
semaphore; heliography and even smoke signals to disseminate information. In this
context, of a business nature, the modern telecommunication transaction there is
much doubt if there will be a departure from the limited circle of the use of fax,
telephones, mobile phones and predominantly the Internet.
8 V, Zwass. Electronic Commerce: Structures and Issues in International Journal of Electronic Commerce Volume 1, Number 1, Fall, 1996, pp. 3 - 23
9 http://www.medialab
research.com/cr/2000/01/docs/Zwass%20Foundations%20of%20Information%20Systems.htm
10 D, Spar. And J, Bussgang. Ruling the Net Harvard Business Review (May-June 1996), 125-133.
11
A,
Pollack.
For
Artificial
Reality,
Wear
A
Computer
in
New
York
Times,
(New
York,
April
10,
1989)
http://www.nytimes.com/1989/04/10/business/for-artificial-reality-wear-a-computer.html [accessed on the 17th of March, 2010.]
7
2.3 EDI; The bedrock for the development of ECommerce.
Electronic commerce is new, however the practice it denotes originated just over a
half-century ago in the Berlin Airlift.12 “In 1949 after the Second World War when
Soviet authorities, claiming technical difficulties, halted all traffic by land or water into
and out of the western-controlled sector of Berlin, Western powers stepped in to
supply Berlin’s inhabitants with the necessities of life by air. Some 278,000 flights
delivered over 2.3 million tons of supplies. With aircraft landings at the rate of one
every three minutes, cargo had to be loaded and off-loaded faster than the
accompanying paperwork could be completed and verified. Because of this,
inventory lists were rarely up-to-date and ordering and expediting lists became of
little consequence. Recognizing the need to standardize the paper manifests coming
in from different countries (and in different languages) coupled with the need to
communicate this information independently from delivery, Master Sergeant Ed
Guilbert of the United States Army, developed a standard manifest system that could
be communicated via telex, radio-teletype, and telephone. It was from this standard
manifest system that EDI evolved. The practice of EDI (EDI), which was the
computer-to-computer exchange of standardized electronic transaction documents,
can now be called the traditional e-commerce. However e-commerce, as practiced
today has not been limited to EDI and has included business practices built around
computer-to-computer transmissions of a variety of message forms, bar codes, and
files; the use of EDI has arguably led to the most significant organizational
transformations and market initiatives. Beyond economy, companies sought strategic
benefits, such as a compressed business cycle and intensified relationships with
business partners. These were sufficiently provided for in the close network of
communication wherein e-commerce takes place. Time-based competitive moves of
quick-response retailing by pulling in demanded products from the supply chain and
just-in-time manufacturing with close-to-zero inventories are also enabled by EDI.”
12 J. W., Verity. Invoice? What's an invoice ?( Business Week) June 10, 1996.p 110-112. See also; Soft share Tips, In the Beginning: The history of
Electronic Data Interchange, Volume 2, Issue 12, [December 1998] at www.softshare.com/tips/1998/tips27.html [accessed on 14th of March, 2010]. And
http://www.liaison.com.[accessed on the 29th of November, 2010}.
8
The growth of e-commerce is landmarked by several remarkable events. Back in
1968, even with the creation of EDI, most businesses were unable to interact with
different companies. This was because everyone was using different software and
there was no standard of software used, as a result Company A and Company B, for
instance, could not exchange information. However, in 1984 the Accredited
Standards Committee (ASC X12)13 established itself an easy and reliable means to
handle a number of transactions, attempting to introduce an easier communication
medium for computers14. This landmark accomplishment was not heralded with great
enthusiasm, but it remains a fundamental event in the potential chaos of ecommerce. This is because ASC X12 gave businesses the first stable platform for a
cohesive system of business transactions by standardizing business transactions
through the creation of trust among business enterprises. Around the mid-1990's,
Netscape15 was created. Netscape allowed persons to go to websites by using a
point and click interface. This not only allowed greater use of the Internet, it was also
free. Previously that is before Netscape you almost had to be a programmer to be
able to navigate the vast World Wide Web because of its complexity.
Then there was the emergence of the Digital Subscriber Loop (DSL); in May of 1998,
a company called SBC Communications installed Asymmetrical Digital Subscriber
Line (ADSL)16 lines in 200 communities in California. This allowed people to travel
the Internet at incredible speeds, 50 times faster than with the traditional modem.
The ADSL line is always connected to the Internet, this leads to a frequent use of the
Internet. The fourth event is in December of 1998, when Amazon.com 17 reached $1
Billion dollars in annual sales, America Online (AOL)18 reached $1.2 Billion in holiday
sales in ten weeks. These stupendous sales numbers not only caused pandemonium
to erupt in the offline retail world, but also were indicative of the vast coverage the
Internet was getting.
13 The official designation of the United States' national standards body for the development and maintenance of Electronic Data Interchange
14 J, Weisman. The Making of E-Commerce: 10 Key Moments, Commerce Times at www.ecommercetimes.com/story/4085.html accessed on 29th of
June, 2006.
15 A widely used browser or client used to search and view information files on the World Wide Web, similar to the Microsoft's Internet Explorer.
16 A modem technology that converts existing twisted-pair telephone lines into access paths for high-speed communications of various sorts.
17 An American electronic commerce company based in Seattle, Washington. It was one of the first major companies to sell goods over the Internet.
18 A corporate online service provider and Internet service provider based in Dulles, Virginia, with regional headquarters installations in many cities
around the world.
9
The fifth event is the Initial Public offering of Linux. 19 In 1991 Linux opened up the
Pandora box for Microsoft, which had before this event dominated a huge proportion
of the market on the defensive side for once by being, unlike the Microsoft operating
system, an open source code which allows the user to customize the programme.
This was closely followed by the creation of Napster20 on August 13, 1999. On this
day, Napster founder Shawn Fanning intimated the press that the number of
subscribers of the online music swap site had quintupled, in just seven days. Napster
operated on a pro bono service. Not only was it free to use, but you received
something that you would normally be paying for, namely, music. The result was
increased public use and patronage to its site.
Another significant event took place in January 10, 2000: the merger of AOL and
Time Warner Company. This would give AOL’s 24 million users more content and
allow more much more e-commerce globally; it was in fact often described as a
merger that would influence every American in one way or the other, besides the
massive global impact it would have. The merger was valued at 350 million dollars.21
The common denominator that runs through these events is the increasing access to
the World Wide Web for little or nothing, in terms of cost. It is noteworthy that the
events have all the trade mark of happenings around companies that are involved in
dealings in the virtual environment. This historic past compared with today’s e-world
reflects that the push had been towards a market that is not defined by geographical
boundaries and the ability to communicate with players everywhere in real time. This
borderlessness or perceived state of absence of geographical limits is the bedrock of
e-commerce. It is intended not only to consider the adjustments in legal regulation
necessitated by the growth of the online environment, but also, peripherally, those
caused by electronically aided communication generally, including the older EDI and
certain other forms of automated transactions as far as contract formation is
concerned.
19 Linux is a free open-source operating system based on UNIX, an operating system that supports multitasking and is ideally suited to multi-user
applications. Linux was originally created by Linus Torvalds with the assistance of developers from around the globe.See [accessed on the 27th of June,
2006]. See also Charles, Ferguson, How Linux Could Overthrow Microsoft at http://www.technologyreview.com/Infotech/14504/?a=f [accessed on the
26th of June, 2010].
20 This is an online music file sharing service which allowed people to easily copy and distribute MP3 files among themselves without going through the
music market.
21 See http://money.cnn.com/2000/01/10/deals/aol_warner/ [accessed on 26th of June, 2010].
10
There are enormous reasons for the fast growth of e-commerce when we consider
what advantages online trading have over its counterpart real world form of business.
Comparatively, it far cheaper, efficient and convenient to engage in transaction online
than the offline market. Market analysts estimated that £8.2bn of goods was bought
in U.K. online in 2005, up 29% from 2004. This was nearly 19 times the rise in overall
retail spending, which was up only 1.5%, its slowest since the early 1960s. By 2006,
£125.2bn was spent online, and £163bn in 2007.22 This rapid expansion is not limited
to the UK; it is a global phenomenon. In June 1996 in Taiwan, there were 440,000
Internet subscribers. By December 2000, that number had risen to 6.26 million, a 14fold increase in four years. Internet subscribers now represent 28 percent of the
entire population, making Taiwan one of the most Internet-penetrated countries in
Asia. By January 2000, the number of Internet hosts in Taiwan had reached 597,036
units, a number ranking Taiwan in second place in Asia behind only Japan (which
has 2.6 million units), and seventh in the world. The effect of the rise in Internet
subscription is a direct rise in the volume of online dealings - according to estimates
by Forrester Research Inc., the value of B-to-B trade in Taiwan reached $3,843
million in 2000, almost doubling the trade volume in 1999.23
Just like in Taiwan as well as in many other countries, a key measure of e-commerce
spread is the use, availability, and penetration of Internet services such as dial-up,
Digital Subscriber Line (DSL), which is a technology for bringing high-bandwidth
information to homes and small businesses over ordinary copper telephone lines and
can carry both data and voice signals. In France, in April 2001, 21 percent of the
French population had Internet connection at home, up from 8 percent in October
1999 and 2 percent in 1997.24 The number of active personal Internet access
contracts rose from 1,280,000 in January 1999 to 3,030,000 in January 2000, then to
5,968,000 in March 2001. For the same period (January 2000-March 2001), the
22 --“Strong Year for Online Retailing” at www.news.bbc.co.uk/1/hi/business/4707750.stm accessed on the 14th of March, 2010. See also News Release,
Office for National Statistics, http://www.statistics.gov.uk/pdfdir/ecomnr1108.pdf accessed on the 14th of March, 2010.
23 Tain-Jy Chen. Globalization and E-commerce: Growth and Impacts in Taiwan, (Center for Research on Information Technology and Organizations (CRITO),
University of California, November 2001.
24 E., Brousseau. Globalization and E-Commerce: Growth and Impacts in France, (UC Irvine, Center for Research on Information Technology and
Organizations) 2001.
11
number of connection hours rose from 25,265,000 to 64,460,000.25 69 percent of all
companies had Internet access by the end of 1999, which represents an increase of
53 percent since the end of 1998. There were 15 Internet users per 100 inhabitants
by the end of 1999, which was an increase of 77 percent since the end of 1998.26
Topping the chart, as expected, is the US, The US has been the quickest to develop
and adopt new e-commerce business models. In 2000, according to one estimate,27
the US represented three quarters of all B-2-B and B-2-C e-commerce trade within
the Organization for Economic Cooperation and Development (OECD) countries. The
Internet by itself as merely an infrastructure for electronic commerce, a more telling
indication of the extent and volume of growth of electronic commerce can be seen by
examining the comparative presence of sites with particular Top Level Domains
(tlds). The .com tld that designates a US commercial site which currently accounts for
approximately half of all sites the world over.28
2.4 Conclusion
This chapter aims at providing some insight on the nature, scope and growth of ecommerce. It particularly attempts to provide, although in a concise form, what is
actually meant by Electronic Data Interchange. Be that as it may, there is no doubt
that E-commerce is spreading like a virus and to a large extent transforming the way
business is transacted thus influencing a great deal the legal regime. In subsequent
chapters, I shall be evaluating how these various means of communication (contract
formation) have provided a veritable setting in the legal environment for intellectual
discourse.
25 International Data Corporation, 2000; International Telecommunication Union 2001; Reed Electronic Research, 2000 all three cited in E. Brousseau,
Globalization and E-Commerce: Growth and Impacts in France (n 22).
26 Ibid. pg 7 – 9.
27 Tracking the Growth of Internet Access (Forrester Global E-commerce Model) 2000. At http://ecommerce.hostip.info/pages/615/Internet-AccessTracking-Growth.html [accessed on the 14th of March, 2010]. See also”At the Epicenter of the Revolution."BusinessWeek Online, September 16, 1999.
Available from www.businessweek.com. [Accessed on the 14th of March, 2010].
28 S. McGann, J. King and K. Lyytinen, Globalization of E-commerce: Growth and Impacts in the United States of America, university of Michigan (in
Sprouts) Working Papers on Information Environments, Systems and Organizations, Volume 2, Issue 2, 2002.
12
13
3 SYNOPTIC METAMORPHOSIS OF
THE LAW OF CONTRACT
3.1 Definition of Contract
This chapter shall attempt to evaluate and transcribe the traditional method of
contract formation into this prevalent online system with emphasize on the
infrastructural changes that have come by way of enhanced communication via the
Internet. The function of computers in contract formation is Computers primary act as
a vehicle of communication. Fundamentally, contract formation will be between
persons in law; who are capable of being held liable for any breach. Although there
are arguments, that innovative use of computers (legal personality) may have kindled
a call for a radical approach with respect to what should encompass contract
formation. This argument seems to have found expression in Automation i.e.
Electronic Data Interchange.
3.2 Contract formation through Telephone and Fax
A contract is basically an agreement, which is enforceable by law. It comes into life
when offer, a definite promise to be bound on specific terms, is accepted without
modification of the content of the offer, otherwise it becomes a counter offer which
needs to be accepted for there to be a contract.29 These offer and acceptance
backed up by the requisite intention is the agreement; the actual contract. Agreement
entails the transformation of negotiations into a settled bargain or deal. The
negotiating process is obviously not contract and the law needs to determine when
that process has ceased and the parties have reached finality in their commercial
arrangement. The traditional approach to answering the question if the parties have
reached agreement is to apply the rules of offer and acceptance. When a properly
constituted offer has been made by one party and accepted by the other, then there
is an agreement at the moment of acceptance or, more precisely, at the moment of
29 Carlill v. Carbolic Smoke Ball Co (1893) 1 QB 256 (CA)
14
communication of acceptance. This reduces the determination of point of contract to
tracking down the point at which acceptance is duly communicated.
30
The offer has to be specific in order to actually constitute an offer. 31 It must be a
clear, unequivocal and direct approach to another party to contract. For this reason,
advertisements, catalogues or store flyers are not offers.32 A valid acceptance must
agree in all material particulars with the offer. If the offer stipulates terms for
acceptance (e.g., that it be in writing) then the acceptor must expressly agree to be
bound as such for the contract to be valid.
The communication of acceptance is imperative for a number of reasons; it facilitates
negotiation to help in determining when a valid contract has been entered into.
Further, the acceptance is used to clearly ascertain what constitutes the terms of the
agreement. An example of acceptance is its use to find out if there is a contract
provided by the court. For example, in the case of Gibson v. Manchester City Council
33
there were so many papers and conversations passing back and forth that it was
impossible to break the interactions down into discrete acts of “offer” and
“acceptance.” In Gibson, Manchester City Council was being run by the Conservative
Party, which was running a policy of selling council houses to the occupants. Mr.
Gibson applied for details of his house price and mortgage terms on a form of the
council. In February 1971, the treasurer replied,
“The corporation may be prepared to sell the house to you at the purchase price of
£2,725 less 20% = £2,180 (freehold)… This letter should not be regarded as a firm
offer of a mortgage. If you would like to make formal application to buy your Council
house please complete the enclosed application form and return it to me as soon as
possible. ”
In March 1971, Mr. Gibson completed the application form, except for the purchase
price and returned it to the council. In May, the Labour party came back to power and
30 Carlill v. Carbolic Smoke Ball Co (1893) 1 QB 256 (CA)
31 Furmston, M. P., Cheshire, Fifoot and Furmston’s Law of Contract, 14th edition London (Butterworth), 2001.
32 Fisher v Bell [1961] 1 QB 394, Partridge v Crittendon [1968] 2 All ER 421. Pharmaceutical Society of Great Britain v Boots [1952] 2 QB 795.
33 [1979] 1 WLR 294.
15
halted sales. Mr. Gibson was told that he could not complete the purchase. So Mr.
Gibson sued the council, arguing that a binding contract had already come into force.
The court held that two offers, identical in terms, made at the same time or which
cross in the post, will not create a contract because neither offer counts as an
informed acceptance of the other. So, at the Court of Appeal, Lord Denning, said that
the analysis of the relationship in terms of offer and acceptance was not so
important, but reliance should be had to the whole transaction, the “global approach”.
However at the House of Lords Diplock and Edmund-Davies, LL.J, did not
particularly adopt the reasoning of Lord Denning, they placed less relevance on the
importance of clarity of offer and acceptance, and definiteness of the communication
mechanism at every stage towards the formation of a contract. Lord Diplock thought
that the correct approach was to examine the correspondence and see whether it
contained an offer by either party, accepted by the other. While Lord Edmund-Davies
thought that it would not indicate a contract in this case for the same reasons that an
offer and acceptance could not be found. He concluded that the correspondence did
not disclose at any stage that the parties considered themselves contractually bound.
Oliver Wendell Holmes once said: “the making of a contract depends not on the
agreement of two minds in one intention, but on the agreement of two sets of
external signs - not on the parties having meant the same thing, but on their having
said the same thing.”34Indeed this deposition is worth noting as it brought the
established rule of communicating acceptance into clearer limelight– not just what is
intended but what is said as intended.
The rule on communicating acceptance is that acceptance must be communicated
unless it is displaced by the clear intention of the parties. In Latec Finance v Knight,35
a finance company had set up its operations so as to take advantage of these rules
of offer and acceptance. The purchaser was required to fill in the form and send it
back to the finance company as the offer. The finance company can then accept the
offer in their office by signing the appropriate section on the form - when the credit
reports check out. It was held that the signing of the form was to be seen as an
34 Oliver, Wendell Holme. Collected Legal Papers. Michigan, (Harcourt, Brace and Howe), 1920, at 178.
35 (1969) 2 N.S.W.R. 79, N.S.W. Court of Appeal. See also Robophone Facilities Ltd v Blank [1966] 3 All ER 128.
16
essential step in the procedure, but it was not to displace the normal requirements of
acceptance i.e. that it be communicated. Furthermore, the contract indeed takes
effect at the communication of the acceptance.
In Cooke v Oxley36 The defendant proposed to sell some goods to the plaintiff. The
plaintiff asked to be allowed until 4pm to decide. Before 4pm, the plaintiff gave notice
to take the goods. It was held that there was no contract on the basis that the
information communicated should take priority over the conduct of the parties where
no contrary agreed intentions are established. However this position was rejected in
the specific context of negotiations by post in Adams v Lindsell37 which formed the
basis for the rule that an acceptance by post is effective from the time of posting, not
the time of delivery. In Adams the defendants, who were dealers in wool, at St. Ives,
in the county of Huntingdon in England had, on Tuesday the 2nd of September 1817
written a letter of offer to the plaintiffs, who were woollen manufacturers residing in
Bromsgrove, Worcestershire. This letter was misdirected by the defendants to
Bromsgrove, Leicestershire, in consequence of which it was not received by the
plaintiffs in Worcestershire till 7pm on Friday, September 5 th. On that evening the
plaintiffs wrote an answer, agreeing to accept the wool on the terms proposed. The
course of the post between St. Ives and Bromsgrove is through London, and
consequently this answer was not received by the defendants till Tuesday,
September 9th. On the Monday September 8th, the defendants not having, as they
expected received an answer on Sunday September 7th (which in case their letter
had not been misdirected would have been in the usual course of the post), sold the
wool in question to another person. The defendants contended that they were not to
be held liable, even though it be now admitted that the answer did come back in due
course of post. They argued further that till the plaintiffs’ answer was actually
received, there could be no binding contract between the parties; and before then,
they had retracted their offer, by selling the wool to other persons. But the court said
that if that were so no contract could ever be completed by the post. For if the
defendants were not bound by their offer when accepted by the plaintiffs till the
answer was received, then the plaintiffs ought not to be bound till after they had
received the notification that the defendants had received their answer and assented
36 100 ER 785.
37 (1818) B & Ald 681.
17
to it. And so it might go on ad infinitum. This, also called the mailbox rule, however, it
is an exception to the general rule on communicating acceptance . As I shall discuss
subsequently, the rule of communication appears to remain the cornstone of contract
formation in EDI.
The mailbox rule or the postal acceptance rule is a creation of common law contract,
which determines the timing of acceptance of an offer when mail is contemplated as
the medium of acceptance. The general principle, that preceded the creation of the
mailbox rule, is that a contract is formed when acceptance is actually communicated
to i.e. receive by to the offeror. This rule is however an exception to the general rule,
that contract formation is deemed completed upon the deposition of letter of
acceptance in the mailbox. The leading case on is Henthorn v. Fraser,38 which was
based largely on the earlier case of Adams v. Lindsell, the locus classicus of the rule.
In Henthorn v. Fraser, the claimant received a note from the defendant with an offer
to purchase a certain property within 14 days. The claimant responded to the offer
with an acceptance posted the next day via mail. The defendant withdrew the offer
before receiving the acceptance, but after the acceptance was posted. The Court of
Appeal ordered that the claimant was entitled to specific performance. Lord Herschell
opined: "Where the circumstances are such that it must have been within the
contemplation of the parties that, according to ordinary usage of mankind, the post
must be used as a means of communicating the acceptance of an offer, the
acceptance is complete as soon as it is posted.”
The summary implication of the operation of the mailbox rule is that acceptance is
complete once the letter of acceptance is posted; it makes no difference whether the
offeror actually receives the letter. The court in Byrne v. Van Tienhoven39 held that a
subsequent revocation does not affect the efficacy of preceding posted acceptance,
irrespective of receipt. If a letter of acceptance were to be lost, acceptance has still
taken place. An exception to this would be if the offeree knows or has reason to know
that the letter of acceptance never reached the offeror. For example, if A brings a
38 [1892] 2 Ch 77.
39 [1880] 5 CPD 344.
18
letter of acceptance to the local post office and A. sees the post office burn down,
there is no acceptance.40
Historically, letter writing and communication by post dates back, assumedly to
Atossa, the daughter of Cyrus,41 around 500 BC. But it was not until quite recently
that it became a matter of importance to use letter-writing communication to transact
business. Although it will follow that as a means of communication, letter writing
found its way into contract formation as a facilitating tool, more like word of mouth
transferred from one person to another. For contract formation to be effective, no rule
was necessary until the case of Adams v. Lindsell, which became the threshold for
the examination of this means of communication in contract formation.
The postal communication rule did extend to more complex means of communication
like the telegraph and fax, but not to telephone or the Internet. Its applicability was
dependent on the symbiotic use of facilities of these modes of communication and
the possibility of the court seeing them as governed by the same principles. Courts
have accepted telegraph communications as a writing, but what makes the postal
rule applicable is not just the fact of it being a written form of communication, but the
method of delivery – both the post and telegraph being non-instantaneous means of
communication, and the sender losing control of the letter once it has been sent until
it is received at the other end. On the second limb here is the bedrock on which a
United States Federal Court rested their judgment42 holding that the mailbox rule did
not apply if postmasters were authorized to stop delivery of a letter when contacted
by the sender. This reasoning was not accepted in other courts and it therefore could
not hold water in American law, but this did not rip from it the merit of opening an
argument that is relevant for the purpose of modern day Internet communication. In
Entores Ltd. v. Miles Far East corporation43 the court held that the mailbox rule did
not apply to an acceptance by telex as the Court regarded it as an instantaneous
form of communication – the forms of communication as if they were in each other’s
presence. This interpretation was further built on in Tenax Steamship Co Ltd v The
40 Ibid.
41 Not much is known about her life, except that she witnessed the reign of the four first Achamenian kings and played a decisive role in the long
period of turbulence and significance in ancient Iran. See Roberts, W., History of Letter-writing, W. Pickering, 1843 at 1.
42 Dick v. U.S. (1949) C1.94, 82 F. Supp. 326.
43 [1955] 2 QB 327.
19
Brimmes44 where it was decided that instantaneous forms of communication are as if
they were in the presence of each other as far as it is within a business day. Thus, if
they did not receive the acceptance within a working business day then they would
not be in the office, hence it would not be instantaneous.
On the other hand, means of communication like the telephone, facsimile and telex
are not governed by this rule, as they are instantaneous and consequently not
restricted to the within-a-business-day rule. In Brinkibon Ltd v Stahag Stahl,45 a case,
which involved a contract for the sale of steel, bars between an English company, the
buyer, and an Austrian company, the seller. The English company made an
application to issue the writ and to serve notice on the other party out of the
jurisdiction. The issue was whether England was the correct jurisdiction. Two
grounds were stated: firstly, the contract was made in England; the buyer in London
accepted a counter-offer by telex issued from England - or the counter offer was
accepted by the conduct of the buyer in England. And secondly, the breach of
contract was committed in England. Lord Wilberforce held that where there are
successive telephone calls, it might be artificial to ask where the contract was made.
If the telex was sent from London to Vienna where is the contract made? If seen as a
postal acceptance, then on posting - in London. If seen as a telephone acceptance,
then on reception in Vienna. Entores says that a telex is to be treated like a
telephone message for this purpose.
In this area, it is difficult to have a universal rule. One should have regard to
intentions, business practice and where the risk should lie. In the case of instant
communication between principals, the contract is made when and where the
communication is received, indicating the time at which the deal is clinched and the
jurisdiction and law which apply. The place of the postal rule was underscored by the
court in Brinkibon Ltd where it said:
“[…] the use of Telex communication has been greatly expanded, and there
are many variants on it. The senders and recipients may not be the principals
to the contemplated contract. They may be servants or agents with limited
authority. The message may not reach, or be intended to reach, the
designated recipient immediately: messages may be sent out of office hours,
or at night, with the intention, or on the assumption that they will be read at a
44 [1975] 1 QB 929.
45 [1983] 2 AC 34 House of Lords
20
later time. There may be some error or default at the recipient’s end which
prevents receipt at the time contemplated and believed in by the sender. The
message may have been sent and/or received through machines operated by
third persons. And many other variants may occur. No universal rule can cover
all such cases; they must be resolved by reference to the intentions of the
parties, by sound business practice and in some cases by a judgment where
the risks should lie”.46
Not only does this show the non-universality of the rule and its inherent limitations as
an exception to the general rule on communication of acceptance, it flags up the
question of the place of hard and fast rules in contract formation. While they are
necessary to give basis for agreements and contracts generally, they should in fact
come after due consideration for the intention of parties, sound business practice and
evaluation of where the risks should rightly lie. But in the field of Internet aided
contracts and the cyber world, consideration for these variables are far between as
the automated nature of the transactions coupled with the fast pace, with the
intention of saving time and money, confine these hypothetical considerations to the
back burner. Perhaps more tellingly is the effort of standard form contracts to
overwhelm these considerations, and Internet contract a majorly standard form in
pattern.
3.3 An overview of Communication online
The practical problem created by where email acceptance belongs can be illustrated
in the following: A may offer goods by email to B and B replies via email with his
acceptance, but then A revokes her offer after B had sent his email of acceptance,
but before A had received it. The time at which acceptance is effective is crucial here,
but is it when B sent his email of acceptance, when that email enters A’s system, or
when A actually reads the email? If it is when the email was sent then B cannot
legally take back his offer, but if it is when A receives the email, then A’s revocation
of his offer will be valid. Besides the fact that the time of acceptance may establish
where it was accepted and give an indication as to where the contract is formed. This
will, in turn, help in determining what law will be the relevant law of contract.
46. Brinkibon Ltd. v. Stahag Stahl [1983] 2 A.C. 34, and [1982] 1 All E.R. 293 per Lord Wilberforce
21
How should acceptance by email be analysed - either in the light of the general rule
or the exceptional instance of the mailbox rule? Is it governed by, as Chitty47
suggests that they should be dealt with in the same way as faxes, and like faxes are
a form of instantaneous communication, the general rule? Or, to the contrary, in an
advice on electronic commerce produced by the Law Commission in December
2001,48 as a non-instantaneous means of communication, hence the mailbox rule?
Chitty describes email as being instantaneous, and if this is the case then of course
the postal rule cannot apply by virtue of the reasoning in Entores v Miles49 that the
postal rule does not apply to instantaneous methods of communication. The United
Nations Convention on Contract for International Sale of Goods, The CISG-Advisory
Council (AC) Opinion No. 150 supports this position when it described an email as
one of the fastest means of communication: “[...] in relation to electronic means of
communication, [...] there are rarely any practical means of faster communication
than electronic messages sent by e-mail or communicated over websites or other
EDI-arrangements.” Whether this is a statement of fact or merely a view will depend
on the context in which they analyzed possibilities in electronic communication.
The CISG-AC Opinion No. 1 illustrated with instances that may result in the speed of
an email being interfered with, these they called Situations A – D. In Situation
A, the receiver may have problems reaching his server due to internal
problems within his "sphere of influence" in his network system. They reckon
that it is not appropriate to put the risk on the offeror for the offeree's technical
problems. And by way of advice, the offeree may reduce the risk by choosing
appropriate Internet service providers or designing an adequate technical
infrastructure to make sure that the internal communication functions
satisfactorily. The risk must not lie with the sender.
In Situation B the CISG-AC paints the background of trade usage against
which the communication takes place, stating that if the parties have
established a practice in their business which the parties knew or ought to
have known and which in trade are widely known to, and regularly observed
by, parties to contracts of the type involved in the particular trade concerned,
47 Chitty on Contract 28th ed., London, (Sweet & Maxwell), 1999.
48 Available on the Law Commission's website at http://www.lawcom.gov.uk.
49 (Supra), and Brinkibon Ltd v Stahag Stahl und Stahlwarenhandels GmbH (supra).
50 CISG-AC Opinion no 1, Electronic Communications under CISG, 15 August 2003. Rapporteur: Professor Christina Ramberg, Gothenburg,
Sweden.
22
an email entering the offeree's server but not accessed by the offeree will be
taken as delivered.
Situation C involves when the address is not correctly stated in the message,
such messages may enter the addressee's server - but never reach the
addressee personally, so that it cannot be accessed by the addressee but gets
stuck in the server.
And Situation D, deals with what may be tagged the omnibus ground ”reaches" is whether the offeree is able to process and understand the
electronic communication. Due to incompatible computer programs, the text
appearing at the offeree's computer may be incomprehensible. The situation is
rather close to the problem of a message being written in a language that the
offeree is unable to understand. The question at issue here is whether an
electronic [message] that cannot be accurately processed by the offeree has
"reached" the offeree when it has entered his server. The crucial issue is to
what extent the offeree has indicated that he is willing to receive that type of
electronic communications. It is not sufficient that the offeree has agreed to
generally receive electronic communications. He must have consented to
receiving electronic messages of that type, in that format, and to that
address.51
The Law Commission considers that an email message is communicated when it is
available to be read52, this does make it instantaneous, as it would be from the time it
was transferred to the recipient’s ISP. Unfortunately, there is not yet any case law on
this issue and therefore this is a matter of private interpretations only.
In the same vein, other views hold email communication as non-instantaneous
deserving of the postal rule. In the view of Deveral Capps53 emails are, in most
cases, exceptionally quick, however, they may on occasion take hours or even days
to reach their intended recipient. As they use mail servers operated by third parties
that are not located at the recipient's location, even after receipt by the mail server,
the recipient has to take steps to connect to their “mailbox” on the mail server before
the communication is complete. Since the offeror is partially responsible for ensuring
delivery, it may not be appropriate to allocate the entire risk in the delivery of
electronic mail to the offeree. It is only fair to say that this view is hinged on the
appropriateness of risk allocation rather than the actual fact of the receipt of the
51 See Articles 8 and 9 of CISG.
52 See the Commission’s propositions on electronic communication in contract http://www.lawcom.gov.uk for accessed on 12th of May, 2010.
53 Deveral Capps. Electronic Mail and The Postal Rule (I.C.C.L.R). 2004, 15(7), 209
23
message which should determine the instantaneousness or otherwise of an email.
Consequently, it falls short of convincing that email is indeed non-instantaneous.
A very practical way of proffering a solution to this dilemma, that is, what is
instantaneous from what is not probably rest on an understanding of the context in
which the term "instantaneous" is appreciated. If we interpret instantaneous in the
sense of a real time communication depicted by telephone, chat room instant
messaging, etc., an email would greatly fail the test here – it not real time, it is not
instant and does not have the essential features of an instant message. Yes, it is
considerably faster that the postal mail. But they are caught by the same principles. If
one attempt to send an email from one email account to another while still logged
into both, the result can demonstrate how non-instantaneous emailing is as time of
delivery will span from a few seconds to several hours, and even days in a few
cases. Click-wrap, browse-wrap and shrink-wrap - are examples of other forms of
online contracts formed via programmes that are mostly either interactive or active.
Interactive computers will not constitute much of a problem, as they are basically
instantaneous in communicating messages. And a great part of the active ones give
instantaneous feedbacks as well.
3.4 An overview of Communication in Online
Contract Formation
The question of control is a crucial consideration in resolving where emails belong –
between instantaneous and non-instantaneous. This question will not arise for active
and interactive systems and programmes. Considering the traditional postal rule,
when a letter is put into the hands of the postal services, the sender has no further
control over the item. The sender - the offeree - has done all that is reasonable to get
the letter of acceptance to the offeror. In Household Fire Insurance Co Ltd v Grant,54
Thesiger L.J. stated that “the acceptor, in posting the letter has … put it out of control
and done an extraneous act which clenches the matter.” This view therefore appears
to favour the person who “trusts the post”, the same principle should apply to email,
as once an email is dispatched; the sender has no control over ensuring that the
email reaches the person to whom it was addressed. If this factor alone were all
54 (1879) L.R. 4 Ex. D. 216, 223.
24
required to determine the applicability of the postal rule, it will apply to acceptance by
email. But further considerations are necessary, as the rule is not hinged on this
alone.
The reason behind the creation of the postal rule included creating certainty in
contract formation at a time when the communication system involved unavoidable
delay. While email is not instantaneous, I submit that, it is quicker, and although
delays are inevitable they are rare. Recourse also has to be made to the fact that it
was the only form of distance communication available in the early nineteenth
century; it would have been difficult to check whether an acceptance had been
successful. In the twenty-first century, an offeree can easily check whether any
emailed acceptance has been received, possibly using an instantaneous or a more
efficient method of communication, such as the telephone or fax. Were such methods
available in 1818, it is doubtful whether the postal rule would have been formulated
abini tio.
In addition to delivery and read receipts, it is now standard for the sender of an email
to be informed if the email is not delivered. This may occur when there is a mistake in
the recipient’s address or when the recipients or even the sender's email system is
experiencing problems. If a non-delivery message is returned, it will be unthinkable
that anyone could allow a contract to be created when the offeree knows that
acceptance has definitely not been communicated! This brings to mind the timetested illustration of Byrne v Van Tienhoven:55
If a letter of acceptance were to be lost, acceptance has still taken place. An
exception to this would be if the offeree knows or has reason to know that the letter
of acceptance never reached the offeror. For example, if A brings a letter of
acceptance to the local post office and A, sees the post office burn down, there is no
acceptance.
The question that follows then is as it is now often possible to confirm whether or not
an email has been successfully delivered, is there really a need to stretch the postal
rule to encompass email?
Indeed, determining when an email is sent and or
received is also helpful in unravelling the haze surrounding the applicability of the
55 [1880] 5 CPD 344.
25
postal rule to emails. Emails are sent when the message leaves the compose page
of the sender at the point the “sent” button is clicked. From this point the sender does
not have control over how and when it is received by the recipient. If the address is
correctly typed, and the recipient’s email address is still active, the mail will certainly
be received; but when it will be received depends or a whole lot of factors – speed of
delivery by the server and when the recipient logs in to the system to open his own
email box, are two major considerations. The basic assumptions of the postal rule
are that:


There will be a substantial delay in delivery of the letter, depending on
where the letter is to be sent.
There is a small risk that due to difficulties the message may be delayed
further, or not reach its destination at all.
There might never be an end to confirmation of receipt, as the confirmation has to be
confirmed as received, ad infinitum.
Lord Wilberforce in Brinkibon Ltd v Stahag Stahl set out a number of guidelines,
which could be used to assess whether a form of communication might have the
postal acceptance rule applied to it:
The message may not reach, or be intended to reach, the designated recipient
immediately: Messages may be sent out of office hours, or at night, with the intention,
or upon the assumption, that they will be read at a later time. There may be some
error or default setting at the recipient's end which prevents receipt at the time
contemplated and believed in by the sender. The message may have been sent
and/or received through machines operated by third persons. Many other variations
of these technical issues may occur. No universal rule can cover all such cases. This
drew the distinction between instantaneous communication and non-instantaneous
communications. While the postal rule establishes beyond doubt the rule for noninstantaneous communication, other instantaneous communication means are not
caught by it. The following circumstances show how similar the email regime is to the
picture painted by Lord Wilberforce in Brinkibon.
For many users of email and the Internet, a constant connection is not financially
viable, and although the popularity of broadband Internet connections is increasing,
many users still only connect to the Internet sporadically using a dial-up connection
26
or even via their mobile phones. The first stage of an email journey to the recipient is
when the sender clicks the “sent” key on the computer. The second stage is when
the person who wishes to send the email connects to an ISP and the email begins to
travel along the network of computers to its recipient. This view would correlate well
with the view that the communication must leave the control of the sender as stated
by Thesiger L.J. in Household Fire Insurance Co Ltd. After all, prior to the email
leaving the outbox of the sender, he is in full control of the email and is able to alter
and even delete it. This is the position that was adopted by the United Nations
Commission on International Trade Law (UNCITRAL) when it published the Model
Law on Electronic Commerce56. This Model Law was created for the purpose, as per
its Preamble, of assisting […] all States significantly in enhancing their legislation
governing the use of alternatives to paper based methods of communication and
storage of information and in formulating such legislation where none currently exists.
Article 15 deals specifically with the time and place of dispatch and receipt of data
messages57 and states in Paragraph 1 that: Unless otherwise agreed between the
originator and the addressee, the dispatch of a data message occurs when it enters
an information system outside the control of the originator or of the person who sent
the data message on behalf of the originator.
The Model Law also states, on when such a data message is deemed to have been
received, Paragraph 2 of Art.15:
“Unless otherwise agreed between the originator and the addressee, the time of
receipt of a data message is determined as follows:
(a) if the addressee has designated an information system for the purpose of
receiving data messages, receipt occurs:
(i) at the time when the data message enters the designated
information system; or
(ii) if the data message is sent to an information system of the
addressee that is not the designated information system, at the time
when the data message is retrieved by the addressee;
56 UNCITRAL Model Law on Electronic Commerce, General Assembly Resolution 51/162 of December 16, 1996.
57 “Data messages” are defined as information generated, sent, received or stored by electronic, optical or similar means including, but not limited to,
electronic data interchange (EDI), electronic mail, telegram, telex or telecopy.
27
(b) if the addressee has not designated an information system, receipt occurs
when the data message enters an information system of the addressee.”
Thus, Article 15 would mean that an email is deemed to have been received at a
designated email address once it has entered a service provider’s email system and
would actually appear in a user’s inbox when he or she logs on to the email
account.58 In the real world, this does mirror as closely as possible the position when
a letter is sent by post. It has been suggested59 that a letter would be deemed as
received when the letter drops through the addressee’s letterbox, and that the fact
that the addressee fails to open the letter would not preclude the letter’s contents
from being effective.
The Model Law did not refer to the postal rule at any time; it may be argued that it
avoided the matter so as not to interfere with national law applicable to contract
formation. That would have exceeded the aim of the Model Law as per the
explanatory notes: “It was felt that such a provision might exceed the aim of the
Model Law, which should be limited to providing that electronic communications
would achieve the same degree of legal certainty as paper-based communications.”60
This piece of legislation, at best, deals a default rule for the time that email is sent
and when it is received. However it is mistaken to suggest that it deals with a
clarification of the postal acceptance rule for electronic communications. Various
local laws have attempted to adapt the rule to how it should apply in their respective
jurisdictions.
58 Which is from the MRAs (Mail Retrieval Agents), a programme or service which fetches messages from a mailbox on a remote server and passes
them to an MUA, Mail User Agent, a programme in which the user sends and receives mail. MRAs simply retrieve messages and/or their headers from
remote mailboxes and deliver them to the MUA on the user's machine. Internet MRAs work using one of two available protocols:
The Internet Message Access Protocol (IMAP) — a complex and powerful protocol which allows all sorts of devices (e.g. NCs, PDAs, PCs, etc) to access
and manipulate server-based mail from any location, from multiple mailboxes, etc. For example, a device with limited local storage capacity could
simply view message headers, to avoid downloading huge binary attachments that it is unable to display anyway. IMAP offers huge opportunities to
exploit email as an e-commerce tool.
The Post Office Protocol (POP3) — A tiny subset of IMAP functions which allows server-based mail to be downloaded, but has extremely limited
remote mailbox management functions (basically, limited to retaining or deleting the messages held on the remote server). POP is favoured by many
ISPs because it is simpler to configure and administer than IMAP.
59 Deveral Capps (Ibid.).
60 Guide to Enactment of the UNCITRAL Model Law on Electronic Commerce (1996), Article 11 Para (1).
28
3.5 Relevant Legislative overview
In the first draft of its E-Commerce Directive (Draft dated 18 November 1998) the
Commission set out specific rules as to how and when an e-contract would be
formed. Article 11 provided that (1) the customer must accept the goods or services,
for example by clicking on an icon; (2) the service provider must acknowledge receipt
of the acceptance; and (3) the customer must confirm receipt of the service
provider’s acknowledgement. The contract would be formed only when the customer
had confirmed receipt of the acknowledgement. This has been established in the final
draft as a third step in contract formation – confirmation. According to Article 11, “In
cases where the recipient of the service places his order through technological
means, the service provider has to acknowledge the receipt of the recipients order
without undue delay and by electronic means.” Thus, a contract is concluded in B2C
transactions only when the recipient of the service has received an electronic
acknowledgement of the recipient’s order from the service provider. Article 11 applies
only in situations where the service provider made the initial offer, not in situations
where the customer is the one who makes the offer. Additionally, the
“acknowledgement requirement” does not apply in contracts “concluded exclusively
by exchange of electronic mail or by equivalent individual communications.”61
The rationale for requiring an “acknowledgement of the receipt of the acceptance” is
to provide protection from accidental contracts. The idea is to give the consumer a
second chance to check whether he/she might have ordered a product that he/she
did not want. It would also give a seller the opportunity to establish whether there
were sufficient stocks available and whether the product has been offered at the right
price. However, the requirement of confirmation seems to duplicate the functions
provided in Art. 10 (1) of the Directive, which requires that a service provider make
available to customers the identification and technical means to handle error. There
are no mandatory requirements concerning the content of the acknowledgement of
the receipt. In order to avoid mistakes, it might be more beneficial if the Directives
ensure a consumer’s right to reviewing the details of his or her contract before
sending his or her confirmation. Thus, according to Article 11, if a service provider
61 11(3) clearly states, “Paragraph 1, first indent, and paragraph 2 shall not apply to contracts concluded exclusively by exchange of electronic mail or
by equivalent individual communications.”
29
fails to send a confirmation to the consumer requesting acknowledgment, no contract
is formed.
The latest proposed Electronic Commerce (EC Directive) Regulations 200262 which
mandate is to ensure the free movement of “information society services” across the
European Community and to encourage greater use of e-commerce by building
bridges across Europe and boosting consumer confidence and trust by clarifying the
rights and obligations of businesses and consumers, however gives some
clarification on the point of receipt of communication. This may be indicative of one of
the purposes the postal rule was meant to serve. Regulation 11(2) (b) states that
where businesses contracts, “the order and the acknowledgement of receipt will be
deemed to be received when the parties to whom they are addressed are able to
access them”. Where email is concerned, this would be the time when the email is
available to be read by the person or business to whom it is addressed and not when
the message is actually read.
By providing that emails are deemed to be effectively communicated when the
parties to whom they are addressed are able to access them, the use of email to
contract is made unequivocally reasonable and driven to certainty. It would be
horrendous to state that the content is not conclusively communicated until it is read,
as the person to whom the message is addressed may never actually read the email.
Of course, this does make email as close as possible to postal mails as in a similar
vein, once a letter has been delivered to an address, there is no certainty that it will in
fact be opened and read. Regulation 11(2) (b) makes reference to an
“acknowledgment of receipt”, whereby a seller is required by Regulation 11(1) (a) to
“acknowledge receipt of the order [...] without undue delay and by electronic means”.
The apparent aim of this requirement is to ensure that those who have made
electronic orders know with certainty that these orders have been received. In this
situation, Regulation 11(2) (b) could suggest that acceptance would be deemed
communicated at the time when the email is available to be read, that is, at the time
when the email enters the information system of the person who has made an order.
62 The Electronic Commerce (EC Directive) Regulations 2002 (SI 2002 No. 2013) transposed into UK law the majority of the provisions of the
Electronic Commerce Directive (2000/31/EC).
30
In the United States, the point at which an emailed acceptance becomes effective
can be clearly seen in the Uniform Computer Information Transactions Act 2000
(UCITA).63 Here, under the sectional subtitle of “Offer and acceptance in general”, s.
203(4) states that “if an offer in an electronic message evokes an electronic message
accepting the offer, a contract is formed [...] when an electronic acceptance is
received”. Receipt is defined in s.102 of UCITA as “coming into existence in an
information processing system or at an address in that system in a form capable of
being processed by or perceived from a system of that type by a recipient”. This
again simply means that an emailed acceptance is deemed effective from the time
that it is successfully delivered to a person’s mailbox, not when it is actually read.
Sadly, UCITA applies to computer information transactions only. Uniform Electronic
Transaction Act, UETA, by contrast, is a statute with broader reach – focusing on all
types of electronic transactions. It is however quite apparent that UCITA is intended
to operate in a similar fashion to UNCITRAL’s Model Law on E-Commerce through
reliance on functional equivalence and avoiding specific technological requirements.
UETA made provisions for default rules regarding when and from where an electronic
record is received. Section 15 states that:
b) Unless otherwise agreed between a sender and the recipient, an electronic
record is received when:
(1) it enters an information processing system that the recipient has
designated or uses for the purpose of receiving electronic records or
information of the type sent and from which the recipient is able to
retrieve the electronic record; and
(2) It is in a form capable of being processed by that system.
In contract formation, UETA brought to light only one new issue – contracting with
machines that have something resembling discretion, and underscores the place of
trade usage between contracting parties. It is explicitly clear that UETA has not
introduced anything radically different from what UCITA provides nor is there a
change in the requirement for the offeror to receive the mail in his service system
technically in the form that is accessible to him.
63 UCITA is the first uniform contract law designed to deal specifically with the new information economy in America.
31
By way of emphasis, it is suggested that emailed acceptances should be deemed
effective from the moment that they are available and accessible to the recipient, akin
to the case of traditional posts. Among the relevant laws, help could be found in the
Convention relating to a Uniform Law on the Formation of Contracts for the
International Sale of Goods.64 But I must first mention the limitations associated with
using this law for resolving e-contract formation: Article 1 of the Convention states –
The present Law shall apply to the formation of contracts of sale of goods entered
into by parties whose places of business are in the territories of different States, in
each of the following cases:
where the offer or the reply relates to goods which are in the course of
carriage or will be carried from the territory of one State to the territory of
another;
where the acts constituting the offer and the acceptance are affected in the
territories of different States;
where delivery of the goods is to be made in the territory of a State other than
that within whose territory the acts constituting the offer and the acceptance
are affected.
The overall scope of this Convention makes it too restrictive for application to
transactions that are outside international sale of goods because applying it will
assume the proposition, howbeit questionably, that e-commerce parties are in
different states. But if we pretend to uphold this presumption, the application of the
rule is a beauty to behold.
In Article 8, the Convention provides that:
A declaration of acceptance of an offer shall have effect only if it is
communicated to the offeror within the time he has fixed or, if no such time is
fixed, within a reasonable time, due account being taken of the circumstances
of the transaction, including the rapidity of the means of communication
employed by the offeror, and usage. In the case of an oral offer, the
acceptance shall be immediate, if the circumstances do not show that the
offeree shall have time for reflection.
64 UNIDROIT Conventions, The Hague, 1 July 1964.
32
Cognizance must be taken of the fact that the communication mechanism in the
online environment is neither concrete-cast nor robotic. Email communications, for
instance, cannot be classified with certainty and accuracy as either instantaneous or
otherwise. In this regard, Khan and Cerf,65 the authors of the article, what is the
Internet and what make it work WorldCom.co; think that unlike the traditional rules on
contract the architecture of the Internet and the evolving state of technology, the
determination of ‘meeting of minds’ or consent becomes less than straightforward.
Indeed, software becomes the primary facilitator of choices, expectations and
autonomy – a form of techno-regulation or the determination of law by technological
functions.66
So then, when will an e-commerce contract be formed? A contract is formed when
one party makes a binding offer to the other party, which is accepted. Contract law
requires an element of intent, but the E-Commerce Directive rather requires an
information obligation, in order to help consumers reach intent. By following the
technical steps to conclude a contract, the consumer indicates his intent to enter into
a contract.67 In contrast, UETA is more explicit and focuses on the party’s intention to
be bound. UETA however supplements existing substantive law on contract.68
Contract formation under UCITA requires an offer and acceptance: “A contract may
be formed in any manner sufficient to show an agreement, including offer and
acceptance or conduct of both parties or operations of electronic agents which
recognize the existence of a contract.”69 Section 203 (1) provides that an offer to
make a contract invites acceptance in any manner and by any medium reasonable
under the circumstances. It went on to outline in the same section thus:
65 Robert E Kahn and Vinton G Cerf, What is the Internet And What Makes it Work WorldCom.co. December, 1999 at
http://www.worldcom.com/generation. [Visited on the 12th September 2010].
66 Robert E Kahn and Vinton G Cerf, What is the Internet And What Makes it Work WorldCom.co. December, 1999 at
http://www.worldcom.com/generation. [Visited on the 12th September 2010].
67 See Council Directive 2000/31 art. 10(1)(a).
68 Comments on the scope of UETA reads:
“2. This Act affects the medium in which information, records and signatures may be presented and retained under current legal requirements. While
this Act covers all electronic records and signatures which are used in a business, commercial (including consumer) or governmental transaction, the
operative provisions of the Act relate to requirements for writings and signatures under other laws.”
69 S. 202 (a).
33
If an offer in an electronic message evokes an electronic message accepting the
offer, a contract is formed
(a) When an electronic acceptance is received; or
(b) If the response consists of beginning performance, full performance, or
giving access to information, when the performance is received or the access
is enabled and necessary access materials are received.
A confirmation would merely be repeating what the parties are intending to be bound
to perform, an opportunity to review the essence of the contract, and would have no
legal effects under the U.S. law. The need for a coherent, uniform body of law has
never been greater
3.6 Conclusion
Expectedly, the law has responded slowly but certainly, to the online environment in
which contracts may be formed and particularly rules involving the communication of
acceptance. When the postal rule was created it provided a reasonable answer to a
genuine problem, in that the inherent delays in the principal method of
communication led to uncertainties in contract formation. That answer has been
adapted to suit subsequent developments in instances of communication via
facsimile, telephone and most recently email. The bottom-line is that the essentials
are retained and the law strives for certainty in the principles of contract formation.
The postal rule, while we still wait for certain decisions on it, has been over and again
constrained to apply to the new regime of e-commerce as emails are equated with
postal mails. The rule should be limited to postal situations where delays still occur
and the rationale for the postal rule’s creation is arguably still present. With the email
as arguably a non-instantaneous method of communication, the conclusion that the
postal rule should be limited and not extended to cover email would seem
questionable.
From the discussion above it becomes very easy to concur with Reed when he
observes that the basic principles of contract formation are still the same, so that the
existence of a contract and its terms are discovered by identifying the
communications which pass between the parties, identifying the offer, and then
determining whether that offer has been accepted and indeed when it was
34
accepted.70 It is then the unchanged principles with changed mechanism-particularly the mechanism for communicating the fact of acceptance in the online
environment. The question for evaluation is whether this above scenarios will do
justice to contract formation in Electronic Data Interchange.
70 C., Reed. Internet Law: Text and Materials, London. (Butterworth), 2000.
35
4 CONTRACT FORMATION IN
ELECTRONIC DATA INTERCHANGE
4.1 Introduction
Paper has been for a century the one of the major means for recording and carrying
out commercial information. For many legal purposes, a contract must assume a
written or printed form in order to gain legal validity and be enforceable [...] Contract
law consideration, such as the Legal validity, enforceability, and the formation of
contract can affect the capacity to prove that a transaction has indeed taken place.
Commercial practice has made paper a safe and reliable means of recording
information. Legal doctrine and practice have both acknowledged the validity of
documents that embody on paper the performance of an action. Courts accept the
information on paper as reliable evidence. Legal doctrines suggest that the properties
of paper in combination of an ink provide enough guarantee for the accuracy of the
recorded information […] Paper is the modern standard information carrier and it
holds a very strong position as such.71The dematerialization of document and the
conclusion of contract in electronic form require a reconsideration of our approach to
fulfilling legal requirements of contracts.72 This chapter shall exclusively evaluate
formation of contract in the light of Electronic Data Interchange under the backdrop
that contract formation in EDI falls within the circumference of electronic contracting.
4.2 Sequence of Electronic Data Interchange
Transaction
A typical EDI transaction would flow as follows. Information for a purchase order is
keyed into the system that produces an electronic purchase order. Most of the
information is only keyed once, since the same information is the basis for all
remaining documents. The electronic purchase order is sent either directly to the
seller […] or through an electronic mailbox provided by a communications network.
The seller receives the electronic purchase order and translates (reformats) the data
71 Andreas, Mitrakes. Open EDI and the law in Europe, volume 3, The Hague, (kluwer law internatonal) 1997,pg.38
72 Deloukas. The Concept of the Form of a Document. (1980) p.18
36
into the form needed by the seller’s order entry application. At this time, an electronic
acknowledgment is sent back to the buyer indicating that a transmission has been
received. This is called a functional acknowledgment. It is also possible for the seller
to read the purchase order and send the buyer a purchase order acknowledgment
reporting on the availability of specific items in the order. The seller’s order entry
system then generates internal instructions to the warehouse, plant, or service centre
regarding the filling of the order. The order entry application may also feed into
"bridge into," the invoicing application so that an electronic invoice can be prepared.
The remaining steps are similar. The translation process formats data so that it can
be sent to or received from a trading partner. The bridging process couples two
separate applications.73
4.3 Contract formation through Electronic Data
Interchange
To determine at what point a contract comes to fruition consideration must be made
to when a valid offer is considered accepted. The time and place of acceptance is of
enormous importance as it is often used to determine the applicability of the rule of
law and relevant jurisdiction. This principle is not alien to Electronic Data
Interchange. Traditional or closed EDI is structured in such a way that parties
engaged in communication are linked by a network service provider (VAN), while
Contemporary or Open EDI is exclusively based on Internet connectivity74. To
appreciate this debate, it is imperative to state that EDI system are generally
designed to be automated, however there is the possibility, that this option can be
waived to allow for manual verification. Technically, it is a counter offer.
In Electronic Data Interchange, communication of purchase order and the
subsequent acknowledgement by the recipient or the computer system serves as
conclusive proof that the entire elements that should suffice to constitute the
description of a valid offer and acceptance exist because a contract comes into life
73
Ned
C.,
Hill.
Electronic
Data
Interchange:
A
Definition
and
Perspective
http://scholar.google.com/scholar?start=20&q=how+does+Electronic+data+interchange+work&hl=en&as_sdt=2000 [23.November.2010]
74
G,
Zekos.
EDI:
Electronic
Techniques
of
EDI,
Legal
Problems
and
European
Union
Law
Greece
[1999]
at
http://webjcli.ncl.ac.uk/1999/issue2/zekos2.html [Visited on the 17th of October, 2010].
37
when an offer, a definite promise to be bound on specific terms, is accepted without
modification of the content of the offer75. As already exhaustively discussed in the
previous chapter, the transition of the Postal box rule into the newer developed mode
of communication of contract appears effortless and reasonable. Will EDI be a
different ball game?
4.4 A Critique of Communication of Contract in
Electronic Data Interchange
Trade practice has developed a number of rules for the time and place of the
formation of a contract.
If there is certainty about the identity of the will of the trading partner and the offeror
is not certain whether the recipient has accepted the offer, the practice has
developed the following rule;
a. The declarative rule, according to which a contract is concluded the time
and place the offeree accepted the contract.
b. The postal rule, accordingly, to which a contract is concluded at the time
and place the offeree hand his or her acceptance to the post office or an
independent third party assigned to deliver the mail.
If the contract is concluded when both parties are notified of the will of each other,
there are two rules to determine the exact place and time of the formation of a
contract;
a. The reception rule, according to which a contract is concluded at the time
and place where the acceptance was delivered to the premises of the offeror.
b. The information rule, according to which a contract is concluded, if the
contract is concluded at the time and place where the offeror actually become
informed about the offeror acceptance.76
4.4.1 Automated EDI
The rule established in Latec Finance v Knight77 on communicating acceptance is
that acceptance must be communicated unless it is displaced by the clear intention of
75 Carlill v. Carbolic Smoke Ball Co (1893) 1 QB 256 (CA)
76 Andreas, Mitrakes. Open EDI and the law in Europe, volume 3, The Hague, (kluwer law internatonal) 1997,pg.4
45 m9
77 (1969) 2 N.S.W.R. 79, N.S.W. Court of Appeal. See also Robophone Facilities Ltd v Blank [1966] 3 All ER 128.
38
the parties. In order words there must be absolute certainty that what is being
communicated get directly to the offeror. With respect to Telex In Entores Ltd. v.
Miles Far East Corporation
78
the court held that the mailbox rule did not apply to
communication of acceptance the Court regarded it as an instantaneous form of
communication – the forms of communication as if they were in each other’s
presence. The CISG Law Commission considers that an email message is
communicated when it is available to be read this does make it instantaneous as it
would be from the time it was transferred to the recipient’s ISP i.e. reaches the mail
box of the offer.79 Furthermore, the United Nation Convention on the Contract for the
International Sale of Goods Vienna Convention 1980 Article 24, also referred to as
the Vienna convention provides for the purposes of this part of the Convention, an
offer, declaration of acceptance or any other indication of intention “reaches” the
addressee when it is made orally to him or delivered by any other means to him
personally, to his place of business or mailing address or, if he does not have a place
of business or mailing address, to his habitual residence.
Finally, European Model EDI Agreement paragraph 3.3 “ [...] a contract effected by
the use of EDI shall be concluded at the time and place where the EDI message
constituting acceptance of an offer reaches the computer system of the offeror.80”
“A majority of member states approve for contracts concluded where parties are not
in the presence of each other, the application of the "reception rule" which ensures
that acceptance takes place at the place and at the time of receipt of such
acceptance by the offeror. The Vienna Convention on the international sale of goods
provides for this rule to be applicable to contracts concluded "at distance".
The conclusion of a study carried out in the first phase of the Tedis programme
supports the view that this rule is the best to apply to EDI contracts, in particular as it
avoids, to a large extent, the risks of conflicts of laws in connection with the use of
EDI81 These elements justify the endorsement of that rule in the EDI Agreement. The
78 [1955] 2 QB 327.
79 CISG-AC Opinion no 1, Electronic Communications under CISG, 15 August 2003. Rapporteur: Professor Christina Ramberg, Gothenburg, Sweden.
80 94/820/EC: Commission Recommendation of 19 October 1994 relating to the legal aspects of electronic data interchange (Text with EEA relevance)
Official Journal L 338 , 28/12/1994 P. 0098 – 0117 http://eurlex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31994H0820:en:HTML accessed on
the 13th of January 2011
81 Telecommunications for Europe, Volume 2. Edited by H. Ungerer, C. Berben, P. Scott (The CEC sources), and 1992 p 498.
39
reception rule, in the case of the European Model EDI Agreement, is to be
understood as the rule whereby an EDI message is received at the time and the
place where the message reaches the computer of information system of the
offeror”.82
The drafters of the model agreement made clear in the scope of the agreement that
unless the parties agreed to the provisions of this model agreement they are not
intended to govern the contractual obligations arising from any underlying
transactions effected by the use of EDI. It seems that the applicability of the model
agreement as mandatory law has been ruled out from its genesis.83
Juxtaposing, the procession of automated EDI with the rule established in Latec
Finance v Knight84 etc, it is doubtful that there is no resemblance. What is obtainable
is that upon the despatch of the purchase order, the message is transmitted vie VAN
or the Internet to the system of the proposed recipient; whose system is programmed
to respond automatically. The system automatically generates a response instantly
on the order of the offeror thereby sending an acknowledgment.85 This
acknowledgment serves as an indication of a notification of the contract it. That is to
say that the reception of this notification constitutes acceptance. It must be stressed
that the general rule applies only to automated EDI. It is justified therefore, to strongly
opine, that the argument of the declarative, reception rule and instantaneous rule has
some resonance with automated EDI contracting.
4.4.2 Non-Automated Electronic Data Interchange
For the purpose of emphasis, non-automotive EDI does not in effect derogate in any
form the quality of EDI. It only means that human action is required to effect
confirmation and verification as this is fundamental to the smooth running of the
contractual process. Whereas in the automotive systems, human influence is only
relevant at the first moment when the first set of data are keyed into the automated
82 http://www.vereon.ch/upload/whitepaper/Engel-Flechsig_Anhang_2_20_26.pdf [Assessed on the 23 November 2010] Commentary on Electronic
data Interchange Model Agreement
83 http://webjcli.ncl.ac.uk/1999/issue2/zekos2.html#fnB25 [Assessed on the 28th of November 2010]
84 [1955] 2 QB 327.
85
Ned
Hill.
A
Definition
and
Perspective
http://scholar.google.com/scholar?start=20&q=how+does+Electronic+data+interchange+work&hl=en&as_sdt=2000 [23.November.2010]
40
programme.86 It will appear justifiable to relate the point at which acceptance is
communicated and fulfilment of contract with the Postal rule, which is an exception
to the general rule on communicating acceptance.
The postal rule accordingly, refers to a situation in which a contract is concluded at
the time and place the offeree hands in his or her acceptance to the post office or to
an independent third party assigned to deliver the mail. Adams v Lindsell87 formed
the basis for the rule that an acceptance by post is effective from the time of posting,
not the time of delivery. This is also called the mailbox rule. The ratio decidendi of
this rule has found judicial expression in the case of Household Fire Insurance Co
Ltd v Grant,88 The signatory, L.J. stated that “the acceptor, in posting the letter has
[…] put it out of control and done an extraneous act which clenches the matter.” that
is to say, from the moment the acceptance is posted it leaves the regime of the
control of the offeree.
The United Nations Commission on International Trade Law (UNCITRAL) can be
summarized thus, particularly; Article 1589 would mean that an email is deemed to
have been received at a designated email address once it has entered a service
provider’s email system and would actually appear in a user’s inbox when he or she
logs on to the email account.
“ […]Unless otherwise agreed between the originator and the addressee, the
dispatch of a data message occurs when it enters an information system
outside the control of the originator or of the person who sent the data
message on behalf of the originator.”
The United States, position is not different from the views expressed above. The
point at which an emailed acceptance becomes effective can be clearly seen in the
Uniform Computer Information Transactions Act 2000 (UCITA). Here, under the
sectional subtitle of “Offer and acceptance in general”, s. 203(4) states that “if an
offer in an electronic message evokes an electronic message accepting the offer, a
86
G,
Zekos.
EDI:
Electronic
Techniques
of
EDI,
Legal
Problems
and
European
Union
Law
Greece
[1999]
at
http://webjcli.ncl.ac.uk/1999/issue2/zekos2.html [Visited on the 17th of October, 2010].
87 (1818) B & Ald 681.
88 (1879) L.R. 4 Ex. D. 216, 223.
89 http://www.jus.uio.no/lm/un.electronic.commerce.model.law.1996/15.html
41
contract is formed ... when an electronic acceptance is received”. Receipt is defined
in s.102 of UCITA as “coming into existence in an information processing system or
at an address in that system in a form capable of being processed by or perceived
from a system of that type by a recipient”.
Interestingly, the only legislation enacted directly aimed at to EDI, is the South
Korean Regulation. Article 15. (Transit Times for Electronic Documents) posited thus:
“When electronic documents used for application or for approval, are processed
through a trade automation network by traders or trade-related institutions, the
electronic documents shall be recorded in the computer files of the contractor or
designated contractor. Such documents shall be regarded as having reached the
[counter party] identified receiving party at the moment they are recorded in the
computer files of the contractor of designated contractor”.
Adreas Mitrakas90 opined that “[…] the time of the formation of a contract is the time
of the receipt of the massage by the network service provider. The place of the
formation of the contract is the premises of the network provider.”
An example of the application of the postal rule is a situation where, a Belgium buyer
places an order with an English supplier, using the service of a network service
provider based in the Netherlands. In this case the time of the formation of the
contract will be the moment that the acceptance from the British counterpart reaches
the computer system of the network service provider in the Netherlands. Hence, the
Dutch law will apply. He further asserted that there is a radical shift from the Postal
rule by other international rule. The reasons he claim is the impracticable nature of
the rule compared with the preferred Reception rule. Applying the postal rule can
create a situation in which contract created will be formed in a jurisdiction completely
different from the one that the trading partner directly involved in the transaction
reside. In his example, a localised solution would either be the application of the
English law or the Belgium law. His argument can be better illustrated supposing that
the network service provider is not located in the Netherlands but in the US. Litigation
cost in this case can rise sharply. Other reasons advanced are that;
90 Andreas, Mitrakes. Open EDI and the law in Europe, volume 3, The Hague, (kluwer law internatonal) 1997
42



the reception rule takes into account the possible delay between the
transmission and the reception of a message [....] this is negligible but the
danger from a technical failure cannot be eliminated.
the reception rule applies to most continental legal systems and it has been
used in the Vienna convention and the European model law, hence it has
acquired some international acceptance.
the postal rule applies in the common law countries; therefore it has a
limited influence in the European context.
With respect to the South Korean legislation, it is a very commendable approach
taken by that Government indeed an encouragement for other countries to follow. It
must be noted that this is a national legislation as such, the exposition by Andrea
Mitrakes, the author of Open EDI law in Europe; may only hold some credit if the
hypothetical illustration only reflected transaction within South Korea where the
contention may arise as to which local court should exercise jurisdiction.91
4.5 Conclusion
Substantive validity of contractual terms in Electronic Data Interchange does not
pose serious challenge to law. So far bold steps taken to provide an assertive
response to this highly improved method of communication is evident in the South
Korean legislation. The European Model Agreement on Electronic Data Interchange
majorly set out guideline to parties’ interested in insulating themselves against
eventuality subject of course to an uncompromised agreement to be bounded by the
terms of the agreement. The UNCTRAL Modal law presents itself as an excellent
piece of legislation. It is however handicapped by the fact that it cannot be enforced
regardless of that, it influence is quite substantial. There are also plethora of decided
cases which have established this principle of law.
What may be needed is a judicial interpretation of the existing law. I am of the firm
belief that the courts will very much transpose the existing legal principles into EDI.
Fears have been expressed about the imminence of this judicial intervention. Reason
posited for this fears seems credible indeed:
91 Andreas, Mitrakes. Open EDI and the law in Europe, volume 3, The Hague, (kluwer law internatonal) 1997
43

The strength of the business relationships between EDI partners
encourages good faith and negotiation and settlement of disputes.

The existence of EDI trading partnership agreement and the use of an
effective EDI communication standard has substantially reduced the
likelihood dispute. The meaning of EDI communication is less likely than
traditional message technique such as mail or phone call to be ambiguous.

In addition to reducing the likelihood of dispute since EDI eases and the
speeds communicate between the parties, it also reduces the average size
of error. Parties can easily tolerate small, relatively infrequent error.

As a proactive measure substantial investment in time and resources in the
implementation of EDI trading partner agreement to comparatively the
uncertainty of the whether the courts will validate such arrangement.

Some EDI may involve trading partners with unequal trading power. A
major manufacturer may be in a strange position to economically coerce its
suppliers into submission when dispute arise. Disputes in such case may
never get to court for fear of reprisal92etc.
For the sake of emphasis, it is doubtful that the court will jettison existing legal
reasoning in contract formation with regard to disputes involving EDI. After all, it is
still very much old contract formation. Indeed an old wine in a new bottle.
92 Electronic contracting law, EDI and Business transaction Barnard D...[et al] Deerfield (Thomson legal Publishing) 1995 p 4to 95
44
Recommendations
Judicial interpretation is fundamental to the resolution of the main problem of
Electronic Data Interchange; which is the standardisation of its legal effects with the
traditional regulations. This may be a real challenge but giving Model laws,
UNCTRAL and the likes a biting force will indeed have a tremendous effect.
Open Electronic Data Interchange has a peculiarity, which is its cross jurisdictional
nature. Although there are international regulation and convention governing
international commercial practises, as a matter of extra precaution Parties intending
to use Electronic Data Interchange as means of contracting should embark on
extensive research on their counterpart existing legal system so that they are able to
draft an extensive Agreement. It is my recommendation that an adoption from the so
many Models should suffice.
It has been suggested that universal Electronic Data Interchange laws be created; as
a way of proffering solution to perceived problem of open Electronic Data
Interchange. It has also been suggested that new terminology be generated to define
Electronic Data Interchange´s contractual terms. It is my view that there is no need
for that, as universal technical standard has be created and adopted. On the second
suggestion, I am of the view that the suggestion to invoke new terms is not only
ridiculous, but also useless.
As stated in my introduction, standardization must be the watchword and must thus
become the result of the consummation between the marriage of technology and the
law. Standardization has been achieved technically e.g. UN/Edifact. What we await
now is standardization by way of transposition of existing legal principle into the
interpretation of EDI transaction. This may be loosely akin to the governing principle
of the doctrine of function equivalence.
45
References
BOOKS AND JOURNALS
A., Pollack. For Artificial Reality: Wear a Computer in (New York Times), New York,
April 10, 1989.
Andreas, Mitrakes. Open EDI and the law in Europe, volume 3, The Hague, (kluwer
law internatonal) 1997,pg.38
Chitty on Contract 28th ed., London, (Sweet & Maxwell), 1999.
C., Reed. Internet Law: Text and Materials, London. (Butterworth), 2000.
Deveral Capps. Electronic Mail and The Postal Rule (I.C.C.L.R). 2004, 15(7), 209
Deloukas. The Concept of the Form of a Document. (1980) p.18
D., Spar and J., Bussgang. Ruling the Net (Harvard Business Review) May-June
1996, p 125-133.
Electronic contracting law, EDI and Business transaction Barnard D...[et al] Deerfield
(Thomson legal Publishing) 1995 p 4to 95
Furmston, M. P., Cheshire, Fifoot and Furmston’s Law of Contract, 14th edition
London (Butterworth), 2001
G, Zekos. EDI: Electronic Techniques of EDI, Legal Problems and European Union
Law Greece [1999]
J. W., Verity. Invoice? What's an invoice? (Business Week) June 10, 1996.p 110112.
M, Cooper. ANSI Position Statement on Reference to Standards and Building Codes,
New York (ANSI Public Document Library) 2008.
46
Ned C., Hill. EDI: A Definition and Perspective
http://scholar.google.com/scholar?start=20&q=how+does+Electronic+data+interchan
ge+work&hl=en&as_sdt=2000 [23.November.2010]
Roberts, W., History of Letter-writing, W. Pickering, 1843 at 1.
S. McGann, J. King and K. Lyytinen, Globalization of E-commerce: Growth and
Impacts in the United States of America, university of Michigan (in Sprouts) Working
Papers on Information Environments, Systems and Organizations, Volume 2, Issue
2, 2002.
Telecommunications for Europe, Volume 2. Edited by H. Ungerer, C. Berben, P.
Scott (The CEC sources), and 1992 p 498.
The Popular Encyclopaedia: Being a General Dictionary of Arts, Sciences, T.
Literature, Biography, History, and Political Economy, (University of Michigan
Library), 2007
The Machine That Changed the World: The Story of Lean Production, P. Womack ...
[et al.] Chicago, (Harper Business), 2003.
Tain-Jy, Chen. Globalization and E-commerce: Growth and Impacts in Taiwan,
(Center for Research on Information Technology and Organizations CRITO),
University of California, November, 2001.E., Brousseau. Globalization and ECommerce: Growth and Impacts in France, (UC Irvine, Center for Research on
Information Technology and Organizations) 2001.
V., Zwass. Electronic Commerce: Structures and Issues in International Journal of
Electronic Commerce. Volume 1, Number 1, Fall, (1996), pp. 3 – 23
CONVENTION
The United Nations Convention on Contract for International Sale of Goods.
Electronic Commerce (EC Directive) Regulations 2002
Uniform Computer Information Transactions Act 2000
South Korean Act on the Promotion of Trade Business Automation
47
European Model EDI trade partner Agreement
The Uniform Electronic Transaction Act
Convention No108 of the Council for Europe of 28 January 1981
UNIDROIT-International institute for the Unification of Private Law
CASE LAW
Adams v Lindseyl (1818) B & Ald 681.
Byrne v. Van Tienhoven [1880] 5 CPD 344.
Brinkibon Ltd v Stahag Stahl [1983] 2 AC 34 House of Lords.
Cooke v Oxley 100 ER 785.
Dick v. U.S., 82 F. Supp. 326.
Entores Ltd. v. Miles Far East corporation [1955] 2 QB 327.
Fisher v Bell [1961] 1 QB 394,
Gibson v. Manchester City Council [1979] 1 WLR 294.
Latec Finance v Knight (1969) 2 N.S.W.R. 79, N.S.W. Court of Appeal
Partridge v Crittendon [1968] 2 All ER 421.
Pharmaceutical Society of Great Britain v Boots [1952] 2 QB 795.
Robophone Facilities Ltd v Blank [1966] 3 All ER 128.
Tenax Steamship Co Ltd v The Brimmes [1975] 1 QB 929.
Household Fire Insurance Co Ltd v Grant (1879) L.R. 4 Ex. D. 216, 223.
Henthorn v. Fraser [1892] 2 Ch 77.
WEBSITES
http://www.ifla.org/VI/5/reports/rep4/42.htm#chap2 [Visited on the 17th of October 2010].
http://webjcli.ncl.ac.uk/1999/issue2/zekos2.html [Visited on the 17th of October, 2010].
http://www.nytimes.com/1989/04/10/business/for-artificial-reality-wear-a-computer.html [accessed on the 17th of
March, 2010].
48
http://www.softshare.com/tips/1998/tips27.html[accessed on 14th of March, 2010].
http://www.liaison.com.[accessed on the 29th of November, 2010].
http://www.ecommercetimes.com/story/4085.html [accessed on 29th of June, 2010].
http://www.technologyreview.com/Infotech/14504/?a=f [accessed on the 26th of June, 2010].
http://money.cnn.com/2000/01/10/deals/aol_warner/ [accessed on 26th of June, 2010].
http://www.statistics.gov.uk/pdfdir/ecomnr1108.pdf [accessed on the 14th of March, 2010.]
http://en.euabc.com/word/620 [assessed 10th january 2011
http://www.lawcom.gov.uk.
http://www.lawcom.gov.uk [accessed on 12th of May, 2010].
http://www.worldcom.com/generation. [Visited on the 12th September 2010].
http://www.businessweek.com.[Accessed on the 14th of March, 2010]
49
Annex I
EUROPEAN MODEL EDI AGREEMENT
LEGAL PROVISIONS
This European Model EDI (EDI) Agreement is concluded by
and....................................................... between.......................................... hereinafter
referred to as "the parties",
Article 1
Object and Scope
1.1 The "European Model EDI Agreement", hereinafter referred to as "the
Agreement", specifies the legal terms and conditions, under which the parties,
conducting transactions by the use of EDI (EDI), operate.
1.2 The Agreement consists of the legal provisions set out in the following and shall
be completed by a Technical Annex.
1.3 Unless otherwise agreed by the parties, the provisions of the Agreement are not
intended to govern the contractual obligations arising from the underlying
transactions effected by the use of EDI.
Article 2
Definitions
2.1 For the purpose of the Agreement, the following terms are defined as follows:
2.2 EDI: EDI is the electronic transfer, from computer to computer, of commercial and
administrative data using an agreed standard to structure an EDI message.
2.3 EDI message: An DEI message consists of a set of segments, structured using
and agreed standard, prepared in a computer readable format and capable of being
automatically and unambiguously processed.
2.4 UN/Edifact: As defined by the UN/ECE93), the United Nations rules for EDI for
administration, commerce and transport, comprise a set of internationally Agreed
standards, directories and guidelines for the electronic interchange of structured
Data, and in particular, interchange related to trade in goods and services, between
Independent computerized information systems.
93 United Nations Economic Commission for Europe.
50
2.5 Acknowledgement of receipt: The acknowledgement of receipt of an EDI
message is the procedure by which, on receipt of the EDI message, the syntax and
semantics are checked, and a corresponding acknowledgement is sent by the
receiver.
Article 3
Validity and formation of contract
3.1 The parties, intending to be legally bound by the Agreement, expressly waive any
rights to contest the validity of a contract effected by the use of EDI in accordance
with the terms and conditions of the Agreement on the sole ground that it was
effected by EDI.
3.2 Each party shall ensure that the content of an EDI message sent or received is
not inconsistent with the law of its own respective country, the application of which
could restrict the content of an EDI message, and shall take all necessary measures
to inform without delay the other party of such inconsistency.
3.3 A contract effected by the use of EDI shall be concluded at the time and place
where the EDI message constituting acceptance of an offer reaches the computer
system of the offeror.
Article 4
Admissibility in evidence of EDI messages
To the extent permitted by any national law which may apply, the parties hereby
agree that in the event of dispute, the records of EDI messages, which they have
maintained in accordance with the terms and conditions of this Agreement, shall be
admissible before the Courts and shall constitute evidence of the facts contained
therein unless evidence to the contrary is adduced.
Article 5
Processing and acknowledgement of receipt of EDI messages
5.1 EDI messages shall be processed as soon as possible after receipt, but in any
event, within the time limits specified in the Technical Annex.
5.2 An acknowledgement of receipt is not required unless requested An
acknowledgement of receipt can be requested by specific provision included in the
Technical Annex or by express request of the sender in an EDI message.
5.3 Where an acknowledgement is required, the receiver of the EDI message to be
acknowledged shall ensure that the acknowledgement is sent within one business
51
day of the time of receipt of the EDI message to be acknowledged, unless an
alternative time limit has been specified in the Technical Annex. A business day
means any day except a Saturday, Sunday or any declared public holiday in the
intended place of receipt of an EDI message. The receiver of an EDI message
requiring an acknowledgement shall not act upon the content of the EDI message
until such acknowledgement is sent.
5.4 If the sender does not receive the acknowledgement of receipt, within the time
limit, he may, upon giving notification to the receiver to that effect, treat the EDI
message as null and void as from the expiration of that time limit or initiate an
alternative recovery procedure as specified in the Technical Annex, to ensure
effective receipt of the acknowledgement. In case of failure of the recovery
procedure, within the time limit, the EDI message will definitely be treated as null and
void, as from the expiration of that time limit, upon notification to the receiver.
Article 6
Security of EDI messages
6.1 The parties undertake to implement and maintain security procedures and
measures in order to ensure the protection of EDI messages against the risks of
unauthorized access, alteration, delay, destruction or loss.
6.2 Security procedures and measures include the verification of origin, the
verification of integrity, the non-repudiation of origin and receipt and the
confidentiality of EDI messages. Security procedures and measures for the
verification of origin and the verification of integrity, in order, to identify the sender of
any EDI message and to ascertain that any EDI message received is complete and
has not been corrupted, are mandatory for any EDI message. Where required,
additional security procedures and measures may be expressly specified in the
Technical Annex.
6.3 If the use of security procedures and measures results in the rejection of, or in
the detection of an error in an EDI message, the receiver shall inform the sender
thereof, within the specified time limit. The receiver of an EDI message which has
been rejected, or which contains an error shall not act upon the EDI message before
receiving instructions from the sender. Where rejected or erroneous EDI message is
retransmitted by the sender. The EDI message should clearly state that it is a
corrected EDI message.
Article 7
Confidentiality and protection of personal data
52
7.1 The parties shall ensure that EDI messages containing information specified to
be confidential by the sender or agreed mutually to be confidential between the
parties, are maintained in confidence and are not disclosed or transmitted to any
unauthorized persons nor used for any purposes other that those intended by the
parties. When authorized, further transmission of such confidential information shall
be subject to he same degree of confidentiality.
7.2 EDI messages shall not be regarded as containing confidential information to the
extent that such information is in the public domain.
7.3 The parties may agree to use a specific form of protection for certain messages
such as a method of encryption to the extent permitted by law in either of their
respective countries.
7.4 Where EDI messages which include personal data are sent or received in
countries where no data protection law is in force, and until a relevant Community
legislation is implemented, each party agrees as a minimum standard, to respect the
provision of the automatic processing of personal data)94.
Article 8
Recording and storage of EDI messages
8.1 A complete and chronological record of all EDI messages exchanged by the
parties in the course of a trade transaction shall be stored by each party, unaltered
and securely, in accordance with the time limits and specifications prescribed by the
legislative requirements of its own national law, and, in any event, for a minimum of
three years following the completion of the transaction.
8.2 Unless otherwise provided by national laws, EDI messages shall be stored by the
sender in the transmitted format and by the receiver in the format in which they are
received.
8.3 Parties shall ensure that electronic or computer records of the EDI messages
shall be readily accessible, are capable of being reproduced in a human readable
form and of being printed, if required. Any operational equipment required in this
connection shall be retained.
Article 9
Operational requirements for EDI
94 Convention No 108 of the Council for Europe of 28 January 1981.
53
9.1 The parties undertake to implement and maintain the operational environment to
operate EDI according to the terms and conditions of this Agreement, which includes
but is not limited to the following:
9.2 Operational equipment
The parties shall provide and maintain, the equipment, software and services
necessary to transmit, receive, translate, record and store EDI messages.
9.3 Means of communication
The parties shall determine the means of communication to be used, including the
telecommunication protocols and if required, the choice of third party service
providers.
9.4 EDI message standards
All EDI messages shall be transmitted in accordance with the UN/Edifact standards,
recommendations and procedures95 as approved by the United Nations Economic
Commission for Europe (UN/ECE-NP 4) and with European standards.
9.5 Codes
Data element code lists referred to in EDI messages shall include UN/Edifact
maintained code lists, international code lists issued as ISO international standards
and UN/ECE or other officially published code lists. Where such code lists are not
available, preference shall be given to the use of code lists published, maintained
and ensuring correspondence with other coding systems.
Article 10
Technical specifications and requirements
The Technical Annex shall include the technical, organizational and procedural
specifications and requirements to operate EDI according to the terms of this
Agreement, which includes but is not limited to the following:
Operational requirements for EDI, as referred to in Article 9, including, operational
equipment, means of communication, EDI message standards and codes, Processing and acknowledgement of EDI messages, Security of EDI messages, -
95 UN/Edifact Syntax Rules ISO 9735 - EN 29735, UN/Edifact TDED ISO 7372 - EN 27372. The Untdid (United Nations
trade data interchange directory) includes also the UN/Edifact message design guidelines, Syntax
implementation guidelines, Data elements directory, Code list, Composite data elements directory, Standard
segments directory, UNSMs directory and Uncid.
54
Recording and storage of EDI message
time limits, procedures for tests and trials to establish and monitor the adequacy of the technical
specifications and requirements.
Article 11
Liability
11.1 No party to this Agreement shall be liable for any special, indirect or
consequential damages caused by a failure to perform its obligations of this
Agreement.
11.2 No party to this Agreement shall be liable for any loss or damage suffered by
the other party caused by any delay or failure to perform in accordance with the
provisions of this Agreement, where such delay or failure is caused by an
impediment beyond that party's control and which could not reasonably be expected
to be taken into account at the time of conclusion of the Agreement or the
consequences of which could not be avoided or overcome.
11.3 If a party engages any intermediary to perform such services as the
transmission, logging or processing of an EDI message, that party shall be liable for
damage arising directly from that intermediary's acts, failures or omissions in the
provision of said services.
11.4 If a party requires another party to use the services of an intermediary to
perform the transmission, logging or processing of an EDI message, the party who
required such use shall be liable to the other party for damage arising directly from
that intermediary's acts, failures or omissions in the provision of said services.
Article 12
Dispute resolution
Alternative 196
Arbitration clause
Any dispute arising out of or in connection with this Agreement, including any
question regarding its existence, validity or termination, shall be referred to and finally
resolved by the arbitration of a (or three) person(s) to be agreed by the parties, or
failing agreement, to be nominated by ....................,97 in accordance with and subject
to the rules or procedure of
96 A choice is to be made by the parties between Alternative 1 "Arbitration clause" or Alternative 2 "Jurisdiction clause".
97 An "appointing authority" has to be completed by the parties.
55
....................98.
Alternative 2
Jurisdiction clause
Any dispute arising out of or in connection with this contract shall be referred to the
courts of ...................., 99which shall have sole jurisdiction.
Article 13
Applicable law
Without prejudice to any mandatory national law which may apply to the parties
regarding recording and storage of EDI messages or confidentiality and protection of
personal data, the Agreement is governed by the law of.......................
Article 14
Effect, modifications, term and severability
14.1 Effect
The Agreement shall be effective from the date on which it is signed by the parties.
14.2 Modifications
Where required, additional or alternative provisions to the Agreement, agreed in
writing by the parties, will be considered as part of the Agreement as from their
signature.
14.3 Term
Any party may terminate the Agreement by giving not less than one month's notice
either by registered post or by any other means agreed between the parties.
Termination of the Agreement shall only affect transactions after that date.
Notwithstanding termination for any
reason, the rights and obligations of the parties referred to in Articles 4, 6, 7 and 8
shall survive termination.
14.4 Severability
Should any Article or part of an Article of the Agreement be deemed invalid, all other
Articles shall remain in full force and effect.
98 A "choice of procedure of commercial arbitration has to be completed by the parties.
99 A "country" has to be completed by the parties.
56
57
Download