12.07.2015 Views

Electronic Project Administration in the Construction Industry ...

Electronic Project Administration in the Construction Industry ...

Electronic Project Administration in the Construction Industry ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Electronic</strong> <strong>Project</strong> <strong>Adm<strong>in</strong>istration</strong> <strong>in</strong> <strong>the</strong> <strong>Construction</strong><strong>Industry</strong>AuthorsProfessor Sharon Christensen LL.B.(Hons)(QIT) LL.M.(QUT), Ms JudithMcNamara LL.B (Hons)(Qld) LLM(QUT), Ms Kathryn O’Shea LL.B.(Hons)(QUT).AbstractPurpose – The purpose of this research project is to identify <strong>the</strong> legal and securityissues, risks and barriers to <strong>the</strong> uptake of communication and documentmanagement technologies by <strong>the</strong> construction <strong>in</strong>dustry. Previous research suggeststhat <strong>the</strong> construction <strong>in</strong>dustry, especially <strong>in</strong> Australia, has been reluctant to adopttechnology on a broad scale due to a range of legal uncerta<strong>in</strong>ties. The purpose ofthis paper is to expla<strong>in</strong> <strong>the</strong> relevant legal issues and risks and to suggest possiblesolutions for legally compliant electronic project adm<strong>in</strong>istration <strong>in</strong> <strong>the</strong> construction<strong>in</strong>dustry.Methodology/approach – This paper is based on research undertaken for <strong>the</strong>Australian Cooperative Research Centre (CRC) for <strong>Construction</strong> InnovationResearch <strong>Project</strong> 2005-025-A <strong>Electronic</strong> Contract <strong>Adm<strong>in</strong>istration</strong> – Legal andSecurity Issues. The outcomes from <strong>the</strong> research to date <strong>in</strong>clude a literature reviewand several case studies. The research project will ultimately produce a set ofrecommendations for secure and legally compliant electronic project adm<strong>in</strong>istration.F<strong>in</strong>d<strong>in</strong>gs - It is apparent that if <strong>the</strong> uncerta<strong>in</strong>ties associated with electronic projectadm<strong>in</strong>istration rema<strong>in</strong> unresolved, <strong>the</strong>n <strong>the</strong> practical consequences for parties us<strong>in</strong>gelectronic project adm<strong>in</strong>istration tools may be serious. On a more general level, <strong>the</strong>se1 of 24


This paper reviews <strong>the</strong> exist<strong>in</strong>g literature on electronic project adm<strong>in</strong>istration <strong>in</strong> <strong>the</strong>construction <strong>in</strong>dustry <strong>in</strong> order to identify <strong>the</strong> legal and security issues that arise.A range of legal and security issues have been identified <strong>in</strong> connection with <strong>the</strong>adm<strong>in</strong>istration of construction projects with<strong>in</strong> an electronic environment. The keyissues that emerge from <strong>the</strong> literature are:• whe<strong>the</strong>r electronic communications can have <strong>the</strong> effect of vary<strong>in</strong>g <strong>the</strong> contractbetween <strong>the</strong> parties;• whe<strong>the</strong>r notices under a construction contract can be given electronically;• whe<strong>the</strong>r electronic communications meet evidentiary requirements so that<strong>the</strong>y will be admissible <strong>in</strong> court <strong>in</strong> <strong>the</strong> event of a dispute between <strong>the</strong> parties;and• whe<strong>the</strong>r electronic communications and records can be managed <strong>in</strong> a waythat not only satisfies legal document retention and archiv<strong>in</strong>g requirements,but also <strong>in</strong> a manner that facilitates <strong>the</strong> efficient discovery of documents <strong>in</strong> <strong>the</strong>event of litigation.Increas<strong>in</strong>gly, onl<strong>in</strong>e collaboration platforms are be<strong>in</strong>g adopted <strong>in</strong> <strong>the</strong> construction<strong>in</strong>dustry as a means of adm<strong>in</strong>ister<strong>in</strong>g construction projects. Accord<strong>in</strong>gly, this paperspecifically targets <strong>the</strong> issues that arise from electronic project adm<strong>in</strong>istration <strong>in</strong> <strong>the</strong>context of onl<strong>in</strong>e collaboration platforms.Can electronic communications have <strong>the</strong> effect ofvary<strong>in</strong>g <strong>the</strong> contract between <strong>the</strong> parties?Usually a construction contract will require any variations to <strong>the</strong> contract to be <strong>in</strong>writ<strong>in</strong>g and may require <strong>the</strong> writ<strong>in</strong>g to be signed. The question that arises is whe<strong>the</strong>r3 of 24


Very little judicial consideration of this issue has occurred, ma<strong>in</strong>ly due to <strong>the</strong> fact thatelectronic communications produced as evidence have been produced <strong>in</strong> pr<strong>in</strong>tedform. However, dicta <strong>in</strong> judicial decisions such as <strong>the</strong> United States case of BazakInternational Corp v Tarrant Apparel Group, 2005 US Dist. LEXIS 14674 (S.D.N.Y2005) po<strong>in</strong>t to <strong>the</strong> likelihood that courts will accept that emails and o<strong>the</strong>r forms ofelectronic communications are writ<strong>in</strong>g, because <strong>the</strong>y are ei<strong>the</strong>r represented <strong>in</strong> avisual form or are reta<strong>in</strong>ed <strong>in</strong> a tangible form capable of be<strong>in</strong>g read (at pp383-384).Given <strong>the</strong> uncerta<strong>in</strong>ty on <strong>the</strong>se issues, it will be vital for contract<strong>in</strong>g parties toexpressly address <strong>the</strong> legal status of electronic communications <strong>in</strong> <strong>the</strong>ir contractdocuments. However, as discussed fur<strong>the</strong>r below, careful consideration must begiven to any such provisions as <strong>the</strong>re may be particular types of communicationsunder <strong>the</strong> contract, <strong>in</strong>clud<strong>in</strong>g but not limited to contractual variations, which <strong>the</strong>parties may still prefer to take place <strong>in</strong> paper form (Briggs & Brumpton 2001, p30).Can notices under a construction contract be givenelectronically?<strong>Construction</strong> contracts typically conta<strong>in</strong> obligations on parties to communicate withone ano<strong>the</strong>r by way of formal notices given under <strong>the</strong> contract (Hassan, Shelbourn &Carter 2004, p2). Where <strong>the</strong> contract requires notices to be given <strong>in</strong> writ<strong>in</strong>g andsigned <strong>the</strong> same considerations as discussed above <strong>in</strong> relation to contractualvariations will apply.It has been suggested that if <strong>the</strong> parties specifically allow for electronic notices <strong>in</strong><strong>the</strong>ir contract, <strong>the</strong>n it is likely that <strong>the</strong> courts will <strong>in</strong>terpret this strictly and hold <strong>the</strong>parties to <strong>the</strong>ir <strong>in</strong>tention (Mallesons 2003). For example, <strong>in</strong> <strong>the</strong> Canadian decision <strong>in</strong>Kanitz v Rogers Cable Inc (2002) 21 BLR (3d) 104, a court held that <strong>the</strong> pla<strong>in</strong>tiffswere obliged to cont<strong>in</strong>ually <strong>in</strong>spect <strong>the</strong> defendant’s website for updates to a user5 of 24


whe<strong>the</strong>r or not <strong>the</strong> electronic record will be considered to be hearsay and whe<strong>the</strong>r <strong>the</strong>electronic record produced <strong>in</strong> court will be considered to be au<strong>the</strong>ntic. The hearsayrule applies when <strong>the</strong> electronic record conta<strong>in</strong>s a statement made by a person and<strong>the</strong> record is sought to be admitted as proof of <strong>the</strong> truth of <strong>the</strong> statement. Au<strong>the</strong>nticitymeans that <strong>the</strong> document is what it purports to be.In civil jurisdictions <strong>the</strong> hearsay rule does not apply. As a result, any electronic recordor communication will be admissible <strong>in</strong> court (Hassan, Shelbourne & Carter 2004,p2). The key issue <strong>in</strong> civil jurisdictions will be establish<strong>in</strong>g <strong>the</strong> au<strong>the</strong>nticity of <strong>the</strong>electronic record.Hearsay ruleThe hearsay rule will apply where <strong>the</strong> electronic record conta<strong>in</strong>s a statement madeby a person. In that case <strong>the</strong> record will not be admissible unless it comes with<strong>in</strong> oneof <strong>the</strong> exceptions to <strong>the</strong> hearsay rule. Accord<strong>in</strong>gly <strong>the</strong> hearsay rule may impact on <strong>the</strong>admissibility of emails and project records which are used significantly <strong>in</strong> <strong>the</strong>construction <strong>in</strong>dustry and will be relied upon extensively <strong>in</strong> construction litigation(Cassimassima & Caplicki 2003, p16). Email and project records are likely to beadmissible as bus<strong>in</strong>ess records which are usually exempt from <strong>the</strong> hearsay rule.Where documents are used <strong>in</strong> evidence to prove <strong>the</strong> terms of a contract, or that anotice has been given under a contract, <strong>the</strong> hearsay rule does not apply. Accord<strong>in</strong>gly,such documents will be admissible even <strong>in</strong> common law jurisdictions.Au<strong>the</strong>nticityAu<strong>the</strong>nticity may impact on whe<strong>the</strong>r or not an electronic record is admissible, or if it isadmissible, <strong>the</strong> weight that should be attached to it. While an electronic record maybe admissible as evidence, it may be given less weight by <strong>the</strong> court than its nonelectronicequivalent. The court may not necessarily believe or act on <strong>the</strong> evidence7 of 24


accord<strong>in</strong>gly, <strong>the</strong>re is no guarantee that <strong>the</strong> recorded date of a document’screation or communication is accurate (DPWS 2000, p44).Document retention and archiv<strong>in</strong>g requirementsObligations to reta<strong>in</strong> and archive electronic records are found <strong>in</strong> various legislativerequirements. In addition, <strong>in</strong> most cases organisations should keep electronic recordsfor <strong>the</strong> limitation period (usually at least 6 years <strong>in</strong> <strong>the</strong> case of contract claims <strong>in</strong>Australia and <strong>the</strong> United K<strong>in</strong>gdom) to defend or br<strong>in</strong>g proceed<strong>in</strong>gs <strong>in</strong> relation tobreach of contract or possible tort claims aris<strong>in</strong>g from <strong>the</strong> construction project. Theliterature reveals that <strong>the</strong> key technological issues regard<strong>in</strong>g <strong>the</strong> retention ofelectronic records are:Durability of storage media. A potential problem <strong>in</strong> stor<strong>in</strong>g records electronically isthat <strong>the</strong> storage medium may break down over time. The most common medium forarchiv<strong>in</strong>g electronic records is <strong>the</strong> CD ROM format which is considered moreresistant to degradation than magnetic tapes and disks (NOIE 2002, p52).Environmental factors such as light, humidity and magnetic fields may also affect <strong>the</strong>durability of <strong>the</strong> storage medium (NOIE 2002, p52).Readability of records. As technology changes it may be impossible to accessdocuments stored on an outdated storage device. For example, back up storagetapes previously used larger spool<strong>in</strong>g devices and older tape backups are notreadable without specialised equipment (White, 2001, p46). Accord<strong>in</strong>gly, goodma<strong>in</strong>tenance procedures are required to ensure that both <strong>the</strong> hardware and softwareby which electronic records are stored do not become superseded.Generally, parties will not have satisfied <strong>the</strong>ir obligation to preserve records if <strong>the</strong>mechanism on which it is stored has broken down or if <strong>the</strong> record is saved <strong>in</strong> a formatthat is no longer able to be read by contemporary computer systems.9 of 24


DiscoveryObligation to make discovery of electronic recordsDiscovery is a process that occurs <strong>in</strong> common law jurisdictions after commencementof a claim and prior to <strong>the</strong> trial. The aim of discovery is to provide parties to litigationwith access, prior to trial, to all relevant documentary evidence <strong>in</strong> each o<strong>the</strong>r’spossession (White 2001, p47). Each party produces a list of documents <strong>in</strong> itspossession verified by affidavit and must produce <strong>the</strong> documents for <strong>the</strong> o<strong>the</strong>r party’s<strong>in</strong>spection unless <strong>the</strong>y can claim privilege (White 2001, p47). <strong>Construction</strong> projectsgenerate large numbers of project records that are relevant to litigation and whichmust be produced for discovery.Retrievability and identifiabilityThe discovery process <strong>in</strong> relation to electronic records may be complex andexpensive <strong>in</strong> light of <strong>the</strong> quantity and variety of electronic records that may bediscoverable (White 2001, p46). <strong>Electronic</strong> records may be stored on a variety ofdevices <strong>in</strong>clud<strong>in</strong>g <strong>the</strong> author’s computer hard drive, <strong>the</strong> file server and router and <strong>the</strong>recipient’s hard drive as well as on any back up media, lap tops, home computers,personal digital assistants and removable storage devices such as CD ROMs(Naismith 2003, p188). Some copies of electronic records may be created bycomputers without <strong>the</strong> knowledge of <strong>the</strong> operator and <strong>the</strong>se documents may not berecoverable without significant technical expertise. There is an obligation to discoverall copies of documents, <strong>the</strong>refore, all of <strong>the</strong>se multiple versions of electronic recordswill be discoverable (White 2001, p46). As a result, compliance with electronicdiscovery obligations can be expensive and time consum<strong>in</strong>g. It is <strong>the</strong>refore essentialthat a party’s system for management of electronic records enables documents to beeasily identified and retrieved. It is also advisable that where <strong>the</strong>re is an electronic10 of 24


ecords management system <strong>in</strong> place, employees should be tra<strong>in</strong>ed to use thatsystem ra<strong>the</strong>r than rely<strong>in</strong>g on alternatives such as personal email or file directories.Recovery of deleted documentsIf electronic records have been deleted <strong>in</strong> <strong>the</strong> usual course <strong>the</strong>y may not bediscoverable. However, where deleted documents are retrievable because <strong>the</strong> dataitself has not yet been deleted from <strong>the</strong> computer or is still available on back upstorage media, <strong>the</strong>n those documents are discoverable (Naismith 2003, p188;Givens 2004/2004, p2).If a company rout<strong>in</strong>ely deletes its email back up tapes and <strong>the</strong> tapes are destroyedprior to <strong>the</strong> company becom<strong>in</strong>g aware of potential litigation, <strong>the</strong>n those documentswill be unavailable. If an electronic record is not obta<strong>in</strong>able from back up media <strong>the</strong>n<strong>the</strong> existence of <strong>the</strong> electronic document should be noted <strong>in</strong> <strong>the</strong> list of documents asa record once but no longer <strong>in</strong> <strong>the</strong> company’s possession (Gorry 1997, p62).White (2001, p49) argues that organisations <strong>in</strong> litigation prone <strong>in</strong>dustries should haveestablished procedures to delete electronically stored documents from back upmedia. The purpose of such a policy is to reduce <strong>the</strong> burden of discovery ra<strong>the</strong>r thanto destroy possibly <strong>in</strong>crim<strong>in</strong>at<strong>in</strong>g evidence. As discussed below, organisations shouldbeware of fall<strong>in</strong>g foul of <strong>the</strong>ir obligations to preserve evidence. However it is unlikelythat records destroyed <strong>in</strong> accordance with a valid disposal authority would beconsidered to be destroyed with <strong>the</strong> <strong>in</strong>tention of spoil<strong>in</strong>g a litigant’s case (NationalArchives of Australia 2004).Duty to preserve evidenceIn addition to <strong>the</strong> obligation to make discovery, parties have a duty to preserve<strong>in</strong>formation that <strong>the</strong>y know is relevant to ongo<strong>in</strong>g or potential litigation (Naismith2003, p186). <strong>Electronic</strong> records can be <strong>in</strong>advertently destroyed by normal practices11 of 24


such as rout<strong>in</strong>e ma<strong>in</strong>tenance. As soon as litigation has commenced parties have aduty not to destroy relevant evidence (White 2001, p48). The duty may also extend topreserv<strong>in</strong>g documents even though litigation has not yet commenced.To comply with <strong>the</strong> duty to preserve evidence, parties have a duty to preserve backup media, make mirror images of hard drives and implement o<strong>the</strong>r steps to ensurethat discoverable and relevant documents are preserved (Walters & Wright 2005).Failure to preserve <strong>in</strong>formation relevant to litigation may result <strong>in</strong> prejudicial ordersaga<strong>in</strong>st a party <strong>in</strong> relation to costs or factual matters, or <strong>in</strong> <strong>the</strong> party be<strong>in</strong>g guilty of <strong>the</strong>tort of spoliation of evidence. Spoliation is <strong>the</strong> destruction or significant alteration ofevidence, or <strong>the</strong> failure to preserve property for ano<strong>the</strong>r’s use as evidence, <strong>in</strong>pend<strong>in</strong>g or future litigation (Ballon 1998, p9).An electronic records management system must <strong>in</strong>clude procedures to be followed <strong>in</strong><strong>the</strong> event that litigation is anticipated (Naismith 2003, p187). Such procedures would<strong>in</strong>clude <strong>the</strong> suspension of disposal practices and may also <strong>in</strong>clude sav<strong>in</strong>g a back-upat <strong>the</strong> commencement of litigation.Onl<strong>in</strong>e collaboration platformsThe construction <strong>in</strong>dustry has begun to adopt onl<strong>in</strong>e collaboration platforms as ameans of adm<strong>in</strong>ister<strong>in</strong>g construction contracts. An onl<strong>in</strong>e collaboration platform is anelectronic network l<strong>in</strong>k<strong>in</strong>g different organisations for <strong>the</strong> purpose of exchang<strong>in</strong>g<strong>in</strong>formation electronically. Documents are stored on an electronic database thatconta<strong>in</strong>s all <strong>the</strong> <strong>in</strong>formation relevant to <strong>the</strong> particular project. The database can beaccessed by any project participant at any time and from any place. Differentorganisations or <strong>in</strong>dividuals may have different levels of access to differentdocuments with<strong>in</strong> <strong>the</strong> database (Briggs & Brumpton 2001, p29). The database isgenerally ma<strong>in</strong>ta<strong>in</strong>ed by an external service provider who will have a contractual12 of 24


arrangement with at least one of <strong>the</strong> participants <strong>in</strong> <strong>the</strong> project (Kamara & Pan 2004,p57).The use of onl<strong>in</strong>e collaboration platforms <strong>in</strong> construction projects can result <strong>in</strong>significant benefits to <strong>in</strong>dustry (Tuma and Ward 2000). Hassan, Shelbourne & Carter(2004, p1) argue that <strong>the</strong> “[e]ffective use of collaborative systems is vital <strong>in</strong> <strong>the</strong>construction <strong>in</strong>dustry because of <strong>the</strong> large number of project participants, often be<strong>in</strong>ggeographically dispersed.”The literature reveals a number of issues <strong>in</strong> connection with <strong>the</strong> use of onl<strong>in</strong>ecollaboration platforms <strong>in</strong> <strong>the</strong> construction <strong>in</strong>dustry.Disruptions to serviceDisruptions may occur if <strong>the</strong> service provider is unable to ma<strong>in</strong>ta<strong>in</strong> <strong>the</strong> service due toei<strong>the</strong>r technical difficulties or <strong>the</strong> cessation of <strong>the</strong> service provider’s bus<strong>in</strong>ess Theagreement with <strong>the</strong> service provider should conta<strong>in</strong> provisions regard<strong>in</strong>g times when<strong>the</strong> system may be unavailable to users and <strong>the</strong> notification that is required to begiven to users <strong>in</strong> <strong>the</strong> event of unscheduled down time. The agreement should also beclear as to what will happen if <strong>the</strong> project extranet crashes (Wilk<strong>in</strong>son 2005, p115).<strong>Project</strong> participants should consider whe<strong>the</strong>r <strong>the</strong>ir <strong>in</strong>terruption to bus<strong>in</strong>ess <strong>in</strong>surancepolicy covers <strong>the</strong>m for liability <strong>in</strong> <strong>the</strong> event that <strong>the</strong>y suffer loss as a result of <strong>the</strong>collaboration platform be<strong>in</strong>g unavailable (Bern<strong>in</strong>g & Diveley-Coyne 2000).The agreement between <strong>the</strong> service provider and <strong>the</strong> customer should <strong>in</strong>cludeprovisions that apply <strong>in</strong> <strong>the</strong> event <strong>the</strong> service provider becomes <strong>in</strong>solvent. These may<strong>in</strong>clude a right to transfer <strong>the</strong> contract to an alternative service provider (Wilk<strong>in</strong>son2005, p117).13 of 24


Contractual arrangementsAgreement between <strong>the</strong> service provider and customerThe agreement between <strong>the</strong> service provider and <strong>the</strong> customer should conta<strong>in</strong>provisions <strong>in</strong>clud<strong>in</strong>g (Wilk<strong>in</strong>son 2005, p111):• The grant of a licence to <strong>the</strong> customer to access and use <strong>the</strong> collaborationservice <strong>in</strong> relation to <strong>the</strong> project.• The parameters govern<strong>in</strong>g <strong>the</strong> use of project data by <strong>the</strong> service provider and<strong>the</strong> project participants.• The terms of <strong>the</strong> end-user licence agreements that will be entered <strong>in</strong>tobetween <strong>the</strong> service provider and <strong>the</strong> o<strong>the</strong>r project participants.• Ownership of copyright <strong>in</strong> <strong>the</strong> collaboration platform technology.• The service provider’s use of <strong>the</strong> customer’s brand<strong>in</strong>g and data.• Indemnification of <strong>the</strong> service provider aga<strong>in</strong>st unauthorised use of <strong>the</strong>collaboration platform.• Confidentiality, <strong>in</strong>clud<strong>in</strong>g <strong>the</strong> security of user names and passwords.• The term<strong>in</strong>ation of <strong>the</strong> project <strong>in</strong>clud<strong>in</strong>g storage of data when <strong>the</strong> project iscomplete.• Any limitations upon <strong>the</strong> service provider’s liabilities.• The levels of service to be provided by <strong>the</strong> service provider <strong>in</strong>clud<strong>in</strong>gspecifications as to security, backup systems, <strong>in</strong>tegrity of data, audit trails,access controls, technical specifications, system availability, softwareupgrades, customer support and end-user tra<strong>in</strong><strong>in</strong>g.End user licence agreementIdeally, <strong>the</strong> agreements entered <strong>in</strong>to between <strong>the</strong> service provider and <strong>the</strong> variousproject participants should be identical and <strong>the</strong>re is a strong argument that such an14 of 24


agreement should be annexed to contracts appo<strong>in</strong>t<strong>in</strong>g any consultants who will use<strong>the</strong> collaboration platform (Wilk<strong>in</strong>son 2005, p111). The end user licence agreementsshould <strong>in</strong>clude provisions similar to those conta<strong>in</strong>ed <strong>in</strong> <strong>the</strong> agreement between <strong>the</strong>service provider and <strong>the</strong> customer (Wilk<strong>in</strong>son 2005, p116).Agreement between project participantsThe contract between <strong>the</strong> head contractor and any sub-contractors who will use <strong>the</strong>collaboration platform should also conta<strong>in</strong> specific provisions to take <strong>in</strong>to account <strong>the</strong>electronic management of <strong>the</strong> construction project.Where a shared database is used for <strong>the</strong> storage of documents such as plans, <strong>the</strong>rewill be a greater possibility for <strong>the</strong>re to be <strong>in</strong>tellectual property <strong>in</strong>fr<strong>in</strong>gements. As aconsequence, <strong>the</strong> contract should deal with issues of design copyright, databaseownership, confidentiality and commercial advantage (Briggs and Brumpton 2001,pp30-1).The contract should also <strong>in</strong>clude a provision that electronic records that comply withspecified archiv<strong>in</strong>g and au<strong>the</strong>ntication procedures are deemed to be admissible asevidence and prima facie accurate (Reed 2001, p91).<strong>Project</strong> protocolsThe service provider should establish a project protocol document sett<strong>in</strong>g out <strong>the</strong>rules of operation for project participants work<strong>in</strong>g on <strong>the</strong> collaboration platform(Wilk<strong>in</strong>son 2005, pp114-15). The project protocol document sets out commonprotocols describ<strong>in</strong>g how users publish retrieve and manage <strong>in</strong>formation.The ownership of documents and <strong>in</strong>tellectual propertyArchitects and designers may be concerned that <strong>the</strong>ir <strong>in</strong>tellectual property rights <strong>in</strong>draw<strong>in</strong>gs are more likely to be <strong>in</strong>fr<strong>in</strong>ged where <strong>the</strong>y are submitted <strong>in</strong> <strong>the</strong>ir orig<strong>in</strong>al15 of 24


electronic format and stored on <strong>the</strong> collaboration platform. Practical means ofprotect<strong>in</strong>g copyright <strong>in</strong> draw<strong>in</strong>gs are to (Wilk<strong>in</strong>son 2005, p121):• Include a disclaimer and statement of permitted use of all draw<strong>in</strong>gs;• Include <strong>the</strong> architect’s name and logo and copyright statement on alldraw<strong>in</strong>gs; and• Watermark <strong>the</strong> draw<strong>in</strong>gs with <strong>the</strong> architect’s name or logo.Contracts should also <strong>in</strong>clude explicit confidentiality and copyright licens<strong>in</strong>gprovisions. Contracts with designers usually provide that <strong>the</strong> designer reta<strong>in</strong>scopyright <strong>in</strong> <strong>the</strong> design and grants a licence to <strong>the</strong> client and o<strong>the</strong>r projectparticipants to use <strong>the</strong> design <strong>in</strong> relation to <strong>the</strong> project (Wilk<strong>in</strong>son 2005, p121). Evenif <strong>the</strong> contract does not conta<strong>in</strong> such a licence, <strong>the</strong>re would be an implied licence touse <strong>the</strong> plans for <strong>the</strong> purposes of <strong>the</strong> project (Gruzman Pty Ltd v Percy Marks Pty Ltd(1989) 16 IPR 87). The use of a collaboration platform would not normally change <strong>the</strong>legal position with regard to <strong>the</strong> ownership of designs. Wilk<strong>in</strong>son (2005, p121) notes,however, that it is possible that if designs are amended extensively by onl<strong>in</strong>ecollaboration it may be that <strong>the</strong> authorship of <strong>the</strong> design can no longer be said to restwith <strong>the</strong> orig<strong>in</strong>al designer. Contracts should <strong>in</strong>clude provisions to deal with thispossibility.Archiv<strong>in</strong>gUpon completion of <strong>the</strong> construction project <strong>the</strong> database may cont<strong>in</strong>ue as an onl<strong>in</strong>efacility which cont<strong>in</strong>ues to be able to be updated. In this case <strong>the</strong> software would alsocont<strong>in</strong>ue to be updated so that <strong>the</strong> customer need not be concerned with <strong>the</strong>cont<strong>in</strong>ued readability and availability of <strong>the</strong> data (Wilk<strong>in</strong>son 2005, p122).Alternatively, <strong>the</strong> data can be stored <strong>in</strong> an off-l<strong>in</strong>e archive. In this case it may also bepossible to produce a copy of <strong>the</strong> project for project participants on CD ROM or DVD(Wilk<strong>in</strong>son 2005, p122). The parties should agree contractually before <strong>the</strong> project16 of 24


SecurityOne of <strong>the</strong> most serious concerns that <strong>the</strong> construction <strong>in</strong>dustry has <strong>in</strong> relation to <strong>the</strong>use of collaboration platforms is <strong>the</strong> security of confidential <strong>in</strong>formation that is madeavailable via <strong>the</strong> platform (Bern<strong>in</strong>g & Diveley-Coyne 2000). To alleviate concernsabout <strong>the</strong> security of data, web collaboration platforms should be designed so thatparties have limited access to data, depend<strong>in</strong>g on <strong>the</strong>ir role with<strong>in</strong> <strong>the</strong> project(Bern<strong>in</strong>g and Diveley-Coyne 2000).The rights to view and alter data should be controlled by an access control systemthat <strong>in</strong>volves <strong>the</strong> identification, au<strong>the</strong>ntication and authorisation of <strong>the</strong> user. The typeof access control system used will depend on <strong>the</strong> level of security required.Alternatively an application may use Extensible Access Control Markup Language(XACML). Where organisations use browser-based access to portals that aggregateresources such as web pages, applications and services, <strong>the</strong> server must determ<strong>in</strong>ewhe<strong>the</strong>r <strong>the</strong> client is authorised to use a particular resource.A fur<strong>the</strong>r issue arises <strong>in</strong> keep<strong>in</strong>g <strong>the</strong> data secure from unauthorised access whe<strong>the</strong>rby a party to <strong>the</strong> project or an outsider. A security policy determ<strong>in</strong>es who will haveaccess to different types of data and whe<strong>the</strong>r or not <strong>the</strong>y have a right to alter <strong>the</strong>data. The method by which <strong>the</strong> security policy is implemented is referred to as asecurity model (Gollmann 1999).It is recommended that <strong>in</strong> <strong>the</strong> context of electronic contract<strong>in</strong>g, one or more securitymodels be used which ensure both <strong>the</strong> <strong>in</strong>tegrity of data and confidentiality betweendifferent projects with which an organisation is <strong>in</strong>volved.Ensur<strong>in</strong>g <strong>the</strong> use of collaboration platformsWhile it is apparent that <strong>the</strong>re are several advantages to <strong>in</strong>dustry <strong>in</strong> <strong>the</strong> use ofcollaboration platforms <strong>in</strong> construction contract adm<strong>in</strong>istration, <strong>the</strong>re is a strong18 of 24


It is apparent that if <strong>the</strong> uncerta<strong>in</strong>ties associated with electronic contract<strong>in</strong>g rema<strong>in</strong>unresolved, <strong>the</strong>n <strong>the</strong> practical consequences for contract<strong>in</strong>g parties may be serious.On a more general level, <strong>the</strong>se uncerta<strong>in</strong>ties will contribute to a reduced will<strong>in</strong>gnessby bus<strong>in</strong>ess to take advantage of modern communication technologies. As succ<strong>in</strong>ctlystated by Boss and Kaufman W<strong>in</strong>n (1997, p1470):The <strong>in</strong>creased costs of deal<strong>in</strong>g with <strong>the</strong>se new legal uncerta<strong>in</strong>ties may offset anyreduction <strong>in</strong> costs achieved through <strong>the</strong> use of new technologies and, as a result, mayslow needlessly <strong>the</strong> rate at which bus<strong>in</strong>esses are will<strong>in</strong>g to implement newtechnologies.20 of 24


Department of Public Works and Services New South Wales (2000), RiskManagement <strong>in</strong> <strong>Electronic</strong> Procurement, available athttp://www.cpsc.nsw.gov.au/e-procurement/docs/Risk-Chapter2.pdf, accessed7 December 2005.Edwards, L. & Waelde, C., (eds), (1997), Law and <strong>the</strong> Internet: Regulat<strong>in</strong>gCyberspace, Hart Publish<strong>in</strong>g, OxfordGivens, J.S. (2003/2004), “The Admissibility of <strong>Electronic</strong> Evidence At Trial:Courtroom Admissibility Standards”, Cumberland Law Review, Vol.34, No1, p.95.Gollmann, D. (1999), Computer Security, John Wiley & Sons, New York.Gorry, S. (1997), “<strong>Electronic</strong> Records and <strong>the</strong> Evidence Act”, Australian CompanySecretary, Vol.49, No.2, p. 60.Hassan, T.M., Shelbourn, M.A., and Carter, C.D. (2004), “Legal and ContractualFramework for <strong>the</strong> Virtual Organisation" <strong>in</strong> "Virtual Organisations, Systems andPractices”, Spr<strong>in</strong>ger Science, available at http://e-pub.uniweimar.de/volltexte/2004/206/pdf/icccbe-x_257.pdf,accessed 8 December2006.Kamara, J. & Pan, D.Y.H. (2004), “Virtual Collaborative Design”, <strong>Construction</strong>Information Quarterly, Vol 6, No 2, p. 170.Laryea, E. T. (1999), “The Evidential Status of <strong>Electronic</strong> Data”, National LawReview, Issue 3, p. 6.Mallesons (2003), “Email and Contractual Notices”, available athttp://www.mallesons.com/searchhithighlight.cfm?hitURL=/publications/Asian_<strong>Project</strong>s_and_<strong>Construction</strong>_Update/6497970W.htm&keyword=electronic%20transactions%20act, accessed 4May 2006.22 of 24


Naismith, P.G. (2003), “The Discovery of <strong>Electronic</strong> Evidence”, Journal of Judicial<strong>Adm<strong>in</strong>istration</strong>, Vol.12, No.4, p. 180.National Archives of Australia (2004), Digital Recordkeep<strong>in</strong>g – Guidel<strong>in</strong>es forCreat<strong>in</strong>g, Manag<strong>in</strong>g and Preserv<strong>in</strong>g Digital Records (Exposure Draft May2004), available athttp://www.naa.gov.au/recordkeep<strong>in</strong>g/er/guidel<strong>in</strong>es/DigitalRecordkeep<strong>in</strong>g.pdf,accessed 19 December 2005.National Office for <strong>the</strong> Information Economy (2002), National <strong>Electronic</strong>Au<strong>the</strong>ntication Council Report on Liability and O<strong>the</strong>r Legal Issues <strong>in</strong> <strong>the</strong> Use ofPKI Digital Certificates.Reed, C. (2001), “Legally B<strong>in</strong>d<strong>in</strong>g <strong>Electronic</strong> Documents: Digital Signatures andAu<strong>the</strong>ntication”, The International Lawyer, Vol.35, No.1, p. 89.Thompson, S. (2004), “E-commerce, E-Security and Contract<strong>in</strong>g”, AustralianBus<strong>in</strong>ess Law Review, Vol.32, No.2, p.132.Tuma. S.E. & Ward, C.R. (2000), “Contract<strong>in</strong>g Over <strong>the</strong> Internet <strong>in</strong> Texas”, BaylorLaw Review, Vol.52, No.2, p. 381.Walters, M.D. & Wright, N. (2005), “<strong>Electronic</strong> Evidence Update: How to Help ClientsMeet Their Duty to Preserve Evidence <strong>in</strong> <strong>the</strong> Computer Age”, Wash<strong>in</strong>gton StateBar News, Vol.59, No.7, p. 16.White, S. (2001), “Discovery of <strong>Electronic</strong> Documents”, Computers & Law, Vol.44, p.46.Wilk<strong>in</strong>son, P. (2005), <strong>Construction</strong> Collaboration Technologies: The ExtranetRevolution, Taylor & Francis, London; New York.23 of 24


Williams, N. (2005), Outsourc<strong>in</strong>g Considerations for <strong>Electronic</strong> Records Archiv<strong>in</strong>g,available at http://www.ecom<strong>in</strong>fo.net/arts/777_legato_outsourc<strong>in</strong>g.htm,accessed 6 December 2005.24 of 24

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!