Beruflich Dokumente
Kultur Dokumente
The term “contract “is defined in sec 2(h) of the Indian contract act ,1872 as AN AGREEMENT
ENFORCEABLE BY LAW IS A CONTRACT; thus for the formation of a contract there must
be –
1. An agreement, and
2. The agreement should be enforceable by law.
E-Contract is an aid to drafting and negotiating successful contracts for consumer and business e-
commerce and related services. It is designed to assist people in formulating and implementing
commercial contracts policies within e-businesses. It contains model contracts for the sale of
products and supply of digital products and services to both consumers and businesses.
There are two ways through which commercial contracts can be entered electronically.]
A common and popular method is through the exchange of electronic mail ‘e-mail’.
The other method of contracting is using the World Wide Web or ‘website’.
E-mail contract- A contract can be entered into and concluded following the exchange of a
number of e-mails between the parties. Here the e-mails serve the same purpose as normal
letters, had a contract been negotiated through letters written by both parties.
Contract through websites- There are many and varied kinds of E- Contracts but these three
are the elementary one, which we assent to or dissent to, in our everyday life. (16) Contracts
through websites are further into following kinds:
1. Shrink-wrap agreements
Shrink wrap contracts are usually a licensing agreement for software purchases. In the case of
shrink-wrap agreements, the terms and conditions for access to such software products shall be
enforced by the person buying it, with the initiation of the packaging of the software product.
Tightening-up agreements are simply the agreements that are accepted by users, for instance,
Nokia pc-suite, at time of installing the software on a CD-ROM. Sometimes, after loading the
product onto your computer, additional conditions may only be observed and then, if the buyer
disagrees, he has an opportunity to return the software product. The shrink-wrap Agreement
provides protection by exonerating the product manufacturer of any violation of copyright or
intellectual property rights as soon as the purchaser tears the product or the coverage for
accessing the product. However, the validity of shrink-wrap agreements does not exist in India
with a stable judgment or precedent.
Click-wrap contracts are web-based contracts that require the user’s consent or consent through
the “I Accept,” or “OK” button. The user must accept the terms of use of the particular software
with the clickwrap agreements. Users who disagree with the terms and conditions cannot use or
purchase the product after cancellation or refusal. Someone almost regularly observes web-wrap
agreements. The terms of use shall be set down before acceptance by the users. For instance,
online shopping agreement, etc.
3. Browse-wrap agreements
A browsing wrap agreement can be called an agreement which is to be binding on two or more
parties through the use of the website. In case of an agreement on browsing, an ordinary user of a
given Website is to accept the terms and conditions of use and other website policies for
continuous use. We usually witness such kinds of online contracts in our daily lives. Although
this online agreement is becoming common in all of our businesses, there is no precise judicial
precedent regarding its validity and enforceability. Other countries, such as courts in the USA,
have dealt with those online agreements and held that both Shrink-wrap Agreements and Click-
Wrap Agreements are enforceable as far as the general principles of the contract are not violated.
Other types of online agreements include contracts for employment, contractors, contracts for
consultants, sales and resale agreements, distributors, non-disclosure agreements, software
developer and licensing agreements and contracts for source-code escrow.
Employment Contracts
Consultant Agreements
The normal requirements of Indian Contracts Act of 1872 will apply on any consultant
agreement. But particularly in Information Technology industry where the infrastructure to
function is low and connectivity is very high consultancy with experience marketing and
business development and technology development is a very dominant mode of contract.
Non-Disclosure Agreements
As in every other contract, an electronic contract also requires the following necessary
requirements:
In many contacts (whether online or conventional) the offer is not made directly one-on-one. The
consumer ‘browses’ the available goods and services showed on the seller’s website and then
chooses what he would like to purchase. The offer is not made by website showing the items for
sale at a particular price. This is essentially an invitation to offer and hence is revocable at any
time up to the time of acceptance. The offer is made by the customer on introduction the
products in the virtual ‘basket’ or ‘shopping cart’ for payment.
As stated earlier, the acceptance is usually assumed by the business after the offer has been made
by the consumer in relation with the invitation to offer. An offer is revocable at any time until the
acceptance is made.
Processes available for forming electronic contracts include
I. E-mail: Offers and acceptances can be exchanged entirely by e-mail, or can be collective with
paper documents, faxes, telephonic discussions etc.
II. Web Site Forms: The seller can offer goods or services (e.g. air tickets, software etc.) through
his website. The customer places an order by completing and communicating the order form
provided on the website. The goods may be actually delivered later (e.g. in case of clothes, music
CDs etc.) or be directly delivered electronically (e.g. e-tickets, software, mp3 etc.).
III. Online Agreements: Users may need to take an online agreement in order to be able to avail
of the services e.g. clicking on “I accept” while connecting software or clicking on “I agree”
while signing up for an email account.
Jurisdiction is a territory or sphere of activity within which a court or other institution’s legal
authority is extended. In the broader sense, it refers to the country or country whose legislation
applies during the period of interpretation of any contractual terms or in the event of a dispute.
The pace of execution of the contract normally determines this. A traditional contract shall be
concluded when contracting parties meet and execute the contract, usually at a predetermined
place and time, by placing the signatures on the document. This is not the case in e-contracts in
which the parties meet online and can be located at different places. Consequently, a strict
determination of the jurisdiction is lacking in the “place of execution”.
Issue of consent- In a click wrap and shrink-wrap contract, the customers do not have any
opportunity to negotiate the terms and conditions and they simply have to accept the contract
before commencing to purchase. Section 16(3) of the ICA provides that where a person who is in
a position to dominate the will of another, enters into a contract with him, and the transaction
appears, on the face of it or on evidence adduced, to be unconscionable, the burden of proving
that such contract was not induced by undue influence shall lie upon the person in a position to
dominate the will of the other. So, in cases of dispute over e-contracts the entity carrying out the
e-commerce will have the onus to establish that there was no undue influence.
Probability of loss of data- The entity collecting data should have a privacy policy in place,
should always obtain consent from the provider of sensitive information and maintain reasonable
security practices and procedures. Unauthorized access to personal information and any misuse
of such personal information should be checked by the online goods/service providers.
Acts by computer programmes- It is a general principle of contract law that a party can be
bound by the acts of agents endowed with apparent authority to act on its behalf. An agent has
apparent authority if a party acts in such a way so as to make it reasonable for a third person to
believe that the agent is acting on its behalf. In the online world, a computer program may act as
an online agent, and a party will presumably be bound by offers and acceptances performed by a
computer or program acting on a party's behalf.
Interface with payment gateways- The IT Act has laid the foundation for strengthening
cyber security and data protection in India with introduction of section 43A that mandates body
corporate to implement "reasonable security practices" for protecting "sensitive personal
information".
Meeting of the minds of Parties: Consensus-ad-idem- Several issues arise whether a person
would be bound by the terms of a contract without reading it or without being able to negotiate
the terms, as is the case with standard form contracts where the customers are required to just
sign on the dotted lines. But then, the issue which needs to be addressed is that what would be
the terms of the contract and would the acceptance of the contract without even reading it be
classified as deemed acceptance?
Requirement as per The Indian Stamp Act-The Indian Stamp Act and different State
legislation mandate that documents in which rights are established or transferred must be
stamped. A document not properly stamped shall not be permitted as proof in a court of law, or
even a competent authority unless it was imposed (a fine of 10 times the amount of the required
stamping duty).However, documents cannot be stamped for an online contract until this date.
SPECIFIC EXCLUSIONS
In particular, the IT Act 2000 excludes from electronic transactions the following documents:
Negotiable Instruments
Power of Attorney
Trust Deed
Will
Sale Deed or Conveyance deed with respect to the immovable property of any documents
relating to any interest in an immovable property.
With the growing importance and value of e-contract in India and across the world, the different
stakeholders are continuously identifying and evaluating the nuances of legal outline relating to
it. The participation of different service providers in the transaction of e-contract, which includes
a payment gateway, the main website, the bank or card verification website, the security
authorization website and the final service provider which can also comprise the shipping agent
has made the E-contract business more complex. Therefore, the need for amendable it has
augmented. In India, till date there are no definite legislations or guidelines protecting the buyers
and sellers of goods and services over the electronic medium.
However, several laws acting in unification are trying to regulate the business transactions of E-
contract. They are as follows:
Like any other types of business, E-contract business also works on the basis of contracts. It is
therefore, structured by the Indian Contract Act, 1872. Any valid and legal E-contracts can be
designed, completed, and enforced as parties replace paper documents with electronic parallels.
[6] The contracts are move in between the service providers or sellers and buyers.
Earlier, there was no definite law to regulate the intermediaries such as verification service
providers and shipping service providers to safeguard that the product or service is actually
delivered. However, the government has recently acquainted the Information Technology
(Intermediaries Guidelines) Rules 2011.
The actual scope of the security provided under these regulations would only be known after
judicial interpretation of the provisions. However, now it has been explained that even foreign
intermediaries delivered to provide service can be sued in India.
The payment gateways which footing a very important position as the primary processor of the
payment for the merchants were brought into the legal framework after proclamation of the
Payment and settlement Systems Act, 2007 (PSS Act, 2007). The PSS Act, 2007 as well as the
Payment and Settlement System Regulations, 2008 made under the Act came into effect from
August 12, 2008.[9] Further, the Reserve Bank of India, issued additional guidelines initiating all
such gateways and payments processors to register under the said act.
The authority of the transactions of E-contract is established under the Information Technology
Act, 2000 (IT Act, 2000). It explains the reasonable mode of acceptance of the offer. IT Act,
2000 also rules the revocation of offer and acceptance.[10] However, definite provisions that
regulate E-contract transactions conducted over the internet, mobile phones, etc. are vague. With
numerous cross border transactions also being conducted over the internet, specific law guarding
the Indian customers and Indian businesses are essential and Indian laws are gravely insufficient
on this issue.
(b) by a person who had the authority to act on behalf of the originator in respect of that
electronic record; or
(1) Where the originator has not agreed with the addressee that the acknowledgment of receipt of
electronic record be given in a particular form or by a particular method, an acknowledgment
may be given by—
(b) any conduct of the addressee, sufficient to indicate to the originator that the electronic
record has been received.
(2) Where the originator has stipulated that the electronic record shall be binding only on receipt
of an acknowledgment of such electronic record by him, then unless acknowledgment has been
so received, the electronic record shall be deemed to have been never sent by the originator.
(3) Where the originator has not stipulated that the electronic record shall be binding only on
receipt of such acknowledgment, and the acknowledgment has not been received by the
originator within the time specified or agreed or, if no time has been specified or agreed to within
a reasonable time, then the originator may give notice to the addressee stating that no
acknowledgment has been received by him and specifying a reasonable time by which the
acknowledgment must be received by him and if no acknowledgment is received within the
aforesaid time limit he may after giving notice to the addressee, treat the electronic record as
though it has never been sent.
Section (13) Time and place of dispatch and receipt of electronic record.-
(1) Save as otherwise agreed to between the originator and the addressee, the dispatch of an
electronic record occurs when it enters a computer resource outside the control of the originator.
(2) Save as otherwise agreed between the originator and the addressee, the time of receipt of an
electronic record shall be determined as follows, namely :—
(a) if the addressee has designated a computer resource for the purpose of receiving
electronic records,—
(i) Receipt occurs at the time when the electronic, record enters the designated
Computer resource; or
(ii) If the electronic record is sent to a computer resource of the addressee that is
not the designated computer resource, receipt occurs at the time when the
electronic record is retrieved by the addressee;
(b) If the addressee has not designated a computer resource along with specified timings,
if any, receipt occurs when the electronic record enters the computer resource of the
addressee.
(3) Save as otherwise agreed to between the originator and the addressee, an electronic record is
deemed to be dispatched at the place where the originator has his place of business, and is
deemed to be received at the place where the addressee has his place of business.
(4) The provisions of sub-section (2) shall apply notwithstanding that the place where the
computer resource is located may be different from the place where the electronic record is
deemed to have been received under sub-section (3).
(a) If the originator or the addressee has more than one place of business, the principal
place of business, shall be the place of business;
(b) If the originator or the addressee does not have a place of business, his usual place of
residence shall be deemed to be the place of business;
(c) “usual place of residence”, in relation to a body corporate, means the place where it is
registered.
UNICITRAL MODEL AND E COMMERCE
The Model Law was adopted in 1996 to facilitate the use of modern e- means of communication
and storage of information, such as electronic data interchange (EDI), electronic mail and
telecopy. Its main objective was to bring uniformity in national laws relating to e-commerce. It
has granted legal recognitions to data message and digital signature. It has encouraged national
legislators to adopt a set of internationally acceptable rules for validity of electronic commerce
by providing equal treatment to paper-based and electronic information. Significantly, such equal
treatment is essential for enabling the use of paperless communication, thus fostering efficiency
in international trade.
It is commendable to note that The MLEC was the first legislative text which adopted the
fundamental principles of non-discrimination, technological neutrality and functional
equivalence. In order to ensure that a document would not be denied legal effect, validity or
enforceability solely on the grounds that it is in electronic form it has laid down the principle of
non-discrimination. The principle of technological neutrality involves the adoption of provisions
that are neutral with respect to technology used. The principle of functional equivalence makes
electronic communications equivalent to paper-based communications.
This Law has been divided into two parts i.e., part I dealing with E-Commerce in General
consisting of 3 Chapters and part II consisting of Chapter 1 only. Significantly, Part I has
provided for the establishment of a functional equivalent for paper-based concepts such as
"writing", "signature" and "original".
First feature of this law is "electronic equivalence". Significantly, the Model Law does
not directly consider electronic communications valid but it provides that information or
documents will not be denied legal effect or enforceability solely because they are in
electronic format. Therefore, it conferred validity on e transaction indirectly.
For achieving electronic equivalence, the model law provides various rules specifying
conditions which must be fulfilled for an electronic communication to constitute a legally
valid substitute for a conventional and paper-based communication. It provides that a
legal requirement to provide information or a document sent "in writing" is satisfied by
its electronic equivalent if it is in a form that can be subsequently accessed and used by
the recipient.
Further, under the law electronic documents are treated as "original" documents if there is
a reliable assurance as to the integrity of the information and that the information is
capable of being displayed to the person to whom it is to be presented. Further, the
information must be complete and remain unaltered, apart from the addition of any
endorsement and any change that arises in the normal course of communication, storage
and display. However, the question of reliability is to be determined in the light of all the
circumstances, including the purpose for which the document was created.
It confers the validity on e-evidence as it provides that evidentiary rules do not deny the
admissibility of an electronic communication solely on the grounds that it is in electronic
form.
Significantly, the law lays down the conditions for data retention. It provides that the
message must be retained in the format in which it was generated and any information
indicating origin, destination, date and time of the message is retained. Another important
condition for retention is that the information contained with the electronic message must
be accessible so as to be usable for subsequent reference.
This Model Law was approved by the UNCITRAL and came into force in 2001. It’s main
objective was to grant legal recognition to e-signature and to bring uniformity in national
laws relating to e-signature. It consists of two Parts i.e., Part I consisting of 12 articles
and Part II, Guide for enactment of the MLES.
Model Law applies where electronic signatures are used in the commercial activities.
However, it does not override any rule of law intended for the protection of consumers.
Important features of this Model Law are:
Significantly, the Model Law grants legal recognition to E-Signature as it provides that
where the law requires a signature of a person, then that requirement is met in relation to
a data message if an electronic signature is used provided that the signature is as reliable
as was appropriate for the purpose for which the data message was generated or
communicated. The reliability is determined in the light of all the circumstances,
including any relevant agreement.
It defines electronic signature as "data in electronic form in, affixed to, or logically
associated with, a data message, which may be used to identify the signatory in relation
to the data message and indicate the signatory's approval of the information contained in
the data message." Significantly, two parties involved in data message are: Signatory i.e.
a person that holds signature creation data and acts either on its own behalf or on behalf
of the person it represents and relying party who may act on the basis of certificate or an
electronic signature.
Further, an electronic signature is reliable provided it meets following four conditions:
the signature creation data are linked solely to the signatory; the signature creation data
was under the sole control of the signatory; any alteration of the electronic signature,
made after signing, is detectable; and where the purpose of the signature is to provide
assurance as to the integrity of the underlying information, any alteration of that
information must be detectable.
It imposes duty on the signatories to use reasonable care to avoid unauthorized use of
their electronic signature. Therefore, where they become aware that the security of their
electronic signature has been compromised, they must notify any person that might be
affected without delay
Intellectual property rights are the legal rights that cover the privileges given to
individuals who are the owners and inventors of a work, and have created something
with their intellectual creativity. Individuals related to areas such as literature, music,
invention, etc., can be granted such rights, which can then be used in the business
practices by them.
The creator/inventor gets exclusive rights against any misuse or use of work without
his/her prior information. However, the rights are granted for a limited period of time to
maintain equilibrium.
The following list of activities which are covered by the intellectual property rights are
laid down by the World Intellectual Property Organization (WIPO) −
Industrial designs
Scientific discoveries
Protection against unfair competition
Literary, artistic, and scientific works
Inventions in all fields of human endeavor
Performances of performing artists, phonograms, and broadcasts
Trademarks, service marks, commercial names, and designations
All other rights resulting from intellectual activity in the industrial, scientific,
literary, or artistic fields
Intellectual Property Rights can be further classified into the following categories −
Copyright
Patent
Patent
Trade Secrets, etc.
To protect the intellectual property rights in the Indian territory, India has defined the formation
of constitutional, administrative and jurisdictive outline whether they imply the copyright,
patent, trademark, industrial designs, or any other parts of the intellectual property rights.
Back in the year 1999, the government passed an important legislation based on international
practices to safeguard the intellectual property rights. Let us have a glimpse of the same −
The Patents (Amendment) Act, 1999, facilitates the establishment of the mail box
system for filing patents. It offers exclusive marketing rights for a time period of five
years.
The Trade Marks Bill, 1999, replaced the Trade and Merchandise Marks Act, 1958
The Copyright (Amendment) Act, 1999, was signed by the President of India.
The sui generis legislation was approved and named as the Geographical Indications of
Goods (Registration and Protection) Bill, 1999.
The Industrial Designs Bill, 1999, replaced the Designs Act, 1911.
The Patents (Second Amendment) Bill, 1999, for further amending the Patents Act of
1970 in compliance with the TRIPS.
Every new invention in the field of technology experiences a variety of threats. Internet is one
such threat, which has captured the physical marketplace and have converted it into a virtual
marketplace.
To safeguard the business interest, it is vital to create an effective property management and
protection mechanism keeping in mind the considerable amount of business and commerce
taking place in the Cyber Space.
Today it is critical for every business to develop an effective and collaborative IP management
mechanism and protection strategy. The ever-looming threats in the cybernetic world can thus
be monitored and confined.
Various approaches and legislations have been designed by the law-makers to up the ante in
delivering a secure configuration against such cyber-threats. However it is the duty of the
intellectual property right (IPR) owner to invalidate and reduce such mala fide acts of criminals
by taking proactive measures.
COPYRIGHT LAW UNDER CYBER
1.Cyber squatting
Various types of domain names disputes come for consideration before the courts all over
world. One of the most serious kinds of disputes has been about ‘Cybersquatting’ which
involves the use of a domain name by a person with neither registration nor any inherent rights
to the name. Trademarks and domain names being similar have been exploited by some people
who register trademarks of others as domain names and sell those domain names back to the
trademarks owners or third parties at a high profit. This is known as ‘cybersquatting’ which
means some person sitting on the property of another person. The practice of ‘cybersquatting’ is
abusive whereby one entity registers a domain name that includes the name or the trademarks of
another. This practice shows the importance of the role played by domain names in establishing
online identity.
2.Meta tags
Meta tag is an element of web pages that is also known as Meta elements. Meta tags provide
information about page descriptions, key words and other relevant data. Originally, Meta tags
were used in search engines to define what the page was about when the internet was in the
early stages, Meta tags were used to help the place web pages in the correct categories.
3.Software Piracy
It is also covered under sections of Indian Copyright Act. This is the illegal use of software by
copying and distributing them among organizations, groups etc for business personal use.
INTERNATIONAL PRESPECTIVE
The Convention on Cybercrime, also known as the Budapest Convention on Cybercrime or the
Budapest Convention, is the first international treaty seeking to address Internet and computer
crime (cybercrime)by harmonizing national laws, improving investigative techniques, and
increasing cooperation among nations. It was drawn up by the Council of Europe in Strasbourg,
France, with the active participation of the Council of Europe's observer states Canada, Japan,
Philippines, South Africa and the United States.
The Convention and its Explanatory Report was adopted by the Committee of Ministers of the
Council of Europe at its 109th Session on 8 November 2001. It was opened for signature in
Budapest, on 23 November 2001 and it entered into force on 1 July 2004. As of September 2019,
64 states have ratified the convention, while a further four states had signed the convention but
not ratified it.
Since it entered into force, important countries like Brazil and India have declined to adopt the
Convention on the grounds that they did not participate in its drafting. Russia opposes the
Convention, stating that adoption would violate Russian sovereignty, and has usually refused to
cooperate in law enforcement investigations relating to cybercrime. It is the first multilateral
legally binding instrument to regulate cybercrime. Since 2018, India has been reconsidering its
stand on the Convention after a surge in cybercrime, though concerns about sharing data with
foreign agencies remain.
Objectives
The Convention is the first international treaty on crimes committed via the Internet and other
computer networks, dealing particularly with infringements of copyright, computer-related fraud,
child pornography, hate crimes, and violations of network security.[8] It also contains a series of
powers and procedures such as the search of computer networks and lawful interception.
Its main objective, set out in the preamble, is to pursue a common criminal policy aimed at the
protection of society against cybercrime, especially by adopting appropriate legislation and
fostering international cooperation.
Harmonizing the domestic criminal substantive law elements of offences and connected
provisions in the area of cyber-crime
Providing for domestic criminal procedural law powers necessary for the investigation
and prosecution of such offences as well as other offences committed by means of a
computer system or evidence in relation to which is in electronic form
Setting up a fast and effective regime of international cooperation
The following offences are defined by the Convention: illegal access, illegal interception, data
interference, and system interference, misuse of devices, computer-related forgery, computer-
related fraud, offences related to child pornography, and offences related to copyright and
neighboring rights.
It also sets out such procedural law issues as expedited preservation of stored data, expedited
preservation and partial disclosure of traffic data, production order, search and seizure of
computer data, real-time collection of traffic data, and interception of content data. In addition,
the Convention contains a provision on a specific type of transborder access to stored computer
data which does not require mutual assistance (with consent or where publicly available) and
provides for the setting up of a 24/7 network for ensuring speedy assistance among the Signatory
Parties.
Further, as conditions and safeguards, the Convention requires the provision for adequate
protection of human rights and liberties, including rights arising pursuant to obligations under
European Convention on Human Rights, International Covenant on Civil and Political Rights,
and other applicable international human rights instruments, and shall incorporate the principle
of proportionality.
The Budapest Convention broadly attempts to cover crimes of illegal access, interference and
interception of data and system networks, and the criminal misuse of devices. Additionally,
offences perpetrated by means of computer systems such as computer-related fraud, production,
distribution and transmission of child pornography and copyright offences are addressed by
provisions of the Convention.
The substantive offences under the Convention can broadly be classified into “(1) offences
against the confidentiality, integrity and availability of computer data and systems; (2) computer-
related offences; (3) content-related offences; and (4) criminal copyright infringement.”
The Additional Protocol makes the act of using computer networks to publish xenophobic and
racist propaganda, a punishable offence. However, the full range of cyber crimes are not covered
under the Budapest Convention. These include cybercrimes such as identity theft, sexual
grooming of children and unsolicited spam and emails
PROVISIONS OF THE CONVENTION
The treaty functions on a mutual information sharing and formal assistance model in order to
facilitate better law enforcement and lays down procedure to seek and receive such assistance.
Article 23 of the Convention outlines the general principles under which international
cooperation can be sought, as follows:
The Parties shall co-operate with each other, in accordance with the provisions of this chapter,
and through the application of relevant international instruments on international cooperation in
criminal matters, arrangements agreed on the basis of uniform or reciprocal legislation, and
domestic laws, to the widest extent possible for the purposes of investigations or proceedings
concerning criminal offences related to computer systems and data, or for the collection of
evidence in electronic form of a criminal offence.”
It is clear then that assistance facilitated by the Convention relies on pre-existing cooperative
agreements between the parties. Thus, as also stated in Article 39 of the Convention, the
provisions only serve to supplement multilateral and bilateral treaties already effective between
parties. In addition, mutual legal assistance (MLA) between parties where no such mutual
arrangements exists, can be facilitated through procedures laid down under Article 27.
The Web Content Accessibility Guidelines, often abbreviated to WCAG, are a series of
guidelines for improving web accessibility. Produced by the World Wide Web Consortium
(W3C), the WCAG are the best means of making your website useful to all of your users.
Although they are not an all-inclusive list of issues facing web users with disabilities, they
are internationally recognised and adopted standards. The guidelines explain how to solve many
of the problems that your users with disabilities face.
The W3C’s first incarnation of WCAG in 1999 was a huge leap in web accessibility, bringing
together years of useful work by developers from across the world.
The Web Content Accessibility Guidelines 1.0 had 14 guidelines and divided them into 3 priority
levels:
The current set of guidelines has been in force since 2008, and will run for many years yet. The
guidelines are more technologically neutral than WCAG 1.0, allowing them to stay useful for
longer.
By designing WCAG 2.0 around principles and not technology, the W3C created an ethical
statement as well as useful guidance.
You could say that a good website is a POUR website! (That joke works better on a screen
reader, trust me.)
The beauty of a principled approach like POUR is the emphasis on understanding your users.
Learning all the guidelines isn’t good enough if you don’t know why they exist.
Perceivable
The principle of a website being perceivable is all about the senses people use when browsing
the web. Some of your users may have difficulties with one or more of their senses, making them
reliant on assistive technology to browse your website.
The three main senses that the guidelines can help with are sight, sound and touch. With WCAG
2.0, you can make sure that users can perceive all the information on your website.
Operable
The principle of a website being operable is about the actions people take when browsing. This
covers the different ways in which your users browse the web. Some of them may have motor
difficulties, which means they use their keyboard to navigate and some users who have sight
impairments often prefer to use a keyboard rather than a mouse too.
The main issues for making your website operable are, ensuring good keyboard-only navigation,
avoiding setting time limits for your users and helping them out if they make errors on forms.
Understandable
Making a website understandable is a different kind of task to the first two principles. A
perceivable and operable website means nothing if your users can’t understand it.
Your website must use clear terms, have simple instructions and explain complex issues. You
must also make your website function in a way that your users understand, by avoiding unusual,
unexpected or inconsistent functions.
Robust
A robust website is one that third-party technology (like web browsers and screen readers) can
rely on. Your website must meet recognised standards, such as using clean HTML and CSS. This
minimises the risk of your users relying on technology that cannot correctly process your
website.
The Web Content Accessibility Guidelines 2.0 are organised into three levels of conformance:
For most websites, Level AA plus some Level AAA is the best target. That’s because some of
the highest level guidelines simply can’t be applied to all websites. However, one of the
problems with the three-tier structure is that if people know they can’t attain AAA, they won’t
even look through the guidelines to see where they can improve accessibility. With all of your
projects, you should comply with all the guidelines you can, whether you want Level AAA or
not.
Starting with Level A is a great way to make progress and begin helping out your users. Level
AA is the standard many governments are using as a benchmark as this level targets the most
common and most problematic issues for web users.
Network neutrality, or simply net neutrality, is the principle that Internet service
providers (ISPs) must treat all Internet communications equally, and not discriminate or
charge differently based on user, content, website, platform, application, type of
equipment, source address, destination address, or method of communication.
With net neutrality, ISPs may not intentionally block, slow down, or charge money for
specific online content. Without net neutrality, ISPs may prioritize certain types of traffic,
meter others, or potentially block traffic from specific services, while charging
consumers for various tiers of service.
The term was coined by Columbia University media law professor Tim Wu in 2003, as
an extension of the longstanding concept of a common carrier, which was used to
describe the role of telephone systems.Net neutrality regulations may be referred to as
"common carrier" regulations. Net neutrality does not block all abilities that Internet
service providers have to impact their customers' services. Opt-in/opt-out services exist
on the end user side, and filtering can be done on a local basis, as in the filtration of
sensitive material for minors.
The basic framework of net neutrality in the European Union (EU) is laid down by Article 3 of
EU Regulation 2015/2120. However, the regulation's text has been criticized as offering
loopholes that can undermine the regulation's effectiveness. Some EU member countries, such as
Slovenia and the Netherlands, have stronger net neutrality laws.
Looking back at the timeline of net neutrality in Europe, it has been a journey over several years.
Using the 2009 Regulatory Framework1 as a reference, it consists of a seven years’ history with
ups and downs. This framework had its good intentions, but was over time judged by the
political institutions as insufficient to protect net neutrality.
It has been argued that access regulation in Europe should be sufficient to ensure net neutrality,
since end-users could switch to alternative Internet service providers (ISPs) to achieve neutral
Internet access2. However, an essential characteristic of Internet communication is ignored in
this argument; as an Internet user you are depending on the users in the other end which you
communicate with. Many of those may not switch to a neutral access due to the pricing policy of
their ISPs. Thereby the Internet becomes fragmented, and the network effect is significantly
reduced.
During this period, BEREC on request from the European Commission conducted a traffic
management investigation among European operators. The results from this investigation
showed that on average, every fifth European subscriber to fixed Internet access, and as much as
every third subscriber to mobile Internet access experienced restrictions to the use of their own
Internet access service, such as blocking of VoIP.
Over the last years, different national approached to net neutrality evolved. Norway has the
longest running net neutrality regime in Europe. Based on a co-regulatory approach, not to be
confused with a self-regulatory approach, national net neutrality guidelines were established in
Norway in 2009. These guidelines contained rules against blocking and throttling of applications,
essential to achieve net neutrality.
The Netherlands and Slovenia adopted net neutrality laws in 20115 and 20126, and then several
additional European countries started to consider similar regulatory measures. On the other hand,
other countries used self-regulatory approaches and/or based their approach on transparency
while effectively allowing throttling and blocking of applications over the Internet access7.
On this background, with a significant level of restrictions on Internet access for European
citizens, and an increasing variation in regulation of net neutrality among member states, the
European Commission proposed a new net neutrality regulation in 2013. Following the law-
making process of the European Union, net neutrality rules were finally adopted by the end of
2015.
The European net neutrality rules were published in the Official Journal of EU in November
2015. This Regulation has a solid legal basis, established through the European democratic law-
making process. According to the Regulation, BEREC was given the mandate to develop
Guidelines for regulators’ implementation of the Regulation9. These Guidelines were published
30 August 201610.
In this regard, it is important to note that BEREC’s Guidelines do not create any new rules; they
only providing guidance on the regulatory implementation of existing rules as adopted by the
law-makers. Furthermore, national regulators shall conduct supervision and enforcement of the
Regulation, and also publish reports on an annual basis on their monitoring and findings11.
The European net neutrality Regulation is seeking to safeguard equal and non-discriminatory
treatment of Internet traffic and related end-users’ rights, such as the right to access and
distribute information12. This describes in other words “net neutrality” as the goal. Interestingly,
in the corresponding recital of the Regulation, preservation of the Internet ecosystem as an
engine of innovation is explicitly included among the goals.
The operational parts of the Regulation cover commercial conditions, such as speed and volume,
but also other commercial practices, where many will consider zero-rating to be the typical
example. Furthermore, different technical practices are covered; reasonable traffic management,
exceptional traffic management and specialized services.
Commercial practices
Commercial practices, and zero-rating in particular, have been surrounded by some uncertainty
in the European discourse on net neutrality, and the opinions have been strong on both sides14.
Law-makers have chosen a middle course regarding zero-rating and other commercial practices
in the Regulation, and such practices are neither explicitly allowed nor explicitly prohibited.
Based on the Regulation’s ban on technical blocking and throttling of applications15, BEREC’s
Guidelines recommend to prohibit zero-rating practices where the zero-rated applications receive
preferential treatment after the data cap is reached, e.g. where the zero-rated application is still
accessible, while other applications are blocked16.
For more complex cases, BEREC recommends general assessment criteria which national
regulators can use to assess commercial practices in general, including zero-rating. These criteria
encompass market positions of the providers involved, covering ISPs and CAPs, the scale of the
practice, effects on end-user, including effects on CAPs, and whether the general aims of the
Regulation are circumvented.
Technical practices
When assessing technical practices for Internet communications, the European net neutrality
rules define three different levels of traffic management. The ground level is when Internet
traffic is treated agnostic to applications and endpoints generating the traffic, often referred to as
“best effort”. The two next levels contain reasonable traffic management and exceptional traffic
management. BEREC’s guidelines describe more in detail how regulators should assess such
practices.
Furthermore, when Internet traffic is transmitted together with specialised services over a shared
infrastructure, which often is the case, regulatory assessment of the net neutrality rules also takes
into account overall traffic management practices. Such traffic management is related to how
traffic from specialised services is handled in parallel with traffic from Internet communications.
The main question when specialised services come into the picture will typically be whether
network capacity is sufficient to avoid a detrimental effect on the quality of internet access
services. Regulations may, as in the European case, set out requirements in this regard. The next
question will then be how sufficient capacity is ensured, and in particular how ISPs ensure that
specialised services don’t degrade Internet communications.
The European net neutrality rules provide a solid basis for regulation of net neutrality the next
years. However, due to the novelty of the rules, there will most probably be challenging
questions to resolve. With a view to preserve the value of the Internet for upcoming generations,
it is important to continue the work to maintain the net as an open and non-discriminatory
platform for everyone.
The current high-profile net neutrality question about zero-rating has not achieved a clear answer
under the European net neutrality Regulation. However, a general assessment methodology is
provided, with a possibility for national regulators to intervene if necessary. Over time the
development of the market under this regulatory regime will gather experiences that can be used
to feed into any future legislative processes.
Compatibility with emerging technologies
The European net neutrality Regulation provides a framework which is compatible with the
Internet technology evolution. On the one hand the traffic management measures cover
traditional best effort communications, advanced congestion handling functionality, and potential
class-based QoS architectures. BEREC’s guidelines elaborate regarding assessment of these
mechanisms, based on the general provisions of the Regulation.
On the other hand, the Regulation allows provision of specialised services in parallel with
Internet communications, which facilitates experimenting with different business models. This
may show particularly interesting for mobile access networks, where the upcoming 5G network
architecture emphasises QoS-based services, and at the same time continue today’s use of mobile
access networks to provide Internet access services.
Growing experiences
The conditions for net neutrality in Europe and related regulatory measures should over time be
reconsidered based on how commercial and technical practices develop. In case zero-rating
practices should distort the market and reduce end-users’ control over their own Internet use and
raise entry barriers for CAPs, this may spur clearer rules of such practices.
Tension between Internet-based communication and specialized services may evolve over time.
The European net neutrality Regulation prescribes obligations on national regulators to “closely
monitor and ensure compliance” with the Regulation, whereby this evolution will be scrutinized,
and corrective regulatory measures may be launched if necessary.