LEGAL CHALLENGES & STRATEGIES IN E-PROCUREMENT IN CONSTRUCTION

Slides:



Advertisements
Similar presentations
ITU Regional Seminar on E-commerce Bucharest, Romania May 2002 National E-commerce Strategies for Development Dr. Susanne Teltscher United Nations.
Advertisements

Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
E-commerce Strategies
The Gathering Cloud computing - Legal considerations David Goodbrand, Partner 28 February 2013 Aberdeen Edinburgh Glasgow.
BLG E-COMMERCE RISKS: RISK MANAGEMENT IN PROFESSIONAL INDEMNITY KIT BURDEN PARTNER, BARLOW LYDE & GILBERT KIT BURDEN PARTNER, BARLOW LYDE & GILBERT.
Legal and Ethical Issues: Privacy and Security Chapter Five.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
FIT3105 Security and Identity Management Lecture 1.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
BACKGROUND  Hawkes Bay Holdings/Aquila Underwriting LLP  Established 2009 utilising Lloyd’s capacity: Canopius % Hiscox 33 50% to May 2010, replaced.
Chapter 16 Security. 2 Chapter 16 - Objectives u The scope of database security. u Why database security is a serious concern for an organization. u The.
Session 3 – Information Security Policies
Copyright © Center for Systems Security and Information Assurance Lesson Eight Security Management.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Copyright © 2004 by Prentice-Hall. All rights reserved. PowerPoint Slides to Accompany BUSINESS LAW E-Commerce and Digital Law International Law and Ethics.
1 Brief Overview of Selective Legal and Regulatory Issues in Electronic Commerce United Nations Conference on Trade and Development Geneva, 14 June 2001.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Computer Security: Principles and Practice
PCM2U Presentation by Paul A Cook IT SERVICES. PCM2U Our History  Our team has been providing complete development and networking solutions for over.
National Smartcard Project Work Package 8 – Security Issues Report.
Information Asset Classification
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Chapter Two Ethical & Legal Issues.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Securing Information Systems
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
Defining Security Issues
PART THREE E-commerce in Action Norton University E-commerce in Action.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
A Comparative Study on the e-Commerce Laws of Taiwan and the Philippines September 20, 2006 John C.T. Ko & Regina Rose N. Regidor for Taiwan for the Philippines.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
THE E-COMMERCE LEGAL ENVIRONMENT Bangkok, November, 2002 David Marsh.
AUGUST 25, 2015 Cyber Insurance:
An Investigation into E-Commerce Frauds and their Security Implications By Kevin Boardman Supervisor: John Ebden 29 July 2004.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Higher Education PKI Summit Meeting August 8, 2001 The ABA PAG Rodney J. Petersen, J.D. Director, Policy and Planning Office of Information Technology.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
11/6/2015 / 1 Electronic Commerce Branch UNCTAD - United Nations Conference on Trade and Development Overview of Selective Legal.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Chap1: Is there a Security Problem in Computing?.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
Models for Cyber-legislation in ESCWA member countries Presented by Jean Akl & Roula Zayat Amman, December 11, 2007.
Chapter 8 Auditing in an E-commerce Environment
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
IT Security in Nepal: Issues and challenges Rajan R. Pant ITSERT-NP.
Chapter 4: Laws, Regulations, and Compliance
Protecting your Managed Services Practice: Are you at Risk?
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
Financial Times Matheson is ranked in the FT’s top 10 European law firms Matheson has also been commended by the FT for corporate law,
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
PH.D Zhanglinyi CHAPTER 18 Ethical conflict.
Cyber Liability: New Exposures Presented by: Henriott Group © 2007, , Zywave Inc. All rights reserved.
Legal Aspects in IT Security Is Your Organisation Up-to-Date?? (Ref : IT Act, 2008 & IT Rules 2011) Adv Prashant Mali [BSc(Phy),MSc(Comp. Sci.),CNA,
Module 5 Special Topic in e-Commerece. What is e-Commerce Utilize telecommunications technology and networks for – Conducting business transactions –
Cyber Liability Insurance for an unsecure world
E&O Risk Management: Meeting the Challenge of Change
Ethical, Social, and Political Issues in E-commerce
INFORMATION SYSTEMS SECURITY and CONTROL
Faculty of Science IT Department By Raz Dara MA.
Computer Security By: Muhammed Anwar.
INFRASTRUCTURE & ACCESS 4TH JULY 2018
Instructor Materials Chapter 5: Ensuring Integrity
Introduction to Digital Forensics
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

LEGAL CHALLENGES & STRATEGIES IN E-PROCUREMENT IN CONSTRUCTION

Potential Legal Issues of E-commerce in the Construction Industry Intellectual Properties Rights Global Issues Legal Issues Security Breaches E-Contracts Enforceability Liability Risks

Global Issues Lack of Alignment Legacy Variations (Laws & Penalties) Domain Name vs. Trademark Taxation Laws

E-Contracts Enforceability Formation of E-Contracts New Legal Relationships & Liabilities Repudiation Coverage of Legal Issues E-Doc as Evident

Liability Risks Services Dependency Risks Regulation Risks Misleading Web Contents Data Protection/ Loss of E-doc

Intellectual Properties Rights Ownership of Shared E-Info/ Data Leak of Trade secrets Domain Names, Hyperlink & Metatag Disputes Copyright

Security Breaches Unauthorized Network Access Interception & Theft Viruses & Worms Denial of Services PKI Cyber Snooping

Lack of Alignment in Jurisdiction Each country has taken different approaches in tackling e-commerce legal issues, and companies that are unfamiliar with foreign laws may face unexpected liabilities. Criminal penalties varied in different countries, Some have considered computer hacking as law breaking and offenders are fined or imprisoned while one cannot prosecute such acts.

Confidentiality Confidentiality issues are magnified with the use of IT as leakage of digital information is easily done, for instance forwarding emails and copying e-documents. Many fostered the mentality that sharing information will expose them to risks. Some ranked confidentiality of information as the top priority followed by ownership issues.

Legal Liability Legal liability is the duty of care and responsibilities one owes to another. One may be sued or have to pay for damages if one does not perform that duty of care.

Insecurity in E-Transactions Shared systems, shared network resources or web servers that are commonly used are subjected to theft, virus and worm attacks. Hence this has created difficulties in controlling access to a computer which contains confidential information and hence putting the integrity of the information at risk. These attacks can be either external (hackers) or internal (employees, partners and clients). There are also cases where database of credit cards information is being hacked or unauthorized persons gained access to sensitive information from systems which proclaimed to be secure.

Service Dependency Risks The technology facilitates faceless transactions and reduces human intervention. Contractors feared their clients would repudiate that their order is not authorized, or not performed by the person claimed to be. There are many other circumstances arising from the new way of transacting that could expose the contractors to such risks.  Hence they felt that service dependency risks were the most prominent  Therefore they might not feel secure exchanging sensitive information online.

Strategies and their Instruments for E-Commerce Legal Framework Self Regulation Secure Information Management Code of Conduct Interchange Agreement Consumer Protection Access & Service Agreement/ Terms & Conditions Community Consensus-Driven Policies Guideline Technical Standards Insurance Dispute Resolution Mechanisms Education, Awareness & Training Emergency response Planning Research Consult Legal counsel Certifications Audit Trail Corporate Policies Integrate Traditional Biz practices Legal Framework/ Strategies Technology Laws and Regulation Cryptography Digital Signature Security systems & software Smart card Biometrics Mobile Technology Static & Dynamic Analysis tools Adjustment in Existing Law Enactment of New Law Case Studies Universal Agreement (treaties)

Education Understanding the importance of security, observing security measures and conforming to regulations are some issues to be addressed continuously in an awareness program. Implementing policies is only winning half the battle. Employees must know and abide them. Both the ASPs and CPs regarded education as the most effective instrument to resolve legal issues.

New Legislation Laws and regulations can act as deterrence to cyber crimes. Failure for law to keep up with technology could encourage internet misuse, which may lead to a country

Interchange Agreement Jordan construction industry has developed a legal framework and an Interchange Agreement (IA) to provide specific details on legal relationships of e-commerce users. IA specifies and defines the standards of discipline, rights and obligations of the parties involved in e-business, which are lacking in the generalized legal system of Singapore. Parties involved in a dispute over the enforceability of a contract can rely on the specific terms stated in the contract.

Public Key Infrastructure (PKI) PKI is a mature and ready solution that addresses all four key elements of security - authentication, non-repudiation, confidentiality and integrity.

CONCLUDING REMARKS Most of the potential legal issues arising from e-procurement are not new liability risks contract enforceability Security global trading and IPR Rather these challenges are magnified when compared to performing these tasks via the traditional modes. A proper training and strategic use of the technology, e-procedures can maintain higher security than conventional ones.

CONCLUDING REMARKS Contractors should be aware of and understand the legal issues arising from implementing e-procurement. To tackle these legal issues more effectively, the various strategies – legislation, self-regulation, technology and information security management should be combined. E-procurement users should plan and strategize such that e-procurement can integrate smoothly in their work practices, culture, as well as that of their working partners