
- •Table of Cases
- •Table of Statutes
- •Table of Statutory Instruments
- •Table of European Legislations
- •Table of Statutes and Other Instruments
- •Table of Abbreviations
- •Preface
- •Introduction
- •Overview
- •1 Standard Trade Terms
- •Introduction
- •Ex works
- •CIF contracts
- •CIF contracts under INCOTERMS 2010
- •C&F contracts
- •C&F and INCOTERMS
- •FOB contracts
- •Variants of an FOB contract
- •FAS contracts
- •Conclusion
- •Further reading
- •2 The Vienna Convention on the International Sale of Goods 1980
- •Introduction
- •The Vienna Convention
- •Conclusion: Recent international initiatives
- •Further reading
- •Overview
- •Introduction
- •Policy considerations, e-commerce and international regulatory measures
- •Electronic data interchange (EDI) and interchange agreements
- •UNCITRAL model law on e-commerce
- •Other international initiatives – the International Chamber of Commerce
- •The EU directive on e-commerce
- •The United Nations Convention on the use of electronic communications in international contracts
- •Conclusion
- •Further reading
- •Introduction
- •Electronic signatures and UNCITRAL
- •The EU directive on electronic signatures and the UK legislation: Electronic Communications Act 2000 and the Electronic Signatures Regulation 2002
- •Electronic medium and computer misuse
- •Conclusion: a bright future for e-commerce?
- •Further reading
- •Overview
- •Introduction
- •Types of charterparties
- •Common law implied obligations in a voyage charterparty
- •Common law immunities
- •Usual express terms
- •Conclusion
- •Further reading
- •6 Bills of Lading
- •Introduction
- •Nature of a bill of lading
- •Rights and liabilities of consignee/endorsee
- •The Carriage of Goods by Sea Act 1992
- •Bills of lading and fraud
- •Electronic data interchange (EDI) and the Carriage of Goods by Sea Act 1992
- •Conclusion
- •Further reading
- •7 Bills of Lading and Common Law
- •Introduction
- •Implied obligations on the part of the shipowner
- •Implied obligations on the part of the shipper
- •Common law exceptions
- •Contractual exceptions
- •Other terms in bills of lading
- •Conclusion
- •Further reading
- •Introduction
- •Limitation of liability
- •Scope of application
- •Contracting out
- •The future
- •Further reading
- •9 The Hamburg Rules and the Rotterdam Rules
- •Introduction
- •The Hamburg Rules
- •Scope of application
- •The Rotterdam Rules (The UN Convention on Contracts for the International Carriage of Goods Wholly or Partly by Sea)
- •Conclusion
- •Further reading
- •10 International Carriage of Goods by Air
- •Introduction
- •The Warsaw system
- •Approach to interpretation of the Warsaw Convention in the English courts
- •Scope of application of the Warsaw Convention (unamended and amended versions)
- •Contracting out
- •Documentary responsibilities
- •Air waybill and negotiability
- •Electronic data interchange (EDI) and the Warsaw regime
- •Carrier liability
- •Proceedings
- •The Montreal Convention
- •Further reading
- •11 International Carriage of Goods by Rail
- •Introduction
- •Interpretation of the CIM
- •Scope of application
- •Documentary responsibilities
- •Electronic data interchange (EDI) and the CIM rules
- •Contracting out
- •Proceedings
- •Conclusion
- •Further reading
- •12 International Carriage of Goods by Road
- •Introduction
- •Interpretation of the CMR by the English courts
- •Scope of application
- •Contracting out
- •Documentary responsibilities
- •Electronic data interchange (EDI) and the CMR
- •Proceedings
- •CMR – the future
- •Further reading
- •13 International Multimodal Transport
- •Introduction
- •Freight forwarder – agent or principal?
- •Fiata negotiable multimodal bill of lading
- •Conclusion
- •Further reading
- •Overview
- •14 Marine Insurance
- •Introduction
- •Scope and nature of marine insurance contracts
- •Principles of marine insurance law
- •Warranties on the part of the insured – implied and express
- •Deviation
- •Liability of insurer
- •Institute cargo clauses (A), (B) and (C)
- •Conclusion
- •Further reading
- •15 Letters of Credit
- •Introduction
- •Open account
- •Bills of exchange
- •Documentary bill
- •Letters of credit
- •Performance bonds/guarantees and standby letters of credit
- •Other means of minimising risk of non-payment
- •Conclusion
- •Further reading
- •Overview
- •16 Civil Jurisdiction
- •Introduction
- •Submission by appearance
- •Ordinary contracts
- •Tort claims
- •Ancillary jurisdiction
- •Jurisdiction clauses
- •Simultaneous actions
- •Interim relief
- •Conclusion
- •Further reading
- •17 Choice of Law
- •Introduction
- •The proper law – express choice
- •The proper law – implied choice
- •The proper law – closest connection
- •Particular issues
- •English public policy and overriding mandatory rules
- •Certain particular types of contract
- •Torts and restitutionary obligations
- •Conclusion
- •Further reading
- •18 Foreign Judgments
- •Introduction
- •European judgments
- •External judgments
- •Conclusion
- •Further reading
- •19 Arbitration
- •Introduction
- •Characteristics
- •Arbitration in international commercial contracts
- •Arbitration under English law
- •Foreign arbitral awards
- •Conclusion
- •Further reading
- •Introduction
- •International developments
- •Developments in England
- •Features and associated issues
- •Mediation online
- •The EU Directive on mediation in civil and commercial matters
- •Conclusion
- •Further reading
- •Overview
- •21 Fighting Corruption in International Business
- •Introduction
- •The OECD Convention
- •The OECD and the UK Bribery Act 2010
- •The UNCAC
- •Business codes of conduct
- •Conclusion
- •Further reading
- •Appendix 7
- •Index

CONCLUSION: A BRIGHT FUTURE FOR E-COMMERCE? |
| 147 |
but rather supplements/enhances the available framework by addressing the particular needs of detecting computer crime. Article 23 formulates the general principles and expects mutual assistance to the greatest extent possible for the purpose of investigation or proceedings concerning criminal offences related to computer systems and data, or for the collection of evidence in electronic form of a criminal offence. Since speed is an essential component for successful investigation, in urgent cases, the COE Convention does away with rigid formalities for requesting mutual assistance and enables parties to request assistance using e-mails and other forms of instantaneous communication. Also, request for expeditious preservation of stored data is allowed under Art 29 and expeditious disclosure of preserved data under Art 30. Refusal for preservation of data is allowed in limited circumstances: where the condition of dual criminality120 is not fulfilled; where the request concerns a political offence or an offence related to a political offence; and in the interests of sovereignty, security or public order. Request for mutual assistance relates not only to the access of stored data, but also to real-time collection of traffic data. Another ground-breaking provision is Art 35, which requires each party to designate a 24/7 point of contact for providing immediate assistance.
Where states are not parties to mutual assistance agreements, Arts 27 and 28 make provisions for procedures, such as establishing central authorities to aid cooperation and regulating confidentiality of requests and information.
It is clear that the problems in investigation posed by anonymity and encryption can be addressed if the framework suggested by the Council of Europe is adopted. Inevitably, the costs of keeping logs and other subscriber information will fall on the service provider, which might increase the overall costs. If the consequence of this is a safer net environment, then it may, according to some, be a price worth paying.121
Conclusion: a bright future for e-commerce?
It seems that international organisations, governments and governmental organisations have been driven by the need to ensure there are sufficient safeguards in place that would reduce the economic risks posed by legal uncertainties and that the vulnerabilities of the system are reduced to a tolerable level. Although the work of the UNCITRAL, in relation to legal effectiveness of electronic communications, may have brought about some harmonisation, it is uncertain whether the legislative steps in the form of creating specific computer related offences have created a desirable level of safety in the electronic environment. Despite well publicised losses to the industry due to vulnerability of the electronic medium, paucity of prosecutions comes as a surprise and is a strong indicator that the creation of computer specific offences is inadequate. It might be best for businesses to protect themselves against the peculiar susceptibilities of the medium through adequate security management and security devices. For instance, a survey of information security breaches conducted by PriceWaterhouse Coopers and the Department of Trade and Industry (DTI)122 in 2002 indicated that investment in information security in the UK was low, despite security incidents that cost the UK billions of pounds in 2001. The report recommended that businesses create
120The convention also addresses extradition in Art 24, and parties are required to extradite individuals for offences criminalised under Arts 2–11 of the Convention, provided the offence is punishable under the laws of both countries by a maximum of one year imprisonment or a more severe penalty. This meets the minimum threshold set by the Council of Europe Convention on Extradition 1957.
121For an interesting economic analysis, see Hamdani, ‘Who’s liable for cyberwrongs?’ (2002) 87 Cornell LR 901.
122‘Information Security Breaches Survey 2002’. See also ‘BERR Information Security Breaches Survey 2008’ available at www
.security-survey.gov.uk.
148 | |
THE ELECTRONIC TRANSACTION AND SECURITY ISSUES |
a security aware culture and put in place appropriate steps in security management, such as use of adequate technical security devices, qualified personnel, penetration testing of its web sites and security audits. Although these suggestions are of a practical nature, it must be emphasised that a legal framework promoting the use of the electronic medium of itself is insufficient to reduce the vulnerabilities of the medium or protect the electronic environment from external threats. Policy makers, governments and international organisations have done their best to provide a legal framework for electronic commerce – its full utilisation and success are now in the hands of businesses.
Further reading
Carr [ed], Computer Crime, 2009, Ashgate.
DTI, Licensing of Trusted Third Parties for the Provision of Encryption Services: Public Consultation Paper on Detailed Proposals for Legislation, March 1997, DTI.
Fafinski, Computer Misuse: Response, Regulation and the Law, 2009, Willan. Goldsmith & Wu, Who Controls the Internet? 2006, OUP.
McEwan ‘The Computer Misuse Act 1990: lessons from the past and predictions for its future’ (2008) Criminal Law Review 955.
OECD, ‘Gateways to global market: consumers and electronic commerce’, 1997, available at www.oecd.org.
Perritt Jr, Law and the Information Superhighway, 1996, John Wiley. Thomas and Loader (eds), Cybercrime, 2000, Routledge.
Walden, Computer Crimes and Digital Investigation, 2007, OUP. Wall (ed), Crime and the Internet, 2001, Routledge.
Weiss, ‘Security requirements and evidentiary issues in the interchange of electronic documents’ (1993) 12 John Marshall Journal of Computer and Information Law 425.
Williams and Carr, ‘Crime, risk and computers’ (2002) Electronic Communications LR 23.

Part III
Transportation of Cargo
This page intentionally left bank