THE CONSTRUCTION INDUSTRY AND THE COMPUTER AGE: RISK EXPOSURES FOR THOSE DEPENDENT ON SOFTWARE
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
THE CONSTRUCTION INDUSTRY AND THE COMPUTER AGE: RISK EXPOSURES FOR THOSE DEPENDENT ON SOFTWARE I. Clickwraps and Shrinkwraps: Warranties, Disclaimers & Remedies Issue: What risks do your clients assume as a result of electronic technology? Short Answer: Substantial risks unless insured against or lessened by contract negotiation. Analysis and Practice Tips 1. Contractors Contractors increasingly rely on computerized tools to assist construction, and these tools may impact the risk assumed by contractors.1 For example, a contractor using computerized tools will generally be responsible to the owner if failure results.2 Accordingly, a contractor’s exposure to liability is affected by agreements with the software providers, ASPs, ISPs, and project owners. The standard warranties provided by software manufacturers are often very limited. Such standard warranties are often contained in either “shrinkwrap” or “clickwrap.” The term “shrinkwrap” refers to a notice of terms contained on or inside the software box.3 The term “clickwrap,” by contrast, refers to a notice of terms that appear on the computer screen when the software user attempts to install the software.4 In many situations (due to the license language of the shrinkwrap or clickwrap), a purchaser of equipment is limited to recovering the cost of the software. In a landmark case, Mortenson Co., Inc. v. Timberline Software Corp., 998 P.2d 305 (Wash. 2000), a general contractor who had a $2 million dollar bid bust as a result of a glitch in his bid analysis software was limited to recovering the costs he had paid for the software licenses. Specifically, Mortenson, the general contractor, had purchased a bid analysis program from Timberline through Timberline’s local authorized dealer. Mortenson used the program to prepare a 1 Paul M. Lurie, Responsibility for Computer-Aided Defects, CAD in the Construction Industry, 21- FALL Construction Law 23. 2 Id. 3 106 A.L.R.5th 309 (2003). 4 Id.
construction bid. On the day of the bid, the program gave Mortenson 19 error messages which stated, “Abort: Cannot find alternate.” Nevertheless, Mortenson submitted the bid generated by the software. After Mortenson was awarded the project, it learned that its bid was $1.95 million lower than intended. Mortenson then filed suit against Timberline alleging breach of express and implied warranties. Timberline, in response, argued that the limitation on consequential damages in the licensing agreement barred Mortenson’s recovery. The full text of the license agreement was set forth on the outside of each of the nine diskette pouches Mortenson purchased and on the inside cover of the instruction manuals. In addition, the first screen that appeared each time the program was used referenced the license. Further, a protection device had to be connected to each computer to enable the software. Wrapped around each protection device was a license to use the device. Among other things, the license agreement stated: LIMITATION OF REMEDIES AND LIABILITY: NEITHER TIMBERLINE NOR ANYONE ELSE WHO HAS BEEN INVOLVED IN THE CREATION, PRODUCTION OR DELIVERY OF THE PROGRAMS OR USER MANUALS SHALL BE LIABLE TO YOU FOR ANY DAMAGES OF ANY TYPE, INCLUDING BUT NOT LIMITED TO, ANY LOST PROFITS, LOST SAVINGS, LOSS OF ANTICIPATED BENEFITS, OR OTHER INCIDENTAL, OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE SUCH PROGRAMS, WHETHER ARISING OUT OF CONTRACT, NEGLIGENCE, STRICT TORT, OR UNDER ANY WARRANTY, OR OTHERWISE, EVEN IF TIMBERLINE HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES OR FOR ANY OTHER CLAIM BY ANY OTHER PARTY. TIMBERLINE’S LIABILITY FOR DAMAGES IN NO EVENT SHALL EXCEED THE LICENSE FEE PAID FOR THE RIGHT TO USE THE PROGRAM. Id. at 308-09 (emphasis added).5 5 It is interesting to note that the Microsoft Project 2000 Warranty, Disclaimer and Remedies are even more limited. The End-User License Agreement (EULA) warranty states, in part, that Microsoft warrants the product “will perform substantially in accordance with the accompanying written materials for a period of 90 days from the date of receipt” and support services “shall be substantially as described in applicable written materials.” The EULA provides the user’s “exclusive remedy” and Microsoft’s “entire liability” shall be either a) return of price paid or b) repair or replacement of product. However, in the same package there are two Supplemental EULAs. Both of which state “To the maximum extent permitted by applicable law, Microsoft and its suppliers provide to you the components and any (if any) support services related to the components as is and with all faults. . . .” The Supplemental EULAs go on to disclaim any warranties, for, among other things, “correspondence to description,” “workmanship effort,” “accuracy or completeness of responses.” Just to make sure, Microsoft adds “The entire risk arising out of use of performance of the components and any support services remains with you.” The users remedy is limited to the greater of $5.00 or the cost of the software. Although an argument can be made for the unconscionability of these provisions, there is some authority upholding this type of language. See Moore v. Microsoft Corp., 741 N.Y.S.2d 91 (N.Y. Sup. Ct. 2002) (holding that an End User License Agreement contained in a software manufacturer's software program was a binding contract, where the plaintiff user was required to click on an "I agree" icon before proceeding with the download of the software, and that the warranty disclaimers and limitations of liability contained in the agreement precluded the user's claims). 2
The court held that Mortenson, a nationwide construction contractor, had ample opportunity to read and understand the terms of the shrinkwrap and clickwrap licensing agreements before using the software, and found the limitation on remedies provision enforceable. The rationale of Mortensen was later followed in I.Lan Sys., Inc. v. Netscout Serv. Level Corp., 183 F.Supp.2d 328 (D. Mass. 2002). In Netscout, the court held that a clickwrap agreement was binding on a computer network support provider that purchased software from a software distributor. In that case, the plaintiff support provider and defendant distributor entered into a Value Added Reseller (VAR) agreement whereby the support provider agreed to resell the distributor's software to customers. The software resold by the support provider included a clickwrap agreement. The support provider sent a purchase order to the distributor for software, then sued the distributor after a dispute arose over the transaction. The distributor contended that under the VAR agreement and the clickwrap agreement it had disclaimed all warranties except for a limited warranty with a term of 30 days, and that under the clickwrap agreement any damages were limited to the cost of the license fees paid. To buttress this argument, the distributor cited the following specific language: LIMITATIONS OF LIABILITY . . . [DISTRIBUTOR] DISCLAIMS ALL WARRANTIES AND CONDITIONS, EITHER EXPRESS OR IMPLIED, STATUTORY OR OTHERWISE, WITH RESPECT TO THE LICENSED PRODUCT, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS, STATUTORY OR OTHERWISE, OF MERCHANTABILITY, NONINFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE. [DISTRIBUTOR’S] LIABILITY FOR DAMAGES TO LICENSEE FOR ANY CAUSE WHATSOEVER, REGARDLESS OF THE FORM OF ANY CLAIM OR ACTION, SHALL BE LIMITED TO THE LICENSE FEES PAID FOR THE LICENSED PRODUCT Id. at 335, fn.3 (emphasis added). The court noted that the terms of the clickwrap agreement provided that the agreement did not affect existing written agreements, and held that the clickwrap agreement, if enforceable, would serve to fill any void where the VAR agreement and purchaser order were silent. The court held that the clickwrap agreement was accepted by the service provider on two alternative grounds. First, the court found that "money now, terms later" was a practical way to form contracts for the purchase of software, and that the contract was therefore formed when the support provider clicked the "I Agree" button that appeared on the computer screen while it was installing the software. Second, the court held that even if the clickwrap agreement were considered a proposal for additional terms under Uniform Commercial Code § 2-207, the support provider had implicitly accepted the additional terms because both parties were merchants and the additional terms were not material. The court noted that the support provider could not claim surprise at the terms, because the VAR agreement contained terms virtually identical to the clickwrap regarding warranty disclaimers and limitations of liability, and the VAR further expressly incorporated the terms of the clickwrap agreement. 3
The logical thrust of Mortensen and Netscout has been followed by various courts. See, e.g., Forrest v. Verizon Comm., Inc., 805 A.2d 1007 (D.C. 2002) (upholding a forum selection clause in an online clickwrap agreement for internet access services because the clause had been reasonably communicated to the plaintiff subscriber prior to his acceptance of the agreement through use of an “I Agree” screen); Moore v. Microsoft Corp., 741 N.Y.S.2d 91 (N.Y. Sup. Ct. 2002) (holding that an End User License Agreement contained in a software manufacturer's software program was a binding contract, where the plaintiff user was required to click on an "I agree" icon before proceeding with the download of the software, and that the warranty disclaimers and limitations of liability contained in the agreement precluded the user's claims); Barnett v. Network Solutions, Inc., 38 S.W.3d 200 (Tex. App.—Eastland 2001, no pet.) (upholding a forum selection clause in a clickwrap agreement because the plaintiff domain name registrant had adequate notice of the terms contained in the clickwrap registration, as he was required to scroll down through the terms of the agreement before accepting the agreement and proceeding to make his purchase; noting also that, as with paper contracts, a party that enters into a contract will not be excused from the contract's terms because of a failure to read the contract). Despite the foregoing authorities, some cases find grounds to avoid shrinkwrap and clickwrap limited warranties. For example, In Caudill Seed and Warehouse Company, Inc. v. Prophet 21, Inc., 123 F.Supp.2d 826 (E.D. Pa. 2000), the United States District Court for the Eastern District of Pennsylvania found that a software manufacturer’s limited warranty to repair or replace the software failed of its essential purpose because the software could not be repaired. Therefore, the court held that under Pennsylvania’s version of the UCC, the plaintiff could avail itself to any remedies allowed by the UCC, including consequential damages and that the license agreement’s limitation of damages to the cost of the software was unenforceable. See also, Klocek v. Gateway, Inc., 104 F. Supp.2d 1332 (D. Kan. 2000) (court found that computer purchaser was offeror and that the vendor accepted the offer by shipping the computer; the vendor’s enclosure of the license agreement in the computer box acted as an acceptance even though it contained different terms and that the vendor had not made acceptance of the license agreement a condition of the computer purchaser’s acceptance of the computer). The logical thrust of Caudill Seed and Klocek has been followed by various courts. See, e.g., Specht v. Netscape Comm. Corp., 306 F.3d 17 (2d Cir. 2002) (holding that plaintiffs, by acting upon an invitation to download free software, did not agree to be bound by the software license agreement—which contained an arbitration clause—because plaintiffs could not have learned of the existence of those terms unless, prior to executing the download, they had scrolled down the web page to a screen located below the download button); Softman Prod. Co., LLC v. Adobe Sys., Inc., 171 F.Supp.2d 1075 (C.D. Cal. 2001) (holding that a reseller of software packages was not bound by an end user license agreement because it never installed the software and thus never had the opportunity to view or accept the terms of the license, which were not contained in the packaging, but presented only when a user installed the software; holding further that reading a notice on the outside of the software box that indicated that the transaction was subject to a clickwrap license contained in the media was not sufficient to show assent to such terms) (emphasis added). 4
2. The Design Professionals Design professionals should also be aware of potential risk exposure associated with using computerized tools. The Fall 2001 issue of CONSTRUCTION LAW provides an interesting hypothetical. Suppose an architect employs a computer tool that is commonly used among similarly situated professionals, its program generates an error, the error is not known among designers, and the generated output is checked and is not suspicious. The architect may be able to defend on the basis that it was professionally reasonable to use an engineering structural analysis program, despite a flawed output caused by an undiscovered programming error.6 However, using the computer program as a negligence shield could fail if the design problem resulted in a code violation, which in some states could breach an implied warranty.7 A recent Houston case provides an excellent example of a case where a flaw in the software left the user of the information generated by the software without recourse for its substantial economic loss. In Hou-Tex, Inc. v. Landmark Graphics, 26 S.W.3d 103 (Tex. App.–Houston [14th Dist.] 2000, no pet.) an oil and gas company hired a geological contractor to do the seismic testing to determine the drill site. The geological contractor used a computer program to interpret the seismic data. A bug in the computer program resulted in the drilling of a dry hole. It was later discovered that the software company knew about the bug before drilling ever commenced but did not alert the geological contractor to the problem although it sent corrected software to other customers. The geological contractor had disclaimed all liability resulting from the use of the software in its agreement with the oil and gas company. Therefore, the oil and gas company sued the software company for negligence and breach of express and implied warranties. The court poured the oil and gas company out because it had no contract with the software company and because the software company owed no duties to the oil and gas company. Landmark Graphics provides an excellent reason why design professionals should consider negotiating liability terms with the software vendors or project owners as well as obtaining insurance for exposure resulting from software problems. Finally, like contractors, the design professionals should ensure that they have the proper type of insurance coverage available to respond to software related losses should they either suffer damage to their own property or business or become liable for damages to a third party. 3. Insurance and E-Commerce Losses Because the insurance framework for e-commerce losses is in its infancy, there are many unknowns as to whether traditional business polices will provide coverage for losses resulting 6 Lurie, supra note 1 at 24-25. 7 Id. 5
from computer viruses, software glitches, or system crashes.8 An architect’s or engineer’s professional liability coverage would generally cover a claim based on failure to catch a mistake generated by a computer program unless the policy expressly excludes such coverage.9 Commercial general liability coverage might provide coverage for architects, engineers, or contractors if the threshold requirement of property damage to another’s property is met.10 Moreover, first party property policies may provide coverage for e-commerce related losses.11 Business interruption coverage, which is generally included in an endorsement to a comprehensive insurance policy, insures against business losses sustained as a result of business interruption.12 In addition, extra expense coverage is available for costs necessary to ensure that operations can continue without interruption.13 Extra expense examples include: the costs of operating a web page through an alternate ISP or restoring lost data.14 Insurance coverage for such losses has been found by a few courts. In American Guarantee & Liab. Ins. Co. v. Ingram Micro, Inc., No. 99-185 TUC ACM, 2000 WL 726789 (D. Ariz. 2000), the court held under an all risks property damage policy that where a computer system physically lost the programming information and custom configurations necessary to function due to a power outage, the computer suffered physical property damage. In addition, Centennial Ins. Co. v. Applied Healthcare Systems, Inc., 710 F.2d 1288 (7th Cir. 1983) held that the allegation that computerized customer billing and patient information was lost as a result of a wiring-connection defect constituted an allegation of property damage under a commercial general liability policy. 4. Practice Tips for Contractors and Design Professionals I. Attempt to negotiate better liability terms & warranties with software vendors; II. Attempt to limit contractual liability for failures associated with computer software in agreements with owners and other contracting parties; 8 David R. Cohen & Roberta D. Anderson, Insurance coverage for “Cyber-Losses”, 25 TORT & INS. L.J. 891, 892. 9 Lurie, supra note 1 at 26. 10 Id. 11 Cohen & Anderson, supra note 8 at 893. 12 Id.at 914-915. 13 Id. at 918. 14 Id. at 896-897. 6
III. Attempt to obtain insurance coverage for e-commerce risks; make sure that business interruption and extra expense coverage does not exclude such losses 5. ASPs and ISPs An application service provider (“ASP”) provides access to application programs and related services that would otherwise have to be located on the customer’s own computers or servers, such as payroll or project management software.15 ISPs are companies which provide internet access or internet presence to individuals, businesses, and other groups. As with software and hardware manufacturers, the warranties provided by ASPs and ISPs are often very limited while the disclaimers are very broad. An example of a warranty found in a form contract book for drafting internet contracts provides: Warranties and Disclaimer a. Host Warranties. Host warrants to Client that: (i) Host has the right and authority to enter into and perform its obligations under this Agreement; (ii) Host shall perform the Services in a commercially reasonable manner; and (iii) that the Services, throughout the term of this Agreement shall conform substantially to the specifications as set forth at Exhibit A. Client’s sole remedy in the event of any breach of this warranty will be for Host to take reasonable commercial efforts for thirty (30) days to cause the Services to conform substantially to the specifications as set forth at Exhibit A.16 Put simply, your client wants to avoid being stuck with an illusory warranty such as this one. 6. Practice Tips for Negotiating ASP and ISP contracts Below is a checklist if issues unique to ASP agreements which can be consulted when negotiating ASP (and ISP where applicable) agreements.17 Issues to Address: I. Make sure the “User” or “Customer” includes all entities for whose benefit the service will be used such as subsidiaries or parent companies; 15 JANE K. WINN & BENJAMIN WRIGHT, LAW OF ELECTRONIC COMMERCE, § 2.05 (4th ed. 2001). 16 Tobey B. Marzouk & Thomas M. Parry, INTERNET CONTRACTS EXPRESS, Agreement No. 5 (emphasis added). 17 Tobey B. Marzouk & Thomas M. Parry, APPLICATION SERVICE PROVIDER CONTRACTS EXPRESS. 7
II. Define who corrects and pays for the repair of bugs in the software application; III. Define availability of service: how is up-time and downtime defined; IV. Set performance requirements for speed (bandwidth/transmission speeds, processing times, response times); V. Determine the ASP has sufficient capacity (number of transactions per month, surge limits, database size); VI. Define terms for expansion and costs for doing so (many ASPs charge by the size of the database); VII. Determine the security is sufficient (passwords, access levels, data encryption, firewalls, intrusion detection, log files, monitoring and reporting); VIII. Make sure the ASP provide backups (real time redundancy and data storage). This is especially important as hard drive destroying viruses increase; IX. Commitment to upgrade software/what schedule; and X. Find out who does system performance monitoring; what are reporting standards and obligations. Support Services and Training I. What training and support is offered and for what price? II. Availability of telephone support services (both end-user help desk services and technical support services). III. Define response time for problems (both work around and fix). Warranty/Remedy. I. Define remedy for nonperformance relative to specifications/service level agreement. The remedy which may vary with the type of breach, could include: 8
A. Adjustment to the fee; B. Early right to terminate; or C. Right to recover damages. 7. Collaborative Project Software Database Issues Contractors sometimes worry that their scheduling and pricing data, when entered into the project software, may be used by other users for purposes not restricted to that project. While owners and architects typically have the same data in paper form, in electronic form that information is much easier to manipulate and to extract for use on other projects. For example, a national developer could conceivably revise schedule and cost data from different projects around the county to assist in negotiating future project or to price extras. In the public domain, one of the self-announced objectives of the state of Texas is to collect data on bids and contracts for use in future bids and to set budgets. Currently, absent contractual provisions, there is no bright line rule defining what is a permitted use of project data and who has ownership rights to that data. Historically, pure databases, compilations or arrangements of facts, measurements, data or other information without any element of creativity or originality received little or no protection as intellectual property.18 In Feist Publ’ns, the Supreme Court held that a white pages telephone directory was not entitled to copyright protection.19 In reaching this conclusion, the court explained that the facts themselves which are contained in a database do not constitute intellectual property. However, the manner and method in which the facts are presented can be considered intellectual property. Additionally, property rights may attach by virtue of the labor expended in collecting the data. Thus, while others may be free to extract facts from a database, they may not be entitled to copy with impunity the way these facts are assembled and presented. The law recognizing intellectual property rights with respect to databases is in its infancy. Additionally, various legal theories are still being applied to protect databases. Examples of cases where various theories have been alleged in attempts to protect databases are as follows: a. Verio In Register.com v. Verio, Inc., 126 F.Supp.2d (S.D.N.Y. 2000), Verio used software robots to access and collect registrant information from Register.com’s online database of 18 Richard Keck & Damon Goode, Misappropriated Manure Heaps, Rude Robots and Broken Promises, THE BUSINESS LAWYER Vol. 57, 514 (2001) citing Feist Publ’ns, Inc., Rural Tel. Serv. Co., Inc., 499 U.S. 340 (1991). 19 Feist Publ’ns, Rural Tel. Serv. Co., Inc., 499 U.S.362 (1991) 9
internet domain registrants and used that information for mass marketing purposes. Register.com sought to enjoin Verio from using its database information under the following theories: breach of Register.com’s terms of use, trespass to chattels, computer fraud and abuse under the federal Computer Fraud and Abuse Act and a Lanham Act claim. The Lanham Act prohibits the use in commerce of any reproduction, counterfeit, copy, or colorable imitation of a federally registered mark in connection with the sale, distribution, or advertising of goods or services in a manner that is likely to cause confusion.20 The court ruled for Register.com under this theory and enjoined Verio from making representations that might mislead Register.com’s customers. The court rejected all other theories. b. Ticketmaster In Ticketmaster Corp. v. Tickets.com, Inc., No. 99 CV-7654, 2000 WL 1887522 (C.D. Cal. Aug. 10, 2000), Ticketmaster attempted to stop Tickets.com from using factual information on its database which Tickets.com obtained from Ticketmaster’s database. Ticketmaster alleged breach of contract (based on its browse-wrap agreement on its website), misappropriation, trespass, unjust enrichment, copyright infringement, federal unfair competition, reverse passing off, false advertising, state unfair business practices, and interference with business advantage. The court refused to grant an injunction on any of the grounds asserted by Ticketmaster. In particular, the court found that Tickets.com’s copying of database information was likely to fall within the fair use exceptions of copyright law exception. c. eBay, Inc. In eBay, Inc. v. Bidder’s Edge, Inc., 100 F. Supp.2d 1058 (N.D. Cal. 2000), the court granted a preliminary injunction against Bidder’s Edge which prohibited it from copying eBay’s auction database. The court granted the injunction on the ground that eBay had a strong likelihood of proving a trespass claim. Notably the court had to tweak the traditional elements of trespass. 20 Winn & Wright, supra note 15 at §11.02[A][I], citing 15 U.S.C. §114(1)(a). 10
You can also read