Global Internet Law
Global Internet Law
Michael L. Rustad
Thomas F. Lambert Jr. Professor of Law, Suffolk University Law School
This paper can be downloaded without charge from the Social Science
Research Network: http://ssrn.com/abstract=2743390
Michael L. Rustad
Thomas F. Lambert Jr. Professor of Law &
Co-Director Intellectual Property Law Concentration
Suffolk University Law School
HORNBOOK SERIES®
Hornbook Series is a trademark registered in the U.S. Patent and Trademark Office.
West, West Academic Publishing, and West Academic are trademarks of West Publishing Corporation, used under license.
ISBN: 978-1-63459-685-5
iii
The term, “global” in my title has a lot to do with teaching so many graduate and
law students from radically different legal cultures over the years. I currently teach the
SJD Research and Writing Colloqium to foreign graduate students at Suffolk University
Law School. For the past five years, I’ve taught the required proseminar for all LL.M.
and foreign visiting students at Suffolk. I also gained global perspective by teaching in
Suffolk’s summer program at the University of Lund in Sweden five summers. I taught
students from more than thirty different countries in Suffolk’s LL.M. program in
International Business LL.M. program in Budapest, Hungary over five summers. Great
thanks are due to Suffolk University Law School’s reference librarians Diane D’Angelo
and Rick Buckingham. Diane D’Angelo co-authored the section on global Internet
research methods in Chapter 2. Vit Svejkovsky, a 2010 Magistr graduate of Prague’s
Charles University Faculty of Law and a LL.M. graduate of Suffolk University Law
School, co-authored the section comparing U.S. to European consumer law. I greatly
appreciate the editorial and research of Suffolk University Law School research
assistants Eunice D. Aikins-Afful, John H. Brainard, Matt Carey, Samantha Lynne
Cannon, Krista Fales, Jeremy Kennelly, Darcy Kohls, Emily Lacy, Nicole A. Maruzzi,
Patrick Nichols, Keyur Parikh, Harel Talasazan, Gamze Yalcin, and Elmira Cancan
Zenger. Rick Buckingham and Diane D’Angelo provided me with expert reference
librarian support on both editions. Finally, as always, I appreciate the editorial work
and good company of my wife, Chryss J. Knowles.
Many people contributed to this book including Suffolk University law students,
legal academics and business lawyers from around the world. My research assistants
included J.D. and LL.M. students who are lawyers in their own country as well as U.S.
law students. Camila Rocio Valenzuela Araya, Marty Cachapero, Andrew Clark, Nicola
Condella, Salvatore Cultrano, Kristina Foreman, Ibrahim Kaylan, Wenzhuo Liu, and
Manuel Ignacia Miranda all served with distinction. Wenzhuo Liu, who has experience
as a Chinese lawyer working with Johnson and Johnson, conducted research and edited
every chapter. I appreciated her technical expertise as well as her considerable analytical
abilities. Manuel Miranda, who is a LL.M. graduate and lawyer from Venezuela, edited
and researched Internet law developments in Latin America. Vit Svejkovsky, a business
and intellectual property lawyer, from the Czech Republic, provided extensive editorial
suggestions and examples from Eurozone. Hyeonieong Woo, Suffolk Law Student, and
Yina Kim, a South Korean lawyer and graduate of Suffolk University Law School,
accomplished superb research as well as giving helpful editorial comments. Thanks to
Kara Ryan my administrative assistant at Suffolk for her assistance on drafts. I also
appreciate the assistance of Shannon Edgar at Stetson University College of Law for
administrative support during the summer of 2013.
Diane D’Angelo and Rick Buckingham, Suffolk University Law School reference
librarians, provided me with useful suggestions. I learned about the importance of global
Internet Law from teaching international business lawyers from around the world in
Suffolk’s LL.M. program. I gained an understanding about European licensing law from
Professors Patrik Lindskoug and Ulf Maunschbach, who taught with me five summers
at the University of Lund.
My family has been supportive and encouraging. My daughter the attorney, Erica
Rustad Ferreira, and my son the doctor, James Knowles Rustad, contributed a great deal
by researching, editing, and offering suggestions along the way. Finally, my wife, Chryss
J. Knowles, deserves special thanks for her editorial assistance.
I would like to acknowledge the recent loss of my beloved mother-in-law, Janice
Marilyn Knowles, R.N., of St. Johnsbury, Vermont, a very distinguished member of the
“greatest generation.” This book is dedicated to Janice’s life so full of joy and loving
contributions to society and her family.
vii
Page
ACKNOWLEDGMENTS .............................................................................................................. V
ACKNOWLEDGMENTS FROM FIRST EDITION ........................................................................ VII
ix
Page
ACKNOWLEDGMENTS ..............................................................................................................V
ACKNOWLEDGMENTS FROM FIRST EDITION ........................................................................ VII
xi
1 “Social media has changed the way businesses communicate, enabling brands to directly engage with
consumers. Companies are turning increasingly to social media platforms to structure innovative and edgy
marketing and promotions that often include a mix of user-generated content, text messaging, Twitter
messaging, Facebook applications, blogging, viral marketing, and other social elements.” Alan L. Friel, Akash
Sachdeva, Jesse Brody, and Jatinder Bahra, Safeguarding Brand Reputation in Social Media, CORPORATE
COUNSEL (June 13, 2013).
2 NANCY S. KIM, WRAP CONTRACTS: FOUNDATIONS AND RAMIFICATIONS 211 (New York: Oxford
University Press, 2013).
3 Adobe Sys., Inc. v. One Stop Micro, Inc., 84 F. Supp. 2d 1086, 1092 (N.D. Cal. 2000) (“[A] common
method of distribution is through licensing agreements, which permit the copyright holder to place restrictions
upon the distribution of its products.”); Storm Impact, Inc. v. Software of Month Club, 13 F. Supp. 2d 782, 791
(N.D. Ill. 1998) (reservation of right to distribute software made available to be downloaded over the Internet
was valid and enforceable).
203
agreements and service level agreements in wide currency. Unlike toasters, rental cars,
or other tangible personal property, software can be reproduced at the click of a download
button at almost no cost, which results in contracting practices being based primarily upon
the licensing of information. Many Internet-related contracts are mass-market
agreements such as terms of service agreements or software license agreements. As
software companies go global, online contracts become subject to radically different legal
traditions. U.S. style terms of use, which are widely enforced in the United States, are
unenforceable in the European Union. A new legal paradigm is necessary to facilitate E-
Commerce, which may soon eclipse brick-and-mortar commerce. Paper-based signatures
are rapidly giving way to digital signatures in E-Commerce. Electronic agents with or
without human review are increasingly forming contracts.4 Trading partner agreements
form rules in advance for protocols regarding the ordering of goods and payment through
electronic messages. The Uniform Computer Information Transaction Act (UCITA)
validates electronic data interchange (EDI) trading agreements, whereby the parties
agree in advance to order goods by computer-to-computer interactions, without the need
for traditional human review.
Since the 1980s, software publishers, as well as database and website developers have
created a number of groundbreaking contracting forms that both deviate markedly from
the customary contract law “formation trilogy” of offer, acceptance, and consideration.
Licenses are a specialized contractual form that protect intellectual property rights and
enable vendors to realize their investments in developing code. The licensing of software,
like leases, validates the legal concept of the right to use property without the passage
of title. While the consumer’s title to the tangible copy of the software (the purchased
CD-ROM, for example) may be absolute, the purchase does not confer property rights
upon the intangible code that makes up the software.
The legal invention of licensing enables the software publishers to prohibit
assignments or transfers of the product, thus allowing them to retain control over the
product after the licensee pays royalties. Licensing enables the licensor to control the use
of their digital products after delivery.5 The licensor’s retention of title enables them to
slice and dice price (arbitrage) based upon a complex array of variables, such as business-
to-business, business-to-consumer, or market segments within a given foreign country. A
typical licensing provision specifies the following conditions of use:
Licensee may not install, electronically transfer, or otherwise execute the
FourGen Enterprise Software on any Computer other than the Designated
Computer. Only one Computer can be specified as the Designated Computer in
a network unless additional licenses are purchased.
4 “This term refers to an automated means for making or performing contracts. The agent must act
independently in a manner relevant to creating or performing a contract. Mere use of a telephone or e-mail
system is not use of an electronic agent. The automated system must have been selected, programmed or
otherwise intentionally used for that purpose by the person that is bound by its operations. The legal
relationship between the person and the electronic agent is not equivalent to common law agency since the
“agent” is not a human. However, parties that use electronic agents are ordinarily bound by the results of their
operations.” UCITA, Id. at § 102(a)(23) (defining electronic agent).
5 “Transferors use a licensing structure in part to restrict usage of the software. Enforcement of the
restriction should not depend on whether the software transferor labels the transfer a license or a sale. Instead,
enforcement should depend on (i) whether federal law renders the restriction unenforceable because it upsets
the intellectual property balance between exclusionary rights and creating a rich public domain; (ii) whether
the transferee had sufficient notice and opportunity to read the term restricting rights; and (iii) whether the
restriction runs afoul of public policy or unconscionability norms.” American Law Institute, Principles of the
Law of Software Contracts § 1.06 (2010).
6 F. LAWRENCE STREET & MARK P. GRANT, THE LAW OF THE INTERNET (New York: Lexis Law
Publishers, 1999) at 8.
7 Register.com, Inc. v. Verio, Inc., 356 F.3d 393, 403 (2d Cir. 2004).
8 Michael L. Rustad, Making UCITA More Consumer-Friendly, 18 J. MARSHALL J. COMPUTER & INFO.
L. 547, 551–52 (1999) (arguing the software licensing law is less developed than the law for durable goods).
9 The IOS is the operating system for Apple’s iPhone and iPod family of mobile devices.
10 In re Smartphone Geolocation Data Application, 977 F. Supp.2d 129 (E.D. N.Y. May 1, 2013) at 14.
law is how license agreements protect intangible assets such as software, data, and other
intangibles. In the 1970s, the software industry invented the shrinkwrap license
agreement, the earliest form of mass-market license. Vendors began using this
contracting form by the early 1980s. Licensing is beginning to displace sales and leases
as the chief means of transferring value in the information-based society. It’s already
“ranked as the third largest segment of the U.S. economy, behind only the automotive
industry and electronic manufacturing” and grew “five times faster than the economy as
a whole between 1996 and 2006.”18 Mass-market software publishers employ licensing
on a widespread scale accounting for over $500 billion in annual revenues. 19 Two of the
world’s largest companies, mass-market software producers Microsoft and Apple, with
market caps of $390.6 billion and $128.7 billion respectively, rely heavily on revenues
generated by software licensing. Apple, whose revenues are driven in large part by its
mobile phones, is the eighth largest company with a capitalization of $188.6 billion. 20
With a license, the licensor gives the licensee the right to use software or other digital
data for the term of the agreement.
Software can be reproduced at the click of a download button for almost no cost to
the licensor. As opposed to durable goods like plasma televisions, iPods, or dishwashers,
there is an endless supply of intangible software. The inimitable feature of licensed
content is that the number of users can be increased without whittling away or
diminishing the product.21 Licensing gives the licensee the right to use software or other
digital code for a designated period, in a bounded geographic area, for specified purposes.
In contrast, a licensing agreement gives the licensor the ability to control both the
users and uses. A clause in a license agreement may also limit use of software to a single
Central Processing Unit (CPU) on a computer workstation or server. A CPU license is
the right to use software on a specific CPU or CPUs designated by make and serial
number. Intersoft Solutions has devised a “multi-pack” license where the licensee may
use a copy of the software “identified in the multi-pack on the number of computers
associated with the multi-pack.”22 For example, a four-user multi-pack will give the
licensee the right to use the software on four computers concurrently.23 A software
license is accurately described as an instrument in the borderland between the law of
contracts and intellectual property law. Thus, the view that a license is merely a
covenant not to sue is a myopic view of licensing.
18 Steve Lohr, Study Ranks Software as No. 3 Industry, N.Y. TIMES (June 3, 1997) at D2; Jon M. Garon,
Media & Monopoly in the Information Age: Slowing the Convergence at the Marketplace of Ideas, 17 CARDOZO
ARTS & ENT. L.J. 491, 574 (1999) (stating that by 1996 computer software was ranked as the “third largest
segment of the U.S. economy, behind only the automotive industry and electronic manufacturing”) (citing
Ronald Rosenberg, Software Fastest Growing Industry, BOSTON GLOBE, June 5, 1997, at D2). The software
industry has been “projected to grow five times faster than the economy as a whole between 1996 and 2006
. . .” One Million New Positions Seen by 2006—Software Sets Pace for Future Job Growth, ELEC. ENG’G TIMES,
Jan. 5, 1998, at 1–2.
19 Software & Information Industry Association, Software and Information: Driving the Knowledge
Economy (January 24, 2008) at 7–8.
20 Id.
21 “Dilution is grounded on the idea that a trademark can lose its ability to clearly and unmistakably
distinguish one source through unauthorized use. It is a gradual whittling away of a distinctive trademark or
name. In order to establish a dilution claim, two elements must be shown: (1) ownership of a distinctive mark,
and (2) a likelihood of dilution. A likelihood of dilution can be established by a showing either of blurring or of
tarnishment.” Hormel Foods Corp. v. Jim Henson Prods., 73 F.3d 497, 506 (2d Cir. 2006).
22 Clientui License Agreement, http://www.intersoftpt.com/clientui/Licensing (2011).
23 Id.
Software publishers and content creators use licensing as the chief method of
transferring value for mass-market software products. Comparable to the creation of the
corporation or the limited liability company, the invention of the software license
agreement is equally significant. Licensing allows the software developer to prohibit
assignments or transfers of their product so the initial purchaser may not resell or
reproduce the copy. The legal invention of licensing makes it possible for a software
publisher to retain title to its information-based product and impose significant transfer
restrictions. This enables the software publisher to slice and dice pricing based upon a
complex array of variables. Software publishers have different fee schedules for
databases depending upon whether the user is a large corporation, a community library,
a small business, or a noncommercial user. Copyright publishers use copyright licenses
to commodify their information-based assets:
Although the copyright model may, at first glance, seem to provide adequate
protection for software, software providers frequently attempt to alter the
relationship created by that model by contracting with parties who receive
copies of the software, denominating such parties as copyright licensees rather
than purchasers. This approach is in stark contrast to the general approach of
publishers of hard copy materials. Such publishers usually simply place a
copyright notice on works of authorship, using the U.S. Copyright Act’s set of
enumerated rights and limitations as, essentially, a boilerplate contract. The
rationale behind these different approaches helps to illuminate the
shortcomings of the copyright regime in dealing with software. 24
A company’s licensing fees reflect not only the product chosen and the identity of
the user, but also the number of users for the chosen products. Software publishers and
content creators can charge different prices for licenses while retaining exclusive
reproduction and other rights under copyright law. For enterprises, royalties are
typically based upon such variables as the number of employees or the revenues of the
licensee. A license gives the licensee permission to use software, information, or other
content subject to conditions, permissions, and restrictions. Location and use restrictions
are necessary tools for software developers to realize their investment in developing
intangible information assets.25 Licenses have long been used to protect intellectual
property, including patents, copyrights, trademarks, and trade secrets. While protecting
the rights of the owner, licensing permits others to use the protected intellectual
property subject to the terms of the license agreement. In addition, the granting of a
license flows from the licensor to the licensee. In a license agreement, the licensor retains
the title and the intellectual property rights. Just as with leases, there is no transfer of
title or interest, only the right to use information.
In practice, software licensing typically includes affirmative obligations, conditions,
and covenants in addition to the licensor waiving its right to file a copyright infringement
lawsuit.26 Software makers use license agreements to engage in wholesale price
discrimination. This does not raise antitrust issues, but it does enable licensors to charge
24 Maureen O’Rourke, Drawing the Boundary Between Copyright and Contract: Copyright Preemption
of Software License Terms, 45 DUKE L. J. 479, 486 (1995).
25 A contract for the sale of goods is one in which a seller agrees to transfer goods that conform to the
contract in exchange for valuable consideration. U.C.C. § 2–301 (2011).
26 RAYMOND T. NIMMER & JEFF DODD, MODERN LICENSING LAW § 1:5 (Chapter One: Introduction and
Overview (Westlaw: 2008).
more for company-wide licenses. For example, a software publisher will charge
Caterpillar or General Motors more for an enterprise-wide license than for the price for
a consumer license. Licenses may charge more for software used in North America than
in Southeast Asia. They also enable the licensor to charge a university more for its
product than for a consumer transaction. Licensing is the one advanced contracting form
that makes arbitrage function well. EULAs give customers the right to use Microsoft
software.27 In a typical standard-form EULA license agreement, the end user agrees to
the EULA terms prior to downloading the software. A Single User License Agreement
(SULA) gives the licensee the right to use software on a single personal computer and to
make a backup. Software publishers, such as Oracle, Adobe, and Microsoft, make it clear
in their license agreement that they are not selling the software, but only giving a right
to use it. Symantec, a leading provider of anti-virus software, parcels out different
bundles of rights with respect to its software; depending on whether it is licensing to a
consumer or an enterprise. These rights bundled together as a “license,” are the only
“products” that Symantec conveys. Symantec retains the title and all rights to its
software. except for those rights that Microsoft expressly conveys through one of these
licenses. When an end-user downloads an Adobe product, they are given legal notice that
the software is licensed not sold and that they are subject to the licensing agreement.
(2.) Granting Clause
The granting clause determines what rights the licensor conveys to the licensee. A
license will recite all rights granted to the licensee in the licensing agreement. The
granting clause also specifies whether a license is exclusive or non-exclusive to the
licensee. An example of a broad granting clause in a license agreement is: “of all possible
rights and media including all rights then existing or created by the law in the future.”28
Use restrictions determine what is not included in the software transfer. “Many non-
exclusive licenses may be non-transferable without the licensor’s consent. In some
commercial licenses, the subject matter includes confidential information that is
protected by enforceable contractual use restrictions.”29 Granting clauses will typically
address the question of whether the licensee has a right to sub-license software or other
information to a third party. Licensing agreements are either “Perpetual” or “Non-
Perpetual.” “Perpetual” license agreements last forever and maintain their validity as
long as the “software is being used in accordance with the license-agreement
requirements.”30 Conversely, “non-perpetual” license agreements specify “the right to
use a particular licensed product until the end of the license-agreement term.”31
A software licensor may place geographic restrictions on use and may charge a
different price for a license in a different country. Additionally, a software license
agreement may grant a “non-exclusive and non-transferrable license” without specifying
that the license is “personal” to the licensee. Software licenses define the scope and
27 Microsoft.com, What Does the End User License Agreement (EULA) Say? http://www.microsoft.com/
resources/documentation/windows/xp/all/proddocs/en-us/lic_what_eula_say.mspx?mfr=true (2012).
28 U.C.C. § 2B–307(1) (2011).
29 UCITA § 503, cmt. 3(B).
30 Microsoft.com, Proof of License for Microsoft Software, Download Series, https://www.google.com/
?gws_rd=ssl#q=%E2%80%9D+%E2%80%9CPerpetual%E2%80%9D+license+agreements+last+forever+and+
maintain+their+validity+as+long+as+the+%E2%80%9Csoftware+is+being+used+in+accordance+with+the+li
cense-agreement+requirements.%E2%80%9D+30.
31 Id.
nature of the licensee’s authorized use. They may limit the customer’s use to internal
operations at a designated location or further restrict their use to a designated Central
Processing Unit. Typically software licenses will state that the customers will not “lend,
sell, give, lease, or otherwise disclose” the software systems without the licensor’s
approval. A licensor may also specify an event of default in a license agreement when
the licensee merges or is reorganized.32
The granting clause is the action section of the license agreement, which determines
how the licensed product may be used. It also determines what rights the licensor and
licensees have in the right to use the intellectual property and under what terms and
conditions. Software publishers typically classify their licensing transaction as exclusive,
semi-exclusive, or nonexclusive. An exclusive software license, like a non-exclusive one,
does not convey ownership, but does signify exclusive use of a product for the term of the
agreement. Exclusive licenses are frequent in software development agreements where
a company tailors a product to the specific needs of a single customer. With an exclusive
license agreement, the royalties must pay not only the entire development costs of the
software, but also projected profits as well. For example, CliniCon entered into a 2001
exclusive license agreement with a division of Bristol-Myers so that the pharmaceutical
giant had the sole right to use software that determines clinically driven skin and wound
care protocols.
Typically, the license grant will explain limitations on the number of users. The
granting clause first determines who can use information. Software license agreements
come in a mélange of affiliations, ranging from the simple bipartite relationship between
the licensor to licensee, to complex development contracts. 33 Software licensing permits
far greater control than either the sales or leases of goods. Arbitrage, the practice of
pricing licenses to software and other information based on the customer or its usage, is
easily accomplished through licensing agreements because it entails the practice of
calibrating the pricing of software to such factors as the nature of the customer or user. 34
For example, a software licensor may control the location, number of users, and even the
permitted uses of the software.
(3.) Definitions in Licensing Agreements
License agreements present key definitions in alphabetical order and define terms
used more than once in the agreement. Courts will review the definitions section as the
best evidence of the parties’ intent for the meaning of core provisions. Nevertheless,
courts may interpret key terms in unintended ways if the parties do not define them
precisely. Learned Hand famously stated, “Definitions are chameleons, which reflect the
color of their environment.”35 Therefore, the parties to license agreements should define
key terms with an eye to the possibility that a court will not understand either the
commercial setting or the technology. As a result, the parties must consistently define
32 Cincom Systems, Inc. v. Novelis Corp., 581 F.3d 431 (6th Cir. 2009) (software transaction was a
license with a non-transfer provision, so subsequent acquiring entity infringed when it used the software).
33 Id. at 316 (“As custom, therefore, software licensing has a historical pedigree that stretches to a
maximum of thirty years. The structure and purpose of software “licenses” that developed at that time . . . in
fairness cannot be compared to contemporary licensing practice, which developers rely on to limit
competition.”).
34 CARL SHAPIRO AND HAL R. VARIAN, INFORMATION RULES: A STRATEGIC GUIDE TO THE NETWORK
ECONOMY (Boston, Massachusetts: Harvard University Business School, 1998).
35 Commissioner v. National Carbide Co., 167 F.2d 304, 306 (1948).
and use key terms throughout the license agreement which best reflect the operational
environment where the software is being used.
(4.) First Sale Doctrine & Licensing
Generally, if the software publisher grants only a license to the copy of software and
imposes significant restrictions on the purchaser’s ability to redistribute or transfer that
copy, the purchaser is considered a licensee, not an owner, of the software. Software
publishers are far more likely to license their products than they are to sell or lease
them.36 The first sale doctrine applies in all fields of intellectual property law. 37 Under
the first sale doctrine, the patent owner cedes the right to file suit for patent
infringement for the patented article that they have sold. 38 Similarly, the first sale
doctrine of trademark law permits the purchaser of trademarked goods to resell the
trademarked goods without infringing the owner’s marks. Essentially, an intellectual
property owner cannot place conditions on goods once they are sold, which is an
undesirable result from the perspective of the intellectual property owner.
The U.S. Copyright Act confers several exclusive rights on copyright owners,
including the exclusive rights to reproduce their works and to distribute their works by
sale or rental.39 The exclusive distribution right is limited by the first sale doctrine, an
affirmative defense to copyright infringement that allows owners of copies of copyrighted
works to resell those copies. This means that “once a copyright owner sells a copy of the
copyrighted work, the owner has no continuing right to control either the use or
distribution of a particular copy of a copyrighted work.”40 Under the U.S. Copyright Act,
the first sale doctrine gives the purchaser of a copyrighted works the right to “sell or
otherwise dispose of the possession of that copy” without interference by the copyright
owner.41 The 1976 Act conceptualizes the public performance right to include the right
36 As the Ninth Circuit stated, “the first sale doctrine rarely applies in the software world because
software is rarely ‘sold.’ ” Wall Data Inc. v. Los Angeles County Sheriff’s Dep’t, 447 F.3d 769, 786 n.9 (9th Cir.
2006).
37 In patent law, the functional equivalent is the doctrine of exhaustion. Under 35 U.S.C. § 271, a
defendant can only be liable for infringement if the allegedly infringing acts are carried out “without authority.”
35 U.S.C. §§ 271(a), (f), (g). “The longstanding doctrine of patent exhaustion provides that the initial authorized
sale of a patented item terminates all patent rights to that item.” Quanta Computer, Inc. v. LG Elecs., Inc.,
553 U.S. 617, 625 (2008). “The exhaustion doctrine prohibits patent holders from selling a patented article and
then ‘invoking patent law to control post-sale use of the article.’ ” Excelstor Tech., Inc. v. Papst Licensing
GmbH & Co. KG, 541 F.3d 1373, 1376 (Fed. Cir. 2008). The rationale underlying the doctrine rests upon the
theory that an unconditional sale of a patented device exhausts the patentee’s right to control the purchaser’s
use of that item thereafter because the patentee has bargained for and received the full value of the goods.
Princo Corp. v. ITC, 616 F.3d 1318, 1328 (Fed. Cir. 2010) (en banc). Trademark exhaustion principles provide
trademark owners with certain rights to control the sale of a branded authentic product until it has been placed
on the market and there is a first sale.
38 The doctrine of patent exhaustion provides that the authorized sale of “an article that substantially
embodies a patent” exhausts the patent holder’s rights and prevents them from controlling post sale use of the
article through the use of patent law. Quanta Computer, Inc. v. LG Elec., Inc., 553 U.S. 617 (2008); See also,
Jazz Photo Corp. v. Int’l Trade Comm’n, 264 F.3d 1094, 1105 (Fed. Cir. 2001) (“When a patented device has
been lawfully sold in the United States, subsequent purchasers inherit the same immunity [as the seller
possessed] under the doctrine of Patent exhaustion.”).
39 Vernor v. Autodesk, Inc., 621 F.3d 1102, 1107 n. 1 (10th Cir. 2010).
40 MARK A. LEMLEY, ET AL., SOFTWARE AND INTERNET LAW 254–55 (New York, New York: Aspen
Casebook, 4th ed. 2011) (explaining how licensing enables the software publisher to control price
discrimination enabling arbitrage or selling the product at different prices in different markets (i.e. business-
to-consumer vs. business-to-business pricing)).
41 Bobbs-Merrill Co. v. Straus, 210 U.S. 339, 350–351 (1908) (recognizing first sale doctrine where
copyright owner sold its book with a printed notice announcing that any retailer who sold the book for less
than one dollar was responsible for copyright infringement; court held that the distribution right did not permit
the plaintiff to dictate subsequent sales of the book.).
42 17 U.S.C. § 101.
43 Kirtsaeng v. John Wiley & Sons, Inc., 133 S. Ct. 1351, 1355–56 (2013).
44 133 S. Ct. 1351 (2013).
45 621 F.3d 1102 (9th Cir. 2010) (holding that Vernor infringed Autodesk’s copyright when he resold
software products on eBay).
46 17 U.S.C. § 109(a).
47 17 U.S.C. § 117(a).
48 Id. at 1104.
49 To enforce its license agreement, Autodesk filed a number of DMCA takedown notices with eBay
arising out of listings of the software. Id. at 1105–06. Eventually, eBay suspended Vernor’s account. Id. at
1106. Chapter 10 explains the DMCA takedown procedures in detail.
50 The court found that Autodesk reserved title to its software copies and imposed significant transfer
and use restrictions. The court held that Autodesk’s customer from whom Vernor acquired the used copies was
a licensee not an owner of the copies. Id. at 1111–1112. The court thus concluded that neither Autodesk’s
original customer nor Timothy Vernor could sell or resell copies of the software under the first sale doctrine.
Id. at 1116.
The court reasoned that neither Autodesk’s original customer nor Vernor could sell
or resell copies of Autodesk’s software under the first sale doctrine. 51 “The first sale
doctrine does not apply to a person who possesses a copy of the copyrighted work without
owning it, such as a licensee.”52 The court developed a three-part test to determine
whether a software user was a licensee or owner of a copy where the copyright owner (1.)
specifies that the user is granted a license, (2.) significantly restricts the user’s ability to
transfer the software, and (3.) imposes notable use restrictions. 53 The court found that
Autodesk was licensing its product and therefore the first sale doctrine was
inapplicable.54
(B.) Licensing Litigation
In New-Crop LLC v. QED Clinical,55 a company failed to pay for an electronic
prescribing system it contracted to use, and continued to use the system’s data after the
license agreement ended. In NewCrop, the licensor delivered an electronic medication
prescribing system for CINA, the physicians and health care provider licensees. The
software licensed to the health care defendants “allegedly allowed physicians to send
prescriptions directly to pharmacies electronically via the Internet.”56 The defendant
licensees gained access through NewCrop’s website or through a software interface.57
“NewCrop said it discussed entering into a formal licensing agreement with CINA during
November 2007, but claimed it allowed CINA and its clients to access the system prior
to execution of the contract.”58 Under the license agreement, the defendants agreed, “to
pay monthly fees for the use of NewCrop’s electronic prescribing system.”59 Because of
CINA’s clients’ enrollment, CINA reportedly was obligated to submit a monthly report-
detailing enrollment by its clients and the fees payable to NewCrop.
In its license agreement with NewCrop, INA agreed to discontinue or disable its
links to NewCrop’s websites, and destroy any copies of data from NewCrop’s system upon
termination of the license agreement. CINA failed to make licensing payments and the
balance due was $44,117.60 After declaring the license agreement to be in breach, the
licensor “apparently blocked CINA from accessing its website, but CINA “continued to
use NewCrop’s data offline. NewCrop claimed it suffered damages totaling at least
$37,351.80 for CINA’s use of the data.”61 NewCrop filed a lawsuit against CINA,
asserting claims of quantum meruit, promissory estoppel, fraud and fraudulent
inducement, money had and received unjust enrichment, and a violation of the Texas
51 Id. at 1116.
52 Id. at 1107–1108.
53 Id. at 1111.
54 Id. (holding that a software user is a licensee rather than an owner of a copy where the copyright
owner specifies that the user is a licensee and noting that this arrangement significantly restricts the user’s
ability to transfer the software and imposes use restrictions).
55 2013 WL 1819926 (Tex. Dist., March 20, 2013).
56 Id.
57 Id.
58 Id.
59 Id.
60 Id.
61 Id.
Theft Liability Act.62 The parties settled for $118,000 plus costs and attorneys’ fees and
an injunction prohibiting CINA from further using NewCrop’s software and data.63
In most software license litigation where the licensee files suit against the
developer, it is because the delivered software does not conform to its specifications. In
Silicon Knights v. Epic Games,64 the video game developer licensed another company’s
videogame engine software. Silicon Knights entered into a license agreement with Epic
Games to license Unreal Engine 3 (UE3). The plaintiff contended that it was licensing
UE3 to use it in the development of videogames it was building for Xbox 360 and
PlayStation 3. They also contended that Epic misrepresented UE3’s capabilities and filed
to deliver updates or new releases in a timely manner and that UE3 did not work
properly and developed its own game engine. The lawsuit asserted claims of breach of
warranty, breach of contract, unfair competition, and fraud. Epic filed a counterclaim
that Silicon Knights breached their license agreement, misappropriated their trade
secrets and infringed their copyright. A jury agreed with Epic, finding that Silicon
Knight breached the license agreement and awarded Epic $2,650,000 in damages. The
jury also found Silicon Knights infringed Epic’s trade secrets and awarded another
$1,800,000. This case illustrates the high stakes nature of many software development
agreements. In many instances, there will be claims, counterclaims, and judgments for
many millions of dollars.
In most software licensing litigation where the developer is the plaintiff, the dispute
is over the duty of the licensee to pay royalties. In Educ. Logistics v. Laidlaw Transit65
a software developer was awarded $28.4 million after a licensee breached the licensing
agreement by failing to remit royalty payments when due and by failing to use its ‘best
efforts’ to promote the software to other users. Educational Logistics (Edulog), the
software developer, licensed a proprietary computer software system that uses digitized
maps and student databases to create bus routes for transporting students to and from
school. Edulog claimed its software would help school districts save money by
diminishing the number of school buses deployed for transportation services. Edulog
formed Logistics Management to license their software to school systems. Logistics
entered into a license agreement with Laidlaw Transit, one of the largest student
transportation services in North America. They entered into a five-year exclusive license
agreement, but retained the right to directly market to other customers. At the end of
the five-year exclusivity agreement, Laidlaw elected not to renew. Laidlaw though
retained a non-exclusive right to continue using the transportation software.
Edulog and Logistics contended Laidlaw breached the perpetual, non-exclusive
portion of their agreement by failing to use “best efforts” to promote the software. The
plaintiffs also contended that Laidlaw failed to pay royalties and failed to promote the
system. Laidlaw’s defense was that it no longer had a duty of “best efforts” once the five-
year exclusive agreement expired. Laidlaw also contended that Logistics (and Edulog)
materially breached their side of the agreement. The jury awarded the plaintiffs
$28,409,515, which included compensation for lost license fees, lost annual license
maintenance fees, lost perpetual license fees, lost royalties and breach. The court
62 Id.
63 Id.
64 2012 WL 6919153 (E.D.N.C., May 30, 2012).
65 2012 WL 8017634 (D. Mont., Nov. 15, 2012).
on a “take-it or leave it” basis with identical, non-negotiable terms for all licensees. They
are generally single-user licenses but may be bundled in multi-pack license, which
delineates the number of users. For example, Symantec, a leading anti-virus licensor
parcels out different bundles of rights depending on whether the user is a business or a
consumer entity. When an end-user of software downloads a digital product, they are
given a legal notice that the software is licensed, not sold, and that they are subject to
the terms of the licensing agreement, which is presented in the login screen. As
mentioned above, a typical EULA requires the licensee to click “I agree” to the terms of
service or other license agreement before they are permitted to download and use the
software.73
Each mass-market form is an adhesive contract where the licensee adheres to the
terms of the licensor and where there is no semblance of balanced terms. The typical
mass market license is characterized by (1.) a vendor-oriented choice of law provision,
(2.) a warning that the intellectual property rights are not transferred to the consumer,
(3.) a restricted scope to a single user, (4.) the consumer must de-install or destroy copies
of the software if he terminates the license, (5.) the vendor disclaims the implied
warranty of merchantability and fitness for a particular purpose, (6.) the licensor offers
the consumer a limited rather than full warranty, (7.) the consumer is not entitled to
updates for free, and (8.) the consumer submits in advance to jurisdiction in the vendor’s
home court.74
To paraphrase Woody Allen’s character, Alvy Singer in Annie Hall, U.S.-style TOU
agreements fall somewhere on the continuum between the horrible and the miserable. 75
TOU agreements, which are presented on a take it or leave it basis, are spreading faster
than the 2011 New York City bed bug epidemic. Just as bed bugs hide in cracks and
crevices of mattresses and box springs, sneakwrap documents, masquerading in the
clothing of contracts, purport to bind consumers to oppressive and unfair terms. The vast
majority of Internet contracts are standard form licenses defined in UCITA as transactions
targeting a broad market.76 Nancy Kim coined the term “wrap contract” to describe
BLAND JR. ET. AL., CONSUMER ARBITRATION AGREEMENTS: ENFORCEABILITY AND OTHER TOPICS 6–12 (2007)
(surveying the reasons why predispute mandatory arbitration diminishes rights of consumers).
73 “Sometimes forgotten in the Internet Age—where contracts of adhesion are often the rule for online
consumers—is the essential element of contract formation: mutual manifestation of assent.” (citing Mark A.
Lemley, Terms of Use, 91 MINN. L.REV. 459, 459–60 (2006) (noting how courts are moving away from the
principle that affirmative evidence of agreement is necessary to find a contract binding). Berkson v. Gogo LLC,
2015 WL 1699755 (E.D. N.Y. Apr. 9, 2015).
74 The term “mass market license” is new and the definition must be applied in light of its intended and
limited function. That function is to describe small dollar value, routine transactions involving information
that is directed to the general public when the transaction occurs in a retail market available to and used by
the general public. The term includes all consumer contracts and also some transactions between businesses
if they are in a retail market.
75 “I feel that life is divided into the horrible and the miserable. That’s the two categories. The horrible
are like, I don’t know, terminal cases, you know, and blind people, crippled. I don’t know how they get through
life. It’s amazing to me. And the miserable is everyone else. So you should be thankful that you’re miserable,
because that’s very lucky, to be miserable.” Annie Hall (Rollins-Joffe Productions 1977) (quoting the character
Woody Allen); See also, MICHAEL L. RUSTAD, SOFTWARE LICENSING: PRINCIPLES AND PRACTICAL STRATEGIES
292 (New York: Oxford University Press, 2010). (comparing this characterization of life by Woody Allen’s
character to quickwrap license agreements).
76 “When most people think about software licensing, they think about standard form mass-market
EULAs. These come in a variety of forms with a variety of colorful names such as “shrink wrap,” “boot screen,”
“click-wrap,” or “browse wrap” (or, less charitably, as “sneak wrap” or “autistic” licenses).” ROBERT W.
GOMULKIEWICZ, XUAN-THAO NGUYEN, & DANIELLE CONWAY-JONES, LICENSING INTELLECTUAL PROPERTY: LAW
AND APPLICATION 311 (New York: Aspen Publishers, 2008); UCITA § 102(a)(44).
77 NANCY S. KIM, WRAP CONTRACTS: FOUNDATIONS AND RAMIFICATIONS 2. (New York: Oxford
University Press, 2013).
78 Id. at 1–3.
79 Id. at 4.
80 Burcham v. Expedia, Inc., 2009 WL 586513, at *2 (E.D.Mo. March 6, 2009).
81 Fteja v. Facebook, Inc., 841 F. Supp. 2d 829, 837–38 (S.D.N.Y.2012).
82 Id. at 836.
83 Stomp Inc. v. Neato, 61 F. Supp. 2d 1074, 1080 n. 11 (C.D. Cal. 1999) (A “clickwrap agreement” allows
the consumer to manifest its assent to the terms of a contract by “clicking” on an acceptance button on the
website. If the consumer does not agree to the contract terms, the website will not accept the consumer’s order.
Such agreements are common on websites that sell or distribute software programs that the consumer
downloads from the website. The term “clickwrap agreement” is borrowed from the idea of “shrinkwrap
agreements,” which are generally license agreements placed inside the cellophane “shrinkwrap” of computer
software boxes that, by their terms, become effective once the “shrinkwrap” is opened.”).
84 See e.g., Zaltz v. JDATE, 2013 WL 3369073 *8 (E.D. N.Y. July 8, 2013) (upholding dating websites’
clickstream agreement); Doe v. Project Fair Bid Inc., No. C11–809 MJP, 2011 WL 3516073, *4 (W.D. Wash.
Aug. 11, 2011) (upholding clickwrap on Internet website.); TracFone Wireless, Inc. v. Anadisk LLC, 685 F.
Supp. 2d 1304, 1315 (S.D. Fla. 2010) (upholding clickstream agreement); A.V. v. iParadigms, LLC, 544 F. Supp.
2d 473, 480 (E.D. Va. 2008) (upholding clickwrap agreement where a student had to register for a term paper
service by creating a profile on defendant’s website and clicking “I Agree” to the terms of the user agreement,
which was displayed directly above the “I Agree” link that the student had to click).
85 Va. Code Ann. § 59.1–501.2(61).
86 Michael L. Rustad, Commercial Law Infrastructure For The Age of Information, 16 J. MARSHALL J.
COMPUTER & INFO L. 255, 300 (1997).
Increasingly, these agreements specify limited remedies and require the user to
waive the right to jury or a court resolution in favor of predispute, mandatory
arbitration. Mandatory arbitration is sometimes coupled with its running partner, anti-
class action waivers.87 Consumer licensees must agree to both forego the right to file
actions in court or join class actions as a condition of using data or software. The chart
below depicts the major form of mass license agreements in wide currency on the
Internet.88 In the 1980s, mass-market licensors began to use shrinkwrap license
agreements to govern terms and conditions for their software products. 89 While the
consumer’s title to the tangible copy of the software (a purchased CD-ROM, for example)
may be absolute, that does not confer property rights upon the intangible code that
makes up the software.
Licensing enables the useful practice of arbitrage, which is the common practice of
strategically calibrating software prices according to such factors as the amount of
competition, the value added, and the user’s ability to pay.90 During the formative period
of mass-market licenses in the 1980s, licensors used the term “shrinkwrap” or box top
license. In the new millennium, clickstream or clickwrap is the most popular type of
contract. Software vendors include clickstream agreements in so-called installwrap
agreements, where the customer agrees to the terms as a condition of downloading the
software. The installwrap is an agreement, which “pops up on the screen when the
software is actually being installed on the user’s computer, requiring the user to click an
“accept” button before the installation will conclude . . . if you decline to accept, the
installation will abort.”91 VeriSign’s installwrap for its Symbian export utility software
license states:
By clicking “I Accept” below, installing, or using this software, you are
consenting to be bound by and are becoming a party to this agreement. If you
do not agree to all of the terms of this agreement and any such third party
87 These provisions will not be enforced in European consumer transactions. Companies including such
provisions in terms of service, shrinkwrap, browsewrap, or clickwrap also face European enforcement actions
by entities that enforce consumer rights. See Council Directive 93/13/EEC of April 1993 on Unfair Terms in
Consumer Contracts, Annex, 1993 O.J. (L 95) 29, at letter (q) (excluding or hindering the consumer’s right to
take legal action or exercise any other legal remedy, particularly by requiring the consumer to take disputes
exclusively to arbitration not covered by legal provisions, unduly restricting the evidence available to him or
imposing on him a burden of proof which, according to the applicable law, should lie with another party to the
contract).
88 Robert A. Hillman & Jeffrey J. Rachlinski, Standard-Form Contracting in the Electronic Age, 77
N.Y.U.L. REV. 429, 464 (2002) (“Consumers enter into electronic contracts in two distinct ways: “browsewrap”
and “clickwrap’ contracts.”).
89 UCITA defines the Mass-Market license as “a standard form that is prepared and used in a Mass-
market transaction. UCITA, Id. at § 102(a)(45). A Mass-market transaction, in turn, means “(A) A consumer
transaction; or (B) any other transaction with an end user licensee if: (i) the transaction is for information or
informational rights directed to the general public as a whole including consumers, under substantially the
same terms for the same information; (ii) the licensee acquires the information or rights in a retail transaction
under terms and in quantity consistent with an ordinary transaction in a retail market.” § 102(a)(46).
90 CARL SHAPIRO AND HAL R. VARIAN, INFORMATION RULES: A STRATEGIC GUIDE TO THE NETWORK
ECONOMY (Boston: Harvard University Business School, 1998); ProCD, Inc. v. Zeidenberg, 86 F.3d 1447, 1449
(7th Cir. 1996) (noting that licensing enables software to be sold for a higher price for commercial users, while
the same product may be priced lower if use restrictions are enforceable and the license is restricted to non-
commercial use).
91 Christain H. Nasdan, Open Source Licensing: Virus or Virtue? 10 TEX. INTELL. PROP. L.J. 349, 377
(2002).
license agreements, which are applicable, do not install or use the software, or
click “I Do Not Accept,” and, if applicable, return this product to VeriSign. 92
The economic reality is that quickwrap licenses are an efficient form of contracting. They
are seldom read before being entered into by millions of online consumers around the
world. Nevertheless, consumers have a love/hate relationship with these mass-market
license agreements, as Amy Schmitz characterizes it:
On the one hand, consumers admit that they have no interest in reading form
contracts, enjoy the convenience and efficiency of form contracting, and
routinely accept forms “dressed up” as deals without stopping to read or
question their content. On the other hand, consumers are often frustrated with
the effectively nonnegotiable nature of these contracts and complain that they
lack the requisite time or understanding to read or negotiate companies’
impenetrable purchase terms.93
Types of Wrap Agreements
Box-top licenses were developed so that the license agreement or document would
be placed under the plastic wrapping of the box containing the CD-ROM. Think of
licensing as an advanced form of contract law with a multiplicity of different conditions,
covenants, and terms. Because licensors can retain control over the licensee’s use of the
intangible information after delivery, licensing is far more flexible than either sales or
leases. In contrast, the seller of a snowmobile generally cannot specify that it may only
96 A number of courts have enforced browsewrap even though they do not require the user to click a
specific box. Sw. Airlines Co. v. BoardFirst, L.L.C., 2007 WL 4823761, at 5 (N.D. Tex. Sept. 12, 2007); Molnar
v. 1-800-Flowers.com, Inc., 2008 WL 4772125, at 7 (C.D. Cal. 2008) (“Courts have held that a party’s use of a
website may be sufficient to give rise to an inference of assent to the terms of use.”). But see, Hines, 668 F.
Supp. 2d at 368 (holding that a forum-selection clause contained in browsewrap terms of use available through
a link at the bottom of a website was not enforceable because it was not “reasonably communicated” to
customer).
97 Roller v. TV Guide Holdings, LLC, 2013 WL 3322348 (Ark. Sup. Ct., June 27, 2013) (refusing to
enforcing browsewrap agreement absent evidence that the agreement was communicated to the user).
98 The federal district court recognized these wrap contracts in Berkson v. Gogo LLC, 2015 WL 1600755
(E.D. N.Y. Apr. 8, 2015).
99 Id. at *25.
100 Id. at *29.
be driven in state parks or farmland or within a given state’s boundaries. With the sale
of goods, the buyer receives ownership and title and can do whatever they want with the
product. With software and other information assets, the licensor retains control over
the customer’s uses. The license agreement determines who, what, where, when, why,
and how software may be used. The unique aspect of licensing versus sales or leases is
that it “enables a split of ownership and user rights in the information, but unlike hard
goods, information can be both transferred and retained.”101 Licensing software permits
software publishers to commodify their intellectual property assets. Unlike with sales or
leases, it is possible to have an infinite supply of licensed software.
Software makers used shrinkwrap licenses in the early 1980s, prior to the
development of the World Wide Web. Adobe, Inc., a leading software development and
publishing company, claimed that all of its software products were subject to a
shrinkwrap EULA that prohibited copying or commercial redistribution. Shrinkwrap
contracts are license agreements or other terms and conditions of a putatively
contractual nature, which can only be read and accepted by the consumer after they
break open the plastic wrapping surrounding the boxed software. The first paragraph of
a shrinkwrap license usually provides that the opening of the package signifies
acceptance of the license’s terms because a licensor needs to reference the fact that the
software is licensed.102 In general, it is advisable that the licensor include the terms of
the license agreement in every copy of the software and manuals, and note that the
software was licensed on the introductory screen display each time the software was
used. The license conditions access to and use of its service on the subscriber’s acceptance
of its terms and conditions. Shrinkwrap license agreements were developed to side-step
the U.S. Copyright Act’s first sale doctrine.”103
Shrinkwrap is cynically referred as “sneakwrap” as captured in a well-known
Dilbert cartoon.104 The cartoon begins with Dilbert stating: “I didn’t read all of the
shrinkwrap license agreement on my new software until after I opened it,”—and
concludes with Dilbert lamenting: “Apparently, I agreed to spend the rest of my life as a
towel boy in Bill Gates’ new mansion.”105 Standard form agreements are adhesion
contracts in which the licensee adheres to the terms of the stronger party. 106 The typical
Internet related shrinkwrap or other mass-market license agreement does not provide
101 Id. at 4.
102 This example is drawn from Morgan Laboratories, Inc. v. Micro Data Base Systems, Inc., 1997 WL
258886 (N.D. Cal. 1997).
103 The first sale doctrine of copyright law gives the owner of a lawfully made copy the power to “sell or
otherwise dispose of the possession of that copy” without the copyright holder’s consent.” Step-Saver Data Sys.
v. Wyse Tech., 939 F.2d 91, 96 n.7 (3d Cir. 1991) (quoting Bobbs-Merrill Co. v. Straus, 210 U.S. 339, 350 (1908)
(holding that a copyright owner’s exclusive distribution right is exhausted after the owner’s first sale of a
particular copy of the copyrighted work)). The first sale doctrine is now codified as Section 109 of the U.S.
Copyright Act. Section 109 of The U.S. Copyright Act states in relevant part: “the owner of a particular copy
. . . lawfully made under this title . . . is entitled, without the authority of the copyright owner, to sell or
otherwise dispose of the possession of that copy. . . .” U.S. Copyright Act, 17 U.S.C. § 109(a).
104 The term “sneak wrap” refers to online TOU agreements. See Ed Foster, ‘Sneak Wrap’ May Be a Good
Way of Defining the Maze of Online Policies, INFOWORLD, July 26, 1999, at 73 (describing sneak wrap as “where
the vendor reserves the right to change the terms of a deal at any time, and sneak notice of the change right
past you if they possibly can”).
105 Michael L. Rustad & Thomas H. Koenig, The Tort of Negligent Enablement of Cybercrime, 20 BERKELEY
warranties of any kind and foreclose any realistic remedy by requiring the consumer to
litigate in a forum of the vendor’s choice—often in a distant forum. Many shrinkwrap
license agreements generally begin with a legal notice followed by a disclaimer, or terms
of use, stating that breaking the shrinkwrap confirms the user’s acceptance of the license
terms.
(2.) Clickwrap Agreements
107 Liberty Syndicates at Lloyd’s v. Walnut Advisory Corp., Slip Copy, No. 09–1343, 2011 WL 5825777
Ill.App.Ct. 976, 984, 359 Ill.App.3d 976, 296 Ill.Dec. 258, 835 N.E.2d 113 (2005) (holding that within the
“browsewrap” context a computer seller’s use of a blue hyperlink to incorporate “Terms and Conditions of Sale”
was conspicuous and provided notice to the buyer because the link was included on numerous pages which
acted like a “multipage written paper contract”).
109 No. 14–CV–4513, 2015 WL 500180, at *7 (E.D.N.Y. Feb. 4, 2015).
(in a clickwrap agreement) to the terms of Conditions of Use, which are subject
to change.112
The court enforced Amazon’s TOU reasoning that: “Where the link to a website’s
terms of use is buried at the bottom of the page or tucked away in obscure corners of the
website where users are unlikely to see it, courts have refused to enforce the browsewrap
agreement,” however “where the website contains an explicit textual notice that
continued use will act as a manifestation of the user’s intent to be bound, courts have
been more amenable to enforcing browsewrap agreements.”113 In short, the
conspicuousness and placement of the ‘Terms of Use’ hyperlink . . . and the website’s
general design all contribute to whether a reasonably prudent user would have inquiry
notice of a browsewrap agreement.”114 The court reasoned:
In reaching this conclusion, the federal district court reviewed Amazon’s initial
sign-up page and final checkout page finding that the plaintiff had, at a
minimum, inquiry notice of the current terms of the Conditions of Use when
making his purchases. First, he expressly agreed, when he signed up for an
account with Amazon.com, to be bound by the terms of the Conditions of Use,
and indicated that, inter alia, he understood that the terms of the Conditions
of Use were subject to change.
Second, he was put on inquiry notice of the current terms each time he made a
purchase, as a conspicuous hyperlink to the current Conditions of Use each
time he made a purchase. Given (1.) the conspicuous placement of the
hyperlink to the current Conditions of Use on the checkout page, (2.) the
express warning at checkout that his purchases were subject to the terms of
the current Conditions of Use, and (3.) the fact that he expressly agreed, when
signing-up for an Amazon.com account, to be bound by the terms of the
Conditions of Use (including a provision notifying him that the conditions are
subject to change), this Court concludes that Plaintiff assented, each time he
made a purchase on Amazon.com, to be bound to the terms of the then-current
Conditions of Use.115
The making of contracts over the internet “has not fundamentally changed the
principles of contract.”116 In Ajemian v. Yahoo!, Inc.,117 the court discusses the
enforceability of a forum selection clause in a clickwrap agreement. Although forum
selection clauses have almost uniformly been enforced in clickwrap agreements, the
court discusses that there have been no such case where such a clause has been enforced
in a browsewrap agreement. Here, the record does not establish that the TOS was a
clickwrap agreement, or that terms of the TOS were displayed (in whole or part), or that
the terms were accepted by clicking “I accept” or by taking some similar action. As a
result, the record does not reflect that the terms of any agreement were reasonably
communicated or that they were accepted. To form such an agreement, users typically
click an “I agree” box after being presented with a list of terms and conditions of use.
112 Id.
113 Id.
114 Id.
115 Id.
116 Register.com, Inc. v. Verio, Inc., 356 F.3d 393, 403 (2d Cir. 2004).
117 83 Mass.App.Ct. 565, 987 N.E.2d 604 (Mass. Ct. App. May 7, 2013).
In State ex rel. U-Haul Co. of West Virginia v. Zakaib,118 the court held that an
oblique reference to an addendum in truck and trailer rental company’s pre-printed
rental contracts and electronic clickwrap contracts was insufficient to incorporate the
addendum and its terms, including its inclusion of an arbitration agreement, into the
contracts by reference. The references to the addendum were quite general, with no
detail provided to ensure that customers were aware of the addendum and its terms,
which was compounded by the fact that the addendum itself was designed to look more
like a document folder advertising products, services, and drop-off procedures, rather
than a legally binding contractual agreement. 119 A “click-wrap” agreement usually
appears on an Internet webpage and requires that a user consent to any terms or
conditions by clicking on a dialogue box on the screen in order to proceed with the
internet transaction.120
Clickwrap evolved out of shrinkwrap agreements that are “generally license
agreements placed inside the cellophane “shrinkwrap” of computer software boxes that,
by their terms, become effective once the “shrinkwrap” is opened.”121 The typical “click
through” website agreement requires end users to click on an “I agree” button that creates
a contract where the user agrees to submit to all of the terms and conditions set forth by
the licensor.122 Generally, the user must indicate acceptance of the clickwrap agreement
121 See Stomp, Inc. v. NeatO, LLC, 61 F. Supp. 2d 1074, 1080 n.11 (C.D. Cal.1999) (upholding choice of
venue clause).
122 See e.g., Register.com, Inc. v. Verio, Inc., 356 F.3d 393, 429 (2d Cir. 2004) (“Essentially, under a
clickwrap arrangement, potential licensees are presented with the proposed license terms and forced to
expressly and unambiguously manifest either assent or rejection prior to being given access to the product.”).
See e.g., Appistry, Inc. v. Amazon.com, Inc., 2015 WL 881507 (W.D. Wash. 2015) (enforcing clickwrap
agreement where website user had reasonable notice of the terms and manifested assent to the agreement by
clicking agreement to Amazon’s customer agreement); Nicosia v. Amazon, 2015 U.S. Dist. LEXIS 13560
(E.D.N.Y. Feb. 4, 2015) (finding that plaintiff assented to [c]onditions of [u]se posted on Amazon.com each time
he completed a purchase, “[g]iven (1) the conspicuous placement of the hyperlink to the current [c]onditions of
[u]se on the checkout page, (2) the express warning at checkout that his purchases were subject to the terms
of the current [c]onditions of [u]se, and (3) the fact that he expressly agreed, when signing-up for an
Amazon.com account, to be bound by the terms of the [c]onditions of [u]se (including a provision notifying him
that the conditions are subject to change)”); Newell Rubbermaid Inc. v. Storm, No. CV 9398–VCN, 2014 WL
1266827 (Del. Ch. Mar. 27, 2014) (upholding a clickwrap “a checkbox underneath the hyperlink read, “I have
read and agree to the terms of the Grant Agreement.”); Bassett v. Elec. Arts, Inc., 2015 WL 1298644 (E.D. N.Y.
Feb. 9, 2015) (upholding clickwrap were user had opportunity to review terms and manifested assent by
clicking agreement); Hines v. Overstock.com, Inc., 380 F. App’x 22, 25 (2d Cir. 2010) (“New York courts find
that binding contracts are made when the user takes some action demonstrating that they have at least
constructive knowledge of the terms of the agreement, from which knowledge a court can infer acceptance.”);
Centrifugal Force, Inc. v. Softnet Commc’n, Inc., No. 08–CV–5463, 2011 WL 744732, at *6–8 (S.D.N.Y. Mar. 1,
2011) (finding binding clickwrap software license agreement); Burcham v. Expedia, Inc., No. 4:07CV1963 CDP,
2009 WL 586513, at *1, 3 (E.D. Mo. Mar. 6, 2009) (upholding clickwrap agreements (i) a “Continue” button led
to a page where it stated, “By continuing on you agree to the following terms and conditions,” and provided the
entire terms of agreement in full text, and (ii) a box stated, “I agree to the terms and conditions,” while the
phrase, “terms and conditions,” was a hyperlink to a user agreement). Feldman v. Google, Inc., 513 F. Supp.
2d 229, 233 (E.D. Pa. 2007) (upholding forum selection clause binding where online contract between internet
advertising service and would-be advertiser read in bold at top “Carefully read the following terms and
conditions,” adding, “If you agree with these terms, indicate your assent below’ and user could only progress
by clicking on box marked ‘accept’ ” and “terms of use” were presented to user in scrollable window); Recursion
Software, Inc. v. Interactive Intelligence, Inc., 425 F. Supp. 2d 756 (N.D. Tex. 2006) (concluding that “clickwrap
licenses . . . , are valid and enforceable contracts” and enforcing arbitration clause when the user was required
to accept before installing software).
to proceed with the installation. 123 Like shrinkwrap, the clickwrap spells out permitted
and restricted uses by licensees. U.S. courts will enforce clickwrap agreements so long
as the user has an opportunity to review the terms and manifest assent, even though
most users fail to read the terms before clicking the “I agree” button.
Clickwrap agreements allow users to manifest assent to contractual terms
presented to the user before installation of computer software programs. The clickwrap
spells out permitted and restricted uses by visitors. In a clickstream agreement, the
licensor conditions a licensee’s use of a website on the user agreeing to the site’s terms
and conditions. The Tenth Circuit U.S. Court of Appeals observed:
Clickwrap agreements are increasingly common and have routinely been
upheld. Federal and state courts typically evaluate clickwrap agreements by
applying state law contract principles. Courts evaluate whether a clickwrap
agreement’s terms were clearly presented to the consumer, the consumer had
an opportunity to read the agreement, and the consumer manifested an
unambiguous acceptance of the terms. 124
A large number of courts have validated clickwrap agreements if they find users
have an opportunity to review the terms and manifest assent. 125 In Newell Rubbermaid
Inc. v. Storm,126 the Delaware Chancery Court found that a valid clickwrap agreement
was formed when the licensor included a (i) box titled “Grant Terms and Agreement”
that stated: ‘[y]ou must read your Grant Agreement and review the terms to continue,”
(ii) an agreement was provided in a hyperlink, and (iii) a checkbox underneath the
hyperlink read, “I have read and agree to the terms of the Grant Agreement.”127 Newell
Rubbermaid gave Storm one of its more valued employees the equivalent of a stock
option. However, to qualify for the stock option, the user had to click “the “accept” button.
In 2013, Storm again clicked the “Accept” but she claimed that she did not know that
she was manifesting assent to the nondisclosure and nonsolicitation terms in the
clickwrap.
Storm argued that she had not read the agreement nor was she given consideration
for the nondisclosure, nonsolicitation agreements. However, the box included the
statement that she had read the agreement and the court enforced the clickwrap and the
nondisclosure and nonsolicitation agreements. The court concluded that “while Newell’s
method of seeking Storm’s agreement to the post-employment restrictive covenants,
although certainly not the model of transparency and openness with its employee, it was
not an improper form of contracting.”128 The court noted that Storm was directed to a
screen, which in several places referenced the 2013 Agreements. In addition she
admitted that she clicked the checkbox next to which were the words “I have read and
123 Realpage, Inc. v. EPS, Inc., 560 F. Supp.2d 539 (2007) (quoting Specht v. Netscape Commc’ns. Corp.,
125 See e.g., Zaltz v. JDATE, 2013 WL 3369073 *8 (E.D. N.Y. July 8, 2013) (upholding dating websites’
clickstream); Serrano v. Cablevision Sys. Corp., 863 F. Supp. 2d 157, 164 (E.D.N.Y. 2012) (“ ‘[C]lick-wrap’
contracts are enforced under New York law as long as the consumer is given a sufficient opportunity to read
the end-user license agreement, and assents thereto after being provided with an unambiguous method of
accepting or declining the offer.”); Jallali v. Nat’l Bd. of Osteopathic Med. Examiners, Inc., 908 N.E.2d 1168,
1173 (Ind. Ct. App. 2009) (upholding clickwrap agreement under general contract principles).
126 No. CV 9398 VCN, 2014 WL 1266827, at *2 (Del. Ch. Mar. 27, 2014).
agree to the terms of the Grant Agreement.” Courts will not enforce clickwraps where
the hyperlink is inconspicuous or a reasonable user would not notice them or be aware
that they were entering a contract.129 In Ngyuen v. Barnes & Noble,130 the court noted
that:
Contracts formed on the Internet come primarily in two flavors: ‘clickwrap’ (or
‘click-through’) agreements, in which website users are required to click on an
‘I agree’ box after being presented with a list of terms and conditions of use;
and ‘browsewrap’ agreements, where a website’s terms and conditions of use
are generally posted on the website via a hyperlink at the bottom of the
screen.’131
(3.) Browsewrap
law and finding clickwrap agreement not binding where website did not make explicitly clear that button
marked “I Accept” indicated assent to “terms of use” presented in scrollable window at top of webpage, in
between which was other text requesting separate authorization); Savetsky v. Pre-Paid Legal Servs., 2015 WL
604767 (N.D. Ca. Feb. 12, 2015) (ruling that LegalShield user did not consent to arbitrate disputes at any point
when entering into a hybrid agreement with some features of clickwrap); Berkson v. Gogo LLC, 2015 WL
1600755 (E.D. N.Y. Apr. 9, 2015) (refusing to enforce venue and arbitration clause in provider’s sign-up wrap
noting that “[c]lickwrap refers to the assent process by which a user must click “I agree,” but not necessarily
view the contract to which she is assenting.”; observing that clickwrap agreements necessitate an active role
by the user of a website and that courts generally find them enforceable; “Click agreements require a user to
affirmatively click a box on the website acknowledging awareness of and agreement to the terms of service
before he or she is allowed to proceed with further utilization of the website. By requiring a physical
manifestation of assent, a user is said to be put on inquiry notice of the terms assented to.”); See generally,
Juliet M. Moringiello and William L. Reynolds, From Lord Coke to Internet Privacy: The Past, Present, and
Future of the Law of Electronic Contracting, 72 MD. L. REV. 452, 466 (2013) (“In the world of electronic
contracts, clickwrap is a meaningless term. Click-to-agree transactions come in many flavors. Sometimes the
click is at the end of the terms so that a reader must at least scroll through to reach the ‘I agree’ icon, while
[at] other times the click is next to a hyperlink that leads to the terms, either in one click or in several. Whether
the terms are classified as clickwrap says little about whether the offeree had notice of them.”).
130 763 F.3d 1173 (9th Cir. 2014).
132 Register.com, Inc. v. Verio, Inc., 356 F.3d 393, 401–04 (2d Cir.2004) (finding likelihood of success on
the merits in a breach of browsewrap claim where the defendant “admitted that . . . it was fully aware of the
terms” of the offer); Sw. Airlines Co. v. BoardFirst, L.L.C., 06–CV–0891,2007 WL 4823761 at *4–6 (N.D.Tex.
Sept. 12, 2007) (finding proper formation of a contract where defendant continued its breach after being
notified of the terms in a cease and desist letter); Ticketmaster Corp. v. Tickets.Com, Inc., No. CV–997654,
2003 WL 21406289 (C.D.Cal. Mar. 7, 2003) (denying defendants’ summary judgment motion on browsewrap
contract claim where defendant continued breaching the contract after receiving letter quoting the browsewrap
contract terms); Fteja v. Facebook, Inc., 841 F. Supp. 2d 829, 835, 838–40 (S.D.N.Y.2012) (enforcing forum
selection clause in terms of service linked to webpage that provided “By clicking Sign Up” you indicate
acceptance of the terms); Cairo, 2005 WL 756610 (enforcing browsewrap forum selection clause where plaintiff
“admit[ted] to actual knowledge” of the agreement). Be In, Inc. v. Google Inc., No. 12–CV–03373–LHK, 2013
WL 5568706, at *7 (N.D. Cal. Oct. 9, 2013).
133 Id.
134 Van Tassell v. United Mktg. Grp., LLC, 795 F. Supp. 2d 770, 790 (N.D. Ill. 2011).
of the website will act as a manifestation of the user’s intent to be bound.”135 Browsewrap
agreements purport to bind the users of websites to which the agreements are
hyperlinked as the Be In Inc. v. Google Inc.136 court states: Browsewrap agreements are
those that purport to bind the users of websites to which the agreements are
hyperlinked. Generally, the text of the agreement is found on a separate webpage
hyperlinked to the website the user is accessing.
Browsewrap agreements are generally entitled “Terms of Use” or “Terms of
Service.” The defining feature of browsewrap agreements is that the user can continue
to use the website or its services without visiting the page hosting the browsewrap
agreement or even knowing that such a webpage exists. How much notice the user has
of the existence of the agreement varies in large part based on the design and content of
the website and the browsewrap agreement’s webpage. Often, the hyperlinks, which
point to the browsewrap agreement, are explicit about both the binding nature of the
agreement and the fact that continued use of the website will act as a manifestation of
the user’s intent to be bound.137 “The defining feature of browsewrap agreements is that
the user can continue to use the website or its services without visiting the page hosting
the agreement or even knowing that such a webpage exists.”138 Browsewraps are
inherently riskier than clickwraps because courts require providers to prove that the
user has actual or constructive notice of the terms of use. 139 A browsewrap agreement
discloses terms on a website that offers a product or service to the user, and the user
assents by visiting the website to purchase the product or enroll in the service.”140 The
Id.
135
139 See e.g. Van Tassell v. United Mktg. Grp., LLC, 795 F. Supp. 2d 770, 792–93 (N.D.Ill.2011) (refusing
to enforce browsewrap arbitration clause in website terms of use which was only noticeable after a “multi-step
process” of clicking through nonobvious links); Jerez v. JD Closeouts, 36 Misc. 2d (Mar. 20, 2012) (finding
browsewrap forum selection clause unenforceable when it was “buried” and “could only be found by clicking on
an inconspicuous link on the company’s ‘About Us’ page”); Hines v. Overstock.com, Inc., 380 Fed.Appx. 22, 25
(2d Cir.2010). See generally, Mark A. Lemley, Terms of Use, 91 MINN. L.REV. 459, 477 (2006) (“Courts may be
willing to overlook the utter absence of assent only when there are reasons to believe that the [website user]
is aware of the [website owner’s] terms.”).
140 Schnabel v. Trilegiant Corp., 697 F.3d 110, 129 n. 18 (2d Cir.2012); Ticketmaster Corp. v.
Tickets.com, Inc., No. 99–CV–7654, 2003 WL 21406289, , at *2 (C.D. Cal. March 7, 2003) (applying California
law in finding binding contract where defendant company was put on reasonable notice of “terms of use” of
competitor’s website, plaintiff having “placed in a prominent place on the home page the warning that
proceeding further binds the user to the conditions of use” and defendant accessed the site repeatedly). “An
examination of the cases that have considered browsewraps in the last five years demonstrates that the courts
have been willing to enforce terms of use against corporations, but have not been willing to do so against
individuals.”); Kwan v. Clearwire Corp., 2012 WL 32380 (W.D. Wash. Dec. 28, 2011) (“In a browsewrap
agreement, the terms and conditions of use for a website or other downloadable product are posted on the
website typically as a hyperlink at the bottom of the screen. Unlike a click-wrap agreement, where the user
must manifest assent to the terms and conditions by clicking on an “I agree” box, browse-wrap agreement does
not require this type of express manifestation of assent. Rather, a party instead gives his or her assent by
simply using the product, such as by entering the website or downloading software. In ruling upon the validity
of browse-wrap agreements, courts primarily consider whether a website user has actual or constructive notice
of the terms and conditions prior to using the website or other product.”); Pollstar v. Gigmania Ltd., 170 F.
Supp. 2d 974, 2000 WL 33266437 (E.D. Cal. 2000) (“[A] browsewrap license is part of the web site[, e.g., license
terms are posted on a site’s home page or are accessible by a prominently displayed hyperlink,] and the user
assents to the contract when the user visits the web site. No reported cases have ruled on the enforceability of
a browsewrap license.”); Be In, Inc. v. Google Inc., No. 12–CV–03373, 2013 WL 5568706 at *6 (N.D Cal. Oct. 9,
2013) (observing that proximity and website layout are the most important variables for enforceability; to be
binding, consumers must have reasonable notice of a company’s “terms of use” and exhibit ‘unambiguous
assent’ to those terms.”); Hancock v. Am. Tel. & Tel. Co., 701 F.3d 1248, 1257–58 (10th Cir. 2012) (validating
term “browsewrap” signifies a form of contracting that purports to bind website visitors
even if they do no perform affirmative acts such as clicking “yes” to agree.141 A defining
feature of a browsewrap license is that it does not require the user to manifest assent to
the terms and conditions expressly—the user need not sign a document or click on an
“accept” or “I agree” button to be bound by the agreement. Assent is even more
attenuated in browsewrap agreements than in the clickwrap or shrinkwrap contexts
because “user[s] can continue to use the website or its services without visiting the page
hosting the browsewrap agreement or even knowing that such a webpage exists.”142
Courts usually uphold browsewrap if the user “has actual or constructive knowledge of
a site’s terms and conditions prior to using the site.”143
The contract formation of a “browse-wrap agreement” is that an agreement is
formed simply by a website visitor’s use of the website or browsing the website, without
requiring the visitor to click on anything or indicate any other explicit manifestation of
assent. ‘Some U.S. courts are reluctant to enforce browsewrap because of the difficulty
of proving that the terms of use were actually communicated to the user. 144 In Hines v.
Overstock.com, Inc.,145 the federal court denied the defendant’s motion to dismiss
because consumer had no notice of the “terms and conditions” on the retailer’s website
and therefore the browsewrap was unenforceable. The court noted that the website did
not give the user a prompt to review the terms and the link was inconspicuously
displayed. Similarly, in In re Zappos.com, Inc., Customer Data Breach Sec. Litig.,146 the
court applying Nevada law found a browsewrap agreement unenforceable where the
hyperlink to “ ‘terms of use’ is ‘inconspicuous, buried in the middle to bottom of every
Internet agreement that gave customer an opportunity to review and a manifestation of assent because
customer had to click an ‘I Agree’ button to continue with registration process and activation of internet
service.”). Southwest Airlines Co. v. BoardFirst, L.L.C., 2007 WL 4823761 (N.D. Tex. Sept. 12, 2007). (“The
validity of a browsewrap license turns on whether a website user has actual or constructive knowledge of a
site’s terms and conditions prior to using the site. Where a website fails to provide adequate notice of the terms,
and there is no showing of actual or constructive knowledge, browsewraps have been found unenforceable.”);
Small Justice LLC v. Xcentric Ventures LLC, 2015 WL 1431071 (D. Mass. Mar. 27, 2015) (concluding that the
blogger transferred copyright ownership to Xcentric by means of an enforceable browsewrap agreement and
that Xcentric was thus entitled to summary judgment as to Count I (declaratory judgment as to copyright
ownership)). Cf. Berkson v. Gogo LLC, 2015 WL 1600755 (E.D.N.Y. Apr. 8, 2015) (refusing to enforce scrollwrap
and observing that “Browsewraps can take various forms but basically the website will contain a notice that—
by merely using the services of, obtaining information from, or initiating applications within the website—the
user is agreeing to and is bound by the site’s terms of service. Because of the passive nature of acceptance in
browsewrap agreements, courts closely examine the factual circumstances surrounding a consumer’s use.
141 Facebook, by far the largest social network site, structures its terms of use as a browsewrap with the
following introductory clause: “By using or accessing Facebook, you agree to this Statement.” Statement of
Rights and Responsibilities, Facebook, http://www.facebook.com/terms.php?ref=pf; See Fteja v. Facebook, Inc.,
841 F. Supp.2d 829, 835, 838–40 (S.D.N.Y.2012) (enforcing forum selection clause in terms of service linked to
webpage that provided “By clicking Sign Up, you are indicating that you have read and agree to the Terms of
Service” against user who clicked “Sign Up”).
142 Be In, Inc. v. Google Inc., No. 12–cv–03373–LHK, 2013 WL 5568706, at *6 (N.D. Cal. Oct. 9, 2013).
143 See Southwest Airlines Co. v. BoardFirst, LLC, 2007 WL 4823761, at *5 (N.D.Tex. Sept.12, 2007).
144 Roller v. TV Guide Holdings, LLC, 2013 WL 3322348 *8 (Ark. Sup. Ct., June 27, 2013) (stating: “In
this case, TV Guide has not demonstrated that the terms of the agreement were communicated to appellants.
TV Guide’s assertions that appellants had notice of the agreement stem from appellants’ mention of the
agreement in their complaint. However, this is insufficient as the dispositive issue in determining if an
enforceable agreement existed is whether appellants had constructive or actual knowledge of the terms of the
agreement and therefore agreed by their use of TV Guide’s website to be bound by those terms.”).
145 668 F. Supp.2d 362, 365 (E.D. N.Y. 2009).
[defendant] webpage among many other links, and the website never directs a user to
the Terms of Use.”147
148 2015 U.S. Dist. LEXIS 17591 (N.D. Cal. Feb 12, 2015).
manifestation of assent to the site’s terms of service.149 “So, for example, the term in its
purest form includes an interface that presents a link at the bottom of the page to the
terms and conditions. It also includes more ambiguous situations, such as where there
is a statement that the purchase is governed by terms that are linked to the page,” but
requires no clicking of “a radio button acknowledging the terms.”150
In Southwest Airlines Co. v. BoardFirst, L.L.C.,151 the Texas court stated that the
enforceability of browsewrap “turns on whether a website user has actual or constructive
knowledge of a site’s terms and conditions prior to using the site. Where a website fails
to provide adequate notice of the terms, and there is no showing of actual or constructive
knowledge, browsewraps have been found unenforceable.”152 Assent is even more
attenuated in browsewrap agreements than in the clickwrap or shrinkwrap contexts
because “user[s] can continue to use the website or its services without visiting the page
hosting the browsewrap agreement or even knowing that such a webpage exists.”153 In
AvePoint, Inc. v. Power Tools, Inc.,154 the court held that the software developer’s
competitor was in violation of the website’s terms and conditions listed in the
browsewrap agreement when they used the developer’s computer network under false
pretenses to download a trial copy of developer’s trademarked “AvePoint” software for
competitive, rather than personal purposes, without authority to do so. Browsewrap
agreements are those that purport to bind the users of websites to which the agreements
are hyperlinked.155 A defining feature of an internet browsewrap agreement is that it
does not require a user to manifest assent to the terms and conditions expressly, since
the user does not click an “I accept” button but rather gives assent by using the website
itself.156 The validity of a browsewrap agreement generally turns on whether a website
user has actual or constructive knowledge of a site’s terms and conditions prior to using
the site.157
The agreement in Major v. McAllister158 illustrated a typical example of
browsewrap. In Major, the court found mutual assent when a website user of the
ServiceMagic site assented to a forum selection clause contained in an Internet website
browsewrap agreement, even though her assent did not require a “click.”159 In that
browsewrap case, the website placed immediately visible notice of the existence of license
terms on the site. The website stated: “By submitting you agree to the Terms of Use” and
placing a blue hyperlink next to the button that user pushed, second link to those terms
was visible on the same page without scrolling, and similar links were on every other
website page.”160 U.S. courts enforce forum selections in favor of the stronger party so
149 “Most courts which have considered the issue, however, have held that in order to state a plausible
claim for relief based upon a browsewrap agreement, the website user must have had actual or constructive
knowledge of the site’s terms and conditions, and have manifested assent to them[,]” Cvent, Inc. v. Eventbrite,
Inc., 739 F. Supp.2d 927, 937 (E.D. Va. 2010).
150 Ronald J. Mann & Travis Siebeneicher, Just One Click: The Reality of Internet Retail Contracting, 108
152 Id.
153 Be In, Inc. v. Google Inc., No. 12–cv–03373–LHK, 2013 WL 5568706 at *6 (N.D. Cal. Oct. 9, 2013).
long as they are not unreasonable. “A forum selection clause is unreasonable if: (1.) its
incorporation into the agreement was the result of fraud or overreaching; (2.) the
complaining party will be deprived of his day in court due to the grave inconvenience or
unfairness of the selected forum; (3.) the fundamental unfairness of the chosen law may
deprive the plaintiff of a remedy; or (4.) the clause contravenes a strong public policy of
the forum state.”161
Browsewrap binds the user when a user merely browses the website or social media
site.162 Facebook, for example, structures its terms of use as a browsewrap with the
following introductory clause: “By using or accessing Facebook, you agree to this
Statement.” Browsewrap agreements dictate that additional browsing past the homepage
constitutes the mutual assent.163 Unlike shrinkwrap or clickwrap, browsewrap raises an
issue of whether the user has manifested assent. Courts will strike down browsewrap
where it is not clear whether users have notice. Browsewrap may take various forms but
typically, they involve notice on a website that conditions use of the site upon compliance
with certain terms or conditions. These terms may be included on the same page as the
notice or accessible via a hyperlink. “A hyperlink electronically provides direct access
from one internet location/file to another, typically by clicking a highlighted word or icon.
An online reference work, for example, may hyperlink words or terms in its text to their
respective definitions.”164
In Register.com, Inc. v. Verio, Inc.,165 the domain name database’s terms of service
(TOS) were structured as a browsewrap. The TOS stated that the user was agreeing to
the terms and conditions by merely submitting a query to the database. The court stated:
[w]hile new commerce on the Internet has exposed courts to many new
situations; it has not fundamentally changed the principles of contract, and
holding that contract terms on website were enforceable when offeree who
should have been aware of terms accepted services from offeror. 166
The TOS provided that by submitting a query, they were bound by the terms and
conditions.167 The website visitor contended that it did not click agreement to
Register.com’s TOS and was thus not bound by its provisions. Nevertheless, the Second
Circuit upheld the browsewrap finding that the defendant’s submission of the WHOIS
query manifested its consent to Register.com’s TOS.168 The court enjoined Verio from
164 Major v. McCallister, 302 S.W.3d 227, 228 (Mo App. 2009).
167 Id.
168 ICANN is considering a radical reform of its WHOIS system as noted in a recent report:
As the Expert Working Group on gTLD Directory Services (EWG), we have proposed a
paradigm shift—a new system in which gTLD registration data is collected, validated and disclosed
for permissible purposes only, with some data elements being accessible only to authenticated
requestors that are then held accountable for appropriate use. Our objective is to reexamine and
define the purpose of collecting and maintaining gTLD directory data, consider how to safeguard
the data, and propose a next generation solution that will better serve the needs of the global
Internet community.
Internet Corporation for Assigned Names and Numbers (ICANN), Explore the Draft Next Generation gTLD
Directory Services Model (June 24, 2013), http://www.icann.org/en/news/announcements/announcement-3-24
jun13-en.htm.
169 14 C1850 (N.D. Ill., Feb. 5, 2015) (finding scroll bar to be insufficient to inform users that they were
2015).
171 2015 WL 1600755 (E.D. N.Y. Apr. 9, 2015).
173 For example, CafeMom’s terms of service apply to all users of the site, and the provider reserves the
right to change terms by simply posting them to the site. Terms of Service, CAFEMOM, http://www.cafemom.
com/about/tos.php (“CafeMom reserves the right to update or change these TOS at any time by posting the
most current version of the TOS on the Site. Your continued use of the Site after we post any changes to the
TOS signifies your agreement to any such changes.”); See also, Terms and Conditions, AUDIMATED, http://
www.audimated.com/legal.php), Terms of Service, SECONDLIFE, http://secondlife.com/corporate/tos.php. and
Terms of Service, STUMBLEUPON, http://www.stumbleupon.com/terms.
174 Id. at *29 (See, e.g., Feldman, 13 F. Supp. 2d at 236–38 (holding that the plaintiff had the duty to
read terms that were presented in a scroll box and required a click to agree and, therefore, the fact that the
entire contract was not visible in the scroll box was irrelevant); Bar-Ayal v. Time Warner Cable Inc., No. 03–
CV–9905, 2006 WL 2990032, at *9–10 (S.D.N.Y. Oct. 16, 2006) (finding acceptance where scrolling though
thirty-eight screens of text was required—essentially the entire agreement); Moore v. Microsoft Corp., 293
A.D.2d 587, 741 N.Y.S.2d 91, 92 (2d Dep’t 2002) (contract formed when “[t]he terms of the [agreement] were
prominently displayed on the program user’s computer screen before the software could be installed,” and “the
program’s user was required to indicate assent to the [agreement] by clicking on the ‘I agree’ icon before
Terms of service must also be reasonably presented or risk that a court will not
enforce them.175 Common terms address user submissions, prohibited content
(pornography, IP rights, rights of publicity, commercial content or endorsements,
promotions, sweepstakes, software viruses, and other malicious or illegal content),
community norms, responsibility for submissions posted on the service, ownership of the
site, refusal to post or removal of postings, termination of accounts, ownership of content
choice of law, choice of forum, privacy policies, warranty disclaimers, limitations of
liability, intellectual property infringement, notice and takedown provisions, licenses to
use submissions, third party websites and services (no endorsements), provisions for
modifying the agreement, integration or merger clauses and provisions for the
termination and modification of the agreement.176 TOU establish the terms and
conditions for online purchases; it may limit the site’s liability for damage that its
content and services cause to users.
A website may, through its TOU, obtain the rights to use and reproduce content
users post to a website, such as comments to a blog. In addition, TOUs may condition or
restrict the subsequent uses a website visitor may make of content that he or she
previously accessed on the website. TOU are often structured as clickwrap, browsewrap,
or a hybrid contracting form, which like scrollwrap or sign-in-wrap.177 Courts
considering browsewrap terms of service have held that “the validity of a browsewrap
license turns on whether a website user has actual or constructive knowledge of a site’s
terms and conditions prior to using the site.”178 The lesson from a decade of terms of
service is that the terms of service must be presented to the plaintiff, rather than merely
posted inconspicuously on a website. 179 Facebook, for example, calls its terms of use
proceeding with the download”); In re RealNetworks, Inc., No. 00–CV–1366, 2000 WL 631341, at *6 (N.D.Ill.
May 8, 2000) (approving license agreement placed in pop-up window with scroll bar); cf. Serrano v. Cablevision
Sys. Corp., 863 F. Supp. 2d 157, 164–65 (E.D.N.Y.2012) (approving agreement where plaintiff noted that upon
initiation of internet service, she was “provided with an electronic copy of Cablevision’s Terms of Service” and
was required “to indicate that [she] reviewed and agreed to the Terms of Service by clicking on a link marked
‘Agree.’).
175 See e.g. Kwan v. Clearwire, No. 09–1392, 2012 WL 32380 at *9 (W.D. Wash., Jan. 24, 2012) (“this
court finds that the breadcrumbs left by Clearwire to lead Ms. Brown to its [Terms of Service] did not constitute
sufficient or reasonably conspicuous notice of the [Terms of Service].”).
176 See e.g., Caringbridge, Terms of Use, (Sept. 3, 2014), http://www.caringbridge.org/terms-of-use
an agreement between the website and user that is enforceable by state contract law. TOU may be deployed
to all sorts of purposes. They may set the terms and conditions for online purchases; they may limit the site’s
liability for damage that its content and services cause to users. A site may, through its TOU, obtain the rights
to use and reproduce content users post to a website, for example, comments to a blog. And TOU may condition
or restrict the subsequent uses a site visitor may make of content that he or she accesses on the website.”
Bradley E. Abruzzi, Copyright, Free Expression, and the Enforceability of “Personal Use-Only” and Other Use-
Restrictive Online Terms of Use, 26 SANTA CLARA COMPUTER & HIGH TECH. L. J. 85, 86 (2010). Some sites are
a hybrid between a browsewrap and a clickwrap because they predicate the manifestation of assent upon either
browsing a site or clicking agreement to the terms in a registration process. See e.g., LinkedIn, User Agreement,
http://www.linkedin.com/static?key=user_agreement (providing an example of a hybrid user agreement).
178 Southwest Airlines Co. v. BoardFirst, L.L.C., 2007 WL 4823761, at *5 (N.D. Tex. Sept. 12, 2007).
Molnar v. 1-800-Flowers.com, 2008 WL 4772125, at *7 (C.D. Cal. 2008); See also, Motise v. America Online,
Inc., 346 F. Supp. 2d 563, 564–65 (S.D.N.Y.2004) (finding the consumer had no notice where terms of use were
available on website, but never presented).
179 Most TOUs require the user to manifest assent to the TOU by clicking on the “I agree” icon or a
hyperlink before they can proceed to download the software. See e.g., Moore v. Microsoft Corp., 741 N.Y.S.2d
91, 92–93 (N.Y. App. Div. 2002) (upholding TOU).
Facebook, http://www.facebook.com/terms.php?ref=pf.
180
Id.
181
183 2011 U.S. Dist. LEXIS 150145, 2012 WL 3280 (W.D. Wash. Jan. 3, 2012).
184 Id. at *7–*9. (citing Specht v. Netscape Communs. Corp., 306 F.3d 17 (2d Cir. 2002) (Sotomayor, J.)).
185 In Specht v. Netscape Communs. Corp., 306 F.3d 17 (2d Cir. 2002) (Sotomayor, J.)), the Second
Circuit first addressed “issues of contract formation in cyberspace.” 306 F.3d at 20. Although cyberspace
transactions typically lacked “a physical document containing contract terms,” the parties to such a transaction
could be deemed to have been put on “inquiry notice” of license terms that a reasonably prudent person would
have seen on the website. 306 F.3d at 31. Conversely, if an offer on a website “did not carry an immediately
visible notice of the existence of licensing terms or require unambiguous manifestation of assent to those
terms”, the mere “existence of license terms on a submerged screen is not sufficient to place consumers on
inquiry or constructive notice of those terms.” 306 F.3d at 31–32. The Specht court was the first appellate
decision to explain that the design and placement of the website matters most in determining whether a user
has constructive notice of the terms. The Court in Specht went on to find that the placement of license terms
on an “unexplored portion of [defendants’] webpage” below the “download button” was not sufficient to bind
customers to those terms. 306 F.3d at 31–32. In so holding, the Court distinguished other “online transaction”
cases where “there was much clearer notice than in the present case that a user’s act would manifest assent
to contract terms.” 306 F.3d at 33.
186 2011 U.S. Dist. LEXIS 150145 at *7.
187 Cf. Nicosia v. Amazon, Inc., 2015 U.S. Dist, LEXIS 13560 (E.D. N.Y. Feb. 4, 2015) (enforcing
Amazon’s TOU because it was clear that clicking the order button constitute assent to the terms of the TOU)
with Savetsky v. Pre-Paid Legal Services, 2015 U.S. Dist. LEXIS 175911 (N.D. Cal. Feb. 12, 2015) (refusing to
compel mandatory arbitration where information was insufficient and arbitration clause was buried).
188 2015 WL 1600755 (E.D. N.Y. Apr. 8, 2015).
190 Id.
by misleading customers into purchasing a service that charged a customer’s credit card,
on an automatically-renewing continuing monthly basis, without adequate notice or
consent.”191 The court recounted the facts as follows:
The graphics and text on defendants’ website, it is argued, led internet
consumers during the proposed class period—between February 2008 and
December 2012—to believe that they were only buying a one-month
subscription when they signed up for in-flight Wi-Fi through Gogo.192
Gogo’s position is that the terms plaintiffs consented to not only clearly provided for
automatic renewal, but that they included mandatory arbitration and waiver of venue
protection. The court found no inquiry notice to these scrollwrap agreements. The court
also ruled that sign-in wraps used in the inflight service were unenforceable and refused
to compel arbitration. The court’s description of these new wrap contracts was as a
hybrid version of browsewrap and clickwrap. The court ruled that the average Internet
user would not be aware that he/she was entering into a binding contract to a sign-in-
wrap. The court found that there was no contract formation as either a clickwrap or
browsewrap for these scrollwrap or sign-in-wrap arrangements.193
The federal court in Berkson stated that these hybrid wraps had some features of
browsewrap and some elements of clickwrap stating:
Browsewrap exists where the online host dictates that assent is given merely
by using the site. Clickwrap refers to the assent process by which a user must
click “I agree,” but not necessarily view the contract to which she is assenting.
Scrollwrap requires users to physically scroll through an internet agreement
and click on a separate “I agree” button in order to assent to the terms and
conditions of the host website. Sign-in-wrap couples assent to the terms of a
website with signing up for use of the site’s services; it is the form used by Gogo
in the instant case.194
Next, the court described sign-in-wraps that “do not require the user to click on a
box showing acceptance of the ‘terms of use’ in order to continue. Rather, the website is
designed so that a user is notified of the existence and applicability of the site’s ‘terms of
use’ when proceeding through the website’s sign-in or login process. The Berkson court
noted that U.S. federal appeals courts have yet to weigh in on the enforceability and
validity of sign-in-wraps. The court summarized recent federal district court opinions
addressing sign-in type wrap contracts:
First, where the hyperlinked “terms and conditions” is next to the only button
that will allow the user to continue use of the website. See, e.g., Crawford v.
Beachbody, LLC, No. 14–CV–1583, 2014 WL 6606563, at *3 (S.D.Cal. Nov. 5,
2014) (forum selection clause binding where consumer clicked on button
marked “Place Order” and above button was statement informing user that by
clicking the button user was subject to the website’s “terms and conditions,”
which were available in the same screen via hyperlink); Starke v. Gilt Groupe,
Inc., No. 13–CV–5497, 2014 WL 1652225, at *2–3 (S.D.N.Y. Apr. 24, 2014)
191 Id.
192 Id.
193 Id. at *44–*45.
194 Id. at *25.
Id. at *31–*32.
195
197 No. CV 9398–VCN, 2014 WL 1266827, at *2 (Del. Ch. Mar. 27, 2014),
198 See e.g., Specht v. Netscape Commc’ns Corp., 306 F.3d 17, 28–32 (2d Cir. 2002) (applying California
law); Serrano v. Cablevision Sys. Corp., 863 F. Supp. 2d 157, 164 (E.D.N.Y. 2012) (“ ‘[C]lick-wrap’ contracts
are enforced under New York law as long as the consumer is given a sufficient opportunity to read the end-
user license agreement, and assents thereto after being provided with an unambiguous method of accepting or
declining the offer.”); Jallali v. Nat’l Bd. of Osteopathic Med. Examiners, Inc., 908 N.E.2d 1168, 1173 (Ind. Ct.
Websites (SNSs) generally require users to enter into two kinds of contractual
relationships, terms of service agreements and privacy policies, as a condition for
accessing their websites. An SNS, website, or other brick-and-mortar company can
reduce transaction costs by using a predispute mandatory arbitration clause because it
need not defend lawsuits in state or federal court but in a forum where it can choose the
arbitral provider and rules to govern the dispute. 199
§ 4.3 Contract Formation Issues in Cyberspace
(A.) Formation Issues
Beginning in the 1990s, the law of contracts evolved to address the unique issues
posed by e-commerce and the Internet.200 In Specht v. Netscape Communications Corp.,201
the Second Circuit refused to enforce a mass-market license agreement because it was
unclear whether a consumer would have an opportunity to review the terms of the
license agreement prior to manifesting assent. The consumer-plaintiff filed suit under
the Computer Fraud & Abuse Act and ECPA charging Netscape with allegedly
monitoring his activities over the Internet. Netscape moved to compel arbitration and to
stay court proceedings, arguing that the plaintiffs agreed to submit to arbitration when
it clicked agreement to a mass-market license agreement located on a submerged screen
that the user would have needed to scroll through to read the full agreement. The court
concluded that, “Where consumers are urged to download free software at the immediate
click of a button, a reference to the existence of license terms on a submerged screen is
not sufficient to place consumers on inquiry or constructive notice of those terms.”202
At issue in Specht was the enforceability of an arbitration clause contained in
license terms on a website.203 Netscape contended that the mass-market agreement was
accepted when plaintiffs downloaded a plug-in (i.e., software that supplements or
enhances the capabilities of an existing program) from the site. 204 Netscape used a
highlighted box that included a statement that read: “Please review and agree to the
terms of the Netscape SmartDownload software license agreement before downloading
App. 2009) (upholding clickwrap agreement under general contract principles); Sgouros v. TransUnion, 14
C1850 (N.D. Ill. Feb. 5, 2015) (refusing to compel arbitration as it was unclear whether checking box
constituted user’s manifestation of assent).
199 See generally, Michael L. Rustad, Richard Buckingham, Diane D’Angelo, & Kate Durlacher, An
Empirical Study of Predispute Mandatory Arbitration Clauses in Social Media Terms of Service, 34 U. ARK.
LITTLE ROCK L. REV. 643 (2012).
200 “In the 1990s, however, things began to change. The rise in computer use by individuals coupled with
the advent of the World Wide Web gave rise to two parallel developments, both of which challenged the law of
contract formation. Increased computer use created a demand for software programs designed for the consumer
market, and those programs were commonly transferred to users by way of standard-form licenses that were
packaged with the software and thus unavailable before the consumer paid for the software. Also, parties in
large numbers began to use electronic means—the computer—to enter into bargained-for relationships. The
turn of the millennium brought two electronic contracting statutes, the Electronic Signatures in Global and
National Commerce Act (“E-Sign”) and the Uniform Electronic Transactions Act (“UETA”), which removed any
doubts that contracts entered into electronically could satisfy the Statute of Frauds.” Juliet M. Moringiello &
William L. Reynolds, From Lord Coke to Internet Privacy: The Past, Present, and Future of the Law of Electronic
Contracting, 72 MD. L. REV. 452, 454 (2013).
201 306 F.3d 17 (2d Cir. 2002) (Where the user was unaware that the license agreement appeared only
and using the software.”205 While this statement was in the same typeface and size as
most of the type on the page, it was specially emphasized by the use of a shaded box, and
it was further highlighted by the use of a colored hyperlink.206 Nevertheless, the court
found that Netscape had not done enough to bring the terms of use to the attention of
consumers and refused to enforce the arbitration clause. In addition, Netscape had not
asked the consumer to click agreement to the DownLoad license, only for Netscape’s
Communicator.
When plaintiffs downloaded free software from the Netscape site by the click of a
button, they could not initially see a reference to license terms. 207 Plaintiffs could have
seen the sole reference to terms only if they had scrolled down to the bottom of the screen
before commencing a download.208 Netscape moved to compel arbitration and stay court
proceedings. The motion to compel arbitration and stay court proceedings was denied by
the district court.209 The Second Circuit affirmed the lower court finding that plaintiffs
were not put on sufficient notice of terms.210 The court observed, “There is no reason to
assume that viewers will scroll down to subsequent screens simply because screens are
there.”211 The Second Circuit determined that downloading the software did not
constitute acceptance of Netscape’s terms that included mandatory arbitration.212 The
court held “that a reasonably prudent offeree in plaintiffs’ position would not have known
or learned, prior to acting on the invitation to download, of the reference to [the
software’s] license terms hidden below the “Download” button on the next screen.”213
The Second Circuit refused to enforce Netscape’s “Smart Download” software license
agreement compelling arbitration, finding that Christopher Specht, the plaintiff, did not
have reasonable notice of the license terms nor did he (and other users) manifest assent
before downloading this plug-in program. Because Netscape’s browsewrap “did not carry
an immediately visible notice of the existence of license terms,” the court refused to
enforce them.214 The key fact in screen was that link to the agreement was located on “a
screen located below the download button.”215 The text of the license agreement “would
have become visible to plaintiffs only if they had scrolled down to the next screen.”216
The court emphasized that an “unexplored portion” of text “remained below the
download button.217 The Specht court applied legal realism to cyberspace contracts by
striking down Netscape’s agreement as “stealthware.”218 The Second Circuit held that a
consumer’s clicking on a download button did not manifest assent to license terms if
those terms were not conspicuous and it was not clear that clicking meant agreement
with the terms of a license agreement containing a predispute mandatory arbitration
205 Id.
206 Id. at 23.
207 Id.
208 Id.
209 Id. at 25.
210 Id. at 32.
211 Id.
212 Id. at 35.
213 Id. at 35.
214 Id. at 31.
215 Id. at 20.
216 Id. at 23.
217 Id. at 32
218 Id.
clause. The consumer had no real opportunity to learn of the existence of an arbitration
clause because it could not be seen prior to scrolling down the page to a screen located
below the download button. The Second Circuit’s ruling that location matters and that a
reasonable Internet user should have an opportunity to review terms prior to being
bound is a rare pro-consumer ruling.
Most U.S. courts are predisposed to enforce Internet license agreements, even when
the consumer might not know of the existence of its one-sided terms.219 In Scherillo v.
Dun & Bradstreet, Inc.,220 the federal court upheld a click-wrap forum selection clause
finding it to be reasonably communicated to the plaintiff even though the user had to
scroll down the page. The court gave no credence to the plaintiff’s argument that he
“checked” the terms and conditions box inadvertently and therefore had not consented
to the agreement. The software licensor can create a “safe harbor” for proving
manifestation of assent by using a “double assent procedure” that requires the user to
reaffirm assent.221 A licensor must give the licensee a right to a refund if the licensee
has not had an opportunity to review the terms and manifest assent prior to payment. 222
Courts will generally validate contractual formation if it follows the Uniform Computer
Information Transactions Act’s (UCITA) mandate of giving the user an opportunity to
review the terms and a means to manifest assent. Manifestation of assent by the offeree
is some decision based upon awareness of the terms of the license. 223
(B.) “Rolling Contracts”
Rolling contracts are a standard form contract where the buyer or licensee orders
goods or downloads information but pays for them prior to seeing many of the terms. 224
Instagram users filed a class action in 2013 contending that the social media’s rolling
contract and unilateral changes to its terms of use regarding the ownership of copyrights
of user-generated content (UGC) was unenforceable.225 Instagram’s prior terms of use
disclaimed ownership of UGC but the new terms claimed a royalty free license. 226
Travelocity’s User Agreement is a rolling contract because it states, “Travelocity may at
219 The limited empirical studies demonstrate beyond my examples that EULAs are tilted in favor of
the seller. See Florencia Marotta-Wurgler, What’s in a Standard Form Contract? An Empirical Analysis of
Software License Agreements, 4 J. EMPIRICAL LEGAL STUD. 677, 703 (2007) (finding that end user license
agreements were more pro-seller than the default rules of the UCC); See e.g., Cvent, Inc. v. Eventbrite, Inc.,
739 F. Supp.2d 927, 937 (E.D. Va. 2010) (enforcing mass-market license and stating the UCITA was not useful
for the plaintiffs); Burcham v. Expedia, Inc., 2009 WL 586512 (E.D. Mo. March 6, 2009) (rejecting plaintiff’s
argument that he was not bound to website’s click-wrap agreement because others had access to his computer
and could have created an account on his behalf without him seeing the terms.); See RESTATEMENT (SECOND)
OF CONTRACTS § 208, cmt. d. (“gross inequality of bargaining power, together with terms unreasonably
favorable to the stronger party, may confirm that the weaker party did not in fact assent or appear to assent
to the unfair terms”).
220 684 F. Supp. 2d 313 (E.D.N.Y. 2010).
223 Register.com, Inc. v. Verio, Inc., 356 F.3d 393, 403 (2d Cir. 2004)(“It is standard contract doctrine
that when a benefit is offered subject to stated conditions, and the offeree makes a decision to take the benefit
with knowledge of the terms of the offer, the taking constitutes an acceptance of the terms, which accordingly
become binding on the offeree.”).
224 Robert A. Hillman, Rolling Contracts, 71 FORDHAM L. REV. 743, 744 (2002) (defining rolling
contracts).
225 (Rodriguez v. Instagram LLC, Cal. Super. Ct., No. CGC–13–532875 (Super. Ct. S.F. Cty., July 16,
2013) (stating that plaintiffs sought injunctive relief for unilateral changes in terms of use).
226 Id.
any time modify this User Agreement and your continued use of this site or Travelocity’s
services will be conditioned upon the terms and conditions in force at the time of your
use.”227 Courts have recognized a “layered” or “rolling” system of electronic contract
formation, which is derived from the layered contract formation 228 that exists in the
physical world for sophisticated products such as computer systems. 229 With a layered
contract, agreement to a contract may not occur at a single point in time. Under webwrap
contracts, a party will manifest assent to different terms at different points in time.
Terms of service agreements, for example, reserve the right to later modify or add to the
terms of use or service. The licensor or buyer requires payment first and provides terms
later. The recent trend in judicial decisions is that courts enforce “cash now, terms later”
licenses so long as the licensor gives reasonable notice to the user and an opportunity to
decline the terms.
UCITA validates “rolling contracts” if the person had reason to know that terms
would come later, had a right to refund if he declined the terms, and manifested assent
after an opportunity to review them.230 Online merchants typically offer consumers take
it or leave it agreements. UCITA gives consumers a right to a refund if they have not had
an opportunity to review the terms. 231 The predominant trend is for U.S. courts to
legitimize software industry consumer licensing practices that disclaim warranties. 232
One commentator suggested the term ‘sneak wrap’ for online mass-market
agreements.233
(1.) ProCD, Inc. v. Zeidenberg: A Game-Changer
ProCD, Inc. v. Zeidenberg 234 nicely illustrates the trend in the law to enforce mass-
market licenses even though they have an avant-garde form departing from classical
contract law. In ProCD, the Seventh Circuit upheld a shrinkwrap agreement in which the
licensee, a computer science graduate student, paid first and was given the software
licensing agreement only after he paid for the CD-ROM. ProCD compiled a computer
database called “Select Phone” that consisted of more than 3,000 telephone directories and
sought to protect its investment in the database by requiring licensees to enter into a
licensing agreement limiting use and containing restrictions. Matthew Zeidenberg
purchased a copy of ProCD’s Select Phone in Madison, Wisconsin, but chose to ignore the
terms of the agreement prohibiting transfers or assignments of rights. Zeidenberg then
formed a company to resell the information provided in ProCD’s database. He charged
customers for access to the information in Select Phone and made the information
available over the World Wide Web. ProCD filed a copyright infringement lawsuit seeking
In re Online Travel Co., 2013 WL 2948086 *4 (N.D. Tex. June 14, 2013).
227
CLAYTON P. GILLETTE & STEVEN D. WALT, SALES LAW: DOMESTIC & INTERNATIONAL 89 (New York,
228
New York: Foundation Press, rev. ed. 2002) (describing rolling contracts as layered).
229 BRIAN W. SMITH, E-COMMERCE PRODUCTS & SERVICES 2.16 (2001); See also, Robert A. Hillman,
232 See Robert W. Gomulkiewicz, The Implied Warranty of Merchantability in Software Contracts: A
Warranty No One Dares to Give and How to Change That, 16 J. MARSHALL J. COMPUTER & INFO. L. 393, 393
(1998) (describing trend in American courts).
233 The term “sneak wrap” refers to online TOU agreements. See Ed Foster, ‘Sneak Wrap’ May Be a Good
Way of Defining the Maze of Online Products, INFOWORLD (July 26, 1999).
234 86 F.3d 1447 (7th Cir. 1996).
an injunction against Zeidenberg.235 Peter Alces describes the factual setting for this
“instant” classic of avant-garde contract formation:
The transactional context is familiar: Zeidenberg went into a store that sold
packaged computer software and purchased ProCD’s product, essentially an
electronic phone directory. Terms disclosed within the box and terms disclosed,
when Zeidenberg launched the software limited his rights to disseminate the
information contained on the software. Zeidenberg ignored the term limiting
his right of dissemination and ProCD brought an action to enjoin his (mis)use
of the product. Zeidenberg responded that his contract with ProCD was formed
when he paid for the software and left the store with it. Not anything proposed
or imposed by ProCD in the box or on the computer screen thereafter could be
part of the parties’ ‘agreement.’236
The injunction prevented Zeidenberg from further disseminating ProCD’s software
since such distribution exceeded the scope of the rights granted in his license. The federal
district court held ProCD’s license agreements were unenforceable since the terms did not
appear on the outside of the package and a customer could not be “bound by terms that
were secret at the time of purchase.”237 The Seventh Circuit disagreed, ruling that ProCD’s
license agreements were enforceable. The Seventh Circuit applied U.C.C. Article 2 to the
license agreement, noting contract formation may be manifested in any manner sufficient
to show agreement.238 The court rejected the argument that license agreement was
preempted: “Contracts . . . generally affect only their parties; strangers may do as they
please, so contracts do not create ‘exclusive rights.’ ”239
The ProCD court decided that Zeidenberg accepted the software “after having an
opportunity to read the license at leisure.”240 The court held that terms inside a box of
software bind consumers who use the software after an opportunity to read the terms
and to reject them by returning the product. The court reasoned that ProCD “extended
an opportunity to reject if a buyer should find the license terms unsatisfactory.”241 The
court rejected Zeidenberg’s assertion he had no choice but to adhere to ProCD’s terms once
he opened the package. The court also gave short shrift to Zeidenberg’s argument that
shrinkwrap license agreements must be conspicuous to be enforced. Finally, the court
rejected the argument that the U.S. Copyright Act preempts software licenses because the
rights created by ProCD’s license agreement were not found to be the functional equivalent
of any of the exclusive rights of the U.S. Copyright Act.242 “Notice on the outside, terms
on the inside, and a right to return the software for a refund if the terms are unacceptable
(a right that the license expressly extends), may be a means of doing business valuable
to buyers and sellers alike.”243
235 A plaintiff seeking a preliminary injunction must establish; (1) that he is likely to succeed on the
merits; (2) that he is likely to suffer irreparable harm in the absence of preliminary relief; (3) that the balance
of equities tips in his favor; and (4) that an injunction is in the public interest.
236 Peter A. Alces, The Moral Impossibility of Contract, 48 WM. & MARY L. REV. 1647, 1653–54 (2007).
241 Id.
The ProCD decision is emblematic in that it validated contracts taking the form of
“payment now, terms later.” The Seventh Circuit adopted a law and economics perspective
in validating “rolling contracts” because the court regarded this method as an efficient
form of private ordering. The court observed that “notice on the outside, terms on the
inside, and a right to return” was a useful business practice. 244 Nevertheless, this
decision raises the question of how far the classical doctrine of master of an offer can be
stretched. James J. White, co-author of a leading treatise on Commercial law, gives this
hypothetical:
“Suppose that your form asserts that my intentional tying my shoelaces
tomorrow will be assent to all of your terms. Since I cannot tie my shoelaces
unintentionally and since I have no valet, I’m stuck, not so?” How would you
respond?245
Professor White notes that the path of Internet contract law is already legitimating
functionally equivalent contracts. He notes how UCITA rules “that one has “manifested
assent,” (agreed to something) if he “intentionally engages in conduct . . . with reason to
know that the other party . . . may infer from the conduct that the person assents to the
. . . term.”246 One way to interpret ProCD is as an efficient evolution of the concept that
a software licensor is the master of its offer.
(2.) Hill v. Gateway 2000, Inc.
In the past two decades, the tide turned in U.S. courts in favor of the enforceability
of mass-market licenses beginning with Judge Frank Easterbrook’s decisions in ProCD,
Inc. v. Zeidenberg247 and Hill v. Gateway 2000.248 In Hill, Judge Easterbrook cited his
own opinion in ProCD validating the practice of pay now, terms later.249 In Hill, a
consumer picked up the telephone, spoke with a Gateway customer representative,
ordered a Gateway personal computer, and gave his credit card number. The box arrived,
containing the computer and a list of terms, said to govern unless the customer returns
the computer within thirty days. Are these terms effective as the parties’ contract, or is
the contract term-free because the order-taker did not read any terms over the phone
and elicit the customer’s assent? This was the fact pattern in Hill v. Gateway 2000, Inc.,250
where Rich and Enzo Hill challenged an arbitration clause in Gateway’s software license
agreement included in a standard form contract shipped with their home computer.
Gateway’s standard business practice was to mail the computer system—with a software
license agreement included inside the box. Included in the software license agreement
Id. at 1451.
244
James J. White, Contracting Under Amended 2–207, 2004 WIS. L. REV. 723, 736; See Roger C. Bern,
245
‘Terms Later’ Contracting: Bad Economics, Bad Morals, and a Bad Idea for a Uniform Law, Judge Easterbrook
Notwithstanding, 12 J.L. & Pol’y 641, 643 (2004) (“Judge Easterbrook’s imposition of the ‘terms later’
contracting rule in ProCD and Hill was itself devoid of legal, economic, and moral sanction. Thus his opinions
in those cases provide no legitimate support for other court decisions or for any uniform law that would validate
‘terms later’ contracting.”).
246 Id.
249 Hill v. Gateway 2000, Inc., 105 F.3d 1147, 1149 (7th Cir. 1997) (applying ProCD to the sale of a boxed
computer and noting that “[p]laintiffs ask us to limit ProCD to software, but where’s the sense in that? ProCD
is about the law of contract, not the law of software.”).
250 Id.
was a predispute mandatory arbitration clause. Under a predominant purpose test, the
sale of a personal computer system with software installed falls under U.C.C. Article 2.
Nevertheless, in this case, the court enforced the license agreement ruling against
the consumers. Under classical contract law, silence or inaction by a party generally does
not constitute assent, “where circumstances or the previous course of dealing between
the parties places the offeree under a duty to act or be bound, his silence or inactivity
will constitute his assent.”251 The court upheld the entire agreement, including the
arbitration clause, finding that the inaction of Hill constituted a manifestation of assent.
Writing for the Seventh Circuit, Judge Easterbrook validated delayed contract formation;
the consumer pays for the product and receives the terms in the packaging of the product
when the shipper sends it at a later point.252
The court found Hill to be the offeree and Gateway the offeror who had the power to
dictate the manner of acceptance. The court enforced a shrinkwrap agreement even
though it was included in a sealed software box giving the licensees no opportunity to
review the terms prior to payment. 253 The Seventh Circuit said that the “terms inside
Gateway’s box stand or fall together.”254 The U.S. Court of Appeals held that Gateway’s
license agreement was enforceable because of the consumer’s decision to keep the Gateway
system beyond the 30-day period specified in the agreement. The Hill court determined
there was acceptance by silence and the entire mass-market agreement was binding
including the arbitration clause.255
Judge Easterbrook reasoned that U.C.C. § 2–207, the battle of the forms, was
inapplicable, since there was not an exchange of forms at all, but rather a single form
drafted by the licensor.256 His contention that a battle of the forms requires two forms
(buyer and seller) conflicts with Official Comment #1 to U.C.C. § 2–207, which makes
clear that the battle of the forms also applies to a written confirmation of an earlier oral
agreement and therefore does not require two forms. A battle of the forms may involve
only the seller’s form and a confirmation. U.C.C. § 2–207 would apply because Gateway’s
form could be construed as a written confirmation where the agreement had been
reached by Mr. and Mrs. Hill and the Gateway representative on the telephone.257 U.C.C.
251 See Circuit City Stores, Inc. v. Najd, 294 F.3d 1104, 1109 (9th Cir. 2002); See also, Quevedo v. Macy’s,
Inc., 798 F. Supp. 2d 1122, 1133–35 (C.D. Cal. 2011) (holding that when a Macy’s employee admitted receiving
the SIS handbook and signing the Acknowledgment Form, his failure to opt out constituted assent to the
arbitration agreement.).
252 Id.
253 “A customer picks up the phone, orders a computer, and gives a credit card number. Presently a box
arrives, containing the computer and a list of terms, said to govern unless the customer returns the computer
within 30 days. Are these terms effective as the parties’ contract, or is the contract term-free because the order-
taker did not read any terms over the phone and elicit the customer’s assent?” Id. at 1148.
254 Id.
255 See Hill v. Gateway 2000, Inc., 105 F.3d 1147, 1149 (7th Cir. 1998) (upholding rolling contract
requiring consumers to submit to arbitration because they had entered into an enforceable contract only after
retaining the personal computer beyond the thirty-day period specified in the agreement.).
256 The court found that the UCC’s battle of the forms provision was not relevant to a single form sent
“Judge Easterbrook’s analysis misunderstood the meaning and application of three Uniform Commercial Code
sections. And it is not clear that the U.C.C. was in the least pertinent to the issue presented. His analysis of
the apposite Contract doctrine, though, is revealing, and demonstrates well the significance of doctrine to
theory. You cannot explain (or even posit) the theoretical basis of Contract until you first determine what
Contract is, and what Contract is what Contract doctrine determines it to be.” Peter A. Alces, The Moral
Impossibility of Contract, 48 WM. & MARY L. REV. 1647, 1653 (2007).
258 U.C.C. § 2–207(2) (2011).
260 Frederick H. Miller, Uniform Computer Information Transactions Act, 10 HAWKLAND U.C.C. SERIES
UCITA § 113:1.
261 Jean Braucher, Delayed Disclosure in Consumer E-Commerce as an Unfair and Deceptive Practice,
46 WAYNE L. REV. 1805, 1852–53 (2000) (stating that “[h]olding back terms can be seen either as involving a
deceptive representation or a deceptive omission” and that the FTC policy presumes that this practice will
mislead consumers.).
262 “A social media company can dodge jury verdicts, punitive damages, class actions, consequential
damages, and any other meaningful remedy by requiring their users to submit to arbitration. One-sided terms
of use that, in effect, divest consumers of fundamental rights raise serious concerns of procedural and
substantive unfairness. ‘Users of ADR are entitled to a process that is fundamentally fair.’ Social networking
sites have designed arbitration agreements that operate as poison pills that eliminate minimum adequate
rights and remedies for consumers, while preserving the full array of remedies for these virtual businesses.”
Michael L. Rustad, Richard Buckingham, Diane D’Angelo, & Kate Durlacher, An Empirical Study of
Predispute Mandatory Arbitration Clauses in Social Media Terms of Service, 34 U. ARK. LITTLE ROCK L. REV.
643, 645 (2012).
263 Absent a class action waiver, individuals with functionally equivalent complaints against a company
may join in a class suit or representative action where a federal court consolidates the complaints into a single
proceeding. Arbitration clauses did not typically address the distinction between class actions filed in federal
and state courts and class action arbitrations. Class actions in court have radically different procedural and
substantive rights than so-called class action arbitrations. For a discussion of the differences between court
and arbitration class actions, see AT&T Mobility LLC v. Concepcion, 131 S. Ct. 1740, 1757 (2011) (citing
empirical research that revealed that class arbitrations did not result in final award on the merits).
264 Arbitral providers will sometimes permit general discovery but this requires an application to an
arbitrator and is subject to the discretion of the arbitrator. See Paul Bennett Marrow, When Discovery Seems
Unavailable, It’s Probably Available, 80 N.Y. ST. B. ASS’N. J. 44, 44–46 (October 2008), http://www.marrow
law.com/articles/pdf/Journal-oct08-marrow.pdf. JAMS, for example, permits depositions and discovery at the
arbitrator’s discretion, which is similar to the rule for the AAA. Id.
265 “Over the past few years, a quiet revolution has begun as many social networking sites (SNSs) impose
predispute mandatory arbitration on consumers. Senator Patrick Leahy (D. Vt.) stated, ‘Mandatory arbitration
supporters of these mass-market license agreements contend that they are efficient and
beneficial to consumers.
(1.) Unconscionability
makes a farce of the right to a jury trial and the due process guaranteed to all Americans.’ [Social Network
Sites] SNSs generally require users to enter into two kinds of contractual relationships, terms of service
agreements and privacy policies, as a condition for accessing their websites. Hundreds of millions of consumers
enter into mandatory arbitration clauses with SNSs through browsewrap, clickwrap, or registration forms.
After a consumer has registered or accessed a site, SNSs reserve the right to modify substantive terms,
sometimes without notifying users. An SNS, website, or other brick-and-mortar company can reduce
transaction costs by using a predispute mandatory arbitration clause because it need not defend lawsuits in
state or federal court but in a forum where it can choose the arbitral provider and rules to govern the dispute.
Michael L. Rustad, Richard Buckingham, Diane D’Angelo, & Kate Durlacher, An Empirical Study of
Predispute Mandatory Arbitration Clauses in Social Media Terms of Service, 34 U. ARK. LITTLE ROCK L. REV.
643, 644 (2012).
266 Berkson v. Gogo LLC, 2015 WL 1600755 (E.D. N.Y. Apr. 9, 2015).
267 See Arthur Neff, Unconscionability and the Code—The Emperor’s New Clause, 115 U. PA. L. REV.
Procedural unconscionability concerns the formalities of making the contract, while substantive
unconscionability concerns the terms of the contract itself. State ex rel. Vincent v. Schneider, 194 S.W.3d 853,
858 (Mo. en banc, 2006).
269 See, e.g., Riensche v. Cingular Wireless, L.L.C., No. C06–1325Z, 2006 WL 3827477, at *9 (W.D.
Wash. Dec. 27, 2006) (holding that the forum selection clause was substantively unconscionable); Comb v.
PayPal, Inc., 218 F. Supp. 2d 1165, 1173, 1176 (N.D. Cal. 2002) (refusing to enforce pre-dispute mandatory
arbitration clause in user agreement ruling that the forum selection clause was substantively and procedurally
unconscionable). Additionally, the doctrine of unconscionability has been applied in a wide array of contexts.
See, e.g., Scott v. Cingular Wireless, 161 P.3d 1000, 1006 (Wash. 2007) (holding a class action waiver
unconscionable); Gatton v. T-Mobile USA, 61 Cal. Rptr. 3d 344, 358 (Cal. Ct. App. 2007) (holding a class action
waiver unconscionable and unenforceable); Aral v. EarthLink, Inc., 36 Cal. Rptr. 3d 229, 238 (Cal. 2005)
(holding a class action waiver unconscionable).
270 676 N.Y.S.2d 569 (N.Y.A.D. 1st Dept. 1998).
30 days after the date of delivery, you accept these Terms and Conditions.” The
Agreement provided that any disputes would be exclusively settled by binding
arbitration in Chicago, according to the rules of the International Chamber of Commerce.
Gateway’s arbitral provider charged an upfront $4,000 non-refundable registration fee
to arbitrate personal computer claims generally valued at less than $1,000. Gateway’s
predispute mandatory arbitration clause reads as follows:
Any dispute or controversy arising out of or relating to this Agreement or its
interpretation shall be settled exclusively and finally by arbitration. The
arbitration shall be conducted in accordance with the Rules of Conciliation and
Arbitration of the International Chamber of Commerce. The arbitration shall
be conducted in Chicago, Illinois, U.S.A. before a sole arbitrator. Any award
rendered in any such arbitration proceeding shall be final and binding on each
of the parties, and judgment may be entered thereon in a court of competent
jurisdiction.271
Brower was the lead plaintiff in a class action alleging that Gateway’s licensing
practices constituted unfair and deceptive practices. Brower argued that it was
unconscionable to be required to arbitrate in distant forum under rules promulgated by
the International Chamber of Commerce (ICC) and that the ICC’s Rules of Conciliation
and Arbitration imposed prohibitively expensive costs in relation to the size of their
claim. “For example, a claim of less than $50,000 required advance fees of $4,000 (more
than the cost of most Gateway products), of which the $2,000 registration fee was
nonrefundable even if the consumer prevailed at the arbitration.”272 The ICC fees did
not include the consumer’s travel expenses that would be “$1,000 per customer in this
action, as well as bear the cost of Gateway’s legal fees if the consumer did not prevail at
the arbitration” because the ICC adopted a loser pays rule.273
The Brower court upheld the license agreement reasoning that the consumer had
the option of making an alternative purchase and was therefore not in a position of take
it or leave it and could have returned the personal computer for a refund. 274 The court
also found “a valid agreement to arbitrate between the parties,” but ruled that the
agreement “should be modified, on the law and the facts, to the extent of vacating that
portion of the arbitration agreement as requires arbitration before the International
Chamber of Commerce.”275 The court replaced the ICC with the American Arbitration
Association (AAA), but could not determine on the record whether their charges were “so
egregiously oppressive that they, too, would be unconscionable.”276 The United States
Supreme Court acknowledges that high arbitration costs can in and of themselves
preclude a litigant from asserting her rights.277
The problem with unconscionability is that judges are reluctant to strike down
substantive provisions because they adopt the legal fiction that a bargain was reached
in a webwrap license. Courts are reticent to strike down one-sided and aggressive terms
271 Id.
272 Id. at 571.
273 Id.
274 Id. at 574.
275 Id. at 575.
276 Id.
277 Green Tree Fin. Corp. v. Randolph, 531 U.S. 79, 90 (2000).
in webwrap.278 One reform proposal for making fairer webwrap would be to presume
that these standard forms are unconscionable except if validated by legislative decree or
if there were meaningful alternatives in the marketplace. 279 Reconceptualizing
unconscionability will lead to more balanced terms, less one-sided terms in webwrap.280
(2.) Public Policy Limitations
278 NANCY S. KIM, WRAP CONTRACTS: FOUNDATIONS AND RAMIFICATIONS 208 (New York: Oxford
280 Id.
283 Misui & Co. (USA) v. Mira M/V, 111 F.3d 33, 35 (5th Cir. 1997).
286 Id.
Id. at 467.
289
Id. at 470.
290
291 Lasercomb Am. v. Reynolds, 911 F.2d 970 (4th Cir. 1990).
292 Ramsey Hanna, Misusing Antitrust: The Search for Functional Copyright Misuse Standards, 46
294 “Traditionally, contract and copyright co-existed peaceably, with contract law providing the legal
framework for transactions in copyrighted works. UCITA threatens that relationship by empowering providers
to impose unilaterally license terms that contravene foundational copyright policies and current user
expectations. The act’s overall framework and specific default rules support enforcement of mass-market
adhesion contracts that restrict uses of information protected by current copyright law. In response to the
threat of contractual foreclosure of user rights, some commentators have observed that copyright law may, in
the future, serve as a “consumer protection” law, limiting the scope of restrictive contractual provisions through
judicial application of doctrines such as preemption or copyright misuse.” Deborah Tussey, UCITA, Copyright,
and Capture, 21 CARDOZO ARTS & ENT. L. J. 319, 321 (2003).
295 Principles of the Law of Software Contracts, Id. at § 1.09, cmt. d (2010).
296 Principles of the Law of Software Contracts, Id. at § 1.09, illust. 8 (2010).
297 Fid. Fed. Savings & Loan Ass’n v. de la Cuesta, 458 U.S. 141, 152 (1982) (interpreting U.S. Const.,
(“Software vendors are attempting en masse to “opt out” of intellectual property law by drafting license
provisions that compel their customers to adhere to more restrictive provisions than copyright law would
require.”).
299 Mark A. Lemley, Beyond Preemption: The Law and Policy of Intellectual Property Licensing, 87 CAL.
303 Julie Mertus, From Legal Transplants to Transformative Justice: Human Rights and the Promise of
Patent law represents a “carefully crafted bargain for encouraging the creation and
disclosure of new, useful, and non-obvious advances in technology.”304 The Lasercomb
court stretched the patent misuse doctrine to copyright law for the first time.
Specifically, the misuse of copyright defense precludes a copyright holder from
recovering for copyright infringement “where the holder has attempt[ed] to suppress any
attempt by the licensee to independently implement the idea which [the copyrighted
material] expresses.”305 There is little case law on what kinds of software contracting
terms would trigger the misuse doctrine or otherwise violate a fundamental public
policy. Attorney Carr makes these suggestions:
Copyright holders should take care in licensing their property to avoid arguably
anticompetitive license terms. They should also retain counsel to review any
enforcement efforts—threat letters, cease-and-desist demands, takedown
notices, and the like—before they are sent to minimize the chance of any
misleading statements about infringement penalties or the scope of the claimed
copyright. Any such questionable conduct could form the basis of a misuse
defense.306
The Third Circuit in Video Pipeline v. Buena Vista Home Ent., Inc.307 extended the
patent misuse doctrine to copyright, and recognizes that it might operate beyond its
traditional anti-competition context, but found it inapplicable to Disney’s license
agreement.
(4.) State Unfair and Deceptive Trade Practices Act
License agreements and terms of use are also challengeable under state consumer
law. Every state has enacted an unfair and deceptive trade practices act, which is the
Swiss Army Knife for many state attorney generals and private attorneys general.
Massachusetts’ Chapter 93A, for example, allows private litigants as well as the attorney
general to pursue actions. Chapter 93A permits plaintiffs to recover for up to three but
not less than two times actual damages for willful or knowing violations of the act.
Double or treble damages are awarded for “willful or knowing” violations of section 2 of
Chapter 93A.308 To date, few plaintiffs have challenged license agreements, where the
rights and remedies are tilted in favor of the dominant party.
(D.) Preemption of Licensing
In order to be preempted, a claim must involve a work “within the subject matter of
copyright.”309 The Principles of the Law of Software Contracts makes it clear that federal
intellectual property rights preempt licensing. 310 Plaintiffs have not been successful in
Bonito Boats, Inc. v. Thunder Craft Boats, Inc., 489 U.S. 141, 146 (1989).
304
Id. at 371.
305
310 Preemption may be either statutorily or constitutionally based and either express or implied. In its
§ 301, the U.S. Copyright Act contains an express preemption provision, stating that “all legal or equitable
rights that are equivalent to any of the exclusive rights within the general scope of copyright . . . and come
within the subject matter of copyright . . . are governed exclusively by this title.” 17 U.S.C. § 301(a). Courts
interpret this language to mean that a cause of action is preempted if the subject matter at issue is within the
scope of the Act and the rights a party seeks to enforce or protect are not qualitatively different from rights
persuading courts that the U.S. Copyright Act preempts licensing provisions. A large
number of courts have ruled that licensing claims involving the subject matter of
copyright do not constitute equivalent rights under the Federal Copyright Act.311
“Intellectual property law usually does not preempt breach-of-contract actions or the
enforcement of terms of private agreements because restrictive by operating against the
world, compete directly with the federal system.”312 “Of course, preemption cannot be
avoided simply by labeling a claim “breach of contract.”313 A plaintiff must actually allege
the elements of an enforceable contract (whether express or implied-in-fact), including
offer, acceptance, and consideration, in addition to adequately alleging the defendant’s
breach of the contract.”314
§ 4.4 Uniform Electronic Transactions Act
(A.) Provisions of UETA
The Uniform Electronic Transactions Act (UETA) is a model state law act proposed
by the National Conference of Commissioners on Uniform State Laws (NCCUSL) to
create more uniformity in state law for electronic transactions. UETA was enacted to
respond to the “widespread use of the Internet for sale of goods and to provide
uniformity.”315 UETA is solely concerned with the validity of records and digital
signatures and is therefore not a statute concerned with substantive online contract law.
The purpose of UETA is to remove barriers to E-Commerce, implement reasonable
practices, and harmonize contracting procedural rules by enabling the electronic retention
and transmission of digital information. UETA is strictly a procedural statute that
modifies the meaning of writings and signatures. UETA substitutes the “record” for a
paper-based writing and treats signatures in electronic form as signatures made by pen.
The UETA is law in forty-seven of the fifty states and the District of Columbia, as
well as by the territories of Puerto Rico and the Virgin Islands. What this means is that
under the Act. The Patent Act, in contrast, contains no such express language. The ultimate source of authority
for implied preemption is the Supremacy Clause of the U.S. Constitution, which states, “Th[e] Constitution,
and the Laws of the United States which shall be made in Pursuance thereof . . . shall be the supreme Law of
the Land; and the Judges in every State shall be bound thereby, any Thing in the Constitution or Laws of any
State to the Contrary notwithstanding.” U.S. Const. art. VI, cl. 2. Whether the Intellectual Property Clause
itself is an independent source of implied preemption is an open question. The Intellectual Property Clause
states, “The Congress shall have Power . . . To promote the Progress of Science and useful Arts, by securing for
limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries.” Id.
, art. I, § 8, cl. 8. Because the intellectual property statutes are enacted pursuant to this power, the extent of
Supremacy Clause preemption is necessarily related to the interpretation of the Intellectual Property Clause.”
Principles of the Law of Software Contracts, Id. at § 1.09 (2010), cmt.
311 Utopia Provider Sys., Inc. v. Pro-Med Clinical Sys., L.L.C., 596 F.3d 1313, 1326–27 (11th Cir. 2010)
(express contract); Bowers v. Baystate Techs., Inc., 320 F.3d 1317, 1324–26 (Fed. Cir. 2003) (applying First
Circuit law to an express contract in a software license); Wrench, 256 F.3d at 456 (implied-in-fact contract);
ProCD, 86 F.3d at 1454–55 (express contract in a software license); Nat’l Car Rental Sys., Inc. v. Computer
Assocs. Int’l, Inc., 991 F.2d 426, 431 (8th Cir. 1993) (express licensing agreement); Taquino v. Teledyne
Monarch Rubber, 893 F.2d 1488, 1490, 1501 (5th Cir. 1990) (express contract); Acorn Structures, Inc. v.
Swantz, 846 F.2d 923, 926 (4th Cir. 1988) (per curiam) (express contract).
312 Principles of the Law of Software Contracts, Id. at § 1.09 (2010), cmt.
313 “A breach of contract claim requires proof of actual damages. In order to recover for a breach of
contract plaintiffs must prove by a preponderance of the evidence that the breaches are the cause of actual
damages to the plaintiff.” Pilar Servs. v. NCI Info. Sys., 569 F. Supp. 2d 563, 568 (E.D. Va. 2008).
314 Forest Park Pictures v. Universal TV Network, Inc., 683 F.3d 424, 432 (2d Cir. 2012).
315 JAMES J. WHITE & ROBERT S. SUMMERS, UNIFORM COMMERCIAL CODE, § 1–3 at 5 (New York: West
an e-signature or e-record has the same validity as a paper and pen signature or writing.
The UETA adopts a non-regulatory approach to electronic signatures and writings and
validates electronic signatures and records in order to remove barriers to electronic
commerce. A document bearing an electronic signature may be contested on the ground
that an alleged signatory did not execute, adopt, or authorize the electronic signature. A
digital signature is an electronic identifier created by computer with the same legal
validity as a handwritten signature. The UETA “applies to any electronic record or
electronic signature created, generated, sent, communicated, received, or stored on or after
the effective date of the statute.”316
For example, when a person orders goods or services through a vendor’s
website, the person will be required to provide information as part of a process,
which will result in receipt of the goods or services. When the customer
ultimately gets to the last step and clicks “I agree,” the person has adopted the
process and has done so with the intent to associate the person with the record
of that process. The actual effect of the electronic signature will be determined
from all the surrounding circumstances, however, the person adopted a process
which the circumstances indicate s/he intended to have the effect of getting the
goods/services and being bound to pay for them. The adoption of the process
carried the intent to do a legally significant act, the hallmark of a signature. 317
If there is a conflict between U.C.C. Article 2 governing sales, and the UETA, U.C.C.
Article 2 holds the trump card. The UETA defines the “electronic signature” as an
“electronic sound, symbol, or process attached to or logically associated with a record, and
executed or adopted by a person with the intent to sign the record.”318 Section 5(a) of the
UETA does not mandate that a consumer or other party use electronic signatures or
records. However, if the parties agree to use electronic signatures or records, the courts
will validate them.319 UETA Section 5(b) applies “only to transactions between parties,
each of which has agreed to conduct transactions by electronic means.”320
Section 6 states that UETA’s purpose is “to facilitate and promote commerce and
governmental transactions by validating and authorizing the use of electronic records
and electronic signatures.”321 Section 7 of the UETA provides “a record or signature may
not be denied legal effect or enforceability solely because it is in electronic form.”322 Section
7(b) of the UETA legitimizes the concept of electronic contract, providing “a contract may
not be denied legal effect or enforceability solely because an electronic record was used in
its formation.”323 UETA is neither a general contracting statute nor a digital signatures
statute. As of September 15, 2012, eighty U.S. courts weighed in on UETA-related issues
in court decisions. UETA is the most influential state statute validating a wide range of
e-contracts and e-transactions.
316 Section 4 states that the Act “. . . applies to any electronic record or electronic signature created,
320 Id.
321 Id. at § 6.
322 Id. at § 7.
324 Id. at § 3.
325 Id. at § 3, cmt. 1.
326 Id. at § 8(a).
327 Id. at § 8.
328 An “attribution procedure” is a procedure used to identify the person who sent an electronic message
or to verify the integrity of its content. In general, an attribution procedure has substantive effect only if it was
agreed to or adopted by the parties or established by applicable law. Agreement to or adoption of a procedure
may occur directly between the two parties or through a third party. For example, the operator of a system
that includes information provided by third parties may arrange with database providers and customers for
use of a particular attribution procedure. Those arrangements establish an attribution procedure between the
customers and the database providers. An attribution procedure may also be established by two parties in the
expectation that a third party may rely on it. For example, a digital signature may be issued to an individual
pursuant to an agreement between the issuer and the individual, but then accepted or relied on by another
party in a separate transaction. Use of the signature is an attribution procedure in that transaction. Similarly,
a group of member companies may establish attribution procedures intended to bind members in dealing with
one another. Such arrangements are attribution procedures under this Act.” UCITA, Id. at § 102(a)(3).
329 Id. at § 5(a).
Id. at § 5, cmt. 5.
332
Id. at § 7.
333
334 Id. at § 8.
336 E-Sign provides that no contract, signature, or record shall be denied legal effect solely because it is
in electronic form. Nor may a contract relating to a transaction be denied legal effect solely because an
electronic signature or record was used in its formation. E-Sign, Id. at § 101(a).
337 Kathy D. Smith, Chief Counsel & Milton Brown, Deputy General Counsel, Electronic Signatures: A
Review of the Exceptions to the Electronic Signatures in Global and National Commerce Act (June 2003) at 6.
338 Id. (“Apparently the drafters of revised Article 1 and Amended Article 2 feared that the revision
might not get the protection of the 103 exemption [of E-Sign] because of the “in effect” language.”).
339 “At the date this report, 49 states, the District of Columbia, and the Virgin Islands, have adopted a
version of an electronic transactions law. Although some state electronic transactions are modeled closely after
E-Sign or UETA, others are incorporated into state commercial and business codes and contain language
unique to the state and that refer to the underlying substantive law governing the transactions. Where a state
has an electronic transactions law that complies with section 102 of E-Sign, the state law controls whether
electronic signatures and documents relating to the nine E-Sign exceptions are to be given the same legal
validity and effect as paper documents.” Id. at 9.
340 James J. White & Robert S. Summers, Uniform Commercial Code, § 1–3 at 5 (New York: West
E-Sign carves out nine statutory exceptions outside its sphere: (1.) wills, codicils,
and testamentary trusts; (2.) laws governing domestic law matters; (3.) state Uniform
Commercial Code, except section 1–107 and 1–206, Articles 2 and 2A; (4.) court orders
or notices; (5.) utility cancellation notices; (6.) default, foreclosure, or eviction notices;
(7.) health or life insurance benefit cancellation notices; (8.) product recall notices; and
(9.) hazardous, toxic, or dangerous materials notices. 342 Section 102(a)(2) gives the States
the power to exempt certain further documents from E-Sign. Each of these exceptions
reflects well-established law and the consumer expectation that a paper-based document
memorialize the transaction. Transfers of land or dissolutions of marriage should not be
executed by e-mail. Congress considered these carve-outs as documents where the
consumer should receive a hard copy not just an electronic document.
E-Sign insures that courts may not deny the legal effect or the enforceability of
contracts solely because the parties formed the contract through electronic signatures or
electronic records. Internet-related contracts might take the form of sales, leases or the
licensing of intellectual property. E-Sign validates electronic signatures to authenticate
the identity of the sender of a message or the signer of a document, and ultimately to
ensure the original content of the sent message or document is unchanged. Digital
signatures can be automatically time stamped and are more transportable than physical
signatures. E-Sign § 101(c) is a rule of consent requiring that consumers affirmatively
consent before receiving electronic communications in lieu of a writing.343 Consumers must
specifically opt-in to receive electronic communications.
The consent rule also gives consumers a prescribed method for withdrawing consent.
Consumer disclosures are required if an electronic record is substituted for a paper based
record. Consumers may not be compelled to use electronic contracting and must consent
to this method of entering into contracts. Section 101(c)(1)(C)(ii) states that a consumer’s
consent to receive electronic records is valid only if the consumer consents electronically
or confirms his or her consent electronically. The consumer’s consent must demonstrate
that the consumer can access the information that is the subject of the consent. Section
101(c) gives consumers the right to demand that sellers or services providers make a record
available on paper or in another electronic form.
§ 4.6 Revised U.C.C. Article 1
Article 1 of the Uniform Commercial Code (U.C.C.) sets forth basic definitions and
concepts that are utilized throughout the other articles of the U.C.C. In December 2001,
the joint sponsors of the UCC, the National Conference of Commissioners on Uniform
State Laws and the American Law Institute, revised Article 1. Section 1–108 is entitled,
“Relation to Electronic Signatures in Global and National Commerce Act.” This section
makes it clear that U.C.C. Article 1:
modifies, limits, and supersedes the federal Electronic Signatures in Global
and National Commerce Act, 15 U.S.C. Section 7001 et seq., except that
nothing in this article modifies, limits, or supersedes Section 7001(c) of that
Section 101(c)(1)(C)(ii) of E-Sign requires businesses to obtain from consumers electronic consent or
343
344U.C.C. § 1–108.
345KATHY SMITH & MILTON BROWN, ELECTRONIC SIGNATURES (June 2003), Id. at 24.
346 The National Conference of Commissioners on Uniform State Law (NCCUSL is now the Uniform
Law Commission.
separate article of the Uniform Commercial Code called Article 2B.347 The avowed
purpose of U.C.C. Article 2B was to revise U.C.C. Article 2 concepts for the commercial
realities of software licenses. The ABA’s Business Law Section created a software
licensing committee that explored the creation of separate software contracting law. The
U.C.C. sponsoring organizations, ALI and NCCUSL, envisioned a common hub and
separate spokes for Articles 2, 2A, and 2B that correspond to sales, leases, and licenses,
respectively. The death knell for the hub and spoke model sounded in late July 1995,
when NCCUSL abandoned the entire hub and spoke architecture in favor of making
Article 2B a separate U.C.C. article.348
NCCUSL eliminated the hub and spoke model but retained Professor Raymond
Nimmer as the Article 2B Reporter. During the early to mid-1990s, NCCUSL and the
American Law Institute developed a model software code to be included as U.C.C. Article
2B of the Uniform Commercial Code. UCITA customizes U.C.C. Article 2 concepts for the
commercial realities of software licenses. In addition to Professor Nimmer, the key
players for the Article 2B project were the American Bar Association, NCCUSL, and the
ALI. The ALI withdrew from the Article 2B Drafting Project after the ALI Council
surveyed its membership and determined that it would not approve the proposed
software article. ALI’s scuttling of the joint statutory project with NCCUSL to create a
specialized U.C.C.
Article 2B preceded the Uniform Computer Information Transactions Act (UCITA)
as a stand-alone statute. “The UCITA differs from U.C.C. Article 2 by recognizing that
most transactions dealing with software and electronic data . . . As such, the UCITA
attempts to tailor remedies and warranties to the transfer of information rather than
the sale of goods.”349 NCCUSL approved UCITA as the comprehensive statute codifying
software contracts.350 In July of 1999, NCCUSL approved UCITA, which is the first
statute to govern licensing:
UCITA is the first uniform contract law designed to deal specifically with the
new information economy. Transactions in computer information involve
different expectations, different industry practices, and different policies from
transactions in goods. For example, in a sale of goods, the buyer owns what it
buys and has exclusive rights in that subject matter (e.g., the toaster that has
been purchased). In contrast, someone that acquires a copy of computer
information may or may not own that copy, but in any case rarely obtains all
rights associated with the information.351
Raymond T. Nimmer stated: “The purpose of UCITA . . . is to develop contract law
sensitive to computer information as subject matter. . . . Sales of goods are different from
transactions in computer information. A sale of a chair or toaster (the grist of Article 2)
347 Professor Rustad served on the ABA Business Law’s Subcommittee on Software Licensing for a
decade. He served as the task force leader for the scope of U.C.C. Article 2B and also worked on the sections
on transfer and assignment of software.
348 See Thom Weidlich, Commission Plans New U.C.C. Article, NAT’L L. J. (Aug. 28, 1995), at B1 (noting
that NCCUSL appointed Houston law professor Raymond T. Nimmer as Technology Reporter for the new
U.C.C. Article 2B).
349 2 GEORGE B. DELTA & JEFFREY H. MATSUURA, LAW OF THE INTERNET (New York, New York: Wolters,
352 Raymond T. Nimmer, UCITA: A Commercial Contract Code, COMPUTER L. (May 2000) at
353 UCITA § 102(a)(1).
354 Android.com Id., Software License Agreement, http://developer.android.com/sdk/terms.html.
355 UCITA § 208, cmt. 3.
356 Letter of April 2001 to Oklahoma Attorney General Drew Edmundson, http://www.ucita.com/pdf/AG_
letter.pdf+Stephen+Chow+Fair+Use+UCITA&cd=2&hl=en&ct=clnk&gl=us&ie=UTF-8.
357 ABA Working Group on UCITA (Jan. 30, 2002).
358 Id. at 9.
Critics charged that UCITA would enable software publishers to shut down their
customer’s computer system without prior court approval. The Americans for Fair
Electronic Commerce spearheaded an attack on self-help provisions in UCITA. They
charged that remote repossession would give software publishers too much power “in a
dispute over license rights, to remotely shut down an organization’s mission-critical
software.”360 UCITA opponents—large technology users and consumer rights groups who
are strange bedfellows—contended UCITA would give software companies a virtual
stranglehold on technology contracts. 361 The licensee community, too, joined the chorus
against UCITA’s self-help provisions.
Ultimately, UCITA’s drafters limited electronic repossession, which did little to
smother the firestorm. “UCITA Section 816 substantially limits licensor repossession of
information, while Articles 2, 2A and 9 impose no limitations beyond trespass and breach
of peace. Yet this section of UCITA has been quite controversial.” 362 The procedural
rights and obligations for electronic repossession are not disclaimable and may not be
waived by agreement. Just as with Article 9, no repossession can take place where a
breach of the peace would result. UCITA does not want to grant licensors the unbridled
right to use electronic self- help or disabling devices that will cause harm to computer
systems. UCITA § 816 does not permit electronic repossession for consumer licenses.
Nevertheless, critics contended that UCITA’s electronic repossession provisions were
imbalanced favoring large software licensors such as Microsoft and failing to protect
licensee’s rights.363
Critics of UCITA charge that it validated abusive practices such as requiring
consumers to litigate in distant forums, depriving them of a meaningful remedy.
Nevertheless, an empirical study of website licenses found that licensors did not abuse
their market power by imposing harsh terms and conditions in standard-form license
agreements.364
The firestorm over a few UCITA provisions deflects attention away from the
empirical reality that many of its rules reflect best practices in the software industry
developed over the past three decades. The United States was the first post-industrial
society to develop a specialized civil code covering the licensing of software. UCITA applies
360 Americans for Fair Electronic Commerce Transactions, What is UCITA? http://www.ucita.com/
what_problems.html.
361 “One of the reasons that the UCITA project did not succeed is that, although UCITA attempted to
mask its real focus on mass market transactions with a purported paradigm of a negotiated transaction, it in
fact explicitly addressed non-negotiated deals in a way that was inconsistent with U.C.C. Art. 2, which
disfavors delayed disclosure of material terms. . . . UCITA seems to protect delayed disclosure of even
significant terms in non-negotiated deals, thus revealing its real concern with validating an approach dubious
under both commercial and consumer law. Most state attorneys-general in the United States—who enforce
state consumer protection laws—and the Federal Trade Commission reacted negatively and pressed for
changes.” Jean Braucher, U.S. Influence with a Twist: Lesson About Unfair Contract Terms from U.S. Software
Customers, 2007 COMPET. & CONSUMER L. J. 5, 12 (2007).
362 Carlyle Ring and Raymond T. Nimmer, NCCUSL, Series of Papers on UCITA Issues, http://www.
364 Florencia Marotta-Wurgler, Competition and the Quality of Standard-Form Contracts: An Empirical
Section
Title of Parts & Subparts Numbers
365 “One of the reasons that the UCITA project did not succeed is that, although UCITA attempted to
mask its real focus on mass-market transactions with a purported paradigm of a negotiated transaction, it in
fact explicitly addressed non-negotiated deals in a way that was inconsistent with U.C.C. Art 2, which disfavors
delayed disclosure of material terms. . . . UCITA seems to protect delayed disclosure of even significant terms
in non-negotiated deals, thus revealing its real concern with validating an approach dubious under both
commercial and consumer law. Most state attorneys-general in the United States—who enforce state consumer
protection laws—and the Federal Trade Commission reacted negatively and pressed for changes.” Jean
Braucher, U.S. Influence with a Twist: Lesson About Unfair Contract Terms from U.S. Software Customers,
2007 COMPET. & CONSUMER L. J. 5, 12 (2007).
As the chart above depicts, UCITA is divided into nine parts: (1.) General
Provisions, (2.) Formation and Terms, (3.) Construction, (4.) Warranties, (5.) Transfer of
Interests and Rights, (6.) Performance, (7.) Breach of Contract, (8.) Remedies and (9.)
Miscellaneous Provisions. Lawyers frequently import UCITA provisions into their mass-
market license agreement because of their flexibility. Even though UCITA has not been
widely adopted, it is nevertheless a useful template for a wide array of software licensing
transactions. Two leading scholars assert, “that UCITA maintains the contextual,
balanced approach to standard terms that can be found in the paper world.”366 Douglas
E. Phillips, vice president and general counsel of Promontory Interfinancial Systems,
contends that counsel representing software licensors or licensees must master UCITA’s
provisions. For example, Phillips recommends that attorneys learn UCITA’s provisions
in deciding whether to opt in or out of the statute:
[L]awyers who assist clients in computer information transactions must place
their bets . . . In negotiating software licenses and other computer information
transactions, lawyers are being confronted with proposed contractual choice-of-
law clauses that invoke UCITA.367
(E.) UCITA’s Sphere of Application
UCITA applies to “computer transactions”368 which encompasses “contracts to
create, modify, transfer or license computer information or informational rights in
computer information.”369 A computer information transaction is defined as an
agreement or the performance of it to create, modify, transfer, or license computer
information or informational rights in computer information. The licensing of
intangibles, like leases, validates the legal concept of the right to use property. The
question of who has title to tangible copies of intangibles is not dispositive or even
relevant to licensing rights. With software licensing, the medium is not the message,
only the right to exploit information. The ease of copying software has made the
invention of licensing the only efficient method of realizing value. UCITA’s scope is
transactions in information, which is a broader concept than software licensing. A
366 See Robert A. Hillman & Jeffrey J. Rachlinski, Standard-Form Contracting in the Electronic Age, 77
373 “ ‘Attribution procedure’ means a procedure to verify that an electronic authentication, display,
message, record, or performance is that of a particular person or to detect changes or errors in information.
The term includes a procedure that requires the use of algorithms or other codes, identifying words or numbers,
encryption, or callback or other acknowledgment.” UCITA § 102(a)(5).
374 UCITA defines authenticate to mean:
(A) to sign; or (B) with the intent to sign a record, otherwise to execute or adopt an electronic
symbol, sound, message, or process referring to, attached to, included in, or logically associated or
linked with, that record. UCITA § 102(a)(6).
375 “ ‘Computer information’ means information in electronic form which is obtained from or through the
use of a computer or which is in a form capable of being processed by a computer. The term includes a copy of
the information and any documentation or packaging associated with the copy.” UCITA § 102(a)(10).
376 “ ‘Electronic agent; means a computer program, or electronic or other automated means, used
independently to initiate an action, or to respond to electronic messages or performances, on the person’s behalf
without review or action by an individual at the time of the action or response to the message or performance.”
UCITA § 102(a)(27).
377 “ ‘Electronic message’ means a record or display that is stored, generated, or transmitted by
electronic means for the purpose of communication to another person or electronic agent.” UCITA § 102(a)(28).
378 “This term helps to define the scope of this Act. Section 103 requires an agreement involving
computer information. The term includes transfers (e.g., licenses, assignments, or sales of copies) of computer
programs or multimedia products, software and multimedia development contracts, access contracts, and
contracts to obtain information for use in a program, access contract, or multimedia product. However, the
mere fact that parties agree to communicate in digital form does not bring a transaction within this definition,
nor does a decision by one party to use computer information when the contract does not require this.” UCITA
§ 102(a)(9).
379 BRIAN W. SMITH, E-COMMERCE FINANCIAL PRODUCTS & SUCCESS, F-5 (New York, New York:
UCITA § 102(a)(27).
380
Section 209(c) provides: “In a mass-market transaction, if the licensor does not have an opportunity
381
to review a record containing proposed terms from the licensee before the licensor delivers or becomes obligated
to deliver the information, and if the licensor does not agree, such as by manifesting assent, to those terms
after having that opportunity, the licensor is entitled to a return.” UCITA, Id. at § 209(c).
382 UCITA §§ 112(e), 209(b).
383 Courts have refused to enforce clauses in a few Internet-related license agreements. See e.g.,
Riensche v. Cingular Wireless, L.L.C., No. C06–1325Z, 2006 WL 3827477, at 9 (W.D. Wash. Dec. 27, 2006)
(holding that the forum selection clause was substantively unconscionable); Comb v. PayPal, Inc., 218 F. Supp.
2d 1165, 1173, 1176 (N.D. Cal. 2002) (refusing to enforce pre-dispute mandatory arbitration clause in user
agreement ruling that the forum selection clause was substantively and procedurally unconscionable).
Additionally, the doctrine of unconscionability has been applied in a wide array of contexts. See e.g., Scott v.
Cingular Wireless, 161 P.3d 1000, 1006 (Wash. 2007) (holding a class action waiver unconscionable); Gatton
v. T-Mobile USA, 61 Cal. Rptr. 3d 344, 358 (Cal. Ct. App. 2007) (holding a class action waiver unconscionable
and unenforceable); Aral v. EarthLink, Inc., 36 Cal. Rptr. 3d 229, 238 (Cal. 2005) (holding a class action waiver
unconscionable). See Brower v. Gateway 2000, Inc., 676 N.Y.S.2d 569, 575 (N.Y. App. Div. 1998) (explaining
that New York requires “a showing that a contract is “both procedurally and substantively unconscionable
when made’ ”) (quoting Gillman v. Chase Manhattan Bank, 73 N.Y.2d 1, 10 (1988)). California’s test for
substantive unconscionability is whether the clause or contract “shocks the conscience.” Am. Software, Inc. v.
Ali, 54 Cal. Rptr. 2d 477, 480 (Cal. Ct. App. 1996). The test for procedural unconscionability is whether “the
manner in which the contract was negotiated” was unfair. Id. at 479.
384 U.C.C. § 2–302, cmt. 1 states this guidepost for unconscionability.
386 Procedural unconscionability “concerns the manner in which the contract was negotiated and the
circumstances of the parties at that time.” Kinney v. United Healthcare Servs., Inc., 70 Cal.App.4th 1322, 83
Cal.Rptr.2d 348, 352–53 (Ct.App.1999). A determination of whether a contract is procedurally unconscionable
focuses on two factors: oppression and surprise. See also, Stirlen v. Supercuts, Inc., 51 Cal.App.4th 1519, 60
Cal.Rptr.2d 138, 145 (Ct.App.1997) (discussing test for procedural unconscionability as being oppression from
the inequality of bargaining power and surprise as hidden terms).
and fair man would accept on the other.”387 In contrast, procedural unconscionability is
often found when one of the parties has no reasonable opportunity to know what he is
signing. A door-to-door sales representative, in a classic illustration, intentionally spills
coffee on a prospective customer to divert his attention and then switches a promissory
note for the sweepstakes entry form the consumer thought he was signing.
This creates a problem of procedural unconscionability. The use of hidden terms in
software licenses will qualify as procedural unconscionability, whereas an exorbitant fee
for arbitration could constitute substantive unconscionability. In order to strike down a
license agreement or a clause in a license agreement, a court must find both an unfair
bargaining process, which is procedural unconscionability, as well as unfair terms, which
is substantive unconscionability. It takes a grossly unfair term such as a forum selection
clause for a U.S. citizen in Oslo, Norway to constitute substantive unconscionability.
Section 111(b) of UCITA follows U.C.C. § 2–302’s methodology in requiring a court to
hear evidence of the commercial setting and other circumstances before invalidating a
license agreement on the grounds of unconscionability.
Unconscionability, however, has proved to be a toothless tiger when it comes to
terms of service agreements.388 There are few terms of service agreements where a court
has struck down either a clause or an entire webwrap license agreement as
unconscionable. A court will refuse to enforce a software contract or a single provision
on unconscionability or public policy grounds. Courts will not strike down a contractual
provision unless they believe it is so one-sided in favor of the dominant party to “shock
the conscience.” Courts will typically look at the contract’s purpose and circumstances in
play when the contract was executed in making a determination about
unconscionability. A California court struck down EarthLink’s arbitration agreement in
a case where consumers filed suit for “improperly charging fees for a digital subscriber
line, or DSL, prior to providing customers with the equipment necessary to utilize the
service.”389 Typically, a court must find unfair bargaining (procedural unconscionability)
as well as an unfair bargain in fact (substantive unconscionability). In EarthLink, the
court found the provider’s arbitration provision to be procedurally unconscionable
because it was presented during installation or when the package was mailed with no
right to opt out.390 Hundreds of millions of consumers have entered into terms of service
agreements with social networking sites. To date, however, a court has invalidated a
terms of use or terms of service agreement on unconscionability grounds in only a single
case.391
387 Farrell v. Convergent Communications, Inc., No. C98–2613 MJJ, 1998 WL 774626, at *4 (N.D. Cal.
(holding game maker’s terms of service and end user license agreement to be enforceable and rejecting
competing game maker’s argument that these agreements was unconscionable even though these mass-market
licenses prohibited reverse engineering, disassembling, and making derivative works).
389 Mike McKee, Earthlink Chastised Over DSL Dispute, 129 THE RECORDER 1 (Nov. 30, 2005).
390 Id.
391 Bragg v. Linden Research, Inc., 487 F. Supp. 2d 593 (E.D.P.A. May 30, 2007) (finding arbitration
clause in Terms of Service for Second Life both procedurally and substantively unconscionable in case filed by
attorney Second Life plaintiff).
[a] love/hate relationship with form terms. On the one hand, consumers admit that they have no
interest in reading form contracts, enjoy the convenience and efficiency of form contracting, and
routinely accept forms “dressed up” as deals without stopping to read or question their content. On
the other hand, consumers are often frustrated with the effectively nonnegotiable nature of these
contracts and complain that they lack the requisite time or understanding to read or negotiate
companies’ impenetrable purchase terms.
Amy J. Schmitz, Pizza-Box Contracts: True Tales of Consumer Contracting Culture, 45 WAKE FOREST L. REV.
863, 864–65 (2010) (arguing that consumers bear some responsibility for acquiescing to the stronger party
“running roughshod over their rights”).
395 Id. at § 208(1).
are enforced if three conditions are met: (1.) the user has an opportunity to review the
terms of the license, (2.) the user manifests assent after having an opportunity to review
the terms, and (3.) the actions are “attributable in law” to the user. UCITA rejects the
doctrine of acceptance by silence for standard form licenses, which is a criticism of
browsewrap. Assent is not conditioned on whether the party has read or understood the
terms of the agreement.396 The concept of manifesting assent is based upon an objective
standard rather than a subjective “meeting of the minds.” A minimally adequate
objective manifestation of assent is an opportunity to review the record coupled with an
affirmative act that indicates assent.
However, one of the difficult policy issues to determine is to decide what affirmative
conduct constitutes assent. In a paper-based contract, a signature establishes the
manifestation of assent. UCITA permits the manifestation of assent to be fulfilled by an
affirmative act, such as clicking a display button reading: “I accept the terms of this
agreement.” A licensor must give the licensee a right to a refund if the licensee has not
had an opportunity to review the terms and manifest assent prior to payment. 397 UCITA
§ 114 requires that the licensor of the terms of service give the potential customer an
opportunity to review the terms of a standard-form license. UCITA § 114 is fulfilled so
long as the licensor gives the customer an opportunity to review the terms of the license
before the software maker delivers the software and the customer is bound to pay. Under
Section 209(b), a licensor must give the licensee a right to a refund if the licensee has
not had an opportunity to review the terms and manifests assent prior to payment.
As a result, mass-market licenses are a useful legal invention. The alternative to
mass-market licensing would be retaining an attorney to negotiate the terms of each
license, which would not be cost-efficient. One possible effect of increasing overall costs
on the business may be that there would be fewer resources available for the
development of new and improved products. In addition, negotiating mass-market
agreements would limit the availability of the licensed products overall or sharply
increase the price of licensed products in the market. For example, UCITA § 112 binds a
licensee to the terms of a shrinkwrap, or clickwrap agreement as long as the party
manifests assent to the terms of the agreement.
UCITA also validates “rolling contracts,” permitting a content provider or software
publisher to add, delete, or change terms after the licensee has paid royalties for access.
The trend in recent judicial decisions is that courts enforce “cash now, terms later”
software agreements so long as the licensor gives reasonable notice to the user and
provides an opportunity to decline the terms. UCITA allows rolling contract terms to be
adopted after performance if the licensee “had reason to know that their agreement
would be represented by terms in a record that there would be no opportunity to review
before performance or use began.”398 UCITA validates “rolling contracts” if the person
had reason to know that terms would come later, had a right to a refund if he declined
the terms, and manifests assent after an opportunity to review them. 399
39 (2000).
399 Raymond T. Nimmer, Licensing of Information Assets, 2 INFO. LAW § 11:147 (June 2009).
are motivated primarily by economic self-interest and have a right to pursue self-interest
“without interference from others or the imposition of alternative conceptions of the good
by others.”405 It is in the self-interest of the software industry to disclaim all warranties
and consequential damages, which may leave consumers without a minimum adequate
remedy.
(3.) Attributable to Licensee
UCITA spells out substantive rules needed for online transactions that provide
safeguards and safe harbors against a user’s inadvertent assent or attribution. Section
212(a) states that electronic events are attributable to either the person or their
electronic agent. Under UCITA § 102(a)(5), for example, attribution procedure is defined
as any electronic authentication or performance of a particular person that enables
tracking of changes or the identification of errors in e-communications. Algorithms and
other codes incorporating encryption, callback, or other acknowledgements are used to
verify authenticity of messages. UCITA validates the use of electronic agents, automated
means of initiating action, and responding to electronic records without review by human
beings. Under UCITA § 206, the parties may closely track both E-Sign and UETA’s
concept of attribution. Under UCITA § 206, the parties may use electronic agents to enter
into contracts (offer and acceptance) without the benefit of human review.406 UCITA
updates the concept of writing with a “record,” which is the functional equivalent of a
paper-based writing.
Section 107 of UCITA provides that “a record or authentication may not be denied
legal effect or enforceability solely because it is in electronic form.”407 UCITA spells out
substantive rules needed for online transactions that provide safeguards and safe
harbors against a user’s inadvertent assent or attribution. Section 212(a) states that
electronic events are attributable to either the person or their electronic agent. Trading
partner agreements often specify the protocols used in computer-to-computer
transactions.
(H.) Formation of Online Contracts
UCITA follows the U.C.C. definition of a contract that includes express terms plus
supplemental terms. “An ‘agreement’ is the bargain of the parties in fact as found in
their language or other circumstances, including course of performance, course of
dealing, or usage of trade.”408 UCITA updates contract law substituting the concept of a
record for a writing.409 Mark Lemley criticizes UCITA’s overly liberal formation rules:
[S]ince [UCITA] makes it so easy to write and enforce the terms of a contract,
a software vendor with a good lawyer can quite easily enforce virtually
whatever terms it likes simply by putting them ‘conspicuously’ in a multi-page
409 “A ‘record’ is information that is inscribed on a tangible medium or that is stored in an electronic or
document that the user cannot even see (much less agree to) until after buying,
installing, and beginning to run the software.410
UCITA’s broad enforceability of standard-form EULAs is aligned with software
industry developments.411 The second part of UCITA “supplies modified contract
formation rules adapted to permit and to facilitate electronic contracting, and rules to
determine the terms of contracts formed, including protections against “imposed” terms,
unauthorized communications, and electronic error, and incentives for pre-transaction
disclosure of all terms to be a part of the contract.”412
UCITA provides Internet-related legal infrastructure that is an advance over
U.C.C. Article 2. The concept of a “record” enables the parties of an e-contract to satisfy
the moth-eaten Statute of Frauds that still is the law in every U.S. jurisdiction. England
abolished its Statute of Fraud in sales in the early 1950s. UCITA allows computer-to-
computer transactions by substituting the concept of an electronic record as the functional
equivalent of writing. UCITA provides essential legal infrastructure for many different
forms of electronic contracts. UCITA § 201 requires a writing for license agreements which
are $5,000 or greater.
UCITA recognizes several exceptions to the Statute of Fraud’s writing requirement.
For example, a license agreement is enforceable after a completed performance, a court
admission, or a merchant licensor’s failure to answer a confirming record. “Part 3 of
UCITA provides rules governing parol evidence, modification, changes in terms and for
interpretation in the absence of explicit treatment by the parties.”413 UCITA’s parol
evidence rule substitutes the term “record” for a writing but is otherwise parallel to
U.C.C. § 2–202.414 Like Article 2, UCITA permits integrated writings to be supplemented
by course of performance and by course of dealing and usage of trade. Courts may receive
evidence of consistent additional terms unless the record states that it is “a complete and
exclusive statement of the terms of the agreement.”415
(1.) Express Warranties
UCITA’s express warranty provisions include both affirmation of act and promises
that the software publisher or other licensor makes to its customer relating to the
software, which is the “basis of the bargain” test. An express warranty is breached when
claims are not supported or product fails to live to affirmative statements about its
performance. UCITA’s express warranty provisions for computer information transactions
borrows extensively from U.C.C. § 2–313. Express warranties are not disclaimable because
410 Mark A. Lemley, Beyond Preemption: The Law and Policy of Intellectual Property Licensing, 87 CAL.
Software, 12 GEO. MASON L. REV. 687, 687–88 (2004) (concluding that end user licenses (EULAs) are here to
stay for the foreseeable future despite hundreds of articles criticizing this form of contracting).
412 William Denny, The Joint Task Force of the Delaware State Bar Association Sections of Commercial
Law, Computer Law, Intellectual Property, and Real and Personal Property Overview of the Uniform Computer
Transactions Act (Jan. 5, 2000) at 11.
413 Id.
414 The parol evidence rule prohibits the introduction of extrinsic evidence in prior or contemporaneous
agreements to alter the terms of an integrated and complete written contract. Where two contracts contain all
the essential terms of the respective agreements, and neither contract is facially ambiguous, they must be
viewed as integrated documents that are subject to the parol evidence rule. Under these circumstances, the
terms of these contracts may not be varied by parol evidence unless they are somehow ambiguous.
415 UCITA § 301.
it would be fraud to make a statement about a digital product’s performance and then later
disclaim it.
Internet merchants create express warranties whenever they make definite
statements about the software’s performance in product packaging, banner
advertisements, pop-up advertisements, and sales representations or demonstrations,
whether on or off line. Website promotional materials, product descriptions, samples, or
advertisements will also create express warranties. A breach of warranty claim has four
elements: (1.) a contract between the parties; (2.) a breach of that contract; (3.) damages
flowing the breach; and (4.) that the party stating the claim performed its own
contractual obligations. UCITA divides warranties into two broad categories: warranties
of non-infringement and warranties of quality. Common software licensing warranties
include those of non-infringement, express warranties, the implied warranty of
merchantability of a computer program, information content, fitness for licensee’s
purpose, and the warranty of system integration. 416 When applied to software, the
concept of merchantability requires the software to perform at a level that is at least
fair, average, and not objectionable in the software industry. Merchantability always
references the specific industry. Software must have the minimal quality of similar code
in the industry (which tolerates a certain amount of bugs) without objection. The mere
fact there are problems in the software does not mean it is unmerchantable. 417
UCITA’s express warranty provisions include “not only affirmations of fact, but also
promises made by the licensor to its licensee which relate to the software and become
part of the basis of the bargain.”418 Affirmations of fact about software or other digital
information creates express warranties to the extent that they form the “basis of the
bargain.”419 A licensor makes an express warranty “if the licensor affirms a fact or makes
a promise to the licensee.”420 Internet merchants create express warranties when they
make definite statements about the software product packaging; banner advertisements;
sales literature; and demonstrations—notwithstanding representations made by sales
personnel to customers.
Website promotional materials, product descriptions, samples, or advertisements will
also create express warranties. A statement that goes to the “basis of the bargain” creates
an express warranty. Express warranties in the online world are created through sales
literature, seller’s talk, website advertisements, and live demonstrations on the Internet.
The question of whether an express warranty is breached is determined by whether the
in a license agreement for a multi-property management system computer program requiring defendant to
correct program errors was a warranty under Maryland’s Uniform Computer Information Transactions Act,
but a disclaimer that correction of errors was not guaranteed was construed as requiring only a good faith
effort to correct program errors.”).
419 Courts have held that an advertisement or packaging may create an express warranty. See e.g.,
Cipollone v. Liggett Group, Inc., 893 F.2d 541, 575–76 (3d Cir. 1990) rev’d in part on other grounds 505 U.S.
504(1992) (concluding that cigarette advertisements representing that the cigarettes were safe could constitute
an express warranty); Elias v. Ungar’s Food Products, 252 F.R.D. 233, 252 (D.N.J. 2008) (packaging statements
regarding fat and caloric content created express warranty).
420 JANE K. WINN & BENJAMIN WRIGHT, THE LAW OF ELECTRONIC COMMERCE (New York, New York:
claims made by products are supportable. UCITA’s express warranty provisions for
computer information transactions are substantially similar to U.C.C. § 2–313.
(2.) Implied Warranty of Merchantability
421 Id. (stating that “[t]he mere fact that some systemic performance failures occur does not prove breach
of merchantability. The issue should be whether those failures are extraordinary as juxtaposed to ordinary
users and performance of similarly complex programs.”).
UCITA § 405(c)(2).
422
1 BARKLEY CLARK & CHRISTOPHER SMITH, THE LAW OF PRODUCT WARRANTIES § 6.2 (Boston,
423
427 Id.
428 Marie Flores, Don’t Settle For Just a Warranty, 19 NO. 10 E-COMMERCE L. & STRATEGY 1 (Feb. 2003).
429 UCITA § 404.
430 UCITA § 404(b)(1).
431 UCITA § 404(b).
432 Principles of the Law of Software Contracts, Id. at § 101(a).
Section 404(a) limits the warranty to merchant/licensors that have a special relationship
of reliance with the licensee. This information-content warranty is limited to the
statement that the content was not inaccurate due to anything that the licensor did in
its processing. It is the information content creator, not the licensor, who would create
inaccuracies in informational content. Therefore, this warranty gives little protection to
the licensee against inaccuracies.
The merchant-licensor’s duty as to information content is limited to inaccuracies
“caused by the merchant’s failure to perform with reasonable care.”433 UCITA devises an
implied warranty for informational content that is unlike those found in either Article 2
or 2A of the UCC.434 Virginia, one of only two states to enact UCITA, adopted the
information content warranty:
Unless the warranty is disclaimed or modified, a merchant that, in a special
relationship of reliance with a licensee, collects, compiles, processes, provides,
or transmits informational content warrants to that licensee that there is no
inaccuracy in the informational content caused by the merchant’s failure to
perform with reasonable care.
(b.) A warranty does not arise under subsection (A) with respect to:
(1.) subjective characteristics of the informational content, such as the
aesthetics, appeal, and suitability to taste;
(2.) published informational content; or
(3.) a person that acts as a conduit or provides no more than editorial
services in collecting, compiling, distributing, processing, providing,
or transmitting informational content that under the circumstances
can be identified as that of a third person.
(c.) The warranty under this section is not subject to the preclusion . . . (b)(1)
on disclaiming obligations of diligence, reasonableness, or care. 435
UCITA’s information content warranty is negligence-based not predicated upon
strict liability like the other warranties. The information warranty is not what it is
cracked up to be because it is not applicable to published content. “One who hires an
expert cannot expect infallibility unless the express terms clearly so require. Reasonable
efforts, not perfect results, provide the appropriate standard in the absence of express
terms to the contrary.”436 Moreover, this warranty is more significant for what it does
not do. Section 404(b) states, “merchant licensors give no warranty for the accuracy of
published information content.”437 A lawyer representing a licensor in a contract where
the customer delivers data should limit any warranty protection to the licensor’s
contribution to the inaccuracy. This warranty is more appropriate to database
agreements than for software licensing.
The information content warranty focusing on accuracy of data has a limited sphere
of application. First, only a merchant/licensor can give this warranty. 438 Second, the
merchant/licensor must have a special relationship of reliance with the licensee. 439
Third, the warranty is limited to the statement that the content was not inaccurate due
to the licensor’s processing.440 It is the information content creator, not the licensor, who
would create inaccuracies in informational content. Therefore, this warranty gives little
protection to the licensee against inaccuracies. This special warranty applies to
merchant/licensors who deal in information transactions; it requires that the
information transferred is accurate within the practice of reasonable care. 441
The warranty for informational content does not arise for subjective aspects of the
informational content, published content or when the licensor is merely acting as an
information transfer conduit without providing editorial services. 442 This warranty may
be disclaimed despite UCITA’s general prohibition against disclaiming reasonableness
and care.443 The information content warranty does not extend to aesthetics, subjective
quality, or marketability. No court has construed the meaning of the implied warranty
for information content but presumably, the general standard for services applies.444
(6.) Warranty Disclaimers & Limitations
UCITA allows the parties to disclaim or modify all implied warranties by words or
conduct. The parties to a software license agreement must use specific language to
disclaim warranties, although it may sometimes be disclaimed by circumstances. An
express warranty once created is as “tenacious as a bulldog, and the only way to get rid
of it is to see that it never takes hold.”445 Google Analytics’ warranty disclaimer clause
entitled, “Our Warranties and Disclaimers” states:
We provide our Services using a commercially reasonable level of skill and care
and we hope that you will enjoy using them. But there are certain things that
we don’t promise about our Services.
OTHER THAN AS EXPRESSLY SET OUT IN THESE TERMS OR
ADDITIONAL TERMS, NEITHER GOOGLE NOR ITS SUPPLIERS OR
DISTRIBUTORS MAKE ANY SPECIFIC PROMISES ABOUT THE
SERVICES. FOR EXAMPLE, WE DON’T MAKE ANY COMMITMENTS
ABOUT THE CONTENT WITHIN THE SERVICES, THE SPECIFIC
FUNCTIONS OF THE SERVICES, OR THEIR RELIABILITY,
AVAILABILITY, OR ABILITY TO MEET YOUR NEEDS. WE PROVIDE THE
SERVICES “AS IS”.
SOME JURISDICTIONS PROVIDE FOR CERTAIN WARRANTIES, LIKE
THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A
UCITA § 404(a).
438
Id.
439
440 Id.
441 Id.
445 THOMAS M. QUINN, UNIFORM COMMERCIAL CODE COMMENTARY AND LAW DIGEST SECOND ¶ 2–313[A]
450 JOHN EDWARD MURRAY & HARRY M. FLECTNER, SALES, LEASES, AND ELECTRONIC COMMERCE:
and must be conspicuous. Warranty limitations must not be unconscionable nor violate
fundamental public policies. The Reporter for the Principles of the Law of Contracts
provided by the American law Institute completed an empirical study concluding that
fifty-three out of fifty-four Internet websites eliminated all warranty protection. 451 From
the beginning of the software industry, vendors universally disclaimed implied warranties
of merchantability and the fitness for a particular purpose. In the absence of a disclaimer,
computer programs must be fit for their ordinary purpose.
Consumer software is subject to state law limitations. Some software publishers will
place a legend on their warranty disclaimer that: “Certain state laws do not allow
limitations on implied warranties or the exclusion or limitation of certain damages.” The
proviso might additionally state, “If these laws apply to you, some or all of the above
disclaimers, exclusions, or limitations may not apply to you, and you might have
additional rights to avoid undue scrutiny from the Federal Trade Commission or state
attorneys general consumer protection divisions.” Massachusetts’ Chapter 106, 2–316A
prohibits sellers as well as lessors to disclaim the implied warranty of merchantability
and fitness for a particular purpose. Massachusetts’ law makes it clear that attempted
disclaimers of the implied warranties of fitness and merchantability in consumer
transactions are unenforceable.
(7.) Non-Infringement Warranty
(Chicago, Illinois: American Bar Association Business Law Section, 2d ed. 2007).
such claim that arises out of compliance with either the required specification
or the required method except for a claim that results from the failure of the
licensor to adopt, or notify the licensee of, a non-infringing alternative of which
the licensor had reason to know.453
A licensor that delivers infringing software or interferes with its customer’s right to
use software will be required to indemnify its customer if its software infringes the
intellectual property of third parties. Any disclaimer of the implied warranty of non-
infringement and quiet enjoyment must be done with specific language. UCITA adapts
the warranty of quiet possession of information transfers. This concept originated in real
property transactions and later was applied to sales and leases of goods in the UCC.
UCITA imposes a strict liability standard, making the licensor accountable if the
software or other information product infringes title or intellectual property rights of
others. The software warranties for non-interference and non-infringement protect the
licensee should the licensed software infringe the intellectual property rights of third
parties. In states adopting UCITA, the licensor will have a duty to indemnify its
customer if delivered software violates a third party’s intellectual property rights. 454
Nevertheless, the licensor will seek to limit its indemnification duties to claims
recognized under U.S. intellectual property rights existing at the time that the licensor
delivers the software.455 In addition to non-infringement, licensors also give a warranty
of non-interference to their customers:
for the duration of the license, that no person holds a rightful claim to, or
interest in, the information which arose from an act or omission of the licensor,
other than a claim by way of infringement or misappropriation, which will
interfere with the licensee’s enjoyment of its interest; and
(2.) as to rights granted exclusively to the licensee, that within the scope of the
license:
(A.) to the knowledge of the licensor, any licensed patent rights are valid
and exclusive to the extent exclusivity and validity are recognized by
the law under which the patent rights were created; and
(B.) in all other cases, the licensed informational rights are valid and
exclusive for the information as a whole to the extent exclusivity and
validity are recognized by the law applicable to the licensed rights in
a jurisdiction to which the license applies. 456
(I.) Performance of a License Agreement
Delivery in a software contract occurs when the software maker gives its customer
electronic access to the licensed software. In a typical software license agreement, the
licensor’s delivery obligation may be to give its customer an activation key to enable
access to the licensed software. In an Internet transmission, delivery frequently comes
in the form of a download from a website. In a cloud-computing environment, a customer
will access computing applications and data from a datacenter that provides services as
opposed to tangible goods. Part 6 of UCITA extends commercial law concepts and
methods to information performance standards. Section 605 applies a “material breach”
standard in business-to-business transactions rather than the perfect tender rule, which
is reserved for business-to-consumer transactions.457 Licensors will generally prefer a
fundamental or material breach standard for performance.
A material breach of a software license agreement “occurs when there is a breach of
an essential and inducing feature of the contract.”458 The First Circuit U.S. Court of
Appeals defined material breach to occur: “when there is a breach of an essential and
inducing feature of the contract.”459 A material breach by one party excuses the other
party from further performance under the contract, and once relieved from performance,
the injured party is not liable for further damages incurred by the party in material
breach. The legal significance of a material breach by either the licensor or licensee
“excuses the other party from further performance under the contract.”460 Software
failure is “the occurrence of either deficient functionality, where the program fails to
perform a required function, or deficient performance, where the program performs a
required function too slow or in an insufficient manner”461 UCITA’s § 701 gives an
aggrieved party the right to refuse a performance that is a material breach.462 Under
this section, a material breach is first determined by examining the agreement.
Examples of breach would be repudiation of a contract, failure to perform a contractual
obligation in a timely way, exceeding the scope of use, or failing to comply with other
conditions expressed in the contract.
As with U.C.C. Article 2, it is a breach to repudiate a contract before the date of
performance (anticipatory repudiation). UCITA’s performance rules are functionally
equivalent to U.C.C. Article 2 except for its articulation of a material breach standard
for non-mass-market transactions. Section 703 imports U.C.C. § 2–508’s concept of a
cure. A federal appeals court affirmed damages for a software developer’s failure to cure
software defects in a 2006 case. The court found that a licensor failed to make any efforts
to correct material failure and did not perform substantially in accordance with the
software’s documentation.463 Section 704 adopts the material breach standard for
defective tender of software. Section 707 imports the concept of revocation of acceptance
from Article 2. Section 708 gives parties a right to an adequate assurance of performance,
while Section 709 adopts the concept of anticipatory repudiation with similar provisions
to U.C.C. Article 2, whereas retraction of anticipatory repudiation is found in Section
710.464
Defects in software may be difficult to detect unless engineers build in an extensive
period of alpha testing. Newly developed software will often have latent design defects
only detectable in certain applications. Software problems may not surface until the
product interacts with a third party’s software. The licensor will want to reallocate the
UCITA § 605.
457
459 Id.
461 See Daniel T. Perlman, Note, Who Pays the Price of Computer Software Failure?, 24 RUTGERS
463 Teragram Corp. v. Marketwatch.com, Inc., 444 F.3d 1, 29 (1st Cir. 2006).
risk if its product will not work with third party software. U.C.C. Article 2’s perfect
tender rule does not mesh well with developmental or customized software where bugs
are worked out over a period of acceptance testing. A licensor will be concerned that a
court will mechanically apply the “perfect tender” standard to software, so it is preferred
that the parties agree to a material breach or fundamental breach standard to replace
the perfect tender rule. Saba Software disclosed in a 10Q S.E.C. filing that they, like
many other companies, are challenged by the problem of identifying design defects or
errors in their software prior to release:
Products as complex as ours often contain unknown and undetected errors or
performance problems. Although our products are subject to rigorous testing
and quality control processes, serious defects are frequently found during the
period immediately following introduction and initial shipment of new products
or enhancements to existing products. Although we attempt to resolve all
errors that we believe would be considered serious by our customers before
shipment to them, our products are not error-free. These errors or performance
problems could result in lost revenues, reduced service levels, delays in
customer acceptance on professional services products and would be
detrimental to our business and reputation. As is typical in the software
industry, with each release we have discovered errors in our products after
introduction. We will not be able to detect and correct all errors before releasing
our products commercially and these undetected errors could be significant. We
cannot assure you that there are no undetected errors or performance
problems.465
A software maker will find it difficult to comply with the “perfect tender rule.” The
parties must spell out the meaning of impaired functionality if they choose that test
rather than “perfect tender.” U.C.C. § 601, the perfect tender rule, permits a buyer to
obtain substitute goods if the goods fail “in any respect to conform to the contract.”466
UCITA’s material breach standard is functionally equivalent to Article 25 of the
Convention for the International Sale of Goods (CISG). UCITA imports a large number
of performance-related concepts such as tender, acceptance, rejection, revocation, cure
repudiation, and retraction from U.C.C. Article 2, with minor adaptations. UCITA’s
concept of tender is that a licensor transmits a copy of software or otherwise enables use
or access to software, databases, or other information. In a mass-market license
agreement, the acceptance process will typically include downloading and using the
software. As with the sale of goods, acceptance occurs if the customer fails to return
software after using it. The customer may expressly communicate acceptance to the
software publisher or failing to reject the software. The parties need to specify
acceptance criteria for the customer’s acceptance testing in its operational environment.
The acceptance-testing period is a software industry practice where the software
developer gives its customer a fixed period to evaluate the software and either accept or
reject it.
UCITA adopts a material breach standard for performance in Section 701 that gives
an aggrieved party the right to refuse a performance that is a material breach. Section
701 states a material breach is first determined by examining the agreement. “A breach
465 Saba Software Inc., 10-Q Filing to Securities & Exchange Commission (October 7, 2009).
466 U.C.C. § 2–601.
occurs if a party without legal excuse fails to perform an obligation in a timely manner,
repudiates a contract, or exceeds a contractual use term, or otherwise is not in
compliance with an obligation placed on it by this [Act] or the agreement.”467 UCITA
§ 601(b)(1) excludes the material breach standard for copies of software or other
information in a mass-market transaction. UCITA adopts the perfect tender rule for
mass-market transactions but this rule does not extend to business-to-business or
custom licenses.468 UCITA defines a “mass-market” license to include “consumer
contracts” but also any other license where the end-user licensee receives software on
the same terms. Mass-market end-user licenses are offered by the licensor on the same
terms for the same rights without individual negotiation. Part 6 of UCITA also sets forth
the procedure for terminating a license agreement.
UCITA § 617 requires that the terminating party to give the other party a
“reasonable notice of termination.”469 Termination is the legally operative stage that
discharges obligations on the part of the licensor and the licensee. Nevertheless, in
software license agreements, a licensee may have continuing obligations that survive
termination unlike sales or leases of goods. The Joint Task Force of the Delaware State
Bar Association Sections of Commercial Law, Computer Law, Intellectual Property, and
Real and Personal Property summarizes UCITA Part Six as follows:
Part 6 of UCITA adapts traditional rules as to what is acceptable performance
to the context of computer information transactions, including providing rules
for the protection of the parties concerning the electronic regulation of
performance (Section 605), to clarify that the appropriate general rule is one of
material breach with respect to cancellation (rather than so called “perfect
tender”) (see Section 601; see also Sections 701, 704, and 802), and to carry over
the familiar rules of Article 2 when appropriate in the context of the tangible
medium on which the information is fixed and for impracticability. Part 6 also
supplies guidance in the case of certain specialized types of contracts for
termination.470
UCITA adopts a substantial performance or material breach standard versus
Article 2’s parochial and unrealistic perfect tender rule for contract performance, which
is adopted in no other country connected to the Internet. In contrast, the U.C.C. Article
2 perfect tender rule permits a buyer to obtain substitute goods if the goods fail “in any
respect to conform to the contract.”471 Perfect tender is not a realistic performance
standard for the sale of goods, and courts find ways to bypass this harsh doctrine. Perfect
tender is a disaster for the software industry where software may be composed of
millions of lines of code. A licensee should not be able to cancel a software contract
because of a minor bug or errant line of code. The material breach standard parallels the
fundamental breach of Article 25 of CISG.472 The vast majority of material breach cases
will be ones in which the software fails to substantially conform to its documentation.
UCITA § 701.
467
UCITA § 601(b)(1).
468
470 William Denny, The Joint Task Force of the Delaware State Bar Association Sections of Commercial
Law, Computer Law, Intellectual Property, and Real and Personal Property Overview of the Uniform
Computer Transactions Act (Jan. 5, 2000).
471 U.C.C. § 2–601.
UCITA imports a large number of performance concepts from U.C.C. Article 2, with
minor adaptations. UCITA adapts U.C.C. Article 2 concepts such as tender, acceptance,
rejection, revocation of acceptance, cure, anticipatory repudiation, and retraction of
anticipatory repudiation from Article 2 of the UCC. UCITA’s concept of tender is that a
licensor transmits a copy of software or otherwise enables use or access to software,
databases, or other information.473 A licensor’s right to cure is a major countervailing
power to the licensee’s right to reject software products. In Sun Microsystems technology
development and distribution license, Microsoft had a thirty-day period for error
correction if it failed to meet the compatibility requirements for Java programming
language.474 If Microsoft could not cure the problems in this period, Sun Microsystems
had the right of termination.
Under U.C.C. Article 2, a buyer’s refusal to permit the seller to cure the non-
conforming tender was grounds for breach of the sales contract. In customized or
development software agreements, the acceptance period is the functional equivalent of
a cure. During the acceptance-testing period, the customer will have an opportunity to
fix bugs, reconfigure interfaces, and make adjustments to improve compatibility. UCITA
adapts U.C.C. Article 2’s perfect tender rule to mass-market software licensing
transactions.475 UCITA § 601(b)(1) excludes the material breach standard for copies of
software or other information in a mass-market transaction. “This “conforming tender”
rule (sometimes described as the “perfect tender” rule) applies to cases involving delivery
of a copy in mass-market transactions.”476
UCITA defines a “mass-market” license to include “consumer contracts” but also
any other license where the end-user licensee receives software on the same terms. Mass-
market end-user licenses are offered by the licensor on the same terms for the “same
information or informational rights in a retail transaction under terms and in a quantity
consistent with an ordinary transaction in a retail market.”477 Part 6 of UCITA sets forth
the procedure for terminating a license agreement. UCITA § 617 requires that the
terminating party to give the other party a “reasonable notice of termination.”478
Termination is the legally operative stage that discharges obligations on the part of the
licensor and the licensee. In software license agreements, a licensee may have continuing
obligations that survive termination.
(J.) Remedies for Licensors and Licensees
Part 7 of UCITA establishes the basic rules that govern breach of computer
information transaction agreements. Even if a licensor tenders software with a
substantial defect, it will have an opportunity to cure—a concept UCITA imports from
U.C.C. § 2–508. A customer’s failure to notify the vendor that it is rejecting software
serves as a waiver of all remedies. Part 8 of UCITA imports many U.C.C. Article 2’s
remedies by adapting provisions to licensing. UCITA defines “ ‘direct damages’ as
compensation for losses associated with the value of the contracted for performance itself
as contrasted to loss of a benefit expected from use of the performance or its results.”479
The key UCITA sections measuring direct damages are Section 808 and 809 that are
capped by the contracted-for price or market value for the performance as appropriate.
Section 816 of UCITA limits licensor’s ability to electronically repossess information or
disable software.
UCITA gives the aggrieved party the right to seek a remedy for nonmaterial
breaches as well as for material breaches. However, rescinding a software license
agreement does not preclude the aggrieved party from pursuing other remedies. An
aggrieved party may cancel a license agreement if there is an uncured material breach,
but the breaching party has a right to notice before the non-breaching party cancels a
software contract. UCITA tailored buyer and seller remedies to software transactions.
UCITA § 804 is a carbon copy of U.C.C. § 2–718, the doctrine of liquidated damages,
which defers to the parties’ compensation clauses.
Parties may specify liquidated damages, sometimes called compensation clauses, in
advance so long as they do not amount to a penalty clause. A compensation clause in a
license agreement may set both a floor and a ceiling for recovery by the non-breaching
party (minimum and maximum recovery). The licensee can only change limited remedies
on the narrow grounds of unconscionability, fundamental public policy, or the issue of
mutuality of obligation. None of these tools are promising for addressing consumer
protection problems such as one-sided choice of law, predispute mandatory arbitration,
and limited but exclusive remedies.480
Section 803(b) adopts the doctrine of “sole and exclusive” remedy from U.C.C. Article
2. Xerox offers two remedies for its breach of warranty; (1.) replace the non-conforming
software or (2.) give its customer a refund. In order to bypass the standard remedies, a
licensor must include the specific language “sole and exclusive” to the limited remedy
provision in the license agreement. If this language is used, the “replacement and
refund” remedy displaces all UCITA remedies. This methodology is drawn from U.C.C.
Article 2.
If a licensee can prove that “performance of an exclusive or limited remedy causes
the remedy to fail of its essential purpose,” it may pursue all licensee remedies under
UCITA. UCITA’s doctrine of the failure of essential purpose is the functional equivalent
of U.C.C. § 2–719(2). Courts frequently employ the doctrine of the failure of essential
purpose to strike down unreasonable limitations of damages in software licenses, as was
the case in RRX Industries. v. Lab-Con, Inc.481 In RRX Industries, the court invalidated
a clause in a software license agreement that limited the licensee’s recovery to actual
fees paid under the license agreement. In RRX, the computer seller began installing the
software system in January 1981 and completed it in June 1981. Bugs appeared in them
soon after installation. The seller attempted to repair the bugs by telephone patching.
The licensor upgraded the system to make it compatible with hardware that was
more sophisticated. However, the software maker was unable to iron out the bugs and
the software did not perform according to the specifications. The court found that the
computer maker failed to install an operational software system and to train the buyer’s
employees how to use it. The court upheld the district court’s finding that the default of
the computer seller was “so total and fundamental that its consequential damages
limitation was expunged from the contract.”482
UCITA § 803 permits an aggrieved licensee to have all UCITA remedies if the
vendor’s sole and exclusive remedy “fails of its essential purpose.” Courts have struck
down limited remedy clauses in license agreements where the licensee does not receive
the benefit of the bargain.483 As with most UCITA provisions, the parties to a license
agreement have the freedom of contract to forge their own contract remedies. UCITA
gives the aggrieved party the right to seek a remedy for nonmaterial breaches as well as
for material breaches. However, rescinding a software license agreement does not
preclude the aggrieved party from pursuing other remedies. An aggrieved party may
cancel a license agreement if there is an uncured material breach, but the breaching
party has a right to notice before the non-breaching party cancels a software contract.
UCITA has essentially imported the buyer’s and seller’s remedies of Article 2 of the
U.C.C. to software transactions.
Non-performance of the remedy leaves the licensee without what it bargained for
under the contract, a functioning product.484 For example, UCITA reasons that an agreed
limited remedy provision is enforceable even if it does not afford a consumer (or other
licensee) a “minimum adequate remedy.”485 The consumer’s only tools for challenging
TOUs will be on the narrow grounds of unconscionability, fundamental public policy,
and the issue of mutuality of obligation. 486 None of these tools is promising in resolving
problems such as one-sided choice of law and forum clauses.
If a licensee can prove that “performance of an exclusive or limited remedy causes
the remedy to fail of its essential purpose,” the licensee may pursue any other UCITA
remedy.487 Maryland’s UCITA allows parties to choose the remedies for breach of
contract “even to the point of eliminating judicial remedies and creating an “exclusive
. . . sole remedy.”488 UCITA’s doctrine of the failure of essential purpose is the functional
equivalent of U.C.C. § 2–719(2) which provides: “Where circumstances cause an
exclusive or limited remedy to fail of its essential purpose, remedy may be had as
provided in this Act.”489 UCITA § 803 permits an aggrieved licensee to have all UCITA
remedies if the vendor’s sole and exclusive remedy “fails of its essential purpose.”490 This
provision gives the licensee all of the remedies of UCITA if a limited, exclusive remedy
fails.
486 Id.
488 Baney Corp. v. Agilysys NV, LLC, 773 F. Supp. 2d 593, 605 (D. Md. 2011).
490 Id.
491 “Issues arising from the process of formation in the software environment share common themes
with other kinds of contracts. One major set of questions involves whether to enforce contract terms that
become available only after payment, or that are presented in a take-it-or-leave-it standard form, or both.
Neither Article 2 of the U.C.C. nor the common law has satisfactorily resolved these issues, as evidenced by
the amount of litigation, conflicting decisions, and ink spilled in the law reviews.” Principles of the Law of
Software Contracts, Introduction.
492 Principles of the Law of Software Contracts Intro. (2010).
493 Id.
494 Id.
licenses, sales, and access contracts. To some extent, this approach eliminates heretofore contentious debates
over the characterization of a transaction, and the resulting implications. For example, the application and
reach of these Principles should not depend on whether a transferor labels a transaction a sale or a license. In
this regard, the goal of the Principles is to make sure that the legal rights that flow from an agreement do not
depend solely on the label a party places on the agreement. Instead, legal rights are based on the legitimacy
of the process of contracting and the meaning and appropriateness of the substantive terms in light of federal
intellectual property law, public policy, and unconscionability concerns.” Principles of the Law of Software
Contracts 1, 2 Overview (2010).
498 H. Ward Classen, who represents large-scale licensors, stated in his software licensing treatise, that
the “Principles are perceived as licensee oriented and as incorporating consumer protections into commercial
transactions. Many argue the Principles limit the freedom of contract, increasing vendor cost and uncertainty,
leading to an increase in litigation . . . From the licensor’s perspective, the most controversial provision
addresses a non-disclaimable warranty of ‘no hidden material defects.’ This warranty may not be disclaimed.
The warranty extends “ to any party in the normal chain of distribution.” H. WARD CLASSEN, A PRACTICAL
GUIDE TO SOFTWARE LICENSING FOR LICENSEES AND LICENSORS (Chicago, Illinois: American Bar Association,
Business Law Section, 4th ed. 2011) at 273.
law and recommends best practices, without unduly hindering the law’s
adaptability to future developments. . . . The ALI has employed the “Principles”
approach before in projects such as “Principles of Corporate Governance:
Analysis and Recommendations” and “Principles of the Law of Family
Dissolution: Analysis and Recommendations.”499
Judges have little recourse but to stretch U.C.C. Article 2 to software but sales law
“is inadequate to govern software transactions because, unlike hard goods, software is
characterized by novel speed, copying, and storage capabilities, and new inspection,
monitoring, and quality challenges.”500 The problem with extending U.C.C. Article 2 to
software is that it does not fit this durable goods paradigm. 501 Title never passes with
licensing unlike sales. Similarly, U.C.C. Article 2’s warranty of title is inapplicable to
software transactions. Software requires its own specialized legal infrastructure to
reflect its emblematic qualities in the borderline between intellectual property and the
law of contracts.
With soft law, courts have the discretion to apply the Principles as definitive rules,
to supplement the common law or Article 2 of the UCC, or not use this template. 502 In
the past, the ALI distilled the common law by developing Restatements of the Law such
as the Restatement of Contracts and the Restatement of Torts. In contrast to UCITA or
Article 2 of the UCC, the Principles of Software are not self-executing and do not apply
unless a court adopts them. The Principles offer courts as well as attorneys representing
clients a limited number of rules applicable to most software contracts. 503 Courts may
also apply the Principles by analogy even though a given transaction is outside the
sphere of application. The following is a roadmap of the topics covered by the Principles
of the law of Software Contracts:
Id. at 1–2.
500
501 The courts’ strained efforts of applying the law of sales to the licensing of intangibles is like the
television commercial in which two mechanics are trying to fit an oversized automobile battery into a car too
small to accommodate it. The car owner looks on with horror as the mechanics hit the battery with mallets,
trying to drive it into place. The owner objects and the mechanics say, “we’ll make it fit!” The owner says, “I’m
not comfortable with make it fit.” Michael L. Rustad, Commercial Law Infrastructure for the Age of
Information, 16 J. MARSHALL J. COMPUTER & INFO. L. 255, 274 (1997).
502 Maureen O’Rourke, Software Contracting, SM088 ALI–ABA 27, American Law Institute American Bar
xix.
Chapters
of Principles Key Selections
Chapter 1: § 1.01 Definitions
Definitions, § 1.06 Scope in General
Scope and § 1.07 Scope of Embedded Software
General Terms
§ 1.08 Scope: Mixed Transfers
(Sections 1.01–1.14)
§ 1.09 Enforcement of Terms under Federal Intellectual
Property Law
§ 1.10 Public Policy
§ 1.11 Unconscionability
§ 1.12 Relation to Outside Law
§ 1.14 Choice of Law in Standard Form Transfers, Forum-
Selection Clauses
Chapter 2: § 2.01 Formation Generally
Formation § 2.02 Enforcement of the Standard Form
and Enforcement § 2.03 Contract Modification
(Sections 2.01–2.04)
The Principles apply to any transfer of any software, including sales, leases, and
licenses, as long as the transfer of software is supported by consideration, which
encompasses sales, leases, and licenses. 504 The ALI Reporters describe the sphere of
504 “These Principles address several sets of issues. The first issue involves the scope of the project. For
a discussion of this difficult issue, see the Summary Overview to Chapter 1, Topic 2, that follows. We conclude
that the appropriate scope of the project is agreements for the transfer of software or access to software for a
consideration, i.e., software contracts. The project does not include the exchange of digital art or digital
databases for reasons discussed in the Summary Overview to Topic 2 of this Chapter.” American Law Institute
Reporters, Introduction to Principles of Software Contracts (May 2010).
application as any form of software contract, thus avoiding the problem of determining
whether a given software transaction was a sale, lease, or license. As the Reporters state:
Focusing on software contracts, regardless of the type, avoids issues arising
from the label the parties place on a transaction. Regardless of whether the
parties call their transaction a license, sale, lease, or something else, the
Principles would apply and courts would avoid the question of whether the
UCC’s Article 2, common law, UCITA, or some other law governs the
transaction.505
Apache License Version 2.0 grants the licensee a “perpetual, worldwide, non-
exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare
Derivative Works of, publicly display, publicly perform, sublicense, and distribute the
Work and such Derivative Works in Source or Object form.”506 The Principles’ sphere of
application excludes all open source software contracts that are royalty-free or without
consideration.
The Principles of the Law of Software Contracts is a project aimed at all software
contracts entered into for consideration, whether structured as licenses, transfers,
assignments, or sales. The Restatement-like Principles address legal issues for
transferring software for consideration, whether by lease, license or sale.
(2.) Exclusions from the Principles’ Sphere of Application
“Section 1.01(j) defines software to exclude digital content (digital art and digital
databases) and §§ 1.06 through 1.08 delineate the types of software transfers targeted
by the Principles.”507
(b.) Embedded Software
The Principles exclude embedded software from its sphere of application. 508 The
Principles are inapplicable to physical media on which software is stored or transferred
such as a CD-ROM or firmware.509 UCITA Article 2 is the applicable law for CD-ROMs
and firmware, a result similar to UCITA’s sphere of application.
505 Robert A. Hillman & Maureen O’Rourke, Principles of the Law of Software Contracts: Some
508 “Software embedded in goods should less frequently raise issues concerning copying, transfer,
support, maintenance, upgrade, inspection, monitoring, licensing restrictions, or remedial limitations (in any
way distinct from the goods themselves). For example, embedded software typically is difficult to copy and
special-purpose in nature so that the owner of one kind of goods with embedded software cannot easily copy
the software and transfer it for use in another brand or kind of goods. In addition, “[w]hen software is embedded
and marketed as an integral part of goods, many, if not most, people would consider the software to be part of
the goods.” Principles of the Law of Software Contracts 1, 2 Overview (2010).
509 “Like UCITA, these Principles do not apply to transactions that involve telecommunication services,
such as the distribution of audio and visual content either on cable or over the Internet, and do not apply to
most transactions involving the motion picture and music industries. However, these Principles effectuate
these exclusions, not by creating industry-specific carve-outs, but by limiting the scope to transfers of software
as defined in § 1.01(j) and (m) and by utilizing the predominant-purpose test of § 1.08 for mixed transactions.
Principles of the Law of Software Contracts 1, 2 Overview (2010). “Section 1.01(j), which defines software, and
§§ 1.06 through 1.08, on scope, accomplish the goals set forth in this discussion. Section 1.01(j) defines software
Open source licenses510 without licensing fees or other consideration, are outside
the scope of the Principles of the Law of Software Contracts.511 This limitation does not
take many open source software outside of the Principles’ sphere of application. The
Reporters note that as long as there is consideration, the Principles apply. 512
Consideration may include licensing fees, but there may be other forms of consideration
such as the obligation of the licensee to supply the licensor with the source code for
improvements.513 The Principles would also apply if the licensee agreed to pay
maintenance fees or a fee for ancillary services. Consideration is broadly construed and
would thus apply the Principles to many, if not most, open source license agreements. 514
As the Reporters note:
Open source licenses also often include terms such as requiring the licensee to
distribute derivative software under the same terms as the initial transfer
(same terms provision) or requiring the licensee to keep the source code open if
it transfers the software (copyleft provision).’ Such terms also should constitute
consideration under contract law because the terms ‘go beyond simply defining
the boundaries of the license[s]” by creating affirmative obligations if the
transferee itself distributes the software.’ Further, licensors have multiple
motives for ‘bargaining for’ these provisions. For example, many licensors of
open source software seek to further their philosophy of openness by creating
a software commons to increase the uses of software for the benefit of society.
Courts have found that such altruistic motives constitute evidence of
bargained-for consideration. Licensors may benefit more directly by entering
lucrative service contracts or by enhancing their reputations, which may lead
to successful entrepreneurial activities. 515
(d.) Physical Tangible Medium
As with UCITA, Section 1.06(b)(1) of the Principles “does not apply to any disk, CD-
ROM, or other tangible medium that stores the software. If a disk is defective so that the
software is inaccessible, for example, Article 2 of the Uniform Commercial Code applies
to exclude digital content (digital art and digital databases) and §§ 1.06 through 1.08 delineate the types of
software transfers targeted by the Principles. The rules and Comments on scope that follow surely do not
clearly place every transaction on one side or the other of the scope line. No scope provisions could achieve that
goal. Instead, these Principles set forth a limited number of coherent rules on scope that courts can apply to
most transactions and that identify the types of transfers these Principles target.” Id.
510 Red Hat, Inc. for example is a leading provider of open source software and related services to
enterprise customers. Red Hat’s open source software, used by Wall Street investment firms, hundreds of
Fortune 500 companies, and the United States government, is outside the sphere of application of the
Principles of the Law of Software Contracts.
511 Jacobsen v. Katzer, 535 F.3d 1373, 1378 (Fed. Cir. 2008) (“Open source software licenses, or ‘public
licenses,’ are used by artists, authors, educators, software developers, and scientists who wish to create
collaborative projects and to dedicate certain works to the public.”).
512 Robert A. Hillman & Maureen O’Rourke, Principles of the Law of Software Contracts: Some
514 Id.
to determine the transferee’s warranty and remedial rights.”516 The Reporters explain
why a defective physical disk is outside the Principles’ sphere of application:
“A” transfers a word-processing program to “B” on a CD-ROM. The CD-ROM is
defective. These Principles apply to the transfer of the word-processing program but not
to the defective CD-ROM. The warranty rules of Article 2 of the U.C.C. comfortably
govern the quality of the CD-ROM, whereas these Principles directly address quality
concerns relating to the software program.517
(3.) Mixed Transactions
These Restatement-like Principles address legal issues for transferring software for
consideration, whether by lease, license or sale. The Reporters suggest that courts may
extend the sphere of the Principles’ application by analogy: Courts facing difficult legal
tangible medium that stores the software. If a disk is defective so that the software is inaccessible, for example,
Article 2 of the Uniform Commercial Code applies to determine the transferee’s warranty and remedial rights.
Although this approach creates the anomaly that two sets of rules may apply to the same transaction, such a
result is appropriate and inevitable in a project that focuses on the special problems presented by the software
component of mixed transactions. Further, such a treatment is not unique to software contracts.” Principles of
the Law of Software Contracts § 1.06, cmt. a (2010).
519 Principles of the Law of Software Contracts 1, 2 Overview (2010).
520 Principles of the Law of Software Contracts § 1.06, cmt. (f) (2010).
521 “It [The Principles] does not include digital art or a digital database (digital content), as defined in
§ 1.01(f). However, courts can look to these Principles by analogy to resolve issues involving digital content if
appropriate.” Principles of the Law of Software Contracts § 1.06 cmt. a (2010)
522 “A “standard form” is a record regularly used to embody terms of agreements of the same type.”
524 The Supremacy Clause provides that federal law shall be the supreme law of the land; and the judges
in every state shall be bound thereby, anything in the Constitution or laws of any state to the contrary
notwithstanding. U.S. Const. art. VI, cl. 2. Under this principle, Congress has the power to preempt state law.
However, in considering whether a state statute is preempted, courts should assume that the historic police
powers of the states are not superseded unless that was the clear and manifest purpose of Congress. U.S.
CONST. art. VI, cl. 2.
offer protection against discovery by so-called reverse engineering, that is by starting with the known product
and working backward to divine the process which aided in its development or manufacture.”).
526 RICHARD S. ROSENBERG, THE SOCIAL IMPACT OF COMPUTERS 511 (New York: Academic Press 2004).
527 Reverse engineering is necessary to attain interoperability of computer systems. The European
Community recognizes a right to reverse engineering to prevent unfair competition or what we refer to as
antitrust.
528 Nintendo Loses Suit Against DS Flash Cards, ESCAPIST MAGAZINE (Dec. 4, 2009).
529 UCITA § 118 (Amendments to Uniform Computer Transactions Act) (stating licensee “may identify,
analyze, and use those elements of the program necessary to achieve interoperability of an independently
created computer program with other programs including adapting or modifying the licensee’s computer
program.”).
530 The Reporter notes to Section 105(b) suggest that anti-reveres engineering clauses prohibiting tests
for interoperability may violate a “fundamental public policy.” ANDREA MATWYSHYN, HARBORING DATA:
INFORMATION SECURITY, LAW AND THE CORPORATION 170 (2009).
531 Kewanee Oil Co. v. Bicron Corp, 470 U.S. 470, 476 (1974) (“A trade secret law, however, does not
offer protection against discovery by so-called reverse engineering, that is by starting with the known product
and working backward to divine the process which aided in its development or manufacture.”).
532 “The American Law Institute’s project on Principles of the Law of Software Contracts suggests there
are currently three possible ways to police unreasonable transfer and use restrictions. First, they might be pre-
empted by federal law. Second and third, they also might be against public policy or unconscionable under
state law. A fourth possibility is that state public policy judgments could be made by state statutes, making
certain types of terms unenforceable in general, or unenforceable in mass-market transactions; state statutes
The Reporters have adopted U.C.C. Article 2’s principle of unconscionability, which
enables courts to police licensors that overreach in software licenses and other contracts.
Courts require licensees to demonstrate both procedural unconscionability in contract
formation and unfair or surprising terms (substantive unconscionability). A comment to
§ 1.1 states: “With some exceptions, courts usually require a showing of both procedural
(defects in the contract-formation process) and substantive (the agreement or term
unfairly surprises or oppresses one party)” before they will strike down a clause or
license agreement.537 “[G]ross inequality of bargaining power, together with terms
unreasonably favorable to the stronger party, may confirm indications that the
transaction involved elements of deception or compulsion, or may show that the weaker
party had no meaningful choice.”538 The Reporters cite “[e]xamples of procedural
unconscionability include conduct approaching misrepresentation or duress, as well as
hidden, incomprehensible, or obscure terms. The Reporters cited examples of
substantively unconscionable terms include a cross-collateral clause and a clause
unreasonably limiting the time within which a buyer must notify the seller about claims
involving latent defects.”539
also could provide minimum transfer and use rights and provide contract remedies, such as rejection or
damages for failure to provide them.” Jean Braucher, Contracting Out of the Uniform Commercial Code,
Contracting Out of Article 2 Using a ‘License’ Label, A Strategy That Should Not Work for Software Products,
40 LOY. L.A. REV. 261, 274 (2006).
533 Id. at § 1.09, illus. #8.
535 “In the First Amendment context, litigants are permitted to challenge a statute not because their
own rights of free expression are violated, but because of a judicial prediction or assumption that the statute’s
very existence may cause others not before the court to refrain from constitutionally protected speech or
expression.” Backpage.com, LLC v. McKenna, 881 F. Supp. 2d 1262, 1270 (W. D. Wash. 2012).
536 Id. at § 105(b).
Id. at § 1.11.
540
Nevertheless, Aral v. EarthLink, Inc., 36 Cal.Rptr.3d 229, 238 (Ct. App. 2005) (“[T]erms . . . were
541
presented on a ‘take it or leave it’ basis either through installation of the software or through materials
included in the package mailed with the software with no opportunity to opt out. This is quintessential
procedural unconscionability. With respect to substantive unconscionability, Aral alleged . . . that EarthLink
began charging customers for DSL service as soon as they ordered [it] although the company knew or should
have known that the service would not be available until after the modem was delivered, some weeks later. . . .
[T]he gravamen of the complaint is that numerous consumers were cheated out of small sums of money through
deliberate behavior. Accepting these allegations as true . . . the class action waiver must be deemed
unconscionable under California law”).
542 Id. at § 1.11, cmt. c.
standard form contract complies with the Principles formation requirements, “it should
not be sheltered from an unconscionability challenge.”545 The Principles Reporters
suggest, “[r]equiring a lesser degree of procedural unconscionability when terms are
particularly onerous may help to counteract the market reality that transferees
generally do not read terms, often do not understand them when they are aware of them,
and underestimate the probability of a defective product.”546
“Additionally, in the clickwrap context, consumers often do not consider the click as
signifying the same assent as a signature. Thus, when a term is particularly onerous,
the court should require a lesser showing of procedural unconscionability.”547 The
Reporters compare substantive unconscionability to the European mandatory rule that
courts will not enforce terms creating a significant imbalance in the bargain to the
consumer’s detriment. The European Commission’s 1993 Directive on Unfair Contract
Terms compiled “a nonexclusive list of terms that may be considered unfair when not
individually negotiated.”548 The Principles of the Law of Software Contracts did not
compile a list of unfair terms, but noted that the Directive’s list may be a useful reference
point for U.S. courts determining unconscionability. 549
Nevertheless, these Principles opt to rely on traditional unconscionability doctrine
rather than defining which terms are enforceable and which are not. A court may,
however, find the European Union’s Unfair Contract Terms Directive’s (UCTD) list
useful in evaluating unconscionability claims. The annex to the Directive gives examples
of terms that the EU considers unfair, deceptive, and unenforceable. Generally, terms
that authorize the transferor to add spyware to a transferee’s computer, allow the
transferor to modify the contract without notice or an opportunity to object or consent,
extend obligations automatically and without notice, allow the transferor to change the
nature of the software unilaterally, or authorize cancellation without notice are suspect
under these Principles.550 Unlike the UCTD, the Reporters rejected the mandatory terms
approach favored by the European Commission:
So long as the formation process is reasonable, an important philosophy of
these Principles is freedom of contract. The view that transferors understand
their products and the risks of contracting better than lawmakers underscores
this philosophy. In addition, regulators may misidentify the class of terms that
are the product of market failures. These Principles therefore reject, in large
part, adopting substantive mandatory rules for software agreements.
Exceptions, in limited circumstances, include certain terms that apply to
contract breakdown, such as choice of law, forum selection, the warranty of no
material hidden defects, liquidated damages, and automated disablement. 551
(4.) Mixed Transactions
purpose test for mixed transactions. Therefore, “the Principles exclude transfers of
embedded software, except when the ‘predominant purpose’ of the transaction is the
transfer of the software, in which case the above issues are more likely to arise.”552
Software issues may also arise when a party transfers non-embedded software along
with any combination of goods, digital content, and services. These Principles apply to
the software portion of these transactions unless any digital content or services
predominate.
(C.) Forum Selection Clauses
During the past four decades, U.S. courts have been predisposed to enforce the
parties’ choice of forum and law clauses. In Caspi v. Microsoft Network, LLC, 553 a New
Jersey appellate court upheld a forum selection clause “where subscribers to online
software were required to review license terms in scrollable window and to click ‘I agree’
or ‘I don’t agree.’ ”554 The Principles also presume that U.S. style choice of forum clauses
are broadly enforceable.555 Sections 114 of the Principles allow the parties to submit to
jurisdiction and agree to an exclusive forum so long as it is not unfair or unreasonable.
Section 114 states:
The parties may by agreement choose an exclusive forum unless the choice
is unfair or unreasonable. A forum choice may be unfair or unreasonable if:
(a.) the forum is unreasonably inconvenient for a party;
(b.) the agreement as to the forum was obtained by misrepresentation,
duress, the abuse of economic power, or other unconscionable means;
(c.) the forum does not have power under its domestic law to entertain
the action or to award remedies otherwise available; or
(d.) enforcement of the forum-selection clause would be repugnant to
public policy as expressed in the law of the forum in which suit is
brought.556
These provisions do not address the problem arising when the cost appearing in a forum
exceeds what is stake. In these cases, the forum selection clause operates de facto as a
liability shield because the plaintiff cannot exercise her rights. In Cairo, Inc. v.
Crossmedia Servs., Inc.,557 the court enforced a forum selection clause in a website’s
terms of use where every page on the website had a textual notice that read: “By
554 Id.
555 See e.g., Guadagno v. ETrade Bank, 592 F. Supp. 2d 1263, 1271–72 (C.D. Cal. 2008) (upholding a
forum selection clause requiring users to waive their right to joining class action and submitting to pre-dispute
mandatory arbitration); Eslworldwide.com, Inc. v. Interland, Inc., No. 06 CV 2503, 2006 WL 1716881, at 2
(S.D.N.Y. June 21, 2006) (upholding forum selection clause including in clickwrap agreement); Siebert v.
Amateur Athletic Union of U.S., Inc., 422 F. Supp. 2d 1033, 1039 (D. Minn. 2006) (upholding forum selection
clause for pre-dispute mandatory arbitration); Adsit Co., Inc. v. Gustin, 874 N.E.2d 1018, 1024 (Ind. Ct. App.
2007) (upholding Adsit’s Terms of Use agreement containing a forum selection clause and choice of law clause
where user was required to click on a button reading “I Accept” that was placed strategically at the bottom of
the webpage containing the policy; clickwrap agreement also was displayed on an internet webpage).
556 Principles of the Law of Software Contracts, § 1.1.
557 No. 04–04825, 2005 WL 756610, at *2, *4–5 (N.D. Cal. Apr. 1, 2005).
continuing past this page and/or using this site, you agree to abide by the Terms of Use
for this site, which prohibit commercial use of any information on this site.”
In Feldman v. Google, Inc.,558 a federal court found a forum selection clause binding
where the online contract between Internet advertising service and a would-be
advertiser read in bold at top “Carefully read the following terms and conditions,”
adding, “If you agree with these terms, indicate your assent below’ and user could only
progress by clicking on box marked ‘accept’ ” and “terms of use” were presented to user
in scrollable window.” In Crawford v. Beachbody, LLC,559 the court found a forum
selection clause binding where the consumer clicked on a button marked “Place Order
and above button was a statement informing the user that by clicking the button was
subject to the website’s ‘terms and condition,’ which were available in the same screen
via hyperlink.”560
(D.) Formation of Software Contracts
(1.) Liberal Formation Rules
Section 2.01 of the Principles “sets forth the general approach to formation issues.
It is based on portions of both the original and amended U.C.C. §§ 2–204, 2–206, and 2–
207, and the Restatement Second of Contracts §§ 18–34, 50–70.”561 Section 2.01 applies
to negotiated software agreements and standard-form agreements, but the Section is
subject to the separate rules of § 2.02 that govern standard-form transfers of generally
available software. Section 2.01 therefore applies if the software transferor uses a
standard form but the transfer is of a large number of copies of software, the right to
access software is to a large number of end users, or the software is not generally
available to the public under the same standard terms.
The U.C.C. Article 2 inspired formation rules apply to both negotiated software
contracts and standard-form agreements. Section 2.01 states:
(a.) Subject to § 2.02, a contract may be formed in any manner sufficient to
show an agreement, including by offer and acceptance and by conduct.
(b.) A contract may be formed under subsection (a) even though
(1.) one or more terms are left open, if there is a reasonably certain basis
for granting an appropriate remedy in the event of a breach; or
(2.) the parties’ records are different. In such a case, the terms of the
contract are
(A.) terms, whether in a record or not, to which both parties agree;
(B.) terms that appear in the records of both parties; and
(C.) terms supplied by these Principles or other law.562
2, 2014) (upholding arbitration clause in ‘terms of use’ where the consumer clicked a ‘Shop Now button next to
a statement informed users they were entering in a contract).
561 Principles of the Law of Software Contracts § 2.01, cmt. (a) (2010).
U.C.C. § 2–207 governing the battle of the forms under Article 2 is one of the most
complicated provisions of U.C.C. Article 2. That section is divided into three sections,
each of which covers a different problem. U.C.C. § 2–207(1) recognizes that contracts
may be formed despite having conflicting or additional terms. U.C.C. § 2–207(2)’s
framework deals with what to do with conflicting or additional terms. U.C.C. § 2–207(3)
presents a solution when there is no contract on the form but rather on the parties
conduct. The Principles of the Law of Software Contracts have adopted a clear and easy
to understand alternative to U.C.C. § 2–207 with § 2.01(b)(2)(A)–(C).563 Under
§ 2.01(b)(2) of these Principles, the terms consist of terms common to both records, other
terms the parties agreed to, and supplemental terms supplied by these Principles and
outside law. Thus, if the parties’ records differ insubstantially, courts can enforce the
common terms under § 2.01(b)(2)(B). The contract first consists of the terms where both
records agree and terms that appear in both records combined with supplemental
principles.564 Conflicting and additional terms falls out and are not part of the software
contract. The Reporters illustrate the simple approach to battle of the forms with the
following illustration:
B, a computer manufacturer, sends A, a software transferor, an order for 500
copies of a graphic-design software package. B’s order provides that A warrants
the software to be free from defects. A ships 500 copies of the software to B
accompanied by a standard form disclaiming all express and implied
warranties. B accepts delivery of the software. Under § 2.01(b), the parties’
conduct shows that they formed a contract even though the records alone do
not establish a contract. Section 2.01(b)(2)(A) and (B) do not apply to the issue
of implied warranties because the disclaimer of implied warranties is not in
both records and the parties did not agree on the treatment of implied
warranties. Subsection (b)(2)(C) does apply, however, which looks to these
Principles or outside law to supply terms. Under Sections 3.03 through 3.05 of
the Principles, the agreement includes implied warranties. Further, under
§ 2.01(b)(2)(A), the contract also includes express warranties to the extent that
A has made any promises, descriptions, and affirmations. B has agreed to such
warranties by implication because B has accepted the software and the
warranties benefit B. The “free from defects” term in B’s record drops out,
however, because it is not in both records. Subsection (b)(2) also applies if one
or both records include a provision such as “only our terms govern” and the
parties perform the agreement.565
Section 2.02 addresses standard form transfers of generally available software. The
contract rules for electronic and prepackaged software adopt an objective theory of contract
565 Principles of the Law of Software Contracts § 2.01, illus. 6.b (2010).
566 “Whether a meeting of the minds exists, however, is determined objectively by looking at the intent
of the parties as expressed by their actual words or acts. A meeting of the minds cannot be determined on the
undisclosed assumption or secret surmise of either party.” Int’l Casings Group, Inc. v. Premium Std. Farms,
Inc., 358 F. Supp. 2d 863, 869 (W.D. Mo. 2005).
567 “Whether a meeting of the minds exists, however, is determined objectively by looking at the intent
of the parties as expressed by their actual words or acts. A meeting of the minds cannot be determined on the
undisclosed assumption or secret surmise of either party.” Int’l Casings Group, Inc. v. Premium Std. Farms,
Inc., 358 F. Supp. 2d 863, 869 (W.D. Mo. 2005).
568 Id.
570 Robert A. Hillman & Maureen O’Rourke, Defending Disclosure in Software Licensing, 78 U. CHI. L.
572 Id. § 2.02(d) (noting that the Principles is subject to “invalidating defenses supplied by these
Article 2 that calls for the broad admissibility of evidence as to course of performance,
course of dealing, and usage of trade. This broad admissibility of supplemental terms also
applies to fully integrated agreements. Section 2.02 applies special rules for standard or
mass-market transfers of generally available software. Section 3.08’s parol evidence rule
distinguishes between fully integrated and partially integrated records, drinking deeply
from the wells of the Restatement (Second) of Contracts and U.C.C. § 2–202.574 Fully
integrated software contracts are “intended by the parties as a complete and exclusive
statement of the terms of an agreement.”575 In contrast, a partially integrated record or
records are a “complete and exclusive statement of one or more terms of an agreement.”576
As with U.C.C. Article 2, even fully integrated terms or agreements “may be explained by
evidence of course of performance, course of dealing, usage of trade, and consistent
additional terms.”577
(4.) Liberal Contract Formation
Section 201(a) provides that a software “contract may be formed in any manner
sufficient to show an agreement, including by offer and acceptance and by conduct.”578
As with U.C.C. Article 2, a “software contract may be formed under subsection (a) even
though (1.) one or more terms are left open, if there is a reasonably certain basis for
granting an appropriate remedy in the event of a breach; or (2.) the parties’ records are
different.”579 Subsection (a) follows common-law and U.C.C. Article 2 formation
principles. The Reporters comment notes, “The policy is to enforce agreements no matter
how formed. A principal challenge in negotiated agreements is to distinguish pre-
contract negotiations and preliminary drafts, on the one hand, from the formation of an
enforceable agreement on the other.”580 The Principles adopt the objective test for
contract formation also followed by the Restatement (Second) of Contracts. Thus, in a
software license or other contract, the court bases contract formation “on what the
circumstances show, not on what they subjectively believe.”581 The Reporters provide the
following illustrations of how contract formation works in the non-retail setting:
(1.) A, a software transferor, enters a multiuser licensing agreement with B, an
automobile manufacturer, which authorizes 4000 of B’s employees to use the
software. The agreement includes a three-year maintenance agreement. The
software is generally available to the public. Section 2.01 applies, not § 2.02,
because the magnitude of the transfer is inconsistent with a retail sale and
because the terms of the multiuser agreement differ from those in a typical
retail sale.
(2.) A, a software publisher, transfers one copy of accounting software to B, an
automobile manufacturer. The transfer is by standard form, but does not
574 The Reporters state that they are seeking “a middle ground between rigid enforcement of the parol-
evidence rule and its abrogation. . . . Based on these sources, these Principles bar evidence only if (1) the parties
intended a full integration or (2) the parties intended a partial integration and the evidence is of conflicting
terms.” Principles of the Law of Software Contracts § 3.08, cmt. (a) (2010). Id. at § 3.08, cmt. a.
575 Id. at § 3.08(a).
576 Id.
577 Id.
581 Id.
“Section 2.01(a) encompasses both contract-formation routes. Not only can parties
form a software contract by virtue of a traditional offer and acceptance, but they can also
form one if their conduct shows their intention to contract, such as by delivering and
accepting software despite the absence of an enforceable record.”583 Section 2.01 applies
to negotiated software agreements as well as mass-market or standard-form
agreements, “but the Section is subject to the separate rules of § 2.02 that govern
standard-form transfers of generally available software.”584 Section 2.01 therefore
applies if the software transferor uses a standard form but the transfer is of a large
number of copies of software, the right to access software is to a large number of end
users, or the software is not generally available to the public under the same standard
terms.
(6.) Modification of a Software Contract
The Principles recognize a hierarchy of contract terms, which begins with the
language of the entire agreement but also considers the parties course of performance,
course of dealing and usage of trade in that order.588 If there is a disagreement over
meaning of a term in a record, courts are to apply the standard of reasonable integration.589
Section 3.10 articulates two exceptions to 3.09(a)’s objective interpretation rule.590 The
first exception is that if the parties to a software contract disagree over the meaning of
words or conduct, “the meaning intended by one of them should be enforced if at the time
the parties made the agreement that party did not know or have reason to know of any
different meaning intended by the other party.”591 The second exception is that parties do
not have an agreement where “the parties disagree over the meaning of a fundamental
582 Principles of the Law of Software Contracts § 2.01, illust. 1–2 (2010).
583 Principles of the Law of Software Contracts § 2.01, illus. 3(b) (2010).
584 Principles of the Law of Software Contracts § 2.01 cmt. (a) (2010).
585 Id. at Topic 3, Contract Modification, Summary Overview, § 2.03.
586 Id. at § 2.03(a).
587 Id. at § 2.03(b).
588 Id. at § 3.09.
589 Id. at § 3.09(a).
590 Id. at § 3.10(a)–(b).
591 Id. at § 3.10(a).
term or terms” but that applies only if the words or conduct are susceptible to more than
one meaning.592
(E.) Software Contracting Warranties
Section 3.01 is the functional equivalent of U.C.C. § 2–312 but gives licensees and
other transferees a lesser infringement warranty than what buyers receive under Article
2. Section 3.01 gives licensees and other transferees a lesser infringement warranty. A
licensor is not liable for transferring software infringing the patents of others absent
knowledge of the infringing content. Licensors typically do not give the non-infringement
warranty when the licensee uses the software in a way contrary to the agreement. A
licensor may disclaim or limit implied warranties. Sections 3.02 through 3.07 in the
Principles import warranties concepts from U.C.C. Article 2 and UCITA with some
differences. Section 3.02 creates an express warranty if the licensor delivers software
that fails to conform to the description in advertising or packaging. As with U.C.C.
Article 2, courts are to distinguish between puffery or seller’s talk and statements more
definite or specific to constitute an enforceable express warranty.
(1.) Express Warranties
The quality warranties outlined in Chapter 3 of the Principles closely track U.C.C.
Article 2, while accommodating them to software commercial realities. Section 3.02 of
the Principles makes the transferor liable for express warranties to any transferee in the
distribution chain, including all intermediate parties and end users.593 The creation of
an express warranty is not dependent upon whether a transferor uses formal words such
as “warrant” or “guarantee” or that it has a specific intention to make a warranty. A
licensor’s affirmation of the value of software is mere puffery and does not constitute an
express warranty.
The Principles recognize express warranties but decline to adopt a “basis of the
bargain” test for enforceability.594 Instead, the Principles replace the “basis of the bargain”
test with an objective test focusing on whether the representations made by the licensor
about software are sufficiently definite so a licensee or other transferee can reasonably
rely upon them. If the transferor makes a statement constituting an affirmation of fact,
promise, or description, the statement constitutes an express warranty, so long as a
licensee or assignee reasonably relies on the statement. As with U.C.C. Article 2, Express
warranties survive unexpected disclaimers and the only way to disclaim them is not to
make them. Reliance is not a formal requirement of Article 2 or UCITA but it is difficult
for the plaintiff to prove an express warranty without a showing of reliance.
The Reporters borrow Section 3.02 of the Principles from both UCITA and Article 2
of the UCC. This section creates a cause of action for the licensee if the delivered software
fails to conform to the description in advertising or packaging. If an employee of the
software licensor demonstrates the software to a licensee, the software must conform to
the demonstration. A licensor is potentially liable for express warranties to any transferee
in the distributional chain, including intermediaries and end users.
The Principles downsize U.C.C. Article 2’s six-part test for merchantability to three
quality standards in Section 3.01(b) for merchant transferors.595 Merchantable software,
at a minimum, must “(1.) pass without objection in the trade under the contract
description; (2.) be fit for the ordinary purposes for which such software is used; and (3.)
be adequately packaged and labeled.”596 The Principles draw upon industry standards
in setting minimal standards of merchantability. The implied warranty of
merchantability is a flexible set of standards and can be calibrated for many different
kinds of software. The Principles do not extend the implied warranty of merchantability
to open source software because “developers have little control over quality.”597
Software warranties determine the merchantability of software by referencing
current software best practices. For example, a maker of Automated Teller Machine
(ATM) software must ensure that its product meets minimum industry standards for
security. The leading ATM provider incorporates a Triple DES standard to encrypt
customers’ financial and personal data. Triple-DES is an encryption standard designed
to make ATM transactions more secure. Software makers that fulfill this standard are
similar to a seller of goods meeting a merchantability standard that goods “pass without
objection in the trade under the contract.” The level of computer security is an example
of an industry standard or usage of trade.
Software is merchantable if it complies with best practices like incorporating
reasonable security. The software industry claims bug-free software is impossible to
produce. Software makers may deliver software with minor defects and still satisfy the
implied warranty of merchantability so long as the software would pass without
objection in the trade and be fit for its ordinary purposes. Software consisting of millions
of lines of code will violate merchantability if it does not perform its functionality. In
development software projects, the licensee is given a period of acceptance testing to
identify bugs, allowing the software maker an opportunity to correct them.
(3.) Systems Integration & Fitness Warranties
The Principles, too, adopts a systems integration or fitness warranty. Section 3.04
of the Principles requires the licensor to know, or have a reason to know, of the particular
purpose of the licensee to make a fitness type warranty. If a software developer warrants
its software will function with a given computer system, the company will be liable for
the warranty of fitness for a particular purpose under § 3.04. Section 3.04 requires the
customer to prove that licensor or other vendor knew or had reason to know of the
licensee’s particular purposes for the software.
The concept of systems integration is a software engineering term meaning an
engineer’s ability to combine “software components into an integrated whole.”598 Systems
integration and fitness for a particular purpose are closely related doctrines often used
in custom software contracts. The Reporters imported Section 3.04 of the Principles from
U.C.C. § 2–312 and UCITA § 405. Section 3.04 of the Principles requires the licensor
598 Carnegie Mellon, A Framework for Software Product Line Practice, Version 5.0, Software System
Integration, http://www.sei.cmu.edu/productlines/frame_report/softwareSI.htm.
know, or have a reason to know, of the particular purpose of the licensee to make a fitness
type warranty. If a software developer warrants its software will function with a given
computer system, the company will be liable for the warranty of fitness for a particular
purpose under § 3.04. A licensor violates a fitness warranty when it selects software for
the particular purpose of the licensee.
Fitness warranties may be created in part by product advertising or sales
representations. Companies claiming that they are systems integration specialists may
create fitness warranties. Vendors frequently must address system integration tasks to
make hardware and software compatible. For example, systems integration is required
to link a given firewall system with other security systems such as surveillance products.
Systems integration is a software engineering term meaning an engineer’s ability to
combine software components so they work as an integrated whole, which is also known
as interoperability.
Like the fitness warranty, systems integration depends upon a showing of reliance
of the customer on the licensor’s representation that software will work or is integrated
with a given computer system. For example, if a software developer warrants that their
software will function with Microsoft’s Word 8 the license will be liable under the systems
integration warranty. Systems integration is a common issue in software contracts
because engineers will often need interfaces to make products interoperable. Customers
would typically license software from diverse vendors employing a ‘best of breed’
strategy, purchasing different applications from several vendors. The customer is often
in a position that they need computer consultants to help them achieve ‘systems
integration.’599 In many instances, software engineers will need to write custom code for
interfaces that would allow components from different vendors to run together. 600
It is sometimes difficult to predict whether systems integration can be achieved
easily because programmers cannot always rely upon the same assumptions about how
components work together.601 Carnegie-Mellon’s best practices for achieving integration
states:
In a product line, the effort involved in software system integration lies along
a spectrum. At one end, the effort is almost zero. If you know all the products’
potential variations in advance, you can produce an integrated parameterized
template of a generic system with formal parameters. You can then generate
final products by supplying the actual parameters specific to the individual
product requirements and launching the construction tool (along the lines of
the UNIX Make utility). In this case, each product consists entirely of core
components; no product-specific code exists. This is the “system generation”
end of the integration spectrum. At the other end of the spectrum, considerable
coding may be involved to bring the right core components together into a
cohesive whole. Perhaps the components need to be wrapped, or perhaps new
components need to be designed and implemented especially for the product.
599 Companies will enter into “systems integrations” contracts with consultants who must compile
engineering and process specifications and documentation to make systems work together. See e.g., Uop v.
Consulting, 1997 WL 219820 (Conn. Super. Ct., April 24, 1997) (striking complaint for negligence in the
performance of a systems integration consulting contract because of the economic loss doctrine).
600 In re Oracle Corp. Sec. Litig., No. C01-00988SI, 2009 WL 1709050, at *1 (N.D. Cal. June 19, 2009).
601 Id.
606 MICHAEL ALDRIDGE, MCTS MICROSOFT WINDOWS VISTA CLIENT CONFIGURATION EXAM 70–620
(2007) at 10.
607 Id.
611 Brief of Amicus Curiae Electronic Freedom Foundation, KSR Int’l Co. v. Teleflex Inc., 2004 U.S.
Press, 2004).
613 Jay P. Kesan & Rajiv C. Shah, Deconstructing Code, 6 YALE J. L. & TECH. 277, 350 (2003–2004)
(retelling the story of the open source software movement and its accomplishments).
The Principles generally follow the contours of warranties set forth in Article 2 of
the U.C.C.—except for the non-infringement warranty. Article 2 of the U.C.C. imposes a
strict liability for transferring goods infringing the patents or other intellectual property
rights of third parties while the Principles adopt a negligence standard. Section 3.01 of
the Principles gives licensees and other transferees a lesser infringement warranty than
U.C.C. Article 2’s does § 2–312. The Principles also permits software vendors to disclaim
their implied indemnification obligations consistent with U.C.C. § 2–312. A former
Microsoft lawyer explains this software industry contracting practice results because
software makers believe that taking on this liability will lead to unknown
repercussions.614 Section 3.01 permits software transferors to exclude or modify the
implied indemnification against infringement.615 The UCC’s non-infringement warranty
does not depend upon the seller’s knowledge because it is a strict liability-like obligation
while the Principles adopt a negligence standard
Licensors routinely disclaim non-infringement warranties because of the
uncertainties in the enforcement of software patents, which is a topic discussed in
Chapter 13. Section 3.01(a) states that unless the parties otherwise agree, a transferor
that deals in software of the kind and receives payment, agrees to “indemnify and hold
the transferee harmless against any claim of a third party based on infringement of an
intellectual property or like right.”616 A licensor is not liable for transferring software
infringing the patents of others absent knowledge of the infringing content.617
Transferors do not give the non-infringement warranty when the transferee uses the
software in a way contrary to the agreement.
(5.) Disclaiming Warranties
The Principles of the Law of Software Contracts draws upon industry standards in
setting the standard of merchantability. Although the implied warranty of
merchantability is a flexible set of standards, it varies within the software industry. The
Principles do not extend the implied warranty of merchantability to open source software
because “developers have little control over quality.”618 Furthermore, most software
makers will disclaim the implied warranty of merchantability. A Texas court upheld the
following disclaimer in a license agreement between sophisticated businesses:
EXCEPT FOR [LICENSOR’S] OBLIGATIONS UNDER SECTION 1.1 BELOW
(NON-INFRINGEMENT) AND SECTION 12 BELOW (CONFIDENTIALITY),
[LICENSOR] MAKES NO REPRESENTATIONS, WARRANTIES OR
GUARANTEES, EXPRESS OR IMPLIED, INCLUDING WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY USE OR ANY PARTICULAR
PURPOSE WITH REGARD TO THE SOFTWARE AND DOCUMENTATION.
[LICENSOR DOES NOT WARRANTY THAT THE OPERATION OF THE
SOFTWARE WILL BE UNINTERRUPTED OR ERROR-FREE . . . THE
614 Robert W. Gomulkiewicz, The Implied Warranty of Merchantability in Software Contracts: A
Warranty No One Dares to Give and How to Change That, 16 JOHN MARSHALL J. OF COMP. & INFO. l. 393, 393
(1998).
615 Id. (citing Section 3.01).
Warranty No One Dares to Give and How to Change That, 16 JOHN MARSHALL J. OF COMP. & INFO. L. 393, 393
(1998).
621 Id. at 234.
622 Robert A. Hillman & Maureen O’Rourke, Defending Disclosure in Software Licensing, 78 U. CHI. L.
625 Id.
including the implied warranty of merchantability and offer the purchaser, a limited and
often inadequate remedy. The nondisclaimable warranty is the first modest step to
mandatory minimum adequate remedies. Some proprietary software publishers who
contend that this provision creates uncertainty as to the meaning of “material defect”
oppose section 3.05.627 Linux and other open source stakeholders oppose this warranty
for free and open software (FOSS).628 Another critic of the non-disclaimable warranty of
no defect provision recommends opting out of the Principles as in the clause below:
This Agreement and all related disputes shall be governed by the laws of
_______, without regard to the United Nations Convention on Contracts for the
International Sale of Goods or the American Law Institute’s Principles of the
Law of Software Contracts (Principles). The parties agree that (i) the Principles
shall have no application whatsoever to the interpretation or enforcement of
this Agreement, and (ii) neither party shall invoke the Principles in whole or
in part in any judicial or arbitral proceeding relating to this Agreement. 629
(F.) Software Performance Standards
(1.) Breach and Material Breach
The Principles defines a breach as failure to perform without a legal excuse. 630 The
material breach standard is more licensor oriented than U.C.C. Article 2’s perfect tender
rule. Customized software code will rarely be bug-free, and therefore the licensor will
violate Article 2’s perfect tender rule most of the time. Material breach reflects the
industry standard that developed software is almost never free of bugs. Software
licensors should use the “material breach” standard so their customer will not
pretextually reject software because of minor bugs that do not impair functionality or
performance. The Reporters do not replicate other law on breach but instead focus “on
what constitutes breach so as to entitle an aggrieved party to a remedy.”631
The Principles did not include specialized rules for tender, acceptance, rejection,
repudiation, “anticipatory repudiation, adequate assurance of performance, or other
performance-related topics such as inspection.”632 These concepts are imported from well-
travelled provisions of Article 2 of the U.C.C. and the common law without substantial
reworking. Instead, the drafters developed rules not found in the common law and tailored
them to the specific problems of software contracting. Courts consider the behaviour of the
party as well as the covenant of good faith and fair dealing.
627 “A few software providers also worry about the meaning of “material defect.” The comments to section
3.05(b) point out that the section simply captures the principle of material breach: Does the defect mean that
the transferee will not get substantially what it bargained for and reasonably expected under the contract?
The criticism that “materiality” is too vague, if accurate, would mean that contract law would have to abolish
its material breach doctrine too.” Robert Hillman, American Law Institute Approves Principles of the Law of
Software Contracts, Concurring Opinions Blog (June 2, 2009) http://www. concurringopinions.com/archives/
2009/06/american-law-institute-approves-the-principles-of-the-law-of-software-contracts.html.
628 Id. (response to Hillman’s post by Ken Arromdee, June 2, 2009).
632 Id.
The Principles draw in large part from the Restatement (Second) of Contracts § 241
and UCITA § 701 in determining what constitutes a material breach. Section 3.11 defines
a material breach as an electronic agent that allows the non-breaching party to declare
the end of the contract. A material breach occurs where transferors breach the warranty
of § 3.05(B) (duty to disclose material hidden defects), a limited remedy fails of its
essential purpose (§ 4.01), or the transferor breaches the contract by failing to comply
with § 4.03, which is the provision for electronic repossession or automatic disablement
by planting malicious or disabling code.
UCITA was the contracting statute to displace the perfect tender rule with the
material breach standard. Under Section 3.11, a material breach signifies the end of the
contract whereas a non-breaching party may recover for non-material breach and the
contract is still in force. UCITA adopted a substantial performance or material breach
standard for development software contracts versus Article 2’s parochial and unrealistic
perfect tender rule. The most significant factors include: the terms of the agreement; (1.)
usage of trade, course of dealing, and (2.) course of performance; (3.) the extent which
the aggrieved party will be deprived of the benefit reasonably expected; (4.) the extent
to which the aggrieved party can be adequately compensated for the part of the benefit
deprived; (5.) the degree of harm or likely harm to the aggrieved party; and (6.) the extent
to which the behavior of the party failing to perform or to offer to perform departs from
standards of good faith and fair dealing.633 The Reporters note also that a material
breach occurs where transferors breach the warranty of § 3.05(b) (duty to disclose
material hidden defects), a limited remedy fails of its essential purpose (§ 4.01); or the
transferor breaches the contract by failing to comply with § 4.03, which is the provision
for automatic disablement.634
(3.) Right to Cure
Breaching parties have the right to cure at their own expense where the time for
performance has not yet expired or there are reasonable grounds to believe the
nonconforming software would be acceptable to the licensee. Software licensors also
often give licensees a period of acceptance testing in addition to the cure. The Principles
of the Law of Software Contracts imported the concept of cure of breach from UCITA,
which gives software licensors a second chance to get things right, if the software does
not work as intended.635 As with U.C.C. Article 2, breaching parties have the right to
cure at their own expense where the time for performance has not yet expired or there
are “reasonable grounds to believe the nonconforming performance would be
acceptable.”636 Software licensors often give licensees a period of acceptance testing
during which time the licensor may cure defects. The cure gives the breaching party a
“further reasonable time after performance was due” to get things right.637
The Principles of the Law of Software Contracts limit the ability of a software
licensor to remotely remove or disable software. Electronic self-help is always a
controversial provision because of the unbridled power it gives licensors over essential
software to the customer’s business. A disabling device is computer code that prevents
users from accessing software.639 The use of disabling devices is a very controversial
practice in the software industry. A software licensor should not use disabling devices
unless the licensee agrees to this remedy prior to entering into the license agreement. 640
Furthermore, a licensor should not disable software without providing notice to the
licensee. For example, the electronic repossession of a business’s billing software might
deprive business of the ability to collect accounts. The principal concern of the licensee
about disablement is that a licensor may repossess mission-critical software where there
is a bona fide dispute over a term in a software contract. Section 4.03 provides, “A
transferor may not use automated disablement of the process results in the loss of rights
granted in the agreement or the loss of use of other software or digital content.”641
Section 4.03 balances the interests of licensors and licensees by permitting
automated disablement under certain limited circumstances, but strictly prohibiting
disablement as a self-help remedy. Electronic self-help is always a controversial
provision because of the power it gives licensors over integral software in enterprises.
Electronic disablement is strictly prohibited in standard form transfers of generally
available software and all consumer transactions.642 Licensors using electronic
disablement contrary to the Principles are subject to liability for direct, incidental, and
consequential damages.643 In business-to-business transfers, disablement is permitted
Section 4.02 provides for liquidated damages but these clauses may not be penal
provisions i.e. “the amount must be reasonable in light of the anticipated harm or actual
harm caused by the breach.”645 The guideposts in U.C.C. § 2–718 were imported to the
Principles. If the court strikes down compensation or liquated damages clauses, the
remedies are available had the clause not been included.646 The Reporters decline to
develop precise formulas for measuring damages in software contracts, but direct courts
to U.C.C. Article 2 for guidance.647
(4.) Cancellation & Expectancy Damages
Section 4.06 recognizes the equitable remedy of specific performance where software
“is unique or in other proper circumstances.”651 Specific performance is not available for
personal services such as support by a particular programmer.652 Specific performance, as
with the sales of goods, is appropriate where the software is unique or in proper
circumstances. This remedy, based upon equity, is discretionary and unavailable absent a
showing of exceptional circumstances.
§ 4.9 Cloud Computing Service Level Agreements
The term, cloud computing, is a metaphor that describes public as well as private
providers of software access or storage. Cloud computing is “used to describe a software-
as-a-service (SAAS) platform for the online delivery of products and services.”653 Despite
the metaphor that services and software are stored in the clouds, cloud computing
always has a physical location. “Cloud computing is a model for enabling convenient, on-
demand network access to a shared pool of configurable computing resources (e.g.,
networks, servers, storage, applications, and services) that can be rapidly provisioned
and released with minimal management effort or service provider interaction.”654
“Amazon, Google, Rackspace, and Microsoft are leading companies in the business of
renting cloud computing and storage.655 Cloud computing is in perpetual motion and the
buzz is that it will displace traditional software licensing. Nevertheless, Richard
Stallman, a founding father of the open source movement describes it as a trap for the
unwary. He writes about how cloud computing raises the specter of unilateral control by
proprietary companies: “It’s stupidity. It’s worse than stupidity: it’s a marketing hype
campaign. Somebody is saying this is inevitable—and whenever you hear somebody
saying that, it’s very likely to be a set of businesses.”656 A litigator examines how cloud
computing impacts discovery and jurisdiction:
We have reached the point where some of us do not know where in the “cloud”
our computer backup files reside. There are drive-through windows at fast food
restaurants in the Midwest where orders are taken by call centers in the
Southeast. We fly from Boston to Chicago, for the day, and stop along the way
to eat dinner at the airport in Philadelphia. In short, nothing stops at a state
border anymore.657
Companies as well as individuals are storing their data and using software in the
clouds and therefore “no longer have direct physical access to the devices storing their
data.”658 A University of California-Berkeley Distributed Systems Laboratory research
report describes the variegated service paradigm of cloud computing:
Cloud Computing refers to both the applications delivered as services over the
Internet and the hardware and systems software in the datacenters that
provide those services. The services themselves have long been referred to as
Software as a Service (SaaS). The datacenter hardware and software is what
we will call a Cloud. When a Cloud is made available in a pay-as-you-go manner
to the public, we call it a Public Cloud; the service being sold is Utility
Computing. We use the term Private Cloud to refer to internal datacenters of
a business or other organization, not made available to the public. Thus, Cloud
Computing is the sum of SaaS and Utility Computing, but does not include
Private Clouds. People can be users or providers of SaaS, or users or providers
of Utility Computing. We focus on SaaS Providers (Cloud Users) and Cloud
654 NATIONAL INSTITUTE OF STANDARDS & TECHNOLOGY, NIST CLOUD COMPUTING PROGRAM, http://
www.nist.gov/itl/cloud/index.cfm.
655 Scott DeCarlo & Tomio Geron, America’s Fastest Growing Tech Companies, FORBES (June 24, 2013).
656 MICHAEL ARMBRUST, ARMANDO FOX, REAN GRIFFITH, ANTHONY D. JOSEPH, RANDY KATZ, ANDY
KONWINSKI, GUNHO LEE, DAVID PATTERSON, ARIEL RABKIN, ION STOICA, AND MATEI ZAHARIA., ABOVE THE
CLOUDS: A BERKELEY VIEW OF CLOUD COMPUTING (Feb. 10, 2009) at 1 (Executive Summary) (quoting Free
Software pioneer Richard Stallman).
657 ANDREW SCHULMAN, A PRACTICAL GUIDE TO ORGANIZING A BUSINESS IN RHODE ISLAND (MCLE) § II–
16.1(2013).
658 JEFFREY FOLLETT, ET. AL., MCLE MASSACHUSETTS DISCOVERY PRACTICE § 20.1 (2012 ed.) (discussing
electronic discovery).
Providers, which have received less attention than SaaS Users. From a
hardware point of view, three aspects are new in Cloud Computing.659
The service agreement by application service providers (ASPs) emerged in the late
1990s as a model of distribution that did not involve installation at the customer’s
facility. For instance, Microsoft devised a method of distributed service that includes
linking popular programs in a services package. Distributed service agreements reflect
a new licensing model, which encompasses software as well as services. As with other
licenses, the service provider makes it clear that it is retaining all proprietary rights and
that the customer does not own the software or the media on which it is inscribed.
Subscription based licenses frequently encompass services as well as the licensing of
software such as 24/7 telephone support, installation, or maintenance. The leading
cloud-based storage products are DropBox, SugarSync, and Pogoplug/Cloudstor. The
U/Cal Berkeley Report identified hardware savings from cloud computing. The chief
finding was that the appeal of cloud computing was the “the construction and operation
of extremely large-scale, commodity-computer datacenters at low cost locations.”660 The
chief savings for companies are the “cost of electricity, network bandwidth, operations,
software, and hardware available at these very large economies.”661 The researchers
identified three hardware-related aspects of cloud computing accounting for its appeal:
(1) The illusion of infinite computing resources available on demand, thereby
eliminating the need for Cloud Computing users to plan far ahead for
provisioning.
(2) The elimination of an up-front commitment by Cloud users, thereby
allowing companies to start small and increase hardware resources only
when there is an increase in their needs.
(3) The ability to pay for use of computing resources on a short-term basis as
needed (e.g., processors by the hour and storage by the day) and release
them as needed, thereby rewarding conservation by letting machines and
storage go when they are no longer useful and storage by the day) 662
(4) The illusion of infinite computing resources available on demand, thereby
eliminating the need for Cloud Computing users to plan far ahead for
provisioning.
(5) The elimination of an up-front commitment by Cloud users, thereby
allowing companies to start small and increase hardware resources only
when there is an increase in their needs.
(6) The ability to pay for use of computing resources on a short-term basis as
needed (e.g., processors by the hour and storage by the day) and release
them as needed, thereby rewarding conservation by letting machines and
storage go when they are no longer useful and storage by the day) and
659 MICHAEL ARMBRUST, ARMANDO FOX, REAN GRIFFITH, ANTHONY D. JOSEPH, RANDY KATZ, ANDY
KONWINSKI, GUNHO LEE, DAVID PATTERSON, ARIEL RABKIN, ION STOICA, AND MATEI ZAHARIA, ABOVE THE
CLOUDS: A BERKELEY VIEW OF CLOUD COMPUTING (Feb. 10, 2009) at 1 (Executive Summary).
660 Id.
661 Id.
662 Id.
666 PETER MELL & TIMOTHY GRANCE, NAT’L INST. OF STANDARDS & TECH., U.S. DEP’T OF COMMERCE,
include: (1.) fast wide-area networks, (2.) powerful, inexpensive server computers,
and (3.) high-performance virtualization for commodity hardware.667
(B.) Qualities of Cloud Computing
Cloud computing “enabling technologies include: (1.) fast wide-area networks, (2.)
powerful, inexpensive server computers, and (3.) high-performance virtualization for
commodity hardware.”668 ReDigi describes cloud computing as “the process involves
“migrating” a user’s file, packet by packet—“analogous to a train”—from the user’s
computer to the Cloud Locker so that data does not exist in two places at any one time. ”669
Cloud computing is rapidly evolving encompassing both software and hardware. The
cloud infrastructure can be viewed as containing both a physical layer and an abstraction
layer. The physical layer consists of the hardware resources that are necessary to
support the cloud services being provided, and typically includes server, storage and
network components. The abstraction layer consists of the software deployed across the
physical layer, which “manifests the essential cloud characteristics. Conceptually the
abstraction layer sits above the physical layer.”670 NIST’s definition of cloud computing
explains its essential qualities:
On-demand self-service. A consumer can unilaterally provision computing
capabilities, such as server time and network storage, as needed automatically
without requiring human interaction with each service provider.
Broad network access. Capabilities are available over the network and accessed
through standard mechanisms that promote use by heterogeneous thin or thick
client platforms (e.g., mobile phones, tablets, laptops, and workstations).
Resource pooling. The provider’s computing resources are pooled to serve
multiple consumers using a multi-tenant model, with different physical and
virtual resources dynamically assigned and reassigned according to consumer
demand. There is a sense of location independence in that the customer
generally has no control or knowledge over the exact location of the provided
resources but may be able to specify location at a higher level of abstraction
(e.g., country, state, or datacenter). Examples of resources include storage,
processing, memory, and network bandwidth.
Rapid elasticity. Capabilities can be elastically provisioned and released, in
some cases automatically, to scale rapidly outward and inward commensurate
with demand. To the consumer, the capabilities available for provisioning often
appear to be unlimited and can be appropriated in any quantity at any time.
Measured service. Cloud systems automatically control and optimize resource
use by leveraging a metering capability at some level of abstraction appropriate
to the type of service (e.g., storage, processing, bandwidth, and active user
accounts). Resource usage can be monitored, controlled, and reported,
667 Id.
668 Id.
669 Capitol Records, LLC v. ReDigi Inc., 106 U.S.P.Q.2D (BNA) 1449, 1449 (S.D. N.Y. 2013).
670 Id. at 2, n.2.
providing transparency for both the provider and consumer of the utilized
service.671
(C.) Software as a Service Paradigm
Service bureaus lease or sell data processing, computer time, online services, and
access to software in return for subscription fees. Service bureaus are businesses that
provide data processing, online services, and access to software through a direct
connection over the Internet or WAN services for a fee.672 A licensor will want a clause
that addresses service bureaus. Service bureaus offer diversified software packages or
target specific industries. Vendors have developed payroll interface software products
that bridge between their software and payroll service bureaus. Service bureaus also
offer credit-reporting software to customers. Service bureaus charge their customers pay
access and storage charges. Credit or collection agencies depend upon the service bureau
to have properly functioning software with the latest updates. Similarly, human
relations or payroll departments will access software through service bureaus. Service
bureaus increasingly support GNU/Linux and Free/Open Source Software. Cloud
computing has evolved as the latest stage in software as a service.
Richard Raysman and Peter Brown, in their computer law treatise, explain that the
service bureau will warrant that it will deliver a software system that meets its
customer’s needs and this includes documentation, training, and the right of the
customer to have a programmer at the services bureau.673 In addition, the service bureau
will warrant that its staff will have the “appropriate technical and application skills to
enable them to perform their duties” under the service bureau agreement. Many service
bureaus will agree to make modifications or enhancements available to their customers
for no additional fee.674
Cloud providers have developed the next generation of IT services, storing data and
running applications and permitting users access data and collaborate on any device,
from any location 24/7. Ideally, data or software can be accessed, edited, and shared
securely from any location on any device. To date, cloud computing providers have
adopted a services paradigm. A typical provision, for example, makes a term of service
automatically renewable in perpetuity, subject only to written cancellation by the
customer. The fees are generally in the form of monthly service fees with upgrades.
Providers issue service credits to customer accounts to offset future billable services.
Service credits are not typically transferable to other account holders.
671 PETER MELL & TIMOTHY GRANCE, THE NIST DEFINITION OF CLOUD COMPUTING: RECOMMENDATIONS
OF THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, SPECIAL PUBLICATION, 800–145 (Sept. 2011) at
1.
PCMAG.com, Encyclopedia, Id.
672
2 RICHARD RAYSMAN & PETER BROWN, COMPUTER LAW: DRAFTING AND NEGOTIATING FORMS AND
673
AGREEMENTS § 10.15A at 10–81 (New York, New York: New York Law Press, 2009).
674 Id. at 10–76.
675 Open Cloud Manifesto, Dedicated to the Principle That the Cloud Should Remain Open, http://www.
opencloudmanifesto.org/.
676 Jon Brodkin, Seven Cloud-Computing Risks, NETWORK WORLD (July 2, 2008) (reviewing Gartner
as when a business places its website on a public cloud but retains a private cloud for its
internal operations.677 A 2011 survey of 3,000 CIO executives confirmed the importance
of cloud computing in U.S. companies.678 “The companies are attempting to build a highly
resilient network by using high tier, redundant connections, failover sites, and
intelligent re-routing; this will help them meet their service level commitments.”679
In many respects, cloud-computing works like a utility such as water or electricity
in that is measured, scaled out, and provides on demand services. NIST develops a
paradigm of three service models:
Cloud Software as a Service (SaaS): The capability provided to the consumer
to use the provider’s applications running on a cloud infrastructure. The
applications are accessible from various client devices through a thin client
interface such as a Web browser (e.g., Web based email). The consumer does
not manage or control the underlying cloud infrastructure including network,
servers, operating systems, storage, or even individual application capabilities,
with the possible exception of limited user specific application configuration
settings.
Cloud Platform as a Service (PaaS): The capability provided to the consumer is
to deploy onto the cloud infrastructure consumer created or acquired
applications created using programming languages and tools supported by the
provider. The consumer does not manage or control the underlying cloud
infrastructure including network, servers, operating systems, or storage, but
has control over the deployed applications and possibly application hosting
environment configurations.
Cloud Infrastructure as a Service (IaaS): The capability provided to the
consumer is to provision processing, storage, networks, and other fundamental
computing resources where the consumer is able to deploy and run arbitrary
software, which can include operating systems and applications. The consumer
does not manage or control the underlying cloud infrastructure but has control
over the operating systems, storage, deployed applications, and possibly
limited control of select networking components (e.g., host firewalls).680
In addition to the private sector, approximately 25% of the federal government’s eighty
billion in IT spending is a potential target for cloud computing solutions. 681
Lawyers representing cloud-computing customers will need to focus on the meaning
of key terms in their contracts such as “availability, “access,” and “outage.” The first
generation of service level agreement (SLA) is the chief instrumentality for cloud
computing contract law. Service providers use SLAs to reallocating risks, disclaiming
677 Nathan Marke, Clearing the Clouds: What’s Right For Your Business, CBR ROLLING BLOG (June 17,
2011), http://www.cbronline.com/blogs/cbr-rolling-blog/clearing-the-clouds-whats-right-for-your-business-210
611.
678 Glenn Gruber, Six Questions Hoteliers Should Ask Providers of Cloud-Based Systems, TALKING
681 Jill Tumler Singer, Is Cloud Computing For Real? Summary of Session By CIO of the National
warranties, and limiting remedies to service credits. 682 In a service paradigm, the
provider gives only a “best efforts” promise as opposed to strict liability-like express
warranties that run with sales of goods or the Principles of the Law of Software
Contracts. An exception to this tendency is the warranty-like protections given by AMS,
a public peer exchange.683
Access and outage terms are two of the most important provisions in any SLA
agreement.684 Access is the sine qua non of cloud computing and therefore the agreement
must carefully define how outage is to be measured. 685 Epocrates’ SLA spells out what
access means under the contract: “ ‘Availability’ is defined as the time when the
infrastructure is available for users to access the BMJWebDxPremium Product.
Availability is measured on a 24/7/365 basis and means when the BMJWebDxPremium
Product is functioning correctly when accessed via the internet from outside the
Epocrates network and includes being able to access the BMJWebDxPremium
Product.”686 Epocrates’ SLA also explains the operational structure for its cloud in its
SLA:
The Epocrates production facility has been architected as a highly available
and highly scalable infrastructure. The site is monitored on a 24 7 365 basis for
fault and performance characteristics. Every effort is made to minimize the
frequency and effects of planned and/or unplanned outages of the
infrastructure. The Service Level Agreement (SLA) for the production
infrastructure is as set out below:
The SLA sets out the time when the BMJWebDxPremium Product will be
available for external user access. This includes access to the
BMJWebDxPremium Product and NewDx Content included in that product
and any other agreed content to the extent that Epocrates and its contractors
host it. Epocrates agrees and undertakes to provide the Service Levels to the
site in accordance with this Schedule. Epocrates further agrees that it shall
monitor and measure the performance of the service and of the Service Levels
and shall report the same to the BMJ as set out below.687
682 CIOs key questions for cloud providers concerned access, outages, and recovery of data. “Do you have
SLAs on RTO (Recovery Time Object) / RPO (Recovery Point Objective)?” Other questions include whether
cloud providers had data backups. If so, how far back in time may data be recovered? How quickly can data be
recovered? Executives are also interested in availability terms, system integration, and the portability of data.
Glenn, Gruber, Six Questions Hoteliers Should Ask Providers, Id.
683 “AMS is a public peering hub—connects cloud providers together. Is now offering SLA guaranteed
100gbE connections, not just ‘best effort’ SLAs that most in industry currently use.” David Sims, Amsterdam
Peering Exchange Intros SLA for Guaranteed Bandwidth, TMCNET.COM, http://www.tmcnet.com/channels/
voice-peering/articles/186546-amsterdam-peering-exchange-intros-sla-guaranteed-bandwidth.htm.
684 “Outages damage perception of reliability of the cloud.” Robert Plant, Don’t Get Stuck in the Cloud:
Even if Your Data is Secure, One Glitch with a Cloud Provider Could Scare off your Customers, HARV. BUS.
REV., http://www.businessweek.com/managing/content/jun2011/ca20110621_098805.htm.
685 “Access to cloud resources requires . . . access to the cloud.” Id.
686 Epocrates Material Contract in SEC Filing, Exhibit 10, July 16, 2010 (Data processing and
preparation DATED 20th February 2007 (1) The BMJ Publishing Group- and -(2) Epocrates, Inc. Click for
Enhanced Coverage Linking Searches Agreement for the Newdx Project).
687 Id.
Cloud providers have developed software that measures usage, which is the basis
for charging its customers688 For example; a new software product by “Uptime Software”
monitors cloud services and provides estimates on costs, uptime, and other benchmarks.
This software signals a new era in contract enforcement as software monitors resources,
determines cloud costs, and helps enforce SLAs. 689 Nevertheless, it is important for
providers and clients to spell out how service level credits are computed and provide for
auditing by both parties.690 A FDIC official notes that SLA cloud computing is still in the
process of evolution. He notes the difficulty of locking down the meaning of a cloud
computing contract.691 This FDIC specialist highlights the following key negotiating
points:
How do you monitor that relationship? Who does the monitoring? What do you
monitor? For example, are you looking at the business health of the service
provider, the compliance with regulations and compliance with the bank’s own
internal policies? How is their security posture? Essentially, it’s everything
we’d want to see in the service level agreements.
For example, ensuring availability of your data, how do you know whether or
not the cloud is really capable of providing you 100 percent up time? Is it a
guarantee or is it a commitment? And we’ve seen some recent examples where
cloud outages do occur, even though they may provide commitments 100
percent up time. The same goes for security. There have been a few instances
where we’ve seen some cloud providers for data storage asserting that there is
security, only to find out later that there really isn’t security that they
committed to.692
The SLA agreement must also provide for prompt hardware service in the event of
outages in private clouds. The Society for Worldwide Interbank Financial
Telecommunication (SWIFT) provides a network that enables financial institutions
worldwide to send and receive information about financial transactions in a secure,
standardized and reliable environment. For the past forty years, SWIFT has averaged
99.999 uptime.693 Security is the watchword for lawyers representing cloud computing
clients:
[B]e specific in the security protocols they require, keeping in mind that they
must be reasonable and within the cloud provider’s ability to implement.
Schultz said organizations should insist on data loss prevention, but be
prepared to pay more for it.
688 Jessica Davis, MSPs, SaaS Providers Get a Handle on Cloud Computing Costs With Uptime Software,
CHANNELINSIDER.COM, http://www.channelinsider.com/c/a/Cloud-Computing/MSPs-SaaS-Providers-Get-a-
Handle-on-Cloud-Computing-Costs-With-Uptime-Software-112268/.
689 Id.
690 Nathan Marke, Clearing the Clouds: What’s Right For Your Business, CBR ROLLING BLOG,(June 17,
2011) http://www.cbronline.com/blogs/cbr-rolling-blog/clearing-the-clouds-whats-right-for-your-business-210611.
691 Tracy Kitten, Cloud & Mobile: Vendor Weak Points: FDIC’s Saxinger on Management and Contracts
693 Karl Flinders, Bank App Store Part of Community Cloud Developments, COMPUTERWEEKLY.COM,
Consider including penalty clauses for data security breaches in their cloud
SLAs. Getting that requires a cloud provider serious enough about data
security . . . It’s nice to get money back if you have a breach. It won’t cover your
costs but you’re getting someone who invests skin in the game.’
The cloud provider must be obligated to return or destroy data as directed by
the customer, and the contract should have a timeframe for accomplishing
that.694
To properly represent their clients, attorneys must spell out rights in the event
software or data is unavailable because of natural disasters or other interruptions. In
addition, the parties to cloud computing SLAs must spell out: (1.) Rights and Duties of
provider and client; (2.) Metrics/measurements to be used in measuring level of service,
disruption, or maintenance; (3.) Description and list of services provider is to deliver that
will conform to terms (Clients should consider how measurement is reported); (4.) Issues
with SLA’s where cloud provider outsources to another cloud provider; upstream SLA
needs to give complimentary representations about level of service and other
obligations.695
The SLA is a very different paradigm than standard software contracts with new
risks. IBM charges more for SLAs with meaningful warranties and remedies. 696 IBM’s
White Paper states that SLAs need to fulfill four objectives:
The list of services the provider will deliver and a complete definition of
each service.
Metrics to determine whether the provider is delivering the service as
promised and an auditing mechanism to monitor the service.
Responsibilities of the provider and the consumer and remedies available
to both if the terms of the SLA are not met.
A description of how the SLA will change over time.697
Another survey of cloud computing customers revealed dissatisfaction with the
terms of cloud computing service agreements:
One critical element of cloud strategy revealed by the survey involves service
levels: ‘Survey respondents hold very low opinions of the service-level
agreements they are getting from vendors,’ . . .” That’s why we believe that the
first essential-but-unknown success factor in cloud implementations is a strong
focus on SLAs.”698
A study of cloud computing clients concluded that SLA agreements were an entirely
new paradigm with unique negotiating points: “About one-third of service consumer
respondents rate the effectiveness of their SLAs 3 on a scale of 1 (“very ineffective”) to 5
694 Marcia Savage, Cloud Computing Contracts and Security’s Role, TECHTARGET.COM (June 22, 2011)
http://searchcloudsecurity.techtarget.com/news/2240037158/Cloud-computing-contracts-and-securitys-role.
695 Id.
696 The Importance of Service Level Agreements, PERSPECTIVES ON CLOUD COMPUTING, http://cloudblog
group.tumblr.com/post/7045628090/the-importance-of-service-level-agreements.
697 IBM.com, Review and Summary of Cloud Service Level Agreements, Id. at 1.
698 Eileen Feretic, There’s No Escaping the Cloud, BASELINEMAG.COM (2011), http://www.baselinemag.
com/c/a/IT-Management/Theres-No-Escaping-the-Cloud-595183/.
(“generally very effective”).699 Only 16% of the respondents gave their SLAs the highest
ratings though “49% say their providers deliver 95% to 100% compliance.”700 A cloud
computing contracting survey also concluded that:
57% of service consumers rely on internal IT to monitor provider SLAs.
46% agree it’s difficult to monitor service-level targets with public cloud service
providers.
Most (79%) of SLA terms are negotiated.
The vast majority (96%) of SLAs did not fully meet the required service-level
targets over the past year.
Most (57%) service consumers assess financial penalties on service providers
when terms aren’t met, yet only 10% say they receive full reimbursement. 701
In the cloud computing legal environment, there is frequently a mismatch in service
level agreements (SLAs) between existing systems (tomorrow’s legacy) and what is being
offered for cloud-based services.702 “Despite supplier promises around availability,
standard SLA targets still fall well short of current performance in more traditional
delivery models.”703 Security and privacy issues abound with cloud computing though
Internet law has not yet evolved to address these issues. Security priorities for cloud
computing include: (1.) Governance, Risk & Compliance, (2.) Identity Management
Infrastructure Security (3.) Confidentiality of Data and (4.) Data Protection.704 As a U.S.-
based company, Microsoft has to comply with the Patriot Act—that means that the U.S.
government may access EU-Based cloud data potentially violating the EU Data
Protection Directive.705 Outsourcing data including personally identifiable information
about European consumers may create unanticipated negative consequences as to the
portability of data.706
§ 4.10 Commercial Law of Internet Intangibles
The lesson of the past two decades is the protean qualities of U.C.C. Article 9. The
law of secured transactions accommodates well to changing information technologies.
Courts have had little difficulty in accommodating principles of secured transactions to
cyberspace or to the transfer of intangible assets. In an information-based economy,
699 Id.
700 Id.
701 Press Release, InformationWeek Analytics New Research Finds Only 4% of SLAs Met All Service-
Level Targets Over the Past 12 Months, PRNEWSWIRE.COM (June 24, 2011) http://www.prnewswire.com/news-
releases/informationweek-analytics-new-research-finds-only-4-of-slas-met-all-service-level-targets-over-the-
past-12-months-124485048.html.
702 Id.
703 Andy Gallagher, An Evolutionary Approach to Cloud Computing, COMPUTERWEEKLY.COM (June 17,
2011), http://www.computerweekly.com/Articles/2011/06/17/247021/An-evolutionary-approach-to-cloud-computing.
htm.
704 Jan De Clercq, Stay Safe in the Cloud, Id.
705 Zack Whittaker, Microsoft Admits Patriot Act Can Access EU-Based Cloud Data, ZDNET, http://www.
zdnet.com/blog/igeneration/microsoft-admits-patriot-act-can-access-eu-based-cloud-data/11225.
706 Stuart Wilson, Steve Bailey, CommVault, CHANNELEMEA.COM (June 24, 2011, http://www.
software and intellectual property are a company’s crown jewels. A leading law school
casebook on the licensing of intellectual property notes that companies seeking financing
will need to prove “the valuation of the company’s intellectual property” before lenders
will loan them money.707 Bankruptcy trustees are disbursing internet assets such as
domain names or IP addresses routinely:
Bankruptcy trustees, debtors-in-possession, and receivers are seeing an
increase in efforts to sell Internet Protocol (IP) addresses, also referred to “IP
Numbers.” IP Numbers are the unique numeric identifiers associated with
computers connected to the Internet. While sales of IP Numbers can deliver
value to the estate, IP Numbers are unusual in that their value, use and
transfer are enhanced by applicable contract and policy. Ignoring the contracts
and policies can delay the sale process and reduce or negate the value of IP
Numbers. This article seeks to provide an overview of issues associated with IP
Number sales, as well as suggesting an approach for permissible and
straightforward sales to obtain the highest value.708
A federal bankruptcy judge ordered that its founders purchase Bebo.com, once the
third largest social media website.709 Increasingly, trustees or debtors-in-possession view
domain names as significant assets for secured lending and sales of assets. 710 To
understand how to collateralize software and underlying intellectual property, it is
necessary to briefly cover the basics of secured transactions. U.C.C. Article 9 is part of
the Uniform Commercial Code, a state law, that covers financial obligations secured by
interest in personal property and fixtures but not real property, which is covered by the
state law of mortgages. Security agreements are contracts that create a security interest
in collateral denominated by the debtor. Intellectual property rights are defined as
general intangibles, a U.C.C. Article 9 category of collateral. Software is protectable by
both patents and copyrights and the underlying intellectual property, which are general
intangibles, can serve as collateral. For patents, which are general intangibles,
perfection is accomplished by filing a UCC-1 or financing statement in the state where
the debtor’s headquarters are located. In contrast, copyrights are perfected by
registration in the U.S. Copyright Office.
Security interests are consensual, as opposed to judicial or mechanical liens, which
are created by law. U.C.C. Article 9 provides the legal infrastructure for assets-based
financing where the assets are personal property. The idea is for a creditor to back up
their right to payment (such as a promissory note) with the right to repossess and sell
the debtor’s collateral. UCC’s sphere of application is spelled out in § 9–109(a)(1).
INTELLECTUAL PROPERTY: LAW AND APPLICATION 529 (New York, New York: Aspen Law and Business, 2008).
708 Stephen M. Ryan, Matthew Martel, and Ben Edelman, Internet Protocol Numbers Internet Protocol
Numbers and the American Registry for Internet Numbers: Suggested Guidance for Bankruptcy Trustees,
Debtors-in-Possession and Receivers, BLOOMBERG BNA: BANKRUPTCY RESOURCE CENTER (Jan. 4, 2012).
709 In re Bebo.com Inc., No. 2:13–bik–22205 (Bankr. Ct., C.D. Cal., July 13, 2013).
710 Domain names are property that can be a valuable asset in secured lending. “Like their brick-and-
mortar counterparts, “e-tailers” must have an attractive address online known as a “domain name.” To
establish their website’s presence on the Internet, domain name holders contract with an Internet Service
Provider, which provides the services necessary for registering a domain name. ‘Domain names are unique;
[they] are assigned on a first come, first serve basis.” As a result, “there are no two identical names on the
Internet.’ In addition, domain names enable Internet users to locate a website using that name.” Rachel
Ehrlich Albanese and Avi Fox, Chapter 11.com: New Life for the Failed Retailer, BLOOMBERG BNA: ELECT.
COMM. & LAW REPORT. (Aug. 23, 2010).
Article 9 applies to “a transaction, regardless of its form, that creates a security interest
in personal property or fixture.”711 U.C.C. Article 9’s unified concept of the security
interest and methods of perfection that turn on the type of collateral applies equally well
to Internet-related commercial and consumer financing of personal property. The chart
below is a roadmap to the seven parts of U.C.C. Article 9. Creditors will need to consider
how U.C.C. Article 9 priority rules apply to software.
Parts to Article 9
of the U.C.C. Key Topics Covered
Part 6: § 9–600s: Rights After Default, Rights and Duties of Secured Party in
Default and Enforcement of Possession and Control, Waiver and Variance of Rights and
Security Interests Duties, Secured Party’s Right to Take Possession After
Default, Disposition (sale, lease or licensing) of Collateral
After Default, Notification Before Disposition of Collateral,
Notification Forms, Contents and Form of Notification Before
Disposition of Collateral: Consumer Goods Transaction;
Application of Proceeds, Surplus & Deficiency, Rights of
Transferees of Collateral, Rights & Duties of Certain
Secondary Obligors; Full and Partial Satisfaction of
Obligation, Notification of Proposal to Accept Collateral,
Right of Redemption, Remedies for Secured Party’s Failure to
Comply with Article, Impact on Deficiency or Surplus,
Determination of Whether Conduct was Commercially
Reasonable
U.C.C. Article 9 provides the ground rules for how to create, perfect, and gain
priority for security interests in Internet-related software and other intangible assets.
U.C.C. Article 9 determines the rules for perfecting security interests in software,
intellectual property and other information-based assets in every U.S. jurisdiction.
Counsel securing Internet-related assets outside the U.S. will need to comply with
foreign law. U.C.C. Article 9’s rules of perfection are not followed outside the United
States but many countries are beginning to adopt U.S. style central registries. The
Reporters of the Principles of the Law of Software Contracts exclude the “transfer of a
security interest in software” from its sphere of application.712
If the parties create a security interest in software, U.C.C. Article 9 applies, not the
Principles. Article 9’s major innovation was to create the legal invention of a “security
interest” in personal property. A security interest is an interest in personal property that
backs up the debtor’s promise to pay or other payment obligation. Collateral means “any
tangible or intangible asset belonging to the debtor in which the debtor grants a security
interest to its secured party.”713 Secured parties are those who are the beneficiaries of
the security interest. The granting clause gives the secured party a security interest in
designated collateral generally indicated by specific listing or collateral types such as
software as a general intangible.714
Section 109 defines the scope of U.C.C. Article 9. Article 9 applies to any
“transaction, regardless of its form, that creates a security interest in personal property
or fixtures.”715 A security interest, in turn, is “an interest in personal property or fixtures
712 American Law Institute, Principles of the Law of Software Contracts (Proposed Final Draft, March
6, 2009) at § 1.06(b)(2).
713 JAMES J. WHITE & ROBERT S. SUMMERS, UNIFORM COMMERCIAL CODE (St. Paul: West Publishing Co.
whole or in material part, the secured party should” be sure that the security agreement
and the financing statement perfect its security interest in the right of payment.”718
Increasingly, the federal law of bankruptcy will be determining the rights and liabilities
of e-commerce companies seeking Chapter 7 or 11 protections. Internet assets such as
websites will increasingly be collateralized as the economy emphasizes intangible assets.
§ 4.11 Cross-Border Electronic Commerce
The Internet, by its very nature, is international, yet there is no uniform legal
infrastructure for commercial transactions harmonized for the global marketplace. 719
However, an international commercial law is beginning to evolve:
The way of the future in the increasingly global economy is to create greater
uniformity in commercial standards of doing business across nations. Where
differences in laws and languages create barriers to trade in the process of
negotiating and translating complex written documents, short cuts provided by
new systems will be needed to keep pace with international commerce and
trade. Many recent uniform systems are evolving, based on mercantile law and
industry practices, such as the INCOTERMS, the international (and generally
accepted) system of commercial delivery terms. 720
In the absence of international conventions, domestic law applies to license
agreements and terms of service. There is great uncertainty as to whose law will govern
online commerce, which knows no international borders. Uniform rules for safeguarding
commercial information transfers would be a desirable international development.
Contract law in cyberspace must take into account radically different social, economic,
and legal systems. A growing number of companies are engaged in cross-border
electronic commerce. The movement to devise uniform rules to be used in private
international law has evolved rapidly over the past century. The United Nations
Commission for International Trade (UNCITRAL); the International Institute for the
Unification of Private Law (UNIDROIT); the Council on Europe (Council); and the
International Chamber of Commerce (ICC) have all spearheaded past efforts to create
international commercial law.
The European Commission contends that E-Commerce will increase only if
consumers are convinced they have a minimal adequate remedy when entering into
cross-border sales and services.721 UNCITRAL’s Model Law on Electronic Commerce is
718 Edwin Smith, MCLE, Taking and Enforcing Security Interests in Personal Property § 2.4.
719 Robert A. Hillman of the Cornell Law School is the Reporter of the Principles of the Law of Software
Contracts, while Maureen O’Rourke, the Dean of the Boston University Law School, the Associate Reporter,
are distinguished legal academics who understand the globalized nature of software transaction. The
Reporters also demonstrate their sophisticated understanding of software consumer issues when they
acknowledge the different approach taken in the Principles from Europe’s “pro-regulatory stance to consumer
protection and contract terms specifically.” Principles of the Law of Software Contracts, 2009 A.L.I., § 1.11,
cmt. c. The Reporters acknowledge that they have considered the European approach to consumer transactions
rejecting it in favor of the U.S.-based unconscionability doctrine. Id. The Reporters note that the annex to the
Unfair Contract Terms Directive may be useful to courts “in evaluating unconscionability claims.” Id. Finally,
the Reporters acknowledge that it may be expensive for software makers to localize their contracts for the
European consumer market. Id. This section demonstrates that Internet contracting practices must be
localized because countries connected to the Internet have radically different legal cultures.
720 MCLE DRAFTING AND ENFORCING MASSACHUSETTS CONTRACTS § 3.11 (2013).
721 “The [Directive on Consumer Rights] Proposal ensures a high level of consumer protection and aims
at establishing the real retail internal market, making it easier and less costly for traders to sell cross border
and providing consumers with a larger choice and competitive price.” Europa, Proposal for a Directive on
Consumer Rights, http://ec.europa.eu/consumers/rights/cons_acquis_en.htm.
722 UNILEX, UNIDROIT PRINCIPLES OF INTERNATIONAL COMMERCIAL L AW PRINCIPLES.
723 A recent example of cultural clash is the French case against Twitter for enabling the transmission
of anti-Jewish tweets. This action is going forward in a French court but would be dismissed at an early stage
in the United States because of the First Amendment and Section 230 of the Communications Decency Act.
See Eleanor Beardsley, French Twitter Lawsuit Pits Free Speech Against Hate Groups, NATIONAL PUBLIC
RADIO (Jan. 22, 2013).
724 There is relatively little case law on shrinkwrap, but a Scottish court upheld a shrinkwrap license in
a business-to-business setting. Beta Computers (Europe) Limited v. Adobe Systems (Europe) Limited. FSR
(1996) 367.
725 MARK LEMLEY ET AL., SOFTWARE AND INTERNET LAW 459 (2006) (noting the need for legal protection
of software and computer technology in an environment “complicated in part because of differences among
national legal rules, traditions, procedures, and institutional frameworks.”).
726 See generally, Michael L. Rustad & Vittoria Maria Onufrio, The Exportability of the Principles of
Software: Lost in Translation?, 2 HASTINGS SCI. & TECH. L.J. 25, 51–52 (2010).
727 Jane K. Winn & Brian H. Bix, Diverging Perspectives on Electronic Contracting in the U.S. and EU,
Selling Directive; Data Protection Directive; Database Protection Directive; and the
Copyright Directive. The right to protection of personal data is established by Article 8 of
the Charter, and in Article 8 of the European Convention of Human Rights. The EU
recognizes E-Commerce does not flourish without mandatory consumer protection across
national borders. Reverse engineering is a right guaranteed to European licensees under
the Software Directive for purposes of interoperability. Many of the U.S. style terms of
service are invalid or questionable under mandatory European consumer protection
rules.728
(A.) EU Consumer Protection
Online businesses, including U.S. companies, must give European consumers
accurate pre-contractual disclosures.729 Online sellers are required to give consumers
confirmatory disclosures before the delivery of computer software or other E-Commerce
contracts. The seller’s confirmation disclosure must explain the period in which a
consumer can cancel the contract. Specifically, websites must give the consumer a right to
cancel a distance contract. Further, a website seller must give European consumers a right
of withdrawal period not shorter than seven working days. If an e-Business accepts orders
via its website or other instrumentality, it will have only 30 days to fill the order. An E-
Commerce seller must give European consumers precontractual disclosures including that
they have the right to a refund payable within 30 days.
Sellers may not require European consumers to waive consumer rights under the
Distance Selling Directive or Unfair Contract Terms Directive or any other mandatory
rule. The European Union’s Unfair Contract Directive gives, in effect, all European
consumers a fundamental right to read, review, and understand standard terms before
concluding a contract.730 Simply put, mass-market license agreements where the
consumer cannot view the terms prior to payment are invalid in all twenty-eight Member
States of the EU under the Unfair Contract Terms Directive.731
(B.) Electronic Commerce Directive
Member States are required to develop national legislation implementing the
Electronic Commerce Directive (E-Commerce Directive).732 The E-Commerce Directive,
which took effect on January 6, 2002, creates a legal framework for online service
providers, commercial communications, electronic contracts, and limitations of liability of
intermediary service providers. Article 1 states that the E-Commerce Directive seeks to
728 Michael L. Rustad and Maria Vittoria Onufrio. Reconceptualizing Consumer Terms of Use for a
Directive 97/7/EC of the European Parliament and of the Council of 20 May 1997 on the protection of consumers
in respect of distance contracts; Council Directive 84/450/EEC of 10 September 1984 concerning misleading
and comparative advertising, Council Directive 85/374/EEC of 25 July 1985 on the approximation of the laws,
regulations and administrative provisions concerning liability for defective products.
730 European Commission, Unfair Contract Terms, http://ec.europa.eu/consumers/consumer_rights/
rights-contracts/unfair-contract/index_en.htm
731 Council Directive 93/13/EEC of 5 April 1993 on unfair terms in consumer contracts at art. 4(1):
Without prejudice to Article 7, the unfairness of a contractual term shall be assessed, taking
into account the nature of the goods or services for which the contract was concluded and by
referring, at the time of conclusion of the contract, to all the circumstances attending the conclusion
of the contract and to all the other terms of the contract or of another contract on which it is
dependent.
732 The European Parliament and the European Council adopted the Directive on June 8, 2000.
contribute to the proper functioning of the internal market by ensuring the free
movement of information society services between the Member States. 733 The E-
Commerce Directive establishes rules such as the transparency and information
requirements for online service providers, commercial communications, electronic
contracts, and limitations of liability of intermediary service providers. 734 The E-
Commerce Directive requires providers to list designated information on their website
to qualify for immunities. Barclay’s Bank for example, complies with the Directive
disclosures in the following chart:
The E-Commerce Directive applies only to service providers established within the
twenty-eight Member States of the EU. The E-Commerce Directive exempts service
providers from liability for intermediaries “where they play a passive role as a “mere
conduit” of information from third parties and limits service providers’ liability for other
“intermediary” activities such as the storage of information.”735 Article 12 provides for
immunity from liability for providers serving as a mere conduit, Articles 13 and 14
immunize providers for ministerial activities such as caching and hosting. Article 14,
entitled “Hosting,” states:
1. Where an information society service is provided that consists of the
storage of information provided by a recipient of the service, Member States
shall ensure that the service provider is not liable for the information stored at
the request of a recipient of the service, on condition that:
(a.) the provider does not have actual knowledge of illegal activity or
information and, as regards claims for damages, is not aware of facts or
circumstances from which the illegal activity or information is apparent;
or
Summary (2012).
740 “Without prejudice to Directive 97/7/EC and Directive 97/66/EC, Member States shall take measures
to ensure that service providers undertaking unsolicited commercial communications by electronic mail
consult regularly and respect the opt-out registers in which natural persons not wishing to receive such
commercial communications can register themselves.” Id. at art. 7(2).
741 Id. at art. 9.
742 Id. at art. 15(1) (“Member States shall not impose a general obligation on providers, when providing
the services covered by Articles 12, 13 and 14, to monitor the information which they transmit or store, nor a
general obligation actively to seek facts or circumstances indicating illegal activity.”).
shall in particular ensure that the legal requirements applicable to the contractual
process neither create obstacles for the use of electronic contracts nor result in such
contracts being deprived of legal effectiveness and validity on account of their having
been made by electronic means.”743
Article 9 contains functionally equivalent provisions to EUTA and the E-Sign Act.
Like these U.S. statutes, the European E-Commerce Directive provides that certain
categories of contracts may not be concluded electronically: (a.) real estate contracts
except rental agreements, (b.) contracts required to be in writing by courts or statutes,
(c.) contracts of suretyship or security agreements, and (d.) contracts for family law or
trusts/estates.744
(4.) Duty to Respond to Report Illegal Activities
Article 15(2) gives Member States the option of establishing a duty of service
providers to “inform the competent public authorities of alleged illegal activities
undertaken or information provided by recipients of their service or obligations to
communicate to the competent authorities, at their request.”745 This role is similar to the
one of U.S. service providers who have a duty to report illegal activities, such as the
distribution of child pornography and respond to subpoenas of courts of competent
jurisdiction. The Directive requires seller to give consumers disclosures before electronic
contracting on how to conclude online contracts, as well as the means of correcting errors.
Article 10 gives consumers the right to store and retrieve contracts or they are
unenforceable. Article 12 essentially immunizes ISPs for conduit activities much like the
U.S. Digital Millennium Copyright Act’s Section 512 discussed in Chapter 10. There are a
number of requirements that must be met for a service provider to receive 17 U.S.C.
§ 512(c) safe harbor protection.
(5.) Liability of Service Providers
The liability limitation for European service providers applies only if the service
provider does not initiate or modify the transmission. Articles 13 and 14 of the Directive
immunize a service provider’s caching and hosting activities. Article 16 imposes no duty of
providers to monitor their websites for illegal activities like the DMCA. Member States
must develop legislation to inform the authorities of illegal activities. Member States are
to develop legislation to encourage out of court settlements of disputes under Article 17.
(C.) The Convention for the International Sale of Goods
(1.) Sphere of Application
The Convention for the International Sale of Goods (CISG) applies to business-to-
business transactions where the buyer and seller are in different signatory states.746 The
purpose of the UNCITRAL was to modernize and harmonize the international law of
sales. By January 1, 1988, when the United States became a signatory, the CISG was
the applicable law for international sales contracts in more than sixty countries. As of
743 Id. at art. 9(1).
744 Id. at art. 9(2).
745 Id. at art. 15(2).
746 Final Act of the U.N. Conference on Contracts for the International Sale of Goods, Official Records,
Annex I at 230 (April 10, 1980), U.N. Doc. A/ Conf.9 7/18, reprinted in 19 INT’L LEGAL MATERIALS 668 (1980),
art. 3(2) [hereinafter CISG].
May 2, 2012, 74 countries became CISG signatories, accounting for an even larger
proportion of U.S. trading partners. CISG consists of four parts made up of three
substantive parts and a fourth part containing final provisions. The CISG drafters
divided the international sales statute into articles, which are subdivided into chapters in
each part of the statute. Part I, entitled the “Sphere of Application and General
Provisions,” establishes CISG’s sphere of application. Article 1 of CISG sets forth the
basic rules on applicability of the international law to contracting states. Nationality is
important in determining scope; the CISG’s scope section uses “place of business” of a
party and not “nationality, place of incorporation, or place of head office.”747
(2.) Exclusions & Overview of Scope
Nevertheless, the CISG excludes the following from the scope of its application:
auction sales, the sale of securities, negotiable instruments, ships, aircraft, and the sale of
electricity. CISG’s Reporters excluded consumer transactions as well as all tort actions
including causes of action for products liability. Because Europe has adopted the Products
Liability Directive there is no need for CISG to cover those causes of action. The justification
for CISG exclusions is that it would subject sellers to conflicting national laws or extant
law. CISG Part I, Chapter 2, General Provisions, applies to both buyers and sellers in
Articles 7 through 13. CISG Part II, spans Articles 14 through 24, and sets forth rules
for the formation of the international sales contract.
CISG Part III, Articles 25 through 88, covers topics such as breach, avoidance, party
obligations, and remedies relevant in software licensing where the CISG is the governing
law. CISG Part IV consists of final provisions, including reservations and legal
provisions for becoming a signatory state. CISG differs from U.C.C. Article 2 in
recognizing the concept of fundamental breach when either party may avoid a contract.
U.C.C. Article 2 employs the “Perfect Tender Rule,” which permits a buyer to reject a
contract if it fails to conform in any respect to the contract. 748 The CISG, however, makes
it more difficult to cancel an international sales agreement because of its Article 25
fundamental breach standard.
The CISG’s exclusive jurisdiction bases itself upon the seller and buyer’s places of
business, as opposed to the nationality of the buyer and seller. The CISG applies unless
the parties agree to opt out of the Convention under CISG Article 6. The CISG is also
inapplicable if one of the parties is unaware that the other’s place of business is a foreign
CISG signatory state.749 Article 10 of CISG applies if one of the parties has multiple
places of business. Courts will likely exclude service-like transactions as well as
contracts where sales are only incidental transactions. CISG leaves less room for creative
judicial reforms, though some commentators believe that this statute should be stretched
to software transactions, even though it is an intangible. CISG rules for international
sales contracts apply in two circumstances: (1.) when contracts for the sale of goods are
between parties whose places of business are in different CISG Contracting States; or
(2.) “when the rules of private international law lead to the application of the law of a
Contracting State.”750
This provision applies when one party has a place of business in a CISG signatory
state and the other party’s place of business is located in a non-CISG state. A court
deciding an international sales law dispute could make a decision that private
international law leads to applying the law of the CISG or some other body of law. In
this provision, the CISG is deferring to the court’s application of its private international
law principles, often referred to as conflict of law principles by U.S. courts. 751 Article
1(1)(b) is not applicable to U.S. contracting parties because the U.S. entered a
reservation derogating from this principle. The U.S. representatives to the Convention
found this article to create uncertainty.
(3.) CISG’s Application to Computer Software
The CISG does not address the question of whether the Convention applies to the
licensing of software. U.S. courts classify most software license transactions as falling
under Article 2 of the U.C.C., governing the sale of goods,—even though these
transactions involve the transfer of information or digital data. 752 However, the
exclusion of specific intangibles like electricity or shares of stock does not signal the
“conclusion that the subject matter of a CISG sale must always be a tangible thing.”753
CISG applies to diverse forms of software licensing but goods, like software, frequently
involve a mix of sales and services:
Though we cannot see or touch it, a computer program is not really all that
different from a tractor or a microwave oven, in that a program—designed and
built to process words, bill customers or play games—is also a kind of
“machine.” In other words, a computer program is a real and very functional
thing; it is neither “virtual reality” nor simply a bundle of (copyrighted)
“information.” Once we recognize the functional nature of a program, we begin
to see that the CISG rules (on contract formation, obligations, remedies for
breach etc.) are well-suited to regulate international sales of these particular
things.754
Academic commentators contend that custom software, Internet downloads, and
standard mass-market licenses are all within CISG’s sphere.755 Under CISG, “the goods
referred to are conceived as movable assets; and the common-law tradition sets great
store by noting that they have to be corporeal as well.”756 CISG “seems well-suited to the
750 CISG art. 1.
751 Rod N. Andreason, MCC-Marble Ceramic Center: The Parol Evidence Rule and Other Domestic Law
Under the Convention on Contracts for the International Sale of Goods, 1999 B.Y.U. LAW REV. 351, 376 (1999)
(arguing that private international law must also be consulted to resolve substantive issues of cross-border
sales law).
752 Robert B. Doe & Jen C. Salyers, Chapter 18 on Software Licenses in KATHERYN A. ANDRESEN, LAW
and Preëmption Under the CISG, 13 DUKE J. INT. & COMP. L. 258 (2003).
754 Id. at 756.
756 FRITZ ENDERLEIN & DIETRICH MASKOW, INTERNATIONAL SALES LAW: UNITED NATIONS CONVENTION
ON CONTRACTS FOR THE INTERNATIONAL SALE OF GOODS, CONVENTION ON THE LIMITATION PERIOD IN THE
INTERNATIONAL SALE OF GOODS (New York: Oceana Publications, 1992) http://www.cisg.law.pace.edu/cisg/
biblio/enderlein-art01.html.
Assuming that the CISG applies to the software contract, there are many
differences in formation rules from U.C.C. Article 2. The CISG does not require a writing
to be enforceable and thus CISG recognizes neither Statute of Fraud nor Parol Evidence
Rule. Anglo-American contract theory follows an objective theory of contract. In contrast,
Article 8 of the CISG interprets an international sales contract according to the party’s
intent. Unlike the parol evidence rule, a court may consider subjective intent as well as
objective circumstances prior to or contemporaneous with any final writing, whether
integrated or not. Article 8 also permits courts and tribunals to consider subjective intent
as well as the reasonable interpretation of the parties’ statements and conduct.758
(5.) CISG’s Warranty-Like Provisions
The CISG does not use the word “warranty,” although all of the warranties found
in U.C.C. § 2–313 to § 2–315 are found in Article 35. CISG Article 35 requires that the
seller deliver goods of the quantity, quality, and description required by the contract. 759
Unlike the UCC, the CISG does not adhere to any formal requirements to disclaim
warranties, such as a “conspicuous” disclaimer of the implied warranty of
merchantability that expressly mentions the term merchantability.
(6.) CISG’s Fundamental Breach and Avoidance
A buyer may require the seller to deliver substitute goods under CISG Article 46(2)
if the seller fundamentally breaches the contract. U.C.C. Article 2’s standard is one of
perfect tender, U.C.C. § 2–601. CISG, unlike U.C.C. Article 2, does not require a Statute
of Fraud nor does it adopt the parol evidence rule. Article 8 of CISG allows either party
to introduce evidence of prior or contemporaneous agreements to interpret a contract.
Assuming there is a fundamental breach under Article 25, the buyer will have remedies
even though the risk of loss has already passed from the seller. Nevertheless, a buyer
may seek monetary remedy for non-fundamental breaches. The difference between the
value of what was promised and delivered, Article 74, is a buyer’s fundamental remedy
for accepted goods. The CISG enables a buyer to accept goods even though they do not
conform to contract and claim a price reduction as an offset.763
(D.) Europe’s Doctrine of Exhaustion
In July of 2012, the European Court of Justice (ECJ)764 ruled against Oracle that
only the right to distribute software is subject to the European Union’s exhaustion
doctrine, which is the equivalent of the first sale doctrine followed by U.S. courts. 765
Exhaustion is a synonym for first sale for all practical purposes. Oracle filed suit against
UsedSoft in the Landgericht München I (Regional Court, Munich I) “seeking an order
that UsedSoft cease the practices” of relicensing Oracle software. According to the
Bundesgerichtshof, the actions of UsedSoft and its customers infringe Oracle’s exclusive
right of permanent or temporary reproduction of computer programs within the meaning
of Article 4(1)(A) of Directive 2009/24. The German court reasoned:
Oracle filed suit against UsedSoft after it promoted an “Oracle Special Offer” in
which it offered for sale “already used” licenses for Oracle software. UsedSoft
represented that all licenses were current because the maintenance agreement
concluded between the original license holder and Oracle was still in force. Oracle’s
principal method of distribution was to have its customers download software from the
Internet. The original Oracle licenses were multi-user and exceeded the number of
licenses needed by the first acquirer. UsedSoft would then purchase these licenses from
organizations that had valid licenses but had stopped using the software. UsedSoft
contended that its business model was authorized by Europe’s exhaustion doctrine.766
Oracle contended, “Exhaustion did not apply to downloading a computer program from
2012, Judgment of the Court (Grand Chamber), Reference for a preliminary ruling under Article 267 TFEU
from the Bundesgerichtshof (Germany), made by decision of 3 February 2011, received at the Court on 14
March 2011, in the proceedings.
766 Directive 2009/24/EC of the European Parliament and of the Council of 23 April 2009 on the legal
the Internet, because there was no sale of a tangible object” only a license.767 The ECJ
opinion ruled that EU Directive permitted licensees to dispose of copies downloaded from
the Internet so long as they do not retain a copy for themselves. The European Court of
Justice decided that the Directive:
must be interpreted as meaning that, in the event of the resale of a user license
entailing the resale of a copy of a computer program downloaded from the
copyright holder’s website, that license having originally been granted by that
right holder to the first acquirer for an unlimited period in return for payment
of a fee intended to enable the right holder to obtain a remuneration
corresponding to the economic value of that copy of his work, the second
acquirer of the license, as well as any subsequent acquirer of it, will be able to
rely on the exhaustion of the distribution right under Article 4(2) of that
directive, and hence be regarded as lawful acquirers of a copy of a computer
program within the meaning of Article 5(1) of that directive and benefit from
the right of reproduction provided for in that provision. 768
The court’s decision was that the first sale or exhaustion doctrine applies equally well to
downloading software from the Internet.
(E.) Cross-Border Licensing
U.S. companies need to localize their licensing agreements tailored for diverse legal
cultures as illustrated by Micro Data Base Systems, Inc. v. State Bank of India. 769 The
key issue in Micro Data Systems turned on the territorial limits of the license’s granting
clause. In Micro Data Base Systems, the State Bank of Mumbai, India entered into an
end-user agreement with the Indiana-based MDBS, the developer of the Database
Management System. The license agreement did not contain geographic limitations on
where the software could be used. MDBS’s Runtime Distribution License Agreement
permitted the India-based bank to copy and distributes MDBS modules so long as each
copy incorporated tokens to track authorized users. The State Bank of India agreed to
purchase tokens for each licensed copy of the software used by MDBS. The licensor
charged royalties based upon the sale of tokens used in the shipment of each module.
State Bank of India installed the MDBS in 130 branches around the world. State
Bank did not purchase tokens for all of the MDBS modules it used and distributed. In
the early 1990s, State Bank used the MDBS software to drive a third-party banking
program known as IBSnet. Morgan Laboratories created IBSnet and sold it to State
Bank. MDBS filed suit against State Bank of India claiming copyright infringement and
breach of the software license agreement. Since MDBS had imposed no territorial
limitations, the court held the software license agreement covered locations both inside
and outside of India. However, the Micro Data Base Systems court ruled that State Bank
of India was liable for every software module they distributed without copy control
tokens. The court computed damages by multiplying the number of unauthorized copies
times the cost for 447 tokens, which totaled $447,000 plus interest. The court ruled that
MDBS could not recover damages for copyright infringement since U.S. copyright law
has no extraterritorial effect on infringing conduct occurring in India. The tracking
767 Id.
768 Id. at clause 88.
769 177 F. Supp.2d 881 (N.D. Ind. 2001).
system described in Micro Data Base Systems, Inc. enabled the licensor to monitor and
control the copying, distribution, and use of its software.
(F.) Cross-Border Payments
EBay initiated a payments system in Germany and Austria in which it
“intermediated payments, receiving funds directly from buyers for items purchased from
newly registered sellers on the localized eBay websites in those countries.”770 EBay
reported that the German Bundesanstalt fur Finanzdienstleistungsaufsicht (BaFin) and
the Austrian Finanzmarktaufsicht (FMA) required it to obtain a license as a condition of
introducing this system. EBay’s payment processing unit is based in Luxembourg, which
does not require a license.771 EBay faces regulations and licensure in other countries
where it operates:
In Australia, PayPal serves its customers through PayPal Australia Pty. Ltd.,
which is licensed by the Australian Prudential Regulatory Authority as a
purchased payment facility provider, which is a type of authorized depository
institution. Accordingly, PayPal Australia is subject to significant fines or other
enforcement action if it violates the disclosure, reporting, anti-money
laundering, capitalization, corporate governance or other requirements
imposed on Australian depository institutions. In China, PayPal is affiliated
with Shanghai Wangfuyi Information Technology Ltd., which is licensed as an
Internet Content Provider and operates a payments service only for Chinese
customers and only for transactions denominated in Chinese currency. The
People’s Bank of China (PBOC) has enacted regulations to establish a new type
of license, called a Payment Clearing Organization (PCO) license, which will be
required for non-bank payment services.772
The Internet poses new legal dilemmas for payments systems. One of the greatest
risks for businesses is when a cybercriminal operating in a distant forum steal
credentials from a commercial bank transfer or wire transfer. For consumers, the
greatest risk is the interception of credit card information. By the time the Internet
evolved, credit cards were well-established as a payment system. Consumers continue to
use credit cards for most retail Internet purchases, though there is a recent shift to debit
cards and ACH (automated clearinghouse) transfers.773 ACH transfers for Internet
purchases are growing exponentially since 2001. 774 Credit card providers and processers
are stepping up their security for credit card processing. 775 The National Automated
Clearing House Association (NACHA) rules now address “Internet-Initiated Entries.”776
Foreign and cross-border payments and mobile payments over a cell phone or other
device, which are far more common in foreign countries such as Japan than in the U.S.,
are at the cutting edge of payments law.777 However, the law governing Internet
Id.
771
772 Id.
773 LYNN M. LOPUCKI, ELIZABETH WARREN, DANIEL KEATING, AND RONALD J. MANN, COMMERCIAL
775 Id.
776 Id.
777 Id.
payments is lagging behind the staggering increasing in new mobile phone applications
enabling payment.