Legal Issues and Construction Industry

Check out more papers on Contract Intellectual Property Interview
Contents

Abstract

While in the 21st century the construction industry prefers to conduct business using the information and communication technologies (I&CT), the presence of legal issues pertaining to this mannerism of business cannot be ignored. The aim of this project is to provide a better understanding of these legal issues which are associated with their use. The objectives entailed to achieve this aim are to determine the existing legal issues and to estimate the awareness about them in the industry. The aim and objectives have been addressed by conducting two types of field investigations namely, questionnaires and interviews with lawyers, architects and engineers with different backgrounds. The project concludes with the identification of the legal issues present in the industry and an attempted comparison between the legal scenario in the U.K. and India.

1. INTRODUCTION
1.1 Background and Scope of the Research

Almost a decade ago the information technology invaded our lives like never before. The advancement in information and communication technologies (I&CT) and their utilisation has been tremendous with the recent years witnessing the development of several IT-based technologies such as e-commerce.

Information technology solutions have paved a way to a new world of internet, business networking and e-banking, budding as a solution to reduce costs, change the sophisticated economic affairs to an easier, speedy, efficient, and time-saving method of transactions and exchange of information.

Though the internet has emerged as a boon for the present pace of life yet at the same time it has also resulted in posing various threats to the consumers and other institutions for which it has till now proven to be the most beneficial. Various criminals have been able to pave their way to interfere with the internet accounts through various techniques like hacking the Domain Name Server (DNS), Internet Provider's (IP) address, spoofing, phishing, internet phishing etc. and have been successful in gaining an unauthorised access to the users' computer system thereby gaining enormous profits from the stolen data.

These and other problems have forced the business community, the legal community and the law enforcers i.e. the government to look at the current legal scenario.
These problems, therefore, need to be studied in detail by investigating legal issues pertaining to the construction industry. This study is an attempt at understanding the legalities which are related to the mannerism of conducting business while using I&CT. As part of this study an effort will be directed towards comparing the legal stance of the United Kingdom and India.

1.2 Aim and Objectives

The aim of this project is to provide a better understanding of the legal issues involved while using information and communication technologies (I&CT) in the construction industry.

To achieve this aim, the following objectives should be fulfilled during the course of this project:-
• To study the legal issues pertaining to e-commerce (for e.g. electronic contracts, digital signatures, etc.).
• To assess the importance of jurisdiction issues in cyberspace (for e.g. engaging in e-commerce on World Wide Web may expose the company to the risk of being sued in any state or foreign country; law applicable to contractual obligations, etc.)
• To study the various legal problems that can arise out of miscommunication between the client, consultants and contractors (court actions, out-of-court settlements of disputes, etc.)
• To study and compare the legal stance of India and the United Kingdom, in using the information and communication technologies in the construction industry.

1.3 Justification for the Research

Computers and more importantly internet governs our lives to the kind of extent that we do not even realise its significance. Today companies, especially in the concerned area of construction, are conducting business by means of the latest advancements in information & communication technologies.

Bearing in mind the current flourishing e-commerce, it becomes quite easy to get embroiled in lawsuits. The reasons maybe several, for instance either there may be disputes between the client and the company; or there might be an issue with jurisdiction; or there may be concerns related to the security of level of exchange of information electronically. In most of the cases it can be assumed that there is a highlighted ignorance of the legal framework with respect to I&CT, and this ignorance may be a deterrent in the popularity of conducting business in this manner.

In lieu of these issues, I believe it becomes the need of the hour to undertake a study of this kind.

1.4 Methodology Outline

Owing to the nature of the research project and its data, the research approach adopted is mostly quantitative. However, some aspects of qualitative research have also been incorporated. Source of information will be taken from journals and books.

The method of collecting data for this research project has consisted of online questionnaires (surveys) and unstructured interviews. Case studies of previous lawsuits with respect to the topic have been studied.

1.5 Dissertation Contents

The research project includes a detailed study into the methodology to be followed and also provides the justifications for the chosen methodology.

The project also includes a literature review about the various legal issues which are related to the use of information & communication technologies for conducting business in the construction industry. It sheds light on the some of the legal terms associated with the legal framework of e-business.

The project report additionally contains with analysis and evaluation from the interviews conducted and the online questionnaire filled in by architects, engineers and lawyers.

It supplies information on the “legal future” of using the various existing and upcoming information & communication technologies in construction, providing an insight into the implications; the solutions available; the problems faced while conducting research; and manner in which I&CT can be utilised for the growth of the construction industry worldwide. It concludes with summarisation of the research and recommendations and scope for further study on this research subject in the construction industry.

2. LITERATURE REVIEW
2.1 Introduction

The intentional use of information technology by cyber-terrorists or cyber-criminals for producing destructive and harmful effects to tangible and intangible property of others is addressed as ‘cyber crime'. Cyber crime is clearly an international problem with absolutely no national boundaries; hacking attacks can be launched from any corner of the world without even an iota of fear of being traced or prosecuted easily. A cyber-terrorist can collapse the economic structure of a country from a place where that country might not even have arrangements such as an extradition treaty to deal with that criminal. The only safeguards can be better technology; to combat such technology which is already well-known to the hackers; and to evolve stricter and tighter laws which can be accepted universally.

2.1.1 An introduction to the construction industry

A maxim in India states, to live a comfortable life all one needs is three basic essentials- food, clothes and a house. This has held true across all civilisations and centuries. Building a house was just a first step. The world has advanced much further constructing palaces, forts, dams, skyscrapers, factories, energy-efficient buildings and lots more.

In a world of today, the 21st century, the construction industry is an important sector of a nation's economy; providing employment to millions; employed by countries across the world as an economy regulator! In U.K. alone, construction industry had an output of £102.4 billion at current prices (2004); 8% of Gross Domestic Product (G.D.P.). In the European Union the construction sector accounts for 9.9% of G.D.P. and 50% of Gross Fixed Capital Formation (GFCF).

Considering the scope and importance which the construction sector enjoys worldwide, it becomes quite easy to understand that this industry functions at an incredible level and involves working with many organisations.

“The construction industry is frequently described as fragmented by its critics; however, disseminated would be a better description .For each construction project a whole new organization is created involving the client, designers, contractors, sub-contractors, material suppliers, plant hire companies, government, local authorities and agencies such as the environmental agency, Health and Safety Executive and many others. Each ‘new' and ‘transient' project organization is, in fact, a virtual organization or enterprise” (McCaffer, 2008).

Communication, thus, becomes an important aspect of conducting a successful business in construction ensuring successful collaboration between the various components of the industry.

2.1.2 An introduction to e-business/e-commerce and e-construction

With age & time the concept and means of communication have also evolved. Earlier communication meant travelling to places near and far, then the concept of letters came and with the advent of telephone postage lost some of its significance. The world was however still is in store for more inventions and the 1940's took the world by storm as the computers were born.

Computers and internet are a lethal combination, a form of communication which rules over our lives as much as eating food does. Every day, man makes new discoveries regarding these two, trying to find out how our day-to-day activities can be undertaken in an improved & efficient manner.

The term ‘electronic commerce' (e-commerce) was coined by Lawrence Livermore in 1989. E-commerce is a consolidation of people, technology, materials and “the processes on an electronic network for commercial transactions” (Johnston et al, 1997, p 37).

As specified by the European Commission (1997, cited in Bruin, 2002), electronic commerce is all about doing business electronically involving the electronic processing and transmission of data (which consists of data, text, sound and videos). It encompasses various activities consisting of electronic trading of goods and services, electronic share trading, on-line delivery of digital content, on-line sourcing, electronic fund transfers, direct consumer marketing, electronic bills of lading, commercial auctions, collaborative design and engineering, public procurement, and after-sales service (European Commission, 1997).

To be speaking strictly it's not really the electronic aspect of e-commerce but the digital part which imparts the revolutionary, efficient and versatile character to e-commerce (Johnston et al, 1997).

E-commerce involves both the services; e.g. financial, information and legal services); and the products; e.g. consumer goods, specialised mechanical equipment. It also constitutes the combination of traditional activities such as education and healthcare and new activities such as virtual malls (European Commission, 1997). This is also agreed with by Johnston et al, 1997 who state that e-commerce supports the selling, buying and distribution of services and goods.

Johnston et al (1997) while discussing the definition of electronic commerce noted that it involves the conduction of business electronically across the spectrum of inter-enterprise relationships.

E-commerce has the advantages of being a paperless economy, engaging in outsourcing and entails the convergence of all information in a single form (Johnston et al, 1997).

In this day and age e-business has emerged as a field of immense potential. The use of information and communication technologies to conduct business has gained momentum, and, like just about any other business the construction industry too has embraced the concept of e-business.

“Strong information technology (IT) capabilities have been a competitive necessity in nearly every industry sector. The post-Latham (1994 and Egan (1998) era has seen many construction firms investing in technology tools to improve business performance, which subsequently led to an increase in technology investments in construction firms” (Ruikar et al., 2008, p 23).

The use of information and communication technologies in construction, however, depends upon a number of factors such as the size of the construction firm, its position in the market, the markets that the company operates in etc.

2.1.3 Introduction to the legal problems in e-business

Before jumpstarting onto the e-business wagon, a company should have some reasonably placed apprehensions. The question in front of the management of a company should be: whether conducting business using information and communication technologies is legally safe or not? Other questions should follow as well, such as: what is an e-contract? will the company's information be secure when shared through I&CT? what are the liability issues? what are the jurisdiction issues? is a scanned document valid and legal? what is a digital signature, an e-signature?

Questions such as above are justified because in actuality the companies are unaware of the legal risks involved while conducting e-business, hampering the chances of fruitful commerce.

Sieber (2001) brings to light the need for new laws when he says that the increased significance of information and information technology is closely linked to increased potential dangers, and these dangers bring an increased necessity to reassess the existing information law regulations and to formulate new ones.

Sieber (2001, p8) further makes this statement to back up the formulation of new information law regulations, “It must encourage- in the interest of communal justice (iustitia commutativa) and as a contribution to distributive justice (iustitia distributia)-the creation of new “information” values (e.g. by means of economic incentives in copyright law), ensure a just distribution of the newly created goods (e.g. through the regulation of rights to particular information), reduce the number of new risks stemming from information technology (in particular, by provisions in the area of liability, administrative law and criminal law)and ensure a just compensation in cases where harm is caused”.

Exchange of information in construction and engineering based businesses is a universal occurrence but it is not accounted for by contractual practice. Insufficiently defined responsibilities, overlapping communication techniques and mistrust all hamper the fuller use of inter-enterprise I&CT (Hassan et al).

A major problem exists with the enforcement of electronic law. Particularly practical difficulties arise from the fact that data containing most of the information is available at the discretion of the recipient. As is the case electronic data is not actually visible and can be altered, deleted or hidden through manipulation of technology (Sieber, 2001). Data can also be encoded or encrypted by offenders to escape imprisonment. Several terrorist, bank robbers, paedophiles, etc have attempted to escape or have been able to escape by encrypting data. Encrypted data is data which has been converted into incomprehensible codes which can only be unlocked by using a key which only a holder of that matching key can reconvert them into plausible data.

All in all there is clearly an urgent need to study and understand the legal issues involved while using information and communication technologies for conducting business.

2.2 Legal Aspects of using I&CT

When the concept of e-commerce as introduced it was greeted with hysteria which has now been replaced by a concern voiced by many over the impact of using I&CT for business. The industry is now closely examining the after-effects of e-business business world (Ismail and Kamat, 2008).

Hurtado and O'Connor Jr (2009) deliberate on the contractual issues concerned with the use of construction Building Information Modeling. They explain that the legal community is struggling to help out in developing meaningful contract terms in relation to the use of BIM technology. In their paper for the Society of Construction Law, they have contemplated upon the issues to be considered when preparing contractual provisions, including the proposed use of the model; the mannerism of data transfer from one model into the other models; the deliverance schedule expected from the model; reliability of the modelled information; management of the modelling process; and usage of the model after the completion of construction.

Some of the legal issues and terminology pertaining to the use of I&CT for business purposes shall now be discussed.

2.2.1 Types of legal risks involved in e-business in construction

Every new day is coloured with a new discovery; this holds as much truth for I&CT as for any scientific discovery. The only drawback with I&CT is that a new discovery brings along with it a new set of legal issues. These legal issues are a drawback because they take time for implementation and regulation; sometimes damage has already been done before any sufficient action can be taken.

Ismail and Kamat (2008, p-212) correctly state, “The difference between the rates at which e-business technology develops to the rate at which legal framework and rules develop is substantial. Legal risks have not been studied in relation to construction e-business”.

The legal risks discussed include risks posed by web-based agencies, risks related to jurisdiction; contract formation; authentication; electronic privacy and risks associated with intellectual property. These legal risks inflicting e-construction have been discussed as below:

• Insecurity regarding electronic privacy

In the digital economy privacy claims have been of paramount concern. An issue forever causing concern amongst the construction and business community is the insecurity of their personal and private information which is exchanged and stored electronically.

A popular, efficient and inexpensive means of information exchange and data transfer is the electronic mail systems, popularly known e-mails. While emails now incorporate information in various forms which includes photographs, typed memos, video clips, spreadsheets and bar codes; they are deemed to be as insecure as a postcard if they are not protected by encryption and elaborate password systems (Johnston et al, 1997).

Construction companies involved in e-business will need to manage the risks associated with sharing private information; private information may refer to personal privacy concerns about their own firms (Ismail and Kamat, 2008, p214-215). “Online portals and marketplaces collect more information than is needed for legally authentically an e-contracting party” (Smith and Clarke, 2000).

The information thus collected may be in the form of registration forms, cookies, etc. Though the question remains as to who owns this information, the risk associated is with the privacy being challenged. In case of hacking or a virus, the information may end up being passed onto a third party.

• Risk posed by the web-based agents

Web-based agents are information brokers. A new brokerage model can substantially change the equilibrium and re-adjust the interests of existing stakeholders. Also, software agents pose the biggest and truly exclusive risk to the current legal system as pointed out by Ismail and Kamat (2008).

Agents control decisions and they learn and act upon their perception of the environment to make the maximum goals of its user or programmer (Dzeng and Lin, 2004; Lee, 2004; Ren and Anumba, 2004). Agents act on behalf of their owners to promote the owner's desires, unlike support software that supports the owner in making a decision but leave the decision for the owner to make (Schoop et al., 2003; Ren and Anumba, 2004).

• Risks related to electronic authentication

When doing business via the electronic networks, it become increasingly difficult to establish the other party's trustworthiness without having physically met them, in other words doubts about authenticity are raised (Bruin, 2002).

Smith & Clarke (2000 cited in Ismail & Kamat, 2008, p 216) debate authentication by stating, “The drive to authenticate e-business buyers and sellers and attribute contracting actions to the proper buyer and seller is in direct conflict with privacy laws”. Pacini et al (2002, quoted in Ismail and Kamat, 2008, p 216) support this statement when they say, “Attributing an electronic message for an offer or acceptance of an e-contract to the person who purports to send it is yet another risk”.
The Uniform Electronic Transaction Act (UETA) addresses this risk from a legal perspective by making it necessary that certain authentication levels are acquired and thus proper authentication and attribution is ensured and a protection is provided to the e-business participants from the attack of hackers (Belgum, 1999; Moreau, 1999; Thelen Reid & Priest LLP, 1999a; Pacini et al., 2002, cited in Ismail and Kamat, 2008).

• Risks inflicting electronic contracts

Consider this scenario. Two parties engage in a negotiation for the purchase of cement for the construction of an institutional building. The seller offers it at say £5 per kg and the buyer refuses and wants to buy it at say £4 per kg and also wants the seller to bear the shipping cost. The seller agrees, transaction is completed, cement is shipped and the buyer transfers money into the seller's account. This sounds like a simple business contract; however, the difference here is that this contract has been formulated and fulfilled electronically (Johnston et al, 1997).

In a commercial context, promises are exchanged in the form of an offer and an acceptance of the order. The offer and the acceptance supported with a valid consideration and mutual assent would, subject to certain limitations, constitute a valid contract.

Electronic Data Interchange (EDI) technology is an advanced form of cyber-contracting. EDI is conducted between trading partners who already have a negotiated agreement which rules the relationship. In this form of technology, the computers contact each other as well as negotiate (based on programmed instructions). If a reply which rejects the offer is received then a counter-offer is also made. This continues till an agreement is arrived at or one of the system stops the process (Johnston et al, 1997).

However, in the e-business transactions, it is not an easy job to distinguish between the offer make and the acceptor. This is considered critical because a contract is considered to be invalid until an offer has been made and the acceptor has accepted the offer and communicated the same to the offer maker (Ismail and Kamat, 2008, p 213).

Although the laws governing electronic contracts have improved significantly over the year, yet there is always scope for improvement because of the ever changing evolving nature of the communication technologies. Business risk and uncertainty are always on a high level in the electronic world. Legal difficulties in an e-contract arise when the parties' expectations are not met with or when a transaction does not progress as planned.

Bruin (2002, p 146) shed some light on TrustUK and explained that, “......in July 1999, the Department of Trade and Industry published its Consumer White Paper Modern markets: Confident consumers........The White paper among other things contained plans for the approval of on-line codes of conduct by a new body provisionally called TrustUK”.

Section 4 of TrustUK Code of Practice deals with the various aspects of e-contracts and its implications (liabilities included).

• Risks related to varying jurisdictions

Jurisdiction is a legal term describing which law is in effect at a given period of time and which court's decisions will be legally binding. Jurisdiction issues arise when parties dispute over a contract and want to settle as to which jurisdiction will decide over the issue (Ismail and Kamat, 2008).

The problem becomes more intimidating where the issue of e-commerce comes into picture. The internet simplifies the carrying out of business globally. But then different countries follow different laws, especially those with respect to construction and therefore, the risk of encountering lawsuits in foreign land increases.

In an electronic contract it should be very clear as to what law applies to the contractual obligations, what court of law will be presiding over to judge any dispute arising from the contract (Bruin, 2002).

As pointed out by Rowe (1998, cited in Ismail and Kamat, 2008) a dispute judged under varying set of regulations, laws and rules have as different judgement. “Although the laws regulating e-business vary, the general opinion of the courts implies that companies engaged in activities or online advertising may have to defend lawsuits in different jurisdictions if those activities violate the local laws”, Thelen & Priest (1997 quoted in Ismail and Kamat, 2008, 213).

The problem of jurisdiction exists becomes all the more relevant in the 21st century, now that there are so many countries existing worldwide and when global expansion has occurred in the business scenario with the arrival and explicit use of the information and communication technologies. However, there are quite a lot of countries which are at the moment unable to make any kind amendments in their legal framework on construction, especially where the amendments in law are concerned with e-construction. At the same time, it is good news that some governments are making changes to the construction law executed in their countries to make e-construction and e-business a more feasible and legally secure venture.

However, the point to be noted here is that despite all the positive proceedings in the respective field, the possibility of two countries sharing the same law on e-commerce and that too in the construction sector are negligible. In a scenario where the choice of law is absent, legal uncertainty may arise regarding the application of law to an electronic contract (Bruin, 2002). This information clearly implies that risk attributed to varying jurisdiction remains.

Bruin (2002, p42) clearly points out that in a specific case of “cross-border electronic consumer contracts, a court procedure may involve such difficulties that a contract term defining a foreign jurisdiction may de facto exclude or hinder the consumer to take legal action......”. As a result the service provider also ends up providing an unfair contractual term.

From the literature on jurisdiction which has been studied and mentioned here, it has been found that although there are quite a lot of provisions in legal frameworks of countries which address the jurisdiction issues, yet it would be beneficial to make changes and improvisations to these existing laws.

2 Brief description of some of the legal terms associated with the legal framework of e-business

To understand the legalities involved in using information and communication technologies for business, one needs to be aware of some terms associated with the legal framework of e-business. In this section these common yet important terms shall be discussed briefly.

Identification of the potential legal gaps and problems within the cluster projects - issue 2, a report on the findings of Hassan et al, forms the main basis for defining these terms.
The discussed terms are as follows:-

• Electronic / digital signatures

Electronic and digital signatures allow the recipient of a piece of information to know when the information has arrived, who has sent it, and to check whether the information has been changed or tampered with since it was sent.

Digital signatures are electronic codes specific to individual users, which can be used to identify the originator of a message or file, and to indicate approval of the transmitted information. There are different types of digital signatures available (i.e. public key infrastructure, asymmetric cryptography, account numbers and passwords), and the level of security that is required dictates the choice of method to be used. Digital signatures are easily to transport and all the more difficult to imitate by anyone else, and more importantly they can be automatically time-stamped. A digital signature is basically a unique ‘key' that provides, if anything, stronger authentication than any written signature (Wacks, 2001).

Asymmetric cryptosystem involves two keys, one public, the other private. Its main advantage is that if you are able to decrypt the message, you know that it could only have been created by the sender (Wacks, 2001)

The Electronic Transaction Act 1999 (in Australia) gives legal recognition to the use of electronic signatures and one may find them useful in executing electronic contracts on your website. The risk of e-businesses dealing with parties which might misuse digital signatures is similar to the commercial risk of fraud that arises through forgery of signature on a paper contract.

• Here is an example which depicts the working of a digital signature. Assume that man named A has to the draft of a contract to his lawyer who at present is in another town. A wants to assure his lawyer that the information sent across has not been tampered with and it really is what he had sent. To ensure that, here's what A has do:
• Copy-and-paste the contract into an e-mail.
• Using specialised software, A obtains a message hash (mathematical summary) of the contract.
• A then uses a private key that he had previously obtained from a public-private key authority to encrypt the hash.
• This encrypted hash becomes A's digital signature of the message. It is to be noted that the digital signature will be different each time a message has been sent.

Now, how will A's lawyer detect that this document is the same unchanged one that A had sent across to him? Here's what he will do:

• A's lawyer makes a hash of the received email to ensure that the document is intact and has been sent by A only.
• A's lawyer then makes use of A's public key to decrypt the message hash or summary.
• The received email (document in this case) is considered authentic and valid if the hashes match.

Thus we understand that using a digital signature is an easy and safe method to protect privacy of information.

A digital signature consists of the concerned person's public key, his/her name and e-mail address, the expiry date of the public key, name of the company, serial number of the digital ID, and digital signature of the certification authority (Magalhaes, 2003).

The fact that digital signature increase the security and ensure privacy is confirmed by Wacks (2001, p 80) when he states, “Blinding or blind and digital signature will significantly enhance the protection of privacy”.

• Digital notaries

Digital notaries provide a time stamping service, thereby proving the existence of a piece of information at a particular time. These are often used in conjunction with an electronic / digital signature. Timestamping can ensure non-repudiation. Indeed, a digital signature is only legally binding if it was made when the user's certificate was still valid, and a timestamp on a signature can prove this. Timestamping involves the following parties -client, timestamping authority (TSA) & a verifier.

Feather in 1999 expressed his opinion on digital notaries. He articulated that the purpose of a digital notary is to certify that a document as produced by a person is a true copy of that document and that the notary has cross-checked that the person is who they claim to be. “The only significant difference is that an electronic signature, once certified, can be securely attached to any document without the notary needing to see the process taking place. I do not disagree with the idea of a licensing process to ensure that such digital notaries are competent and also carry appropriate liability, but I do not see it as essential and it should be possible for any person to provide such a service without needing a licence”, concludes Feather (1999) in his paper.

• ICT contracts

Information and communication contracts describe usage of information and communication technologies and detail the supporting environment. All parties involved in a project must comply with the ICT contract to enable the effective use of the information and communication technologies.

• ASP contracts

ASP contracts are signed between an ASP and a client; and the ASP and other stakeholders involved within a project. The ASP sets up and manages services on behalf of the client, providing facilities and functionality for all project participants.

Shelbourn et al (2003) elaborating on this concept state that the contract can be formulated between the two electronically since the ASP has the requisite software. Negotiating virtually, the project stakeholders can, either accept & digitally sign the contract, or they can suggest amendments to formulate a new contract. “If for any reason whatsoever the email and attached contract document have not been digitally signed, then the ASP's transaction monitor will not allow the new contract to be posted to the room”, Shelbourn et al (2003) further clarify.

Each stakeholder is issued with an ‘end-user license' based upon their respective level of trust. This license determines the extent to which the stakeholders have rights to use ASP services (Shelbourn et al, 2003).

• End-user licences

End-user licenses are determined by the ASP based upon the respective trust level of the end users as determined by the ASP. An end-user license will normally include information on the method of granting access to services, IPR conditions, permitted use of the ASP's services by the end users, training for users, IPR and confidentiality conditions, and limits on liability (Shelbourn et al, 2003).

• IPR issues of information

Intellectual property is an area of law that is drawing maximum attention from the cyberspace. IP is the legal protection governing works which are a result of creative work processes (Johnston et al, 1997). Examples of IP are inclusive of patents, trade secrets, copyrights, etc.

The term IPR denotes Intellectual Property Rights and describes the rights to information contained within the project for the different stakeholders who are involved within the project. Many different levels of rights to access will exist that must be managed by the ICT contained within the project.

Trade secrets are used to protect valuable information and virtually any kind of information can be guarded as a trade secret. It enforces rights indefinitely, meaning that the rights are to be exercised as long as the information remains a secret (Bone, 2001).

However, there are legal limitations to the extent to which trade secret law is exercised. As described by Bone (2001), the two most important limitations on trade secret law are namely: the rule that allows reverse engineering and independent discovery; and the rule that excludes protection for ‘general knowledge and skill'.

Only wrongful means of appropriation are not given any rights under trade secret law, and neither independent discovery nor reverse engineering is considered to be wrongful enough.

An employee is permitted to use the general knowledge and skill that he has acquired at work even if it is at the expense of the employer.

Copyright is the set of rules which govern the right to copy a piece of work (Johnston et al, 1997). However, some interventions by regulations may be required as s second-degree enforcement control (Elkin-Koren & Salzberger, cited in Koren, 2001).

• AEC objects

The increased use of ‘object' technology within construction projects has raised a number of legal and contractual issues. These issues comprise of management of these objects, ownership issues, change of rights, and accessibility of these objects Shelbourn et al, 2003).

• Legal infrastructure

The legal and contractual issues highlighted in this literature review bring to front the actuality of the situation. Clearly there is a need for a legal infrastructure which will be used for framing regulations and laws to counter the risks associated with information and communication technologies.

• E-disclosures

Today nearly 60 billion e-mails are sent every day, and this figure is increasing with each passing day! Although half of these are unwanted spam, the rest are a mixture of formal & informal writings, all sent for different reasons and with different motives. In a business context, all e-mails, and any & all electronic records that somehow are a part of business activity, are a permanent record of events (Baillieu, 2008).

Recent changes and developments in law means that in 21st century's electronic and digital age, e-disclosure opens up all forms of electronic media and makes it available for scrutiny by the courts (Baillieu, 2008). This further has an impact in the sense that now, more than ever before, business managers need to focus on the management of their data and the access to that data (Baillieu, 2008).

Where earlier typed & handwritten letters were the norm, now documents created on PCs and laptops are considered to be the easiest form of storing and communicating information. More and more PC users are evolving into prolific writers. “As a result more documentary evidence exists today than ever before, albeit only in electronically stored formats”, as stated by Trevelyan (2009).
This new method of storing data implies that law firms have to deal with and understand a totally new way of conducting the disclosure process (Trevelyan, 2009). E-disclosure is a process of restoring, searching, capturing, manipulating and collecting electronic documents as a part of the system of disclosure in civil litigation. To put it in simpler words; electronic disclosure or e-disclosure is now the norm (Trevelyan, 2009).
Baillieu (2008) explains that in court proceedings in England, “.....the duty of disclosure even applies to documents that no longer exist, privileged and confidential documents, and documents found or which come into existence during the court proceedings”.
In case of disputes litigation support software tools are employed to search and dissect the databases including erased e-mails, discarded and hidden data, so that the foot-print is always there to be found (Baillieu, 2008). Trevelyan (2009) shares her opinion on the kind of technology available to tackle the multitude of information which is made available through e-disclosers. According to her, there is technology available to help search & sift through electronic information electronically, and this technology includes software which allows for automated categorisation and clustering, and near-duplicate finding, conceptual and contextual searches, and email threading. Computer forensics experts are trained to break down encryption codes & passwords, and, also to investigate & analyse data for reproducing time critical events (Baillieu, 2008).

However, due to the amount of effort, time and money involved e-disclosure is not very popular amongst lawyers.

• Extranet:

An extranet is essentially defined as a private network that uses internet protocols, public telecommunications and network connectivity to share data in a secure manner with partners, customers, vendors, and suppliers.

Ruikar et al (2005) have mentioned that project extranets have opened a new avenue of communication and collaboration during a construction project. They have further discussed the effect of web-based tools (such as project extranets) which are being made use of to manage construction projects.

Tools such as project extranets can be utilised to control, manipulate and store information on the project and also make it available to all participants of the construction supply chain (Alshawi and Ingirige, 2002, cited in Ruikar et al, 2005).

ITCBP Intelligence (2002, cited in Ruikar et al, 2005) lists some of the examples of web-based tools, namely: computer-mediated tendering system for services or contracts; purchase of materials electronically; project extranets for project management; and marketing of products online by a manufacturer.

An interesting point to note here is that the founder members of the UK vendors' trade association did not like the usage of the term extranets in construction and in 2003 changed it to Network for Collaborative Technology Providers (Wilkinson, 2008).

To summarise this section, the common terms and risks associated with the legal issues plaguing information and communication technologies, have been defined and discussed in a brief manner. The idea is to acquaint the reader with the terminology to be used as well as introduce him/her to the legalities which are a part and parcel of using ICT for conducting e-construction.

2.3 Conclusion

McCaffer (2008) states very categorically that e-business offers quite a lot to the construction industry; the reason being that it questions the issues which a scattered industry had to address, such as distributed collaboration, electronic sourcing and purchasing of products & services, requirement of an improved efficiency and delivery of products on time.

The flaws in the legal systems have further been strengthened by Johnston et al (1997) who say that law, being conservative as it is, has lagged in responding to the changes brought on by information and communication technologies.

One might question the inclusion of statements made nearly a decade ago. Well, the argument is that even after almost 10 years the scenario has not changed much.
The whole idea behind undertaking this literature review was to find out about the manner of research work undertaken regarding this field. Whether it was by referring books, e-journals or the internet, the data found may be considered substantial, although a need was felt to further understand the legal issues concerned with ICT and their affect on conducting daily business.

While referring to the book titled e-Business in Construction edited by Chimay J. Anumba and Kirti Ruikar, it was found that it touched a lot of topics, throwing light on the e-Business aspects of Construction as well as the legalities associated with it.

However, more relevant information was garnered from the results of Identification of the potential legal gaps and problems within the cluster projects - issue 2, a paper on the findings of Hassan Tarek et al. The cluster projects mentioned in the title of this paper were European Union funded research projects addressing information and communication technologies (I&CT) in construction and the idea was to analyse them and identify the legal issues. This paper shows that there is a commercial product available for the use of electronic signatures, ICT contracts, or ASP contracts directly from the projects studied in this exercise.

The number of projects that carried out research into each of the legal and contractual issues differed significantly. For example the area of legal AEC objects although researched by all projects, does not have commercially available tools to use to overcome the legal barriers to the wider uptake of AEC objects [ICCI 2003]. However, it should be noted that even though there are commercial products available for all of the legal and contractual issues researched, the development of a complete legal framework to enable the use of ICT on construction projects has yet to be fully realised.

While undertaking the research on this topic, it was surprising to note that very little published material is available on the relevant topic. The facts established almost a decade ago have only been further strengthened, and there is still more scope for studies and research works to be taken up.

To conclude, one common factor that was arrived upon after the literature review was the problem of ignorance regarding the legal framework of using e-business tools. It was realised that there is a scope for more study in this field.

3. RESEARCH METHODOLOGY

The nature of variables and data which shall be analysed determines the design of a research strategy. The two types of research strategies are qualitative research and quantitative research. Their applicability depends on the purpose of the study and the type and availability of the information that is required (Naoum, 1998).

Naoum (2002) has stated that research design is similar to an action plan which can be used to getting from ‘here' to ‘there', wherein he defines ‘here' as the initial set of questions, and ‘there' he defines as a set of conclusions or answers received for these questions. In general, qualitative research implies a study of a subject without any prior formulation of the problem. Qualitative research involves data collection such that the theories and hypothesis will emerge (Fellows and Liu, 2003).

On the other hand, quantitative research is objective in nature and the data is firm and reliable (Naoum, 2002). In addition, quantitative research is based on testing a hypothesis through a number of measurement and logical measures (Naoum, 2002).

However, neither of the two methods described above are exclusive from each other. Triangulation is a third approach, which combines the two research methods. This approach is very powerful as it assists in making interferences and conclusions (Fellows and Liu, 2003).

Quantitative research is driven by the researchers' viewpoints, while qualitative research underlines the perception of the subjective (Uwe Flick, 2006).

It becomes highly relevant to understand the difference between the terms methods and methodology. According to Blaxter et al. (2001), a method is associated with the tools used to gather data while methodology is referred to the approach that underpins the research. In simpler words, methods are a part of methodology.

This chapter will explain and analyses the different types of research methodology. The aim is to analyse the different research methodologies and choose a suitable research method which shall be adopted for this research project.

3.1 Quantitative Research

Creswell (1994, quoted in Naoum, 2002, p 38) defines quantitative research as, “.......an inquiry into a social or human problem, based on testing a hypothesis or a theory composed of variables, measured with numbers, and analysed with statistical procedures, in order to determine whether the hypothesis or the theory hold true”.
A survey depicts quantitative research through the data collection of asking questions to people. Quantitative research is of two types: Objective measurement and Placement of theory (Naoum, 2002).

3.2 Qualitative Research

Qualitative research is more subjective in nature as compared to quantitative research (Naoum, 2002). It lays more stress on descriptions, meanings and experiences.
“Qualitative research is a lot about producing and analysing texts, such as transcripts of interviews or field notes and other analytical materials” (Uwe Flick, 2006).

The crucial features of qualitative research are the accurate choice of suitable methods and theories; the identification and analysis of various perspectives; the researchers' reflections on their research as part of the process of knowledge production; and the variety of approaches and methods (Uwe Flick, 2006).

Information collected in the qualitative research is classified under two categories: exploratory research and attitudinal research (Naoum, 2002).

The term exploratory research is used when the researcher has inadequate amount of knowledge on the topic (Naoum, 2002). The objectives of this type of research are to make a judgment of the situation, to screen the alternatives available and to discover new ideas (Naoum, 2002).

Attitudinal research is used to evaluate the perception of a specific group towards an issue (Naoum, 2002). This category of research is conducted through a structured survey where the questions are adjusted with the attitude of the person towards a particular topic.

3.3 Triangulation

Triangulation refers to the combination of two approaches to carry out research. As triangulation employs the work of two or more techniques, both qualitative and quantitative research methods may be used. This will allow these two approaches to overcome their individual disadvantages and capitalize on each other's advantages.
Triangulation has been divided into the following categories according to Easterby-Smith et al (2002):

• Theoretical triangulation

This involves the borrowing of models from one discipline and using them to explain the situations encountered in another discipline.

• Data triangulation

It is defined as the research method where different people collect data on the same situation, and then the results are compared.

• Methodological triangulation

This category uses both quantitative as well as qualitative methods of data collection such as questionnaire, interviews, telephone survey and filed study.
Triangulation has its own share of problems. Yin (2003) observed that there may be problems in implementing triangulation methods in any research. First of all the issue is with the expenses wherein the collection of data from multiple sources can turn out to be more expensive than if it were collected from only a single source. Secondly, every investigator is required to know how to carry out the various data collection techniques. If by any mistake any of the research technique is used in an improper or inefficient manner, then an opportunity to address a broader spectrum of issues or to conduct various inquiries may be lost.

3.4 Sources of Information

Sources of information for a research project include journals, text books, magazines, government papers, etc. However, here the information sources have been categorised as primary sources, secondary sources and reference sources.

3.4.1 Primary sources

For this research project the primary sources of information have been the journals available online; online journals have been classified as a primary source because they contain the most up to date the information.

Other materials such as previous dissertations and thesis have been referred for this dissertation. Previously completed dissertation reports and thesis act as a guide to frame the research methodology and also supply a list of references which can be used by the researcher to begin his/her research.

Additionally publications which have been published by professionals and papers presented in conferences have also been used a source of information for this research project. Papers presented in conferences are being considered valid for this research as these represent the outlook of professionals in practice. Publications which are written and published by professionals with respect to the topic can prove to be quite useful for research work.

3.4.2 Secondary sources

Books and magazines which have been used for gathering information are considered to be a secondary source of information.

Books are an excellent resource for obtaining knowledge on concepts and definitions. However, the issue with books is that they take some time to get published so the information contained in them may not be up to date by the time it is published and is available to the researcher.

Articles published in magazines may be ambiguous in nature, even though they may be carrying recent development in terms of the topic of research. The word ambiguous is used because these articles can e confused and may not be referenced in the correct manner.

Internet has been also regarded as a secondary source for gathering information on the topic. Websites of professional societies contain information but this information may not be up to date with the latest developments. Although vast amount of information is available on the internet, yet there will always be doubts raised over the quality, reliability and validity of the data.

It thus becomes very important for the researcher to study the various materials available online and then use the most convincing and authentic, with proper references, as a source of data.

3.4.3 Reference sources

The encyclopaedias and dictionaries, published and those available online, have been used for referencing. Although they have been used at a number of instances during this research project, yet they have neither been categorised under primary sources nor under secondary sources. The kind of information which is available through these sources is quite basic for research purpose.

3.5 Data Collection

The data collection is an extremely important element of any research project and this section will be throwing light on some of the data collection techniques to be used for follow a line of investigation work for this research project.

Before discussing the data collection techniques which have been made use of, it is becomes important to recognise difference between the sources which have been classified as one-way communications and two-way communications.

The one-way communication system requires the receiving the data as it is supplied. It is the researcher's prerogative to either use the data or to discard it. The two-way communications system involves the receivers' as well as the providers' responses; thus requiring a constant exchange of information between the two. It includes the enrichment of the attained data through an active process.

After the formulation of the research problem, it becomes evident as to what kind of data will be needed to study the problem, what is available and manner of analysing it. This is further determined by the nature of what the researcher wants to explore and the specific characteristics of the problem (Walliman, 2006).

Once the type of data to be collected and the research approach has been decided upon, the next step is to finalise the techniques to be used for collecting data (Naoum, 2002).

Qualitative research is associated with two kinds of data collection techniques, namely: interviews and observations (which may also be recorded from the literature review).

Quantitative research on the other hand entails the use of the following techniques for data collection: surveys and experiments.

In this research project both the qualitative and quantitative research methodologies have been combined. To collect data I have employed the use of interviews and questionnaires (which are a form of surveys). The chosen methods of data collection are further elaborated.

3.5.1 Interviews

Interviews are considered to be a very powerful tool to gather the opinion of people. Also, asking questions is covered under both qualitative and quantitative methods of collecting data. In fact although interviews are regarded to be suitable for quantitative data collection, yet they are most useful when they are used for qualitative research (Walliman, 2006).

Tashakkori and Teddlie (1998) consider interviews as a more common method of collecting data in qualitative research than in quantitative research.
“No amount of sophisticated scale-building or statistical analysis can rescue a research project in which the conceptualization and instrumentation have been built on poorly conducted exploratory interviews” (Oppenheim, 2005, p65).

Nachmais and Nachmais (1996 quoted in Naoum, 2002, p56), “the questions, their wording and their sequence define the structure of the interview”. While in qualitative interviews the questions are non-descriptive and quite general; e.g. “Tell us about your workplace”; in the quantitative interviews, the questions tend to be more closed-ended and more structured; e.g. “Which of the following options will you choose to describe the quality of food in the university cafeteria: very good, good, bad, or very bad?”; (Tashakkori and Teddlie, 1998).

When information is not readily available for traditional quantitative research, the open-ended interviews are used for early research.

Interviews can further be grouped into 3 categories: unstructured interviews, structured interviews and semi-structured interviews (Naoum 2002).

• Unstructured interviews:

These kinds of interviews are ‘open-ended', are generally meant to be of a general level and are usually conducted with qualitative research (Naoum, 2002). These can be conducted at the beginning of the research as well. However, as Naoum clarifies, one needs to have a “clear research outline that you are familiar enough with” (2002, p56) to conduct this interview.

Walliman (2006, p 285) puts forth his opinion on unstructured interviews, “....if you need to explore a situation and wish to get information which you cannot predict, a very open and unstructured form of interview is appropriate”.

An unstructured interview concludes with a list of answers which are examined by the researcher for analysis.

• Structured interviews:

In a structured interview the questions presented to all the interviewees are the same. With the questions famed in a ‘closed-ended' format, these interviews resemble surveys. The structured interview allows the researcher to gain more in-depth information. The main advantage of a structured interview is that along with a relatively higher rate of response, the answers tend to be more accurate (Naoum, 2002).

• Semi-structured interviews:

These are more formal in comparison to unstructured interviews. Here, both ‘open-ended' and ‘close-ended' questions are used for conducting the interviews. The entire idea is to get as much information regarding the topic as possible (Naoum, 2002). The advantage of this type of interviews is that the interviewer is permitted a lot of freedom in asking questions and to raise specific questions (Naoum, 2002).

For this research purpose telephonic interviews were conducted to save time and expenditure. Lawyers from the United Kingdom and India were interviewed for research purpose.

“It has been estimated that face-to-face interviews spend only about one-third of their time in conducting interviews, the remainder of their time being taken up by travel and by locating respondents” (Oppenheim, 2005, p 97). However, there is a small disadvantage. Even though it is widely considered that data recorded during a telephonic interview prevents loss of data, actually some data may already have been lost as the response of the interviewee can also be judged through his facial expression which is unavailable in this case.

This disadvantage, however is not a huge problem and keeping this viewpoint in kind, it is regarded that telephonic interviews are the best option from the cost perspective, hence the choice. The interviewees who were interviewed for this research project were also equally comfortable while giving out interviews over the telephone and also agreed for the recording of interviews (to be referred to later t overrule any ambiguity).

3.5.2 Questionnaire

Questionnaires can be also be categorised under both qualitative research methods and quantitative research methods. Questionnaire, as a method of collecting data, is quite flexible and has to be used carefully so that the requirements of a specific topic of research are fulfilled (Walliman, 2006).

“A questionnaire is not some sort of official form, nor is it a set of questions which have been casually jotted down without much thought. We should think of the questionnaire as an important instrument of research, a tool for data collection. The questionnaire has a job to do: its function is measurement” (Oppenheim, 2005, p 100).

While describing what a questionnaire entails, Tashakkori and Teddlie (1998, p 95) say, “In a more commonly used approach, you might have predetermined response options for questions, followed by and “other” response option with a blank space. The respondents are encouraged to write additional comments or provide additional data by writing them in that space”.

Questionnaires have their own advantages. They do not have any geographical limitations and also prove to be economically viable. A questionnaire gives you an opportunity to arrange questions and collect questions without requiring to personally talking to the respondent (Walliman, 2006).

However, there are two major disadvantage with questionnaires. Some people just do not fill them up depsite repeated reminders. This can porve to be quite a hindrance.Another disadvantage is the problem of missed questions. Sometimes the reposndents do not fill in all the questions causing missed data. Ideally, everyone wants to collect data in compete form but we have to ensure that our statistical software package can cope with varying case numbers (Oppenheim, 2005).
Questionnaires can be delivered by two means: personally or through post (in the case of this research project the questionnaires have been sent for responses by emails).

While postal questionnaire has the advantage of a low cost of data collection and processing, it also has the disadvantage of encountering obstacles like illiteracy and lesser number of responses (Oppenheim, 2005).

Personal questionnaires prove to be an expensive option. The interview may not take as a much time as the amount of time and money spent in commuting (Oppenheim, 2005).

The questions used in a questionnaire can be open-ended and closed-ended. Majority of the postal questionnaires consist of closed-ended questions; such as questions which require a particular response, more like either ‘yes' or ‘no' kind or the ones which involve a ranking (Naoum, 2002).

Open-ended questions can prove to be quite difficult to analyse even though they provide the respondent with an opportunity to express their views on the subject (Naoum, 2002). On the other hand despite the fact that the respondents are given a set of responses to choose from in closed-ended questions, they prove to be easier to analyse.

Questions may be factual or opinion based, depending on the sort of information which they are designed to gather. Naoum (2002, p 88) differentiates between the two, “Factual questions are designed to obtain objective data while opinion questions are designed to elicit subjective information”. The most common formats for questions are scales, checklists, grids, ranking and rating.

It is vital for the researcher to ensure that the questions are not ambiguous. It is necessary that the researcher has enough information on the topic under research to formulate a set of responses for the respondent to choose from (Naoum, 2002).

For this research study postal questionnaires have been preferred over personal questionnaires. Personal questionnaires would have meant increased expenditure and the responses would not have been generated from geographically different locations. Postal questionnaires have been used because of their advantage of widely spaced geographical locations and also because they generated more number of responses. The questionnaire have not been posted but rather emailed.

The questionnaire was compiled on a website and the link was emailed to people with a background in architecture, construction, information and technology, and, law; this helped in gathering the opinion of people coming from various professional backgrounds.

The analysis and results obtained the questionnaire have been discussed in the next chapter.

3.6 Summary

The methodology that has been chosen for this research subject is a mixture of both qualitative and quantitative research methods. In other word it can be said that triangulation method has been followed to collect data for this research project. The techniques which have been chosen to collect the relevant information are namely: interviews and questionnaires.

Journals, papers presented at conferences, previous dissertations have been used as a primary source to collect information. Online publications include Information and Communications Technology Law, Systemic Practice and Action Research amongst several others.

Several texts books have been used, as a secondary source, to collect information and also used a guide to analyse the results. Law journals, law books, internet are considered to be secondary sources of information collection, and these have been referred to so as to take information which may or may not be the latest in the field of research but at the same time it is highly relevant.

As a summarisation of the research methodology, it is concluded that the method to collect and analyse the data and information for this research project comprises of a combination of both qualitative research and quantitative research methods. It would appropriate to say that triangulation approach is the chosen methodology for this particular research project.

4. ANALYSIS AND EVALUATION

A researcher's work is never almost completed by carrying out the collection of data. It is actually then that the humongous work of analysing the data collected begins.
For this research interviews and questionnaires were used to collect data. Obviously it involved speaking to and receiving the responses of many people. As the number of people increases, the task of analysis also becomes difficult.

A researcher has to ensure that analysis of the data gathered is carried out by following a proper and efficiently designed methodology.

This chapter will be discussing the methodologies employed to analyse the data, the results obtained by conducting interviews, and, the results compiled after receiving the responses for the questionnaire.

4.1 Methodology of Analysis and Evaluation

The methodology applied for the collection of data is interviews and questionnaires. Data collected from text books, online/e- journals, conference papers and other publications, has provided the research with a base. This base has utilised to carry the research forward by conducting interviews and posting questionnaires.

The responses received from the respondents who gave the interviews and filled the questionnaire, have been compared with the information already garnered on the subject under study.

One similarity that stood out was an observation made during the questionnaire and portrayal in the various publications and books. This similarity is the fact that most people are unaware regarding the various legal procedures, legal risks and the solutions that are associated with the conducting of business using information and communication technologies.

While interviews have been conducted with lawyers from the U.K. and India, the questionnaire has been filled in by people form varying backgrounds related to construction and the Information & Technology sector.

4.2 Results Obtained from Questionnaire
4.2.1 An introduction to the feedback received

To collect data from a larger section of people questionnaire have to be used. For this research study postal questionnaires have been preferred over personal questionnaires. In fact, the questionnaire was not posted but emailed to a number people with varying professional background, in both India and the United Kingdom. Out of the 500 emails that were sent to gather information through questionnaires, the researcher received only 61 responses from individuals of various professional backgrounds.

Questions asked were related to the markets in which their company operates in, the size of the firm, the background of the respondent. Respondents were questioned and assessed on their knowledge regarding the existence of legal procedures, the legal risks posed to their businesses when using information and communication technologies and their awareness regarding the laws on information and communication technologies in their countries (of residence & employment).
The end product of a questionnaire will be constituted by statistical analyses, tabulations and illustrative quotations from raw data. These will then be prepared in a report form which will showcase the effects of the findings on the already conducted research (Oppenheim, 2005).

4.2.2 Results interpreted from the data available

Responses were generated from respondents residing in countries like the United Kingdom, India, Egypt, China, Singapore and Nigeria and working in the same or other countries. Respondents' professions varied from information and communication technology, software development, town planning, interior designing, building materials manufacturing, architectural designing, building contracting to an advertising agency, electronics goods manufacturing.

4.2.3 Analysis of the data gathered

The 61 respondents who took out some time to respond to the questionnaire gave comments along with replying to the questions asked. The data collected through the questionnaire can be analysed as follows:-

• Although some people are aware of the legal problems that are a part and package of information and communication systems when used for business, yet there is a need to create greater awareness regarding the subject of study.
• 80% of the respondents agreed to the use of I&CT for day to day business in the country of their employment.
• More than 50% agree that their native countries are making a serious effort towards ensuring that e-business is a safe venture legally.
• Governments of nations the world over need to frame and regulates stricter laws.
• The legal problems associated with I&CT are in no way a reason for making the conduction of business though them any less popular.

Note:

The details of the questionnaire along with the responses have been provided in the Appendices section of this research project report.

4.3 Results Obtained from Interviews
4.3.1 An introduction to the feedback received

Practising lawyers and company secretaries from the United Kingdom and India have been interviewed for the collecting data for this research project. An effort was made to interview as many lawyers specialising in construction as possible. In this section the results obtained from the interviews shall be discussed.

In total four interviews were conducted. Out of these four interviews, one was with a lawyer from the United Kingdom and the rest were carried out with the lawyers from India.

One main advantage of having lawyers from both countries giving their input is that information regarding the legal status of using information and communication technologies for carrying out project based business, in both these countries was obtained.

4.3.2 A discussion of the responses of the interviewees.

The opinion and feedback provided by the lawyers, their interviews will be discussed individually to understand in detail the kind of feedback which has been received.

• Interviewee 1:

A principal solicitor, who works in a large construction company; with business expansions all over the world; in the United Kingdom and has been practising as a lawyer for the last 14 years, believes that the legal system of the U.K. is restrictive as compared to other jurisdictions. The company which need to carry out business in the United Kingdom, the United States of America, Middle-East & South-East Asia and Australia, makes optimum use of information and communication technologies.

These technologies are not only used for communication on the various projects spread half nearly the world but also for their businesses like designing air-conditioning units, architectural drawings, etc.

The interviewee shared his opinion on the inadequacy of the English law when the matters concern the information and communication technologies. He is of the view that the English law is restrictive in comparison to the other jurisdictions. Neither does the English law also does not deal with freeway nor with electronic design. Companies face tremendous difficulty with the copyright license and the extent to which it can be considered applicable. The interviewee was of the opinion that the American law is better equipped than the English law when it comes down to patents, as it permits the patenting of software which the law in the U.K. does not permit.

Although the company has not faced any legal problems concerning the use of I&CT for businesses, there are some issues which bother them nonetheless. For one, suppliers regularly upload the design details and specifications of their products on shared websites. Quite often there is a problem in understanding the information provided to them. A matter which keeps cropping up is associated with the intellectual property license. The company is frequently asked to provide a full license over all the intellectual property in the information and communications, which is not possible for the company because they do not have the rights to supply one. Their clients and associates cannot comprehend that the company is the only originator of all the intellectual property until a delivery of a service.

More often than not a problem is faced by the company when dealing with clients and associates in America and Australia in contrast to Asia. It has been experienced that the while the Australian law is very harsh in their terms and conditions which may not be enforceable, the Americans are over-protective about their terms and conditions. The Americans are reportedly ‘obsessed' with their limitations and liabilities to such an extent that these are not valid in the United Kingdom. The company ensures that an extra payment is paid in such cases. These payments make available the right insurance protection and ensure that liabilities are covered.

Using the I&CT for conducting business has made things easy and is efficiency driven. It helps the company in handling the projects in a larger scale (such as using video-conferencing). Emails provide a good picture of the requirements of the people as people actually say what they really want.

The company takes extensive measures to cover data protection. As much as is possible, when signing a contract the company puts a clause that in the case of a dispute the English law shall avail. The only exception here is with the Emirates. Since a majority of the projects undertaken are with the government in the UAE, the company has to obey the Emirates law.

Although the interviewee agreed that the emails prove to be good evidence in case of a dispute and that the digital signatures are also good concept to judge authenticity, yet he also said that sometimes they need to back-up the digital signatures with a telephone call whenever in doubt.

The benefits are there, but these are accompanied by certain drawbacks while using the I&CT. Loss of a human, more personal touch is felt by the company where verbal communication is only a mere 10%.

• Interviewee 2:

A company secretary in a medium based firm in India, with headquarters in Singapore, also emphasized that his company uses the I&CT for conducting day-to-day business and has never encountered any legal problems.

He was very appreciative of using the information and communication technologies as these make communicating easier, faster and well-organised, and does not feel that there any drawbacks or apprehensions connected to this mannerism of conducting business.

He underlined fact that although the Indian has some provision in its law for the utilization of I&CT for business purposes (like emails being considered as a legal evidence of exchange of information), yet there is scope for improvements to the legal system in India and its enforcement.

• Interviewee 3:

A retired lawyer from the high court of the state of Kerala in India is currently employed in private practice in Bangalore, Karnataka, India. Apart from dealing with cases from the construction industry regarding the subject under study, his company also makes use of the information and communication technologies. He stressed upon the fact that the legal scenario in India needs improvements, and also shared that the laws in India are being updated and modifications are being made to act ITA 2000.
Upon being questioned regarding the difference of jurisdictions as being one of the legal problems, he agreed that variations in jurisdictions lead to a lot of legal problems in international agreements. Due to these variations, sometimes the integrity of the companies and governments comes under the scanner as questions are raised regarding the accuracy of the data supplied. Since India is one of the commonwealth countries, the laws formulated for these countries are obeyed while extending business relations.

He himself faced a theft of money on a website, and is of the view that the security and confidentiality personal details of users be it individuals or companies, is a major problem when exchanged over the internet. Surprisingly, he felt that there is no means of verifying a digital signature.

Most of the cases are best solved as an out-of-court settlement. Majority of the cases with his firm are still in the complaint stage and he shared an example of a case (still in complaint stage) which his firm is handling. A construction company (A) has outsourced the construction of a shopping mall to a contracting company (B). Payment from A to B was made using internet banking. After some time when the engineer from A went to inspect the progress of the construction of the shopping mall, he found that the construction had been halted due to non payment by A to B. Apparently, funds were already transferred by A to B were relocated to some other account. A has filed for claim of damages from B.

The lawyer suggested that public should be made aware of the legalities involved with the conduct of business using the information communication technologies.

• Interviewee 4:

The last person interviewed is a lawyer practising with the Punjab and Haryana High Court, India apart from having his own legal firm in Chandigarh, India. He has till yet not directly dealt with legal cases related to construction but nevertheless he spoke about the legal risks involved with I&CT and business.

He said that though the legal framework of India is very strong yet the Indian legal system requires a new outlook and suggested some modifications. According to him, “a section should be introduced in Chapter XI of ITA 2000 to the following effect: (MN) whoever uses a computer or any associated device or an electronic document to create destabilization of the economy or any segment thereof, intimidate or coerce the government, the civilian population, or any segment thereof, or to create disharmony in the society, in furtherance of political, religious or social objectives or to harm the community injuriously by any means shall be liable for imprisonment up to 10 years or/and a fine of Rs 100 lakhs ( approximately £150000)”.

He informed that the Information Technology Act 2000 (ITA 2000) was enacted after the passing of the United Nation General Assembly Resolution A/RES/51/162, dated 30th January, 1997, by adopting the Model Law on Electronic Commerce, as adopted by the United Nations Commission on International Trade Law (UNICITRAL). This was the first step in India towards creating the law relating to e-commerce at an international level, to regulate an alternative form of commerce and to give legal status to the area of e-commerce. It was enacted taking into consideration UNICITRAL model of Law on e- commerce 1996.

Further, he suggested that a section may also be introduced in Chapter IX to the following effect: (PQ) whoever, in bad faith and with the intention to cause disrepute, harm to another person or cause disruption of any legitimate business or cause confusion in the minds of the public, registers a domain name shall be liable to pay damages to the person so affected an amount not exceeding Rs 10 lakhs (approximately £ 15000). He even suggested that for the purpose of this section, a person not being a resident of or a citizen of India should also be considered to be liable even if a computer system not located in India is used for the infringement.

4.3.3 Analysis of the results of the interviews carried out

Although the number of interviews discussed is less yet they highlight the facts which have been already stated in various books, journals and articles.
While analysing the results obtained from interviews, it was found that the problems inflicting the commercial construction scenario ranged from liabilities issues, the variations in jurisdictions, disputes over payment to copyright problems, and, licensing of intellectual property rights in information & communication technologies.
The results from the interviews are somewhat similar to each other & the variations in opinions are not wide. An outcome of these interviews is that a lot needs to be done to improve the scenario and simply inventing new technologies is not the only solution. The laws in countries have to be revised and improvised to make a place for dealing with the legal issues of information and communication technologies, which plague and hinder the prospects of project based businesses.

5. DISCUSSION

This chapter is focussed on discussing the results obtained from the interviews and the questionnaires and their implications on the future work in relevance to this field of study & research.

It has been noted that the results which were drawn from the interviews and the questionnaire confirm some of the findings as established by previous research works. The results which have been deduced from the questionnaire and the interviews have been discussed in detail in Chapter 4.

One of the objectives of this study was to compare the legal scenario in the United Kingdom and India The legal system in India may differ from the legal system implemented in the United Kingdom in its content, enforcement and stringency level. However, as much as the Indian law needs amendments and improvements to deal with the ever developing technologies and their impact, the English law also needs to cater more for the developments which have cropped up with the advancement in the dependency level on information & communication technologies into businesses. There is much scope for amendments and improvisation of the law in India and the law in the United Kingdom.

Results of the research confirm that there is an underlined need to create awareness amongst the community. Although the construction companies are aware of the use of digital signatures or the validity of emails as a proof in the court of law or maybe while engaging in e-contracts, there still is some kind of scepticism amongst them while doing so.

It is important to note here that information has been acquired from individuals of varying professional backgrounds. Feedback was received from lawyers, architects, contractors, IT professionals, business managers and IT managers.

While the legal risks associated with them do not make running business using information and communication technologies an unpopular choice, yet a need has been felt to garner awareness regarding the legal problems which may develop.

Interviews results revealed the concern for the security of private information of an individual or a company when this information is exchanged electronically. Businesses must advance quickly to realise and accept the obligations to respect privacy (Johnston et al, 1997). Corporate houses and individuals (in the construction industry) must begin to see privacy protection as an integral and necessary part of doing business, in the same manner as environmental protection was seen as integral to its concerns (Johnston et al, 1997).

A point worthy of being mentioned in this discussion is the agreement over the problem of diverse jurisdictions. Most companies are wary of holding business relations with a country whose jurisdiction is extremely rigid (as is the case with the Australian law).

The results of this research have highlighted the existing legal problems. After the conclusion of this study, a better understanding of what is in store when business is carried out by means of information and communication technologies has been achieved.

6. CONCLUSIONS AND RECOMMENDATIONS & FUTURE WORK
6.1 Introduction

This chapter will be focussed on the conclusions drawn after investigating into the research of the project. This chapter will also deliberate on the outcome of the aim and objectives that were set out at the start of the research project. The conclusions are a summarisation of the research work conducted.

6.2 Conclusions

The existing literature and research works available on the subject under study were explored in detail with an outlook to have a better understanding of the legalities associated with the advent of, and an extremely popular use of, the information and communication technologies for carrying out project based businesses. In the process of investigation of the various aspects of this study, while carrying out the interviews and receiving the feedback for the questionnaires, the researcher developed an improved perspective on the subject under study. The conclusions that were drawn from the literature review were ably supported by the results of the questionnaire and interviews.

After comparing the available literature and the analysed results of the collected data it was concluded that the legal issues associated with the usage of I&CT for business purposes ranged from flaws in e-contracts, use of digital & e-signatures and their drawbacks, jurisdiction problems to concerns over copyrights & patenting, and, the scope of license for the intellectual property in information and communication technology.

It was concluded from the feedback of the questionnaire and interviews that professionals from the construction and legal background backed the development of new technologies to deal with the flaws of the existing ones ably supported by an efficient and tougher legal system.

Analysis of the interviews' results concluded that there is a great concern for privacy of the company and individual when exchanging information electronically for business purposes.

A comparison of the legal stance of India and the United Kingdom with respect to the subject of the research subject yielded a unified response and analysis. As a conclusion of this comparison, it was discovered that while professionals in both the countries considered the English law to be stricter than its Indian counterpart, a fresh outlook on the legal systems of the two countries is required wherein the law of both the countries needs an upgradation.

Also, the study revealed that the law in the United States of America and Australia is considered strict and rigid in comparison to both the United Kingdom and India. It was therefore concluded that the law in the United Kingdom and India must make way for amendments and improvisation in terms of formulation and implementation.
Regarding privacy intrusions and insecurities it is concluded that businesses should begin to recognise that employers and customers are the owners of their personal information, and, therefore need to be consulted when policies are being developed which can have an impact on their privacy.

An important conclusion of this study is the hurdles faced during the progress of the study, the most prominent being the unwillingness of the lawyers and IT managers in the United Kingdom to participate in the research. The researcher faced a hard task in convincing them to be a part of this study, which yielded in their responses to the online questionnaire. This has resulted in the researcher basing the findings of the report on literature available in books, journals and the internet.

On the other hand the professionals in India were more forthcoming with their views. They supported and appreciated the need of the hour to undertake this study. Suggestions to include amendments were provided, where the lawyers suggested the kind of amendment which should be made.

From the above two statements it is concluded that while undertaking research on this topic in the future, all possible problems to be encountered must be taken into account and a suitable risk mitigation strategy must be formed and followed.

To sum up, the analyses of the research methodologies concluded that improving the technologies to combat the problems of the existing ones is not sufficient. These evolving technologies have a requirement of being supported by carefully framed and strictly implemented legal framework.

6.3 Recommendations

This section addresses the recommendations to be made for future work which may be undertaken to gain a further insight into the topic.

It is advisable for construction professionals to think about the impact of a vague design scope. An inappropriately defined scope of the project will not only cause the waste of time and money of the researcher but also of those who will be associated with it during the course of the research.

A clearly defined scope has to be backed up by well -researched literature. Suitable research methodology should be worked out and followed for achieving the necessary results.

Well-researched literature and a worked methodology will prepare a strong base for the research findings and aid the researcher in drawing analyses and to arrive at suitable conclusions.

It is recommended to expand the horizon of investigation and not to confine to any limitations. As was realised during the research for this project, to limit the investigation to only the United Kingdom could have proved to be a foolish decision. The lawyers and other professionals from the United Kingdom were uncooperative towards giving their input for this research work. The decision to take the opinion of the professionals from India not only gave the study a wider perspective but also the researcher was able to gather information at an international level.

In simpler words, it is necessary for the researcher to gauge the risks which might be encountered during the course of the research work, and to prepare an appropriate risk mitigation strategy.

6.4 Future Work

As a result of the research, the analyses and the conclusions of this research project, it was deduced that there still is a need for further research in the subject which can be undertaken in the future.

Upon detailed study of textbooks, journals and articles available it was realised that although there is a lot of literature available in the library on the mentioned subject, yet a lot of this material is either outdated or it is irrelevant in context to the evolving technologies. Therefore, it needs to be replaced by modern works and research.

Information and technologies is a constantly evolving and growing field. The construction industry has to match pace with the latest developments, which no doubt are being evolved constantly. In this process of matching steps with a continuous technological development, however, we all have forgotten the kind of risks, especially legal, which might be incurred. Much needs to done, found and said about this matter.

Awareness on this subject needs to be generated among professionals and the public alike. Countries the world over need to frame stricter laws to back up the ever developing technologies, the pace may not match with the advancements but it is a highly necessary step nevertheless. Developers need to realise that evolving new technologies to combat the previous ones (which have been hacked by hackers), is also in a way challenging the hackers to try something new. To control these hackers and bring them to justice new laws also need to be brought into implementation.

Since the information and technologies are as much a part of our life as is education, health, food and business, it becomes an urgency that legal steps are taken to safeguard against those elements which threaten prosperity and development. Any kind of work in the future on the subject under study will be a step that we shall be taking towards ensuring the security of privacy and safeguarding the e-construction environment.

 

Did you like this example?

Cite this page

Legal Issues and Construction Industry. (2017, Jun 26). Retrieved December 13, 2024 , from
https://studydriver.com/legal-issues-and-construction-industry/

Save time with Studydriver!

Get in touch with our top writers for a non-plagiarized essays written to satisfy your needs

Get custom essay

Stuck on ideas? Struggling with a concept?

A professional writer will make a clear, mistake-free paper for you!

Get help with your assignment
Leave your email and we will send a sample to you.
Stop wasting your time searching for samples!
You can find a skilled professional who can write any paper for you.
Get unique paper

Hi!
I'm Amy :)

I can help you save hours on your homework. Let's start by finding a writer.

Find Writer