SlideShare a Scribd company logo
Duty of Care Online



                                        White Paper

                                  bwired Group Pty Ltd

                       348 High St Prahran, Victoria 3181
                                         T 03 9510 5255
                                         F 03 9510 5266

                                         bwired.com.au
Experience. Capability. Technology
White Paper                 Open Source vs. Closed Source (Proprietary) Software




Table of Contents
Statement                                                               03

Introduction                                                            04

Privacy                                                                 05

Legally Binding T’s & C’s                                               06




                                                                             2
White Paper                     Open Source vs. Closed Source (Proprietary) Software




“You owe yourself and your
customers a duty of care online
and therefore must protect your
organisation with an adequate
privacy policy and legally
binding terms and conditions”.

Sam Saltis – CEO Bwired Group




                                                                                3
White Paper                                         Open Source vs. Closed Source (Proprietary) Software




Introduction
Essential reading for any online business; this whitepaper offers helpful hints for establishing
comprehensive duty of care procedures.

When setting up an online business, it is important to consider the legal aspects required. Most
importantly:

    •    An adequate privacy policy

    •    Legally binding terms and conditions




                                                                                                    4
White Paper                                    Open Source vs. Closed Source (Proprietary) Software




1
Privacy


Privacy is a common concern among many online. Any website through which users
engage, interact or transact have a responsibility to adopt and implement a
comprehensive privacy policy.

A privacy policy must include:


    •   Choice and consent - individuals must be given the opportunity to exercise
        choice regarding collection, use and distribution of personal information


    •   What personal information is being collected - Collection and transactions
        should always be done in a secured (https) environment, and the database
        protected by adequate technology.


    •   Use of personal information – The purposes for which you are collecting
        personal information.


    •   Disclosure of personal information – Whether or not you will be disclosing
        collected information with third parties.


    •   Storage and security of personal information - Making your customers aware
        of the security of your website will always offer added reassurance. Signage such
        as "you have now entered a secure area" is encouraged.


    •   In addition, the policy must be easy to find, read and understand; and be made
        available prior to or at the time that personal information is collected or
        requested. We recommend establishing a respective page on your website,
        linking to it from every page and abiding by it.



For more information on guidelines for online privacy policies, visit
www.privacyalliance.org.au.




                                                                                               5
White Paper                                    Open Source vs. Closed Source (Proprietary) Software




2
Legally Binding T’s & C’s


In the context of website usage, the potentially million dollar question is “are your terms
and conditions enforceable?”.

Not sure? Read on.

For protection from legal action, all online businesses must incorporate a website
disclaimer.

A website disclaimer should protect both the organisation and the consumer and should
include reference to:

    •   Accuracy of information – waive liability for accuracy, timeliness, suitability


    •   Risk and responsibility – waive liability for responsibility to ensure
        information/products/services meet specific requirements.


    •   Copyright infringements – prohibition of reproduction of content, design,
        graphics, layout and appearance


    •   Unauthorised use – may result in damages and/or criminal action, subject to the
        Australian court of law

Again, we recommend establishing a respective page on your website, linking to it from
every page and abiding by it.

In the context of online transactions, terms and conditions must be clearly visible prior to
or at the same time that the transaction takes place. It is not enough to have these terms
and conditions listed – this does not qualify as acceptance and will not be enforced. The
user must agree to comply with the terms and conditions before a legal agreement is
formed. To do so, organisations must create either a “click-wrap system”, or a “browse-
wrap system”.

A “click-wrap system” requires the user to scroll through the terms and conditions before
accepting them.

A “browse-wrap system” refers the user to the terms and conditions by way of a hyperlink,
but does not require the user to click on the link before accepting.

Regardless of the system chosen, to maximise the ability to enforce terms and conditions,
it is recommended that they be:

    •   Clearly visible, easily read and accessed

    •   Printable

    •   Accepted before use of the website or performance of the relevant act

    •   Explicit



                                                                                               6
White Paper                                   Open Source vs. Closed Source (Proprietary) Software




For more information on guidelines for terms and conditions, visit
http://www.nortonrose.com




                                                                                              7

More Related Content

What's hot

GDPR - 5 Months On!
GDPR - 5 Months On!GDPR - 5 Months On!
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
guestd7fc9c
 

What's hot (20)

Knowing Me, Knowing You - Managing & Using Contact Information
Knowing Me, Knowing You - Managing & Using Contact Information Knowing Me, Knowing You - Managing & Using Contact Information
Knowing Me, Knowing You - Managing & Using Contact Information
 
Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)
 
Privacy by design for peerlyst meetup
Privacy by design for peerlyst meetupPrivacy by design for peerlyst meetup
Privacy by design for peerlyst meetup
 
Blockchain - Hype or Reality
Blockchain - Hype or RealityBlockchain - Hype or Reality
Blockchain - Hype or Reality
 
Email and cloud ethics (continuing legal education course)
Email and cloud ethics (continuing legal education course)Email and cloud ethics (continuing legal education course)
Email and cloud ethics (continuing legal education course)
 
Data Protection Forum meetup 23052017
Data Protection Forum meetup   23052017 Data Protection Forum meetup   23052017
Data Protection Forum meetup 23052017
 
Blockchain Overview
Blockchain OverviewBlockchain Overview
Blockchain Overview
 
Privacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSPrivacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMS
 
S719a
S719aS719a
S719a
 
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
 
What does GDPR mean for your charity?
What does GDPR mean for your charity?What does GDPR mean for your charity?
What does GDPR mean for your charity?
 
Cloud Computing Legal Issues
Cloud Computing Legal IssuesCloud Computing Legal Issues
Cloud Computing Legal Issues
 
GDPR - 5 Months On!
GDPR - 5 Months On!GDPR - 5 Months On!
GDPR - 5 Months On!
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
 
Privacy Preserved Data Augmentation using Enterprise Data Fabric
Privacy Preserved Data Augmentation using Enterprise Data FabricPrivacy Preserved Data Augmentation using Enterprise Data Fabric
Privacy Preserved Data Augmentation using Enterprise Data Fabric
 
No byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettleNo byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettle
 
Cloud
CloudCloud
Cloud
 
GDPR The New Data Protection Law coming into effect May 2018. What does it me...
GDPR The New Data Protection Law coming into effect May 2018. What does it me...GDPR The New Data Protection Law coming into effect May 2018. What does it me...
GDPR The New Data Protection Law coming into effect May 2018. What does it me...
 
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
 
Convince your board - Ten steps to GDPR compliance
Convince your board  - Ten steps to GDPR complianceConvince your board  - Ten steps to GDPR compliance
Convince your board - Ten steps to GDPR compliance
 

Viewers also liked

Avail duty of_care
Avail duty of_careAvail duty of_care
Avail duty of_care
managemycars
 
O H& S Presentation
O H& S  PresentationO H& S  Presentation
O H& S Presentation
alicanc
 
Aw101 occupational safety and health
Aw101 occupational safety and healthAw101 occupational safety and health
Aw101 occupational safety and health
Mohamad_Nizam_Zafael
 
Introduction to occupational safety and health
Introduction to occupational safety and healthIntroduction to occupational safety and health
Introduction to occupational safety and health
Politeknik Kuching Sarawak
 
Introduction To Osha
Introduction To OshaIntroduction To Osha
Introduction To Osha
guest8a4b501
 
Occupational Safety and Health Act (OSHA)
Occupational Safety and Health Act (OSHA)Occupational Safety and Health Act (OSHA)
Occupational Safety and Health Act (OSHA)
Chuckle Chubb
 
Negligence duty of care
Negligence   duty of careNegligence   duty of care
Negligence duty of care
Kulshoom
 
Occupational Health & Safety
Occupational Health & SafetyOccupational Health & Safety
Occupational Health & Safety
DebbieGould
 

Viewers also liked (15)

Avail duty of_care
Avail duty of_careAvail duty of_care
Avail duty of_care
 
O H& S Presentation
O H& S  PresentationO H& S  Presentation
O H& S Presentation
 
Top 10 Duty of Care Practices
Top 10  Duty of Care PracticesTop 10  Duty of Care Practices
Top 10 Duty of Care Practices
 
DUW chapter 1. ppt
DUW chapter 1. pptDUW chapter 1. ppt
DUW chapter 1. ppt
 
Aw101 occupational safety and health
Aw101 occupational safety and healthAw101 occupational safety and health
Aw101 occupational safety and health
 
Chapter 02- OSHA Legition
Chapter 02- OSHA LegitionChapter 02- OSHA Legition
Chapter 02- OSHA Legition
 
Chapter 2 osha legislation
Chapter 2 osha legislationChapter 2 osha legislation
Chapter 2 osha legislation
 
Introduction to occupational safety and health
Introduction to occupational safety and healthIntroduction to occupational safety and health
Introduction to occupational safety and health
 
Introduction To Osha
Introduction To OshaIntroduction To Osha
Introduction To Osha
 
Occupatinal health hazards
Occupatinal health hazardsOccupatinal health hazards
Occupatinal health hazards
 
Chapter 01 -Introduction of OSHA
Chapter 01 -Introduction of OSHAChapter 01 -Introduction of OSHA
Chapter 01 -Introduction of OSHA
 
Occupational Safety and Health Act (OSHA)
Occupational Safety and Health Act (OSHA)Occupational Safety and Health Act (OSHA)
Occupational Safety and Health Act (OSHA)
 
Negligence duty of care
Negligence   duty of careNegligence   duty of care
Negligence duty of care
 
Occupational Health & Safety
Occupational Health & SafetyOccupational Health & Safety
Occupational Health & Safety
 
Occupational Health & Safety Presentation
Occupational Health & Safety PresentationOccupational Health & Safety Presentation
Occupational Health & Safety Presentation
 

Similar to Duty of Care Online

2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
Meg Weber
 
Contracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy BortzContracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy Bortz
itnewsafrica
 
Gain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless WorldGain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless World
Qualys
 
Top 6 provisions you should know to prevent outsourcing pitfalls
Top 6 provisions you should know to prevent outsourcing pitfallsTop 6 provisions you should know to prevent outsourcing pitfalls
Top 6 provisions you should know to prevent outsourcing pitfalls
Mani Soft International
 
Digital fundraising the legal bits - Augustus Della-Porta - Bates, Wells and ...
Digital fundraising the legal bits - Augustus Della-Porta - Bates, Wells and ...Digital fundraising the legal bits - Augustus Della-Porta - Bates, Wells and ...
Digital fundraising the legal bits - Augustus Della-Porta - Bates, Wells and ...
iof_events
 

Similar to Duty of Care Online (20)

2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
10 questions to ask your cloud provider
10 questions to ask your cloud provider10 questions to ask your cloud provider
10 questions to ask your cloud provider
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Program
 
Contracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy BortzContracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy Bortz
 
Cookies and Data Protection - a Practitioner's perspective
Cookies and Data Protection - a Practitioner's perspectiveCookies and Data Protection - a Practitioner's perspective
Cookies and Data Protection - a Practitioner's perspective
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
 
Privacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User DataPrivacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User Data
 
Cloud Computing Legal for Pennsylvania Bar Association
Cloud Computing Legal for Pennsylvania Bar AssociationCloud Computing Legal for Pennsylvania Bar Association
Cloud Computing Legal for Pennsylvania Bar Association
 
Fundraising On The Internet
Fundraising On The InternetFundraising On The Internet
Fundraising On The Internet
 
Data Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & AcquisitionsData Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & Acquisitions
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
 
Creating Trust for the Internet of Things
Creating Trust for the Internet of ThingsCreating Trust for the Internet of Things
Creating Trust for the Internet of Things
 
Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10) Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10)
 
Gain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless WorldGain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless World
 
Global Data Privacy Regulation
Global Data Privacy RegulationGlobal Data Privacy Regulation
Global Data Privacy Regulation
 
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFETECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
 
Top 6 provisions you should know to prevent outsourcing pitfalls
Top 6 provisions you should know to prevent outsourcing pitfallsTop 6 provisions you should know to prevent outsourcing pitfalls
Top 6 provisions you should know to prevent outsourcing pitfalls
 
Digital fundraising the legal bits - Augustus Della-Porta - Bates, Wells and ...
Digital fundraising the legal bits - Augustus Della-Porta - Bates, Wells and ...Digital fundraising the legal bits - Augustus Della-Porta - Bates, Wells and ...
Digital fundraising the legal bits - Augustus Della-Porta - Bates, Wells and ...
 
(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice
 
How Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceHow Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR compliance
 

Recently uploaded

FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 
PETAVIT SIP-01.pdfAAAAAAAAAAAAAAAAAAAAAAAAAAA
PETAVIT SIP-01.pdfAAAAAAAAAAAAAAAAAAAAAAAAAAAPETAVIT SIP-01.pdfAAAAAAAAAAAAAAAAAAAAAAAAAAA
PETAVIT SIP-01.pdfAAAAAAAAAAAAAAAAAAAAAAAAAAA
lawrenceads01
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 

Recently uploaded (20)

Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed Guide
 
Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdf
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 
Team-Spandex-Northern University-CS1035.
Team-Spandex-Northern University-CS1035.Team-Spandex-Northern University-CS1035.
Team-Spandex-Northern University-CS1035.
 
Lookback Analysis
Lookback AnalysisLookback Analysis
Lookback Analysis
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 
PETAVIT SIP-01.pdfAAAAAAAAAAAAAAAAAAAAAAAAAAA
PETAVIT SIP-01.pdfAAAAAAAAAAAAAAAAAAAAAAAAAAAPETAVIT SIP-01.pdfAAAAAAAAAAAAAAAAAAAAAAAAAAA
PETAVIT SIP-01.pdfAAAAAAAAAAAAAAAAAAAAAAAAAAA
 
Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...
Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...
Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...
 
University of Connecticut Fees, Courses, Acceptance Rate, Admission deadline,...
University of Connecticut Fees, Courses, Acceptance Rate, Admission deadline,...University of Connecticut Fees, Courses, Acceptance Rate, Admission deadline,...
University of Connecticut Fees, Courses, Acceptance Rate, Admission deadline,...
 
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
 
12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdf
12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdf12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdf
12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdf
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
 
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdfDigital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
 
Using Generative AI for Content Marketing
Using Generative AI for Content MarketingUsing Generative AI for Content Marketing
Using Generative AI for Content Marketing
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
 

Duty of Care Online

  • 1. Duty of Care Online White Paper bwired Group Pty Ltd 348 High St Prahran, Victoria 3181 T 03 9510 5255 F 03 9510 5266 bwired.com.au Experience. Capability. Technology
  • 2. White Paper Open Source vs. Closed Source (Proprietary) Software Table of Contents Statement 03 Introduction 04 Privacy 05 Legally Binding T’s & C’s 06 2
  • 3. White Paper Open Source vs. Closed Source (Proprietary) Software “You owe yourself and your customers a duty of care online and therefore must protect your organisation with an adequate privacy policy and legally binding terms and conditions”. Sam Saltis – CEO Bwired Group 3
  • 4. White Paper Open Source vs. Closed Source (Proprietary) Software Introduction Essential reading for any online business; this whitepaper offers helpful hints for establishing comprehensive duty of care procedures. When setting up an online business, it is important to consider the legal aspects required. Most importantly: • An adequate privacy policy • Legally binding terms and conditions 4
  • 5. White Paper Open Source vs. Closed Source (Proprietary) Software 1 Privacy Privacy is a common concern among many online. Any website through which users engage, interact or transact have a responsibility to adopt and implement a comprehensive privacy policy. A privacy policy must include: • Choice and consent - individuals must be given the opportunity to exercise choice regarding collection, use and distribution of personal information • What personal information is being collected - Collection and transactions should always be done in a secured (https) environment, and the database protected by adequate technology. • Use of personal information – The purposes for which you are collecting personal information. • Disclosure of personal information – Whether or not you will be disclosing collected information with third parties. • Storage and security of personal information - Making your customers aware of the security of your website will always offer added reassurance. Signage such as "you have now entered a secure area" is encouraged. • In addition, the policy must be easy to find, read and understand; and be made available prior to or at the time that personal information is collected or requested. We recommend establishing a respective page on your website, linking to it from every page and abiding by it. For more information on guidelines for online privacy policies, visit www.privacyalliance.org.au. 5
  • 6. White Paper Open Source vs. Closed Source (Proprietary) Software 2 Legally Binding T’s & C’s In the context of website usage, the potentially million dollar question is “are your terms and conditions enforceable?”. Not sure? Read on. For protection from legal action, all online businesses must incorporate a website disclaimer. A website disclaimer should protect both the organisation and the consumer and should include reference to: • Accuracy of information – waive liability for accuracy, timeliness, suitability • Risk and responsibility – waive liability for responsibility to ensure information/products/services meet specific requirements. • Copyright infringements – prohibition of reproduction of content, design, graphics, layout and appearance • Unauthorised use – may result in damages and/or criminal action, subject to the Australian court of law Again, we recommend establishing a respective page on your website, linking to it from every page and abiding by it. In the context of online transactions, terms and conditions must be clearly visible prior to or at the same time that the transaction takes place. It is not enough to have these terms and conditions listed – this does not qualify as acceptance and will not be enforced. The user must agree to comply with the terms and conditions before a legal agreement is formed. To do so, organisations must create either a “click-wrap system”, or a “browse- wrap system”. A “click-wrap system” requires the user to scroll through the terms and conditions before accepting them. A “browse-wrap system” refers the user to the terms and conditions by way of a hyperlink, but does not require the user to click on the link before accepting. Regardless of the system chosen, to maximise the ability to enforce terms and conditions, it is recommended that they be: • Clearly visible, easily read and accessed • Printable • Accepted before use of the website or performance of the relevant act • Explicit 6
  • 7. White Paper Open Source vs. Closed Source (Proprietary) Software For more information on guidelines for terms and conditions, visit http://www.nortonrose.com 7