当前位置:首页 > 外文
INFORMATION TECHNOLOGY AND ARBITRATION A PRACTITIONER'S GUIDE
INFORMATION TECHNOLOGY AND ARBITRATION A PRACTITIONER'S GUIDE

INFORMATION TECHNOLOGY AND ARBITRATION A PRACTITIONER'S GUIDEPDF电子书下载

外文

  • 电子书积分:10 积分如何计算积分?
  • 作 者:THOMAS SCHULTZ
  • 出 版 社:KLUWER LAW INTERNATIONAL
  • 出版年份:2006
  • ISBN:9041125159
  • 页数:241 页
图书介绍:
《INFORMATION TECHNOLOGY AND ARBITRATION A PRACTITIONER'S GUIDE》目录
标签:

Introduction 1

Chapter 1: Setting the stage 5

Ⅰ. Developments of IT in dispute resolution 6

Ⅱ. Why IT? 11

A. Benefits of IT usage 12

1. Efficiency 12

2. Effectiveness 14

3. Convenience 15

B. Functions of IT for arbitration 16

Ⅲ. When to use IT? 18

Ⅳ. How to use IT? 21

A. Creeping featurism: the more IT, the better? 21

B. Lack of experience: IT as a trump card? 22

Ⅴ. Fundamental communication technologies 23

A. Discussion lists 23

B. Chats 24

C. Bulletin boards 24

D. Designated community websites 25

E. Wikis 25

Chapter 2: Information technologies for arbitration 27

Ⅰ. Case management websites 29

A. What is a case management website? 30

B. Uses and advantages 31

C. Caveats 33

Ⅱ. Videoconferencing 34

A. Videoconferencing technologies 35

1. The evolution ofcodecs 35

2. Dedicated videoconferencing 36

3. IP videoconferencing 37

B. The Geneva experiment 38

1. General description 39

2. Scenario 39

a. Background 40

b. Script 41

3. The technology 44

a. Features 44

b. Security 45

c. Screenshots 45

d. Technical requirements 46

4. Results of the experiment 47

a. Usefulness 48

b. Realism 48

c. Technical secretary of the tribunal 49

d. Document presentation and application sharing 50

C. Uses and advantages 50

1. Assessing videoconferencing 51

a. Videoconferencing v. telephone conferencing 51

b. Videoconferencing v. in-person meetings 52

c. Videoconferencing v. e-mail or letter exchanges 56

2. Situations of use 56

D. Caveats 59

1. Technological insufficiencies and limitations 60

a. Technical breakdowns 60

b. Image quality 61

c. Camera view 62

2. Security, privacy, and confidentiality 62

3. Legal issues 63

Ⅲ. Other uses of technology 64

A. Live notes 64

B. Online dispute resolution platforms as a standalone solution 66

Ⅳ. Technologies of the future? 3D Shared virtual workspaces 68

A. What is a 3D shared virtual workplace? 69

B. Uses and advantages 70

1. Situations 70

2. Example - scenario 70

3. Enhanced virtualization: sharing visual information 72

Chapter 3: Current practice at arbitration institutions 75

Ⅰ. State of practice 75

A. AAA - WebFile 76

B. WIPO - ECAF 85

1. General IT facilities at WIPO 85

2. America's Cup arbitration and domain names dispute resolution 92

C. 1CC -NetCase 93

Ⅱ. Guidelines of the International Chamber of Commerce 97

A. Report on Special IT Requirements in International Arbitration 98

B. Guidelines on 'Using Technology to Resolve Business Disputes' 100

1. General procedures 100

2. Paperless files 101

3. Electronic communications 102

a. Written communications 103

b. Case management websites 103

c. Audioconferences 104

d. Videoconferences 105

Chapter 4: Legal framework 107

Ⅰ. Due process issues 108

A. The right to be heard 108

1. A reasonable opportunity to present the case 108

a. Real opportunities to present the case 108

b. Sufficient opportunities to present the case 110

2. Oral hearings 111

B. Adversary proceedings 114

C. Equal treatment 116

D. Judicial review of arbitral awards rendered after proceedings making use of IT 118

E. Enforcement of awards 119

1. Article Ⅴ(1)(b) of the New York Convention 119

2. Article Ⅴ(1)(d) of the New York Convention 120

3. Article Ⅴ(2)(b) of the New York Convention 121

Ⅱ. Confidentiality issues 122

A. Confidentiality by virtue of law 124

B. Confidentiality by virtue of the parties' agreement 125

B. Who is bound by the duty of confidentiality? 126

C. What information is confidential? 127

Chapter 5: Practice guidelines 131

Ⅰ. Frequent concerns and responses 131

A. Security 132

1. Interception 133

a. E-mail interception 133

b. Web-based transmissions interception 137

2. Intrusion 139

a. Authentication 139

b. Accounting 141

3. Infection 142

a. Viruses 142

b. Trojan horses 144

B. Breakdowns 145

C. Authentication 148

1. The issue 149

2. Solutions 149

D. Working habits 151

Ⅱ. E-mailing 153

A. Sending e-mail 153

B. Receiving e-mail 155

C. Keeping track of hidden information: metadata 156

D. Encrypting and digitally signing e-mail 158

1. Private and confidential e-mails: encryption 159

2. Identifying the sender and verifying the authenticity of the text: digital signatures 160

3. Trusting digital signatures and key rings in general: linking ciphers to people 161

4. In practice: setting up encrypted and digitally-signed e-mail 163

a. E-mail clients 163

b. Webmails 165

Ⅲ. Videoconferencing 168

A. To videoconference or not to videoconference 168

B. Setting up a videoconferencing session 170

C. Examples of videoconferencing software 173

1. ClickToMeet 173

2. Macromedia Breeze 174

3. Megameeting 175

4. iVisit 176

5. Earthlink videoconferencing software 178

6. Festoon 178

7. Windows NetMeeting 180

Ⅳ. Defining a communications protocol 181

A. The use of IT: who decides, when and how? 182

B. Submissions (briefs, memorials, applications) and documentary evidence 183

C. Other communications 184

D. Hearings 184

E. Deliberations between arbitrators 184

F. Form and notification of the award 185

Chapter 6: Drafting suggestions 187

Ⅰ. Arbitration agreements 187

A. In general 187

B. Pre-dispute arbitration agreement 188

B. Post-dispute arbitration agreement 188

Ⅱ. Procedural order 189

A. Comments 189

B. Sample procedural order 190

Ⅲ. Initiation form 198

A. Comments 198

B. Sample initiation form 200

Ⅳ. Incident form 206

A. Comments 206

B. Sample incident form 208

Chapter 7: Checklists, reminders, and charts 211

Ⅰ. Main tasks 211

Ⅱ. E-mailing 213

Ⅲ. Videoconferencing 214

A. General reminders 214

B. Videoconference or in-person meeting? 214

C. Preparing a videoconference 215

Ⅳ. Charts for IT usage 217

A. Practical aspects 217

1. Advantages of technologies 217

2. General technical measures 218

3. Videoconferencing 218

B. Legal aspects 220

1. Due process at risk 220

2. Oral hearings 220

3. Confidentiality 221

Bibliography 223

List of figures 233

Index 235

About the Author 241

返回顶部