Proceedings of the 38th Hawaii International Conference on System Sciences - 2005 Legal Issues in Agents for Electronic Contracting+ Irene Kafeza1, Eleanna Kafeza2, Dickson K.W. Chiu3, Senior Member, IEEE, 1 Faculty of Law, University of Hong Kong Department of Marketing and Communications, Athens University of Economics and Business 3 Dickson Computer Systems, 7A Victory Avenue, 4th floor, Homantin, Kowloon, Hong Kong 2 email: [email protected], [email protected], [email protected] Abstract Intelligent agents are a new emerging technology that allows for machine-to-machine contract formation. Agents equipped with a set of rules instructed by humans, surf the web, discover other agents and/or humans, and take decisions forming agreements in an autonomous way. Despite recent legislations on electronic contracting, there are no legislations governing automatic agent transactions except one preliminary attempt in the USA. In this paper, we are looking into the new legal issues that arise due to intelligent agents in automatic contracting. There are few scattered opinions in the literature and are inadequate to address these issues. So, we present a legal framework to analyze these novel issues and show why even recent legislations cannot adequately address this problem. We identify many of these issues which are rooted at the authorization management in agent delegation. Therefore, we advocate solutions that consider both legal and technical aspects. Based on current legal and business practices, we develop a conceptual model for agent authorization. We propose the use of a Contract Agent Authorization Platform (CAAP) that also supports alerts and acknowledgments, and illustrate the platform with typical use cases. We attempt to investigate the ambiguities of the existing legal framework on contracting agents that emerged due to new technical developments in the field. 1. Introduction A new era of electronic contracting is emerging where intelligent agents are negotiating, formulating, and monitoring contracts. New technological advances are making possible for machine to machine contracting. An agent is a piece of software that is programmed to execute a set of instructions given by the user. In the existing practice agents are surfing the web to find beneficial deals for the customer, negotiate a price, and create a contract. In the near future, e-commerce will evolve and agents will be able to negotiate and monitor more complicated deals than simple purchasing of goods. Agents will represent users without being explicitly instructed to do so. Agents could + arrange trips for users based on the information found on their calendars, their preferences, and their habits. Although much work has been done in the area of developing intelligent agents and machine to machine communication, there is a growing interest on legal aspects that arise when intelligent agents are contracting. This transformation of the contracts landscape raised some crucial legal issues and key regulatory challenges. The use of Internet and new software technologies has resulted in legal problems and most existing legal framework is inadequate to deal with them. The Internet provides opportunities for new ways to damage or otherwise affect legal relations and markets worldwide. For example, Internet pornography, hacking, Internet money laundering, and identity theft are criminal acts and as such are prosecuted by the laws in all jurisdictions. The criminalization of hacking was an important step towards the regulation of the Internet. Computer systems, their data, and their processes are protected of exploitation by unauthorized parties. But the issues are not so clear in the case of electronic contracting. In the process of the transition from offline to online, the contracting environment has changed markedly through the use of electronic agents. The legal framework has sought to keep up but the technology involves fast. In a closed system where the user does not allow third parties to enter unless those with a previous authorization, it is easier to decide the unauthorized use of the resources. Intelligent agents can perform deals and formulate contracts mainly in an open environment. As a result, the seller, whether it is a web-site or a seller agent, tries to advertise the services it offers. Therefore the notion of the protection in open systems is quite different than a closed one. In open systems the user invites others to interact with his agent, to visit the website, and use the system’s computational resources aiming at financial benefit. If the agent does not act as the user’s expectation, either based on the user instructions, either because of a malfunction of the agent, either because the agent can easily be manipulated by a third party, either because the user of the system did not estimate appropriately the benefit, etc., then it is not easy to decide who is liable for the damages. We are grateful to Dr. Felix W.H. Chan of the Faculty of Law, University of Hong Kong for his advice and comments 0-7695-2268-8/05/$20.00 (C) 2005 IEEE 1 Proceedings of the 38th Hawaii International Conference on System Sciences - 2005 Let us consider this conceptual example. Suppose agent B acted on X’s behalf in stock exchange by negotiating, buying, and selling shares. X instructed B to buy 5,000 shares of S Inc. for two dollars each. B went to bulletin boards of various companies, placed advertisements, checked chat rooms, and so on, to gather information. Finally, B decided to buy shares from agent A of Company C, which has a link in its website to a financial news service (say, Bloomberg web page) stating that Company C was about to be subject to a take-over and could result in 40 percent rise of stock within minutes. B communicated with A asking whether there were bank guarantees. Knowing that X would like to take advantage of this opportunity, based on X’s preferences and previous purchases as well as rules that allow B to use this information, B immediately buys 5,000 shares for X. However, X later found out that Company C has no such shares and it was common knowledge among the investors that C was convicted of distributing 2 million shares, inappropriately registered to the investors. There were news headlines that C’s investments had no bank guarantees as they claimed and that their agent A had made knowingly false statements in order to attract and mislead other investors. X suffered economic loss from this transaction that could not happen if delegated to a human representative since everyone would have known C’s bad reputation and conviction. Now, many questions arise. Can X challenge the validity of the contract on the ground that B is just software and not a person capable to have intention to enter into contracts? Can X claim that B has operated in excess of his implied authority by buying more shares? Can the other party argue that this is their internal relationship problem? Can X sue the physical agent A to recover the loss in assets? However, this is not possible because agent A does not own any assets. Can it be argued that the software in agents A or B has bugs? Can it be argued that the agents are not properly representing their owners? Would it be different if there was a requirement and available mechanisms to check the validity of the agents’ authorization? Can X argue that agent A had asked for his ratification in all previous transaction but did not do so this time? Can X sue the programmer? Can the programmer argue that X did not operate according to the instructions or within the documented technical limits? This list of ambiguous legal questions can grow further almost unlimitedly. It seems that the adoption of new technological advances in intelligent agents area as well as the massively use of such agents depends on solving the legal issues first. From a business perspective, trade is not encouraged in such an environment where the rules are not clear and where technological innovation can be used easily as a means for fraud and deception. The lack of adequate legal response, international standards, and the cross-border nature of electronic trade make it even more difficult to resolve any possible disputes, thus discouraging people to use this new technology. In this paper, we review the existing approaches and the existing legal framework. Then, we give an overview of the existing legal issues and also of problems that are eminent to come. We try to bridge the gap between the theoretical and philosophical point of view about agents with the practice. Furthermore, we propose a solution framework with a Contract Agent Authorization Platform (CAAP) where we discuss the directions that might lead to a viable solution to the problem. 2. Background and Problem Definition There is not a uniform definition for agents. Casual definitions of agents can be “a software thing that knows how to do things that you could do probably yourself if you had the time” (Hermans 1996). He et al. (2003) presented an excellent survey on agent-mediated ecommerce. In summary, agents are software tools that have: • social ability: agents interact with other agents or individuals, • reactivity: agents respond to changes that occur in their environment, • pro-activity: agents are programmed to pursue goal directed behavior, • adaptivity: agents assimilate to the user’s habits and benevolence assuming that they do not have conflicting goals, and • mobility: some agents can move in an electronic environment, in our case the Internet. These properties of an agent significantly change the nature and the capabilities of this piece of software. In contrast to traditional software, agents can be used to take decisions on users’ behalf and enter a transaction automatically based on its personalized, continuously running, and semi-autonomous nature. The terms selected to describe the interactions of agents attribute to them humanlike capabilities. Although for the time being such capabilities seem to be an obstacle and lead to philosophical questions about agents, still agents are a piece of software programmed to execute requests posed by the user. A variety of types of electronic agents exist: there are buying and selling agents, matchmaking agents, information filtering agents, etc. Watcher agents, for example, are looking for information specified by the user and either notifies the user directly or store the information for future access (such as Fish wrap and Newshound or Dow Jones’ Personal Journal). There are learning agents that adjust their performance to individual’s preferences, knowing them from the user’s previous behavior (such as Firefly, Web hunter, News Weeder). Shopping agents are capable of comparison shopping and finding the best price for the requested item (such as BargainFinder). Information re- 0-7695-2268-8/05/$20.00 (C) 2005 IEEE 2 Proceedings of the 38th Hawaii International Conference on System Sciences - 2005 trieval agents are capable of complicated searches by completing independently the search criteria defined by a user (such as Architext, AppleSearch, Pageakeeper). In our study, we discuss agents that are used for e-commerce transactions. These agents have at least three basic functions: product brokering, merchant brokering, and negotiation (Maes et al. 1999). That is, agents are capable of: • retrieving information based on criteria provided by the buyer, • deciding what to buy resulting in a “consideration set” of products (product brokering), which combines with merchant information to determine from who to buy after evaluating the merchant alternatives (merchant brokering), and • considering how to settle the terms of the transaction (negotiation). Intelligent agents search the Web for making beneficiary deals for their users. Assuming that an intelligent agent based on the instructions given to it by the user, searches the web and identifies a beneficiary deal with an agent that represents company, and both agents agree. The question is whether this is a formation of a contract. The term contract is overloaded. In everyday life we use the term contract to refer to an agreement between two or more parties. An electronic contract extends this notion and refers to electronic agreements; agreements that are created through electronic means. In e-commerce every time intelligent agents interact and agree upon the execution of a task, we have an electronic agreement. The formation of an electronic agreement has several stages: searching for the parties, negotiation, drafting of the contract, execution, control, and monitor of the contract. The legal term contract as defined in the American Law Institute’s Restatement Second of the Law of Contracts states that “a contract is a promise or a set of promises for the breach of which the law gives a remedy, or the performance of which the law in someway recognizes as a duty.” From this point of view, a legal contract introduces the notion of enforceability; a party that does not fulfill its contractual obligation has a penalty. Moreover, the law limits the capacity of certain person to bind oneself by a promise, or to enforce a promise made to them like minors, mentally disordered, etc. From this point of view, only a person can have contractual capacity, but not an electronic agent. Whether automated formulated agreements among intelligent agents constitute a contract with legal obligations is of fundamental importance for the evolution of ecommerce. Making business relations and initiating business interactions is of importance only if the necessary means of trust exist. In e-business where the parties are having cross-border agreements with parties they do not know (in the case of intelligent agents they might not even know that they are having an agreement) legal obligations should be clear. The issue is that legal obligations are con- nected to contracts such obligations bind the parties that participate in it. The answer to the above question is not straightforward. There are philosophical and technical issues related to it. Is an intelligent agent a legal person thus bound by its actions? How could a software tool be a legal person and how the user is then bound by its actions? The user of the agent should be responsible for the agent, if this is always the case then is an intelligent agent a simple communication tool? Is this the case even when agents decide and act based on users’ preferences? Could agents be viewed as a form of traditional agents bound by the agency law? Who is liable in case an agent makes damages? Is the use of the computational power of an open system considered to be damage? Can an agent subcontract part of his job to another agent? What happens if an electronic transaction goes wrong resulting in an economic loss? Several of the above issues have been mentioned in the literature and there is no consensus even within researchers from the same jurisdiction. Let us proceed to review the existing approaches and the existing legal framework. 3. Recent Legal Framework in Intelligent Agents Contracting Intelligent agents are part of an evolving approach to businesses that could eventually alter the communications landscape in a global scale. The characteristics of intelligent agent’s legal framework are just beginning to become clear and the legal framework that currently governs these activities must be clearly drawn and re-evaluated. In this section, we introduce some recent legislation on electronic contracting. However, there is only one attempt in the USA to enact more detailed legislation, addressing the issues in electronic contracts formed by agent. In the context of European law the most significant initiatives affecting electronic contracts have been the Directives on Distance Selling1, on Electronic Commerce2, and on Electronic Signatures 3 . These Directives, in contrast with USA legislation, are referring to electronic contracts without further specification to contracts concluded by electronic agents. The objective of the Directives is to establish a uniform legal framework for all member states. Nevertheless, the European legal framework regarding electronic contracts is unclear due to disparities between 1 Directive 97/7/EC of the European Parliament and of the Council of 20 May 1997 on the protection of consumers in respect of Distance Contracts, OJ 1997 L 144 2 Directive 2000/31/EC of the European Parliament and of the Council of 8 June 2000 on certain legal aspects of information society services ,in particular electronic commerce, in the internal market, OJ 2000 L 178/1 3 Directive 99/93/EC of the European parliament and of the council of 13 December 1999 on a Community framework for electronic signatures, OJ 2000L13/12 0-7695-2268-8/05/$20.00 (C) 2005 IEEE 3 Proceedings of the 38th Hawaii International Conference on System Sciences - 2005 national legislations. Hong Kong enacted the Electronic Transactions Ordinance4 which adopts an open Public Key Infrastructure (PKI) system that encourages the formation of contracts. Singapore’s Electronic Transactions Act has specific provisions on how to form a contract electronically5. Australia has enacted the Electronic Transactions Bill that sets the general rules about the validity of electronic transactions6. In USA, the Uniform Electronics Transaction Act (UETA 1999) is an extensive law attempting to regulate electronic commerce, promulgated by the Uniform Law Commissioners in 1999, approved by the American Bar Association, and adopted in several states. UETA is an effort to establish uniform legal standards for electronic commerce transactions. As stated at the UETA, the primary objective of this act is to establish the legal equivalence of electronic records and signatures with paper writings and manually-signed signatures, removing barriers to electronic commerce. The idea underlying UETA is the enforceability of electronic transactions at the same level as at the paper transactions without changing the substantive rules of law that applies. In that way the Act provides stability and significant efficiency and cost savings. UETA applies to transactions in which parties have agreed to conduct transactions by electronic means (UETA, Section 5(b)). The Uniform Computer Information Transactions Act (UCITA) is a more ambitious statute than UETA. Historically, UCITA is the result of an effort to revise the article 2 of the Uniform Commercial Code in order to conform to the technological advances. The National Conference of Commissioners on Uniform State Laws (NCCUSL), an organization of commissioners from every state for drafting uniform state laws, established a committee to draft a new article 2b in the Uniform Commercial Code in order to support the future advances of the new technologies which later on resulted in UCITA. UCITA’s objective is to provide a full set of commercial law rules for computer information transactions. UCITA is a uniform commercial code applicable to computer information transactions. 7 An electronic agent can respond to a term in an electronic record if it is “conspicuous” and presented in a form that a reasonably configured electronic agent could take it into account or react to the term without review of the record by an individual. A “Conspicuous” term with respect to an electronic agent includes a term or references to a term that is so placed in a record or display that the person or electronic agent cannot proceed without taking action with respect to the particular term or reference (Section 102, Definitions 14(B)). An “Electronic agent” is defined as a computer program, or electronic or other automated means, used by a person to initiate an action, or to respond to electronic messages or performances, on the person’s behalf without review or action by an individual at the time of the action or response to the message or performance (Section 102, Definition 27). An electronic message can be communicated to either a person or an electronic agent (Section 102, Definitions 28). The person that employs an electronic agent for making an authentication, performance, or agreement, including manifestation of assent, is bound by the operations of the electronic agent, even if the person was not informed or reviewed the agent’s operations or the results of the operations. 8 A manifestation of assent is valid when the person is aware or has the opportunity to review the record or term or a copy, and intentionally engages in conduct or makes statements by which the other party or its electronic agent may conclude that the person assents to the record or term. An electronic agent manifests assent to a record or a term when authenticates it or engage in operations that indicate acceptance. Furthermore if the law requires specific assent for a term, the manifestation of assent must relate specifically to the term and the assent can be proved in any manner. An electronic agent has the opportunity to review a record or term if it is made available in a manner that would enable a reasonably configured agent to react to the record or term9. UCITA states that a contract can be formed by electronic agents10. A contract is valid if it is formed by the interaction of the electronic agents when they engage in operations that indicate acceptance of an offer, unless the court rules that it is a result from fraud, electronic mistake, or the like. The interaction between electronic agents and individuals acting on their own behalf or for another person can form a valid contract as well.11 4. Legal Analysis of Agents and Contracts 4 Hong Kong Bilingual Laws Information System, http://www.justice.gov.hk/eng/index.htm 5 Electronic Transactions Act, Part IV, Electronic Contracts - Section11: Formation and validity; Section12: Effectiveness between parties; Section1 3: Attribution; Section14: Acknowledgement of receipt; Section15: Time and place of dispatch and receipt. 6 7 Electronic Transactions Bill, Part I-Preliminary, Section 5 UCITA applies to computer contracts and not to the sale of goods contracts nevertheless it gives the parties the option to “opt into” and UCITA govern their contract formation provisions if a material part of the transactions subject matter includes computer information, Section 104 However, by reviewing the literatures in law, UCITA (section 103) as well as other related proposals can be characterized as having a limited scope of application and that most of the electronic agents transactions fall outside 8 Section 107, Legal recognition of electronic record and authentication; use of electronic agents 9 Section 112, Manifestation of assent 10 11 Section 202, Formation in general Section 206, Offer and acceptance: electronic agents. 0-7695-2268-8/05/$20.00 (C) 2005 IEEE 4 Proceedings of the 38th Hawaii International Conference on System Sciences - 2005 its scope of application. UCITA provisions are complex, ambiguous, and possibly violating legal foundations of contracts. We analyze in detail these problems in this section. However, by reviewing the literatures in law, UCITA (section 103) as well as other related proposals can be characterized as having a limited scope of application and that most of the electronic agents transactions fall outside its scope of application. UCITA provisions are complex, ambiguous, and possibly violating legal foundations of contracts. We analyze in detail these problems in this section. 4.1. Agent’s Ambiguity in Contracting Foundations A contract consists of three essential elements: (1) an agreement, (2) an intention from both parties to be legally bound, and (3) a valuable consideration. To determine whether the first element exists and an agreement has actually been concluded, it is necessary to examine whether the negotiations that have taken place between the parties (offeror / offeree) can be defined as an offer and acceptance. An offer may be in three forms: (1) in the form of an offer of an act for a promise as when a person offers goods or services that when the other party accepts the offeror is obliged to reward him for them, (2) in the form of an offer of a promise for an act as when a person gives a reward for a doing of a certain thing, and (3) in the form of a promise for a promise. The first two cases refer to “unilateral” contracts in which only the fact of the performance of one party makes obligatory the execution of promise of the other. The third case is the “bilateral” contracts where there is an outstanding obligation from both parties. Furthermore, an offer is effective when, and not until, it is communicated to the offeree. A valid acceptance also must be communicated to the offeror and must be an absolute assent to the terms of the offer by words or conduct. If a contract is to be made, offer and acceptance must correspond. In this stage, the problem of the “battle of the forms” may arise where one party sends the other an offer on his general conditions of business and the other accepts subject to his own general conditions. An electronic agent acting on behalf of a buyer, for example, offers to buy goods from another on a standard form which incorporates the buyer’s standard terms and conditions of trade. The seller accepts the offer through his electronic agent by a confirmation on a form, which contains his standards conditions of trade that may differ substantially from those of the buyer’s. The arising issues are whether there is a contract and if, whose conditions and standard forms prevail. One solution could be that the party should program his electronic agent to obtain the other party‘s consent to his own conditions by a confirmation slip in an earlier stage. The agent could be programmed so that automatically prior to offer-acceptance stage obtains this slip. Another issue is whether an agent’s acceptance is instantaneous or non-instantaneous in the communication method that creates different legal commitments. In real life, the acceptance can be regarded as a communication by instantaneous methods, such as email, Electronic Data Interchange (EDI), telephone or by non -instantaneous methods such as post. In instantaneous methods, the general rule is that the acceptance must be communicated to the offeror, but if the communication has not arrived at once the acceptor can try again later. In non-instantaneous methods, the acceptance is considered completed when the letter is posted. In this case, the offeror is bound from the time the acceptance is posted but not delivered. In the agent environment, that means if postal rule is accepted, the contract is valid from the moment that the transmission of the agents system begins. The second element for a valid contract is that an agreement constitutes a binding contract when is reasonably regarded as both parties intended to create legal relations. The general rule for testing the intention is to attribute to the person his actual intention and not what was present in his mind. We have to discover what one reasonable person was entitled to conclude from the other’s attitude. How this is possible in electronic agent’s environment? The judge in order to rule about one’s person intention asks him questions and concludes from all the surrounding circumstances considering his personality. One possible solution for the agents is to check statically how it acted on relevant situations and what are the parameters of his instructions on how to react under these situations. The third and last substantive element of a legally enforceable contract is a consideration that is something must be given in exchange of a promise. An agent can be programmed to give specific consideration under specific defined situations, for example, for a certain type of contract to give a certain type of consideration. Thus, this aspect is relatively straightforward. 4.2. Ambiguity due to New Technical Issues If a contract is to be made through electronic agents, new issues that do not exist in real life formation of contracts arise through the process of these three elements. For example, if a system administrator or Internet service provider withdrawn or modify the intelligent agent, who is liable for the contracts concluded by the agent under this new set of rules? Who is liable for the agent’s actions if the owner is not aware or does not consent to the alteration of instructions? If the system administrator who provides the platform in which the agents run, disrupt the communication either intentionally or not, and the process of forming the contract is disrupted who is liable? For example, in an international supply contract of sales when the agents negotiate the transfer of ownership of goods, if the other party introduces new terms in the acceptance, this is a counter-offer that amounts to the rejection of an offer. If 0-7695-2268-8/05/$20.00 (C) 2005 IEEE 5 Proceedings of the 38th Hawaii International Conference on System Sciences - 2005 the administrator closes the platform and the counter-offer does not reach the party, he may employ a carrier to ship the goods while the other party will deny delivery and payment. Sometimes, in international contracts an offer has a clause that stipulates the contract may be considered completed if the other party does not respond within a predefined time limit. In case the other party denies the terms but the platform is not working, do we have a valid contract? One possible solution could be that the party may escape liability on the force majeure ground. The force majeure clause may exclude the party from delivering the goods to be supplied under the contract without any further liability on its part upon the occurrence of unexpected events beyond the party’s control such as strikes, inliability to obtain supplies, bad weather, etc. It is debatable whether the unexpected closing of the platform could fit in these categories of force majeure. The effectiveness of technical alternatives (such as backup machines, migration to other computers) or notifications for fallback to manual procedures differs by cases and under different situations. Another new issue that could not happen in real life contracting is who is liable if an agent is confused in a platform that host several agents running together for different users. For example, due to system malfunction, the reply of user U’s agent being “no” is exchanged with another agent transmitting a “yes” acceptance. Under this circumstance, should U enter into a contract? The answer here should be no. U is not entering into a contract since U do not intent to do so. The liability lies to the administrator. 4.3. Contractual Capability of Agents Until now we have discussed the three fundamental elements of a contract in the electronic agent contracting environment. Moreover, for a contract to be valid and enforceable there is a further important requirement which is to be drawn by persons with contractual capacity. It is accepted that such capacity is attributed in physical persons and legal persons. Since intelligent agents cannot be considered natural persons, we discuss whether agents could be regarded as legal persons that can make contracts. It is debatable whether software agents can meet these requirements in order to form a valid contract under the traditional contract doctrines. A group of authors in the literature has argued that the conference of legal personality to electronic agents can regulate these issues. The attribution of legal personality will enable agents to have rights and duties, to be sue and sued, to own property. On the other hand, all these properties initiated group of authors in the literature to oppose the conferral of legal personality to software agents on the grounds that the legal landscape will change in such a way that uncertainty will rule in the near future with no existing solid legal framework. However, Bellia (2001) and Lerouge (1999) believe that the answer to this question is not of great importance because attributing legal personality to agents cannot resolve any legal issue. They believe that in all existing cases, besides physical persons, legal persons (such as a corporation, a government entity, a ship) exist only when they have assets. If an agent has legal personality then it can be either a principal with a duty to fulfill an obligation or an agent to account to the principal for any malfunction. In this sense a user that relies on the action of the software will be protected but the problem is how such protection can exist if the agent has no assets. Bellia believes that “electronic agents are another mode in which people are doing business.” Allen and Widdison (1996) argue that attributing all computer communications to the principal and holding the trader bound to any unexpected communications would not be fair and commercially reasonable. They argue that traditional approaches are inadequate as it considers faceto-face communications and the law should be adapted to the new technological advances. Regardless if we assume that an intelligent agent is a legal person or if the user of the person is liable for its actions and uses it as a mere communication tool, the next question that has to be answered is whether the use of an intelligent agent can be assumed as an act of promise or conduct. According to the contract definition, a contract is a promise or a set of promises. When intelligent agents negotiate a deal, they cannot manifest assent in the same way as humans. Thus, it is not clear whether agents can convey a promise. A party that enters into a contract has to be aware of the commitment and this is guaranteed if the party manifests assent of the terms. We can assume that a person manifests assent by conduct when using an electronic agent. Lerouge (1999), associates the question of manifestation of assent by conduct with the question of whether the electronic agent has the opportunity to review the electronic record. He states that use of intelligent agents to enter into contracts presumes the person’s assent to the contract even though he may subjectively intent otherwise or does not know exactly the moment and the content of the contract. Middlebrook and Muller (2000) state that the opportunity to review the record should be in a manner that would enable a “reasonably configured electronic agent” to react to the contract. Unless international technical standards specify the agents interactions, the concept of “reasonable configures electronic agent” will remain fuzzy and give ground for litigation. Kerr (2001) also discusses this issue and states that a contract can arise only after the expressed or implicit animus contrahendi in order to be enforceable. Moreover, he states that the exchange of promises is not enough and a 0-7695-2268-8/05/$20.00 (C) 2005 IEEE 6 Proceedings of the 38th Hawaii International Conference on System Sciences - 2005 mutual assent on the nature and scope of the rights and obligations between the parties (meeting of the minds) is necessary. The underlying idea of the meeting of the minds is the voluntary nature of the contract. This is a result of the fact that each party has exercised its freewill and has chosen to trust and rely in the mind of the other person and thus assumes duties and obligation. Computers are unable to act voluntarily and therefore unable to reach the meeting of the minds. One might consider that intelligent agents serve the same function as human agents. According to common law principles, a human agent must accept his mandate and both parties have to consent and be different persons and as long as the person understands what he is doing, is capable to be an agent without himself having full contractual capacity. Similarly, in civil law the agency relationship arises when one person acts as representative of another person, ordered or allowed by the law. The agent is not acting on his own behalf and it is not necessary to have capacity to contract. In this sense, an incapacitated person may be an agent. In both legal systems, legal personality should be attributable to the agents, which introduces again the issue of whether an agent is a legal person or not. 4.4. Lack of Consensus It is clear from the above analysis that in the literature already several major legal issues have been discussed and there is no consensus on the way that they should be addressed. As agents evolve and as their use becomes more popular new problems will arise. Issues like can the user of the agent or the owner of the computer that the agent terminates the process thus interrupting a transaction? In future developments, there might be the case that agents are given assets and they will be charged to manage these assets based on the user preferences, a predefined set of rules, or rules found by the agents themselves on the web. In the future, agents could have a portfolio to handle and do so not only based on a set of known pre-defined rules but also based on user preferences and past history. 5. Contract Agent Authorization Platform Authorized Agents Agreement Agents Communication Tool Contract Agents Agents with Customized Delegation Agents with Legal Personality Increasing Autonomous Capability Figure 1. Overview of Agents Contractual Capability From a legal point of view, researchers and legislators are trying to come up with a uniform solution that will govern all transactions made by intelligent agents. On the other hand, our CAAP aims at high reliability of agents programming, communications infrastructure, and other technical improvements that can indirectly help the management of contract agent. We believe that a combination of legal and technical solutions would best serve the ecommerce community. In particular, based on current legal and business practices, we mimic such automation with agents in our model in order to address the legal ambiguities in contracting foundations and those due to new technical issues, as discussed in the previous section. 5.1. Scope of the Proposed Platform We perceive that a high percentage of the solution relies on technological part and therefore a computersupported solution with a controlled and customizable degree of authorization to agents might be more beneficial because of the diversity of requirements and situations. Because intelligent agents have a wide range of capabilities and can be programmed to behave very differently, only a user customizable solution can be practical and really help the situation. This is also because the status and the enforceability of a contract depend on the specific case and have to adhere to users’ needs. Conceptually, we can create a hierarchy of authorization based on the legal analysis (see Figure 1). At the top authorization level are agents that the user assigns legal personality to them. At that level the agent is free to get involved to any contract formation where the other party accepts this level of authorization. In this kind of authorization, the agent can also convey its assets to the other agent in order to facilitate the decision of the agent to participate in a contract or not. At the lowest level the agent can be a communication tool which makes the user liable for the agent’s action. If the agent is a communication tool then whatever arrangement the agent is doing the user is liable for it. In between, agents can have customized degree of authorization and automation (i.e., delegation) based on the situation and the liability of their users. For example, a user may allow an agent to contract with other agents as long as a message reaches his/her mobile within a short period after the transaction. As another example, consider the case where an agent is programmed by the user to assume manifestation of assent by the other agent only in the case where the user of the agent sends an email stating that he read the contract and agrees. In addition, we differentiate between two types of agents: the agreement agents and contract agents. Agreement agents are agents that perform agreements in the existing infrastructure or the users of the agents do not wish to be protected by giving contractual dimension to their transactions. These are cases where trust already exists. For example, it might be interesting from law point of view whether a user that requests from an agent to buy a 0-7695-2268-8/05/$20.00 (C) 2005 IEEE 7 Proceedings of the 38th Hawaii International Conference on System Sciences - 2005 book from amazon.com actually has a contract or not. But the user trusts that amazon.com will charge the credit card appropriately and do the delivery as agreed. In case amazon.com debits the card without delivery, the user has the alternative to sue under the tort of unjust enrichment. Contact agents are agents with contractual capabilities where the user wants to precede to agreements only if there is a legal contract between the participating parties. From the legal analysis of the previous sections, we identify a large number of legal issues are rooted from the proper authorization of agents. Therefore, based on PKI concepts and technologies, we propose a Contract Agent Authorization Platform (CAAP) as a foundation of a technical solution. We target to manage contract agents in our CAAP, which is a trusted party to be operated by authorities. 5.2. Conceptual Model and Typical CAAP Use Cases Figure 2 depicts our conceptual model for agent authorization in the Unified Model Language (UML, OMG 2001) class diagram to be supported in the CAAP. The essential functions of the CAAP include the following: • Issue of electronic agent certificates • Authentication of the users and their agents through electronic certificates • Validation of agents’ bids • Witness of electronic contracts with validation to ensure contract terms are with the agents’ authorization limits • Alert agents’ owners in case of authorization violations • Non-repudiation support E-Cert Agent Certificate Human User Agent Authorization Profile Mission Authorization Rules Negotiation success Contract send to Counter Party Authorization Alert raise raise Figure 2. A Conceptual Model for Agent Authorization There are five phases of contract agent operation support in our CAAP: user registration phase, agent registration phase, mission specification phase, negotiation phase, and contractual phase as explained below. Before using the CAAP, users must first register in the CAAP, with their identity verified with an electronic certificate (e-cert). Registered users can specify various authorization rules for controlling their agents. Rules are organized into authorization profiles for potential reuse and customization. Users must also register each of their agents before delegating them to missions. A registration results in an agent certificate which captures the agent’s descriptions, functions, the owner’s e-cert, the CAAP’s access method, and other relevant information. The agent certificate is digitally signed by the CAAP. When a user delegates an agent into a mission, the user may choose to override the agent’s authorization profile with a mission authorization profile. Normally, the mission authorization profile is equal to the contract authorization profile. In some situations, a mission may comprise more than one contract, say, when the agent is delegated to buy some quantity of goods. However, for example, if the agent is not allowed to buy too much from a supplier, the user may set these two profiles different. In addition, the negotiation authorization profile may be set larger than contract authorization profile to increase the agent’s flexibility and therefore the efficiency of the negotiation. However, if the contract exceeds the contract authorization as a result, then an alert will be sent to the user for approval to clarify legal responsibilities. All these authorization profiles should also be loaded into the agent’s knowledge so that the agent can perform the delegation in accordance with its authorization. In the negotiation phase, the agent may negotiate with one or more counter-parties, which may be humans or agents. Our CAAP does not intend to interfere with the normal tasks of the agent because this may involve a large overhead and should be the responsibility of the agent’s own running platform. However, counter-parties may obtain the following services from the CAAP: 1) verify the authenticity of the agent certificate, 2) verify if the contract terms are under its authorization limit, and optionally 3) verify if an agent’s bid is under its authorization limit. However, we cannot allow the counter-parties to directly access the authorization limits because this may expose sensitive information regarding the reservation prices. Thus, before honoring authorization verification requests, the CAAP must check if the bid is really issued by the agent (for example, the bids have been signed by the agent). Should the CAAP detect a violation of any authorization limit, the agent’s user is notified with an alert mechanism (Chiu et al. 2004). If the user confirms allowing such a deed of the agent, the CAAP records this confirmation as evidence in case of future disputes and replies a positive result to the counterparty; otherwise a negative result is sent. Upon a negative verification, the counterparty should usually reject the bid or the contract. Although an optimistic bidder (agent or human) need not verify every bid, contracts must be verified to ensure within the authorization limits. This is particularly important as users may change authorization limits during mission progress. Further, the CAAP have to digitally sign the validated contract and then store it in a non-repudiation 0-7695-2268-8/05/$20.00 (C) 2005 IEEE 8 Proceedings of the 38th Hawaii International Conference on System Sciences - 2005 server. As such, the CAAP much strengthens legal protection against ambiguities in case of future possible disputes. 5.3. CAAP System Architecture Figure 3 describes an implementation architecture, which consists of three tiers, namely the front-end tier, the logical tier, and the back-end tier. The front-end tier interfaces with users and agents. The CAAP Portal is a web-based interface for interactive user access to the CAAP. The CAAP authenticates users’ identities with their e-cert from Certificate Authorities and register them to the system. The Internet Alert Sender sends alerts to agents and users with various mobile and Internet technologies (Lin and Chlamtac 2000) such as ICQ (I seek you), e-mail, Short Message Services (SMS), etc. The Agents Programmatic Interface supports interactions with agents through agent communications languages (ACL), such as that of the Foundation for Intelligent Physical Agents (FIPA, http://www.fipa.org). AVR = Authorization validation request Human Users Desktop Laptop PDA Mobile Contract Agent Authorization Platform Agents rt Ale Web / WAP Access Ale rt Certificate Authorities Front-end Tier &33$ 3RUWDO Authorization profile $XWKRUL]DWLRQ 3URILOH(GLWRU Logical Tier Agent registration AVR request Alert $OHUW 0DQDJHPHQW 6\VWHP Authorization profile Back-end Tier $JHQW 3URJUDPPDWLF ,QWHUIDFH ,QWHUQHW$OHUW 6HQGHU AVR Authorization Violation $XWKRUL]DWLRQ 9DOLGDWRU Agent cert $JHQW &HUWLILFDWLRQ &HQWHU Agent cert Authorization profile $XWKRUL]DWLRQ 'DWDEDVH E-contracts Validation logs 1RQ5HSXGLDWLRQ 6HUYHU Figure 3. Architecture of a Contract Agent Authorization Platform The logical tier implements all the necessary main programming logic for contract agent authorization. The Agent Certification Center creates agent certificates upon users’ requests for registration of their new agents. The Authorization Profile Editor supports creation and maintenance of agent authorization rules and profiles, as well as binds them to agents at different scopes (namely, lifetime, mission, negotiation, and contract). The Authorization Validator checks if the bids or contracts violate the agents’ authorization upon counter-parties’ requests. Upon authorization violations, the Alert Management System generates alerts to notify the agents’ owners for verification and confirmations as described in the previous subsection. The agents’ owners can then connect to the CPPA Portal for further details and responses to the alerts. The back-end tier provides backing storage for the sys- tem. The Authentication Database keeps operation data such as the authorization rules and profiles, agent and user information, and so on. However, the Non-Repudiation Server is separated for sensitive legal records, such as econtracts, validation logs, and so on. 6. Discussions and Summary To the best of our knowledge, there have not been any attempts to combine legal analysis with a comprehensive platform for the support of proper authorization management for contracting agents. The only close technically oriented attempt is Hu’s (2001) proposal of agent certificates for authentication but it does not address the problem of validating authorization limits, which is legally crucial. In this paper, we have examined the legal issues that arise when agents are used for e-commerce contracting. In contrast to traditional contracts where the legal framework is built upon face-to-face transactions, we have analyzed the inadequacies of recent legislations regarding contracting agents and various legal ambiguities when agents contracting through computers and Internet communications. This is a major issue since electronic trade can be developed well only if enforceable trust can be established in the Internet. We have also looked into the philosophical and practical aspects of the problem and proposed a technical solution based on the freedom to contract. In our approach, we do not intend to solve all the legal issues immediately but we propose a solid foundation for establishing enforceable trust between agents’ communications by providing some fundamental platforms that can help clarify them. We argue that as long as a global standard governing agent interactions does not exist, a customized solution based on user preferences could be adopted. This approach is based on the general rule of freedom of contract where each party has the freedom to choose to enter into a contract on whatever terms it may consider advantageous to its interests. Based on our legal analysis, we have identified that many of these issues are rooted from the authorization management in agent delegation. Therefore, as a foundation of a technical solution, we propose the use of a Contract Agent Authorization Platform (CAAP) that supports alert and acknowledgment. Based on current legal and business practices, we mimic such automation with agents. Therefore, we have naturally developed a conceptual model for agent authorization and illustrated a CAAP architecture with typical use cases of the platform. With the proposed comprehensive functions of the CAAP, we can ensure that whatever happens cannot violate the agents’ authorization limit. The final electronic contract is validated against the agents’ authorization or with the users’ explicit consent, therefore establishing the agents’ contract foundation. The alert and notification support in the CAAP improves communication problems that arise from new technical issues of agent computing. Further with 0-7695-2268-8/05/$20.00 (C) 2005 IEEE 9 Proceedings of the 38th Hawaii International Conference on System Sciences - 2005 non-repudiation support, there are adequate evidences to avoid most of the legal ambiguities. With the recent technical maturity, adoption, and diffusion of PKI and electronic certificate infrastructures, we believe our CAAP proposal is a direct and viable extension. However, a main technical challenge and effort is the specification of authorization limits. This involves a proper encoding of users’ requirements, intention, and preferences. To streamline the procedure for this as well as negotiation and other phases of electronic contracting, we have developed methodologies involving the notion of electronic contract templates (Chiu et al. 2003). We are also extending this methodology for more general specification agent authorization limits with constraints and authorization verification in the form of the Constraint Satisfaction Problem (CSP, Tsang 1993) and Belief-DesireIntension (BDI) agent architecture (He et al. 2003), both of which are widely adopted in artificial intelligence and agent computing. However, based on our experience, we observe that the first phase of deployment in electronic marketplaces and other common Internet trading scenarios are relatively straightforward (as opposed company or real estates acquisitions) because the number of issues and variables are small. We perceive gradual but successful adoption of CAAP or related platforms in the near future. This is because our approach not only helps in legal issues, but also technical issues (such as agent reliability, which is another direction of our ongoing research) as well as social issues (such as the build up of trust and a positive image of technical reliability). Only after technical validation and success can further legislation be studied and enacted. However, the successful experience in electronic transactions and contracting can serve as a good reference and starting point. There are several open issues that need to be resolved. In most cases, we envision that a combination of enactment of legislation with the support of technical solutions is required to solve the problems. For example, if the user wishes to fully authorize the contracting agent, legislation can be enacted to give legal personality to the agent. However, users are responsible to transfer adequate assets (or equivalent insurance) to the agents and the other parties can go against the agents’ assets upon dispute. Then, agents can use solutions in artificial intelligence to make “their own” decisions based on user preferences. If agents own assets, their users are protected because the decision of the agents out at stake the specific assets, while the other parties are also protected because they can go against the agents. In addition, electronic communication can be used in an efficient way to facilitate the performance of a contract. For example, in real life a breach of contract can occur because a party fulfills its contractual obligation inadequately. Our proposed CAAP can solve problems before arising. For example, critical points of the execution can be identified and messages can be sent to the parties on time to remain of the contractual capabilities and request progress reports. Associated legislation should verify that if a party receives the pre-obligation messages, then unless otherwise proved, the party was fully informed, aware, and had the appropriate time to fulfill the obligation. Further for the promotion of international laws of electronic agents and avoid other ambiguities in contracting, we need to investigate a systematic way for digital unification of concepts (i.e., ontologies), such as through Semantic Web technologies12. In our future work, we are also addressing specific jurisdictions and developing agent models that can adhere to the existing laws. We are investigating formal and detailed design of agent authorization protocols. We are also considering the legal and technical aspects of delegation, network of trust, and authorization chains. Investigations in cultural and trust issues are also in our agenda. References [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] T.Allen and R. Widdison, “Can Computers make Contracts?”, Harvard Journal of Law, 1996 Anthony J. Bellia, “Contracting with electronic agents,” Emory Law Journal, 2001. D.K.W. Chiu, S.C. Cheung, and S. Till., “An Architecture for EContract Enforcement in an E-service Environment,” In HICSS36, CDROM, 10 pages, IEEE Computer Society Press, Jan 2003. D.K.W. Chiu, Benny Kwok, Ray Wong, E. Kafeza and S.C. Cheung, “Alert Driven E-Services Management,” HICSS37, IEEE Computer Society press, CDROM, 10 pages, Jan 2004 (Best Paper Award, Decision Technologies track). M. He, N.R. Jennings and H.-f. Leung, "On agent-mediated electronic commerce," IEEE TKDE, 15(4):985- 1003, July-Aug. 2003. Jean-Francois Lerouge, “UCITA: The use of electronic agents questioned under contractual law: suggested solutions on a European and American level,” 18 J. Marshall J. Computer & Info. L.403, 1999. B. Hermans, “Intelligent Software Agents on the Internet: An Inventory of Currently Offered Functionality in the Information Society and a Prediction of (near-)Future Developments” (1996), http://www.firstmonday.dk/issues/issue2_3/ch_123/index.html Kerr, “Providing for autonomous electronic devices in the Uniform Electronic commerce Act,” In Proc. Uniform Law Conference of Canada, 2001, Toronto, Canada, http://www.law.ualberta.ca/alri/ulc/current/ekerr.htm Y.-H. Hu, “Some thought on Agent Trust and Delegation,” In Proc. AGENTS’01, ACM Press, pp. 489-496, 2001. Y.-B. Lin and I. Chlamtac, Wireless and Mobile Network Architectures, John Wiley & Sons, 2000. P. Maes, R. H .Guttman, A. G .Moukas, “Agents that buy and sell,” CACM, 42(3):81-83, March 1999. Object Management Group, Foreword UML specification 1.4, Sept. 2001. Stephen T. Middlebrook, John Muller, “Thoughts on Bots: The emerging law of electronic agents,” Business Lawyer, 2000. E. Tsang, Foundations of Constraint Satisfaction, Academic Press, 1993. UETA, Legislative Fact Sheet, http://www.nccusl.org, 1999. 12 See: http://www.w3.org/2001/sw/WebOnt for Web-Ontology (WebOnt) Working Group. 0-7695-2268-8/05/$20.00 (C) 2005 IEEE 10
© Copyright 2026 Paperzz