Legal quicksand: Shrink-wrap and click-wrap agreements

You see shrink-wrap and click-wrap agreements when you click through terms and conditions in accessing an online service. But Michael Overly cautions you to consider their legal and business liabilities before you blindly agree

Shrink-wrap and click-wrap agreements are the fine print you see, among other things, when you click through terms and conditions in accessing an online service (e.g., in connection with a cloud computing service) or as part of the installation of a piece of software.

They may also be encountered as part of the documentation provided with new software or a hardware component. They may even be found, with some searching, in a file entitled “license.txt” or similar name on the installation CD on which a new piece of software is delivered. Businesses seldom read these terms in any detail, generally view them as non-negotiable, and accept them as a necessary evil.

[Related: Click-wrap license agreement found binding on company even though it was accepted by the vendor]

The fact is, these types of agreements can present significant legal and business issues. They can place a business’ sensitive data at risk, expose the business to liability, compromise the business’ ownership of its own intellectual property, and cause the business to pay additional, unforeseen fees. Three specific examples:

This article discusses some of the key risks inherent in these types of transactions. Specifically, the following areas are addressed:

What is a “Shrink-Wrap” License?

The term “shrink-wrap” derives from the method by which software was distributed as a package of installation disks and associated documentation sealed by shrink-wrap cellophane. The accompanying end user license agreement was often itself packaged in shrink-wrap cellophane and placed on the outside of the package or included as the top most item in the package. Today, shrink-wrap agreements can take a variety of forms and are found in both software and hardware acquisitions. However, they all have a common structure: essentially non-negotiable terms and conditions that accompany the product. The terms may appear as part of the documentation accompanying the product, as part of an on-line purchase process whereby the terms are displayed (and the purchaser, potentially, required to affirmatively click an “accept” button as part of the process), or presented to the purchaser on first use of the application as part of the installation process.

If the terms are displayed electronically, either online or in connection with the installation process, they are often referred to as “click-wrap” terms. For purposes of this discussion, there is no difference between click-wrap and shrink-wrap terms.

Courts in the United States have almost uniformly found that these types of agreements are enforceable (Conference America Inc. v. Conexant Sys. Inc., M.D. Ala., No. 2:05-cv-01088, 9/10/07). In fact, courts have held them enforceable even if the customer failed to read them (Druyan v. Jagger, S.D.N.Y., No. 06-cv-13729, 8/29/07).

Products Purchased Under Shrink-Wrap Agreements — Common Elements

While there are no bright-line rules as to the specific types of products that are made available under shrink-wrap agreements, the following are common elements:

The above are, of course, only generalities. It is important to note that there are many instances in which shrink-wrap agreements are used for the purchase of products that cost hundreds of thousands of dollars, require extensive customization and a significant implementation effort, and are mission critical to the organization. As discussed below, the risk of the products purchased under a shrink-wrap model can increase dramatically when the proposed application varies from the foregoing common elements.

Methods of Purchasing Shrink-Wrap Products

There are essentially two means of purchasing shrink-wrap products. First, the product can be directly purchased from the vendor that created it (e.g., downloading a copy of Acrobat from Adobe’s Web site). Second, the product can be purchased through a reseller or similar entity that is authorized by the vendor to distribute the product.

One benefit of using a reseller is the potential to license and purchase products, particularly large orders, at a substantial discount. Another advantage is the possibility of negotiating an enterprise or master contract with favorable legal and business terms for all licenses and purchases made through the reseller. In many instances, however, the use of resellers results in the licensee or purchaser obtaining substantially less favorable terms than if the licensee or purchaser directly negotiated with the vendor and eliminated the use of the reseller. Resellers generally insist on highly protective agreements that absolve them of liability for the products they distribute.

Any protections relating to the products are provided in the form of non-negotiable shrink-wrap agreements from the manufacturers or, worse yet, provided through Web sites that may change at any time. In either case, the product terms are (i) non-negotiable, and (ii) almost always very minimal, offering little in the way of substantive warranties and indemnities. A growing number of manufacturers are turning to reseller arrangements for the express purpose of avoiding having to extend appropriate, market-based contractual protections to their customers.

Reseller arrangement should generally only be considered when the product satisfies the common elements described above (e.g., low fees, non-critical use, off-shelf, well established, potentially trialed, etc.) and the cost-benefit of proceeding with transaction is justified. This usually means the reseller will be used for the purchase of a narrow range of pre-approved products for the organization. For example, purchases of standard office productivity applications (e.g., Microsoft Word, Adobe products, etc.).

Proprietary Versus Open Source Software

Software licensed under shrink-wrap terms can be broadly grouped into two categories: proprietary software and open source software.

Proprietary software is software that is generally developed by a single vendor, licensed for a fee, furnished in object code form only (i.e., the licensee has no access to the source code or the actual programming for the software), and provided under a license agreement that is specific to that vendor. Purchasers generally have no right to modify proprietary software. In contrast, open source software is software that is generally developed by multiple developers, provided without charging a license fee, for which the licensee is furnished with a complete copy of the source code and is encouraged to modify the software.

This article focuses only on the licensing of proprietary software. Open source software raises a different set of issues that are beyond the scope of this discussion.

Typical Shrink-Wrap Terms and Conditions

While the type of terms and conditions found in shrink-wrap agreements vary greatly from vendor to vendor, there are a number of common themes. In general, shrink-wrap agreements include the following potentially problematic terms:

These are general observations only. The specific language of a given shrink-wrap agreement may present additional risks. In particular, as discussed in the next section, a growing number of shrink-wrap agreements may present substantial risks to the purchasers own intellectual property or, if the purchaser is in a regulated industry (e.g., financial services or healthcare), to the purchaser’s data.

Inherent Risks of Shrink-Wrap Products

The end result of the terms and conditions commonly found in shrink-wrap agreements, as discussed in the preceding section, is that the purchaser has little or no remedy against the vendor in the event there is an issue with the product or damages arise (e.g., the product has a substantial bug in it, ceases to function, causes an intellectual property infringement claim) out of use of the product. The product is, essentially, being licensed on an “as-is” basis. In most instances, the purchaser’s only remedy in the event of a problem is to cease use of the offending product. A refund or other compensation is unlikely.

In general, the purchaser’s primary protection in purchasing shrink-wrap products is the concept of “safety in numbers.” That is, the product is widely distributed and usually well established in the community. This reduces the potential for a substantial bug or defect to go without a fix from the vendor. The purchaser is essentially relying on the power of the market to force the vendor to correct issues (i.e., vendors with poorly designed or buggy products will lose market share and, at least arguably, be easy to identify).

A growing number of shrink-wrap agreements present additional risks beyond those identified in the preceding section. Two of the most common additional risks relate to the purchaser’s own intellectual property and data.

Some shrink-wrap agreements contain expansive “feedback” and similar clauses that could result in the licensor gaining ownership of the purchaser’s own intellectual property. The contract actually includes language that the purchaser is assigning its intellectual property rights to the vendor. In some cases, almost anything the purchaser shares with the vendor, including during support discussions, may become the vendor’s property or, at minimum, result in the vendor having an unbridled license to use what it has learned for its own business purposes. At best, this can result in the purchaser essentially granting the vendor a free license to the purchaser’s valuable intellectual property. At worst, it can result in purchaser losing all control over its intellectual property.

Shrink-wrap agreements may also include broad audit rights, permitting the vendor almost unlimited access to the purchasers facilities, records, and systems. In some instances, these rights permit any or all of the vendor’s agents, contractors, and licensors to also have full access to the purchasers facilities, records, and systems. Under these terms, purchasers assume the additional risk of having third parties, with whom the licensee has no contract and no confidentiality protection, unfettered access the licensees facilities, records, and systems. For regulated entities (e.g., in financial services and healthcare) and all others in possession of consumer information, these audit rights subject the licensee to the additional risk and potential of exposing highly sensitive and regulated data to vendors and other third parties without adequate contractual protections (e.g., confidentiality clauses, information security protections, limitations on use, etc.). Consider the potential risk presented by a vendor showing up at a purchaser’s facility, without notice, and demanding full access to their systems and records — without any protection for the purchaser’s highly sensitive confidential information and data or any protection if that access causes a disruption in the purchaser’s operations.

Audits can also be excessive and abusive, disrupting the licensees normal operations and potentially making the licensee liable for substantial financial liability for third party auditor fees (which can reach the hundreds of thousands of dollars). This is because Many vendors view these audit rights as a means to derive additional revenue from its purchasers. Some auditors even work on a contingency basis, forcing them to either find a problem or not be paid. This creates an undue incentive for the auditor to search until they find something. In a number of instances, audits have led to substantial additional fees being paid by purchasers in agreements that were not properly negotiated. In one case, an audit revealed a relatively minimal excess use of the software which resulted in the payment of a few thousand dollars in additional license fees. Unfortunately, the customer was also responsible for paying nearly forty thousand dollars in audit costs.