| Contents | p. v |
| Abbreviations | p. xi |
| Foreword | p. xv |
| Preface | p. xix |
| Introduction | p. 1 |
| Setting the stage | p. 5 |
| Developments of IT in dispute resolution | p. 6 |
| Why IT? | p. 11 |
| Benefits of IT usage | p. 12 |
| Efficiency | p. 12 |
| Effectiveness | p. 14 |
| Convenience | p. 15 |
| Functions of IT for arbitration | p. 16 |
| When to use IT? | p. 18 |
| How to use IT? | p. 21 |
| Creeping featurism: the more IT, the better? | p. 21 |
| Lack of experience: IT as a trump card? | p. 22 |
| Fundamental communication technologies | p. 23 |
| Discussion lists | p. 23 |
| Chats | p. 24 |
| Bulletin boards | p. 24 |
| Designated community websites | p. 25 |
| Wikis | p. 25 |
| Information technologies for arbitration | p. 27 |
| Case management websites | p. 29 |
| What is a case management website? | p. 30 |
| Uses and advantages | p. 31 |
| Caveats | p. 33 |
| Videoconferencing | p. 34 |
| Videoconferencing technologies | p. 35 |
| The evolution of codecs | p. 35 |
| Dedicated videoconferencing | p. 36 |
| IP videoconferencing | p. 37 |
| The Geneva experiment | p. 38 |
| General description | p. 39 |
| Scenario | p. 39 |
| Background | p. 40 |
| Script | p. 41 |
| The technology | p. 44 |
| Features | p. 44 |
| Security | p. 45 |
| Screenshots | p. 45 |
| Technical requirements | p. 46 |
| Results of the experiment | p. 47 |
| Usefulness | p. 48 |
| Realism | p. 48 |
| Technical secretary of the tribunal | p. 49 |
| Document presentation and application sharing | p. 50 |
| Uses and advantages | p. 50 |
| Assessing videoconferencing | p. 51 |
| Videoconferencing V. telephone conferencing | p. 51 |
| Videoconferencing V. in-person meetings | p. 52 |
| Videoconferencing V. e-mail or letter exchanges | p. 56 |
| Situations of use | p. 56 |
| Caveats | p. 59 |
| Technological insufficiencies and limitations | p. 60 |
| Technical breakdowns | p. 60 |
| Image quality | p. 61 |
| Camera view | p. 62 |
| Security, privacy, and confidentiality | p. 62 |
| Legal issues | p. 63 |
| Other uses of technology | p. 64 |
| Live notes | p. 64 |
| Online dispute resolution platforms as a standalone solution | p. 66 |
| Technologies of the future? 3D Shared virtual workspaces | p. 68 |
| What is a 3D shared virtual workplace? | p. 69 |
| Uses and advantages | p. 70 |
| Situations | p. 70 |
| Example - scenario | p. 70 |
| Enhanced virtualization: sharing visual information | p. 72 |
| Current practice at arbitration institutions | p. 75 |
| State of practice | p. 75 |
| AAA - WebFile | p. 76 |
| WIPO - ECAF | p. 85 |
| General IT facilities at WIPO | p. 85 |
| America's Cup arbitration and domain names dispute resolution | p. 92 |
| ICC - NetCase | p. 93 |
| Guidelines of the International Chamber of Commerce | p. 97 |
| Report on Special IT Requirements in International Arbitration | p. 98 |
| Guidelines on 'Using Technology to Resolve Business Disputes' | p. 100 |
| General procedures | p. 100 |
| Paperless files | p. 101 |
| Electronic communications | p. 102 |
| Written communications | p. 103 |
| Case management websites | p. 103 |
| Audioconferences | p. 104 |
| Videoconferences | p. 105 |
| Legal framework | p. 107 |
| Due process issues | p. 108 |
| The right to be heard | p. 108 |
| A reasonable opportunity to present the case | p. 108 |
| Real opportunities to present the case | p. 108 |
| Sufficient opportunities to present the case | p. 110 |
| Oral hearings | p. 111 |
| Adversary proceedings | p. 114 |
| Equal treatment | p. 116 |
| Judicial review of arbitral awards rendered after proceedings making use of IT | p. 118 |
| Enforcement of awards | p. 119 |
| Article V(1)(b) of the New York Convention | p. 119 |
| Article V(1)(d) of the New York Convention | p. 120 |
| Article V(2)(b) of the New York Convention | p. 121 |
| Confidentiality issues | p. 122 |
| Confidentiality by virtue of law | p. 124 |
| Confidentiality by virtue of the parties' agreement | p. 125 |
| Who is bound by the duty of confidentiality? | p. 126 |
| What information is confidential? | p. 127 |
| Practice guidelines | p. 131 |
| Frequent concerns and responses | p. 131 |
| Security | p. 132 |
| Interception | p. 133 |
| E-mail interception | p. 133 |
| Web-based transmissions interception | p. 137 |
| Intrusion | p. 139 |
| Authentication | p. 139 |
| Accounting | p. 141 |
| Infection | p. 142 |
| Viruses | p. 142 |
| Trojan horses | p. 144 |
| Breakdowns | p. 145 |
| Authentication | p. 148 |
| The issue | p. 149 |
| Solutions | p. 149 |
| Working habits | p. 151 |
| E-mailing | p. 153 |
| Sending e-mail | p. 153 |
| Receiving e-mail | p. 155 |
| Keeping track of hidden information: metadata | p. 156 |
| Encrypting and digitally signing e-mail | p. 158 |
| Private and confidential e-mails: encryption | p. 159 |
| Identifying the sender and verifying the authenticity of the text: digital signatures | p. 160 |
| Trusting digital signatures and key rings in general: linking ciphers to people | p. 161 |
| In practice: setting up encrypted and digitally-signed e-mail | p. 163 |
| E-mail clients | p. 163 |
| Webmails | p. 165 |
| Videoconferencing | p. 168 |
| To videoconference or not to videoconference | p. 168 |
| Setting up a videoconferencing session | p. 170 |
| Examples of videoconferencing software | p. 173 |
| ClickToMeet | p. 173 |
| Macromedia Breeze | p. 174 |
| Megameeting | p. 175 |
| iVisit | p. 176 |
| Earthlink videoconferencing software | p. 178 |
| Festoon | p. 178 |
| Windows NetMeeting | p. 180 |
| Defining a communications protocol | p. 181 |
| The use of IT: who decides, when and how? | p. 182 |
| Submissions (briefs, memorials, applications) and documentary evidence | p. 183 |
| Other communications | p. 184 |
| Hearings | p. 184 |
| Deliberations between arbitrators | p. 184 |
| Form and notification of the award | p. 185 |
| Drafting suggestions | p. 187 |
| Arbitration agreements | p. 187 |
| In general | p. 187 |
| Pre-dispute arbitration agreement | p. 188 |
| Post-dispute arbitration agreement | p. 188 |
| Procedural order | p. 189 |
| Comments | p. 189 |
| Sample procedural order | p. 190 |
| Initiation form | p. 198 |
| Comments | p. 198 |
| Sample initiation form | p. 200 |
| Incident form | p. 206 |
| Comments | p. 206 |
| Sample incident form | p. 208 |
| Checklists, reminders, and charts | p. 211 |
| Main tasks | p. 211 |
| E-mailing | p. 213 |
| Videoconferencing | p. 214 |
| General reminders | p. 214 |
| Videoconference or in-person meeting? | p. 214 |
| Preparing a videoconference | p. 215 |
| Charts for IT usage | p. 217 |
| Practical aspects | p. 217 |
| Advantages of technologies | p. 217 |
| General technical measures | p. 218 |
| Videoconferencing | p. 218 |
| Legal aspects | p. 220 |
| Due process at risk | p. 220 |
| Oral hearings | p. 220 |
| Confidentiality | p. 221 |
| Bibliography | p. 223 |
| List of figures | p. 233 |
| Index | p. 235 |
| About the Author | p. 241 |
| Table of Contents provided by Ingram. All Rights Reserved. |