internet law

Dark fibre agreements for telcos

HomeBlogLegal insightsDark fibre agreements for telcos

by

reviewed by

Malcolm Burrows

Dark fibre refers to access to ‘unlit’ (unused) telecommunications fibre.  Generally, large telecommunications carriers and government utilities (Supplier) have dark fibre networks laid out that can be available to carriage service providers (CSPs) to access to scale up their network.  Below we set out key elements of dark fibre and corresponding issues in telecommunications service agreements between CSPs and their business end users (End User).

Layer 2 or layer 3 ethernet compared dark fibre

Dark fibre exists in certain areas because Carriers have laid out more fibre optic infrastructure than needed.  The physical cables are then able to support CSPs who want their own connections.  In comparison, layer 2 or layer 3 ethernet service is used on a leased bandwidth basis.  The network is already activated and the CSP is not generally managing the connection or equipment.

Benefits of dark fibre

Dark fibre has many benefits, including:

  • Giving CSPs full control and freedom over their network, equipment and connection settings. The CSP can implement the type of transmission technology, protocols and features of the network and is a way of CSPs ‘building’ their own network with control over how it works, as the service won’t be shared with others;
  • Dark fibre also allows CSPs to upscale to suit the CSPs’ changing business needs. Consequently, data and speed capacities are only limited by the equipment the CSP uses over the dark fibre network;
  • Point-to-point connections are more reliable as they bypass the carriers core network routing and switching;
  • With linked point-to-point networks, data is highly secure and does not enter the public internet and the CSP can specify the security protocol and standards, including encryption standards and settings; and
  • Creating a network without buying the infrastructure.

Access to dark fibre

Access to dark fibre is a service with the underlying fibre-optic infrastructure leased or purchased from a Supplier.

Therefore, it is important to frame the licence granted to the End User to use the dark fibre service component.  End Users should ensure that that the licence gives them an exclusive licence to use a dark fibre circuit between two end points.  This ensures that the circuit is not shared and traffic impairment and latency is minimised.

Often Suppliers and CSP’s will allocate the fibre optic cores to be used in circuits on the condition that they have the discretion to modify, substitute, replace or relocate the path of the cores.  This can potentially cause service disruption for the End User, so the End User should ensure that advance notice of the change is given in order that the End User may make any required network changes.  The End User should also ensure that any change to the path of the cores can only be done if the standard of service is not materially reduced.

Service Levels

Service levels for dark fibre access provided by Supplier’s must be clearly stated, such as committed service availability and resolution times.  Service levels for a single path may be, say, 99.95%, however the End User should expect that service levels for the service which consists of multiple paths with complete physical separation should be higher, say 99.999%.

As dark fibre agreements are B2B, the End User should insist on service credits for failure to reach the service level availability target on a sliding scale dependent on the length of downtime.  In this sector, a significant downtime of, say, 4 hours in month with an availability of <99.5%, should carry with it a substantial service credit of around 50%.

From the Supplier’s perspective, it should exclude specified events from the calculation of service availability time, such as force majeure, failure of the End User’s equipment, planned maintenance, failure of third party upstream Suppliers and any permitted service suspension rights the CSP has.

Liability

CSPs should insist that the payment of any service credits is sole and exclusive remedy of the End User and exclude liability for any loss of profits, loss of business, loss of data incurred by the End User arising from the failure to achieve the service levels or provide the services.

Security and viruses

CSPs should clearly state that they do not have complete control over the security or content of data passing over the network and any systems operated by third parties.

Further, the CSP should clearly state that any property damage suffered by the End User, say damage to the End User equipment arising from a network virus, is limited and falls under the general liability cap.

Takeaways

Using dark fibre to provide a telecommunications service has many benefits, particularly around scalability, network control and reducing infrastructure spend, however Suppliers still need to ensure that there End User agreements limit their liability and risk exposure.

Links and further references

Legislation

Telecommunications Act 1997 (Cth)

Further information about dark fibre agreements for telcos

If you need advice on Carrier to CSP dark fibre access agreements or CSP to End User telecommunications service agreements, please feel free to contact me for a confidential and obligation free discussion.

Doyles Recommended TMT Lawyer 2024

Related insights for telecommunication service providers

  • Federal parliament passes cyber security laws

    Federal parliament passes cyber security laws

    On 25 November 2024, the Australian Parliament passed a suite of legislation, collectively referred to by the Australian Government as the Cyber Security Legislative Package 2024.  The purported impetus for this legislation was a series of high-profile data breaches in 2022 and 2023.

    Read more …

  • Domain name disputes – a summary of the process

    Domain name disputes – a summary of the process

    A domain name is a string of text that maps to an alphanumeric IP address, enabling users to access websites through client-side software.[1]  Domains can be valuable business assets, and they frequently become the subject of disputes regarding the legitimacy of their registration among organisations with competing rights.

    Read more …

  • New OAIC guidance on Artificial Intelligence

    New OAIC guidance on Artificial Intelligence

    On 21 October 2024, the Office of the Australian Information Commissioner (OAIC) published two (2) new guides on artificial intelligence (AI), purportedly in effort to make privacy compliance easier for business.

    Read more …

  • Artificial Intelligence defined – why no uniform approach?

    Artificial Intelligence defined – why no uniform approach?

    Artificial Intelligence (AI) is commonly thought of as the capacity of computer systems to execute tasks that usually need human intelligence, such as learning, reasoning, and making decisions.[1]  It covers a range of specialised fields, each focusing on different functions.  For example, machine learning allows computers to learn from data, computer vision enables them to…

    Read more …

  • New USPTO guidelines on AI assisted inventions

    New USPTO guidelines on AI assisted inventions

    In response to the Biden administration’s Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence on 30 October 2023, which outlined policies and principles to promote responsible Artificial Intelligence innovation and competition, the United States Patent and Trademark Office (USPTO) issued inventorship guidance for artificial intelligence (AI) assisted inventions.  These…

    Read more …

  • Software developer obtains Court order – names behind IP addresses

    Software developer obtains Court order – names behind IP addresses

    Justice Burley of the Federal Court of Australia in the case of Siemens Industry Software Inc v Telstra Corporation Limited [2020] FCA 901 ordered that Telstra, within fourteen (14) days, provide to Siemens all documents in its control relating to the identity of certain Telstra Account holders.  Those account holders were suspected by Siemens of…

    Read more …

  • The Digital ID Bill 2023 (Cth)

    The Digital ID Bill 2023 (Cth)

    On 30 November 2023, the Digital ID Bill 2023 (Cth) and the Digital ID (Transitional and Consequential Provisions) Bill 2023 (Digital ID Bills) were introduced in the Australian Senate.  Digital IDs are designed to provide individuals with a convenient way to verify their identity when completing certain online transactions and dealing with government and certain…

    Read more …

  • What are adequate cyber security measures?

    What are adequate cyber security measures?

    The adequacy of cyber security measures was considered in the case of Australian Securities and Investments Commission v RI Advice Group Pty Ltd [2022] FCA 496 (ASIC v Ri Advice Group).  One of the issues raised was whether the respondent had adequate cyber security and cyber resilience in place across its network of financial advisors. …

    Read more …

  • National Classification Scheme – proposed federal reforms

    National Classification Scheme – proposed federal reforms

    Albanese Government announces intention to reform National Classification Scheme, proposing R18+ for games simulating gambling and M for computer games with paid loot boxes/in-game purchases linked to chance. Learn more about proposed reforms and if simulated gambling needs to be addressed.

    Read more …


Posted

in

,
Send this to a friend