internet law

What is in a network access agreement?

HomeBlogLegal insightsWhat is in a network access agreement?

by

reviewed by

Malcolm Burrows

Network access agreements are agreements between licenced carriers in which a carrier (First Carrier) gives another carrier (Second Carrier) access to its network, which the Second Carrier can then access to provide telecommunications services to end customers or other wholesale carriers.  Below we set out the key considerations, carriers need to cover in their network access agreements.

Routing

Carriers need freedom to re-route services as required.  It is important for the First Carrier to clearly state that the service does not include redundancy, particular wavelengths, particular equipment, assets or links or particular routing, unless specified in a service order, otherwise the First Carrier could be in breach of the agreement if it re-routes services between the points of interconnect or changes the equipment used to provide the service.   Likewise, carriers should not take on obligations to provide or utilise any specific configuration of assets, links or waveforms, network architecture, technology or related equipment, in providing the network services, unless agreed in a service order.

Faults and interruptions

Network access agreements should clearly provide that the First Carrier is not responsible for rectifying any fault in a service where the fault arises in or is caused by the Second Carrier’s network, equipment or facilities beyond the points of interconnect.

Acceptance testing

Where the network service is subject to acceptance testing, the criteria needs to be clearly set out in the order.  Where the Second Carrier does not give the First Carrier a certificate of acceptance or a notice of failure within a certain period of the service activation date, the agreement should state that the Second Carrier is deemed to have accepted the service.

Suspension

It is important that the First Carrier has the right to suspend its services to the Second Carrier if an upstream supplier terminates or suspends the underlying service.  There are two (2) broad approaches to addressing the risk of an upstream supplier cancelling the underlying service:

  • giving the First Carrier a broad suspension right; and
  • specifying more detailed scenarios where the First Carrier can suspend which more closely reflect upstream supplier’s rights to terminate or suspend.

Pass through charges

It is imperative that the First Carrier has the right to charge the Second Carrier additional amounts to cover events which cause the cost to provide the service increase, such as:

  • additional pass through charges directly imposed by an upstream supplier (including price increases, network extension costs, special and one-off charges);
  • to service, modify, repair or replace a service or any equipment, as a result of the Second Carrier’s breach of the agreement, failure of the Second Carrier’s equipment, or an act or omission of Second Carrier, Second Carrier’s personnel or an end user;
  • for installation or activation, if the information Second Carrier provides to determine the installation required is incomplete or inaccurate; and
  • for installation, maintenance and any other services that Second Carrier requests that the First Carrier provide outside normal business hours.

Network obligations – Second Carrier

The agreement should clearly state that the Second Carrier must ensure that its network and equipment is compatible with the First Carrier’s network and equipment, including all technical requirements set out in the Service Order, otherwise the service will not function properly.

 A prohibition on the Second Carrier Customer installing or connecting any equipment to the First Carrier’s network without first the First Carrier’s express written consent should be clearly stated, otherwise there is a risk that the equipment of the Second Carrier could interrupt, degrade or damage the First Carrier’s network and equipment which can cause service interruption to other carriers and end users.

Indemnity

It is important that the First Carrier is not faced with claims made by third parties against it arising from the acts or omissions of the Second Carrier.  To protect the First Carrier, the agreement should include an indemnity given by the Second Carrier against such claims.  The Second Carrier may request that the First Carrier give a reciprocal indemnity. 

 If the First Carrier considers this, the scope of such indemnity should be to the extent the liabilities of the Second Carrier has to third parties do not exceed the liability of the First Carrier to Second Carrier under the agreement For example, up to the designated cap with certain types of loss excluded, such as loss of profits.

Takeaways

Network access agreements require careful consideration to ensure carriers are not liable for any service interruption caused by upstream carriers or by its carrier customers.  A well-drafted network access agreement can avoid these scenarios and give the First Carrier freedom to re-route and suspend services as required and on-charge any pass-through costs.

Links and further references

Legislation

Telecommunications Act 1997 (Cth)

Further information about network access agreements

If you need advice on network access agreements, please feel free to contact me for a confidential and obligation free discussion.

Doyles Recommended TMT Lawyer 2024

Related insights about technology law

  • Federal parliament passes cyber security laws

    Federal parliament passes cyber security laws

    On 25 November 2024, the Australian Parliament passed a suite of legislation, collectively referred to by the Australian Government as the Cyber Security Legislative Package 2024.  The purported impetus for this legislation was a series of high-profile data breaches in 2022 and 2023.

    Read more …

  • Domain name disputes – a summary of the process

    Domain name disputes – a summary of the process

    A domain name is a string of text that maps to an alphanumeric IP address, enabling users to access websites through client-side software.[1]  Domains can be valuable business assets, and they frequently become the subject of disputes regarding the legitimacy of their registration among organisations with competing rights.

    Read more …

  • New OAIC guidance on Artificial Intelligence

    New OAIC guidance on Artificial Intelligence

    On 21 October 2024, the Office of the Australian Information Commissioner (OAIC) published two (2) new guides on artificial intelligence (AI), purportedly in effort to make privacy compliance easier for business.

    Read more …

  • Artificial Intelligence defined – why no uniform approach?

    Artificial Intelligence defined – why no uniform approach?

    Artificial Intelligence (AI) is commonly thought of as the capacity of computer systems to execute tasks that usually need human intelligence, such as learning, reasoning, and making decisions.[1]  It covers a range of specialised fields, each focusing on different functions.  For example, machine learning allows computers to learn from data, computer vision enables them to…

    Read more …

  • New USPTO guidelines on AI assisted inventions

    New USPTO guidelines on AI assisted inventions

    In response to the Biden administration’s Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence on 30 October 2023, which outlined policies and principles to promote responsible Artificial Intelligence innovation and competition, the United States Patent and Trademark Office (USPTO) issued inventorship guidance for artificial intelligence (AI) assisted inventions.  These…

    Read more …

  • Software developer obtains Court order – names behind IP addresses

    Software developer obtains Court order – names behind IP addresses

    Justice Burley of the Federal Court of Australia in the case of Siemens Industry Software Inc v Telstra Corporation Limited [2020] FCA 901 ordered that Telstra, within fourteen (14) days, provide to Siemens all documents in its control relating to the identity of certain Telstra Account holders.  Those account holders were suspected by Siemens of…

    Read more …

  • The Digital ID Bill 2023 (Cth)

    The Digital ID Bill 2023 (Cth)

    On 30 November 2023, the Digital ID Bill 2023 (Cth) and the Digital ID (Transitional and Consequential Provisions) Bill 2023 (Digital ID Bills) were introduced in the Australian Senate.  Digital IDs are designed to provide individuals with a convenient way to verify their identity when completing certain online transactions and dealing with government and certain…

    Read more …

  • What are adequate cyber security measures?

    What are adequate cyber security measures?

    The adequacy of cyber security measures was considered in the case of Australian Securities and Investments Commission v RI Advice Group Pty Ltd [2022] FCA 496 (ASIC v Ri Advice Group).  One of the issues raised was whether the respondent had adequate cyber security and cyber resilience in place across its network of financial advisors. …

    Read more …

  • National Classification Scheme – proposed federal reforms

    National Classification Scheme – proposed federal reforms

    Albanese Government announces intention to reform National Classification Scheme, proposing R18+ for games simulating gambling and M for computer games with paid loot boxes/in-game purchases linked to chance. Learn more about proposed reforms and if simulated gambling needs to be addressed.

    Read more …


Posted

in

,
Send this to a friend