Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 69

Full-Text Articles in Law

Hidden Contracts, Shmuel I. Becher, Uri Benoliel Dec 2023

Hidden Contracts, Shmuel I. Becher, Uri Benoliel

BYU Law Review

Transparency is a promising means for enhancing democratic values, countering corruption, and reducing power abuse. Nonetheless, the potential of transparency in the domain of consumer contracts is untapped. This Article suggests utilizing the power of transparency to increase consumer access to justice, better distribute technological gains between businesses and consumers, and deter sellers from breaching their consumer contracts while exploiting consumers’ inferior position.

In doing so, this Article focuses on what we dub “Hidden Contracts.” Part I conceptualizes the idea of hidden contracts. It first defines hidden contracts as consumer form contracts that firms unilaterally modify and subsequently remove from …


Byte A Carrot For Change: Uprooting Problems In Data Privacy Regulations, Sarah Terry Dec 2023

Byte A Carrot For Change: Uprooting Problems In Data Privacy Regulations, Sarah Terry

BYU Law Review

There is a growing gap between technology advancement and a lagging regulatory system. This is particularly problematic in consumer data privacy regulating. Companies hold collected consumer data and determine its use largely without accountability. As a result, ethical questions that carry society-shaping impact are answered in-house, under the influence of groupthink, and are withheld from anyone else weighing in.

This Note poses a solution that would address multiple data privacy regulation issues. Namely, an incentive approach would help even out the information-imbalanced system. Incentives are used as tools throughout intellectual property law to foster commercial progress, discourage trade secrets, and …


Updating The Berne Convention For The Internet Age: Un-Blurring The Line Between United States And Foreign Copyrighted Works, Ethan Schow Oct 2023

Updating The Berne Convention For The Internet Age: Un-Blurring The Line Between United States And Foreign Copyrighted Works, Ethan Schow

Brigham Young University Journal of Public Law

John Naughton, notable journalist and academic, has asserted that “[common sense] should also revolt at the idea that doctrines about copyright that were shaped in a pre-Internet age should apply to a post-Internet one.” And yet, in crucial aspects of international law, this is the situation in which the world finds itself today. The Berne Convention for the Protection of Literary and Artistic Works (the “Berne Convention” or the “Convention”) is one of the most important multinational agreements concerned with copyright law, but it has not been amended since September 28, 1979. Although the internet technically existed in an early …


Instigator And Proxy Liability In The Context Of Information Operations, Carolyn Sharp Sep 2023

Instigator And Proxy Liability In The Context Of Information Operations, Carolyn Sharp

Brigham Young University Journal of Public Law

No abstract provided.


The Internet Immunity Escape Hatch, Gregory M. Dickinson Jun 2022

The Internet Immunity Escape Hatch, Gregory M. Dickinson

BYU Law Review

Internet immunity doctrine is broken, and Congress is helpless. Under Section 230 of the Communications Decency Act of 1996, online entities are absolutely immune from lawsuits related to content authored by third parties. The law has been essential to the internet’s development over the last twenty years, but it has not kept pace with the times and is now deeply flawed. Democrats demand accountability for online misinformation. Republicans decry politically motivated censorship. And all have come together to criticize Section 230’s protection of bad-actor websites. The law’s defects have put it at the center of public debate, with more than …


Intellectual Property In E-Commerce Retail Arbitrage: An Analysis Of The Legality Of Using Intellectual Property In Drop-Shipping, Kara J. Bloomer Jun 2022

Intellectual Property In E-Commerce Retail Arbitrage: An Analysis Of The Legality Of Using Intellectual Property In Drop-Shipping, Kara J. Bloomer

BYU Law Review

No abstract provided.


Moderating From Nowhere, Gilad Abiri May 2022

Moderating From Nowhere, Gilad Abiri

BYU Law Review

We are living in the midst of a battle over online hate speech regulation, and the stakes could not be higher. Hate speech not only harms its intended victims, be they individuals or groups, but it also polarizes and divides society in ways that undermine the health of democratic regimes. While there is widespread agreement that the current situation of online discourse is untenable, scholars and policymakers are deeply divided on the best way to improve it.

Until recently, American free speech norms have dominated the content moderation policies of digital media platforms. First Amendment norms are extremely resistant to …


Cybersecurity Spillovers, Mark Verstraete, Tal Zarsky May 2022

Cybersecurity Spillovers, Mark Verstraete, Tal Zarsky

BYU Law Review

This Article identifies and analyzes a previously unrecognized source of positive externalities within cybersecurity, which we term "cybersecurity spillovers". Most commentators have focused on negative externalities and market failures, leading to a pervasive pessimism about the possibility of adequate cybersecurity protections. In response, this Article demonstrates that unique dynamics from the world of cloud computing – most notably, indivisibility – may force cloud service firms to generate spillovers. These spillovers are additional security protections provided to common cloud users: clients who may not have been willing or able to acquire these security services otherwise. Furthermore, this additional source of security …


Conflict Of Laws For The Age Of Cybertorts: A Game Theoretic Study Of Corporate Profiteering From Choice Of Law Loopholes And Interstate Torts, Yunsieg P. Kim Mar 2021

Conflict Of Laws For The Age Of Cybertorts: A Game Theoretic Study Of Corporate Profiteering From Choice Of Law Loopholes And Interstate Torts, Yunsieg P. Kim

BYU Law Review

This Article identifies a choice of law loophole that corporations can exploit to commit interstate torts against individuals without paying damages by inducing victims to sue in a state where they are guaranteed to lose. The Second Restatement effectively requires plaintiffs bringing interstate tort claims to allege which state has the most significant relationship to their injury, because most federal courts rely on plaintiffs allegations to choose a state law for the purpose of resolving motions to dismiss. However, when torts are committed over state lines (for example, over the internet), plaintiffs can be misinformed or misled as to where …


Reputation Systems Bias In The Platform Workplace, E. Gary Spitko Aug 2020

Reputation Systems Bias In The Platform Workplace, E. Gary Spitko

BYU Law Review

Online reputation systems enable the providers and consumers of a product or service to rate one another and allow others to rely upon those reputation scores in deciding whether to engage with a particular provider or consumer. Reputation systems are an intrinsic feature of the platform workplace, in which a platform operator, such as Uber or TaskRabbit, intermediates between the provider of a service and the consumer of that service. Operators typically rely upon consumer ratings of providers in rewarding and penalizing providers. Thus, these reputation systems allow an operator to achieve enormous scale while maintaining quality control and user …


Copyright’S Memory Hole, Eric Goldman, Jessica Silbey Aug 2020

Copyright’S Memory Hole, Eric Goldman, Jessica Silbey

BYU Law Review

There is growing interest in using copyright to protect the privacy and reputation of people depicted in copyrighted works. This pressure is driven by heightened concerns about privacy and reputation on the Internet, plus copyright’s plaintiff-favorable attributes compared to traditional privacy and reputation torts.

The Constitution authorizes copyright law because its exclusive rights benefit society by increasing our knowledge. But copyright law is being misdeployed by suppressing socially valuable works in a counterproductive attempt to advance privacy and reputation interests. This results in “memory holes” in society’s knowledge, analogous to those discussed in George Orwell’s dystopian novel 1984.

This Article …


“My Computer Is My Castle”: New Privacy Frameworks To Regulate Police Hacking, Ivan Škorvánek, Bert-Jaap Koops, Bryce Clayton Newell, Andrew Roberts Aug 2020

“My Computer Is My Castle”: New Privacy Frameworks To Regulate Police Hacking, Ivan Škorvánek, Bert-Jaap Koops, Bryce Clayton Newell, Andrew Roberts

BYU Law Review

Several countries have recently introduced laws allowing the police to hack into suspects’ computers. Legislators recognize that police hacking is highly intrusive to personal privacy but consider it justified by the increased use of encryption and mobile computing—both of which challenge traditional investigative methods. Police hacking also exemplifies a major challenge to the way legal systems deal with, and conceptualize, privacy. Existing conceptualizations of privacy and privacy rights do not always adequately address the types and degrees of intrusion into individuals’ private lives that police hacking powers enable.

Traditional privacy pillars such as the home and secrecy of communications do …


Kill Me Through The Phone: The Legality Of Encouraging Suicide In An Increasingly Digital World, Sierra Taylor Feb 2020

Kill Me Through The Phone: The Legality Of Encouraging Suicide In An Increasingly Digital World, Sierra Taylor

BYU Law Review

No abstract provided.


Saving The Internet: Why Regulating Broadband Providers Can Keep The Internet Open, Emma N. Cano Mar 2016

Saving The Internet: Why Regulating Broadband Providers Can Keep The Internet Open, Emma N. Cano

BYU Law Review

No abstract provided.


Upping The Ante: Rethinking Anti-Slapp Laws In The Age Of The Internet, Andrew L. Roth Mar 2016

Upping The Ante: Rethinking Anti-Slapp Laws In The Age Of The Internet, Andrew L. Roth

BYU Law Review

No abstract provided.


Establishing Russia's Responsibility For Cyber-Crime Based On Its Hacker Culture, Trevor Mcdougal Aug 2015

Establishing Russia's Responsibility For Cyber-Crime Based On Its Hacker Culture, Trevor Mcdougal

Brigham Young University International Law & Management Review

No abstract provided.


Cybercrime And Punishment: The Russian Mafia And Russian Responsibility To Exercise Due Diligence To Prevent Trans-Boundary Cybercrime, Daniel Ortner Feb 2015

Cybercrime And Punishment: The Russian Mafia And Russian Responsibility To Exercise Due Diligence To Prevent Trans-Boundary Cybercrime, Daniel Ortner

BYU Law Review

No abstract provided.


Cyber Sovereignty: The Way Ahead, Eric Talbot Jensen Dec 2014

Cyber Sovereignty: The Way Ahead, Eric Talbot Jensen

Faculty Scholarship

The last few years are full of reports of cyber incidents, some of which have caused significant damage. Each of these cyber events raise important questions about the role and responsibility of States with respect to cyber incidents. The answer to these questions revolves in large part around the international law doctrine of sovereignty. The extent to which nations exercise sovereignty over cyberspace and cyber infrastructure will provide key answers to how much control States must exercise and how much responsibility States must accept for harmful cyber activities when they fail to adequately do so. This article argues that States …


Off-Campus Cyberbullying: First Amendment Problems, Parameters, And Proposal, David R. Hostetler Mar 2014

Off-Campus Cyberbullying: First Amendment Problems, Parameters, And Proposal, David R. Hostetler

Brigham Young University Education and Law Journal

No abstract provided.


A Trade-Off That Becomes A Rip-Off: When Schools Can't Regulate Cyberbullying, Stacie A. Stewart Feb 2014

A Trade-Off That Becomes A Rip-Off: When Schools Can't Regulate Cyberbullying, Stacie A. Stewart

BYU Law Review

No abstract provided.


Defamation Is More Than Just A Tort: A New Constitutional Standard For Internet Student Speech, Reesa Miles Mar 2013

Defamation Is More Than Just A Tort: A New Constitutional Standard For Internet Student Speech, Reesa Miles

Brigham Young University Education and Law Journal

No abstract provided.


Not Lol: Legal Issues Encountered During One High School's Response To Sexting, R. Stewart Mayers Ph.D., Mike F. Desiderio Ph.D. Mar 2013

Not Lol: Legal Issues Encountered During One High School's Response To Sexting, R. Stewart Mayers Ph.D., Mike F. Desiderio Ph.D.

Brigham Young University Education and Law Journal

No abstract provided.


A Case For The Public Domain, Clark Asay Feb 2013

A Case For The Public Domain, Clark Asay

Faculty Scholarship

Over the past several decades open license movements have proven highly successful in the software and content worlds. Such movements rely in part on the belief that greater freedom of use triggers innovative activity that is superior to what a restrictive IP approach produces. Ironically, such open license movements also rely on IP rights to promote their vision of freedom and openness. They do so through IP licenses that, while granting significant freedoms, also impose certain conditions on users such as the “copyleft” requirement in the software world. Such movements rely on this IP-based approach due to fears that, without …


Cyber Deterrence, Eric Talbot Jensen Dec 2012

Cyber Deterrence, Eric Talbot Jensen

Faculty Scholarship

Cyber operations by both state actors and non-state actors are increasing in frequency and severity. As nations struggle to defend their networks and infrastructure, their ability to apply the principles of deterrence to cyber activities correspondingly increases in importance. Cyber deterrence offers much more flexibility and increased options from traditional deterrence methodologies developed in the Cold War’s nuclear age. In addition to traditional retaliation, cyber deterrence includes options such as taking legal action; and making networks invisible, resilient, and interdependent. It also presents new ways to view and apply accepted methodologies such as invulnerability. As the U.S. continues to develop …


Digitally Unknown: Why The Ninth Circuit Should Wish To Remain Anonymous In In Re Anonymous Online Speakers, Brandon T. Crowther May 2012

Digitally Unknown: Why The Ninth Circuit Should Wish To Remain Anonymous In In Re Anonymous Online Speakers, Brandon T. Crowther

BYU Law Review

No abstract provided.


Searching For A Trademarks Test: The Ninth Circuit’S Query In Network Automation, R. Gregory Israelsen May 2012

Searching For A Trademarks Test: The Ninth Circuit’S Query In Network Automation, R. Gregory Israelsen

BYU Law Review

No abstract provided.


Can Students Be Disciplined For Off-Campus Cyberspeech?: The Reach Of The First Amendment In The Age Of Technology, Allan G. Osborne Jr., Charles J. Russo Mar 2012

Can Students Be Disciplined For Off-Campus Cyberspeech?: The Reach Of The First Amendment In The Age Of Technology, Allan G. Osborne Jr., Charles J. Russo

Brigham Young University Education and Law Journal

No abstract provided.


(Un)Reasonable Expectation Of Digital Privacy, Brandon T. Crowther Mar 2012

(Un)Reasonable Expectation Of Digital Privacy, Brandon T. Crowther

BYU Law Review

No abstract provided.


Unwrapping Shrinkwraps, Clickwraps, And Browsewraps: How The Law Went Wrong From Horse Traders To The Law Of The Horse, Cheryl B. Preston, Eli W. Mccann Mar 2012

Unwrapping Shrinkwraps, Clickwraps, And Browsewraps: How The Law Went Wrong From Horse Traders To The Law Of The Horse, Cheryl B. Preston, Eli W. Mccann

Brigham Young University Journal of Public Law

This Article starts with the famous "horse trades" (typically between A and B and for 10£) from early discussions of contract law, and proceeds through Judge Burrough's enduring "unruly horse" and Karl Llewellyn's Across Sales on Horseback and The First Struggle to Unhorse Wares, to provide background for a critique of the recent judicial liberality in enforcing online contracts. We then focus on role of Judge Frank Easterbrook, who has personally insulted the place of the horse in law, and his infamous opinion in ProCD v. Zeidenberg. This case fueled the enforcement of clickwrap and browsewrap contracts by decaying assent …


President Obama And The Changing Cyber Paradigm, Eric Talbot Jensen Dec 2011

President Obama And The Changing Cyber Paradigm, Eric Talbot Jensen

Faculty Scholarship

Among the most important issues for American National Security is the national response to the growing threat from cyber activities. This threat is both ubiquitous and potentially catastrophic as recently demonstrated by both the recent decision by the UK to prioritize cyber capabilities over putting in service an air-capable aircraft carrier and the targeted effectiveness of the STUXNET worm. The evolving cyber paradigm will force the United States to reevaluate the way in which it thinks of both national security and the concept of armed conflict. To combat this threat, President Obama must refocus America’s attention, by both reallocating the …