Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 30 of 38
Full-Text Articles in Law
Byte A Carrot For Change: Uprooting Problems In Data Privacy Regulations, Sarah Terry
Byte A Carrot For Change: Uprooting Problems In Data Privacy Regulations, Sarah Terry
BYU Law Review
There is a growing gap between technology advancement and a lagging regulatory system. This is particularly problematic in consumer data privacy regulating. Companies hold collected consumer data and determine its use largely without accountability. As a result, ethical questions that carry society-shaping impact are answered in-house, under the influence of groupthink, and are withheld from anyone else weighing in.
This Note poses a solution that would address multiple data privacy regulation issues. Namely, an incentive approach would help even out the information-imbalanced system. Incentives are used as tools throughout intellectual property law to foster commercial progress, discourage trade secrets, and …
Hidden Contracts, Shmuel I. Becher, Uri Benoliel
Hidden Contracts, Shmuel I. Becher, Uri Benoliel
BYU Law Review
Transparency is a promising means for enhancing democratic values, countering corruption, and reducing power abuse. Nonetheless, the potential of transparency in the domain of consumer contracts is untapped. This Article suggests utilizing the power of transparency to increase consumer access to justice, better distribute technological gains between businesses and consumers, and deter sellers from breaching their consumer contracts while exploiting consumers’ inferior position.
In doing so, this Article focuses on what we dub “Hidden Contracts.” Part I conceptualizes the idea of hidden contracts. It first defines hidden contracts as consumer form contracts that firms unilaterally modify and subsequently remove from …
The Internet Immunity Escape Hatch, Gregory M. Dickinson
The Internet Immunity Escape Hatch, Gregory M. Dickinson
BYU Law Review
Internet immunity doctrine is broken, and Congress is helpless. Under Section 230 of the Communications Decency Act of 1996, online entities are absolutely immune from lawsuits related to content authored by third parties. The law has been essential to the internet’s development over the last twenty years, but it has not kept pace with the times and is now deeply flawed. Democrats demand accountability for online misinformation. Republicans decry politically motivated censorship. And all have come together to criticize Section 230’s protection of bad-actor websites. The law’s defects have put it at the center of public debate, with more than …
Intellectual Property In E-Commerce Retail Arbitrage: An Analysis Of The Legality Of Using Intellectual Property In Drop-Shipping, Kara J. Bloomer
Intellectual Property In E-Commerce Retail Arbitrage: An Analysis Of The Legality Of Using Intellectual Property In Drop-Shipping, Kara J. Bloomer
BYU Law Review
No abstract provided.
Moderating From Nowhere, Gilad Abiri
Moderating From Nowhere, Gilad Abiri
BYU Law Review
We are living in the midst of a battle over online hate speech regulation, and the stakes could not be higher. Hate speech not only harms its intended victims, be they individuals or groups, but it also polarizes and divides society in ways that undermine the health of democratic regimes. While there is widespread agreement that the current situation of online discourse is untenable, scholars and policymakers are deeply divided on the best way to improve it.
Until recently, American free speech norms have dominated the content moderation policies of digital media platforms. First Amendment norms are extremely resistant to …
Cybersecurity Spillovers, Mark Verstraete, Tal Zarsky
Cybersecurity Spillovers, Mark Verstraete, Tal Zarsky
BYU Law Review
This Article identifies and analyzes a previously unrecognized source of positive externalities within cybersecurity, which we term "cybersecurity spillovers". Most commentators have focused on negative externalities and market failures, leading to a pervasive pessimism about the possibility of adequate cybersecurity protections. In response, this Article demonstrates that unique dynamics from the world of cloud computing – most notably, indivisibility – may force cloud service firms to generate spillovers. These spillovers are additional security protections provided to common cloud users: clients who may not have been willing or able to acquire these security services otherwise. Furthermore, this additional source of security …
Conflict Of Laws For The Age Of Cybertorts: A Game Theoretic Study Of Corporate Profiteering From Choice Of Law Loopholes And Interstate Torts, Yunsieg P. Kim
Conflict Of Laws For The Age Of Cybertorts: A Game Theoretic Study Of Corporate Profiteering From Choice Of Law Loopholes And Interstate Torts, Yunsieg P. Kim
BYU Law Review
This Article identifies a choice of law loophole that corporations can exploit to commit interstate torts against individuals without paying damages by inducing victims to sue in a state where they are guaranteed to lose. The Second Restatement effectively requires plaintiffs bringing interstate tort claims to allege which state has the most significant relationship to their injury, because most federal courts rely on plaintiffs allegations to choose a state law for the purpose of resolving motions to dismiss. However, when torts are committed over state lines (for example, over the internet), plaintiffs can be misinformed or misled as to where …
Reputation Systems Bias In The Platform Workplace, E. Gary Spitko
Reputation Systems Bias In The Platform Workplace, E. Gary Spitko
BYU Law Review
Online reputation systems enable the providers and consumers of a product or service to rate one another and allow others to rely upon those reputation scores in deciding whether to engage with a particular provider or consumer. Reputation systems are an intrinsic feature of the platform workplace, in which a platform operator, such as Uber or TaskRabbit, intermediates between the provider of a service and the consumer of that service. Operators typically rely upon consumer ratings of providers in rewarding and penalizing providers. Thus, these reputation systems allow an operator to achieve enormous scale while maintaining quality control and user …
Copyright’S Memory Hole, Eric Goldman, Jessica Silbey
Copyright’S Memory Hole, Eric Goldman, Jessica Silbey
BYU Law Review
There is growing interest in using copyright to protect the privacy and reputation of people depicted in copyrighted works. This pressure is driven by heightened concerns about privacy and reputation on the Internet, plus copyright’s plaintiff-favorable attributes compared to traditional privacy and reputation torts.
The Constitution authorizes copyright law because its exclusive rights benefit society by increasing our knowledge. But copyright law is being misdeployed by suppressing socially valuable works in a counterproductive attempt to advance privacy and reputation interests. This results in “memory holes” in society’s knowledge, analogous to those discussed in George Orwell’s dystopian novel 1984.
This Article …
“My Computer Is My Castle”: New Privacy Frameworks To Regulate Police Hacking, Ivan Škorvánek, Bert-Jaap Koops, Bryce Clayton Newell, Andrew Roberts
“My Computer Is My Castle”: New Privacy Frameworks To Regulate Police Hacking, Ivan Škorvánek, Bert-Jaap Koops, Bryce Clayton Newell, Andrew Roberts
BYU Law Review
Several countries have recently introduced laws allowing the police to hack into suspects’ computers. Legislators recognize that police hacking is highly intrusive to personal privacy but consider it justified by the increased use of encryption and mobile computing—both of which challenge traditional investigative methods. Police hacking also exemplifies a major challenge to the way legal systems deal with, and conceptualize, privacy. Existing conceptualizations of privacy and privacy rights do not always adequately address the types and degrees of intrusion into individuals’ private lives that police hacking powers enable.
Traditional privacy pillars such as the home and secrecy of communications do …
Kill Me Through The Phone: The Legality Of Encouraging Suicide In An Increasingly Digital World, Sierra Taylor
Kill Me Through The Phone: The Legality Of Encouraging Suicide In An Increasingly Digital World, Sierra Taylor
BYU Law Review
No abstract provided.
Saving The Internet: Why Regulating Broadband Providers Can Keep The Internet Open, Emma N. Cano
Saving The Internet: Why Regulating Broadband Providers Can Keep The Internet Open, Emma N. Cano
BYU Law Review
No abstract provided.
Upping The Ante: Rethinking Anti-Slapp Laws In The Age Of The Internet, Andrew L. Roth
Upping The Ante: Rethinking Anti-Slapp Laws In The Age Of The Internet, Andrew L. Roth
BYU Law Review
No abstract provided.
Cybercrime And Punishment: The Russian Mafia And Russian Responsibility To Exercise Due Diligence To Prevent Trans-Boundary Cybercrime, Daniel Ortner
Cybercrime And Punishment: The Russian Mafia And Russian Responsibility To Exercise Due Diligence To Prevent Trans-Boundary Cybercrime, Daniel Ortner
BYU Law Review
No abstract provided.
A Trade-Off That Becomes A Rip-Off: When Schools Can't Regulate Cyberbullying, Stacie A. Stewart
A Trade-Off That Becomes A Rip-Off: When Schools Can't Regulate Cyberbullying, Stacie A. Stewart
BYU Law Review
No abstract provided.
Searching For A Trademarks Test: The Ninth Circuit’S Query In Network Automation, R. Gregory Israelsen
Searching For A Trademarks Test: The Ninth Circuit’S Query In Network Automation, R. Gregory Israelsen
BYU Law Review
No abstract provided.
Digitally Unknown: Why The Ninth Circuit Should Wish To Remain Anonymous In In Re Anonymous Online Speakers, Brandon T. Crowther
Digitally Unknown: Why The Ninth Circuit Should Wish To Remain Anonymous In In Re Anonymous Online Speakers, Brandon T. Crowther
BYU Law Review
No abstract provided.
(Un)Reasonable Expectation Of Digital Privacy, Brandon T. Crowther
(Un)Reasonable Expectation Of Digital Privacy, Brandon T. Crowther
BYU Law Review
No abstract provided.
Adverse Publicity By Administrative Agencies In The Internet Era, Nathan Cortez
Adverse Publicity By Administrative Agencies In The Internet Era, Nathan Cortez
BYU Law Review
Nearly forty years ago, Ernest Gellhorn documented the potentially devastating impact that can occur when federal agencies issue adverse publicity about private parties. Based on his article, the Administrative Conference of the United States recommended that courts, Congress, and agencies hold agencies to clear standards for issuing such publicity. In the decades since, some agencies have adopted standards, but most have not, and neither the courts nor Congress has intervened to impose standards. Today, agencies continue to use countless forms of publicity to pressure alleged regulatory violators and to amplify their overall enforcement powers—all without affording due process or other …
Www.Sam·S_Stationery_And_Luncheonette.Com: Bringing Ginsberg V. New York Into The Internet Age, John Fee
Www.Sam·S_Stationery_And_Luncheonette.Com: Bringing Ginsberg V. New York Into The Internet Age, John Fee
BYU Law Review
No abstract provided.
Technology And Pornography, Arnold H. Loewy
A New First Amendment Model For Evaluating Content-Based Regulation Ofinternet Pornography: Revising The Strict Scrutiny Model To Better Reflect The Realities Of The Modern Media Age, Mark S. Kende
BYU Law Review
No abstract provided.
Introduction To The 2007 Byu Law Review Symposium: Warning! Kids Online: Pornography, Free Speech, And Technology, Cheryl B. Preston
Introduction To The 2007 Byu Law Review Symposium: Warning! Kids Online: Pornography, Free Speech, And Technology, Cheryl B. Preston
BYU Law Review
No abstract provided.
Zoning The Internet: A New Approach To Protecting Children Online, Cheryl B. Preston
Zoning The Internet: A New Approach To Protecting Children Online, Cheryl B. Preston
BYU Law Review
This Article considers how Internet architecture can be harnessed to create an online environment where government regulation of material harmful to minors can be effective but not unreasonably burdensome. It proposes a solution that engages technology in refocusing the point of regulation, thereby reducing the burden on speech and increasing the ability to achieve constitutionally recognized governmental objectives. This Article briefly examines failed congressional attempts to restrict children's access to sexually explicit content online, and then introduces the Internet Community Ports Concept, which relies on channeling technology to divide kinds of content among various Internet ports. After briefly outlining the …
Making Family-Friendly Internet A Reality: The Internet Community Ports Act, Dawn C. Nunziato
Making Family-Friendly Internet A Reality: The Internet Community Ports Act, Dawn C. Nunziato
BYU Law Review
No abstract provided.
Regulating Internet Pornography Aimed At Children: A Comparative Constitutional Perspective On Passing The Camel Through The Needle's Eye, Kevin W. Saunders
Regulating Internet Pornography Aimed At Children: A Comparative Constitutional Perspective On Passing The Camel Through The Needle's Eye, Kevin W. Saunders
BYU Law Review
No abstract provided.
Obscenity And The World Wide Web, John E. Fee
Salvaging States' Rights To Protect Children From Internet Predation: State Power To Regulate Internet Activity Under The Dormant Commerce Clause, Julie Sorenson Stanger
Salvaging States' Rights To Protect Children From Internet Predation: State Power To Regulate Internet Activity Under The Dormant Commerce Clause, Julie Sorenson Stanger
BYU Law Review
No abstract provided.
Www.Wildwest.Gov: The Impact Of The Internet On State Power To Enforce The Law, Terrence Berg
Www.Wildwest.Gov: The Impact Of The Internet On State Power To Enforce The Law, Terrence Berg
BYU Law Review
No abstract provided.
Www.Franchisedisclosure.Com: Assessing The Ftc's Proposed Franchise Rule Provisions Involving Electronic Disclosure, Perry C. Siatis
Www.Franchisedisclosure.Com: Assessing The Ftc's Proposed Franchise Rule Provisions Involving Electronic Disclosure, Perry C. Siatis
BYU Law Review
No abstract provided.