Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 4 of 4
Full-Text Articles in Law
The Internet Immunity Escape Hatch, Gregory M. Dickinson
The Internet Immunity Escape Hatch, Gregory M. Dickinson
BYU Law Review
Internet immunity doctrine is broken, and Congress is helpless. Under Section 230 of the Communications Decency Act of 1996, online entities are absolutely immune from lawsuits related to content authored by third parties. The law has been essential to the internet’s development over the last twenty years, but it has not kept pace with the times and is now deeply flawed. Democrats demand accountability for online misinformation. Republicans decry politically motivated censorship. And all have come together to criticize Section 230’s protection of bad-actor websites. The law’s defects have put it at the center of public debate, with more than …
Intellectual Property In E-Commerce Retail Arbitrage: An Analysis Of The Legality Of Using Intellectual Property In Drop-Shipping, Kara J. Bloomer
Intellectual Property In E-Commerce Retail Arbitrage: An Analysis Of The Legality Of Using Intellectual Property In Drop-Shipping, Kara J. Bloomer
BYU Law Review
No abstract provided.
Moderating From Nowhere, Gilad Abiri
Moderating From Nowhere, Gilad Abiri
BYU Law Review
We are living in the midst of a battle over online hate speech regulation, and the stakes could not be higher. Hate speech not only harms its intended victims, be they individuals or groups, but it also polarizes and divides society in ways that undermine the health of democratic regimes. While there is widespread agreement that the current situation of online discourse is untenable, scholars and policymakers are deeply divided on the best way to improve it.
Until recently, American free speech norms have dominated the content moderation policies of digital media platforms. First Amendment norms are extremely resistant to …
Cybersecurity Spillovers, Mark Verstraete, Tal Zarsky
Cybersecurity Spillovers, Mark Verstraete, Tal Zarsky
BYU Law Review
This Article identifies and analyzes a previously unrecognized source of positive externalities within cybersecurity, which we term "cybersecurity spillovers". Most commentators have focused on negative externalities and market failures, leading to a pervasive pessimism about the possibility of adequate cybersecurity protections. In response, this Article demonstrates that unique dynamics from the world of cloud computing – most notably, indivisibility – may force cloud service firms to generate spillovers. These spillovers are additional security protections provided to common cloud users: clients who may not have been willing or able to acquire these security services otherwise. Furthermore, this additional source of security …