Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

E-Commerce

PDF

All Faculty Scholarship

Internet

Publication Year

Articles 1 - 2 of 2

Full-Text Articles in Business

Demystifying The Right To Exclude: Of Property, Inviolability, And Automatic Injunctions, Shyamkrishna Balganesh Jan 2008

Demystifying The Right To Exclude: Of Property, Inviolability, And Automatic Injunctions, Shyamkrishna Balganesh

All Faculty Scholarship

The right to exclude has long been considered a central component of property. In focusing on the element of exclusion, courts and scholars have paid little attention to what an owner's right to exclude means and the forms in which this right might manifest itself in actual property practice. For some time now, the right to exclude has come to be understood as nothing but an entitlement to injunctive relief- that whenever an owner successfully establishes title and an interference with the same, an injunction will automatically follow. Such a view attributes to the right a distinctively consequentialist meaning, which …


Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh Apr 2006

Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh

All Faculty Scholarship

The doctrine of cybertrespass represents one of the most recent attempts by courts to apply concepts and principles from the real world to the virtual world of the Internet. A creation of state common law, the doctrine essentially involved extending the tort of trespass to chattels to the electronic world. Consequently, unauthorized electronic interferences are deemed trespassory intrusions and rendered actionable. The present paper aims to undertake a conceptual study of the evolution of the doctrine, examining the doctrinal modifications courts were required to make to mould the doctrine to meet the specificities of cyberspace. It then uses cybertrespass to …