Open Access. Powered by Scholars. Published by Universities.®

Legal Remedies Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Legal Remedies

Throw The Book At Them: Testing Mortgagor Remedies In Foreclosure Proceedings After U.S. Bank V. Ibanez, Claire Ward Dec 2011

Throw The Book At Them: Testing Mortgagor Remedies In Foreclosure Proceedings After U.S. Bank V. Ibanez, Claire Ward

Claire Alexis Ward

This article takes one state, Massachusetts, as its focus for a perspective on the residential mortgage foreclosure crisis. U.S. Bank v. Ibanez, in early 2011, signaled a changing tide which began to hold banks accountable for the shoddy practices they frequently used to foreclose. However, the promise of Ibanez was unfulfilled as successor cases failed to follow through with its vision. Mortgagor actions brought in the trial courts to prevent foreclosure have been unsuccessful with the elemental actions based in consumer protection, contract, and equity. However, this article proposes new and novel solutions to force banks to be held accountable …


Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh Oct 2006

Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh

Michigan Telecommunications & Technology Law Review

The doctrine of cybertrespass represents one of the most recent attempts by courts to apply concepts and principles from the real world to the virtual world of the Internet. A creation of state common law, the doctrine essentially involved extending the tort of trespass to chattels to the electronic world. Consequently, unauthorized electronic interferences are deemed trespassory intrusions and rendered actionable. The present paper aims to undertake a conceptual study of the evolution of the doctrine, examining the doctrinal modifications courts were required to make to mould the doctrine to meet the specificities of cyberspace. It then uses cybertrespass to …