Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Law

Fiber Optic Foxes: Virtual Objects And Virtual Worlds Through The Lens Of Pierson V. Post And The Law Of Capture, John W. Nelson Jun 2009

Fiber Optic Foxes: Virtual Objects And Virtual Worlds Through The Lens Of Pierson V. Post And The Law Of Capture, John W. Nelson

John W. Nelson

Virtual worlds are more successfully blurring the lines between real and virtual. This tempts many to try and equate virtual property with tangible property. Such an equation creates problems when the common law of property is applied to virtual objects over which users can not possess complete dominion and control. The result is a conversion of the tangible resources that support virtual worlds into a virtual commons. Accordingly, the common law of contracts, rather than that of property, should be used to govern transactions between a user and owner of a virtual world.


Border Confidential: Why Searches Of Laptop Computers At The Border Should Require Reasonable Suspicion, John W. Nelson Jan 2007

Border Confidential: Why Searches Of Laptop Computers At The Border Should Require Reasonable Suspicion, John W. Nelson

John W. Nelson

Our laptops are capable of containing large amounts of personal, private, intimate, and confidential information. At the same time, the power of the government to search us and our possessions is at its zenith during a border crossing. How should our laptops be treated during these border crossings?

This Note examines the background of the border search exception and the privacy interests we each have in our laptop computers. This Note argues that searches of our laptop computers should be viewed as highly intrusive in nature because of the ability to quickly sort through vast amounts of intimate and private …