Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2010

PDF

Journal

Internet Law

Media & Communications

Articles 1 - 3 of 3

Full-Text Articles in Law

Privacy Expectations And Protections For Teachers In The Internet Age, Emily H. Fulmer Sep 2010

Privacy Expectations And Protections For Teachers In The Internet Age, Emily H. Fulmer

Duke Law & Technology Review

Public school teachers have little opportunity for redress if they are dismissed for their activities on social networking websites. With the exception of inappropriate communication with students, a school district should not be able to consider a public educator’s use of a social networking website for disciplinary or employment decisions. Insisting that the law conform to twenty-first century social norms, this iBrief argues that the law should protect teachers’ speech on popular social networking websites like Facebook and MySpace.


Who Owns The Virtual Items?, Leah Shen Aug 2010

Who Owns The Virtual Items?, Leah Shen

Duke Law & Technology Review

Do you WoW? Because millions of people around the world do! Due to this increased traffic, virtual wealth amassed in MMORPGs are intersecting in our real world in unexpected ways. Virtual goods have real-life values and are traded in real-life markets. However, the market for trading in virtual items is highly inefficient because society has not created property rights for virtual items. This lack of regulation has a detrimental effect not just the market for virtual items, but actually the market for MMORPGs. Assuming we want to promote the production of MMORPGs as a market, society requires a set of …


The Anonymous Poster: How To Protect Internet Users’ Privacy And Prevent Abuse, Scott Ness Aug 2010

The Anonymous Poster: How To Protect Internet Users’ Privacy And Prevent Abuse, Scott Ness

Duke Law & Technology Review

The threat of anonymous Internet posting to individual privacy has been met with congressional and judicial indecisiveness. Part of the problem stems from the inherent conflict between punishing those who disrespect one's privacy by placing a burden on the individual websites and continuing to support the Internet's development. Additionally, assigning traditional tort liability is problematic as the defendant enjoys an expectation of privacy as well, creating difficulty in securing the necessary information to proceed with legal action. One solution to resolving invasion of privacy disputes involves a uniform identification verification program that ensures user confidentiality while promoting accountability for malicious …