Noriega v. Activision/Blizzard: The First Amendment Right to Use a Historical Figure’s Likeness in Video Games

By: Joshua Sinclair Panama’s former dictator, Manuel Noriega, recently sued Activision Blizzard in the California Superior Court for using his likeness and image in the popular video game “Call of Duty: Black Ops II.” In his complaint, Noriega alleged that the use of his likeness violated his right of publicity. Former New York Mayor, Rudy Giuliani, came to Activision’s defense, and filed a motion to dismiss, which was granted. In granting Activision’s motion, the court held that Activision’s use of Noriega’s likeness was transformative and did not violate his right of publicity. This Issue Brief argues that the California Superior Court should not have applied the transformative use test but should have held that Manuel Noriega did not have a right of publicity for his place in Panama’s history. Download Full Article (PDF) Cite: 14 Duke L. & Tech. Rev. 69

Authenticity and Admissibility of Social Media Website Printouts

By: Wendy Angus-Anderson Social media posts and photographs are increasingly denied admission as evidence in criminal trials. Courts often cite issues with authentication when refusing to admit social media evidence. Cases and academic writings separate recent case law into two approaches: The Maryland Approach and the Texas Approach. The first method is often seen as overly skeptical of social media evidence, setting the bar too high for admissibility. The second approach is viewed as more lenient, declaring that any reasonable evidence should be admitted in order for a jury to weigh its sufficiency. This Brief addresses the supposed differences between the two sets of cases and suggests that courts are not actually employing two distinct approaches. The Maryland Approach courts are not holding social media content to a higher standard than the Texas Approach courts, but are merely responding to a lack of evidence connecting the proffered content to the purported author. Download Full Article (PDF) Cite: 14 Duke L. & Tech. Rev. 33

The Constitutionality and Legality of Internet Voting Post-Shelby County

By: Logan T. Mohs The technological and electoral landscapes have changed drastically since the turn of the century. While it once might have made sense to view voting online as unconstitutional, as opposed to merely impractical, the expanded range of Internet access for minority communities has made that argument tenuous at best. While there still may exist practical and political reasons to avoid Internet voting, the Constitution no longer stands as an effective wall against the practice. Furthermore, the primary statutory obstacle to the implementation of Internet voting on a local level, the Voting Rights Act, has been greatly weakened by the recent Supreme Court decision in Shelby County. As such, now is the perfect time for state-level experimentation in the field of Internet voting. Download Full Article (PDF) Cite: 13 Duke L. & Tech. Rev. 181

Tragedy of the Regulatory Commons: LightSquared and the Missing Spectrum Rights

By: Thomas W. Hazlett and Brent Skorup The endemic underuse of radio spectrum constitutes a tragedy of the regulatory commons. Like other common interest tragedies, the outcome results from a legal or market structure that prevents economic actors from executing socially efficient bargains. In wireless markets, innovative applications often provoke claims by incumbent radio users that the new traffic will interfere with existing services. Sometimes these concerns are mitigated via market transactions, a la “Coasian bargaining.” Other times, however, solutions cannot be found even when social gains dominate the cost of spillovers. In the recent “LightSquared debacle,” such spectrum allocation failure played out. GPS interests that access frequencies adjacent to the band hosting LightSquared’s new nationwide mobile network complained that the wireless entrant would harm the operation of locational devices. Based on these complaints, regulators then killed LightSquared’s planned 4G network. Conservative estimates placed the prospective 4G consumer gains at least an order of magnitude above GPS losses. “Win win” bargains were theoretically available, fixing GPS vulnerabilities while welcoming the highly valuable wireless innovation. Yet transaction costs—largely caused by policy choices to issue limited and highly fragmented spectrum usage rights (here in the GPS band)—proved prohibitive. This episode provides a

Sharing is Airing: Employee Concerted Activity on Social Media After Hispanics United

By: Ryan Kennedy Section 7 of the United States’ National Labor Relations Act allows groups of American workers to engage in concerted activity for the purposes of collective bargaining or for “other mutual aid or protection.” This latter protection has been extended in cases such as Lafayette Park Hotel to workers outside the union context. Starting in 2005, the National Labor Relations Board increasingly signaled to employers that concerted activity may take place on social media such as Facebook. However, the Board proper delivered its first written opinion articulating these rules in the 2012 case of Hispanics United of Buffalo, Inc. There, the Board found the employer in question to have committed multiple unfair labor practices when it fired five employees over a series of Facebook posts due to violating the employer’s zero-tolerance no bullying policy. This article argues that the majority opinion of the Board misapplied Lafayette Park Hotel’s test for whether employer conduct “would reasonably tend to chill employees” from legitimate, protected uses of their §7 rights. This article explains the two largest errors in the Board’s decision: (1) a failure to identify a missing, important element for concerted activity protection under §7, the nexus between employee discussion

More from the #Jury Box: The Latest on Juries and Social Media

By: Hon. Amy J. St. Eve,  Hon. Charles P. Burns, & Michael A. Zuckerman This Article presents the results of a survey of jurors in federal and state court on their use of social media during their jury service. We began surveying federal jurors in 2011 and reported preliminary results in 2012; since then, we have surveyed several hundred more jurors, including state jurors, for a more complete picture of juror attitudes toward social media. Our results support the growing consensus that jury instructions are the most effective tool to mitigate the risk of juror misconduct through social media. We conclude with a set of recommended best practices for using a social-media instruction. Download Full Article (PDF) Cite: 12 Duke L. & Tech. Rev. 64

Ensuring an Impartial Jury in the Age of Social Media

By: Amy J. St. Eve & Michael A. Zuckerman The explosive growth of social networking has placed enormous pressure on one of the most fundamental of American institutions—the impartial jury. Through social networking services like Facebook and Twitter, jurors have committed significant and often high-profile acts of misconduct. Just recently, the Arkansas Supreme Court reversed a death sentence because a juror Tweeted about the case during deliberations. In light of the significant risks to a fair trial that arise when jurors communicate through social media during trial, judges must be vigilant in monitoring for potential outside influences and in deterring misconduct. In this Article, we present informal survey data from actual jurors on their use of social networking during trial. We discuss the rise of web-based social networks like Facebook and Twitter, and the concerns that arise when jurors communicate about a case through social media before returning a verdict. After surveying how courts have responded to jurors’ social media use, we describe the results of the informal survey. The results support a growing consensus in the legal profession that courts should frequently, as a matter of course, instruct jurors not to use social media to communicate about trial. Although

Privacy Expectations and Protections for Teachers in the Internet Age

By: Emily H. Fulmer Public school teachers have little opportunity for redress if they are dismissed for their activities on social networking websites. With the exception of inappropriate communication with students, a school district should not be able to consider a public educator’s use of a social networking website for disciplinary or employment decisions. Insisting that the law conform to twenty-first century social norms, this iBrief argues that the law should protect teachers’ speech on popular social networking websites like Facebook and MySpace. Download Full Article (PDF) Cite: 2010 Duke L. & Tech. Rev. 014

Who Owns the Virtual Items?

By: Leah Shen Do you WoW? Because millions of people around the world do! Due to this increased traffic, virtual wealth amassed in MMORPGs are intersecting in our real world in unexpected ways. Virtual goods have real-life values and are traded in real-life markets. However, the market for trading in virtual items is highly inefficient because society has not created property rights for virtual items. This lack of regulation has a detrimental effect not just the market for virtual items, but actually the market for MMORPGs. Assuming we want to promote the production of MMORPGs as a market, society requires a set of distinct property rules to decrease the inefficiencies in the virtual market. In creating these regulation, we may be able to take cues from intellectual property laws, as many of the problems surrounding virtual goods are akin to intellectual property. Download Full Article (PDF) Cite: 2010 Duke L. & Tech. Rev. 011

The Anonymous Poster: How to Protect Internet Users’ Privacy and Prevent Abuse

By: Scott Ness The threat of anonymous Internet posting to individual privacy has been met with congressional and judicial indecisiveness. Part of the problem stems from the inherent conflict between punishing those who disrespect one’s privacy by placing a burden on the individual websites and continuing to support the Internet’s development. Additionally, assigning traditional tort liability is problematic as the defendant enjoys an expectation of privacy as well, creating difficulty in securing the necessary information to proceed with legal action. One solution to resolving invasion of privacy disputes involves a uniform identification verification program that ensures user confidentiality while promoting accountability for malicious behavior. Download Full Article (PDF) Cite: 2010 Duke L. & Tech. Rev. 008