News & Events



Over the last week, several high profile celebrities (e.g., Jennifer Lawrence and Kate Upton) have reportedly become the latest victims of internet privacy rights violations.  In those cases, hackers supposedly obtained private, risqué photographs of the celebrities and disseminated them for publication over the internet.  In response to the photographs, lawyers have sent the obligatory cease and desist letters and appealed to the community to ignore the illegally obtained photographs. Only time will tell whether the photographs will ever be permanently deleted from the vast domain that is the World Wide Web.

Although you may not have any Oscars or a photo on the cover of Sports Illustrated, what if you become a victim of a similar violation of privacy?  Is there anything that you can do?   What is your recourse?  Unfortunately, in this free and open internet age, the available remedies for misappropriation of photographs or other electronic information are somewhat limited.  However, if your selfie has fallen into the wrong hands, the following statutory acts and/or common law theories may provide some relief:

Storage Communications Act:

The Storage Communication Act, 18 U.S.C. 2701, makes improper access to an electronic communication a crime. According to the Act, if a person “intentionally accesses without authorization a facility through which an electronic communication service is provided” or “exceeds authorized access to the facility,” such actions shall be punishable by fine or imprisonment if the access is criminal or tortuous in nature.  Consequently, if a hacker improperly accesses an electronic account, he or she may pay the price behind bars.  The Storage Communication Act does not, however, create a private right of action on behalf of the wronged party.

Copyright Infringement:

The Copyright Act provides one potential avenue for removal of any private photograph disseminated over the internet.   The Copyright Act, 17 U.S.C. § 101 et seq., provides that “[c]opyright protection subsists . . . in original works of authorship fixed in any tangible medium of expression . . . from which they can be perceived, reproduced, or otherwise communicated. 17 U.S.C. § 102.  Accordingly, a photograph is an original work subject to copyright protection.   Id.see also Blair v. World Tropics Prods., 502 F. Supp. 2d 828, 833 (W.D. Ark. 2007).

Moreover, the owner of a copyright has the exclusive right to reproduce the copyrighted work; to prepare derivative works based on it; to distribute copies of the copyrighted work to the public; to display the copyrighted work; and to authorize any of these uses of the copyrighted work. 17 U.S.C. § 106.  Copyright initially vests in the author of the work, 17 U.S.C. § 201(a), and subsists from the point of creation of the work, 17 U.S.C. § 302(a).

Accordingly, if your copyrighted “selfie” has been improperly published on the internet, you may be able to seek removal of a private photograph by pursuing an injunction under the Copyright Act.  See 17 U.S.C. 502 (“Any court having jurisdiction of a civil action arising under this title may … grant temporary and final injunctions on such terms as it may deem reasonable to prevent or restrain infringement of a copyright.”).

Invasion of Privacy:

Section 652A of the Second Restatement of Torts provides that “one who invades the right of privacy of another is subject to liability for the resulting harm to the interests of the other.”  Restatement (Second) of Torts, 652A.  (Most if not all states have adopted a common-law invasion of privacy tort similar to the Restatement).  The right to privacy is invaded by “unreasonable intrusion, appropriation of another in name or likeness, unreasonable publicity of another’s private life, and publicity which places a false light before the public.” Id.  According to Section 652B, a person is liable to another for invasion of privacy if a person “intentionally intrudes…upon the solitude or seclusion of another or his private affairs or concerns, if the intrusion would be highly offensive to a reasonable person.” Restatement (Second) of Torts, 652A.  Misappropriation and publication of a risqué selfie is likely to constitute “highly offensive” intrusion entitling the subject of the photograph to relief.

Report the Security Breach:

As soon as you learn of a private security breach, you should to report the breach to the FBI, US Secret Service and/or local law enforcement.  The US Secret Service’s Electronic Crimes Task Force recommends containing the breach while investigating the incident, which may include changing security setup and configuration (e.g., log-in IDs, passwords, and security codes) and cataloging the inventory on computers and networks.  The purpose is to “stop the leak” while the appropriate law enforcement agency provides assistance.


For the most part, a person’s ability to restrict the use of an illegally obtained photograph is limited.  The subject of the photograph usually needs to know the identity of the hacker (thief) to enforce his or her rights.  Often times, in the age of the internet, such an identity is not easy to find.  Accordingly, until more legislation is enacted to govern the content of the internet, it may be advisable to avoid the camera or, at the very least, keep your clothes on when in front of it.

Kevin C. Baltz