December 2008Volume 14Number 2PDF icon PDF version (for best printing)

A wary world in Web 2.0

The emergence of new technologies always seems to be accompanied by casualties or victims of the darker, more nefarious uses of such technologies. Social networking sites prove no exception. Nor does the convergence of developments in digital photography and online platforms for the publication of photography and other visual media. This article briefly discusses recent injuries and litigation emanating from these developments.

Over the last few years, my practice has handled a number of privacy related litigation matters. Of these, a small percentage focused on the misuse of photographs. As examples, the cases involved the misuse of a child’s photograph; the unauthorized taking and publication of photographs of a nude model sitting for a college art class; and, the unauthorized distribution of private, intimate photographs by e-mail.

With respect to this latter example, an individual distributed private, intimate photographs of his former partner naked to her employer, friends, and family. However, the distribution occurred solely by e-mail.

With the advent of social networking sites such as Facebook and MySpace, the distribution channels available to someone intent on causing harm through the distribution of private, intimate photographs has increased in choice, type and target audience. Where several years ago the distribution recipients represented a small, calculable number of individuals, the emergence of sites such as Facebook and MySpace has dramatically enabled media to reach thousands (if not millions) of individuals in a short amount of time. Unfortunately, this changing landscape provides individuals who wish to cause an individual harm a myriad of choices through which to do so.

Indeed, my firm has seen an increase in the number of situations where a former boyfriend, fiancée, spouse or partner has used Facebook, MySpace, YouTube or similar Web sites to upload private, intimate photographs or videos of their former (and sometimes existing) partners. Not only does the publication of media to these sites increase the extent of the distribution, some viewers of the photographs will often copy or download the photographs for their private use. Additionally, some viewers proceed one step further and upload the media to other sites – including adult-oriented Web sites. For example, private, intimate videos often find their way onto sites such as <www.youporn.comand <www.dirtytube.com>, which allow user-submitted material. These sites often have sharing relationships with other adult Web sites. Consequently, a single publication can quickly become viral and, without proper handling, uncontrollable.

Responding to situations such as those described above requires precision and diligence. For, the most immediate objective should be the removal of the content wherever it can be found. Although litigation may later ensure, the primary objective for the attorney representing the client should be the mitigation of harm. However, in doing so, the attorney must absolutely be cognizant of the need and procedural methods required to preserve the evidence should the client later wish to file suit. This preservation should occur on two fronts: observational and systemic. The content of the Web pages containing the unauthorized content should be preserved. Additionally, efforts need to be made to ensure third party preservation of back-end evidence related to the publication of the unauthorized content.

At the same time, it is paramount that legal counsel be aware of the client’s psychological state of mind. For, the unauthorized publication of private, intimate photographs represents an invasion of one’s privacy and betrayal of one’s trust. The extent to which these violations affect an individual will vary from person to person. However, there exists no dispute that the individual victims in such circumstances have been violated. Consequently, counsel must recognize this fact, be cautious and observant in counseling their clients, and ensure that every decision considers the ramifications of such a violation on the client’s psyche.

Apart from the embarrassment of knowing the photographs and/or videos exist (even for a limited duration) on the Internet, the potential for the photographs and/or videos to remain on the Internet for a significant amount of time cannot be understated. As previously discussed, the media can be copied from site to site. Additionally, Google and other search engines may cache the content of some Web sites and their respective pages. Because of this, an individual’s name could be associated with the media. When one searches the individual’s name, the unauthorized content could appear in search results. The impact of this is significant. Potential employers and other parties interested in reviewing an individual’s history on the Internet can often find content that – although published without authorization – can lead to adverse consequences, such as a lost employment opportunity or terminated employment relationship.

Regrettably, the number of cases involving the publication of private, intimate photographs will likely continue to increase. Given the potential long-term harm that can be caused by such publications, proactive measures should be taken to educate individuals on the dangers of allowing themselves to be photographed. Consequently, in addition to reactive measures involved in the removal of content and pursuit of damages through litigation, our firm also counsels proactive measures that should be implemented. In this Internet-era, our mindsets must be Internet focused. In other words, an individual must consider the Internet-related consequences of any conduct in which he or she engages. “Do I want this photograph on <www.cnn.com>?” “Do I want this e-mail on the front page of the New York Times?” For those who remember the X-Files, it is difficult to ignore the mantra “Trust No One.”

__________

Charles Lee Mudd Jr. is the principal of Mudd Law Offices, a law firm with its main office in Chicago, Illinois. He graduated magna cum laude from Quinnipiac University School of Law in 1997.

After law school, Charles served as a law clerk for the Honorable John T. Sharpnack, Chief Judge of the Indiana Court of Appeals of Indiana and the Honorable Alan H. Nevas, U.S. District Court Judge in Bridgeport, Connnecticut. After clerking for Judge Nevas, Charles joined Cummings & Lockwood, a full-service, mid-sized law firm in Connecticut, as a litigation associate in its Stamford, Connecticut office.

In 2001, Charles and his wife, Katherine, returned to Chicago, Illinois where he established his own law practice. Mudd Law Offices is now in its 8th year with individual and business clients throughout the United States and the world.

Charles was admitted to the Indiana State Bar in 1997, the Illinois State Bar in 1998, the Connecticut State Bar in 2000, and the Utah State Bar in 2007. He remains an active member of each of these state bars.

Charles is admitted to the Supreme Court of the United States as well as the Sixth and Seventh Circuits of the United States Courts of Appeals. He is admitted to the trial bar of the United States District Court, Northern District of Illinois. He is also admitted to the bars of the Northern District of Indiana, Central District of Illinois, Northern District of Florida, the District of Colorado, and the District of Utah.

Charles currently is on the adjunct faculty of John Marshall Law School where he has taught privacy and technology courses. He has taught Privacy in Cyberspace at the University of Connecticut School of Law as well as United States Government and United States History at Quinnipiac College and Indiana University-Purdue University at Indianapolis.

Charles can be contacted at Mudd Law Offices, 3114 West Irving Park Road, Suite 1W, Chicago, Illinois 60618.

Login to post comments