the code war

“Never underestimate the determination of a kid who is time-rich and cash-poor.” ― Cory Doctorow

Cyberstalking: Impersonation to Avoid Scrutiny or Judgement (Georgia)

If someone uses another person's identity to avoid public scrutiny themselves, the legal implications will depend on the intent behind the impersonation, how the identity is used, and the resulting consequences. In Georgia, using someone else’s identity for such a purpose could still lead to significant legal consequences under various laws related to identity fraud, defamation, and invasion of privacy.

1. Identity Fraud (O.C.G.A. § 16-9-121)

Under Georgia law, identity fraud occurs when a person uses another individual's identifying information without their consent for any unlawful purpose or with the intent to defraud. If someone assumes another's identity to evade public scrutiny, they could be committing identity fraud, especially if the impersonation is intended to deceive others, protect themselves from legal or professional consequences, or obtain some form of benefit.

  • Penalties: Identity fraud in Georgia is a felony, punishable by one to ten years in prison and a fine of up to $100,000. If the impersonation involves a minor or is part of a larger fraudulent scheme, the penalties may be harsher.
2. Defamation or False Light

If the use of someone else's identity to avoid scrutiny results in harm to that person's reputation or portrays them in a false and misleading light, it could lead to a civil lawsuit for defamation or "false light."

  • Defamation: If the impersonation involves making false statements or engaging in conduct that damages the third person's reputation, it could constitute defamation. To succeed in a defamation lawsuit, the person whose identity was used must prove that false statements were made about them, those statements were published to third parties, and they caused harm to their reputation.
  • False Light: If the impersonation casts the third person in a misleading or highly offensive manner that is not necessarily defamatory but still damaging (e.g., creating a false association with a scandal), the affected person could bring a "false light" claim. This is also considered an invasion of privacy.
  • Damages: The person whose identity was used may seek compensatory damages for reputational harm, emotional distress, and any economic losses resulting from the impersonation. They might also seek punitive damages if the impersonation was particularly malicious or reckless.
3. Invasion of Privacy (Appropriation of Name or Likeness)

Using someone else’s identity to avoid public scrutiny could also violate Georgia's right to privacy, specifically the aspect related to the appropriation of name or likeness. This occurs when someone uses another person’s identity, image, or likeness without permission, primarily for personal benefit, even if it is not commercial.

  • Civil Action: The person whose identity was used may sue for invasion of privacy. They could seek damages for emotional distress, harm to reputation, and any other injuries suffered due to the unauthorized use of their identity.
4. Fraud or Misrepresentation

If someone uses another person's identity to avoid public scrutiny and, in doing so, deceives others into believing they are someone else, they could be engaging in fraud or misrepresentation. While this is more commonly associated with financial fraud, it could apply in situations where the impersonation results in someone obtaining a benefit (e.g., access to certain venues, avoidance of contractual obligations) or deceiving others to avoid negative consequences.

5. Possible Criminal Penalties for Obstruction or Hindering

If the impersonation involves misleading law enforcement or any government authority, it could constitute obstruction or hindering law enforcement under Georgia law (O.C.G.A. § 16-10-24). Even if the primary purpose is to avoid public scrutiny, providing false information or presenting oneself under a false identity to avoid consequences can still be charged as obstruction.

Conclusion

Using someone else’s identity to avoid public scrutiny can lead to several legal consequences in Georgia, including criminal charges for identity fraud, civil lawsuits for defamation or invasion of privacy, and potential claims for emotional distress or reputational harm. The severity of these consequences will depend on the specifics of how the identity is used, the extent of the damage caused, and the intent behind the impersonation. Anyone considering or involved in such behavior should be aware that it poses serious risks of legal liability and criminal penalties.

We use cookies to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, advertising and analytics partners. View more
Cookies settings
Accept
Decline
Privacy & Cookie policy
Privacy & Cookies policy
Cookie name Active

Who we are

Suggested text: Our website address is: https://luesposito.com.

Comments

Suggested text: When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection. An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.

Media

Suggested text: If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

Cookies

Suggested text: If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year. If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser. When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select "Remember Me", your login will persist for two weeks. If you log out of your account, the login cookies will be removed. If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

Embedded content from other websites

Suggested text: Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website. These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

Who we share your data with

Suggested text: If you request a password reset, your IP address will be included in the reset email.

How long we retain your data

Suggested text: If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue. For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

What rights you have over your data

Suggested text: If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

Where your data is sent

Suggested text: Visitor comments may be checked through an automated spam detection service.
Save settings
Cookies settings
Scroll to Top