• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechCopyright

In Ashley Madison hack, copyright “solution” is worse than no solution

Jeff John Roberts
By
Jeff John Roberts
Jeff John Roberts
Editor, Finance and Crypto
Down Arrow Button Icon
Jeff John Roberts
By
Jeff John Roberts
Jeff John Roberts
Editor, Finance and Crypto
Down Arrow Button Icon
July 21, 2015, 1:30 AM ET
Video Poster

Hackers stole troves of data from Ashley Madison but the online cheating site has yet to say how the breach will compromise its 37 million members, or even explain just how the hack happened in the first place. But the company did offer this non-action plan:

“Using the Digital Millennium Copyright Act (DMCA), our team has now successfully removed the…posts related to this incident as well as all Personally Identifiable Information (PII) about our users published online,” Ashley Madison told CNBC.

Unfortunately, this “copyright law to the rescue” response is worse than useless. Not only will it fail to work, but it provides false assurances, distorts copyright law and is a distraction from the real issues.

To understand what Ashley Madison just tried to do, it’s helpful to know how the DMCA (the law cited by Ashley Madison above) is supposed to work in the first place. It’s a legal tool designed to help studios and other content owners remove unauthorized content that people have posted to websites like YouTube or Facebook: If Disney tells those sites to remove a pirate version of The Lion King, for instance, they have to comply or else risk a copyright lawsuit.

In the case of Ashley Madison, the company has apparently used a DMCA notice to scrub a site where the hackers posted the information about its adultery-seeking members. (Brian Krebs, a noted security researcher who first reported the breach, says the hackers sent him links to the data but he chose not to publish them so as not to be “party to their extortion”).

While the copyright takedown might sound like a solution, it’s a weak and short-lived one. For one thing, there’s nothing to stop the hackers simply uploading the files again, forcing Ashley Madison to send out DCMA notices over and over. And this assumes that the company even has a valid copyright it can enforce in the first place – an unlikely event since, in the case of members’ profiles, the copyright probably belongs to the users not Ashley Madison.

Very skeptical of @ashleymadison‘s claim that it used DMCA to take down hacked data: 1) its users don’t assign ©; 2) unlikely to work anyway

— Daniel Nazer (@danielnazer) July 20, 2015

Ashley Madison’s DMCA announcement is little more than a bluff, and it’s one we’ve seen before. Recall, how in the wake of the Sony hacks, the movie studio hired super-lawyer David Boies to send around trumped-up intellectual property threats in a failed attempt to keep media from reporting on the leaks. Or how Jennifer Lawrence, and other celebrities who had their Apple iCloud accounts hacked, tried to use copyright law to stop people distributing nude photos.

In all of these cases, the copyright claims in question were weak or non-existent, but the hacking targets invoked them anyways. Why? The best answer is that lawyers had to respond to frantic entreaties from their clients to do something, and copyright was the nearest legal cudgel. It’s easy to use, everyone’s heard of it, and it can come with nasty penalties.

You can also argue that the copyright claims are at least worth a try, even if the legal threats are empty. After all, the hacking attacks that befell Jennifer Lawrence and Sony and the Ashley Madison adulterers are criminal conduct, and victims can do everything in their power to stop it.

But there are two problems with using copyright law to repulse hackers. The first is that it’s simply not designed for the job. The purpose of copyright is to encourage the creation of songs, books and paintings – not to serve as a roving catch-all tool to punish anything inappropriate on the internet. When it’s used outside of its natural legal context, such as a tool to oppose hackers, the whole reason for copyright law becomes muddled, and can appear as just another means of censorship.

The DMCA isn’t even good at being copyright law. Trust me, it’s really lousy at being privacy law.

— Parker Higgins (@xor) July 20, 2015

The other reason using copyright to confront hacking is a poor idea is because it provides a false sense of a solution, and distracts from the real issue: Why the hacks occurred and what the company should have done to stop it. These are harder questions, and often embarrassing ones for companies, including Sony and Ashley Madison, that suffer a breach.

But answers are emerging. In a much-praised article about the Ashley Madison hack, writer and programmer Paul Ford asks why websites don’t rely available technological measures like hashing and database-level encryption to protect their customers:

“We could demand that large centralized services encrypt our stuff at the database level, and know that while there are still points of failure, one password won’t unlock tens of millions of others by default — which is how it works now.”

The Ashley Madison site also had another weakness that let anyone see if a given email had been used on the site.

This is what the debate should be about, not copyright law. But concepts like database-level encryption are hard to understand (I’m not sure I could explain it), so the discourse can devolve into more basic topics like “that’s copyrighted so you have to take it down.” By now, though, it’s time to move past this. When the next major hacking attack arrives, and it will come soon, let’s hope the company in question will skip the empty copyright gestures, and get right down to solving the problem.

About the Author
Jeff John Roberts
By Jeff John RobertsEditor, Finance and Crypto
LinkedIn iconTwitter icon

Jeff John Roberts is the Finance and Crypto editor at Fortune, overseeing coverage of the blockchain and how technology is changing finance.

See full bioRight Arrow Button Icon

Latest in Tech

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Fortune Secondary Logo
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • World's Most Admired Companies
  • See All Rankings
  • Lists Calendar
Sections
  • Finance
  • Fortune Crypto
  • Features
  • Leadership
  • Health
  • Commentary
  • Success
  • Retail
  • Mpw
  • Tech
  • Lifestyle
  • CEO Initiative
  • Asia
  • Politics
  • Conferences
  • Europe
  • Newsletters
  • Personal Finance
  • Environment
  • Magazine
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
  • Group Subscriptions
About Us
  • About Us
  • Lists Calendar
  • Press Center
  • Work At Fortune
  • Terms And Conditions
  • Site Map
  • About Us
  • Lists Calendar
  • Press Center
  • Work At Fortune
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Latest in Tech

Steve Jobs called Tim Cook ‘not a product person,’ but still hand-picked him to run Apple and turn it into a $4 trillion tech giant
C-SuiteTech
Steve Jobs called Tim Cook ‘not a product person,’ but still hand-picked him to run Apple and turn it into a $4 trillion tech giant
By Marco Quiroz-GutierrezApril 22, 2026
39 minutes ago
Current price of Ethereum for April 22, 2026
Personal FinanceEthereum
Current price of Ethereum for April 22, 2026
By Joseph HostetlerApril 22, 2026
1 hour ago
ravi
AICommentary
The $6 trillion reinvention: Why IT services firms must start underwriting outcomes
By Ravi Kumar S and Andreea RobertsApril 22, 2026
2 hours ago
The Godmother of Silicon Valley and her former student want to fix how healthcare gets built
NewslettersTerm Sheet
The Godmother of Silicon Valley and her former student want to fix how healthcare gets built
By Allie GarfinkleApril 22, 2026
5 hours ago
edelman
CommentaryHealth
70% of people believe at least one divisive health claim. Science needs a new playbook
By Richard EdelmanApril 22, 2026
5 hours ago
Cursor CEO Michael Truell on April 07, 2026 in San Francisco, California. (Photo: Big Event Media/Getty Images/HumanX)
NewslettersFortune Tech
SpaceX strikes a $60 billion deal for Cursor
By Andrew NuscaApril 22, 2026
5 hours ago

Most Popular

$166 billion in tariff refunds just became available, but small businesses may already be at a disadvantage
Law
$166 billion in tariff refunds just became available, but small businesses may already be at a disadvantage
By Sasha RogelbergApril 20, 2026
2 days ago
The tables have turned: Florida and Texas are the biggest losers in the housing market as Ohio emerges a surprise winner
Real Estate
The tables have turned: Florida and Texas are the biggest losers in the housing market as Ohio emerges a surprise winner
By Sydney LakeApril 21, 2026
20 hours ago
Jeff Bezos once gave Eva Longoria and the admiral behind Osama bin Laden's capture $100 million—but she says you don't need wealth to give back
Success
Jeff Bezos once gave Eva Longoria and the admiral behind Osama bin Laden's capture $100 million—but she says you don't need wealth to give back
By Orianna Rosa RoyleApril 21, 2026
1 day ago
'Something sinister could be happening': FBI looks into dead or missing nuclear and space defense scientists tied to NASA, Blue Origin, and SpaceX
Politics
'Something sinister could be happening': FBI looks into dead or missing nuclear and space defense scientists tied to NASA, Blue Origin, and SpaceX
By Catherina GioinoApril 21, 2026
19 hours ago
John Ternus, the man stepping into Tim Cook and Steve Jobs' shoes, is a 25-year Apple veteran with zero LinkedIn posts
C-Suite
John Ternus, the man stepping into Tim Cook and Steve Jobs' shoes, is a 25-year Apple veteran with zero LinkedIn posts
By Kelvin Chan and The Associated PressApril 21, 2026
22 hours ago
Tim Cook's exit is part of a CEO reckoning sweeping Corporate America
Newsletters
Tim Cook's exit is part of a CEO reckoning sweeping Corporate America
By Diane BradyApril 21, 2026
1 day ago

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.