In this article...

Watch Our Video
Contributor
Kevin O'Flaherty
Factchecked by

This question came from one of our users:

I found out somone was cloning my devices after I found a parental app attached to me I also found github being used and python script they were creating script and apps the police will not help me even though one of them says im right.

There are essential steps you should take when you find out your phone is being cloned or someone is invading your privacy in the state of Illinois. If this matter concerns you for safety reasons, you need to find a lawyer who can find an expert right away. An expert can look over files and documents and use investigative skills to figure out exactly who is tracking you and possibly for what reason.  


The Illinois Personal Information Protection Act (PIPA) was signed in June 2005. Illinois also passed the Illinois Eavesdropping Act, which mandates that all parties involved in a conversation must consent to be recorded (We Are the People). There are disclosures about being monitored on household electronic devices without a warrant. There is limited information available regarding peer-to-peer phone cloning, as this technology is relatively new. Most legal protections are against law enforcement. Primarily protecting against the collection of information that reveals vast amounts of personal household data. 


But what is more suitable for you – suing someone for invasion of privacy? This is a general Tort claim and is hinged on your right to privacy. There are four distinct types of civil wrongs under the Invasion of Privacy Claims: Intrusion Upon Seclusion, Appropriation of Name or Likeness, Public Disclosure of Private Facts, and False Light. The first topic is the most important in this case because that is the umbrella your question fits under. Intrusion Upon Seclusion occurs when someone is intentionally intruding (including electronically) into a person’s private affairs (Legal Clarity).

This is all the legal evidence needed for the claim to be valid (Legal Clarity). This includes actions like accessing private records without permission, because the act of intrusion itself is the violation. The burden of proof is simple but necessary to understand what you must do to take this to Court. For an Intrusion Upon Seclusion claim, a plaintiff must prove an intentional intrusion into a private matter (Legal Clarity).

This includes cell phones, home tapping, or recording of conversations. You must prove the intrusion was highly offensive and prove the information that was shared, hacked, or stolen was not required by a reasonable person (Legal Clarity).  

The process of filing an invasion of privacy does involve seeking an attorney. The attorney must file a complaint with the Court outlining the facts of the case. This is the legal backbone of your case. The potential remedies could be awards of damages, economic damages, or financial harm in a case if your financial privacy was compromised, or emotional distress or damages if there was damage to your reputation, but the Court will deem what is fair, just, and probable for the parties. 

Designed for general information use only. The content above does not constitute legal advice or the formation of an attorney/client relationship.

Disclaimer: The information provided on this blog is intended for general informational purposes only and should not be construed as legal advice on any subject matter. This information is not intended to create, and receipt or viewing does not constitute an attorney-client relationship. Each individual's legal needs are unique, and these materials may not be applicable to your legal situation. Always seek the advice of a competent attorney with any questions you may have regarding a legal issue. Do not disregard professional legal advice or delay in seeking it because of something you have read on this blog.

FREE Criminal DefenseE-Book

Get my FREE E-Book

Similar Articles

Learn about Law