Sharing photos online has become routine practice for many of us, but most of the methods we use are inherently not as secure or private as we think. Even if you share photos online ‘privately’ on social media platforms like Facebook or Instagram, the companies themselves have access to not just the photos themselves but a whole host of data alongside them
As we recognize Cyber Security Awareness Month, there’s no better time to reflect on some of the most overlooked aspects of online photo sharing. For photographers and creatives who rely on showcasing their vast portfolios of photos, security is an aspect that they cannot afford to overlook.
This short article goes over all of the most safe and secure ways that you can make a part of your practice for sharing your images online. Cover Image: Photo by Matt Moloney on StockSnap.
Important Factors to Consider With Photo Sharing
The web is fraught with potential security risks at almost every juncture. While it’s in every website owner’s best interest to exercise proper data and security etiquette, sometimes assets can be compromised. Cybercrime has become increasingly more prolific in recent years, with data evolving into a highly valuable commodity in this regard.
For freelancers or businesses, maintaining online privacy and security is more valuable than ever and proxy providers are now an essential tool to have. They can help individuals and businesses mask their IP addresses, bypass geo-restrictions, and secure their online activities.
Of course, budget-conscious creatives and photographers won’t always have the resources, infrastructure, or funds to invest in managed storage options and enterprise-grade solutions. However, a solid foundation of security best practices, strategies, and awareness will be a good start when it comes to safeguarding their valuable assets, promoting their work, and branching out to new customers.
Here are some of the risks that can arise from unsupervised and unsecured photo sharing:
- Data breaches: Platforms with insufficient security can lead unauthorized people to access your photos and potentially steal them.
- Copyright infringement: Without proper safeguards in place, your work could be used without permission.
- Privacy violations: Sensitive or personal photos could be exposed illegally, leading to them being proliferated across the internet.
- Metadata exposure: Photos contain metadata with sensitive information, and this could be released alongside the photos, putting subjects and creators at further risk.
Privacy Laws and Regulations for Data Sharing
While the US has federal and state laws that cover different aspects of data privacy, it is noticeably different from the European Union’s General Data Protection Regulation (GDPR). However, in many cases, international rules, standards, and best practices apply.
- Privacy Act of 1974 – governs how federal agencies can collect and use data in their records. This prohibits agencies from disclosing personal information without written consent.
- HIPAA – standards that stipulate how ‘covered entities’ healthcare providers can use a patient’s personal health data.
- GLBA – legislation that requires institutions to safeguard sensitive data and explain how they use customer data.
- COPPA – places limits on what companies can do with data collected about children under 13 years of age, requiring consent from parents or guardians.
- CCPA – a recent piece of legislation that applies to companies collecting personal information about consumers, explaining the latter’s rights.
Understanding these regulations is vital for photographers, videographers, and other creatives who capture images or produce videos to share in emails or online for the world to see. Their inherent USP is promoting their standard of work to other potential customers who are looking for visual quality. Invariably, however, when making a decision about whether to pursue the services of a photographer, there is rarely any thought given to the sensitivity of some – particularly candid – images.
Photographers therefore must take great care to ensure that every image subject has – verbally or in writing – given consent for its distribution. A clear privacy policy and terms of use must also be readily accessible on your website or portfolio platform. Fundamentally, however, to avoid images falling into the wrong hands.
Best Practices for Secure Photo Sharing
Use End-to-End Encryption
When sharing photos, particularly those containing client information, always choose platforms that offer end-to-end encryption. This ensures that only the intended recipient(s) can access the images. You can also lock down whether they are shareable or not.
Be Mindful of Metadata
For certain images, consider removing metadata from them, especially before sharing. Metadata can include location data, camera details, timestamps, and even your name. If you want to avoid this from being exposed, you may wish to conceal it in case an image is shared publicly.
Utilise Watermarking
Professional photographers should always add watermarks to their images. This preserves your copyrights over the images and can deter them from being spread unlawfully.
Implement Two-Factor Authentication (2FA)
Where applicable, enable two-factor authentication on your accounts and logins to add an extra layer of security. By requesting a form of verification like a PIN code, biometrics or one-time password (OTP) on top of your login credentials, you can reduce the risk of your account(s) being compromised.
Improve Password Hygiene
Make sure that you use strong, unique passwords for all your individual accounts to reduce the risk of them being compromised. While password fatigue is common, you should ensure any password is not reused across logins, and update them regularly; a good solution to this is to use a reputable, secure password management tool.
Be Cautious with Public Wi-Fi
Photographers often need to edit photos on the go. When doing so, be careful about using free or unsecured Wi-Fi networks, as these often have insufficient security and can be easily compromised.
Use Secure File Transfer Services
When sending high-resolution images to clients, sometimes email will not suffice. Instead, opt for secure, patched file transfer tools that can offer strict access for the recipient only.
Potential Implications of Security Breaches
While it’s easy to assume that you – as a photographer – won’t be the victim of a data breach, it’s important to not rest on your laurels. The consequences of breaches can be quite severe.
A single breach can damage your professional reputation and dissuade current and future clients from trusting you. If you, as a website owner or business, are found to be non-compliant with privacy laws or lax about DBS checks when employing staff, you could be subject to legal action, depending on the nature and sensitivity of the photos that are compromised and the data held within them. Beyond this, you may find yourself with fewer business opportunities and hefty penalties to pay.
For both you and your client(s), the unveiling of private photos can be emotionally distressing. What’s more, in extreme cases, exposed information can lead to further situations ranging from identity theft and fraud to blackmail and extortion.
This is why, when handling images intended to be kept safe, secure, and confidential, you should never assume that they cannot be compromised.
Choosing the Right Secure Website Platform
While there are various options for sharing photos online and growing your business in a secure manner, choosing a platform specifically designed for photographers and creatives is a good first step.
Make Secure Photo Sharing a Priority
FilterGrade offers a comprehensive website-building solution that creatives and photographers can feel reassured using. With security top-of-mind for our users, we are proud to have created a reliable, resilient, flexible, and user-friendly platform that allows our users to showcase what they do best with complete confidence.
Discover how your photography business can be taken to the next level while keeping your work safe and secure. Look out for services that guarantee anonymity and security for users so you are able to prioritize online safety and data privacy.