Feeds

Lindsay Lohan sues Grand Theft Auto V makers for 'using her image'

Actress claims game has characters that are exactly like her

The Power of One Infographic

Actress Lindsay Lohan is suing game devs Rockstar and Take-Two for allegedly copying her into their Grand Theft Auto V (GTAV) game.

Grand Theft Auto Lindsay Lohan lookalike

Lohan claims that the character of the rather vapid actress "Lacey Jonas" in the game amounts to using her likeness without permission and has accused Rockstar Games and Take-Two Interactive of milking her newsworthiness to boost sales of the game.

The Jonas character and side plot, which allows players to rescue her from swarms of paparazzi and take her home, was used in marketing for the game before it came out on Playstation and Xbox 360 in September last year. The cover for the game also features a woman holding a mobile that could arguably be said to look like Lohan.

In another part of the game, a Lohan-like character is at a hotel very similar to the Chateau Marmont in West Hollywood, where the actress lived for two months until she was famously banned for not paying her bill. She later got the ban lifted and is still known to frequent the hotel.

Lohan’s lawsuit said that the places and events in both characters’ storylines were “substantially similar” to her own life and there could be no doubt about who the game was sending up.

“It is unequivocal that the Plaintiff was the intended referent in the GTA V game by using her likenesses, portraits, and voice solely to advertise the game for trade purposes and by specifically announcing the Plaintiff’s name in the media as a 'Lindsay Lohan look-alike side mission' at least two months before the release of the game purely to promote, hype the game to attract sales of the defendants video game,” it said.

Gossip site TMZ originally suggested that Lohan was planning a lawsuit way back in December, but it seemed unlikely given that US law allows for parody under fair use. If the court decides that the GTAV characters fit the legal definition of parody as “the use of some elements of a prior author's composition to create a new one that, at least in part, comments on that author's works”, Lohan will find it pretty tough to make a case.

Her filing claims, though, that Rockstar and Take-Two’s use of her likeness was done solely to make money. ®

Mobile application security vulnerability report

More from The Register

next story
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.