Free Articles  >>  Copywriting >>  Page 3  >> 

Somebody s Distributing Your Copyright Content Illegally Know Your Facts Before You Accuse

Somebody's Distributing Your Copyright Content Illegally? Know Your Facts Before You Accuse   by June Campbell

Is someone distributing your software or other copyright
content illegally over the Internet? It's possible. It
happens. If you can prove your case, you have grounds
for legal action.

BUT -- before making yourself look foolish and creating
enemies, have your facts straight. A reasonable
understanding of Internet technology can prevent you
from ending up with egg on your face.

Take this situation. I've changed names to protect the

A representative of an online business emailed me
saying, "It has been brought to my attention that
you have made the "" public download
files freely available for download by FTP from your
web site. Would you please let us know immediately
what is going on and what your justification is
for doing this."

First mistake. If the files are "public download
files", then what is the problem? Public download
files are freely available.

However, since I had never heard of their
software, I responded with a request that the company
rep show me the link or at least provide a
screen capture of the alleged FTP activity.

I received an apologetic email from the company
rep saying that she could not locate a link to her
software from my site. "Perhaps your site has been
confused with someone else's," she explained. Second
mistake. If you're making an allegation of this nature,
know where the problem can be found and be ready
to present evidence to the other party. You look more
than a little incompetent if you can't back up your
claim in the most elementary way.

A few hours later, a third email arrived. This time,
the company rep accused me of being untruthful
and threatened legal action. She then
backed up her case with the following URL: heirfiles/

Third mistake.

Sure enough, "theirfiles" were available for
download at this link. And, sure enough, is my site domain. HOWEVER,
had the company rep had a basic understanding of FTP
(File Transfer Protocol), she would have understood
that a "pub" directory is "public" -- and therefore the
URL had nothing to do with my site.

A phone call to my web host confirmed they were hosting
both my site and the other company's site. Since both web
sites were on the same public server, any domain listed on
that server would have produced identical results with the
FTP URL given above. That is, you could change heirfiles/ to heirfiles/
and you would get access to this company's software. If
a web administrator has set up the server to implement
anonymous FTP in this fashion, then all that is necessary
is for both web domains to be stored on the same server.

And that brings us to the fourth mistake. If you don't want
your copyright-protected software files to be available for
public download, why in the wide world would you store
them in a public FTP directory where everyone has free
access? Public means public. If you want the files to be
available only to authorized users, doesn't it make sense
to have a private, password-protected directory set up on
your web site?

Had I wanted to be vindictive, I could have posted the URL
to multiple newsgroups and mailing lists. Hundreds of
people could have downloaded those files before the
problem was corrected. I didn't do that, but some
people would.

What can be learned from this episode?
1. An understanding of basic Internet protocols is
essential if you are running an Internet business. It is
equally important that your agents, employees and
company reps are trained, since they are the ones
that are likely to make the mistakes.
2. Have a tech-guro available to advise you on
issues that are beyond your current understanding.
3. If you're operating an Internet business, get a tough skin.
You'll be accused of some mighty interesting stuff.

About Author June Campbell :

June Campbell's writing has appeared in various international publications.Visit her on the web for articles, a FREE gift, or for how-to booklets on writing a business proposal, developing a business plan, developing a joint venture contract and more

Article Source:
Article Url:

Other Articles by June Campbell

Cyberlaw 101
   by June CampbellYou've already discovered that the Internet is a great medium for promoting your business. But just as you can use the Net's various components like the web,email, chat and newsgroups to network, to make new contacts and to generate leads, you can easily findyourself in hot water over legal disputes and legalchallenges.Doing business on the Net can be fraught with legal perils for those who act unthinkingly or unknowingly.In some situations, laws governing cyber activities...

Unsolicited Email Yes or No
?    by June CampbellIf Internet marketing is on your list of things to do, you will have to decide what role email will play in your marketing activities. Unless you've been living in a cyber-cave, you already know that the topic of bulk email is a contentious one. While opponents and anti-spam groups protest and lobby to ban the use of unsolicited email (spam), our mailboxes continue to fill with … well, crap.And make no mistake; this influx is an inconvenience. Yes, you can set up email...

Their Secret Lives or My Ezine Has a Love Life
   by June CampbellI've just discovered something amazing. The Roundup, my bi-weeklyezine, has a love life! As a matter of fact, it appears to be doing much better than I am in that respect. You see, The Roundup regularly receivesemail messages sent to its subscription address. The last one started,Hi, It's been awhile since we talked. I'm wondering if you've beenthinking about our last conversation….Oh, Roundup, you little devil you! Have you been sneaking aroundbehind my back with other...

Things Ezine Publishers Wished Their Subscribers Knew
   by June CampbellWant to make the most of the ezines that you receive?Understanding the following will go a long way towards makingyour ezine subscribing a pleasant experience.1. Advertisements Make It Possible.You're outraged because the free ezine contains advertisements?Consider that you PAY to receive newspapers, magazines andtelevision shows, and they all contain ads. The publisher of that freeezine isn't doing hours and hours of work just to make you happy. Heis trying to make a living...

Ten O Clock Charley and Other Irritants
   by June CampbellI'm tired of Ten O'Clock Charley. (MASH fans will get theconnection.) Charley is the twit that inevitably sends me 4-6 virusesby email a day or two after my newsletter is published. My anti-virussoftware picks them off like mosquitoes attacking a bug zapper. Heor she) must have subscribed using an autoresponder that isprogrammed to send out the viruses according to a set schedule.Maybe I'm just ready for a vacation, but I'm weary of the badbehavior that is so commonplace on...

What Do They Search For
?   by June CampbellDo you know what and how people search when online? If you're operating an online business, this is important information. Understanding search habits and online behaviors helps you strategize your marketing campaigns.Pew Internet Project has released a new study (summer 2002) describing what people do online. ( The researchers found that searching for information is big -- second only to using email. Fully eighty percent of Americans who are on...

Don t Gimme No Solutions
   by June CampbellEver thought that this whole technology thing is just too confusing for the average person to understand? Ever visited a web site to learn about a new computer product only to leave the site muttering, I don't get it. It's way too complicated?Well, if you have, you're not alone, and the problem may not be of your making. The way I see it, the technology marketers on the Information Superhighway are spinning their wheels in a morass of jargon and hype. The result? A...

Who s Peering Into Your Computer
?   by June CampbellHave any passwords, love letters, naughty picturesor sensitive business information stored on yourhard drive? It's almost embarrassingly easy for ahacker to break into a networked computer andretrieve your personal information.Does your computer have an interior microphone oran interior video recorder? If yes, thesetechnologies can be activated without your knowledge.Hackers can not only get your data files, but theycan record sound and video files of the conversationsand...

Publishers / Webmasters
Article ID: 16803
DELINK URL from Authors Bio
REMOVE Article
Tell A Friend
Leave A Comment!
Download this article in PDF
Report Article!
Search through all the articles:

201 Users Online!!
Related Articles:
Latest Articles:
Copywriting >> Top 50 Articles on Copywriting
Category - >
Advertising Advice Affiliate Programs Automobiles
Be Your Own Mentor Careers Communication Consumers
CopyWriting Crime Domain Names DoT com Entrepreneur Corner
Ebooks Ecommerce Education Email
Entertainment Environment Family Finance And Business
Food & Drink Gardening Health & Fitness Hobbies
Home Business Home Improvement Humour House Holds
Internet And Computers Kiddos and Teens Legal Matters Mail Order
Management Marketing Marriage MetaPhysical
Motivational MultiMedia Multi Level Marketing NewsLetters
Pets Psychology Religion Parenting
Politics Sales Science Search Engine Optimization
Site Promotion Sports Technology Travel
Web Development Web Hosting WeightLoss Women's Corner
Writing Miscellaneous Articles Real Estate Arts And Crafts

Disclaimer: The information presented and opinions expressed in the articles are those of the authors
and do not necessarily represent the views of and/or its owners.

Copyright © AwareINDIA. All rights reserved || Privacy Policy || Terms Of Use || Author Guidelines || Free Articles
FAQs Link To Us || Submit An Article || Free Downloads|| Contact Us || Site Map  || Advertise with Us ||
Click here for Special webhosting packages for visitors of this website only!
Vastu Shastra

India Hosting Services Provided By AwareIndia

Company IDS