Skip navigation

BLOGProtecting your Digital Cargo

by Randall CraigFiled in: Blog, Make It Happen Tipsheet, Risk, Social MediaTagged as: ,

Every organization owns intellectual property: in fact, this recorded knowledge is often key evidence of expertise, capability, and fit. So if it is that valuable, how do you protect it from being stolen?

Before answering that question, it is useful to distinguish between content that you want to be widely distributed, and content that is being sold.

Widely distributed content – blog posts and whitepapers for example – give prospective clients an opportunity to taste the chocolate before buying the box. Here’s how to protect this content:

  1. Include a byline (“by Randall Craig”) at the top.
  2. Include a mini-bio at the bottom.
  3. Include a copyright statement and usage permissions at the very bottom of the page. An example: Copyright © 2020 Randall Craig, all rights reserved. Permission is granted to reprint all or part of this document, as long as the byline, bio, and this notice are included in its entirety.
  4.  For videos, superimpose your name and source URL over the video at key points – during the middle and at the end.
  5. Set up Google Alerts on key phrases, to monitor for usage and abuse.

For purchased digital products, these steps are necessary, but not sufficient. Here is more:

  1. Embed copyright and friendly do not share messages throughout the document: On a cover page, page footers, and if appropriate, embedded within the text itself. For exceptionally high-value intellectual property (IP), consider customizing the document to include the purchaser’s name.
  2. Embed copyright and ownership information within the document’s meta data or within the “code” of the file.  This isn’t immediately noticeable to the thief, and often can be changed by them, but it is one more way to protect it.
  3. Consider password-protecting the document. While it will discourage casual piracy, it will also create a higher cost of support, as frustrated users will contact you with password requests.
  4. Use an e-commerce system that “encodes” the download links so that the link expires after one click. Better yet, sell your content through a third party rights-protected ecosystem, such as Amazon’s Kindle, Apple’s Books, Kobo, and Nook. The”closed” nature of these systems are designed to protect against IP theft.
  5. Instead of sending IP “out”, provide access to the content on the cloud, behind a password-protected paywall. So long as the password is keyed to a credit card, it likely won’t get shared. Bonus: Set up  your system to allow the user to invite-and-pay-for-others to access the information with their own unique password.
  6. Create and release slightly different versions of the same content. While this may work best only for high-value items, it provides a mechanism to trace back to the source of the IP theft.
  7. Consider using specialized monitoring services, like copyscape.com, to identify additional unauthorized usage.

Finally, what to do upon discovering that your IP has been stolen? Three options:

  1. Ignore: The time and dollar cost of going after the perpetrator must be balanced against the value of sales lost. There is also the possibility that widespread distribution of your IP – even if illegal – may actually improve awareness of your products or services and ultimately lead to increased sales.
  2. Send a friendly request: Much of the time, sites posting unauthorized copies of your IP will remove them upon formal notification. Consider instead asking them to post an excerpt with in-built links to purchase the full version.  A DMCA takedown notice is the more serious version of this.
  3. Legal action: Unless you have very deep pockets and significant extra time on your hands, this option is usually a very last resort. Sometimes a formal letter from your lawyer – a threat of legal action – is enough.

THIS WEEK’S ACTION PLAN

How are you protecting your IP? Take an inventory, then assess how you can better protect your digital cargo.

Does this topic resonate? Reach out to Randall: he can present it to your group.  (More presentation topics)
Download Randall’s professional credentials: Speaker credentials one-sheet or Management Advisory credentials.

Content Authenticity Statement: 100% original content: no AI was used in creating this content.

@RandallCraig (Follow me for daily insights)
www.RandallCraig.com: Professional credentials site.

CATEGORIES

INVITE
RANDALL
TO SPEAK

Randall Craig

Contact us for more on Randall’s topics, availability, and audience fit.

Back to top