Make It Happen
My Tipsheets are chock full of ideas. They are all aimed at translating knowledge into a quick, action-oriented 60-second nugget.

First Name:
Last Name:
Tipsheet Archive
Randall's Resources
Whenever I speak or write, I often prepare extra "bonus" materials.
Enter the Resource Code to access this special content:
Resource Code:
Try this example Resource Code: eventplanning


Every organization owns intellectual property: in fact, this recorded knowledge is often key evidence of expertise, capability, and fit. So if it is that valuable, how do you protect it from being stolen?

Before answering that question, it is useful to distinguish between content that you want to be widely distributed, and content that is being sold.

Widely distributed content – blog posts and whitepapers for example – give prospective clients an opportunity to taste the chocolate before buying the box. Here’s how to protect this content:

  1. Include a byline (“by Randall Craig”) at the top.
  2. Include a mini-bio at the bottom.
  3. Include a copyright statement and usage permissions at the very bottom of the page. An example: Copyright © 2013 Randall Craig, all rights reserved. Permission is granted to reprint all or part of this document, as long as the byline and bio are included in its entirety.
  4.  For videos, superimpose your name and source URL over the video at key points – during the middle and at the end.
  5. Set up Google Alerts on key phrases, to monitor for usage and abuse.

For purchased digital products, these steps are necessary, but not sufficient. Here is more:

  1. Embed copyright and friendly do not share messages throughout the document: On a cover page, page footers, and if appropriate, embedded within the text itself. For exceptionally high-value intellectual property (IP), consider customizing the document to include the purchaser’s name.
  2. Consider password-protecting the document. While it will discourage casual piracy, it will also create a higher cost of support, as frustrated users will contact you with password requests.
  3. Use an e-commerce system that “encodes” the download links so that the link expires after one click. Better yet, sell your content through a third party rights-protected ecosystem, such as Amazon, Kindle, Apple’s iBookstore, Kobo and Nook. The”closed” nature of these systems are designed to protect against IP theft.
  4. Instead of sending IP “out”, provide access to the content on the cloud, behind a password-protected paywall. So long as the password is keyed to a credit card, it likely won’t get shared. Bonus: Set up  your system to allow the user to invite-and-pay-for-others to access the information with their own unique password.
  5. Create and release slightly different versions of the same content. While this may work best only for high-value items, it provides a mechanism to trace back to the source of the showing.
  6. Consider using specialized monitoring services, like, to identify additional unauthorized usage.

Finally, what to do upon discovering that your IP has been stolen? Three options:

  1. Ignore: The time and dollar cost of going after the perpetrator must be balanced against the value of sales lost. There is also the possibility that widespread distribution of your IP – even if illegal – may actually improve awareness of your products or services and ultimately lead to increased sales.
  2. Send a friendly request: Much of the time, sites posting unauthorized copies of your IP will remove them upon formal notification. Consider instead asking them to post an excerpt with in-built links to purchase the full version.
  3. Legal action: Unless you have very deep pockets and significant extra time on your hands, this option is usually a very last resort. Sometimes a formal letter from your lawyer – a threat of legal action – is enough.

This week’s action plan: How are you protecting your IP? Take an inventory, then assess how you can better protect your digital cargo.

Note: The Make It Happen Tipsheet is also available by email. Go to to register.

Randall Craig

@RandallCraig (follow me)
:  Professional credentials site
.com: Web strategy, technology, and development
:  Interviews with the nation’s thought-leaders


No Social Media Dial Tone

by Randall Craig on February 17, 2011

Filed in: Blog, Make It Happen Tipsheet, Planning, Social Media

Tagged as: , ,

For many of us, Social Media has become ubiquitous: we couldn’t imagine a day without Facebook, Twitter, LinkedIn, or YouTube. For many companies, Social Media is at the core of their strategies. But what if the plug was pulled? What if the government, or a technical disaster, caused a shutdown that lasted a week – or three? Or what if whole segments of society decided to completely unplug? (There is a movement towards this.)

Even though internet penetration and Social Media adoption is past the tipping point, it is terribly fragile, with many dependencies required to keep it alive. What can you do to protect yourself, if the plug were pulled unexpectedly?

  • Export your contacts from as many Social Media sites as you can, as a back-up. If you’re not sure how, search for ‘Export’ from help.
  • Extract any valuable content – answers, thoughtful discussion posts, pictures, etc. – again as back-up.
  • If you advertise, don’t just drive users to a website, but include information and a telephone call-to-action.
  • Formulate a disaster plan for your office (and family), in case all communication is cut-off unexpectedly.

This week’s action plan: Do a disaster-plan dry run, by not accessing any Social Media for 72 hours. Like all “necessary” activities, it may be hard to give up, but you’ll find a way to cope.  When the three days are up, embed what you learn into your current routines and disaster plans.

Note: The Make It Happen Tipsheet is also available by email. Go to to register.

Randall Craig

@RandallCraig (follow me)
:  Professional credentials site Web strategy, technology, and development
:  Interviews with the nation’s thought-leaders