SlideShare ist ein Scribd-Unternehmen logo
1 von 55
Downloaden Sie, um offline zu lesen
ARE PEOPLE STEALING
YOUR CONTENT?
How to keep your marketing content safe from internet thieves
The internet is
the wild west.
Everyone’s
trying to get
their piece of
content gold.
Don’t worry,
you’re doing
it right.
sparks discussion.
You create content that
goes viral.
You create content that
drives business.
You create content that
But some people want to take shortcuts.
They steal your content
to grow their business.
Sound
familiar?
IT’S NOT FAIR.
IT’S NOT FAIR.
It’s your content.
IT’S NOT FAIR.
It’s your search engine rankings.
IT’S NOT FAIR.
It’s your business.
So let’s band
together …
… and fight back against
the content thieves.
HERE’S HOW.
Know your rights.
1
As soon as you publish
content online, you are
covered under Copyright Law.FACT	
  
No needed.©	
  
… but, people are still legally allowed to use
parts of your content under the “fair use” clause.
… so then what falls under fair use?
1.  Quotation of short passages in a scholarly or technical work
… so then what falls under fair use?
1.  Quotation of short passages in a scholarly or technical work
2.  Use of a work for commentary or criticism of the work
… so then what falls under fair use?
1.  Quotation of short passages in a scholarly or technical work
2.  Use of a work for commentary or criticism of the work
3.  Use in a parody
… so then what falls under fair use?
1.  Quotation of short passages in a scholarly or technical work
2.  Use of a work for commentary or criticism of the work
3.  Use in a parody
4.  Summary of an article with brief quotations in a news report
… so then what falls under fair use?
1.  Quotation of short passages in a scholarly or technical work
2.  Use of a work for commentary or criticism of the work
3.  Use in a parody
4.  Summary of an article with brief quotations in a news report
5.  And many other situations
… so then what falls under fair use?
Fair use isn’t black and white.
So if you’re still
not sure if it’s
fair use or
copyright
infringement …
Check out this free checklist*
to figure it out:
http://bit.ly/cqOLL3
*Of course, we aren’t lawyers and
this checklist does not act as legal advice.
If you have one available,
it’s always best to get in
touch with a lawyer
before moving to the next step.
Pick your battles.
2
Before accusing anyone
of stealing …
Ask yourself 3 questions.
1.  Do I have a relationship with the copycat?
Ask yourself 3 questions.
1.  Do I have a relationship with the copycat?
2.  Will the copycat send me traffic?
Ask yourself 3 questions.
1.  Do I have a relationship with the copycat?
2.  Will the copycat send me traffic?
3.  Can I increase my brand exposure with the stolen content?
Ask yourself 3 questions.
If the answer to all
three questions is NO ...
Lay down the law.
3
Grab a screenshot as evidence.
No	
  one	
  likes	
  a	
  ta,le	
  tale—talk	
  to	
  the	
  thief	
  directly.	
  
Then, talk with the thief directly.
If the thief doesn’t want to listen,
ask Google to help remove the content.
While you can always try to get your
content removed after it’s been stolen,
it’s much better to …
Stop the crime
before it happens.4
Take ownership of
your content with
Google Authorship
and branded visuals.
©	
  Prominently
display
your rights.
Make it hard for bots
to steal content from
your RSS feed.
Create content
usage guidelines.
These preventative measures stop
content theft every single day.*
These preventative measures stop
content theft every single day.*
*They won’t deter all content thieves.
But, even though there’s
no 100% effective way
to prevent people from
stealing your content …
Knowing your rights
and having an immediate
plan-of-action will help
keep your marketing
content safe.
http://bit.ly/ContentTheft
Click here to learn
more about keeping
your content safe:
By Ginny Soskey.
@gsosk

Weitere ähnliche Inhalte

Mehr von HubSpot

15 Stats Every Marketing Leader Needs to Know
15 Stats Every Marketing Leader Needs to Know15 Stats Every Marketing Leader Needs to Know
15 Stats Every Marketing Leader Needs to KnowHubSpot
 
Inbound Recruiting: Hire Top Talent By Thinking Like a Marketer
Inbound Recruiting: Hire Top Talent By Thinking Like a MarketerInbound Recruiting: Hire Top Talent By Thinking Like a Marketer
Inbound Recruiting: Hire Top Talent By Thinking Like a MarketerHubSpot
 
What's a Growth Stack? And why you should build one.
What's a Growth Stack? And why you should build one. What's a Growth Stack? And why you should build one.
What's a Growth Stack? And why you should build one. HubSpot
 
HubSpot Diversity Data 2016
HubSpot Diversity Data 2016HubSpot Diversity Data 2016
HubSpot Diversity Data 2016HubSpot
 
Add the Women Back: Wikipedia Edit-a-Thon
Add the Women Back: Wikipedia Edit-a-ThonAdd the Women Back: Wikipedia Edit-a-Thon
Add the Women Back: Wikipedia Edit-a-ThonHubSpot
 
What is Inbound Recruiting?
What is Inbound Recruiting?What is Inbound Recruiting?
What is Inbound Recruiting?HubSpot
 
Behind the Scenes: Launching HubSpot Tokyo
Behind the Scenes: Launching HubSpot TokyoBehind the Scenes: Launching HubSpot Tokyo
Behind the Scenes: Launching HubSpot TokyoHubSpot
 
25 Discovery Call Questions
25 Discovery Call Questions25 Discovery Call Questions
25 Discovery Call QuestionsHubSpot
 
How to Earn the Attention of Today's Buyer
How to Earn the Attention of Today's BuyerHow to Earn the Attention of Today's Buyer
How to Earn the Attention of Today's BuyerHubSpot
 
Class 1: Email Marketing Certification course: Email Marketing and Your Business
Class 1: Email Marketing Certification course: Email Marketing and Your BusinessClass 1: Email Marketing Certification course: Email Marketing and Your Business
Class 1: Email Marketing Certification course: Email Marketing and Your BusinessHubSpot
 
Why People Block Ads (And What It Means for Marketers and Advertisers) [New R...
Why People Block Ads (And What It Means for Marketers and Advertisers) [New R...Why People Block Ads (And What It Means for Marketers and Advertisers) [New R...
Why People Block Ads (And What It Means for Marketers and Advertisers) [New R...HubSpot
 
10 Things You Didn’t Know About Mobile Email from Litmus & HubSpot
 10 Things You Didn’t Know About Mobile Email from Litmus & HubSpot 10 Things You Didn’t Know About Mobile Email from Litmus & HubSpot
10 Things You Didn’t Know About Mobile Email from Litmus & HubSpotHubSpot
 
3 Proven Sales Email Templates Used by Successful Companies
3 Proven Sales Email Templates Used by Successful Companies3 Proven Sales Email Templates Used by Successful Companies
3 Proven Sales Email Templates Used by Successful CompaniesHubSpot
 
Modern Prospecting Techniques for Connecting with Prospects (from Sales Hacke...
Modern Prospecting Techniques for Connecting with Prospects (from Sales Hacke...Modern Prospecting Techniques for Connecting with Prospects (from Sales Hacke...
Modern Prospecting Techniques for Connecting with Prospects (from Sales Hacke...HubSpot
 
14 Reasons Why Inbound Marketers Make Great Advertisers
14 Reasons Why Inbound Marketers Make Great Advertisers14 Reasons Why Inbound Marketers Make Great Advertisers
14 Reasons Why Inbound Marketers Make Great AdvertisersHubSpot
 
How To Define A Conversion Path
How To Define A Conversion PathHow To Define A Conversion Path
How To Define A Conversion PathHubSpot
 
Generate Traffic and Conversions on Your Blog... Without Creating Another Post
Generate Traffic and Conversions on Your Blog... Without Creating Another PostGenerate Traffic and Conversions on Your Blog... Without Creating Another Post
Generate Traffic and Conversions on Your Blog... Without Creating Another PostHubSpot
 
Top 100 quotes from Medium in 2015
Top 100 quotes from Medium in 2015Top 100 quotes from Medium in 2015
Top 100 quotes from Medium in 2015HubSpot
 
23 Shocking Truths New Managers Learned On The Job
23 Shocking Truths New Managers Learned On The Job23 Shocking Truths New Managers Learned On The Job
23 Shocking Truths New Managers Learned On The JobHubSpot
 
Why Security Matters for Marketers
Why Security Matters for MarketersWhy Security Matters for Marketers
Why Security Matters for MarketersHubSpot
 

Mehr von HubSpot (20)

15 Stats Every Marketing Leader Needs to Know
15 Stats Every Marketing Leader Needs to Know15 Stats Every Marketing Leader Needs to Know
15 Stats Every Marketing Leader Needs to Know
 
Inbound Recruiting: Hire Top Talent By Thinking Like a Marketer
Inbound Recruiting: Hire Top Talent By Thinking Like a MarketerInbound Recruiting: Hire Top Talent By Thinking Like a Marketer
Inbound Recruiting: Hire Top Talent By Thinking Like a Marketer
 
What's a Growth Stack? And why you should build one.
What's a Growth Stack? And why you should build one. What's a Growth Stack? And why you should build one.
What's a Growth Stack? And why you should build one.
 
HubSpot Diversity Data 2016
HubSpot Diversity Data 2016HubSpot Diversity Data 2016
HubSpot Diversity Data 2016
 
Add the Women Back: Wikipedia Edit-a-Thon
Add the Women Back: Wikipedia Edit-a-ThonAdd the Women Back: Wikipedia Edit-a-Thon
Add the Women Back: Wikipedia Edit-a-Thon
 
What is Inbound Recruiting?
What is Inbound Recruiting?What is Inbound Recruiting?
What is Inbound Recruiting?
 
Behind the Scenes: Launching HubSpot Tokyo
Behind the Scenes: Launching HubSpot TokyoBehind the Scenes: Launching HubSpot Tokyo
Behind the Scenes: Launching HubSpot Tokyo
 
25 Discovery Call Questions
25 Discovery Call Questions25 Discovery Call Questions
25 Discovery Call Questions
 
How to Earn the Attention of Today's Buyer
How to Earn the Attention of Today's BuyerHow to Earn the Attention of Today's Buyer
How to Earn the Attention of Today's Buyer
 
Class 1: Email Marketing Certification course: Email Marketing and Your Business
Class 1: Email Marketing Certification course: Email Marketing and Your BusinessClass 1: Email Marketing Certification course: Email Marketing and Your Business
Class 1: Email Marketing Certification course: Email Marketing and Your Business
 
Why People Block Ads (And What It Means for Marketers and Advertisers) [New R...
Why People Block Ads (And What It Means for Marketers and Advertisers) [New R...Why People Block Ads (And What It Means for Marketers and Advertisers) [New R...
Why People Block Ads (And What It Means for Marketers and Advertisers) [New R...
 
10 Things You Didn’t Know About Mobile Email from Litmus & HubSpot
 10 Things You Didn’t Know About Mobile Email from Litmus & HubSpot 10 Things You Didn’t Know About Mobile Email from Litmus & HubSpot
10 Things You Didn’t Know About Mobile Email from Litmus & HubSpot
 
3 Proven Sales Email Templates Used by Successful Companies
3 Proven Sales Email Templates Used by Successful Companies3 Proven Sales Email Templates Used by Successful Companies
3 Proven Sales Email Templates Used by Successful Companies
 
Modern Prospecting Techniques for Connecting with Prospects (from Sales Hacke...
Modern Prospecting Techniques for Connecting with Prospects (from Sales Hacke...Modern Prospecting Techniques for Connecting with Prospects (from Sales Hacke...
Modern Prospecting Techniques for Connecting with Prospects (from Sales Hacke...
 
14 Reasons Why Inbound Marketers Make Great Advertisers
14 Reasons Why Inbound Marketers Make Great Advertisers14 Reasons Why Inbound Marketers Make Great Advertisers
14 Reasons Why Inbound Marketers Make Great Advertisers
 
How To Define A Conversion Path
How To Define A Conversion PathHow To Define A Conversion Path
How To Define A Conversion Path
 
Generate Traffic and Conversions on Your Blog... Without Creating Another Post
Generate Traffic and Conversions on Your Blog... Without Creating Another PostGenerate Traffic and Conversions on Your Blog... Without Creating Another Post
Generate Traffic and Conversions on Your Blog... Without Creating Another Post
 
Top 100 quotes from Medium in 2015
Top 100 quotes from Medium in 2015Top 100 quotes from Medium in 2015
Top 100 quotes from Medium in 2015
 
23 Shocking Truths New Managers Learned On The Job
23 Shocking Truths New Managers Learned On The Job23 Shocking Truths New Managers Learned On The Job
23 Shocking Truths New Managers Learned On The Job
 
Why Security Matters for Marketers
Why Security Matters for MarketersWhy Security Matters for Marketers
Why Security Matters for Marketers
 

Kürzlich hochgeladen

activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 

Kürzlich hochgeladen (20)

activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 

Are People Stealing Your Content? How (and When) to Fight Back