SlideShare ist ein Scribd-Unternehmen logo
1 von 55
Downloaden Sie, um offline zu lesen
ARE PEOPLE STEALING
YOUR CONTENT?
How to keep your marketing content safe from internet thieves
The internet is
the wild west.
Everyone’s
trying to get
their piece of
content gold.
Don’t worry,
you’re doing
it right.
sparks discussion.
You create content that
goes viral.
You create content that
drives business.
You create content that
But some people want to take shortcuts.
They steal your content
to grow their business.
Sound
familiar?
IT’S NOT FAIR.
IT’S NOT FAIR.
It’s your content.
IT’S NOT FAIR.
It’s your search engine rankings.
IT’S NOT FAIR.
It’s your business.
So let’s band
together …
… and fight back against
the content thieves.
HERE’S HOW.
Know your rights.
1
As soon as you publish
content online, you are
covered under Copyright Law.FACT	
  
No needed.©	
  
… but, people are still legally allowed to use
parts of your content under the “fair use” clause.
… so then what falls under fair use?
1.  Quotation of short passages in a scholarly or technical work
… so then what falls under fair use?
1.  Quotation of short passages in a scholarly or technical work
2.  Use of a work for commentary or criticism of the work
… so then what falls under fair use?
1.  Quotation of short passages in a scholarly or technical work
2.  Use of a work for commentary or criticism of the work
3.  Use in a parody
… so then what falls under fair use?
1.  Quotation of short passages in a scholarly or technical work
2.  Use of a work for commentary or criticism of the work
3.  Use in a parody
4.  Summary of an article with brief quotations in a news report
… so then what falls under fair use?
1.  Quotation of short passages in a scholarly or technical work
2.  Use of a work for commentary or criticism of the work
3.  Use in a parody
4.  Summary of an article with brief quotations in a news report
5.  And many other situations
… so then what falls under fair use?
Fair use isn’t black and white.
So if you’re still
not sure if it’s
fair use or
copyright
infringement …
Check out this free checklist*
to figure it out:
http://bit.ly/cqOLL3
*Of course, we aren’t lawyers and
this checklist does not act as legal advice.
If you have one available,
it’s always best to get in
touch with a lawyer
before moving to the next step.
Pick your battles.
2
Before accusing anyone
of stealing …
Ask yourself 3 questions.
1.  Do I have a relationship with the copycat?
Ask yourself 3 questions.
1.  Do I have a relationship with the copycat?
2.  Will the copycat send me traffic?
Ask yourself 3 questions.
1.  Do I have a relationship with the copycat?
2.  Will the copycat send me traffic?
3.  Can I increase my brand exposure with the stolen content?
Ask yourself 3 questions.
If the answer to all
three questions is NO ...
Lay down the law.
3
Grab a screenshot as evidence.
No	
  one	
  likes	
  a	
  ta,le	
  tale—talk	
  to	
  the	
  thief	
  directly.	
  
Then, talk with the thief directly.
If the thief doesn’t want to listen,
ask Google to help remove the content.
While you can always try to get your
content removed after it’s been stolen,
it’s much better to …
Stop the crime
before it happens.4
Take ownership of
your content with
Google Authorship
and branded visuals.
©	
  Prominently
display
your rights.
Make it hard for bots
to steal content from
your RSS feed.
Create content
usage guidelines.
These preventative measures stop
content theft every single day.*
These preventative measures stop
content theft every single day.*
*They won’t deter all content thieves.
But, even though there’s
no 100% effective way
to prevent people from
stealing your content …
Knowing your rights
and having an immediate
plan-of-action will help
keep your marketing
content safe.
http://bit.ly/ContentTheft
Click here to learn
more about keeping
your content safe:
By Ginny Soskey.
@gsosk

Weitere ähnliche Inhalte

Mehr von HubSpot

15 Stats Every Marketing Leader Needs to Know
15 Stats Every Marketing Leader Needs to Know15 Stats Every Marketing Leader Needs to Know
15 Stats Every Marketing Leader Needs to KnowHubSpot
 
Inbound Recruiting: Hire Top Talent By Thinking Like a Marketer
Inbound Recruiting: Hire Top Talent By Thinking Like a MarketerInbound Recruiting: Hire Top Talent By Thinking Like a Marketer
Inbound Recruiting: Hire Top Talent By Thinking Like a MarketerHubSpot
 
What's a Growth Stack? And why you should build one.
What's a Growth Stack? And why you should build one. What's a Growth Stack? And why you should build one.
What's a Growth Stack? And why you should build one. HubSpot
 
HubSpot Diversity Data 2016
HubSpot Diversity Data 2016HubSpot Diversity Data 2016
HubSpot Diversity Data 2016HubSpot
 
Add the Women Back: Wikipedia Edit-a-Thon
Add the Women Back: Wikipedia Edit-a-ThonAdd the Women Back: Wikipedia Edit-a-Thon
Add the Women Back: Wikipedia Edit-a-ThonHubSpot
 
What is Inbound Recruiting?
What is Inbound Recruiting?What is Inbound Recruiting?
What is Inbound Recruiting?HubSpot
 
Behind the Scenes: Launching HubSpot Tokyo
Behind the Scenes: Launching HubSpot TokyoBehind the Scenes: Launching HubSpot Tokyo
Behind the Scenes: Launching HubSpot TokyoHubSpot
 
25 Discovery Call Questions
25 Discovery Call Questions25 Discovery Call Questions
25 Discovery Call QuestionsHubSpot
 
How to Earn the Attention of Today's Buyer
How to Earn the Attention of Today's BuyerHow to Earn the Attention of Today's Buyer
How to Earn the Attention of Today's BuyerHubSpot
 
Class 1: Email Marketing Certification course: Email Marketing and Your Business
Class 1: Email Marketing Certification course: Email Marketing and Your BusinessClass 1: Email Marketing Certification course: Email Marketing and Your Business
Class 1: Email Marketing Certification course: Email Marketing and Your BusinessHubSpot
 
Why People Block Ads (And What It Means for Marketers and Advertisers) [New R...
Why People Block Ads (And What It Means for Marketers and Advertisers) [New R...Why People Block Ads (And What It Means for Marketers and Advertisers) [New R...
Why People Block Ads (And What It Means for Marketers and Advertisers) [New R...HubSpot
 
10 Things You Didn’t Know About Mobile Email from Litmus & HubSpot
 10 Things You Didn’t Know About Mobile Email from Litmus & HubSpot 10 Things You Didn’t Know About Mobile Email from Litmus & HubSpot
10 Things You Didn’t Know About Mobile Email from Litmus & HubSpotHubSpot
 
3 Proven Sales Email Templates Used by Successful Companies
3 Proven Sales Email Templates Used by Successful Companies3 Proven Sales Email Templates Used by Successful Companies
3 Proven Sales Email Templates Used by Successful CompaniesHubSpot
 
Modern Prospecting Techniques for Connecting with Prospects (from Sales Hacke...
Modern Prospecting Techniques for Connecting with Prospects (from Sales Hacke...Modern Prospecting Techniques for Connecting with Prospects (from Sales Hacke...
Modern Prospecting Techniques for Connecting with Prospects (from Sales Hacke...HubSpot
 
14 Reasons Why Inbound Marketers Make Great Advertisers
14 Reasons Why Inbound Marketers Make Great Advertisers14 Reasons Why Inbound Marketers Make Great Advertisers
14 Reasons Why Inbound Marketers Make Great AdvertisersHubSpot
 
How To Define A Conversion Path
How To Define A Conversion PathHow To Define A Conversion Path
How To Define A Conversion PathHubSpot
 
Generate Traffic and Conversions on Your Blog... Without Creating Another Post
Generate Traffic and Conversions on Your Blog... Without Creating Another PostGenerate Traffic and Conversions on Your Blog... Without Creating Another Post
Generate Traffic and Conversions on Your Blog... Without Creating Another PostHubSpot
 
Top 100 quotes from Medium in 2015
Top 100 quotes from Medium in 2015Top 100 quotes from Medium in 2015
Top 100 quotes from Medium in 2015HubSpot
 
23 Shocking Truths New Managers Learned On The Job
23 Shocking Truths New Managers Learned On The Job23 Shocking Truths New Managers Learned On The Job
23 Shocking Truths New Managers Learned On The JobHubSpot
 
Why Security Matters for Marketers
Why Security Matters for MarketersWhy Security Matters for Marketers
Why Security Matters for MarketersHubSpot
 

Mehr von HubSpot (20)

15 Stats Every Marketing Leader Needs to Know
15 Stats Every Marketing Leader Needs to Know15 Stats Every Marketing Leader Needs to Know
15 Stats Every Marketing Leader Needs to Know
 
Inbound Recruiting: Hire Top Talent By Thinking Like a Marketer
Inbound Recruiting: Hire Top Talent By Thinking Like a MarketerInbound Recruiting: Hire Top Talent By Thinking Like a Marketer
Inbound Recruiting: Hire Top Talent By Thinking Like a Marketer
 
What's a Growth Stack? And why you should build one.
What's a Growth Stack? And why you should build one. What's a Growth Stack? And why you should build one.
What's a Growth Stack? And why you should build one.
 
HubSpot Diversity Data 2016
HubSpot Diversity Data 2016HubSpot Diversity Data 2016
HubSpot Diversity Data 2016
 
Add the Women Back: Wikipedia Edit-a-Thon
Add the Women Back: Wikipedia Edit-a-ThonAdd the Women Back: Wikipedia Edit-a-Thon
Add the Women Back: Wikipedia Edit-a-Thon
 
What is Inbound Recruiting?
What is Inbound Recruiting?What is Inbound Recruiting?
What is Inbound Recruiting?
 
Behind the Scenes: Launching HubSpot Tokyo
Behind the Scenes: Launching HubSpot TokyoBehind the Scenes: Launching HubSpot Tokyo
Behind the Scenes: Launching HubSpot Tokyo
 
25 Discovery Call Questions
25 Discovery Call Questions25 Discovery Call Questions
25 Discovery Call Questions
 
How to Earn the Attention of Today's Buyer
How to Earn the Attention of Today's BuyerHow to Earn the Attention of Today's Buyer
How to Earn the Attention of Today's Buyer
 
Class 1: Email Marketing Certification course: Email Marketing and Your Business
Class 1: Email Marketing Certification course: Email Marketing and Your BusinessClass 1: Email Marketing Certification course: Email Marketing and Your Business
Class 1: Email Marketing Certification course: Email Marketing and Your Business
 
Why People Block Ads (And What It Means for Marketers and Advertisers) [New R...
Why People Block Ads (And What It Means for Marketers and Advertisers) [New R...Why People Block Ads (And What It Means for Marketers and Advertisers) [New R...
Why People Block Ads (And What It Means for Marketers and Advertisers) [New R...
 
10 Things You Didn’t Know About Mobile Email from Litmus & HubSpot
 10 Things You Didn’t Know About Mobile Email from Litmus & HubSpot 10 Things You Didn’t Know About Mobile Email from Litmus & HubSpot
10 Things You Didn’t Know About Mobile Email from Litmus & HubSpot
 
3 Proven Sales Email Templates Used by Successful Companies
3 Proven Sales Email Templates Used by Successful Companies3 Proven Sales Email Templates Used by Successful Companies
3 Proven Sales Email Templates Used by Successful Companies
 
Modern Prospecting Techniques for Connecting with Prospects (from Sales Hacke...
Modern Prospecting Techniques for Connecting with Prospects (from Sales Hacke...Modern Prospecting Techniques for Connecting with Prospects (from Sales Hacke...
Modern Prospecting Techniques for Connecting with Prospects (from Sales Hacke...
 
14 Reasons Why Inbound Marketers Make Great Advertisers
14 Reasons Why Inbound Marketers Make Great Advertisers14 Reasons Why Inbound Marketers Make Great Advertisers
14 Reasons Why Inbound Marketers Make Great Advertisers
 
How To Define A Conversion Path
How To Define A Conversion PathHow To Define A Conversion Path
How To Define A Conversion Path
 
Generate Traffic and Conversions on Your Blog... Without Creating Another Post
Generate Traffic and Conversions on Your Blog... Without Creating Another PostGenerate Traffic and Conversions on Your Blog... Without Creating Another Post
Generate Traffic and Conversions on Your Blog... Without Creating Another Post
 
Top 100 quotes from Medium in 2015
Top 100 quotes from Medium in 2015Top 100 quotes from Medium in 2015
Top 100 quotes from Medium in 2015
 
23 Shocking Truths New Managers Learned On The Job
23 Shocking Truths New Managers Learned On The Job23 Shocking Truths New Managers Learned On The Job
23 Shocking Truths New Managers Learned On The Job
 
Why Security Matters for Marketers
Why Security Matters for MarketersWhy Security Matters for Marketers
Why Security Matters for Marketers
 

Kürzlich hochgeladen

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 

Kürzlich hochgeladen (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 

Are People Stealing Your Content? How (and When) to Fight Back