Forum Moderators: open
Because this is happening so frequently, and I rank well in Google, I am worried that Google is going to spider these infringing sites with identical content and say "hey, she's duplicating this, let's ban her" when in actual fact, it is not me at all, but infringers.
And yes, I do have a copyright notice on the bottom of every single page (and this last case didn't even bother to remove it when they swiped the source code)
Is there anything I can do Google-wise so that this kind of thing doesn't ruin my rankings, ban certain pages or get me booted out of Google all together? Should I be sending a report to Google? Or a Digital Millennium Copyright Act notice (worried that might make Google cranky if I go and send a notice like that!) I have worked hard, and I don't want thieves to cause my online demise because they swiped my content.
Jen
I have a simmilar information/specification/procedures site that suffers with the same problem.
To date I have had a good success rate by cease and desist Emails.
For one particular stuborn offender who did not respond to firm but polite requests, just the threat of reporting to Google using this phrase "This site www.url.com is duplicating my content and also refuses to respond to my Emails" resulted in prompt action from the offenders.
Good luck
I also downloaded the program Hijack Blaster for free to protect my site.
[webmasterworld.com...]
[webmasterworld.com...]
Is there anywone that have any experience of the program Web Lock,it looks very good,but is it really that good that they say.I just had a quick look at the product's home page which is protected with itself. It's another of these applications that uses JavaScript to decode an encrypted version of the sourcecode.
This should solve the problem with duplicating,stolen sites and so on.It will stop the casual user from getting their hands on the source code, yes. But the source code is still there along with the code to access it, so anyone who's determined will still be able to steal it. It's basically security through obscurity, which isn't really security at all.