legal_aspects_of_phishing_spoofing_etc
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
legal_aspects_of_phishing_spoofing_etc [2015/12/28 16:33] – [Can we clone any website and use any logo?] lucy | legal_aspects_of_phishing_spoofing_etc [2018/12/17 14:23] – lucy | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ===== Can we clone any website | + | ===== About this chapter ===== |
+ | |||
+ | The information presented in this wiki is not a legal advice | ||
+ | |||
+ | |||
+ | ===== What is a copyright? ===== | ||
- | From the legal point of view, Copyright in Web is often considered as the grey area. But in the English law everything created privately | + | From the legal point of view, Copyright in Web is often considered as the grey area. But in the English law everything created privately |
+ | |||
+ | In English law, permissions to use copyright works (also known as licences) do NOT need to be in writing. For instance, when you make a website available to the world, you grant an implied licence to internet users to copy that website for the purpose of viewing it on a web browser. Therefore we recommend using the website cloner and logo's only from your own corporate site. | ||
+ | |||
+ | |||
+ | ===== Can you use 3rd party logos/ | ||
+ | |||
+ | When our customers incorporate another company’s logo in a simulated phishing email, that logo is not used in a way that confuses customers into believing that their goods or services originate with, are related to, or are sponsored by the company whose logo is displayed. | ||
+ | |||
+ | So as long as the clients | ||
+ | |||
+ | ===== Example legal disclaimer ===== | ||
+ | |||
+ | Please use a legal disclaimer for your email or landing page in case you spoof a third party brand for educational purposes. Example: | ||
+ | |||
+ | Please note that the third-party logos and trademarks used in this email or landing page are used for illustrative or instructional purposes only and there is no connection or relationship between the trademark owner and Lucy Security or the LUCY Security customer. | ||
===== Is impersonating an email even allowed? ===== | ===== Is impersonating an email even allowed? ===== |
legal_aspects_of_phishing_spoofing_etc.txt · Last modified: 2019/07/25 12:49 by 127.0.0.1