User Tools

Site Tools


legal_aspects_of_phishing_spoofing_etc

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Next revisionBoth sides next revision
legal_aspects_of_phishing_spoofing_etc [2018/05/31 10:57] – [What is a copyright)] lucylegal_aspects_of_phishing_spoofing_etc [2018/12/17 14:22] – [Example legal disclaimer] lucy
Line 16: Line 16:
  
 So as long as the clients  are reinforcing, that any third party logo is for illustrative or instructional purposes only and there is no affiliation or relationship between the mark owner and LUCY or LUCY's customer, there is no legal issue. But customers should not omit this important information when customizing landing pages. So from a copyright perspective, incorporating a third party logo in a simulated phishing email serves an entirely new, transformative purpose, and as such, constitutes a fair use. The logo is employed in a different manner (unrelated to the offering or sale of goods or services) and for a different purpose (aimed at security awareness and educating the public about how to avoid phishing scams). This transformative use does not undermine the copyright holder or any market that the copyright holder would reasonably exploit. So as long as the clients  are reinforcing, that any third party logo is for illustrative or instructional purposes only and there is no affiliation or relationship between the mark owner and LUCY or LUCY's customer, there is no legal issue. But customers should not omit this important information when customizing landing pages. So from a copyright perspective, incorporating a third party logo in a simulated phishing email serves an entirely new, transformative purpose, and as such, constitutes a fair use. The logo is employed in a different manner (unrelated to the offering or sale of goods or services) and for a different purpose (aimed at security awareness and educating the public about how to avoid phishing scams). This transformative use does not undermine the copyright holder or any market that the copyright holder would reasonably exploit.
 +
 +===== Example legal disclaimer =====
 +
 +Please use a legal disclaimer for your email or landing page in case you spoof a third party brand for educational purposes. Example:
 +
 +  Please note that the third-party logos and trademarks used in this email or landing page are used for   illustrative or instructional purposes only and there is no connection or relationship between the trademark owner and Lucy Security or the LUCY Security customer.
  
  
legal_aspects_of_phishing_spoofing_etc.txt · Last modified: 2019/07/25 12:49 by 127.0.0.1