473,225 Members | 787 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,225 software developers and data experts.

Legal restrictions

Don't you just love sites that put up meaningless legal restrictions? I
just came across one that said "No part of this site may be used without
prior permission...".

I looked at the HTML, and discovered that they'd used <H1>... damn! I'm
in violation now, I'll have to use <H2>... damn! Another violation, and
another tag lost. I'll be in jail soon.

Still, they hadn't used the rarely seen <ABBRtag, so I'm safe with
that one for the time being. Although my pages may get a little
dull(er), you can be sure that I won't use any abbreviation without
explaining it in its first use.

--
Steve Swift
http://www.swiftys.org.uk/swifty.html
http://www.ringers.org.uk
Oct 18 '07 #1
2 1608
Steve Swift wrote:
Don't you just love sites that put up meaningless legal restrictions? I
just came across one that said "No part of this site may be used without
prior permission...".
"Used?" That's not so bad. I mean, it's pretty lenient compared to these
guys: <http://www.boingboing.net/2007/10/17/lawfirm-copyright-pr.html>*.
And these are lawyers, so if you *do* view the source of their site,
then by God, they will hunt you down and sue you until you can't see
straight!
>
I looked at the HTML,
Living pretty dangerously, there. You might get sued if you keep that
kind of despicable, anti-social behavior up. ;-)
*not a direct link, but a BB post about dimwits with law degrees
--
John
Pondering the value of shooting all the lawyers
(or anybody who attempts to write a EULA)
Oct 18 '07 #2
On 10/18/2007 12:46 AM, John Hosking wrote:
Steve Swift wrote:
>Don't you just love sites that put up meaningless legal restrictions? I
just came across one that said "No part of this site may be used without
prior permission...".

"Used?" That's not so bad. I mean, it's pretty lenient compared to these
guys: <http://www.boingboing.net/2007/10/17/lawfirm-copyright-pr.html>*.
And these are lawyers, so if you *do* view the source of their site,
then by God, they will hunt you down and sue you until you can't see
straight!
>I looked at the HTML,

Living pretty dangerously, there. You might get sued if you keep that
kind of despicable, anti-social behavior up. ;-)
*not a direct link, but a BB post about dimwits with law degrees
All this is quite different from claiming a copyright on the CONTENT of
a Web page. That is quite legitimate and enforceable.

I sometimes receive an E-mail message with the following warning:

"CONFIDENTIALLY NOTICE: This e-mail communication and any attachments
may contain confidential and privileged information for the use of the
designated recipients named above. Any unauthorized review, use,
disclosure or distribution is prohibited. If you are not the intended
recipient, please contact the sender by reply e-mail and destroy all
copies of the original message."

This is not enforceable. If someone sends me a restricted message by
mistake, that is their error for which they must suffer the consequences
if I choose to show the message to my neighbor or forward it to my
daughter. They cannot shift responsibility to me. In any case, a truly
confidential message should be encrypted before sending; but that's a
topic for the alt.security.pgp and comp.security.pgp.discuss newsgroups.

--
David E. Ross
<http://www.rossde.com/>

Natural foods can be harmful: Look at all the
people who die of natural causes.
Oct 18 '07 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

6
by: Alf P. Steinbach | last post by:
One main usage of references is for arguments, to replace e.g. void foo(int*) with void foo(int&). However, our Holy Standard claims that a reference must be initialized with an _object_, before...
2
by: Shailendra Batham | last post by:
Hello Gurus, I want to put some restrictions on my attribute tag in my XML Schema, anyone out there have any idea how to do that. here is my XML and the XML Schema <?xml version="1.0"...
6
by: aj | last post by:
I currently have 2 official DB2 Workgroup Edition licenses for my 2 v8 production servers. I also have tech support/software upgrade agreements in place for both servers. I am interested in...
15
by: K.M Jr | last post by:
Hi group, I want you to tell me if the following code is legal as per Standard. void foo(int *p) { } int main(void)
14
by: Frank Rizzo | last post by:
I realize that this maybe the wrong forum, but maybe someone has run into this situation before. I sell an app and I want to offer my customers a migration path from a competing product. However,...
5
by: Debbie Erickson | last post by:
Lately I've been getting lots of spam, selling cheap software. The website was oemsoftwarehouse.com. They supposedly were selling oem software of Borland's Delphi and Microsoft's Visual Studio. ...
27
by: Erik de Castro Lopo | last post by:
Hi all, The GNU C compiler allows a void pointer to be incremented and the behaviour is equivalent to incrementing a char pointer. Is this legal C99 or is this a GNU C extention? Thanks in...
10
by: John T. | last post by:
Hi all Figure this scenario: - My Company develops an assembly (a controls DLL) - Since an obfuscation software is too expensive, my Company engages a consultant and delegates him the...
5
by: Noah Roberts | last post by:
#define new DEBUG_NEW I can't imagine that has defined behavior.
1
isladogs
by: isladogs | last post by:
The next online meeting of the Access Europe User Group will be on Wednesday 6 Dec 2023 starting at 18:00 UK time (6PM UTC) and finishing at about 19:15 (7.15PM). In this month's session, Mike...
3
isladogs
by: isladogs | last post by:
The next Access Europe meeting will be on Wednesday 3 Jan 2024 starting at 18:00 UK time (6PM UTC) and finishing at about 19:15 (7.15PM). For other local times, please check World Time Buddy In...
0
by: jianzs | last post by:
Introduction Cloud-native applications are conventionally identified as those designed and nurtured on cloud infrastructure. Such applications, rooted in cloud technologies, skillfully benefit from...
2
by: jimatqsi | last post by:
The boss wants the word "CONFIDENTIAL" overlaying certain reports. He wants it large, slanted across the page, on every page, very light gray, outlined letters, not block letters. I thought Word Art...
2
isladogs
by: isladogs | last post by:
The next Access Europe meeting will be on Wednesday 7 Feb 2024 starting at 18:00 UK time (6PM UTC) and finishing at about 19:30 (7.30PM). In this month's session, the creator of the excellent VBE...
0
by: stefan129 | last post by:
Hey forum members, I'm exploring options for SSL certificates for multiple domains. Has anyone had experience with multi-domain SSL certificates? Any recommendations on reliable providers or specific...
0
Git
by: egorbl4 | last post by:
Скачал я git, хотел начать настройку, а там вылезло вот это Что это? Что мне с этим делать? ...
1
by: davi5007 | last post by:
Hi, Basically, I am trying to automate a field named TraceabilityNo into a web page from an access form. I've got the serial held in the variable strSearchString. How can I get this into the...
0
by: MeoLessi9 | last post by:
I have VirtualBox installed on Windows 11 and now I would like to install Kali on a virtual machine. However, on the official website, I see two options: "Installer images" and "Virtual machines"....

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.