473,395 Members | 1,571 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,395 software developers and data experts.

Legal restrictions

Don't you just love sites that put up meaningless legal restrictions? I
just came across one that said "No part of this site may be used without
prior permission...".

I looked at the HTML, and discovered that they'd used <H1>... damn! I'm
in violation now, I'll have to use <H2>... damn! Another violation, and
another tag lost. I'll be in jail soon.

Still, they hadn't used the rarely seen <ABBRtag, so I'm safe with
that one for the time being. Although my pages may get a little
dull(er), you can be sure that I won't use any abbreviation without
explaining it in its first use.

--
Steve Swift
http://www.swiftys.org.uk/swifty.html
http://www.ringers.org.uk
Oct 18 '07 #1
2 1614
Steve Swift wrote:
Don't you just love sites that put up meaningless legal restrictions? I
just came across one that said "No part of this site may be used without
prior permission...".
"Used?" That's not so bad. I mean, it's pretty lenient compared to these
guys: <http://www.boingboing.net/2007/10/17/lawfirm-copyright-pr.html>*.
And these are lawyers, so if you *do* view the source of their site,
then by God, they will hunt you down and sue you until you can't see
straight!
>
I looked at the HTML,
Living pretty dangerously, there. You might get sued if you keep that
kind of despicable, anti-social behavior up. ;-)
*not a direct link, but a BB post about dimwits with law degrees
--
John
Pondering the value of shooting all the lawyers
(or anybody who attempts to write a EULA)
Oct 18 '07 #2
On 10/18/2007 12:46 AM, John Hosking wrote:
Steve Swift wrote:
>Don't you just love sites that put up meaningless legal restrictions? I
just came across one that said "No part of this site may be used without
prior permission...".

"Used?" That's not so bad. I mean, it's pretty lenient compared to these
guys: <http://www.boingboing.net/2007/10/17/lawfirm-copyright-pr.html>*.
And these are lawyers, so if you *do* view the source of their site,
then by God, they will hunt you down and sue you until you can't see
straight!
>I looked at the HTML,

Living pretty dangerously, there. You might get sued if you keep that
kind of despicable, anti-social behavior up. ;-)
*not a direct link, but a BB post about dimwits with law degrees
All this is quite different from claiming a copyright on the CONTENT of
a Web page. That is quite legitimate and enforceable.

I sometimes receive an E-mail message with the following warning:

"CONFIDENTIALLY NOTICE: This e-mail communication and any attachments
may contain confidential and privileged information for the use of the
designated recipients named above. Any unauthorized review, use,
disclosure or distribution is prohibited. If you are not the intended
recipient, please contact the sender by reply e-mail and destroy all
copies of the original message."

This is not enforceable. If someone sends me a restricted message by
mistake, that is their error for which they must suffer the consequences
if I choose to show the message to my neighbor or forward it to my
daughter. They cannot shift responsibility to me. In any case, a truly
confidential message should be encrypted before sending; but that's a
topic for the alt.security.pgp and comp.security.pgp.discuss newsgroups.

--
David E. Ross
<http://www.rossde.com/>

Natural foods can be harmful: Look at all the
people who die of natural causes.
Oct 18 '07 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

6
by: Alf P. Steinbach | last post by:
One main usage of references is for arguments, to replace e.g. void foo(int*) with void foo(int&). However, our Holy Standard claims that a reference must be initialized with an _object_, before...
2
by: Shailendra Batham | last post by:
Hello Gurus, I want to put some restrictions on my attribute tag in my XML Schema, anyone out there have any idea how to do that. here is my XML and the XML Schema <?xml version="1.0"...
6
by: aj | last post by:
I currently have 2 official DB2 Workgroup Edition licenses for my 2 v8 production servers. I also have tech support/software upgrade agreements in place for both servers. I am interested in...
15
by: K.M Jr | last post by:
Hi group, I want you to tell me if the following code is legal as per Standard. void foo(int *p) { } int main(void)
14
by: Frank Rizzo | last post by:
I realize that this maybe the wrong forum, but maybe someone has run into this situation before. I sell an app and I want to offer my customers a migration path from a competing product. However,...
5
by: Debbie Erickson | last post by:
Lately I've been getting lots of spam, selling cheap software. The website was oemsoftwarehouse.com. They supposedly were selling oem software of Borland's Delphi and Microsoft's Visual Studio. ...
27
by: Erik de Castro Lopo | last post by:
Hi all, The GNU C compiler allows a void pointer to be incremented and the behaviour is equivalent to incrementing a char pointer. Is this legal C99 or is this a GNU C extention? Thanks in...
10
by: John T. | last post by:
Hi all Figure this scenario: - My Company develops an assembly (a controls DLL) - Since an obfuscation software is too expensive, my Company engages a consultant and delegates him the...
5
by: Noah Roberts | last post by:
#define new DEBUG_NEW I can't imagine that has defined behavior.
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.