© 2017 Center for the Protection of Internet Freedom
All Rights Reserved

Title 17 Copyrights of the United States Code
§106. Exclusive rights in copyrighted works


Unauthorized use and/or duplication of material in this blog, without the express, written permission from the owner, is strictly prohibited. Contact: Excerpts and links may be used, provided full and clear credit is given to Center for the Protection of Internet Freedom (CPIF) and


The owner of this blog reserves the right to edit or delete any comments without notice for:
1. Spam or questionable spam
2. Profanity
3. Verbal attacks on others
4. Threats of terrorism
5. Engaging in illegal acts
6. Any other reason at the discretion of the owner that doesn’t violate free speech


All information in this blog is published for general information only. does not make any warranties regarding thoroughness, reliability and/or accuracy of this information. Any action taken using information found on within is strictly at your own risk. will not be liable for any losses and/or damages in connection with the use of information in this blog.

From this blog other websites can be visited by following links to external sites. While we strive to provide quality links to useful and ethical websites, we have no control over the content or nature of these sites. These links do not imply a recommendation for all content found on these sites. Site owners and content may change without notice.


If you require more information or have questions about our privacy policy, please contact us by email at At the privacy of our visitors is important. This privacy policy describes the types of personal information collected and recorded and how we use it.

Log Files

Like many Web sites, makes use of log files. These files log visitors to the site – a standard procedure for hosting companies and part of hosting service’s analytics. The information inside the log files includes internet protocol (IP) addresses, browser type, Internet Service Provider (ISP), date/time stamp and referring/exit pages. This information is used to analyze trends, administer the site, track user’s movement around the site, and gather demographic information. IP addresses, and other such information are not linked to any information that is personally identifiable.

If you wish to disable cookies, you can do so in your individual browser options. More detailed information about cookie management with specific web browsers can be found at the browsers’ respective websites.

Children’s Information

It is important to provide additional protection for children online. We encourage parents and guardians to spend time online with their children to observe, participate in and/or monitor and guide their online activity. does not knowingly collect any personally identifiable information from children under the age of 13. If a parent or guardian believes that has in its database personally identifiable information of a child under the age of 13, please contact us immediately and we will use our best efforts to promptly remove such information from our records.

Online Privacy Policy Only

This privacy policy applies only to our online activities and is valid for visitors to our website and regarding information shared and/or collected there. This policy does not apply to any information collected offline or via channels other than this website.




To file a notice of infringement with us, you must provide an email to that sets forth the items specified below. Please note that you may be liable for damages (including costs and attorneys’ fees) if you materially misrepresent that a product or activity is infringing your copyrights. Accordingly, if you are not sure whether material available online infringes your copyright, we suggest that you first contact an attorney.

Your communication must include substantially all of the following:

  • An electronic signature of a person authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.
  • Identify in sufficient detail the location of copyrighted work you believe has been infringed upon or other information sufficient to specify the copyrighted work being infringed. If multiple copyrighted works are covered by a single notification, a representative list of such works.
  • Identification of the material claimed to be infringing or the subject of infringing activity is to be removed or access to which is to be disabled, and information reasonably sufficient to permit us to locate the material.
  • Information reasonably sufficient to permit us to contact the complaining party.
  • The following statement: “I have a good faith belief that use of the material in the manner complained of is not authorized by the copyright owner, its agent, or the law.”
  • The following statement: “I swear, under penalty of perjury, that the information in the notification is accurate, and that I am the copyright owner or am authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.”

*** END ***