Creating a profile: ONLY after achieving a comprehensive list of all titles researchers can begin to build a content “profile”. This profile refers to how the content looks on the internet to the internet. Ultimately researching the vast ocean of information that makes up the internet must be conducted by computer programs or applications. researchers must build a content research profile that is understood by computers, programs, applications and networks based on the internet. Once the profile has been started the team can move to the next stage of the work.

Profile Factors There are many other factors that must be considered at the onset of any research project locating content. Some of those are:

  1. Determine variations of the titles. Very often content will have multiple titles or variations on the title. Misspellings, slang, missing or changed syntax or punctuation etc
  2. Existing URL locations.
  3. Meta tagging – often content posted on the internet has or will get meta tags. These are single words, phrases, guids or numbers that reference (sometimes specifically) the content
  4. Media Content Identifiers – there will often be direct reference to the type of media that is the content. Sometimes this helps create a unique profile of the content
  5. Geography – either source or current location. There are cultural issues within geographic locations that effect the publishing and copying of certain content. Often geography as an issue is connected of course to
  6. Language – this is critical element to the research process. Again – while it seems like an obvious comment it often has critical ramifications to researching content on the internet. Particularly relevant is the correct or often incorrect translation of content from one language to another. This again is often specific to the content title, description, tagging etc.
  7. Disseminating site identification – often content is published (or republished) on only one or two internet platforms (websites or applications) that ultimately become responsible for the majority of the “spread” across the internet. Identifying and ultimately stopping the distribution of content on these disseminating or source websites can be important in stopping the unwanted spread of content.
  8. Platforms – there are specific program platforms (like social media) that are programmed to perform in a certain method around certain kinds of content.
Determining these factors prior to beginning the research saves considerable time in locating content online. If these factors cannot be determined prior to research commencing it will be incumbent on our team to locate and add the available factors to the content profile.

Please follow this guideline in order for to provide you the best matched service. In order for to provide a best quote for research or monitoring services these questions must be answered.

  1. What is the content?
    1. Video - what format and what is / was the source
    2. Image - what format and what is / was the source
    3. Code - what language and what is / was the source
    4. Text - what specifically. Some (in fact a lot) of words and phrases cannot be copyright. Or will provide false positive search results. Be as specific as possible and provide the original source.
  2. How many versions or titles?
  3. List the versions and titles?
  4. How long ago was the content created?
  5. When was the content stolen?
  6. Global or regionally specific? Are you interested in stolen content list everywhere or only in one area e.g. North America
  7. What other locations of the content have existed previously?
  8. What search engines are you concerned about locating the content?
  9. What languages whether translated or source are involved in the content?
  10. Is the content commercial or personal? Was the content produced / created commercially or personally?
  11. Who owns the copyright?
  12. Who created the content?
  13. Is the content connected to other copyrighted content? Such as a picture within a (text) document?
  14. How many times has the content been searched for previously?
  15. How was the content originally stolen?

These factors are often determined from our technical team working in tandem with our content specialists. Back and forth to determine accuracy of findings. From there our team then takes the title(s) and using our proprietary search, scan and monitoring technology we begin to look for matches and variations across several networks and search platform on the internet. We then look for translations and variations using the same process. When completed we have a cursory understanding of the level (amount or volume) of infringement (amount of content) online which then gives us and ultimately our customer an understanding of the amount work needed to complete the research package.
Click here to create case:
Modified: 02/07/2019
Category: Frequently Asked Question
By: Mr. DMCA Helper
FAQ ID:c44255f8-b6c3-4c53-823c-da40547c4c37