mirror of
https://github.com/github/dmca.git
synced 2025-06-18 08:55:43 -04:00
Process DMCA request
This commit is contained in:
parent
1fdeab800a
commit
05918030ce
102
2024/09/2024-09-13-ec-council.md
Normal file
102
2024/09/2024-09-13-ec-council.md
Normal file
@ -0,0 +1,102 @@
|
||||
While GitHub did not find sufficient information to determine a valid anti-circumvention claim, we determined that this takedown notice contains other valid copyright claim(s).
|
||||
|
||||
---
|
||||
|
||||
**Are you the copyright holder or authorized to act on the copyright owner's behalf?**
|
||||
|
||||
Yes, I am authorized to act on the copyright owner's behalf.
|
||||
|
||||
**Are you submitting a revised DMCA notice after GitHub Trust & Safety requested you make changes to your original notice?**
|
||||
|
||||
No
|
||||
|
||||
**Does your claim involve content on GitHub or npm.js?**
|
||||
|
||||
GitHub
|
||||
|
||||
**Please describe the nature of your copyright ownership or authorization to act on the owner's behalf.**
|
||||
|
||||
I, [private], [private] at EC-Council International Limited (“EC-Council”), am the duly authorized representative of the copyright holder of the content that is being hosted on your servers without permission.
|
||||
|
||||
EC-Council owns the following trademarks and has full authority to report infringement containing the trademarks that are identical to or substantially indistinguishable from the trademarks of EC-Council. Additionally, EC-Council is the owner and developer of the following certification courses as well and as such owns copyright over these courses.
|
||||
|
||||
C|EH
|
||||
Certified Ethical Hacker
|
||||
|
||||
**Please provide a detailed description of the original copyrighted work that has allegedly been infringed. If possible, include a URL to where it is posted online.**
|
||||
|
||||
Several links that your website is hosting are infringing on at least one (1) if not more copyrights(s) owned by EC-Council. The course materials of EC-Council official courses like “Certified Ethical Hacker - CEH”, is being uploaded unlawfully through your website without permission and in blatant violation of our proprietary rights. Furthermore, EC-Council is the owner and developer of the course “Certified Ethical Hacker” and owns copyright in all its versions which [private] has illegally uploaded through its GitHub Account - imrk51. The customers seeking EC-Council’s courses may be misled into thinking that the infringing content and courses uploaded are endorsed or affiliated with EC-Council. As a result of the misrepresentation caused by the account owner, EC-Council is likely to suffer damage in the form of loss of sales, damage to its reputation, and further risks confusing our clients. We assert that this is a clear intent of riding freely on the goodwill of EC-Council.
|
||||
|
||||
URL - https://iclass.eccouncil.org/our-courses/certified-ethical-hacker-ceh/
|
||||
|
||||
**What files should be taken down? Please provide URLs for each file, or if the entire repository, the repository’s URL.**
|
||||
|
||||
https://github.com/imrk51/CEH-v11-Study-Guide/blob/main/modules/All-Modules.md
|
||||
https://github.com/imrk51/CEH-v11-Study-Guide/blob/main/modules/1-Introduction.md
|
||||
https://github.com/imrk51/CEH-v11-Study-Guide/blob/main/modules/10-Denial-of-Service.md
|
||||
https://github.com/imrk51/CEH-v11-Study-Guide/blob/main/modules/11-Session-Hijacking.md
|
||||
https://github.com/imrk51/CEH-v11-Study-Guide/blob/main/modules/12-Evading-IDS-Firewalls-and-Honeypots.md
|
||||
https://github.com/imrk51/CEH-v11-Study-Guide/blob/main/modules/13-Hacking-Web-Servers.md
|
||||
https://github.com/imrk51/CEH-v11-Study-Guide/blob/main/modules/14-Hacking-Web-Applications.md
|
||||
https://github.com/imrk51/CEH-v11-Study-Guide/blob/main/modules/14-Pentesting.md
|
||||
https://github.com/imrk51/CEH-v11-Study-Guide/blob/main/modules/16-Hacking-Wireless-Networks.md
|
||||
https://github.com/imrk51/CEH-v11-Study-Guide/blob/main/modules/17-Hacking-Mobile-Platforms-and-IoT.md
|
||||
https://github.com/imrk51/CEH-v11-Study-Guide/blob/main/modules/19-Cloud%20Computing.md
|
||||
https://github.com/imrk51/CEH-v11-Study-Guide/blob/main/modules/2-Footprinting-and-Reconnaissance.md
|
||||
https://github.com/imrk51/CEH-v11-Study-Guide/blob/main/modules/20-Cryptography.md
|
||||
https://github.com/imrk51/CEH-v11-Study-Guide/blob/main/modules/3-Scanning-Networks.md
|
||||
https://github.com/imrk51/CEH-v11-Study-Guide/blob/main/modules/5-Vulnerability-Analysis.md
|
||||
https://github.com/imrk51/CEH-v11-Study-Guide/blob/main/modules/6-System-Hacking.md
|
||||
https://github.com/imrk51/CEH-v11-Study-Guide/blob/main/modules/7-Malware.md
|
||||
https://github.com/imrk51/CEH-v11-Study-Guide/blob/main/modules/8-Sniffing.md
|
||||
https://github.com/imrk51/CEH-v11-Study-Guide/blob/main/modules/9-Social-Engineering.md
|
||||
https://github.com/imrk51/CEH-v11-Study-Guide/blob/main/README.md
|
||||
https://github.com/imrk51/CEH-v11-Study-Guide/blob/main/LICENSE
|
||||
https://github.com/imrk51/CEH-v11-Study-Guide/tree/main/modules
|
||||
|
||||
**Do you claim to have any technological measures in place to control access to your copyrighted content? Please see our <a href="https://docs.github.com/articles/guide-to-submitting-a-dmca-takedown-notice#complaints-about-anti-circumvention-technology">Complaints about Anti-Circumvention Technology</a> if you are unsure.**
|
||||
|
||||
Yes
|
||||
|
||||
**What technological measures do you have in place and how do they effectively control access to your copyrighted material?**
|
||||
|
||||
Please note that the course materials are disclosed only to the candidates enrolled in the official EC-Council Course while they are attempting the official EC-Council examination and are not publicly accessible. They are copyrighted materials solely owned by EC-Council. These violations of EC-Council’s intellectual property rights also undermines the integrity of educational assessment and damages EC-Council’s reputation associated with the content of the copyrighted materials, as well as the sanctity of EC-Council's examinations.
|
||||
|
||||
**How is the accused project designed to circumvent your technological protection measures?**
|
||||
|
||||
The title of the PDF makes use of our registered trademark and content of the PDF is EC-Council's copyrighted materials, that is causing confusion and misleading the public. There is no description provided that adequately capture the relationship between the content provider and EC-Council and therefore, it is confusing the users as to the origin of the content. The users believing that the infringing content is that of EC-Council and is being endorsed by EC-Council.
|
||||
|
||||
**<a href="https://docs.github.com/articles/dmca-takedown-policy#b-what-about-forks-or-whats-a-fork">Have you searched for any forks</a> of the allegedly infringing files or repositories? Each fork is a distinct repository and must be identified separately if you believe it is infringing and wish to have it taken down.**
|
||||
|
||||
No, there is not any other fork of the allegedly infringing files or repositories.
|
||||
|
||||
**Is the work licensed under an open source license?**
|
||||
|
||||
No
|
||||
|
||||
**What would be the best solution for the alleged infringement?**
|
||||
|
||||
Reported content must be removed
|
||||
|
||||
**Do you have the alleged infringer’s contact information? If so, please provide it.**
|
||||
|
||||
Contact mail ID - [private]
|
||||
|
||||
**I have a good faith belief that use of the copyrighted materials described above on the infringing web pages is not authorized by the copyright owner, or its agent, or the law.**
|
||||
|
||||
**I have taken <a href="https://www.lumendatabase.org/topics/22">fair use</a> into consideration.**
|
||||
|
||||
**I swear, under penalty of perjury, that the information in this notification is accurate and that I am the copyright owner, or am authorized to act on behalf of the owner, of an exclusive right that is allegedly infringed.**
|
||||
|
||||
**I have read and understand GitHub's <a href="https://docs.github.com/articles/guide-to-submitting-a-dmca-takedown-notice/">Guide to Submitting a DMCA Takedown Notice</a>.**
|
||||
|
||||
**So that we can get back to you, please provide either your telephone number or physical address.**
|
||||
|
||||
[private]
|
||||
City/Province - [private]
|
||||
ZIP - [private]
|
||||
Country - [private]
|
||||
|
||||
**Please type your full legal name below to sign this request.**
|
||||
|
||||
[private]
|
Loading…
Reference in New Issue
Block a user