Frequently Asked Questions
Questions & Answers
Quick Answers
๐ Find frequently asked questions answers, tips, and troubleshooting instructions based on our most viewed topics.
About Copyright Law
Copyright is originality and fixation
Original Works
Works are original when they are independently created by a human author and have a minimal degree of creativity. Independent creation simply means that you create it yourself, without copying. The U.S. Supreme Court has said that, to be creative, a work must have a โsparkโ and โmodicumโ of creativity. There are some things, however, that are not creative, like: titles, names, short phrases, and slogans; familiar symbols or designs; mere variations of typographic ornamentation, lettering, or coloring; and mere listings of ingredients or contents. And always keep in mind that copyright protects expression, and never ideas, procedures, methods, systems, processes, concepts, principles, or discoveries.
Fixed Works
A work is fixed when it is captured (either by or under the authority of an author) in a sufficiently permanent medium such that the work can be perceived, reproduced, or communicated for more than a short time. For example, a work is fixed when you write it down or record it.
Companies, organizations, and other people besides the workโs creator can also be copyright owners. Copyright law allows ownership through โworks made for hire,โ which establishes that works created by an employee within the scope of employment are owned by the employer. The work made for hire doctrine also applies to certain independent contractor relationships, for certain types of commissioned works.
Copyright ownership can also come from contracts like assignments or from other types of transfers like wills and bequests.
Based on Bern Convention copyright owners has the following exclusive rights:
- Reproduce the work in copies or phonorecords.
- Prepare derivative works based upon the work.
- Distribute copies or phonorecords of the work to the public by sale or other transfer of ownership or by rental, lease, or lending.
- Perform the work publicly if it is a literary, musical, dramatic, or choreographic work; a pantomime; or a motion picture or other audiovisual work.
- Display the work publicly if it is a literary, musical, dramatic, or choreographic work; a pantomime; or a pictorial, graphic, or sculptural work. This right also applies to the individual images of a motion picture or other audiovisual work.
- Perform the work publicly by means of a digital audio transmission if the work is a sound recording.
Copyright also provides the owner of copyright the right to authorize others to exercise these exclusive rights, subject to certain statutory limitations.
The length of copyright protection depends on when a work was created.
For the 179 countries that have signed the international copyright treaty The Berne Convention , the minimum length of copyright is 50 years after the authorโs death, but some countries, like the UK and the USA, can actually allow even longer.
The United Kingdom gives creators more than 50 years for some types of work. Details as shown below:
- Music and Sound recordings : 70 years from the date it was originally published
- Written, dramatic, musical and artistic works : 70 years from the death of the author
- Films : 70 years from the death of the director, screenplay author and composer
- Broadcasts : 50 years from the date of original broadcast
- AI (Artificial Intelligence) generated work : Copyright protection for computer-generated works without a human author is 50 years.
- Databases : 15 years from when the database is made or, if the database is published during this time, 15 years from publication
- Layout of published editions of written, dramatic or musical works : 25 years from the date it was originally published
Under the U.S. law, works created on or after January 1, 1978, have a copyright term of life of the author plus seventy years after the authorโs death. If the work is a joint work, the term lasts for seventy years after the last surviving authorโs death. For works made for hire and anonymous or pseudonymous works, copyright protection is 95 years from publication or 120 years from creation, whichever is shorter. Works created before 1978 have a different timeframe. Learn more about copyright duration, based on the U.S. Copyrigth Office.
Copyright protection is global, across 179 countries, includingย the following (click here for a full up-to-date list).
Albania
Algeria
Andorra
Antigua and Barbuda
Argentina
Armenia
Australia
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belgium
Belize
Benin
Bhutan
Bolivia (Plurinational State of)
Bosnia and Herzegovina
Botswana
Brazil
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cabo Verde
Cameroon
Canada
Central African Republic
Chad
Chile
China
Colombia
Comoros
Congo
Cook Islands
Costa Rica
Cรดte d’Ivoire
Croatia
Cuba
Cyprus
Czech Republic
Democratic People’s Republic of Korea
Democratic Republic of the Congo
Denmark
Djibouti
Dominica
Dominican Republic
Ecuador
Egypt
El Salvador
Equatorial Guinea
Estonia
Fiji
Finland
France
Gabon
Gambia
Georgia
Germany
Ghana
Greece
Grenada
Guatemala
Guinea
Guinea-Bissau
Guyana
Haiti
Holy See
Honduras
Hungary
Iceland
India
Indonesia
Ireland (ROI)
Israel
Italy
Jamaica
Japan
Jordan
Kazakhstan
Kenya
Kuwait
Kyrgyzstan
Lao People’s Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Libya
Liechtenstein
Lithuania
Luxembourg
Madagascar
Malawi
Malaysia
Mali
Malta
Mauritania
Mauritius
Mexico
Micronesia (Federated States of)
Monaco
Mongolia
Montenegro
Morocco
Mozambique
Namibia
Nepal
Netherlands
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norway
Oman
Pakistan
Panama
Paraguay
Peru
Philippines
Poland
Portugal
Qatar
Republic of Korea
Republic of Moldova
Romania
Russian Federation
Rwanda
Saint Kitts and Nevis
Saint Lucia
Saint Vincent and the Grenadines
Samoa
Sao Tome and Principe
Saudi Arabia
Senegal
Serbia
Singapore
Slovakia
Slovenia
South Africa
Spain
Sri Lanka
Sudan
Suriname
Swaziland
Sweden
Switzerland
Syrian Arab Republic
Tajikistan
Thailand
The former Yugoslav Republic of Macedonia
Togo
Tonga
Trinidad and Tobago
Tunisia
Turkey
Turkmenistan
Tuvalu
Ukraine
United Arab Emirates
United Kingdom
United Republic of Tanzania
United States of America
Uruguay
Uzbekistan
Vanuatu
Venezuela (Bolivarian Republic of)
Vietnam
Yemen
Zambia
Zimbabwe
It is important to know that we are all also copyright users. When we read books, watch movies, listen to music, or use videogames or software, we are using copyright-protected works.
So, even if you are not the owner of a work, you still may be able to use it. In addition to buying or licensing works (or some other way of seeking permission to use the work), you can also use one of the Copyright Actโs exceptions and limitations, or rely on works in the public domain.
The Copyright Actโs exceptions and limitations found in sections 107-122 include fair use, the โfirst sale doctrine,โ some reproductions by libraries and archives, certain performances and displays, broadcast programming transmissions by cable and satellite, to name a few. Interested in more information on fair use? Take a look at our Fair Use Index. The complete list of exemptions to copyright protection can be found in chapter 1 of Title 17 of the United States Code.
You can also use works that are in the public domain. Works in the public domain are those that are never protected by copyright (like facts or discoveries) or works whose term of protection has ended either because it expired or the owner did not satisfy a previously required formality. Currently, all pre-1926 U.S. works are in the public domain because copyright protection has expired for those works.
Copyright registration also provides value to the public overall. It facilitates the licensing marketplace by allowing people to find copyright ownership information, and it provides the public with notice that someone is claiming copyright protection. It also provides a record of this nationโs creativity.
This is known as Recordation, and means that the Office reviews and accepts documents, and keeps a record of, the documents people provide.
Recordation relates to three different kinds of documents: transfers of copyright ownership, other documents relating to a copyright, and notices of termination, which authors or their heirs use when terminating certain transfers or licenses.
Know Your Customer (KYC) standards are designed to protect financial institutions against fraud, corruption, money laundering, and terrorist financing.
KYC involves several steps:
- establish customer identity;
- understand the nature of customersโ activities and qualify that the source of funds is legitimate; and
- assess money laundering risks associated with customers.
Copyright Zone and LutinX are NOT financial Institutions and we do NOT offer any kind of financial service.
We choose to follow the KYC standards because are the only international “standard” globally recognized for identity verification.
In this way once you activate your Account you can be legally identified and activate the Copyright and Intellectual Property protections offered by us. Without legal identity verification, no online service like this one can guarantee any rights everywhere.
About Copyright Zone
Why Do I Need to CopyRight Zone?
Copyright is an automatic right under international law but if your work is used without your permission, you’ll have to prove ownership of your work and the date it was created. This can be harder to do than it sounds.
For example, if you take a photo on your phone, how do you prove that the photo is yours and shot onย yourย phone?
The Poor Man’s Copyright
The old way of doing this was to print the photo, put it in an envelope, and post it to yourself. The date stamp from the post office would be your proof-of-date and inside would be your photo. This was known as “The Poor Man’s Copyright”.
Today, this is ineffective. If you post your photo on Instagram and it’s used without your permission, you can’t send an envelope to Instagram and ask them to look inside. Additionally, once you open the envelope, it can’t be used again as evidence.
CopyRight Zone is a LutinX.com project, that acts as a digital, independent witness with the strength of the latest technology, like Blockchain, Artificial intelligence, and Machine learning.
๐ Copyright Zone is a Project of LutinX.com.
๐ LutinX.com is a global blockchain platform active in more than 20 countries with more than 150’000 users, growing day by day.
๐ Copyright Zone’ users can directly manage their works, including the privacy visibility inside the public explorer.
๐ Every work uploaded inside our system is automatically encrypted.
Registering your work with Copyright Zone by LutinX you’ll will get you the right to use a copyright deterrent notice that you can add to your work. It will take the following format:
ยฉ Copyright 2023. YOUR NAME. All Rights Reserved.
Copyright Protected with lutinx.com
Reference Number: [your hash code]
At the first login, we assign you 33 Blockchain transactions, that you can use for your works (music, thesis, presentations, poems, photography, articles, books, and much more).
After you verify your identity, the system will automatically grant you 67 more Blockchain transactions. In this way, you can register for Free every work – obtaining Authorship/Paternity certificates.
The original files can be accessed only by you and by the people you granted the login credentials.
From the Public Explorer, a default page presents a table of your work, including Tags, keywords, the Blockchain Certificate, the link to the Timestamp archive, and the link to the Paternity Certificate.
Copyright Zone employees cannot see your work.
we use 128 bit SSL data encryption for all data uploaded from our member area to our system.
Here you can download our SSL certificate (last update Nov 11, 2023):
– LutinX.com
– Copyright.zone
About Technology
Anย assetย can be tangible (a house, car, cash, land) or intangible (intellectual property, patents, copyrights, branding). Virtually anything of value can be tracked and traded on a blockchain network, reducing risk and cutting costs for all involved.
Business runs on information.
The faster itโs received and the more accurate it is, the better.
Blockchain is ideal for delivering that information because it provides immediate, shared, and completely transparent information stored on an immutable ledger that can be accessed only by permissioned network members.
A blockchain network can track orders, payments, accounts, production, and much more. And because members share a single view of the truth, you can see all the details of a transaction end to end, giving you greater confidence, as well as new efficiencies and opportunities.
Most importantly 100+ Governments, including Europe and USA, recognize to the Blockchain technology two legal values: 1) Timestamp; and 2) Immutable registrations.
Decentralization
Decentralization in blockchain refers to transferring control and decision making from a centralized entity (individual, organization, or group) to a distributed network. Decentralized blockchain networks use transparency to reduce the need for trust among participants. These networks also deter participants from exerting authority or control over one another in ways that degrade the functionality of the network.
Immutability
Immutability means something cannot be changed or altered. No participant can tamper with a transaction once someone has recorded it to the shared ledger. If a transaction record includes an error, you must add a new transaction to reverse the mistake, and both transactions are visible to the network.
Consensus
A blockchain system establishes rules about participant consent for recording transactions. You can record new transactions only when the majority of participants in the network give their consent.
Education
LutinX Blockchain Platform impacts education and addresses challenges with tangible solutions. We resolve inefficient paper-based record-keeping processes, lack of transparency, and poor student and teacher accountability. With Blockchain, we can increase the student’s motivation to learn and perform well in class, resolving the lack of trust in merits and academic degrees, and bringing to zero falsification and fake degrees.
Media and entertainment
Companies in media and entertainment use blockchain systems to manage copyright data. Copyright verification is critical for the fair compensation of artists. It takes multiple transactions to record the sale or transfer of copyright content. Sony Music Entertainment Japan uses blockchain services to make digital rights management more efficient. They have successfully used blockchain strategy to improve productivity and reduce costs in copyright processing.
Retail
Retail companies use blockchain to track the movement of goods between suppliers and buyers. For example, Amazon retail has filed a patent for a distributed ledger technology system that will use blockchain technology to verify that all goods sold on the platform are authentic. Amazon sellers can map their global supply chains by allowing participants such as manufacturers, couriers, distributors, end users, and secondary users to add events to the ledger after registering with a certificate authority.
Energy
Energy companies use blockchain technology to create peer-to-peer energy trading platforms and streamline access to renewable energy.
For example, consider these uses:
Blockchain-based energy companies have created a trading platform for the sale of electricity between individuals. Homeowners with solar panels use this platform to sell their excess solar energy to neighbors. The process is largely automated: smart meters create transactions, and blockchain records them.
With blockchain-based crowd funding initiatives, users can sponsor and own solar panels in communities that lack energy access. Sponsors might also receive rent for these communities once the solar panels are constructed.
Finance
Traditional financial systems, like banks and stock exchanges, use blockchain services to manage online payments, accounts, and market trading. For example, Singapore Exchange Limited, an investment holding company that provides financial trading services throughout Asia, uses blockchain technology to build a more efficient interbank payment account. By adopting blockchain, they solved several challenges, including batch processing and manual reconciliation of several thousand financial transactions.
A distributed ledger
A distributed ledger is the shared database in the blockchain network that stores the transactions, such as a shared file that everyone in the team can edit. In most shared text editors, anyone with editing rights can delete the entire file. However, distributed ledger technologies have strict rules about who can edit and how to edit. You cannot delete entries once they have been recorded.
Smart contracts
Companies use smart contracts to self-manage business contracts without the need for an assisting third party. They are programs stored on the blockchain system that run automatically when predetermined conditions are met. They run if-then checks so that transactions can be completed confidently. For example, a logistics company can have a smart contract that automatically makes payment once goods have arrived at the port.
Public key cryptography
Public key cryptography is a security feature to uniquely identify participants in the blockchain network. This mechanism generates two sets of keys for network members. One key is a public key that is common to everyone in the network. The other is a private key that is unique to every member. The private and public keys work together to unlock the data in the ledger.
For example, John and Jill are two members of the network. John records a transaction that is encrypted with his private key. Jill can decrypt it with her public key. This way, Jill is confident that John made the transaction. Jill’s public key wouldn’t have worked if John’s private key had been tampered with.
Step 1 โ Record the transaction
A blockchain transaction shows the movement of physical or digital assets from one party to another in the blockchain network. It is recorded as a data block and can include details like these:
– Who was involved in the transaction?
– What happened during the transaction?
– When did the transaction occur?
– Where did the transaction occur?
– Why did the transaction occur?
– How much of the asset was exchanged?
– How many pre-conditions were met during the transaction?
Step 2 โ Gain consensus
Most participants on the distributed blockchain network must agree that the recorded transaction is valid. Depending on the type of network, rules of agreement can vary but are typically established at the start of the network.
Step 3 โ Link the blocks
Once the participants have reached a consensus, transactions on the blockchain are written into blocks equivalent to the pages of a ledger book. Along with the transactions, a cryptographic hash is also appended to the new block. The hash acts as a chain that links the blocks together. If the contents of the block are intentionally or unintentionally modified, the hash value changes, providing a way to detect data tampering.
Thus, the blocks and chains link securely, and you cannot edit them. Each additional block strengthens the verification of the previous block and therefore the entire blockchain. This is like stacking wooden blocks to make a tower. You can only stack blocks on top, and if you remove a block from the middle of the tower, the whole tower breaks.
Step 4 โ Share the ledger
The system distributes the latest copy of the central ledger to all participants.
The technology has continued to evolve over these three generations:
First generation โ Bitcoin and other virtual currencies
In 2008, an anonymous individual or group of individuals known only by the name Satoshi Nakamoto outlined blockchain technology in its modern form. Satoshi’s idea of the Bitcoin blockchain used 1 MB blocks of information for Bitcoin transactions. Many of the features of Bitcoin blockchain systems remain central to blockchain technology even today.
Second generation โ smart contracts
A few years after first-generation currencies emerged, developers began to consider blockchain applications beyond cryptocurrency. For instance, the inventors of Ethereum decided to use blockchain technology in asset transfer transactions. Their significant contribution was the smart contracts feature.
Third generation โ the future
As companies discover and implement new applications, blockchain technology continues to evolve and grow. Companies are solving limitations of scale and computation, and potential opportunities are limitless in the ongoing blockchain revolution. In this situation LutinX.com concentrate its energies to become a global leader in the Digital Data Certification using Blockchain technology.
Registering works
๐ ZERO – If you use it for No-Business-Porpouses. And you’ll get all the Blockchain Power with 100 FREE registrations, including all the Copyright procedures with the related Autorship Certificates.
๐ 49,00 โฌ/year for Business activities. A lot of functionalities are included. 250 Registrations too.
๐ 489,00 โฌ/year for I.P. Professionals, Editors, Book Distributors, Architects… The plan includes all the most advanced services offered by Copyright Zone, with 1000 Registrations too.
The full Pricing list, with all the plan details, is available here.
The most important part of our copyright proof certification is that we hold a copy of your original work files and certificates, so that when a dispute arises in the future, you can show independent date stamped evidence of creation using our system.
We charge a small annual membership fee to cover ongoing costs of providing that service, such as file storage , technical and phone support, company management, server maintenance – including the blockchain infrastructure – and website upgrade and administration costs.ย
This has allowed us to trade successfully since 2019 and ensures weโll be able to operate in perpetuity, balancing future costs of holding customers’ work with future subscription revenues, enabling us to continually hold your work and certificates and support you in the future when a dispute on your work arises.
Some competitor copyright proof providers charge large one-off payments instead, for ‘lifetime storage’. This may seem good value , but that funding model leaves creators vulnerable, because without a continual stream of new customers, the provider eventually goes bankrupt and copyright evidence is lost.
With one shoot payment, some companies can get immediate benefits, but if they cannot reach a minimal subscription they can only close, losing all the data stored for their clients.
LutinX.com with Copyright Zone wants to offer a high-quality service for all in the future, so we charge a small annual fee to ensure that we’re able to offer unparalleled support by phone and email and ensure our service remains reliable, up-to-date, and secure for the future.
๐ For Business Accounts,ย their work will not be reachable anymore, and will no longer be protected. A not-renewed Business Account will be marked for removal.
We allow a short grace period of 60 days for you to reactivate and renew before your account is deleted.
Subscriptions are automatically charged each year via your original payment method.
If you cancel this renewal, your subscription to Copyright Zone will not be renewed.
If your account expires, simply log in and renew it within the grace period.
๐ Non UK bank cards are charged in your own currency at your bank’s exchange rate and fees. Subscribers outside the UK pay no VAT (Value Added Tax).
๐ Payment will be automatically debited each year, unless you cancel your account.
๐ You will be notified by email each time an annual renewal payment is made.
โ ๏ธ Please Note: It does NOT, protect a name that may be on the logo.
๐ No, youย CAN NOT protect a name using copyright and Copyright Zone. Copyright law does not protect names or slogans, but we can protect original logos.
Music copyright has become a big issue in the music industry, with massive names such as Ed Sheeran and Taylor Swift finding themselves wrapped up in copyright infringement cases.
International copyright law as dictated by the Berne Convention, ensures that copyright is an automatic right, at the time the artist or artists created the music.
The first point is to note that no official registration is needed with a copyright office.
However, the second point, which is very important to understand, is to take action in any copyright claims over your sound recording or own song, you will have to be able to prove that you’re the original copyright owner of the musical work in question and prove when your song or music was created.
Learn more about Music Copyright in our “Industries” page.
Copyright law, when it comes time to copyright a book, like all literary intellectual property, is simple to understand, as copyright protection is an automatic right. Under the Berne Convention, there’s no need to register your book or written work with a copyright office. However, should you ever have a copyright dispute in future, you’ll need to prove that you’re the original author of your book or written work and the date it was completed.
This can be much harder to prove than it may seem. With the advent of the Internet, whilst making our lives easier on many fronts, one of the consequences of it is that copyright infringement of intellectual property has become a growing problem so it’s important to understand how copyright protection works for your books and exactly how to copyright a book, before publishing and releasing it into the public domain, especially if you plan on self publishing on somewhere like Amazon.
Learn more about Books Copyright in our “Industries” page.
๐ Yes.
When first learning about copyright law and how it can affect your business, it can be confusing.
Understanding how to copyright a logo, is simple as under international copyright law, copyright is an automatic right at the moment the design of the logo is deemed finished.
You simply have to prove that you created the logo and be able to prove the date. Thatโs it.
HOW TO COPYRIGHT A LOGO IN 3 STEPS:
1) Use the ยฉ copyright symbol on your work
2) Ensure you can prove the date of creation
3) Register with a copyright witness service such as LutinX.com – Your Copyright Zone.
Learn more about Books Copyright in our “Industries” page.
A blockchain transaction is NOT a money transfer, it is the creation of an Immutable data, that inside Copyright Zone is your Paternity Certificate.
You can create your own NFT from the platform you choose. In this way you can tokenize your unique Hash Code provided by us, or directly your Paternity Certificate of your work.
Every time you use Copyright.Zone, LutinX creates a unique Certificate of Author/Authorship.
However, in our Certificates, we include an important and sometimes fundamental identifier in litigation or legal disputes, i.e. proof of the identity of the beneficiary of the work.
In this case, our certificates clearly show three different identifiers in the header, such as:
- A1 – the registered user has completed the verification of his identity – KYC procedure. LutinX guarantees that it has verified the correctness of the evidence entered – selfie and copy of the identity document – by the account holder.
- A2 – the user registered the work without initially proving her identity, and later completed the KYC procedure.
- B – The user who registered the work and obtained her Certificate of Author / Authorship, has NOT verified her identity and potentially the “certainty” of who “invented” the registered work is not certain .
Discover the Blockchain Applications
L.Cardย creates a public certificate (or private) that users can present to third people. It verifies both parts presented. With a QR code, you can prove your identity, your job status, the signature power you have, and more!
THE 8 KEY POINTS
IDENTITY VERIFICATION & BLOCKCHAIN SMART CONTRACT, TOGETHER
๐ L.Card offers a decentralized and secure solution that puts users back in control of their identity via a distributed trust model.
๐ It is Consent – L.Card uses Smart contracts to enable controlled data disclosure.
๐ It is Decentralized: All the documents that identify users get stored on their device backed by L.iD Technology, making it safe from mass data breaches.
๐ A universal ecosystem: Our Blockchain technology doesnโt set any geographical boundaries. So, users can use the platform across nations to verify their identity.
๐ Trusted platform: Trust score generated by the Smart Contracts can help organizations validate usersโ identities in real-time. Based on a userโs trust score, it can be inspected whether itโs a suspicious account or a valid account.
๐ User-optimized: L.Card reduces costs and it is time-efficient. As you can confirm, you can also โRevokeโ or โModifyโ at any time the status by accessing the L.Card.
๐ It is Transparent: Everyone connected to the network can trace the transactions recorded on the blockchain.
๐ It is Easy: No special training is needed to use L.Card. You have simple to โCopy & Pasteโ your QR on cards, resume, or any document you would like to prove that you made it, or who you are.
And this is the Public BBadge:
With L.Library you can collect multiple files inside the blockchain network resolving trust problems for the everyday life of professionals, artists, lawyers, and any other man or woman who creates intellectual data every day. L.Library can with an easy-to-use procedure save and “copyright” every version of your files – tracking them – and every update of your documents… like an infinity review of them.
The main element is thatย we are not talking about reviews but we talk about the legal archive of your intellectual property.
๐ L.Library Licence can manage archives or collections of files from two to one thousand in time, based on your subscription.
๐ L.Library Licence can accept files from 2Mb to 500Mb each, based on your subscription.
Every time someone uses it you know exactly when and from where someone uses it, and more importantly you can generate immutable reports, with a legal timestamp.
L.Links works with this short domain “LRX.IS”. In 2024 we’ll add more than five new short-domains that will increase our efficency and popularity.
L.Links can be upgraded with two plugins:
- Silver – you can customize your short-links by choosing words or a combination of letters and numbers up to 5 characters.
- Gold – your short link can be fully customizable with 3 characters only.
L.Login is the first APP of the LutinX world.
With L.Login everyone who manages a Blog or a website can integrate KYC login access at ZERO costs, simply activating our API.
With L.Login you can respect privacy regulations and access your online content only to identified people – that perhaps you do not even know.ย
In your account panel, you can watch and study the logs, including the real name of your guests, their verified email, and even more data we managed to prove their identity.ย
L.Login can let you respect AML regulations, if you sell online, or fight the HATE Internet problem if you manage a blog with potential “complicate” comments.
Using L.Login with your blog or website requires a basic addition to your privacy policy, according to this example:
You [your company name] act as Data Controller, while LutinX, without prejudice to the provisions of the art. 28 of the GDPR, acts as Data Controller in accordance with the provisions of the relevant DPA (Data Processing Addendum) found at https://gbsi.lutinx.com/dpa/
In this situation, you’ll have legal proof about the delivery and the identity of the people or the company that opens and views it.
L.Proof can be used from 1 to 1000 receivers, based on your subscription. The procedure is very easy. You just have to add the recipient’s email and confirm it. the LutinX platform will inform the receiver that you shared a file with him/her and if they want to open it, they should follow the same simple step to activate their account on lutinx.com.