{"id":12789,"date":"2017-12-19T08:00:37","date_gmt":"2017-12-19T15:00:37","guid":{"rendered":"https:\/\/honeybook.site.strattic.io\/?p=12789"},"modified":"2022-10-26T14:11:30","modified_gmt":"2022-10-26T21:11:30","slug":"digital-products-theft","status":"publish","type":"post","link":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/digital-products-theft","title":{"rendered":"How to Protect your Digital Downloads From Theft"},"content":{"rendered":"\n<div class=\"page\" title=\"Page 1\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p><em>Selling digital download products is a perfect fit for creative business owners. Instant access for our customers, no trips to the post office, and no ceiling on how many we can sell\u2014what&#8217;s not to love? The only thorn in an otherwise flawless business model is the threat of file theft.<\/em><\/p>\n<\/div><\/div><\/div><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter wp-image-79245 size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2000\" height=\"1548\" src=\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2017\/12\/Feature-Images-2.jpg\" alt=\"Computer, coffee, and hands. Text stating &quot;How to Protect Yourself From Digital File Theft&quot;\" class=\"wp-image-79245\" srcset=\"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2017\/12\/Feature-Images-2.jpg 2000w, https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2017\/12\/Feature-Images-2-300x232.jpg 300w, https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2017\/12\/Feature-Images-2-1024x793.jpg 1024w, https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2017\/12\/Feature-Images-2-768x594.jpg 768w, https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2017\/12\/Feature-Images-2-1536x1189.jpg 1536w\" sizes=\"(max-width: 2000px) 100vw, 2000px\" \/><figcaption>What steps can you take to protect yourself?<\/figcaption><\/figure>\n\n\n\n<p>As a graphic designer who sells digital downloads, my ears perk up whenever I hear the latest tale of how &#8220;this person from &lt;country I&#8217;ve never heard of&gt; stole my design and is selling it in a Zazzle shop for less money.&#8221; It&#8217;s scary to think that you could be the next victim.<\/p>\n\n\n\n<p>Digital download theft is not entirely avoidable, but that doesn&#8217;t mean that we can&#8217;t put up a good fight. By taking a few small steps, you&#8217;ll reduce the likelihood of theft. Rest easy that you did everything you could to protect yourself.<\/p>\n\n\n\n<p>In this article, I break down all of the ways I secure the stuff I sell and give away for free online. This article includes how I educate my audience about usage. I also share how I quiet my fears and keep a big-picture mentality when it comes to digital download theft. It helps that I use HoneyBook, a platform that allows me to <a href=\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/how-to-sell-digital-products\">sell digital products securely<\/a> online. Still, you can never be too careful!<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>When and where should you be using file protection?<\/strong><\/h2>\n\n\n\n<p>It&#8217;s important to safeguard your work, but even more so when you put anything out there for free. Many of us use freebies in our marketing to attract new users and to give our audience a taste of what we have to offer. Not every visitor will turn into a buyer, but you don&#8217;t want them stealing your work, either.<\/p>\n\n\n\n<p>You can feel more secure about the items that you sell. When a customer spends money to purchase one of your digital products, it&#8217;s unlikely that they are doing it to steal from you. <a href=\"https:\/\/honeybook.com\">HoneyBook<\/a> is a great way to sell your digital products securely, with features like email time-out that eliminate opportunities for exploitation. In addition to requiring payment for your files, an email opt-in form is your first layer of defense. You&#8217;ll collect information like the customer&#8217;s name, address and phone number.<\/p>\n\n\n\n<p>In addition to giving you a way to stay in touch with your audience, requiring an email address removes anonymity. Of course, anyone could type in a fake name and email address, but authentication emails will stop many from doing that. The more details you request, the more of a deterrent it will be to a thief.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How to protect your digital downloads<\/strong><\/h2>\n\n\n\n<p>While it&#8217;s impossible to prevent file theft entirely, there are more measures you can take to protect your work to make it harder to do so. When it comes to digital downloads, <a href=\"https:\/\/www.youtube.com\/watch?v=uqJG4IMHCSw\">password protection<\/a> is your best friend.<\/p>\n\n\n\n<p>If you are selling PDFs that you don&#8217;t want to be altered or modified for resale, you can protect your files with a password using Adobe Acrobat. For any free resources you share (such as a printable design or guide), it&#8217;s smart to add password protection to prevent users from doing anything other than viewing and printing. With this layer of protection, the user will be prompted to input a password if they try to open it in an editing program like Adobe Photoshop. Unfortunately, .jpegs are not easily protected in the same way, so use PDFs when possible.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Educating your audience and customers<\/strong><\/h2>\n\n\n\n<p>Be very explicit about usage in your blog posts and on sales pages. When you provide clear instructions and terms of use, you show that you mean business. Use language to give anyone with bad intentions very little defense. If there&#8217;s nothing that says, &#8220;you can&#8217;t use this commercially,&#8221; what&#8217;s to stop them?<\/p>\n\n\n\n<p>In addition to including text on your websites, it&#8217;s also good practice to incorporate them into your files themselves. Add a <a href=\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/what-business-owners-need-to-know-about-copyright-law\">copyright line<\/a> to the bottom of any PDF you share. Here&#8217;s what I use for my digital downloads:<\/p>\n\n\n\n<blockquote class=\"wp-block-stackable-blockquote is-style-default stk-block-blockquote stk-block stk-b7f8605\" data-block-id=\"b7f8605\"><div class=\"has-text-align-left stk-block-blockquote__content stk-container stk-b7f8605-container stk-hover-parent\"><div class=\"stk-block-content stk-inner-blocks\">\n<div class=\"wp-block-stackable-icon stk-block-icon stk-block stk-32e06cd\" data-block-id=\"32e06cd\"><style>.stk-32e06cd .stk--svg-wrapper .stk--inner-svg svg:last-child,.stk-32e06cd .stk--svg-wrapper .stk--inner-svg svg:last-child :is(g,path,rect,polygon,ellipse){fill:#001247 !important}<\/style><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg style=\"height:0;width:0\"><defs><linearGradient id=\"linear-gradient-32e06cd\" x1=\"0\" x2=\"100%\" y1=\"0\" y2=\"0\"><stop offset=\"0%\" style=\"stop-opacity:1;stop-color:var(--linear-gradient-32-e-06-cd-color-1)\"><\/stop><stop offset=\"100%\" style=\"stop-opacity:1;stop-color:var(--linear-gradient-32-e-06-cd-color-2)\"><\/stop><\/linearGradient><\/defs><\/svg><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 50 50\" aria-hidden=\"true\" width=\"32\" height=\"32\"><path d=\"M19.8 9.3C10.5 11.8 4.6 17 2.1 24.8c2.3-3.6 5.6-5.4 9.9-5.4 3.3 0 6 1.1 8.3 3.3 2.2 2.2 3.4 5 3.4 8.3 0 3.2-1.1 5.8-3.3 8-2.2 2.2-5.1 3.2-8.7 3.2-3.7 0-6.5-1.2-8.6-3.5C1 36.3 0 33.1 0 29 0 18.3 6.5 11.2 19.6 7.9l.2 1.4zm26.4 0C36.9 11.9 31 17 28.5 24.8c2.2-3.6 5.5-5.4 9.8-5.4 3.2 0 6 1.1 8.3 3.2 2.3 2.2 3.4 4.9 3.4 8.3 0 3.1-1.1 5.8-3.3 7.9-2.2 2.2-5.1 3.3-8.6 3.3-3.7 0-6.6-1.1-8.6-3.4-2.1-2.3-3.1-5.5-3.1-9.7 0-10.7 6.6-17.8 19.7-21.1l.1 1.4z\"><\/path><\/svg><\/div><\/span><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-540e030\" data-block-id=\"540e030\"><p class=\"stk-block-text__text\">\u00a9 Elegance &amp; Enchantment and Enchanted Prints. For personal use only, not to be copied, distributed, altered or sold.<br>www.eleganceandenchantment.com \/\/ www.enchantedprints.com<\/p><\/div>\n<\/div><\/div><\/blockquote>\n\n\n\n<p>If the nature of your digital product doesn&#8217;t allow for space, consider adding a separate &#8220;Read Me&#8221; file with all instructions and terms and include it with your download.<\/p>\n\n\n\n<div class=\"wp-block-ugb-container ugb-container ugb-375db68 ugb-container--v2 ugb-container--design-basic ugb-main-block\"><style>.ugb-375db68-wrapper.ugb-container__wrapper{padding-top:0 !important;padding-bottom:0 !important}.ugb-375db68-wrapper > .ugb-container__side{padding-top:35px !important;padding-bottom:35px !important}@media screen and (min-width:768px){.ugb-375db68.ugb-container{padding-top:0px !important}}<\/style><div class=\"ugb-inner-block\"><div class=\"ugb-block-content\"><div class=\"ugb-container__wrapper ugb-375db68-wrapper\"><div class=\"ugb-container__side\"><div class=\"ugb-container__content-wrapper ugb-375db68-content-wrapper\">\n<div class=\"wp-block-ugb-columns ugb-columns ugb-d9f30f7 ugb-columns--design-plain ugb-columns--columns-2 ugb-main-block\"><style>.ugb-d9f30f7 > .ugb-inner-block > .ugb-block-content > .ugb-columns__item{grid-template-columns:0.20fr 1.80fr !important}<\/style><div class=\"ugb-inner-block\"><div class=\"ugb-block-content\"><div class=\"ugb-columns__item ugb-d9f30f7-content-wrapper\">\n<div class=\"wp-block-ugb-column ugb-column ugb-8131115 ugb-column--design-plain ugb-main-block\"><div class=\"ugb-inner-block\"><div class=\"ugb-block-content\"><div class=\"ugb-column__item ugb-8131115-column-wrapper\"><div class=\"ugb-column__content-wrapper\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2022\/04\/1_lightbulb-icon_182946fb75.png\" alt=\"\" class=\"wp-image-18294\"\/><\/figure>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-ugb-column ugb-column ugb-032b0ff ugb-column--design-plain ugb-main-block\"><div class=\"ugb-inner-block\"><div class=\"ugb-block-content\"><div class=\"ugb-column__item ugb-032b0ff-column-wrapper\"><div class=\"ugb-column__content-wrapper\">\n<p><span style=\"color: #000000;\"><b>Pro Tip: <\/b>Zip your product files and &#8220;read me&#8221; files together into one folder for a more streamlined downloading process.<\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"page\" title=\"Page 2\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h3>Label your files with your business name<\/h3>\n<p>It&#8217;s also good practice to label your files with your business name. For example, instead of calling your download: &#8220;Save the Date Template.jpg&#8221; you can consider, &#8220;Save the Date Template \u00a9Rebecca Jayne Photography.jpg&#8221;. Including a copyright symbol next to your name is just another reminder that the content belongs to you.<\/p>\n<p>While it won&#8217;t protect you legally, it never hurts to include a couple of lines of text to remind your readers and users that this is your livelihood and that you&#8217;re a real person who has worked hard to craft your digital resource. Here&#8217;s an example of what I include at the bottom of my Etsy listings:<\/p>\n<blockquote>\n<p>Lots of hard work and love goes into designing every item\u2014thank you for respecting these terms.<\/p>\n<\/blockquote>\n<p>If file theft is a big concern or has been a problem for you in the past, you may want to consider hiring an attorney to craft the perfect verbiage and seek counsel if\/when a robbery occurs.<\/p>\n<h2><strong>Learning when to let it go<\/strong><\/h2>\n<p>In our online digital space, we have to accept that theft is going to happen from time to time. Living in constant fear that somebody is going to steal our ideas, designs or work will prevent us from using our creative talents to keep producing\u2014which is just another type of robbery.<\/p>\n<p>When you discover that file theft has occurred, consider the severity of the situation. If someone reposted one of your Instagram photos without permission, is it really worth your time to track that person down, and start a full-fledged campaign against them?<\/p>\n<h3>It&#8217;s not the end of the world<\/h3>\n<p>We all know that running a successful business is not just about creating something and putting it up for sale. Just because somebody steals one of your files, it doesn&#8217;t mean that they are smart enough to be able to market it or even sell it. Keep this in mind, if you happen to stumble across one of your printable designs in a shop that has been open for two years and had three sales.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"page\" title=\"Page 3\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>Pick your battles, and only take action when you see that your business is going to suffer if you don&#8217;t. For example: if you notice that a big-name website or store is using your exact design and claiming it as their own, that&#8217;s not okay! If you find yourself in a situation where you need to take action, seek legal counsel before making contact, or you could end up hurting your case.<\/p>\n<p>If you sell digital downloads or use them as opt-ins to grow your audience, your hard work deserves to be respected. A little time and effort toward preventative measures will take you far and put you at ease. Create security so you can focus on creating more incredible work to share with the world.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Selling digital download products is a perfect fit for creative business owners. Instant access for our customers, no trips to the post office, and no ceiling on how many we can sell\u2014what&#8217;s not to love? The only thorn in an otherwise flawless business model is the threat of file theft. As a graphic designer who [&hellip;]<\/p>\n","protected":false},"author":264,"featured_media":79245,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[20],"tags":[355],"class_list":["post-12789","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-best-practices","tag-digital-products"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2017\/12\/Feature-Images-2.jpg",2000,1548,false],"thumbnail":["https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2017\/12\/Feature-Images-2-150x150.jpg",150,150,true],"medium":["https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2017\/12\/Feature-Images-2-300x232.jpg",300,232,true],"medium_large":["https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2017\/12\/Feature-Images-2-768x594.jpg",768,594,true],"large":["https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2017\/12\/Feature-Images-2-1024x793.jpg",1024,793,true],"1536x1536":["https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2017\/12\/Feature-Images-2-1536x1189.jpg",1536,1189,true],"2048x2048":["https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2017\/12\/Feature-Images-2.jpg",2000,1548,false]},"post_excerpt_stackable_v2":"<p>Selling digital download products is a perfect fit for creative business owners. Instant access for our customers, no trips to the post office, and no ceiling on how many we can sell\u2014what&#8217;s not to love? The only thorn in an otherwise flawless business model is the threat of file theft. What steps can you take to protect yourself? As a graphic designer who sells digital downloads, my ears perk up whenever I hear the latest tale of how &#8220;this person from &lt;country I&#8217;ve never heard of&gt; stole my design and is selling it in a Zazzle shop for less money.&#8221;&hellip;<\/p>\n","category_list_v2":"<a href=\"https:\/\/hbb.dev.reliablepenguin.com\/blog\/category\/business-best-practices\" rel=\"category tag\">Business best practices<\/a>","author_info_v2":{"name":"Michelle Hickey","url":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/author\/michelle-hickey"},"comments_num_v2":"1 comment","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Protect Digital Downloads | HoneyBook<\/title>\n<meta name=\"description\" content=\"Protecting your unique digital downloads is essential for any independent. Our guide shows you how to effectively do just that.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/digital-products-theft\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Protect Digital Downloads | HoneyBook\" \/>\n<meta property=\"og:description\" content=\"Protecting your unique digital downloads is essential for any independent. Our guide shows you how to effectively do just that.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/digital-products-theft\" \/>\n<meta property=\"og:site_name\" content=\"HoneyBook\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/honeybook.co\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/michellehickeydesign\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-12-19T15:00:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-26T21:11:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2017\/12\/Feature-Images-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1548\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michelle Hickey\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@honeybook\" \/>\n<meta name=\"twitter:site\" content=\"@honeybook\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michelle Hickey\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/digital-products-theft\",\"url\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/digital-products-theft\",\"name\":\"How to Protect Digital Downloads | HoneyBook\",\"isPartOf\":{\"@id\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/digital-products-theft#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/digital-products-theft#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2017\/12\/Feature-Images-2.jpg\",\"datePublished\":\"2017-12-19T15:00:37+00:00\",\"dateModified\":\"2022-10-26T21:11:30+00:00\",\"author\":{\"@id\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/#\/schema\/person\/a7a4c20bf9394293bb39f0fd787ce648\"},\"description\":\"Protecting your unique digital downloads is essential for any independent. Our guide shows you how to effectively do just that.\",\"breadcrumb\":{\"@id\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/digital-products-theft#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/digital-products-theft\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/digital-products-theft#primaryimage\",\"url\":\"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2017\/12\/Feature-Images-2.jpg\",\"contentUrl\":\"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2017\/12\/Feature-Images-2.jpg\",\"width\":2000,\"height\":1548,\"caption\":\"What steps can you take to protect yourself?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/digital-products-theft#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/hbb.reliablepenguin.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Business best practices\",\"item\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/category\/business-best-practices\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How to Protect your Digital Downloads From Theft\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/#website\",\"url\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/\",\"name\":\"HoneyBook\",\"description\":\"Resources to empower independent business owners\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/#\/schema\/person\/a7a4c20bf9394293bb39f0fd787ce648\",\"name\":\"Michelle Hickey\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/65dd5a9fffcb87c7c5af95268401bf03282e37495df135c3011df9eef2068428?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/65dd5a9fffcb87c7c5af95268401bf03282e37495df135c3011df9eef2068428?s=96&d=mm&r=g\",\"caption\":\"Michelle Hickey\"},\"description\":\"Michelle is a graphic designer + entrepreneur who loves guiding fellow creatives in starting + growing successful businesses, through her site, michellehickey.design. She is also the owner of Enchanted Prints, an online stationery shop and editor of the blog, Elegance + Enchantment. When she\u2019s not \u201cworking\u201d you can find Michelle exploring new cities, likely in search of typography and baked goods. Originally a New Yorker, Michelle now calls NE Florida home, where she lives with her hubby + adorable kitties.\",\"sameAs\":[\"https:\/\/www.michellehickey.design\/\",\"https:\/\/www.facebook.com\/michellehickeydesign\/\",\"https:\/\/www.instagram.com\/michellehickeydesign\/\"],\"url\":\"https:\/\/hbb.dev.reliablepenguin.com\/blog\/author\/michelle-hickey\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Protect Digital Downloads | HoneyBook","description":"Protecting your unique digital downloads is essential for any independent. Our guide shows you how to effectively do just that.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/digital-products-theft","og_locale":"en_US","og_type":"article","og_title":"How to Protect Digital Downloads | HoneyBook","og_description":"Protecting your unique digital downloads is essential for any independent. Our guide shows you how to effectively do just that.","og_url":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/digital-products-theft","og_site_name":"HoneyBook","article_publisher":"https:\/\/www.facebook.com\/honeybook.co","article_author":"https:\/\/www.facebook.com\/michellehickeydesign\/","article_published_time":"2017-12-19T15:00:37+00:00","article_modified_time":"2022-10-26T21:11:30+00:00","og_image":[{"width":2000,"height":1548,"url":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2017\/12\/Feature-Images-2.jpg","type":"image\/jpeg"}],"author":"Michelle Hickey","twitter_card":"summary_large_image","twitter_creator":"@honeybook","twitter_site":"@honeybook","twitter_misc":{"Written by":"Michelle Hickey","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/digital-products-theft","url":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/digital-products-theft","name":"How to Protect Digital Downloads | HoneyBook","isPartOf":{"@id":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/digital-products-theft#primaryimage"},"image":{"@id":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/digital-products-theft#primaryimage"},"thumbnailUrl":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2017\/12\/Feature-Images-2.jpg","datePublished":"2017-12-19T15:00:37+00:00","dateModified":"2022-10-26T21:11:30+00:00","author":{"@id":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/#\/schema\/person\/a7a4c20bf9394293bb39f0fd787ce648"},"description":"Protecting your unique digital downloads is essential for any independent. Our guide shows you how to effectively do just that.","breadcrumb":{"@id":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/digital-products-theft#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/digital-products-theft"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/digital-products-theft#primaryimage","url":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2017\/12\/Feature-Images-2.jpg","contentUrl":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2017\/12\/Feature-Images-2.jpg","width":2000,"height":1548,"caption":"What steps can you take to protect yourself?"},{"@type":"BreadcrumbList","@id":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/digital-products-theft#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/hbb.reliablepenguin.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Business best practices","item":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/category\/business-best-practices"},{"@type":"ListItem","position":3,"name":"How to Protect your Digital Downloads From Theft"}]},{"@type":"WebSite","@id":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/#website","url":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/","name":"HoneyBook","description":"Resources to empower independent business owners","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/#\/schema\/person\/a7a4c20bf9394293bb39f0fd787ce648","name":"Michelle Hickey","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/65dd5a9fffcb87c7c5af95268401bf03282e37495df135c3011df9eef2068428?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/65dd5a9fffcb87c7c5af95268401bf03282e37495df135c3011df9eef2068428?s=96&d=mm&r=g","caption":"Michelle Hickey"},"description":"Michelle is a graphic designer + entrepreneur who loves guiding fellow creatives in starting + growing successful businesses, through her site, michellehickey.design. She is also the owner of Enchanted Prints, an online stationery shop and editor of the blog, Elegance + Enchantment. When she\u2019s not \u201cworking\u201d you can find Michelle exploring new cities, likely in search of typography and baked goods. Originally a New Yorker, Michelle now calls NE Florida home, where she lives with her hubby + adorable kitties.","sameAs":["https:\/\/www.michellehickey.design\/","https:\/\/www.facebook.com\/michellehickeydesign\/","https:\/\/www.instagram.com\/michellehickeydesign\/"],"url":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/author\/michelle-hickey"}]}},"_links":{"self":[{"href":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/posts\/12789","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/users\/264"}],"replies":[{"embeddable":true,"href":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/comments?post=12789"}],"version-history":[{"count":0,"href":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/posts\/12789\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/media\/79245"}],"wp:attachment":[{"href":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/media?parent=12789"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/categories?post=12789"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/tags?post=12789"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}