Get in Touch

All Rights Reserved​

All material appearing on the DigitalSyntaxSolutions website (“Content”) is protected by copyright under South African Copyright laws, are the property of DigitalSyntaxSolutions or the party credited as the provider of the content. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any way exploit any such content, nor may you distribute any part of this content over any network, including a local area network, sell or offer it for sale, or use such content to construct any kind of database. You may not alter or remove any copyright or other notice from copies of the content on the DigitalSyntaxSolutions website. Copying or storing any content except as provided above is expressly prohibited without prior written permission of the University or the copyright holder identified in the individual content’s copyright notice. For permission to use the content on the DigitalSyntaxSolutions website, please contact admin@digitalsyntaxsolutions.com.Copyright Law in South Africa is governed by the Copyright Act of 1978 and its amendments. CIPC and DTI oversee copyright in the country. As a member of the Berne Convention and TRIPS Agreement, copyright works protected in South Africa are also protected in other member states of the above. One doesn’t have to register copyright on a work for it to be protected. Copyright is automatically assigned the moment an original creative work takes a tangible form. Copyright applies to works that have some form of creativity embedded. As such a mere list of facts or data cannot be copyright protected. A grocery list, for instance, is not a creative act and thus cannot be protected. Copyright Law in South Africa applies to computer programs, literary works, broadcasts, cinematographic films, artistic expressions such as music, photographs, paintings, drawings, sculpting-related works, and architectural works, as well as published editions and sound recordings. With cinematograph films registration is required as such are complex works embedding several other creative works.

Usage Rights

Infringement of copyright can take place when a party copy, uses, sells, rents out, imports, or disposes of stores, and makes available copyright-protected works in a manner not authorized by the copyright holder. One can get usage and selling rights on a work through a license agreement. It is important to note that such rights can range from master resellers to mere usage rights. Royalties are paid to the copyright holder for such usage.

Transfer of Copyright

Much like other property, copyright can be transferred by assignment, testamentary disposition, or by operation of law. Copyright can also be licensed to a licensee for royalties. It is important to note that an assignment and an exclusive license (which precludes anyone else, including the author from using the creation) must be in writing and signed by the assignor to be valid. A non-exclusive license may be written or oral, or inferred from the conduct of the parties.

​Who we are

Our website address is: https://digitalsyntaxsolutions.com

Cookies

If you leave a comment on our site you may opt-in to saving your name, email address, and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year. If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser. When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed. If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited.

Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the same way as if the visitor has visited the other website. These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

Who do we share your data with

If you request a password reset, your IP address will be included in the reset email.

How long we retain your data

If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue. For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

Where do we send your data?

Visitor comments may be checked through an automated spam detection service.

How do we protect your information?

We implement a variety of security measures to maintain the safety of your personal information when you access our site and landing pages and fill out forms.

Your Consent

By using our site, or filling out forms, you consent to our privacy policy.https://digitalsyntaxsolutions.com is committed to the rights and obligations under GDPR, FIPPA, and PIPEDA and follows all privacy and security protocols to ensure the safety of the reports received through our system.

SSL or TLS encryption

This site uses SSL or TLS encryption for security reasons and the protection of the transmission of confidential content. You can recognize an encrypted connection in your browser’s address line when it changes from “http://” to “https://” and the lock icon is displayed in your browser’s address bar. If SSL or TLS encryption is activated, the data you transfer to us cannot be read by third parties.

Changes to our Privacy Policy

If we decide to change our privacy policy, we will post those changes on this page. This policy was last modified on November 1, 2022.

error: Content is protected !!
Share This