HELP CENTER | Internet Identity Card

Do You Have Questions? We Have The Answers!

Prove and Protect Your Online Identity


Why the Internet Identity Card ?

So you can prove and protect your online identity ™

Your Internet Identity Card is always accessible to you online even when your physical ID documents may not be and you can make your Internet Identity Card visible to the public or keep access limited to those given passwords by you.


How to Prove Your Online Identity?

We use a thorough, yet uncomplicated 8-step process that includes Email, phone, E-Signature, photo, Id document, social network accounts, Facial video and payment

After the verification process has been completed, you will receive your very own Internet Identity Card that has been created for and made available for you.
Remember the Internet Identity Card is 100% can be accessed 24/7.


How to Protect Your Online Identity?

Your Internet Identity Card can help you take action against impersonators or copyright infringers. Internet Identity Card contents are DMCA and copyright protected in over 171+ countries worldwide via the Berne Convention. 

With your Internet Identity Card, your online identity is protected from theft or unauthorized use. Any unauthorized use of your Internet Identity Card can be challenged around the clock to protect your online identity whenever it is under threat.

What is the Digital Millennium Copyright Act (DMCA) protection?

The Digital Millennium Copyright Act (DMCA) is a United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO). It criminalizes the production and dissemination of technology, devices, or services intended to circumvent measures (commonly known as digital rights management or DRM) that control access to copyrighted works. It also criminalizes the act of circumventing an access control, whether or not there is actual infringement of copyright itself. In addition, the DMCA heightens the penalties for copyright infringement on the Internet. frequently handles cases where someone has found their personal, private name(s) and picture(s) online without their authorization. Often they have been stolen from email, phones, laptops or even cameras.If this happens to you, the Internet Identity Card can help. has been very successful at getting this kind of personal infringements taken down.

A DMCA Takedown is when content is removed from a website at the request of the owner of the content or the owner of the copyright of the content.

Digital Millennium Copyright Act (“DMCA”) enacted in 1998, prevents others from using images or “work” in general without the permission from the author.

Legal Punishments for Copyright Infringement:

YOU will be fully responsible for ALL fees incured by the individual who had to incur Loss in efforts to get you to take down their photos.

Note: DMCA Takedown does not require the content of the Internet Identity Card to be copyrighted in order for a takedown to occur. The fact that the content is yours, or the subject of a photo/video is you can be sufficient to request a takedown.

If appropriate, start your takedown here:


What is the Berne Convention protection?

The Berne Convention for the Protection of Literary and Artistic Works, usually known as the Berne Convention, is an international agreement governing copyright, which was first accepted in Berne, Switzerland, in 1886.

The Internet Identity Card’s © Copyright and Content are Protected in 171+ Countries via the Berne Convention

The Berne Convention formally mandated several aspects of modern copyright law; it introduced the concept that a copyright exists the moment a work is “fixed”, rather than requiring registration. It also enforces a requirement that countries recognize copyrights held by the citizens of all other signatory countries.


What is the UETA and ESIGN Act protection?

You may see the terms ‘UETA’ and ‘ESign Act’ referred to on website and elsewhere in connection with getting legally binding documents signed online. These are both regulatory acts drawn up by the US government to provide legal guidelines for ensuring the validity of electronic records and documents signed online. The Uniform Electronic Transactions Act (‘UETA’) is an Act adopted by 47 states, the District of Columbia, Puerto Rico, and the U.S. Virgin Islands. The Electronic Signatures in Global and National Commerce Act (‘ESIGN’) was passed at the federal level in 2000.

What Do These Acts Mean?

Together these Acts establish guidelines by which electronic records and signatures achieve the same legal standing as traditional paper documents and handwritten signatures. In other words, “A document or signature cannot be denied legal effect or enforceability solely because it is in electronic form.” However, in order to achieve this equal standing, documents signed between parties in the United States must meet the requirements set down by these two Acts before they can be deemed ‘legal and binding’.

What Happens if These Requirements are NOT Met?

Documents that are signed without meeting the requirements set down by ESIGN and UETA may be challenged in court.

Making Internet identity Card Documents Legally Binding:

The Internet Identity Card prepares legally-binding documents in accordance with ESIGN and UETA. Contracts that are signed using Internet Identity Card’s E-Signature will hold up to legal scrutiny, providing an encrypted signature process and a comprehensive audit trail of exactly who signed, what, and when. Following these E-Signature guidelines, combined with our robust security and compliance measures, will ensure that Internet Identity Card’s E-Signature documents have the same legal standing as handwritten signatures on paper documents.


What is Personality rights?

The right of publicity, often called personality rights, is the right of an individual to control the commercial use of his or her name, image, likeness, or other unequivocal aspects of one’s identity. It is generally considered a property right as opposed to a personal right, and as such, the validity of the right of publicity can survive the death of the individual (to varying degrees depending on the jurisdiction).

Personality rights are generally considered to consist of two types of rights: the right of publicity, or to keep one’s image and likeness from being commercially exploited without permission or contractual compensation, which is similar to the use of a trademark; and the right to privacy, or the right to be left alone and not have one’s personality represented publicly without permission. In common law jurisdictions, publicity rights fall into the realm of the tort of passing off. United States jurisprudence has substantially extended this right.

A commonly cited justification for this doctrine, from a policy standpoint, is the notion of natural rights and the idea that every individual should have a right to control how, if at all, his or her “persona” is commercialized by third parties. Usually, the motivation to engage in such commercialization is to help propel sales or visibility for a product or service, which usually amounts to some form of commercial speech (which in turn receives the lowest level of judicial scrutiny). If an individual violates this right they will have to through a lawsuit.

Your right of privacy or publicity is violated when your name, voice, signature, photograph or likeness appears in a work of art and you can be clearly recognized as the subject shown in the work and  you have not consented to the use.

The rights of an individual which are likely to be infringed by others are the right to good name, the right to dignity and the right to privacy, which are referred to as personality rights, which is a non-patrimonial interest which cannot exist separately from the individual.
Fraudulent misrepresentation occurs when one makes representation with intent to deceive and with the knowledge that the subject matter is false. An action for fraudulent misrepresentation allows for a remedy of damages and rescission. One can also sue for fraudulent misrepresentation in a tort action. Fraudulent misrepresentation is capable of being made recklessly.


What is the Personal Data Protection Rules in the EU ?

In January 2012, the European Commission proposed a comprehensive reform of data protection rules in the EU.

On 4 May 2016, the official texts of the Regulation and the Directive have been published in the EU Official Journal in all the official languages. While the Regulation will enter into force on 24 May 2016, it shall apply from 25 May 2018. The Directive enters into force on 5 May 2016 and EU Member States have to transpose it into their national law by 6 May 2018.

The objective of this new set of rules is to give citizens back control over of their personal data, and to simplify the regulatory environment for business. The data protection reform is a key enabler of the Digital Single Market which the Commission has prioritised. The reform will allow European citizens and businesses to fully benefit from the digital economy.

Whenever you open a bank account, join a social networking website or book a flight online, you hand over vital personal information such as your name, address, and credit card number.

What happens to this data? Could it fall into the wrong hands? What rights do you have regarding your personal information?

Everyone has the right to the protection of personal data.

Under EU law, personal data can only be gathered legally under strict conditions, for a legitimate purpose. Furthermore, persons or organisations which collect and manage your personal information must protect it from misuse and must respect certain rights of the data owners which are guaranteed by EU law.

Every day within the EU, businesses, public authorities and individuals transfer vast amounts of personal data across borders. Conflicting data protection rules in different countries would disrupt international exchanges. Individuals might also be unwilling to transfer personal data abroad if they were uncertain about the level of protection in other countries.

Therefore, common EU rules have been established to ensure that your personal data enjoys a high standard of protection everywhere in the EU. You have the right to complain and obtain redress if your data is misused anywhere within the EU.

The EU’s Data Protection Directive also foresees specific rules for the transfer of personal data outside the EU to ensure the best possible protection of your data when it is exported abroad.



Step 1 – What is Email verification?

1. The subscriber fills out our online signup form and enters his Email address.
2. The opt-in confirmation Email is sent to the subscriber.
3. The confirmation email contains a unique URL that the subscriber must click to verify their subscription request.
4. This verifies the owner of the email address is indeed the person who is attempting to subscribe to the Internet Identity Card.

Step 2 – What is Phone verification?

1. The subscriber visits our phone verification web page and enters his phone number.
2. A random verification code is generated and sent via SMS to him.
3. The subscriber enters the code that he received into our web confirmation form.
4. If the correct code is entered, the subscriber’s phone is verified.
5. If an incorrect code is entered, he is re-prompted to enter a new code.

Step 3– What is E-Signature verification?

Our solution is  (UETA) & (ESIGN) compliant & adheres to the strictest document signing policy’s in the US & European unions.

Two Factor Verification:
A password protect their documents with an access code and unique password.

Tamper-Resistant Technology:
Similar to human DNA each eSign generated document has a tamper resistant Document ID.

Step 4 – What is Photo verification?

1. The subscriber clicks a button to upload  his photo or take a picture with his webcam.
2. The subscriber selects the passport-style photo to upload and clicks open.
3. The uploading process begins automatically.
4. The subscriber can see his image embedded in his Internet identity Card following its uploading.
5. If the subscriber is  happy with his photo, then he clicks on “Next Step.”
6. If unhappy, the subscriber may re-upload the photo by clicking it. 

Click here to visit the photo requirements page

Step 5 – What does Id Document verification mean?

1. The subscriber selects a document ID to be Uploaded or take a picture with his webcam.
2. The subscriber selects the country of the Document ID.
3. The subscriber fills in the date of issuance and date of expiration.
4. The subscriber uploads his Document ID.

Step 6 – What does Social Media Verification mean?

1. The subscriber selects the first social media account he wish to verify.
2. The subscriber take the necessary steps either to login to this account.
3. Seeing “ACCOUNT VERIFIED” means that the subscriber succeeded.
4. The subscriber can click to verify additional social media account(s)

Step 7 – What does Live Facial Verification mean?

1. Take a video
2. The subscriber clicks “Record Video”, fill-in his name then click Save.
3. The subscriber allows access to his camera and record his video imitating the random animated person.
4. Once the subscriber is happy with the video, he clicks the “Submit” button.

Step 8 – What does Payment Verification mean?

1. The subscriber can make his payment via Credit Card.
2. There is also an option to choose the type of credit card you wish, e.g. Visa, MasterCard, Discover, American Express, etc.
3. The subscriber enters his name as it appears on his credit card and then enters his credit card number, expiration date, and security code.
4. If the subscriber’s credit card is declined, he can either verify that he’s entered each piece of information correctly or he can use his PayPal account or a different credit card for payment processing.

When the 8-step verification process is completed we will review the subscriber’s application and send him a message once it has been approved.

What You Need to Enroll?

  1. A scanned copy of a Government photo-ID issued to you.
  2. A scanned copy of the Photo you wish put on your Internet Identity Card.
  3. Your mobile phone number for a verification SMS message.
  4. The email address at which you wish to receive our confirming message.
  5. The credit/debit card or PayPal account to be used by you.
  6. A webcam or smartphone to take your live image when you are enrolling.
  7. Organizing these items Before you Start, will save you time.

You have 8 days from registration and receipt of payment to complete the enrollment process. A failure to do so will result in your account being suspended.

  • Anyone 18 years of age or over who completes our 8-step enrollment and verification process is eligible for an Internet Identity Card.
  • The Internet Identity Card ™ is accessible to people all over the world irrespective of their race, color, religion, national origin, status or financial situation. 


How do I permanently delete my account?

If you don’t think you’ll use Internet Identity card account again, you can request to have your account permanently deleted. Please keep in mind that you won’t be able to reactivate your account or retrieve anything you’ve added.

  1. Log into your account
  2. Select  → “Members” from the top main drop-down menu and click  the link “Delete my account”  .
  3. Click “Ok” to confirm


How much is this going to cost me?

Yearly Subscription – $33.00/year – You can cancel your subscription any time – No contracts – No hidden fees


Knowledge Base

How can I get my picture off the internet? handles cases everyday where someone has found their personal, private picture(s) online. Often they have been stolen from email, phones, laptops or even cameras. Or they have been sent to someone in confidence or private for them only – as in sexting with a mobile device. Regardless of how, often these picture(s) end up on a website without your permission.

If this has happened to you we can help. has been very successful at getting this kind of personal infringement taken down from most of the popular adult websites on the internet.

If you have been a victim of sexting or someone has gained access to your email,computer files, phone or camera and published your nude picture(s) on the internet without your permission, can get them removed.

Can I still use Internet Identity Card DMCA Takedown in a non United States country?

Yes you can. clients are everywhere and represent almost every country on the planet.

We work all over the world removing copyright infringed / stolen content. Most OSP/SP’s have a “DMCA Protocol” to handle their hosted websites infringing on copyright protection. and his partners has relationships with hosting companies across the planet and that is how we can get your stolen content removed quickly. We generally have your content removed quickly.

Start Your Takedown here:

I have been defamed?

Bitter ex-boyfriend (girlfriend), husband/wife, employee etc can often ruin your reputation online through defamation.

The internet provides a wide open, un-policed forum to post lies and misleading information which can permanently damage your reputation. Whether this information is about a corporation or person is irrelevant. Just one blog post or gossip site posting can have seriously harmful effects. Takedown can help.

While we cannot provide support for defamation however we can remove content and information which is yours.

Often defamation or damaging information is accompanied by photos or files which have been stolen and published without permission. can get that stolen content removed through the DMCA Takedown.

Go and complete the form
Simply submit the name and location of where you found the stolen content and we can go to work on your behalf.

Most of our reputation support clients are people or organizations that have found their content listed on another website without their permission.

Some examples of stolen content that we work with everyday are:

    1. Pictures – of you or taken by you
    1. Videos – of you or taken by you
    1. Graphics
    1. Text
    1. Applications
    1. Programs
    1. Profiles or Bio’s – personal or corporate
    1. etc

If one of these examples is like your situation we can help.

Start Your Takedown here:

How to Become our Verified Website Sponsor?

In order to become one of our Verified Website Sponsors you must create your Internet Identity Card to Prove and Protect Your Online Identity.

Once your online identity has been verified and your Internet Identity Card created please sign in to your account and return to this page

Knowledge base

Who is authorized to send an Internet Identity Card DMCA Takedown notice?

There are only two parties that are authorized to send a (DMCA) Takedown Notice:

  1. the owner of the content described in the takedown notice
  2. an authorized agent of the owner of the content described in the takedown notice

furthermore, if the owner of the content chooses and agent to act on their behalf to send the takedown notice they must first swear by (legally state):

  1. they own the content contained in the takedown notice
  2. they have authorized the agent to act on their behalf requires this sworn statement from every one of its customers. See example here: Takedown Notice Sign up form – in order to complete this form users must legally swear they are authorized to submit a takedown notice.

False Notice

Making and sending of false takedown notification is illegal and no small legal matter.
Sending a takedown notice is a legal process that is upheld by the courts of law.
The penalties of sending a false notice is perjury within the United States. Other jurisdictions treat the sending of false notices very seriously and are comfortable pursuing false claimants with significant vigor.

Why use the Internet Identity Card DMCA Website Status Page and Protection Certificate?

The DMCA Protection Certificate shows the webpage  indexed and protected by DMCA. The certificate clearly identifies a number of key pieces of information for site users and owners to know the webpage is connected to is protected. It also clearly states the content on that page is the property of the site owner or is used under permission by the site owner.
Click here to view an example of a Protection Certificate

There are three kinds of Protection Certificates:

  1. verified
  2. unverified
  3. unauthorized

The Protection Certificate provides several specific key pieces of information to help protect your content:

  1. webpage title – direct connection to the specific Internet Identity Card webpage it is protecting
  2. verification status
  3. When the Protection of the Internet Identity Card URL  started
  4. Last Checked  tell you and site users when it was last scanned
  5. Language Option – communicate your copyright or content ownership in the language of your users.

All of this information and the tools connected to the Internet Identity Card are critical to helping prevent thieves from stealing your content. And if they do steal your content you have specific content protection information to provide as proof of ownership or copyright to process a successful takedown. It is a powerful solution and guard against theft.

Will work with lawyers or corporate law firms?

Yes does a lot of work for and in cooperation with lawyers and lawfirms. We have a very clear and established process that makes this arrangement highly effective for both the lawyer and their client. ‘s skill and talent is understanding the internet, its culture and how it “really” works. does not replace the lawyer or firm in this arrangement but rather becomes a partner to accomplish the same result. uses an existing law and established process on the internet to get stolen content taken down.

What will happen to my Internet Identity Card if I pass away?

Death is a fact of life. When someone dies, they’re no longer physically here, but their digital self lives on.

The risk of identity theft does not end at death and Post-Mortem ID theft now transcends the frontiers of biological life.

This can have disastrous consequences on your surviving family members when and if it is discovered.

All it takes is an identity thief to read and scan online memorial sites, online obituary sites, online funeral notices, online death Records and find a picture of someone who matches either what they look like or what their clients are looking for.

Today, with so much of our personal data being entered into electronic databases, stored on electronic devices or floating around on the Internet, everyone—including the deceased—is vulnerable to having their identity cloned, stolen or ghosted.

Our post-mortem privacy enable users to decide what happens to their Internet Identity Card after death.

Memorializing an Internet Identity Card is free and lasts forever.

For instance, this means that an Internet identity card holder can ask for his Internet Identity Card to be entirely deleted after he dies or he can also request his Internet Identity Card to be turned into a memorial and to leave an access to chosen “legacy contact” (typically their friends or family) who can write and share memories on the Online Memorial Websites of their choice that will be linked to the Internet identity Card.

If you have an Internet Identity Card Please fill and sign the form below to ensure that your Internet identity is posthumously protected.

If no instructions are given the Internet Identity Card will be entirely deleted and the online identity will no longer be protected.

Post Mortem Privacy Form URL (You need to be connect to your account) :

Example of Post mortem Internet Identity card:

Example URL:

Create your Internet identity Card to protect your online identity :  Click here

Https card - Internet identity card Copyright 2017

Click Me