Joomla! Joomla!

This trademark policy (the "Policy") describes the ways in which the Trademarks, service marks, and logos of DiceLock Security relating to DiceLock Security products ("Trademarks") may or may not be used. If you use any of the Trademarks, you must abide by this Policy. We encourage communication to prevent misunderstanding. If you have any questions or comments, please contact as described at the end of this Policy.

DiceLock Security's trademark policy attempts to balance two competing interests: DiceLock Security's need to ensure that its trademarks remain reliable indicators of quality, and DiceLock Security's desire to permit community members to contribute to the development and success of the DiceLock Security software. Striking a proper balance can be difficult, and we hope this Policy will help us to do that.

Underlying DiceLock Security's trademark policy is the general law of trademarks. Trademarks exist to help consumers identify the source or origin of products. When a company makes a product, consumers begin to associate it with the name and trademarks of that company. The reputation of a company can be a key factor in a consumer deciding to use one product or another. Allowing others to place a company's trademarks on other people's products can affect this reputation. Trademark law exists, at least in part, to help consumers to avoid being confused about the source and quality of the goods they are using.
As a baseline, any use of the Trademarks should not be confusing or misleading. Beyond that, this Policy describes uses of the Trademarks that are allowed and not allowed. When we refer to "Trademarks", we refer not only to the logo of DiceLock Security but the names DiceLock Security, DiceLock and others as well.

Trademarks and the DL-FLSCL

As you know, certain noncommercial versions of the DiceLock Security software are distributed under the DiceLock Free/Libre Source Code License ("DL-FLSCL"). Please keep in mind that the DL-FLSCL does not grant any trademark rights. Although you may distribute and modify certain software under the DL-FLSCL, you may use our Trademarks in connection with those modifications and distributions only as described in this Policy.

Modified software and unmodified software

Genuine DiceLock Security software, which is sourced by DiceLock Security and thus properly bears the Trademarks, is the software in the exact source code and binary form that it is distributed by DiceLock Security, without modification of any kind. Once any change has been made to the software, even if that change may be permissible under the DL-FLSCL, the software should no longer bear the Trademarks. The public has a right to know when it is receiving a genuine DiceLock Security product that is quality assured by DiceLock Security.

Uses that Are Not Approved by This Policy

The following uses are not allowed. If you feel you need to use the Trademarks as described below, and have a legitimate reason to do so, please contact us. Some such uses may be acceptable under a written license agreement negotiated between you and DiceLock Security. However, DiceLock Security will decide this at its discretion on a case-by-case basis.

  • Certain web uses. You must not use any Trademark in a web page title, titletag, metatag, or other manner with the intent or the likely effect of influencing search engine rankings or results listings.
  • Combination marks. You must not use any Trademark in a manner that creates a "combined mark", or use that integrates other wording with the Trademark in a way that the public may think of the use as a new mark (e.g., DiceLocker, or DiceLock Lite, or DiceLock by DiceLock Safer).
  • Company names. You must not use any Trademarks as part of your company name, trademark, or logo.
  • Domain names. If you want to include all or part of a DiceLock Security Trademark in a domain name, you must first receive written permission from DiceLock Security. This includes uses for user groups, developer groups, or international groups. We approve many such uses, but we need to do this on a case-by-case basis.
  • Misuse. You must not use the Trademarks in a manner that is unethical, offensive, disparaging, defamatory, illegal, or in bad taste.
Uses Permitted under This Policy

The following uses of the Trademarks are permitted, but in all cases you must use the Trademarks only as otherwise required by this Trademark Policy. Also, if you use the Trademarks in violation of this Trademark Policy in any way, DiceLock Security may revoke your right to use the Trademarks, even as allowed under this Trademark Policy.

Unaltered Source Codes and Binaries. You may distribute source codes and binaries downloaded from DiceLock Security web site to anyone, without receiving any further permission from DiceLock Security. However, you must not remove or change any part of the official source codes and binaries, including DiceLock Security trademarks. On your web site or in other materials, you may truthfully state that the software you are providing is an unmodified version of a DiceLock Security application. If you choose to provide visitors to your web site the opportunity to download DiceLock Security source codes and binaries, you must do so by means of links to our download site, to help ensure faster, more reliable downloads.

If you choose to distribute DiceLock Security source codes and binaries yourself, you should make available only the latest released version.

Modified Versions. DiceLock Security's source code repository may contain any digital version of DiceLock Security's logos. You may not use the Trademarks with any modified program (including a modified configuration or build) that you create using this source code, and you may not use the Trademarks in any way to designate a modified version, except that you may truthfully state that the software you are providing contains portions that are derived from DiceLock Security software, and then only by using the Trademarks in their word form. For example, if the product you've modified is DiceLock, you may not use DiceLock Security or DiceLock, in whole or in part, in its name. Also, it would be inappropriate for you to say "based on DiceLock Security DiceLock". Instead, in the interest of complete accuracy, you could describe your modifications and executables as "based on DiceLock Security technology", or "incorporating DiceLock Security source code", or "based on DiceLock technology", or "incorporating DiceLock source code". You may not use any DiceLock Security logo on any modified version. If you want to build an unmodified version, you should instead use our binary distribution only.

Extensions and Derivations. If you want to distribute extensions or derivations, you may not use the Trademarks to refer either to the extensions or derivations, or to a product that consists of unmodified DiceLock Security software built or installed together with your extensions or derivations. You should use the Trademarks only to refer to unmmodified versions of the DiceLock Security software alone. If you are in doubt about how to do this, you should consider contacting us.


DiceLock Security invites you to link to DiceLock Security's web site, for the purpose of allowing your visitors to download the DiceLock Security software by using this hyperlink: DiceLock Security

Services related to DiceLock Security software

If you offer services related to DiceLock Security software, you may use DiceLock Security's Trademarks in word form to describe and advertise your services, so long as you do not suggest that you are the origin of the DiceLock Security software. For example, your web site might say "Customization services for the DiceLock Security utility available here". It must not say "DiceLock Security services sold here", or "custom DiceLock Security software available here".

Proper trademark use

If you use the Trademarks as described in this Policy, here is how they should be used.

  • Proper form. DiceLock Security's Trademarks should be used in their exact form, neither abbreviated nor combined with any other word or words. Do not vary the spelling, add hyphens, make one word into two, or use a possessive or plural form of the Trademarks. Do not abbreviate a Trademark to create an acronym. When using a logo, you must never modify the design, add or delete any words, or change any colors or proportions. The logo may be scaled proportionally. The logo may in its entirety be displayed using the exact colors used by DiceLock Security.
  • Use of word mark. We encourage you to use the word form of the Trademarks (as opposed to the logo), because using the word form is easier to do without violating this Policy. You may use the word form of the Trademarks either in all capitals (DICELOCK, DICELOCK SECURITY) or by capitalizing only in these ways (DiceLock, DiceLock Security). No other capitalization should be used. Use of the word form of the trademark should be in the same font and style as the surronding text.
  • Trademarks are adjectives. Always use the Trademarks as adjectives, and not as a verb or noun or in the possessive or plural forms. Examples of proper use: DiceLock Security Software, DiceLock Security software application, DiceLock Software, DiceLock software application. Examples of improper use: Custom DiceLock, I DiceLock-ed my system.
  • Accompanying symbol. The first or most prominent mention of a DiceLock Security Trademark should be accompanied by a symbol indicating whether the mark is a registered trademark ("®") or an unregistered trademark ("™"). Please see our Trademarks below for the correct symbol to use.
  • Attribution. The fact that the Trademarks are controlled by DiceLock Security should be stated (e.g., "[DiceLock] is a trademark of DiceLock Security") in a footnote or similar place, in a reasonably legible position and size.
  • Separation. The DiceLock Security logos must be used as standalone icons, without any other third-party logos and/or trademarks combined or associated with them.

Shown below are some examples of DiceLock Security Trademarks and their current registration status. This list will be updated from time to time, at DiceLock Security sole discretion.

Registered Trademarks ®: DiceLock.

Trademarks ™: DiceLock Security, DiceLock-x, XDiceLock, JDiceLock, DiceChecker, DiceCheck, HashDigester, DigesterCheck, DiceChecker-x, DiceCheck-x, HashDigester-x, DigesterCheck-x, XDiceChecker, XDiceCheck, XHashDigester, XDigesterCheck, JDiceChecker, JDiceCheck, JHashDigester, JDigesterCheck, iDiceChecker, iDiceCheck, iHashDigester, iDigesterCheck, CheckDiceLockIndexed, CheckDiceLockDigested and others.

Possible Infringements

Please help us by reporting any possible infringement of any Trademark by contacting us through our Contact Us form.


Reservation of Rights

DiceLock Security is the controller of all right, title, and interest in the DiceLock Security Trademarks and logos. No person or entity may reproduce or use (or authorize the reproduction or use of) the DiceLock Security Trademarks and logos in any manner other than expressly authorized by DiceLock Security. Unauthorized use of DiceLock Security Trademarks and logos is strictly prohibited. 

DiceLock Security may, at its sole discretion, modify the DiceLock Security Trademarks and logos at any time. In order to assure compliance and quality of control, DiceLock Security may request that you provide samples of any marketing, advertising, or other material that includes the DiceLock Security Trademarks and logos.


Policy Updates

DiceLock Security reserves the right to modify this Policy at any time. You should review this Policy from time to time so that you will be aware of any updates. Any updates will apply as soon as they are posted on this page.

Third Party Licensors

Some DiceLock Security products include technology used under license from third party licensors. You may not use any such third party trademark without express permission from the owner.


DiceLock Security has tried to make this policy as comprehensive and understandable as possible. If you are considering a use of a Trademark that is not covered by the policy, and you are unsure whether that use would run afoul of this Policy, please feel free to contact us. Also, we welcome your suggestions as to how to make this Policy better and more workable for our community. We like hearing from you!.