Abstract: A computerized method for deterring unauthorized distribution of an electronic book comprising the steps of receiving a request to purchase the electronic book, receiving a set of personal identifiers from a user, receiving a set of publisher identifiers from a publisher of the electronic book, embedding both sets of identifiers into the electronic book, and displaying the electronic book with the embedded identifiers.