{"id":342,"date":"2024-08-05T01:57:18","date_gmt":"2024-08-05T01:57:18","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/esty05\/?p=342"},"modified":"2024-08-05T01:57:18","modified_gmt":"2024-08-05T01:57:18","slug":"journal-entry-12-understanding-internet-activities-that-may-be-illegal","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/esty05\/2024\/08\/05\/journal-entry-12-understanding-internet-activities-that-may-be-illegal\/","title":{"rendered":"Journal Entry 12: Understanding Internet Activities That May Be Illegal"},"content":{"rendered":"The Internet is highly relevant today as it is an essential tool in people\u2019s lives, providing comfort and information. But, as Andriy Slynchuk has pointed out, many things\u2019 people do on the Web are unlawful even though most of them are unaware of it (Tech, n.d.). Downloading movies and music through unauthorized applications and torrents is quite popular among the population, but at the same time, it is entirely unlawful. Such actions infringe the provisions of the law on copyright and lead to prosecution. Most users fail to consider the legal issues, and the simplicity and low costs attract them. Likewise, unauthorized utilization of copyrighted images, particularly for business or one\u2019s use, could result in infringement of copyright laws. Only an image that is copyright-free or has permission from the copyright holder can be used.<br \/>\tIn addition, it is also unlawful to post passwords, addresses, and photos of other people or any other information without their permission. To post someone\u2019s address with ill intent is unfair, a clear violation of their privacy, and could result in legal consequences. Another common challenge is cyberbullying, associated with bullying and trolling, facilitated by the anonymity of the Internet (Tech, n.d.). Nonetheless, these behaviors are being covered by laws, with severe cases even attracting criminal charges. Another of these relatively unknown but unlawful acts is recording VoIP calls without the consent of the involved parties. One must get the permission of the involved persons before taping a conversation; not getting this consent could lead to legal consequences.<br \/>\tAdditionally, lying about one\u2019s identity in terms of your username and password, using the details of another individual, or giving a wrong age has consequences. This practice is against service terms and may lead to a legal problem if the agent engages in fraud or deception. Utilizing others\u2019 internet networks without permission is as bad as theft and leverages resources that the owners pay for. Likewise, the unauthorized data collection from anyone below the age of 13 violates the Children\u2019s Online Privacy Protection Act (COPPA) concerning children\u2019s privacy on the internet.<br \/>\tIn addition, getting music from YouTube without authorization and doing unlawful searches on the net are other little-known hazards. YouTube strictly denies downloading\/ripping the content, which is against copyright rules and regulations regarding the intellectual property rights of the content creators (Tech, n.d.). Some keywords are likely to give suspicion to law enforcement agencies; although Google does not inform users, their algorithms may hinder or monitor suspicious activities. To avoid any legal issues, users should focus more on the privacy and security aspects of their browsing habits through better passwords, private browsing, and safe, anonymous browsing through VPN, and all such searches are far safer and more responsible.\u2003<br \/><br \/>References<br \/>Tech, C. (n.d.). 11 Illegal Things You Unknowingly Do on the Internet. Clario.co. https:\/\/clario.co\/blog\/illegal-things-you-do-online\/#h2_9<br \/><br \/><br \/><br \/>","protected":false},"excerpt":{"rendered":"<p>The Internet is highly relevant today as it is an essential tool in people\u2019s lives, providing comfort and information. But, as Andriy Slynchuk has pointed out, many things\u2019 people do on the Web are unlawful even though most of them are unaware of it (Tech, n.d.). Downloading movies and music through unauthorized applications and torrents [&hellip;]<\/p>\n","protected":false},"author":28250,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":3},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/posts\/342"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/users\/28250"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/comments?post=342"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/posts\/342\/revisions"}],"predecessor-version":[{"id":366,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/posts\/342\/revisions\/366"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/media?parent=342"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/categories?post=342"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/esty05\/wp-json\/wp\/v2\/tags?post=342"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}