{"id":347,"date":"2023-12-05T03:24:34","date_gmt":"2023-12-05T03:24:34","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nharp\/?p=347"},"modified":"2023-12-05T19:28:44","modified_gmt":"2023-12-05T19:28:44","slug":"illegal-online-activities","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/nharp\/2023\/12\/05\/illegal-online-activities\/","title":{"rendered":"Illegal Online Activities"},"content":{"rendered":"\n<p>The five most serious violations in my eyes are:<\/p>\n\n\n\n<ul>\n<li>Collecting Information about Children<\/li>\n\n\n\n<li>Faking Your Identity Online<\/li>\n\n\n\n<li>Using Torrent Services<\/li>\n\n\n\n<li>Sharing Passwords, Addresses, or Photos of Others<\/li>\n\n\n\n<li>Illegal Searches on the Internet<\/li>\n<\/ul>\n\n\n\n<p>Collecting information about children without proper consent or for nefarious purposes is a serious violation of privacy and legal regulations. Children are considered a vulnerable group, and their personal information is often protected by stringent laws to ensure their safety and well-being.<\/p>\n\n\n\n<p>Creating a fake identity online, commonly known as &#8220;catfishing,&#8221; involves deceptive practices that can lead to various negative consequences, including fraud, harassment, or manipulation.<\/p>\n\n\n\n<p>While torrenting itself is not illegal, using torrent services to share copyrighted material without authorization is a violation of intellectual property rights. It deprives creators of their due compensation for their work.<\/p>\n\n\n\n<p>Sharing personal information about others without their consent infringes on their privacy rights and can lead to harassment, identity theft, or other malicious activities.<\/p>\n\n\n\n<p>Engaging in illegal searches might involve attempting to access restricted or sensitive information, hacking, or conducting searches with malicious intent.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The five most serious violations in my eyes are: Collecting information about children without proper consent or for nefarious purposes is a serious violation of privacy and legal regulations. Children are considered a vulnerable group, and their personal information is often protected by stringent laws to ensure their safety and well-being. Creating a fake identity&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/nharp\/2023\/12\/05\/illegal-online-activities\/\">Read More<\/a><\/div>\n","protected":false},"author":27319,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nharp\/wp-json\/wp\/v2\/posts\/347"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nharp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nharp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nharp\/wp-json\/wp\/v2\/users\/27319"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nharp\/wp-json\/wp\/v2\/comments?post=347"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/nharp\/wp-json\/wp\/v2\/posts\/347\/revisions"}],"predecessor-version":[{"id":369,"href":"https:\/\/sites.wp.odu.edu\/nharp\/wp-json\/wp\/v2\/posts\/347\/revisions\/369"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nharp\/wp-json\/wp\/v2\/media?parent=347"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nharp\/wp-json\/wp\/v2\/categories?post=347"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nharp\/wp-json\/wp\/v2\/tags?post=347"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}