  {"id":34,"date":"2020-07-10T11:58:58","date_gmt":"2020-07-10T15:58:58","guid":{"rendered":"https:\/\/www.adelphi.edu\/it\/security\/file-sharing\/"},"modified":"2020-07-29T09:51:10","modified_gmt":"2020-07-29T13:51:10","slug":"file-sharing","status":"publish","type":"page","link":"https:\/\/www.adelphi.edu\/it\/security\/file-sharing\/","title":{"rendered":"File-Sharing"},"content":{"rendered":"<p>If you&#8217;re using or plan to use a file-sharing network to download music, movies, games and more, copyright infringement is not the only risk you are taking. You may not even be aware of when you are sharing files with virtual strangers, opening up your system to security and privacy threats such as viruses, worms, Trojan horses, snooping, data theft, spyware, and more.<\/p>\n<p>Even if you aren&#8217;t using actively using a file-sharing application you once downloaded, it&#8217;s usually running in the background, providing other users with access to your system. Aside from threats of viruses and other malware you may end up sharing private files such as email and financial information.<\/p>\n<h2>Protect yourself:<\/h2>\n<ul>\n<li>Turn file sharing off<\/li>\n<li>Watch what you share<\/li>\n<li>Run security software<\/li>\n<li>Create system backups<\/li>\n<\/ul>\n<p>And if you haven\u2019t already done so, don\u2019t download file-sharing applications in the first place!<\/p>\n<p><em>For more information about legal consequences and campus disciplinary action, view <a href=\"https:\/\/operations.adelphi.edu\/catalog\/file-sharingdownload-policy\/\" target=\"_blank\" rel=\"noopener noreferrer\">Adelphi&#8217;s File-Sharing Policy<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you&#8217;re using or plan to use a file-sharing network to download music, movies, games and more, copyright infringement is not the only risk you are taking. You may not even be aware of when you are sharing files with virtual strangers, opening up your system to security and privacy threats such as viruses, worms,&hellip;<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":27,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-34","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<title>File Sharing | IT Department | 91勛圖厙<\/title>\n<meta name=\"description\" content=\"Sharing copyrighted P2P files is illegal and can cause disaster for you and your computer.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.adelphi.edu\/it\/security\/file-sharing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"File Sharing | IT Department | 91勛圖厙\" \/>\n<meta property=\"og:description\" content=\"Sharing copyrighted P2P files is illegal and can cause disaster for you and your computer.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.adelphi.edu\/it\/security\/file-sharing\/\" \/>\n<meta property=\"og:site_name\" content=\"Information Technology\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-29T13:51:10+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>","yoast_head_json":{"title":"File Sharing | IT Department | 91勛圖厙","description":"Sharing copyrighted P2P files is illegal and can cause disaster for you and your computer.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.adelphi.edu\/it\/security\/file-sharing\/","og_locale":"en_US","og_type":"article","og_title":"File Sharing | IT Department | 91勛圖厙","og_description":"Sharing copyrighted P2P files is illegal and can cause disaster for you and your computer.","og_url":"https:\/\/www.adelphi.edu\/it\/security\/file-sharing\/","og_site_name":"Information Technology","article_modified_time":"2020-07-29T13:51:10+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.adelphi.edu\/it\/security\/file-sharing\/","url":"https:\/\/www.adelphi.edu\/it\/security\/file-sharing\/","name":"File Sharing | IT Department | 91勛圖厙","isPartOf":{"@id":"https:\/\/www.adelphi.edu\/it\/#website"},"datePublished":"2020-07-10T15:58:58+00:00","dateModified":"2020-07-29T13:51:10+00:00","description":"Sharing copyrighted P2P files is illegal and can cause disaster for you and your computer.","breadcrumb":{"@id":"https:\/\/www.adelphi.edu\/it\/security\/file-sharing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.adelphi.edu\/it\/security\/file-sharing\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.adelphi.edu\/it\/security\/file-sharing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.adelphi.edu\/it\/"},{"@type":"ListItem","position":2,"name":"Information Security","item":"https:\/\/www.adelphi.edu\/it\/security\/"},{"@type":"ListItem","position":3,"name":"File-Sharing"}]},{"@type":"WebSite","@id":"https:\/\/www.adelphi.edu\/it\/#website","url":"https:\/\/www.adelphi.edu\/it\/","name":"Information Technology","description":"Just another Adelphi Sites site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.adelphi.edu\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"new_scheduled_revision":"","save_as_revision":"","_links":{"self":[{"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages\/34"}],"collection":[{"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/comments?post=34"}],"version-history":[{"count":2,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages\/34\/revisions"}],"predecessor-version":[{"id":215,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages\/34\/revisions\/215"}],"up":[{"embeddable":true,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages\/27"}],"wp:attachment":[{"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/media?parent=34"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}