{"id":95,"date":"2011-06-02T19:35:31","date_gmt":"2011-06-02T19:35:31","guid":{"rendered":"http:\/\/my-wp.com\/?page_id=15"},"modified":"2011-06-02T19:35:31","modified_gmt":"2011-06-02T19:35:31","slug":"cybercrime","status":"publish","type":"page","link":"https:\/\/archive.blogs.harvard.edu\/jdcc\/practice-areas\/cybercrime\/","title":{"rendered":"Cybercrime &amp; Youth Online Safety"},"content":{"rendered":"<p style=\"text-align: justify\"><span style=\"text-decoration: underline\">Overview<\/span><\/p>\n<p style=\"text-align: justify\">The Cyberlaw Clinic has developed significant expertise with respect to the issues that arise in the prosecution and defense of criminal cases that involve technology and the Internet.\u00a0 The Clinic has assisted federal and state prosecutors and others with research and drafting of legal briefs in child pornography and other cybercrime cases regarding computer search and seizure and electronic evidence issues.\u00a0 The Clinic has also counseled clients on issues relating to Fourth Amendment search and seizure; sexting, cyberbullying, and the Computer Fraud and Abuse Act.<\/p>\n<p style=\"text-align: justify\"><span style=\"text-decoration: underline\">Representative Projects<\/span><\/p>\n<p style=\"text-align: justify\">[custom-post id=&#8221;948&#8243;]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview The Cyberlaw Clinic has developed significant expertise with respect to the issues that arise in the prosecution and defense of criminal cases that involve technology and the Internet.\u00a0 The Clinic has assisted federal and state prosecutors and others with &hellip; <a href=\"https:\/\/archive.blogs.harvard.edu\/jdcc\/practice-areas\/cybercrime\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2620,"featured_media":0,"parent":100,"menu_order":4,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-95","page","type-page","status-publish","hentry"],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P56F3K-1x","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/jdcc\/wp-json\/wp\/v2\/pages\/95","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/jdcc\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/jdcc\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/jdcc\/wp-json\/wp\/v2\/users\/2620"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/jdcc\/wp-json\/wp\/v2\/comments?post=95"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/jdcc\/wp-json\/wp\/v2\/pages\/95\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/jdcc\/wp-json\/wp\/v2\/pages\/100"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/jdcc\/wp-json\/wp\/v2\/media?parent=95"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}