{"id":3152,"date":"2015-08-14T13:17:14","date_gmt":"2015-08-14T11:17:14","guid":{"rendered":"https:\/\/www.safecreative.org\/blog\/en\/?p=3152"},"modified":"2015-08-14T15:55:05","modified_gmt":"2015-08-14T13:55:05","slug":"phishing-and-other-scam-issues-how-to-protect-your-information-and-works","status":"publish","type":"post","link":"https:\/\/www.safecreative.org\/blog\/en\/2015\/08\/14\/phishing-and-other-scam-issues-how-to-protect-your-information-and-works\/","title":{"rendered":"Phishing and other scam issues, how to protect your information and works"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The term \u2018phishing\u2019 refers to certain criminal activities that take place on the Internet, which aim to obtain confidential user information. Sometimes this is followed by spoofing, or the data is sent to organizations interested in them. It is called phishing (from \u2018fishing\u2019) because they make users \u2018take the bait\u2019. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are many different kinds of phishing sites. The most common ones tend to be fake versions of well-known and legitimate websites. Let us take Facebook\u2019s login page as an example. If the user does not check the URL to confirm they are on the actual Facebook page, and they submit their username and password, they fall right into the trap. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">For more in-depth information read these tips from <\/span><a href=\"https:\/\/www.staysafeonline.org\/stay-safe-online\/keep-a-clean-machine\/spam-and-phishing\"><span style=\"font-weight: 400;\">Stay Safe Online<\/span><\/a><span style=\"font-weight: 400;\">. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Recently, we shared on our social media channels <\/span><a href=\"https:\/\/www.plagiarismtoday.com\/2015\/07\/30\/phishing-scam-targets-photographers-protecting-copyright\/\"><span style=\"font-weight: 400;\">an article by PlagiarismToday about WallPart<\/span><\/a><span style=\"font-weight: 400;\">, a supposedly online store for posters that turned out to be a scam site, probably for phishing purposes. It is not clear if they are in fact selling posters or not. What we know is that their products are not original content: they import results from Google Images and sell posters of them, without asking for any permission from the content owners.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is what the phishing bait could be. Users who found their works being sold without permission would fill in a complaint form. Someone is selling posters of my photo, I send a copyright notice, and this is how they get my personal information. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The page itself has admitted not to have its own image library. Also, according to them, their activities do not infringe copyright (we will spare you any comments on this).<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.safecreative.org\/blog\/en\/wp-content\/uploads\/2015\/08\/plagiarismtoday-search-postershop-550x253.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-3153 size-full\" src=\"https:\/\/www.safecreative.org\/blog\/en\/wp-content\/uploads\/2015\/08\/plagiarismtoday-search-postershop-550x253.png\" alt=\"Plagiarismtoday - WallPart and Google Images - Phishing\" width=\"550\" height=\"253\" srcset=\"https:\/\/www.safecreative.org\/blog\/en\/wp-content\/uploads\/2015\/08\/plagiarismtoday-search-postershop-550x253.png 550w, https:\/\/www.safecreative.org\/blog\/en\/wp-content\/uploads\/2015\/08\/plagiarismtoday-search-postershop-550x253-300x138.png 300w\" sizes=\"auto, (max-width: 550px) 100vw, 550px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">It remains unclear why they want this data, or why in this case they were looking for content creators who would send copyright claims, apart from unsuspecting buyers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The reason for sharing this information is not just this particular case. It is just an example among many others. This week we found another website that could be another similar phishing site. It is called General-ebooks, and we shall not include a link to it for obvious reasons. Pages like this one get e-book titles from sites such as Amazon, then redirect people who try to download them to other partner scam websites and profit. Some of these distribute <\/span><i><span style=\"font-weight: 400;\">malware<\/span><\/i><span style=\"font-weight: 400;\">, others show ads and popups, but at the end of the day they are the same. They pretend to have a certain content, have a decent presence on search engines and profit. In these cases a copyright complaint would not be the best option, since the work is not even on the page. Anyway, some of these pages will shut down after a proper warning, to avoid further problems. \u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The one thing to keep in mind is to <\/span><b>never give them any personal information<\/b><span style=\"font-weight: 400;\">. If \u00a0the website does not seem trustworthy, just let it go and wait until they shut it down, or go ahead and report them yourself. It does not matter if they are using our work without permission, better safe than sorry. Do not fill any forms, nor register. This would require giving personal information, and accepting who knows what terms and conditions. If the website is legal and has a good reputation, if you see the URL starts with <\/span><b>https:\/\/<\/b><span style=\"font-weight: 400;\">, then you are safe to place your copyright claim. Otherwise, beware because your works could just be another phisher\u2019s bait. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">One of the options if we want to take action would be to report the website or its content to <\/span><a href=\"https:\/\/support.google.com\/legal\/troubleshooter\/1114905?hl=en\"><span style=\"font-weight: 400;\">Google\u2019s content removal service.<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Lastly, we would like to remind you to <\/span><b>register <\/b><span style=\"font-weight: 400;\">your works anytime before sharing them online. Even if we are going to submit them to legal and well-known sites such as Amazon, it is best to create an early evidence of authorship, anticipating any possible problems.<\/span><\/p>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>The term \u2018phishing\u2019 refers to certain criminal activities that take place on the Internet, which aim to obtain confidential user information. Sometimes this is followed&hellip;<!-- AddThis Advanced Settings generic via filter on get_the_excerpt --><!-- AddThis Share Buttons generic via filter on get_the_excerpt --><\/p>\n","protected":false},"author":1,"featured_media":3154,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-3152","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","has-post-thumbnail-archive"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Phishing and other scam issues, how to protect your information and works - Safe Creative Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.safecreative.org\/blog\/en\/2015\/08\/14\/phishing-and-other-scam-issues-how-to-protect-your-information-and-works\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing and other scam issues, how to protect your information and works - Safe Creative Blog\" \/>\n<meta property=\"og:description\" content=\"The term \u2018phishing\u2019 refers to certain criminal activities that take place on the Internet, which aim to obtain confidential user information. Sometimes this is followed&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.safecreative.org\/blog\/en\/2015\/08\/14\/phishing-and-other-scam-issues-how-to-protect-your-information-and-works\/\" \/>\n<meta property=\"og:site_name\" content=\"Safe Creative Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-08-14T11:17:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-08-14T13:55:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.safecreative.org\/blog\/en\/wp-content\/uploads\/2015\/08\/Phishing-site.png\" \/>\n\t<meta property=\"og:image:width\" content=\"560\" \/>\n\t<meta property=\"og:image:height\" content=\"315\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/en\\\/2015\\\/08\\\/14\\\/phishing-and-other-scam-issues-how-to-protect-your-information-and-works\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/en\\\/2015\\\/08\\\/14\\\/phishing-and-other-scam-issues-how-to-protect-your-information-and-works\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/en\\\/#\\\/schema\\\/person\\\/b7e523a308bfbd482e83ce6d9866b2a4\"},\"headline\":\"Phishing and other scam issues, how to protect your information and works\",\"datePublished\":\"2015-08-14T11:17:14+00:00\",\"dateModified\":\"2015-08-14T13:55:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/en\\\/2015\\\/08\\\/14\\\/phishing-and-other-scam-issues-how-to-protect-your-information-and-works\\\/\"},\"wordCount\":653,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/en\\\/2015\\\/08\\\/14\\\/phishing-and-other-scam-issues-how-to-protect-your-information-and-works\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2015\\\/08\\\/Phishing-site.png\",\"articleSection\":[\"Articles\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/en\\\/2015\\\/08\\\/14\\\/phishing-and-other-scam-issues-how-to-protect-your-information-and-works\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/en\\\/2015\\\/08\\\/14\\\/phishing-and-other-scam-issues-how-to-protect-your-information-and-works\\\/\",\"url\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/en\\\/2015\\\/08\\\/14\\\/phishing-and-other-scam-issues-how-to-protect-your-information-and-works\\\/\",\"name\":\"Phishing and other scam issues, how to protect your information and works - Safe Creative Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/en\\\/2015\\\/08\\\/14\\\/phishing-and-other-scam-issues-how-to-protect-your-information-and-works\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/en\\\/2015\\\/08\\\/14\\\/phishing-and-other-scam-issues-how-to-protect-your-information-and-works\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2015\\\/08\\\/Phishing-site.png\",\"datePublished\":\"2015-08-14T11:17:14+00:00\",\"dateModified\":\"2015-08-14T13:55:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/en\\\/2015\\\/08\\\/14\\\/phishing-and-other-scam-issues-how-to-protect-your-information-and-works\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/en\\\/2015\\\/08\\\/14\\\/phishing-and-other-scam-issues-how-to-protect-your-information-and-works\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/en\\\/2015\\\/08\\\/14\\\/phishing-and-other-scam-issues-how-to-protect-your-information-and-works\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2015\\\/08\\\/Phishing-site.png\",\"contentUrl\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2015\\\/08\\\/Phishing-site.png\",\"width\":560,\"height\":315,\"caption\":\"Wallpart scam site\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/en\\\/2015\\\/08\\\/14\\\/phishing-and-other-scam-issues-how-to-protect-your-information-and-works\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phishing and other scam issues, how to protect your information and works\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/en\\\/\",\"name\":\"Safe Creative Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/en\\\/#organization\",\"name\":\"Safe Creative Blog\",\"url\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/texto-blog.png\",\"contentUrl\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/texto-blog.png\",\"width\":953,\"height\":183,\"caption\":\"Safe Creative Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/en\\\/#\\\/schema\\\/person\\\/b7e523a308bfbd482e83ce6d9866b2a4\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b4a173c28250ab79f5d4bba318bdf6fd1f2eb79f9086a71806d26c794c8da69?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b4a173c28250ab79f5d4bba318bdf6fd1f2eb79f9086a71806d26c794c8da69?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b4a173c28250ab79f5d4bba318bdf6fd1f2eb79f9086a71806d26c794c8da69?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/en\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phishing and other scam issues, how to protect your information and works - Safe Creative Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.safecreative.org\/blog\/en\/2015\/08\/14\/phishing-and-other-scam-issues-how-to-protect-your-information-and-works\/","og_locale":"en_US","og_type":"article","og_title":"Phishing and other scam issues, how to protect your information and works - Safe Creative Blog","og_description":"The term \u2018phishing\u2019 refers to certain criminal activities that take place on the Internet, which aim to obtain confidential user information. Sometimes this is followed&hellip;","og_url":"https:\/\/www.safecreative.org\/blog\/en\/2015\/08\/14\/phishing-and-other-scam-issues-how-to-protect-your-information-and-works\/","og_site_name":"Safe Creative Blog","article_published_time":"2015-08-14T11:17:14+00:00","article_modified_time":"2015-08-14T13:55:05+00:00","og_image":[{"width":560,"height":315,"url":"https:\/\/www.safecreative.org\/blog\/en\/wp-content\/uploads\/2015\/08\/Phishing-site.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.safecreative.org\/blog\/en\/2015\/08\/14\/phishing-and-other-scam-issues-how-to-protect-your-information-and-works\/#article","isPartOf":{"@id":"https:\/\/www.safecreative.org\/blog\/en\/2015\/08\/14\/phishing-and-other-scam-issues-how-to-protect-your-information-and-works\/"},"author":{"name":"admin","@id":"https:\/\/www.safecreative.org\/blog\/en\/#\/schema\/person\/b7e523a308bfbd482e83ce6d9866b2a4"},"headline":"Phishing and other scam issues, how to protect your information and works","datePublished":"2015-08-14T11:17:14+00:00","dateModified":"2015-08-14T13:55:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.safecreative.org\/blog\/en\/2015\/08\/14\/phishing-and-other-scam-issues-how-to-protect-your-information-and-works\/"},"wordCount":653,"commentCount":0,"publisher":{"@id":"https:\/\/www.safecreative.org\/blog\/en\/#organization"},"image":{"@id":"https:\/\/www.safecreative.org\/blog\/en\/2015\/08\/14\/phishing-and-other-scam-issues-how-to-protect-your-information-and-works\/#primaryimage"},"thumbnailUrl":"https:\/\/www.safecreative.org\/blog\/en\/wp-content\/uploads\/2015\/08\/Phishing-site.png","articleSection":["Articles"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.safecreative.org\/blog\/en\/2015\/08\/14\/phishing-and-other-scam-issues-how-to-protect-your-information-and-works\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.safecreative.org\/blog\/en\/2015\/08\/14\/phishing-and-other-scam-issues-how-to-protect-your-information-and-works\/","url":"https:\/\/www.safecreative.org\/blog\/en\/2015\/08\/14\/phishing-and-other-scam-issues-how-to-protect-your-information-and-works\/","name":"Phishing and other scam issues, how to protect your information and works - Safe Creative Blog","isPartOf":{"@id":"https:\/\/www.safecreative.org\/blog\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.safecreative.org\/blog\/en\/2015\/08\/14\/phishing-and-other-scam-issues-how-to-protect-your-information-and-works\/#primaryimage"},"image":{"@id":"https:\/\/www.safecreative.org\/blog\/en\/2015\/08\/14\/phishing-and-other-scam-issues-how-to-protect-your-information-and-works\/#primaryimage"},"thumbnailUrl":"https:\/\/www.safecreative.org\/blog\/en\/wp-content\/uploads\/2015\/08\/Phishing-site.png","datePublished":"2015-08-14T11:17:14+00:00","dateModified":"2015-08-14T13:55:05+00:00","breadcrumb":{"@id":"https:\/\/www.safecreative.org\/blog\/en\/2015\/08\/14\/phishing-and-other-scam-issues-how-to-protect-your-information-and-works\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.safecreative.org\/blog\/en\/2015\/08\/14\/phishing-and-other-scam-issues-how-to-protect-your-information-and-works\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.safecreative.org\/blog\/en\/2015\/08\/14\/phishing-and-other-scam-issues-how-to-protect-your-information-and-works\/#primaryimage","url":"https:\/\/www.safecreative.org\/blog\/en\/wp-content\/uploads\/2015\/08\/Phishing-site.png","contentUrl":"https:\/\/www.safecreative.org\/blog\/en\/wp-content\/uploads\/2015\/08\/Phishing-site.png","width":560,"height":315,"caption":"Wallpart scam site"},{"@type":"BreadcrumbList","@id":"https:\/\/www.safecreative.org\/blog\/en\/2015\/08\/14\/phishing-and-other-scam-issues-how-to-protect-your-information-and-works\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.safecreative.org\/blog\/en\/"},{"@type":"ListItem","position":2,"name":"Phishing and other scam issues, how to protect your information and works"}]},{"@type":"WebSite","@id":"https:\/\/www.safecreative.org\/blog\/en\/#website","url":"https:\/\/www.safecreative.org\/blog\/en\/","name":"Safe Creative Blog","description":"","publisher":{"@id":"https:\/\/www.safecreative.org\/blog\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.safecreative.org\/blog\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.safecreative.org\/blog\/en\/#organization","name":"Safe Creative Blog","url":"https:\/\/www.safecreative.org\/blog\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.safecreative.org\/blog\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.safecreative.org\/blog\/en\/wp-content\/uploads\/2024\/05\/texto-blog.png","contentUrl":"https:\/\/www.safecreative.org\/blog\/en\/wp-content\/uploads\/2024\/05\/texto-blog.png","width":953,"height":183,"caption":"Safe Creative Blog"},"image":{"@id":"https:\/\/www.safecreative.org\/blog\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.safecreative.org\/blog\/en\/#\/schema\/person\/b7e523a308bfbd482e83ce6d9866b2a4","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3b4a173c28250ab79f5d4bba318bdf6fd1f2eb79f9086a71806d26c794c8da69?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3b4a173c28250ab79f5d4bba318bdf6fd1f2eb79f9086a71806d26c794c8da69?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b4a173c28250ab79f5d4bba318bdf6fd1f2eb79f9086a71806d26c794c8da69?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/www.safecreative.org\/blog\/en\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.safecreative.org\/blog\/en\/wp-json\/wp\/v2\/posts\/3152","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.safecreative.org\/blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.safecreative.org\/blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.safecreative.org\/blog\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.safecreative.org\/blog\/en\/wp-json\/wp\/v2\/comments?post=3152"}],"version-history":[{"count":3,"href":"https:\/\/www.safecreative.org\/blog\/en\/wp-json\/wp\/v2\/posts\/3152\/revisions"}],"predecessor-version":[{"id":3157,"href":"https:\/\/www.safecreative.org\/blog\/en\/wp-json\/wp\/v2\/posts\/3152\/revisions\/3157"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.safecreative.org\/blog\/en\/wp-json\/wp\/v2\/media\/3154"}],"wp:attachment":[{"href":"https:\/\/www.safecreative.org\/blog\/en\/wp-json\/wp\/v2\/media?parent=3152"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.safecreative.org\/blog\/en\/wp-json\/wp\/v2\/categories?post=3152"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.safecreative.org\/blog\/en\/wp-json\/wp\/v2\/tags?post=3152"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}