Stealing away a brand new computer from a showroom.
Getting in someone’s social networking account without his consent and posting pictures on his behalf to harass him.
Secretly copying files from server of a call center and selling it to the other organization.
Viewing sites on a internet browser.