NRO: Risky Methods of Data Exploitation