Cyber Law
Students will gain a broad knowledge of constitutional, civil, criminal, and related legal considerations that arise in the context of work or citizenship in an increasingly cyber/digital world. Whether the student seeks a career in the public or private sector, the student will gain insight into both the limits and authorities on government or private sector activities, from the creation and protection of intellectual property, to the investigation of unlawful cyber activities, to the considerations of cyber operations in an increasingly dangerous world. This broadened awareness will help students successfully navigate and strengthen personal and professional choices as they move ahead.
Course Material
Below are two course assignments that you should have completed within the course. Include at least one, ideally both, assignments, explaining what you did and how these projects helped you engage with the outcomes listed above.
Assignment 1
The Cyber Intelligence Sharing and Protection Act is a proposed law/act in the U.S. Congress which would allow for the sharing of Internet traffic information between the U.S. Government and technology and manufacturing companies.
Include your paper that:
- Summarizes the proposed law;
- Describes what the proposed law is designed to address, fix, or do;
- Examines the law’s strengths/weaknesses and states whether you support its passage and why. Incorporate too what you have already learned in class as you examine and evaluate the proposed law.
Assignment 2
There are many other new or proposed U.S. laws (e.g. the Cyber Intelligence Sharing and Protection Act; the Defend Trade Secrets Act of 2016; IOT Cybersecurity Improvement Act of 2017) designed to enhance cybersecurity in some manner.
Include your paper that:
- Selects and clearly cites/identifies one U.S. new or proposed law that you find interesting;
- Summarizes what the new or proposed law is about and what it is designed to accomplish;
- Assesses its value and explain why or why not the law will likely improve cybersecurity and meets its intended purpose(s).
Be sure to remove this instructional language when you have completed updating content on this page.