{"id":125,"date":"2023-09-13T16:15:32","date_gmt":"2023-09-13T16:15:32","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=125"},"modified":"2024-11-22T00:59:10","modified_gmt":"2024-11-22T00:59:10","slug":"cyse-406","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ejcyber\/cyse-406\/","title":{"rendered":"CYSE 406"},"content":{"rendered":"<h1 style=\"text-align: center\">Cyber Law<\/h1>\n<h1>\u00a0<\/h1>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<h1>Course Material<\/h1>\n<p>\u00a0<\/p>\n<ol>\n<li>\n<p><strong>Data Protection Laws<\/strong>: Legislation like GDPR, HIPAA, and CCPA mandates organizations to protect sensitive information and outlines rights for individuals regarding their data.<\/p>\n<\/li>\n<li>\n<p><strong>Cybercrime Laws<\/strong>: Laws such as the Computer Fraud and Abuse Act (CFAA) address unauthorized access, hacking, and other malicious cyber activities.<\/p>\n<\/li>\n<li>\n<p><strong>Intellectual Property Laws<\/strong>: Protect digital assets and content, covering copyrights, patents, and trademarks in cyberspace.<\/p>\n<\/li>\n<li>\n<p><strong>International Cooperation<\/strong>: Agreements like the Budapest Convention aim to standardize cybercrime laws and promote cross-border collaboration.<\/p>\n<\/li>\n<\/ol>\n<p>Cyber Law Mid semester writing assignment:<\/p>\n\n<a href=\"https:\/\/sites.wp.odu.edu\/ejcyber\/wp-content\/uploads\/sites\/34191\/2024\/11\/annotated-law20paper.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">annotated-law20paper<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Law \u00a0 \u00a0 \u00a0 \u00a0 Course Material \u00a0 Data Protection Laws: Legislation like GDPR, HIPAA, and CCPA mandates organizations to protect sensitive information and outlines rights for individuals regarding their data. Cybercrime Laws: Laws such as the Computer Fraud and Abuse Act (CFAA) address unauthorized access, hacking, and other malicious cyber activities. Intellectual Property&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ejcyber\/cyse-406\/\">Read More<\/a><\/div>\n","protected":false},"author":27495,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ejcyber\/wp-json\/wp\/v2\/pages\/125"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ejcyber\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ejcyber\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ejcyber\/wp-json\/wp\/v2\/users\/27495"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ejcyber\/wp-json\/wp\/v2\/comments?post=125"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/ejcyber\/wp-json\/wp\/v2\/pages\/125\/revisions"}],"predecessor-version":[{"id":391,"href":"https:\/\/sites.wp.odu.edu\/ejcyber\/wp-json\/wp\/v2\/pages\/125\/revisions\/391"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ejcyber\/wp-json\/wp\/v2\/media?parent=125"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}