{"id":355,"date":"2026-04-18T00:26:36","date_gmt":"2026-04-18T00:26:36","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/?page_id=355"},"modified":"2026-04-18T02:29:22","modified_gmt":"2026-04-18T02:29:22","slug":"cyse-406-cyber-law","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/cyse-406-cyber-law\/","title":{"rendered":"CYSE 406 &#8211; Cyber Law"},"content":{"rendered":"\n<p>This course tackles two major cyber law subjects.\u00a0 The first part of the course examines various U.S. laws and legal considerations that impact the digital and cyberspace worlds from a traditional civilian perspective \u2013 from freedom of expression to internet regulations to information-gathering and access to intellectual property to privacy.\u00a0 The second part will familiarize students interested in becoming civilian or military investigative or cyber operations professionals about the extent of and limitations on their authorities to ensure that their work complies with U.S. law, regulations, directives, and policies.\u00a0 The course will also introduce students to the wide variety of issues that fall within the broad umbrella of cyber law.<\/p>\n\n\n\n<p><strong>Course GOALS AND objectives<\/strong><\/p>\n\n\n\n<p>Students will gain exposure to, and a basic understanding of, the following topics:<\/p>\n\n\n\n<p>1) Overview of the U.S. legal system, including Article I, Article II and Article III of the U.S. Constitution, and the court system, including the Foreign Intelligence Surveillance Act (FISA) and the Foreign Intelligence Surveillance Court (FISA)&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>2) Freedom of expression fundamentals in the digital world<\/p>\n\n\n\n<p>3) Overview of internet regulations<\/p>\n\n\n\n<p>4) The role of government in accessing and protecting information in the digital world&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>5) Overview of intellectual property in the digital world: copyright, patents, trademarks, and trade secrets&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>6) Privacy, invasion of privacy, banners, and the role of consent&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>7) Key laws, terms and processes governing governmental searches and seizures in the cyber world. These include the Fourth (Search and Seizure) and Fourteenth (Due Process) Amendments of the U.S. Constitution; Electronic Communications Privacy Act (18 USC 2510-2522); Stored Communications Act (18 USC 2701-2712); Pen Register\/Trap and Trace (18 USC 3123-3127); Foreign Intelligence Surveillance Act (FISA) (50 USC 1801 et seq); key differences between intercepting\/obtaining content versus transactional records and data (including metadata); court orders; subpoenas; writs; national security letters, and other terms&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>8) Overview of various substantive crimes that arise in the cyber\/computer world, such as those found in Title 18 United States Code (USC), especially the Computer Fraud and Abuse Act (18 USC 1030); Economic Espionage Acts (18 USC 1831-32); national security crimes (18 USC 791-797); and other federal laws&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>9) The investigative and operational roles that federal and military agencies play in cyber security (consider various orders (e.g., EO 12333) and directives), with special emphasis on the Domestic Incident Response National Response Framework.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>10) Overview of the Communications Assistance for Law Enforcement Act (CALEA)&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>11) Perspectives on investigating and prosecuting cybercrime<\/p>\n\n\n\n<p>12) Basics of International Law and Law of War, including Jus ad bellum,<em>&nbsp;Jus in bello,<\/em>&nbsp;United Nations Charter\/Article S1, and the Hague and Geneva Conventions<\/p>\n\n\n\n<p>13) Overview of the Tallinn Manual, Cyber Attacks, Cyber Vandalism, and Cyber Operations&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>14) National cybersecurity efforts, particularly Einstein 2.0 and later versions that are used to protect civilian unclassified networks in the Executive Branch of the U.S. government<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Course Materials<\/h2>\n\n\n\n<p>digital privacy<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/privacy-memorandum-Google-Docs-1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">privacy-memorandum-Google-Docs-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>Grades within course objectives<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"584\" src=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/Screenshot-2026-04-17-222830-1024x584.png\" alt=\"\" class=\"wp-image-409\" srcset=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/Screenshot-2026-04-17-222830-1024x584.png 1024w, https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/Screenshot-2026-04-17-222830-300x171.png 300w, https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/Screenshot-2026-04-17-222830-768x438.png 768w, https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/Screenshot-2026-04-17-222830-1536x876.png 1536w, https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/Screenshot-2026-04-17-222830-526x300.png 526w, https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/Screenshot-2026-04-17-222830.png 1730w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>This course tackles two major cyber law subjects.\u00a0 The first part of the course examines various U.S. laws and legal considerations that impact the digital and cyberspace worlds from a traditional civilian perspective \u2013 from freedom of expression to internet regulations to information-gathering and access to intellectual property to privacy.\u00a0 The second part will familiarize&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/cyse-406-cyber-law\/\">Read More<\/a><\/div>\n","protected":false},"author":27592,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-json\/wp\/v2\/pages\/355"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-json\/wp\/v2\/users\/27592"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-json\/wp\/v2\/comments?post=355"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-json\/wp\/v2\/pages\/355\/revisions"}],"predecessor-version":[{"id":410,"href":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-json\/wp\/v2\/pages\/355\/revisions\/410"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-json\/wp\/v2\/media?parent=355"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}