{"id":125,"date":"2024-09-26T02:50:16","date_gmt":"2024-09-26T02:50:16","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=125"},"modified":"2024-09-26T02:50:16","modified_gmt":"2024-09-26T02:50:16","slug":"cyse-406","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jahmire-whitehurst\/cyse-406\/","title":{"rendered":"CYSE 406"},"content":{"rendered":"<h1 style=\"text-align: center\">Cyber Law<\/h1>\n<p>Students will gain a broad knowledge of constitutional, civil, criminal, and related legal considerations that arise in the context of work or citizenship in an increasingly cyber\/digital world. \u00a0 Whether the student seeks a career in the public or private sector, the student will gain insight into both the limits and authorities on government or private sector activities, from the creation and protection of intellectual property, to the investigation of unlawful cyber activities, to the considerations of cyber operations in an increasingly dangerous world.\u00a0 This broadened awareness will help students successfully navigate and strengthen personal and professional choices as they move ahead.<\/p>\n<h1>Course Material<\/h1>\n<p>Below are two course assignments that you should have completed within the course. Include at least one, ideally both, assignments,\u00a0 explaining what you did and how these projects helped you engage with the outcomes listed above.<\/p>\n<h3>Assignment 1<\/h3>\n<p style=\"text-align: left\"><em><span style=\"font-size: 1.8rem\">The Cyber\u00a0Intelligence Sharing and Protection Act is a proposed law\/act in the U.S. Congress which\u00a0would allow for the sharing of Internet traffic information between the U.S. Government and technology and manufacturing companies.<\/span><\/em><\/p>\n<p class=\"m_-7289575211786111875x_p2\"><span class=\"m_-7289575211786111875x_s1\">Include your\u00a0 paper that:<\/span><\/p>\n<ol>\n<li class=\"m_-7289575211786111875x_p2\"><span class=\"m_-7289575211786111875x_s1\">S<strong>ummarizes<\/strong>\u00a0the proposed law;<\/span><\/li>\n<li class=\"m_-7289575211786111875x_p2\"><span class=\"m_-7289575211786111875x_s1\">Describes what the proposed law is designed to\u00a0<strong>address, fix, or do;<\/strong><\/span><\/li>\n<li class=\"m_-7289575211786111875x_p2\"><span class=\"m_-7289575211786111875x_s1\">Examines the law&#8217;s\u00a0<strong>strengths\/weaknesses<\/strong>\u00a0<strong>and states whether you support its passage and why<\/strong>.\u00a0\u00a0<\/span>Incorporate too what you have already learned in class as you examine and evaluate the proposed law.<\/li>\n<\/ol>\n<h3>Assignment 2<\/h3>\n<p class=\"m_-7289575211786111875x_p2\"><span class=\"m_-7289575211786111875x_s1\">There are many other\u00a0<strong><em>new or proposed<\/em><\/strong>\u00a0U.S. laws (e.g. the Cyber\u00a0Intelligence Sharing and Protection Act; the Defend Trade Secrets Act of 2016; IOT Cybersecurity\u00a0Improvement Act of 2017) designed to enhance cybersecurity\u00a0in some manner.\u00a0<\/span><\/p>\n<p class=\"m_-7289575211786111875x_p2\"><span class=\"m_-7289575211786111875x_s1\">Include your\u00a0 paper that:<\/span><\/p>\n<ol>\n<li class=\"m_-7289575211786111875x_p2\"><span class=\"m_-7289575211786111875x_s1\">Selects and clearly cites\/identifies one U.S.\u00a0<strong><em>new or proposed<\/em><\/strong>\u00a0law\u00a0<\/span><span class=\"m_-7289575211786111875x_s1\">that you find interesting;<\/span><\/li>\n<li class=\"m_-7289575211786111875x_p2\"><span class=\"m_-7289575211786111875x_s1\">Summarizes what the new or proposed law is about and what it is designed to accomplish;<\/span><\/li>\n<li class=\"m_-7289575211786111875x_p2\"><span class=\"m_-7289575211786111875x_s1\">Assesses its value and explain why or why not the law will likely improve cybersecurity\u00a0and meets its intended purpose(s).<\/span><\/li>\n<\/ol>\n<p class=\"p1\">Be sure to remove this instructional language when you have completed updating content on this page.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Law Students will gain a broad knowledge of constitutional, civil, criminal, and related legal considerations that arise in the context of work or citizenship in an increasingly cyber\/digital world. \u00a0 Whether the student seeks a career in the public or private sector, the student will gain insight into both the limits and authorities on&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jahmire-whitehurst\/cyse-406\/\">Read More<\/a><\/div>\n","protected":false},"author":27501,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jahmire-whitehurst\/wp-json\/wp\/v2\/pages\/125"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jahmire-whitehurst\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jahmire-whitehurst\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jahmire-whitehurst\/wp-json\/wp\/v2\/users\/27501"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jahmire-whitehurst\/wp-json\/wp\/v2\/comments?post=125"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/jahmire-whitehurst\/wp-json\/wp\/v2\/pages\/125\/revisions"}],"predecessor-version":[{"id":226,"href":"https:\/\/sites.wp.odu.edu\/jahmire-whitehurst\/wp-json\/wp\/v2\/pages\/125\/revisions\/226"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jahmire-whitehurst\/wp-json\/wp\/v2\/media?parent=125"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}