{"id":93,"date":"2022-09-16T13:00:03","date_gmt":"2022-09-16T13:00:03","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=93"},"modified":"2024-04-14T00:43:54","modified_gmt":"2024-04-14T00:43:54","slug":"law-ethics","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/nir\/law-ethics\/","title":{"rendered":"CYSE 406"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-text-align-center\">Cyber Law and Ethics<\/h2>\n\n\n\n<p>This is a comprehensive class that revolved around the ethical and legal aspects of how cybersecurity and the law coincides with one another. This class also delved deep into how data protection is implemented and the issues that law enforcement and legal systems run into when it comes to confiscating evidence and holding criminals accountable for their actions. <\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/nir\/wp-content\/uploads\/sites\/30465\/2024\/04\/Writing-Assignment-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Writing-Assignment-1.\"><\/object><a id=\"wp-block-file--media-583ac89a-df7b-4f00-a5fc-3183a7e17150\" href=\"https:\/\/sites.wp.odu.edu\/nir\/wp-content\/uploads\/sites\/30465\/2024\/04\/Writing-Assignment-1.pdf\">Writing-Assignment-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/nir\/wp-content\/uploads\/sites\/30465\/2024\/04\/Writing-Assignment-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-583ac89a-df7b-4f00-a5fc-3183a7e17150\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/nir\/wp-content\/uploads\/sites\/30465\/2024\/04\/writing-assignment-2.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of writing-assignment-2.\"><\/object><a id=\"wp-block-file--media-39a9befb-f715-4671-a729-2da06cabb015\" href=\"https:\/\/sites.wp.odu.edu\/nir\/wp-content\/uploads\/sites\/30465\/2024\/04\/writing-assignment-2.pdf\">writing-assignment-2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/nir\/wp-content\/uploads\/sites\/30465\/2024\/04\/writing-assignment-2.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-39a9befb-f715-4671-a729-2da06cabb015\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Law and Ethics This is a comprehensive class that revolved around the ethical and legal aspects of how cybersecurity and the law coincides with one another. This class also delved deep into how data protection is implemented and the issues that law enforcement and legal systems run into when it comes to confiscating evidence&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/nir\/law-ethics\/\">Read More<\/a><\/div>\n","protected":false},"author":24833,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nir\/wp-json\/wp\/v2\/pages\/93"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nir\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nir\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nir\/wp-json\/wp\/v2\/users\/24833"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nir\/wp-json\/wp\/v2\/comments?post=93"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/nir\/wp-json\/wp\/v2\/pages\/93\/revisions"}],"predecessor-version":[{"id":368,"href":"https:\/\/sites.wp.odu.edu\/nir\/wp-json\/wp\/v2\/pages\/93\/revisions\/368"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nir\/wp-json\/wp\/v2\/media?parent=93"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}