{"id":152,"date":"2024-02-12T22:57:44","date_gmt":"2024-02-12T22:57:44","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=152"},"modified":"2024-12-05T23:44:53","modified_gmt":"2024-12-05T23:44:53","slug":"crjs-405","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/porter-doughty\/crjs-405\/","title":{"rendered":"CRJS 406"},"content":{"rendered":"\n<h1 class=\"wp-block-heading has-text-align-center\">Cyber Law<\/h1>\n\n\n\n<p class=\"has-text-align-center\"><span style=\"font-weight: 400\">In my Cyber Law course, I gained a solid understanding of how legal principles intersect with technology and the internet. We covered key topics like intellectual property rights, privacy regulations, digital contracts, cybercrimes, and the legal implications of data breaches and cybersecurity protocols. This course emphasized the balance between user rights and the responsibilities of tech companies, exploring how legislation adapts to rapid technological advances.<\/span><\/p>\n\n\n\n<div class=\"wp-block-cover\" style=\"min-height:134px\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"480\" height=\"360\" class=\"wp-block-cover__image-background wp-image-394\" alt=\"\" src=\"http:\/\/sites.wp.odu.edu\/porter-doughty\/wp-content\/uploads\/sites\/35865\/2024\/12\/gavel.jpg\" data-object-fit=\"cover\" srcset=\"https:\/\/sites.wp.odu.edu\/porter-doughty\/wp-content\/uploads\/sites\/35865\/2024\/12\/gavel.jpg 480w, https:\/\/sites.wp.odu.edu\/porter-doughty\/wp-content\/uploads\/sites\/35865\/2024\/12\/gavel-300x225.jpg 300w, https:\/\/sites.wp.odu.edu\/porter-doughty\/wp-content\/uploads\/sites\/35865\/2024\/12\/gavel-400x300.jpg 400w\" sizes=\"(max-width: 480px) 100vw, 480px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-center has-large-font-size\">Course Material<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"has-text-align-center\"><span style=\"font-weight: 400\">The ever-evolving landscape of the digital world is in constant need of scrutiny. Making, amending, and passing laws that can form to the changing environment is proving more difficult with each advancement made. Things such as AI, the blockchain, and even traditional areas like data encryption are difficult to legally traverse.<\/span><\/p>\n\n\n\n<p class=\"has-text-align-center\"><span style=\"font-weight: 400\">Another major challenge is jurisdictional complexity. The internet is global, but laws are usually local, creating conflicts when data or cyber incidents cross borders. For instance, different countries have varying standards for privacy protection; the GDPR in Europe mandates strict data control, while other regions have less stringent requirements. This disparity complicates compliance for international companies and raises questions about which jurisdiction\u2019s laws apply during transnational cybercrimes.<\/span><\/p>\n\n\n\n<p class=\"has-text-align-center\"><span style=\"font-weight: 400\">I have learned a lot not only in the field of cyber security, but about the law itself. Learning these fundamental steps helps me better understand the challenges that go into charging someone with a crime committed using the internet as the primary tool that facilitates the crime. I also had the honor of speaking with a federal judge and asking them questions regarding the intricacies of charging an internet crime.<\/span><\/p>\n\n\n\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Law In my Cyber Law course, I gained a solid understanding of how legal principles intersect with technology and the internet. We covered key topics like intellectual property rights, privacy regulations, digital contracts, cybercrimes, and the legal implications of data breaches and cybersecurity protocols. This course emphasized the balance between user rights and the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/porter-doughty\/crjs-405\/\">Read More<\/a><\/div>\n","protected":false},"author":27427,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/porter-doughty\/wp-json\/wp\/v2\/pages\/152"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/porter-doughty\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/porter-doughty\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/porter-doughty\/wp-json\/wp\/v2\/users\/27427"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/porter-doughty\/wp-json\/wp\/v2\/comments?post=152"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/porter-doughty\/wp-json\/wp\/v2\/pages\/152\/revisions"}],"predecessor-version":[{"id":397,"href":"https:\/\/sites.wp.odu.edu\/porter-doughty\/wp-json\/wp\/v2\/pages\/152\/revisions\/397"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/porter-doughty\/wp-json\/wp\/v2\/media?parent=152"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}