{"id":1026,"date":"2019-07-09T13:33:07","date_gmt":"2019-07-09T17:33:07","guid":{"rendered":"https:\/\/www.rivier.edu\/academics\/?page_id=1026"},"modified":"2025-03-13T11:58:14","modified_gmt":"2025-03-13T15:58:14","slug":"what-is-cyber-law","status":"publish","type":"page","link":"https:\/\/www.rivier.edu\/academics\/online\/resources\/program-resources\/what-is-cyber-law\/","title":{"rendered":"What Is Cyber Law?"},"content":{"rendered":"<h2>IT Law<\/h2>\n<p>Perhaps most relevant to IT managers, IT law primarily covers <a title=\"What is Information Technology Law?\" href=\"https:\/\/www.hg.org\/information-technology-law.html\" target=\"_blank\" rel=\"noopener noreferrer\">security, ownership, and use of data<\/a>. IT law encompasses intellectual property and copyright law, as they pertain both to commercial software that a company might use and also to proprietary software or information that a company might own.<\/p>\n<p>IT managers might be tasked with keeping various kinds of data secure. They must be aware of different aspects of financial law as well as law dictating the security of information about children, foreign nationals, healthcare information, and other types of sensitive data. IT law spans state and local regulations, laws regarding security breaches, electronic signature law, privacy law, and laws governing electronic commerce.<\/p>\n<h2>Internet Law<\/h2>\n<p>Most aspects of IT law apply to the internet, but internet law also focuses on issues of <a title=\"Data Privacy Best Practices for Employees and Employers\" href=\"https:\/\/www.infosecurity-magazine.com\/opinions\/data-privacy-practices-employees\/\" target=\"_blank\" rel=\"noopener noreferrer\">free speech and privacy<\/a>. IT managers should be aware of the protections afforded to employees under the law and must be careful not to violate them. Yet they must also be aware of the liability a company can face when individual employees break internet law. Censorship is an important component of internet law, particularly for employers who are concerned with how their employees might represent them.<\/p>\n<p>Internet law encompasses laws regarding access to and usage of the internet; <a title=\"What is net neutrality and what does it mean for me?\" href=\"http:\/\/www.usatoday.com\/story\/tech\/2015\/02\/24\/net-neutrality-what-is-it-guide\/23237737\/\" target=\"_blank\" rel=\"noopener noreferrer\">net neutrality laws<\/a>\u00a0dictate what internet users can and cannot access on the internet. If a crime is committed, internet law addresses jurisdiction.<\/p>\n<h2>Computer Law<\/h2>\n<p>Computer law is a collection of laws and statutes that govern what constitutes <a title=\"Prosecuting Computer Crimes\" href=\"https:\/\/www.justice.gov\/sites\/default\/files\/criminal-ccips\/legacy\/2015\/01\/14\/ccmanual.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">misuse of computer technology<\/a>. Much of computer law deals with data theft and interception, telecommunications, dishonesty regarding electronic communications, unauthorized use of computers and laws concerning retention and monitoring of network data.<\/p>\n<h2>Pursuing a Career in IT Management<\/h2>\n<p>You can learn about cyber law, regulations, and compliance with an <a title=\"Online M.S. in Computer Information Systems\" href=\"https:\/\/www.rivier.edu\/programs\/?query=computer+information+systems\">M.S. in Computer Information Systems<\/a> from Rivier University. Take the next step in your CIS management career; request information about our on-campus or online programs today.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>IT Law Perhaps most relevant to IT managers, IT law primarily covers security, ownership, and use of data. IT law encompasses intellectual property and copyright law, as they pertain both [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":993,"menu_order":5,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1026","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What Is Cyber Law? - Rivier Academics<\/title>\n<meta name=\"description\" content=\"Dive into the three core types of cyber law as we answer the question, &quot;What is Cyber Law&quot; in this guide to building a career in computer information systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rivier.edu\/academics\/online\/resources\/program-resources\/what-is-cyber-law\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is Cyber Law? - Rivier Academics\" \/>\n<meta property=\"og:description\" content=\"Dive into the three core types of cyber law as we answer the question, &quot;What is Cyber Law&quot; in this guide to building a career in computer information systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rivier.edu\/academics\/online\/resources\/program-resources\/what-is-cyber-law\/\" \/>\n<meta property=\"og:site_name\" content=\"Rivier Academics\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-13T15:58:14+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.rivier.edu\/academics\/online\/resources\/program-resources\/what-is-cyber-law\/\",\"url\":\"https:\/\/www.rivier.edu\/academics\/online\/resources\/program-resources\/what-is-cyber-law\/\",\"name\":\"What Is Cyber Law? - Rivier Academics\",\"isPartOf\":{\"@id\":\"https:\/\/www.rivier.edu\/academics\/#website\"},\"datePublished\":\"2019-07-09T17:33:07+00:00\",\"dateModified\":\"2025-03-13T15:58:14+00:00\",\"description\":\"Dive into the three core types of cyber law as we answer the question, \\\"What is Cyber Law\\\" in this guide to building a career in computer information systems.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.rivier.edu\/academics\/online\/resources\/program-resources\/what-is-cyber-law\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.rivier.edu\/academics\/online\/resources\/program-resources\/what-is-cyber-law\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.rivier.edu\/academics\/online\/resources\/program-resources\/what-is-cyber-law\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.rivier.edu\/academics\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Online Programs\",\"item\":\"https:\/\/www.rivier.edu\/academics\/online\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Resources\",\"item\":\"https:\/\/www.rivier.edu\/academics\/online\/resources\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Program Resources\",\"item\":\"https:\/\/www.rivier.edu\/academics\/online\/resources\/program-resources\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"What Is Cyber Law?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.rivier.edu\/academics\/#website\",\"url\":\"https:\/\/www.rivier.edu\/academics\/\",\"name\":\"Rivier Academics\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.rivier.edu\/academics\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is Cyber Law? - Rivier Academics","description":"Dive into the three core types of cyber law as we answer the question, \"What is Cyber Law\" in this guide to building a career in computer information systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rivier.edu\/academics\/online\/resources\/program-resources\/what-is-cyber-law\/","og_locale":"en_US","og_type":"article","og_title":"What Is Cyber Law? - Rivier Academics","og_description":"Dive into the three core types of cyber law as we answer the question, \"What is Cyber Law\" in this guide to building a career in computer information systems.","og_url":"https:\/\/www.rivier.edu\/academics\/online\/resources\/program-resources\/what-is-cyber-law\/","og_site_name":"Rivier Academics","article_modified_time":"2025-03-13T15:58:14+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.rivier.edu\/academics\/online\/resources\/program-resources\/what-is-cyber-law\/","url":"https:\/\/www.rivier.edu\/academics\/online\/resources\/program-resources\/what-is-cyber-law\/","name":"What Is Cyber Law? - Rivier Academics","isPartOf":{"@id":"https:\/\/www.rivier.edu\/academics\/#website"},"datePublished":"2019-07-09T17:33:07+00:00","dateModified":"2025-03-13T15:58:14+00:00","description":"Dive into the three core types of cyber law as we answer the question, \"What is Cyber Law\" in this guide to building a career in computer information systems.","breadcrumb":{"@id":"https:\/\/www.rivier.edu\/academics\/online\/resources\/program-resources\/what-is-cyber-law\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rivier.edu\/academics\/online\/resources\/program-resources\/what-is-cyber-law\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.rivier.edu\/academics\/online\/resources\/program-resources\/what-is-cyber-law\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rivier.edu\/academics\/"},{"@type":"ListItem","position":2,"name":"Online Programs","item":"https:\/\/www.rivier.edu\/academics\/online\/"},{"@type":"ListItem","position":3,"name":"Resources","item":"https:\/\/www.rivier.edu\/academics\/online\/resources\/"},{"@type":"ListItem","position":4,"name":"Program Resources","item":"https:\/\/www.rivier.edu\/academics\/online\/resources\/program-resources\/"},{"@type":"ListItem","position":5,"name":"What Is Cyber Law?"}]},{"@type":"WebSite","@id":"https:\/\/www.rivier.edu\/academics\/#website","url":"https:\/\/www.rivier.edu\/academics\/","name":"Rivier Academics","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rivier.edu\/academics\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.rivier.edu\/academics\/wp-json\/wp\/v2\/pages\/1026","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rivier.edu\/academics\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.rivier.edu\/academics\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.rivier.edu\/academics\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rivier.edu\/academics\/wp-json\/wp\/v2\/comments?post=1026"}],"version-history":[{"count":0,"href":"https:\/\/www.rivier.edu\/academics\/wp-json\/wp\/v2\/pages\/1026\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.rivier.edu\/academics\/wp-json\/wp\/v2\/pages\/993"}],"wp:attachment":[{"href":"https:\/\/www.rivier.edu\/academics\/wp-json\/wp\/v2\/media?parent=1026"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}