Privacy Protection Laws
Cybersecurity and Misuse
Surveillance and Monitoring
Identity Theft and Fraud
100

Alex is concerned about his private emails being accessed without his knowing. One day, Alex learns that a coworker tried to log into his personal email account on a shared work computer. Luckily, the coworker couldn’t access it because the email service needed legal authorization to access. 

What law ensures the protection of their electronic communications and prevents unauthorized access to their stored emails or messages.  

Electronic communications Privacy Act (ECPA).

(Protects electronic and store communications)

100

Which act criminalizes unauthorized access to computers and networks?

The Computer Fraud and Abuse Act (CFAA) address the unauthorized access and damage to protect computer systems.

100

I see your moves, both night and day,
Recording paths along your way.
With warrants now, I must align,
Or breaking laws becomes my crime.
What am I?

Cell Site Location Information (CSLI)

100

I steal your name, but not your face,
I use your info, leave no trace.
I’m a crime that’s hard to stop,
But catch me quick, or I’ll hit the top.
What am I?

Identity Theft and Fraud

200

Taylor receives a call from a police officer investigating a case involving one of her friends. The officer asks for access to Taylor's social media messages and emails to see if they contain any information related to the case. Taylor is unsure if the officer can simply request this information directly from the service provider or if they need specific legal authorization.  


What law can enforcement access stored electronic communications like emails and social media messages?

Stored Communications Act (SCA).

(Controls law enforcement access to electronic communications.)

200

The No TikTok on Government Devices Act is part of cybersecurity regulations and prohibits the use of TikTok on federal government devices to mitigate cybersecurity risks. 

True or False

True. The No TikTok on Government Devices Act is designed to enhance national security by restricting the use of TikTok on government-issued devices, aiming to protect against potential cyber threats and unauthorized data access

200

I watch in silence, unseen but clear. tracing the steps of those who appear. My gaze is bound by rules so tight. To guard the truth and keep it right. What am I?

Surveillance and Monitoring

200

I make sure your ID's secure,
With rules for states that must endure.
A standard set for driver's license,
For travel too, I bring compliance.
What am I?

The REAL ID Act

300

Jamie is a journalist who works at different companies at different times, working on an article about government corruption. One morning, law enforcement officers show up at her house with a search warrant, demanding to seize Jamie's laptop and notebooks to find information related to their investigation. Jamie knows that there are laws in place protecting journalists and preventing the law from seizing their work without meeting specific legal criteria.  

What law might protect her journalistic work from being searched or seized in this situation?

Privacy Protection Act (PPA).

(Limits searches and seizures of publication and communication work products.)

300

I guard against digital deeds so sly,
Unauthorized access I defy.
Born in the UK, to crimes I react,
Which law am I? A cyber pact!

The Computer Misuse Act! It combats hacking and unauthorized access to digital systems.

300

The government violets the Fourth amendment to the united States Constitution

Carpenter V. United State Does it require a search warrant for Cell Site Location Information(CSLI)

Yes or no

Yes

300

The Identity Theft Enforcement and Restitution Act imposes stricter penalties for identity theft linked to terrorism. 

True or False

True

400

I guard reporters’ pens and their pads,  

Protecting their work, whether good or bad.  

Search me too soon, and the law you’ll defy,  

What am I, that makes authorities comply?  

The Privacy Protection Act (PPA)!

400

Which act establishes cybersecurity measures for critical infrastructure protection?

The Homeland Security Act includes provision for cybersecurity to counter national threats.

400
How does cyber law statue like the computer fraud and abuse act regulate the use of surveillance and monitoring tools to balance privacy rights?

The Computer Fraud and Abuse Act restricts unauthorized surveillance to protect privacy while allowing lawful monitoring.

400

The Gramm-Leach-Bliley Act mandates that financial institutions must protect sensitive customer data.

True or False

True. Requires financial organizations to implement measures to protect the privacy and security of customer information.

500

I’m here to guard the little ones' play,  

Online where their data might stray.  

Websites must ask before they dive,  

Into data from those under the age of ___ (what number?)

The Children’s Online Privacy Protection Act (COPPA)!

(Protects the online privacy of children under 13 by regulating how websites and apps collect and use their information.)


500

I’m not a superhero, but I unite countries to fight cybercrime. My name sounds like a place to store your digital files, but I focus on global justice. What am I?

The Budapest Convention on Cybercrime.

500

True or False: Surveillance and monitoring tools must comply with privacy laws to prevent unlawful intrusions.

True. Laws like the Electronic Communications Privacy Act regulate surveillance to protect individual privacy.

500

You apply for a loan, but the lender spots some mistakes in your credit report. Thankfully, there's a law to ensure that your credit information is accurate and fair.

What's the law?

The Fair Credit Reporting Act (FCRA) ensures the accuracy, fairness, and privacy of credit reports.

M
e
n
u