Table of contents : Cybersecurity technology and actors -- Responding to cyber threats -- Computer Fraud and Abuse Act -- State cybercrime laws -- Data breaches -- Identity theft : federal -- State identity theft laws -- Recent changes to federal cybersecurity law -- Cybersecurity and international law -- Privacy theory and investigations -- Privacy law and data protection.