Problem:
In many situations, multiple levels of government must work in partnership when ensuring security compliance. For each scenario, research and understand the Federal, State and Local Cyber Defense partners/structures. Then, identify the applicable law(s) it would fall under, as well as describe how the type of legal dispute (civil, criminal, private) affects the evidence used to resolve it. Note: This information can be presented in a table.
1. Transmission of underage photographs to various email addresses in CA, AZ, and CO
2. Colonial Pipeline Hack
3. Victim's identity used to open a new account
4. Bank fraud/scam
5. A firm's credit card records are stolen
6. Several cyberattacks penetrated several U.S. federal organizations
7. Financial scandal
8. Financial institutions refuse to disclose their privacy policies to their customers
9. Patients' information is stolen
10. A candidate is not selected for employment due to a disability