Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.

2.2.1. Legal Systems and Types of Law

💡 First Principle: The type of legal proceeding determines the evidence standard required, who bears the burden of proof, and what the potential penalties are. Using criminal-law thinking in a civil matter (or vice versa) leads to wrong answers and real-world mistakes.

Two primary legal system traditions:

Common Law (US, UK, Canada, Australia): Law develops through court decisions (precedent/stare decisis) as well as legislation. Courts interpret statutes. Prior rulings bind future cases. Most cybercrime is prosecuted under common law systems.

Civil Law (France, Germany, most of continental Europe, Japan): Law is primarily codified in comprehensive statutes. Judges apply the code; precedent is less binding. Many privacy frameworks (GDPR) operate in civil law countries.

Types of law relevant to information security:
TypeWho Brings ActionStandard of ProofPenaltiesSecurity Relevance
CriminalGovernment / StateBeyond reasonable doubt (~95%)Imprisonment, fines, criminal recordComputer fraud (CFAA), identity theft, unauthorized access
Civil / TortPrivate partiesPreponderance of evidence (>50%)Monetary damages, injunctionsNegligence claims after breach, contract disputes, IP infringement
Administrative / RegulatoryGovernment agenciesVaries by agencyFines, license revocation, consent decreesFTC, SEC, HIPAA, PCI enforcement actions
Industry StandardsStandards bodies, contract partiesContract termsContract penalties, loss of certificationPCI DSS, ISO 27001, SOC 2 compliance failures
Key cybercrime statutes (US context):
  • Computer Fraud and Abuse Act (CFAA) — Federal statute criminalizing unauthorized computer access. The primary US federal cybercrime law. "Unauthorized access" is the key element.
  • Electronic Communications Privacy Act (ECPA) — Governs interception of electronic communications; relevant to monitoring employees, wiretapping.
  • Sarbanes-Oxley (SOX) — Financial reporting integrity for public companies; requires accurate financial records and internal controls.
  • HIPAA — Health information privacy and security for covered entities and business associates.
  • GLBA (Gramm-Leach-Bliley Act) — Financial services customer data protection.

⚠️ Exam Trap: The CFAA applies to "unauthorized" access. An employee with authorized access who misuses that access for unauthorized purposes may still violate the CFAA — but this is a contested legal area. The exam tests whether you know the CFAA governs unauthorized computer access, not whether you can litigate it.

Reflection Question: A company suffers a breach and wants to prosecute the attacker. Their legal team also plans to sue the attacker for damages. What are the parallel proceedings, what different evidence standards apply to each, and why does this matter for how the organization preserves digital evidence?

Alvin Varughese
Written byAlvin Varughese
Founder15 professional certifications