Your opponent’s data has been audited, and it appears that some personal information is not being properly removed from the data before being shared. This privacy violation has caused damage to their reputation and may lead to litigation.
Select an Asset – Data card that your opponent has in play. That card now has a value of -3 for this round. Discard Privacy Violation at the end of this round.
The CIAS was established at UTSA in June of 2001 as part of UTSA’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.