<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
        xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9
        http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">

  <!-- ═══════════════════════════════════════════════════════════════════
       iCyberLaw — Rivera Law Group  |  https://icyberlaw.com
       Generated: 2026-03-07
       ═══════════════════════════════════════════════════════════════════ -->

  <!-- Core Pages -->
  <url>
    <loc>https://icyberlaw.com/</loc>
    <lastmod>2026-03-07</lastmod>
    <changefreq>weekly</changefreq>
    <priority>1.0</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/about</loc>
    <lastmod>2026-03-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.9</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/practice-areas</loc>
    <lastmod>2026-03-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.9</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/notable-cases</loc>
    <lastmod>2026-03-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/blog</loc>
    <lastmod>2026-03-07</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/contact</loc>
    <lastmod>2026-03-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/for-attorneys</loc>
    <lastmod>2026-03-08</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.9</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/disclaimer</loc>
    <lastmod>2026-03-07</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.4</priority>
  </url>

  <!-- ═══════════════════════════════════════════════════════════════════
       Practice Area Pages
       ═══════════════════════════════════════════════════════════════════ -->

  <url>
    <loc>https://icyberlaw.com/practice-areas/artificial-intelligence</loc>
    <lastmod>2026-03-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.9</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/practice-areas/cybercrime</loc>
    <lastmod>2026-03-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.9</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/practice-areas/defamation</loc>
    <lastmod>2026-03-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.9</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/practice-areas/intellectual-property</loc>
    <lastmod>2026-03-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.9</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/practice-areas/domain-names</loc>
    <lastmod>2026-03-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/practice-areas/forensics</loc>
    <lastmod>2026-03-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/blog/business-email-compromise-virginia-wire-fraud-cfo-case-study</loc>
    <lastmod>2026-03-08</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/blog/ransomware-virginia-cfaa-ofac-corporate-counsel-case-study</loc>
    <lastmod>2026-03-08</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/blog/cyberstalking-doxxing-online-harassment-virginia-case-study</loc>
    <lastmod>2026-03-08</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/blog/richmond-healthcare-cybercrime-case-study-hipaa-cfaa-vcca</loc>
    <lastmod>2026-03-08</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/blog/vcca-cfaa-jurisdictional-case-study-nova-contractor</loc>
    <lastmod>2026-03-08</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/blog/phishing-credential-theft-unauthorized-access-virginia-case-study</loc>
    <lastmod>2026-03-08</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/ransomware-response-checklist</loc>
    <lastmod>2026-03-09</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/phishing-red-flags-checklist</loc>
    <lastmod>2026-03-09</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/bec-prevention-checklist</loc>
    <lastmod>2026-03-08</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/vcca-vs-cfaa</loc>
    <lastmod>2026-03-08</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.9</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/northern-virginia-cybercrime-defense</loc>
    <lastmod>2026-03-08</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.9</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/richmond-cybercrime-defense</loc>
    <lastmod>2026-03-08</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.9</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/virginia-cyber-law</loc>
    <lastmod>2026-03-08</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.9</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/practice-areas/attorney-consulting</loc>
    <lastmod>2026-03-08</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>

  <!-- ═══════════════════════════════════════════════════════════════════
       Blog Articles
       ═══════════════════════════════════════════════════════════════════ -->

  <url>
    <loc>https://icyberlaw.com/blog/defending-virginia-state-cybercrime-charges-vcca</loc>
    <lastmod>2026-03-08</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.9</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/blog/government-contractor-cybercrime-northern-virginia-cfaa-eea</loc>
    <lastmod>2026-03-08</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.9</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/blog/healthcare-cybercrime-richmond-hipaa-cfaa-edva</loc>
    <lastmod>2026-03-08</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.9</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/blog/federal-cybercrime-charges-wdva</loc>
    <lastmod>2026-03-08</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.9</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/blog/federal-cybercrime-charges-edva-doj</loc>
    <lastmod>2026-03-08</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.9</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/blog/virginia-computer-solicitation-minors-2025-amendment</loc>
    <lastmod>2025-08-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.9</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/blog/appian-v-pegasystems-virginia-trade-secrets-vcca</loc>
    <lastmod>2026-03-08</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.9</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/blog/virginia-computer-crimes-act-vs-federal-cybersecurity-law</loc>
    <lastmod>2026-03-08</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.9</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/blog/commonwealth-v-wallace-virginia-computer-crimes-act</loc>
    <lastmod>2026-03-08</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.9</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/blog/dual-engineering-legal-expertise-attorney-value</loc>
    <lastmod>2026-03-08</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.9</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/blog/ai-liability-expert-witness-built-ai-systems</loc>
    <lastmod>2026-03-08</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.9</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/blog/cybersecurity-expert-witness-attorney-guide</loc>
    <lastmod>2026-03-08</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.9</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/blog/nyt-v-openai-legal-implications</loc>
    <lastmod>2026-03-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/blog/marriott-data-breach</loc>
    <lastmod>2025-01-23</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/blog/equifax-data-breach</loc>
    <lastmod>2019-09-15</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/blog/cybersecurity-hackers-regulators-liability</loc>
    <lastmod>2013-12-05</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.6</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/blog/top-100-trial-lawyers</loc>
    <lastmod>2014-07-08</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.6</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/blog/summary-judgment-computer-trespass</loc>
    <lastmod>2011-03-28</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.6</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/blog/cease-and-desist-letter</loc>
    <lastmod>2010-05-20</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.6</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/blog/internet-privacy</loc>
    <lastmod>2010-05-20</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.6</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/blog/website-documents-contracts</loc>
    <lastmod>2010-05-19</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.6</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/blog/internet-startups</loc>
    <lastmod>2010-05-19</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.6</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/blog/us-v-cassim-music-piracy-victory</loc>
    <lastmod>2010-03-20</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.7</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/blog/cda-cyber-racketeers-dmca-section-230</loc>
    <lastmod>2008-11-26</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.6</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/blog/bbc-interview</loc>
    <lastmod>2008-03-04</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.6</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/blog/computer-expert-internet-cyber-trial-attorney</loc>
    <lastmod>2007-12-16</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.6</priority>
  </url>

  <url>
    <loc>https://icyberlaw.com/blog/microsoft-sues-dentist-trademark-cybersquatting</loc>
    <lastmod>2007-12-04</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.6</priority>
  </url>

</urlset>
