This paper is an introductory summary of a large-scale project, which I first outlined in more detail during the assessment for my Masters degree and is currently under development. It describes what I call the “Cyber Law Protocol”, an automatic system capable of enforcing legal rules into networking operations.