Privacy vs. Cybersecurity: Where the lines are drawn