TOOLS AND TRACKERS

Cybersecurity Law Key Terms

This resource provides key terms for cybersecurity law, developed with valuable input from top experts in the field.


Published: 12 Jan. 2026

View PDF

Additional insights:

Cybersecurity implicates many aspects of corporate and governmental operations, engaging senior management, boards of directors, corporate counsel, outside counsel and policymakers at all levels of government.

Efficiently addressing issues in this rapidly and continuously evolving field requires a shared language. To begin to standardize how we communicate about cybersecurity, IAPP staff developed these key terms with valuable input from top experts in cybersecurity law: James Burd, CIPP/US, CIPT; Veronica Canton, CIPP/E, CIPP/US, CIPM, CIPT, FIP; Erik Dullea, AIGP, CIPP/US, CIPM; Doron Goldstein, AIGP, CIPP/E, CIPP/US, CIPM, FIP, PLS; Jennifer Martin, CIPP/US, CIPM; and Charles Westerhaus, CIPP/E, CIPP/US, CIPM, FIP.

While many nations and regions are developing complex and sophisticated bodies of law for cybersecurity, this initial list of key terms is limited to U.S. federal and state laws. This document is intended as a first step, as it was impossible to develop a single common resource covering all the ongoing efforts in countries around the world. The IAPP will strive to internationalize and further develop this resource in the future.

Although there are some shared terms and definitions, these key terms are separate from the IAPP's Glossary of Privacy Terms, and Key Terms for AI Governance.

Cybersecurity Law Key Terms

CPE credit badge

This content is eligible for Continuing Professional Education credits. Please self-submit according to CPE policy guidelines.

Submit for CPEs

Contributors:

Cheryl Saniuk-Heinig

Former research and insights analyst, IAPP

CIPP/E, CIPP/US

Jim Dempsey

Lecturer, UC Berkeley Law; Managing Director, Cybersecurity Law Center, IAPP


Tags:

Data securityFrameworks and standardsLaw and regulationRisk managementStrategy and governanceSurveillanceU.S. federal regulationTechnologyCybersecurity law
TOOLS AND TRACKERS

Cybersecurity Law Key Terms

This resource provides key terms for cybersecurity law, developed with valuable input from top experts in the field.

Published: 12 Jan. 2026

View PDF

Contributors:

Cheryl Saniuk-Heinig

Former research and insights analyst, IAPP

CIPP/E, CIPP/US

Jim Dempsey

Lecturer, UC Berkeley Law; Managing Director, Cybersecurity Law Center, IAPP


Additional insights:

Cybersecurity implicates many aspects of corporate and governmental operations, engaging senior management, boards of directors, corporate counsel, outside counsel and policymakers at all levels of government.

Efficiently addressing issues in this rapidly and continuously evolving field requires a shared language. To begin to standardize how we communicate about cybersecurity, IAPP staff developed these key terms with valuable input from top experts in cybersecurity law: James Burd, CIPP/US, CIPT; Veronica Canton, CIPP/E, CIPP/US, CIPM, CIPT, FIP; Erik Dullea, AIGP, CIPP/US, CIPM; Doron Goldstein, AIGP, CIPP/E, CIPP/US, CIPM, FIP, PLS; Jennifer Martin, CIPP/US, CIPM; and Charles Westerhaus, CIPP/E, CIPP/US, CIPM, FIP.

While many nations and regions are developing complex and sophisticated bodies of law for cybersecurity, this initial list of key terms is limited to U.S. federal and state laws. This document is intended as a first step, as it was impossible to develop a single common resource covering all the ongoing efforts in countries around the world. The IAPP will strive to internationalize and further develop this resource in the future.

Although there are some shared terms and definitions, these key terms are separate from the IAPP's Glossary of Privacy Terms, and Key Terms for AI Governance.

Cybersecurity Law Key Terms

CPE credit badge

This content is eligible for Continuing Professional Education credits. Please self-submit according to CPE policy guidelines.

Submit for CPEs

Tags:

Data securityFrameworks and standardsLaw and regulationRisk managementStrategy and governanceSurveillanceU.S. federal regulationTechnologyCybersecurity law

Related resources