TOOLS AND TRACKERS

Cybersecurity Law Key Terms

This resource provides key terms for cybersecurity law, developed with valuable input from top experts in the field.

Published
View glossary PDF

Contributors:

Jim Dempsey

Lecturer, UC Berkeley Law; Managing Director, Cybersecurity Law Center

IAPP

Cheryl Saniuk-Heinig

CIPP/E, CIPP/US, CIPM

Former research and insights analyst, IAPP

Cybersecurity implicates many aspects of corporate and governmental operations, engaging senior management, boards of directors, corporate counsel, outside counsel and policymakers at all levels of government.

Efficiently addressing issues in this rapidly and continuously evolving field requires a shared language. To begin to standardize how we communicate about cybersecurity, IAPP staff developed these key terms with valuable input from top experts in cybersecurity law: James Burd, CIPP/US, CIPT; Veronica Canton, CIPP/E, CIPP/US, CIPM, CIPT, FIP; Erik Dullea, AIGP, CIPP/US, CIPM; Doron Goldstein, AIGP, CIPP/E, CIPP/US, CIPM, FIP, PLS; Jennifer Martin, CIPP/US, CIPM; and Charles Westerhaus, CIPP/E, CIPP/US, CIPM, FIP.

While many nations and regions are developing complex and sophisticated bodies of law for cybersecurity, this initial list of key terms is limited to U.S. federal and state laws. This document is intended as a first step, as it was impossible to develop a single common resource covering all the ongoing efforts in countries around the world. The IAPP will strive to internationalize and further develop this resource in the future.

Although there are some shared terms and definitions, these key terms are separate from the IAPP's Glossary of Privacy Terms, and Key Terms for AI Governance.

The IAPP additionally published a Cybersecurity Law Basics infographic, which provides an overview on the basics of cybersecurity law, including definitions, as well as information on the sectors it applies to and the significant laws and regulations that impact it.

Cybersecurity Law Key Terms


CPE credit badge

This content is eligible for Continuing Professional Education credits. Please self-submit according to CPE policy guidelines.

Submit for CPEs

Contributors:

Jim Dempsey

Lecturer, UC Berkeley Law; Managing Director, Cybersecurity Law Center

IAPP

Cheryl Saniuk-Heinig

CIPP/E, CIPP/US, CIPM

Former research and insights analyst, IAPP

Tags:

Data securityFrameworks and standardsLaw and regulationRisk managementStrategy and governanceSurveillanceU.S. federal regulationTechnologyCybersecurity law

Related resources