Data Security and Privacy PolicyCornell Certificate Program
Overview and Courses
Personal data is a tremendous asset for many organizations doing business in today's global digital economy. This data can also become a major liability for organizations that may be subject to vulnerabilities within their security systems. One of the biggest challenges businesses face is safeguarding personally identifiable information collected from customers by creating a sustainable framework for securing this data for decades to come.
In this certificate program, you will go through the steps you can take as a privacy professional charged with the responsibility of protecting private data. You will discover how a strategy of the three Fs – find it, face it, fix it – will help protect your private data from the threat of malware, ransomware, and other cybersecurity vulnerabilities. Starting from an understanding of your organization’s current protection system, you will build on that framework, taking valuable tools back to your teams in support of preparing for the unexpected.
Throughout this certificate program, you will delve into case studies and industry examples showcasing how organizations can deal with privacy incidents, overcome them, and become stronger following security attacks. As the business world continuously evolves, so does the exposure to new cybersecurity threats. While you may not be able to avoid every vulnerability, this program will show you how to prepare for the unexpected and plan an effective response to almost any cybersecurity crisis. By the end of the program, you will be set up to effect change at your organization, thereby reducing your risk, preparing for crisis management, and instilling a culture of cybersecurity throughout your teams and beyond.
The courses in this certificate program are required to be completed in the order that they appear.
Course list
- Aug 20, 2025
- Nov 12, 2025
Safeguarding data is one of the most critical duties of any business striving to be successful in the global digital economy. Even with a privacy protection structure in place, there is no guarantee of immunity from a potential breach. In this course, you will explore strategies for effectively responding to data privacy incidents and identify ways to contain the potential damage they can cause. You'll discover how you can help your organization prepare for a risk that is both ever present and continuously evolving. By the end of this course, you will recognize how an investment in preparation can minimize vulnerabilities and even help you to emerge stronger following a privacy incident.
You are required to have completed the following course or have equivalent experience before taking this course:
- Privacy Structure and Risk Assessment
- Sep 3, 2025
- Nov 26, 2025
There are federal laws and regulations that govern cybersecurity to ensure the protection of data systems and operations. It can be challenging to determine the specific laws and regulations that apply to your organization.
In this course, you will explore an overview of the regulatory framework that includes the laws and regulations designed to provide different industries with the most effective safeguards against cyber threats and attacks. You will discover the benefits as well as the risks of certain security practices. As you delve into the workings of the regulatory framework, you will have an opportunity to engage with your classmates and share your thoughts on whether there needs to be more or better regulatory oversight. You will also consider the insights of a cybersecurity expert on the evolution of increasingly secure methods of protection to minimize attacks or their impact.
You are required to have completed the following courses or have equivalent experience before taking this course:
- Privacy Structure and Risk Assessment
- Privacy Incidents
- Sep 17, 2025
- Dec 10, 2025
The integrity of data systems and operations is at constant risk from potential vulnerabilities, threats, and attacks. In this course, you will examine how these risks can occur within your organization as well as originate from external sources. You will discover how to anticipate bad actors that threaten your cybersecurity and explore strategies for identifying, reviewing, and implementing best practices to safeguard the security of your operations. You will also hear the insights of a cybersecurity expert who helps organizations adapt their businesses to changing operational needs. This course equips you to anticipate the cybersecurity-related issues, potential business risks, and consequences facing your organization, then manage these issues under the applicable regulatory and policy regimes.
You are required to have completed the following courses or have equivalent experience before taking this course:
- Privacy Structure and Risk Assessment
- Privacy Incidents
- Examining Cybersecurity Governance
- Oct 1, 2025
- Dec 24, 2025
Cybersecurity requires more than just laws and regulations. To ensure the protection of data systems and operations, your organization must embrace a culture of compliance, employ best practices, and remain alert. Once you define the types of cyber risks your organization faces, the next step is to cultivate a culture aimed at safeguarding against them. In this course, you will gain an understanding of the importance of collaboration, both internally and externally. You will recognize how establishing a shared sense of responsibility can be the start of your best defense against cyber threats and attacks. Finally, you will examine cybersecurity best practices and explore how to adopt those that best fit your organization.
You are required to have completed the following courses or have equivalent experience before taking this course:
- Privacy Structure and Risk Assessment
- Privacy Incidents
- Examining Cybersecurity Governance
- Business and Cybersecurity in Practice
How It Works
- View slide #1
- View slide #2
- View slide #3
- View slide #4
- View slide #5
- View slide #6
- View slide #7
- View slide #8
Key Course Takeaways
- Identify the privacy protection structure in your organization
- Assess your readiness to safeguard private data
- Respond to a data crisis
- Continuously prepare for the unexpected
- Recognize the principal framework that governs cybersecurity
- Examine the discretion that is involved within the regulatory framework as it applies to your organization
- Explore how third-party actions as well as your own can impede business objectives
- Anticipate changes in an ever-evolving system of operational security practices and adapt accordingly
- Identify threats and vulnerabilities both internal and external to your business
- Promote a cybersecurity culture and examine best practices

Download a Brochure
Not ready to enroll but want to learn more? Download the certificate brochure to review program details.
What You'll Earn
- Data Security and Privacy Policy Certificate from Cornell Law School
- 50 Professional Development Hours (5.0 CEUs)
Who Should Enroll
- IT professionals
- Marketing professionals
- Managers and executives
- Product development professionals
- Data scientists
- Professionals responsible for cybersecurity and privacy-related concerns
- HR professionals
- Legal professionals
Explore Related Programs

“eCornell gave me the confidence I needed to take a seat at the table and say: I’m ready.”
“I went into this data science program not fully knowing what to expect other than the content aligned with the skills I needed for my career. I was blown away by the thought put into the curriculum, the projects, and the help of expert facilitators. I’ve used other online resources to learn these skills, but until this program, I hadn’t walked away with both the technical skills AND an understanding of how to apply them in real-world scenarios.”
- View testimonial #1
- View testimonial #2
Request Information Now by completing the form below.

Data Security and Privacy Policy
Select Payment Method | Cost |
---|---|
$3,900 | |