Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » CCPA » CCPA Compliance

CCPA Compliance

CCPA, or California Consumer Privacy Act, is a set of compliance guidelines aimed at protecting data belonging to residents of the state of California. It came into effect on January 1, 2020, and is considered one of the most stringent privacy laws in the United States. It applies to all organizations, regardless of where the business is located, that:

  • Process more than 100,000 personal data (B2B data included) of California citizens annually
  • Have more than $25 million in revenue annually
  • Earn more than 50% of revenue from selling California residents’ data

According to the CCPA guidelines, personal data can include details such as names, Social Security numbers, email addresses, birthdates, passport numbers, IP addresses, phone numbers, driver’s license numbers, residential addresses, and bank account details.

The CCPA protects the customers for their right to choose not to sell their data and the right of access and deletion of the data collected. Organizations that violate the CCPA may face fines of $7,500 per violation and $750 per user affected in civil damages.

The CCPA compliance requires an organization to have a process for responding to customer privacy rights exercise requests. In addition, businesses should collect less personal information except when it is absolutely necessary.

An inventory of all the data collected by an organization is set up, and customers are given notice of the collection of data. A data privacy policy is established, the employees are trained, and requests from customers are handled effectively.

Additional reading

ISO 27001 For SaaS Businesses: A Starter’s Guide

ISO 27001 is a well-established and recognized cybersecurity certification. It provides companies (and SaaS businesses) comprehensive guidelines on creating, implementing, and improving their Information Security Management System (ISMS).  For SaaS businesses that have a majority of their data on the cloud, the standard is more than a certification that gets them in the room. It’s…
Essential Steps to Build a Risk-Aware Culture in Your Organization

How to build a risk-aware culture in your organization?

Can people in your organization freely discuss what might go wrong without hesitation? Do you still think system-centric when you hear the words risk and security? Are your employees risk-avoidant or calculated risk-takers? The answers can be indicative of your organization’s risk culture. This culture is the sum of shared values, attitudes, and behavior that…
open source software risks

7 Major Risks Of Open-Source Software & Mitigation Strategies

Open source software (OSS) has gained popularity due to its accessibility, rich functionality, cost-effectiveness, and flexibility. These advantages make OSS an attractive choice for many, but it is also considered an inherently riskier option. For example, Gilad David Maayan, Security Today, notes: “Open-source is a bit more chaotic, with contributors adding new features and improving…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.