Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » CCPA » California Consumer Privacy Act (CCPA)

California Consumer Privacy Act (CCPA)

Enacted in 2018, and going into effect on January 1, 2020, the California Consumer Privacy Act (CCPA) is one of the most comprehensive consumer data protection laws in the US. By offering Californians more control over their personal data, it seeks to strengthen their privacy rights and safeguards.

Californian customers have various important rights regarding their personal data under the CCPA. People have the right to know what information is being collected on them, why it is being collected, and what details are being gathered. Additionally, they can ascertain who is receiving the disclosure or sale of their data. They have the option to refuse to have the sale of their personal data. 

Customers also have the right to access their personal data that is held by businesses and can request that their data be removed from those records. Crucially, the CCPA makes sure that exercising these rights doesn’t lead to unfair treatment in the form of price differentials or denial of goods or services.

For-profit businesses operating in California that fulfill specific requirements are subject to the law. It covers, among other things, firms that handle the personal data of at least 50,000 individuals, households, or devices; organizations whose yearly gross revenues surpass $25 million; and companies whose primary source of income is the sale of personal data.

The CCPA provides a broad definition of personal information. Besides the more conventional identifiers like names and addresses, it also includes internet identifiers like browsing history, biometric information, and conclusions derived from different kinds of personal data.

In order to protect customer data, organizations must implement and uphold acceptable security procedures. Additionally, companies must provide clear and accessible mechanisms for consumers to exercise their rights, including a prominent “Do Not Sell My Personal Information” option on their website.

Additional reading

ISO 27001 Checklist: 13 Easy Steps To Get Started

TL;DR An ISO 27001 checklist provides a structured roadmap to implement an Information Security Management System (ISMS) and prepare for certification. Key steps include forming an internal security team, defining ISMS scope, conducting risk assessments, implementing Annex A controls, and maintaining required documentation. The process also involves internal audits, external certification audits (Stage 1 &…

What are the Different CMMC Levels?

If you are a contractor for the Department of Defense, you probably find yourself in the shoes of Efraim Diveroli from War Dogs, hustling for that million dollar deal. Your battlefield is cybersecurity and the shield is CMMC; each level is a new mission. The stakes are high—miss a step, and you’re out of the…

SOC for Cybersecurity: Requirements, Report, & Examination

A growing concern for service and non-service organizations alike is the increasing threat to data. With an increase in cloud exploitation by 95% businesses are under pressure to take adequate measures against malicious actors. One way to demonstrate their seriousness toward security is through a globally accepted framework like SOC for cybersecurity.  In this article,…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.