Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary Β» CCPA Β» CCPA Consent

CCPA Consent

The California Privacy Rights Act (CPRA) updates the CCPA by clarifying what counts as consent: it’s a consumer’s freely given, clear, and informed choice about how their personal data is used. 

While the CCPA generally operates on an opt-out basisβ€”meaning businesses can handle most personal data without explicit permission as long as consumers have the option to say noβ€”there are situations where explicit consent is a must.

Explicit consent is needed, for instance, when a consumer has already opted out of having their personal information shared or sold. It’s also required when dealing with the personal information of minors aged 13 to 16, especially if that information is being exchanged or sold. Furthermore, if sensitive personal data is being used in ways not explicitly allowed by law, businesses need to get a clear β€œyes” from the consumer.

Consent, in this context, can’t be assumed or coerced. It has to be a conscious and voluntary action. This means no pre-checked boxes, no taking silence as agreement, and no assuming that inactivity is a green light. Importantly, consumers can change their minds at any time.

For those under 16, businesses need opt-in consent before they can sell their personal information, and for children under 13, this permission has to come from a parent or guardian. Companies are also required to respect opt-out signals sent through user-enabled tools like Global Privacy Controls (GPC).

If a business offers financial incentives for collecting, selling, or deleting personal data, they must get the consumer’s opt-in consent, which can be withdrawn at any point. Additionally, if a consumer has previously opted out of the sale of their information, businesses need to wait at least 12 months before asking for permission again.

Additional reading

SOC 2 Type 2: Requirements, Process, Cost in 2026

Security questionnaires are piling up, procurement stalls are on page two, and your sales team is begging for a shortcut. The solution: a current SOC 2 Type 2 certification. Unlike its point-in-time cousin (Type 1), Type 2 proves your controls run smoothly for months, not merely look good on audit day. And it’s quickly becoming…

ISO 42001 for Startups: A Practical Guide to Responsible AI

Startups today face immense pressure to adopt AI and ship features quickly. But as AI becomes increasingly embedded in products and processes, the tension between speed and security grows. Enterprise buyers demand greater transparency and investors want to understand how bias, data privacy, and AI risk is managed. This is where ISO 42001 comes in….

FedRAMP Software & 5 Tools Required For Compliance [2026]

TL; DR This guide explains the key software categories required for FedRAMP compliance and compares tools based on their role in control management, continuous monitoring, risk management, and incident response. Top 5 FedRAMP Software in 2026:1. Sprinto2. Uptycs3. Anitian4. Aquia5. Coalfire FedRAMP (Federal Risk and Authorization Management Program) compliance is required by any cloud service…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.