Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » CCPA » CCPA Ammendments

CCPA Ammendments

Since its initial implementation in 2018, the California Consumer Privacy Act has undergone a December 2020: The fourth iteration defined offline interaction requirements and reinstated the opt-out button. 

  1. In February 2020, revised laws made it clear that loyalty programs would not be viewed as discriminatory and included the idea of an opt-out button
  2. The ability to place an opt-out button next to a “Do Not Sell” link and the ban on pre-selecting opt-in options were eliminated in a second round of changes, in March 2020
  3. The final CCPA regulations were authorized by the Office of Administrative Law, in August 2020. Among the revisions were the removal of the need for express agreement for using personal information for purposes that materially differ from one another.
  4. A third series of changes defined rules for companies handling the personal information of children and included guidelines on opt-out notifications in physical establishments. 
  5. In December 2020, the fourth iteration defined offline interaction requirements and reinstated the opt-out button. 
  6. Additional regulations banned “dark patterns” that obscure the opt-out process and clarified rules for authorized agents.
  7. The California Privacy Protection Agency (CPPA) released draft regulations addressing enforcement, audit rights, and updated CCPA terminology. Subsequent revisions clarified rules on third-party data collection, sensitive data usage, and opt-out preference signals.

These amendments reflect the ongoing effort to balance privacy rights with business practicalities.

Additional reading

ISO 27001 Principles

Three Main ISO 27001 Principles

As a cloud-hosted organization, is your data secure? Can you be sure of its safety at all times? Do your data protection controls and measures align with those of the global requirement? The answer isn’t as simple as a yes or no; it’s something much more complex.  That is why implementing (International Organization for Standardization)…
Cyber Threat Intelligence Feeds

From Data to Defense: How Cyber Threat Intelligence Feeds work?

In an unexpected turn of events, Taylor Swift’s record-breaking tour faced a challenge off-stage. While fans celebrated the musical spectacle, cybercriminals were orchestrating their own performance behind the scenes.  Reports emerged of a massive data breach affecting millions of customers, with sensitive information potentially exposed on illicit online marketplaces. This incident highlights a growing concern:…
risk matrix with impact score

Enterprise Risk Management: Frameworks, Implementation, Cost

Every business choice you make has some inherent risk to it—some very small, such as setting your password policy right, while others are much bigger, like entering a new market. Just think about it—what if the supplier doesn’t deliver? Or what if the compliance requirements in a new geography are vastly different from what you…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.