Glossary of Compliance
Compliance Glossary
Our list of curated compliance glossary offers everything you to know about compliance in one place.
CCPA Ammendments
Since its initial implementation in 2018, the California Consumer Privacy Act has undergone a December 2020: The fourth iteration defined offline interaction requirements and reinstated the opt-out button.
- In February 2020, revised laws made it clear that loyalty programs would not be viewed as discriminatory and included the idea of an opt-out button
- The ability to place an opt-out button next to a “Do Not Sell” link and the ban on pre-selecting opt-in options were eliminated in a second round of changes, in March 2020
- The final CCPA regulations were authorized by the Office of Administrative Law, in August 2020. Among the revisions were the removal of the need for express agreement for using personal information for purposes that materially differ from one another.
- A third series of changes defined rules for companies handling the personal information of children and included guidelines on opt-out notifications in physical establishments.Â
- In December 2020, the fourth iteration defined offline interaction requirements and reinstated the opt-out button.Â
- Additional regulations banned “dark patterns” that obscure the opt-out process and clarified rules for authorized agents.
- The California Privacy Protection Agency (CPPA) released draft regulations addressing enforcement, audit rights, and updated CCPA terminology. Subsequent revisions clarified rules on third-party data collection, sensitive data usage, and opt-out preference signals.
These amendments reflect the ongoing effort to balance privacy rights with business practicalities.
Additional reading
Three Main ISO 27001 Principles
As a cloud-hosted organization, is your data secure? Can you be sure of its safety at all times? Do your data protection controls and measures align with those of the global requirement? The answer isn’t as simple as a yes or no; it’s something much more complex. That is why implementing (International Organization for Standardization)…
From Data to Defense: How Cyber Threat Intelligence Feeds work?
In an unexpected turn of events, Taylor Swift’s record-breaking tour faced a challenge off-stage. While fans celebrated the musical spectacle, cybercriminals were orchestrating their own performance behind the scenes. Reports emerged of a massive data breach affecting millions of customers, with sensitive information potentially exposed on illicit online marketplaces. This incident highlights a growing concern:…
Enterprise Risk Management: Frameworks, Implementation, Cost
Every business choice you make has some inherent risk to it—some very small, such as setting your password policy right, while others are much bigger, like entering a new market. Just think about it—what if the supplier doesn’t deliver? Or what if the compliance requirements in a new geography are vastly different from what you…

Sprinto: Your growth superpower
Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.
