Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » CCPA » CCPA Compliance

CCPA Compliance

CCPA, or California Consumer Privacy Act, is a set of compliance guidelines aimed at protecting data belonging to residents of the state of California. It came into effect on January 1, 2020, and is considered one of the most stringent privacy laws in the United States. It applies to all organizations, regardless of where the business is located, that:

  • Process more than 100,000 personal data (B2B data included) of California citizens annually
  • Have more than $25 million in revenue annually
  • Earn more than 50% of revenue from selling California residents’ data

According to the CCPA guidelines, personal data can include details such as names, Social Security numbers, email addresses, birthdates, passport numbers, IP addresses, phone numbers, driver’s license numbers, residential addresses, and bank account details.

The CCPA protects the customers for their right to choose not to sell their data and the right of access and deletion of the data collected. Organizations that violate the CCPA may face fines of $7,500 per violation and $750 per user affected in civil damages.

The CCPA compliance requires an organization to have a process for responding to customer privacy rights exercise requests. In addition, businesses should collect less personal information except when it is absolutely necessary.

An inventory of all the data collected by an organization is set up, and customers are given notice of the collection of data. A data privacy policy is established, the employees are trained, and requests from customers are handled effectively.

Additional reading

Essential Strategies for Effective Cybersecurity Training

Essential Cybersecurity Training for Employees: Free and Paid Options

Your strongest defences are only as effective as your employees enforcing them. Malicious actors often use weak practices as entry points for cyber attacks. Most of these are exploitable weaknesses such as weak passwords, shadow IT, and unguarded devices. This is where cybersecurity training can be the difference. It forms the initial layer of security….
audit trail

Audit trail: What it is, how it works, and why it matters?

As per a report by Security Intelligence, noncompliance with regulations costs firms about $15 million. Audit trails are your digital footprint that helps to ensure accountability and compliance. They are the watchdogs of regulations, the unsung heroes of digital transparency, and the trail of truth.  In this article, we unravel the complex world of audit…
CIS vs NIST

CIS vs. NIST: Which Framework is Right For Your Business? 

Designing and managing security architecture is a multifaceted task, and doing so without proper guidance can be challenging. Thankfully, numerous security frameworks are available to provide direction for your business.  Two primary models in cyber security that are generally recognized internationally are CIS (Center for Internet Security) and NIST (National Institute of Standards and Technology)….

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.