Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » CCPA » Right of Access

Right of Access

California customers have the ability to obtain particular information about the personal data gathered about them from businesses under the CCPA right of access, sometimes known as the right to know. This information includes:

Under the CCPA, the Right of Access grants the residents of California the following entitlements:

  1. Disclosure of collection: Consumers can request that businesses disclose the categories of personal information collected about them over the past 12 months.
  2. Specific pieces of information: Consumers have the right to obtain the actual pieces of personal information a business has collected about them.
  3. Sources of information: Businesses must disclose the sources from which the personal information was collected.
  4. Purpose of collecting information:  Consumers can request information about the business or commercial purpose for collecting or selling their personal information.

Companies are required to disclose the kind of third parties to whom they sell or share a customer’s personal data.

Customers usually file a verifiable consumer request to the firm in order to exercise this entitlement. According to the CCPA, companies must reply to these requests within 45 days, giving the customer advance notice of any potential 45-day extension if it is deemed necessary.

Companies must give this information away for free, no more than twice in a calendar year. The data must be provided in an easily readable manner that enables the user to send the data to another organization without difficulty.

There are limits to the right of access. In certain situations, businesses may refuse or restrict access requests. These situations include when allowing access would violate the rights of others, when the information is protected by legal privilege, or when the request is obviously excessive or unwarranted.

Additional reading

A Beginner’s Guide to the SOC 2 Trust Principles

SOC 2 Trust Service Principles – Detailed Guide

One of the first decisions you would make after deciding to get SOC 2 compliant is selecting the SOC 2 Trust Service Principles for your audit. The SOC 2 Principles, also called the SOC 2 Trust Services Criteria, form the foundation on which the entire scope, process, and audit of the framework is built. It…
Top ISMS Frameworks 2024: ISO 27001, COBIT, NIST SP 800-53 Explained

List of ISMS Frameworks: How to Choose the Right One 

One of the best ways to adhere to security best practices is using a compliance framework. These guidelines offer a practical, step-by-step, and holistic approach to manage, monitor, implement, and maintain your security objectives. ISMS frameworks are the gold standard of improving posture and gaining customer trust. Let’s understand the most popular ISMS frameworks in…
iso 27001 scope statement

ISO 27001 Scope Statement: Ultimate Guide

Just like how a building is only as good as its foundation, your ISO 27001 certification is only as good as the scope of your Information Security Management Systems (ISMS). Writing the scope statement, therefore, is undeniably one of the most critical things you will do when you kickstart your ISO 27001 compliance journey. To…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.