Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » CCPA » Right of Data Portability

Right of Data Portability

The right of data portability is a privacy right that allows individuals to request their personal data from a service provider in a structured, easily understood, and machine-readable format. With this right, customers can transfer their data to another service provider without hindrance.

Under CCPA (California Consumer Privacy Act), the right of data portability falls under the broader scope of Right of Access to one’s personal information collected by a business. 

The right of data portability applies to the personal information that a business has collected from the consumer over the 12 months preceding the request.

The right can be exercised on the part of the customer by raising a request by submitting an online form, calling a toll-free number, or sending an e-mail to the business. Within 10 days of receiving the request, the business needs to confirm its receipt and provide the information within 45 days.

If the same has not been received within that said period, then the business will extend this period by another 45 days; however, for this, they must notify the customer and state the reason for such a delay.

Failure to comply with a valid data portability request may yield severe penalties under the CCPA, including fines of up to $7,500 per violation if found intentional. Beyond that, it would also severely dent a business’s reputation and chances of consumers trusting their business and subsequently facing lawsuits.

Additional reading

Breaking Down Malware Statistics What They Reveal About Cyber Threats Today

Breaking Down Malware Statistics: What They Reveal About Cyber Threats Today

Malware has evolved substantially since its humble beginnings as experimental pranks or minor exploits. In 2023, there were 6.06 billion documented malware attacks worldwide, a 10% rise over the previous year.  To put things in perspective; 90,000 new malware attacks happen every second and nearly 90% of all cyber threats are phishing or social engineering…

Risk Assessment Matrix: What Is It + How to Create It

Imagine this: You’re in your weekly team sync. Someone flags a possible vendor breach. A few minutes later, the conversation shifts to a product misconfiguration that might expose customer data. Then there’s a mention of a delayed compliance audit because someone missed a control update. These things come up often. Each one feels serious in…
Security posture

What Is Security Posture and Why It Matters?

According to data by SpaceLift, over 96% of businesses are using public cloud systems rather than on-premise systems. While this is no surprise due to the massive adoption of cloud infrastructure, the problem begins when providers and customers are not aware of the vulnerabilities in their security posture, which can lead to data breaches, account…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.