Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireTechnologies & SolutionsCybersecurity News

How to navigate the new Colorado Privacy Act (CPA)

privacy freepik
June 11, 2021

The Colorado Privacy Act (CPA) passed yesterday in the state's senate and will go into effect in July 2023 – creating an additional  regulation that organizations must comply with or face hefty fines and eroding consumer trust. Colorado is the third state to enact a cross-industry privacy law, following following Virginia’s Consumer Data Protection Act (CDPA) and the California Consumer Privacy Act (CCPA). 

As noted by JD Supra, the CPA will be enforced by the attorney general or district attorneys. There is not a private right of action, but violations do constitute a deceptive trade practice, and penalty amounts are up to $2,000 per violation with a maximum of $500,000 for related violations. 

The CPA applies to legal entities that conduct business or produce commercial products or services that are intentionally targeted at Colorado residents, JD Supra says, and that either:

  • Control or process personal data of more than 100,000 consumers per calendar year; or
  • Derive revenue from the sale of personal data and control or process the personal data of at least 25,000 consumers.

According to JD Supra, the CPA provides Consumer Access Rights including:

  • The right to receive a copy of the personal data the business is processing;
  • The right to know what data is collected and the processing and sharing activities;
  • The right to correct any inaccurate personal data;
  • The right to delete;
  • The right to opt-out of processing of personal data (for targeted advertising, profiling, and sale); and
  • An appeals process for refusal of any rights.

In addition, organizations are required to ensure they operate from common privacy principles, such as purpose specification, data minimization, purpose limitation and duty of care.

Without one federal law in place, more states will  continue to pass consumer data protection legislation, making it challenging for businesses that operate in multiple jurisdictions to navigate a fractured regulatory landscape. Fortunately, there are ways that businesses can prepare for this privacy regulation onslaught, says and David Valovcin, Senior Director, Global Data Security for Imperva.

“Organizations are overwhelmed by the onslaught of multiple privacy regulations and most are not prepared to meet the coming compliance challenges,” said David Valovcin, Senior Director, Global Data Security for Imperva.  “At the same time, the definition of personally identifiable information keeps expanding, going beyond social security numbers to include political affiliations, religion and even IP addresses. Furthermore, most organizations don’t know where their PII data is stored, how it is controlled or who has access to it. Fortunately, there are new ways to streamline these processes, allowing organizations to automate compliance initiatives.”

Heather Paunet, Senior Vice President at Untangle, a San Jose, Calif.-based provider of comprehensive network security for SMBs, explains, "As businesses navigate privacy laws, it can begin to look a bit like word soup: General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA), Consumer Data Protection Act (CDPA) and now the Colorado Privacy Act (CPA). However, most companies that operate in the U.S. and internationally will have gone through various steps for the European Union’s GDPR rules, as well as the CCPA. Having already complied with these regulations will make it easier to make it easier to comply with the CPA."

Paunet adds that to ensure compliance with current, and new regulations, businesses need to understand the data they’re taking in and who has access. "The Colorado law, with similar versions in CCPA and CDPA, includes a requirement to conduct a data protection assessment. This is an important step that any business collecting consumer data should begin. Businesses will need to understand what is being collected, and how to protect customer data while also continuing employee education about data ownership and protection," Paunet explains. "In addition, businesses will need an effective strategy to communicate when customer information may be sold or disclosed for business-related purposes. Transparency in data collection will be a foundational pillar for businesses looking to maintain a trusting relationship with their customers."

According to Venture Beat, while CCPA has a global annual revenue threshold that essentially applies to every company over a certain size, the Colorado law — like the Virginia law — does not. Rather, the CPA is applicable to companies that either collect personal data from 100,000 Colorado residents or collect data from 25,000 Colorado residents and also derive some portion of revenue from sales.

Monti Knode, Director of Customer & Partner Success at Horizon3.AI, a continuous automated security assessment and validation company, says, "What I love about this Act is that it goes above the CCPA, where companies processing this data will be assessed; what I don't like is that the Act does not specify frequency. The last thing any of us--government, industry, and citizens--need are more annual compliance standards that gear up for a test and gear down the rest of the time. What we all need is continuous assessment. With escalating data theft, ransomware attacks, and AI-enabled credential attacks, anything less is irresponsible.  Risk is persistent, so assessment and verification should be as well."

In addition, Venture Beat reports, the process required to respond to a privacy request, how long the business has to respond, and individual exceptions businesses may use to resist complying with a privacy request, for example, all differ between Colorado, California, and Virginia.

"The mounting requirements from compliance simply reflects that people care about how their personal data is handled -- and wish to see the data more respectfully and transparently. From a company's standpoint, this is a major opportunity to add visibility into how data flows and is used inside their organization -- compliance is a good forcing function, but most organizations will find that visibility can drive top-line revenue and save on cloud costs," Mohit Tiwari, Co-Founder and CEO at Symmetry Systems, a San Francisco, Calif.-based provider of cutting-edge Data Store and Object Security (DSOS).

Tiwari adds, "For example, visibility into data enables responsible sharing and allows analysts to work with the freshest purchase and partner/supplier data; or removing dormant data and permissions improves cloud cost while driving down risk. As a result, I'd encourage organizations to not settle for a web-service that simply orchestrates privacy requests among developers and privacy officers, and look into more substantive tools to observe and protect data in their hybrid cloud."

 

KEYWORDS: consumer protection cyber security data security privacy laws risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Model globe on a desk

    Navigate the new European AI Act and possible global standardization

    See More
  • consumers using california consumer privacy protection act right away

    Research shows how consumers are using the California Consumer Privacy Act

    See More
  • cyber-shield

    The perfect storm: Finding new ways to navigate and mitigate the cybersecurity pandemic

    See More

Related Products

See More Products
  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products

Events

View AllSubmit An Event
  • January 14, 2026

    Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

    The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing