Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

What does the CPRA mean for US businesses?

By Anas Baig
data privacy cyber security
March 23, 2022

Acronyms such as the CCPA, GDPR and CPRA have become all too common today. When the California Consumer Privacy Act (CCPA) went into effect on January 1, 2020, the legislation started a conversation amongst businesses dealing with California residents regarding how to adapt and comply with what’s considered one of the harshest pieces of consumer-focused digital privacy legislation.

With the CCPA in effect, businesses that fall under the scope of the law have had to make a considerable number of changes in the way their websites and other digital assets collect, process and share the personal data of California residents. Changes such as amending outdated privacy policies, implementing safeguards, honoring data subject rights, issuing prompt data breach notifications and more are just some of the requirements.

Goodbye CCPA, hello CPRA

However, the extension of the CCPA came shortly after its enactment and is known as the California Privacy Rights Act (CPRA). The CPRA is California’s version of the European Union's General Data Protection Regulation (GDPR), as it takes inspiration from perhaps the most stringent data privacy law as of today. The CPRA was signed into law in November 2020 and will take effect on January 1, 2023.

Among several new provisions, the CPRA includes provisions that allow California residents to opt out of firms sharing their personal information; imposes hefty penalties on businesses that violate the state's data privacy rules; and establishes a new enforcement agency to govern the law.

Even though the CPRA is California state legislation, it will have far-reaching implications for businesses across and outside the country that deal with California residents. By simply interacting with California residents, businesses must ensure they comply with the requirements of the CPRA.

CPRA’s effects on U.S. enterprise

Although most of the CPRA's provisions will not be implemented until January 2023 and enforcement will not begin until July 2023, the law will apply to businesses acquiring information of California residents starting in January 2022.

Before a business within or outside of the U.S. begins to comply with the CPRA, they must ensure the following:

Applicability

Organizations meeting any of these eligibility requirements are subject to the law:

  • Annual gross revenues greater than $25 million in the preceding calendar year
  • Handling the data of 100,000 or more consumers
  • At least 50% of revenue from selling or sharing data

Suppose a business falls under the category as highlighted by the CPRA. In that case, they must ensure their operations comply with the law’s requirements to avoid penalties and reputational damage.

Update policies & practices

Under the CPRA, businesses need to develop and/or change processes to allow users, employees and other individuals engaging with the business to exercise their new data privacy rights. Businesses will have to devise opt-out functionality and honor such requests.

Additionally, businesses must update their websites, other digital domains and privacy policies to reflect compliance with CPRA’s additional requirements. The website should also offer visitors an option to opt-out from the sharing and selling of their personal information.

Improve security safeguards

Since the CPRA empowers California residents to reach out to businesses that process or share their personal information without permission and even file lawsuits, businesses should immediately prepare to beef up their cybersecurity defenses.

The last thing a business wants is to fall victim to a data breach without having the necessary safeguards and exposing the data subject's personal information. In that case, the business would not only face the wrath of the regulatory body, but also get slammed with lawsuits and massive penalties.

Sensitive personal information

Taking inspiration from the EU’s GDPR, the CPRA has announced a new sub-category of personal information called Sensitive Personal Information. It refers to higher-risk, sensitive information about an individual that, if made public or landed in the wrong hands, might cause considerable harm to that individual. Cybersecurity leaders should familiarize themselves with this classification and protect it an appropriate amount.

Prioritize data subject rights

Consumers can prevent organizations from using, disclosing, or exchanging their sensitive personal information with third parties. If a customer requests to access their personal information, the business must disclose the categories of personal information collected, disclosed, sold and shared with others.

Additionally, businesses need to detail the categories of sources from where the personal information is collected, the commercial purposes for collecting, selling, or sharing, and the categories of third parties with whom the personal information is shared. For example, the CPRA forbids the sale of personal information without the consent of those under the age of 16. Children between the ages of 13 and 16 have the freedom to consent. As for those under 13, their parents need to provide consent. Businesses must ensure that consent is being acquired freely, as the CPRA triples its penalty for infractions involving children's personal information under 16.

Conduct cybersecurity audits 

According to the CPRA, organizations whose processing of personal information "poses a serious risk to customers' privacy or security" must conduct an annual cybersecurity audit. Apart from conducting cybersecurity audits, businesses should regularly conduct Data Protection Impact Assessments to discover vulnerabilities and devise ways to minimize risk at the earliest opportunity.

Penalties

Under the CPRA, organizations can be penalized up to $7,500 for intentional violations and $2,500 for unintentional violations. Furthermore, if the organization knew that the personal information belonged to a minor, fines for offenses involving children’s personal information under 16 are $7,500 per infraction.

In light of these considerations, businesses in the U.S. and abroad should closely watch California laws and become familiar with the CPRA's new strict rules and criteria. The sooner CPRA’s regulations are understood and implemented across a business, the faster and less expensive compliance has to be.

KEYWORDS: California Consumer Privacy Act (CCPA) cyber security legislation data privacy enterprise cyber security GDPR personal identifiable information

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Baig headshot

With a passion for working on disruptive products, Anas Baig is currently working as a Product Marketing Manager at Securiti.

Baig holds a Degree in Computer Science from Iqra University. His interests include information security, data privacy and security. You can connect with him on LinkedIn.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC1218-career-Feat-slide1_900px

    Nearly 10 Million People Filed for Unemployment in the US: What Does It Mean for the Cybersecurity and IT Workforce?

    See More
  • Person looking at flight schedules

    REAL ID Enforcement in Effect — What Does This Mean for Biometric Data Security?

    See More
  • Video Surveillance as a Service will change come 5G

    What does 5G mean for VSaaS?

    See More

Related Products

See More Products
  • 150 things.jpg

    The Handbook for School Safety and Security

  • Physical Security and Safety: A Field Guide for the Practitioner

  • The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing