CPPA Finalizes CCPA Regulations on Automated Decision-Making Technology, Risk Assessments and Cybersecurity Audits
4 Minute Read
July 29, 2025
On July 24, 2025, the California Privacy Protection Agency (“CPPA”) finalized California Consumer Privacy Act (“CCPA”) regulations on automated decision-making technology, risk assessments and cybersecurity audits (the “Regulations”), following a lengthy rulemaking process. The new Regulations will take effect once approved by California’s Office of Administrative Law.
- Automated Decision-Making Technology (ADMT): The Regulations impose stricter requirements on the use of ADMT. For example, businesses must allow consumers to opt out of the use of ADMT when the technologies replace or substantially replace human judgment. The definition of “human involvement” under the Regulations means reviewers must be able to understand and evaluate output generated by ADMT, review the output and alter final decisions.
- Compliance deadline: January 1, 2027.
- Risk Assessment: Companies must conduct risk assessments when engaged in certain processing, including “selling” or “sharing” personal information (as those terms are broadly defined under the CCPA), processing “sensitive personal information” (as defined under the CCPA), using ADMT to make significant decisions or using personal information to train ADMT, or when using automated technology to infer personal attributes under certain circumstances.
- Compliance deadline: December 31, 2027.
- Cybersecurity Audits: The Regulations introduce mandatory annual cybersecurity audits that are conducted by qualified, objective, independent professionals using accepted auditing standards (g., standards adopted by the American Institute of CPAs). The Regulations stipulate that such auditors (which may be internal or external to the organization) must have knowledge of cybersecurity and how to audit a business’s cybersecurity program. The audits must assess the business’s cybersecurity program’s compliance with a variety of data security measures, including secure user authentication, encryption of personal information, account management and access controls, inventory and management of personal information, secure configuration of hardware and software, vulnerability scans, penetration testing, audit-log management, network monitoring and defenses, antivirus/antimalware protections, network segmentation, vendor management, data retention schedules, data disposal, incident response, and cybersecurity training, among other items. The audits must provide detailed disclosures, including the scope of the review, policies assessed, criteria applied, and supporting documentation. Businesses must document remediation plans for identified compliance gaps and retain audit records for five years. Businesses must complete and submit to the CPPA a written certificate of compliance by April 1 of the following year.
- Compliance deadline:
- April 1, 2028 (for businesses with over $100 million in annual gross revenue)
- April 1, 2029 (for businesses with annual gross revenue of between $50 million and $100 million)
- April 1, 2030 (for businesses with annual gross revenue less than $50 million)
- Compliance deadline:
To prepare for these new requirements, businesses should:
- ADMT
- Audit their use of ADMT to determine if it replaces human judgment.
- Build in a clear consumer opt-out mechanism for ADMT use.
- Ensure humans can review, understand, and override ADMT decisions.
- Train personnel on the new ADMT rules and processes.
- Risk Assessments
- Determine whether the business “sells” or “shares” personal information, processes sensitive personal information, uses personal information to train ADMT, uses ADMT for significant decisions, or uses ADMT to infer consumers’ personal traits.
- Conduct thorough risk assessments on these activities.
- Document risks and fix compliance gaps.
- Cybersecurity Audits
- Engage a qualified auditor with proven cybersecurity knowledge and auditing expertise (either internal or external).
- Audit the business’s cybersecurity program to ensure it meets the requirements set forth in the Regulations.
- Prepare detailed audit report that documents the scope of the review, policies assessed, criteria applied, and all supporting documentation.
- Identify compliance gaps.
- Create and track remediation plans to fix issues promptly.
- Complete and submit a written certificate of compliance to the CPPA. Retain all audit records and documentation for 5 years.
Tags: Audits, Automated Decisionmaking, California, CPPA, Personal Data, Personal Information, Risk Assessment
Search
Recent Posts
Categories
- Behavioral Advertising
- Centre for Information Policy Leadership
- Children’s Privacy
- Cyber Insurance
- Cybersecurity
- Enforcement
- European Union
- Events
- FCRA
- Financial Privacy
- General
- Health Privacy
- Identity Theft
- Information Security
- International
- Marketing
- Multimedia Resources
- Online Privacy
- Security Breach
- U.S. Federal Law
- U.S. State Law
- Workplace Privacy
Tags
- Aaron Simpson
- Accountability
- Adequacy
- Advertisement
- Advertising
- Age Appropriate Design Code
- Age Verification
- American Privacy Rights Act
- Anna Pateraki
- Anonymization
- Anti-terrorism
- APEC
- Apple Inc.
- Argentina
- Arkansas
- Article 29 Working Party
- Artificial Intelligence
- Audit
- Audits
- Australia
- Austria
- Automated Decisionmaking
- Baltimore
- Bankruptcy
- Behavioral Advertising
- Belgium
- Biden Administration
- Big Data
- Binding Corporate Rules
- Biometric Data
- Blockchain
- Bojana Bellamy
- Brazil
- Brexit
- British Columbia
- Brittany Bacon
- Brussels
- Business Associate Agreement
- BYOD
- California
- CAN-SPAM
- Canada
- Cayman Islands
- CCPA
- CCTV
- Chile
- China
- Chinese Taipei
- Christopher Graham
- CIPA
- Class Action
- Clinical Trial
- Cloud
- Cloud Computing
- CNIL
- Colombia
- Colorado
- Committee on Foreign Investment in the United States
- Commodity Futures Trading Commission
- Compliance
- Computer Fraud and Abuse Act
- Congress
- Connecticut
- Consent
- Consent Order
- Consumer Protection
- Consumer Rights
- Cookies
- COPPA
- Coronavirus/COVID-19
- Council of Europe
- Council of the European Union
- Court of Justice of the European Union
- CPPA
- CPRA
- Credit Monitoring
- Credit Report
- Criminal Law
- Critical Infrastructure
- Croatia
- Cross-Border Data Flow
- Cross-Border Data Transfer
- Cyber Attack
- Cybersecurity and Infrastructure Security Agency
- Data Brokers
- Data Controller
- Data Localization
- Data Privacy Framework
- Data Processor
- Data Protection Act
- Data Protection Authority
- Data Protection Impact Assessment
- Data Transfer
- David Dumont
- David Vladeck
- Deceptive Trade Practices
- Delaware
- Denmark
- Department of Commerce
- Department of Health and Human Services
- Department of Homeland Security
- Department of Justice
- Department of the Treasury
- Department of Treasury
- Design
- Digital Markets Act
- District of Columbia
- Do Not Call
- Do Not Track
- Dobbs
- Dodd-Frank Act
- DORA
- DPIA
- E-Privacy
- E-Privacy Directive
- Ecuador
- Ed Tech
- Edith Ramirez
- Electronic Communications Privacy Act
- Electronic Privacy Information Center
- Electronic Protected Health Information
- Elizabeth Denham
- Employee Monitoring
- Encryption
- ENISA
- EU Data Protection Directive
- EU Member States
- European Commission
- European Data Protection Board
- European Data Protection Supervisor
- European Parliament
- European Union
- Facial Recognition Technology
- FACTA
- Fair Credit Reporting Act
- Fair Information Practice Principles
- Federal Aviation Administration
- Federal Bureau of Investigation
- Federal Communications Commission
- Federal Data Protection Act
- Federal Trade Commission
- FERC
- Financial Data
- FinTech
- Florida
- Food and Drug Administration
- Foreign Intelligence Surveillance Act
- France
- Franchise
- Fred Cate
- Freedom of Information Act
- Freedom of Speech
- Fundamental Rights
- GDPR
- Geofencing
- Geolocation
- Geolocation Data
- Georgia
- Germany
- Global Privacy Assembly
- Global Privacy Enforcement Network
- Gramm Leach Bliley Act
- Hacker
- Hawaii
- Health Data
- HIPAA
- HITECH Act
- Hong Kong
- House of Representatives
- Hungary
- Illinois
- India
- Indiana
- Indonesia
- Information Commissioners Office
- Information Sharing
- Insurance Provider
- Internal Revenue Service
- International Association of Privacy Professionals
- International Commissioners Office
- Internet
- Internet of Things
- Iowa
- IP Address
- Ireland
- Israel
- Italy
- Jacob Kohnstamm
- Japan
- Jason Beach
- Jay Rockefeller
- Jenna Rode
- Jennifer Stoddart
- Jersey
- Jessica Rich
- John Delionado
- John Edwards
- Kentucky
- Korea
- Latin America
- Laura Leonard
- Law Enforcement
- Lawrence Strickling
- Legislation
- Liability
- Lisa Sotto
- Litigation
- Location-Based Services
- London
- Louisiana
- Madrid Resolution
- Maine
- Malaysia
- Maryland
- Massachusetts
- Meta
- Mexico
- Michigan
- Microsoft
- Minnesota
- Missouri
- Mobile
- Mobile App
- Mobile Device
- Montana
- Morocco
- MySpace
- Natascha Gerlach
- National Institute of Standards and Technology
- National Labor Relations Board
- National Science and Technology Council
- National Security
- National Security Agency
- National Telecommunications and Information Administration
- Nebraska
- NEDPA
- Netherlands
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- New Zealand
- Nigeria
- Ninth Circuit
- North Carolina
- North Dakota
- North Korea
- Norway
- Obama Administration
- OCPA
- OECD
- Office for Civil Rights
- Office of Civil Rights
- Office of Foreign Assets Control
- Ohio
- Oklahoma
- Online Behavioral Advertising
- Online Privacy
- Opt-In Consent
- Oregon
- Outsourcing
- Pakistan
- Parental Consent
- Payment Card
- PCI DSS
- Penalty
- Pennsylvania
- Personal Data
- Personal Health Information
- Personal Health Information
- Personal Information
- Personally Identifiable Information
- Peru
- Philippines
- Poland
- PRISM
- Privacy By Design
- Privacy Notice
- Privacy Policy
- Privacy Rights
- Privacy Rule
- Privacy Shield
- Profiling
- Protected Health Information
- Ransomware
- Record Retention
- Red Flags Rule
- Rhode Island
- Richard Thomas
- Right to Be Forgotten
- Right to Privacy
- Risk Assessment
- Risk-Based Approach
- Rosemary Jay
- Russia
- Safe Harbor
- Sanctions
- Schrems
- Scott Kimpel
- Securities and Exchange Commission
- Security Rule
- Senate
- Sensitive Data
- Serbia
- Service Provider
- Singapore
- Smart Grid
- Smart Metering
- Social Media
- Social Security Number
- South Africa
- South Carolina
- South Dakota
- South Korea
- Spain
- Spyware
- Standard Contractual Clauses
- State Attorneys General
- States Attorney General
- Steven Haas
- Stick With Security Series
- Stored Communications Act
- Student Data
- Supreme Court
- Surveillance
- Sweden
- Switzerland
- Taiwan
- Targeted Advertising
- Telecommunications
- Telemarketing
- Telephone Consumer Protection Act
- Tennessee
- Terry McAuliffe
- Texas
- Text Message
- Thailand
- Transparency
- Transportation Security Administration
- Trump Administration
- United Arab Emirates
- United Kingdom
- United States
- Unmanned Aircraft Systems
- Uruguay
- Utah
- Vermont
- Video Privacy Protection Act
- Video Surveillance
- Virginia
- Viviane Reding
- Washington
- Whistleblowing
- Wireless Network
- Wiretap
- ZIP Code