

The issued draft regulations on CCPA risk assessments and cybersecurity audits by the California Privacy Protection Agency (CPPA) give you an idea of how to comply with imminent obligations
The California Privacy Protection Agency (CPPA) issued draft regulations on risk assessment and cybersecurity audits under the CCPA (California Consumer Privacy Act) as amended by the
Explore more privacy compliance insights and best practices
The draft rules on cybersecurity audit regulations are part of the rulemaking process arising from the CPRA amendments, which granted the Agency the right to set specific rules in compliance with specific provisions of the act. The CPPA releases draft regulations for CCPA data privacy issues. You can see the full list of CCPA regulations here.
It is important to note that the actual rulemaking process is not done yet. According to the note in the draft regulations, "The Agency has not yet started the formal rulemaking process for cybersecurity audits, risk
assessments, or automated decision-making technology. The draft text in this document is intended
to facilitate Board discussion and public participation and is subject to change."
Simply put, it means that parts of the new regulations are subject to CPPA board meeting decisions and are subject to preliminary comments on proposed rulemaking. That means they may be changed eventually.
Nevertheless, we read them for you and extracted the most important requirements. You need to know them because the draft regulations provide an idea of what will be required for compliance with the CCPA once the text is finalized and becomes obligatory for CCPA-bound businesses.
There are two separate documents:
Every CCPA-covered business whose processing of personal information of consumers poses a significant risk to consumers' privacy. The regulations also prescribe what processing activities are considered to present significant risk to consumers, which include:
In all these cases, the processing of personal information presents a significant risk to consumers; therefore, you need to assess your risks.
The CCPA risk assessment must include the following elements:
The risk assessment must be updated every time there are changes to privacy practices that would affect its content.
On top of the previously mentioned risk assessment content requirements, businesses that process data for automated decision-making, such as credit scoring companies, recruitment companies, and others, need to include a bit more information.
They need to explain in plain language:
On top of all the requirements mentioned above, if a company uses personal data to train AI or automated decision-making tools and shares them with others, it must give a clear explanation of how others should properly use the AI or tool. The business must document in its risk evaluation how it has shared or intends to share the necessary information with others and the safety precautions it has put in place or intends to put in place to ensure that others use the AI or automated tool correctly.
If you use personal data to develop AI or automated decision-making tools and sell them to other businesses, you must give those businesses all the needed information so they can carry out their own risk evaluations and put them on paper.
Learn how artificial intelligence (AI) impacts personal data protection and how to comply with GDPR and CCPA regulations while using AI. Discover key insights on privacy, risks, and essential compliance steps
Some businesses must conduct cybersecurity audits to prove compliance with the CCPA. It is not yet clear who will have the duty to do so.
The proposed regulations propose a threshold of at least 50% of revenue derived from sales or shared personal data. However, we can expect more alternative thresholds to be added. The possible ones include the number of employees, annual revenue, and the number of consumers whose personal data has been processed by the business.
There are a few basic requirements that cybersecurity audits must meet:
The CCPA draft regulations related to cybersecurity prescribe the scope of the audits. The cybersecurity audit will evaluate and record the company's cybersecurity measures, considering its size, complexity, and data processing activities, while also considering current technology and the costs of implementation.
It is not clear yet whether only certain activities will fall under the audit scope or all the processing of personal data.
The audit must specifically evaluate and record different parts of the company's cybersecurity measures. If a component isn't relevant, the audit will note and explain why it isn't needed for protecting personal information and how the existing safeguards offer equal security.
The proposed components include multi-factor authentication, encryption, zero-trust architecture, secure configuration of hardware and software, audit-log management, training, and other safeguards you would expect in cybersecurity programs.
The assessment shall list all the safeguards one-by-one and explain how each one is being used. If it is not used, then you need to explain why it is not applicable.
It must also contain details on the notifications if any, and details on the persons conducting the audit.
Finally, the audit needs to point out existing weaknesses that pose a threat to consumers' data privacy or even present a significant risk to consumers.
After the CPRA amendments to the CCPA, it applies to every company in the world if:
To prepare for the duties arising from the regulations on cybersecurity audits and risk assessment, we propose that you be prepared no matter what, because:
These regulations have at least a few months to come into effect. We'll keep you updated on their requirements.