
- Products
- Services
- Solutions
By Regulation
- Resources
Our Latest Blog

- Partner With Us
By Regulation
Personnel are responsible for complying with Privacy Pillar Inc. policies when using Privacy Pillar Inc. Information Resources and/or on Privacy Pillar Inc. time. If requirements or responsibilities are unclear, please seek assistance from the Information Security Committee.
Personnel must promptly report harmful events or policy violations involving Privacy Pillar Inc. assets or information to their manager or a member of the Incident Handling Team. Events include, but are not limited to, the following:
Personnel should not purposely engage in activity that may
Personnel should not download, install, or run security programs or utilities that reveal or exploit weakness in the security of a system. For example, Privacy Pillar Inc. personnel should not run password cracking programs, packet sniffers, port scanners, or any other non-approved programs on any Privacy Pillar Inc. Information Resource.
All inventions, intellectual property, and proprietary information, including reports, drawings, blueprints, software codes, computer programs, data, writings, and technical information, developed on Privacy Pillar Inc. time and/or using Privacy Pillar Inc. Information Resources are the property of Privacy Pillar Inc.
Use of encryption should be managed in a manner that allows designated Privacy Pillar Inc. personnel to promptly access all data.
Privacy Pillar Inc. Information Resources are provided to facilitate company business and should not be used for personal financial gain.
Personnel are expected to cooperate with incident investigations, including any federal or state investigations.
Personnel are expected to respect and comply with all legal protections provided by patents, copyrights, trademarks, and intellectual property rights for any software and/or materials viewed, used, or obtained using Privacy Pillar Inc. Information Resources.
Personnel should not intentionally access, create, store or transmit material which Privacy Pillar Inc. may deem to be offensive, indecent, or obscene.
Access to information is based on a “need to know”.
Personnel are permitted to use only those network and host addresses issued to them by Privacy Pillar Inc. IT and should not attempt to access any data or programs contained on Privacy Pillar Inc. systems for which they do not have authorization or explicit consent.
All remote access connections made to internal Privacy Pillar Inc. networks and/or environments must be made through approved, and Privacy Pillar Inc. -provided, virtual private networks (VPNs).
Personnel should not divulge any access information to anyone not specifically authorized to receive such information, including IT support personnel.
Personnel must not share their (personal authentication information, including:
Access cards and/or keys that are no longer required must be returned to physical security personnel.
Lost or stolen access cards, security tokens, and/or keys must be reported to physical security personnel as soon as possible.
A service charge may be assessed for access cards, security tokens, and/or keys that are lost, stolen, or are not returned.
All personnel are required to maintain the confidentiality of personal authentication information.
Any group/shared authentication information must be maintained solely among the authorized members of the group.
All passwords, including initial and/or temporary passwords, must be constructed, and implemented according to the following Privacy Pillar Inc. rules:
Unique passwords should be used for each system, whenever possible.
User account passwords must not be divulged to anyone. Privacy Pillar Inc. support personnel and/or contractors should never ask for user account passwords.
If the security of a password is in doubt, the password should be changed immediately.
Personnel should not circumvent password entry with application remembering embedded scripts or hard coded passwords in client software.
Security tokens (i.e., Smartcard) must be returned on demand or upon termination of the relationship with Privacy Pillar Inc., if issued.
Personnel should log off from applications or network services when they are no longer needed.
Personnel should log off or lock their workstations and laptops when their workspace is unattended.
Confidential or internal information should be removed or placed in a locked drawer or file cabinet when the workstation is unattended and at the end of the workday if physical access to the workspace cannot be secured by other means.
Personal items, such as phones, wallets, and keys, should be removed or placed in a locked drawer or file cabinet when the workstation is unattended.
File cabinets containing confidential information should be locked when not in use or when unattended.
Physical and/or electronic keys used to access confidential information should not be left on an unattended desk or in an unattended workspace if the workspace itself is not physically secured.
Laptops should be either locked with a locking cable or locked away in a drawer or cabinet when the work area is unattended or at the end of the workday if the laptop is not encrypted.
Passwords must not be posted on or under a computer or in any other physically accessible location.
Copies of documents containing confidential information should be immediately removed from printers and fax machines.
Personnel should use approved encrypted communication methods whenever sending confidential information over public computer networks (Internet).
Confidential information transmitted via USPS or other mail services must be secured in compliance with the Information Classification and Management Policy.
Only authorized cloud computing applications may be used for sharing, storing, and transferring confidential or internal information.
Information must be appropriately shared, handled, transferred, saved, and destroyed, based on the information sensitivity.
Personnel should not have confidential conversations in public places or over insecure communication channels, open offices, and meeting places.
Confidential information must be transported either by a Privacy Pillar Inc. employee or a courier approved by IT Management.
All electronic media containing confidential information must be securely disposed. Please contact IT for guidance or assistance.
Auto-forwarding electronic messages outside the Privacy Pillar Inc. internal systems is prohibited.
Electronic communications should not misrepresent the originator or Privacy Pillar Inc.
Personnel are responsible for the accounts assigned to them and for the actions taken with their accounts.
Accounts must not be shared without prior authorization from Privacy Pillar Inc. IT, with the exception of calendars and related calendaring functions.
Employees should not use personal email accounts to send or receive Privacy Pillar Inc. confidential information.
Any personal use of Privacy Pillar Inc. provided email should not:
Personnel should only send confidential information using approved secure electronic messaging solutions.
Personnel should use caution when responding to, clicking on links within, or opening attachments included in electronic communications.
Personnel should use discretion in disclosing confidential or internal information in Out of Office or other automated responses, such as employment data, internal telephone numbers, location information or other sensitive data.
All hardware must be formally approved by IT Management before being connected to Privacy Pillar Inc. networks.
Software installed on Privacy Pillar Inc. equipment must be approved by IT Management and installed by Privacy Pillar Inc. IT personnel.
All Privacy Pillar Inc. assets taken off-site should be physically secured at all times.
Personnel traveling to a High-Risk location, as defined by FBI and Office of Foreign Asset control, must contact IT for approval to travel with corporate assets.
Employees should not allow family members or other non-employees to access Privacy Pillar Inc. Information Resources.
The Internet must not be used to communicate Privacy Pillar Inc. confidential or internal information, unless the confidentiality and integrity of the information is ensured, and the identity of the recipient(s) is established.
Use of the Internet with Privacy Pillar Inc. networking or computing resources must only be used for business-related activities. Unapproved activities include, but are not limited to:
Access to the Internet from outside the Privacy Pillar Inc. network using a Privacy Pillar Inc. owned computer must adhere to all of the same policies that apply to use from within Privacy Pillar Inc. facilities.
Privacy Pillar Inc. does not allow personally owned mobile devices to connect to the Privacy Pillar Inc. corporate internal network.
OR
The use of a personally owned mobile device to connect to the Privacy Pillar Inc. network is a privilege granted to employees only upon formal approval of IT Management.
All personally owned laptops and/or workstations must have approved virus and spyware detection/protection software along with personal firewall protection active.
Mobile devices that access Privacy Pillar Inc. email must have a PIN or other authentication mechanism enabled.
Confidential information should only be stored on devices that are encrypted in compliance with the Privacy Pillar Inc. Encryption Standard.
Privacy Pillar Inc. confidential information should not be stored on any personally owned mobile device.
Theft or loss of any mobile device that has been used to create, store, or access confidential or internal information must be reported to the Privacy Pillar Inc. Security Team immediately.
All mobile devices must maintain up-to-date versions of all software and applications.
All personnel are expected to use mobile devices in an ethical manner.
Jail-broken or rooted devices should not be used to connect to Privacy Pillar Inc. Information Resources.
Privacy Pillar Inc. IT Management may choose to execute “remote wipe” capabilities for mobile devices without warning (see Mobile Device Email Acknowledgement).
In the event that there is a suspected incident or breach associated with a mobile device, it may be necessary to remove the device from the personnel’s possession as part of a formal investigation.
All mobile device usage in relation to Privacy Pillar Inc. Information Resources may be monitored at the discretion of Privacy Pillar Inc. IT Management.
Privacy Pillar Inc. IT support for personally owned mobile devices is limited to assistance in complying with this policy. Privacy Pillar Inc. IT support may not assist in troubleshooting device usability issues.
Use of personally owned devices must be in compliance with all other Privacy Pillar Inc. policies.
Privacy Pillar Inc. reserves the right to revoke personally owned mobile device use privileges in the event that personnel do not abide by the requirements set forth in this policy.
Texting or emailing while driving is not permitted while on company time or using Privacy Pillar Inc. resources. Only hands-free talking while driving is permitted, while on company time or when using Privacy Pillar Inc. resources.
Photographic, video, audio, or other recording equipment, such as cameras and cameras in mobile devices, is not allowed in secure areas.
Personnel must display photo ID access card at all times while in the building.
Personnel must badge in and out of access-controlled areas.
Piggybacking, tailgating, door propping and any other activity to circumvent door access controls are prohibited.
Visitors accessing card-controlled areas of facilities must be accompanied by authorized personnel at all times.
Eating or drinking are not allowed in data centers. Caution must be used when eating or drinking near workstations or information processing facilities.
Information created, sent, received, or stored on Privacy Pillar Inc. Information Resources are not private and may be accessed by Privacy Pillar Inc. IT employees at any time, under the direction of Privacy Pillar Inc. executive management and/or Human Resources, without knowledge of the user or resource owner.
Privacy Pillar Inc. may log, review, and otherwise utilize any information stored on or passing through its Information Resource systems.
Systems Administrators, Privacy Pillar Inc. IT, and other authorized Privacy Pillar Inc. personnel may have privileges that extend beyond those granted to standard business personnel. Personnel with extended privileges should not access files and/or other information that is not specifically required to carry out an employment related task.
The use of removable media for storage of Privacy Pillar Inc. information must be supported by a reasonable business case.
All removable media use must be approved by Privacy Pillar Inc. IT prior to use.
Personally, owned removable media use is not permitted for storage of Privacy Pillar Inc. information.
Personnel are not permitted to connect removable media from an unknown origin without prior approval from the Privacy Pillar Inc. IT.
Confidential and internal Privacy Pillar Inc. information should not be stored on removable media without the use of encryption.
All removable media must be stored in a safe and secure environment.
The loss or theft of a removable media device that may have contained any Privacy Pillar Inc. information must be reported to the Privacy Pillar Inc. IT.
All new personnel must complete an approved security awareness training class prior to, or at least within 30 days of, being granted access to any Privacy Pillar Inc. Information Resources.
All personnel must be provided with and acknowledge they have received and agree to adhere to the Privacy Pillar Inc. Information Security Policies before they are granted access to Privacy Pillar Inc. Information Resources.
All personnel must complete the annual security awareness training.
Communications made with respect to social media should be made in compliance with all applicable Privacy Pillar Inc. policies.
Personnel are personally responsible for the content they publish online.
Creating any public social media account intended to represent Privacy Pillar Inc. , including accounts that could reasonably be assumed to be an official Privacy Pillar Inc. account, requires the permission of the Privacy Pillar Inc. Communications Departments.
When discussing Privacy Pillar Inc. or Privacy Pillar Inc. -related matters, you should:
Personnel should not misrepresent their role at Privacy Pillar Inc.
When publishing Privacy Pillar Inc. -relevant content online in a personal capacity, a disclaimer should accompany the content. An example disclaimer could be; “The opinions and content are my own and do not necessarily represent Privacy Pillar Inc. ’s position or opinion.”
Content posted online should not violate any applicable laws (i.e. copyright, fair use, financial disclosure, or privacy laws).
The use of discrimination (including age, sex, race, color, creed, religion, ethnicity, sexual orientation, gender, gender expression, national origin, citizenship, disability, or marital status or any other legally recognized protected basis under federal, state, or local laws, regulations, or ordinances) in published content that is affiliated with Privacy Pillar Inc. will not be tolerated.
Confidential information, internal communications and non-public financial or operational information may not be published online in any form.
Personal information belonging to customers may not be published online.
Personnel approved to post, review, or approve content on Privacy Pillar Inc. social media sites must follow the Privacy Pillar Inc. Social Media Management Procedures.
Personnel should use discretion in disclosing confidential or internal information in voicemail greetings, such as employment data, internal telephone numbers, location information or other sensitive data.
Personnel should not access another user’s voicemail account unless it has been explicitly authorized.
Personnel must not disclose confidential information in voicemail messages.
As a convenience to Privacy Pillar Inc. personnel, incidental use of Information Resources is permitted. The following restrictions apply:
Storage of personal email messages, voice messages, files and documents within Privacy Pillar Inc. Information Resources must be nominal .
All information located on Privacy Pillar Inc. Information Resources are owned by Privacy Pillar Inc. may be subject to open records requests and may be accessed in accordance with this policy.
Waivers from certain policy provisions may be sought following the Privacy Pillar Inc. Waiver Process.
Personnel found to have violated this policy may be subject to disciplinary action, up to and including termination of employment, and related civil or criminal penalties.
Any vendor, consultant, or contractor found to have violated this policy may be subject to sanctions up to and including removal of access rights, termination of contract(s), and related civil or criminal penalties.
We encourage you to report violations of this Acceptable Use Policy to Privacy Pillar Inc. immediately. If you have a question about whether a type of transaction may violate the Acceptable Use Policy, or wish to file a report, you can do so:
● By visiting this page on our website: https://privacypillar.com/contact
● By sending us an email: privacy@privacypillar.com
● 103 Carnegie Center Dr STE 300, Princeton, NJ. 08540
New Jersey Data Privacy Act (NJDPA)
Effective Date: January 15, 2025
| Applicability | Consumer Rights | Penalties |
|---|---|---|
| 100,000 consumer or 25,000+ consumers with 50% revenue from data sales |
Access, Delete, Correct, Opt-Out, Portability |
Up to $10,000 for 1st violation and up to $20,000 for subsequent violations |
Florida Digital Bill of Rights (FDBR)
Effective Date: July 1, 2024
| Applicability | Consumer Rights | Penalties |
|---|---|---|
| gross annual revenue of at least $1 billion or 50% or more revenue from targeted advertising | Access, Delete, Correct, Opt-Out, Portability |
Up to $50,000 per violation |
Rhode Island Data Transparency and Privacy Protection Act (RIDTPPA)
Effective Date: January 1, 2026
| Applicability | Consumer Rights | Penalties |
|---|---|---|
| 35,000 consumers or 10,000+ consumers with 20%+ revenue from data sales | Access, Delete, Correct, Opt-Out, Portability |
$10,000 per violation and between $100 – $500 for each intentional disclosure of personal data |
Dedicated Data Privacy Laws in Michigan
Michigan does not have a comprehensive consumer data privacy and protection law, nor are any bills making progress at this time. However, it is protected by some privacy-related legislation.
Indiana Consumer Data Protection Act (INCDPA)
Effective Date: January 1, 2026
| Applicability | Consumer Rights | Penalties |
|---|---|---|
| 100,000 consumers or 25,000+ consumers with data 50%+ revenue from data sales | Access, Delete, Correct, Opt-Out, Portability |
Up to $7,500 per violation |
Tennessee Information Protection Act (TIPA)
Effective Date: July 1, 2025
| Applicability | Consumer Rights | Penalties |
|---|---|---|
| 35,000 consumer or 10,000+ consumers with 20% revenue from data sales |
Access, Delete, Correct, Opt-Out, Portability |
Up to $7,500 per violation |
Kentucky Consumer Data Protection Act (KCDPA)
Effective Date: January 1, 2026
| Applicability | Consumer Rights | Penalties |
|---|---|---|
| 100,000 consumers or 25,000+ consumers with data 50%+ revenue from data sales | Access, Delete, Correct, Opt-Out, Portability |
Up to $7,500 per violation |
Minnesota Consumer Data Privacy Act (MCDPA)
Effective Date: July 31, 2025
| Applicability | Consumer Rights | Penalties |
|---|---|---|
| 100,000 consumers or 25,000+ consumers with data 25%+ revenue from data sales | Access, Delete, Correct, Opt-Out, Portability |
Up to $7,500 per violation |
Dedicated Data Privacy Laws in West_Virginia
West_Virginia does not have a comprehensive consumer data privacy and protection law, nor are any bills making progress at this time. However, it is protected by some privacy-related legislation.
Dedicated Data Privacy Laws in Washington D.C.
Washington D.C. does not have a comprehensive consumer data privacy and protection law, nor are any bills making progress at this time. However, it is protected by some privacy-related legislation.
Dedicated Data Privacy Laws in Washington
Washington does not have a comprehensive consumer data privacy and protection law, nor are any bills making progress at this time. However, it is protected by some privacy-related legislation.
Dedicated Data Privacy Laws in Wisconsin
Wisconsin does not have a comprehensive consumer data privacy and protection law, nor are any bills making progress at this time. However, it is protected by some privacy-related legislation.
Dedicated Data Privacy Laws in Alaska
Alaska does not have a comprehensive consumer data privacy and protection law, nor are any bills making progress at this time. However, it is protected by some privacy-related legislation.
Dedicated Data Privacy Laws in Louisiana
Louisiana does not have a comprehensive consumer data privacy and protection law, nor are any bills making progress at this time. However, it is protected by some privacy-related legislation.
Dedicated Data Privacy Laws in Kansas
Kansas does not have a comprehensive consumer data privacy and protection law, nor are any bills making progress at this time. However, it is protected by some privacy-related legislation.
Dedicated Data Privacy Laws in Vermont
Vermont does not have a comprehensive consumer data privacy and protection law, nor are any bills making progress at this time. However, it is protected by some privacy-related legislation.
Dedicated Data Privacy Laws in Maine
Maine does not have a comprehensive consumer data privacy and protection law, nor are any bills making progress at this time. However, it is protected by some privacy-related legislation.
Dedicated Data Privacy Laws in Mississippi
Mississippi does not have a comprehensive consumer data privacy and protection law, nor are any bills making progress at this time. However, it is protected by some privacy-related legislation.
Dedicated Data Privacy Laws in Missouri
Missouri does not have a comprehensive consumer data privacy and protection law, nor are any bills making progress at this time. However, it is protected by some privacy-related legislation.
Dedicated Data Privacy Laws in North_Carolina
North_Carolina does not have a comprehensive consumer data privacy and protection law, nor are any bills making progress at this time. However, it is protected by some privacy-related legislation.
Dedicated Data Privacy Laws in Georgia
Georgia does not have a comprehensive consumer data privacy and protection law, nor are any bills making progress at this time. However, it is protected by some privacy-related legislation.
Dedicated Data Privacy Laws in Alabama
Alabama does not have a comprehensive consumer data privacy and protection law, nor are any bills making progress at this time. However, it is protected by some privacy-related legislation.
Dedicated Data Privacy Laws in Arkansas
Arkansas does not have a comprehensive consumer data privacy and protection law, nor are any bills making progress at this time. However, it is protected by some privacy-related legislation.
Dedicated Data Privacy Laws in New_Mexico
New_Mexico does not have a comprehensive consumer data privacy and protection law, nor are any bills making progress at this time. However, it is protected by some privacy-related legislation.
Dedicated Data Privacy Laws in Arizona
Arizona does not have a comprehensive consumer data privacy and protection law, nor are any bills making progress at this time. However, it is protected by some privacy-related legislation.
Dedicated Data Privacy Laws in Nevada
Nevada does not have a comprehensive consumer data privacy and protection law, nor are any bills making progress at this time. However, it is protected by some privacy-related legislation.
Dedicated Data Privacy Laws in Idaho
Idaho does not have a comprehensive consumer data privacy and protection law, nor are any bills making progress at this time. However, it is protected by some privacy-related legislation.
Dedicated Data Privacy Laws in Wyoming
Wyoming does not have a comprehensive consumer data privacy and protection law, nor are any bills making progress at this time. However, it is protected by some privacy-related legislation.
Dedicated Data Privacy Laws in South_Dakota
South_Dakota does not have a comprehensive consumer data privacy and protection law, nor are any bills making progress at this time. However, it is protected by some privacy-related legislation.
Dedicated Data Privacy Laws in North_Dakota
North_Dakota does not have a comprehensive consumer data privacy and protection law, nor are any bills making progress at this time. However, it is protected by some privacy-related legislation.
Dedicated Data Privacy Laws in Hawaii
Hawaii does not have an official comprehensive consumer privacy law. However, there are a few privacy-related regulations in force and a few introduced bills moving through the state government.
South_Carolina does not have an official comprehensive consumer privacy law. However, there are a few privacy-related regulations in force and a few introduced bills moving through the state government.
Connecticut Data Privacy Act (CTDPA)
Effective Date: July 1, 2023
| Applicability | Consumer Rights | Penalties |
|---|---|---|
| 100,000 consumers or 25,000+ 25%+ revenue from data sales | Access, Delete, Correct, Opt-Out, Portability |
Up to $500,000 per violation |
Dedicated Data Privacy Laws in Massachusetts
Massachusetts does not have an official comprehensive consumer privacy law. However, there are a few privacy-related regulations in force and a few introduced bills moving through the state government.
Dedicated Data Privacy Laws in Ohio
Ohio does not have an official comprehensive consumer privacy law. However, there are a few privacy-related regulations in force and a few introduced bills moving through the state government.
Dedicated Data Privacy Laws in Illinois
Illinois does not have an official comprehensive consumer privacy law. However, there are a few privacy-related regulations in force and a few introduced bills moving through the state government.
Dedicated Data Privacy Laws in Oklahoma
Oklahoma does not have an official comprehensive consumer privacy law. However, there are a few privacy-related regulations in force and a few introduced bills moving through the state government.
Dedicated Data Privacy Laws in Pennsylvania
Pennsylvania does not have a comprehensive consumer data privacy and protection law, nor are any bills making progress at this time. However, it is protected by some privacy-related legislation.
Dedicated Data Privacy Laws in NewYork
New York does not have an official comprehensive consumer privacy law. However, there are a few privacy-related regulations in force and a few introduced bills moving through the state government.
Maryland Online Data Privacy Act (MODPA)
Effective Date: Oct 1, 2025
| Applicability | Consumer Rights | Penalties |
|---|---|---|
| 35,000 consumers or 10,000+ consumers with 20%+ revenue from data sales |
Access, Delete, Correct, Opt-Out, Portability |
up to $10,000 per violation, and up to $25,000 for repeated violations |
Delaware Personal Data Privacy Act (DPDPA)
Effective Date: January 1, 2025
| Applicability | Consumer Rights | Penalties |
|---|---|---|
| 35,000 consumer or 10,000+ consumers with 20% revenue from data sales |
Access, Delete, Correct, Opt-Out, Portability |
up to $10,000 per violation |
Effective Date: January 1, 2025
| Applicability | Consumer Rights | Penalties |
|---|---|---|
| 35,000 consumer or 10,000+ consumers with 25% revenue from data sales |
Access, Delete, Correct, Opt-Out, Portability |
up to $10,000 per violation |
Virginia Consumer Data Privacy Act (VCDPA)
Effective Date: January 1, 2023
| Applicability | Consumer Rights | Penalties |
|---|---|---|
| 100,000 consumer or 25,000+ consumers with 50% revenue from data sales |
Access, Delete, Correct, Opt-Out, Portability |
Up to $7,500 per violation |
Texas Data Privacy and Security Act (TDPSA)
Effective Date: July 1, 2024
| Applicability | Consumer Rights | Penalties |
|---|---|---|
| 35,000 consumer or 10,000+ consumers with 20% revenue from data sales |
Access, Delete, Correct, Opt-Out, Portability |
Up to $7,500 per violation |
Oregon Consumer Privacy Act (OCPA)
Effective Date: July 1, 2024
| Applicability | Consumer Rights | Penalties |
|---|---|---|
| 100,000 consumer or 25,000+ consumers with 25% revenue from data sales |
Access, Delete, Correct, Opt-Out, Portability |
Up to $7,500 per violation |
Montana Consumer Data Privacy Act (MTCDPA)
Effective Date: October 1, 2024
| Applicability | Consumer Rights | Penalties |
|---|---|---|
| 50,000 consumer or 25,000+ consumers with 25% revenue from data sales |
Access, Delete, Correct, Opt-Out, Portability |
Not specified |
Iowa Consumer Data Protection Act (ICDPA)
Effective Date: January 1, 2025
| Applicability | Consumer Rights | Penalties |
|---|---|---|
| 100,000 consumer or 25,000+ consumers with 50% revenue from data sales |
Access, Delete, Portability Opt-Out |
Up to $7,500 per violation |
Nebraska Data Privacy Act (NDPA)
Effective Date: January 1, 2025
| Applicability | Consumer Rights | Penalties |
|---|---|---|
| Annual gross Revenue exceeding $10 million or buying/selling/sharing personal information of 50,000 or more consumers or 50%+ revenue from data sales | Access, Delete, Correct, Opt-Out, Portability |
Up to $7,500 per violation |
Effective Date: July 1, 2023
| Applicability | Consumer Rights | Penalties |
|---|---|---|
| 100,000 consumers or 25,000+ 25%+ revenue from data sales |
Access, Delete, Correct, Opt-Out, Portability |
Up to $20,000 per violation with a total maximum penalty of $500,000 |
Utah Consumer Privacy Act (UCPA)
Effective Date: December 31, 2023
| Applicability | Consumer Rights | Penalties |
|---|---|---|
| $25M revenue and 100,000 consumer or 25,000+ consumers with 50% revenue from data sales |
Access, Delete, Opt-Out, Portability |
Up to $7,500 per violation |
California Consumer Privacy Act (CCPA)/CPRA
Effective Date : January 1, 2020/2023
| Applicability | Consumer Rights | Penalties |
|---|---|---|
| $25M revenue, 50,000 consumers, or 50%+ revenue from data sales |
Access, Delete, Correct, Opt-Out, Portability |
$2,500 per violation; $7,500 for intentional violations |
Adding {{itemName}} to cart
Added {{itemName}} to cart