Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

Basics to Know About the California Delete Act

Published October 16, 2023 / Updated March 10, 2025

Contributors

Anas Baig

Product Marketing Manager at Securiti

Omer Imran Malik

Senior Data Privacy Consultant at Securiti

FIP, CIPT, CIPM, CIPP/US

Listen to the content

Passed by the Senate and State Assembly in September 2023 and signed into law by Governor Gavin Newsom on October 10, 2023, the California Delete Act  (“Delete Act”) aims to amend several sections in existing data brokers' regulations.

The California Consumer Privacy Act of 2018 (CCPA), as amended by the California Privacy Rights Act of 2020 (CPRA), contains several provisions that grant users and customers various rights related to their personal information that is collected or sold by a business, including the right to request disclosure related to all collected information, the right to request deletion of personal information, and to direct a business not to sell or share this information.

Previously, the regulatory setup required data brokers to register with the Attorney General's office, pay them the registration fee, and provide specific information related to their yearly operations, among other requirements. However, the enactment of the Delete Act transfers data brokers' oversight to the California Privacy Protection Agency (CPPA). The CPPA will now assume all the responsibilities and powers held by the Attorney General's office regarding data brokers.

Additionally, the Delete Act requires the CPPA to establish an accessible deletion mechanism that allows a customer, through a single verifiable consumer request, to request that every data broker that maintains personal information delete any personal information related to that customer held by the data broker or associated service provider or contractor.

Beginning from 1 January 2028 and every three years thereafter, the data brokers must undergo an audit by an independent third party to determine compliance with the law. The data brokers shall also be required to submit an audit report to the CPPA upon its written request.

Scope and Applicability

The Delete Act applies to data brokers, defined as any business that knowingly collects and sells to third parties the personal information of a consumer with whom the business does not have a direct relationship. It excludes entities covered by the Fair Credit Reporting Act, Gramm-Leach-Bliley Act, Insurance Information and Privacy Protection Act, as well as entities or business associates of covered entities, to the extent their processing of personal information is exempt under section 1798.146 of the California Civil Code (i.e., entities covered by HIPAA).

Obligations for Organizations Under this Act

Registration Requirements

All businesses must register with the CPPA on or before 31 January following each year in which they meet the definition of a ‘data broker’ as per the Delete Act.

To register with the CPPA, the data broker must do all of the following:

  • Pay a registration fee to the CPPA, not exceeding the reasonable costs of establishing and maintaining an informational internet website and the reasonable costs of establishing, maintaining, and providing access to the deletion mechanism. This fee will be deposited in the Data Brokers' Registry Fund.
  • Provide information, including their contact details and web presence. They must also provide metrics on their processing of consumer privacy requests and information on whether the data broker collects precise geolocation, reproductive health care data, or minor's personal information.
  • Beginning January 1, 2029, provide a link to a webpage on the data broker’s website that explains how consumers may exercise their CCPA rights, such as the right to access, delete, and limit the use of personal data and confirm that the data broker does not make use of dark patterns.
  • Provide information on the extent the data broker or any of its subsidiaries is regulated by the Fair Credit Reporting Act, the Gramm-Leach Bliley Act or Health Insurance Portability and Accountability Act; or California’s Insurance Information and Privacy Protection Act or Confidentiality of Medical Information Act.
  • Starting in 2029, whether the data broker has undergone a third-party audit to determine its compliance with the Delete Act and, if so, the most recent year that the data broker submitted an audit report and related materials to the CPPA (third-party audits are required starting in 2028).

Deletion Mechanism

The law requires the California Privacy Protection Agency to establish an ‘accessible’ deletion mechanism by January 1, 2026. The deletion mechanism must implement and maintain robust security measures for protecting consumers' personal information. Through a single verifiable request, it must also enable the consumers to request the deletion of all their personal information maintained by the data brokers and their service providers. The mechanism must also allow the consumers to exclude specific data brokers from the deletion request and alter a prior request, provided that at least 45 days have elapsed since the consumer made the last request.

Moreover, the deletion mechanism must adhere to several key requirements, including enabling the customers to request the deletion of all their collected data in a single request, providing secure data submission, allowing data brokers to verify and access necessary request information, offering internet-based access, being free of charge, support the use of languages spoken by the customers, ensuring accessibility for people with disabilities, permitting requests through authorized agents, enabling request status checks, and providing descriptions of permissible deletions, the request process, and types of information that is deletable.

From 1 August  2026, the law requires the data brokers to access the deletion mechanism once every 45 days to process any deletion requests received from consumers via the mechanism. If a deletion request cannot be verified, it should be treated as an opt-out request instead. In addition, the data brokers must also instruct their service providers and contractors to delete relevant consumer information or process opt-out requests accordingly.

Public Disclosure and Audit Obligations

The Delete Act requires data brokers to report annually, by July 1, metrics on the number of CCPA requests and Delete Act deletion requests that the data broker received, complied with, and denied during the prior calendar year, as well as the average number of days it took the data broker to substantively respond to such request. These metrics must also be made available on the data broker’s website privacy policy.

In addition, beginning from January 1, 2028, and every three years after, data brokers must undergo an extensive independent third-party assessment audit to determine their compliance with the Delete Act. The audit will only be deemed complete once the data broker submits the audit report and other relevant materials to the CPPA within five business days of a written request made by the CPPA. The data brokers must maintain the report and any other materials submitted to the CPPA for a period of at least six years. Beginning January 1, 2029, the data brokers must also disclose their audit results while registering annually with the CPPA.

Regulatory Authority

The CPPA, responsible for enforcing the California Consumer Privacy Act (CCPA), is primarily responsible for overseeing all provisions of the Delete Act.

Penalties for Non-Compliance

A data broker who fails to comply with the registration and deletion requirements is liable to administrative fines and penalties.

If a data broker fails to register as required under the Delete Act, they can be fined $200 per day and must also pay the fees that were due during the non-compliance period, along with the expenses incurred by the CPPA during the investigation. If a data broker doesn't comply with deletion requests, they can face a daily fine of $200 for each request not fulfilled and must also cover reasonable investigation and administration expenses.

It is to be noted that the Delete Act imposes a five-year statute of limitations for initiating an action against the alleged violation of its provisions.

How Securiti Can Help

The California Delete Act emphasizes the users' overall control over their data once collected.

The deletion mechanism ensures users can easily exercise their right to deletion without dealing with cumbersome processes and redtapes. Securiti can help organizations address this challenge by ensuring users can gain access to such a mechanism to fulfill their data privacy rights.

This is where Securiti can be of service.

Securiti is the pioneer of the Data Command Center, a centralized platform that enables the safe use of data and GenAI. Large global enterprises rely on Securiti's Data Command Center for meeting data security, privacy, governance, and compliance obligations.

Among a large plethora of modules, products, and other solutions is the Privacycenter.cloud, which enables organizations to streamline the entry process of receiving, processing, and complying with any individual data requests, such as data deletion.

Not only is it easy to use and deploy, but it allows for consistent real-time insights into the status of each request, assuring compliance with each request as a consequence.

Request a demo today and learn more about how Securiti's Data Command Center can help you comply with the critical requirements of the California Delete Act.

Share

Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox

Videos

View More

Mitigating OWASP Top 10 for LLM Applications 2025

Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...

View More

DSPM vs. CSPM – What’s the Difference?

While the cloud has offered the world immense growth opportunities, it has also introduced unprecedented challenges and risks. Solutions like Cloud Security Posture Management...

View More

Top 6 DSPM Use Cases

With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...

View More

Colorado Privacy Act (CPA)

What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...

View More

Securiti for Copilot in SaaS

Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...

View More

Top 10 Considerations for Safely Using Unstructured Data with GenAI

A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....

View More

Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes

As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...

View More

Navigating CPRA: Key Insights for Businesses

What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...

View More

Navigating the Shift: Transitioning to PCI DSS v4.0

What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...

View More

Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)

AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 14:21

AI Governance Is Much More than Technology Risk Mitigation

AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3

You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge

Watch Now View
Spotlight 47:42

Cybersecurity – Where Leaders are Buying, Building, and Partnering

Rehan Jalil
Watch Now View
Spotlight 27:29

Building Safe AI with Databricks and Gencore

Rehan Jalil
Watch Now View
Spotlight 46:02

Building Safe Enterprise AI: A Practical Roadmap

Watch Now View
Spotlight 13:32

Ensuring Solid Governance Is Like Squeezing Jello

Watch Now View
Spotlight 40:46

Securing Embedded AI: Accelerate SaaS AI Copilot Adoption Safely

Watch Now View
Spotlight 10:05

Unstructured Data: Analytics Goldmine or a Governance Minefield?

Viral Kamdar
Watch Now View
Spotlight 21:30

Companies Cannot Grow If CISOs Don’t Allow Experimentation

Watch Now View
Spotlight 2:48

Unlocking Gen AI For Enterprise With Rehan Jalil

Rehan Jalil
Watch Now View

Latest

View More

From Trial to Trusted: Securely Scaling Microsoft Copilot in the Enterprise

AI copilots and agents embedded in SaaS are rapidly reshaping how enterprises work. Business leaders and IT teams see them as a gateway to...

The ROI of Safe Enterprise AI View More

The ROI of Safe Enterprise AI: A Business Leader’s Guide

The fundamental truth of today’s competitive landscape is that businesses harnessing data through AI will outperform those that don’t. Especially with 90% of enterprise...

Data Security Governance View More

Data Security Governance: Key Principles and Best Practices for Protection

Learn about Data Security Governance, its importance in protecting sensitive data, ensuring compliance, and managing risks. Best practices for securing data.

AI TRiSM View More

What is AI TRiSM and Why It’s Essential in the Era of GenAI

The launch of ChatGPT in late 2022 was a watershed moment for AI, introducing the world to the possibilities of GenAI. After OpenAI made...

Managing Privacy Risks in Large Language Models (LLMs) View More

Managing Privacy Risks in Large Language Models (LLMs)

Download the whitepaper to learn how to manage privacy risks in large language models (LLMs). Gain comprehensive insights to avoid violations.

View More

Top 10 Privacy Milestones That Defined 2024

Discover the top 10 privacy milestones that defined 2024. Learn how privacy evolved in 2024, including key legislations enacted, data breaches, and AI milestones.

Comparison of RoPA Field Requirements Across Jurisdictions View More

Comparison of RoPA Field Requirements Across Jurisdictions

Download the infographic to compare Records of Processing Activities (RoPA) field requirements across jurisdictions. Learn its importance, penalties, and how to navigate RoPA.

Navigating Kenya’s Data Protection Act View More

Navigating Kenya’s Data Protection Act: What Organizations Need To Know

Download the infographic to discover key details about navigating Kenya’s Data Protection Act and simplify your compliance journey.

Gencore AI and Amazon Bedrock View More

Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock

Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...

DSPM Vendor Due Diligence View More

DSPM Vendor Due Diligence

DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...

What's
New