Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

How do CPRA treat sensitive personal information

Download: CPRA Decision-Making Guide
Published August 25, 2022
Contributors

Anas Baig

Product Marketing Manager at Securiti

Omer Imran Malik

Data Privacy Legal Manager, Securiti

FIP, CIPT, CIPM, CIPP/US

Listen to the content

This post is also available in: Brazilian Portuguese

For businesses globally, personal data is a highly vital asset. Used effectively, personal data can increase a business’s revenues tenfold and ensure it targets users most likely to convert and turn into customers. Thus, it wouldn't be wrong to say that access to personal data has transformed the business world by knowing their customers and potential customers better.

However, there have long been ethical concerns about the scale and scope of personal data available to businesses. Some personal data is more sensitive than the rest - its use must be more strictly curtailed so that individuals are not exploited. This type of data might be about their most sensitive innate characteristics or traits, or it might be information that, in the wrong hands, could lead them to severe loss or harm.

That is one of the several factors that have led countries worldwide to draft data privacy laws that categorize certain types of personal data as sensitive personal data and provide it additional protections.

The California Privacy Rights Act (CPRA) replaces the California Consumer Privacy Act (CCPA), which will come into effect on January 1, 2023. The CPRA guarantees Californian consumers' are adequately protected by introducing a new category of data labeled "sensitive personal information". All data within this category warrants increased protection from businesses collecting, storing, processing, disclosing, and transferring personal information about their consumers.

Read on to learn more about sensitive personal information, including the ideal solution for organizations that want to handle the collection of sensitive personal information:

What is Sensitive Personal Information?

So, what exactly is sensitive personal information? The CCPA defined what constitutes personal information. The CPRA builds on that definition by introducing the sub-category of sensitive personal information. As per the CPRA's definition, personal information that reveals any of the following details about an individual consumer constitutes sensitive personal information:

  • Government-issued identifiers
    • Social Security,
    • Driver’s license,
    • State identification card, or
    • Passport number.
  • Finances
    • Account log-in.
    • Financial account combined with any required security or access code, password, or credentials allowing access to an account.
    • Debit card or credit card number combined with any required security or access code, password, or credentials.
  • Geolocation
    • a consumer’s precise geolocation, including address, ZIP code, and city.
  • Race, religion, and union membership
    • Racial or ethnic origin,
    • Citizenship or immigration status,
    • Religious or philosophical beliefs, or
    • Union membership.
  • Communications
    • The contents of a consumer’s private communications,
    • Unless the company is the intended recipient of the communication.
  • Genetics
    • a consumer’s genetic data.
  • Biometrics
    • Biometric information which can uniquely identify a consumer.
  • Health
    • Personal information collected and analyzed concerning a consumer’s health.
  • Sexual orientation
    • Personal information collected and analyzed concerning a consumer’s sex life or sexual orientation.

This broader definition of the term means that an organization that might be collecting either one of these would now have to comply with the provisions that the CPRA requires them to adhere to.

Sensitive Personal Information is an entirely new category of data that the CPRA creates. It follows the wisdom that some types of data necessitate increased protection online such as a user's financial or biometric information. This new category of personal information is inspired by the "special categories of personal data" mentioned in the General Data Protection Regulation (GDPR).

The CPRA goes into great detail explaining the duties of businesses that collect consumers’ sensitive personal information. These duties and responsibilities include:

  • Disclosing to the consumer at or before the point of collection:
    • the categories of sensitive personal information to be collected,
    • the purposes for which they are being collected,
    • whether that information is being sold or shared, and
    • the length of time the business intends to retain consumers’ sensitive personal information, including the criteria used to determine that period.
  • Disclose to the consumer in its privacy notice:
    • a list of the categories of sensitive personal information it has collected about consumers in the preceding 12 months,
    • a list of the categories of sensitive personal information it has sold or shared about consumers or disclosed for a business purpose in the preceding 12 months,
    • the categories of sources from which consumers' sensitive personal information is collected,
    • the business or commercial purpose for collecting or selling or sharing consumers' sensitive personal information,
    • the categories of third parties to whom the business discloses consumers' sensitive personal information.
  • Undertake reasonable security procedures and practices appropriate to the nature of the sensitive personal information to protect it from unauthorized or illegal access, destruction, use, modification, or disclosure under CPRA;
  • Make available to consumers two or more designated methods for submitting requests for access, deletion, or correction of sensitive personal information and fulfill their requests within 45 days;
  • Providing two clear and conspicuous links on the business’s internet homepages, titled:
    • Do Not Sell or Share My Personal Information,” that enables a consumer, or a person authorized by the consumer, to opt out of the sale or sharing of the consumer’s personal information, including his/her sensitive personal information.
    • “Limit the Use of My Sensitive Personal Information,” that enables a consumer, or a person authorized by the consumer, to limit the use or disclosure of the consumer’s sensitive personal information only for the following tasks:
      • Usage which is reasonably necessary to perform the services or provide the goods to an average consumer.
      • Helping to ensure security and integrity.
      • Short-term, transient use, such as for non-personalized advertising based on the consumer’s interaction with the business in real-time - however, it is important to note that consumer’s sensitive personal information cannot be shared with another third party nor used to build profiles or alter the consumer’s experience outside their interaction with the business in real-time.
      • Performing services on behalf of the business, which includes maintenance or servicing of user accounts, providing customer service, processing orders and fulfilling transactions, verifying customer information, processing payments, providing financing, analytic services, storage, or similar services on behalf of the business.
      • To maintain and verify the quality and safety of the products/services offered by the business or to improve/upgrade/enhance the products’ capabilities.
  • The business is exempt from having to do this if the business allows consumers to opt out of the sale or sharing of their personal information and to limit the use of their sensitive personal information through a global opt-out preference signal sent with the consumer’s consent by a platform, technology, or mechanism.
  • Businesses must notify consumers before using their sensitive personal information or disclosing it to a service provider or contractor for any additional, specified purposes and must inform consumers they have the right to limit the use or disclosure of their sensitive personal information. Consumers may give consent for the use or disclosure of sensitive personal information for additional purposes if they have employed their right to limit the use of their sensitive personal information.
  • Waiting for at least 12 months before re-requesting the consumer to authorize the sale or sharing of the consumer’s sensitive personal information or the use and disclosure of their sensitive personal information for additional purposes.

Sensitive Data Intelligence: Your First Step to Managing Sensitive Personal Information

Due to just how expansive the definition of sensitive personal information is under the CPRA, businesses are likely to find themselves scrambling to determine whether they collect any such data.

Managing how a business collects, stores secures and maintains sensitive personal information is long and arduous. An automated solution is a critical necessity to ensure that the process is carried out effectively and efficiently.

With Securiti’s Sensitive Data Solution (SDI), an organization can scan its data assets and detect and classify all personal and sensitive personal information. Furthermore, this discovered data can be neatly arranged in a catalog to enable teams to leverage the metadata for security, privacy, and compliance purposes.

SDI uses machine learning and pattern recognition techniques, which aid in identifying personal and sensitive information such as government identifiers, financial, or racial identifiers. It can then categorize them accordingly by importing labels from the Microsoft Security Centre and applying them to Box, NFS, SMB, and other unstructured data assets.

These sensitivity labels are vital in ensuring the enforcement of security policies that prevent any sort of data leaks.

An organization can attach additional metadata to each sensitive file, such as the category of personal data, the purpose of processing, and retention period. Additionally, People Data Graphs enable timely and accurate fulfillment of DSRs, breach notifications, and consent reports.

Lastly, SDI allows an organization to identify data risk hotspots in their environment based on elements such as specific data elements, data locations, and user residencies. These insights can then be used to take any necessary remedial or preventative actions to mitigate or eliminate any security and privacy risks.

How Securiti Can Help

The CPRA, like any other significant privacy regulation, requires organizations to radically overhaul the way they collect users' personal information or sensitive personal information. The sheer volume of data makes it seem an arduous task for any organization unless they opt for robotic automation.

This is where Securiti can prove to be a viable option.

Securiti’s Sensitive Data Intelligence (SDI) is a highly reliable way to initiate an organization’s management of sensitive personal information. With SDI, you can enable Privacy Notice Management to automate your organization’s privacy policy in compliance with the CPRA requirements while giving you hundreds of pre-built templates based on your unique needs.

The automated data mapping solution helps maintain an updated catalog of all data assets and sensitive data, along with metadata such as the purpose of collection, retention period, and other details.

Additionally, you can visualize data maps to gain real-time insights into key data patterns, initiate PIAs, and monitor real-time risks related to your data processing activities.

Request a demo today to see how Securiti's products can aid your CPRA compliance efforts today.

Securiti Data Command Center with integrated Data Security Posture Management (DSPM) helps teams discover and classify data across public, hybrid multicloud, and SaaS applications. DSPM use those insights to help organizations identify and rectify gaps in their security posture, and protect data everywhere while meeting governance and compliance obligations.

Learn More

Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share

More Stories that May Interest You
Videos
View More
Mitigating OWASP Top 10 for LLM Applications 2025
Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...
View More
Top 6 DSPM Use Cases
With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...
View More
Colorado Privacy Act (CPA)
What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...
View More
Securiti for Copilot in SaaS
Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...
View More
Top 10 Considerations for Safely Using Unstructured Data with GenAI
A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....
View More
Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes
As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...
View More
Navigating CPRA: Key Insights for Businesses
What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...
View More
Navigating the Shift: Transitioning to PCI DSS v4.0
What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...
View More
Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)
AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...
AWS Startup Showcase Cybersecurity Governance With Generative AI View More
AWS Startup Showcase Cybersecurity Governance With Generative AI
Balancing Innovation and Governance with Generative AI Generative AI has the potential to disrupt all aspects of business, with powerful new capabilities. However, with...

Spotlight Talks

Spotlight 11:29
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Watch Now View
Spotlight 11:18
Rewiring Real Estate Finance — How Walker & Dunlop Is Giving Its $135B Portfolio a Data-First Refresh
Watch Now View
Spotlight 13:38
Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines
Sanofi Thumbnail
Watch Now View
Spotlight 10:35
There’s Been a Material Shift in the Data Center of Gravity
Watch Now View
Spotlight 14:21
AI Governance Is Much More than Technology Risk Mitigation
AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3
You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge
Watch Now View
Spotlight 47:42
Cybersecurity – Where Leaders are Buying, Building, and Partnering
Rehan Jalil
Watch Now View
Spotlight 27:29
Building Safe AI with Databricks and Gencore
Rehan Jalil
Watch Now View
Spotlight 46:02
Building Safe Enterprise AI: A Practical Roadmap
Watch Now View
Spotlight 13:32
Ensuring Solid Governance Is Like Squeezing Jello
Watch Now View
Latest
Navigating the Data Minefield: Essential Executive Recommendations for M&A and Divestitures View More
Navigating the Data Minefield: Essential Executive Recommendations for M&A and Divestitures
The U.S. M&A landscape is back in full swing. May witnessed a significant rebound in deal activity, especially for transactions exceeding $100 million, signaling...
Simplifying Global Direct Marketing Compliance with Securiti’s Rules Matrix View More
Simplifying Global Direct Marketing Compliance with Securiti’s Rules Matrix
The Challenge of Navigating Global Data Privacy Laws In today’s privacy-first world, navigating data protection laws and direct marketing compliance requirements is no easy...
View More
What is IAM (Identity and Access Management)?
Gain insights into Identity and Access Management (IAM), what it is, challenges, core components, and how organizations can leverage it.
AI Data Mapping View More
AI Data Mapping: The Pathway to Intelligent Data Insights
Discover how AI data mapping revolutionizes data utilization. Harness the power of AI for smarter decision-making, data utilization, and ensuring regulatory compliance.
View More
Is Your Business Ready for the EU AI Act August 2025 Deadline?
Download the whitepaper to learn where your business is ready for the EU AI Act. Discover who is impacted, prepare for compliance, and learn...
View More
Getting Ready for the EU AI Act: What You Should Know For Effective Compliance
Securiti's whitepaper provides a detailed overview of the three-phased approach to AI Act compliance, making it essential reading for businesses operating with AI.
August 2, 2025 - A Critical Date in the EU AI Act Enforcement Timeline View More
August 2, 2025 – A Critical Date in the EU AI Act Enforcement Timeline
Securiti’s latest infographic explains the obligations and requirements coming into effect for different entities as the AI Act’s August 2 deadline approaches.
LGPD & Consent: Clear Compliance Guide for Enterprise Executives View More
LGPD & Consent: Clear Compliance Guide for Enterprise Executives
Download the infographic to learn about LGPD and consent. Get a clear compliance guide for enterprise executives. Ensure swift compliance with Securiti.
Gencore AI and Amazon Bedrock View More
Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock
Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...
DSPM Vendor Due Diligence View More
DSPM Vendor Due Diligence
DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...
What's
New