Veeam Completes Acquisition of Securiti AI to Create the Industry’s First Trusted Data Platform for Accelerating Safe AI at Scale

View

What to Know about the New CCPA Regulations on Automated Decision-Making Technology

Contributors

Anas Baig

Product Marketing Manager at Securiti

Aswah Javed

Associate Data Privacy Analyst at Securiti

Published September 13, 2025

Listen to the content

I. Introduction

The California Privacy Protection Agency (CPPA) approved and adopted a rule-making package that includes new rules related to the use of automated decisionmaking technology (ADMT) on July 24, 2025. The packages further contain rules on risk assessments and cybersecurity audits, and updates to the current California Privacy Protection Agency (CCPA) regulations.

The new rules have now been forwarded to the Office of Administrative Law per the Administrative Procedure Act for review. It now has 30 business days to decide whether the regulations become final and effective.

Read on to learn more about the obligations these new laws place on businesses and, most importantly, how best to ensure compliance with them.

II. Definitions of Key Terms

a. Automated Decisionmaking Technology

Any technology that processes personal information and is capable of completely or substantially replacing human decision-making processes. This includes profiling but does not include web hosting, domain registration, networking, caching, website-loading, data storage, firewalls, anti-virus, anti-malware, spam and robocall filtering, spellchecking, calculators, databases, and spreadsheets, provided that they do not replace human decision-making.

b. Significant Decision

A decision resulting in the “provision or denial of financial or lending services, housing, education enrollment or opportunities, employment or independent contracting opportunities or compensation, or healthcare services”.

c. Substantially Replace Human Decision Making

The use of technology’s output to make a decision without human involvement by a business.

III. Obligations for Businesses

Businesses using ADMT must ensure their compliance with the following obligations before January 1, 2027. For those initiating ADMT use after this date, they must be compliant at the time of using the ADMT.

a. Pre-Use Notice

Businesses using ADMT to make significant decisions must provide their consumers with a pre-use notice. This pre-use notice must adequately inform consumers about their use of ADMT, along with the consumers’ right to access and opt out of ADMT.  The notice must be:

  • Easy to read, understandable to consumers, available in languages the business typically uses, and reasonably accessible to consumers with disabilities per the relevant regulatory requirements;
  • Presented prominently and conspicuously at or before the point of personal information collection/processing for ADMT use;
  • Presented in the manner in which the business primarily interacts with the consumer.

Furthermore, the pre-use notice must include:

  • An explanation of the exact business reasons for the use of ADMT;
  • Description of the consumers’ right to access and opt out of the ADMT, how to exercise these rights, and the appeal process, where applicable;
  • The fact that the business is prohibited from retaliating against consumers for exercising their rights;
  • An explanation of how the ADMT works, including the following information:
    • How ADMT processes personal information, including categories of data affecting the output;
    • Types of output and how they are used for significant decisions;
    • Any alternative process for making a significant decision if a consumer opts out (unless an exception applies).
  • A link through which consumers can opt out of the business’s use of ADMT.

However, businesses can provide a single pre-use notice for multiple ADMTs or purposes, provided it includes all required information for each use.

Exceptions

Trade secrets or information that compromises security, fraud prevention, or safety purposes are not required to be disclosed.

b. Additional Requirements for Businesses Collecting Large Amounts of Personal Information

Businesses that process the personal information of 10,000,000 or more consumers in a calendar year must compile the following metrics for their previous calendar year:

  • The number of requests to access ADMT that the business received, complied with in whole or in part, and denied;
  • The number of requests to opt out of ADMT that the business received, complied with in whole or in part, and denied.

IV. Data Subject Rights

A. Request to Opt Out

Consumers have the right to opt out of ADMT used to make significant decisions. However, the businesses can choose not to provide the consumers with the ability to opt out of ADMT in the following circumstances:

  • If a business has a method for consumers to appeal ADMT decisions to a human reviewer who can overturn ADMT decisions;
  • If the ADMT is necessary for a consumer’s ability to participate in an educational/work program to determine whether to admit, accept, or hire them, and the ADMT does not discriminate based on any protected characteristics;
  • If the ADMT use is solely for business purposes related to allocation/assignment/compensation, and the ADMT does not discriminate based on any protected characteristics.

Methods to Opt Out

Businesses are required to provide two or more methods for consumers to submit opt-out requests, with at least one method reflecting the primary interaction method with the consumer. A business interacting with consumers online must, at minimum, allow consumers to submit opt-out requests through an interactive form linked to the pre-use notice.

The opt-out methods must be easy to use, include minimal steps, and must not use dark patterns. They must not require the creation of a new account or additional information. Businesses are also not required to verify the opt out requests, but can ask for additional information from consumers to complete a request. Lastly, a business can allow specific uses of ADMT to consumers, as long as a single option to opt out of all ADMT uses is provided.

Response to an Opt-Out Request

When responding to an opt-out request, a business:

  • May deny the request based on a good-faith, reasonable, and documented belief that a request to opt out of ADMT is fraudulent, with the requester being informed of this decision along with an explanation;
  • Must provide a means for a consumer to confirm their request is being processed;
  • Must allow authorized agents to submit a request on behalf of the consumer. Requests lacking the consumer’s permission can be denied;
  • Must wait 12 months before asking a consumer who opted out to consent to ADMT use again;
  • Cannot retaliate against consumers for exercising their opt-out right;
  • Must not proceed with processing the consumer's personal information if they have opted out of ADMT before the processing started;
  • Must cease processing personal information with ADMT within 15 business days of receiving an opt-out request, and notify service providers, contractors, and third parties to whom data was disclosed to comply with the opt-out.

B. Request to Access ADMT

All consumers have the right to request information related to ADMT use. When responding to such requests, businesses must ensure their response is in plain language and contains the following information:

  • Exact reason for which the business used ADMT;
  • How the ADMT processed consumer’s personal information to generate an output;
  • How the ADMT's output was used in making a significant decision about the consumer, including whether it was the sole factor, other factors involved, any human role, and whether the output will be used in future decision-making;
  • How the logic was applied to the consumer and the key parameters affecting the output;
  • The information about the prohibition on businesses from retaliating against consumers for exercising their rights under the CCPA and instructions on how to exercise these rights.

Exception

Trade secrets or information that compromises security, fraud prevention, or safety purposes are not required to be disclosed in response to an access request.

Response to an Access Request

When responding to an access request, businesses:

  • Can leverage existing "request to know," "delete," or "correct" methods to respond to consumer requests.
  • Must only provide consumers access when they have confirmed it to be a verifiable consumer request. If this cannot be confirmed, a consumer request can be denied.
  • In case a request is denied, must inform the requester and the basis for the denial must be explained.
  • Use reasonable security measures when transmitting the information requested.
  • Can use an aggregate-level response summarizing outputs and parameters, when ADMT was used more than four times in 12 months for a consumer,
  • Can use secure self-service portals to provide access.
  • Can leverage the assistance of service providers/contractors to respond to consumer requests.
  • Must not retaliate against a consumer for exercising their access right.
  • Can provide additional information to consumers about the use of ADMT to help them compare it with others.

Timeline to Respond to a DSR Request

Businesses are required to confirm the receipt of the access request and appeal request within 10 business days of initially receiving it. They must also provide information about how it will process the request, including a description of the business’s verification process, and a timeline of when the consumer can expect a response related to their request.

Following this, businesses must then respond to the request within 45 days of receiving it. This initial deadline may be extended by an additional 45 days, provided the consumer is informed of this via a notice.

V. How Securiti Can Help

Securiti is the pioneer of the Data Command Center, a centralized platform that enables the safe use of data and GenAI capabilities. Thanks to its unified data intelligence, controls, and orchestration across hybrid multicloud environments, numerous reputable and esteemed global enterprises rely on it for their data security, privacy, governance, and compliance needs.

The Data Command Center is equipped with several solutions and modules designed to ensure swift and reliable compliance via complete automation. These modules, including privacy policy management, assessment automation, vendor risk assessment, and DSR automation, empower an organization to maintain real-time oversight of its compliance with all relevant regulatory requirements per the CCPA via the centralized dashboard.

Furthermore, this enables proactive measures from an organization if a potential violation or non-compliance is detected.

Request a demo today to learn more about how Securiti can help your organization comply with the CCPA’s latest requirements related to the use of ADMT.

Analyze this article with AI

Prompts open in third-party AI tools.
Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox



More Stories that May Interest You
Videos
View More
Mitigating OWASP Top 10 for LLM Applications 2025
Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...
View More
Top 6 DSPM Use Cases
With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...
View More
Colorado Privacy Act (CPA)
What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...
View More
Securiti for Copilot in SaaS
Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...
View More
Top 10 Considerations for Safely Using Unstructured Data with GenAI
A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....
View More
Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes
As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...
View More
Navigating CPRA: Key Insights for Businesses
What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...
View More
Navigating the Shift: Transitioning to PCI DSS v4.0
What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...
View More
Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)
AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...
AWS Startup Showcase Cybersecurity Governance With Generative AI View More
AWS Startup Showcase Cybersecurity Governance With Generative AI
Balancing Innovation and Governance with Generative AI Generative AI has the potential to disrupt all aspects of business, with powerful new capabilities. However, with...

Spotlight Talks

Spotlight 50:52
From Data to Deployment: Safeguarding Enterprise AI with Security and Governance
Watch Now View
Spotlight 11:29
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Watch Now View
Spotlight 11:18
Rewiring Real Estate Finance — How Walker & Dunlop Is Giving Its $135B Portfolio a Data-First Refresh
Watch Now View
Spotlight 13:38
Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines
Sanofi Thumbnail
Watch Now View
Spotlight 10:35
There’s Been a Material Shift in the Data Center of Gravity
Watch Now View
Spotlight 14:21
AI Governance Is Much More than Technology Risk Mitigation
AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3
You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge
Watch Now View
Spotlight 47:42
Cybersecurity – Where Leaders are Buying, Building, and Partnering
Rehan Jalil
Watch Now View
Spotlight 27:29
Building Safe AI with Databricks and Gencore
Rehan Jalil
Watch Now View
Spotlight 46:02
Building Safe Enterprise AI: A Practical Roadmap
Watch Now View
Latest
View More
DataAI Security: Why Healthcare Organizations Choose Securiti
Discover why healthcare organizations trust Securiti for Data & AI Security. Learn key blockers, five proven advantages, and what safe data innovation makes possible.
View More
The Anthropic Exploit: Welcome to the Era of AI Agent Attacks
Explore the first AI agent attack, why it changes everything, and how DataAI Security pillars like Intelligence, CommandGraph, and Firewalls protect sensitive data.
View More
Aligning Your AI Systems With GDPR: What You Need to Know
Securiti’s latest blog walks you through all the important information and guidance you need to ensure your AI systems are compliant with GDPR requirements.
Network Security: Definition, Challenges, & Best Practices View More
Network Security: Definition, Challenges, & Best Practices
Discover what network security is, how it works, types, benefits, and best practices. Learn why network security is core to having a strong data...
View More
Data & AI Security Challenges in the Credit Reporting Industry
Explore key data and AI security challenges facing credit bureaus—PII exposure, model risk, data accuracy, access governance, AI bias, and compliance with FCRA, GDPR,...
EU AI Act: What Changes Now vs What Starts in 2026 View More
EU AI Act: What Changes Now vs What Starts in 2026
Understand the EU AI Act rollout—what obligations apply now, what phases in by 2026, and how providers and deployers should prepare for risk tiers,...
View More
Solution Brief: Microsoft Purview + Securiti
Extend Microsoft Purview with Securiti to discover, classify, and reduce data & AI risk across hybrid environments with continuous monitoring and automated remediation. Learn...
Top 7 Data & AI Security Trends 2026 View More
Top 7 Data & AI Security Trends 2026
Discover the top 7 Data & AI security trends for 2026. Learn how to secure AI agents, govern data, manage risk, and scale AI...
View More
Navigating HITRUST: A Guide to Certification
Securiti's eBook is a practical guide to HITRUST certification, covering everything from choosing i1 vs r2 and scope systems to managing CAPs & planning...
The DSPM Architect’s Handbook View More
The DSPM Architect’s Handbook: Building an Enterprise-Ready Data+AI Security Program
Get certified in DSPM. Learn to architect a DSPM solution, operationalize data and AI security, apply enterprise best practices, and enable secure AI adoption...
What's
New