Veeam Completes Acquisition of Securiti AI to Create the Industry’s First Trusted Data Platform for Accelerating Safe AI at Scale

View

What is the Virginia Consumer Data Protection Act (VCDPA)?

Published August 8, 2023 / Updated November 10, 2025

Contributors

Anas Baig

Product Marketing Manager at Securiti

Omer Imran Malik

Data Privacy Legal Manager, Securiti

FIP, CIPT, CIPM, CIPP/US

Virginia has become the next US state to pass a comprehensive consumer data protection law which can be considered to be at par with other major state data privacy laws i.e. the California Consumer Protection Act (CCPA) -or the recently passed Consumer Privacy Rights Act (CPRA)- and Washington Privacy Act (WPA).This new law provides comprehensive privacy rights to state residents of Virginia and imposes a new set of obligations and duties on businesses managing consumer personal data.

Listen to the content


Definitions

Personal Data

Personal Data means any information that is linked or reasonably associated to an identified or identifiable natural person.

Sensitive Data

  • The VCDPA also categorizes certain data as "Sensitive data" which includes:
    1. Personal data revealing racial or ethnic origin, religious beliefs, mental or physical health diagnosis, sexual orientation, or citizenship or immigration status;
    2. The processing of genetic or biometric data for the purpose of uniquely identifying a natural person;
    3. The personal data collected from a known child;
    4. Precise geolocation data.

Publicly available and de-identified personal data are not covered under the law.

Addictive Social Media Platform

"Addictive social media platform" means a website, online service, or online or mobile application that offers or provides users an addictive feed that is not incidental to the provision of such website, online service, or online or mobile application.

Addictive Feed

"Addictive feed" means a website, online service, or online or mobile application, or a portion thereof, in which multiple pieces of media generated or shared by users of a website, online service, or online or mobile application, either concurrently or sequentially, are recommended, selected, or prioritized for display to a user based, in whole or in part, on information associated with the user or the user's device, unless any of the following conditions are met, alone or in combination with one another:

  1. The information is not persistently associated with the user or user's device and does not concern the user's previous interactions with media generated or shared by others;
  2. The information is user-selected privacy or accessibility settings, technical information concerning the user's device, or device communications or signals concerning whether the user is a minor;
  3. The user expressly and unambiguously requested the specific media or media by the author, creator, or poster of the media, provided that the media is not recommended, selected, or prioritized for display based, in whole or in part, on other information associated with the user or the user's device that is not otherwise permissible under this definition;
  4. The media are direct, private communications;
  5. The media recommended, selected, or prioritized for display is exclusively the next media in a preexisting sequence from the same author, creator, poster, or source; or
  6. The media are provided for the purpose of interactive gaming, virtual gaming, or educational entertainment.

Data Level Exemptions

Certain forms of personal data are exempted from the law:

  1. Medical data covered under any medical laws: Any health information, records, data and documents protected and covered under HIPAA, other federal or state medical laws including de-identified medical data and medical data for public health use or medical research under HIPAA or any other medical law or policy;
  2. FCRA covered data: Any personal information of consumers used for consumer credit scoring and reporting protected under the federal Fair Credit Report Act (FCRA);
  3. Driver data: Personal data collected, processed, sold, or disclosed in compliance with the federal Driver's Privacy Protection Act of 1994;
  4. FERPA data: Personal data regulated by the federal Family Educational Rights and Privacy Act (FERPA);
  5. Farm credit data: Personal data collected, processed, sold, or disclosed in compliance with the federal Farm Credit Act.

Data Subject Rights

All consumers may invoke the following rights by sending a verified request to the data controller (in case of a child, the parent/guardian may send the request on behalf of the child):

Virginia Consumer Data Protection Act (VCDPA)

Confirm

The consumer shall have a right to confirm whether or not a controller is processing his/her personal data.
Virginia Consumer Data Protection Act (VCDPA)

Access

The consumer has a right to access the personal data collected and processed about him/her by the data controller.

Virginia Consumer Data Protection Act (VCDPA)

Rectify

The consumer has a right to have inaccurate personal data being stored or processed by the data controller be corrected.

Virginia Consumer Data Protection Act (VCDPA)

Delete

The consumer has the right to have his/her personal data stored or processed by the data controller be deleted.

Virginia Consumer Data Protection Act (VCDPA)

Port

The consumer has a right to obtain a copy of his/her personal data, in a portable, technically feasible and readily usable format that allows the consumer, where the processing is carried out by automated means, to transmit the data to another controller without hindrance.

Virginia Consumer Data Protection Act (VCDPA)

Opt-out

The consumer has the right to opt out of the processing of the personal data for purposes of targeted advertising, the sale of personal data, or profiling in furtherance of decisions that produce legal or similarly significant effects concerning the consumer.

  • Time period to fulfill DSR request: All data subject rights’ requests (DSR requests) must be fulfilled by the business within a 45 day period.
  • Extension in time period: Businesses may seek for an extension of 45 days in fulfilling the request depending on the complexity and number of the consumer's requests.
  • Denial of DSR request: If a DSR request is to be denied, the business must inform the consumer of the reasons within a 45 days period. Businesses can deny DSR requests from a consumer if they are unfounded, excessive, or repetitive.
  • Appeal against refusal: Consumers have a right to appeal the decision for refusal of grant of the DSR request. The appeal must be decided within 60 days.
  • Limitation of DSR requests per year: Information provided in response to a consumer request shall be provided by a controller up to twice annually per consumer.
  • Charges: DSR requests must be fulfilled free of charge. However, if requests from a consumer are manifestly unfounded, excessive, or repetitive, the controller may charge the consumer a reasonable fee to cover the administrative costs of complying with the request.

Who must comply?

  • VCDPA applies to all businesses in Virginia or those who produce products or services that are targeted to residents of Virginia and “control and process” the personal data of:
    1. at least 100,000 Virginia residents; or
    2. for an entity that derives over half (50%) of its gross revenue from the sale of personal data, of at least 25,000 Virginia residents.
  • The following entities are exempt from complying with the VCDPA:
    1. Public/government bodies: any body, authority, board, bureau, commission, district, or agency of the Commonwealth or of any political subdivision of the Commonwealth;
    2. GLBA entities: Financial Institutions or data which is subject to Title V of the federal Gramm-Leach-Bliley Act (GLBA);
    3. HIPAA/HITECH covered entities: Any covered entity or business associate governed by the privacy, security, and breach notification rules issued by the United States Department of Health and Human Services (HHS) pursuant to the federal Health Insurance Portability and Accountability Act (HIPAA) or the federal Health Information Technology for Economic and Clinical Health Act (HITECH);
    4. COPPA compliant entities: Controllers and processors that comply with the verifiable parental consent requirements of the federal Children's Online Privacy Protection Act (COPPA) are be deemed to be in compliance with the obligation to obtain parental consent.

Obligations of Controllers

Transparency

Controllers must provide consumers with a reasonably accessible, clear, and meaningful privacy notice containing specific information including categories of data it shares or sells (including for targeted advertising) and means for consumers to exercise their rights.

Accountability

Controllers must undertake Data Protection Assessments (DPAs) before conducting certain types of risky processing, protect deidentified data from reidentification and comply with data subject requests made by consumers as well as ensure data processors it contracts with comply with the duties prescribed under this law.

Purpose Limitation and Data Minimization

Controllers shall not collect unnecessary personal data of consumers or process the personal data for purposes beyond what was disclosed to consumers without gaining their consent.


Non Discrimination

Controllers may not process the personal data to discriminate against the consumer in any way - including discrimination for exercising their data privacy rights.


Consent Management

Controllers cannot process sensitive personal data (including data of minors) unless it has the express consent of the consumer (or parents/guardians of a minor child).


Data Security

Establish, implement, and maintain reasonable administrative, technical, and physical data security practices to protect the confidentiality, integrity, and accessibility of personal data. Such data security practices shall be appropriate to the volume and nature of the personal data at issue.


Responsibilities related to Social Media Platforms

For the purpose of this section, minor means any natural person under the age of 16 years of age. This law prohibits social media platforms from providing an addictive feed to a user unless the operator uses commercially reasonable methods to ensure that the is not a minor or it obtains verifiable parental consent to provide an addictive feed to a user. 

Moreover, the operators of social media platforms must limit the duration of a minor’s use of the social media platform to just one hour per day. However, parents can provide verifiable parental consent to increase or decrease this time duration.

Important Exceptions

The VCDPA does not apply to data processed in an employment or commercial (business-to-business) context. Personal data processed by a controller, processor, or third party for the following reasons are exempt from the application of this law:

  1. in the course of an individual applying to, employed by, or acting as an agent of a controller, processor, or third party as long as the data is processed within that context;
  2. necessary for the controller, processor, or third party to retain to administer benefits for another individual related to the individual highlighted in part (a) i.e an employee or contractor as long as the data is used for the purposes of administering those benefits.
  3. As the emergency contact information of an individual used for emergency contact purposes;
    • Data processed for household purposes or free speech: Nothing in this law should be construed as an obligation imposed on controllers and processors that adversely affects the rights or freedoms of any persons, such as exercising the right of free speech pursuant to the First Amendment to the United States Constitution, or applies to the processing of personal data by a person in the course of a purely personal or household activity.
    • Data processed for internal purposes: Nothing in this law restricts a controller or processor from processing personal data to conduct internal research to improve or repair products, services, or technology or to identify and repair technical errors that impair existing or intended functionality or to undertake internal operations reasonably aligned with the consumer’s expectations for performance of a service or provision of a product.
    • Data processed for legal obligations: Nothing in this law restricts a controller or processor from complying with other applicable laws, to claim or defend legal claims or cooperate with government authorities or investigations.
    • Data processed to protect life and physical safety: Nothing in this law restricts a controller or processor from taking immediate steps to protect an interest that is essential for the life or physical safety of the consumer or of another natural person, and where the processing cannot be manifestly based on another legal basis.
    • Data processed for security purposes: Nothing in this law restricts a controller or processor from processing data to prevent, detect, protect against, or respond to security incidents, identity theft, fraud, harassment, malicious or deceptive activities, or any illegal activity; preserve the integrity or security of systems; or investigate, report, or prosecute those responsible for any such action.
    • Data processed for scientific purposes:  Nothing in this law restricts controllers from engaging in public or peer-reviewed scientific or statistical research in the public interest that adheres to all other applicable ethics and privacy laws and is approved, monitored, and governed by an institutional review board, or similar independent oversight entities that determine:
  4. if the deletion of the information is likely to provide substantial benefits that do not exclusively accrue to the controller;
  5. the expected benefits of the research outweigh the privacy risks; and
  6. if the controller has implemented reasonable safeguards to mitigate privacy risks associated with research, including any risks associated with reidentification.

Non-Compliance Risks and Penalties

The Virginia Attorney General may issue a civil investigative demand to any controller or processor believed to be engaged in, or about to engage in, any violation.

The state AG also retains exclusive authority to enforce the VCDPA by bringing an action in the name of the Commonwealth, or on behalf of persons residing in the Commonwealth, as well as reasonable expenses incurred in investigating and preparing the case, including attorney fees against violators.

Thus, covered businesses must comply with the law or face civil penalties for non-compliance up to $7500 for each violation, as well as an injunction to stop the violation from continuing.


Key Facts

1

The provisions of this act became effective on January 1, 2023.

2

The VCDPA is structurally very similar to the CPRA (which has amended the CCPA), but it has some significant differences.

3

The Data Protection Assessments under the VCDPA identify and weigh the benefits that may flow from the processing to the controller, the consumer, other stakeholders, and the public against the potential risks to the rights of the consumer associated with such processing activities after accounting for mitigating factors.

4

The requirement to conduct Data Protection Assessments under the VCDPA applies to processing activities created or generated after January 1, 2023, and is not retroactive.

5

VCDPA defines a minor below 13 years of age for the additional protections it provides.

6

There is no 12-month time limit as found in the CPRA or CCPA, after which the business can re-ask for the consent of the consumer who chooses to exercise the right to opt-out.

7

The VCDPA requires that opt-in consent be collected for processing of children’s Personal Data, use of Sensitive Personal Data and use of Personal Data beyond the initial purpose for which it was collected.


Frequently Asked Questions (FAQs)

The Virginia Consumer Data Protection Act (VCDPA) is a privacy law in the state of Virginia, USA. It establishes regulations for how businesses handle and protect consumers' personal data, granting consumers certain rights over their personal data.

Yes, Virginia has the Virginia Consumer Protection Act (VCPA), which aims to protect consumers from deceptive or unfair trade practices.

While both CCPA (California Consumer Privacy Act) and VCDPA are consumer privacy laws, they have differences in terms of scope, requirements, and applicability. They both grant consumers rights over their personal data, but they apply to different jurisdictions (California and Virginia, respectively).

Yes, the Virginia Consumer Data Protection Act became effective on January 1, 2023.

The Virginia Consumer Data Protection Act (VCDPA) protects consumers by providing them comprehensive privacy rights and imposing a set of obligations and duties on businesses managing their personal data. The consumer rights under the VCDPA include right to confirmation and access, rectification, deletion, portability and opt-out of processing.

Share
Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox

Videos
View More
Mitigating OWASP Top 10 for LLM Applications 2025
Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...
View More
Top 6 DSPM Use Cases
With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...
View More
Colorado Privacy Act (CPA)
What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...
View More
Securiti for Copilot in SaaS
Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...
View More
Top 10 Considerations for Safely Using Unstructured Data with GenAI
A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....
View More
Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes
As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...
View More
Navigating CPRA: Key Insights for Businesses
What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...
View More
Navigating the Shift: Transitioning to PCI DSS v4.0
What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...
View More
Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)
AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...
AWS Startup Showcase Cybersecurity Governance With Generative AI View More
AWS Startup Showcase Cybersecurity Governance With Generative AI
Balancing Innovation and Governance with Generative AI Generative AI has the potential to disrupt all aspects of business, with powerful new capabilities. However, with...

Spotlight Talks

Spotlight 50:52
From Data to Deployment: Safeguarding Enterprise AI with Security and Governance
Watch Now View
Spotlight 11:29
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Watch Now View
Spotlight 11:18
Rewiring Real Estate Finance — How Walker & Dunlop Is Giving Its $135B Portfolio a Data-First Refresh
Watch Now View
Spotlight 13:38
Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines
Sanofi Thumbnail
Watch Now View
Spotlight 10:35
There’s Been a Material Shift in the Data Center of Gravity
Watch Now View
Spotlight 14:21
AI Governance Is Much More than Technology Risk Mitigation
AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3
You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge
Watch Now View
Spotlight 47:42
Cybersecurity – Where Leaders are Buying, Building, and Partnering
Rehan Jalil
Watch Now View
Spotlight 27:29
Building Safe AI with Databricks and Gencore
Rehan Jalil
Watch Now View
Spotlight 46:02
Building Safe Enterprise AI: A Practical Roadmap
Watch Now View
Latest
View More
DataAI Security: Why Healthcare Organizations Choose Securiti
Discover why healthcare organizations trust Securiti for Data & AI Security. Learn key blockers, five proven advantages, and what safe data innovation makes possible.
View More
The Anthropic Exploit: Welcome to the Era of AI Agent Attacks
Explore the first AI agent attack, why it changes everything, and how DataAI Security pillars like Intelligence, CommandGraph, and Firewalls protect sensitive data.
View More
Aligning Your AI Systems With GDPR: What You Need to Know
Securiti’s latest blog walks you through all the important information and guidance you need to ensure your AI systems are compliant with GDPR requirements.
Network Security: Definition, Challenges, & Best Practices View More
Network Security: Definition, Challenges, & Best Practices
Discover what network security is, how it works, types, benefits, and best practices. Learn why network security is core to having a strong data...
Australia’s Guidance for AI Adoption View More
Australia’s Guidance for AI Adoption
Access the whitepaper to learn about what businesses need to know about Australia’s Guidance for AI Adoption. Discover how Securiti helps ensure compliance.
Montana Privacy Amendment on Notices: What to Change by Oct 1 View More
Montana Privacy Amendment on Notices: What to Change by Oct 1
Download the whitepaper to learn about the Montana Privacy Amendment on Notices and what to change by Oct 1. Learn how Securiti helps.
View More
Solution Brief: Microsoft Purview + Securiti
Extend Microsoft Purview with Securiti to discover, classify, and reduce data & AI risk across hybrid environments with continuous monitoring and automated remediation. Learn...
Top 7 Data & AI Security Trends 2026 View More
Top 7 Data & AI Security Trends 2026
Discover the top 7 Data & AI security trends for 2026. Learn how to secure AI agents, govern data, manage risk, and scale AI...
View More
Navigating HITRUST: A Guide to Certification
Securiti's eBook is a practical guide to HITRUST certification, covering everything from choosing i1 vs r2 and scope systems to managing CAPs & planning...
The DSPM Architect’s Handbook View More
The DSPM Architect’s Handbook: Building an Enterprise-Ready Data+AI Security Program
Get certified in DSPM. Learn to architect a DSPM solution, operationalize data and AI security, apply enterprise best practices, and enable secure AI adoption...
What's
New