Skip to content

Webinar: CMMC Is Here! Is Your Org Ready? 10/16, 2:00-3:00 PM ET [Register]

Close
Spirion_archTIS (1)
Spirion_archTIS (1)
  • Products
    • Products

      • Governance Suite Use Spirionโ€™s suite to enhance data security posture management
      • Sensitive Data Platform Scan, classify, remediate using SaaS solution
      • Sensitive Data Finder Automate Subject Rights Request processing
      • Sensitive Data Watcher Actively monitor and understand your data
      • Sensitive Data Manager Scan, classify, remediate using on-premise solution
      • archTIS NC Protect Dynamic data-centric protection for Microsoft 365, SharePoint Server and File Shares
    • Learn more

      • Data Security Posture Management Identify security and privacy risks wherever data lives and secure where it travels.
      • Data Risk Assessment Proactive audit โ€“ discover how your org protects its sensitive data before a data breach occurs
      • Data Impact Assessment Reactive audit โ€“ respond to an incident for swift and accurate data breach mitigation
      • Privacy-Gradeโ„ข Compliance and privacy standards that set the bar for sensitive data protection.
    • Technology

      • CADIA Advanced HITL machine learning to accurately discover and classify sensitive data.
      • AnyFindโ„ข Minimize false positives and deliver accurate matches
      • Interrogated Platforms More data sources than anyone including both unstructured and structured data
      • Marketplace Integrate with security tools and explore resources to boost data protection
      • Governance Framework Outlines key stages of readiness to safeguard sensitive data and maintain compliance.
    • WHITE PAPER

      Complete Your Microsoft 365 Data Protection Stack
  • Solutions
    • Industry Solutions

      • eCommerce
      • Finance
      • Healthcare
      • Higher Education
      • Manufacturing
      • Telecommunications
    • Security & Privacy Use Cases

      • Data Security Posture Management (DSPM)
      • Microsoft Purview Integration
      • DISCOVER: Sensitive data-at-rest is data-at-risk
      • CLASSIFY: Unify data governance efforts with context-rich classification
      • CONTROL: Reduce the risk and cost of a data breach
      • COMPLY: Accelerate PCI-DSS compliance
    • Compliance

      • Overview
      • GDPR
      • CCPA
      • CMMC
      • CPRA
      • GLBA
      • HIPAA
      • The New York SHIELD Act
      • PCI DSS
      • Other
    • WHITE PAPER

      Complete Your Microsoft 365 Data Protection Stack
  • Resources
    • Resources

      • Blog
      • Case Studies
      • Data Sheet
      • Events
      • MS Purview Calculator
      • Podcast
      • Whitepapers & Research
    • Core Expertise

      • How to take a data-centric approach to security
      • What are cyber insurance requirements?
      • What is data lifecycle management?
      • What is data loss prevention?
      • What is a data risk assessment?
      • What is endpoint security?
      • What is a sensitive data governance framework?
    • Core Capabilities

      • Data Discovery Software Tools: Capabilities and Benefits
      • What is sensitive data discovery?
      • What is semantic data discovery?
      • What is data classification?
      • What is data remediation?
    • WHITE PAPER

      Complete Your Microsoft 365 Data Protection Stack
  • Partners
  • Customers
    • Customers

    • Customer Services
    • Customer Portal
    • Premium Support
  • Company
    • Company

    • About Us
    • Careers
    • Leadership
    • News
    • Our History
  • Search
  • Contact
 Build your own demo
Build your own demo
  • Products
    • Governance Suite
    • Sensitive Data Platform
    • Sensitive Data Finder
    • Sensitive Data Watcher
    • Sensitive Data Manager
    • archTIS NC Protect
    • Learn more
      • Data Security Posture Management
      • Data Risk Assessment
      • Data Impact Assessment
      • Privacy-Gradeโ„ข
    • Technology
      • CADIA
      • AnyFIndโ„ข
      • Interrogated Platforms
      • Marketplace
      • Governance Framework
  • Solutions
    • Industry Solutions
      • eCommerce
      • Finance
      • Healthcare
      • Higher Education
      • Manufacturing
      • Telecommunications
    • Security & Privacy Use Cases
      • Data Security Posture Management (DSPM)
      • Microsoft Purview Integration
      • DISCOVER: Sensitive data-at-rest is data-at-risk
      • CLASSIFY: Unify data governance efforts with context-rich classification
      • CONTROL: Reduce the risk and cost of a data breach
      • COMPLY: Accelerate PCI-DSS compliance
    • Compliance
      • Overview
      • GDPR
      • CCPA
      • CMMC
      • CPRA
      • GLBA
      • HIPPA
      • The New York SHIELD Act
      • PCI DSS
      • Other
  • Resources
    • Resources
      • Blog
      • Case Studies
      • Data Sheet
      • Events
      • MS Purview Calculator
      • Podcast
      • Whitepapers & Research
    • Core Expertise
      • How to take a data-centric approach to security
      • What are cyber insurance requirements?
      • What is data lifecycle management
      • What is data loss prevention?
      • What is a data risk assessment?
      • What is endpoint security?
      • What is a sensitive data governance framework?
    • Core Capabilities
      • Data Discovery Software Tools: Capabilities and Benefits
      • What is sensitive data discovery?
      • What is semantic data discovery?
      • What is data classification?
      • What is data remediation?
  • Partners
  • Customers
    • Customer Services
    • Customer Portal
    • Premium Support
  • Company
    • About Us
    • Careers
    • Leadership
    • News
    • Our History
  • Contact
Build your own demo
Hero Starlight Image
  • CCPA Summary and Key Issues

  • Consent
  • Enforcement
  • Financial Incentives
  • Jurisdictional Thresholds
  • Information Security
  • Marketing and Advertising
  • Notices to Consumers
  • Personal Information
  • Privacy Policy
  • Requests for Disclosure of Personal Information
  • Requests for Deletion
  • Service Providers
  • Sales of Minorsโ€™ Information
  • Sales to Third Parties
  • Verification of Requestors
View CCPA Act

Requests for Disclosure of Personal Information

The Statute

Per the CCPA statute ยงยง1798.110 and 130, upon request, a business that holds personal information about a consumer must disclose within 45 days of a verifiable consumer request the following:

  1. The categories of personal information it has collected about that consumer;
  2. The categories of sources from which the personal information is collected;
  3. The business or commercial purpose for collecting or selling personal information;
  4. The categories of third parties with whom the business shares personal information; and
  5. The specific pieces of personal information it has collected about that consumer.

The statute defines a โ€œ[v]erifiable consumer requestโ€ as a

means a request that is made by a consumerโ€ฆthat the business can reasonably verify, pursuant to regulations adopted by the Attorney Generalโ€ฆto be the consumer about whom the business has collected personal information. A business is not obligated to provide information to the consumerโ€ฆif the business cannot verifyโ€ฆthat the consumer making the request is the consumer about whom the business has collected informationโ€ฆ. 1

The Regulations

The CCPA Regulations call this Request for Disclosure a โ€œRequest to Knowโ€:

โ€œRequest to knowโ€ means a consumer request that a business disclose personal information
that it has collected about the consumer pursuant to Civil Code sections 1798.100, 1798.110, or
1798.115. It includes a request for any or all of the following:

  1. Specific pieces of personal information that a business has collected about the consumer;
  2. Categories of personal information it has collected about the consumer;
  3. Categories of sources from which the personal information is collected;
  4. Categories of personal information that the business sold or disclosed for a business purpose about the consumer;
  5. Categories of third parties to whom the personal information was sold or disclosed for abusiness purpose; and
  6. The business or commercial purpose for collecting or selling personal information.

The Regulations provide specifics with respect to effectuating Requests to Know. Per ยง999.312, a business must provide 2 or more designated methods for a consumer to submit a Request to Know unless itโ€™s an online-only business and has a direct relationship with the consumer.

Per ยง999.313, businesses have

  • 10 business days to confirm receipt of the Request to Know
  • 45 calendar days to fulfil the Request to Know
    • Can extend 45 additional days but have to provide a reason within the first 45 days
      [all emphasis added]

The in-scope time period runs 12 months prior to the date of the request.

Per ยง999.313, for requests that seek the disclosure of specific pieces of information about the consumer, if a business canโ€™t verify the identity of the person making the request, the business shall not disclose any specific pieces of personal information to the requestor and shall inform the consumer requestor that it cannot verify their identity. 2 [emphasis added]

Furthermore, โ€œ[a] business shall not disclose in response to a request to know a consumerโ€™s Social Security number, driverโ€™s license number or other government-issued identification number, financial account number, any health insurance or medical identification number, an account password, or security questions and answers, or unique biometric data generated from measurements or technical analysis of human characteristics.โ€ 3 [emphasis added]

However, the business shall (for example), respond that it collects โ€œunique biometric data including a fingerprint scanโ€ without disclosing the actual fingerprint scan data. 4


1. Cal. Civ. Code ยง1798.140(y).
2. The CCPA Regulations ยง999.313(c)(1).
3. The CCPA Regulations ยง999.313(c)(4).
4. Id.

Ready to get started?

Schedule a personalized demo with one of our data security experts to see Spirion data protection solutions in action.

Watch demo now
Discover, protect and comply.

Protect sensitive information with a solution that is customizable to your organizational needs. When your job is to protect sensitive data, you need the flexibility to choose solutions that support your security and privacy initiatives.

Governance Suite โ†’

social icon
Industry Solutions

Not knowing where sensitive client financial data resides and failing to take the right security precautions can be a costly mistake for your organization. Find out how Data privacy is treated in your sector.

Read more โ†’

Spirion_archTIS (1)
  • Products
    • Sensitive Data Platform
    • Sensitive Data Finder
    • Sensitive Data Watcher
  • Solutions
    • What is sensitive data discovery?
    • What is data loss prevention?
    • What is data classification?
    • Security Use Cases
  • Compliance
    • News
    • Services
  • Need Help?
    • Customer Portal
    • 646-863-8301โ€‹โ€‹โ€‹โ€‹โ€‹โ€‹โ€‹โ€‹โ€‹โ€‹โ€‹โ€‹โ€‹โ€‹โ€‹โ€‹โ€‹โ€‹โ€‹โ€‹โ€‹
    • 3030 North Rocky Point Drive West,
      Suite 470
      Tampa, FL 33607
LATEST BLOG POSTS
  • Not All DSPM Solutions Are Created Equal
  • CMMC Final Rule Published: What It Means for DoD Contractors and How Spirion Can Helpโ€ฏ
  • Spirion Sensitive Data Platform v13.5: Unlocking the Next Generation of Data Security

ยฉ 2025 archTIS US Inc. All Rights Reserved

  • Legal
  • Privacy
  • Sitemap