Skip to content

Are you ready for HIPAA 2.0? Find out…

Close
  • Products
    • Products

      • Governance Suite Use Spirion’s suite to enhance data security posture management
      • Sensitive Data Platform Scan, classify, remediate using SaaS solution
      • Sensitive Data Finder Automate Subject Rights Request processing
      • Sensitive Data Watcher Actively monitor and understand your data
      • Sensitive Data Manager Scan, classify, remediate using on-premise solution
    • Learn more

      • Data Security Posture Management Identify security and privacy risks wherever data lives and secure where it travels.
      • Data Risk Assessment Proactive audit – discover how your org protects its sensitive data before a data breach occurs
      • Data Impact Assessment Reactive audit – respond to an incident for swift and accurate data breach mitigation
      • Privacy-Grade™ Compliance and privacy standards that set the bar for sensitive data protection.
    • Technology

      • CADIA Advanced ML/AI to accurately discover and classify sensitive data
      • AnyFinds™ Minimize false positives and deliver accurate matches
      • Interrogated Platforms More data sources than anyone including both unstructured and structured data
      • Marketplace Integrate with security tools and explore resources to boost data protection
      • Governance Framework Outlines key stages of readiness to safeguard sensitive data and maintain compliance.
    • WHITE PAPER

      Complete Your Microsoft 365 Data Protection Stack
  • Solutions
    • Industry Solutions

      • eCommerce
      • Finance
      • Healthcare
      • Higher Education
      • Manufacturing
      • Telecommunications
    • Security & Privacy Use Cases

      • Data Security Posture Management (DSPM)
      • Microsoft Purview Integration
      • DISCOVER: Sensitive data-at-rest is data-at-risk
      • CLASSIFY: Unify data governance efforts with context-rich classification
      • CONTROL: Reduce the risk and cost of a data breach
      • COMPLY: Accelerate PCI-DSS compliance
    • Compliance

      • Overview
      • GDPR
      • CCPA
      • CMMC
      • CPRA
      • GLBA
      • HIPAA
      • The New York SHIELD Act
      • PCI DSS
      • Other
    • WHITE PAPER

      Complete Your Microsoft 365 Data Protection Stack
  • Resources
    • Resources

      • Blog
      • Case Studies
      • Data Sheet
      • Events
      • MS Purview Calculator
      • Podcast
      • Whitepapers & Research
    • Core Expertise

      • How to take a data-centric approach to security
      • What are cyber insurance requirements?
      • What is data lifecycle management?
      • What is data loss prevention?
      • What is a data risk assessment?
      • What is endpoint security?
      • What is a sensitive data governance framework?
    • Core Capabilities

      • Data Discovery Software Tools: Capabilities and Benefits
      • What is sensitive data discovery?
      • What is semantic data discovery?
      • What is data classification?
      • What is data remediation?
    • WHITE PAPER

      Complete Your Microsoft 365 Data Protection Stack
  • Partners
  • Customers
    • Customers

    • Customer Services
    • Customer Portal
    • Premium Support
  • Company
    • Company

    • About Us
    • Careers
    • Leadership
    • News
    • Our History
  • Search
  • Contact
 Build your own demo
Build your own demo
  • Products
    • Governance Suite
    • Sensitive Data Platform
    • Sensitive Data Finder
    • Sensitive Data Watcher
    • Sensitive Data Manager
    • Learn more
      • Data Security Posture Management
      • Data Risk Assessment
      • Data Impact Assessment
      • Privacy-Grade™
    • Technology
      • CADIA
      • AnyFInds™
      • Interrogated Platforms
      • Marketplace
      • Governance Framework
  • Solutions
    • Industry Solutions
      • eCommerce
      • Finance
      • Healthcare
      • Higher Education
      • Manufacturing
      • Telecommunications
    • Security & Privacy Use Cases
      • Data Security Posture Management (DSPM)
      • Microsoft Purview Integration
      • DISCOVER: Sensitive data-at-rest is data-at-risk
      • CLASSIFY: Unify data governance efforts with context-rich classification
      • CONTROL: Reduce the risk and cost of a data breach
      • COMPLY: Accelerate PCI-DSS compliance
    • Compliance
      • Overview
      • GDPR
      • CCPA
      • CMMC
      • CPRA
      • GLBA
      • HIPPA
      • The New York SHIELD Act
      • PCI DSS
      • Other
  • Resources
    • Resources
      • Blog
      • Case Studies
      • Data Sheet
      • Events
      • MS Purview Calculator
      • Podcast
      • Whitepapers & Research
    • Core Expertise
      • How to take a data-centric approach to security
      • What are cyber insurance requirements?
      • What is data lifecycle management
      • What is data loss prevention?
      • What is a data risk assessment?
      • What is endpoint security?
      • What is a sensitive data governance framework?
    • Core Capabilities
      • Data Discovery Software Tools: Capabilities and Benefits
      • What is sensitive data discovery?
      • What is semantic data discovery?
      • What is data classification?
      • What is data remediation?
  • Partners
  • Customers
    • Customer Services
    • Customer Portal
    • Premium Support
  • Company
    • About Us
    • Careers
    • Leadership
    • News
    • Our History
  • Contact
Build your own demo
Hero Starlight Image
  • CCPA Summary and Key Issues

  • Consent
  • Enforcement
  • Financial Incentives
  • Jurisdictional Thresholds
  • Information Security
  • Marketing and Advertising
  • Notices to Consumers
  • Personal Information
  • Privacy Policy
  • Requests for Disclosure of Personal Information
  • Requests for Deletion
  • Service Providers
  • Sales of Minors’ Information
  • Sales to Third Parties
  • Verification of Requestors
View CCPA Act

Verification of Requestors

Verification Under the CCPA Statute

A leading challenge to a business in complying with the CCPA is determining whether a consumer who is requesting to know what information that business has on him/her is, in fact, truly that consumer and not an imposter. Section 1798.140(y) of the statute defines a “[v]erifiable consumer request” as “a request that is made by a consumer…that the business can reasonably verify…to be the consumer about whom the business has collected personal information.” It goes on to state that “[a] business is not obligated to provide information to the consumer…if the business cannot verify…that the consumer making the request is the consumer about whom the business has collected information or is a person authorized by the consumer to act on such consumer’s behalf.” The statute cites a long list of requirements in the context of verification:

  • A business shall provide the information specified in §1798.100(a) [i.e., the categories and specific pieces of personal information the business has collected] to a consumer only upon receipt of a verifiable consumer request. 1
  • A business that receives a verifiable consumer request from a consumer to delete the consumer’s personal information pursuant to §1798.105(a) [i.e., right to request that a business delete any personal information about the consumer which the business has collected from the consumer] shall delete the consumer’s personal information from its records and direct any service providers to delete the consumer’s personal information from their records. 2
  • A business that collects personal information about a consumer shall disclose to the consumer, pursuant to §1798.130(a)(3) [i.e., a business shall, in a form that is reasonably accessible to consumers the category or categories the personal information collected about the consumer in the preceding 12 months], the information specified in §1798.110(a) [i.e., what personal information is being collected and circumstances surrounding that collection] upon receipt of a verifiable consumer
    request from the consumer. 3
  • A business that sells personal information about a consumer, or that discloses a consumer’s personal information for a business purpose, shall disclose, pursuant to §1798.130(a)(4) [i.e., information sold or disclosed in the previous 12 months], the information specified in 1798.115(a) [i.e., the categories of personal information collected, sold, and shared] to the consumer upon receipt of a verifiable consumer request from the consumer. 4
  • A business must disclose and deliver the required information to a consumer free of charge within 45 days of receiving a verifiable consumer request from the consumer. 5
  • The business shall promptly take steps to determine whether the request is a verifiable consumer request, but this shall not extend the business’ duty to disclose and deliver the information within 45 days of receipt of the consumer’s request.” 6
  • The business may require authentication of the consumer that is reasonable in light of the nature of the personal information requested, but shall not require the consumer to create an account with the business in order to make a verifiable consumer request. 7
Verification Under the CCPA Regulations

Section 999.323(a) of the Regulations prescribes the general rule of verification of the identity of requestors:

“A business shall establish, document, and comply with a reasonable method for verifying that the person making a request to know or a request to delete is the consumer about whom the business has collected information.”

The rest of §999.323 addresses the process for constructing an identity verification process. Relevant points include:

  • “Whenever feasible, match the identifying information provided by the consumer to the personal information of the consumer already maintained by the business, or use a third-party identity verification service that complies with this section.” 8 The concept of a third-party identity verification service is not found in the CCPA statute but is introduced here.
  • “Avoid collecting the types of personal information identified in Civil Code section 1798.81.5(d), unless necessary for the purpose of verifying the consumer.” This is a reference to personal information such as Social Security numbers, driver’s license numbers and similar identification numbers, and other personal information that is particularly sensitive or advances identity theft. 9
  • Considerations of potential elements for use in the verification process include: 10a. The type, sensitivity, and value of the personal information collected and maintained about theconsumer (this point cites §1798.81.5(d) personal information as presumptively sensitive);
    b. The risk of harm to the consumer posed by any unauthorized access or deletion;
    c. The likelihood that fraudulent or malicious actors would seek the personal information;
    d. Whether the personal information to be provided by the consumer…is sufficiently robust to protect against fraudulent requests or being spoofed or fabricated;
    e. The manner in which the business interacts with the consumer; and
    f. Available technology for verification.Point “d” does not describe what qualifies as “robust”; the idea of certain types of personal information not lending itself to fraudulent requests is almost certainly new.
  • A side effect of verifying a requestor is the necessity of asking him/her for additional personal information in order to complete the verification. Section 999.323(c) articulates the general rule that “[a] business shall generally avoid requesting additional information from the consumer for purposes of verification.” It qualifies this by stating that[i]f, however, the business cannot verify the identity of the consumer from the information already maintained by the business, the business may request additional information from the consumer, which shall only be used for the purposes of verifying the identity of the consumer seeking to exercise their rights under the CCPA, and for security or fraud-prevention purposes.This subsection closes by stating that “[t]he business shall delete any new personal information collected for the purposes of verification as soon as practical after processing the consumer’s request, except as required to comply with section 999.317” [i.e., record keeping provisions].
  • “A business shall not require the consumer or the consumer’s authorized agent to pay a fee for the verification of their request to know or request to delete.” 11
  • “If a business maintains consumer information that is deidentified, a business is not obligated to provide or delete this information in response to a consumer request or to re-identify individual data to verify a consumer request.” 12

1. Cal. Civ. Code §1798.100(c).
2. Cal. Civ. Code §1798.105(c).
3. Cal. Civ. Code §1798.110(b).
4. Cal. Civ. Code §1798.115(b).
5. Cal. Civ. Code §1798.130(a)(2).
6. Id.
7. Id.
8. The CCPA Regulations §999.323(b)(1).
9. The CCPA Regulations §999.323(b)(2).
10. The CCPA Regulations §999.323(b)(3).
11. The CCPA Regulations §999.323(d).
12. The CCPA Regulations §999.323(f).

Ready to get started?

Schedule a personalized demo with one of our data security experts to see Spirion data protection solutions in action.

Watch demo now
Discover, protect and comply.

Protect sensitive information with a solution that is customizable to your organizational needs. When your job is to protect sensitive data, you need the flexibility to choose solutions that support your security and privacy initiatives.

Governance Suite →

social icon
Industry Solutions

Not knowing where sensitive client financial data resides and failing to take the right security precautions can be a costly mistake for your organization. Find out how Data privacy is treated in your sector.

Read more →

  • Products
    • Sensitive Data Platform
    • Sensitive Data Finder
    • Sensitive Data Watcher
  • Solutions
    • What is sensitive data discovery?
    • What is data loss prevention?
    • What is data classification?
    • Security Use Cases
  • Compliance
    • News
    • Services
  • Need Help?
    • Customer Portal
    • 646-863-8301​​​​​​​​​​​​​​​​​​​​​
    • 3030 North Rocky Point Drive West,
      Suite 470
      Tampa, FL 33607
LATEST BLOG POSTS
  • Why Data Classification is the Unsung Hero of Financial Data Security
  • Beyond the Firewall: Protecting Student Data with Intelligent Data Classification
  • From Reactive to Proactive: Achieving Data Privacy Through Automation

© 2024 Spirion, LLC. All Rights Reserved

  • Legal
  • Privacy
  • Sitemap