In this article

Sign up for our newsletter

Share this article

Virtually every country has enacted some sort of data privacy law to regulate how information is collected, how data subjects are informed, and what control a data subject has over their information once it is transferred. Failure to follow applicable data privacy laws may lead to fines, lawsuits, and even prohibiting a site's use in certain jurisdictions. Navigating these laws and regulations can be daunting, but all website operators should be familiar with data privacy laws that affect their users. 

New and Upcoming Data Privacy Laws in 2024

It's important to remain cognizant of existing data privacy laws, but perhaps you just want to review what's new in 2024 and beyond. Some of these laws are already in effect in 2024, will go into effect this year, or have relevant dates in the future.

U.S. Data Privacy Laws

Despite numerous proposals over the years, no one comprehensive federal law governs data privacy in the U.S. yet. As of this writing, the American Privacy Rights Act has been introduced in Congress. It still faces significant hurdles before it can ultimately be enacted into law, however.

In the meantime, however, individual states have acted rather than wait on the federal government. There's a complex patchwork of sector-specific and medium-specific laws, including laws and regulations that address telecommunications, health information, credit information, financial institutions, and marketing. 

The FTC

An important enforcement agency in the U.S. is the Federal Trade Commission (FTC). Its authority to regulate on behalf of consumer protections comes from The Federal Trade Commission Act (FTC Act), which has broad jurisdiction over commercial entities under its authority to prevent unfair or "deceptive trade practices." 

While the FTC uses its authority to issue regulations, enforce privacy laws, and take enforcement actions to protect consumers. For example, the FTC might take impose action against organizations that:

  • Fail to implement and maintain reasonable data security measures
  • Fail to abide by any applicable self-regulatory principles of the organization's industry
  • Fail to follow a published privacy policy
  • Transfer personal information in a manner not disclosed in the privacy policy
  • Make inaccurate privacy and security representations (i.e., lying) to consumers and in privacy policies
  • Fail to provide sufficient security for personal data
  • Violate consumer data privacy rights by collecting, processing, or sharing consumer information
  • Engage in misleading advertising practices

Other federal laws that govern the collection of information online include:

State Privacy Laws

The U.S. also has hundreds of sectoral data privacy and data security laws among its states. State attorneys general oversee data privacy laws governing the collection, storage, safeguarding, disposal, and use of personal data collected from their residents, especially regarding data breach notifications and the security of Social Security numbers. Some apply only to governmental entities, others to private entities, and others apply to both. 

In addition to sectoral privacy laws, the U.S. is experiencing a massive drive toward pushing privacy legislation at the state level. That’s because the federal government hasn’t been able to find a consensus on how to legislate broadly. Rather than wait, state lawmakers have been nudged by consumers, consumer advocates, and even companies to set their own rules. 

Of course, companies would rather comply with a single federal standard than hire attorneys and privacy professionals, invest in compliance tools, and establish a robust compliance program that covers all applicable state laws. But states see the lack of any data privacy protections as more damaging than overly complex data privacy protections.

Starting with 2023's state privacy laws and moving into 2024 and beyond, here’s a breakdown of where things stand. 

California Privacy Rights Act (CPRA)

The most comprehensive state data privacy legislation to date is the California Privacy Rights Act (CPRA). The CPRA was passed by a ballot initiative in November 2020 and amended California’s previous state privacy law, the California Consumer Privacy Act (CCPA). It went into effect on January 1, 2023.

The CPRA is cross-sector legislation that introduces important definitions and broad individual consumer rights and imposes substantial duties on entities or persons that collect personal information about or from a California resident. These duties include informing data subjects when and how data is collected; allowing them to opt-out of data collection; allowing them to access, correct, and delete such information; and restricting how businesses can transfer personal information to other entities.

Many of the above requirements were also included in the CCPA, but once the CPRA passed, the law was amended to include the following:

  • Right to rectification: This updates and adds to a consumer’s right to correct inaccurate personal information.
  • Right to restriction: This grants consumers the right to limit the use and disclosure of their sensitive personal information.
  • Sensitive personal information: This updates the definition of personal information. Certain types of information, like a consumer’s Social Security number, must be treated with special protections. 

The CPRA also:

  • Increased fines for breaches of children’s data threefold
  • Expanded breach liability beyond breaches of unencrypted data to disclosures of credentials (like an email address or password) that could lead to access to a consumer’s account
  • Limited the duration of time a company may retain a consumer’s information to only what’s necessary and “proportionate” to the reason it was collected in the first place
  • Requires companies working with third parties, contractors, and outside service providers to contractually mandate that those organizations exercise the same level of privacy protection to data shared with them as the first party

One of the most significant features of the CPRA is its enforcement. While state attorneys general typically handle privacy cases—unless the FTC is involved, and even then, it’s often a partnership—the CPRA establishes a new privacy regulator.

The California Privacy Protection Agency (CPPA) can fine transgressors, hold hearings about privacy violations, and clarify privacy guidelines. It’s a five-member board, and it starts enforcing six months after the CPRA goes into effect on July 1, 2023.

Download the Guide - Break down the major tasks you need to complete for CPRA  compliance.

Virginia's Consumer Data Protection Act (CDPA) 

Virginia's Consumer Data Protection Act (CDPA) was passed on March 2, 2021. It grants Virginia consumers certain rights over their data and requires companies covered by the law to comply with rules on the data they collect, how it's treated and protected, and with whom it's shared.

The law contains some similarities to the EU General Data Protection Regulation's (GDPR) provisions and the CPRA. It applies to entities that do business in Virginia or sell products and services targeted to Virginia residents and also meet one of the following:

  • Control or process the personal data of 100,000 or more
  • Control or process the personal data of at least 25,000 consumers and earn 50% of their revenue by selling personal information 

The CDPA requires companies covered by the law to assist consumers in exercising their data rights by obtaining opt-in consent before processing their sensitive data (non-sensitive data may be collected so long as the consumer is notified), disclosing when their data will be sold, and allowing them to opt-out of data collection. It also requires companies to provide users with a clear privacy notice that enables consumers to opt-out of targeted advertising. In addition, it requires data brokers to honor consumers’ requests to opt out of data processing, among other requirements.

The CDPA went into effect on January 1, 2023.

Colorado Privacy Act (CPA)

In June 2020, Colorado became the third U.S. state to pass a privacy law. The Colorado Privacy Act grants Colorado residents rights over their data and places obligations on data controllers and processors. It contains some similarities to California's CPRA, Virginia's CDPA, and the EU’s GDPR.

While there are similarities, such as some form of a right to opt-out, special protections for sensitive data, and the adoption of some privacy-by-design principles, the significant differences are in the details.
The CPA applies to businesses that collect personal data from 100,000 Colorado residents or collect data from 25,000 Colorado residents and derive revenue from the sale of that data. 

The law lists five rights granted to Colorado residents once the law becomes effective on July 1, 2023. They are:

  • The right to opt-out of targeted ads, the sale of their personal data, or being profiled
  • The right to access the data a company has collected about them
  • The right to correct data that's been collected about them
  • The right to request the data collected about them is deleted
  • The right to data portability (that is, the right to take your data and move it to another company)
     

There are 17 blanket exemptions within the law. Data exemptions include:

  • If the data was collected for Colorado health insurance law purposes
  • If the entity collecting the data or the data collected is already covered by certain sectoral laws, including COPPA or the Family Educational Rights and Privacy Act (FERPA)
  • If the data has been de-identified or pseudonymized
  • If the data is being maintained and used by a consumer reporting agency
  • If the data is being used for employment records purposes

Since the law goes into effect midway through 2023, businesses should expect updates to the law via rulemaking in the first half of the year.

Utah Consumer Privacy Act (UCPA)

In March 2022, Utah became the fourth state to enact a comprehensive consumer privacy law, which will take effect on December 31, 2023. The Utah Consumer Privacy Act (UCPA) draws from the CDPA, CPA, and CPRA.

The law applies to both data controllers and processors that generate over $25 million in annual revenue and either:

  • Control or process personal data for over 100,000 consumers yearly, or
  • Derive over 50% of the entity’s gross revenue from the sale of personal data and controls or processes the personal data of 25,000 or more consumers.

Similarly to the statutes in Colorado and Virginia, there are exemptions for certain types of personal data; however, they’re broader at both the entity and data levels.

The law does not apply to governmental entities or third parties acting on behalf of a governmental entity, tribes, institutions of higher education, nonprofit corporations, business associates, information that meets the definition of protected health information for HIPAA and related regulations, and more.

Financial institutions governed by the GLBA (the Gramm-Leach-Bliley Act) and information in the FCRA (Fair Credit Reporting Act) also aren’t subject to the UCPA. Data processed or maintained in the course of employment is also exempt.

Consumers have the right to:

  • Confirm whether a controller is processing their personal data and accessing or deleting personal data provided
  • Obtain a copy of their personal data in a portable, accessible format
  • Opt-out of processing of personal data for targeted advertising or sale

In contrast to the CDPA and CPA, the UCPA does not include the right to opt-out of profiling nor codify the right to correct inaccuracies in their data.

Connecticut Data Privacy Act (CTDPA)

Connecticut's fifth and most recent state to adopt a comprehensive consumer privacy law. Senate Bill 6, or “An Act Concerning Personal Data Privacy and Online Monitoring” (CTDPA), went into effect July 1, 2023.

The law also draws from Virginia and Colorado’s statutes, with a few departures. It applies to businesses that, during the preceding calendar year:

  • Controlled or processed personal data of 100,000 or more Connecticut residents, excluding residents whose personal data is controlled or processed solely to complete a payment transaction; or
  • Controlled or processed the personal data of not less than 25,000 consumers and derived more than 25% of their gross revenue from the sale of personal data.

The law is the first to specify that payment transaction data is not subject to the law, which is for small businesses that process information to complete a transaction, such as restaurants. Consumers can opt out of data processing for the purposes of targeted advertisements, sale to a third party, and profiling.

The state allows a 60-day period to remedy violations through December 31, 2024.

Montana Consumer Data Privacy Act (MTCDPA) 

Montana Governor Greg Gianforte signed the Montana Consumer Data Privacy Act (MTCDPA) into law on May 19, 2023. However, the law does not go into effect until October 1, 2024. 

The MTCDPA applies to any data controller that handles the personal data of at least 50,000 Montana residents, except for data used exclusively for payment transactions. Additionally, controllers that manage personal data from at least 25,000 consumers and derive more than 25% of their revenue from selling personal data also must comply with the law. Notably, there is no revenue threshold associated with the MTCDPA. 

Under the law, Montanans have the right to opt out of the sale of their personal data, the right to know if a controller is processing their personal information and access to that data, the right to request the correction of inaccurate or outdated information, the right to ask a controller to delete their personal data, the right to portability, and the right to not be discriminated against for exercising their rights. 

The MTCDPA includes the usual range of exemptions, including government agencies, nonprofits, higher education institutions, national securities associations registered under the Securities Exchange Act, organizations governed by GLBA, and organizations subject to HIPAA. 

One of the more unique features of the law is that it doesn't specify a particular dollar amount for fines or other statutory damages for breaking the law. It simply states that the Attorney General can take legal action. Businesses will also have a 60-day cure period to address any violations, though this period expires April 1, 2026. 

Tennessee Information Protection Act (TIPA)

The Tennessee Information Protection Act (TIPA), signed into law in May 2023 and effective from July 1, 2025, positions Tennessee among states taking proactive steps in consumer privacy. The TIPA applies to businesses exceeding $25 million in revenue that engage with Tennessee or its residents and either: 

  • Control or process the personal information of at least 175,000 consumers.  
  • Control or process the personal information of at least 25,000 consumers and derive more than 50 percent of gross revenue from the sale of personal information. 

Consumer rights under TIPA include the ability to confirm, access, correct, delete, and obtain personal information. The law places responsibilities on data controllers, emphasizing data minimization, security practices, and non-discrimination.  

In contrast with other state laws, the TIPA provides a narrower applicability threshold, a generous two-plus-year on-ramp period for businesses, and an affirmative defense option for those with written privacy programs aligned with specified frameworks like NIST. In this circumstance, an affirmative defense helps protect businesses against liability. Because of these and other unique features, the TIPA is one of the more business-friendly U.S. privacy laws. 

Enforcement falls under the state attorney general, with a 60-day cure period for violators. Penalties may include fines up to $7,500 per violation, with the potential for tripled damages for willful violations. 

Oregon Consumer Privacy Act (OCPA)

The Oregon Consumer Privacy Act (OCPA) represents Oregon's response to the absence of a federal privacy law. Signed into law in July 2023, the OCPA is set to become effective on July 1, 2024, concurrently with Texas's privacy law. The law applies to businesses conducting operations in Oregon or providing services to its residents and either: 

  • Control or process the personal data of 100,000 or more consumers. 
  • Control or process the personal data of 25,000 or more consumers while deriving a quarter or more of their annual gross revenue from selling personal data. 

Notable exemptions to the OCPA involve information governed by acts like HIPAA and GLBA like other state laws. However, the OCPA is distinct that entities subject to these acts must still comply with the OCPA for non-covered data. The law grants consumers the usual rights, including access, correction, deletion, and opt-out options for targeted advertising or profiling. Controllers must respond to requests within 45 days, extendable by an additional 45 days, and provide justification for any rejection. 

Unique features of the OCPA include its data-level exemptions for HIPAA and GLBA (as opposed to entity-level exemptions) and its broad definition of sensitive data. The OCPA includes the usual items under the umbrella of sensitive data, but also includes data types like an individual’s status as transgender or nonbinary, citizenship or immigration status, and more.  

Enforcement falls under the state attorney general, with potential fines up to $7,500 per violation. Unlike some state laws, the OCPA incorporates a 30-day right to cure, a five-year statute of limitations, and provisions for additional fees if the attorney general prevails in an action. 

Texas Data Privacy and Security Act (TDPSA)

The Texas Data Privacy and Security Act (TDPSA), signed into law on June 18, 2023, by Texas Governor Greg Abbott, positions Texas as the second-largest state (after California) to enact a comprehensive data privacy law. 

Unique aspects of the TDPSA include a deviation from traditional applicability criteria, replacing revenue-based thresholds with a focus on businesses conducting operations in Texas and offer products or services consumed by Texas residents, or businesses that process or sell personal data. Notably, it introduces a novel small business provision, and while exclusions exist for entities such as state agencies and financial institutions, the law does not provide a general exemption for entities governed by HIPAA or GLBA, requiring compliance for non-covered data. 

Consumer rights granted by the TDPSA align with common privacy laws, allowing residents to confirm, correct, delete, and obtain copies of their personal data, along with opting out of targeted advertising or data sale. The law becomes enforceable on July 1, 2024, with businesses gaining a grace period until January 1, 2025, to comply with the global opt-out technology provision. A distinctive feature is the perpetual 30-day cure period, allowing violators to rectify breaches and avoid penalties by providing the attorney general with evidence of compliance. 

The TDPSA introduces unique provisions, such as additional disclosures for companies selling sensitive or biometric information, and explicit notices for data sale on targeted advertising. 

The law is enforceable by the state attorney general, who can issue fines of up to $7,500 per violation. 

Iowa Consumer Data Protection Act (ICDPA)

The Iowa Consumer Data Protection Act (ICDPA) was signed into law in late March, 2023, by Governor Kim Reynolds, and goes into effect on January 1, 2025. 

The ICDPA applies to businesses controlling or processing the personal data of at least 100,000 Iowa consumers or 25,000 consumers with over 50% of gross revenue from data sales. Exemptions include data regulated by the FCRA, state agencies, financial institutions under GLBA, and entities complying with HIPAA.  

Consumer rights under the ICDPA include confirmation of data processing, deletion rights, access to personal data, and the right to opt out of data sales. While similar to other state laws, ICDPA notably lacks explicit provisions for the right to correct personal data and the right to opt out of profiling. In response to consumers exercising their rights, the law sets a 90-day timeline for responses and requires businesses to provide information free of charge up to twice annually per consumer. 

Enforcement, managed by the state attorney general, incorporates a perpetual 90-day cure period for violators before fines of $7,500 per violation are imposed. The ICDPA does not grant a private right of action. 

Indiana Consumer Data Protection Act (INCDPA)

The Indiana Consumer Data Protection Act (INCDPA) became the seventh state to adopt a privacy law on May 1, 2023. Effective from January 1, 2026, the INCDPA follows the footsteps of similar state laws, emphasizing consumer rights and establishing guidelines for data safeguarding. 

The INCDPA applies to businesses operating in Indiana or selling products and services to Indiana residents that control or process personal data of either 100,000 or 25,000 Indiana residents. Unlike other data privacy laws, the INCDPA doesn't solely rely on a revenue threshold, requiring compliance even if annual gross revenues fall below a specific limit. 

Consumer rights granted by the INCDPA include the ability to correct data inaccuracies; opt out of targeted advertising, data sales, or specific profiling; confirm data processing; and request the deletion of personal data. Exemptions exclude state entities, affiliates of financial institutions, organizations subject to HIPAA, non-profit entities, higher education institutions, and public utility entities. Controllers must adhere to principles like data minimization, implement security measures, and conduct data protection impact assessments (DPIA) for specific data processing activities. These include targeted advertising, data sale, profiling with foreseeable risks, processing of sensitive data, and other activities with heightened risk. 

Enforcement of the INCDPA involves a 30-day cure period for alleged violations before civil penalties of up to $7,500 per violation are imposed. The attorney general oversees enforcement and may grant injunctive relief. The law emphasizes a business-friendly approach, providing a substantial window for compliance preparation.  

Delaware Personal Data Privacy Act (DPDPA)

Delaware joined the growing list of U.S. states enacting comprehensive data privacy legislation with the Delaware Personal Data Privacy Act (DPDPA), positioned as one of the nation's most robust data privacy bills. While California still holds the title for the strongest data privacy law, the DPDPA is notable for its consumer-friendly approach and broader applicability, encompassing businesses of varying sizes. Set to take effect on January 1, 2025, the law grants an additional year for businesses to implement universal opt-out mechanisms in 2026. 

Applicability under the DPDPA is extensive, covering any company conducting business in Delaware or offering products/services targeting state residents. The thresholds for compliance are set at processing the personal data of at least 35,000 consumers or 10,000 consumers with over 20% of gross revenue derived from personal data sales. Notably, the 35,000-consumer threshold is the lowest among existing data privacy laws, making the DPDPA applicable to a broader range of small and medium-sized companies. 

Exemptions under the DPDPA include government bodies, financial institutions subject to the GLBA, and various types of data, such as protected health information under HIPAA. Consumer rights align with other state laws, encompassing the right to confirm and access personal data, correct inaccuracies, delete data, obtain data copies, receive a list of third-party disclosures, and opt-out of targeted advertising, data sale, or profiling. Controllers are obliged to limit data collection to what is necessary, implement security measures, and obtain opt-in consent for sensitive data or data of known children. 

Enforcement falls under the jurisdiction of the Department of Justice, allowing a cure period for violators, albeit with a sunset provision ending on January 1, 2026. The Department may investigate and prosecute violations, potentially resulting in penalties up to $10,000 per violation. The law also mandates data protection assessments for activities with a heightened risk of harm to consumers, such as targeted advertising or processing sensitive data.  

Nebraska Data Privacy Act (NDPA)

The Nebraska Data Privacy Act (NDPA) is a comprehensive data privacy act designed to protect consumers and give them control over their personal information. It grants them certain rights, outlined below, and provides controllers, or the entity that determines the purpose and means of processing personal data, with specific requirements for how to handle data and consumer requests related to their data.  

The law’s scope tracks closely with the Texas Data Privacy and Security Act (TDPSA), including its applicability, sensitive data, and its requirement to honor universal opt-out mechanisms.  

Like the TDPSA, Nebraska’s privacy law applies to a person who:  

  • Conducts business in the state or produces a product or service consumed by residents of Nebraska;  
  • Processes or engages in the sale of personal data; and  
  • Is not a small business as determined under the federal Small Business Act. 

One notable aspect of the NDPA’s applicability is that, unlike most other state laws, there is no revenue or volume of data processed.  

Like many other comprehensive data privacy laws, the state attorney general has enforcement authority of the data privacy act. The law stipulates that the attorney general must first notify the controller or processor of the violation in writing and provide a 30-day cure period—luckily for Nebraska businesses, this cure period does not sunset, unlike other state data privacy laws.   

In addition to curing the violation, the controller or process must also provide a written statement and supportive documentation to show the violation was cured and stating that they will not commit another violation.  

Those who don’t cure a violation during the 30-day timeframe, or who breach their written statement, will be subject to a $7,500 fine for each infraction. 

New Hampshire Privacy Act (NHPA)

The New Hampshire Privacy Act (NHPA) is one of a number of statewide data privacy laws aimed at giving consumers control over their personal data in an increasingly digital world. 

The good news for businesses is that the NHPA largely resembles other data privacy laws that have come before it. It is most closely aligned to those in Virginia (VCDPA) and Connecticut (CTDPA)—though there are slight nuances. 

The law is slated to take effect January 1, 2025, and will apply to “persons that conduct business” in the state or who produce products or services targeted to residents of New Hampshire and who, during a one-year period:  

  • Controlled or processed the personal data of not less than 35,000 unique consumers, excluding if the processing occurred solely to complete a payment transaction, or 
  • Controlled or processed the personal data of not less than 10,000 unique consumers and derived more than 25 percent of their gross revenue from the sale of personal data.  

The New Hampshire data privacy act’s scope is somewhat unique in that it doesn’t include a revenue threshold. Additionally, the applicability threshold is lower than other laws, but lawmakers have pointed out that this is because of the state’s lower population.  

Like other U.S. laws, the NHPA follows primarily an opt-out model, meaning businesses are free to process consumer data, but must notify consumers about the processing first and give them a way to opt out of the collection or sale of data. There are exceptions, however, for the data of children under the age of 13 and for sensitive data. Here, opt-in permission is required. 

Other notable provisions include:  

  • The NHPA will require businesses to recognize universal opt-out mechanisms, such as the Global Privacy Control. 
  • The act has a 60-day cure period for violations that sunsets one year after the law is enacted (in January 2026).  

New Jersey Data Privacy Act (NJDPA)

The New Jersey Data Protection Act (NJDPA) is a data privacy law that gives New Jersey residents control over their personal data, providing certain rights and imposing obligations on those who control and process consumer data. The law applies to businesses and entities who conduct business in the state or who produce products or services targeted to those who live in New Jersey.

In terms of applicability and exemptions, New Jersey’s privacy law aligns with other state laws. It applies to controllers who, during a calendar year, meet one of the following criteria:

  • Control or process the personal data of at least 100,000 consumers, excluding personal data processed solely for the purpose of completing a payment transaction, or
  • Control or process the personal data of at least 25,000 consumers and the controller derives revenue or receives a discount on the price of any goods or services, from the sale of personal data.

There are a few key definitions in the law: the NJDPA defines “sale” as “sharing, disclosing, or transferring” data for money or other valuable consideration, similar to California’s law. A “controller” is an individual or legal entity that determines the purpose and means of processing personal data.

Similar to Colorado’s privacy law, it doesn’t define a specific percentage of revenue that must be derived from the sale of data, whereas other states have implemented a 25 or 50 percent threshold.

The law goes into effect in January 15, 2025, one year after its enactment.

Kentucky Consumer Data Protection Act (KCDPA)

The Kentucky Consumer Data Protection Ac (KCDPA) provides data privacy protections for consumers of the Bluegrass State, granting them certain, now standard rights. We’ll dive into more on that later.

The law defines consumers as residents of the state acting only as an individual, not in commercial or employment contexts. It closely aligns with Virginia’s law, which is good news for businesses already complying with the Virginia Consumer Data Protection Act (VCDPA). And, because the VCDPA is considered a framework or foundation legislation, the KCDPA also tracks closely with other state laws that used Virginia’s law as a framework, including Tennessee and Indiana.

Businesses will become subject to the law as of January 1, 2026.

Similar to Virginia, Colorado, Connecticut, and Indiana, Kentucky’s privacy act allows companies to collect and process most types of personal information without obtaining affirmative user consent first (in most cases). This is known as the opt-out model, which most U.S. data privacy laws follow.

Just like Virginia’s law, the KCDPA applies to any person who conducts business in Kentucky or who produces products or services that target residents of the state, and during a calendar year controls or processes data of at least:

  • 100,000 consumers; or
  • 25,000 consumers and derives over 50 percent of gross revenue from the sale of personal data.

Like all data privacy laws that came before it, the KCDPA applies to both controllers, or entities who determine the purpose and means of processing data, and processors, or entities that process personal data on behalf of a controller, such as a third-party vendor charged with analyzing data. The delineation between controllers and processors exists to clearly assign responsibilities for data governance between the parties involved in collecting and processing consumer data.

Minnesota Consumer Data Privacy Act (MCDPA)

The MCDPA is a state-level legislation designed to safeguard the personal data of Minnesota residents. Rather than permit organizations to collect, process, and generally do whatever they wish with consumers’ personal information, data privacy regulations like the MCDPA:  

  • Set limits on what organizations can do with personal data 
  • Require organizations to meet certain obligations, like setting safeguards, assessing for risk, and respecting consumer rights 
  • Provide consumers with data privacy rights that enable them to maintain control over their personal information 

Officially enacted on May 24, 2024, the MCDPA will take effect on July 31, 2025. Once that happens, businesses will need to comply or potentially suffer penalties and fines from the state Attorney General. 

The MCDPA applies to organizations that provide products or services targeted at Minnesotans and meet one of the following criteria: 

  • During a calendar year, they control or process the personal data of 100,000 consumers or more. 
  • They derive more than 25 percent of gross revenue from the sale of personal data and process or control personal data of 25,000 consumers or more. 

As is the case with most data privacy laws, the definition of “sale” includes both selling data for money and “other valuable considerations.” 

Maryland Online Data Privacy Act (MODPA)

The MODPA gives Maryland residents more control over how companies collect and use their personal data online. With an effective date of October 1, 2025, the new law establishes data protection rights and requires companies that track or target the state’s residents to meet stricter requirements around data collection—especially related to data minimization, consent, universal opt-out mechanisms, sensitive data, and children’s data. However, MODPA will not apply to companies’ data processing activities until April 1st, 2026.  

While it is an opt-out law (meaning consumers have the right to opt-out of processing data for certain purposes) Maryland’s privacy act is already known in the data privacy world as more stringent than many other state laws.  

Maryland’s privacy law applies to anyone who conducts business in the state, as well as those who provide services or products targeted to residents of Maryland and during the prior calendar year either:  

  • Controlled or processed the personal data of at least 35,000 consumers, with the exception of personal data collected or processed solely for completing a payment transaction, or:  
  • Controlled or processed the personal data of at least 10,000 consumers and derived more than 20 percent of its gross revenue from the sale of personal data.  

With controller requirements and restrictions, the MODPA gets tricky. It differs from other state laws in a few key areas.  

In Maryland, controllers are restricted from the collection, processing, and sharing of sensitive data, except where it’s strictly necessary to provide or maintain a specific product or service requested by the consumer.  

What’s more, controllers are banned altogether from selling sensitive data.

The Maryland Office of the Attorney General's Consumer Protection Division enforces the MCPA, which has fines of up to $10,000 per violation or $25,000 for each repetition of the same violation.

The Rhode Island Data Transparency and Privacy Protection Act (RIDTPPA)

Enacted June 29, 2024, the RIDTPPA resembles many other US data privacy laws, including its requirements surrounding consent, sensitive personal information processing, and consumer rights. The law, however, does feature several important differences.

Notably, the law also lacks a cure period. If you’re found to have violated the law, you’ll simply be fined without any grace period to fix the violation. Most state data privacy laws feature cure periods, though some expire at various dates in the future, and some are permanent features.  

The law also does not require businesses to honor universal opt-out mechanisms.

If your organization is a for-profit entity and conducts business in Rhode Island or provides products or services targeted to Rhode Islanders, you may be subject to the RIDTPPA. 

Specifically, you must meet the above criteria as well as one of the following: 

  • Your organization controlled or processed at least 35,000 state residents’ personal data. 
  • Your organization controlled or processed at least 10,000 state residents’ personal data and derived more than 20% of its gross revenue from the sale of that data. 

There are exemptions, of course, but if you meet the above criteria, you likely will need to comply with the law.  

New York SHIELD Act

In July 2019, New York passed the Stop Hacks and Improve Electronic Data Security (SHIELD) Act. This law amends New York's existing data breach notification law and creates more data security requirements for companies that collect information on New York residents. As of March 2020, the law is fully enforceable.

This law broadened the scope of consumer privacy and provides better protection for New York residents from data breaches of their personal information. It requires employers in possession of the New York residents’ private information to “develop, implement, and maintain reasonable safeguards to protect the security, confidentiality, and integrity of the private information.”

Last year, in 2022, the state Attorney General settled with an organization $600,000 for failing to meet minimum standards that led to a breach in security and a leak of personal information. While there have been no recent updates to the law, it is still very active and enforced, as shown by this settlement.

Check out our U.S. data privacy laws guide for a detailed summary.

European Data Privacy Laws

The EU General Data Protection Regulation remains the law of the land, but new data privacy-related laws have been passed in the EU recently—notably, the Digital Services Act and Digital Markets Act.  Here's a refresher on the GDPR and a list of the other laws you should track to keep your organization up-to-date on data privacy in 2024.

The General Data Protection Regulation (GDPR)

The most crucial data protection legislation enacted to date is the General Data Protection Regulation (GDPR). It governs the collection, use, transmission, and security of data collected from residents of any of the 28 member countries of the European Union. The law applies to all EU residents, regardless of the entity's location that collects the personal data. Fines of up to € 20 million or 4% of total global turnover may be imposed on organizations that fail to comply with the GDPR. Some essential requirements of the GDPR include:

Consent 

Data subjects must be allowed to give explicit, unambiguous consent before the collection of personal data. Personal data includes information collected through the use of cookies. Some information not usually considered "personal information" in the United States, such as the user's computer IP address, is considered to be "personal data" according to the GDPR.

Data Breach Notification

Organizations must notify supervisory authorities and data subjects within 72 hours if a data breach affects users' personal information in most cases.

Data Subjects' Rights

Data subjects (people whose data is collected and processed) have certain rights regarding their personal information. These rights should be communicated to data subjects in a clear, easy-to-access privacy policy on the organization's website.

  1. The right to be informed. Data subjects must be informed about the collection and use of their personal data when the data is obtained.

  2. The right to access their data. A data subject can request a copy of their personal data via a data subject request. Data controllers must explain the means of collection, what's being processed, and with whom it is shared.

  3. The right of rectification. If a data subject's data is inaccurate or incomplete, they have the right to ask you to rectify it.

  4. The right of erasure. Data subjects have the right to request the erasure of personal data related to them on certain grounds within 30 days.

  5. The right to restrict processing. Data subjects have the right to request the restriction or suppression of their personal data (though you can still store it).

  6. The right to data portability. Data subjects can have their data transferred from one electronic system to another at any time safely and securely without disrupting its usability.

  7. The right to object. Data subjects can object to how their information is used for marketing, sales, or non-service-related purposes. The right to object does not apply where legal or official authority is carried out, a task is carried out for public interest, or when the organization needs to process data to provide you with a service for which you signed up.


    If you're not prepared, complying with DSARs can be difficult and complicated.  Download our guide to ensure you’re on the right path.

Digital Services Act (DSA) 

The new regulation addresses illegal and harmful content by compelling platforms such as Google and Facebook to remove content that doesn’t meet certain standards. The primary principle is “what is illegal offline must be illegal online,” according to the Council of the EU. The Digital Services Act (DSA) entered into force on November 16, 2022. Different provisions of the law will become effective at different times, with the law coming fully into force on February 17, 2024.

It applies to four categories of businesses:

  • Intermediary services offering network infrastructure, such as ISPs
  • Hosting services, such as cloud and web-hosting services
  • Online platforms that bring sellers and consumers together, such as online marketplaces, social platforms, and app stores
  • Very large online platforms, which are defined as online platforms that reach more than 10% of the 450 million consumers in Europe

Each category faces different requirements.

All of the above categories must:

  • Engage in transparency reporting on court orders and actions taken, content moderation efforts, and more
  • Update terms of service to account for fundamental rights
  • Cooperate with national authorities
  • Establish points of contact for authorities and, when necessary, legal representatives

Hosting services, online platforms, and very large online platforms must:

  • Provide a notice-and-action mechanism enabling users to note potential illegal content for the business to remove
  • Report criminal offenses

Online platforms and very large platforms must:

  • Implement a complaint and redress mechanism
  • Identify trusted flaggers whose expertise adds special weight to their content notices
  • Take measures against abusive notices and counter-notices
  • If they have a marketplace feature, take special actions, such as vetting third-party suppliers’ credentials, adhering to compliance-by-design principles, and more
  • Not target advertisements to children or target advertisements based on users’ special characteristics
  • Provide transparency into content recommendation systems
  • Provide user-facing transparency into online advertising practices 

Very large platforms must: 

  • Adopt risk management practices and establish crisis response protocols
  • Acquiesce to external, independent auditing, establish an internal compliance function, and be publicly accountable
  • Provide users the choice to not be subject to content recommendations based on profiling
  • Share data with authorities and researchers
  • Adhere to self-drafted codes of conduct
  • Cooperate with authorities during crisis response situations

EU data protection authorities may access, obtain information from, and inspect service providers to inform orders and sanctions. If a business is found to be in violation, it may be fined up to 6% of annual global turnover during the preceding financial year. If an information obligation under the DSA is violated, the maximum penalty is limited to 1% of the previous year’s income or global turnover.

The Digital Markets Act (DMA)

Coming into effect March 2024, the Digital Markets Act (DMA) covers the largest digital platforms, known as “gatekeepers,” which include companies like Facebook, Apple, Microsoft, and Google. The DMA aims to level the playing field for digital companies and prevent gatekeeper companies from imposing unfair conditions on their competitors. For example, a company like Amazon isn’t allowed to rank products on its site in a way that gives Amazon’s own products and services an advantage. 

A company is considered a gatekeeper if it:

  • Has a strong economic position, significant impact on the EU market, and is active in multiple EU member states
  • Has a strong position as an intermediary linking a large user base to a large number of businesses
  • Has or will soon have an entrenched position in the market, which is determined by whether or not the company met the two previous criteria in the last three financial years

Under the DMA, businesses that qualify as gatekeepers must:

  • Not engage in self-preferencing, where the gatekeeper promotes their own products and services over an equivalent third-party product or service on the gatekeeper’s platform
  • Not reuse users’ data outside of the context in which it was originally collected without consent
  • Not track users outside of the gatekeepers’ platform for the purpose of targeted advertising without consent
  • Permit communication and content access between businesses and end users
  • Ensure price and fee transparency in advertising intermediation services
  • Provide access to marketing or advertising performance data on the platform to users
  • Make it easy for users to change their default settings and uninstall software
  • Ensure third-party technology can interoperate with the gatekeeper’s own
  • Ensure end users’ data is portable to other systems
  • Provide businesses with real-time access to their data on the gatekeeper’s platform
  • Not prevent users from making complaints to authorities
  • Not require user registration to additional services as a condition of accessing a given service
  • Not use businesses’ non-public data to compete against them
  • And more

Gatekeepers that violate the DMA may be subject to fines of up to 10% of annual global turnover or up to 20% in the case of repeated violations. What’s more, repeated violations may result in non-financial remedies, such as forced divestitures.

The EU-U.S. Data Privacy Framework

Although it isn't a law per se, the EU-U.S. Data Privacy Framework is an important factor to be aware of. 

Previously, businesses transferring EU citizens’ data into the U.S. relied on a framework called the Privacy Shield to ensure the data was sufficiently protected, but that framework was deemed invalid during the Schrems II court case. This forced businesses to rely on standard contractual clauses approved by the European Commission to provide legal protection for data transfers. 

However, these clauses are somewhat shaky, which is why there was pressure to get a replacement for the Privacy Shield stood up.

On July 10, 2023, the new EU-U.S. Data Privacy Framework went into effect. It includes additional security measures, a redress mechanism for EU and U.S. citizens who feel their rights have been violated, and greater protections for foreign citizens’ data that has been transferred to the U.S. Additionally, the framework requires intelligence agencies to make updates to surveillance-related policies and procedures, followed by a review by the Privacy and Civil Liberties Oversight Board.

While the framework improves upon the Privacy Shield, it's not without its flaws. There will likely be criticisms from European privacy advocacy groups, but if the framework survives, it could be the method businesses use to transfer data between the EU and U.S.

The EU AI Act

The EU’s Artificial Intelligence Act was approved on 16 June 2023 and is expected to go into effect sometime in late 2025 or early 2026. It applies to any company doing business in the EU that develops or adopts “high-risk” AI systems. These systems affect employment, credit, health care, and other critical domains.

The EU AI Act applies extraterritorially, meaning the law will cover companies based elsewhere if they have customers or users inside the EU, effectively making it a global regulation. 

Under the Act, businesses with applicable AI systems have to:

  • Conduct impact assessments, keep records, and meet transparency obligations
  • Not develop systems that can be used to manipulate a person’s behavior in a manner that could cause mental or physical harm.
  • Not develop systems that can be used to exploit the vulnerabilities of a specific group due to their age, physical or mental disabilities, or behavior in a manner that could cause psychological or physical harm.
  • Not develop systems that could exploit vulnerable groups based on age, or physical or mental disability.
  • Not develop systems that provide real-time remote biometric data in publicly accessible spaces by law enforcement. 

Other International Data Privacy Laws

With over 130 data privacy laws across the globe, it isn’t feasible to list and describe each and every one in this blog post. However, here are some important regulations that may apply to your business.

  • Brazil’s General Law for the Protection of Personal Data, or the Lei Geral de Proteção de Dados Pessoais (LGPD): This law came into effect in 2020 and contains many similar provisions to the GDPR. Learn more about the law in our dedicated blog article, The definitive guide to Brazil's privacy law, the LGPD.
  • Canada’s Personal Information Protection and Electronic Documents Act (PIPEDA): PIPEDA was assented to in 2000, came into full force in 2004, and was considered a progressive law at the time. It was last updated in 2015 by the Data Privacy Act but still falls short of the GDPR’s regulatory standard.
  • China’s Personal Information Protection Law (PIPL): PIPL was enacted into law in November of 2021 and broadly maps to the GDPR’s stipulations. However, it does vary in some of its details, notably by giving individuals fewer rights, requiring a stricter standard for consent, and imposing harsher penalties.
  • India's Digital Personal Data Protection Act (DPDPA): Significantly, this law covers all of India's 1.4 billion people. While the law broadly mirrors the GDPR, it includes some variation, notably in the form of government exemptions.

Reduce Complexity and Risk With a Compliance Platform 

This post covered some of the major laws that have had recent updates. That excludes many smaller laws that simply haven’t been updated recently and details of the above regulations that would be too deep in the weeds for a blog post. And still, this post is well over 5,000 words long!

For businesses that know they only need to comply with one law and have no intentions of expanding to other jurisdictions, it might be possible to handle compliance in-house. It will take time, resources, and effort, but it’s feasible. Once your business becomes subject to multiple laws, a wholly homegrown approach to compliance quickly becomes overwhelmed by the complexity of different laws’ requirements. With complexity comes risk and a weakened revenue stream, whether through fines and penalties, diverted resources that could be spent on revenue generation, or the loss of consumer trust.

Whether subject to one law or multiple, businesses interested in protecting their revenue from risk invest in compliance platforms. The solutions in this category formalize the knowledge of privacy professionals through their capabilities and features, enabling privacy novices and empowering privacy professionals alike.

The Osano platform, for example, provides a means for businesses to ask for, record, and act on consumer consent, whether that’s the specific kind of consent required under the CPRA, under the GDPR, or under any other privacy law. It also streamlines the process of accepting, managing, and acting on DSARs. Osano’s proprietary database of vendor privacy scores also ensures you can build a vendor ecosystem that reduces risk and stay alert to emerging issues in your vendors’ privacy postures, such as recent lawsuits or privacy policy changes. The result is greater situational awareness of the state of data privacy in your business, your vendors’ business, and the market as a whole.

Schedule a demo of Osano today

U.S. State Laws Checklist

Gearing up for the new U.S. State privacy laws? Grab this checklist to help save some time.

Download Now
Checklist-1
Share this article