As of January 1, 2026, a new set of state-level data privacy and cybersecurity laws and regulations have become effective in the United States, significantly expanding the compliance landscape for businesses. Comprehensive consumer data privacy laws, similar in structure to those in Virginia and Colorado, are now enforceable in Indiana, Kentucky, and Rhode Island. Perhaps most significantly, new, detailed regulations under the California Consumer Privacy Act (CCPA) are now active. These California regulations introduce mandatory requirements for annual cybersecurity audits, risk assessments for high-risk data processing, and new rules governing the use of Automated Decision-Making Technology (ADMT). These changes signal a move towards more proactive and documented cybersecurity practices being legally mandated at the state level.
This new wave of regulations introduces several key obligations for covered businesses:
Comprehensive Privacy Laws (IN, KY, RI): These states now have laws granting consumers rights regarding their personal data, including the right to access, correct, delete, and opt out of the sale of their data or its use for targeted advertising. Businesses must update their privacy policies, provide mechanisms for consumers to exercise these rights, and conduct data protection assessments for high-risk processing activities.
California Cybersecurity Audits: Businesses whose processing of personal information presents a significant risk to consumers must now conduct annual, independent cybersecurity audits. These audits must assess and document the company's cybersecurity program's compliance with stated standards. The results must be submitted to the California Privacy Protection Agency (CPPA) in 2027.
California Risk Assessments: Similar to GDPR's DPIAs, businesses must now conduct and document risk assessments before engaging in high-risk data processing activities, such as selling data, processing sensitive data, or using ADMT.
California ADMT Regulations: The new rules provide consumers with the right to know about their use of ADMT and, in cases where it has a significant impact, the right to opt out of such processing. This requires businesses to provide clear notices and create opt-out pathways.
California Delete Act: The 'DROP' system for data brokers, which allows a consumer to make a single request to have their data deleted by all registered data brokers, has also launched.
The new laws in Indiana, Kentucky, and Rhode Island apply to businesses that control or process the personal data of a certain number of state residents (e.g., 100,000 residents) or derive a significant portion of their revenue from selling personal data. The California regulations apply to for-profit entities that meet specific revenue or data processing thresholds and do business in California. The impact is broad, affecting nearly every major industry that handles consumer data, including technology, retail, finance, and healthcare.
Organizations must now:
These new regulations impose significant operational and financial burdens on businesses. Organizations will need to invest in legal counsel, privacy management software, and potentially new personnel to manage compliance. The requirement for independent cybersecurity audits in California represents a substantial new cost and administrative overhead. Failure to comply can result in significant fines (e.g., up to $7,500 per intentional violation under CCPA) and reputational damage. The patchwork of state laws also continues to create complexity for businesses operating nationwide, increasing the cost of compliance compared to a single federal standard.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats