National Privacy Authority - Data Privacy Rights Reference
Data privacy rights in the United States operate across a fragmented landscape of federal statutes, state-level omnibus laws, and sector-specific regulations — with no single federal privacy law establishing a unified framework. This page maps the definition, mechanism, common scenarios, and decision boundaries of data privacy rights as they apply to individuals and the organizations that collect, process, or share personal information. The National Privacy Authority serves as the reference hub for this subject matter, with the network coverage described below supporting deeper dives into adjacent technical and compliance domains. Understanding where rights begin and enforcement authority ends is foundational to navigating the regulatory context for cybersecurity.
Definition and scope
Data privacy rights are legally enforceable entitlements that govern how personal information about an identifiable individual may be collected, stored, used, disclosed, or deleted. In the United States, these rights are not consolidated in a single statute. Instead, they emerge from at least four distinct regulatory layers:
- Federal sector-specific statutes — including HIPAA (45 CFR Parts 160 and 164), FERPA (20 U.S.C. § 1232g), GLBA (15 U.S.C. § 6801 et seq.), and COPPA (15 U.S.C. § 6501).
- State omnibus privacy laws — California's CCPA/CPRA (Cal. Civ. Code § 1798.100), Virginia's CDPA (Va. Code Ann. § 59.1-575), Colorado's CPA (C.R.S. § 6-1-1301), and Connecticut's CTDPA.
- FTC enforcement authority under Section 5 of the FTC Act (15 U.S.C. § 45), which treats deceptive or unfair data practices as actionable violations.
- State attorney general enforcement — 18 states had enacted comprehensive consumer data privacy laws as of 2024 (IAPP State Privacy Legislation Tracker).
The scope of rights typically includes: the right to know what data is collected, the right to access that data, the right to correct inaccuracies, the right to delete, the right to opt out of sale or targeted advertising, and the right to data portability. The cybersecurity terminology and definitions reference page provides precise definitions for terms like "personal data," "sensitive data," and "data controller" as used across these frameworks.
National Data Protection Authority covers the intersection of federal and state data protection obligations in depth, with particular focus on how controller and processor distinctions affect compliance obligations.
How it works
Data privacy rights operate through a request-and-response mechanism that places affirmative obligations on covered businesses. The general process follows these discrete phases:
- Trigger identification — A data subject submits a verifiable consumer request (VCR) to the covered business. Under CCPA/CPRA, businesses must respond to access requests within 45 days, extendable by an additional 45 days with notice (Cal. Civ. Code § 1798.130).
- Identity verification — The business must authenticate the requester without demanding excessive personal information. The California Privacy Protection Agency (CPPA) specifies that verification processes must not create unreasonable barriers.
- Scope determination — The organization determines which data systems hold responsive information, which processors hold data on its behalf, and whether any exemptions apply (e.g., legal hold, fraud prevention, or free-speech exemptions).
- Fulfillment or denial — The business fulfills the request or issues a reasoned denial citing the applicable statutory exemption.
- Appeal and enforcement — Under the Virginia CDPA and Colorado CPA, individuals have a right to appeal a denial. Enforcement referrals flow to state attorneys general, and in California, to the CPPA.
Data Security Authority addresses the technical controls — including access logging, data mapping, and encryption — that make fulfillment of these requests operationally feasible. Encryption Authority provides reference material on how encryption affects data subject access rights, particularly when data is stored in anonymized or pseudonymized form.
The how cybersecurity works conceptual overview places this rights-management process within the broader architecture of organizational data governance.
Common scenarios
Healthcare data requests under HIPAA
Patients have a right of access to their protected health information (PHI) under 45 CFR § 164.524. The HHS Office for Civil Rights (OCR) has issued guidance confirming that covered entities must provide PHI within 30 days and may charge only a reasonable, cost-based fee. Information Security Authority covers the technical safeguards required to fulfill HIPAA access requests securely.
California consumer rights under CCPA/CPRA
A consumer resident in California may request disclosure of the categories and specific pieces of personal information collected, the purposes for collection, and the third parties to whom data was sold or disclosed. Businesses with annual gross revenues exceeding $25 million, or that buy/sell/share personal information of 100,000 or more consumers annually, are covered entities (Cal. Civ. Code § 1798.140). California Security Authority provides state-level detail on CCPA/CPRA compliance obligations, including the 2023 CPRA amendments enforced by the CPPA. Florida Security Authority covers Florida's Digital Bill of Rights (FDBR), effective July 1, 2024, which applies to controllers processing data of 100,000 or more Florida consumers annually.
Children's data under COPPA
The FTC's COPPA Rule (16 CFR Part 312) requires verifiable parental consent before collecting personal information from children under 13. Parents hold the right to review and delete their child's data. Civil penalties under COPPA can reach $51,744 per violation (FTC COPPA Rule enforcement page). Cyber Safety Authority addresses child safety dimensions of online data collection in educational and consumer contexts.
Employee data and state law gaps
HIPAA and GLBA do not govern employee personal data outside narrow circumstances. States including New York and Texas have enacted varying employee privacy provisions. New York Security Authority covers the New York SHIELD Act's data security requirements, while Texas Security Authority addresses the Texas Data Privacy and Security Act (TDPSA), effective July 1, 2024.
Cross-border data transfers and multinational exposure
Organizations processing data of EU residents remain subject to GDPR alongside US law. Global Security Authority maps the compliance obligations that arise when US organizations handle personal data across multiple jurisdictions. Digital Security Authority addresses the technical architecture required to enforce data residency and transfer restrictions.
Breach notification as a rights-adjacent obligation
While not a "privacy right" in the access-and-deletion sense, breach notification laws create rights to timely information about unauthorized disclosure of personal data. All 50 US states have enacted breach notification statutes. National Cybersecurity Authority provides a reference framework for breach notification timelines across state and federal regimes. Identity Protection Authority covers the downstream identity theft risks that breach notification laws are designed to mitigate.
Decision boundaries
Privacy rights are not absolute. Four primary boundary conditions determine whether a right applies, is limited, or is extinguished:
1. Applicability thresholds
Most state omnibus laws exempt small businesses. Under CCPA/CPRA, a