Emerging State Privacy Legislation
This article is for educational purposes only and does not constitute professional compliance advice or legal counsel. Privacy laws and regulatory requirements evolve — consult a qualified compliance professional about your specific situation.
Three years ago, privacy compliance meant understanding California's CCPA. Today, that's no longer true. A dozen states have now enacted comprehensive privacy laws. More are in various stages of legislative progress. If you thought GDPR and CCPA were the privacy frameworks you needed to worry about, your understanding is outdated. The landscape is shifting from a single-state problem to a multi-state reality that creates operational complexity for any organization processing personal information.
Understanding this emerging privacy landscape is essential because your compliance obligations change every time a new state law takes effect. You can't wait until a law is already active to begin preparing — by then you're scrambling to implement changes on short timelines. Understanding the patterns, knowing which states have laws coming, and building compliance infrastructure that can adapt to new requirements is the difference between managing a compliance program and fighting fires constantly.
The Current State of Comprehensive Privacy Laws
At least twelve states have comprehensive consumer privacy laws that have been enacted and are taking effect or already active. California led with the CCPA and CPRA. Colorado passed the Colorado Privacy Act. Connecticut enacted the Connecticut Data Privacy Act. Delaware passed the Delaware Personal Data Privacy Act. Indiana, Iowa, Montana, New Hampshire, Oregon, Tennessee, Utah, and Virginia all have comprehensive privacy laws in effect.
These laws vary in their scope, their requirements, and their enforcement mechanisms. Colorado's law covers a slightly different scope than Virginia's. Utah's law includes different definitions of personal information than California's. Montana's law had its effective date delayed due to litigation. Tennessee's law has different opt-out requirements than Oregon's.
What they share is a common pattern: they all grant consumers rights similar to those under GDPR and CCPA — access, deletion, correction, opt-out of sales or sharing. They all impose requirements on how organizations collect and handle personal information. They all have enforcement mechanisms, whether through the state attorney general, a dedicated privacy agency, or both.
The pace of enactment is accelerating. When CCPA was passed, it seemed like a California-specific initiative. Now that multiple states have shown that comprehensive privacy laws are legislatively and politically feasible, more states are following. Maryland, North Carolina, Tennessee (already passed), and others have bills in progress. The practical reality is that the list of states with comprehensive privacy laws will likely be closer to twenty than twelve within the next two to three years.
Common Pattern vs. Important Variations
The good news is that most state privacy laws follow a pattern that allows some degree of standardization. Most include similar consumer rights: access to personal information, deletion of personal information, correction of inaccurate information, and opt-out of sales or sharing. Most require organizations to be transparent about data collection and use. Most impose security safeguard requirements, though the specificity varies.
This pattern means that an organization that builds compliance infrastructure around CCPA/CPRA can often extend that to meet other state requirements without starting from scratch. A system for handling consumer access requests under California law can be adapted for Colorado, Connecticut, or Virginia. A consent management system built for CCPA can be modified for other states. This creates economies of scale that don't exist if every state law is completely unique.
But the variations matter. Some state laws have different definitions of personal information. Some include B2B data (information about businesses rather than consumers), while others explicitly exclude it. Some require different timelines for responding to consumer requests. Some allow different exceptions to the right to delete. Some have different enforcement mechanisms or penalties. Some require a data protection officer or privacy officer, while others don't explicitly require this.
Colorado's law, for example, defines personal information slightly differently than California's, which means some data that's covered under CCPA might not be covered under Colorado's law, and vice versa. Virginia's law allows for broader exceptions to the deletion right for organizations' own business records. Utah's law includes exemptions for certain data types. These variations are real, and they require attention.
The practical implication is that an organization can adopt CCPA/CPRA compliance as a baseline and then layer in state-specific modifications, rather than building completely independent compliance programs for each state. This is much more efficient than treating each state as a completely separate regulatory regime.
The Timeline Problem: Staggered Compliance Deadlines
One of the most challenging aspects of multi-state privacy law compliance is that the laws don't all take effect at the same time. States typically stagger the effective date from the enactment date by 12 to 18 months to give organizations time to comply. This means that while you're still implementing compliance for one state's law, another state's law is approaching its effective date.
California's CCPA took effect January 2020. CPRA modifications began taking effect in January 2023. Colorado's law took effect July 2023. Virginia's law took effect January 2024. Connecticut's law takes effect July 2024. Montana's law had a delayed effective date due to litigation. Delaware's takes effect January 2025. Others are coming.
What this staggered timeline creates is a rolling compliance obligation. You're never done with state privacy law compliance because there's always a new law approaching its effective date. By the time you've fully implemented compliance for one state's law, another state's law is months away from taking effect and requires preparation.
This is different from federal regulation, where a single law takes effect and you're in compliance across the entire country. With state privacy laws, you're managing a sequence of compliance dates, each requiring preparation, implementation, and testing.
The advantage of understanding this timeline is that you can plan accordingly. If you know that Virginia's law is active, Connecticut's law is imminent, Montana's law is uncertain due to litigation, and Delaware's law is approaching, you can prioritize your implementation schedule. You can phase compliance rather than treating every state law as equally urgent.
Variations That Matter: Scope and Definitions
Not all state privacy laws have identical scope. Some apply only to for-profit organizations, while others apply to nonprofit organizations as well. Some have revenue thresholds or employee count thresholds that determine applicability. Colorado's law has a revenue threshold of four million dollars in annual revenue, but it calculates that revenue differently than California's threshold. Virginia's law applies to organizations that collect personal information of 100,000 or more consumers or households, which is a different applicability test than many other states use.
The definition of personal information also varies. Some states include IP addresses as personal information; others don't. Some include biometric information; others handle it separately. Some include pseudonymized data (data that's been de-identified but could be re-identified with additional information); others don't. Some require that data be linked to an identifiable individual; others are more expansive.
Consumer rights vary too. Most states allow consumers to access their personal information, delete it, and opt out of sales or sharing. But the specifics of what counts as "sales" and "sharing" vary. Some states define sales very broadly (like California); others are narrower. Some states require opt-in consent for certain processing; others allow opt-out.
Enforcement varies significantly. Some states have a dedicated privacy agency like California's Privacy Protection Agency. Others rely on the state attorney general. Some allow private rights of action; others don't. The penalties range from state to state. This variation affects how actively the law is enforced and what risk of penalty exists.
The "Stack Everything on California" Strategy
Many organizations are adopting a practical approach: build your compliance infrastructure to meet California's CCPA/CPRA requirements, which are among the strictest, and then layer in state-specific modifications as needed. This works because if you're complying with California's broad definition of personal information, you're likely covering most other states' definitions. If you're honoring California's broad opt-out rights, you're likely covering most other states' requirements.
This strategy acknowledges the reality that perfect compliance with every state's law simultaneously is operationally difficult. But complying with the strictest state and then adding modifications for other states is manageable.
The modifications aren't trivial. You might need to adjust your applicability analysis for states with different thresholds. You might need to modify your opt-out mechanisms for states with different requirements. You might need to update your privacy policy to address state-specific language requirements. But these are modifications to an existing foundation, not building compliance infrastructure from scratch for each state.
Some organizations build compliance matrices that map each state law to your compliance systems. Which systems handle access requests? Which systems track opt-outs? Which systems monitor data retention? Once you've built this mapping, adding a new state's law becomes a question of whether it requires new systems or modifications to existing ones.
The Federal Uncertainty Factor
A legitimate question for any organization is whether to prepare for state laws or wait for federal privacy law that might preempt them all. There's discussion in Congress about comprehensive federal privacy legislation. Some experts predict federal privacy law within the next five years. Others are skeptical that Congress will pass anything given the political disagreements.
The historical pattern suggests Congress moves slowly on privacy legislation. The last comprehensive federal privacy law was GLBA in 1999 for financial services. HIPAA in 1996 for health information. The only comprehensive federal consumer privacy law in the US is FCRA (Fair Credit Reporting Act) from 1970. Against this backdrop, waiting for federal law while state laws are already taking effect is a risky strategy.
Additionally, even if federal privacy law is enacted, it's likely to set a floor, not a ceiling. Meaning it establishes baseline requirements that apply nationally, but states can impose stricter requirements on top of the federal baseline. This is the pattern under GLBA and HIPAA — federal law sets minimum standards, but states can and do impose additional requirements. So a future federal privacy law wouldn't necessarily preempt state laws; it might exist alongside them.
The practical implication is that preparing for state privacy laws now is a safer strategy than betting on federal law preemption. If federal law eventually passes and preempts state laws, the compliance infrastructure you've built isn't wasted — it positions you to meet the federal baseline more easily. If federal law doesn't pass or doesn't preempt state laws, you're already compliant.
Preparation Strategy: Building Adaptable Infrastructure
Organizations that are managing the emerging privacy landscape effectively are building compliance infrastructure that's adaptable to new requirements rather than static. This means building systems that can be configured for different state requirements, rather than hardcoding California's requirements into every system.
A consent management system built for CCPA should be configurable to handle other states' consent requirements. An access request system should be able to handle different state timelines and scope requirements. A data retention system should be flexible about retention policies that vary by state. This flexibility requires more sophisticated systems than a simple "comply with California" approach, but it pays dividends when new state laws take effect.
It also means building a data governance foundation. Understanding what personal information your organization collects, where it comes from, how it's used, who it's shared with, and how long you retain it is foundational to compliance with any state's privacy law. Once you've built this foundation, adapting to new state requirements becomes easier because you already know what data you're managing.
Many organizations are also monitoring state legislation as it progresses. There are services that track privacy bills and alert organizations when bills that might apply to them are advancing. Monitoring doesn't require compliance action, but it allows you to start preparation before a law takes effect, rather than scrambling after.
The Cost Reality
Privacy law compliance at scale is expensive. Building systems to handle consumer access requests, honor deletion requests, manage opt-outs, and respond to regulator inquiries costs money. Extending that to multiple state requirements costs more. But the cost of reactive compliance — scrambling when a new law takes effect — is higher.
Organizations that build compliance infrastructure proactively can often handle new state laws with modifications to existing systems at a fraction of the cost of building new systems reactively. A system built for California can usually be adapted for Colorado faster and cheaper than building a Colorado-specific system from scratch.
The alternative is to treat privacy law compliance as each law individually takes effect, which creates crisis mode compliance. This is more expensive in legal costs, implementation costs, and risk. It's also disruptive to normal operations because compliance implementation becomes an emergency project rather than planned work.
Understanding the emerging state privacy landscape is less about perfect compliance with every state's unique requirements and more about building adaptable compliance infrastructure that can scale as the landscape evolves. The organizations that manage this effectively are the ones that treat multi-state compliance as inevitable and plan accordingly, rather than treating each state law as a surprise to be managed reactively.
Fully Compliance provides educational content about IT compliance and privacy regulations. This article reflects general information about state privacy laws as of its publication date. Regulations, penalties, and requirements evolve — consult a qualified compliance professional for guidance specific to your organization.