Mass collection of users’ personal data from users for targeted advertising online has created a rift. On one side are efforts to protect users from abuse and privacy infringements, and on the other is securing marketing revenue and analytics for websites that rely on this. This data and revenue are needed not only to survive, but also to provide the free content and information that has come to define the Internet as we know it.

Google Consent Mode is a tool that bridges the gap between data privacy and data-driven digital advertising by helping to make sure that your website’s analytics and marketing can run seamlessly based on each specific user’s consent choice.

Consent Mode adjusts how Google services collect users’ data based on their consent preferences. When a visitor opts in or out, Google Consent Mode directs Google Analytics and advertising services to either collect full data (opt in) or only anonymized data (opt out), which doesn't include personally identifiable information.

Originally designed to communicate users’ consent preferences to Google tags for analytics and advertising cookies, Google Consent Mode has since evolved to function more as a signaling tool. Its latest update in November 2023 enables website owners to comply with global data privacy laws, integrate systems, and respect users’ consent choices automatically.

Consent is becoming a stable requirement of most data privacy laws in the world, including the EU’s General Data Protection Regulation (GDPR), which assigns the responsibility of obtaining end-users’ consent prior to processing personal data to website owners and data controllers.

Google Consent Mode helps build a more sustainable internet economy that brings both elements into greater balance. The tool helps move towards a consent-based dynamic system that respects the privacy and dignity of each individual user without breaking the underlying business model of large parts of the Internet.

What services does Google Consent Mode support?

Google Consent Mode can also signal consent state for third-party tags using the “additional consent” settings if it is manually configured for this purpose.

How does Google Consent Mode work?

Google Consent Mode is an API that can be used with a consent management platform (CMP) like Cookiebot CMP, with the global site tag (tag.js) or Google Tag Manager (GTM).userce

It enables your users’ consent state to determine how Google’s tags and scripts behave on your website, even though they load before the consent banner appears for users. These tags won't be able to use browser storage though, and personal data will be redacted. 

Once consent has been granted these tags gain their normal capabilities.

Your CMP collects user consent preferences, and Google Consent Mode transmits these to Google for further processing. Tags dynamically adjust their behavior, i.e. whether they collect full or anonymised data, based on whether users accept or reject cookies for a specific purpose.

An additional feature, Consent Initialization, enables tags that require user consent choice to fire before all other tags. 

With the Google Consent Mode updates to Google Tag Manager, you can now see and customize each tag’s consent settings, as well as see which types of consent each tag requires in the Consent Overview.

Google Consent Mode introduced two new tag settings that will manage cookies for analytics and advertising purposes on your website: 

Google Analytics 4 (GA4) Consent Mode

With the “analytics_storage” tag setting, Google Consent Mode controls the behavior of statistics cookies on your website based on the consent state of your end users, making Google Analytics 4 adjust its data collection based on the granular consent choice of each individual user.

If users don’t give consent to statistics cookies, for example, your website will still receive aggregate and non-identifying basic measurements and modeling data, such as:

Google Ads Consent Mode

With the “ad_storage” tag setting, Google Consent Mode controls the behavior of marketing cookies on your website based on the consent state of your end users. For example, if a user doesn’t consent to marketing or advertising cookies, Google Consent Mode will ensure that all marketing-related Google tags will adjust and not use those cookies.

If users do not give consent to marketing cookies, your website will still be able to show contextual advertisements based on anonymous data instead of targeted advertising based on tracking of personal data..

Google Consent Mode enables your website to measure conversions related to a specific campaign on an aggregate level, rather than on an individual user level. This helps ensure that you get insights into the performance of your website’s marketing in a fully GDPR-compliant way without the use of personal data.

Additionally, Google Consent Mode enables Google tags to change behavior if a user later changes their consent state. It also enables you to configure Google tag behaviors to specific regions, e.g. automatically ensuring that no cookies are activated without consent for users inside the EU, while using cookies for users in the US.

By using Cookiebot CMP and Google Tag Manager together you can now control all tags on your website based on the consent state of your end users without manual configuration.

Combining Google Consent Mode with Cookiebot CMP enables you to receive vital insights and analytics through conversion modeling and non-identifying data if your end users choose to opt out of cookies.

Conversion modeling for Google Ads

Another feature of Google Consent Mode, introduced in April 2021, is conversion modeling, a probability-based and privacy-friendly measurement tool for ad interactions and conversions on your website.

Conversion modeling provides anonymous analytics data on your website for users who choose to reject or decline cookies, filling in missing attribution paths by using observable data from people who chose to opt in to cookies and thereby giving you an estimate of how the anonymous users might have behaved on your domain as well.

Conversion modeling is integrated automatically in your Google Ads campaign reports.

What changes does Google Consent Mode v2 bring?

Google has introduced two new tag settings with the latest version of Google Consent Mode released in November 2023. These two new tag settings are set based on the same trigger as the “ad_storage” key:

How do you integrate Google Consent Mode with Google Tag Manager?

Google Tag Manager (GTM) can be integrated with or without a Consent Management Platform (CMP).

With a CMP: Some CMPs, including Cookiebot CMP, come with a Tag Manager template that’s designed to work with the Consent API. This template is readily available within the Google Tag Manager interface, which reduces the need for coding and makes the integration process easy to set up.

Without a CMP: Implementing Google Consent Mode without the Cookiebot CMP template tag is only slightly more difficult, as you would need to add an additional script that must be loaded before the Google Tag Manager container.

Cookiebot CMP and Google Consent Mode

Cookiebot CMP fully integrates with Google Consent Mode right out of the box.

Usercentrics Cookiebot CMP banner example
Cookiebot CMP consent banner displayed on your website that enables users to give consent to each cookie category.

Once users give their consent through Cookiebot CMP, only the consent state is forwarded to Google – i.e. no personal data is sent from Cookiebot CMP to Google, but only the specifics of the anonymous user’s consent, e.g. whether they have accepted marketing cookies or not.

Example: Cookiebot CMP and Google Consent Mode at work

A user visits your website and is presented with a Cookiebot CMP consent banner that shows them four cookie categories up front and the option to see how many cookies and trackers the Cookiebot™ scanner has found on your domain.

The user chooses not to give their consent to any analytics or marketing cookies, and Cookiebot CMP keeps blocking all such trackers from activation, respecting the user’s consent choice.

Cookiebot CMP sends the user’s consent state to Google Consent Mode, and this specific consent state becomes the basis of operation for all Google services that you are using on your website, e.g. by controlling Google Analytics data collection based  on user consent states.

Try Cookiebot free for 14 days… or forever if you have a small website.

Consent is sustainable, targeted advertisement is not

A “wild west” environment where the mass collection of user data has existed for years on the Internet, but only really surfaced to public knowledge over the last few years. Major news headlines about data breaches and questionable operations by large tech companies have contributed to creating distrust in big tech companies, in addition to growing public awareness of data privacy.

Landmark data protection laws have emerged, partly as a response, most notably the EU’s General Data Protection Regulation (GDPR). That regulation empowers individuals in Europe with enforceable rights over the data they generate every day, and defines clear rules and responsibilities for websites and tech companies when processing this data.

Google, consent and the “hard block”

Consent management platforms are a safe and effective way for websites to become compliant with the GDPR, by handing over the controls for the activation of cookies and trackers to the user through consent.

But when users choose not to consent to analytics and marketing cookies through a website’s CMP, this often means a hard block of the domain’s analytics and marketing services. These run on such cookies and trackers, so such actions effectively cut off vital analytics insights and marketing revenue streams that are crucial for the commercial survival of not only major tech companies or media domains, but smaller, independent websites and ecommerce operations as well.

Ad blockers and privacy browsers have acted as self-defense tools for end users, but have not been able to solve the larger, structural issues around the coexistence of data privacy and digital advertisement, partly because of their blanket approach to blocking everything, and partly because many users don’t have the time or the skills to defend themselves in this way to begin with.

Add to this research showing targeted advertisements provide only marginally better results compared to contextual advertising that isn’t based on users’ personal data, and the industry move away from mass personal data collection for privacy-infringing behavioral advertising seems to have been an event horizon coming ever closer.

Google moves the Internet, again

When Google launched Consent Mode in September 2020, website operators got new options so it was no longer only a choice between protecting user privacy and optimizing opt-in rates for websites big and small.

Harvard Professor Emeritus Shoshana Zuboff argues in The Age Of Surveillance Capitalism that surveillance capitalism — the business model of mass data collection for user behavioral predictions — started in 2002 when Google decided to commodify the unfathomable amounts of data their search engine collected.

In 2020, Google’s decision to move the digital advertising industry in the direction of consent with the launch of the Google Consent Mode marks a defining chapter in this story, providing a way forward to a more safe, private and fair Internet.

Consent in the making

Consent is the basis of the EU’s GDPR, ePrivacy Directive and the Digital Markets Act (DMA), as well as data privacy laws in other countries, such as Brazil’s LGPD, because it empowers individuals with enforceable rights over all the digital traces of their lives, they live online every day.

But in practice, consent keeps evolving to become more complex. It was once a mere scroll on a web page or pre-ticked checkboxes on cookie banners.

In 2002 and 2009, the ePrivacy Directive (also known as the “EU cookie law”) first introduced a requirement for cookie banners on websites. But these cookie banners only required website owners to state that the website uses cookies, with an accompanying “OK” button for users to click on. But cookies and trackers would already be in activation, rendering their consent meaningless.

In 2018, the GDPR carved out a clear definition of consent that many data privacy laws around the world have adopted or at the least reflected. Together with courts and data protection authorities this fundamental digital right keeps evolving.

The GDPR defines consent as the informed, prior, clear and unambiguous indication of a user’s wishes, i.e. that users must be made aware of exactly how your website processes personal data, what cookies and trackers are in use (including their purpose, provider and duration), and that users have the ability to give their explicit consent to each of these before any processing of their personal data can take place.

The Digital Markets Act (DMA), which came into force on November 2022 in the European Union and European Economic Area, reinforces the definition of consent under the GDPR, and requires the companies it has designated as “gatekeepers” under the regulation, as well as third-party businesses using the gatekeepers’ platforms, to collect and process user data only after obtaining valid consent, per this definition.

Cookiebot CMP has pushed to shape consent management since 2012, to make “consent” a no-nonsense term with real-world application: the explicit, informed and empowered voice of the individual person being the governing force for the processing of personal data on our digital infrastructures.

Try Cookiebot CMP free for 14 days… or forever if you have a small website.


Having taken effect in 2000, PIPEDA predates the GDPR by nearly two decades. The law has been amended several times to meet the evolution of the digital landscape since it came into force.

However, successive attempts to replace PIPEDA have stalled amid parliamentary changes. The law was amended with the Digital Privacy Act in 2015, and requires Parliamentary review every five years under Section 29 of the Act. As of the time of writing, PIPEDA has not been fully replaced.

Canada’s PIPEDA has received an adequacy decision from the EU Commission, ensuring the free flow of personal data back and forth between Canada and the EU. Of note is that only PIPEDA has been deemed adequate, so it's only data transfers to and from the commercial, private sector of Canada that is secured with the EU.

In short, Canada’s PIPEDA regulates all gathering, use and disclosure of personal information in the private sector through its 10 PIPEDA Principles; chief among them the requirements that you inform users about your website’s data collection, and obtain their prior, meaningful consent.

PIPEDA is enforced by the Canadian Privacy Commissioner (OPC) and applies to all websites and companies in the world that process personal information from Canadian residents for commercial use.

Person holding 40 Canadian dollars - Cookiebot
Fines for non-compliance with PIPEDA can reach CAD 100,000 per violation for the most serious infractions.

At a glance

Person sitting on rocks with the sea in the background at sunset - Cookiebot
Meaningful consent is at the heart of PIPEDA. Individuals must understand what they are consenting to before you collect their personal information.

Scan your website to see what cookies and trackers are in operation. Learn your compliance risk in minutes.


Key definitions under PIPEDA

When assessing your PIPEDA compliance needs, there are several terms that are important to understand.

Personal information

PIPEDA defines personal information broadly as any information about an identifiable individual — factual or subjective, recorded or otherwise. For most websites, this means the data collected through everyday tracking technologies falls squarely within scope. Common examples include IP addresses, device identifiers, browsing and search history, purchase history, and cookie data. More sensitive categories — such as medical records, financial information, and ethnic origin — are also covered, and will generally require a higher standard of consent.

Commercial activity

PIPEDA applies to personal information collected, used, or disclosed in the course of commercial activity. This covers any transaction or conduct of a commercial character, including the exchange of user data with third-party services in return for analytics, advertising, or tracking capabilities, which is a common arrangement for websites using tools such as Google Analytics or Meta Pixel.

For consent to be valid under PIPEDA, it must be reasonable to expect that the individual understands what they are consenting to — including the nature, purpose, and consequences of the collection, use, or disclosure of their personal information. Consent obtained through unclear language, buried disclosures, or pre-ticked boxes is unlikely to meet this standard.

Who does PIPEDA apply to?

PIPEDA applies to any private sector organization — anywhere in the world — that collects, uses, or discloses the personal information of Canadian residents in the course of commercial activities. It does not matter where your business is based: if your website processes data from Canadian residents for commercial purposes, PIPEDA applies to you.

Federally regulated organizations operating in Canada are also subject to PIPEDA, including airports and airlines, domestic and authorized foreign banks, inter-provincial and international transportation companies, telecommunications companies, and radio and television broadcasters.

Organizations operating in the Northwest Territories, Yukon, and Nunavut are also subject to PIPEDA, as these territories do not have their own substantially similar private sector privacy legislation.

Exceptions to PIPEDA

PIPEDA does not apply to Canadian federal government institutions, which are covered by the separate federal Privacy Act, or to provincial and territorial governments and their agents.

Additional exemptions include business contact information used solely for professional communication purposes; personal information collected or disclosed for purely personal use; information gathered for journalistic, artistic, or literary purposes; not-for-profit and charitable organizations where activities are not commercial; and political parties and associations, municipalities, universities, schools, and hospitals.

Cookieboot Pop Up Banner - Cookiebot
Customize your Cookiebot CMP banner with your logo, colors, and text for a better brand experience for your website visitors.

Through highly customizable consent banners that can be shaped to fit the compliance requirements specific to any region’s data privacy law, including Canada’s PIPEDA, Cookiebot CMP offers a simple way of collecting users’ valid, informed consent.

Cookiebot CMP safely stores all collected consents, automatically renews consent on a regular basis and makes it easy for your website’s users to withdraw their consent as easily as they gave it.

Data breach notification requirements under PIPEDA

Under the Digital Privacy Act amendment to PIPEDA, organizations that become aware of a data breach must, as soon as reasonably possible:

Third-party data processing

Under PIPEDA, your organization remains responsible for the personal information of your website's visitors even when that data is transferred to a third party for processing — for example, an analytics provider, advertising platform, or other service that handles data on your behalf.

You are required to conclude contracts or comparable agreements with any third-party processors to help ensure they provide a comparable level of protection for the personal information under their control. These agreements should make clear the limitations on processing, the security safeguards required, and the obligations for returning or deleting personal information at the end of the processing relationship.

Privacy Impact Assessments (PIA)

Under PIPEDA, Privacy Impact Assessments (PIAs) are a recommended practice rather than a strict legal requirement (unlike DPIAs under the GDPR). The Office of the Privacy Commissioner provides guidelines and forms for conducting a PIA, and organizations are encouraged to use them, particularly when implementing new data processing activities.

Canada’s PIPEDA in detail

Let’s break down Canada’s PIPEDA even further and look at its 10 PIPEDA Principles, how it interacts with provincial data privacy laws around Canada, e.g., Alberta, British Columbia, and Quebec, and hold it up against the EU’s GDPR for comparison.

The 10 PIPEDA Principles

Canada’s PIPEDA revolves around the ten so-called fair information principles that spell out the rules and regulations around the use of personal information for commercial purposes.

PIPEDA’s definition of commercial purpose includes acts such as selling or trading of your users’ data, e.g., in exchange for analytics services or marketing schemes.

If your website collects personal information from Canadian residents, such as IP addresses or search history, and then trades this information with a third-party service in exchange for tracking of users or marketing services, you are likely liable for PIPEDA compliance – no matter where in the world you and your website is operated from.

The 10 PIPEDA Principles are:

Canadian lake with mountains & trees in the background - Cookiebot
PIPEDA's 10 Principles apply to all personal information processing for commercial use.

Principle 1: Accountability

The first PIPEDA Principle makes it clear that you are responsible for all personal information that your website collects, and that you must have a designated representative in charge of ensuring your PIPEDA compliance.

You need to develop and implement privacy policies and practices, which must be readily available for individuals to read. Organizations are also responsible for training staff on privacy policies and practices, and for ensuring those policies are communicated internally.

Principle 2: Identifying purposes

Why does your website collect the personal information that it does?

This is the question that the second PIPEDA Principle requires you to answer in detail and prior to actually collecting any personal information from your users.

This is the most important PIPEDA Principle of all.

In a nutshell: you must obtain meaningful consent from users before collecting, using and sharing their personal information.

Meaningful consent under PIPEDA involves informing your users of exactly what they are consenting to, e.g., telling them what cookies your website uses, why and what the data is going to be used for.

Flagpole with the flag of Canada  - Cookiebot
Consent can be either express or implied, depending on the sensitivity of the information and the circumstances of collection.

PIPEDA states that consent is only valid if it is “reasonable to expect” that your users understand the nature, purpose and consequence of your website’s personal information processing.

Implied consent may be appropriate in strictly defined circumstances, generally where the personal information is not sensitive and where collection and use would fall within the reasonable expectations of the individual.

Even where implied consent applies, you must still inform users prior to collection about the following:

Express consent requires an active, explicit action from the individual, for example, clicking a button or ticking a box to confirm they agree to the collection of their personal information.

Express consent is required when the personal information is sensitive in nature — such as medical or health data, information about an individual's sexual orientation or religious beliefs — or where collection would fall outside the reasonable expectations of the individual, or where there is a meaningful risk of significant harm.

The OPC's position is that express consent must also be obtained from a parent or guardian where an individual lacks the capacity to provide meaningful consent themselves. In all but exceptional circumstances, this includes anyone under the age of 13.

Regardless of whether consent is implied or express, the following requirements apply:

Toronto waterfront at night  - Cookiebot
PIPEDA applies to any website in the world that processes personal information from Canadian residents for commercial purposes.

Principle 4: Limiting collection

The crux of the fourth PIPEDA Principle is this: your website is not allowed to collect personal information in ways that exceed or fall outside the stated purposes, to which your users have already consented.

If you want to use personal information for different purposes, you must rewrite your privacy policy to include these new purposes – and renew the consent of your users.

Principle 5: Limiting use, disclosure, and retention

Similar to the fourth, the fifth PIPEDA principle requires you to only use and disclose personal information in the ways that you’ve stated in your privacy policy, and to which your users have already consented.

You are also only allowed to keep personal information (known as “retention”) for as long as needed to serve the purposes that you’ve informed your users about and to which they’ve consented.

As with the previous principle, should you change the ways you want to use or share personal information on your website, you must inform users anew and obtain their consent again.

Principle 6: Accuracy

It’s a requirement for PIPEDA compliance that the personal information your website collects is accurate and complete, as well as up to date.

Canadian residents have the right to access data collected about them and the right to have it corrected, should they find it inaccurate.

Toronto skyline - Cookiebot
Canadian residents are empowered with the enforceable rights of access and correction.

Principle 7: Safeguards

It is also your responsibility to keep collected personal information safe and secure.

Though Canada’s PIPEDA doesn’t specify exactly what kinds of security measures you must take on your website in order to protect your users’ personal information, this PIPEDA principle helps you get an overview of the safeguards required.

Among the proposed safeguards in PIPEDA are:

Personal information must be protected by appropriate security relative to the sensitivity of the information. Where the data collected is of a more sensitive nature, for example, information about sexual orientation, stronger safeguards will be required.

Principle 8: Openness

Your website needs to be transparent, honest and clear about the kinds of personal information it collects, what it uses it for and the ways in which it gathers and shares it. This eighth PIPEDA Principle clarifies that your privacy policies and information to users must be easy to understand and written in plain language (i.e. not long legal texts). Information to be open about to your website’s users includes:

Principle 9: Individual access

Canadian residents have the right to access what personal information your website has collected from them, as well as the right to have it corrected if the data is not accurate or complete.

This ninth PIPEDA Principle spells out how you are required to respond to such requests from users, including:

Organizations must respond to access requests within 30 days of receipt. A single 30-day extension is permitted where meeting the initial deadline would unreasonably interfere with the organization's activities, consultation required cannot be completed in time, or converting information to an alternative format requires additional time. Any extension must be communicated to the individual within the initial 30-day period, including the new deadline, reasons, and the individual's right to complain to the Privacy Commissioner.

Principle 10: Challenging compliance

If users find that you are non-compliant with PIPEDA, e.g., because you violate or don’t live up to one of the above Principles, they are legally allowed to challenge your compliance status.

The last PIPEDA principle spells out how such challenges must be issued and how you must respond to them, i.e. by providing users with a simple way to give their complaint and informing them of their rights to refer to the Privacy Commissioner.

Road with trees on either side with a skyscrapers in the background - Cookiebot
Provincial privacy laws may supplement or override PIPEDA within the relevant province, but PIPEDA applies once data crosses provincial or national borders.

PIPEDA enforcement

PIPEDA is enforced by the Office of the Privacy Commissioner of Canada (OPC), which operates in an ombudsman capacity. When an individual lodges a complaint, the OPC is required to investigate and produce a report, but that report is advisory rather than binding.

The OPC cannot directly order an organization to comply or levy fines. If a complainant is unsatisfied with the outcome, they can take the matter to Federal Court, which does have the power to order corrective action and award damages. The OPC can also initiate audits and require organizations to enter into compliance agreements where there are reasonable grounds to believe a violation has occurred or is likely to occur.

Individuals' rights under PIPEDA

PIPEDA provides Canadian residents with the following rights:

PIPEDA and provincial data privacy laws

Though Canada’s PIPEDA is a federal data privacy law, several Canadian provinces have similar data privacy laws that are in effect in parallel with PIPEDA.

The following provincial data privacy laws are considered equivalent to PIPEDA, so if you’re in compliance with them, it means you are exempt from also seeking compliance with PIPEDA –

Firstly, Alberta’s Personal Information Protection Act (PIPA) regulates the commercial use of personal information in Alberta, enforced and supervised by the Information and Privacy Commissioner of Alberta.

Secondly, British Columbia’s Personal Information Protection Act (PIPA) regulates the commercial use of personal information in British Columbia, enforced and supervised by the Information and Privacy Commissioner of British Columbia.

Lastly, Quebec’s Act Respecting the Protection of Personal Information in the Private Sector regulates the commercial use of personal information in Quebec, enforced and supervised by the Commission d’accès à l’information du Québec.

Quebec Law 25

Quebec's Law 25, which resulted from Bill 64, an act to modernize legislative provisions regarding the protection of personal information, came into force in three stages: September 2022, September 2023 (the majority of requirements), and September 2024. Like PIPEDA, it is extraterritorial, protecting Quebec residents' data regardless of where the organizations processing it are based.

Law 25 is explicitly opt-in, meaning cookies and other tracking technologies cannot be activated without prior explicit individual consent. It has no compliance thresholds based on company revenue or data volumes.

Penalties for serious violations mirror the GDPR: four percent of global revenue or CAD 25,000,000, whichever is higher. Unlike PIPEDA, Law 25 allows for private right of action, with potential damages of at least CAD 1,000 per individual. It also provides rights of deletion and data portability, which PIPEDA does not.

Combined flag of the European Union and the Canadian flag - Cookiebot
One of the biggest differences between PIPEDA and GDPR is their scope.

PIPEDA vs. GDPR: Key differences

Though PIPEDA and the GDPR share a number of foundational principles — including consent requirements, data minimization, and individuals' rights of access and correction — there are meaningful differences between the two laws that are worth understanding, particularly if your organization is already GDPR-compliant and is assessing what additional work PIPEDA compliance may require.

Scope

PIPEDA applies only to the commercial use of personal information by private sector organizations. The GDPR applies to both public and private sector processing of personal data, with broader reach across government and institutional contexts. Canada has a separate law — the federal Privacy Act — that governs personal information handling by Canadian government departments and agencies.

PIPEDA operates a hybrid consent model, allowing for implied consent in lower-risk contexts where the sensitivity of the personal information does not warrant explicit action from the individual. The GDPR requires explicit, freely given, specific, and informed consent — with no equivalent implied consent mechanism. It is worth noting, however, that the GDPR also provides alternative legal bases for processing, including legitimate interests and contractual necessity, whereas PIPEDA is more narrowly centered on consent as the primary mechanism, with limited exceptions.

International data transfers

PIPEDA does not use a country-level adequacy model for outbound transfers. Instead, it takes an organization-to-organization approach: each organization involved in a cross-border transfer of personal information is responsible for ensuring that adequate protections are in place, regardless of where the receiving organization is located. In the other direction, Canada holds an adequacy designation from the European Commission, meaning EU personal data can flow to Canadian commercial organizations subject to PIPEDA without additional safeguards. Organizations handling data in both jurisdictions should note that adequacy in one direction does not equal compliance in the other — PIPEDA and GDPR obligations remain distinct.

Private right of action

Under the GDPR, individuals can bring private legal action against organizations for violations of their rights. PIPEDA does not provide a private right of action. Complaints must be directed to the Office of the Privacy Commissioner, which investigates and produces recommendations; further action can then be taken in Federal Court if a complainant is unsatisfied with the outcome.

Individual rights

The GDPR provides individuals with the right to data portability and the right to erasure. PIPEDA provides neither. Organizations subject to PIPEDA are required to provide access to personal information and allow corrections, but are not obligated to delete it or provide it in a portable format. Quebec's Law 25 does provide both rights to Quebec residents, but this applies at the provincial level only.

PIPEDA compliance with Cookiebot CMP

Canada's PIPEDA is one of the older data privacy laws still in active force, and one of the more substantive — providing Canadian residents with meaningful, enforceable rights over their personal information and placing real obligations on any organization that handles it, wherever in the world that organization is based.

Meeting those obligations means knowing what data your website collects, having valid consent in place before you collect it, and being able to demonstrate that consent if required. For most websites, that is a more complex task than it appears.

Cookiebot CMP by Usercentrics is a plug-and-play consent management solution used across 2.4 million websites and applications worldwide. It scans your website to detect cookies and tracking technologies, gives you detailed information on each one, and provides customizable consent banners designed to support compliance with PIPEDA and other major data privacy laws — including the EU's GDPR, the UK's GDPR, California's CCPA/CPRA, Brazil's LGPD, and many others.

Cookiebot CMP also stores consent records, supports consent renewal, and makes it straightforward for your website's visitors to withdraw consent as easily as they gave it — all of which are requirements under PIPEDA.

Try our interactive builder to see how easy it is to set up and customize your consent banner with Cookiebot CMP. Then start your free 14-day trial and go live in minutes.

If your business collects data from California residents, the regulatory environment you're operating in today looks meaningfully different from two years ago. CalPrivacy — the chosen name of the California Privacy Protection Agency (CPPA) — has acquired new enforcement tools, new legal authority, and new allies across nine states, all at the same time. This article breaks down the ten structural forces driving that expansion and what they mean for how businesses need to approach compliance.

At a glance

1. The Historical CPPA Enforcement Backlog Is Being Actively Resolved

CalPrivacy’s Enforcement Division only gained formal authority in July 2023, even though the California Consumer Privacy Act (CCPA) has been in effect since January 2020. That gap left more than three years of potential violations that weren’t necessarily extinguished by the agency’s prior limitations.

That gap is now being tested. When CalPrivacy investigated Tractor Supply in 2024, it pulled records back to 2020, and Tractor Supply accepted the agency's authority to do so. For businesses that treated pre-enforcement-era conduct as untouchable, that precedent changes the calculation.

Between July 2023 and September 2025, CalPrivacy received 8,265 consumer complaints, roughly 150 per week, per Calprivacy’s 2025 Annual Report. By early 2026, the agency had more than 100 active investigations running simultaneously, with many businesses under examination unaware it had begun.

2. A New CPPA Audits Division Means Proactive Scrutiny Across Every Sector

Until February 2026, the CPRA's audit mandate, which was written into law when voters passed Proposition 24 in 2020, had never been operationalized. That changed when CalPrivacy appointed Sabrina Boyson Ross as inaugural Chief Privacy Auditor and started ramping up a dedicated Audits Division

What the Audits Division adds to the enforcement picture:

Examination without a trigger

The Enforcement Division responds primarily to complaints and reported incidents. The Audits Division is not bound by either. It can open an examination of any CCPA-covered business based on sector risk, its own research, or regulatory priority alone.

Technical scrutiny

Ross's prior experience at Meta points to a methodology focused on how systems actually work — data flows, technical configurations, and system architecture — rather than whether policy documents say the right things. That's where most compliance failures come from.

A path to enforcement

An audit is not a parallel track. Findings can be referred directly to the Enforcement Division, making an audit an early stage of the same process that ends with fines and remediation orders.

Expanding reach

The division is actively hiring. More staff means more simultaneous examinations across more industries, which is a capacity that will only grow.

CalPrivacy has been clear that the Audits Division is not purely punitive. The 2025 Annual Report signals an intention to engage businesses directly through stakeholder meetings, plain-language guidance, and webinars, while the Enforcement Division continues issuing advisories to indicate where scrutiny is headed.

3. CPPA's 2026 Ruleset Adds Risk Assessments, Cybersecurity Audits, and ADMT Rules

January 1, 2026 marked the largest single expansion of CCPA obligations since the law took effect. Three new requirement categories are now in force, and businesses that were fully compliant two years ago may not be today.

Privacy Risk Assessments

Before starting any new high-risk processing activity, businesses must now complete and document a formal risk assessment. For processing already underway, assessments must be finished by December 31, 2027. The threshold is triggered by:

Selling or sharing personal information

Processing sensitive data

Using automated decision-making for significant decisions

Training AI systems on personal data

CalPrivacy has made clear it won't wait for the 2028 submission deadline to start asking questions. The agency signaled it would request risk assessments during active investigations as early as 2026. 

The March 2026 PlayOn Sports settlement reinforced that: A mandatory risk assessment was included as a remedial condition, confirming the agency treats this as an enforcement tool now, not a future compliance milestone.

Cybersecurity Audits

Businesses whose data processing presents significant risk to California consumers must now commission annual independent cybersecurity audits covering 18 specified technical and organizational components [Cal. Code Regs. tit. 11, § 7123(b-c)]. 

The audit must be conducted by a qualified independent professional. Its findings must be certified annually by a member of executive management under penalty of perjury. Nothing in the prior CCPA framework required anything comparable.

Automated Decision-Making Technology (ADMT)

AI and automated systems that make significant decisions about consumers in areas like employment, housing, credit, education, or healthcare, are subject to new notice and opt-out requirements from January 1, 2027. Risk assessment obligations for those same systems are already in effect.

The definition of ADMT is deliberately broad. Machine learning models, rule-based scoring systems, and analytics tools that materially shape decisions about individuals all fall within scope, regardless of whether the business labels them "AI."

4. The 2028 CPPA Deadline Will Hand Regulators an Economy-Wide List of Investigative Leads

The April 1, 2028 deadline is where years of accumulated compliance obligations converge into a single structured disclosure. 

Three categories of submission will be required:

1

Executive-certified attestations confirming that risk assessments were conducted for all qualifying processing activities in 2026 and 2027

2

Summary information from those assessments, signed by a senior executive with direct compliance responsibility

3

Annual cybersecurity audit certifications on a staggered schedule: large businesses from 2028, mid-size from 2029, smaller businesses from 2030 (all signed under penalty of perjury)

What makes this consequential is not the paperwork but rather what the submissions create. For the first time, CalPrivacy will hold a structured, economy-wide picture of compliance across every sector in California — a state whose economy ranks among the four or five largest in the world by most measures.

That picture will be read carefully. Submissions that reveal gaps or make claims the agency has reason to question become ready-made grounds for an audit referral. And executives who sign off on compliance attestations that don't hold up face personal liability for false certification, not just corporate exposure.

The 2028 submission cycle is, in effect, the Audits Division's most powerful investigative tool. It hasn't launched yet, but businesses are already generating the underlying records that it will be scrutinizing.

5. DROP Is In Force and Complaint Volumes Are Rising

Before the Delete Request and Opt-Out Platform (DROP) was launched, a California resident wanting to remove their personal information from data broker databases had to contact each one individually. That process could involve hundreds of separate requests. DROP, which launched January 1, 2026, collapses that into a single submission covering all 500-plus registered data brokers at once.

Adoption has been rapid. More than 217,000 California residents enrolled within the first two months. CalPrivacy Executive Director Tom Kemp has said publicly that he expects complaint volume to climb as the platform's user base grows, and the trajectory so far gives little reason to doubt that.

The platform has two enforcement-relevant phases. Drop launched for consumers on January 1, 2026. The obligation for data brokers to actually process and fulfill the deletion requests it generates kicks in on August 1, 2026. After that date, non-fulfillment triggers immediate enforcement exposure. There is no cure period.

The penalty structure is designed to compound quickly. Each unprocessed deletion request carries a USD 200-per-day fine. Brokers also face a separate USD 200-per-day penalty for any registration lapse. For a broker managing tens of thousands of consumer records, those figures accumulate fast.

What DROP ultimately creates is a permanent, consumer-powered audit mechanism for data broker compliance. Every enrolled resident is an ongoing check on whether brokers are honoring their obligations. Every unfulfilled request is a potential enforcement referral. The platform finances itself through the same registration fees that data brokers are already required to pay.

6. CPPA Automated Detection Is Expanding Investigation Capacity

Most regulatory enforcement starts with a complaint. A consumer files one, the agency reviews it, and an investigation may follow. But CalPrivacy has built a parallel track that doesn't require any of that.

The agency's dedicated technology team conducts its own independent research into privacy harms and data flows. This is entirely separate from complaint intake. Using automated scanning of public-facing websites and applications, it can assess non-compliance at scale across four areas in particular:

GPC signal recognition: whether sites are correctly processing Global Privacy Control opt-out signals

Opt-out mechanism functionality: whether the mechanisms businesses provide actually work

Dark patterns: in consent interfaces, design choices that nudge or manipulate users away from privacy-protective choices

Consent banner behavior: whether banners meet CCPA requirements for symmetry and clarity

7. One CPPA Investigation Can Now Trigger Enforcement Across Nine States

In April 2025, nine state privacy regulators formalized something that had previously been ad hoc: a coordinated, cross-jurisdictional enforcement coalition. 

Established by a memorandum of understanding, the Consortium of Privacy Regulators brings together CalPrivacy and California’s Attorney General alongside regulators from Colorado, Connecticut, Delaware, Indiana, Minnesota, New Hampshire, New Jersey, and Oregon.

The consortium's structure enables member regulators to share investigative findings, align on enforcement priorities, build collective expertise on technically complex data practices, and bring joint actions where warranted. For businesses, the implications go well beyond California:

The closest historical analogy is the wave of multistate data breach enforcement coalitions that took shape in the 2010s. Those coalitions reshaped how corporations approached data security investment, producing landmark settlements and establishing cross-state enforcement as a standard feature of the regulatory landscape. Privacy law enforcement appears to be following the same trajectory.

8. Proposed Whistleblower Legislation Would Open CPPA Enforcement from Within Businesses

CalPrivacy's existing enforcement tools, which include automated scanning, consumer complaints, audit authority, all operate from the outside looking in. 

AB 2021, legislation introduced in February 2026, would add a fundamentally different mechanism: enforcement intelligence sourced from inside the organizations being regulated.

Modeled on the SEC whistleblower program, the bill would establish:

The significance of that last point shouldn't be understated. Internal privacy violations, which can include decisions made in meetings, configurations set by engineers, or policies quietly deprioritized under cost pressure, among others, are largely invisible to external regulators. 

AB 2021 would give people with direct knowledge of those decisions a meaningful financial incentive to report them, and a legal backstop if their employer retaliates.

The SEC program offers a useful benchmark for what that could mean in practice. Since its introduction, it has generated some of the largest and most consequential enforcement actions in the history of financial regulation. Not because regulators got better at detecting violations from the outside, but because insiders started bringing the evidence directly to them.

9. Deterrence Approach: Fixing a CPPA Violation Before Contact No Longer Guarantees a Reduced Fine

For much of CalPrivacy's short enforcement history, the implicit understanding was that businesses that identified and fixed their own compliance issues before the agency came calling would receive some credit for doing so. The PlayOn Sports settlement ended that assumption.

PlayOn had found and remediated its compliance failures in December 2024, months before CalPrivacy made contact. The agency imposed a USD 1.1 million penalty regardless. Its public statements left little ambiguity about why: The fine was intended to send a message to an entire industry, not just to correct one company's behavior.

Several things follow from that shift, about which businesses across sectors should take note:

Self-remediation is no longer a reliable mitigant

Fixing violations before agency contact may still be the right thing to do operationally, but it does not insulate a business from significant penalties.

Penalty size reflects deterrence objectives, not violation cost

Fines are calibrated to produce industry-wide behavioral change, which means they will often exceed what the specific violation would seem to warrant.

Enforcement targets are chosen for their signaling value

PlayOn put the schools and youth sports sector on notice; Tractor Supply addressed rural retail; Honda addressed automotive; and the Attorney General’s case against Disney addressed entertainment. Actions reached entire industries through a single case.

The "captive audience" doctrine travels

CalPrivacy's enforcement position in PlayOn — that users who had no meaningful alternative deserved heightened protection — applies directly to subscription platforms, workplace tools, ticketing services, and any other context where opting out is genuinely difficult.

10. 4 CPPA Rulemaking Areas Will Add New Obligations Through 2027 and Beyond

The ten forces described in this article represent the current state of CPPA enforcement. Rulemaking underway at CalPrivacy will expand that picture further in at least four areas, with a fifth possible depending on what the undisclosed fourth rulemaking covers.

The three confirmed areas:

1
Employee and contractor data

CCPA protections for job applicants, employees, and contractors have long been treated as a lower-compliance-burden category. Upcoming rulemaking will challenge that assumption, clarifying and potentially expanding what businesses must do to protect employment-related personal information.

2
Privacy policy standards

Readability, accuracy, and completeness requirements are all under review. A policy that passed muster in 2024 may not satisfy what CalPrivacy finalizes for 2026 or 2027, and outdated privacy policies have already featured in enforcement actions.

3
Opt-out preference signals

CalPrivacy is moving to codify and expand the obligation to recognize and honor browser-level opt-out signals, including GPC. What is currently a compliance expectation enforced through investigations will become a formal, auditable regulatory requirement.

A fourth rulemaking area has been confirmed but not yet publicly described. Its scope and timeline remain unknown.

Each package that emerges from this process adds new obligations, creates new standards against which audits will measure businesses, and opens new grounds for enforcement action. The rulemaking calendar is, in effect, a forward-looking list of future compliance gaps for businesses that aren't tracking it.

What Businesses Need to Do as CPPA Enforcement Continues to Escalate

The enforcement pressure building at CalPrivacy is structural, not cyclical. Each mechanism described above adds capacity that persists and compounds over time; each new body of regulation creates new categories of potential violation.

The table below summarises how enforcement pressure is likely to evolve:

TimeframeImportant Initiatives
2026- Historical enforcement backlog under active review
- Audits Division hiring and building examination capacity
- August 1 DROP processing deadline for data brokers
- January 2026 regulations — risk assessments, cybersecurity audits, ADMT — now in force
- Automated detection sweeps ongoing
2026–2027- Growing consumer participation in DROP driving complaint volume up
- ADMT notice and opt-out requirements take effect January 1, 2027
- Consortium joint investigations expanding in scope and frequency
- AB 2021 whistleblower legislation moving through legislature
- Rulemaking packages on employee data, privacy policies, and GPC being finalized
2028 and beyond- April 2028 submission deadline: executive-certified risk assessment attestations and cybersecurity audit certifications due
- Audits Division has a structured, economy-wide compliance picture for the first time
- Annual submission and examination cycles begin
Ongoing- DROP enrolment and complaint volume continuing to grow
- Automated scanning capacity expanding
- Nine-state consortium making multi-state enforcement routine
- Penalty levels rising as deterrence-focused approach embeds across enforcement actions

These ten forces are not operating independently; they are compounding. Each new regulation creates new audit criteria. Each audit finding feeds into the enforcement pipeline. Each new consortium member multiplies the jurisdictional reach of any single investigation.

Businesses that treat CCPA compliance as a periodic exercise are already operating at a structural disadvantage, and that gap will widen as the 2028 submission cycle approaches. 

Cookiebot by Usercentrics helps businesses maintain the consent records, documented opt-out flows, and consent management infrastructure that regulators will expect to see. Having systems in place that can demonstrate compliance rather than just aspiring to it is increasingly a baseline requirement, not a competitive differentiator.

Frequently asked questions

What is the CPPA currently prioritizing for enforcement?

CalPrivacy's current focus areas, based on public actions and active scanning:

  • GPC compliance
  • Data broker registration and DROP compliance
  • Dark patterns in consent interfaces
  • Children's and students' data 
  • Automated decision-making systems
How does the CPPA open an enforcement investigation?

CPPA enforcement investigations are initiated in three ways:

  • Consumer complaint
  • Audits Division referral
  • Proactive detection by the agency's own technology team

The third one requires no external trigger. CalPrivacy scans public-facing websites autonomously for GPC non-compliance, broken opt-out mechanisms, and dark patterns. A business can be under active investigation without having received any contact from the agency.

If a business fixes a privacy violation before the CPPA makes contact, does that prevent a fine?

Not necessarily. The March 2026 PlayOn Sports settlement is the controlling precedent. CalPrivacy imposed a USD 1.1 million penalty on a company that had self-identified and remediated its violations months before agency contact. The agency's stated position is that enforcement is calibrated for industry-wide deterrence. Prior remediation does not function as a penalty shield.

Which businesses are required to complete annual cybersecurity audits under the CCPA?

Businesses that are required to complete annual cybersecurity audits are those with data processing that presents significant risk to California consumers, specifically:

  • Deriving 50 percent or more of annual revenue from selling or sharing personal information
  • Processing personal information of more than 250,000 consumers or households, or
  • Processing sensitive personal information of more than 50,000 consumers

Audits must cover 18 specified technical and organizational components and be certified annually by executive management under penalty of perjury.

What do businesses need to submit to the CPPA by April 2028?

Two categories: executive-certified attestations confirming required risk assessments were completed for 2026 and 2027 processing activities; and cybersecurity audit certifications on a staggered schedule: USD 100M+ revenue businesses first in 2028, mid-size in 2029, smaller businesses in 2030, all signed under penalty of perjury.

The submissions will give CalPrivacy the first structured, economy-wide compliance picture across California, and gaps or implausible claims become direct grounds for audit examination or enforcement referral.

What is the Consortium of Privacy Regulators, and which states are members?

A formal nine-state enforcement coalition established by memorandum of understanding in April 2025. Members are California (CalPrivacy and the state AG), Colorado, Connecticut, Delaware, Indiana, Minnesota, New Hampshire, New Jersey, and Oregon.

Member regulators coordinate investigations, align priorities, and can bring joint actions. For any business under CalPrivacy scrutiny, the investigation can expand to all nine states simultaneously. Settling with one member does not resolve exposure in the others.

Most businesses understand that they need a privacy policy. Far fewer understand what actually needs to go into one or how detailed it should be.

This is where many privacy policies fall short. They exist, but they are incomplete, outdated, or too vague to meet modern privacy expectations. Regulators expect clarity. Users expect transparency. And increasingly, both expect accuracy.

A privacy policy is a legal document that explains how a website or organization collects, uses, stores, and shares personal data. It gives users visibility into what happens to their information and outlines their rights in relation to that data.

In practice, a privacy policy is no longer just a legal safeguard. It is a communication tool. It explains how your business operates behind the scenes, particularly in how it handles personal data. When done properly, it can reinforce credibility and strengthen relationships with your users.

This guide focuses on the practical side of privacy policies: what you need to include, how to structure it, and how to keep it relevant as your business evolves.

Key takeaways

What Makes a Privacy Policy Compliant?

A compliant privacy policy is not defined by length or legal language. It is defined by clarity, accuracy, and completeness.

At a minimum, your policy must reflect your actual data practices. If your website uses cookies, analytics tools, or third-party integrations, those must be disclosed. If you collect personal data through forms or transactions, that must be explained.

In practice, privacy compliance comes down to two principles:

Common Mistakes to Avoid

Before outlining what to include, it’s worth noting where many policies go wrong. These issues often lead to gaps:

A privacy policy should reflect reality — not aspiration.

Core Elements Every Privacy Policy Must Include

While privacy laws differ in scope and terminology, the structure of a privacy policy is broadly consistent worldwide. Regardless of jurisdiction, regulators expect organizations to clearly explain how personal data is handled across its lifecycle. The following elements form the foundation of a comprehensive and compliant document.

1. Categories Of Personal Data Collected

Every privacy policy should begin with a clear overview of what personal data is collected. This sets expectations for users and provides the baseline for all subsequent disclosures. It also helps regulators assess whether your data practices are proportionate and justified.

Typical categories include:

Be explicit. If your website uses cookies or tracking technologies, this should be clearly stated and not implied.

2. How You Collect Data

Understanding what data is collected is only part of the picture. Users also need visibility into how that data is obtained, as this influences both consent and expectations. This section helps clarify when and where data collection occurs.

Common collection methods include:

Each method should be described in a straightforward way to reduce ambiguity.

3. Purpose Of Data Processing

Once data collection is established, your policy must explain why that data is used. This is one of the most scrutinized sections. Users expect a clear explanation of how their data supports your services.

Common purposes include:

Avoid broad or generic statements. Precision supports compliance and builds credibility.

For organizations subject to General Data Protection Regulation (GDPR) , identifying the legal basis for processing is a mandatory requirement. This section connects your data activities to a lawful justification and demonstrates regulatory awareness. It also helps users understand under what conditions their data is processed.

These typically include:

Each processing activity should be tied to a specific legal basis where applicable.

5. Data Sharing And Third Parties

Modern websites rarely operate in isolation. Most rely on a network of third-party providers that process data in some form. This makes transparency around data sharing essential for both user trust.

You should clearly identify the categories of recipients, such as:

Explain why data is shared and the role each third party plays.

6. Data Retention

Data retention is a critical but often overlooked component of privacy policies. Users increasingly expect to know not just what data is collected, but how long it is kept. Regulators also assess whether retention practices are justified and proportionate.

Your policy should explain:

This demonstrates responsible data lifecycle management.

7. User Rights

User rights are central to most modern privacy frameworks. Clearly outlining these rights empowers individuals and reinforces your commitment to transparency and control.

Common rights include:

Provide clear instructions for how users can exercise these rights.

8. Security Measures

Security disclosures help reassure users that their data is handled responsibly. While you should avoid exposing sensitive operational details, you should still communicate your general approach to data protection.

You may describe:

The aim is to balance transparency with security.

9. Contact Information

A privacy policy must include a clear way for users to get in touch. This is essential for handling requests, complaints, or general inquiries related to personal data. Accessibility here reinforces accountability.

This typically includes:

Ensure this information is easy to find and up to date.

How Privacy Policy Requirements Differ by Regulation

While the core structure of a privacy policy remains consistent, specific requirements vary depending on the regulatory frameworks that apply to your business. Understanding these differences helps you tailor your disclosures appropriately. It also reduces the risk of overlooking jurisdiction-specific obligations.

How to Structure a Privacy Policy for Clarity

A privacy policy should not read like a dense legal document. Structure plays a critical role in usability and comprehension. Users typically scan for relevant information rather than reading every word.

Before diving into formatting techniques, it is important to recognize that clarity is not optional. It is a core expectation under many privacy regulations.

How to Keep Your Privacy Policy Up to Date

A privacy policy must evolve alongside your business. Changes in tools, technologies, and regulations can quickly make it outdated. Regular reviews help maintain both accuracy and compliance.

Keeping your policy current also signals to users that you take data protection seriously.

Why Accuracy And Transparency Drive Trust

Privacy expectations are evolving rapidly, and users are becoming more selective about who they trust with their data. This shift places greater emphasis on clear and accurate communication. A privacy policy plays a central role in meeting these expectations.

Research shows that 77 percent of consumers do not fully understand how their data is collected and used. At the same time, transparency remains the most important factor in building trust.

Turning Requirements Into Actionable Insight

Understanding what to include in a privacy policy is only the first step. The more complex challenge is translating those requirements into an accurate reflection of your website’s real-world data practices. This is where many organizations encounter difficulty.

Modern websites rely on multiple tools, integrations, and third-party services that evolve over time. Without clear visibility, maintaining accuracy becomes significantly more difficult.

A privacy policy is no longer just a legal formality. It is a critical part of how your business communicates with users.

To be effective, it must be:

By focusing on what truly matters — transparency, usability, and alignment with real practices — you create a policy that supports both regulatory compliance and user trust.

Frequently asked questions

What is the minimum information required in a privacy policy?

At a minimum, a privacy policy must explain what personal data you collect, how you collect it, why you use it, who you share it with, how long you retain it, and what rights users have. Requirements may vary depending on applicable privacy regulations.

Do small websites need a privacy policy?

Yes. Even small websites often collect personal data through cookies, analytics tools, or contact forms. This typically triggers disclosure requirements under most privacy laws.

Can I use a template for my privacy policy?

Templates can be a useful starting point, but they must be customized to reflect your actual data practices. A generic policy that does not match your operations may lead to non-compliance.

How often should a privacy policy be updated?

You should review your privacy policy at least once per year. Additionally, update it whenever your data practices, tools, or regulatory obligations change.

What happens if my privacy policy is inaccurate?

An inaccurate privacy policy can expose your business to regulatory penalties and erode user trust. It may also create legal risk if your documented practices do not match reality.

Protecting the personal information of website visitors and customers sits at the heart of modern data privacy law, and the obligations it creates are only growing more specific. In the U.S. alone, more than 20 states now have comprehensive privacy regulations in force, each with its own definitions of what data qualifies for protection and at what level. 

Getting compliance right begins with understanding what kind of data you are actually dealing with. Three terms appear repeatedly across privacy regulations worldwide: 

These are not interchangeable. Each carries distinct legal significance, and misclassifying the data your organization collects can lead to compliance gaps, regulatory exposure, and erosion of your users’ trust.

This guide explains what each category means, how they relate to one another, and why the distinctions matter for the GDPR, CCPA, and the expanding landscape of global privacy regulations.

Understanding the Three Core Data Categories

Before examining each type in depth, it is worth establishing the basic relationship between them.

Personally identifiable information (PII) is any information that can identify a specific individual, either directly or in combination with other data. It includes information like full name and government-issued ID numbers. It is the term most commonly used in U.S. federal law, government standards, and many sector-specific regulations.

Personal data (PI) is the broader category used in frameworks like the GDPR and most state-level U.S. privacy laws. It encompasses any information relating to an identifiable person, including data points that would not traditionally be classified as PII in every context, such as browsing or purchase history.

Sensitive data (SPI) is a subset of personal data that carries a higher risk of harm if disclosed or misused, including information like racial or ethnic identity, medical records, or financial details. It is subject to stricter protections under virtually all major privacy regulations, often requiring explicit consent before it can be processed. Personal information from known children is also often categorized as sensitive data under many privacy laws.

The essential relationship: All PII is personal data, but not all personal data is considered PII. Sensitive data is a high-protection subset of personal data that may also overlap with PII.

Accurately classifying information across the three categories is essential for meeting the ongoing requirements for regulatory compliance. Laws like the GDPR and the CCPA impose different obligations depending on which type of data an organization processes. Misclassification is a common root cause of compliance failure.

What You Need to Know About Personally Identifiable Information (PII)

PII is the foundational data category in U.S. privacy laws, and understanding it correctly is essential if you collect, store, or process information about individuals, whether in one state or across the country. The following sections cover what PII is, how it is classified, how it is treated under major privacy frameworks, and what organizations can do to protect it.

What Does PII Mean?

Personally identifiable information (PII) refers to any data that can be used to identify a specific individual. This covers information that directly identifies a person, as well as data that can be combined with other information to make identification possible.

The concept originates primarily in U.S. privacy law and aligns with guidance from the National Institute of Standards and Technology (NIST). It is important to note that there is no single, universally agreed-upon definition of PII. The scope of what qualifies varies among jurisdictions, regulatory bodies, and industry contexts. Different privacy regulations also use different terminology and levels of specificity in describing these categories.

Direct and Indirect Identifiers

There are two principal types of PII. Direct identifiers are data points that can immediately identify an individual on their own: a full legal name, Social Security number, or passport number, for instance.

Indirect identifiers are data points that, when combined with other information, can lead to identification. These could include a date of birth, employer, or job title when taken together. Neither type should be overlooked; indirect identifiers are frequently underestimated in data classification exercises and can create significant compliance exposure when combined.

How PII Is Classified: Sensitive vs. Non-Sensitive

Sensitive PII is information whose exposure could result in substantial harm, embarrassment, financial loss, or discrimination. This category warrants the strictest protection measures and is addressed with heightened requirements under most major privacy laws. Examples include:

Non-sensitive PII is information that, while still requiring protection, is less likely to cause direct harm if disclosed and may be more readily available through public or semi-public sources. Examples include:

It is worth bearing in mind that even non-sensitive PII can create privacy risks when combined with other data. Best practice is to treat all PII with care, regardless of how it is classified in isolation.

How the GDPR Approaches PII

Although the GDPR does not use the term "personally identifiable information," the regulation encompasses the concept within its broader definition of "personal data." 

There are several important distinctions in how the GDPR approaches what would traditionally be called PII:

The key takeaway is that the GDPR framework is broader than conventional PII definitions. Organizations operating under the GDPR should not assume that a narrow PII classification is sufficient for compliance purposes.

Protecting PII: Compliance Best Practices

To protect PII effectively and support compliance with relevant regulations, organizations can apply the following practices:

Classify and audit your data

Begin by identifying what PII your organization holds, where it lives, and how sensitive it is. Without an accurate data inventory, every other protection measure is built on uncertain ground.

Apply minimization from the start

Collect only the PII that is genuinely necessary for the stated purpose, retain it only as long as that purpose requires, and delete it securely once it has been served. Minimization reduces both compliance exposure and breach impact simultaneously.

Secure what you keep

Apply encryption to PII at rest and in transit, enforce role-based access controls so that only those with a legitimate need can reach sensitive data, and conduct periodic vulnerability assessments to identify and close gaps.

Build privacy into your processes

Develop clear internal policies for how PII is collected, processed, and shared. Train all staff who handle personal data and keep those training programs current as regulations and threats evolve.

Be ready when things go wrong

Maintain a documented incident response plan that covers breach containment, mandatory notifications to regulators and affected individuals, and post-incident review. Pair this with up-to-date privacy notices and a reliable consent management process so your baseline obligations are always in order.

PII Violations: The Cost of Getting It Wrong

The consequences of inadequate PII protection are significant for both individuals and organizations. For individuals, breaches of PII can result in identity theft, financial fraud, and lasting reputational harm.

For organizations, non-compliance carries substantial legal and commercial risk. Under the GDPR, for example, fines can reach EUR 20 million or four percent of global annual turnover, whichever is higher. 

Beyond financial penalties, organizations face reputational damage, loss of customer trust, operational disruption, and the costs of breach remediation, including mandatory notifications to data protection authorities and affected individuals.

Cookiebot bg shield
Privacy regulations set strict rules for collecting, handling, and protecting personal data

Personal data, sensitive information, PII — find out what relevant laws say about the data you collect and how you must manage consent, security, and user rights.

What You Need to Know About Personal Data (PI)

Personal data is the central concept in the GDPR and in most modern privacy frameworks worldwide. It is a broader category than PII, and understanding where the two overlap and diverge is critical for organizations seeking to achieve and maintain compliance with regulations that use one term or the other.

Defining Personal Data

Personal data, which is also referred to as personal information (PI) in some jurisdictions, is any information that can identify an individual, either directly or indirectly. It is a broader category than PII, encompassing a wider range of data points, including location data, online identifiers, and behavioral signals that can, in context, make a person identifiable. 

The distinction matters practically: all PII is personal data, but not all personal data would traditionally be classified as PII.

In the course of ordinary online activity, the average person generates dozens of these data points daily. Over time, the accumulated record can paint a surprisingly detailed picture of habits, preferences, movements, and associations.

Personal data is the central concept in the GDPR and in most U.S. state privacy laws, including theCCPA and CPRA.

What Personal Data Looks Like in Practice

Personal data spans both objective and subjective information types.

Objective personal data is factual, measurable, and verifiable. This includes full names, dates of birth, Social Security numbers, phone numbers, email addresses, IP addresses, financial information such as bank account and credit card details, and biometric data such as fingerprints and facial recognition data.

Subjective personal data is based on personal opinions, evaluations, or assessments. This category includes performance reviews, customer feedback, personal preferences, self-reported medical symptoms, and personality assessments. Both types qualify as personal data when they can be linked to an identifiable individual.

It is worth noting that even publicly available information can constitute personal data in some jurisdictions. Under the GDPR, for instance, publicly available information may still fall within the regulation's scope depending on how it is used and combined with other data — a position that differs from the approach taken under the CCPA, which generally excludes genuinely public information from its definition of personal information.

How the GDPR Defines Personal Data

Art. 4(1) GDPR defines personal data as "any information relating to an identified or identifiable natural person ('data subject'); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person."

Several features of this definition are worth emphasizing:

Personal Data: Compliance Best Practices

Organizations can support compliance with personal data obligations by adopting the following practices:

Conduct regular data audits

Identify and classify all personal data held or processed by the organization.

Apply data minimization

Collect and retain only the personal data genuinely necessary for specific, documented purposes. Delete data that no longer serves those purposes.

Manage consent systematically

Use aconsent management platform (CMP) to communicate clearly how personal data will be used, and to provide users with consent and preference controls.

Audit third-party data handling

Ensure that partners and data processors handle personal data appropriately, and document these arrangements. Transparency about data-sharing practices is both a legal requirement and a matter of user trust.

Train staff regularly

Privacy obligations are not solely the responsibility of compliance teams. All staff who handle personal data should understand their obligations.

Respond efficiently to data subject requests

Establish processes for handling requests to access, correct, or delete personal data within the timeframes required by applicable regulations.

Assign accountability

Designate a Data Protection Officer (DPO) where required by law, or as a matter of governance best practice.

What You Need to Know About Sensitive Data

Not all personal data carries the same level of risk. Certain categories of information are considered sensitive because their exposure or misuse can cause disproportionate harm, including discrimination, physical danger, or serious financial loss. 

Most major privacy regulations treat these categories separately and impose stricter obligations for access, use, and security on organizations that process them.

Defining Sensitive Data

Sensitive data is a subset of personal data that carries a higher risk of harm, discrimination, or adverse consequences if it is disclosed, accessed without authorization, or misused. The category covers a broad range of information, from health records and financial details to biometric identifiers and protected characteristics such as racial or ethnic origin.

Most major privacy regulations treat sensitive data as a distinct category requiring additional safeguards, separate legal bases for processing, and typically explicit consent obtained before processing begins, rather than implied or inferred consent.

What Counts as Sensitive Data

Common categories of sensitive personal data include:

Health and genetic data

Medical records, mental health information, genetic data, protected health information (PHI).

Biometric identifiers

Fingerprints, facial recognition data, retinal scans used for identification purposes.

Children's data

Any personal data relating to minors, which attracts heightened protections under COPPA, the GDPR, and an expanding range of U.S. state laws.

Financial information
  • Bank account numbers, credit card details, payment records, credit and debt information.
Protected characteristics

Racial or ethnic origin, religious or philosophical beliefs, political affiliation, sexual orientation, gender identity, trade union membership.

Access credentials

Account login credentials, PINs, biometric authentication data.

Employee data

Payroll records, performance evaluations, background check results.

Legal and industry-specific data

Legal case information, regulated financial records, research data subject to confidentiality obligations.

Sensitive Data Under the GDPR

Under the GDPR, certain categories of personal data are designated as "special categories" and attract the most stringent protections. These include information revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, genetic data, biometric data used for identification, health data, and data concerning a person's sex life or sexual orientation.

Processing special category data is generally prohibited unless one of a limited set of conditions applies. The most commonly relevant conditions for commercial organizations are explicit consent from the individual, processing that is necessary for employment law obligations, or processing required for substantial public interest. Each is subject to specific requirements and limitations.

How U.S. State Privacy Laws Treat Sensitive Data

The expanding network of U.S. state privacy laws — as well as certain federal laws, like COPPA, HIPAA, or the GLBA — has brought sensitive data into sharper regulatory focus. Several states now have specific rules targeting sensitive personal information, and the scope of what qualifies as sensitive continues to evolve.

As of 2026, most state-level privacy law frameworks impose opt-in consent requirements for the processing of sensitive data. This is a stricter standard than the opt-out model that applies to general personal information under many of the same laws, where the main requirements are notification and the ability to opt out of certain uses of personal data.

Connecticut's CTDPA was significantly amended in 2025 (SB 1295, effective July 1, 2026), expanding the definition of sensitive data to include neural data, financial account details, government-issued ID numbers, disability or treatment information, and nonbinary or transgender status. 

The amendments also lower the law's applicability thresholds, introduce new consent requirements for the sale of sensitive data, and strengthen protections for minors' personal data.

Organizations operating across multiple U.S. states must now manage a patchwork of overlapping sensitive data definitions and consent obligations, making systematic consent management and data classification more important than ever. Generally speaking, companies best protect themselves and their customers by treating compliance as a floor, not a ceiling.

A Framework for Protecting Sensitive Data

Organizations handling sensitive data should implement controls proportionate to the heightened risk that category carries. Three areas of focus provide the strongest foundation.

Access and technical controls

Sensitive data should only be reachable by those with a documented, role-specific need. Enforce strong authentication, encrypt data both at rest and in transit, and deploy layered technical defenses, including firewalls, intrusion detection, and data loss prevention tools, to reduce the attack surface. Classify data by sensitivity tier so that the most stringent controls are applied where the risk is greatest.

Governance and training

Technical controls alone are insufficient without the human and procedural layer to support them. Conduct regular audits to verify that processing activities involving sensitive data remain justified, documented, and proportionate. 

Ensure that all staff who handle sensitive data — not just security teams — receive ongoing training on what the category includes, why it matters, and what their specific obligations are. 

Best practice goes beyond legal minimums: organizations that treat sensitive data governance as a cultural commitment rather than a compliance checkbox are better positioned to maintain it under regulatory scrutiny.

Incident readiness

Assume that a breach is possible and prepare accordingly. Maintain documented response procedures that specify containment steps, notification obligations to regulators and affected data subjects, and a post-incident review process. 

Test these procedures periodically rather than leaving them dormant. When sensitive data is involved, the regulatory clock starts immediately. Having a practiced response in place is the difference between a managed incident and a costly one.

Comparing PII, Personal Data, and Sensitive Data

ConceptScopePrimary Legal FrameworkProtection Level
PIIInformation that identifies an individual, directly or indirectlyU.S. federal and sector law (NIST, HIPAA, etc.)Standard, with higher protection for sensitive PII
Personal data (PI)Any information relating to an identifiable natural personGDPR, CCPA/CPRA, U.S. state privacy lawsStandard, with additional protections for special categories
Sensitive data (SPI)A high-risk subset of personal data covering protected characteristics, health, biometrics, and similarGDPR (special categories), CCPA/CPRA, U.S. state lawsHighest: explicit consent typically required

The practical takeaway: these categories are not mutually exclusive. A piece of data can simultaneously be PII, personal data, and sensitive data. The applicable protections are determined by the most stringent classification that applies.

The Evolving Regulatory Landscape: What to Watch in 2026 and Beyond

Data privacy regulation continues to accelerate. 2025 saw continued regulatory activity at both U.S. state-level and internationally, with enforcement authorities placing increased emphasis on operational compliance rather than merely technical adherence to rules.

The regulatory focus on minors' data, automated decision-making, and data broker transparency has increased significantly, with several states enacting or amending laws specifically targeting these areas. 

For organizations that collect personal data from website visitors, this translates to more granular consent obligations, stricter controls on how data is shared with third parties, and growing scrutiny of the technologies used to collect behavioral and location data.

In the EU, the GDPR continues as the global standard, with targeted simplification proposals under the EU Digital Omnibus aiming to reduce administrative burdens on smaller businesses while leaving core protections intact. The EU-UK adequacy decision was renewed in December 2025, ensuring continued seamless data transfers until 2031.

For organizations seeking to stay ahead of these developments, the foundation remains the same: understand what data you collect, classify it accurately, obtain appropriate consent, and manage that consent in a way that can be demonstrated to regulators. 

Understanding the distinctions between PII, personal data, and sensitive data is not merely an academic exercise. Those distinctions determine what consent is required before data can be collected, what information must be disclosed in your privacy notice, how stringent your security precautions must be, and how you must respond if data is involved in a breach or a data subject request.

Cookiebot by Usercentrics provides a consent management platform designed to support these obligations, whether in a single state or across multiple jurisdictions simultaneously. It enables website owners to collect, record, and manage user consent across the martech stack in a way that supports ongoing compliance with the GDPR, CPRA, and a growing range of other privacy laws, as well as enabling you to demonstrate that compliance to regulators when required.

Cookiebot bg shield
Manage personal data collection, consent, and user preferences with Cookiebot

In 5 minutes you can customize your cookie banner for your brand and relevant regulations. Then start your 14-day free trial to see it in action.

This article is intended for informational purposes only and does not constitute legal advice. Privacy laws vary by jurisdiction and are subject to change. Organizations should seek independent legal counsel when assessing their specific compliance obligations.

Third-party cookies have long been the backbone of digital analytics and advertising — but their role is diminishing. Browser restrictions, tightening privacy regulations, and growing user awareness have all combined to push marketers toward cookieless alternatives.

Understanding your options is now a practical necessity. A reliable cookieless tracking solution helps you stay legally compliant, understand your audience, and make smarter data-driven decisions. Without compromising user privacy or violating the General Data Protection Regulation (GDPR), California Privacy Rights Act (CPRA), or the growing and evolving landscape of global privacy law.

This guide covers top cookieless tracking methods, compares 12 of the leading tools on the market, and outlines how to choose the right solution for your organization.

Key takeaways

Why Cookieless Tracking Matters in 2026

Third-party cookies were never a permanent foundation, and the web has been moving away from them for years. Safari has blocked third-party cookies by default since 2020. Firefox's Enhanced Tracking Protection restricts a wide range of tracking technologies. Google, despite stepping back from full cookie deprecation in Chrome, continues to develop privacy-preserving alternatives through its Privacy Sandbox initiative. 

Users are more privacy-aware than ever, and regulators across the EU, U.S., and beyond continue to tighten the rules around how personal data is collected online.

At the same time, privacy regulations including the GDPR and CPRA have raised the compliance bar for any form of user tracking, cookie-based or otherwise. Businesses that built their analytics and advertising infrastructure around third-party cookies are now reassessing how they collect data, what they actually need, and how to do it in a way that is both effective and lawful.

Cookieless tracking strategies are not simply a contingency plan for any one browser's policy decisions. They are a more durable approach to data collection. They reduce dependence on infrastructure you don’t control, better support privacy compliance operations, and help build user trust that translates into higher consent rates and better first-party data over time.

Top Cookieless Tracking Methods

Cookieless tracking, also sometimes called cookieless analytics, replaces traditional third-party cookies with alternative technologies and processes that enable compliance with privacy regulations while still delivering actionable insights. Each of the main approaches reduces or removes dependence on third-party cookies while still capturing the data you need to measure traffic, conversions, and user behavior.

Server-Side Tracking

Server-side tracking moves the data collection process from the user's browser to your own server. This limits data loss from ad blockers and browser-level restrictions, and gives you full control over what data you collect, on what basis, and how it is processed.

Data is processed on your infrastructure rather than in the user's browser, so server-side tracking is less affected by Intelligent Tracking Prevention (ITP), content blockers, and similar client-side restrictions. Importantly, it also means you — and not a third party — are the data controller from the point of collection.

Probabilistic Tracking

Probabilistic tracking infers user behavior using statistical patterns — device type, approximate location, browsing habits, and similar signals — to reconstruct sessions without relying on persistent identifiers. It is not perfectly accurate, but offers a reasonable trade-off between privacy and insight when deterministic identifiers like email addresses or login credentials are not available.

Browser Fingerprinting

Fingerprinting combines device and browser attributes — screen resolution, installed fonts, browser version, and more — to create a unique identifier that persists without cookies. It can operate without user consent in some interpretations, but this is increasingly contentious. 

Under GDPR and ePrivacy Directive requirements, fingerprinting is widely considered to require the same standard of consent as cookies, given its tracking function. Using it without proper disclosure and user consent carries regulatory risk.

Cookiebot by Usercentrics can detect fingerprinting and other non-cookie tracking technologies on your website, helping you understand your full data collection footprint.

First-Party Data Collection

First-party data is collected directly from your own website or app through login forms, user accounts, purchase histories, onsite surveys, or newsletter sign-ups. Because visitors have explicitly interacted with your brand to share this data, it is both highly reliable and inherently more privacy-friendly than third-party tracking.

Building a robust first-party data strategy is one of the most durable responses to a cookieless environment, as it does not depend on third-party infrastructure or browser policy decisions.

Privacy-Focused APIs and Browser APIs

Privacy-preserving APIs such as Google's Privacy Sandbox technologies were designed to enable advertising and measurement functions without exposing individual user data. Google formally retired the Privacy Sandbox initiative in October 2025, following its July 2024 decision not to deprecate third-party cookies in Chrome. A small set of features — including CHIPS, FedCM, and Private State Tokens — continues under Google's broader privacy and security work. These cover cookie partitioning, privacy-friendly sign-ins, and fraud prevention, but do not replace third-party cookies for audience targeting or attribution.

Cookieless tracking reduces reliance on third-party cookies, but it does not remove the need for consent management. Many cookieless methods, including server-side tracking and first-party data collection, still involve processing personal data, which requires a lawful basis under the GDPR. For most commercial analytics and marketing use cases, that lawful basis is consent.

A consent management platform (CMP) like Cookiebot by Usercentrics helps to ensure that:

Even if your analytics platform operates without third-party cookies, deploying it without compliant consent collection can still result in enforcement action. Cookieless does not mean consent-free.

Find out which privacy regulations apply to your website using theCookiebot Regulations Finder.

Top Picks for Cookieless Tracking Solutions

Here is a summary of how each of the 12 tools below compares on key features and pricing.

CompanyKey FeaturesPricing
Google Analytics 4Event-based model, AI-driven audiences, Google Ads and BigQuery integrationFree up to 10M events/month (data sampling applies in exploration reports above this threshold
Analytics 360 from USD 50,000/year
Simple AnalyticsAggregate-only metrics, <1 KB script, live visitor dashboardFree for up to 5 domains 
Paid plans from USD 15/month
Twipla100% cookieless traffic capture, heatmaps, session replays, custom segmentation30-day free trial
From USD 2.39/month
MatomoSelf-hosted or EU cloud, plugin ecosystem, IP anonymization, data retention controlsSelf-hosted free
Cloud from EUR 22/month
Fathom<4 KB cookie-free script, real-time pageviews and goals, bot filtering14-day free trial
From EUR 39/month
Ruler AnalyticsMulti-touch attribution, real-time revenue reporting, AI insightsNo trial
From GBP 179/month
PlausibleLightweight script, UTM tracking, GDPR/CCPA/PECR-ready, Docker-friendly30-day free trial
From EUR 9/month
Piwik PROAnalytics + tag + consent management suite, on-premises or cloudFree core
Enterprise from EUR 10,995/year
SealMetricsReal-time source aggregation, GDPR/CCPA automation, multi-domainFree tier
Paid plans up to EUR 199/month
RedTrackCross-channel ad and affiliate tracking, AI optimization, 200+ integrationsFree trial
Affiliate plans from EUR 1,490/month
SwetrixCookieless real-time analytics, IP anonymization, API access14-day free trial
From EUR 5/month
MetricsFlowAI-driven cross-device profiling, CRM integration, no browser storageCustom pricing on request

Google Analytics 4

Google Analytics 4 (GA4) is designed to function in a privacy-constrained environment. It reduces reliance on third-party cookies by combining first-party cookies, machine learning, and an event-based tracking model. This means GA4 can collect meaningful data even when cookies are limited or declined.

Predictive metrics, such as purchase probability and churn probability, enable marketers to identify high-value audiences without third-party tracking. Integration with BigQuery gives data teams direct access to raw event data for custom analysis.

The free tier applies data sampling once monthly event volume exceeds 10 million, which can affect reporting accuracy for high-traffic properties. GA4 does have a reputation for complexity. Configuring events, funnels, and custom dimensions often requires developer involvement. For Explorations and custom reports, data retention is capped at 14 months on the free tier. Standard aggregated reports are not subject to this limit, but detailed user-level analysis is restricted, which can affect long-term trend work.

GA4's relationship with GDPR compliance is nuanced. Because GA4 sends data to Google's servers — often including IP addresses and other personal data — using it without a properly configured CMP and Google Consent Mode integration can result in non-compliance issues. Cookiebot by Usercentrics is a Google-certified CMP partner and supports Google Consent Mode v2 signalling out of the box.

Key features: 

Pricing: 

ProsCons
Unmatched integration within the Google ecosystemSteep learning curve, particularly for non-technical users
Free and scalable for most organizationsHistorical data retention limited to 14 months
Cross-platform (web and app) tracking in a single propertyLimited integrations compared to some specialist analytics tools

Simple Analytics

For teams that want site traffic data without any personal data touching their servers, Simple Analytics is purpose-built for that constraint. It collects only aggregate metrics — pageviews and referrers — and its entire setup amounts to dropping in a single script tag. The dashboard loads in under 100ms and is deliberately minimal: fast answers, no configuration overhead.

That simplicity is also the ceiling. Because no personally identifiable information (PII) is collected, there are no user paths, cohorts, or advanced filters. Integrations are limited to Slack and Webhooks, so connecting to BI tools requires middleware or custom development.

Key features: 

Pricing: 

ProsCons
Guaranteed privacy compliance as no personal data is collectedLimited integrations beyond Slack and Webhooks
Clear, intuitive dashboard designed for quick insightsMay be too minimal for advanced analytics requirements
Minimal performance impactUnique visitor counts are less detailed

Twipla

Where most cookieless analytics tools trade depth for privacy, Twipla tries to offer both. It is a strong fit for publishers and media companies that need behavior analytics — heatmaps, scroll-depth tracking, session replays, conversion funnels — without relying on cookies or compromising on traffic visibility.

Its API supports custom event tracking and integration with external systems, though native CRM data import and ad metric connectivity are not included. Implementation typically involves mapping existing data layers and configuring custom events, a process that can run from a few days to several weeks depending on complexity.

Key features: 

Pricing: 

ProsCons
Captures all visitor data without consent requirements on the analytics layerLacks native Looker Studio integration or advanced attribution modelling
Combines multiple analytics and feedback tools in one platformMay require technical setup for custom event configurations
Flexible privacy modes adapt to different regulatory requirements

Matomo

Matomo (formerly Piwik) is an open-source analytics platform available as a self-hosted installation or as a cloud-hosted service with EU-based servers. 

For organizations that prioritize data sovereignty, such as EU-based businesses, public sector bodies, or healthcare providers, self-hosting enables full control over server location and data processing. The cloud option offers EU-based hosting for those who prefer a managed deployment.

Matomo supports additional functionality through a plugin marketplace, including heatmaps, session recordings, and A/B testing. Self-hosted users are responsible for server maintenance, PHP updates, and database management, which may require dedicated technical resources.

Key features: 

Pricing: 

ProsCons
No cookie consent banners required for the analytics layerRequires technical knowledge for setup and ongoing configuration
Highly customizable to specific business requirements
Complete data ownership

Fathom

Small teams and solo operators who need accurate, compliant traffic data without managing a complex analytics stack will find Fathom a practical fit. A single JavaScript snippet under 4 KB is all that is required — it anonymizes IP addresses by default, filters out bots automatically, and has dashboards that update in real time.

Compliance coverage spans the GDPR, CCPA, PECR, and LGPD. The trade-off is analytical depth: there is no built-in A/B testing or cohort analysis, and direct integrations are limited to Zapier and Segment.

Key features: 

Supports GDPR, CCPA, PECR, and LGPD compliance

Pricing: 

ProsCons
Lightweight, cookie-free script with minimal performance impactLacks advanced audience segmentation and multi-step funnel reporting
Automatically filters bot traffic for more accurate dataLimited direct integrations restrict marketing automation options
Real-time metrics with forever data retention for paying subscribersBasic data visualization and dashboard customization
Cookiebot bg shield
Growth brings legal complexities. Know what regulations apply to you.

Answer three quick questions and find out which privacy regulations and frameworks apply to your website. Fast, free, no sign-up required.

Ruler Analytics

Ruler Analytics is a marketing attribution platform that integrates deterministic tracking, probabilistic modelling, and marketing mix modelling (MMM) to deliver granular insight into how each channel contributes to conversions. 

Machine learning underpins the probabilistic attribution layer, helping organizations with complex, multi-touch customer journeys assign credit accurately across touchpoints.

The platform is particularly suited to companies with intricate marketing ecosystems, including agencies, B2B businesses, and organizations running campaigns across paid, organic, and offline channels simultaneously. 

Setup may require expertise in CRM integration and Google Tag Manager configuration.

Key features: 

Pricing: 

ProsCons
Connects offline and online conversions in a unified viewNo free trial
Detailed, actionable marketing ROI insightsPricing may be prohibitive for smaller businesses
AI surfaces hidden trends and optimizes campaign allocationSetup requires CRM and Google Tag Manager knowledge

Plausible

Plausible appeals most to developers, content publishers, and privacy-conscious SMBs that want straightforward traffic reporting without cookie banners or data governance complexity. Its open-source core integrates cleanly with static-site generators, and self-hosting via Docker is well documented. Paying subscribers on the cloud service get unlimited data retention with no default 12-month cap.

The absence of user profiling is a deliberate design decision, which makes Plausible a poor fit for personalization use cases but a natural choice for teams that prioritize compliance-first reporting over analytical depth.

Key features: 

Pricing: 

ProsCons
No cookie banners required for the analytics layerNo event-based or custom property tracking
Transparent, actively maintained open-source developmentLimited segmentation compared to enterprise-grade platforms
Clean, modern interface for rapid insights

Piwik PRO

Piwik PRO is an enterprise analytics suite that combines analytics, tag management, consent management, and a customer data platform in a single offering. In cookieless mode, it uses browser storage APIs and server-side processing to capture events. Client benefits include SLAs, dedicated support, and on-premises deployment options.

The platform includes customizable dashboards, funnel reports, user flow visualizations, and advanced event tracking. Its built-in consent management module is a notable differentiator for organizations looking to consolidate their analytics and compliance infrastructure.

Key features: 

Pricing: 

ProsCons
Highly customizable for complex enterprise requirementsAdvanced features carry a learning curve for new users
Full data ownership with strong privacy controlsSome free-tier features expire after six months
Dedicated onboarding and responsive customer supportSome integrations require technical expertise to configure

SealMetrics

SealMetrics is a privacy-first web analytics platform designed for businesses that need accurate, cookieless tracking alongside automated compliance with regulations like the GDPR and CPRA. 

By capturing first-party data directly at the server level, it eliminates reliance on third-party cookies and browser scripts and is therefore less affected by the increasingly strict tracking restrictions in Safari, Firefox, and similar browsers.

The platform is particularly strong on real-time, source-aggregated reporting, allowing marketers to understand user journeys, optimize conversions, and map custom sales funnels with relative ease.

Key features: 

Pricing: 

ProsCons
Data ownership remains with your organizationLacks some advanced segmentation found in enterprise analytics suites
Fast setup with minimal code requiredLimited integrations with niche third-party tools
Free plan supports unlimited traffic, useful for small businessesFewer built-in visualization options than some competitors

RedTrack

RedTrack is a tracking and analytics platform built for performance marketers, affiliates, and agencies. It consolidates data from paid, affiliate, and influencer campaigns into a single dashboard spanning more than 200 advertising channels. 

Server-side and cookieless tracking underpin the attribution engine, enabling accurate measurement while supporting compliance with evolving browser restrictions and privacy regulations.

RedTrack also offers collaboration features, including permission controls and branded partner portals for affiliate programme management. Its AI-powered automation tools are designed to surface optimization opportunities and reduce manual campaign management overhead.

Key features: 

Pricing: 

ProsCons
Unifies campaign tracking across paid, affiliate, and influencer channelsAdvanced features carry a learning curve for non-technical users
Powerful automation and AI-driven optimizationHigher-tier pricing required for large teams or high event volumes
Seamless integration with ecommerce and CRM platforms

Swetrix

Swetrix is a fully cookieless analytics platform that uses first-party data and server-side processing. Its live dashboard shows real-time visitor counts and goal completions without compromising user privacy. Automatic IP anonymization is built in as a default, meaning no cookie consent banner is required for the analytics layer itself.

While Swetrix supports basic funnels and cohort analysis, its feature set and integration options are more limited than enterprise-grade alternatives. It’s best suited to developers, SMBs, and privacy-conscious teams that prioritize simplicity and compliance over analytical depth.

Key features: 

Pricing: 

ProsCons
Fast data processing with near real-time insightsLimited native integrations beyond Google Tag Manager
Fully cookieless and privacy-first, supporting GDPR complianceAdvanced features such as funnels and cohort analysis are basic
Lightweight tracking script with minimal performance impact

MetricsFlow

MetricsFlow is a cookieless analytics and attribution platform targeted at enterprise marketing teams. It uses proprietary AI to collect more than 40 data points per visitor and builds unique cross-device, cross-platform identities without cookies or any client-side storage. 

The platform integrates with tools like Salesforce CRM and does not require traditional ETL connector setup or direct data warehouse credentials as part of its core workflow.

For organizations operating at scale and requiring robust, consent-friendly visitor attribution across complex digital environments, MetricsFlow offers an enterprise-grade option. However, the absence of transparent pricing information may be a barrier to evaluation.

Key features: 

Pricing: 

ProsCons
Enterprise-grade data reliability and privacy compliancePricing isn’t publicly disclosed
Seamless integration with CRM and marketing platformsPositioning largely limited to marketing and analytics teams
Captures complete visitor data without loss or duplication

How to Implement Cookieless Tracking

Before adopting a cookieless solution, it is worth taking stock of your existing data collection setup. A clear understanding of your current technology stack and consent infrastructure will help you align implementation with both your operational needs and your privacy compliance obligations.

A general implementation approach proceeds as follows:

Audit your existing analytics setup by mapping all tags, cookies, and third-party scripts. A tool like theCookiebot’s free website scanner can surface trackers you may not be aware of.

Review your current consent banner configuration and data retention policies. Identify any gaps between what you collect, what you disclose, and what consent you have obtained.

Select an appropriate tracking method, such as server-side tagging, first-party data collection, a privacy-preserving API, or a combination.

Deploy and configure the required scripts or server-side endpoints. Define custom events (form submissions, video plays, purchases, etc.) appropriate to your measurement goals.

Validate and reconcile your data. Run test scenarios and compare results against your legacy analytics to identify discrepancies. Check pageview, goal, and conversion counts for consistency and adjust as needed.

Monitor and optimize on an ongoing basis. Set up alerts for anomalies in key metrics, review consent rates regularly, and revisit your configuration as your website or regulatory environment evolves.

How to Choose the Right Cookieless Tracking Solution

Choosing a cookieless tracking platform requires aligning your organization's specific requirements with the strengths of each available tool. Start from your own needs rather than from vendor reputation.

Assess Technical Fit

Assess your development and infrastructure capacity honestly. Some solutions require only a script tag and minimal configuration; others demand server-side implementation, custom data layer mapping, or dedicated engineering resource. Choosing a tool that exceeds your implementation capacity will create delays and ongoing maintenance overhead.

Outline Your Compliance Needs

Identify which privacy regulations apply to your website and audience. The GDPR applies to any organization processing personal data of individuals in the EU, regardless of where the organization is based. California's CCPA and CPRA, the UK GDPR, Brazil's LGPD, and PIPEDA in Canada, among others, each carry their own requirements.

Use the Cookiebot Regulations Finder to identify which laws are relevant to your operations and growth, then verify that your chosen analytics platform supports the anonymization standards, data residency requirements, and consent and notification mechanisms those laws demand.

Clarify Integration Requirements

List the tools and platforms you rely on, including advertising networks, CRMs, data warehouses, tag managers, and confirm that your preferred analytics solution can connect to them through native integrations, APIs, or ETL pipelines.

Define Your Budget Parameters

Decide whether a flat-rate or usage-based pricing model is more predictable for your organization. Forecast costs based on expected event volumes or monthly pageviews, and factor in implementation costs, not just subscription fees.

Know Your Reporting Goals

Consider the level of analysis you require. Real-time dashboards and basic goal tracking serve very different needs from funnel analysis, cohort reporting, multi-touch attribution, or session replay. Prioritize platforms that natively support the reporting capabilities your team actually uses. Advanced features that go unused represent investment without return.

It is worth reiterating that moving to a cookieless tracking approach does not, in itself, resolve your compliance obligations. Many cookieless methods still process personal data — or can do so depending on how they are configured. Under the GDPR and some other laws, processing personal data requires a lawful basis. For analytics and marketing purposes, that basis is almost always prior user consent.

A consent management platform handles the mechanics of compliant consent collection: presenting users with a clear, accessible banner; recording consent choices; enabling users to withdraw consent at any time; and generating the audit documentation that regulators may request in the event of an investigation. Cookiebot by Usercentrics is trusted on millions of websites worldwide, a certified Google CMP partner with Consent Mode v2 integration, and it supports ongoing compliance with global regulations and frameworks throughout your marketing ecosystem.

Cookiebot bg shield
See exactly how your cookie banner looks — before you go live.

Build and preview your customized cookie banner in minutes. Fully branded, user-friendly, and aligned with relevant regulations — no coding required.

The Gramm-Leach-Bliley Act (GLBA), enacted in 1999, sets standards for protecting consumer data in the United States financial industry. Amid growing concerns about how institutions collect, use, and share sensitive personal information, the Act was passed as part of sweeping reforms to modernize the financial services sector.

The GLBA was among the first U.S. data privacy laws to impose specific data privacy and security requirements on businesses. Its aim is to give consumers more control over their personal information while requiring institutions to adopt robust data protection measures.

Although the GLBA predates the current wave of state-level privacy laws and federal privacy legislation, its requirements continue to shape how financial institutions approach consumer data protection. Its principles have influenced many subsequent regulations and remain central to compliance efforts in the financial industry.

State-level U.S. data privacy laws passed to date usually reference the GLBA explicitly, recognizing that the federal Act is both robust in its protections and assigned responsibilities, and takes precedence over state rules where the two overlap.

What Is the Gramm-Leach-Bliley Act (GLBA)?

The Gramm-Leach-Bliley Act is a U.S. federal law that addresses data security and privacy practices in the U.S. financial industry. It mandates that businesses handling individual financial information, including banks, insurers, loan providers, and a wide range of other entities, protect that data, inform customers of their privacy practices, and limit data sharing.

Summary of the GLBA

The GLBA was created to address concerns about data security and privacy within the financial sector. Its overarching aim is to protect consumers' financial information and prevent personal data breaches by requiring organizations to follow responsible practices when handling data.

Any business "significantly engaged" in financial activities that handles consumer financial data must follow the rules set out by the GLBA. This definition includes traditional financial institutions — banks, credit unions, insurance companies — as well as businesses not usually recognized in that category, such as loan brokers, debt collectors, mortgage lenders, financial advisors, and tax preparers.

The GLBA requires these institutions to adhere to three rules aimed at maintaining transparency and accountability while mitigating risks associated with data misuse:

GLBA Definitions

The following key concepts within the GLBA help clarify how the Act may apply to your business.

Financial Institution

A financial institution under the GLBA is any institution whose business involves activities that are financial in nature or incidental to financial activities. In practice, this means any company offering financial products or services to individuals. 

This includes loans, financial or investment advice, or insurance, so applies to banks, securities brokers and dealers, insurance underwriters and agents, finance companies, mortgage bankers, and travel agents.

Financial Service

A financial service under the GLBA includes a financial institution's evaluation or brokerage of information collected in connection with a consumer's request for a financial product or service. 

Activities covered include lending, exchanging, or transferring money; investing for others; safeguarding money or securities; providing financial or investment advice; and insurance underwriting. Services such as issuing credit cards, managing investment portfolios, and facilitating payment processing are all considered financial services under the Act.

Consumer and Customer

Under the GLBA, all customers are consumers, but not all consumers are customers. A consumer is an individual who obtains financial products or services from a financial institution; a customer is someone with an ongoing relationship with that institution.

For instance, a mortgage borrower is a customer because the loan requires an ongoing relationship. Someone using an ATM to withdraw cash is merely a consumer. This distinction matters because customers typically have more privacy rights under the GLBA than consumers do.

Nonpublic Personal Information (NPI)

Nonpublic personal information refers to personal details of consumers, typically personally identifiable information obtained as a result of transactions or services performed for the consumer. 

NPI can include data a consumer provides to obtain a financial product or service, information resulting from a transaction between the consumer and the institution, or information the institution otherwise obtains in connection with providing a financial product or service.

Social Security numbers, account balances, payment histories, and information derived from consumer reports all fall into this category. Information that is publicly and lawfully available, such as data from public records, is not considered NPI.

NPI is, in essence, a category of personally identifiable information (PII) specific to the financial context and carries correspondingly stringent handling requirements.

Nonaffiliated Third Party

A nonaffiliated third party is any entity that is not an affiliate of the financial institution. The GLBA defines an affiliate as any company that controls, is controlled by, or is under common control with the institution. 

Nonaffiliated third parties are external companies or individuals with whom a financial institution may share consumers' NPI, provided consumers are given proper notice and a meaningful opportunity to opt out.

Opt-Out Rights and Exceptions

The GLBA gives consumers the right to opt out of allowing financial institutions to share their NPI with nonaffiliated third parties. Institutions must provide a clear notice and a reasonable means to decline before any such sharing takes place.

Opt-out rights do not apply in every circumstance, however. Exceptions exist where NPI is shared with service providers performing essential tasks on behalf of the institution, where the institution is legally compelled to disclose the information, or where sharing forms part of a transaction the consumer themselves requested.

Who Must Comply With the GLBA?

The GLBA's scope extends well beyond traditional banks. The following types of organizations are among those most commonly required to comply:

Higher education institutions processing Title IV federal student financial aid are also subject to GLBA compliance obligations.

The extent of protection afforded to an individual depends on the nature of their relationship with the institution, whether they are a customer with an ongoing relationship or a consumer engaging in a one-time transaction.

GLBA Exceptions

The GLBA sets out three categories of exception, found in Sections 13, 14, and 15 of the Act, under which financial institutions are not required to provide a privacy notice or offer an opt-out before sharing NPI with nonaffiliated third parties.

Section 13 covers sharing necessary for a third party to perform services on behalf of the institution — including joint marketing arrangements — provided the institution has given an initial notice of these arrangements and the third party is bound by a confidentiality agreement limiting their use of the information to the specified purpose.

Section 14 covers sharing that is necessary to carry out, administer, or enforce a transaction that the consumer themselves requested or authorized, as well as certain disclosures arising from existing customer relationships.

Section 15 covers a range of other disclosures that financial institutions routinely make in the ordinary course of business — including reporting to regulators, complying with legal obligations, and sharing information for fraud prevention purposes.

GLBA Consumer Rights

Under the GLBA, consumers and customers have the following key rights:

What Are the GLBA Compliance Obligations for Financial Institutions?

GLBA compliance requires financial institutions to meet obligations under each of its three rules.

Financial Privacy Rule Obligations

Safeguards Rule Obligations

The Safeguards Rule, as updated in 2021 and 2023, requires covered institutions to develop, implement, and maintain a comprehensive information security program that includes the following elements:

  1. Designate a qualified individual to oversee, implement, and enforce the information security program.
  2. Conduct written risk assessments to identify foreseeable internal and external threats to the security, confidentiality, and integrity of customer information.
  3. Design and implement safeguards to control identified risks, including access controls, encryption of customer information in transit and at rest, multi-factor authentication, and activity monitoring.
  4. Regularly test or monitor the effectiveness of safeguards — at minimum through annual penetration testing and semi-annual vulnerability assessments, or equivalent continuous monitoring.
  5. Train staff to implement the information security program.
  6. Oversee service providers through written contracts requiring appropriate safeguards.
  7. Maintain an incident response plan for security events.
  8. Report to the board (or equivalent senior oversight body) on the information security program at least annually.
  9. Notify the FTC of any qualifying breach involving 500 or more customers within 30 days of discovery.

Institutions with fewer than 5,000 consumer records are exempt from some of these requirements.

Pretexting Rule Obligations

Financial institutions must implement procedures to verify the identity of anyone seeking access to customer information, train staff to recognize pretexting attempts, and establish controls that prevent unauthorized access through social engineering or false pretenses.

Cookiebot bg shield

Federal, state, and industry rules. Which ones apply to you?

Financial businesses often fall under multiple overlapping regulations. Find out exactly which ones apply to you. No signup requried, takes less than 2 minutes.

GLBA Enforcement 

Enforcement of the GLBA is shared between federal and state agencies, and the responsible authority depends on the type of institution:

Penalties for GLBA Non-Compliance

Beyond legal consequences, non-compliance can result in significant reputational damage, loss of customer trust, and increased regulatory scrutiny — lasting effects that can materially affect an institution's operations. 

Notable FTC enforcement actions under the GLBA include a USD 4.7 billion suspended judgment against crypto platform Celsius Network in 2023. This was the first time the FTC had brought suit against a digital asset company. 

There was also a 2018 consent decree against PayPal over Venmo's privacy and security practices, and more recent cases targeting student loan debt relief schemes, rental property manager Greystar (2025), and merchant cash advance operators.

GLBA and State Privacy Laws

The GLBA operates as the federal baseline for financial privacy. State-level consumer privacy laws passed to date, including the California Consumer Privacy Act (CCPA) and its amendment, the California Privacy Rights Act (CPRA), generally recognize the GLBA's authority and carve out GLBA-covered data from their own requirements. However, state laws may impose additional obligations in some circumstances, and institutions must track both federal and state developments carefully.

GLBA Updates

On May 13, 2024, an amendment to the Federal Trade Commission (FTC) Standards for Safeguarding Consumer Information (the "Safeguards Rule") came into effect. This update introduced more stringent requirements for security practices and breach notifications.

Before the amendment, the GLBA required financial institutions simply to develop and maintain a comprehensive security program with administrative, technical, and physical safeguards appropriate to the entity's size and complexity. The updated rule is considerably more prescriptive, outlining nine elements that a business's information security program must include.

Most significantly, the amendment introduced a notification requirement. Financial institutions must now notify the FTC of any security event involving unauthorized access to customer information where 500 or more individuals are affected. 

This threshold is notably low, bringing the GLBA closer to the notification standards of international frameworks such as the EU’s GDPR. Notifications must be sent as soon as possible and no later than 30 days after discovery.

In 2025, the FTC also released Frequently Asked Questions specifically addressing how the Safeguards Rule applies to motor vehicle dealers. 

Separately, the Consumer Financial Protection Bureau (CFPB) issued a Request for Information in January 2025 seeking public input on whether and how to modernize the GLBA's Privacy Rule, including possible improvements to opt-out rights and guidance on fintech and data broker coverage.

GLBA: What's on the Horizon

The regulatory landscape around the GLBA is in active flux. At the federal level, both the FTC and the CFPB have been revisiting key rules, while Congress has been considering more sweeping reforms to the Act's foundational privacy framework.

House Financial Services Committee Discussion Draft

A discussion draft circulated by Representative Bill Huizenga (R-MI) in connection with the House Financial Services Committee hearing of March 17, 2026, titled "Updating America's Financial Privacy Framework for the 21st Century," would, if enacted, significantly modernize Title V of the GLBA.

Key proposals in the draft include:

The draft is at an early stage. However, it signals that significant reform of the federal financial privacy framework is firmly on the legislative agenda.

How to Achieve GLBA Compliance: Key Steps

Achieving GLBA compliance requires a structured, ongoing approach rather than a one-time exercise. The following steps provide a practical foundation:

1. Determine Whether the GLBA Applies to Your Organization

Confirm whether your organization qualifies as a "financial institution" under the GLBA's broad definition. This includes non-traditional entities such as colleges processing Title IV student financial aid, auto dealers arranging consumer financing, and tax preparation firms. 

The key test is whether your business is "significantly engaged" in financial activities — a threshold that turns on both the existence of a formal arrangement and the regularity with which the activity is conducted. If you are unsure, the FTC's plain-language guidance on the Safeguards Rule is a useful starting point, and legal counsel familiar with the GLBA can help assess whether your specific activities bring you within scope.

2. Appoint a Qualified Individual

Designate a senior person responsible for overseeing, implementing, and enforcing your information security program. This does not need to be a dedicated role. A qualified employee, affiliate, or service provider can serve in this capacity, but the individual must report to the board or equivalent senior oversight body on the status of the program at least annually.

3. Conduct a Written Risk Assessment

Identify and document the types of customer information you hold, the internal and external risks to that information, and the adequacy of existing safeguards. The assessment must be written and should include criteria for evaluating and categorizing identified risks, an assessment of the confidentiality and integrity of your information systems, and a description of how identified risks will be mitigated or accepted. 

Risk assessments are not a one-time exercise. The Safeguards Rule requires them to be repeated periodically, and whenever significant changes to your operations or environment occur.

4. Develop and Implement an Information Security Program

Address the nine elements required by the updated Safeguards Rule, including access controls, encryption, multi-factor authentication, activity monitoring, and an incident response plan. 

The program must be written and tailored to the size, complexity, and sensitivity of your operations. A large bank and a small tax preparation firm will have very different programs, and the rule accommodates that. 

Institutions with fewer than 5,000 consumer records are exempt from certain elements, including the penetration testing and vulnerability assessment requirements and the obligation to report annually to the board.

5. Prepare and Deliver Privacy Notices 

Draft clear, conspicuous privacy notices that accurately reflect your data collection, sharing, and protection practices. Deliver initial notices at account opening and annual notices thereafter (unless an exception applies). 

Notices must be written in plain language and designed to call attention to their significance. Burying key disclosures in fine print or low-contrast text, as the FTC's action against PayPal/Venmo illustrated, will not satisfy the requirement. A model privacy form is available from the CFPB and provides a safe harbor for institutions that use it correctly.

6. Establish and Honor Opt-out Mechanisms

Provide consumers with a straightforward means of opting out of NPI sharing with nonaffiliated third parties — typically a toll-free number, web form, or mail-in form — and process such requests within a reasonable timeframe. 

Opt-out rights must be offered before any sharing takes place, and consumers must be given a reasonable period — generally 30 days — to respond. Once a consumer opts out, that preference must be honored indefinitely unless the consumer affirmatively revokes it.

7. Implement Vendor Oversight Controls

Require service providers with access to customer information to maintain appropriate safeguards, and incorporate these obligations into contractual agreements. 

The Safeguards Rule makes clear that GLBA compliance obligations cannot be delegated to third parties. You remain responsible for the security of customer information even when it is held or processed by a vendor. This means conducting due diligence during vendor selection and periodically reassessing providers based on the risk they present.

8. Train Staff

Ensure employees understand the requirements of the GLBA, can recognize pretexting attempts, and know how to handle customer information appropriately. Training should be provided at onboarding and refreshed regularly as threats and regulatory requirements evolve. 

The FTC has signaled through enforcement actions that inadequate staff training and weak internal controls are common contributors to the compliance failures it investigates.

9. Test and Monitor Your Safeguards

Conduct annual penetration testing and semi-annual vulnerability assessments, or implement continuous monitoring that achieves comparable outcomes. Testing should be scoped based on the risks identified in your written risk assessment, with higher-risk systems prioritized. 

Results must feed back into your security program. Identifying a vulnerability and failing to remediate it offers no protection, and could itself become evidence of non-compliance in an enforcement action.

10. Plan for Breach Notification

Ensure that you have processes in place to detect, assess, and report qualifying security events to the FTC within 30 days of discovery, and to notify affected customers promptly. A qualifying event is the unauthorized acquisition of unencrypted customer information affecting 500 or more individuals. 

Notifications must be submitted electronically via the FTC's online reporting form, and your incident response plan should designate who is responsible for making that determination and filing the report under time pressure.

11. Review and Update Regularly

The GLBA compliance landscape continues to evolve. Monitor FTC guidance, CFPB rulemaking, and state-level developments, and revise your program accordingly. 

The proposed amendments to Title V currently before Congress, which include data minimization obligations, expanded privacy notices, and new consumer access and deletion rights, signal that the compliance requirements for financial institutions are likely to become more demanding in the coming years, not less.

The GLBA requires financial institutions to provide clear privacy notices and to manage consumer opt-out preferences accurately and reliably. For organizations operating digital channels — websites, web applications, or mobile platforms — a consent management platform (CMP) can help automate and centralize much of this work.

A consent management platform (CMP) enables institutions to present compliant privacy notices, capture and store opt-out preferences, and maintain records of consumer consent decisions. This is particularly valuable given the GLBA's requirement that privacy notices be clear and conspicuous, and that opt-out mechanisms be straightforward to use.

Cookiebot by Usercentrics helps financial institutions and other covered entities manage consent in line with GLBA requirements, ensuring that privacy notices are delivered reliably and that consumer choices are honored consistently across digital touchpoints.

Cookiebot bg shield

One compliance gap can cost you.

Financial websites face strict scrutiny, and manual compliance doesn't scale. Know what your website collects. Try the interactive demo and start your free 14-day trial.

How long can you keep personal data under the General Data Protection Regulation (GDPR)? The short answer is that you can only retain it for as long as it is necessary for the purpose you collected it. This principle is intentionally flexible, which means organizations must take responsibility for defining and justifying their own retention periods.

GDPR does not prescribe universal timelines for most types of personal data. Instead, it requires organizations to evaluate context, legal basis, and business needs when deciding how long to store information. This approach allows for flexibility, but it also places a greater burden on organizations to document and defend their decisions.

Understanding data retention is not just about regulatory compliance. It also plays a central role in building trust with your customers and reducing operational risk. Poor retention practices can increase exposure to breaches and regulatory scrutiny, while strong practices support transparency and a more user-centric approach to data.

Key takeaways

What Is Data Retention Under GDPR?

Data retention refers to how long you store personal data after collecting it and how you manage it throughout its lifecycle. Under GDPR, this practice is governed by the storage limitation principle, which is outlined in Article 5(1)(e). This principle requires organizations to take a deliberate and structured approach to storing and deleting data.

Rather than treating retention as a final step, GDPR expects you to consider it from the moment data is collected. This includes defining retention periods in advance and aligning them with clearly stated processing purposes. It also requires that you actively monitor whether stored data is still necessary.

In practical terms, data retention is about control and accountability. You must be able to explain why you hold data, how long you will keep it, and what happens when that period ends. This creates a consistent framework for managing personal data responsibly.

The Storage Limitation Principle Explained

The storage limitation principle requires that personal data is only kept for as long as it serves its original purpose. Once that purpose is fulfilled, the data must either be deleted or anonymized in a way that prevents identification of individuals. This principle protects individuals from indefinite or unnecessary data storage.

It is important to distinguish between anonymization and pseudonymization. Anonymized data is no longer considered personal data under GDPR, while pseudonymized data still falls within its scope. This distinction affects how retention rules are applied.

The principle also works closely with purpose limitation. If you want to reuse data for a different purpose, you must establish a new legal basis. This reinforces the need for careful planning at the point of data collection.

Why Retention Matters For Privacy Compliance

Data retention is closely tied to several core GDPR principles, including accountability and data minimization. Organizations must be able to demonstrate how they determine retention periods and how they apply them in practice. This documentation is essential when responding to regulatory inquiries.

Excessive data retention increases risk across multiple areas. The more data you store, the greater your exposure in the event of a breach. Reducing unnecessary data helps limit both security risks and potential liability.

Retention practices also affect how you handle user rights, such as the right to erasure. When retention policies are clearly defined and implemented, responding to these requests becomes more efficient and consistent. This contributes to a better overall user experience.

How Long Can You Keep Personal Data Under GDPR?

GDPR does not define fixed retention periods for most types of personal data. Instead, it requires organizations to determine appropriate timeframes based on the specific context of processing. This flexibility allows businesses to tailor retention practices to their operations, but it also requires careful judgment.

Several factors influence retention decisions, including processing purpose, legal basis, and regulatory obligations. Each data category should be assessed individually rather than applying a single blanket policy. This ensures that retention aligns with actual business and legal needs.

In addition, sector-specific regulations may impose minimum or maximum retention periods. These requirements can override general GDPR principles and must be taken into account. Organizations should regularly review applicable laws to remain aligned with evolving requirements.

Determining Necessary Retention Periods

The first step in determining retention periods is to identify why the data was collected. This purpose should be clearly documented in your privacy notices and internal records. If the purpose no longer applies, the data should not be retained.

You should also consider legal obligations and legitimate business needs. For example, retaining data for tax compliance or dispute resolution may be necessary. However, convenience alone is not sufficient justification for extended retention.

Finally, create a structured retention schedule that defines timeframes for each data category. This schedule should be reviewed regularly and updated when business processes or regulations change. Consistency and documentation are key to demonstrating compliance.

Common Retention Period Examples

While retention periods vary by context, there are some commonly accepted benchmarks across industries. These examples provide guidance but should always be adapted to your specific legal and operational environment.

Where possible, consider anonymizing data instead of deleting it entirely. This allows you to retain analytical value without maintaining personally identifiable information.

Your legal basis for processing personal data directly affects how long you can retain it. GDPR outlines six lawful bases under Article 6, and each one has different implications for retention. Choosing the correct basis is essential for both compliance and operational clarity.

You must assign a legal basis to each processing activity and document it clearly. This decision should be made at the time of data collection and should not be changed arbitrarily later. Consistency in this area supports accountability and transparency.

Retention periods should align with the chosen legal basis. For example, data processed based on consent must be deleted when consent is withdrawn. Understanding these relationships helps you avoid unnecessary risk.

Consent requires a clear and informed agreement from the individual. It must be freely given and easy to withdraw at any time. This makes consent one of the most restrictive legal bases in terms of retention.

When consent is withdrawn, you must stop processing the data and typically delete it. The only exception is when another legal basis applies. This requires careful tracking of consent status.

Consent is most appropriate for optional activities, such as marketing communications. It is less suitable for core service functions where data processing is necessary.

Contract

Contractual necessity allows you to process data required to fulfill an agreement. This includes activities such as processing orders or delivering services. Retention is allowed for as long as the contract remains active.

After the contract ends, data may still be retained for related obligations, such as handling returns or disputes. However, this retention must be limited and justified. Data should not be stored indefinitely.

This legal basis should not be used for unrelated activities. For example, marketing communications require a separate legal basis.

Legal obligations may require you to retain certain types of data for defined periods. These obligations often come from tax laws, employment regulations, or financial compliance requirements. They take precedence over general GDPR principles.

You must clearly document which laws apply and how they influence your retention periods. This provides a strong justification for extended retention where necessary. However, it should not be used as a catch-all justification.

Once the legal requirement expires, the data must be deleted. Continued retention beyond this point would violate GDPR principles.

Legitimate Interests

Legitimate interests allow data processing when your interests are not overridden by individual rights. This requires a balancing test that evaluates necessity and potential impact. The outcome must be documented.

Retention under this basis should be proportionate and regularly reviewed. Over time, the justification for retaining data may weaken. This means retention periods should not be indefinite.

Common use cases include fraud prevention and service improvement. However, each case must be assessed individually to remain compliant.

Cookiebot bg shield

How Do You Create A GDPR-Compliant Data Retention Policy?

A data retention policy provides a structured approach to managing personal data across your organization. It defines what data you collect, how long you keep it, and how you dispose of it. This clarity supports both compliance and operational efficiency.

The policy should be accessible, regularly updated, and integrated into employee training. It should also reflect both GDPR requirements and any applicable industry regulations. Consistency across teams is essential.

A well-designed policy reduces ambiguity and helps your organization respond more effectively to audits and user requests. It also reinforces a culture of responsible data handling.

Step One: Map All Personal Data

Start by creating a comprehensive inventory of all personal data you process. This includes identifying data types, sources, storage locations, and access permissions. You should also include backups and third-party systems.

This mapping exercise often reveals gaps or redundancies in data collection. Addressing these issues early can simplify retention management. It also helps you align with GDPR documentation requirements.

Group data into categories based on processing purpose. Each category should have a clearly defined objective and corresponding legal basis. Avoid vague or overly broad categories.

This step creates the foundation for setting retention periods. It also helps maintain consistency across your organization. Clear categorization improves both compliance and operational clarity.

Step Three: Set Retention Periods

Define the minimum retention period required for each category. Consider legal requirements, business needs, and user rights. The goal is to retain data only for as long as necessary.

Be explicit about when retention begins and ends. This clarity supports both implementation and auditing. Regular reviews help keep retention periods aligned with current needs.

Step Four: Document Deletion Procedures

Define how and when data will be deleted. This includes specifying technical methods and responsibilities. Deletion should extend to backups and archived systems where possible.

Automation can help maintain consistency and reduce human error. However, manual oversight may still be necessary for complex cases. Clear procedures reduce the risk of non-compliance.

Step Five: Train Your Team

Employees play a critical role in implementing retention policies. Training should be practical, role-specific, and regularly updated. This helps translate policy into action.

Ongoing education reinforces best practices and keeps teams aligned with regulatory changes. It also supports a culture of accountability. Well-trained teams are essential for effective compliance.

What Happens If You Don’t Comply?

Failure to comply with GDPR data retention requirements can result in significant consequences. Financial penalties can reach EUR 20 million or 4 percent of global annual turnover, depending on the severity of the violation. These penalties reflect the importance of data protection principles.

Regulators also consider factors such as intent, duration, and cooperation. Organizations that demonstrate accountability and corrective action may face reduced penalties. However, repeated or intentional violations are treated more severely.

Beyond fines, non-compliance can damage your reputation and erode customer trust. Research shows that transparency is a key driver of trust for nearly half of consumers, highlighting the business impact of poor data practices.

How Do You Audit Data Retention Practices?

Auditing your data retention practices helps you verify that your policies are working in practice. It provides visibility into how data is stored, used, and deleted across your organization. Regular audits also help identify gaps before they become compliance issues.

You should conduct audits at least once per year, or more frequently if your data environment is complex. These reviews should include all systems, departments, and third-party processors. A comprehensive approach is essential.

Documenting audit results is equally important. This demonstrates accountability and supports continuous improvement. Over time, audits help refine your retention strategy.

What To Review

Focus your audit on key areas where retention practices are most likely to drift. These include data deletion, legal basis documentation, and consent management. Verifying these elements helps confirm alignment with GDPR.

Acting On Findings

Once issues are identified, prioritize remediation based on risk. Address high-impact issues immediately to reduce exposure. This proactive approach helps maintain compliance.

Update policies, improve processes, and provide additional training where needed. Tracking remediation progress helps confirm that corrective actions are effective. Continuous improvement is the goal.

What About Third-Party Processors?

Even when you work with third-party processors, you remain responsible for how personal data is handled. This includes retention practices implemented by vendors such as cloud providers or analytics platforms. GDPR places accountability on the data controller.

You must define retention requirements in data processing agreements and monitor compliance over time. This includes verifying that processors delete data when required. Oversight is essential.

Managing third-party relationships requires ongoing attention. Regular reviews and audits help maintain alignment with your retention policies. This reduces the risk of unintended non-compliance.

Consent management plays a key role in aligning data collection with retention requirements. When consent is the legal basis, retention is directly tied to its validity. This makes accurate tracking essential.

A consent management platform helps you document consent, manage withdrawals, and align data lifecycle decisions. This improves both compliance and operational efficiency. It also reduces manual complexity.

At the same time, consumer expectations around transparency continue to rise. Nearly half of users say clear data usage is the most important factor in building trust, reinforcing the need for structured consent management.

How Cookiebot Supports GDPR Data Retention Compliance

Usercentrics Cookiebot CMP enables you to manage consent and data collection in a structured and compliant way. It helps you align data practices with GDPR requirements from the outset. This reduces risk and improves consistency.

With Cookiebot, you can automatically scan your website for tracking technologies and collect valid user consent. The platform also maintains detailed consent logs that support audit readiness. These capabilities simplify compliance efforts.

By connecting consent to data lifecycle management, Cookiebot helps you retain only the data you need. This supports both regulatory compliance and a more user-centric approach to data strategy.

Cookiebot bg shield

You likely track privacy compliance or broader regulatory compliance requirements somewhere, spreadsheets, shared documents, or reminder emails. These methods often start out manageable. Over time, however, they become harder to maintain.

A missed update, an outdated requirement, or an overlooked deadline can introduce real risk. Regulatory environments change quickly, and manual processes rarely keep pace.

Regulatory compliance software replaces this reactive approach with a structured system. It centralizes obligations, tracks deadlines automatically, and collects evidence continuously. Instead of scrambling before audits, you gain a clear, ongoing view of your regulatory compliance status.

Whether you need it depends on your regulatory complexity. A small business with limited exposure may manage privacy compliance manually. Organizations operating across multiple jurisdictions, handling personal data, or scaling rapidly will typically require automation to maintain control.

Key Takeaways

Before we explore the details, here are the essential points:

What Is Regulatory Compliance Software?

Regulatory compliance software provides a centralized system for managing legal and regulatory requirements across your organization. Instead of relying on disconnected tools, it creates a structured environment where obligations, controls, and evidence are linked.

In many organizations, regulatory compliance responsibilities are distributed across teams. Legal identifies requirements, operations implements controls, and compliance teams gather documentation. Without a unified system, this fragmentation creates gaps.

These gaps often show up in predictable ways:

A structured compliance system addresses these issues by:

This creates a single source of truth. Teams understand their responsibilities, and leadership gains visibility into how well the organization supports regulatory compliance.

It also makes change manageable. As regulations evolve or your business expands, the system updates and adapts with you, rather than requiring manual restructuring.

How Does Compliance Management Software Work?

At a practical level, regulatory compliance software follows a structured workflow that connects obligations to execution.

First, the system centralizes all relevant regulations. These are organized by jurisdiction, business function, and time frame. Some tools provide pre-built regulatory libraries, while others allow full customization.

Next, obligations are mapped to internal controls. Every requirement must be supported by an action, whether a policy, process, or technical safeguard. This mapping shows how your organization maintains regulatory compliance and where gaps exist.

Automation then supports continuous evidence collection. The system integrates with your existing tools to:

This removes the need for manual evidence gathering before audits.

Finally, dashboards provide real-time visibility. You can see which obligations are met, which are at risk, and which require action. Alerts notify teams before deadlines are missed, helping maintain consistent regulatory compliance over time.

What Are The Key Features Of Regulatory Compliance Tools?

Regulatory compliance tools are built around a set of core capabilities. These features work together to support structured, ongoing compliance management.

It is worth noting that the value does not come from individual features alone. The strength lies in how they connect to create a complete compliance workflow.

Key capabilities include:

These features help standardize processes, reduce uncertainty, and make regulatory compliance measurable and manageable.

Why Do Businesses Use Regulatory Tracking Software?

Organizations adopt regulatory compliance software to move from reactive processes to proactive management.

Manual workflows tend to concentrate effort around audits. Teams gather documentation at the last minute, often under pressure, and frequently discover gaps too late to resolve them effectively.

Regulatory compliance software changes this model by maintaining continuous records.

The benefits are both operational and strategic:

At a broader level, these tools help reduce risk. Strong regulatory compliance practices support business continuity, protect reputation, and help avoid costly penalties.

What Types Of Regulatory Compliance Solutions Are Available?

Not all regulatory compliance solutions serve the same purpose. Most are designed to address specific regulatory domains.

Before choosing a solution, it is important to understand where your primary risks lie.

Common categories include:

Some organizations use multiple specialized tools. Others prefer a unified solution. The right approach depends on the scope and complexity of your regulatory compliance obligations.

Cookiebot bg shield

How Do You Choose The Right Solution?

Selecting the right solution requires a clear understanding of your regulatory landscape and operational needs.

Start by identifying your highest-risk areas. Consider which regulations apply, where enforcement is strictest, and where your current processes are weakest.

Then evaluate practical factors:

It is also useful to assess your current maturity level. Organizations with basic processes may need simplicity and ease of use, while more advanced teams may prioritize customization and integration.


A structured assessment of your regulatory obligations can help clarify which solution best fits your business and where automation will deliver the most value.
 

Consent management is a key component of privacy compliance, particularly for organizations operating online.

Modern privacy regulations require clear, informed, and freely given consent before processing personal data. This creates operational complexity that cannot be managed effectively with manual processes alone.

A consent management platform (CMP) helps you:

Under GDPR, consent must be specific and unambiguous. Under CCPA and CPRA, users must be able to opt out of certain data uses.

While regulatory compliance software may track these obligations, CMPs execute them. Together, they form a complete approach to privacy compliance.

How Much Does Regulatory Compliance Software Cost?

The cost of regulatory compliance software varies depending on complexity, scale, and functionality. Before comparing vendors, it is important to understand what drives pricing.

Key factors include:

Typical pricing ranges include:

Consent management tools often use different pricing models, such as charging based on website traffic or consent volume.

Implementation costs should also be considered. These may include setup, integrations, training, and data migration.

The return on investment extends beyond audit readiness. Effective regulatory compliance management reduces operational risk, improves efficiency, and supports long-term growth.

Turning Regulatory Compliance Into A Strategic Advantage

Regulatory compliance software does more than organize obligations. It changes how your organization approaches risk and decision-making.

With structured systems in place, regulatory compliance becomes part of everyday operations rather than a periodic burden. Teams work with clear processes, and leadership gains reliable insights into performance.

This shift also supports growth. As your business expands into new markets or introduces new products, your compliance framework scales with you.

Perhaps most importantly, strong privacy compliance and regulatory practices contribute to trust. Customers, partners, and regulators increasingly expect transparency and accountability.

When privacy compliance is managed effectively, it moves from being a cost center to a foundation for sustainable, responsible growth.

Cookiebot bg shield