Clym Logo

Handling Access Requests Under the CCPA: What Businesses Must Disclose

~ 8 min read

Under the California Consumer Privacy Act (CCPA), California residents have the right to access personal information that businesses collect, use, and disclose about them. For businesses, access requests create significant operational risk, particularly around scope, verification, response timing, and over‑ or under‑disclosure. This article explains what the CCPA right of access means in practice, what information businesses must disclose, what they are not required to provide, how access requests interact with portability and automated decision‑making information, and how access requests should be handled within broader consumer rights workflows.

Summarize full article with:

The right of access is one of the foundational consumer rights under the California Consumer Privacy Act (CCPA), as amended by the California Privacy Rights Act (CPRA). It allows California residents to ask what personal information a business holds about them and how that information is used and disclosed.

In practice, access requests are one of the most misunderstood obligations under the CCPA. Many businesses struggle not with responding at all, but with determining the correct scope of disclosure. Over‑disclosure can expose sensitive data unnecessarily, while under‑disclosure can lead to complaints and enforcement risk. These challenges have become more pronounced as CPRA expansions, including portability and access to automated decision‑making information, have taken effect.


What is the CCPA right of access?

The CCPA right to access allows a consumer to request disclosure of personal information a business has collected about them, subject to defined limitations and verification requirements.

This right applies when:

  • The business is subject to the CCPA
  • The requester is a California resident
  • The personal information relates to that consumer

The right of access is often referred to as the “right to know.” It encompasses both high‑level disclosures about data practices and access to specific personal information, depending on the nature of the request.


Is California a right of access state?

Yes. California is considered a right of access state because the CCPA explicitly grants consumers the ability to request access to their personal information.

However, this right operates within a structured legal framework. Businesses are required to disclose certain information, but they are not required to provide everything they hold, nor to create new data or explanations that do not already exist. Understanding this distinction is critical to handling access requests lawfully.


Which access requests follow the 45‑day response timeline?

Access requests are request‑based consumer rights, often referred to as a data subject request, and follow the same response timing framework as deletion and correction requests.

In most cases, businesses must:

  • Acknowledge receipt of the access request within 10 business days
  • Verify the identity of the requester
  • Respond within 45 days of receiving the request, subject to a possible extension

For a detailed explanation of how response timing works, see our guide on the CCPA 45‑day response timeline.


Verifying identity for access requests

Stage

Typical timing

Business consideration

Request received

Day 1

Log request and begin verification

Verification initiated

Day 1 - 10

Use proportionate methods based on data sensitivity

Data review and preparation

Day 10 - 35

Identify responsive data and apply exclusions

Final response

By day 45

Deliver disclosure and document outcome

Before disclosing personal information, businesses must take reasonable steps to verify the identity of the requester. Because access requests involve disclosure rather than deletion, verification requirements are closely tied to the sensitivity of the information requested.

In practice, businesses commonly rely on:

  • Email‑based verification links sent to the address on file
  • Re‑authentication through an existing account
  • Matching multiple data points already maintained by the business

Verification standards are explained in more detail in our article on verifying identity under the CCPA.


What must be disclosed under a CCPA access request

The scope of disclosure depends on the type of access request submitted.

Under the CCPA, consumers may request:

  • Categories of personal information collected
  • Sources of personal information
  • Business or commercial purposes for collection or disclosure
  • Categories of third parties receiving the information
  • Categories of personal information sold or shared
  • Specific pieces of personal information held about the consumer

Businesses are expected to respond accurately and consistently with their privacy disclosures and notices at collection.

A frequent source of enforcement risk is confusion between requests for categories of personal information and requests for specific pieces of personal information. Categories describe types of data at a high level, while specific pieces refer to the actual data elements linked to a consumer. Disclosing specific pieces when only categories are requested can expose sensitive data unnecessarily. Responding with categories when specific pieces are requested can result in an incomplete or non‑compliant response.


Access request types and verification standards

Access request type

Verification level required

Practical approach

Categories of personal information

Reasonable degree of certainty

Matching at least two data points

Specific pieces of personal information

Reasonably high degree of certainty

Matching multiple data points plus confirmation

Data portability

Same as underlying access request

Secure delivery in usable format

Automated decision‑making information

Reasonably high degree of certainty

Enhanced verification and confirmation

What is not required to be disclosed under the CCPA

Not required to disclose

Explanation

Trade secrets or proprietary algorithms

Businesses are not required to reveal confidential logic, source code, or internal systems

Information about other individuals

Personal information relating to other consumers must be protected

Security and fraud controls

Information that could undermine security safeguards may be withheld

Data not collected from the consumer

The right to access applies only to personal information collected from the consumer

The right of access does not require businesses to:

  • Create new records or explanations
  • Retain personal information solely to respond to future requests
  • Disclose trade secrets or proprietary algorithms
  • Provide information that would compromise security or the rights of others

Understanding what is excluded from disclosure is as important as understanding what must be provided.


Data portability requirements for access requests

Requirement

What businesses must do

What is not required

Format

Provide data in a portable, readily usable format

Create custom or real-time access portals

Scope

Include personal information responsive to the request

Include information not already maintained

Delivery

Use secure transmission methods

Offer multiple delivery formats per consumer

When consumers request access to specific personal information, businesses must provide the information in a portable and readily usable format, where technically feasible.

Portability does not require:

  • Customized formats for each consumer
  • Real‑time access to systems
  • Disclosure beyond what is already maintained

The goal is to allow consumers to receive and reuse their information without imposing disproportionate burden on the business.


Access to automated decision‑making information (ADMT)

Under the CPRA framework, consumers may request access to information about automated decision‑making technology (ADMT), including meaningful information about the logic involved and the outcome of such processing where applicable.

These requests introduce additional complexity and often require coordination between technical, legal, and compliance teams. Businesses should be prepared to explain automated processing in clear, non‑technical terms without revealing proprietary systems.


Practical examples: handling CCPA access requests


E‑commerce example

A customer submits an access request asking what personal information an online retailer holds about them. After verifying identity through an email confirmation, the business provides categories of data collected, order history, account details, and a summary of third‑party disclosures. Payment information and internal fraud signals, including certain sensitive personal information, are excluded as permitted under the law.

SaaS example

A SaaS user submits an access request seeking access to profile data, usage history, and information about automated processing. The business verifies the request through account re‑authentication and provides account data, usage logs, and a high‑level explanation of automated features without exposing proprietary logic.


How access requests fit into broader CCPA consumer rights obligations

Access requests often precede deletion or correction requests and interact closely with identity verification, response timelines, and documentation requirements.

For a broader overview, see our hub on consumer rights under the CCPA and CPRA and the CCPA compliance guide for businesses.


How Clym helps businesses manage CCPA access requests

Businesses install Clym on their website to allow consumers to submit access requests through the widget or the Governance Portal.

Once submitted, requests appear in the Clym Control Center, where businesses can:

  • View and track access requests in one place
  • Monitor response deadlines
  • Communicate with requesters
  • Record verification steps and disclosures
  • Maintain documentation for audits or regulatory inquiries

This centralized approach supports consistent handling of access requests across teams and systems.


Key takeaway

The CCPA right of access requires more than simply sending data. Businesses must determine the correct scope of disclosure, apply appropriate verification, meet response timelines, and explain automated processing where required. Clear workflows and careful documentation are central to managing access requests effectively.

Frequently asked questions about the CCPA right of access

The CCPA right of access allows California residents to request disclosure of personal information a business has collected about them, including categories, sources, purposes, and specific pieces of information.

Access rights apply to California residents whose personal information is collected by a business subject to the CCPA, regardless of where the business is located.

In certain cases, yes. Under the CPRA framework, consumers may request information about automated decision‑making technology used in connection with their personal information.

The response period begins when the business receives the request, not when identity verification is completed. Businesses must manage verification and response activities within the response window.

No. The CCPA does not require businesses to disclose trade secrets, proprietary algorithms, or confidential internal processes. When responding to access requests involving automated decision‑making, businesses are expected to provide meaningful, high‑level explanations without exposing protected intellectual property.

Yes. Businesses may limit or redact access responses where disclosure would compromise security, reveal personal information about other individuals, or expose sensitive operational details. Any limitation should be narrowly applied and documented.

Over‑disclosure can create security, confidentiality, and privacy risks. Providing unnecessary sensitive data or information about other individuals may increase exposure to complaints or regulatory scrutiny. Businesses should design access workflows that balance transparency with proportional disclosure.

Alex Margau

Content Manager

Alex is a Content Developer at Clym, where he researches and writes about everything related to data privacy and web accessibility compliance for businesses, helping them stay informed on their compliance needs and spreading awareness about making the web safer and more inclusive. When he’s not writing about compliance, Alex has his nose in a book or is hiking in the great outdoors.

Find out more about Alex