The Utah Consumer Privacy Act (UCPA), officially House Bill 382, is a data privacy law that went into effect on December 31, 2023. It provides Utah residents with specific rights regarding their personal data and sets requirements for businesses handling such data.
The UCPA applies to businesses that meet at least one of the following criteria:
- Conduct business in Utah or target products or services to Utah residents.
- Control or process the personal data of at least 100,000 Utah consumers in a calendar year or
- Derive over 50% of their gross revenue from the sale of personal data and process data of at least 25,000 consumers.
UCPA Guidelines
Under the Utah Consumer Privacy Act, Utah residents have the right to:
- Access their personal data.
- Correct inaccuracies in their personal data.
- Delete their personal data.
- Obtain a copy of their personal data in a portable format.
- Opt out of the sale of their personal data and targeted advertising.
Businesses that meet the criteria for UCPA must:
- provide a clear privacy notice detailing their data practices, including data collection, processing, and sharing practices.
- assess the risks associated with their data processing activities and take measures to mitigate those risks.
- implement reasonable safeguards to protect personal data from unauthorized access, use, or disclosure.
- establish contracts with data processors to ensure compliance with UCPA requirements.
- seek explicit consent for the processing of sensitive data, such as data revealing racial or ethnic origin, health information, or sexual orientation.
How Finite State Helps You Comply with the UCPA
Finite State can complement your data protection efforts by strengthening your data security capabilities, particularly by:
- Enforcing Secure Coding Practices: Seamless integrations into existing CI/CD pipelines automatically analyze source code and compiled binaries for common security vulnerabilities and coding errors. This allows engineers to identify vulnerabilities hidden deep within legacy code and third-party libraries and detect and address issues early in the development process.
- Real-Time Threat Detection: Integrations with vulnerability databases provide up-to-date information on the latest threats and exploits, allowing for the proactive identification of potential risks before they can be exploited.
- Automate Vulnerability Identification: Using our advanced binary and source code SCA, vulnerabilities can be identified as they’re introduced across the SDLC to help teams keep applications secure.
- Comprehensive SBOM Solutions: Automatically generate Software Bill of Materials throughout the SDLC and easily compile detailed information on all components in your products, including open-source libraries, third-party dependencies, and custom code to improve transparency and identify potential security risks in your software supply chain.
Strong cybersecurity requires a collective effort. Talk to the team today to discover how Finite State can help you comply with the UCPA.