Data privacy and cybersecurity practitioners have grown accustomed in recent years to a constantly growing and shifting set of federal, state, and global obligations. This trend continued in 2024, but the rapid growth and widespread use of AI added new challenges. Organizations increasingly recognized that responsible AI use demands heightened attention to data ethics and governance. Enlisting data privacy and cybersecurity practitioners to integrate these broader risk management activities into their already expanding programs became more common.
Many organizations, including critical infrastructure entities, also continued to grapple with unaddressed cybersecurity gaps and other technology debt. Q4 brought reports of nation-state hackers exploiting known vulnerabilities to compromise major US telecom carriers. High-profile 2024 incidents like the Change Healthcare and Snowflake cyberattacks and the widespread Crowdstrike outage following a faulty software update reemphasized service provider and supply chain risk management.
Understanding current trends helps practitioners build skills and identify opportunities to harmonize often overlapping requirements. This article reviews important 2024 data privacy and cybersecurity developments, including related AI topics, and highlights risks and trends to watch in 2025.
(For the complete version of this resource, which includes information on global data security trends and cross-border data transfers, see Trends in Data Privacy and Cybersecurity: 2024 on Practical Law; for more on the current patchwork of US laws regulating data privacy and cybersecurity, see US Privacy and Data Security Law: Overview on Practical Law.)
Federal Regulation, Guidance, and Enforcement
Data privacy, cybersecurity, and related issues continued to garner increased attention from a varied group of federal agencies, including:
- The Federal Trade Commission (FTC).
- The Consumer Financial Protection Bureau (CFPB).
- The Department of Commerce and its National Institute of Standards and Technology (NIST).
- The Federal Communications Commission (FCC).
- The Department of Health and Human Services (HHS) and the HHS Office for Civil Rights (OCR).
- The Department of Homeland Security (DHS) and its Cybersecurity and Infrastructure Security Agency (CISA).
- The Securities and Exchange Commission (SEC).
(For the complete version of this resource, which includes more on federal agency developments and industry self-regulation efforts, see Trends in Data Privacy and Cybersecurity: 2024 on Practical Law.)
FTC
The FTC is the primary federal agency regulating consumer data privacy and cybersecurity. It derives its authority to protect consumers against unfair or deceptive trade practices from Section 5 of the Federal Trade Commission Act (FTC Act) (15 U.S.C. § 45). In 2024, the FTC engaged in formal rulemaking activities, released guidance, and announced data privacy and cybersecurity-related enforcement actions.
FTC Regulations and Guidance
In September, the FTC staff issued a report:
- Finding that major social media and video streaming services have failed to adequately protect consumers’ personal information.
- Enumerating personal data handling activities that it considers unfair or deceptive practices under Section 5, citing its recent enforcement actions.
- Recommending that these services adopt safeguards and policies to protect consumers, including restrictions and measures concerning AI use, targeted advertising, sensitive data, and children’s and teens’ personal data.
(For more information, see FTC Releases Staff Report Analyzing and Providing Recommendations for Large Social Media Companies’ Data Practices on Practical Law.)
Formal FTC data privacy and cybersecurity-related rulemaking activities in 2024 addressed:
- Children’s privacy. On January 11, the FTC formally published previously announced proposed changes to its Children’s Online Privacy Protection Act (COPPA) implementing rules (15 U.S.C. §§ 6501 to 6506; 16 C.F.R. §§ 312.1 to 312.13). The still-pending proposals address market and technology changes and effectively create an opt-in for behavioral advertising (89 Fed. Reg. 2034 (Jan. 11, 2024)).
- Sector-specific data breach notification. Updated data breach notification obligations for non-banking financial institutions covered under the FTC’s Safeguards Rule and changes to its Health Breach Notification Rule took effect.
- Surveillance pricing. The FTC announced that it had used its Section 6(b) authority to order eight companies to provide information on their surveillance pricing products and services and how using them may affect data privacy, competition, and consumer protection (15 U.S.C. § 46(b)).
- Telemarketing. In March, the FTC updated the Telemarketing Sales Rule, expanding its prohibitions on misrepresentations and false or misleading statements to include business-to-business calls, and proposed additional changes to limit inbound telemarketing calls involving technical support services, based on a recent rise in related scams.
(For the complete version of this resource, which includes more on FTC rulemaking and guidance on topics such as biometric, genetic, and health information, cybersecurity, privacy policies and data collection and use practices, AI, and vehicle-related data practices, see Trends in Data Privacy and Cybersecurity: 2024 on Practical Law.)
FTC Enforcement
The FTC’s 2024 data privacy and cybersecurity enforcement actions provide crucial guidance in the absence of comprehensive federal laws or additional regulations. Notable actions highlighted:
- Children’s privacy. The FTC’s COPPA-related enforcement activities included:
-
- a July-announced settlement with an anonymous messaging app and its founders over allegations under multiple federal and state laws, banning the company from marketing its app to persons under 18 and making false claims and misrepresentations about the app and its AI content moderation program (for more information, see FTC Announces Settlement Over Anonymous Messaging App’s Unfair Marketing to Children and Misrepresentations about App and AI Content Moderation on Practical Law);
- an August-announced suit against TikTok, its parent company ByteDance, and affiliates alleging knowing and repeated COPPA violations, including infringing an existing 2019 consent order (FTC Press Release: FTC Investigation Leads to Lawsuit Against TikTok and ByteDance for Flagrantly Violating Children’s Privacy Law (Aug. 2, 2024)); and
- an August-filed amicus brief in a US District Court for the Northern District of California suit brought by parents against an edtech service provider, disputing the company’s argument that a school’s agreement to binding arbitration applied to parents (FTC Press Release: FTC Files Amicus Brief Saying COPPA Can’t Force Parents Into Arbitration (Aug. 19, 2024)).
- Cybersecurity. Some FTC data privacy actions regarding sensitive personal data practices also allege data security failures. Several cybersecurity-focused actions built on the FTC’s previously stated reasonable data security practices expectations, for example, settlements with:
-
- a software and cloud services provider, requiring the company to delete consumer data it no longer needs and create a specified, publicly available data retention schedule (for more information, see FTC Announces Settlement with Blackbaud Over Alleged Cybersecurity and Data Retention Failures on Practical Law);
- a surveillance camera and related cloud-based services provider, highlighting harms to businesses, institutional users, and consumers and setting risk assessment and security controls obligations for any additional customer-related data it handles in the future (for more information, see FTC Announces Settlement Over Cloud-Based Security Camera Company’s Information Security Practices and Misrepresentations on Practical Law); and
- a hotelier and its subsidiary, imposing requirements to adopt a data minimization policy and conduct pre-integration security reviews for merger and acquisition targets (for more information, see FTC Announces Settlement with Marriott and Starwood Over Alleged Cybersecurity Failures and Misrepresentations on Practical Law).
- Sensitive personal data. FTC actions showed a marked trend to protect consumer personal information that it deems especially sensitive, including:
-
- web browsing history, alleging that a company deceptively claimed its software would protect consumers by blocking third-party tracking and instead sold browsing history data for advertising purposes without notice or consent (for more information, see FTC Announces Settlement Banning Software Provider’s Browsing Data Sales on Practical Law);
- health-related information, settling with two companies that allegedly shared consumers’ health condition and treatment data with third-party advertising platforms (for more information, see FTC Announces Settlement with Online Addiction Treatment Service for Sharing Consumer Health Data for Advertising Without Consent and FTC Announces Settlement with Telehealth Company for Failing to Secure and Protect Sensitive Health Data on Practical Law); and
- precise location data, with the first data broker settlement to ban sensitive location data sales, followed by others, requiring companies to develop and maintain a specified written sensitive location data program that comprehensively identifies sensitive locations and prevents related data uses or disclosures (for more information, see FTC Announces First Data Broker Settlement Banning Sensitive Location Data Sales, FTC Announces Settlement Banning Digital Marketer’s Precise Consumer Location Data Sales and Licensing, and FTC Announces Multiple Settlements with Data Brokers for Unlawfully Selling Sensitive Location Data on Practical Law).
- Telemarketing and robocalls. The FTC announced settlements with a voice over internet protocol service provider and a website-based lead generator for facilitating illegal calls (FTC Press Releases: XCast Labs Will Be Banned from Supporting Illegal Telemarketing Practices to Settle FTC Charges It Assisted and Facilitated in Sending Hundreds of Millions of Illegal Robocalls and California-Based Lead Generator Agrees to Settlement Banning It from Making or Assisting Others in Making Telemarketing Calls, Including Robocalls (Jan. 2, 2024)).
Recent enforcement actions have imposed higher standards for personal information deemed sensitive, especially location, health, and financial data, as well as children’s information. Public sentiment and legislative activity support this ongoing trend.
The FTC also continued its collaboration with other federal, state, and global regulators. (For more on the FTC’s evolving expectations regarding reasonable data security practices and appropriate comprehensive information security programs, see FTC Data Security Actions Tracker on Practical Law; for more on data broker obligations and current regulatory efforts, see US Data Broker Registration Laws: Overview on Practical Law.)
CFPB
The CFPB increasingly focuses on data privacy risks and issues in its work to ensure that financial institutions and consumer reporting agencies treat consumers fairly. Some notable 2024 actions addressed:
- Data brokers. The CFPB proposed a rule expanding the scope of consumer reporting agencies under the Fair Credit Reporting Act (FCRA) to include data brokers that sell certain sensitive personal information (for more information, see CFPB Proposes FCRA Amendments to Combat Harmful Data Broker Practices on Practical Law).
- Digital payments. In November, the CFPB finalized a rule establishing supervisory authority over certain larger nonbank consumer digital payments providers (for more information, see CFPB Finalizes Rule to Supervise Large Digital Consumer Payment Apps on Practical Law).
- Open banking. The CFPB took long-pending rulemaking actions to support open banking, which provides consumers with personal financial data rights, including data portability, under the 2010-enacted Consumer Financial Protection Act (for more information, see CFPB Issues Final Personal Financial Data Rights Rule on Practical Law).
The CFPB also addressed in guidance and reports video gaming markets, worker surveillance, and what it characterized as gaps or insufficient consumer protections in recent state consumer privacy laws.
Department of Commerce and NIST
In February, NIST released version 2.0 of its widely used Cybersecurity Framework, broadening its scope beyond critical infrastructure and adding an overarching governance function (for more information, see NIST Releases Cybersecurity Framework 2.0 on Practical Law). NIST also released a concept paper and engaged in public outreach on a potential update to its Privacy Framework (NIST: NIST Privacy Framework Version 1.1 Concept Paper (Jun. 18, 2024)). The Department of Commerce engaged in various AI-related efforts in 2024, including:
- Proposing a new rule requiring US infrastructure-as-a-service providers to verify non-US customer identities and report non-US customers engaged in certain AI model training that may support malicious cyber activities (89 Fed. Reg. 5698-01 (Jan. 29, 2024)).
- Through NIST:
-
- publishing a report on adversarial machine learning that details the types of cyberattacks that threaten AI systems and how to mitigate the associated risks (NIST AI 100-2 E2023: Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations);
- launching a new program to help organizations review an AI system’s validity, reliability, safety, security, privacy, and fairness (NIST: Assessing Risks and Impacts of AI (ARIA));
- releasing several AI guidance resources in a follow-up to Executive Order 14110 (NIST Press Release: Department of Commerce Announces New Guidance, Tools 270 Days Following President Biden’s Executive Order on AI (July 26, 2024)); and
- launching a new program assessing how AI advancements affect cybersecurity and privacy risks (NIST: Managing Cybersecurity and Privacy Risks in the Age of Artificial Intelligence: Launching a New Program at NIST (Sept. 19, 2024)).
- Proposing a rule to expand its current industrial data collection regulations to gather data on advanced AI models and computing clusters (for more information, see Bureau of Industry and Security Proposes Reporting Requirements for Developing Advanced AI Models and Computing Clusters on Practical Law).
Organizations increasingly recognized that responsible AI use demands heightened attention to data ethics and governance. Enlisting data privacy and cybersecurity practitioners to integrate these broader risk management activities into their already expanding programs became more common.
Some other NIST activities and guidance addressed health information cybersecurity, protecting controlled unclassified information, post-quantum computing encryption standards, information security program metrics guidance, and other technical standards and detailed practice resources.
DHS and CISA
High-impact cyber incidents highlighted DHS and CISA public-private work in 2024. For example:
- CISA’s Joint Cyber Defense Collaborative (JCDC) coordinated information sharing and response during the widespread Crowdstrike software update-driven outage in July. The incident mirrored the agency’s current emphasis on cyber resilience and managing software supply chain risks (CISA: JCDC’s Industry-Government Collaboration Speeds Mitigation of CrowdStrike IT Outage (Oct. 29, 2024)).
- In late 2024, CISA and the FBI announced an investigation into large-scale targeted cyberattacks against major US telecom carriers. Reports continued to emerge in December, attributing the activities to a group allegedly sponsored by the People’s Republic of China known as Salt Typhoon. Global cyber authorities noted in CISA-published guidance that the compromises exploited known infrastructure weaknesses rather than using any novel approaches. The attacks renewed calls for stronger critical infrastructure protection. (CISA Press Release: Joint Statement from FBI and CISA on the People’s Republic of China (PRC) Targeting of Commercial Telecommunications Infrastructure (Nov. 13, 2024) and CISA Alert: CISA and Partners Release Joint Guidance on PRC-Affiliated Threat Actor Compromising Networks of Global Telecommunications Providers (Dec. 3, 2024).) CISA later released guidance to help potentially targeted individuals secure their communications (CISA Alert: CISA Releases Best Practice Guidance for Mobile Communications (Dec. 18, 2024)).
In April, CISA published proposed implementing rules for the Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA) that:
- Broadly define critical infrastructure, with a stated potential to encompass over 300,000 entities.
- Require covered entities to report qualifying cyber incidents within 72 hours and ransomware payments within 24 hours.
CISA expects to finalize the rules in late 2025 and reporting to begin in 2026. (89 Fed. Reg. 23644-01, 23743 (Apr. 4, 2024).) CISA currently offers a voluntary reporting portal to encourage information sharing (CISA: Voluntary Cyber Incident Reporting). (For more on critical infrastructure cybersecurity, see Critical Infrastructure Cybersecurity and Cyber Incident Reporting: Overview on Practical Law.)
Some DHS-level critical infrastructure cybersecurity activities in 2024 addressed AI risk management, maritime security, and pipeline and surface transportation security. The CISA-administered Cyber Safety Review Board released a report on the July 2023-reported Microsoft Exchange Online intrusions, with broadly applicable recommendations for cloud service providers (DHS Press Release: Cyber Safety Review Board Releases Report on Microsoft Online Exchange Incident from Summer 2023 (Apr. 2, 2024)).
CISA also offered guidance and resources on cloud security, critical infrastructure resilience and incident response, ransomware risk mitigation, including results of its ongoing Ransomware Vulnerability Warning Pilot, secure by design principles, single sign-on barriers and solutions, and vulnerability disclosure management.
FCC
In late 2024, CISA and the FBI announced that the group Salt Typhoon, allegedly sponsored by the People’s Republic of China, had compromised at least eight US telecom carriers’ networks. The hackers reportedly exploited known infrastructure vulnerabilities, gaining access to sensitive call data. Officials later increased the number of affected companies to nine. The FCC reacted by:
- Circulating a draft declaratory ruling reaffirming that the Communications Assistance for Law Enforcement Act obligates carriers to protect their networks from unauthorized access (47 U.S.C. § 1004).
- Announcing that it is considering further rulemaking to require specific carrier cybersecurity risk management activities and an annual certification. (FCC Fact Sheet: Implications of Salt Typhoon Attack and FCC Response (Dec. 5, 2024).)
Other cybersecurity and network resilience activities, including enforcement settlements, highlighted increased expectations, especially for protecting customer proprietary network information. The FCC further focused on consumer data privacy and cybersecurity by implementing its voluntary smart device labeling program and continuing its anti-robocall efforts with the FTC under the Telephone Consumer Protection Act.
The FCC also reopened the net neutrality debate, with its potential implications for data privacy and cybersecurity obligations, when it reclassified broadband internet providers as common carriers (In re Safeguarding and Securing the Open Internet, 2024 WL 2109860 (F.C.C. May 7, 2024)). However, the Sixth Circuit stayed the ruling (In re MCP No. 185, 2024 WL 3650468 (6th Cir. Aug. 1, 2024)).
HHS and HHS OCR
The HHS continued its focus on cyber resilience, releasing its voluntary health care and public health sector-specific cybersecurity performance goals (CPGs) through its Administration for Strategic Preparedness and Response (ASPR) (ASPR Press Release: HHS Releases New Voluntary Performance Goals to Enhance Cybersecurity Across the Health Sector and Gateway for Cybersecurity Resources (Jan. 24, 2024)). In a late December action, the HHS OCR announced a proposed update to the HIPAA Security Rule aligned with the CPGs and other widely recognized standards and practices. The proposed rule was published in the Federal Register on January 6, 2025 (OCR Press Release: HHS Office for Civil Rights Proposes Measures to Strengthen Cybersecurity in Health Care Under HIPAA (Dec. 27, 2024)).
In a long-awaited February rulemaking action, the HHS better aligned patient data privacy protections under HIPAA and its Substance Abuse and Mental Health Services Administration 42 C.F.R. Part 2 rules (for more information, see HHS Final Rules Align Federal Substance Use Disorder Protections and HIPAA Rules (February 2026 Compliance Date); Rules Addressing HIPAA Privacy Notices to Follow on Practical Law).
(For more on HHS’s health IT-related actions, see Health Information Sharing Scenarios and Issues: Overview on Practical Law.)
HHS OCR Guidance and Enforcement Activity
The HHS OCR promulgates rules, provides guidance, and conducts enforcement actions under HIPAA (for more information, see HIPAA and Health Information Privacy Compliance Toolkit on Practical Law).
In 2024, the OCR focused on the cyberattack against Change Healthcare, Inc., which processes claims and payments for a large segment of US providers (for more information, see Provider Impacts from Recent Health Care Cyberattacks in the June 2024 issue of Practical Law The Journal). Characterizing the attack and resulting lengthy outage as unprecedented, the OCR offered extensive guidance and support to providers (OCR: Change Healthcare Cybersecurity Incident Frequently Asked Questions).
Other OCR 2024 rulemaking, guidance, and enforcement actions addressed malicious insiders, phishing and ransomware incidents, physical security, reproductive health care privacy, and HIPAA Security Rule compliance. The OCR also focused on patients’ rights to their data under its continued right of access initiative, currently exceeding 50 total actions, and launching its new risk analysis initiative.
SEC
In late 2023, publicly traded reporting companies began disclosing cybersecurity incidents and key aspects of their cybersecurity risk management programs under the SEC Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure Rules (17 C.F.R. § 229.106 (Item 106) and 17 C.F.R. § 249.308 (Item 1.05)). Some exceptions allowed smaller reporting companies to delay incident reporting until mid-2024.
Variations in early disclosures regarding incident materiality and companies’ reported concerns, especially under the short four business day Form 8-K disclosure deadline, led the SEC to issue a series of mid-year guidance statements addressing:
- Material and other cybersecurity incident disclosures.
- Selective disclosure of cybersecurity incident information.
- Requests to delay disclosures that pose a substantial risk to national security or public safety.
- Ransomware incident scenarios.
(For more on SEC cybersecurity disclosure rules, examples, and current guidance, see SEC Cybersecurity Disclosure Rules and Enforcement on Practical Law.)
SEC enforcement actions proceeded following 2020’s high-profile Solarwinds cyberattack. The SEC also amended Regulation S-P to require broker-dealers, including funding portals, and investment advisers to adopt written incident response program policies and procedures. Compliance timelines vary according to an entity’s size (for more information, see SEC Adopts Amendments to Regulation S-P on Practical Law).
Other SEC cyber-related enforcement actions alleged companies failed to implement effective controls and timely or accurately notify management, shareholders, and the SEC of cyber incidents.
State Regulation, Guidance, and Enforcement
State authorities continued to fill the gaps left in the absence of a comprehensive federal data privacy law to protect their residents’ personal information. Like federal regulators, state agencies focused their efforts on protecting sensitive data and children’s data privacy and online safety. California, Colorado, and New York continued to play prominent roles in consumer data protection, with Texas announcing new initiatives and becoming a more visible authority in 2024. Some cities have also joined in, a trend practitioners should note for 2025.
(For the complete version of this resource, which includes more on state enforcement activities and multistate actions, see Trends in Data Privacy and Cybersecurity: 2024 on Practical Law; for a collection of resources to assist counsel in advising clients on US state-specific privacy, data protection, and cybersecurity requirements, see State Data Privacy Laws Toolkit on Practical Law.)
California
On February 9, after a state appellate court vacated a lower court’s stay order, the California Privacy Protection Agency (CPPA) began enforcing its implementing regulations under the California Consumer Privacy Act, as amended by the California Privacy Rights Act (CCPA/CPRA) (for more information, see California Appellate Court Overturns Lower Court Ruling Delaying CPRA Regulations Enforcement on Practical Law). Also in 2024, the CPPA released a CCPA/CPRA resources website for businesses and residents, a new strategic plan, and enforcement advisories on data minimization and dark patterns (digital design practices to disguise ads and hidden fees, manipulate consumers’ privacy choices, trick consumers into buying products or services, or make it difficult to cancel orders or reverse charges). The CPPA showed particular interest in regulating data brokers under California’s recently enacted Delete Act.
The California attorney general (CAG) brought and settled claims with several companies for alleged data privacy law violations, in some cases, partnering with city and county district attorneys. The CAG also conducted an enforcement sweep of streaming services’ CCPA/CPRA compliance, specifically, its sales and sharing opt-out requirements.
(For more on California’s extensive data privacy laws and enforcement model, see California Privacy and Data Security Law: Overview on Practical Law.)
Colorado
The Colorado Privacy Act (CPA) requirement for controllers to support consumers exercising their opt-out rights using a universal opt-out mechanism took effect on July 1.
Additionally, the Colorado Department of Law adopted updated CPA rules on December 6 that create processes for the Colorado attorney general to issue guidance and opinion letters and reflect recent CPA amendments. The amended rules went into effect on January 30, 2025.
(For more on developments in Colorado data privacy law, see Colorado Privacy Act Regulation Tracker on Practical Law.)
New York
Sector-specific regulators continued to play an important role in New York, including the New York Department of Financial Services (NYDFS), and the New York Department of Health (NYDOH), as well as New York Attorney General (NYAG). New York agencies paid particular attention to securing residents’ sensitive personal information, such as health and financial data.
The NYDFS offered further guidance on complying with its cybersecurity regulations, including updates that required compliance by April 29, with additional requirements taking effect in 2025 (for more information, see The NYDFS Cybersecurity Regulations on Practical Law). The NYDFS publishes alerts, guidance, and FAQs on its Cybersecurity Resource Center.
The NYDOH adopted its Hospital Cybersecurity Requirements Regulation on October 2. Requirements to report certain cybersecurity incidents within 72 hours took effect on adoption, but covered entities have until October 2, 2025, to comply with most other provisions, including those on implementing a specified cybersecurity program (for more information, see New York Adopts Cybersecurity Requirements for Hospitals on Practical Law).
The NYAG released online tracking technologies and website privacy controls guidance and issued an Advanced Notice of Proposed Rulemaking under New York’s recently enacted Child Data Protection Act and Stop Addictive Feeds Exploitation (SAFE) for Kids Act for public comment. The NYAG also continued to bring actions alleging lax data security practices resulting in data breaches and exposing residents’ sensitive data, including partnering with the NYDFS for some actions. The NYAG also collaborated with the New York Education Department to protect student privacy.
(For more on state student data processing restrictions, see Student Privacy State Laws for Education Service Providers Chart: Overview on Practical Law.)
Texas
Texas gained more data privacy visibility in 2024 after the Texas attorney general (TAG) announced a new initiative to aggressively enforce its laws (TAG: Attorney General Ken Paxton Launches Data Privacy and Security Initiative to Protect Texans’ Sensitive Data from Illegal Exploitation by Tech, AI, and Other Companies (June 4, 2024)).
In addition to the Texas Capture or Use of Biometric Identifier Act (Tex. Bus. & Com. Code Ann. § 503.001) and state consumer protection laws, the TAG took on enforcing recently enacted statutes, including:
- A data broker registration law (effective September 1, 2023).
- The Texas Data Privacy and Security Act (effective July 1, 2024).
- Securing Children Online through Parental Empowerment (SCOPE) Act (enacted in 2023). Some parts of the SCOPE Act have been enjoined pending litigation, but its data privacy provisions are in effect.
(For more information, see Texas Enacts Data Privacy and Security Act and Laws on Data Brokers and Genetic Data Privacy and Texas Data Privacy and Security Act (TDPSA) Quick Facts: Overview on Practical Law.)
Federal Legislation
Congress has yet to pass a general consumer data privacy law or an updated children’s privacy law. Notable legislation such as the proposed American Privacy Rights Act of 2024 (HR 8818) and the Kids Online Safety and Privacy Act (S 2073) garnered support but fell short of enactment.
One exception is the Protecting Americans’ Data from Foreign Adversaries Act of 2024, which was enacted in April and took effect on June 23 (for more information, see President Biden Signs the Protecting Americans’ Data from Foreign Adversaries Act of 2024 on Practical Law). The law, which broadly defines personally identifiable sensitive data, prohibits data brokers from transferring or otherwise making available US individuals’ personally identifiable sensitive data to:
- Foreign adversary countries, namely China, Iran, North Korea, and Russia.
- Entities controlled by a foreign adversary.
(For the complete version of this resource, which includes information on related executive and rulemaking actions, see Trends in Data Privacy and Cybersecurity: 2024 on Practical Law; for more on federal data privacy bills, see Federal Privacy-Related Legislation Tracker and US Children’s Privacy Legislation Tracker: Federal Children’s Privacy Bills on Practical Law.)
State Legislation
States enacted or amended an extraordinary number of data privacy and cybersecurity laws in 2024, including seven new broad consumer privacy laws. Alaska, Oklahoma, and Rhode Island continued the long-standing trend of introducing state insurance data security laws by enacting National Association of Insurance Commissioners model law-based statutes. Several states also followed trends of:
- Joining federal regulators in focusing on data deemed sensitive, like health, financial, and children’s information.
- Addressing AI risks.
- Updating data breach notification obligations.
As of the 2024 legislative season, 20 states have enacted broad consumer privacy laws. Some previously enacted laws:
- Took effect in 2024 in Florida, Montana, Oregon, and Texas.
- Take effect in 2025 in Delaware, Iowa, and Tennessee.
Seven 2024-enacted laws take effect in 2025 and 2026, including:
- The Nebraska Data Privacy Act and the New Hampshire Consumer Data Privacy Act (January 1, 2025).
- The New Jersey Consumer Data Privacy Act (January 15, 2025).
- The Minnesota Consumer Data Privacy Act (July 31, 2025).
- The Maryland Online Data Privacy Act (October 1, 2025).
- The Kentucky Consumer Data Protection Act and the Rhode Island Data Transparency and Privacy Protection Act (January 1, 2026).
Additionally, some states updated existing consumer privacy laws in 2024, including California, Colorado, and Virginia.
(For more on state consumer privacy laws, see US State Consumer Privacy Laws Toolkit and State Consumer Privacy Legislation Tracker on Practical Law.)
Litigation
Data privacy and cybersecurity litigation continued apace in 2024. Common suits and trends included those seeking consumer and shareholder relief for data breaches and cyberattacks as well as class actions involving web tracking technology and biometrics and genetic information. (For the complete version of this resource, which includes more on notable data privacy-related actions, see Trends in Data Privacy and Cybersecurity: 2024 on Practical Law).
Several 2024 US Supreme Court decisions expanded plaintiffs’ ability to contest certain administrative actions, likely increasing future data privacy and cybersecurity-related rules and enforcement challenges. Specifically, in:
- Loper Bright Enterprises v. Raimondo, the Court overruled its 1984 decision in Chevron, U.S.A. Inc. v. National Resources Defense Council, Inc., which required courts to apply a two-step deference framework when reviewing federal agencies’ statutory interpretations (144 S. Ct. 2244 (2024); 467 U.S. 837 (1984); for more information, see Supreme Court Decision Overturning Chevron Deference in the August 2024 issue of Practical Law The Journal).
- Corner Post Inc. v. Board of Governors of the Federal Reserve System, the Court held that the six-year statute of limitations for challenging a federal rule starts on the date of the plaintiff’s injury, not the rule’s finalization (603 U.S. 799 (2024)).
- Department of Agriculture Rural Development Rural Housing Service v. Kirtz, the Court ruled that individual consumers can sue federal agencies under the FCRA (601 U.S. 42 (2024)).
Data Breach Actions
Continuing the story of one of 2023’s biggest cyber incidents, a consolidated class action against Progress Software Corporation and its MOVEit file transfer software and service mostly survived a motion to dismiss (In re MOVEit Customer Data Sec. Breach Litig., 2024 WL 5092276 (D. Mass. Dec. 12, 2024) (finding Article III standing for most plaintiffs)).
Large-scale 2024 attacks and fast-ensuing data breach litigation activities included:
- The consolidation of 45 class actions in the District of Montana following a threat actor’s theft of over 500 million individuals’ personal information held by third-party cloud storage platform Snowflake, Inc. for AT&T (In re AT&T Inc. Cellular Customer Data Sec. Breach Litig., 2024 WL 4429233 (J.P.M.L. Oct. 4, 2024)).
- A class action filing following the apparent theft of approximately 2.9 billion individuals’ personal information from background search company National Public Data (Complaint, Hofmann v. Jerico Pictures, Inc., No. 24-CV-61383 (S.D. Fla. Aug. 1, 2024)).
Cyber incidents and widely impacting software outages in 2024 reiterated the risks inherent in using service providers and purchasing software.
2024 data breach class actions highlighted several emerging and continuing themes, including:
- Customer agreements to arbitrate and mass arbitration.
- Attorney-client privilege in data breach investigations.
- Law firm data breaches.
Multimillion dollar settlements following data breaches resulting from various cyber incident types remained common.
(For more on data breach litigation developments, see Key Issues in Consumer Data Breach Litigation and Attorneys’ Duties to Protect Client Data on Practical Law.)
Web Tracking Actions
A notable body of web tracking-related class actions, often filed against health care and online retailers alleging disclosure of sensitive personal information, encountered mixed results at the motion to dismiss stage. The cases typically made claims under:
- Common law.
- COPPA.
- The federal Wiretap Act (18 U.S.C. §§ 2511, 2520) and similar state laws (for more information, see Key Issues in Electronic Communications Privacy Act (ECPA) Litigation on Practical Law).
- State consumer protection, medical records, and unfair competition laws (Jones v. Bloomingdales.com, LLC, 2024 WL 5205528 (8th Cir. Dec. 24, 2024) (dismissing session replay claims for lack of Article III standing when plaintiff failed to allege sensitive data collection); Mekhail v. North Mem. Health Care, 726 F.Supp.3d 916 (D. Minn. 2024) (maintaining Wiretap Act and some state law claims); A.B. by and Through Turner v. Google LLC, 2024 WL 3052969 (N.D. Cal. June 18, 2024) (preserving COPPA and state law claims)).
The California Invasion of Privacy Act trap and trace provisions garnered more attention following a 2023 district court decision holding that Cal. Penal Code § 638.50 defines pen registers and trap and trace devices broadly to include tracking software (Greenley v. Kochava, Inc., 684 F.Supp.3d 1024, 1050-51 (S.D. Cal. 2023); Complaint, Lesh v. Cable News Network, Inc., No. 24CV061464 (Cal. Sup. Ct. Jan. 25, 2024); Moody v. C2 Educ. Sys. Inc., 2024 WL 3561367 (C.D. Cal. July 25, 2024) (preserving trap and trace claims at motion to dismiss stage)).
Additionally, a California federal court held that data disclosed using web tracking technologies could qualify as a data breach under the CCPA’s private right of action (In re BetterHelp, Inc. Data Disclosure Cases, 2024 WL 3416511 (N.D. Cal. July 15, 2024); for more information, see Understanding the California Consumer Privacy Act (CCPA) and the California Privacy Rights Act (CPRA) on Practical Law).
2025 Risks and Trends
The seemingly continuous growth curve in data privacy and cybersecurity risks and obligations shows no signs of slowing in 2025. Data privacy and cybersecurity practitioners who adopt a more expansive data ethics and governance approach will be better positioned to:
- Assess risks holistically across their clients’ products, services, and business processes.
- Offer proactive risk management advice to address:
-
- potential harms to customers, consumers, and others; and
- cybersecurity and other threats to information technology and operational technology infrastructure.
- Identify regulatory compliance harmonization and efficiency improvement opportunities.
- Help their clients adapt as AI evolves, other new technologies emerge, and policy approaches under the second Trump administration solidify.
Recent Supreme Court rulings like Loper have restrained federal regulatory authority, and the new administration is generally focused on deregulation. Dissenting FTC and SEC commissioners’ statements in recent actions and announced nominations make narrower regulation readings and fewer novel enforcement actions more likely. However, data privacy and cybersecurity actions increasingly garner bipartisan support, especially those aimed at protecting children, sensitive consumer data, and critical infrastructure.
As these tensions and the 2025 state legislative season play out, organizations must prepare for an already increasing compliance burden as more state data privacy laws come into force. For example, eight state consumer privacy laws take effect in 2025, as well as other state laws to protect children’s privacy and limit social media risks (see State Legislation above).
The seemingly continuous growth curve in data privacy and cybersecurity risks and obligations shows no signs of slowing in 2025. Data privacy and cybersecurity practitioners who adopt a more expansive data ethics and governance approach will be better positioned.
Other risks and trends to track and consider in 2025 include:
- Varied approaches to AI regulation. Ranging from the EU’s rigorous EU Artificial Intelligence Act ((EU) 2024/1689) to more flexible regimes intended to foster innovation, these obligations may affect data use practices and deployments, including consumer and employee communications. Embedding impact assessment and other review processes in product and service development cycles helps identify and manage risks early. (For more information, see Identifying Data Protection Issues for a New Product or Service Checklist on Practical Law.)
- Continued cybersecurity threats. The cybersecurity threat climate continues to grow with persistent nation-state attacks against critical infrastructure and opportunistic cybercriminal-driven ransomware and other incidents. Regulators increasingly seek to hold organizations accountable for failures to maintain reasonable measures. Meeting these challenges requires:
-
- supporting known effective critical security controls appropriate for each organization’s unique, evolving cyber risk profile;
- developing and regularly exercising a cyber incident response plan; and
- recognizing that core cyber hygiene investments pay off by building resilience and lowering enforcement risks, especially as harmonization efforts around accepted practices advance. (For more information, see Cybersecurity Toolkit (US) on Practical Law.)
- Heightened data protection standards for sensitive personal information. Recent enforcement actions have imposed higher standards for personal information deemed sensitive, especially location, health, and financial data, as well as children’s information. Public sentiment and legislative activity support this ongoing trend. Identifying potential, even unintended data collection points and applying extra scrutiny and protection to any uses helps minimize risks. (For more information, see Tracking Technologies: Privacy and Data Security Issues on Practical Law.)
- Increasing service provider and supply chain risks and expectations. Cyber incidents and widely impacting software outages in 2024 reiterated the risks inherent in using service providers and purchasing software. Most, if not all, organizations must engage in these transactions to remain competitive. Managing these risks requires organizations to:
-
- identify and understand their roles and dependencies in various, often overlapping business ecosystems;
- hold service providers and suppliers accountable through their purchasing decisions and agreements; and
- plan for meeting business continuity needs if products or services fail or become unavailable. (For more information, see Managing Privacy and Data Security Risks in Vendor Relationships on Practical Law.)
- More state-level data privacy enforcement actions. Additional state data privacy laws coupled with greater consumer awareness inevitably mean more state enforcement actions. Minimizing potential risks demands that organizations identify current and emerging obligations and monitor ongoing compliance. (For more information, see State Data Privacy Laws Toolkit on Practical Law.)
- Expanding global data protection and cross-border data transfer obligations. More countries continue to enact and update data protection laws and regulations, often focusing on cross-border personal data transfers. Recognizing that different jurisdictions address data protection in materially different ways and addressing those variations before moving into new markets or workforce locations lowers risks. (For more information, see Cross-Border Personal Data Transfers Toolkit on Practical Law.)