Changeflow GovPing Data Privacy & Cybersecurity California Cybersecurity Audit Rule: Class Acti...
Routine Notice Added Final

California Cybersecurity Audit Rule: Class Action Discovery and Privilege Implications

Favicon for iapp.org IAPP Privacy News
Published
Detected
Email

Summary

The California Privacy Protection Agency's cybersecurity audit rule took effect Jan. 1, 2026, requiring covered businesses to conduct annual audits covering 18 technical and organizational components and submit written certification to the agency. The rule, the first of its kind among state data privacy laws of general applicability, may generate substantial compliance efforts and create discoverable evidence in data breach class action litigation.

Published by Faegre Drinker on iapp.org . Detected, standardized, and enriched by GovPing. Review our methodology and editorial standards .

What changed

The California Privacy Protection Agency's new cybersecurity audit rule requires certain businesses to conduct annual cybersecurity audits covering 18 technical and organizational components, with written certification submitted to the agency each calendar year. The rule took effect Jan. 1, 2026.

Affected businesses should anticipate that cybersecurity audit reports and supporting materials may become focal points in data breach class action litigation, as plaintiffs' counsel will likely seek these documents in discovery to prove negligence or CCPA violations. California law does not provide automatic privilege or discovery protection for compliance documents prepared primarily for regulatory purposes, and courts have been reluctant to shield such materials. Companies should prepare for discovery requests covering not only final audit reports but also drafts, internal communications, risk scoring worksheets and preliminary gap analyses.

What to do next

  1. Monitor for updates on California Privacy Protection Agency audit guidance
  2. Prepare for potential discovery requests in data breach litigation regarding cybersecurity audits
  3. Consider how to handle audit materials given limited privilege protections under CCPA

Archived snapshot

Apr 15, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.


ANALYSIS Published

14 April 2026

Subscribe to IAPP Newsletters

Contributors:

Charles Westerhaus

CIPP/E, CIPP/US, CIPM, FIP

Associate

Faegre Drinker Biddle and Reath LLP

Lukas Stoutenour

Associate

Faegre Drinker Biddle and Reath LLP

Craig Heeren

Partner

Faegre Drinker Biddle and Reath LLP


Last year, the California Privacy Protection Agency adopted a major new rule requiring certain businesses to conduct an annual cybersecurity audit. The rule went into effect 1 Jan. 2026. This pioneering requirement, the first of its kind among state data privacy laws of general applicability, may entail substantial compliance efforts for affected companies to identify and correct cybersecurity shortcomings. While compliance concerns may generate new anxiety, the audit requirement's impact on data breach litigation could have equally significant long-term implications for businesses operating in California.

The compliance requirements are considerable and complex, covering eighteen different technical and organizational components of an entity's cybersecurity practice. Under the rule, covered entities are required to submit to the agency, each calendar year, a written certification that the business has completed a cybersecurity audit report that meets the rule’s standards.

Although the report itself does not need to be filed, the need to create and certify one highlights an item of high interest to a plaintiff’s counsel. As a result, the audit will likely become a focal point of plaintiffs' discovery requests in data breach class actions as they seek to prove negligence or violations of state data privacy laws.

Discovery and privilege

With the rise in cybersecurity, data breaches and privacy-related litigation, plaintiffs are increasingly seeking materials they can leverage to argue that a business’s cybersecurity or privacy-related practices are deficient or negligent in some fashion. Cybersecurity audit reports and risk-assessment narratives will therefore be compelling targets for discovery, particularly when the business must identify gaps in its security posture. Additional materials generated during an audit, such as supporting analyses, drafts, internal communications and documentation showing when risks were identified and how they were addressed, will likewise be of substantial interest.

Importantly, shielding these materials from discovery may be difficult. While there may be good-faith arguments to limit the discovery of such materials, such as a claim of privilege or attorney work product over materials prepared by or for a lawyer, courts have often been unwilling to treat materials prepared for these types of purposes as protected from discovery.

Indeed, California Consumer Privacy Act audits and risk assessments are not automatically privileged. While California law preserves traditional evidentiary privileges, such as attorney-client privilege and attorney work product, the statute does not provide any shield or discovery limitation for compliance documents. If an audit is primarily conducted as a business or regulatory exercise — rather than to obtain legal advice — it may be treated as fully discoverable. As a result, businesses should anticipate being required to disclose a cybersecurity audit and certain supporting materials prepared as part of the CCPA certification and handle those materials accordingly.

Even when companies believe the final audit report is defensible, discovery fights often focus on what came before it. Drafts, internal emails, risk scoring worksheets and preliminary gap analyses are fertile ground for plaintiffs arguing that the company knew of specific vulnerabilities, chose not to remediate them and downplayed those risks in the final audit.

It begs the question: What can a company subject to the CCPA do to combat the risk of crafty lawyering that paints such a narrative? Companies may want to consider additional precautions, such as maintaining clear divisions and limited handling of any legal work product from more traditional compliance and business analysis, to foster a sense of control and readiness.

Companies should carefully document the audit process, clearly distinguish legal advice from operational assessments and maintain a structured record to prevent unfavorable inferences during litigation. Particularly sophisticated companies have begun to take a two-track approach, as upheld in several data breach cases, where more traditional regulatory compliance and operational activities proceed on one side while legal advice and attorney work product remain on the other. This separation can help organizations doing business in California feel more in control of their legal protections and proactive in safeguarding privileged information.

How can companies prepare for a heightened risk of data breach litigation?

The risk that opposing counsel could obtain copies of up to five years of cybersecurity audits during discovery may disincentivize companies from fully participating in cybersecurity audits. The risk of resource and cost-intensive class action litigation, whether the claim has merit, may be especially impactful for startup businesses that may not yet have as robust a cybersecurity program or legal team as more established companies. The intersection of audit requirements and data breach litigation may create an environment where organizations are more hesitant to candidly document undesirable findings.

However, as in judo, the martial art where an individual uses an opponent's weight to their advantage, entities can view the weight of a cybersecurity audit as an opportunity to build a strong defense against claims of cybersecurity negligence or regulatory violations. This perspective can help the audience feel optimistic about leveraging an audit as a strategic tool in litigation defense.

A strong showing in a cybersecurity audit conducted under an approved cybersecurity framework, such as those issued by the U.S. National Institute of Standards and Technology, International Organization for Standardization or Center for Internet Security, demonstrates that the organization has invested time, talent and infrastructure to minimize, not eliminate, cybersecurity risk. A cybersecurity audit can help eliminate actual compliance gaps as well as perceived gaps, where ambiguous discussions about cybersecurity readiness could paint an incorrect picture of what is otherwise a robust and appropriate security posture.

No defense system is perfect, but one goal of a company audit is to provide a clear, evidence-based picture of its cybersecurity practices to rebut any claims of negligence and deter litigation.

This content is eligible for Continuing Professional Education credits. Please self-submit according to CPE policy guidelines.

Submit for CPEs

Contributors:

Charles Westerhaus

CIPP/E, CIPP/US, CIPM, FIP

Associate

Faegre Drinker Biddle and Reath LLP

Lukas Stoutenour

Associate

Faegre Drinker Biddle and Reath LLP

Craig Heeren

Partner

Faegre Drinker Biddle and Reath LLP

Tags:

Law and regulation Litigation and case law CCPA/CPRA Privacy Cybersecurity law

Related Stories

### New year, new rules: US state privacy requirements coming online as 2026 begins 5 Jan. 2026

### California adopts Cybersecurity Audit Rule, outlining 'reasonable' cybersecurity 24 July 2025

ANALYSIS

### CPPA Board finalizes long-awaited ADMT, cyber audit, risk assessment rules 25 July 2025

### Power in the margins: Why diversity is foundational to privacy excellence 14 April 2026

OPINION

Named provisions

Discovery and privilege

Get daily alerts for IAPP Privacy News

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from Faegre Drinker.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
Faegre Drinker
Published
April 14th, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Minor

Who this affects

Applies to
Businesses Technology companies Retailers
Industry sector
5112 Software & Technology
Activity scope
Cybersecurity audits Data breach litigation Regulatory compliance
Geographic scope
California US-CA

Taxonomy

Primary area
Data Privacy
Operational domain
Legal
Compliance frameworks
CCPA/CPRA
Topics
Cybersecurity Consumer Protection Class Action Litigation

Get alerts for this source

We'll email you when IAPP Privacy News publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!