US Data Protection Laws: Federal and State Landscape
The United States data protection landscape is defined not by a single omnibus statute but by a patchwork of sector-specific federal laws, agency enforcement regimes, and an accelerating body of state-level privacy legislation. This page maps the federal and state regulatory framework, identifies the agencies and statutes that govern personal data collection, processing, and disclosure, and outlines the structural tensions that shape compliance obligations across industries. It serves as a reference for legal professionals, compliance officers, privacy engineers, and policy researchers operating within or intersecting US data protection requirements.
- Definition and scope
- Core mechanics or structure
- Causal relationships or drivers
- Classification boundaries
- Tradeoffs and tensions
- Common misconceptions
- Checklist or steps
- Reference table or matrix
Definition and scope
US data protection law governs the collection, storage, processing, sharing, and disposal of personal information held by private entities and, to a more limited degree, government agencies. Unlike the European Union's General Data Protection Regulation (GDPR), which established a single horizontal framework across member states, the United States operates through vertical sectoral statutes — each targeting a specific industry, data type, or population segment.
At the federal level, the primary operative statutes include the Health Insurance Portability and Accountability Act (HIPAA, 1996), the Gramm-Leach-Bliley Act (GLBA, 1999), the Children's Online Privacy Protection Act (COPPA, 1998), the Family Educational Rights and Privacy Act (FERPA, 1974), and the Fair Credit Reporting Act (FCRA, 1970). The Federal Trade Commission Act, Section 5 (15 U.S.C. § 45), grants the FTC authority to take action against unfair or deceptive trade practices, which the Commission has applied extensively to data security failures.
At the state level, the California Consumer Privacy Act (CCPA, 2018) and its amendment the California Privacy Rights Act (CPRA, 2020) established the most comprehensive state-level rights framework, including the right to know, delete, correct, and opt out of the sale of personal information. By 2024, at least 19 states had enacted comprehensive consumer privacy statutes (IAPP State Privacy Legislation Tracker), with Virginia, Colorado, Connecticut, Texas, and Montana among those with laws in force.
The scope of these laws is shaped by three primary variables: the type of data involved, the type of entity collecting it, and the jurisdiction in which the data subject resides. The personally identifiable information definitions reference page provides a cross-statutory breakdown of how PII is defined across major federal and state regimes.
Core mechanics or structure
Federal data protection statutes operate through a combination of covered entity definitions, data use restrictions, administrative safeguard requirements, breach notification mandates, and enforcement penalties.
HIPAA applies to covered entities — healthcare providers, health plans, and healthcare clearinghouses — and their business associates. The HIPAA Privacy Rule (45 CFR Part 164) restricts the use and disclosure of protected health information (PHI). The Security Rule mandates administrative, physical, and technical safeguards for electronic PHI. Civil monetary penalties under HIPAA range from $137 to $2,067,813 per violation category per year (HHS Office for Civil Rights, updated civil monetary penalty tiers), with tiers based on culpability.
GLBA applies to financial institutions and requires three components: a privacy notice to consumers, a safeguards rule governing the security of nonpublic personal information, and an opt-out right for third-party data sharing. The FTC's Safeguards Rule, updated in 2021 (16 CFR Part 314), requires qualifying financial institutions to implement a written information security program and designates a qualified individual to oversee it. Details on this framework are covered in the Gramm-Leach-Bliley financial data reference.
COPPA applies to operators of websites and online services directed to children under 13, requiring verifiable parental consent before collecting personal information. Enforcement authority rests with the FTC, which has issued civil penalties in excess of $5 million in individual enforcement actions (FTC v. Musical.ly/TikTok, 2019).
CCPA/CPRA apply to for-profit businesses that meet one of three thresholds: annual gross revenues exceeding $25 million, annual buying, selling, or sharing the personal information of 100,000 or more consumers or households, or deriving 50% or more of annual revenues from selling consumers' personal information (Cal. Civ. Code § 1798.140). The CCPA/CPRA compliance reference details the operational obligations under these statutes.
State breach notification laws constitute a parallel structural layer. All 50 states, plus the District of Columbia, Puerto Rico, and the US Virgin Islands, have enacted breach notification statutes (NCSL Breach Notification Laws), though trigger definitions, notification timelines, and covered entities vary substantially. The data breach notification requirements reference covers state-by-state variation.
Causal relationships or drivers
The fragmented character of US data protection law results from discrete legislative responses to industry-specific harms rather than a unified policy design. HIPAA emerged from concerns about health insurer portability and the secondary effect of protecting medical record confidentiality. GLBA followed the repeal of Glass-Steagall and the convergence of financial services, creating new data-sharing risks between banking, insurance, and securities arms of consolidated institutions.
COPPA was enacted in direct response to documented practices of commercial websites collecting children's personal data without parental knowledge, following FTC reports to Congress in 1996 and 1998. FCRA predates the internet era and was designed to address errors and misuse in consumer credit files maintained by reporting agencies.
State privacy legislation from 2018 onward was catalyzed primarily by the Cambridge Analytica disclosure involving Facebook user data (2018), which demonstrated the scale of commercial data use without meaningful consumer awareness. California's CCPA passed within months of that disclosure. The absence of a federal comprehensive privacy law has driven legislative activity at the state level, creating compliance complexity for organizations operating nationally.
Enforcement agency capacity also shapes the landscape. The FTC operates with a budget and staff insufficient to litigate every data security failure, leading to consent decree-based remediation as the predominant enforcement mechanism. The FTC data security enforcement reference documents the consent decree structure and major precedent actions.
Classification boundaries
US data protection obligations are delineated along four primary classification axes:
By data type: Sector-specific statutes govern health data (HIPAA), financial data (GLBA, FCRA), children's data (COPPA), educational records (FERPA), and consumer credit data (FCRA). Comprehensive state laws apply to personal information broadly, with heightened protections for sensitive data categories including biometric identifiers, geolocation, mental health, and sexual orientation data. The biometric data protection laws reference covers state-specific biometric statutes including Illinois's Biometric Information Privacy Act (BIPA).
By entity type: HIPAA applies to covered entities and business associates. GLBA applies to financial institutions as defined by the FTC and bank regulatory agencies. COPPA applies to website and app operators. State privacy laws typically apply to for-profit commercial entities meeting size or data volume thresholds, with nonprofit and government entity exemptions varying by statute.
By data subject residency: State laws protect residents of the enacting state, meaning a business headquartered in Ohio may be subject to Virginia, Colorado, and Texas privacy law if it processes personal data of residents of those states. This residency-based trigger, rather than a business domicile trigger, is the predominant model in state statutes enacted after 2020.
By processing activity: Some statutes restrict specific processing activities — sale, profiling, targeted advertising — independently of general data security obligations. CCPA/CPRA, for instance, creates an opt-out right specifically for the "sale" or "sharing" of personal information, with "sharing" defined to include cross-context behavioral advertising even absent monetary consideration (Cal. Civ. Code § 1798.140(ah)).
Tradeoffs and tensions
Federal preemption vs. state innovation: Proposals for a federal comprehensive privacy law, including the American Data Privacy and Protection Act (ADPPA), have stalled in part over whether federal law would preempt stronger state protections. California and other states with established regulatory infrastructure have opposed broad preemption provisions. The preemption debate represents a structural tension between national compliance uniformity for businesses and the policy flexibility of state-level experimentation.
Enforcement authority fragmentation: No single federal agency holds general-purpose data protection authority. The FTC lacks rulemaking authority under APA Section 553 for unfair or deceptive acts without satisfying a substantial burden of proof standard established in FTC v. Wyndham Worldwide Corp. (3d Cir. 2015). Sector-specific agencies — HHS Office for Civil Rights for HIPAA, CFPB for financial data, FCC for telecommunications — operate with bounded jurisdictions that can leave cross-sector data flows under-regulated.
Consumer rights vs. operational feasibility: State privacy laws granting deletion and portability rights impose operational costs that scale nonlinearly with data volume and system architecture. For organizations processing tens of millions of consumer records, rights fulfillment infrastructure represents a material compliance cost that smaller market entrants may be less equipped to absorb, potentially concentrating market power.
Security requirements vs. data minimization: Breach notification laws create incentives to collect and retain detailed identifying information to notify affected individuals — which stands in tension with data minimization principles that reduce breach exposure by limiting data collection in the first instance. The NIST Privacy Framework addresses this tension by treating data processing as a risk to be managed rather than solely a compliance checkbox.
Common misconceptions
Misconception: HIPAA applies to any entity that handles health data.
Correction: HIPAA applies only to covered entities (healthcare providers, health plans, healthcare clearinghouses) and their business associates under contract. A fitness app that collects health data from users is not a HIPAA covered entity and is not subject to HIPAA's Privacy or Security Rules unless it processes data on behalf of a covered entity. The FTC's Health Breach Notification Rule (16 CFR Part 318) may apply instead.
Misconception: Compliance with one state's privacy law provides compliance with all others.
Correction: State privacy laws differ materially in threshold definitions, data subject rights, consent requirements, and cure periods. Virginia's Consumer Data Protection Act (CDPA) has no private right of action; Illinois's BIPA does, with statutory damages of $1,000 to $5,000 per violation (740 ILCS 14/20). A single compliance program calibrated to one state's requirements will not satisfy the requirements of another.
Misconception: Encryption eliminates breach notification obligations.
Correction: Encryption of data at rest provides a safe harbor under specific state breach notification statutes, but the safe harbor conditions vary. Some statutes require the encryption key to also be uncompromised. Others apply the safe harbor only to specific data elements. The safe harbor is a statutory provision, not a universal rule, and must be evaluated on a state-by-state basis.
Misconception: The FTC has comprehensive rulemaking authority over data privacy.
Correction: The FTC's primary authority derives from Section 5 of the FTC Act, which prohibits unfair or deceptive acts or practices. The agency can bring enforcement actions and negotiate consent decrees, but its authority to issue binding substantive privacy rules is procedurally constrained and has been contested in litigation. The federal data protection agencies reference provides a detailed agency-by-agency authority analysis.
Checklist or steps
The following sequence reflects the standard operational process for mapping data protection obligations to a specific organization's profile. This is a structural description of the compliance determination process, not legal advice.
- Identify all data types collected — categorize personal information by type (health, financial, biometric, children's, consumer) to determine which sector-specific federal statutes apply.
- Identify covered entity status — determine whether the organization qualifies as a HIPAA covered entity, GLBA financial institution, COPPA operator, or FCRA consumer reporting agency under the operative statutory definitions.
- Map data subject residency — identify the states in which data subjects reside to determine which state privacy laws apply based on residency-triggered thresholds.
- Apply state law thresholds — evaluate revenue, data volume, and data sale revenue thresholds for each applicable state statute to confirm whether obligations are triggered.
- Identify processing activities subject to restriction — catalog data uses including sale, sharing for advertising, profiling, and automated decision-making, which may be subject to opt-out rights or consent requirements independent of general data handling.
- Assess breach notification obligations — identify notification trigger definitions, timing requirements, and regulatory notification obligations under each applicable state statute and any applicable federal rule (HIPAA Breach Notification Rule, FTC Health Breach Notification Rule).
- Inventory third-party data relationships — identify vendors, service providers, and business associates receiving personal data and assess contractual data protection requirements under applicable statutes. The third-party vendor data security reference addresses contract structure standards.
- Document a written information security program — required by GLBA Safeguards Rule, HIPAA Security Rule, and 20+ state statutes; document administrative, technical, and physical safeguards proportionate to data sensitivity and volume.
- Establish data subject rights fulfillment processes — implement mechanisms to receive, verify, and respond to access, deletion, correction, and portability requests within statutory timeframes (45 days under most state laws, with one 45-day extension).
- Conduct and document a data protection impact assessment — required or recommended under HIPAA, NIST Privacy Framework, and comprehensive state laws for high-risk processing activities. The privacy impact assessments reference covers assessment methodology standards.
Reference table or matrix
| Statute | Enforcing Agency | Covered Entities | Key Data Type | Penalty Range | Private Right of Action |
|---|---|---|---|---|---|
| HIPAA Privacy & Security Rules | HHS Office for Civil Rights | Covered entities, business associates | Protected health information (PHI) | $137–$2,067,813/violation category/year (HHS OCR) | No (with limited exceptions) |
| GLBA Safeguards Rule | FTC, OCC, FDIC, Fed Reserve | Financial institutions | Nonpublic personal financial information | FTC civil penalties up to $51,744/day (16 CFR Part 314) | No |
| COPPA | FTC | Operators of child-directed websites/apps | Children's personal information (under 13) | Up to $51,744/violation (16 CFR Part 312) | No |
| FCRA | FTC, CFPB | Consumer reporting agencies, furnishers | Consumer credit/background data | $100–$1,000/willful violation; actual damages | Yes |
| FERPA | US Dept. of Education | Educational institutions receiving federal funds | Student education records | Loss of federal funding | No |
| CCPA/CPRA | California Privacy Protection Agency | For-profit businesses meeting thresholds | Consumer personal information | $2,500/unintentional, $ |