In this guide:
- What CIPA actually is: the full definition and origin story
- The three sections of CIPA that matter for websites
- How CIPA got extended to websites: the court decisions
- Who CIPA applies to — and the out-of-state trap
- CIPA vs. CCPA vs. GDPR
- What actually triggers a CIPA violation
- What CIPA compliance actually requires
- Frequently asked questions
The 1967 law that is currently suing thousands of modern websites
In 1967, California passed a law to stop people from tapping phone lines. Richard Nixon was in his first term. The internet wouldn't exist for another two decades. The smartphone was forty years away.
That law is currently being used to sue thousands of websites for running Google Analytics.
This is not a legal technicality or a fringe theory. The California Invasion of Privacy Act — CIPA — has become one of the most actively litigated privacy laws in the United States, and the overwhelming majority of its targets are ordinary businesses that had no idea they were doing anything wrong. They had analytics tools. They had a chat widget. They had a session replay script their marketing team installed two years ago and forgot about.
What is CIPA? The California Invasion of Privacy Act (Cal. Penal Code §§ 630–638.55) is a California wiretapping statute that prohibits the interception of communications without the consent of all parties involved. Originally enacted to prevent telephone eavesdropping, courts have extended it to cover website tracking technologies — including analytics tools, advertising pixels, and session replay software — that capture user data in real time through third-party vendors. Violations carry statutory damages of $5,000 per incident, with no requirement to prove actual harm.
The reason you need to understand this now — before a demand letter arrives, before your general counsel is forwarding you something with a deadline on it — is that CIPA exposure is almost entirely preventable when you know what creates it. It is significantly harder and more expensive to address after the fact.
This guide is the complete explanation. By the end, you'll know exactly what CIPA is, which parts of the law apply to your website, who is genuinely at risk, and what the compliance standard actually requires. Not in legal language. In plain English, written for the people who build and run websites, not the people who litigate them.
What CIPA actually is: the full definition and origin story
The full name is the California Invasion of Privacy Act. It was signed into law in 1967 by Governor Ronald Reagan, during a period when wiretapping technology had advanced faster than the laws designed to contain it. Organized crime was using listening devices. Law enforcement was using them too, sometimes without warrants. Private investigators were tapping the phones of business rivals and estranged spouses. California's legislature decided the federal standard wasn't strong enough and passed something stricter.
That stricter standard is the thing that makes CIPA dangerous for businesses today.
The all-party consent rule
Federal wiretapping law — the Electronic Communications Privacy Act — operates on a one-party consent basis. If you are a participant in a conversation, you can record it without telling the other person. California rejected this standard entirely. Under CIPA, every party to a communication must consent to its interception. Not one. Not a majority. Everyone.
This distinction sounds technical. Its practical consequences are enormous.
Under federal law and the laws of most states, a company that records its own customer service calls, captures its own web chat conversations, or deploys analytics tools to observe its own users is generally protected — it is a party to those communications, and one-party consent is satisfied. Under CIPA, that reasoning fails the moment a third party enters the picture. If a vendor's infrastructure is involved in capturing the communication — even as a passive technical intermediary — the all-party consent requirement applies to them too. And your users almost certainly haven't consented to a vendor they've never heard of intercepting their activity on your website.
This is the mechanism that turns a routine MarTech stack into a potential wiretapping violation.
Where CIPA lives in California law
CIPA is codified in California Penal Code §§ 630 through 638.55. That address in the penal code is not a coincidence — CIPA is a criminal statute. Violations of its core provisions are misdemeanors under California law, punishable by fines and imprisonment.
For most businesses, however, the criminal exposure is theoretical. What is very much not theoretical is the civil enforcement mechanism built into the statute. Section 637.2 gives any person whose communications were intercepted in violation of CIPA the right to sue — individually or as part of a class action — and to collect statutory damages of $5,000 per violation or three times actual damages, whichever is greater. The plaintiff does not need to demonstrate that the interception caused them any harm. The violation itself triggers the right to collect.
This combination — criminal statute, broad private right of action, no-harm-required damages — is what separates CIPA from the modern privacy laws that most compliance teams are familiar with. The California Consumer Privacy Act requires companies to disclose their data practices and honor opt-out requests, but its private right of action is narrow. GDPR creates obligations around lawful basis for processing but enforcement runs through regulatory bodies. CIPA hands every California resident a personal enforcement mechanism with a $5,000 floor, no proof of injury required, and the right to multiply it across every interaction on your website.
From phone lines to web pages: the short version
For the first three decades of its existence, CIPA was essentially what it looked like — a telephone privacy law. It governed wiretaps, recording devices, pen registers attached to phone lines. It had no obvious application to the internet because the internet didn't exist, and when it did exist, the statute's language hadn't been tested in that context.
That began to change in the mid-2000s, when California courts first considered whether CIPA's provisions could extend to digital communications. The answer, developed through a series of decisions between 2006 and the present, was increasingly yes — yes to out-of-state businesses serving California users, yes to website tracking technologies, yes to third-party vendors as potential eavesdroppers, yes to session replay tools and tracking pixels and chat widgets as the functional equivalents of the wiretapping equipment the legislature had in mind in 1967.
By the time CIPA demand letters began arriving in large volumes in 2022 and 2023, the legal framework supporting them had been a decade in the making.
The three sections of CIPA that matter for websites
CIPA is not a single prohibition. It is a collection of related provisions covering different types of privacy violations, each with its own legal threshold, its own category of technology most likely to trigger it, and its own set of defenses. Understanding which section is being invoked in a claim — or which section your website might be vulnerable under — is the first step toward understanding your actual exposure.
Section 631(a) — the wiretapping and eavesdropping provision
Section 631(a) is the core of CIPA and the section most frequently cited in demand letters and litigation involving website tracking. In plain terms, it prohibits three things: intentionally tapping a wire or cable to intercept communications, using an electronic device to read or learn the contents of a communication while it's in transit, and helping someone else do either of those things.
The phrase that matters most for websites is "while in transit." Courts have interpreted this to mean that the interception must be happening in real time — as the communication is being transmitted, not after it has been stored. This is the legal mechanism that puts session replay tools and live chat widgets in a different risk category than your CRM accessing a stored customer record.
The third-party eavesdropper theory is what makes Section 631(a) dangerous for modern websites specifically. Plaintiffs' attorneys have successfully argued that when a website embeds third-party tracking tools, the user is the sender, your company is the intended recipient, and the vendor — Meta, Google, Hotjar, whoever built the tool — is the third party whose infrastructure captures the communication as it transits. If that vendor can use the captured data for its own independent purposes, it is not acting as your agent. It is eavesdropping.
The key technologies to understand as Section 631(a) risks are session replay tools that capture keystrokes, mouse movements, and form inputs in real time; live chat and chatbot widgets where user messages pass through a vendor's servers before reaching you; and any tool that captures the contents of what users type into search bars, contact forms, or account fields.
Section 632 — the confidential communications provision
Section 632 prohibits intentionally recording or eavesdropping on a "confidential communication" without the consent of all parties — where "confidential" means a communication that at least one party reasonably expects is not being overheard or recorded by anyone not present.
Section 632 appears less frequently in website tracking demand letters than Section 631(a), but it surfaces in claims involving recorded customer service calls, video chat features, voice-enabled website tools, and any feature where a user might reasonably believe they are having a private conversation. If your website involves any recorded or live voice or video communication with users, Section 632 belongs in your risk assessment.
Section 638.51(a) — the pen register and trap-and-trace provision
Section 638.51(a) is the provision most people haven't heard of and the one that makes tracking pixels specifically dangerous under CIPA. A pen register, in its original telephony context, records the numbers dialed from a telephone — not the content of calls, but metadata about who was called and when. Courts have extended this language to website tracking technologies that function analogously.
This is where tracking pixels — Meta Pixel, Google Ads conversion tracking, Pinterest Tag, TikTok Pixel — primarily land in CIPA litigation. These tools record that a user with a particular identifier visited a particular page, came from a particular source, and took or didn't take a particular action. That is metadata about communication and behavior — and Section 638.51(a) covers metadata.
The legal threshold here is meaningfully different from Section 631(a). Section 631 requires showing that the contents of communications were intercepted. Section 638.51 requires only showing that a pen register equivalent was used without prior consent. In St. Aubin v. Carbon Health (N.D. Cal. 2024), the court further held that descriptive URLs — web addresses that reveal what a user was searching for — can qualify as communication contents under Section 631, not merely metadata. The line between the two sections is blurrier in practice than it appears in theory.
| CIPA section | What it covers | Website technologies most at risk | Key legal threshold |
|---|---|---|---|
| § 631(a) | Interception of communication contents in transit | Session replay tools, live chat, chatbots, form capture | Real-time interception of contents by a third party |
| § 632 | Recording of confidential communications | Recorded calls, video chat, voice-enabled features | Communication was reasonably confidential; recording without all-party consent |
| § 638.51(a) | Installation of pen registers / trap-and-trace devices | Advertising pixels, behavioral tracking tags | Use of metadata-capturing tool without prior consent |
How CIPA got extended to websites: the court decisions that changed everything
CIPA did not become a website compliance problem overnight. What happened was quieter and in some ways more consequential: a sequence of court decisions, each building on the last, that gradually stretched a 1967 telephone privacy statute across the architecture of the modern web.
2006 — the geographic wall comes down
The first major expansion of CIPA's reach had nothing to do with tracking technology. It was about geography. Before 2006, the prevailing assumption was that CIPA was a California law in the traditional sense — it applied to conduct occurring in California, by parties located in California. A 2006 California court decision ended that assumption. The court held that CIPA's protections extend to California residents regardless of where the other party to the communication is located. The location of the business, the servers, the vendor, or the intercepting technology is irrelevant. What matters is where the protected party was when the communication occurred.
2020 — website tracking enters the frame
The second pivotal expansion came in 2020, when California courts began seriously entertaining the argument that website tracking technologies could constitute interception of communications under CIPA. Courts held that website interactions could constitute communications, that third-party tools capturing those interactions in real time could constitute interception, and that the all-party consent requirement applied. The door to website tracking litigation under CIPA was now open.
Javier v. Assurance IQ (9th Cir. 2022) — the third-party eavesdropper theory arrives
If there is a single case that gave the current wave of CIPA demand letters its legal foundation, it is Javier v. Assurance IQ, decided by the Ninth Circuit Court of Appeals in May 2022. The facts were straightforward: a user visited a website and filled out an insurance quote form while a session replay tool captured their keystrokes and form inputs in real time, transmitting that data to the vendor's servers.
The Ninth Circuit's ruling turned on whether the third-party vendor qualifies as an unauthorized eavesdropper or is simply acting as the website operator's agent. The court held that the answer depends on whether the vendor has the capacity to use the collected data for its own independent purposes. If a vendor can use the data for its own commercial benefit, it is not merely an extension of the website operator. It is a third party with its own interests in the communication — and potentially an eavesdropper under Section 631(a).
Graham v. Noom (N.D. Cal. 2021) — the tape recorder exception
In Graham v. Noom, a plaintiff alleged that Noom's use of FullStory violated CIPA. The court dismissed the claim. The key facts were contractual: Noom's agreement with FullStory explicitly prohibited FullStory from using the collected data for any purpose other than providing the session replay service to Noom. Under those conditions, the court reasoned FullStory was not an independent third party — it was a service provider acting entirely on Noom's behalf. A tape recorder, not an eavesdropper.
Graham v. Noom established that the tape recorder exception is real and available, but it defined precisely what it requires: a contractual restriction on vendor data use. A vendor agreement that lacks that restriction does not support the exception, regardless of what you believed about how those vendors operate.
St. Aubin v. Carbon Health (N.D. Cal. 2024) — descriptive URLs as communication contents
St. Aubin expanded Section 631(a)'s reach in a way that affects a much broader range of websites. The question was whether URLs captured by tracking tools could constitute the "contents" of a communication. The court denied the motion to dismiss, holding that descriptive URLs — the kind that embed specific information about what a user was searching for or viewing — can plausibly qualify as communication contents. A URL like /results?condition=diabetes doesn't just tell you where a user went. It tells you what they were looking for. That, the court held, is substantive information that Section 631(a) protects.
Any website with a search function, filtered browsing, or URLs that encode user intent — e-commerce searches, media content queries, SaaS onboarding flows — is potentially affected. The contents-versus-metadata distinction that had offered a relatively clean defense for analytics and pixel tracking is now less clean than it appeared.
What the timeline tells you
The arc of this case law has moved consistently in one direction: toward broader application, more specific liability triggers, and a more demanding definition of what consent mechanisms must actually do to be legally sufficient. What remains consistently standing is genuine, prior, technically enforced consent. Not a banner. Not a policy. A technical system that prevents tracking from occurring until a user has affirmatively indicated they consent to it.
Who CIPA applies to — and the out-of-state trap most businesses miss
If your website is accessible to California residents and any California resident has used it, CIPA applies to you. Not potentially. Not if certain conditions are met. It applies to you right now, regardless of where your company is located, where your servers are hosted, or whether California has ever crossed your mind as a relevant jurisdiction.
The four misconceptions that get businesses into trouble
"We're not a California company." Your state of incorporation and the location of your headquarters are irrelevant to CIPA jurisdiction. The law protects California residents, not California businesses. The relevant question is not where you are. It is where your users are.
"We don't specifically target California." The absence of California-targeted advertising or California-focused operations does not remove you from CIPA's reach. If your website is publicly accessible, you are within the statute's scope.
"Our servers aren't in California." Server location has never been the operative factor in CIPA jurisdiction. The interception that CIPA prohibits occurs where the communication is captured — wherever the user is sitting.
"We have no offices or employees in California." Physical presence is irrelevant. CIPA's long-arm jurisdiction is grounded in the residence of the protected party, not the physical presence of the defendant. This has been settled law since 2006.
Who is most at risk in practice
E-commerce and DTC brands with national audiences sit at the top of the risk profile. These businesses typically run aggressive MarTech stacks and serve California residents at high volume. California is the most populous state in the country. A national DTC brand almost certainly has California as one of its top three markets.
SaaS companies with self-serve sign-up flows are similarly exposed. The sign-up flow is precisely the kind of high-intent interaction that session replay tools are most commonly deployed to analyze — and where users are most likely to be typing sensitive information into forms.
Beauty, lifestyle, and consumer brands are an increasingly targeted vertical. The DTC beauty and cosmetics space in particular has seen growing demand letter activity, as plaintiffs' attorneys have identified it as a category where MarTech sophistication significantly outpaces privacy compliance sophistication.
Healthcare and financial services websites carry elevated risk because of the sensitivity of the information users are likely to be entering — symptoms, account details — which per St. Aubin may be classifiable as communication contents rather than mere metadata.
Media and publishing sites face elevated risk specifically under the pen register provision. These sites typically run extensive advertising infrastructure that captures detailed metadata about what users read, search for, and engage with.
The real risk variable: technical compliance, not traffic volume
There is no traffic threshold below which CIPA definitively does not apply. But the risk variable that matters most in practice is not how much California traffic you have. It is whether your website's tracking configuration is visibly non-compliant to an automated scan. Plaintiffs' attorneys use scanning tools to identify websites with specific technology signatures — tracking scripts present, consent mechanism not enforcing blocking, tags firing before consent. The businesses that fall outside the targeting radius are not the ones with low California traffic. They are the ones whose consent infrastructure is configured correctly.
CIPA vs. CCPA vs. GDPR: how it fits into the privacy law landscape
If you have a privacy compliance program, you have almost certainly heard of CCPA. If your business operates internationally, you have almost certainly heard of GDPR. The question that matters: does any of that work protect you from CIPA?
The answer is partially, imperfectly, and probably not as much as you think — and the gap between your existing compliance posture and genuine CIPA compliance is almost always located in the same place: whether your website's tracking tools are actually blocked before a user gives permission.
CIPA vs. CCPA — the comparison that matters most
CCPA is a transparency and control framework. It tells businesses what they must disclose about their data collection practices, gives California residents rights to access and delete their data, and requires businesses to honor opt-out requests. Its private right of action is narrow — limited primarily to data breach scenarios.
CIPA operates on a completely different theory. It does not ask whether you disclosed your data collection practices. It asks whether the interception of a communication occurred without the prior consent of all parties — and if it did, any affected California resident can sue you individually, without proving harm, for $5,000 per violation.
The critical practical consequence: a company can have a fully CCPA-compliant privacy program — accurate disclosures, functioning opt-out mechanisms, a well-maintained privacy policy — and still receive a valid CIPA demand letter the next morning. CCPA compliance addresses what you disclose. CIPA compliance addresses what your technology does before disclosure is even relevant.
CIPA vs. CPRA — the GPC intersection
The California Privacy Rights Act — the 2023 amendment to CCPA — added one provision that intersects directly with CIPA compliance: the requirement to honor Global Privacy Control signals. When a GPC-enabled user lands on your site, your system must detect that browser-level signal and honor it immediately, before any tracking executes. Businesses that have invested in consent banners but have not specifically implemented GPC signal detection are operating with a gap that is increasingly being cited in demand letters as an independent basis for claims.
CIPA vs. GDPR — the comparison international teams reach for
GDPR requires a lawful basis for processing personal data. Consent is one lawful basis among six — and for many common data processing activities, companies rely on legitimate interests or contractual necessity rather than consent. A company using Google Analytics under a legitimate interests basis may be fully GDPR-compliant without ever obtaining explicit user consent for analytics tracking.
CIPA has no concept of legitimate interests. It has no alternative lawful bases. It has one requirement: all-party consent before interception. A company that is GDPR-compliant under a legitimate interests basis for its analytics tracking is not CIPA-compliant.
Where GDPR compliance does provide meaningful overlap is in the technical implementation of consent. A GDPR consent mechanism built to the freely-given, specific, informed, unambiguous standard — one that blocks tracking until explicit consent is received — is architecturally aligned with what CIPA requires. GDPR legitimate interests assessments, however, are entirely irrelevant to CIPA and must be evaluated separately.
The insight that unifies all three
Strip away the jurisdictional differences and the one requirement that sits at the intersection of genuine compliance with CIPA, CCPA, CPRA, and GDPR simultaneously is this: tracking must not begin before a user has had a meaningful opportunity to make an informed choice about it. A consent management system that actually prevents tracking from executing until the user's preference is known and honored satisfies all of them simultaneously — not because it is a legal instrument, but because it is the right technical architecture for the problem all four laws are trying to solve.
| CIPA | CCPA / CPRA | GDPR | |
|---|---|---|---|
| Consent standard | All-party prior consent before interception | Opt-out (sale/sharing); opt-in for sensitive data | Lawful basis required; consent is one of six bases |
| Private right of action | Broad — any individual, any violation | Narrow — data breach only | Regulatory enforcement; limited individual claims |
| Harm required to sue | No | No (breach claims) | No (regulatory); varies (civil) |
| Penalty per violation | $5,000 or 3× actual damages | Up to $7,500 per intentional violation | Up to €20M or 4% global revenue |
| Geographic scope | Any business serving CA residents | Businesses meeting CA revenue/data thresholds | Any business processing EU resident data |
| Does other law's compliance equal CIPA compliance? | — | No | No |
What actually triggers a CIPA violation: the four technologies at risk
The place to start is not with a list of dangerous technologies. It is with the structure that makes any technology dangerous under CIPA — because once you understand the structure, you can evaluate any tool in your stack against it.
The three-party requirement — the framework for everything
CIPA's wiretapping provision does not prohibit a company from observing its own users. It prohibits a third party from intercepting communications without all-party consent. A two-party interaction — where your own server processes a user's request and your own code observes the result — is not a CIPA violation. The moment you introduce a third-party vendor whose infrastructure captures that interaction, the structure changes. Whether that vendor qualifies as an unauthorized eavesdropper or your agent depends on two variables: timing (real-time capture vs. post-hoc access to stored data) and independence (does the vendor use the data for its own purposes, or is it contractually restricted to acting solely on your behalf).
Advertising pixels — the pen register risk
Meta Pixel, Google Ads conversion tracking, Pinterest Tag, TikTok Pixel, and their equivalents are most commonly cited under Section 638.51(a). When a user loads a page on your site, these pixels fire and transmit data to the respective platform's servers in real time — before the user has necessarily done anything at all. The advertising platforms receiving this data are not acting as your agents. Meta is using Pixel data to power its own advertising business. Google is using conversion data to improve its own ad targeting. These vendors have their own significant interests in the data being transmitted, which directly defeats the tape recorder exception.
Analytics platforms — behavioral capture in real time
Google Analytics, Adobe Analytics, Mixpanel, Amplitude, and similar platforms capture behavioral data in real time and transmit it to third-party servers. These tools occupy a more legally nuanced position than advertising pixels — analytics vendors are generally more restricted in how they use collected data — but they are not outside CIPA's reach. Several CIPA claims involving Google Analytics specifically have survived motions to dismiss. Google Tag Manager compounds the risk because it acts as a container: a single misconfigured GTM deployment that fires on page load before consent can introduce multiple Section 631 and Section 638.51 risks simultaneously.
Session replay tools — the most direct wiretapping analogy
Hotjar, FullStory, Microsoft Clarity, LogRocket, Mouseflow, and their equivalents present the most direct factual analogy to telephone wiretapping and carry the highest risk profile under Section 631(a). These tools capture every mouse movement, every keystroke, every scroll, every character typed into every field before the user decides whether to submit. When a user types into a search bar, fills out a contact form, or enters information into a sign-up flow, they are communicating. A session replay tool capturing every keystroke as it is typed — including characters the user later deletes — is capturing communication contents in real time. The tape recorder exception is available for session replay tools, but only if your vendor agreement explicitly prohibits the vendor from using collected data for its own commercial purposes.
Chat and conversational tools — the most intuitive risk
Live chat widgets, AI chatbots, customer support tools, and conversational commerce features are the technology category where the wiretapping analogy is most immediately obvious. When a user types a message into your website's chat window, that message is a communication in the most straightforward possible sense. A chat vendor whose infrastructure routes that message through its own servers — capturing it, processing it, and potentially using it for its own purposes — is doing exactly what CIPA's eavesdropping provision was designed to address. Many chat tools also load and begin capturing pre-chat behavioral data before any conversation starts, meaning the interception begins at widget load rather than first message.
Risk gradients — not all tools are equal
Session replay tools carry the highest risk because they capture communication contents in real time and the case law behind § 631(a) claims is the most developed. Advertising pixels carry substantial risk under § 638.51 specifically because the vendors receiving the data explicitly use it for their own independent commercial purposes. Analytics platforms carry genuine but more defensible risk, particularly where vendor agreements contain meaningful data use restrictions. The common thread is not the technology itself. It is the combination of real-time capture and third-party data independence. Your vendor agreements, not just your technology inventory, determine where you actually sit in the risk distribution.
What CIPA compliance actually requires: the standard in plain terms
CIPA compliance is not a documentation exercise. It is not a policy update. It is an engineering requirement with legal consequences — one that lives or dies in the milliseconds between a user loading your page and your tracking tools deciding whether to fire.
The three non-negotiable requirements
Prior consent is the foundational requirement. CIPA requires that all parties to a communication consent to its interception before the interception occurs. A user who is shown a banner after your tracking scripts have already fired has not consented to the interception that already happened. What prior consent means technically is not that a banner has appeared — it is that your tracking infrastructure has been prevented from executing until a verifiable user signal indicating consent has been received and processed.
Accurate consent UI means that your consent mechanism truthfully describes what it controls and technically enforces what it claims. Your banner must accurately represent which tracking tools activate upon acceptance. When a user clicks "reject all," the tools in that category must actually stop firing — in every browser, on every device, on every page of your site. The gap between what a consent banner claims to control and what it actually controls in practice is where most consent mechanism failures live.
Vendor contract hygiene is the requirement that operates furthest from the user interface and closest to legal counsel. As established in Graham v. Noom, whether a third-party vendor qualifies as an unauthorized eavesdropper or a legitimate agent depends primarily on what your contract says about how they can use the data they collect. Review your vendor agreements for data use restrictions, data processing addenda, and provisions classifying the vendor as a processor acting on your instructions.
The GPC requirement
When a GPC-enabled user loads your page, they have already communicated a privacy preference before any interaction with your consent interface begins. Your system must detect that signal and honor it immediately, before any tracking executes. Testing this correctly requires a browser with GPC enabled — Firefox or Brave — and monitoring your network traffic on first page load. If tracking scripts execute before your system processes the GPC signal, the implementation is non-compliant. Demand letters are increasingly citing GPC signal failures as an independent basis for CIPA claims.
What compliance is not — the three false equivalences
Having a privacy policy is not CIPA compliance. A privacy policy is a disclosure document. CIPA does not care what you disclosed. It cares whether the interception occurred without prior consent. A meticulously accurate, regularly updated, attorney-reviewed privacy policy describes the practice. It does not constitute consent to it.
Having a cookie banner is not CIPA compliance. A cookie banner that loads after tracking scripts have already executed, that records consent preferences without enforcing them technically, or that honors "accept" but ignores "reject" is not a CIPA defense. It is an interface element. The compliance is in the enforcement, not the display.
Being CCPA-compliant is not CIPA-compliant. A comprehensive CCPA compliance program addresses disclosure, opt-out mechanisms, and data subject rights. It does not satisfy CIPA's prior consent requirement unless its consent mechanism also technically blocks tracking before consent is received. The programs address different problems.
The compliance standard, stated plainly
Before any third-party tracking tool on your website captures any data about any user, that user must have affirmatively indicated they are okay with it — and your technology must have respected that indication by not running the tool until the signal was received. Either your tracking tools fire before consent is received, or they don't. If they do, you have exposure. If they don't, and your vendor agreements are structured correctly, you have a defensible position.
What this all comes down to
CIPA is a 1967 California wiretapping statute that courts have extended, through a sequence of decisions spanning nearly two decades, into one of the most actively litigated privacy laws affecting modern websites. It applies to any business whose website is accessible to California residents. It requires prior consent of all parties before any third-party tracking tool captures user data. And it is enforced not by regulators but by individual plaintiffs and the attorneys who represent them at industrial scale.
None of that is going to change in the near term. The legislature has tried and failed to reform it. The courts continue to expand it. The volume of demand letters is not declining.
What is entirely within your control is whether your website gives those letters something valid to claim. A consent management platform that blocks tracking before consent is received, honors GPC signals automatically, and maintains an auditable record of user preferences is the technical implementation of the compliance standard CIPA requires. That is the practical answer to CIPA — not hoping the law changes, but building infrastructure that makes your website structurally difficult to claim against.
Frequently asked questions
What does CIPA stand for?
CIPA stands for the California Invasion of Privacy Act. It is codified in California Penal Code §§ 630 through 638.55 and was originally enacted in 1967 to address telephone wiretapping. Courts have since extended its provisions to cover website tracking technologies that capture user data in real time through third-party vendors.
Is CIPA a criminal law or a civil law?
Both. CIPA is a criminal statute — violations of its core provisions are misdemeanors under California law, punishable by fines and imprisonment. For most businesses, the practical exposure is civil rather than criminal. Section 637.2 creates a private right of action allowing any affected California resident to sue for statutory damages of $5,000 per violation or three times actual damages, whichever is greater, without needing to prove harm. It is this civil enforcement mechanism that drives the demand letter campaigns targeting websites.
What is the difference between CIPA and CCPA?
CCPA is a transparency and control framework governing how businesses disclose and manage personal data. CIPA is a wiretapping statute making the interception of communications without prior all-party consent potentially illegal, regardless of what was disclosed. CCPA compliance does not produce CIPA compliance. A business can satisfy every CCPA requirement and still face valid CIPA claims if its tracking tools fire before user consent is received.
Does CIPA apply to mobile apps?
Yes, in principle. CIPA's provisions are not limited to websites — they apply to any interception of communications involving California residents, including interactions occurring through mobile applications. In practice, the current wave of demand letters has concentrated primarily on websites because website tracking technologies are more standardized and easier to scan at scale. Businesses with consumer-facing mobile apps using third-party SDKs for analytics, advertising, or behavioral tracking should treat the same compliance principles as applicable to their app stack.
Does CIPA apply to B2B websites?
Yes, with a practical nuance. CIPA's legal requirements apply to any website accessible to California residents, including B2B sites. The plaintiffs' bar has concentrated its campaigns primarily on consumer-facing websites where California user session volume is higher. B2B websites are less frequent targets in practice, but are not legally exempt. B2B sites using session replay tools to analyze prospect behavior, advertising pixels to power retargeting, or chat tools to capture sales conversations carry genuine exposure.
What is the penalty for violating CIPA?
The civil penalty is $5,000 per violation or three times actual damages, whichever is greater. A violation is generally interpreted as each instance of unauthorized interception — meaning each California user session during which a non-consented tracking tool was running is a potential violation. For a website with significant California traffic over an extended period, the theoretical maximum exposure can reach into the millions. Most pre-litigation settlements are negotiated for a fraction of that figure, but the gap between the two numbers is the primary leverage mechanism in demand letters.
The infrastructure answer
Understanding CIPA is the first step. The second step is knowing what your website actually looks like to the scanning tools that plaintiffs' attorneys use to identify targets — which tracking scripts are firing, when they're firing relative to your consent mechanism, and whether users who decline tracking are actually not being tracked.
PieEye was built to answer those questions and to fix what they find. Our platform audits your current tracking setup, identifies the consent timing failures and technical misconfigurations that create CIPA exposure, and implements the pre-consent blocking infrastructure that the compliance standard requires. We integrate with your existing tag management system, honor GPC signals automatically, and generate the audit trail your legal team needs if a demand letter arrives.
Run a free PieEye compliance scan — it takes minutes, requires no code changes to initiate, and tells you precisely what a plaintiffs' attorney's tool would find if it looked at your site today.
And if you've already received a demand letter and you're working through what to do next — our complete guide to CIPA demand letters covers the response process step by step, from the emergency technology audit through the legal defense evaluation through the negotiation strategy.
The targeting isn't random. It isn't arbitrary. It is a systematic search for websites that look vulnerable to a well-defined technical test. The answer to that test is a website that passes it.