California Attorney General Rob Bonta has announced yet another major CCPA enforcement action. This time it concluded in a $1.4 million settlement with Jam City, the famous mobile gaming studio behind hits like Frozen, Harry Potter, and Family Guy. The investigation found certain data privacy-related failures across Jam City apps, some of which also involved conflicts with the CCPA’s heightened protection for minors aged 13-16. The case reinforces a critical reality that even if privacy failures within apps, embedded SDKs, or complex ad-tech ecosystems occur unbeknownst to the concerning businesses, they will still be met with significant financial and regulatory penalties.
Definitely, these risks are not unique to Jam City or just the gaming industry, for that matter. Any organization that uses behavioral advertising, third-party trackers, or app-based data collection could face similar exposure. Therefore, let’s break down what went wrong and what every business needs to learn from Jam City’s experience. For a deeper dive into how cases like this keep stacking up and how to proactively defend against “drive-by” privacy lawsuits, check out our detailed guide here.
When ‘Tap to Play’ Became ‘Pay to Settle’
What makes Jam City’s case unique is that the company is heavily dependent on mobile apps and ad-tech, and all data collected and processed through them. Therefore, even if the data collection may happen through controlled digital properties, the risks and penalties of privacy negligence are unambiguous. Moreover, CCPA enforcement treats mobile apps as first-class digital products and, therefore, requires certain compliance mechanisms inside the apps themselves.
- No in-app opt-out for sale: Jam City’s 21 mobile games all lacked any CCPA-compliant option to opt out of sale or sharing of personal data. The only mechanism offered was an email address, which is something that does not meet CCPA enforcement requirement for a “clear and conspicuous” opt-out directly accessible to users.
- Sale/sharing of data from minors without affirmative consent: For users aged between 13 and 16, the CCPA requires explicit opt-in before any sale or sharing of personal information can happen. Jam City, however, was found to have sold or shared data from the teens cohort without obtaining the required consent. According to the complaint, while some of its games had age-gates and child-safe versions, six games failed to maintain those protections, effectively selling data of minors with no opt-in at all.
- Cross-context advertising without clear user consent or control: Jam City collected device identifiers, IP addresses, in-game interaction data, purchase history, and gameplay behavior, then disclosed this to third-party advertising and analytics partners. These partners used the data, often combined with data from other sources, to build detailed user profiles and deliver cross-app, cross-platform targeted advertising. Because Jam City did not provide a valid opt-out mechanism or proper notice, this amounted to an unlawful “sale” or “sharing” under CCPA.
- Lack of compliance across the full mobile product portfolio: Importantly, the failure was not limited to one or two under-performing games. The DOJ complaint notes that none of Jam City’s 21 apps provided compliant opt-out links or clear sale/share disclosures. This suggests a company-wide privacy compliance gap rather than an isolated oversight.
- Failure to adapt privacy mechanisms: Jam City’s reliance on a privacy-policy email-based opt-out ignored the reality of mobile UX, where users rarely inspect policy documents, especially in gaming apps. By not providing a “clear and conspicuous” in-app control, Jam City effectively deprived its users, including vulnerable teen users, of the meaningful opportunity to exercise their CCPA rights.
- Regulatory miscalculation: The case closes the gap on the assumptions that the CCPA laws don’t concern mobile-only apps, behavioral ad-tech, and under-16 users. The $1.4 million civil penalty is a strong signal that CCPA enforcement now looks past traditional web-based data collection and sees mobile games, ad-funded apps, and teen-oriented digital services as fully within scope.
Building a Privacy-Safe Mobile and Ad-Tech Ecosystem
Jam City’s case shows that regulators expect businesses to have full visibility and governance over every touchpoint that gathers or transmits personal data. Ignoring this reality doesn’t reduce legal exposure; it simply means violations pile up unnoticed until the Attorney General highlights them for you.
- Build frictionless opt-out mechanisms: Ensure that clear, easy-to-find Do-Not-Sell/Share controls exist inside the app or platform where data is collected. Customers should be able to toggle tracking permissions within seconds. If your product operates in mobile, CCPA expects your opt-outs to live in mobile.
- Map and classify all ad-tech, SDK, and tracker flows: Conduct a detailed audit of every SDK, pixel, analytics tool, and advertising integration. Many businesses unknowingly “sell” or “share” data simply by allowing third-party partners to collect identifiers, behavior logs, or engagement data. Categorize each flow, determine if it triggers CCPA’s definitions, and implement opt-outs accordingly.
- Implement strict teen-data governance for ages 13–16: If your platform reaches teens, you must implement affirmative opt-in before sharing or selling their data. This means age gating, verification logic, parental consent mechanisms (if applicable), and strict monitoring for users who fall within the 13–16 bracket. Teen data violations represented one of the most serious failures in the Jam City case.
- Translate privacy obligations directly into mobile UX design: Your UX, product, and engineering teams should treat privacy as a core design requirement. That means adding privacy settings within the app menu, using icons and labels that users understand, including real-time toggles, and maintaining consistent controls across iOS and Android.
- Strengthen vendor governance and advertising partner contracts: Because much of Jam City’s exposure came from third-party ad-tech partners, businesses should update vendor contracts to require CCPA compliance, restrict secondary use of data, and ensure partners honor user opt-outs. Conduct periodic checks and implement automated monitoring tools to detect noncompliant trackers.
- Set up continuous monitoring for hidden or unintended data flows: Mobile SDKs frequently update their behavior without notice. Businesses need monitoring tools that detect when new data points are being collected, when identifiers change, or when an update introduces a fresh risk. Treat privacy monitoring the same way you treat vulnerability scanning as an ongoing discipline.
- Train product, engineering, and marketing teams on CCPA duties: Many violations happen not out of malice, but ignorance. Developers add SDKs without realizing they constitute “sale/sharing.” Marketers deploy targeting tools without understanding consent rules. Training must be targeted, role-specific, and repeated, not a one-off annual session.
- Conduct periodic internal audits focused specifically on mobile and ad-tech: Annual or semi-annual privacy audits should review mobile apps independently of web properties. Audit each release, each SDK upgrade, and each new advertising integration. If you rely heavily on personalized ads, consider quarterly compliance checks.
Standards for End-to-End Privacy Compliance
The Jam City settlement marks a decisive shift in how California enforces privacy obligations across digital ecosystems. Mobile apps, embedded SDKs, and complex ad-tech infrastructure can no longer be treated as “grey zones”. If your business collects or shares personal data, every surface where that data flows must be governed with the same rigor as a website, backend API, or enterprise database. Your privacy programs must operate with continuous monitoring and defensible audit trails.
Platforms like Truyo’s Compliance Advisor help teams operationalize this level of oversight, turning ongoing monitoring and auditability into repeatable, reliable processes.