This is the danger of user config dependent code for CCPA compliance. Configurations that live in user settings or environment variables can be fragile, invisible to tests, and easy to break. Under the California Consumer Privacy Act, one missing config can mean a violation, fines, and loss of trust.
When enforcement depends on user config, you’re building compliance on moving sand. A setting can drift. A flag can be overridden. Different environments can silently run with different defaults. No one notices until a real user triggers the wrong path.
The fix is not to remove configurability, but to design around it. Treat every CCPA-related user config as a controlled artifact. Keep it in code or immutable infrastructure when possible. Version it. Audit it. Mirror production configs in staging. Automate checks that fail fast if a required privacy guard is missing or off.