Californias CCPA Law: Why CISOs Need to Take Heed

  /     /     /  
Publicated : 23/11/2024   Category : security


Californias CCPA Law: Why CISOs Need to Take Heed


The recently enacted California Consumer Privacy Act, while hardly a sweeping reform of the states privacy laws, changes the playing field for IT risk and liability where California residents personal information is concerned.



Californias controversial new privacy law, despite not being especially burdensome, presents a few need-to-knows for CISOs and others IT executives who are helping to manage enterprise security risk.
On June 28, Gov. Jerry Brown of California signed into state law
the California Consumer Privacy Act of 2018 (CCPA)
. The bulk of the CCPAs requirements have to do with disclosures and forewarnings about the selling and sharing of California residents personal information (although most of these requirements are focused on categories of information instead of the actual information).
Fines under the CCPA will cap at $7,500 per violation -- and even that maximum penalty is reserved for only
intentional
violations of the CCPA; violations lacking intent will remain subject to the preset $2,500 maximum fine under
Section 17206 of the California Business and Professions Code
. Of course, cumulative fines for large and systemic abuses may add up to be costly, but they are unlikely to be bank-breaking.
(Source:
Flickr
)

Of greater financial concern to businesses is that the CCPA expressly paves the way for the right of natural persons to bring lawsuits for the breach of their nonencrypted or nonredacted personal information -- even in the absence of evidence of actual damage. The CCPA allows individuals to recover between $100 and $750 per such incident -- or greater in the showing of actual damages exceeding $750.
In the absence of such clearly elucidated rights, individuals have had difficulty in lawsuits over egregious mega-breaches where they could not yet show that their compromised data had actually been used to their detriment or otherwise caused them actual and quantifiable damage. The issue
remains
a general legal uncertainty as US courts struggle with the issue and even disagree with each other. Therefore, upon this provision going into effect, businesses have greater incentive to deploy encryption where they have not done so already -- even for data that organizations have not traditionally encrypted. (See:
Seamless Cloud Security Depends on Encryption Done Right
.)
At the same time, the CCPA places a number of bureaucratic hurdles in the path of would-be CCPA plaintiffs -- mandating that they first provide a business 30 days written notice identifying the specific provisions of this title the consumer alleges have been or are being violated, allowing the business the opportunity to cure the problem if possible. While hardly best practice, this provision -- arguably -- effectively gives CCPA-subject businesses some degree of opportunity to slack off on their reporting requirements and data requests, allowing businesses to wait and see who among the activist consumers in their inboxes are
really
serious.
This may be a dangerous game, however, when played over the long run because the CCPA dictates that judges are to consider such factors as the nature and seriousness of the misconduct, the number of violations, the persistence of the misconduct, the length of time over which the misconduct occurred, [and] the willfulness of the defendants misconduct in awarding statutory damages.
Meanwhile, as the CCPA purports to place the realm of data breaches under its own purview, it is difficult to see what a cure would look like in such a situation. It is unclear if, for example, such a thing as Uber paying $100,000 for hackers to promise – on their honor -- to delete stolen data would represent a real cure. (See:
Uber Loses Customer Data: Customers Yawn & Keep Riding
.)
Additionally, within 30 days of filing a CCPA action, a CCPA plaintiff must notify the California Attorney General -- who, the CCPA makes clear, can delay or block such individual litigation.
Finally, smaller businesses and startups may find further CCPA relief by virtue of being so small. In determining statutory damages, judges are also to consider defendant businesses assets, liabilities, and net worth (note that the word valuation does not appear in that laundry list).
Emphasis on may. Even a relatively small judgment can hurt a startup or small business substantially -- while multi-billion-dollar penalties against Silicon Valley giants like Google are viewed as
little more than a hiccup
on a quarterly earnings report.
Still, smaller businesses are further protected from CCPA liability in that the CCPA may not consider them businesses to begin with. The CCPA indicates that it only applies to
for-profit
businesses that:
Have over $25,000,000 in statutorily adjusted gross annual revenues
Derive at least half of their annual revenue from selling California residents personal information, or
Buy, sell, receive, or otherwise trade the personal information of 50,000 or more [California residents], households, or devices
The CCPA also applies to entities that control or are controlled by such a business (such as, for example, a parent company or a subsidiary).
Related posts:
Equifax Agrees to Implement New Security Measures
GDPR, AI & a New Age of Consent for Enterprises
My Cybersecurity Predictions for 2018, Part 4: Regulating Encryption
—Joe Stanganelli, principal of Beacon Hill Law, is a Boston-based attorney, corporate-communications and data-privacy consultant, writer, and speaker. Follow him on Twitter at @JoeStanganelli.
(Disclaimer: This article is provided for informational, educational and/or entertainment purposes only. Neither this nor other articles here constitute legal advice or the creation, implication or confirmation of an attorney-client relationship. For actual legal advice, personally consult with an attorney licensed to practice in your jurisdiction.)
 

Last News

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security

▸ Researchers create BlackForest to gather, link threat data. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Californias CCPA Law: Why CISOs Need to Take Heed