Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

7/3/2018
07:40 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

California's New Privacy Law Gives GDPR-Compliant Orgs Little to Fear

Others should boost their security controls to get in sync with AB 375... or get ready to be sued hundreds of dollars for each personal record exposed in a breach.

California's newly enacted Consumer Privacy Act should have little impact for US organizations that have already implemented measures for complying with the requirements of the European Union's General Data Protection Regulation. But for most others the mandate will likely necessitate a thorough review of their data security controls and in many cases potential updates to them. If not, they risk expensive litigation from their own customers. 

California governor Jerry Brown June 28 signed into law, AB 375, the California Consumer Privacy Act (CCPA) of 2018. The statute - widely seen as one of the toughest privacy laws in the country - will give consumers in the state unprecedented control over any personal information about them that a company might have collected.

Starting Jan. 1, 2020, CCPA confers upon California residents the right to ask a business for all data on them that the business might have collected. It will give consumers the right to ask companies not to sell their personal data to third parties or to ask them to delete all of their personal data.

The bill requires organizations to disclose exactly what categories of personal information it collects about a consumer - before the organization can actually begin to collect the data. Organizations will have to disclose their information collection sources, and the business purpose for collecting personal data and of any changes to those reasons.

Businesses will also have to disclose the categories of third parties with whom they share the information and obtain explicit opt-in consent for collecting data belonging to individuals that are younger than 16 years of age. Importantly, organizations that collect personal data on California residents cannot refuse service or provide lower service quality to individuals that don't want their personal data to be shared or sold to others.

The biggest concern with the new law is the section pertaining to data disclosures resulting from security control failures. CCPA gives individuals the right to sue companies that violate the statute or suffer a data breach because of their failure to implement and maintain reasonable security controls and processes.

"This seems more problematic to the majority of businesses as they struggle to defend themselves against the constant barrage of cyberattacks seeking the very data that the CCPA enumerates," says Chris Prevost, vice president of solutions at Prevoty.

CCPA allows any consumer whose personal data is exposed to sue the breached entity for damages ranging from $100 to $750 or more per exposed record. "Add in all the other breach-related costs - IT response, forensics and recovery, legal, notification, etc. - and this could push a breach into the realm of an existential threat for many businesses."

The law, which privacy rights groups such as the Electronic Privacy Information Center (EPIC) has called  the "most comprehensive consumer privacy state law ever enacted" is the result of a ballot initiative in California that garnered over 660,000 signatures from residents. California's Attorney General's office will have the authority to enforce the law when it goes into effect in 2020.

In intent and in requirements, the California statute is very similar to GDPR. The goal is to give consumers ownership of their personal data; more control over what organizations can do with the data; and the ability to hold businesses liable for failing to adequately protect the data. With California taking the lead many expect it is only a matter of time before other states implement identical statutes.

Some organizations and individuals have criticized the law as being rushed through the state legislature without adequate debate or a chance for organizations to weigh in on the measures.  Robert Callahan, vice president of state government affairs at the Internet Association, describes the law as creating a "massive new regulatory regime" on companies. "The bill was written in a hurried and ill-considered process, and received very little input from those affected by the legislation," Callahan says. "Changes will be necessary as businesses of all types look at implementation." Others have called the bill's language vague and open to interpretation.

However, for enterprise security teams that have implemented practices such as strong access control, data encryption, data anonymization, data minimization, and formal incident response capabilities, CCPA should have relatively little impact.

"It may seem a big demand on organizations, but in reality, it shouldn’t be," said Terry Ray, chief technology officer at Imperva. Many global organizations have already implemented similar requirements for GDPR over the last few years. So organizations that want help implementing CCPA requirements have plenty of existing materials, practices, and products to get started, he said. "Whether it’s serendipitous or planned by California, following GDPR might have helped get organizations ready for CCPA."

 

Related Content:

 

 

 
Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
ebyjeeby
100%
0%
ebyjeeby,
User Rank: Strategist
7/9/2018 | 2:55:19 PM
Re: The oligarchs
Why? In a few words, it costs money that they otherwise would not have to spend.
Joe Stanganelli
100%
0%
Joe Stanganelli,
User Rank: Ninja
7/6/2018 | 11:37:07 AM
Re: The oligarchs
@jenshadus:

> First, if a company doesn't want to be sued because their databases breached, why don't they use encryption.  Even if it slows things down, the data is secured.


While I tend to agree with you, I can point out that perhaps the most common counterargument lies precisely in the lack of business agility that you point out -- which can be particularly problematic when regulatory compliance dictates certain levels of accessibility (as in, for example, certain cases with HIPAA).

But, like I said, I tend to agree with you. It seems that the pendulum could stand to swing a bit more towards security when we are talking about this context of encryption.
jenshadus
50%
50%
jenshadus,
User Rank: Strategist
7/5/2018 | 9:15:46 AM
The oligarchs
There is a lot I do not understand about all this.  First, if a company doesn't want to be sued because their databases breached, why don't they use encryption.  Even if it slows things down, the data is secured.  Or...instead of keeping everything in one database, why not have the active database of a few days and push the older data into an encrypted database.  Second,  I those against this law, which for once I think CA has the right idea, the only ones upset by this are those who might be using the data illegally to start with...the FB, AWS, Google, Yahoo, and other social media.  Companies that collect data from consumers thought emarts provide two options: sign up and have the company keep personal data, or sign in a guest, and I hope they don't keep the data for long.  That would be a breach of trust.
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19594
PUBLISHED: 2019-12-05
reset/modules/fotoliaFoto/multi_upload.php in the RESET.PRO Adobe Stock API Integration for PrestaShop 1.6 and 1.7 allows remote attackers to execute arbitrary code by uploading a .php file.
CVE-2019-19595
PUBLISHED: 2019-12-05
reset/modules/advanced_form_maker_edit/multiupload/upload.php in the RESET.PRO Adobe Stock API integration 4.8 for PrestaShop allows remote attackers to execute arbitrary code by uploading a .php file.
CVE-2019-3690
PUBLISHED: 2019-12-05
The chkstat tool in the permissions package followed symlinks before commit a9e1d26cd49ef9ee0c2060c859321128a6dd4230 (please also check the additional hardenings after this fix). This allowed local attackers with control over a path that is traversed by chkstat to escalate privileges.
CVE-2013-0243
PUBLISHED: 2019-12-05
haskell-tls-extra before 0.6.1 has Basic Constraints attribute vulnerability may lead to Man in the Middle attacks on TLS connections
CVE-2018-10021
PUBLISHED: 2019-12-05
Improper validation of URL redirection in the Kubernetes API server in versions prior to v1.14.0 allows an attacker-controlled Kubelet to redirect API server requests from streaming endpoints to arbitrary hosts. Impacted API servers will follow the redirect as a GET request with client-certificate c...