Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

7/3/2018
07:40 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

California's New Privacy Law Gives GDPR-Compliant Orgs Little to Fear

Others should boost their security controls to get in sync with AB 375... or get ready to be sued hundreds of dollars for each personal record exposed in a breach.

California's newly enacted Consumer Privacy Act should have little impact for US organizations that have already implemented measures for complying with the requirements of the European Union's General Data Protection Regulation. But for most others the mandate will likely necessitate a thorough review of their data security controls and in many cases potential updates to them. If not, they risk expensive litigation from their own customers. 

California governor Jerry Brown June 28 signed into law, AB 375, the California Consumer Privacy Act (CCPA) of 2018. The statute - widely seen as one of the toughest privacy laws in the country - will give consumers in the state unprecedented control over any personal information about them that a company might have collected.

Starting Jan. 1, 2020, CCPA confers upon California residents the right to ask a business for all data on them that the business might have collected. It will give consumers the right to ask companies not to sell their personal data to third parties or to ask them to delete all of their personal data.

The bill requires organizations to disclose exactly what categories of personal information it collects about a consumer - before the organization can actually begin to collect the data. Organizations will have to disclose their information collection sources, and the business purpose for collecting personal data and of any changes to those reasons.

Businesses will also have to disclose the categories of third parties with whom they share the information and obtain explicit opt-in consent for collecting data belonging to individuals that are younger than 16 years of age. Importantly, organizations that collect personal data on California residents cannot refuse service or provide lower service quality to individuals that don't want their personal data to be shared or sold to others.

The biggest concern with the new law is the section pertaining to data disclosures resulting from security control failures. CCPA gives individuals the right to sue companies that violate the statute or suffer a data breach because of their failure to implement and maintain reasonable security controls and processes.

"This seems more problematic to the majority of businesses as they struggle to defend themselves against the constant barrage of cyberattacks seeking the very data that the CCPA enumerates," says Chris Prevost, vice president of solutions at Prevoty.

CCPA allows any consumer whose personal data is exposed to sue the breached entity for damages ranging from $100 to $750 or more per exposed record. "Add in all the other breach-related costs - IT response, forensics and recovery, legal, notification, etc. - and this could push a breach into the realm of an existential threat for many businesses."

The law, which privacy rights groups such as the Electronic Privacy Information Center (EPIC) has called  the "most comprehensive consumer privacy state law ever enacted" is the result of a ballot initiative in California that garnered over 660,000 signatures from residents. California's Attorney General's office will have the authority to enforce the law when it goes into effect in 2020.

In intent and in requirements, the California statute is very similar to GDPR. The goal is to give consumers ownership of their personal data; more control over what organizations can do with the data; and the ability to hold businesses liable for failing to adequately protect the data. With California taking the lead many expect it is only a matter of time before other states implement identical statutes.

Some organizations and individuals have criticized the law as being rushed through the state legislature without adequate debate or a chance for organizations to weigh in on the measures.  Robert Callahan, vice president of state government affairs at the Internet Association, describes the law as creating a "massive new regulatory regime" on companies. "The bill was written in a hurried and ill-considered process, and received very little input from those affected by the legislation," Callahan says. "Changes will be necessary as businesses of all types look at implementation." Others have called the bill's language vague and open to interpretation.

However, for enterprise security teams that have implemented practices such as strong access control, data encryption, data anonymization, data minimization, and formal incident response capabilities, CCPA should have relatively little impact.

"It may seem a big demand on organizations, but in reality, it shouldn’t be," said Terry Ray, chief technology officer at Imperva. Many global organizations have already implemented similar requirements for GDPR over the last few years. So organizations that want help implementing CCPA requirements have plenty of existing materials, practices, and products to get started, he said. "Whether it’s serendipitous or planned by California, following GDPR might have helped get organizations ready for CCPA."

 

Related Content:

 

 

 
Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
jenshadus
50%
50%
jenshadus,
User Rank: Strategist
7/5/2018 | 9:15:46 AM
The oligarchs
There is a lot I do not understand about all this.  First, if a company doesn't want to be sued because their databases breached, why don't they use encryption.  Even if it slows things down, the data is secured.  Or...instead of keeping everything in one database, why not have the active database of a few days and push the older data into an encrypted database.  Second,  I those against this law, which for once I think CA has the right idea, the only ones upset by this are those who might be using the data illegally to start with...the FB, AWS, Google, Yahoo, and other social media.  Companies that collect data from consumers thought emarts provide two options: sign up and have the company keep personal data, or sign in a guest, and I hope they don't keep the data for long.  That would be a breach of trust.
Joe Stanganelli
100%
0%
Joe Stanganelli,
User Rank: Ninja
7/6/2018 | 11:37:07 AM
Re: The oligarchs
@jenshadus:

> First, if a company doesn't want to be sued because their databases breached, why don't they use encryption.  Even if it slows things down, the data is secured.


While I tend to agree with you, I can point out that perhaps the most common counterargument lies precisely in the lack of business agility that you point out -- which can be particularly problematic when regulatory compliance dictates certain levels of accessibility (as in, for example, certain cases with HIPAA).

But, like I said, I tend to agree with you. It seems that the pendulum could stand to swing a bit more towards security when we are talking about this context of encryption.
ebyjeeby
100%
0%
ebyjeeby,
User Rank: Strategist
7/9/2018 | 2:55:19 PM
Re: The oligarchs
Why? In a few words, it costs money that they otherwise would not have to spend.
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: We need more votes, check the obituaries.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27295
PUBLISHED: 2021-01-26
The affected product has uncontrolled resource consumption issues, which may allow an attacker to cause a denial-of-service condition on the OPC UA Tunneller (versions prior to 6.3.0.8233).
CVE-2021-22159
PUBLISHED: 2021-01-26
Insider Threat Management Windows Agent Local Privilege Escalation Vulnerability The Proofpoint Insider Threat Management (formerly ObserveIT) Agent for Windows before 7.4.3, 7.5.4, 7.6.5, 7.7.5, 7.8.4, 7.9.3, 7.10.2, and 7.11.0.25 as well as versions 7.3 and earlier is missing authentication for a ...
CVE-2021-3308
PUBLISHED: 2021-01-26
An issue was discovered in Xen 4.12.3 through 4.12.4 and 4.13.1 through 4.14.x. An x86 HVM guest with PCI pass through devices can force the allocation of all IDT vectors on the system by rebooting itself with MSI or MSI-X capabilities enabled and entries setup. Such reboots will leak any vectors us...
CVE-2020-27299
PUBLISHED: 2021-01-26
The affected product is vulnerable to an out-of-bounds read, which may allow an attacker to obtain and disclose sensitive data information or cause the device to crash on the OPC UA Tunneller (versions prior to 6.3.0.8233).
CVE-2021-23272
PUBLISHED: 2021-01-26
The Application Development Clients component of TIBCO Software Inc.'s TIBCO BPM Enterprise and TIBCO BPM Enterprise Distribution for TIBCO Silver Fabric contains a vulnerability that theoretically allows a low privileged attacker with network access to execute a Cross Site Scripting (XSS) attack on...