Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

12/20/2019
10:00 AM
Anurag Kahol
Anurag Kahol
Commentary
Connect Directly
LinkedIn
RSS
E-Mail vvv
100%
0%

Ambiguity Around CCPA Will Lead to a Slow Start in 2020

But longer term, compliance to California's new privacy law represents an opportunity for companies to increase customer trust and market share.

California's governor, Gavin Newsom, had a busy 2019 as he reviewed a total of 1,042 different bills. Newsom ended up signing 870 of those bills into law, with most going into effect on January 1, 2020. Of those 870, one of the most discussed is the California Consumer Privacy Act (CCPA), which had five amendments signed by Newsom earlier in October.

When CCPA goes into effect on January 1, California residents will have the right to know the data that organizations are collecting about them, the right to tell companies not to share or sell their personally identifiable information (PII), and the right to protection against corporations that fail to keep their PII secure. As with the European Union's GDPR, we will eventually see major fines and lawsuits dealt to companies that fail to abide by CCPA. However, there is still an aura of ambiguity around the regulation as well as confusion among California legislators — this will ultimately cause a slow start to enforcement in early 2020.

The fact that several different associations have already suggested alterations to the original version of CCPA (which was passed in 2018) suggests that legislators may not be prepared to adequately and consistently enforce the new law. Additionally, a number of organizations will undoubtedly be confused about the specific requirements of the act, meaning that they won't be compliant by January 1. For the most part, small and medium-sized businesses (SMBs) are going to make up the majority of noncompliant organizations. This is because they lack the resources that large corporations can use to ensure proper security and compliance.

As a result of this ambiguity, California will likely wait an extended period of time before it issues its first major fine under the regulation. Similarly, even though GDPR was enacted in May 2018, it was nearly a year after a September 2018 breach before British Airways was fined $250 million for violating the EU privacy act in July 2019.Once the lull period that will follow the initial establishment of CCPA concludes, we can expect a greater volume of penalties dealt to organizations that fail to adhere to the law's requirements.

CCPA poses a challenge to businesses of all sizes as they seek to retain competitive edges in their respective California markets. However, the Golden State's data privacy act also represents an opportunity for companies to obtain consumer trust and increase their market share as they adhere to the law and prioritize consumer privacy. For example, Microsoft announced last month that it will be honoring CCPA throughout the US and not just within California. By prioritizing security and customer privacy, the multinational technology company will cement customer loyalty in the Microsoft brand.

For that reason, businesses should not delay the process of transforming their security and privacy strategies to conform to CCPA. Failing to adhere to CCPA will not just result in large fines for companies, but it can also significantly damage customer trust. To adhere to (and benefit from) the enactment of CCPA, organizations should take a page out of Microsoft's playbook and make the protection of consumer data a priority by implementing proactive cybersecurity strategies and maintaining transparency around how they handle and protect data. Bottom line: Complying with CCPA and continually reevaluating cybersecurity measures and strategies are critical steps for any organization that wants to succeed.

Related Content

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "'Motivating People Who Want the Struggle': Expert Advice on InfoSec Leadership"

As Chief Technology Officer of Bitglass, Anurag Kahol expedites technology direction and architecture. Anurag was director of engineering in Juniper Networks' Security Business Unit before co-founding Bitglass. He received a global education, earning an M.S. in computer ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-0532
PUBLISHED: 2021-06-21
In memory management driver, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-185196177
CVE-2021-0533
PUBLISHED: 2021-06-21
In memory management driver, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-185193932
CVE-2021-26461
PUBLISHED: 2021-06-21
Apache Nuttx Versions prior to 10.1.0 are vulnerable to integer wrap-around in functions malloc, realloc and memalign. This improper memory assignment can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution.
CVE-2021-0478
PUBLISHED: 2021-06-21
In updateDrawable of StatusBarIconView.java, there is a possible permission bypass due to an uncaught exception. This could lead to local escalation of privilege by running foreground services without notifying the user, with User execution privileges needed. User interaction is not needed for explo...
CVE-2021-0504
PUBLISHED: 2021-06-21
In avrc_pars_browse_rsp of avrc_pars_ct.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: ...