Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

12/20/2019
10:00 AM
Anurag Kahol
Anurag Kahol
Commentary
Connect Directly
LinkedIn
RSS
E-Mail vvv
100%
0%

Ambiguity Around CCPA Will Lead to a Slow Start in 2020

But longer term, compliance to California's new privacy law represents an opportunity for companies to increase customer trust and market share.

California's governor, Gavin Newsom, had a busy 2019 as he reviewed a total of 1,042 different bills. Newsom ended up signing 870 of those bills into law, with most going into effect on January 1, 2020. Of those 870, one of the most discussed is the California Consumer Privacy Act (CCPA), which had five amendments signed by Newsom earlier in October.

When CCPA goes into effect on January 1, California residents will have the right to know the data that organizations are collecting about them, the right to tell companies not to share or sell their personally identifiable information (PII), and the right to protection against corporations that fail to keep their PII secure. As with the European Union's GDPR, we will eventually see major fines and lawsuits dealt to companies that fail to abide by CCPA. However, there is still an aura of ambiguity around the regulation as well as confusion among California legislators — this will ultimately cause a slow start to enforcement in early 2020.

The fact that several different associations have already suggested alterations to the original version of CCPA (which was passed in 2018) suggests that legislators may not be prepared to adequately and consistently enforce the new law. Additionally, a number of organizations will undoubtedly be confused about the specific requirements of the act, meaning that they won't be compliant by January 1. For the most part, small and medium-sized businesses (SMBs) are going to make up the majority of noncompliant organizations. This is because they lack the resources that large corporations can use to ensure proper security and compliance.

As a result of this ambiguity, California will likely wait an extended period of time before it issues its first major fine under the regulation. Similarly, even though GDPR was enacted in May 2018, it was nearly a year after a September 2018 breach before British Airways was fined $250 million for violating the EU privacy act in July 2019.Once the lull period that will follow the initial establishment of CCPA concludes, we can expect a greater volume of penalties dealt to organizations that fail to adhere to the law's requirements.

CCPA poses a challenge to businesses of all sizes as they seek to retain competitive edges in their respective California markets. However, the Golden State's data privacy act also represents an opportunity for companies to obtain consumer trust and increase their market share as they adhere to the law and prioritize consumer privacy. For example, Microsoft announced last month that it will be honoring CCPA throughout the US and not just within California. By prioritizing security and customer privacy, the multinational technology company will cement customer loyalty in the Microsoft brand.

For that reason, businesses should not delay the process of transforming their security and privacy strategies to conform to CCPA. Failing to adhere to CCPA will not just result in large fines for companies, but it can also significantly damage customer trust. To adhere to (and benefit from) the enactment of CCPA, organizations should take a page out of Microsoft's playbook and make the protection of consumer data a priority by implementing proactive cybersecurity strategies and maintaining transparency around how they handle and protect data. Bottom line: Complying with CCPA and continually reevaluating cybersecurity measures and strategies are critical steps for any organization that wants to succeed.

Related Content

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "'Motivating People Who Want the Struggle': Expert Advice on InfoSec Leadership"

As Chief Technology Officer of Bitglass, Anurag Kahol expedites technology direction and architecture. Anurag was director of engineering in Juniper Networks' Security Business Unit before co-founding Bitglass. He received a global education, earning an M.S. in computer ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Active Directory Needs an Update: Here's Why
Raz Rafaeli, CEO and Co-Founder at Secret Double Octopus,  1/16/2020
Google Lets iPhone Users Turn Device into Security Key
Kelly Sheridan, Staff Editor, Dark Reading,  1/15/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
How Enterprises are Attacking the Cybersecurity Problem
How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-16270
PUBLISHED: 2020-01-22
Samsung Galaxy Gear series before build RE2 includes the hcidump utility with no privilege or permission restriction. This allows an unprivileged process to dump Bluetooth HCI packets to an arbitrary file path.
CVE-2018-16271
PUBLISHED: 2020-01-22
The wemail_consumer_service (from the built-in application wemail) in Samsung Galaxy Gear series allows an unprivileged process to manipulate a user's mailbox, due to improper D-Bus security policy configurations. An arbitrary email can also be sent from the mailbox via the paired smartphone. This a...
CVE-2018-16272
PUBLISHED: 2020-01-22
The wpa_supplicant system service in Samsung Galaxy Gear series allows an unprivileged process to fully control the Wi-Fi interface, due to the lack of its D-Bus security policy configurations. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
CVE-2019-10780
PUBLISHED: 2020-01-22
BibTeX-ruby before 5.1.0 allows shell command injection due to unsanitized user input being passed directly to the built-in Ruby Kernel.open method through BibTeX.open.
CVE-2019-10781
PUBLISHED: 2020-01-22
In schema-inspector before 1.6.9, a maliciously crafted JavaScript object can bypass the `sanitize()` and the `validate()` function used within schema-inspector.