Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security //

Law

7/26/2018
08:05 AM
Joe Stanganelli
Joe Stanganelli
Joe Stanganelli
50%
50%

California's CCPA Law: Why CISOs Need to Take Heed

The recently enacted California Consumer Privacy Act, while hardly a sweeping reform of the state's privacy laws, changes the playing field for IT risk and liability where California residents' personal information is concerned.

California's controversial new privacy law, despite not being especially burdensome, presents a few need-to-knows for CISOs and others IT executives who are helping to manage enterprise security risk.

On June 28, Gov. Jerry Brown of California signed into state law the California Consumer Privacy Act of 2018 (CCPA). The bulk of the CCPA's requirements have to do with disclosures and forewarnings about the selling and sharing of California residents' personal information (although most of these requirements are focused on "categories" of information instead of the actual information).

Fines under the CCPA will cap at $7,500 per violation -- and even that maximum penalty is reserved for only intentional violations of the CCPA; violations lacking intent will remain subject to the preset $2,500 maximum fine under Section 17206 of the California Business and Professions Code. Of course, cumulative fines for large and systemic abuses may add up to be costly, but they are unlikely to be bank-breaking.

(Source:  Flickr)\r\n\r\n
(Source: Flickr)\r\n\r\n

Of greater financial concern to businesses is that the CCPA expressly paves the way for the right of natural persons to bring lawsuits for the breach of their "nonencrypted or nonredacted personal information" -- even in the absence of evidence of actual damage. The CCPA allows individuals to recover between $100 and $750 per such incident -- or greater in the showing of actual damages exceeding $750.

In the absence of such clearly elucidated rights, individuals have had difficulty in lawsuits over egregious mega-breaches where they could not yet show that their compromised data had actually been used to their detriment or otherwise caused them actual and quantifiable damage. The issue remains a general legal uncertainty as US courts struggle with the issue and even disagree with each other. Therefore, upon this provision going into effect, businesses have greater incentive to deploy encryption where they have not done so already -- even for data that organizations have not traditionally encrypted. (See: Seamless Cloud Security Depends on Encryption Done Right.)

At the same time, the CCPA places a number of bureaucratic hurdles in the path of would-be CCPA plaintiffs -- mandating that they first "provide a business 30 days' written notice identifying the specific provisions of this title the consumer alleges have been or are being violated," allowing the business the opportunity to "cure" the problem if possible. While hardly best practice, this provision -- arguably -- effectively gives CCPA-subject businesses some degree of opportunity to slack off on their reporting requirements and data requests, allowing businesses to wait and see who among the activist consumers in their inboxes are really serious.

This may be a dangerous game, however, when played over the long run because the CCPA dictates that judges are to consider such factors as "the nature and seriousness of the misconduct, the number of violations, the persistence of the misconduct, the length of time over which the misconduct occurred, [and] the willfulness of the defendant's misconduct" in awarding statutory damages.

Meanwhile, as the CCPA purports to place the realm of data breaches under its own purview, it is difficult to see what a "cure" would look like in such a situation. It is unclear if, for example, such a thing as Uber paying $100,000 for hackers to promise – on their honor -- to delete stolen data would represent a real cure. (See: Uber Loses Customer Data: Customers Yawn & Keep Riding.)

Additionally, within 30 days of filing a CCPA action, a CCPA plaintiff must notify the California Attorney General -- who, the CCPA makes clear, can delay or block such individual litigation.

Finally, smaller businesses and startups may find further CCPA relief by virtue of being so small. In determining statutory damages, judges are also to consider defendant businesses' "assets, liabilities, and net worth" (note that the word "valuation" does not appear in that laundry list).

Emphasis on "may". Even a relatively small judgment can hurt a startup or small business substantially -- while multi-billion-dollar penalties against Silicon Valley giants like Google are viewed as little more than a hiccup on a quarterly earnings report.

Still, smaller businesses are further protected from CCPA liability in that the CCPA may not consider them "businesses" to begin with. The CCPA indicates that it only applies to for-profit businesses that:

  • Have over $25,000,000 in statutorily adjusted gross annual revenues
  • Derive at least half of their annual revenue from selling California residents' personal information, or
  • Buy, sell, receive, or otherwise trade "the personal information of 50,000 or more [California residents], households, or devices"

The CCPA also applies to entities that control or are controlled by such a business (such as, for example, a parent company or a subsidiary).

Related posts:

—Joe Stanganelli, principal of Beacon Hill Law, is a Boston-based attorney, corporate-communications and data-privacy consultant, writer, and speaker. Follow him on Twitter at @JoeStanganelli.

(Disclaimer: This article is provided for informational, educational and/or entertainment purposes only. Neither this nor other articles here constitute legal advice or the creation, implication or confirmation of an attorney-client relationship. For actual legal advice, personally consult with an attorney licensed to practice in your jurisdiction.)

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises are Attacking the Cybersecurity Problem
Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-42556
PUBLISHED: 2021-10-22
Rasa X before 0.42.4 allows Directory Traversal during archive extraction. In the functionality that allows a user to load a trained model archive, an attacker has arbitrary write capability within specific directories via a crafted archive file.
CVE-2021-42840
PUBLISHED: 2021-10-22
SuiteCRM before 7.11.19 allows remote code execution via the system settings Log File Name setting. In certain circumstances involving admin account takeover, logger_file_name can refer to an attacker-controlled PHP file under the web root, because only the all-lowercase PHP file extensions were blo...
CVE-2021-29835
PUBLISHED: 2021-10-22
IBM Business Automation Workflow 18.0, 19.0, 20.0, and 21.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X...
CVE-2021-41171
PUBLISHED: 2021-10-22
eLabFTW is an open source electronic lab notebook manager for research teams. In versions of eLabFTW before 4.1.0, it allows attackers to bypass a brute-force protection mechanism by using many different forged PHPSESSID values in HTTP Cookie header. This issue has been addressed by implementing bru...
CVE-2021-42836
PUBLISHED: 2021-10-22
GJSON before 1.9.3 allows a ReDoS (regular expression denial of service) attack.