7/26/2018
08:05 AM
Joe Stanganelli
Joe Stanganelli
Joe Stanganelli

California's CCPA Law: Why CISOs Need to Take Heed

The recently enacted California Consumer Privacy Act, while hardly a sweeping reform of the state's privacy laws, changes the playing field for IT risk and liability where California residents' personal information is concerned.



California's controversial new privacy law, despite not being especially burdensome, presents a few need-to-knows for CISOs and others IT executives who are helping to manage enterprise security risk.

On June 28, Gov. Jerry Brown of California signed into state law the California Consumer Privacy Act of 2018 (CCPA). The bulk of the CCPA's requirements have to do with disclosures and forewarnings about the selling and sharing of California residents' personal information (although most of these requirements are focused on "categories" of information instead of the actual information).

Fines under the CCPA will cap at $7,500 per violation -- and even that maximum penalty is reserved for only intentional violations of the CCPA; violations lacking intent will remain subject to the preset $2,500 maximum fine under Section 17206 of the California Business and Professions Code. Of course, cumulative fines for large and systemic abuses may add up to be costly, but they are unlikely to be bank-breaking.

Of greater financial concern to businesses is that the CCPA expressly paves the way for the right of natural persons to bring lawsuits for the breach of their "nonencrypted or nonredacted personal information" -- even in the absence of evidence of actual damage. The CCPA allows individuals to recover between $100 and $750 per such incident -- or greater in the showing of actual damages exceeding $750.

In the absence of such clearly elucidated rights, individuals have had difficulty in lawsuits over egregious mega-breaches where they could not yet show that their compromised data had actually been used to their detriment or otherwise caused them actual and quantifiable damage. The issue remains a general legal uncertainty as US courts struggle with the issue and even disagree with each other. Therefore, upon this provision going into effect, businesses have greater incentive to deploy encryption where they have not done so already -- even for data that organizations have not traditionally encrypted. (See: Seamless Cloud Security Depends on Encryption Done Right.)

At the same time, the CCPA places a number of bureaucratic hurdles in the path of would-be CCPA plaintiffs -- mandating that they first "provide a business 30 days' written notice identifying the specific provisions of this title the consumer alleges have been or are being violated," allowing the business the opportunity to "cure" the problem if possible. While hardly best practice, this provision -- arguably -- effectively gives CCPA-subject businesses some degree of opportunity to slack off on their reporting requirements and data requests, allowing businesses to wait and see who among the activist consumers in their inboxes are really serious.

This may be a dangerous game, however, when played over the long run because the CCPA dictates that judges are to consider such factors as "the nature and seriousness of the misconduct, the number of violations, the persistence of the misconduct, the length of time over which the misconduct occurred, [and] the willfulness of the defendant's misconduct" in awarding statutory damages.

Meanwhile, as the CCPA purports to place the realm of data breaches under its own purview, it is difficult to see what a "cure" would look like in such a situation. It is unclear if, for example, such a thing as Uber paying $100,000 for hackers to promise – on their honor -- to delete stolen data would represent a real cure. (See: Uber Loses Customer Data: Customers Yawn & Keep Riding.)

Additionally, within 30 days of filing a CCPA action, a CCPA plaintiff must notify the California Attorney General -- who, the CCPA makes clear, can delay or block such individual litigation.

Finally, smaller businesses and startups may find further CCPA relief by virtue of being so small. In determining statutory damages, judges are also to consider defendant businesses' "assets, liabilities, and net worth" (note that the word "valuation" does not appear in that laundry list).

Emphasis on "may". Even a relatively small judgment can hurt a startup or small business substantially -- while multi-billion-dollar penalties against Silicon Valley giants like Google are viewed as little more than a hiccup on a quarterly earnings report.

Still, smaller businesses are further protected from CCPA liability in that the CCPA may not consider them "businesses" to begin with. The CCPA indicates that it only applies to for-profit businesses that:

  • Have over $25,000,000 in statutorily adjusted gross annual revenues
  • Derive at least half of their annual revenue from selling California residents' personal information, or
  • Buy, sell, receive, or otherwise trade "the personal information of 50,000 or more [California residents], households, or devices"

The CCPA also applies to entities that control or are controlled by such a business (such as, for example, a parent company or a subsidiary).

Related posts:

—Joe Stanganelli, principal of Beacon Hill Law, is a Boston-based attorney, corporate-communications and data-privacy consultant, writer, and speaker. Follow him on Twitter at @JoeStanganelli.

(Disclaimer: This article is provided for informational, educational and/or entertainment purposes only. Neither this nor other articles here constitute legal advice or the creation, implication or confirmation of an attorney-client relationship. For actual legal advice, personally consult with an attorney licensed to practice in your jurisdiction.)

 

Comment  | 
Email This  | 
Print  | 
RSS
More Insights
Copyright © 2020 UBM Electronics, A UBM company, All rights reserved. Privacy Policy | Terms of Service