Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

12/20/2019
10:00 AM
Anurag Kahol
Anurag Kahol
Commentary
Connect Directly
LinkedIn
RSS
E-Mail vvv
100%
0%

Ambiguity Around CCPA Will Lead to a Slow Start in 2020

But longer term, compliance to California's new privacy law represents an opportunity for companies to increase customer trust and market share.

California's governor, Gavin Newsom, had a busy 2019 as he reviewed a total of 1,042 different bills. Newsom ended up signing 870 of those bills into law, with most going into effect on January 1, 2020. Of those 870, one of the most discussed is the California Consumer Privacy Act (CCPA), which had five amendments signed by Newsom earlier in October.

When CCPA goes into effect on January 1, California residents will have the right to know the data that organizations are collecting about them, the right to tell companies not to share or sell their personally identifiable information (PII), and the right to protection against corporations that fail to keep their PII secure. As with the European Union's GDPR, we will eventually see major fines and lawsuits dealt to companies that fail to abide by CCPA. However, there is still an aura of ambiguity around the regulation as well as confusion among California legislators — this will ultimately cause a slow start to enforcement in early 2020.

The fact that several different associations have already suggested alterations to the original version of CCPA (which was passed in 2018) suggests that legislators may not be prepared to adequately and consistently enforce the new law. Additionally, a number of organizations will undoubtedly be confused about the specific requirements of the act, meaning that they won't be compliant by January 1. For the most part, small and medium-sized businesses (SMBs) are going to make up the majority of noncompliant organizations. This is because they lack the resources that large corporations can use to ensure proper security and compliance.

As a result of this ambiguity, California will likely wait an extended period of time before it issues its first major fine under the regulation. Similarly, even though GDPR was enacted in May 2018, it was nearly a year after a September 2018 breach before British Airways was fined $250 million for violating the EU privacy act in July 2019.Once the lull period that will follow the initial establishment of CCPA concludes, we can expect a greater volume of penalties dealt to organizations that fail to adhere to the law's requirements.

CCPA poses a challenge to businesses of all sizes as they seek to retain competitive edges in their respective California markets. However, the Golden State's data privacy act also represents an opportunity for companies to obtain consumer trust and increase their market share as they adhere to the law and prioritize consumer privacy. For example, Microsoft announced last month that it will be honoring CCPA throughout the US and not just within California. By prioritizing security and customer privacy, the multinational technology company will cement customer loyalty in the Microsoft brand.

For that reason, businesses should not delay the process of transforming their security and privacy strategies to conform to CCPA. Failing to adhere to CCPA will not just result in large fines for companies, but it can also significantly damage customer trust. To adhere to (and benefit from) the enactment of CCPA, organizations should take a page out of Microsoft's playbook and make the protection of consumer data a priority by implementing proactive cybersecurity strategies and maintaining transparency around how they handle and protect data. Bottom line: Complying with CCPA and continually reevaluating cybersecurity measures and strategies are critical steps for any organization that wants to succeed.

Related Content

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "'Motivating People Who Want the Struggle': Expert Advice on InfoSec Leadership"

As Chief Technology Officer of Bitglass, Anurag Kahol expedites technology direction and architecture. Anurag was director of engineering in Juniper Networks' Security Business Unit before co-founding Bitglass. He received a global education, earning an M.S. in computer ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
When It Comes To Security Tools, More Isn't More
Lamont Orange, Chief Information Security Officer at Netskope,  1/11/2021
US Capitol Attack a Wake-up Call for the Integration of Physical & IT Security
Seth Rosenblatt, Contributing Writer,  1/11/2021
IoT Vendor Ubiquiti Suffers Data Breach
Dark Reading Staff 1/11/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-28476
PUBLISHED: 2021-01-18
All versions of package tornado are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configura...
CVE-2020-28473
PUBLISHED: 2021-01-18
The package bottle from 0 and before 0.12.19 are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with defa...
CVE-2021-25173
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory allocation with excessive size vulnerability exists when reading malformed DGN files, which allows attackers to cause a crash, potentially enabling denial of service (crash, exit, or restart).
CVE-2021-25174
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory corruption vulnerability exists when reading malformed DGN files. It can allow attackers to cause a crash, potentially enabling denial of service (Crash, Exit, or Restart).
CVE-2021-25175
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.11. A NULL pointer dereference exists when rendering malformed .DXF and .DWG files. This can allow attackers to cause a crash, potentially enabling a denial of service attack (Crash, Exit, or Restart). This is issue 1 of 3.