CCPA’s Top 5 Compliance Challenges

sam

Originally published on Lockpath.com


The California Consumer Privacy Act (CCPA) took effect on New Year’s Day. California is the first state in the union to create a data privacy law for its residents. Other states will follow soon.

For compliance purposes, there is good news and bad news. The good news: CCPA has a six-month grace period. There will be no enforcement action until after July 1, 2020. Bad news? You only have until July 1 to get your act together.

Let’s get to work. Here are the top five challenges you’ll encounter while complying with CCPA’s requirements and tips to address them.

1. CCPA’s Foundational Requirement

CCPA demands that you categorize personal data as well as define the purpose for each category. CCPA states: “at or before the point of collection, [the business shall] inform consumers as to the categories of personal information to be collected and the purposes for which the categories of personal information shall be used.”

CCPA’s categorization requirement presents organizations with a foundational challenge....Basically, can you justify the privacy data you collect?

CCPA’s categorization requirement presents organizations with a foundational challenge: how well does the mission and goals of the company, along with its processes and policies, align with the data you are collecting and protect people’s data privacy?  Basically, can you justify the privacy data you collect?

Address data privacy’s foundational challenge with a thorough and effective, focused, and flexible data governance structure. This type of governance lets you more easily identify the categories of personal information you need to achieve the goal of complying with CCPA.

2. Data Involves Every Department, not Just IT

For CCPA compliance, organizations need pinpoint accuracy in identifying what data exists and where it’s located.

Given the way data flows through and around an organization, the job of data caretaker falls on everyone – business managers, audit, privacy officers and security personnel. It’s not a job that can be relegated to IT. Business processes, toolsets, customers, and vendors, all also interact with data. This omnipresence of data creates additional challenges for CCPA compliance. For example, many companies monitor their servers for configurations, data security, and the applications that run on them. That, however, is not true with company laptops that can run unapproved software, store gigabytes of protected data, and insecurely communicate with third parties via email and cloud-based share drives.

The daily course of business can also be a trouble spot. Let's say a salesperson prefers using a free CRM tool, but the software falls outside the company’s approved toolsets and standard processes. Or the product management team’s reporting solution is incompatible with the enterprise’s reporting solution. In each case, awareness and access to data are lost.

Whether it’s processes or people touching data, both need direction and guidance on handling data with privacy implications.

Read More: CCPA: Understanding Data Privacy’s Pandora’s Box

3. Protecting Your Organization’s Data

CCPA stipulates your company is responsible for protecting its data.

The challenge comes when performing risk assessments and conducting continuous monitoring, which are key tactics for securing and protecting data. Such activities disrupt people and processes focused on serving the needs of the business. You may encounter resistance.

Another issue is the lack of guidance for security procedures compliant with CCPA. While CCPA does not define reasonable security procedures, California’s attorney general has cited the CIS Top 20 as the minimum set of controls that would meet the standard for reasonable security. On a side note, understanding which CIS 20 controls to use and how to apply them holistically can be a challenge in itself.

Data protection requirements with CCPA calls for an integrated management of assets and data combined with the CIS Top 20 set of controls.

Preview: Full Length CCPA Training Course for Employees & Managers

4. Meeting Data Subjects’ Rights

CCPA grants its citizens multiple rights, including Right to Access, Right to Know, Right to Opt-Out, and Right to Deletion. Companies mistakenly believe data subject rights focus exclusively on the right to be forgotten. It’s much more than that.

For CCPA compliance, you need consumer-facing and back-office processes designed to address all data subject rights...

For CCPA compliance, you need consumer-facing and back-office processes designed to address all data subject rights, as well as facilitate disclosures and answer consumer questions submitted via multiple channels, including a toll-free number. Failure to address all data subject rights could not only damage customer relationships but also lead to fines, reputational damage, and litigation.

Read More: Mastering the Full Life Cycle of PII to Deliver on CCPA Data Requests

5. The Race Against the Clock When Data Breaches Occur

CCPA’s breach notification requirement is time-sensitive and can be high stress. When a breach occurs, multiple clocks start ticking, such as notifying the effected people and appropriate authorities.

Although not required for compliance, firms are also under pressure to act quickly after a breach occurs. That means getting ahead of the story or taking proactive steps to keep the business operational and preserving its reputation. Firms should also consider specific plans for financial resiliency as some businesses will encounter steep fines and/or class action lawsuits pursued by data subjects.

Data breach notification requirements and non-regulatory issues call for a dedicated cross-functional team that can act swiftly and report to higher-ups with real-time information needed to make informed decisions without delay.

Enlist a Technology Solution for CCPA Compliance

CCPA’s complexity of requirements makes compliance next to impossible without a technology solution.

Look for a solution that can deliver on the following:

  • Houses CCPA requirements and connects them to controls, processes, and more for an integrated view of risk and compliance
     
  • Incorporates CIS Controls for information security  
     
  • Enhances privacy by normalizing CIS Top 20 with ISO 27701 and, when released, NIST 800-53 V5
     
  • Streamlines communications between departments, and third parties, including customers
     
  • Automatically identifies hardware and software assets on networks, including rogue or unknown assets
     
  • Facilitates, consolidates, and/or reports on the status of responses to data subject requests from multiple channels, including a toll-free number
     
  • Integrates surveys and questionnaires that support continuous monitoring of third parties to ensure compliance with processes and ethical practices
     
  • Manages and reports on the entire privacy incident management life cycle

As is often the case, you are not likely going to get the extra resources you need to manage privacy using your current processes and toolsets.  In order to keep up with CCPA and future privacy requirements, you need to take a purposeful and automated approach to meet the challenges listed above. The right technology solution allows you to do more with less, all the while helping you meet CCPA requirements. It sets you up for not only complying with CCPA, but also other state data privacy regulations, GDPR, and data privacy laws in over 80 countries.

CCPA Compliance: Data Subject Rights Hotline & Web Intake Bundle


Chat with a solutions expert to learn how you can take your compliance program to the next level of maturity.


Data Privacy Is Not a Law, It’s a Lifestyle

5 Best Practices for Managing Whistleblower Expectations & Experiences

Research shows that the majority of employee whistleblowers report internally before reporting to regulators or the media. Here are five whistleblower best practices to ensure that once our ethics and compliance teams receive an internal report, we are properly managing reporters to ensure issues are able to be addressed and resolved internally. 

Previous/Next Article Chevron Icon of a previous/next arrow. Previous Post

Our 2020 Risk & Compliance Trends & Predictions

Every year as we prepare to launch our annual Top 10 Risk & Compliance Trends report, we discuss the complexity of the environments in which our organizations operate. This year is no different; however, how we are approaching that complexity is. Here is an overview of the key themes we are seeing in 2020.

Next Post Previous/Next Article Chevron Icon of a previous/next arrow.

Comments