{"id":603,"date":"2019-02-25T09:21:18","date_gmt":"2019-02-25T15:21:18","guid":{"rendered":"http:\/\/ericlambert.net\/blog\/?p=603"},"modified":"2019-02-25T09:21:18","modified_gmt":"2019-02-25T15:21:18","slug":"the-california-consumer-privacy-act-why-and-how-to-start-preparing-now","status":"publish","type":"post","link":"https:\/\/ericlambert.net\/blog\/2019\/02\/25\/the-california-consumer-privacy-act-why-and-how-to-start-preparing-now\/","title":{"rendered":"The California Consumer Privacy Act: Why (and How) to Start Preparing Now"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">By now most companies have heard about the California Consumer Privacy Act (\u201c<strong>CCPA<\/strong>\u201d).\u00a0 Privacy as an inalienable right has been enshrined in the California Constitution since 1972, and California has developed a reputation as being at the forefront of state privacy legislation. California is also known for grassroots-driven legislation through the ballot initiative process known as \u201cPropositions.\u201d The Cambridge Analytica scandal led to a combination of the two &#8211; a proposed data privacy law with extremely burdensome obligations and draconian penalties garnered enough signatures to appear on the ballot in November 2018. \u00a0To prevent this from happening, the California legislature partnered with California business and interest groups to introduce and pass the California Consumer Privacy Act. It went from introduction to being signed into law by the governor of California <\/span><span style=\"text-decoration: underline;\"><span style=\"font-weight: 400;\">in a matter of days<\/span><\/span><span style=\"font-weight: 400;\"> in June of 2018, resulting in withdrawal of the ballot initiative. No major privacy legislation had ever been enacted as quickly. The law will become effective as early as January 1, 2020 &#8211; the effective date is six (6) months after the California Attorney General releases implementing and clarifying regulations which are expected sometime in 2019. Given the speed at which it was enacted, CCPA has numerous drafting errors and inconsistent provisions which will need to be corrected. In addition, as of the date of this article, the implementing regulations are not yet released.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Other states have introduced statutes similar to CCPA, and there is some discussion in Congress about a superseding national data privacy law. Because of this, companies may want to look at CCPA compliance from a nationwide, and not California, perspective. For companies hoping that CCPA will be scaled back or repealed, that\u2019s not likely to happen. \u00a0<span style=\"text-decoration: underline;\"><strong>The clock is ticking for businesses to develop and implement a compliance plan.<\/strong><\/span> <\/span>When determining what compliance approach to take, c<span style=\"font-weight: 400;\">onsider the wisdom of the \u201cHerd on the African Savanna\u201d approach to compliance \u2013 <\/span><i><span style=\"font-weight: 400;\">the safest place to be in a herd on the African savanna is right in the center<\/span><\/i><b>.<\/b><span style=\"font-weight: 400;\"> It\u2019s almost always the ones on the <\/span><span style=\"text-decoration: underline;\"><span style=\"font-weight: 400;\">outside<\/span><\/span><span style=\"font-weight: 400;\"> which get picked off, not the ones in the center. The ones more likely to be \u201cpicked off\u201d through an investigation or lawsuit are the ones at the <\/span><span style=\"text-decoration: underline;\"><span style=\"font-weight: 400;\">front of the herd<\/span><\/span><span style=\"font-weight: 400;\"> (e.g., those who desire to be viewed as a leader in compliance) and the ones at the <span style=\"text-decoration: underline;\">back of the herd<\/span> (e.g., those who start working on compliance too late or don&#8217;t make serious efforts to be in compliance). For many companies, being in the <span style=\"text-decoration: underline;\">center of the herd<\/span>\u00a0is the optimal initial position from a compliance perspective. Once additional compliance guidance is released, e.g., through clarifying regulations, press releases, or other guidance from the state Attorney General, companies can adjust their compliance efforts appropriately.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this article, I\u2019ll talk through steps that companies may want to consider as a roadmap towards CCPA compliance.\u00a0<\/span><span style=\"font-weight: 400;\">(This is a good place to note that <\/span><span style=\"text-decoration: underline;\"><b>the information in this article does not constitute legal advice<\/b><\/span><span style=\"font-weight: 400;\"> and is provided for informational purposes only. I summarize and simplify some of CCPA provisions for ease of discussion; you should look at the specific language of the statute to determine if a provision applies in your case. Consult your own internal or external privacy counsel to discuss the specifics of CCPA compliance for your own business.)<\/span><\/p>\n<p>&nbsp;<\/p>\n<h1><b>A Quick CCPA Refresher<\/b><\/h1>\n<p><span style=\"font-weight: 400;\">The first problem with the \u201cCalifornia Consumer Privacy Act\u201d is its name. It applies to personal information collected about <u>any California resident (not just consumers)<\/u> in either a business-to-consumer (&#8220;B2C&#8221;) or business-to-business (&#8220;B2B&#8221;) context. <\/span><span style=\"font-weight: 400;\">It applies to almost every business entity that collects personal information about California residents, their affiliates, their service providers, and other third parties with which personal information is shared or disclosed. The use of &#8220;service provider&#8221; and &#8220;third party&#8221; are somewhat similar under the CCPA &#8211; both are businesses to which a company discloses a person&#8217;s confidential information for a business purpose pursuant to a written contract. The difference between the two is <u>whether the information is being processed on behalf of the disclosing company<\/u>. For example, SalesForce would be a service provider &#8211; it is processing personal information on behalf of your company. However, if the company with whom you share personal information processes it for its own benefit, not yours, it&#8217;s a &#8220;third party&#8221; under the CCPA.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cPersonal Information\u201d is defined extremely broadly under CCPA, in some ways even more broadly than under the EU&#8217;s General Data Protection Regulation (&#8220;GDPR&#8221;). \u00a0It is information that identifies, relates to, describes, is capable of being associated with, or could reasonably be linked, directly or indirectly, with a particular <\/span><span style=\"text-decoration: underline;\"><span style=\"font-weight: 400;\">person or household<\/span><\/span><span style=\"font-weight: 400;\">. It includes but is not limited to IP address, geolocation data, commercial information, professional and employment-related information, network activity, biometric information, audio\/video, and behavioral analytics about a person. \u00a0CCPA covers businesses which \u201ccollect\u201d a California resident\u2019s personal information, defined as actively or passively obtaining, gathering, accessing or otherwise receiving personal information from a person, or by observing the person\u2019s behavior. It also covers \u201cselling\u201d personal information, which is another bad choice of a defined term &#8211; \u201cselling\u201d personal information under the CCPA includes selling, renting, sharing, disclosing, or otherwise communicating (by any means) personal information to another business or third party for monetary or other valuable consideration, with some significant exceptions.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">CCPA creates five (5) rights for California residents:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The <\/span><b>Right to Know<\/b><span style=\"font-weight: 400;\"> \u2013 California residents have a general right to know the categories and purposes of personal information collected, sold, or otherwise disclosed about them.<br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The <\/span><b>Right to Access and Portability <\/b><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">\u2013 California residents have a specific right to know how, why and what personal information about them is being collected, sold or disclosed, and if information is provided electronically, to receive it in a portable format.<\/span><\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The <\/span><b>Right to Deletion<\/b><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"> \u2013 California residents have a right to request the deletion of personal information about them collected by a business, with some exceptions.<\/span><\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The <\/span><b>Right to Opt Out <\/b><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">\u2013 California residents have a right to say \u201cno\u201d to a company\u2019s sale, sharing or transfer of their personal information with third parties.<\/span><\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The <\/span><b>Right to Equal Service &amp; Pricing<\/b><span style=\"font-weight: 400;\"> \u2013 California residents have a right to equal service and pricing whether or not they choose to exercise their CCPA rights.<\/span><\/li>\n<\/ul>\n<h1><\/h1>\n<h1><b>Creating and Implementing a CCPA Compliance Plan<\/b><\/h1>\n<p>For companies that have not already gone through a GDPR compliance effort, CCPA compliance can seem daunting.\u00a0However, creating a solid compliance plan and getting started now maximizes the chance your company will be in good shape for CCPA once it becomes effective.\u00a0Here are some things to consider as you create and implement a CCPA compliance plan for your business. (Please note that if your company has already gone through a GDPR compliance effort, some of these may already be fully or mostly in place.)<\/p>\n<h2><b>1. Identify CCPA Champions within your business<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">An important initial step towards CCPA compliance is to identify the person(s) within your company that will lead the CCPA compliance effort. CCPA compliance will require a cross-departmental team. This often includes <\/span><b>Legal <\/b><span style=\"font-weight: 400;\">(to advise on and help to interpret the statutory and regulatory requirements and to monitor for new developments both on CCPA and similar federal and state legislation, and to create a compliance plan for the business if the company does not have a data governance team); <\/span><b>Development <\/b><span style=\"font-weight: 400;\">and <\/span><b>Information Technology <\/b><span style=\"font-weight: 400;\">(to implement the necessary technical and operational systems, processes, and policies which enable CCPA compliance); <\/span><b>Sales leadership<\/b><span style=\"font-weight: 400;\">\u00a0(for visibility into CCPA compliance efforts and to help manage inbound requests for CCPA compliance addenda); <\/span><b>Customer Support<\/b><span style=\"font-weight: 400;\"> (as CCPA requires customer support personnel be trained on certain aspects of CCPA compliance); <\/span><b>Security <\/b><span style=\"font-weight: 400;\">(if your company has a Chief Information Security Officer or other information security person or team); <\/span><b>Data Governance <\/b><span style=\"font-weight: 400;\">(if your company has a data governance person or team); and an <\/span><b>executive sponsor<\/b><span style=\"font-weight: 400;\"> (to support the CCPA compliance efforts within the C-Suite). Depending on your company, there may be other involved groups\/parties as well.<\/span><\/p>\n<h2><b>2. Determine <\/b><span style=\"text-decoration: underline;\"><b>how<\/b><\/span><b> CCPA applies to your business<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">A key early step in CCPA compliance is determining <\/span><span style=\"text-decoration: underline;\"><span style=\"font-weight: 400;\">how<\/span><\/span><span style=\"font-weight: 400;\"> CCPA applies to your business. \u00a0There are different compliance requirements for <\/span><em><span style=\"font-weight: 400;\">companies that collect personal information<\/span><\/em><span style=\"font-weight: 400;\">, <\/span><em><span style=\"font-weight: 400;\">companies that process personal information as a service provider<\/span><\/em><span style=\"font-weight: 400;\"> for other companies, and <\/span><em><span style=\"font-weight: 400;\">companies that \u201csell\u201d personal information or disclose it for a business purpose<\/span><\/em><span style=\"font-weight: 400;\">. \u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Does your business collect information directly from California residents, e.g., through online web forms, through customer support contacts, from employees who are California residents, through creation of an account, etc.? \u00a0<\/span><span style=\"font-weight: 400;\"><strong>If so<\/strong>, it must comply with <\/span><span style=\"text-decoration: underline;\"><span style=\"font-weight: 400;\">CCPA requirements for companies that collect personal information<\/span><\/span><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"> (a \u201cdata controller\u201d in GDPR parlance).<\/span><\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Does your business receive and process personal information on behalf of customers or other third parties? \u00a0<strong>If so<\/strong>, it must comply with <\/span><span style=\"text-decoration: underline;\"><span style=\"font-weight: 400;\">CCPA requirements for companies acting as a service provider<\/span><\/span><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"> (a \u201cdata processor\u201d in GDPR parlance.) If you are a service provider, <span style=\"text-decoration: underline;\">you must ensure your service offerings enable customers to comply with their own obligations under CCPA<\/span>.\u00a0 If not, expect a lot of requests for assistance from your customers, which could result in significant manual effort.<\/span><\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Does your business (a) \u201csell\u201d personal information to affiliates, service providers or third parties (other than for the excluded purposes under CCPA), and\/or (b) disclose or otherwise share personal information with an affiliate, service provider or third party for operational or other notified purposes? \u00a0<strong>If so<\/strong>, it must comply with <\/span><span style=\"text-decoration: underline;\"><span style=\"font-weight: 400;\">CCPA requirements for companies that \u201csell\u201d personal information or disclose it for a business purpose<\/span><\/span><span style=\"font-weight: 400;\">. It&#8217;s important to note that under Section 1798.40(t)(2) of the CCPA, there are <em>certain exceptions that when satisfied\u00a0mean a company is not &#8220;selling&#8221; personal information under the CCPA.<\/em> For example, a business does not &#8220;sell&#8221; personal information if a person uses that business&#8217;s software or online system, or gives consent for a business, to disclose their personal information to a third party, as long as that third party is also obligated not to &#8220;sell&#8221; the personal information. As another example, a business does not &#8220;sell&#8221; personal information when it shares it with a service provider, as long as certain conditions are met.<\/span><\/li>\n<\/ul>\n<h2><b>3. Inventory your data assets, data elements and data processes<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">One of the most important steps in CCPA compliance, and data privacy compliance in general, is to conduct a data inventory. \u00a0For CCPA purposes, consider inventorying your <\/span><b>data assets<\/b><span style=\"font-weight: 400;\"> (programs, SaaS solutions, systems, and service providers in which data elements are stored for use in data processes), <\/span><b>data elements<\/b><span style=\"font-weight: 400;\"> (elements of personal and other information stored in data assets), and <\/span><b>data processes<\/b><span style=\"font-weight: 400;\"> (business processes for which data elements are stored and processed in data assets). \u00a0This inventory should also collect information on service providers and other third parties with whom data elements are shared or disclosed by your business, and the purposes for which information is shared or disclosed. \u00a0<\/span><span style=\"text-decoration: underline;\"><span style=\"font-weight: 400;\">Companies should try to complete this inventory as quickly as possible<\/span><\/span><span style=\"font-weight: 400;\">. \u00a0The CCPA compliance team should work to create a list of internal individuals who should complete this inventory; once all responses are received, the compliance team should consolidate the responses into a master table.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The data inventory is a snapshot in time. \u00a0It\u2019s also important to refresh the data inventory on a regular basis, e.g., quarterly, to capture changes to data collection and usage over time.<\/span><\/p>\n<h2><b>4. Cease any unnecessary collection and\/or storage of personal information (\u201cdata minimization\u201d)<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Once the data asset\/element\/process inventory is created, businesses should be encouraged to use the opportunity to conduct a \u201cdata minimization\u201d exercise. \u00a0One of the central principles of data privacy is <\/span><span style=\"text-decoration: underline;\"><span style=\"font-weight: 400;\">data minimization &#8211; limiting the collection and storage of personal information to only what is directly necessary and relevant to accomplish a specified business purpose<\/span><\/span><span style=\"font-weight: 400;\">. \u00a0The CCPA compliance team should consider both (a) identifying data elements without an associated data process, which I call \u201c<\/span><i><span style=\"font-weight: 400;\">orphaned data elements<\/span><\/i><span style=\"font-weight: 400;\">,\u201d and purging and ceasing the further collection of stored orphaned data elements; and (b) identifying data collection which is not associated with an associated business purpose, which I call \u201c<\/span><i><span style=\"font-weight: 400;\">orphaned data transfers<\/span><\/i><span style=\"font-weight: 400;\">,\u201d and cease any further orphaned data transfers and terminate the associated contracts. \u00a0Also consider validating that record retention policies are being followed so that data is promptly irretrievably deleted once it is no longer needed for a business purpose.<\/span><\/p>\n<h2><b>5. Implement a compliance plan for the 5 CCPA privacy rights<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The heart of a CCPA compliance plan is implementing compliance with the 5 privacy rights created by the CCPA. \u00a0A solidly-constructed plan should cover compliance requirements where the business acts as a data collector, a service provider, or a company selling or otherwise disclosing personal information.<\/span><\/p>\n<h2><b>a. The Right to Know<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">One of CCPA&#8217;s core requirements is to publicly provide the necessary disclosure of the CCPA privacy rights, including the specific methods by which a person can submit requests to exercise those rights. \u00a0Many companies will likely add this to their privacy policy, as well as any California-specific disclosures already made by the business. Don\u2019t forget this disclosure needs to be added not only to websites, but to mobile apps. \u00a0The disclosures must include a list of the categories of personal information collected, sold or disclosed for business purposes during the previous 12 months, as well as a list of the business purposes for which the categories are used. If this information is collected as part of the data inventory, it can greatly simplify the process of creating this disclosure.\u00a0 The implementation plan should include a process for updating these disclosures as needed to reflect a rolling 12-month period.<\/span><\/p>\n<h2><b>b. The Right to Access and Portability<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Another key requirement is the implementation of a process to respond to verifiable requests from data subjects for the following information covering the 12-month period preceding the request date.\u00a0 Companies will need to provide information including:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The <\/span><span style=\"font-weight: 400;\"><span style=\"text-decoration: underline;\">categories of personal information<\/span><\/span><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"> collected about that person<\/span><\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The <\/span><span style=\"font-weight: 400;\"><span style=\"text-decoration: underline;\">categories of sources<\/span><\/span><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"> from which the personal information is collected<\/span><\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The\u00a0<\/span><span style=\"text-decoration: underline;\"><span style=\"font-weight: 400;\">business\/commercial purpose<\/span><\/span><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"> for collecting\/selling personal information<\/span><\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The <\/span><span style=\"text-decoration: underline;\"><span style=\"font-weight: 400;\">categories of third parties<\/span><\/span><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"> to which their personal information is shared\/disclosed<\/span><\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The <\/span><span style=\"text-decoration: underline;\"><span style=\"font-weight: 400;\">specific data elements<\/span><\/span><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"> collected about that person for the 12-month period preceding the request date (this could be read to conflict with data destruction policies or data minimization best practices, but I suspect that destruction policies or data minimization best practices will trump this disclosure requirement)<\/span><\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">If a person\u2019s personal information is sold or is disclosed for a business purpose by your business unit, <\/span><span style=\"text-decoration: underline;\"><span style=\"font-weight: 400;\">additional information must be provided<\/span><\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">If the data inventory is done right, it can be a source of data for this response (except for the requestor&#8217;s specific data elements). Companies must provide at least 2 methods for a person to submit a verifiable request &#8211; a toll-free number and website address are both required.\u00a0 The California Attorney General will release regulations on how to \u201cverify\u201d a request. Information must be disclosed within 45 days of receipt of the request, but there is a process under CCPA to extend the time period to 90 days if necessary. If information is provided electronically, they must be provided in a <\/span><span style=\"text-decoration: underline;\"><span style=\"font-weight: 400;\">portable format<\/span><\/span><span style=\"font-weight: 400;\"> (e.g., an .xml file). The team that is responsible for fulfilling verified requests should be trained on how to prepare a response, and should test it before the CCPA effective date to validate that the process is working properly. You can\u2019t require someone to have an account with you in order to submit a request.\u00a0Don\u2019t forget to train your website and customer service personnel on how to handle consumer requests.<\/span><\/p>\n<p>Also, if you are a service provider, your clients will look to you to ensure they are able to pull information from your systems necessary for them to comply with the right to access and portability. Don&#8217;t overlook including in your compliance plan a review of your customer portal and interfaces (e.g., APIs) to ensure customers are able to satisfy their CCPA compliance obligations.<\/p>\n<h2><b>c. The Right to Deletion<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Another key requirement is to implement a process to <\/span><span style=\"font-weight: 400;\"><span style=\"text-decoration: underline;\">delete collected personal information of a person<\/span><\/span><span style=\"font-weight: 400;\"> if that person submits a verified request for deletion, and to <\/span><span style=\"text-decoration: underline;\"><span style=\"font-weight: 400;\">direct your service providers to do the same<\/span><\/span><span style=\"font-weight: 400;\">. Note that this does not apply to third parties with whom information has been shared or disclosed who are not service providers. \u00a0As with the right to access and portability, you can\u2019t require someone to have an account with you to exercise this right.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are many important exclusions to the right of deletion. \u00a0These include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Completing a transaction with, providing a good or service requested by or reasonably anticipated under a business relationship with, or otherwise needed to perform a contract with, a person<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Security purposes<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Debugging and error resolution<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Conducting formal research (many conditions apply)<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">\u201cSolely internal uses\u201d that are reasonably aligned with a person\u2019s expectations based on the person\u2019s relationship with the business<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Compliance with a legal obligation<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Internal uses in a lawful manner that is compatible with the context in which the person provided the personal information<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Other limited exceptions under CCPA<\/span><\/li>\n<\/ul>\n<h2><b>d. The Right to Opt Out<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">This one may be the most challenging for many companies to implement. \u00a0It applies if a business \u201csells\u201d personal information to third parties, or otherwise shares personal information with a third party (e.g., a data sharing agreement).\u00a0 \u00a0CCPA appears to provide that an opt-out <\/span><span style=\"text-decoration: underline;\"><span style=\"font-weight: 400;\">would not apply to information provided to a company\u2019s own service providers<\/span><\/span><span style=\"font-weight: 400;\"> to further the company\u2019s own business purposes, as long as there are certain contractual requirements in place with the service provider.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">CCPA requires companies to implement a \u201cDo Not Sell My Personal Information\u201d opt-out page linked to from the homepage footer on a website, and from their mobile apps. \u00a0(The description of a person\u2019s rights under CCPA in section (a) above should include a description of the right to opt out.) Creating a process to verify requests (pending guidance from the California Attorney General) is especially important here since opt-out requests can be submitted by a person or that person\u2019s \u201cauthorized representative.\u201d \u00a0Once a request has been verified, the personal information of the data subject cannot be shared with third parties (e.g., by associating an opt-out flag with the personal information) until the person later revokes the opt-out by giving the business permission to share his or her personal information with third parties. However, you cannot ask for permission for at least 12 months from the opt-out date. \u00a0Companies must train their customer service representatives on how to direct persons to exercise their opt-out rights.<\/span><\/p>\n<h2><b>e. The Right to Equal Service and Pricing<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">As part of a CCPA compliance plan, businesses should consider ways to make sure that they do not charge more or otherwise \u201cdiscriminate\u201d against a person who chooses to exercise one of their CCPA rights. \u00a0A business can offer financial incentives to persons for the collection, sale or retention of their personal information, as long as that incentive is not <\/span><span style=\"text-decoration: underline;\"><span style=\"font-weight: 400;\">unjust, unreasonable, coercive or usurious<\/span><\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h2><b>5. Verify you have\u00a0<\/b><b>CCPA-compliant written contracts in place with s<\/b><b>ervice providers and third parties receiving personal information<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Personal information governed by CCPA may only be disclosed to a service provider or third party under a written contract. Businesses should work with their internal or external Legal resource to validate that written contracts are in place with all service providers and third parties to which personal information is disclosed, and that there is a valid business purpose for disclosing the personal information. If no written agreement exists, work with your Legal resource to negotiate and execute a CCPA-compliant agreement. For existing written agreements, a CCPA contract addendum will likely be required which adds into the agreement the obligations and commitments required under CCPA. Don&#8217;t forget to look at any data sharing with your corporate affiliates which is likely under an inter-company agreement.<\/span><\/p>\n<h2><b>6. Prepare for compliance requests where your company is a service provider<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">If your company is a service provider to other businesses, you should expect to start receiving questions about, and contract amendments\/addenda related to, CCPA. \u00a0It\u2019s the inverse of #5 above. Consider how to most efficiently handle these requests. Some companies may want to consider whether to have a standard CCPA compliance addendum for use with customers, or to have a CCPA compliance statement on a public facing website that can be referred to as needed.\u00a0 Work with Sales and account managers to educate them as to why the company cannot accept a customer\u2019s own CCPA addenda, which may include more than just CCPA compliance terms.<\/span><\/p>\n<h2><b>\u00a07. Take steps to permit continued use\u00a0of de-identified personal information<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Finally, a CCPA compliance plan should include implementation of appropriate steps as needed so your company can continue to use <\/span><span style=\"text-decoration: underline;\"><span style=\"font-weight: 400;\">de-identified personal information<\/span><\/span><span style=\"font-weight: 400;\"> (an information record which is not reasonably capable of being identified with, relating to, describing, being associated with or being directly\/indirectly linked to the source person) and <\/span><span style=\"text-decoration: underline;\"><span style=\"font-weight: 400;\">aggregated personal information<\/span><\/span><span style=\"font-weight: 400;\"> (information relating to a group or category of persons from which individual identities have been removed, and which is not linked or reasonably linkable to a <\/span><i><span style=\"font-weight: 400;\">person or device<\/span><\/i><span style=\"font-weight: 400;\">). \u00a0CCPA talks about de-identified data only with respect to the following requirements, but the same safeguards and processes would likely apply to aggregated personal information.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Implement technical safeguards to prohibit re-identification of the person to whom de-identified personal information pertains.<\/span><\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Implement business processes that specifically prohibit re-identification of de-identified personal information.<\/span><\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Implement business processes to prevent the inadvertent release of de-identified personal information.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Your company can only use de-identified personal information as long as it makes <\/span><span style=\"text-decoration: underline;\"><span style=\"font-weight: 400;\">no attempt to re-identify<\/span><\/span><span style=\"font-weight: 400;\"> the de-identified personal information (whether or not that attempt is successful). \u00a0If your company begins re-identifying personal information, cease any use of de-identified personal information immediately.<\/span><\/p>\n<h2>8. Review your security procedures and practices, and consider encryption and data redaction options<\/h2>\n<p>Finally, business are encouraged to review their security procedures and practices to ensure they are reasonable and appropriate to protect personal information in their possession or control. CCPA creates a private right of action for consumers whose <u>un-encrypted<\/u> or <u>un-redacted<\/u> personal information is subject to an unauthorized &#8220;access and exfiltration,&#8221; theft, or disclosure as the result of a business&#8217;s violation of its duty to implement and maintain reasonable security procedures and practices to protect personal information appropriate to the nature of the information. For this private right of action, CCPA specifically uses a <u>different definition of personal information<\/u>, the one found in California Civil Code \u00a7 1798.81.5(d)(1)(A). Here, &#8220;personal information&#8221; means a person&#8217;s first name or first initial and last name coupled with the person&#8217;s (i)\u00a0social security number, (ii)\u00a0driver\u2019s license number or California identification card number, (iii)\u00a0account number, credit or debit card number, in combination with any required security code, access code, or password that would permit access to an individual\u2019s financial account, (iv)\u00a0medical information, and\/or (v)\u00a0health insurance information, where such information is not encrypted or redacted. Any private right of action is sure to spawn a cottage industry of class action lawsuits. If your company collects and\/or receives personal information as defined above, consider a review of your company&#8217;s security procedures and practices to ensure that they are <u>reasonable and appropriate<\/u> to protect such personal information given the nature of the information.<\/p>\n<p>In 2016, the California Attorney General issued a <a href=\"https:\/\/oag.ca.gov\/sites\/all\/files\/agweb\/pdfs\/dbr\/2016-data-breach-report.pdf\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Data Breach Report<\/a> in which the Attorney General stated that &#8220;[t]he 20 security controls in the <a href=\"https:\/\/www.cisecurity.org\/controls\/\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Center for Internet Security&#8217;s Critical Security Controls<\/a> identify a minimum level of information security that all organizations that collect or maintain personal information should meet. The failure to implement all the Controls that apply to an organization&#8217;s environment constitutes a lack of reasonable security.&#8221; Given this, all companies are encouraged to review the <a href=\"https:\/\/www.cisecurity.org\/controls\/\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Center for Internet Security&#8217;s Critical Security Controls<\/a> to ensure that they meet the California AG&#8217;s minimum definition of &#8220;reasonable security.&#8221;<\/p>\n<p>The California Attorney General&#8217;s report included other recommendations, such as use of multi-factor authentication on consumer-facing online accounts containing sensitive personal information, and the consistent use of strong encryption to protect personal information on laptops, portable devices, and desktop computers. Companies may want to evaluate whether implementing encryption at rest on servers, workstations, and removable media, and\/or redacting personal information (e.g., through tokenization and deletion of the source data or another data redaction technique), would make sense as a part of its security procedures and practices.<\/p>\n<p>&nbsp;<\/p>\n<p><i><span style=\"font-weight: 400;\">Eric Lambert is counsel for the Transportation division of Trimble Inc., an geospatial solutions provider focused on transforming how work is done across multiple professions throughout the world\u2019s largest industries. He supports the<\/span><\/i><a href=\"http:\/\/mobility.trimble.com\/\"> <i><span style=\"font-weight: 400;\">Trimble Transportation Mobility<\/span><\/i><\/a><i><span style=\"font-weight: 400;\"> and<\/span><\/i><a href=\"https:\/\/www.tmwsystems.com\/\"> <i><span style=\"font-weight: 400;\">Trimble Transportation Enterprise<\/span><\/i><\/a><i><span style=\"font-weight: 400;\"> business units, leading providers of software and SaaS fleet mobility, communications, and data management solutions for transportation and logistics companies. He is a corporate generalist and proactive problem-solver who specializes in transactional agreements, technology\/software\/cloud, privacy, marketing and practical risk management. Eric is also a life-long techie, Internet junkie and avid reader of science fiction, and dabbles in a little<\/span><\/i><a href=\"http:\/\/voiceover.ericlambert.net\"> <i><span style=\"font-weight: 400;\">voice-over work<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">. Any opinions in this post are his own. This post does not constitute, nor should it be construed as, legal advice.<\/span><\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By now most companies have heard about the California Consumer Privacy Act (\u201cCCPA\u201d).\u00a0 Privacy as an inalienable right has been enshrined in the California Constitution since 1972, and California has developed a reputation as being at the forefront of state &hellip; <a href=\"https:\/\/ericlambert.net\/blog\/2019\/02\/25\/the-california-consumer-privacy-act-why-and-how-to-start-preparing-now\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,4,10],"tags":[36,37,41,69,141],"class_list":["post-603","post","type-post","status-publish","format-standard","hentry","category-contracts","category-legal","category-privacy","tag-cacpa","tag-california","tag-ccpa","tag-data-privacy","tag-privacy"],"_links":{"self":[{"href":"https:\/\/ericlambert.net\/blog\/wp-json\/wp\/v2\/posts\/603","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ericlambert.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ericlambert.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ericlambert.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ericlambert.net\/blog\/wp-json\/wp\/v2\/comments?post=603"}],"version-history":[{"count":0,"href":"https:\/\/ericlambert.net\/blog\/wp-json\/wp\/v2\/posts\/603\/revisions"}],"wp:attachment":[{"href":"https:\/\/ericlambert.net\/blog\/wp-json\/wp\/v2\/media?parent=603"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ericlambert.net\/blog\/wp-json\/wp\/v2\/categories?post=603"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ericlambert.net\/blog\/wp-json\/wp\/v2\/tags?post=603"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}