Webinar: Join us, Tues 5/24. Nightfall & Hanzo experts will discuss how machine learning can enhance data governance, data security, and the efficiency of legal investigations. Register now ⟶

Guides 5 min read

An Overview of the California Data Breach Notification Law (+Compliance Template)

by Michael Osakwe Published Nov 18, 2022

In this post, we’ll quickly cover the highlights of what you need to know about California’s Data Breach Notification Statute.

What is California’s Data Breach Notification Law?

Many states in the US have data privacy and protection statutes as part of their legal codes. For the most part, these codify what types of PII/PI constitute a data breach, as well as when and how an entity doing business should communicate with customers if a data breach occurs.

California’s Data Breach Notification Law vs CCPA

The California Data Breach Notification Law should not be confused with the California Consumer Privacy Act or the California Privacy Rights Act (colloquially known as “CCPA 2.0”). The data breach notification law, passed in 2003, predates the CCPA by nearly two decades. All of these laws, however, are part of the same legal framework. The CCPA/CPRA predominantly gives consumers certain rights—like Right to Know, Right to Delete, etc.—that requires companies to know where Californians’ personal information is stored.

It’s worth noting, though, that the CCPA does contain an enforcement mechanism tied to data breaches through “Private Right of Action” which allows customers who are impacted by a data breach to sue the breached organization. Penalties can range from  $100 to $750 per consumer per incident.

What does the California Data Breach Notification Law say?

The law (Cal. Civ. Code §1798.82) centers around defining when notification of data breaches occur, and what types of personal information (PI) constitute a data breach.

Any entity (person or business) that conducts operations in California and manages/stores/uses digital personal information is required to disclose security breaches immediately after discovering or becoming aware of them. The law has an exception in instances where notifications may be delayed by law enforcement investigations.

Included with the law is a template illustrating the format that a data breach notification should take. Additionally, the law defines what information constitutes exposure of personal information. See the subsections quoted verbatim below.

For purposes of this section, “personal information” means either of the following:

(1) An individual’s first name or first initial and last name in combination with anyone or more of the following data elements, when either the name or the data elements are not encrypted:

(A) Social security number.

(B) Driver’s license number, California identification card number, tax identification number, passport number, military identification number, or other unique identification number issued on a government document commonly used to verify the identity of a specific individual.

(C) Account number or credit or debit card number, in combination with any required security code, access code, or password that would permit access to an individual’s financial account.

(D) Medical information.

(E) Health insurance information.

(F) Unique biometric data generated from measurements or technical analysis of human body characteristics, such as a fingerprint, retina, or iris image, used to authenticate a specific individual. Unique biometric data does not include a physical or digital photograph, unless used or stored for facial recognition purposes.

(G) Information or data collected through the use or operation of an automated license plate recognition system, as defined in Section 1798.90.5.

(H) Genetic data.

(2) A username or email address, in combination with a password or security question and answer, that would permit access to an online account.

How can you protect California PI?

California takes data privacy and security enforcement seriously, which means that if you have the personal information of any Californians, you’ll need to ensure that it’s not exposed to unauthorized parties. 

Many companies use Nightfall, a cloud-native data loss prevention solution, to accomplish this. Nightfall integrates with cloud services like Slack, Confluence, Salesforce, Google Drive, and more in order to discover, classify, and protect sensitive data. Nightfall uses machine learning detectors, each trained on a specific type of PII or sensitive data—like person name, address, API keys, and more—in order to classify content in a file or message. Once identified, this sensitive data can be remediated through some action like redaction or, if appropriate, deletion. 

Nightfall’s simple interface allows you to create remediation policies that tell the platform: 

  1. What type of data Nightfall’s machine detectors should look for.
  2. Where Nightfall should scan for the data within a given app. For example, in Slack you can scan within public and private channels, DMs, or Slack Connect channels depending on which tier of Nightfall you’re using. Use the PI template below to see where you should scan for Californian personal information.
  3. How to handle any positive findings. Nightfall can be configured to take remediation actions automatically. Because Nightfall integrates at the API level, all actions are contextually relevant and specific to each app. For example, within Slack policies, you’re allowed to automatically redact any message containing sensitive data. However, in Google Drive, you’re able to alter the permissions of any files containing sensitive data.

Nightfall can:

  • Alert. Alert you to inappropriately exposed PII in a message or file. This happens automatically, but you need to specify if you want to receive alerts via email, Slack, or send them (via webhook) to a SIEM. Alerts contain detailed metadata that give you all the context you need to assess your risk.
  • User Education. Notify end users about any policy violations they’ve created. Notifications can contain custom messages, allowing you to educate employees about proper etiquette and policy to turn an incident into a teachable moment. This action can be taken manually or automated.
  • Delete. Completely delete the file or message containing the finding. This is an action that can be taken manually or automated.
  • And much more

To learn more about Nightfall and see the platform in action, watch clips from our demo video library, request a free trial, or schedule a call to discuss your use case.

California data breach & PI templates

You can use Nightfall to discover, classify, and protect any California-defined PI from accidental exposure. For most standard scenarios, we recommend the following Detection Rule templates to protect California Personal Information:

PIIConfidence LevelDetection RuleDetection PolicyDescription
Person nameUS social security numberAll at very likelyIf All are TriggeredSlack Enterprise. Add Nightfall Bot to all Internal & Connect channels where PI shouldn’t be shared (ie: no business purpose or need).
Jira Enterprise. Have Nightfall scan Jira projects for inappropriate disclosure of PI.

Confluence Enterprise.
Have Nightfall scan pages for inappropriate disclosure of PII.
An individual’s first name or first initial and the individual’s last name when combined with specific identifiers constitutes a data breach
Person nameUS driver licenseAll at very likelyIf All are TriggeredSlack Enterprise. Add Nightfall Bot to all Internal & Connect channels where PI shouldn’t be shared (ie: no business purpose or need).
Jira Enterprise. Have Nightfall scan Jira projects for inappropriate disclosure of PI.

Confluence Enterprise.
Have Nightfall scan pages for inappropriate disclosure of PI.
An individual’s first name or first initial and the individual’s last name when combined with specific identifiers constitutes a data breach
Person nameUS passportAll at very likelyIf All are TriggeredSlack Enterprise. Add Nightfall Bot to all Internal & Connect channels where PI shouldn’t be shared (ie: no business purpose or need.
Jira Enterprise. Have Nightfall scan Jira projects for inappropriate disclosure of PI.

Confluence Enterprise.
Have Nightfall scan pages for inappropriate disclosure of PI.
An individual’s first name or first initial and the individual’s last name when combined with specific identifiers constitutes a data breach
Person nameUS Individual Taxpayer Identification Number (ITIN)All at very likelyIf All are TriggeredSlack Enterprise. Add Nightfall Bot to all Internal & Connect channels where PI shouldn’t be shared (ie: no business purpose or need.
Jira Enterprise. Have Nightfall scan Jira projects for inappropriate disclosure of PI.

Confluence Enterprise.
Have Nightfall scan pages for inappropriate disclosure of PI.
An individual’s first name or first initial and the individual’s last name when combined with specific identifiers constitutes a data breach
Credit Card Number
Person Name
All at very likelyIf All are TriggeredSlack Enterprise. Add Nightfall Bot to all Internal & Connect channels where PI shouldn’t be shared (ie: no business purpose or need).
Jira Enterprise. Have Nightfall scan Jira projects for inappropriate disclosure of PI.

Confluence Enterprise.
Have Nightfall scan pages for inappropriate disclosure of PI.
An individual’s first name or first initial and the individual’s last name when combined with specific identifiers constitutes a data breach

Subscribe to our newsletter

Receive our latest content and updates

Nightfall logo icon

About Nightfall

Nightfall is the industry’s first cloud-native DLP platform that discovers, classifies, and protects data via machine learning. Nightfall is designed to work with popular SaaS applications like Slack, Google Drive, GitHub, Confluence, Jira, and many more via our Developer Platform. You can schedule a demo with us below to see the Nightfall platform in action.

 

Schedule a Demo

Select a time that works for you below for 30 minutes. Once confirmed, you’ll receive a calendar invite with a Zoom link. If you don’t see a suitable time, please reach out to us via email at sales@nightfall.ai.

call to action

See Nightfall in action.

Schedule a demo