California Data Security Breach Act Helps Protect Citizens From Id Theft
- Date: 2007-05-01 - Word Count: 553
Share This!
What Does This Act Mean for Californians?
With the increasing incidence of identity theft, the state of California has passed a law that essentially protects personal information of its citizens. The California Security Breach Information Act protects citizens by holding businesses and organizations responsible for protecting valuable information. In addition these organizations must report and security breaches to authorities in a timely fashion.
The Act was enforced on July 1, 2003, to curtail the growing instances of identity theft. It is also referred to as the Database Security Breach Notification Act, Security Breach Law, California's Database Security Breach Notification Act, California State Bill 1386, Breach Notification Law, Senate Bill 1386 and California Security Breach Information Act, SB 1386. The Act is an effective and important measure adopted to deal with identity theft. The California Database Security Breach Act is applicable to all state agencies, individuals and businesses in California.
The Act is widely applied and even includes those businesses that are not based in California, but have clientele in the state. Personal information includes details such as Social Security Numbers, state ID card numbers, driver's license details, bank account numbers, credit or debit card numbers and security codes. In addition to notifying customers, the Act also requires disclosure, even if the security breach is merely suspected.
Repercussions Of The Law
Several companies have welcomed the law, however there are a few that have strongly opposed it. The latter believe that notifying a customer about a suspected breach may unnecessarily scare the person. According to these business communities, notifying customers based on a mere suspicion may lead to negative consequences and harm the image of the company involved. Besides, they say, such laws may also encourage hackers, who would be more than happy to trigger customer panic. IT departments of various companies are engaged in identifying ways to combat security breaches. The law also regulates service providers who process sensitive personal information over the Internet.
How Some Businesses Are Ensuring Security
Many companies that support the law have revised their security structures. Some companies have installed host-based software in an effort to safeguard data security. A week after installation, the software detects any unusual patterns and accordingly impedes any attempt to damage or access the server. There are companies that have also installed computer gateways, to check suspicious or illegal attempts to access personal information of customers.
Alerting Citizens
The law clearly mentions the ways in which companies can notify customers about security breaches. Customers can be informed via email, with prior permission. To reach out to a larger database of customers, the law also allows web postings and press coverage.
The Act has raised several questions, and legal experts are contemplating whether a security breach should be brought to the notice of California-based customers only or those of other regions as well. There may be certain customers listed as non-California residents in the company database. If such a customer later moves and becomes a California resident, without the company updating the information, they may fall through the cracks.
Every law has its cracks and those issues must be addressed. For now, this law protects the majority of California's residents and that is good news for those who are at risk for identity theft. Many businesses throughout California have chosen to protect valuable customer data with a professional document destruction company.
With the increasing incidence of identity theft, the state of California has passed a law that essentially protects personal information of its citizens. The California Security Breach Information Act protects citizens by holding businesses and organizations responsible for protecting valuable information. In addition these organizations must report and security breaches to authorities in a timely fashion.
The Act was enforced on July 1, 2003, to curtail the growing instances of identity theft. It is also referred to as the Database Security Breach Notification Act, Security Breach Law, California's Database Security Breach Notification Act, California State Bill 1386, Breach Notification Law, Senate Bill 1386 and California Security Breach Information Act, SB 1386. The Act is an effective and important measure adopted to deal with identity theft. The California Database Security Breach Act is applicable to all state agencies, individuals and businesses in California.
The Act is widely applied and even includes those businesses that are not based in California, but have clientele in the state. Personal information includes details such as Social Security Numbers, state ID card numbers, driver's license details, bank account numbers, credit or debit card numbers and security codes. In addition to notifying customers, the Act also requires disclosure, even if the security breach is merely suspected.
Repercussions Of The Law
Several companies have welcomed the law, however there are a few that have strongly opposed it. The latter believe that notifying a customer about a suspected breach may unnecessarily scare the person. According to these business communities, notifying customers based on a mere suspicion may lead to negative consequences and harm the image of the company involved. Besides, they say, such laws may also encourage hackers, who would be more than happy to trigger customer panic. IT departments of various companies are engaged in identifying ways to combat security breaches. The law also regulates service providers who process sensitive personal information over the Internet.
How Some Businesses Are Ensuring Security
Many companies that support the law have revised their security structures. Some companies have installed host-based software in an effort to safeguard data security. A week after installation, the software detects any unusual patterns and accordingly impedes any attempt to damage or access the server. There are companies that have also installed computer gateways, to check suspicious or illegal attempts to access personal information of customers.
Alerting Citizens
The law clearly mentions the ways in which companies can notify customers about security breaches. Customers can be informed via email, with prior permission. To reach out to a larger database of customers, the law also allows web postings and press coverage.
The Act has raised several questions, and legal experts are contemplating whether a security breach should be brought to the notice of California-based customers only or those of other regions as well. There may be certain customers listed as non-California residents in the company database. If such a customer later moves and becomes a California resident, without the company updating the information, they may fall through the cracks.
Every law has its cracks and those issues must be addressed. For now, this law protects the majority of California's residents and that is good news for those who are at risk for identity theft. Many businesses throughout California have chosen to protect valuable customer data with a professional document destruction company.
Related Tags: identity theft, information security, data security, personal security, california data security breach act
Andy Lawson and Southland shredding, a California document shredding services company, work to prevent information security issues by providing collection centers and mobile shredding services for the secure document shredding Orange County California needs of companies, government offices or individual privacy protection. Your Article Search Directory : Find in Articles
Recent articles in this category:
- What Is Spyware?
If you use a computer then there are certain things that you have to be educated about. Spyware is o - There's No Such Thing As The Perfect Password
Even though you can get advice on how to create the perfect password, it's important to realize that - Shopping Online For Contacts: Security And Privacy
The Fairness to Contact Lens Consumer Act, signed into law in 2004, empowered lens wearers with the - Step-by-step Procedure Of Ssl Certificate Installation
SSL certificates are used to transfer the private data entered on the user computer to the website o - Software Protection Versus Code Obfuscation - Stable Software Protection
Security of intellectual property is crucial for every business in today's modern reality. Competiti - Portable Mini Digital Video Recorder
Portable Mini Digital Video Recorder is one of the world's smallest high-resolution mini Digital Vid - Protecting Domain Name From Cyber Squatting And Hijacking
Before I go into details about protecting domain name you should first know that there is no busines - Finding Email Senders Using Reverse Email Lookup
Most of our email inboxes are flooded with so many solicited and unsolicited messages that it's ofte - Confidentiality With Secure Email
Confidentiality, in any business, is among the most significant key in order to keep a client. There - Covering Your Computer's Footprints
When you delete a file, email, or piece of internet history on your computer, where do you think it
Most viewed articles in this category:
- How Does Ssl Fit Into the Over Scheme of Internet Security?
Internet has become an integral part of our life. Most of us prefer to do maximum amount of transact - Tips of Security
Protecting private information Information is the lifeblood of most, if not all, modern organis - Your Security Awareness Iq
Article about security awareness: Are you aware of the need for security? Your awareness o - Information Security Endangered
Sour time is coming. Spy programs are stealing information more easily. The reason is weak algorithm - Internet Attack Methods
The U.S. Government's National Information Assurance Glossary defines Information Security as: Prote - Computer Viruses
In information security , computer virus is a manmade program or piece of code that is loaded onto y - The Top 7 Threats to your Computer in 2007
Now that the holidays are behind us, the cost-conscious among us will be looking for those "post-hol - In Reality, Spyware is Always a Threat
I received a spam email the other day and the subject said "Tired of reality shows? Make your ow - Security Using Public Internet Array Access
Internet comes to peoples lives and then suddenly comes truth, that WE CAN'T LIVE WITHOUT INTERNET. - Enslaving the Airwaves: the Repercussions of Insecure Wireless Networks
There is no doubt that wireless technology has evolved the way we communicate. With the popular 2.4