Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

The Future of Employee Data Under California Consumer Privacy Act (CCPA)

Published June 15, 2021
Author

Omer Imran Malik

Data Privacy Legal Manager, Securiti

FIP, CIPT, CIPM, CIPP/US

Listen to the content

When we think about privacy regulations, our first thought centers around the protection of consumer data. That most organizations should also keep in mind is that these data privacy laws also pertain to protecting your employees' data as well.

According to employment attorneys Jessica Gross and Justine Philips, there are two points that the HR department of an organization needs to keep in mind with regards to staying compliant with the CCPA:

  1. "It requires mandatory privacy notices and disclosures about the data collected by employers and purpose for the collection."
  2. "It provides for statutory damages ranging from $100-750 if sensitive personal information is breached."

The organization's HR department has a huge responsibility and stake in keeping the organization compliant with data privacy regulations. If the organization fails to fulfill the aforementioned points it could result in non-compliance, which means penalties, both as statutory damages and fines along with reputational damage.

Employees and potential employees are both very concerned about how their personal information is being collected and captured by their employers. And employees will not hesitate to go to court to enforce their rights. Thus employers should work to implement all responsibilities on employment data imposed by data privacy regulations such as the CCPA.

This article will talk about the importance of employee data under the CCPA and steps that can be taken to comply with this regulation.

Employee Data Under the CCPA

While it is true that employment data was excluded from many of the legal obligations and requirements of the CCPA, as per a time-sensitive exemption brought by the California Legislature via Assembly Bill No. 25, there are still some obligations on employee data under the CCPA which are enforceable right now and which businesses have to follow to avoid violation and potential penalties.

Under Section 1798.145(h)(3) of the CCPA, since Jan. 1, 2020, a notice must be provided to employees by employers, at or before the point of the collection of personal information.

Under Section 1798.100(b) read along with CCPA Regulation § 999.305.(f) this notice to employees needs to include the following information:

  • Categories of personal information that will be collected.
  • Commercial or business purpose for collection of personal information.

It is important to note that the notice should be:

  • Prominent and readily available where employees will encounter it at or before the point of collection of any personal information. For example, if the employer is monitoring its employees physical actions via CCTVs, it must inform them with prominent signage within the physical location.
  • Using plain and straightforward language and should be in a language in which business is ordinarily conducted.
  • Reasonably accessible to consumers with disabilities. For example, for online notices, it should follow generally recognized industry standards, such as the Web Content Accessibility Guidelines, version 2.1 of June 5, 2018, from the World Wide Web Consortium.

It is important to note that a business shall not collect categories of personal information other than those disclosed in the notice at the time of collection. If the business intends to collect additional categories of personal information, the business shall have to provide a new notice when collecting the new information.

Furthermore, Section 1798.150, which applies to employee data, means that businesses are liable for undertaking adequate and reasonable security measures to protect the data of their employees. Because, if unredacted or unencrypted employee personal information is breached, due to the employers’ failure to take reasonable security measures, they will have to face civil actions brought by the employees. Under Section 1798.150, damages in suits brought by aggrieved individuals in such cases of a breach can be granted $100-$750 in statutory damages or actual damages (whichever is higher). Thus, employers must make sure to protect employee data as it protects consumer data to avoid facing penalties under the CCPA.

Steps Towards Compliance

In order to have a strong HR strategy, the team must first interpret the applicable state law and then ensure compliance with that law.

Understand what laws apply to your organization

Data privacy laws such as the CCPA are constantly evolving (take, for example, the CPRA amendment), so it’s important for the HR department to stay on top of all the regulatory amendments. It is advised to have automated alerts set up in order to inform the organization about new and changing cybersecurity and data privacy laws.

Assess your organization's compliance requirements

Privacy regulations can differ based on industry, location, and types of data being processed. It is paramount that the organization is aware of the compliance requirements of laws that apply to them.

Expand your knowledge base

Becoming well-versed about privacy regulations can help keep your employees updated about their data rights. A better understanding of data privacy will lead to more effective leadership on how these regulations can potentially impact a business.

Set expectations with staff

The HR department needs to make its staff aware of the importance of protecting an individual's sensitive information and how they can balance individual privacy concerns against the privacy requirements of running an organization.

Maintain transparency

HR professionals are required to maintain transparency on the data they have collected. This will promote trust among employees and third parties and also help the company stay compliant with privacy regulations.

Conclusion

Organizations today are collecting more and more data, whether that be from their consumers or their employees. Privacy regulations such as the CCPA require organizations to keep track of data collected from their own employees and in turn protect this data from being responsible custodians.

The past shows that doing this through manual methods, although maybe possible, is a tedious task, and organizations are encouraged to automate their operations.  With the constant evolution of privacy regulations, automation is the only way an organization can keep up.

Seucriti offers organizations a fully automated solution that can help them easily detect personal data, map it to the owner, and keep it protected. This helps comply with several privacy requirements such as DSR fulfillment and “adequate security” of the stored data. Securiti recently joined hands with Workday, enabling Sensitive Data Intelligence-driven Security, PrivacyOps, Governance, and Compliance for sensitive employee and financial data in Workday.  This is a huge step towards protecting employee data on a global scale.

The Securiti Sensitive Data Intelligence Solution will help organizations comply with privacy requirements, by offering the following functionalities:

  1. Discover & catalog shadow and sanctioned assets
  2. Extract and catalog asset metadata
  3. Detect sensitive and personal data
  4. Catalog, classify & tag sensitive data
  5. Identify high-risk data
  6. Built a graph between data and its owners
  7. Scale to petabyte volume with high accuracy
  8. Map data to compliance and regulations

Learn more about how Securiti can help you comply, watch a demo today!


Frequently Asked Questions (FAQs)

Employee data in the California Consumer Privacy Act (CCPA) refers to personal information collected and processed by businesses about their employees in the context of employment.

CCPA initially exempted employee data, but this exemption expired on January 1, 2023. Now, CCPA applies to the personal information of California employees and non-California employees alike.

Under CCPA, employee information such as Social Security numbers, financial account information, and certain medical or health information is considered confidential and requires protection.

Securiti for Workday

Security | PrivacyOps | Governance | Compliance

Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share


More Stories that May Interest You

Videos

View More

Mitigating OWASP Top 10 for LLM Applications 2025

Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...

View More

DSPM vs. CSPM – What’s the Difference?

While the cloud has offered the world immense growth opportunities, it has also introduced unprecedented challenges and risks. Solutions like Cloud Security Posture Management...

View More

Top 6 DSPM Use Cases

With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...

View More

Colorado Privacy Act (CPA)

What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...

View More

Securiti for Copilot in SaaS

Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...

View More

Top 10 Considerations for Safely Using Unstructured Data with GenAI

A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....

View More

Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes

As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...

View More

Navigating CPRA: Key Insights for Businesses

What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...

View More

Navigating the Shift: Transitioning to PCI DSS v4.0

What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...

View More

Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)

AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 10:35

There’s Been a Material Shift in the Data Center of Gravity

Watch Now View
Spotlight 14:21

AI Governance Is Much More than Technology Risk Mitigation

AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3

You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge

Watch Now View
Spotlight 47:42

Cybersecurity – Where Leaders are Buying, Building, and Partnering

Rehan Jalil
Watch Now View
Spotlight 27:29

Building Safe AI with Databricks and Gencore

Rehan Jalil
Watch Now View
Spotlight 46:02

Building Safe Enterprise AI: A Practical Roadmap

Watch Now View
Spotlight 13:32

Ensuring Solid Governance Is Like Squeezing Jello

Watch Now View
Spotlight 40:46

Securing Embedded AI: Accelerate SaaS AI Copilot Adoption Safely

Watch Now View
Spotlight 10:05

Unstructured Data: Analytics Goldmine or a Governance Minefield?

Viral Kamdar
Watch Now View
Spotlight 21:30

Companies Cannot Grow If CISOs Don’t Allow Experimentation

Watch Now View

Latest

View More

From Trial to Trusted: Securely Scaling Microsoft Copilot in the Enterprise

AI copilots and agents embedded in SaaS are rapidly reshaping how enterprises work. Business leaders and IT teams see them as a gateway to...

The ROI of Safe Enterprise AI View More

The ROI of Safe Enterprise AI: A Business Leader’s Guide

The fundamental truth of today’s competitive landscape is that businesses harnessing data through AI will outperform those that don’t. Especially with 90% of enterprise...

Understanding Data Regulations in Australia’s Telecom Sector View More

Understanding Data Regulations in Australia’s Telecom Sector

1. Introduction Australia’s telecommunications sector plays a crucial role in connecting millions of people. However, with this connectivity comes the responsibility of safeguarding vast...

Understanding Saudi Arabia’s Global AI Hub Law View More

Understanding Saudi Arabia’s Global AI Hub Law

Gain insights into Saudi Arabia’s Global AI Hub Law - a legal framework for operating various types of data centers referred to as Hubs....

ROPA View More

Records of Processing Activities (RoPA): A Cross-Jurisdictional Analysis

Download the whitepaper to gain a cross-jurisdictional analysis of records of processing activities (RoPA). Learn what RoPA is, why organizations should maintain it, and...

Managing Privacy Risks in Large Language Models (LLMs) View More

Managing Privacy Risks in Large Language Models (LLMs)

Download the whitepaper to learn how to manage privacy risks in large language models (LLMs). Gain comprehensive insights to avoid violations.

Comparison of RoPA Field Requirements Across Jurisdictions View More

Comparison of RoPA Field Requirements Across Jurisdictions

Download the infographic to compare Records of Processing Activities (RoPA) field requirements across jurisdictions. Learn its importance, penalties, and how to navigate RoPA.

Navigating Kenya’s Data Protection Act View More

Navigating Kenya’s Data Protection Act: What Organizations Need To Know

Download the infographic to discover key details about navigating Kenya’s Data Protection Act and simplify your compliance journey.

Gencore AI and Amazon Bedrock View More

Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock

Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...

DSPM Vendor Due Diligence View More

DSPM Vendor Due Diligence

DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...

What's
New