Secuvy

Importance of Implementing Reasonable Security in Remote Working

Because of Covid 19, remote working has become highly popular. In the year 2020, every employee received some instruction on how to operate remotely. It has become a serious concern, particularly for small businesses, because they only have the necessities of network defenses to safeguard their central offices from cyber attacks.

What are the requirements under CCPA and CPRA for reasonable security measures?

California Consumer Privacy Act (CCPA)

Under the California Consumer Privacy Act (CCPA), adopting “reasonable security” is a defense against a customer’s private right of action, which provides them the power to sue for a data breach.

A client can seek remedy only if,

  • his personal information was not encrypted or erased, or
  • the organization failed to establish adequate protection to their personal information

It means that if a company implements security measures but still has a data breach, the company may be immune from liability provided the security measures are ruled acceptable. As a result, while reasonable security is not legally an affirmative need under the CCPA, it has become an unofficial requirement due to the reduced risk of consumer responsibility.

California Privacy Rights Act (CPRA)

When it comes to CCPA compliance and CCPA regulations, California was the first in the United States. Both CCPA and California Privacy Rights Act (CPRA) have been introduced in the state. It is essential for all organizations to comply with these data privacy laws and CCPA regulations.   

According to California Privacy Rights Act (CPRA), it is mandatory to implement reasonable security. Therefore, any firm that collects a consumer’s personal information must have adequate security processes and policies to secure such information under the updated California Civil Code 1798.100.

An organization must meet specific criteria to be classified as a “business” under the CCPA or CPRA. Unfortunately, many small and even large enterprises are often exempt from the CCPA because of these thresholds.

According to the CCPA and CPRA, every firm, large or small, that controls the personal data of California citizens must take reasonable security measures.

What is a CIS control?

CIS control, also known as the Centre of Internet Security, is a critical security control for effective cybersecurity. The CIS controls are divided into twenty categories, each organized into an Implementation Group (IG) based on the organization’s risk profile. For example, an IG1 organization is often a tiny business with minimal resources dealing with limited data. An IG3 organization, on the other hand, is a huge company that deals with extremely sensitive data and has the resources to hire in-house security professionals.

A solid first step toward reasonable security is to review the CIS controls, do a gap assessment to establish which controls are now in existence and inadequately implemented, and document the process.

What is the Difference in Rules in the implementation of reasonable security in CCPA and CPRA?

Investigating the security of service suppliers utilized by the company is also part of implementing reasonable security. The CCPA requires businesses to prohibit their service providers from keeping, utilizing, or sharing information for any purpose other than to carry out the contract under the CCPA. However, there are no further responsibilities in terms of supervising the privacy of the service provider.

The CPRA modifications demand that a company’s contract with service providers include many additional clauses not needed under the CCPA. Under CPRA, any company that collects personal details and shares them with a third-party service provider must engage in an agreement with the third-party service provider that includes the following provisions:

  • The third-party can share information only for specific purposes.
  • The third-party must provide the same level of data protection as the company.
  • The businesses must ensure that the service provider must comply with CPRA.
  • The third-party needs to inform the firm if they are unable to comply with CPRA.
  • Businesses can stop the illegal use of personal data by a service provider.

What is cyber liability insurance?

While most organizations have various insurance plans in place, such as commercial general liability and workers compensation liability, they mainly ignore cyber liability insurance.

Nobody can ensure the 100 percent security of all the systems, and a corporation may still be liable to a cyberattack even if it meets the standard of reasonable security. Ransomware is a hacking attack that can affect any company, large or small and is costly to repair. The global cost of ransomware is expected to be around $19 million by 2020. While the organization’s data may be successfully recoverable from backups to avoid having to pay the ransom, some fraud groups want to tell the data publicly, resulting in additional expenditures for addressing a public breach.

Cyber Attacks
Some major facts show the importance of cyber insurance for small businesses.

  • Small businesses are the target of 45% of cyber-attacks.
  • Cyber-attacks cost small firms on average $35 in 2018.
  • Seventy percent of small businesses fail within seven months of a cyber-attack.

Any firm with sensitive information should look into cyber insurance coverage to help limit the dangers of a devastating attack. It’s also a good idea to include minimal cyber insurance coverage criteria in contracts with service providers when thinking about its supply chain.

Conclusion:

Reasonable security is critical to secure remote working, particularly for small organizations struggling to adapt to this popular trend. All firms under the CCPA and CPRA that handle the personal information of California residents must take adequate security precautions. The CCPA mandates businesses to restrict their service providers from retaining, using, or exchanging information for any reason other than to fulfill the CCPA contract. The CPRA amendments require that a company’s service provider contracts include numerous extra terms that were not required under the CCPA. Similarly, cyber liability insurance is critical because no one can guarantee that all systems are completely secure.

 

Related Blogs

April 19, 2026

If your organization is running AI agents or has connected LLMs to internal knowledge bases, there’s a governance gap already open inside your AI program,...

April 15, 2026

There is a number that keeps appearing in enterprise AI conversations, and most teams would rather not talk about it.  56% of enterprise AI proof-of-concept...

April 12, 2026

Enterprises spent years treating data sovereignty as a geography problem. But it’s always been an intelligence problem, and enterprises just didn’t know it until AI...

April 09, 2026

Most enterprise AI teams are solving the wrong problem first. They’re optimizing storage speed for data that was never safe or ready to use. At...

April 06, 2026

A company building the world’s most capable AI model left thousands of sensitive internal files in a publicly searchable data store. No sophisticated attacker was...

February 28, 2026

“HUMANS, as you know, make MISTAKES.” And that single fact is enough to unravel everything your ChatGPT Enterprise license promised to protect. OpenAI explicitly promises...

February 22, 2026

If you believe ChatGPT Enterprise, Microsoft Copilot, and Claude are secure for enterprise use, consider these uncomfortable facts: ChatGPT has already suffered a bug that...

February 18, 2026

ChatGPT Enterprise prevents OpenAI from training on your data, but it doesn’t stop sensitive data exposure, unauthorized transmission, or regulatory violations. The moment confidential or...

February 14, 2026

“ALERT: SENSITIVE INFORMATION IS LEAKING FROM YOUR SOURCE TO ANOTHER!” Your over-helpful bot would never say that. That’s because AI does exactly what it is...

February 10, 2026

Did you know that Samsung banned ChatGPT & the use of Gen-AI company-wide in 2023? This decision was undertaken as an internal security incident where...

November 15, 2024

Using Data Classification for Effective Compliance When working toward ISO 42001 compliance, data classification is essential, particularly for organizations handling large amounts of data. Following...

November 12, 2024

Laying the Groundwork for ISO 42001 Compliance Starting the journey toward ISO 42001 compliance can seem complex, but with a strategic approach, companies can lay...

November 07, 2024

A Data Subject Access Request (DSAR) is the means by which a consumer can make a written request to enterprises to access any personal data...

November 07, 2024

VRM deals with managing and considering risks commencing from any third-party vendors and suppliers of IT services and products. Vendor risk management programs are involved...

October 30, 2024

With organizations storing years of data in multiple databases, governance of sensitive data is a major cause of concern. Data sprawls are hard to manage...

October 30, 2024

 There has been a phenomenal revolution in digital spaces in the last few years which has completely transformed the way businesses deal with advertising, marketing,...

October 30, 2024

In 2023, the California Privacy Rights Act (CPRA) will supersede the California Consumer Privacy Act (CCPA), bringing with it a number of changes that businesses...

October 09, 2024

For years, tech companies have developed AI systems with minimal oversight. While artificial intelligence itself isn’t inherently harmful, the lack of clarity around how these...

September 25, 2024

Navigating the Shift in AI Compliance Regulations The latest revisions in the Justice Department’s corporate compliance guidelines signal a significant shift for companies that rely...

September 18, 2024

Introduction The threat landscape around data security evolves each year due to factors like a lack of robust security measures, improper data handling, and increasingly...

Prepare for Assessments and Get AI-Ready

Gain visibility into sensitive data, reduce exposure, and produce evidence you can trust without months of deployment or manual effort.