Requires compliance of all for-profit business if they make more the $25mil a year, or buy/sell CA resident data of 100,000+, or make 50%+ of their revenue from selling resident PII
Cali AG office conducts enforcement and issues penalties.
Can be challenging for companies to comply with
Complex consent requirements, and processing requests.
Data inventory is challenging
Third-party vendor issues
Drawbacks
Only for businesses in Cali
Excludes govt, nonprofits, and some financial institutions
Includes Amex, Discover, JCB, MasterCard, Visa and UnionPay
Entites that store, process, or transmit cardholder data, authentication data, or could impact security of cardholder data environment.
Core components
Build & maintain secure network
Protect cardholder data
Vulnerability management program
Strong access control
Monitor and test networks
Maintain information security policy
Publish, train, maintain
Initiative gained traction from the 90’s to early 200’s due to increase in card fraud. Standards council created in 2004
First standards creation in 2006, most recently updated 2018 w/ version 3.2.1
Who must comply:
Any card transaction business (AKA anyone accepting card payments for their services)
financial institutions that issue cards (Banks, airlines, etc).
any companies with access to cardholder data (contractors like IT support, security services, etc)
service providers that facilitate transactions for clients, and payment processors (think Square, PayPal etc).
Don’t store cardholder data except when absolutely necessary
Strong firewalls and encryption when data in transit
Enforcement mechanism:
Fines
Legal costs
Monitoring
Reputational damage
Transaction fees
Massively enhances security of card payments, and standardizes them for the whole ecosystem, but is rather complex and expensive, while simultaneously lagging behind latest threat ecosystem