California Consumer Privacy Act Compliance

nCipher enables compliance with the data protection provisions of the CCPA and helps organizations avoid consumer litigation

California Consumer Privacy Act Compliance

The California Consumer Privacy Act (CCPA) became effective January 1, 2010. Its provisions include protecting consumer personally identifiable information (PII). nCipher can help you comply with this regulation, strengthen your security around stakeholder PII, and prevent civil actions resulting from a data breach.

According to California Civil Code §1798.150:

Any consumer whose nonencrypted and nonredacted personal information … is subject to an unauthorized access and exfiltration, theft, or disclosure as a result of the business’s violation of the duty to implement and maintain reasonable security procedures and practices appropriate to the nature of the information to protect the personal information may institute a civil action for any of the following:

(A) To recover damages in an amount not less than one hundred dollars ($100) and not greater than seven hundred and fifty ($750) per consumer per incident or actual damages, whichever is greater.

(B) Injunctive or declaratory relief.

(C) Any other relief the court deems proper.

“Reasonable security procedures and practices” include the following that nCipher can provide:

Strong data encryption and key protection

nCipher and our data encryption technology partners help you ensure that encrypted personal data remains unreadable, as defined by CCPA, by protecting encryption keys with FIPS-certified nCipher HSMs.

Database encryption key protection

Personal data housed in databases is attractive to attackers seeking to steal identities, payment credentials and more. nShield HSMs are integrated with numerous database encryption partners to ensure that consumer data is protected with hardened security of the encryption keys.

Authorized User Controls

Establish a secure and scalable PKI that helps ensure that only authorized users and devices have access to consumer data. Using nCipher HSMs to help secure the process of issuing certificates and proactively manage private keys creates a high-assurance foundation for digital security.

Brochure : nCipher HSM brochure

nShield HSMs provide a hardened, tamper-resistant environment for secure cryptographic processing, key generation and protection, encryption and more. Available in three FIPS 140-2 certified form factors, nShield HSMs support a variety of deployment scenarios.


Want to be part of our team? Explore
Get in contact with a specialist Contact Us