Press "Enter" to skip to content

California Consumer Privacy Act to cause Headaches for Organizations

The California Consumer Privacy Act of 2018 intends to provide consumers more control over their personal information collected online. However, according to a recent study published in this month’s issue of Health Policy and Technology, healthcare institutions may find challenges in complying with the rule. However, understanding the law’s authority and developing technical infrastructure that is sophisticated enough to protect against data breaches can be difficult, especially for smaller healthcare businesses.

Researchers discovered that professionals anticipated legal and technological hurdles for healthcare companies in complying with the California Consumer Privacy Act after questioning 19 digital privacy and information system experts. According to academics, the combination of and HIPAA is part of the problem. “Given the law’s broad definition of ‘business’ and ‘consumer,’ companies across the United States that collect user data and deploy cookies must comply with the,” according to the law.

However, healthcare firms must also comply with HIPAA, and we discovered that the overlap between the two rules poses some unanticipated obstacles. The California Consumer Privacy Act gives citizens of the state access to the personal information that businesses collect about them, allows them to request that their data be deleted, and permits them to pursue legal action in the event of data misuse or a breach. HIPAA-eligible information is specifically exempted from the statute.

They claim that healthcare companies face a lack of regulatory clarity and an uncertain possibility of reinforcement in general. In addition to legal difficulties, conversations with experts revealed technology-related challenges. From a practical standpoint, our research shows that the more visible aspects of California Consumer Privacy Act compliance, such as creating a website or establishing a helpline for customers to submit data access requests, are simple to implement.

Be First to Comment

Leave a Reply

Your email address will not be published.