Senior Content Marketing Manager II
September 15, 2022â˘9 min read
Transcend's General Counsel and Head of Privacy, Brandon Wiebe, and CEO, Ben Brook, hosted a webinar exploring Sephora's $1.2M settlement and what it means for CPRA compliance. You'll find the highlights of the conversation below and can watch the full recording here.
Note: The following text has been edited for readability.
Letâs dig into that first one, Global Privacy Control, a little more.Â
We see from the settlement and complaint documents that when the AG initiated the enforcement sweep, Global Privacy Control signals - technical signals that users can emit from their browser by installing the plugin - were at the core of the attorney general's investigation.Â
The AGâs office was going website by website to these consumer brands and checking the network traffic emitted from their sites to see whether it changed when they were using the Global Privacy Control signal and when they werenât.Â
In Sephoraâs case, they noticed there was no change. So they did further testing and came to the conclusion that Sephora was not honoring this signal, despite the fact that they were sharing information with third party trackers on the site.Â
For background, the CCPA statute itself doesnât mention anything about universal opt-outs or Global Privacy Control. However, it does give the Attorney General the authority to promulgate regulations designed to further the purposes of CCPA.Â
In the initial set of regulations the Attorney General issued regs that said if a business collects personal information from consumers online they must treat user enabled global privacy controls, such as a browser plugin or privacy setting, as a valid CCPA request.
Though that regulation didnât specifically call out Global Privacy Control as the anointed standard, in 2021 the attorney general tweeted support for Global Privacy Control specifically and updated their FAQ page to indicate they would be treating the GPC signal as a requirement businesses needed to honor.Â
And the enforcement action with Sephora makes it clear that none of this was fluff or hyperbole in any way. The attorney general in California views GPC as a requirement and businesses should look at adopting the technology that will allow them to detect and honor downstream global privacy control signalsâopting users out of the sale of data in that scenario.Â
The second big takeaway is that, to the AGâs office, use of most third party trackers will constitute a sale of data.Â
In the Sephora action in particular, the settlement and complaint documents mention that Sephora was allegedly using a âpopular analytics provider.â They donât go into specifics on what that is and some folks have assumed itâs Google Analytics.Â
But the theory the attorney general put forward here is that sharing personal information with this type of analytics tracker constituted a saleâbecause Sephora received an exchange for the personal information in the form of analytics services.
This is a tricky, mushy area in the law because many folks would view this scenario, where you receive a service in exchange for personal information, as a service provider relationship. Where youâre actually obtaining an analytics service from this third party tool on your own behalf and not exchanging data for the analyticsâ benefits.Â
But the Sephora documents show that the attorney generalâs core complaint was that Sephora didnât have sufficient service provider contracts in place with these third parties.Â
The takeaway is that you should look very critically at any third party trackers youâre using. If youâve done the analysis and think the exchange of information with a third party is truly a service provider relationship, meeting that definition under the law, you need to make sure youâve checked all the boxes to formalize that relationshipâmake sure you have service provider agreements in place.Â
Moving onto the last big takeaway, and I think this struck a lot of folks, is that the attorney general's enforcement sweep touched on a lot of businesses. Over a hundred businesses were in this initial sweepâall of whom received non-compliance letters from the attorney generalâs office.Â
And, the attorney general said theyâre in the process of sending out another series of letters now.Â
But I want to point out that most businesses that got letters didnât end up in Sephoraâs position. All of these businesses were given thirty days to cure their deficiencies, as theyâre entitled to do under CCPA. Sephora did not, so that led into further action and ultimately the settlement.Â
Itâs also worth noting that moving forward next year under CPRA, the 30 day cure period is no longer obligatory. As enforcement moves from the AGâs office to the California Privacy Protection Agency (CPPA), it becomes discretionary. And so it may be the case that the CPPA doesnât allow businesses a chance to cure these types of deficiencies going forward.Â
Also, as one commentator pointed outâitâs very interesting that the first major enforcement action out of CCPA didnât go after one of the big tech companies. Under GDPR, the data protection authorities in Europe have been focused on big tech and Silicon Valley. Whereas the California attorney general is focused on consumer facing brands that interact with a lot of personal information.Â
So if you fall into that category, be aware that the attorney general is monitoring this sort of stuff - especially your public facing website and visible privacy efforts - very closely. Â
On their site, the attorney general publishes a list of example enforcement letters theyâve sent out, as well as the steps businesses took to cure those deficiencies. Itâs worth using these examples as a roadmap for mitigating risk effectively and buttoning up your privacy compliance.Â
To give a bit of background, the Global Privacy Control (GPC) was formed in response to the CCPA requirement for businesses to honor browser based signals as a Do Not Sell opt out choice. It was created by folks in the privacy community including Robin Berjon, Sebastian Zimmeck, and people from places like DuckDuckGo and the Brave Browser.Â
In practice, GPC is a browser specification that creates a signal for any user visiting a website. And that website is then required to detect that signal and honor it as a Do Not Sell or Share request.
So the easy part is actually detecting GPCâitâs a relatively simple implementation on your front end code. Thereâs really only a couple lines to see whether or not a user has GPC enabled and that spec is available at globalprivacycontrol.org.
The harder part is honoring that signal as a Do Not Sell or Share requestâimplementing it downstream to actually change the way youâre collecting and using this individual's data.Â
These processes, which constitute selling or sharing, are almost always fully automated pipelines where data is just being collected in an automated fashion. Meaning that to implement Do Not Sell or Share and honor it, you have to alter these automated pipelines.Â
For a lot of businesses this represents a fairly large project of overhauling their ad tech integrations, as well as integrations with vendors that are collecting data from their site.Â
And day-by-day, this is getting more complex because thereâs been a rise in special APIs with these ad tech vendors. For example, Google restricted data processing, Facebook Limited Data Use (LDU) parameters, Youtube Privacy Enhanced Modeâall of these require modifying the events youâre collecting on individuals on the client side before they get emitted to third parties.
These special APIs were specifically called out as an implementation requirement in the Sephora settlement. But with these new APIs changing every day, itâs getting increasingly complex in terms of technical implementation.Â
For the Transcend Consent customers in the audience today, just know that youâre already covered here. Transcend Consent has always detected GPC and treats it as an opt out. Itâs also integrated with these special APIs like Google restricted data processing, Facebook LDU, and more.
For anyoneâs whoâs not yet using Transcend Consent weâd love to talk to you and see if thereâs a fit. But if not, the way to approach this problem is by identifying each of the third parties you're sending data to, those that donât meet the service provider definition under the AGâs interpretation).
Then you have to modify the way your ad tech stack works. Thereâs more to peel back there with your engineering team, but if anybodyâs looking to get a little bit deeper with a consultation weâre more than happy to follow up.Â
Thereâs a few components there. The first big one is that a lot of these ad tech vendors have special APIs where you actually have to modify events. So itâs actually better to think of this problem as more of a data flow rather than just a dropping of cookies.Â
At Transcend we think of cookies as one tiny component of the tracking stack, but generalize all of it under the questionâwhat data is being emitted from the user's device to any of your systems or third parties? And how do you actually regulate those data flows?
We approach the problem by essentially putting a firewall between the user's browser and all of these third party destinations, such that any time data is emitted it has to pass through a rule engine in this firewall.Â
These special APIs are a fundamentally different problem than cookies. Itâs really about all the data thatâs being collected and processed, so if youâre only looking at cookies youâre only seeing a very small piece of the pie in terms of what youâre collecting.Â
If your organization has been impacted by the California Privacy Rights Act or other consumer privacy laws, Transcend can help you ensure compliance.
Automate data subject request workflows with Privacy Requests, ensure nothing is tracked without user consent using Transcend Consent, or discover data silos and auto-generate reports with Data Mapping.
Senior Content Marketing Manager II