The First 24 Hours Define Everything
A mechanical contractor in the Bay Area discovered that an unauthorized user had accessed their cloud-based HR system and downloaded files containing employee Social Security numbers, bank account details for direct deposit, and driver's license numbers for 127 current and former employees. The IT consultant they called first spent 14 hours trying to "investigate" on his own before recommending they contact legal counsel. By then, they'd lost critical forensic evidence by rebooting servers and changing passwords without preserving logs.
The sequence of your response matters more than the speed. Taking the right steps in the right order — with the right professionals — is the difference between a manageable $80,000 incident and a $400,000 catastrophe compounded by regulatory penalties.
California's Data Breach Notification Framework
California's breach notification requirements are the strictest in the nation and impose specific obligations that contractors must understand before a breach occurs.
What Triggers Notification (California Civil Code § 1798.82)
Notification is required when unencrypted personal information is "acquired by an unauthorized person." Personal information under California law includes:
| Data Element | Example in Construction Context | |-------------|-------------------------------| | Social Security number | Employee W-2s, I-9 forms, subcontractor 1099s | | Driver's license number | Employee records, equipment operator files | | Financial account number (with access code) | Direct deposit info, vendor banking details | | Medical information | Workers' comp claims, drug testing records | | Health insurance information | Employee benefit enrollment records | | Biometric data | Fingerprint scans for job-site access | | Tax ID number | Subcontractor records, vendor files |
Encryption Safe Harbor
If the breached data was encrypted and the encryption key was not compromised, California notification requirements do not apply. This is the single strongest argument for encrypting employee and client data at rest and in transit. It can literally eliminate your notification obligation — and the associated costs.
Notification Timeline
California requires notification "in the most expedient time possible and without unreasonable delay." Unlike some states with specific deadlines (72 hours, 30 days), California's standard is flexible but strictly enforced. The AG has taken action against companies that waited more than 45 days without justification.
What the Notification Must Include
California Civil Code § 1798.82(d) prescribes specific content:
- Name and contact information of the notifying entity
- Types of personal information involved
- Date or estimated date of the breach
- Description of the incident in general terms
- Steps taken to protect affected individuals (free credit monitoring, etc.)
- Contact information for major credit reporting agencies
AG Reporting Threshold
If the breach affects more than 500 California residents, you must submit a copy of the notification to the California Attorney General. The AG maintains a public database of reported breaches — meaning your breach notification becomes a public record accessible to clients, competitors, and journalists.
The Step-by-Step Response Plan
Phase 1: Detection and Containment (Hours 0–24)
Step 1: Activate Your Cyber Insurance
Call your carrier's incident response hotline immediately — before calling your IT person, before calling your lawyer, before doing anything else. Your cyber policy provides:
- A pre-vetted forensic investigation firm
- Breach counsel licensed in California
- A response coordinator who manages the entire process
Why this matters: Using your carrier's panel firms ensures the costs are covered. Hiring your own forensic firm without carrier approval may result in coverage disputes.
Step 2: Preserve Evidence
Do NOT:
- Reboot or shut down affected systems
- Delete suspicious emails
- Change passwords on compromised accounts (yet)
- "Fix" anything before forensics examines the systems
DO:
- Disconnect affected systems from the network (unplug ethernet, disable WiFi)
- Photograph screens showing evidence of compromise
- Document the timeline of discovery
- Preserve all log files
Step 3: Assemble Your Response Team
Your cyber insurance carrier's incident response panel includes:
- Forensic investigator — determines how the breach occurred, what data was accessed, and whether data was exfiltrated
- Breach counsel — California-licensed attorneys who advise on notification obligations specific to your situation
- Notification vendor — handles printing, mailing, call center setup, and credit monitoring enrollment
Phase 2: Investigation and Scoping (Days 2–14)
The forensic investigation determines:
- Entry point (how did the attacker get in?)
- Scope of access (what systems were compromised?)
- Data exposure (what personal information was accessed or exfiltrated?)
- Duration (how long was the attacker in your systems?)
- Remediation (how to prevent recurrence?)
This phase directly determines your notification obligations. If forensics confirms that only encrypted data was accessed, you may avoid notification entirely under California's encryption safe harbor. If unencrypted PII was accessed, notification is required.
Phase 3: Notification (Days 14–45)
If notification is required, your breach counsel and notification vendor handle:
Individual Notices
- Drafted by breach counsel to comply with § 1798.82(d)
- Printed and mailed by the notification vendor
- Includes offer of complimentary credit monitoring (typically 12–24 months)
AG Notification
- Required if 500+ California residents affected
- Submitted electronically through the AG's online portal
- Becomes a public record
Substitute Notice
- If you don't have contact information for some affected individuals, California allows substitute notice through website posting and major state media notification
Costs covered by cyber insurance:
- Forensic investigation: $30,000 – $80,000
- Breach counsel: $15,000 – $40,000
- Notification mailing and call center: $5 – $15 per individual
- Credit monitoring: $10 – $25 per individual per year
- AG response and regulatory defense: $20,000 – $75,000
Phase 4: Post-Breach Remediation (Days 30–180)
Security improvements to prevent recurrence — some cyber policies include a "betterment" benefit covering a portion of security upgrades.
Regulatory response if the AG or other regulators investigate. Your cyber policy's regulatory defense coverage pays for legal representation during investigations.
Litigation defense if affected individuals file lawsuits. CCPA's private right of action allows California residents to sue for statutory damages of $100–$750 per person per incident for breaches involving unencrypted PII. Class action attorneys actively monitor AG breach notifications for potential cases.
Contractor-Specific Data Breach Scenarios
Scenario: Subcontractor Database Breach
A GC maintains a database of 450 subcontractors including company names, EIN numbers, banking information for ACH payments, contact information, and insurance certificate data. A compromised employee credential gives an attacker access to the database.
- EIN + banking info = reportable personal information
- 450 records = just under AG reporting threshold (depends on how many individuals vs. companies)
- Breach counsel analysis determines exact notification obligations
- Cyber insurance covers full investigation and notification process
Scenario: Field Tablet Theft
A project manager's tablet is stolen from a job-site trailer. The tablet contains synced email (with employee information in attachments), project management app with client contact information, and photos of driver's licenses collected for site access logs.
- If the tablet was encrypted with a strong passcode: likely no notification required (encryption safe harbor)
- If unencrypted: notification required for every individual whose PII was accessible
- Cyber insurance covers forensic analysis of what data was on the device
Scenario: Payroll Service Provider Breach
Your third-party payroll company experiences a breach exposing your employees' data. The payroll company bears primary notification responsibility, but you may have contractual obligations to your employees and secondary regulatory exposure.
- Review your payroll service agreement for data breach provisions
- Your cyber policy's dependent business interruption coverage may apply
- Monitor the payroll company's response for adequacy
- Consider independent notification to employees to maintain trust
Pre-Breach Preparation Checklist
- [ ] Cyber liability insurance policy in force with adequate limits
- [ ] Incident response plan documented and accessible offline
- [ ] Carrier's incident response hotline number saved in mobile phone contacts
- [ ] Policy number accessible outside of company network
- [ ] Data inventory completed (know what PII you hold and where)
- [ ] Encryption implemented for PII at rest and in transit
- [ ] Employee security awareness training completed (annual minimum)
- [ ] Backup strategy tested with verified offline/immutable backups
- [ ] Breach counsel pre-identified (or using carrier's panel)
- [ ] Key employee contacts available outside company systems
Common Questions
How fast do we have to notify people in California?
California requires notification "in the most expedient time possible and without unreasonable delay." There's no specific day count, but the AG has taken action against companies delaying beyond 45 days without reasonable justification. Most well-handled breaches complete notification within 30 days of discovery.
What if we're not sure personal information was actually accessed?
California's threshold is "reasonably believes" that PII was acquired by an unauthorized person. If forensic investigation shows the attacker had access to systems containing PII, a reasonable belief of access exists even without proof of specific file downloads. Consult breach counsel — the "we're not sure" defense rarely holds up.
Can we handle a small breach without involving our insurance carrier?
You can, but you shouldn't. Every "small" breach has the potential to be larger than initially apparent. Forensic investigation frequently reveals broader compromise than the initial symptoms suggest. Additionally, handling costs yourself and reporting to your carrier later can create coverage disputes. Notify your carrier immediately — it protects your coverage rights.
Do we have to notify if only employee data was breached, not client data?
Yes. California's breach notification law applies to any California resident's personal information, including employees. Employee SSNs, bank account details, and driver's license numbers all trigger notification requirements. Employee-only breaches are just as reportable as client data breaches.
What's the cost difference between a breach with cyber insurance vs. without?
For a typical California contractor breach affecting 100–200 records: with cyber insurance, your out-of-pocket cost is the deductible (typically $2,500–$10,000). Without insurance, the same incident costs $80,000–$250,000 in forensic, legal, notification, credit monitoring, and regulatory response expenses. The policy typically pays for itself 20–50x in a single incident.
