Pros and Cons of the Kids Online Safety Act
The Kids Online Safety Act (KOSA) responds to the escalating youth mental health crisis and its ties to harmful online content and addictive social media algorithms. Given the rising rates of depression, anxiety, and loneliness among children in the U.S., KOSA aims to establish a legal framework that promotes a healthier online ecosystem for youth. […]
Pros and Cons of New York’s Regulation of Financial Institutions and Chatboxes
Chatbots, powered by artificial intelligence (AI), have become increasingly prevalent in the banking industry. The implementation of chatbots in banking increases customer satisfaction and loyalty through offering instant and round-the-clock support to handle a large volume of customer queries and address customer inquiries promptly. Around 37% of the U.S. population engaged with a bank’s chatbot […]
American Privacy Rights Act: Pros, Cons, and Impact on Consumer Data Protection
Introduction The American Privacy Rights Act (APRA) is a new bill introduced in Spring 2024 that seeks to implement a nationwide set of consumer privacy laws. Currently, no national framework exists. A previous bill with similar goals, the American Data Privacy Protection Act, failed to pass in 2022. The APRA would, among other things: Support […]
Understanding PADFA: The Pros and Cons of the Federal Government’s Approach to American Data Privacy
A new law addressing the national security risks of the data brokerage industry took effect on June 23, 2024, following bipartisan approval in January. The bill, known as the Protecting Americans’ Data from Foreign Adversaries Act or PADFAA, seeks to limit the transfer of sensitive American data to firms owned or controlled by Russia, China, […]
Understanding the Debate on Neurorights and Personal Identity in Neurotechnology
In recent years, significant advancements in neurotechnology promise to profoundly impact healthcare and human capabilities. As technologies such as Brain-Computer Interfaces (BCIs), Transcranial Direct-Current Stimulation (tDCS), and Deep Brain Stimulation (DBS) evolve, they can potentially blur the boundary between a person’s consciousness and external technological influences. Examples of Neurotechnologies Conditions such as Parkinson’s, Alzheimer’s, and […]
Understanding The Debate on Facial Recognition Technology in Policing: Pros, Cons, and Privacy Concerns
Introduction A facial image is like a fingerprint: a unique piece of human data that can identify an individual or connect them to a crime. Law enforcement uses facial recognition to identify suspects, monitor large crowds, and ensure public safety. Facial recognition software is used by local, state, and federal law enforcement, but its adoption […]
Pros and Cons of Cybersecurity Regulation
Cybersecurity is the practice of protecting online networks, systems, and information from cyber attacks. Cybersecurity regulation involves policies that mandate specific cybersecurity strategies in both the private and public sector. With the increasing reliance on digital systems and networks by both individuals and organizations, cyber attacks have become more common and detrimental. As a result […]
Pros and Cons of the 2015 Cybersecurity Information Sharing Act
At the end of 2015, the Cybersecurity Information Sharing Act (CISA) was signed into law by President Obama as part of a larger omnibus spending bill. In the years prior to 2015, the US suffered many major cyberattacks including the 2013 Target Corp data breach that leaked the private information of 110 million people and […]
Understanding the FTC’s Data Breach Response Plan
A data breach is defined as an incident with loss of control, compromise, or unauthorized disclosure/access of Personally Identifiable Information (PII). PII includes Social Security Numbers, financial accounts, license and passport numbers, credit card numbers, and personal address information. Losing control over PII increases the risk for identity theft and fraudulent activity. A data breach […]
Pros and Cons of the Cybersecurity Information Sharing Act of 2015
Background In February 2015, Anthem became the first major healthcare provider to experience a cyber attack when attackers stole 80 million records from Amerigroup and Blue Cross Blue Shield health plan users. In June 2015, hackers stole the personal information of over 20 million people from the Office of Personnel Management (OPM), which was the […]