{"id":1708,"date":"2021-10-25T15:17:34","date_gmt":"2021-10-25T15:17:34","guid":{"rendered":"https:\/\/cisobyte.com\/?p=1708"},"modified":"2021-10-25T15:17:35","modified_gmt":"2021-10-25T15:17:35","slug":"california-sb-41-privacy-genetic-testing-companies","status":"publish","type":"post","link":"https:\/\/cisobyte.com\/index.php\/2021\/10\/25\/california-sb-41-privacy-genetic-testing-companies\/","title":{"rendered":"California SB-41 Privacy: genetic testing companies."},"content":{"rendered":"<h4 style=\"text-align: left;\"><strong>CISObyte\u00a0 \u00a0 10-25-2021<\/strong><\/h4>\n<p>\u00a0<\/p>\n<h4>You are more than your genetic pre-dispositions. But &#8220;direct-to-consumer genetic testing services are largely unregulated and could expose personal and genetic information.&#8221;<\/h4>\n<h2>&#8220;California&#8217;s new law requires a direct-to-consumer genetic testing company to implement and maintain reasonable security procedures and practices to protect a consumer\u2019s genetic data against unauthorized access, destruction, use, modification, or disclosure.&#8221;<\/h2>\n<p>The Legislature finds and declares all of the following: &#8220;There is growing concern in the scientific community that outside parties are exploiting the use of genetic data for questionable purposes, including mass surveillance and the ability to track individuals without their authorization.&#8221;<\/p>\n<p>We&#8217;re not living in Gattaca yet. The bill aims to prevent genetic discrimination, and imposes fines on individuals for violations.<\/p>\n<p>Carefully consider who you volunteer your DNA to. Unlike a password, it can&#8217;t be changed when exposed.\u00a0<\/p>\n<ul>\n<li>Privacy<\/li>\n<li>Cybersecurity<\/li>\n<li>SB41<\/li>\n<li>Genetics<\/li>\n<\/ul>\n\n<div class=\"vlp-link-container vlp-template-default wp-block-visual-link-preview-link\">\n\t<a href=\"https:\/\/leginfo.legislature.ca.gov\/faces\/billTextClient.xhtml?bill_id=202120220SB41\" class=\"vlp-link\" title=\"Bill Text - SB-41 Privacy: genetic testing companies.\" rel=\"nofollow\" target=\"_blank\"><\/a>\t\t<div class=\"vlp-link-image-container\">\n\t\t<div class=\"vlp-link-image\">\n\t\t\t<img decoding=\"async\" src=\"https:\/\/leginfo.legislature.ca.gov\/resources\/images\/header_img.png\" style=\"max-width: 600px; max-height: 600px\" \/>\t\t<\/div>\n\t<\/div>\n\t\t<div class=\"vlp-link-text-container\">\n\t\t\t\t<div class=\"vlp-link-title\">\n\t\t\tBill Text &#8211; SB-41 Privacy: genetic testing companies.\t\t<\/div>\n\t\t\t\t\t\t<div class=\"vlp-link-summary\">\n\t\t\tCHAPTER 2.6.\u00a0Genetic Privacy\t\t<\/div>\n\t\t\t<\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;There is growing concern in the scientific community that outside parties are exploiting the use of genetic data for questionable purposes, including mass surveillance and the ability to track individuals without their authorization.&#8221;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[51,50],"tags":[8,56,52,55],"class_list":["post-1708","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","category-privacy","tag-cybersecurity","tag-genetics","tag-privacy","tag-sb41"],"_links":{"self":[{"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/posts\/1708","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/comments?post=1708"}],"version-history":[{"count":2,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/posts\/1708\/revisions"}],"predecessor-version":[{"id":1711,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/posts\/1708\/revisions\/1711"}],"wp:attachment":[{"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/media?parent=1708"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/categories?post=1708"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/tags?post=1708"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}