Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Don’t Be Caught Unaware: Four Pieces of Cybersecurity Legislation to Watch

By Karnika Arora, Vlad Eidelman
cyber-frame
October 22, 2019

The proliferation of technology in our social fabric has made consumer data ever more accessible to companies, making data security a growing concern. According to a poll conducted by Polling the Nations, 92 percent of respondents wanted the Federal Government to put in a great deal of effort to combat cybersecurity threats. How then, is the government responding?

Where do we currently stand?

While cybersecurity vulnerabilities dominate news cycles, government intervention at the federal level is minimal. The National Institute of Standards and Technology (NIST) creates guidelines for best cybersecurity practices, but they are merely suggestions to help companies reduce cybersecurity risk. Some states have stronger protections, however. The California Consumer Privacy Act seeks to protect Californians’ right to data privacy and goes into effect in January 2020. A set of regulations from the New York Department of Financial Services places cybersecurity requirements on certain financial institutions, requiring them to implement cybersecurity programs and assess risks.

Proposed Federal Legislation in 2019

Cybersecurity can cover many different stages at which a company may interact with personal information. Typically companies engage with one or more of these three activities when engaging with data: data collection, data storage and organization, and data usage and analysis. The bills addressed here cover all of these stages. The Algorithmic Accountability Act of 2019 seeks to address security concerns in how data is used. The Internet of Things Cybersecurity Improvement Act of 2019 and the Data Broker List Act both address the collection and storage of consumer data. The Data Accountability and Trust Act addresses both data storage and the procedures for addressing a breach if it occurs.

The Algorithmic Accountability Act of 2019 seeks to address the problem of bias and discrimination caused by automated decision-making. The act will require security teams to audit their automated decision-making algorithms to prevent such discrimination. Under this proposed legislation, security teams will be required to conduct impact and data privacy assessments on any automated decision-making system used by companies. This might require security teams to disregard certain demographic variables when auditing their automated decision making models, to ensure that decisions based on them are not discriminatory.

The Internet of Things Cybersecurity Improvement Act of 2019 seeks to improve the security of the data collected by IoT devices used by the federal government. This law would impact companies that provide any IoT devices to federal government agencies, as they may be subject to minimum information security requirements.

While device data security is a significant concern, information security among data brokers has recently been under scrutiny. The Data Broker List Act will require data brokers to register annually with the Federal Trade Commission, in addition to meeting minimum requirements regarding how consumer data is acquired. The Data Accountability and Trust Act is more robust and plans to lay out minimum information security requirements, requirements for post-breach audits, as well as civil penalties. Security teams will find themselves having to create internal mechanisms to comply with these requirements if the law goes into effect.

What should security teams be on the look-out for?

The legislation highlighted here is indicative of the general cybersecurity concerns held by the public. Preventing discrimination in automated decision making, improving the security of IoT devices that collect data and strengthening cybersecurity requirements for data brokers are at the forefront of legislative discussions. While these bills have not been enacted into law, security teams should prepare to create more robust procedures in the near future that address these concerns. For organizations that use automated decision-making in any aspects of their business, conducting audits on their algorithms and ensuring that data is responsibly collected will be essential.

Data security will continue to be prioritized as we embrace technology in increasing areas of our lives, and it is inevitable that data collection, storage and usage of personal information is resulting in strengthened procedures and protections. Security teams should be prepared for audits of their information security, and to develop security procedures that can identify breaches in a timely manner for notification requirements.

KEYWORDS: cyber legislation cyber security data breach

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Karnika arora

Karnika Arora is a Technical Consultant at FiscalNote. She works on building custom technical solutions for clients using Python and enjoys automating tasks. Before joining FiscalNote, she spent time as a Fellow at the Property Casualty Insurers Association, where she built a custom application for the Federal Government Relations team. Karnika enjoys working with large amounts of data and finding innovative solutions with her skills. She has a B.A. in Political Science and Global Development Studies from Grinnell College, where she was recognized for her service with the Alumni Senior Award. She has conducted research on international law and policy, and worked on cybersecurity policy research as an intern at MIT.

Vlad eidelman

Vlad Eidelman is VP of Data Operations and Research team at FiscalNote. With more than a decade of experience developing machine learning algorithms, he focuses on applying technologies such as machine learning and natural language processing (NLP) to intelligent data aggregation, manipulation, augmentation and generation of the growing amount of unstructured data related to government, policy and law. He created the first version of the company’s patented technology to help organizations understand and act on policy changes. His work has led to 10 patent applications, he has published more than 20 peer-reviewed articles in and serves on the program committees for top-tier conferences, such as ACL, NAACL, and EMNLP, and has been covered by media such as Wired, Vice News, and Washington Post. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Chatbot prompt screen

8 in 10 AI Chatbots Likely to Help Plan Attacks, Hate Crimes

Head in front of monitors

Ransomware Response: How Businesses Regain Control Under Pressure

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • mobile-security-freepik.jpg

    Four mobile cybersecurity threats to watch in 2022

    See More
  • supply-chain-freepik

    Supply chain cybersecurity trends: What professionals should be aware of and how to prepare for 2022

    See More
  • security-innovation-fp1170x658.jpg

    Why it pays to be an early adopter of cybersecurity technology

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • Security of Information and Communication Networks

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing