Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

A national data privacy law might arrive sooner than expected

It’s called ADPPA, and we should hope it passes

By Bill Tolson
cyber-data-protection.jpg

Image by Freepik

August 22, 2022

For those of us waiting for a national data privacy law — and those numbers might be rising — there’s good news. The U.S. House Energy and Commerce Committee recently amended and passed HR 8152, the American Data Privacy and Protection Act (ADPPA). This legislation has already made it further than any other federal privacy law and faster than many expected.


Now comes the hard part. 


The ADPPA would govern how organizations across all industries treat consumer data, specifically information that can be used to identify individual citizens. It would create a comprehensive federal privacy framework to protect personally identifiable information (PII) from misuse, increase data security requirements, and give consumers more say about how their PII is collected, handled, sold and disposed of. If it passes, enforcement would be handled by the Federal Trade Commission (FTC) and, in civil actions, by state Attorney Generals.


Most importantly, it will guarantee individuals’ various rights, including the right to access and review their PII held by an organization, the right to fix incorrect data, and the right to have their PII erased (if no regulatory or legal requirement overrides the deletion), and the right to receive a portable copy of all of their PII. Additionally, the ADPPA will require citizen consent to collect, process, and transfer PII. These rights follow those granted by state-level laws in California, Colorado, Utah, Virginia and Connecticut laws. 

 

So what’s the problem? Well, some provisions might become giant obstacles.  


The duty of loyalty would impose specific responsibilities on organizations that collect PII. This is a form of data fiduciary that obligates the data collection organization to ensure no substantive harm comes to the data subject from the data collector or aggregator’s use of their data. 


Private right of action enables individuals to sue data collectors and processors in federal court for damages, injunctions, litigation costs, and attorney’s fees for a data breach, data misuse, and not reporting on or deleting PII when requested. This is also in California’s CCPA) but nowhere else. In my ongoing conversations with state lawmakers, several have told me that in their states, a bill with such a provision would never pass. 


Preemption refers to the ADPPA superseding or overriding all current and future state privacy bills and laws. Many businesses like this provision because it avoids the complications of minor differences between state laws, but in this, California doesn’t like the idea of preempting CCPA and its successor CPRA. The state wants an exemption. 


These are the big problems, but some smaller issues may be thorny as well. 


Data deletion: Unlike state privacy laws, ADPPA states that data disposal means destroying, erasing, or otherwise modifying PII to make it permanently unreadable, indecipherable, and unrecoverable (just like in Canada). This would require software vendors and cloud data management suppliers to add this capability to their solutions. Let’s not think this would be easy. 


Data security: ADPPA, state privacy laws and Canada’s C-27 bill all use the same language around data collectors’ responsibilities — they call for “reasonable security” practices to ensure PII is adequately protected. This is not prescriptive enough — we need more specific language to set a base security capability. Maybe it should be: “All PII shall be encrypted while in transit and at rest.” There is some legal reasoning behind “reasonable security,” but those of us in the compliance industry for a while have seen the potential for subjectivity and wiggle room.


Bottom line: I understand the concern around federal overreach, but the circumstances here call for a national standard. Without a superseding federal privacy law, and with every state putting its own flavor into place, companies face a business environment in which they must track and ensure compliance with 50 slightly different privacy laws. This will take a huge toll on time and resources, and even the best technology might not be able to adequately balance routine operations with conflicting regulations.  


No comprehensive federal data privacy bill will satisfy every constituency in every state, and I acknowledge the challenges in ADPPA. However, after studying the proposed legislation, I believe it would simplify and, therefore, lower the cost of complying with U.S. privacy law. It needs to be debated and passed — and the sooner that happens, the better it will be for the nation. 

KEYWORDS: cyber security data privacy data security legislation risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bill tolson

Bill Tolson is VP of eDiscovery & Compliance at information management specialist Archive360.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Head in front of monitors

Ransomware Response: How Businesses Regain Control Under Pressure

Chatbot prompt screen

8 in 10 AI Chatbots Likely to Help Plan Attacks, Hate Crimes

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • meta-facebook-freepik1170.jpg

    Meta fined $275m for breaking EU data privacy law

    See More
  • Gaps in Cybersecurity Programs

    Ecuador Rushes to Pass Data Privacy Law After Massive Data Breach

    See More
  • SEC1218-News3-Feat-slide_900px

    GDPR Implementation Costs Enterprises More than Expected

    See More

Related Products

See More Products
  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • surveillance.jpg

    Surveillance, Privacy and Public Space

See More Products

Events

View AllSubmit An Event
  • January 29, 2026

    Protecting Data Centers as National-Level Critical Infrastructure

    ON DEMAND: Data centers have quietly become some of the most critical infrastructure around the globe. Learn how the modern security mission is no longer just about protecting assets — it’s about protecting outcomes such as resilience, uptime and global trust.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing