- ConsumersIncreases individual control and data portability by prohibiting firms from blocking consumer use of de‑identified or c…
- Targeted stakeholdersMay spur competition and innovation in privacy‑preserving services and identity/consent technologies (e.g., providers o…
- Federal agenciesProvides a federal enforcement mechanism (FTC) that could produce consistent nationwide remedies against entities that…
MY DATA Act of 2025
Referred to the House Committee on Energy and Commerce.
The bill, titled the Manage Your Data and Allow Only Trusted Access (MY DATA) Act of 2025, prohibits covered entities (private, non‑governmental commercial actors who collect, process, or transfer personal information) from preventing an individual from using either de-identified data or “cloaked data” (unique persistent identifiers that conceal identity while enabling communication).
The prohibition does not apply when the covered entity is acting as a service provider.
Violations are enforced by the Federal Trade Commission (FTC) and treated as unlawful unfair or deceptive acts or practices under the FTC Act, with the Commission’s full enforcement powers and penalties available.
On substance the bill is a focused, technically implementable privacy rule that could attract consumer advocates and some bipartisan support, but it also directly constrains private business practices and relies on FTC enforcement — both of which draw coordinated opposition. Absence of compromise mechanisms and potential legal uncertainties over definitions lower the chance of clearing both chambers and surviving reconciliation.
Relative to its intended legislative type, this bill is a concise substantive statutory prohibition with built-in FTC enforcement and a set of definitional provisions. It establishes the high-level rule and enforcement vehicle but omits technical standards, detailed compliance mechanisms, fiscal considerations, and many edge-case clarifications.
Scope and clarity: liberals and centrists want clearer technical standards for de-identification; conservatives view the bill as regulatory overreach rather than a privacy win.
Who stands to gain, and who may push back.
- Targeted stakeholdersCreates compliance costs and regulatory burdens for businesses that collect or manage personal data (changes to systems…
- Targeted stakeholdersRaises potential privacy and re‑identification risks because the bill does not set technical or operational standards f…
- Permitting processCould reduce revenues for firms that monetize identifiable data or rely on exclusivity of data assets if they must perm…
Why the argument around this bill splits.
Scope and clarity: liberals and centrists want clearer technical standards for de-identification; conservatives view the bill as regulatory overreach rather than a privacy win.
A mainstream progressive would likely view this bill as broadly pro-consumer and privacy-forward because it creates a right for individuals to use de-identified or privacy-preserving identifiers rather than being forced to expose raw personal data.
They would appreciate the FTC enforcement mechanism but would be concerned that key protections are ambiguous or weak — especially the definitions of "cloaked data" and de-identification and the exception for entities acting as service providers, which could be used to evade the rule.
Progressives would also worry about re-identification risks and about enforcement resources and remedies being sufficient to protect vulnerable groups.
A pragmatic, moderate observer would see the bill as a targeted privacy protection that encourages privacy-preserving data practices and gives consumers more options without an outright ban on data collection.
They would welcome the FTC enforcement hook but want clearer definitions, implementation guidance, and an assessment of impacts on businesses and security.
Centrists would weigh consumer benefits against potential operational burdens and fraud/security tradeoffs and push for clarifications to reduce legal uncertainty.
A mainstream conservative would be skeptical of creating a new federal restriction enforced by the FTC that limits how private firms control use of their data assets.
They would be concerned about expanded regulatory authority, compliance costs, and potential harm to business models, platforms, and innovation.
Conservatives would also worry the bill could create security and fraud vulnerabilities by encouraging persistent identifiers, and that the service-provider exception may be inconsistently applied but not enough to reassure industry.
The path through Congress.
Reached or meaningfully advanced
Reached or meaningfully advanced
Still ahead
Still ahead
Still ahead
On substance the bill is a focused, technically implementable privacy rule that could attract consumer advocates and some bipartisan support, but it also directly constrains private business practices and relies on FTC enforcement — both of which draw coordinated opposition. Absence of compromise mechanisms and potential legal uncertainties over definitions lower the chance of clearing both chambers and surviving reconciliation.
- How stakeholders — particularly major technology platforms and privacy advocates — will react: strong industry lobbying against the restriction or targeted concessions could materially change prospects.
- No cost estimate or regulatory impact analysis is included in the text; projected compliance and litigation costs could influence legislative support and amendment patterns.
Recent votes on the bill.
No vote history yet
The bill has not accumulated any surfaced votes yet.
Go deeper than the headline read.
Scope and clarity: liberals and centrists want clearer technical standards for de-identification; conservatives view the bill as regulatory…
On substance the bill is a focused, technically implementable privacy rule that could attract consumer advocates and some bipartisan suppor…
Relative to its intended legislative type, this bill is a concise substantive statutory prohibition with built-in FTC enforcement and a set of definitional provisions. It establishes the high-level rule and enforcement…
Go beyond the headline summary with full stakeholder mapping, legislative design analysis, passage barriers, and lens-by-lens tradeoff breakdowns.