{"id":5159,"date":"2017-04-17T14:45:29","date_gmt":"2017-04-17T18:45:29","guid":{"rendered":"http:\/\/ncjolt.org\/?p=5159"},"modified":"2020-06-04T20:52:54","modified_gmt":"2020-06-04T20:52:54","slug":"security-privacy-car-act-will-actually-protect","status":"publish","type":"post","link":"https:\/\/journals.law.unc.edu\/ncjolt\/articles\/security-privacy-car-act-will-actually-protect\/","title":{"rendered":"The Security and Privacy In Your Car Act: Will It Actually Protect You?"},"content":{"rendered":"<div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\nOn July 21, 2015, in light of emerging technology involving autonomous driving vehicles, the United States Senate proposed Senate Bill 1806, or the Security and Privacy in Your Car Act, to address issues surrounding these technologies. The \u201cSPY Car Act\u201d attempts to address issues surrounding cybersecurity, data privacy, and hacking of autonomous driving vehicles. The Senate Committee on Commerce, Science, and Transportation is currently analyzing the SPY Car Act. If enacted, this bill could pave the way for the autonomous driving vehicle industry to be effectively regulated. Although this bill has its shortcomings, it is a good start to the conversation regarding the privacy and security concerns associated with autonomous driving vehicles.\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>On July 21, 2015, in light of emerging technology involving autonomous driving vehicles, the United States Senate proposed Senate Bill 1806, or the Security and Privacy in Your Car Act, to address issues surrounding these technologies. The \u201cSPY Car Act\u201d attempts to address issues surrounding cybersecurity, data privacy, and hacking of autonomous driving vehicles. The <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/articles\/security-privacy-car-act-will-actually-protect\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[5,74,76],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/5159"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=5159"}],"version-history":[{"count":1,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/5159\/revisions"}],"predecessor-version":[{"id":7077,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/5159\/revisions\/7077"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=5159"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/categories?post=5159"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/tags?post=5159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}