{"id":319,"date":"2025-06-15T22:18:13","date_gmt":"2025-06-15T22:18:13","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/shauntellgavinocollins\/?p=319"},"modified":"2025-06-15T22:18:13","modified_gmt":"2025-06-15T22:18:13","slug":"dna-in-the-digital-era-genetic-vulnerabilities-2","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/shauntellgavinocollins\/2025\/06\/15\/dna-in-the-digital-era-genetic-vulnerabilities-2\/","title":{"rendered":"DNA in the Digital Era: Genetic Vulnerabilities"},"content":{"rendered":"\n<p><em>The digitization of human DNA through direct-to-consumer (DTC) services introduces vast<br>cybersecurity risks. DNA represents the most sensitive form of personally identifiable<br>information (PII). Its increasing accessibility to cybercriminals expands the threat landscape<br>considerably and without urgent advancements in cyberbiosecurity, the potential for irreversible<br>breaches of personal identity and violations of bioethical standards is inevitable.<\/em><\/p>\n\n\n\n<p><strong>Security Risks of DNA Digitization<\/strong><br>Genetic testing by consumers has increased at an alarming rate and some examples include<br>ancestry, genealogy, genetic predispositions, targeted therapists, and more. Through this ever-<br>increasing expansion, more risks and data vulnerabilities are being uncovered. Genetic data,<br>unlike other forms of PII, cannot be altered or revoked once exposed (Erlich et al., 2018). It is<br>uniquely personal and, if compromised, can lead to lifelong risks for individuals and their<br>families (Kasperbauer Schwartz, 2020). Cyberbiosecurity regarding DNA covers from<br>sequencing, processing, storage, and sharing. Vulnerabilities include insecure cloud<br>environments, weak cryptographic protocols, and insufficient access controls.<\/p>\n\n\n\n<p><br><strong>The Ethical Minefield<br><\/strong>The potential misuse of DNA raises complex ethical questions that extend far beyond traditional<br>concerns of data privacy. As genetic information becomes increasingly intertwined with<br>healthcare, employment, insurance, and law enforcement, the boundaries of consent,<br>ownership, and usage grow increasingly blurred. Employers might one day use genetic profiles<br>to screen job candidates; insurers could tailor premiums based on inherited health risks; and<br>law enforcement agencies may seek access to consumer databases for criminal investigations<br>without sufficient oversight. DNA is what connects extended families and a single individual\u2019s<br>decision to submit a genetic sample can inadvertently expose the privacy of relatives. Without<br>clear ethical frameworks and enforceable protections, the digitization of DNA risks becoming a<br>tool not only for innovation, but for exploitation. Cybercriminals now have an incentive to<br>target genetic databases, and without comprehensive cyberbiosecurity strategies, national<br>corporation and personal security may be compromised.<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><br>Genetic data should be classified as sensitive personally identifiable information (such as social<br>security numbers) and have their own framework that is mandatory such as NIST, but more so<br>designed for cyberbiosecurity. Consumers need to be thoroughly informed about how their<br>DNA is used and protected. By adhering to these protocols, the safety and privacy of individuals<br>concerning DNA in the digital age will not be compromised.<\/p>\n\n\n\n<p><strong>References<\/strong><br>Erlich, Y., Shor, T., Pe\u2019er, I., &amp; Carmi, S. (2018). Identity inference of genomic data using long-<br>range familial searches. Science, 362(6415), 690\u2013694. https:\/\/doi.org\/10.1126\/science.aau4832<br>Kasperbauer, T. J., &amp; Schwartz, P. H. (2020). Genetic data aren\u2019t so special: Causes and<br>implications of re-identification. Hastings Center Report, 50(1), 30\u201339.<br>https:\/\/doi.org\/10.1002\/hast.1074<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The digitization of human DNA through direct-to-consumer (DTC) services introduces vastcybersecurity risks. DNA represents the most sensitive form of personally identifiableinformation (PII). Its increasing accessibility to cybercriminals expands the threat landscapeconsiderably and without urgent advancements in cyberbiosecurity, the potential for irreversiblebreaches of personal identity and violations of bioethical standards is inevitable. Security Risks of DNA&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/shauntellgavinocollins\/2025\/06\/15\/dna-in-the-digital-era-genetic-vulnerabilities-2\/\">Read More<\/a><\/div>\n","protected":false},"author":30947,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/shauntellgavinocollins\/wp-json\/wp\/v2\/posts\/319"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/shauntellgavinocollins\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/shauntellgavinocollins\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/shauntellgavinocollins\/wp-json\/wp\/v2\/users\/30947"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/shauntellgavinocollins\/wp-json\/wp\/v2\/comments?post=319"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/shauntellgavinocollins\/wp-json\/wp\/v2\/posts\/319\/revisions"}],"predecessor-version":[{"id":320,"href":"https:\/\/sites.wp.odu.edu\/shauntellgavinocollins\/wp-json\/wp\/v2\/posts\/319\/revisions\/320"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/shauntellgavinocollins\/wp-json\/wp\/v2\/media?parent=319"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/shauntellgavinocollins\/wp-json\/wp\/v2\/categories?post=319"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/shauntellgavinocollins\/wp-json\/wp\/v2\/tags?post=319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}