Session:   
Updated:   2026-02-23

Home - Bills - Bill - Authors - Dates - Locations - Analyses - Organizations

Measure
Authors Ta  
Subject Crimes: unlawful use of DNA.
Relating To relating to crimes.
Title An act to add Section 367 to the Penal Code, relating to crimes.
Last Action Dt 2026-02-05
State Introduced
Status Pending Referral
Flags
Vote Req Approp Fiscal Cmte Local Prog Subs Chgs Urgency Tax Levy Active?
Majority No Yes Yes None No No Y
i
Leginfo Link  
Bill Actions
2026-02-06     From printer. May be heard in committee March 8.
2026-02-05     Read first time. To print.
Versions
Introduced     2026-02-05
Analyses TBD
Latest Text Bill Full Text
Latest Text Digest

Existing law, the Genetic Information Privacy Act, requires a direct-to-consumer genetic testing company, as defined, to provide a consumer with certain information regarding the company’s policies and procedures for the collection, use, maintenance, and disclosure, as applicable, of genetic data, and to obtain a consumer’s express consent for collection, use, or disclosure of the consumer’s genetic data, as specified.

This bill would make a person guilty of unlawful use of DNA in the first degree, a felony, if they intentionally and without express consent sell or otherwise transfer another individual’s DNA sample or genetic data to a third party, as specified.

The bill would make a person guilty of unlawful use of DNA in the second degree, a felony, if they intentionally and without express consent submit another individual’s DNA for genetic testing, conduct or procure the conducting of genetic testing of another individual’s DNA, or disclose another individual’s genetic data to a third party, except as specified.

The bill would make a person guilty of unlawful use of DNA in the third degree, a misdemeanor, if they collect or retain another individual’s DNA sample with the intent to perform a DNA analysis or if they collect or retain another individual’s DNA sample or genetic information by accessing a computer system either without authorization or by exceeding their authorized access to the computer system.