Enforcement begins for New York’s algorithmic pricing law

New York’s algorithmic pricing law took effect Monday, requiring companies disclose when they use consumers’ personal data to set prices.

Algorithmic pricing allows firms to automatically change prices based on data like consumers’ income, previous shopping behaviors and location. 

California’s legislature also has enacted an algorithmic pricing law, but it has not yet taken effect, making New York the first state in the country to regulate the practice.

New York Attorney General Letitia James on Wednesday issued a consumer alert, telling residents to report instances where companies use algorithmic pricing without disclosure.

“New Yorkers deserve to know whether their personal information is being used to set the prices they pay, and if businesses are charging customers different prices for the same products,” James said in a prepared statement. 

“I will not hesitate to take action against those who try to mislead New Yorkers and use their personal information to manipulate prices without their knowledge.”

Privacy advocates have long warned that algorithmic pricing — also known as surveillance pricing — can lead to discrimination and unfairness. 

In January, the Federal Trade Commission (FTC) issued a report examining how businesses are using algorithmic pricing.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Suzanne Smalley

Suzanne Smalley

is a reporter covering privacy, disinformation and cybersecurity policy for The Record. She was previously a cybersecurity reporter at CyberScoop and Reuters. Earlier in her career Suzanne covered the Boston Police Department for the Boston Globe and two presidential campaign cycles for Newsweek. She lives in Washington with her husband and three children.

 

Total
0
Shares
Previous Post

Hackers Exploiting Triofox Flaw to Install Remote Access Tools via Antivirus Feature

Next Post

Russian hacker to plead guilty to aiding Yanluowang ransomware group

Related Posts

Microsoft Detects “SesameOp” Backdoor Using OpenAI’s API as a Stealth Command Channel

Microsoft has disclosed details of a novel backdoor dubbed SesameOp that uses OpenAI Assistants Application Programming Interface (API) for command-and-control (C2) communications. "Instead of relying on more traditional methods, the threat actor behind this backdoor abuses OpenAI as a C2 channel as a way to stealthily communicate and orchestrate malicious activities within the compromised
Read More

Sneeit WordPress RCE Exploited in the Wild While ICTBroadcast Bug Fuels Frost Botnet Attacks

A critical security flaw in the Sneeit Framework plugin for WordPress is being actively exploited in the wild, per data from Wordfence. The remote code execution vulnerability in question is CVE-2025-6389 (CVSS score: 9.8), which affects all versions of the plugin prior to and including 8.3. It has been patched in version 8.4, released on August 5, 2025. The plugin has more than 1,700 active
Read More

Securing GenAI in the Browser: Policy, Isolation, and Data Controls That Actually Work

The browser has become the main interface to GenAI for most enterprises: from web-based LLMs and copilots, to GenAI‑powered extensions and agentic browsers like ChatGPT Atlas. Employees are leveraging the power of GenAI to draft emails, summarize documents, work on code, and analyze data, often by copying/pasting sensitive information directly into prompts or uploading files.  Traditional
Read More