The "Vets Connect Act" mandates the Department of Veterans Affairs to establish a secure, privacy-preserving database and messaging platform , known as the Vets Connect System. This platform's primary goal is to enable veterans to reconnect with others they served alongside, without disclosing personal contact information unless explicitly authorized. The system will only include minimal service-connection information and a display name, requiring veterans to affirmatively opt-in to be discoverable by other users. Access to the system is strictly limited to verified veterans , who maintain full control over their visibility, communication settings, and the ability to opt out or delete their data. The bill explicitly prohibits any use of system information for commercial solicitation, advertising, or data brokerage activities. Robust cybersecurity protections, audit logs, and penalties for misuse are also required to ensure the system's integrity and security.
Get AI-generated questions to help you understand this bill better
Timeline
Introduced in House
Referred to the House Committee on Veterans' Affairs.
Introduced in House
Referred to the House Committee on Veterans' Affairs.
Armed Forces and National Security
Vets Connect Act
USA119th CongressHR-7176| House
| Updated: 1/21/2026
The "Vets Connect Act" mandates the Department of Veterans Affairs to establish a secure, privacy-preserving database and messaging platform , known as the Vets Connect System. This platform's primary goal is to enable veterans to reconnect with others they served alongside, without disclosing personal contact information unless explicitly authorized. The system will only include minimal service-connection information and a display name, requiring veterans to affirmatively opt-in to be discoverable by other users. Access to the system is strictly limited to verified veterans , who maintain full control over their visibility, communication settings, and the ability to opt out or delete their data. The bill explicitly prohibits any use of system information for commercial solicitation, advertising, or data brokerage activities. Robust cybersecurity protections, audit logs, and penalties for misuse are also required to ensure the system's integrity and security.