SENATE DOCKET, NO. 1492        FILED ON: 1/16/2015

SENATE  .  .  .  .  .  .  .  .  .  .  .  .  .  .  No. 734

 

The Commonwealth of Massachusetts

_________________

PRESENTED BY:

Harriette L. Chandler

_________________

To the Honorable Senate and House of Representatives of the Commonwealth of Massachusetts in General
Court assembled:

The undersigned legislators and/or citizens respectfully petition for the adoption of the accompanying bill:

An Act to protect freedom of speech and association.

_______________

PETITION OF:

 

Name:

District/Address:

Harriette L. Chandler

First Worcester

Michael J. Barrett

Third Middlesex

David M. Rogers

24th Middlesex

Timothy J. Toomey, Jr.

26th Middlesex


SENATE DOCKET, NO. 1492        FILED ON: 1/16/2015

SENATE  .  .  .  .  .  .  .  .  .  .  .  .  .  .  No. 734

By Ms. Chandler, a petition (accompanied by bill, Senate, No. 734) of Harriette L. Chandler, Michael J. Barrett, David M. Rogers and Timothy J. Toomey, Jr. for legislation relative to freedom of speech and association.  The Judiciary.

 

[SIMILAR MATTER FILED IN PREVIOUS SESSION
SEE SENATE, NO. 642 OF 2013-2014.]

 

The Commonwealth of Massachusetts

 

_______________

In the One Hundred and Eighty-Ninth General Court
(2015-2016)

_______________

 

An Act to protect freedom of speech and association.

 

Be it enacted by the Senate and House of Representatives in General Court assembled, and by the authority of the same, as follows:
 

SECTION 1.  Section 1 of Chapter 66A of the General Laws, as appearing in the 2010 Official Edition, is hereby amended by striking out the definition of “Personal data”, at lines 32 through 39, and inserting the following definitions:--

“Commonwealth Fusion Center”, that entity established by Executive Order 476 within the executive office of public safety and security, or any successor entity.

“Criminal intelligence information”, data which has been evaluated to determine that it is relevant to the identification of and the criminal activity engaged in by an individual who or organization which is reasonably suspected of involvement in criminal activity.   Such reasonable suspicion is established when information exists which establishes sufficient facts to give a trained law enforcement or criminal justice agency officer, investigator, or employee a basis to believe that there is a reasonable possibility that an individual or organization is involved in a definable criminal activity or enterprise.

“Criminal intelligence system”, the arrangements, equipment, facilities, and procedures used for the receipt, storage, interagency exchange or dissemination, and analysis of criminal intelligence information,  including the commonwealth fusion center, the Boston regional intelligence center, and any successor entities.

“Personal data”, any information concerning an individual which, because of name, identifying number, mark or description can be readily associated with a particular individual; provided, however, that personal data shall not include information that would reasonably be expected to: interfere with an ongoing criminal investigation or other law enforcement proceeding; constitute a clearly unwarranted invasion of personal privacy; disclose the identity of a confidential source; or endanger the life or physical safety of any individual.

SECTION 2.  Said Chapter 66A is hereby amended by inserting after section 2 the following sections:- 

Section 2 ½.  At least once annually, every criminal intelligence system shall conduct an internal audit, the report of which shall be a public record.  This audit shall include:

(1)For each database that contains personal data, the number of authorized users, each user’s level of access, and the quantity of data accessed by each user on a weekly basis;

(2)For each database that contains personal data, the number of transactions performed by transaction type, unique user, and access location;

(3)For each database that contains personal data, the quantity of data collected and maintained from each unique source, and the frequency of use in an investigation of data from each source;

(4)The numbers of investigations authorized and denied under subsection (b)(4) of section 1A of Chapter 276;

(5)The number of investigations authorized under said subsection (b)(4) that remain open;

(6)For each open investigation authorized under said subsection (b)(4), the length of time the investigation has remained open and a justification for continued collection or maintenance of protected information;

(7)The number of investigations authorized under said subsection (b)(4) that have led to indictments or prosecutions, and the names and docket numbers of resulting court proceedings;

(8)The number of authorized disseminations under subsection (b)(3) of section 1A of Chapter 276, and to which entity each dissemination was made.

Section 2 ¾.  Every criminal intelligence system shall provide assistance and unrestricted access to the inspector general, who may from time to time prepare a report on the compliance of criminal intelligence systems with section 1A of Chapter 276, which report shall include recommendations for corrective action and be a public record.

SECTION 3.  Chapter 276 of the General Laws is hereby amended by striking out section 1A and inserting in place thereof the following section:-

Section 1A.  (a) No state or local law enforcement agency, prosecutorial office, criminal intelligence system, police or peace officer, or agent thereof shall track, collect or maintain information about the political, religious or social views, associations or activities of any individual, group, association, organization, corporation, business or partnership or other entity unless such information directly relates to an investigation of criminal activities, and there are reasonable grounds to suspect the subject of the information is involved in criminal conduct. Any information collected or maintained under this section shall be referred to hereinafter as “protected information.”

(b)  No criminal intelligence system, as defined in chapter 66A of the General Laws, or state or local law enforcement agency in receipt of information from an criminal intelligence system, shall collect, maintain, or disseminate protected information except in accordance with the provisions of this section:

(1) No protected information obtained in violation of any applicable federal, state, or local law, ordinance, or regulation shall be knowingly accessed, received, maintained, or disseminated.

(2) All protected information shall be evaluated for the reliability of its source and the accuracy of its content prior to being recorded in any investigation file.

(3) Protected information shall be disseminated only to law enforcement agencies, contingent upon review and prior written authorization by the head of the originating law enforcement agency or criminal intelligence system. A record of any such written authorization, which shall specify the reasons the dissemination is necessary, shall be maintained for a minimum of five years.  The originating entity shall record each instance of dissemination, whether written or oral, in a log containing the name of the subject or subjects, the name of the entity with whom the information was shared, and the date of dissemination.

(4) All investigations undertaken on the basis of any protected information shall first be authorized in writing by the head of the investigating law enforcement agency or criminal intelligence system. A record of any such written authorization, which shall specify the reasons for such investigation, shall be maintained in the corresponding investigation file for a minimum of five years

(5) All information recorded in any investigation file shall be reviewed at least once every five years, and any information that is not reliable, accurate, relevant, and timely, shall be destroyed, provided however, that any documents related to the authorization for and termination of investigations based in whole or in part on protected information collected under section 1A of this chapter, and any authorization to disseminate such protected information, shall be retained.  Information retained in an investigation file after a review shall be accompanied by the following documentation: the name of the reviewer, the date of review, and an explanation of the decision to retain the information.