Skip to Content


HOUSE DOCKET, NO. 1539         FILED ON: 1/20/2011

HOUSE  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  No. 1336

 

The Commonwealth of Massachusetts

_________________

PRESENTED BY:

Jason M. Lewis

_______________

To the Honorable Senate and House of Representatives of the Commonwealth of Massachusetts in General
              Court assembled:

              The undersigned legislators and/or citizens respectfully petition for the adoption of the accompanying bill:

An Act to Protect Privacy and Personal Data.

_______________

PETITION OF:

 

Name:

District/Address:

Kevin J. Kuros

8th Worcester

Jason M. Lewis

31st Middlesex

Frank I. Smizik

15th Norfolk

William N. Brownsberger

 

Peter V. Kocot

1st Hampshire

John P. Fresolo

16th Worcester

Kay Khan

11th Middlesex

Denise Andrews

2nd Franklin

James Arciero

2nd Middlesex

Cory Atkins

14th Middlesex

Ruth B. Balser

12th Middlesex

Jennifer E. Benson

37th Middlesex

Linda Campbell

15th Essex

Gailanne M. Cariddi

1st Berkshire

Thomas P. Conroy

13th Middlesex

Carolyn C. Dykema

8th Middlesex

James B. Eldridge

 

Christopher G. Fallon

33rd Middlesex

Linda Dorcena Forry

12th Suffolk

Sean Garballey

23rd Middlesex

Jonathan Hecht

29th Middlesex

Bradley H. Jones, Jr.

20th Middlesex

Jay R. Kaufman

15th Middlesex

Stephen Kulik

1st Franklin

Steven L. Levy

4th Middlesex

Elizabeth A. Malia

11th Suffolk

James J. O'Day

14th Worcester

George N. Peterson, Jr.

9th Worcester

Byron Rushing

9th Suffolk

Jeffrey Sánchez

15th Suffolk

John W. Scibak

2nd Hampshire

Carl M. Sciortino, Jr.

34th Middlesex

Theodore C. Speliotis

13th Essex

William M. Straus

10th Bristol

Benjamin Swan

11th Hampden

Chris Walsh

6th Middlesex

Martha M. Walz

8th Suffolk

Thomas M. Petrolati

7th Hampden

Paul Adams

17th Essex


HOUSE DOCKET, NO. 1539        FILED ON: 1/20/2011

HOUSE  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  No. 1336

By Mr. Lewis of Winchester, a petition (accompanied by bill, House, No. 1336) of Jason M. Lewis and others for legislation to regulate the collection and maintenance of criminal intelligence information.  The Judiciary. 


The Commonwealth of Massachusetts
 

_______________

In the Year Two Thousand Eleven

_______________

 

An Act to Protect Privacy and Personal Data.
 

              Be it enacted by the Senate and House of Representatives in General Court assembled, and by the authority of the same, as follows:
 

                              Be it enacted by the Senate and House of Representatives in General Court assembled, and by the authority of the same, as follows:

              SECTION 1.  Section 18 of chapter 6A of the General Laws, as appearing in the 2008 Official Edition, is hereby amended by inserting after the word “board”, at line 5, the following:--

              ; criminal intelligence systems operating in Massachusetts

              SECTION 2.  Section 18 ¾ of said chapter 6A, as so appearing, is hereby amended by adding at the end thereof:--

              (10) to promulgate rules and regulations to ensure that criminal intelligence systems operating in Massachusetts, including but not limited to the commonwealth fusion center and the Boston regional intelligence center, as defined in chapter 66A of the General Laws:

              (a) maintain records regarding the sources of criminal intelligence information and personal data, as defined in said Chapter 66A, that such criminal intelligence systems review, collect, and maintain, and the quantity of data received from each source;

              (b) maintain criminal intelligence information or personal data concerning an individual or organization only if there is a reasonable suspicion that the individual is involved in criminal conduct or activity and the information is relevant to that criminal conduct or activity.  Such reasonable suspicion is established when information exists which establishes sufficient facts to give a trained law enforcement or criminal justice agency officer, investigator, or employee a basis to believe that there is a reasonable possibility that an individual or organization is involved in a definable criminal activity or enterprise;

              (b) disseminate criminal intelligence information or personal data only where there is a need to know and a right to know the information in the performance of a law enforcement activity;

              (c) disseminate criminal intelligence information or personal data only to law enforcement authorities which shall agree to follow procedures regarding information receipt, maintenance, security, and dissemination which are consistent with the receipt, maintenance, security and dissemination limitations, requirements and procedures applicable to the criminal intelligence system.  Nothing herein shall limit the dissemination of an assessment of intelligence information to a government official or to any other individual, when necessary, to avoid imminent danger to life or property;

              (d) notify submitting criminal justice agencies, law enforcement agencies, criminal intelligence systems or other submitting individuals prior to initiation of formal information exchange arrangements with any Federal, State, regional, or other information systems;

              (e) adopt, implement, and maintain procedures to ensure the maximum feasible security, confidentiality, and integrity of personal information, as defined in Chapter 93H, and personal data, as defined in Chapter 66A, including but not limited to labeling all such data to indicate levels of sensitivity, levels of confidence, and the identity of the submitting criminal justice agency, law enforcement agency, or other submitting entity or individual;

              (f) adopt, implement, and maintain written information security programs governing the collection, use, dissemination, storage, retention and destruction of personal information, as defined in Chapter 93H, and personal data, as defined in Chapter 66A, and ensure that criminal intelligence systems securely store and protect the information against unauthorized access, destruction, use, modification, disclosure or loss, and destroy the information as soon as it is no longer needed.  Such programs shall address, without limitation, administrative, technical and physical safeguards, and shall include sanctions for unauthorized access, utilization, or disclosure of information stored and maintained by criminal intelligence systems, and shall comply with all federal and state privacy and information security laws and regulations, including but not limited to all applicable rules and regulations used by the Secretary of State’s Supervisor of Public Records under Chapter 93H.

              (g) file annually, on or before the first of September, a notice as directed by section sixty-three of Chapter 30.

              (h) protect the security and privacy of data collected by criminal intelligence systems operating in Massachusetts by requiring that such criminal intelligence systems, at a minimum:

              (i) address any participation by entities other than public law enforcement agencies in criminal intelligence system activities;

              (ii) require any agency submitting data to a criminal intelligence system to maintain in its agency files documentation of each such submission, which shall be made available for reasonable audit and inspection by the inspector general;

              (iii) establish protocols for screening, hiring, transferring, promoting, and terminating personnel authorized to have direct access to criminal intelligence information or personal data; and

              (iv) implement subsection (10) of this section, as well as the provisions of Chapter 66A and section 1A of Chapter 276.

              (11)               provide assistance and unrestricted access to the inspector general in the preparation of an annual report on the compliance of criminal intelligence systems with subsection (10), which report shall include recommendations for corrective action.  Said report shall be filed annually on or before the thirtieth of April with the clerks’ offices of the senate and the house of representatives, the ways and means committees of the senate and house of representatives, and the joint committee on state administration and regulatory oversight, which shall convene a public hearing concerning the report within 60 days of its filing.

             

              SECTION 3.  Section 63 of Chapter 30 of the General Laws, as appearing in the 2008 Official Edition, is hereby amended by striking the word “and”, at line 19, and by inserting after the word “system”, at line 21, the following:-- ; and (j) a signed certification by the individual identified herein at subsection (i) that acknowledges his or her personal accountability for the data maintained by and disseminated from the system and that the operations of the system are, to the best of his or her knowledge, in compliance with all applicable federal, state and local laws, ordinances, and regulations.

              SECTION 4.  Section 1 of Chapter 66A of the General Laws, as appearing in the 2008 Official Edition, is hereby amended by inserting the following definitions:--

              “Boston Regional Intelligence Center”, that entity within the office of the police commissioner of the Boston police department responsible for collecting and analyzing criminal intelligence information within the Metro-Boston homeland security region, or any successor entity.

              “Commonwealth Fusion Center”, that entity established by Executive Order 476 within the executive office of public safety and homeland security, or any successor entity.

              “Criminal intelligence information”, data which has been evaluated to determine that it is relevant to the identification of and the criminal activity engaged in by an individual who or organization which is reasonably suspected of involvement in criminal activity.

              “Criminal intelligence system”, the arrangements, equipment, facilities, and procedures used for the receipt, storage, interagency exchange or dissemination, and analysis of criminal intelligence information, including the commonwealth fusion center and the Boston regional intelligence center.

              SECTION 5.  Said section 1 of Chapter 66A, as so appearing, is hereby further amended by striking the words “such information is not contained in a public record, as defined in clause Twenty-sixth of section seven of chapter four and shall not include intelligence information, evaluative information or criminal offender record information as defined in section one hundred and sixty-seven of chapter six.”, at lines 34 through 39, and inserting in their place the following:-- personal data shall not include information that would reasonably be expected to: interfere with an ongoing criminal investigation or other law enforcement proceeding; constitute a clearly unwarranted invasion of personal privacy; disclose the identity of a confidential source; or endanger the life or physical safety of any individual.

              SECTION 6.  Said Chapter 66A is hereby amended by inserting after section 2 the following section:- 

              Section 2 ½.  At least once annually, every criminal intelligence system shall conduct an internal audit, the results of which shall be public records.  This audit shall include:

              (1)              For each database that contains personal data, the number of authorized users, each user’s level of access, and the quantity of data accessed by each user on a weekly basis;

              (2)              For each database that contains personal data, the number of transactions performed by transaction type, unique user, and access location;

              (3)              For each database that contains personal data, the quantity of data collected and maintained from each unique source, and the frequency of data from each source being used in an investigation;

              (4)              Since the last audit, the numbers of investigations authorized and denied under subsection (b)(4) of section 1A of Chapter 276;

              (5)              The number of investigations authorized under said subsection (b)(4) that remain open;

              (6)              For each open investigation authorized under said subsection (b)(4), the length of time the investigation has remained open and a justification for continued collection or maintenance of protected information;

              (7)              Since the last audit, the number of investigations authorized under said subsection (b)(4) that have led to indictments or prosecutions, and the names and docket numbers of resulting court proceedings;

              (8)              Since the last audit, the number of authorized disseminations under subsection (b)(3) of section 1A of Chapter 276, and to which entity each dissemination was made.

              SECTION 7.  Section 3 of said Chapter 66A, as so appearing, is hereby amended by inserting after the word “towns.”, at line 9, the following:-

              The Secretary of Public Safety and Security shall promulgate rules and regulations to carry out the purposes of this chapter which shall be applicable to the Commonwealth Fusion Center and other criminal intelligence systems, including those operated by public safety entities of the cities and towns.             

              SECTION 8.  Chapter 276 of the General Laws is hereby amended by striking out section 1A, as appearing in the 2008 Official Edition, and inserting in place thereof the following section:-

                          Section 1A.  (a) No state or local law enforcement agency, prosecutorial office, criminal intelligence system, police or peace officer, or agent thereof shall track, collect or maintain information about the political, religious or social views, associations or activities of any individual, group, association, organization, corporation, business or partnership or other entity unless such information directly relates to an investigation of criminal activities, and there are reasonable grounds to suspect the subject of the information is involved in criminal conduct. Any information collected or maintained under this section shall be referred to hereinafter as “protected information.”

              (b)  No criminal intelligence system, as defined in chapter 66A of the General Laws, or state or local law enforcement agency in receipt of information from an criminal intelligence system, shall collect, maintain, or disseminate protected information except in accordance with the provisions of this section:

              (1) No protected information shall be knowingly received, maintained, or disseminated that has been obtained in violation of any applicable federal, state, or local law, ordinance, or regulation.

              (2) All protected information shall be evaluated for the reliability of its source and the accuracy of its content prior to being recorded in any investigation file.

              (3) Protected information shall be disseminated only to law enforcement agencies, contingent upon review and prior written authorization by the head of the originating law enforcement agency or criminal intelligence system. A record of any such written authorization, which shall specify the reasons the dissemination is necessary, shall be maintained for a minimum of five years.  The originating entity shall record each instance of dissemination in a log containing the name of the subject or subjects, the name of the entity with whom the information was shared, and the date of dissemination.

              (4) All investigations undertaken on the basis of any protected information shall first be authorized in writing by the head of the investigating law enforcement agency or criminal intelligence system. A record of any such written authorization, which shall specify the reasons for such investigation, shall be maintained in the corresponding investigation file for a minimum of five years

              (5) All information recorded in any investigation file shall be reviewed at least once every five years, and any information that is not reliable, accurate, relevant, and timely, shall be destroyed, provided however, that any documents related to the authorization for and termination of investigations based in whole or in part on protected information collected under section 1A of this chapter, and any authorization to disseminate such protected information, shall be retained.  Information retained in an investigation file after a review shall be accompanied by the following documentation: the name of the reviewer, the date of review, and an explanation of the decision to retain the information.

The information contained in this website is for general information purposes only. The General Court provides this information as a public service and while we endeavor to keep the data accurate and current to the best of our ability, we make no representations or warranties of any kind, express or implied, about the completeness, accuracy, reliability, suitability or availability with respect to the website or the information contained on the website for any purpose. Any reliance you place on such information is therefore strictly at your own risk.

Error