Massachusetts 2025 2025-2026 Regular Session

Massachusetts House Bill H2687 Introduced / Bill

Filed 02/27/2025

                    1 of 1
HOUSE DOCKET, NO. 4038       FILED ON: 1/17/2025
HOUSE . . . . . . . . . . . . . . . No. 2687
The Commonwealth of Massachusetts
_________________
PRESENTED BY:
David M. Rogers
_________________
To the Honorable Senate and House of Representatives of the Commonwealth of Massachusetts in General
Court assembled:
The undersigned legislators and/or citizens respectfully petition for the adoption of the accompanying bill:
An Act relative to protecting Massachusetts residents against federal government surveillance.
_______________
PETITION OF:
NAME:DISTRICT/ADDRESS :DATE ADDED:David M. Rogers24th Middlesex1/17/2025Patrick Joseph Kearney4th Plymouth1/17/2025 1 of 7
HOUSE DOCKET, NO. 4038       FILED ON: 1/17/2025
HOUSE . . . . . . . . . . . . . . . No. 2687
By Representative Rogers of Cambridge, a petition (accompanied by bill, House, No. 2687) of 
David M. Rogers and Patrick Joseph Kearney relative to personal data access by criminal justice 
agencies. Public Safety and Homeland Security.
The Commonwealth of Massachusetts
_______________
In the One Hundred and Ninety-Fourth General Court
(2025-2026)
_______________
An Act relative to protecting Massachusetts residents against federal government surveillance.
Be it enacted by the Senate and House of Representatives in General Court assembled, and by the authority 
of the same, as follows:
1 SECTION 1. Section 1 of chapter 66A of the General Laws, as appearing in the 2020 
2Official Edition, is hereby amended by inserting after the definition of “Automated personal data 
3system,” the following definition:-
4 “Commonwealth fusion center”, an entity established in executive order no. 476 within 
5the criminal information section of the department of state police, established in section 38 of 
6chapter 22C, and under the direction of the executive office of public safety and security, or any 
7successor entity.
8 SECTION 2. Said section 1 of said chapter 66A, as so appearing, is hereby further 
9amended by inserting after the definition of “Criminal intelligence agency,” the following 2 
10definitions:-
11 “Criminal intelligence information”, data collected on an individual or organization that 
12is reasonably suspected of involvement in criminal activity for the purpose of their identification  2 of 7
13or for acquiring evidence of their criminal activity. Reasonable suspicion is established when 
14information exists that establishes sufficient facts to give a trained law enforcement or criminal 
15justice agency officer, investigator or employee a basis to believe that there is a reasonable 
16possibility that an individual or organization is involved in a definable criminal activity or 
17enterprise.
18 “Criminal intelligence system”, the arrangements, equipment, facilities and procedures 
19used for the receipt, storage, interagency exchange or dissemination, and analysis of criminal 
20intelligence information, including the commonwealth fusion center, the Boston Regional 
21Intelligence Center, any successor entities and any other entities in the commonwealth bound by 
22the provisions of 28 CFR Part 23.
23 SECTION 3. Said section 1 of said chapter 66A, as so appearing, is hereby further 
24amended by striking out the definition of “Personal data,” and inserting in place thereof the 
25following definition:-
26 “Personal data”, any information concerning an individual that, because of a name, 
27identifying number, mark or description, can be readily associated with a particular individual; 
28provided however, that personal data shall not include information that would reasonably be 
29expected to: (i) interfere with an ongoing criminal investigation or other law enforcement 
30proceeding; (ii) constitute a clearly unwarranted invasion of personal privacy; (iii) disclose the 
31identity of a confidential source; or (iv) endanger the life or physical safety of any individual.
32 SECTION 4. Said section 1 of said chapter 66A, as so appearing, is hereby further 
33amended by adding the following definition:- 3 of 7
34 “Protected information”, information about the political, religious or social views, 
35associations or activities of any individual, group, association, organization, corporation, 
36business or partnership or other entity.
37 SECTION 5. Said chapter 66A is hereby further amended by inserting after section 2 the 
38following 6 sections:-
39 Section 2A. At least once annually, every criminal intelligence system shall conduct an 
40internal audit and publish a report based on the results. This audit shall include:
41 (i) for each database that contains personal data: (1) the number of authorized users; (2) 
42each user’s level of access; (3) the quantity of data accessed by each user on a weekly basis; (4) 
43the number of transactions performed of each specified transaction type for each unique user and 
44access location; (5) the quantity of data collected and maintained from each unique source; and 
45(6) the frequency of use in an investigation of data from each source;
46 (ii) the numbers of investigations authorized and denied under paragraph (4) of 
47subsection (b) of section 2C, and the dates of initiation and closure for each of these 
48investigations;
49 (iii) the number of investigations authorized under said paragraph (4) of said subsection 
50(b) that remain open, the date of initiation of the investigation for each open investigation, the 
51length of time the investigation has remained open and a justification for continued collection or 
52maintenance of protected information; 4 of 7
53 (iv) the number of investigations authorized under said paragraph (4) of said subsection 
54(b) that have led to indictments or prosecutions, and the names and docket numbers of resulting 
55court proceedings; and
56 (v) the number of authorized disseminations under paragraph (3) of said subsection (b), 
57and to which entity each dissemination was made.
58 Section 2B. Every criminal intelligence system shall provide assistance and unrestricted 
59access to the office of the inspector general, who shall submit to the clerks of the house of 
60representatives and the senate, the house and senate committees on post audit and oversight, and 
61the joint committee on public safety and homeland security a report every 2 years on the 
62compliance of criminal intelligence systems with section 2C. The report shall include 
63recommendations for corrective action and shall be a public record.
64 Section 2C. (a) No state or local law enforcement agency, as defined in section 1 of 
65chapter 6E, prosecutorial office, criminal intelligence system, as defined in section 1, police or 
66peace officer or agent thereof shall track, collect, maintain or disseminate protected information, 
67unless such information directly relates to an investigation of criminal activities, and there are 
68reasonable grounds to suspect the subject of the information is involved in criminal conduct.
69 (b) (1) No protected information obtained in violation of any applicable federal, state or 
70local law, ordinance or regulation shall be knowingly accessed, received, maintained or 
71disseminated.
72 (2) All protected information shall be evaluated for the reliability of its source and the 
73accuracy of its content prior to being included in any investigation file, whether temporary, 
74interim or permanent in nature. 5 of 7
75 (3) Protected information shall be disseminated only to law enforcement agencies, 
76contingent upon review and prior written authorization by the head of the originating law 
77enforcement agency or criminal intelligence system. The originating law enforcement agency 
78shall maintain a record of any such written authorization, specifying the reasons the 
79dissemination is necessary, for a minimum of 5 years. The originating entity shall record each 
80instance of dissemination in a log containing: (i) the method of dissemination; (ii) the name of 
81the subject; (iii) the name of the entity with whom the information was shared; and (iv) the date 
82of dissemination.
83 (4) All investigations undertaken on the basis of any protected information shall first be 
84authorized in writing by the head of the investigating law enforcement agency or criminal 
85intelligence system. A record of any such written authorization, specifying the reasons for such 
86investigation, shall be maintained in the corresponding investigation file for a minimum of 5 
87years.
88 (5) A law enforcement agency or criminal intelligence system shall review all 
89information included in its investigation files at least once every 5 years, and shall destroy any 
90information that is not reliable, accurate, relevant and timely; provided, that any documents 
91related to the authorization for and termination of investigations based in whole or in part on 
92protected information collected under this section, and any authorization to disseminate such 
93protected information, shall be retained. Information retained in an investigation file after a 
94review shall be accompanied by the following documentation: the name of the reviewer, the date 
95of review and an explanation of the decision to retain the information. 6 of 7
96 (6) Any violation of this section constitutes an injury and any person may institute 
97proceedings for injunctive relief, declaratory relief or writ of mandamus in the superior court. An 
98action instituted under this paragraph may be brought against any agency with possession, 
99custody or control of personal data, and any person whose data is included in the violation may 
100institute proceedings and shall be entitled to recover actual damages not exceeding $2,000 or 
101$200 per day for each day of violation, whichever is greater. A court shall award costs and 
102reasonable attorneys’ fees to the plaintiff who is the prevailing party in an action brought under 
103this paragraph. Violations of this section by a government employee shall result in consequences 
104that may include retraining, suspension or termination, in accordance with any memorandums of 
105understanding with employee bargaining units.
106 Section 2D. The executive office of public safety and security shall engage an 
107independent auditor to select and audit a random sample of the suspicious activity reports held 
108by the Boston Regional Intelligence Center, the commonwealth fusion center and the New 
109England State Police Information Network, relating to current or former residents of the 
110commonwealth. If the auditor finds any of these suspicious activity reports to lack indicia of 
111reasonable suspicion of a crime as outlined in 28 CFR part 23.20, the department of state police 
112shall suspend cooperation with the entity that produced the report until such time as all records 
113held by these agencies pertaining to Massachusetts residents have been reviewed for compliance 
114with 28 CFR part 23.20, and such records purged from these agencies’ systems if noncompliant.
115 Section 2E. (a) The commonwealth fusion center shall publish the names of the members 
116of its privacy oversight committee. The meetings of the privacy oversight committee shall take 
117place at least quarterly, and shall be open to the public. 7 of 7
118 (b) For entities retaining criminal intelligence information, training manuals related to the 
119handling of personal data shall be available to the public.
120 Section 2F. Personal data held in a criminal intelligence system shall not be exempt from 
121disclosure to the individual concerned, or to their attorney or their heirs, by reason of being held 
122in a criminal intelligence system; provided, that disclosure is otherwise proper.
123 Section 2G. After notice and opportunity for a hearing, the office of the inspector general 
124may impose a monetary penalty on any person or group found to be in violation of any of the 
125provisions of sections two A to two F, inclusive, or of any rules or regulations promulgated 
126thereunder. The monetary penalty shall not exceed five hundred dollars for each act or violation. 
127The amount of any such monetary penalty shall be paid to the inspector general for general use.
128 SECTION 6. After 	notice and opportunity for a hearing, the office of the inspector 
129general may impose a monetary penalty on any person or group found to be in violation of any of 
130the provisions of SECTION 5, inclusive, or of any rules or regulations promulgated thereunder. 
131The monetary penalty shall not exceed five hundred dollars for each act or violation. The amount 
132of any such monetary penalty shall be paid into the general fund.