Massachusetts 2025-2026 Regular Session

Massachusetts House Bill H2687 Compare Versions

Only one version of the bill is available at this time.
OldNewDifferences
11 1 of 1
22 HOUSE DOCKET, NO. 4038 FILED ON: 1/17/2025
33 HOUSE . . . . . . . . . . . . . . . No. 2687
44 The Commonwealth of Massachusetts
55 _________________
66 PRESENTED BY:
77 David M. Rogers
88 _________________
99 To the Honorable Senate and House of Representatives of the Commonwealth of Massachusetts in General
1010 Court assembled:
1111 The undersigned legislators and/or citizens respectfully petition for the adoption of the accompanying bill:
1212 An Act relative to protecting Massachusetts residents against federal government surveillance.
1313 _______________
1414 PETITION OF:
1515 NAME:DISTRICT/ADDRESS :DATE ADDED:David M. Rogers24th Middlesex1/17/2025Patrick Joseph Kearney4th Plymouth1/17/2025 1 of 7
1616 HOUSE DOCKET, NO. 4038 FILED ON: 1/17/2025
1717 HOUSE . . . . . . . . . . . . . . . No. 2687
1818 By Representative Rogers of Cambridge, a petition (accompanied by bill, House, No. 2687) of
1919 David M. Rogers and Patrick Joseph Kearney relative to personal data access by criminal justice
2020 agencies. Public Safety and Homeland Security.
2121 The Commonwealth of Massachusetts
2222 _______________
2323 In the One Hundred and Ninety-Fourth General Court
2424 (2025-2026)
2525 _______________
2626 An Act relative to protecting Massachusetts residents against federal government surveillance.
2727 Be it enacted by the Senate and House of Representatives in General Court assembled, and by the authority
2828 of the same, as follows:
2929 1 SECTION 1. Section 1 of chapter 66A of the General Laws, as appearing in the 2020
3030 2Official Edition, is hereby amended by inserting after the definition of “Automated personal data
3131 3system,” the following definition:-
3232 4 “Commonwealth fusion center”, an entity established in executive order no. 476 within
3333 5the criminal information section of the department of state police, established in section 38 of
3434 6chapter 22C, and under the direction of the executive office of public safety and security, or any
3535 7successor entity.
3636 8 SECTION 2. Said section 1 of said chapter 66A, as so appearing, is hereby further
3737 9amended by inserting after the definition of “Criminal intelligence agency,” the following 2
3838 10definitions:-
3939 11 “Criminal intelligence information”, data collected on an individual or organization that
4040 12is reasonably suspected of involvement in criminal activity for the purpose of their identification 2 of 7
4141 13or for acquiring evidence of their criminal activity. Reasonable suspicion is established when
4242 14information exists that establishes sufficient facts to give a trained law enforcement or criminal
4343 15justice agency officer, investigator or employee a basis to believe that there is a reasonable
4444 16possibility that an individual or organization is involved in a definable criminal activity or
4545 17enterprise.
4646 18 “Criminal intelligence system”, the arrangements, equipment, facilities and procedures
4747 19used for the receipt, storage, interagency exchange or dissemination, and analysis of criminal
4848 20intelligence information, including the commonwealth fusion center, the Boston Regional
4949 21Intelligence Center, any successor entities and any other entities in the commonwealth bound by
5050 22the provisions of 28 CFR Part 23.
5151 23 SECTION 3. Said section 1 of said chapter 66A, as so appearing, is hereby further
5252 24amended by striking out the definition of “Personal data,” and inserting in place thereof the
5353 25following definition:-
5454 26 “Personal data”, any information concerning an individual that, because of a name,
5555 27identifying number, mark or description, can be readily associated with a particular individual;
5656 28provided however, that personal data shall not include information that would reasonably be
5757 29expected to: (i) interfere with an ongoing criminal investigation or other law enforcement
5858 30proceeding; (ii) constitute a clearly unwarranted invasion of personal privacy; (iii) disclose the
5959 31identity of a confidential source; or (iv) endanger the life or physical safety of any individual.
6060 32 SECTION 4. Said section 1 of said chapter 66A, as so appearing, is hereby further
6161 33amended by adding the following definition:- 3 of 7
6262 34 “Protected information”, information about the political, religious or social views,
6363 35associations or activities of any individual, group, association, organization, corporation,
6464 36business or partnership or other entity.
6565 37 SECTION 5. Said chapter 66A is hereby further amended by inserting after section 2 the
6666 38following 6 sections:-
6767 39 Section 2A. At least once annually, every criminal intelligence system shall conduct an
6868 40internal audit and publish a report based on the results. This audit shall include:
6969 41 (i) for each database that contains personal data: (1) the number of authorized users; (2)
7070 42each user’s level of access; (3) the quantity of data accessed by each user on a weekly basis; (4)
7171 43the number of transactions performed of each specified transaction type for each unique user and
7272 44access location; (5) the quantity of data collected and maintained from each unique source; and
7373 45(6) the frequency of use in an investigation of data from each source;
7474 46 (ii) the numbers of investigations authorized and denied under paragraph (4) of
7575 47subsection (b) of section 2C, and the dates of initiation and closure for each of these
7676 48investigations;
7777 49 (iii) the number of investigations authorized under said paragraph (4) of said subsection
7878 50(b) that remain open, the date of initiation of the investigation for each open investigation, the
7979 51length of time the investigation has remained open and a justification for continued collection or
8080 52maintenance of protected information; 4 of 7
8181 53 (iv) the number of investigations authorized under said paragraph (4) of said subsection
8282 54(b) that have led to indictments or prosecutions, and the names and docket numbers of resulting
8383 55court proceedings; and
8484 56 (v) the number of authorized disseminations under paragraph (3) of said subsection (b),
8585 57and to which entity each dissemination was made.
8686 58 Section 2B. Every criminal intelligence system shall provide assistance and unrestricted
8787 59access to the office of the inspector general, who shall submit to the clerks of the house of
8888 60representatives and the senate, the house and senate committees on post audit and oversight, and
8989 61the joint committee on public safety and homeland security a report every 2 years on the
9090 62compliance of criminal intelligence systems with section 2C. The report shall include
9191 63recommendations for corrective action and shall be a public record.
9292 64 Section 2C. (a) No state or local law enforcement agency, as defined in section 1 of
9393 65chapter 6E, prosecutorial office, criminal intelligence system, as defined in section 1, police or
9494 66peace officer or agent thereof shall track, collect, maintain or disseminate protected information,
9595 67unless such information directly relates to an investigation of criminal activities, and there are
9696 68reasonable grounds to suspect the subject of the information is involved in criminal conduct.
9797 69 (b) (1) No protected information obtained in violation of any applicable federal, state or
9898 70local law, ordinance or regulation shall be knowingly accessed, received, maintained or
9999 71disseminated.
100100 72 (2) All protected information shall be evaluated for the reliability of its source and the
101101 73accuracy of its content prior to being included in any investigation file, whether temporary,
102102 74interim or permanent in nature. 5 of 7
103103 75 (3) Protected information shall be disseminated only to law enforcement agencies,
104104 76contingent upon review and prior written authorization by the head of the originating law
105105 77enforcement agency or criminal intelligence system. The originating law enforcement agency
106106 78shall maintain a record of any such written authorization, specifying the reasons the
107107 79dissemination is necessary, for a minimum of 5 years. The originating entity shall record each
108108 80instance of dissemination in a log containing: (i) the method of dissemination; (ii) the name of
109109 81the subject; (iii) the name of the entity with whom the information was shared; and (iv) the date
110110 82of dissemination.
111111 83 (4) All investigations undertaken on the basis of any protected information shall first be
112112 84authorized in writing by the head of the investigating law enforcement agency or criminal
113113 85intelligence system. A record of any such written authorization, specifying the reasons for such
114114 86investigation, shall be maintained in the corresponding investigation file for a minimum of 5
115115 87years.
116116 88 (5) A law enforcement agency or criminal intelligence system shall review all
117117 89information included in its investigation files at least once every 5 years, and shall destroy any
118118 90information that is not reliable, accurate, relevant and timely; provided, that any documents
119119 91related to the authorization for and termination of investigations based in whole or in part on
120120 92protected information collected under this section, and any authorization to disseminate such
121121 93protected information, shall be retained. Information retained in an investigation file after a
122122 94review shall be accompanied by the following documentation: the name of the reviewer, the date
123123 95of review and an explanation of the decision to retain the information. 6 of 7
124124 96 (6) Any violation of this section constitutes an injury and any person may institute
125125 97proceedings for injunctive relief, declaratory relief or writ of mandamus in the superior court. An
126126 98action instituted under this paragraph may be brought against any agency with possession,
127127 99custody or control of personal data, and any person whose data is included in the violation may
128128 100institute proceedings and shall be entitled to recover actual damages not exceeding $2,000 or
129129 101$200 per day for each day of violation, whichever is greater. A court shall award costs and
130130 102reasonable attorneys’ fees to the plaintiff who is the prevailing party in an action brought under
131131 103this paragraph. Violations of this section by a government employee shall result in consequences
132132 104that may include retraining, suspension or termination, in accordance with any memorandums of
133133 105understanding with employee bargaining units.
134134 106 Section 2D. The executive office of public safety and security shall engage an
135135 107independent auditor to select and audit a random sample of the suspicious activity reports held
136136 108by the Boston Regional Intelligence Center, the commonwealth fusion center and the New
137137 109England State Police Information Network, relating to current or former residents of the
138138 110commonwealth. If the auditor finds any of these suspicious activity reports to lack indicia of
139139 111reasonable suspicion of a crime as outlined in 28 CFR part 23.20, the department of state police
140140 112shall suspend cooperation with the entity that produced the report until such time as all records
141141 113held by these agencies pertaining to Massachusetts residents have been reviewed for compliance
142142 114with 28 CFR part 23.20, and such records purged from these agencies’ systems if noncompliant.
143143 115 Section 2E. (a) The commonwealth fusion center shall publish the names of the members
144144 116of its privacy oversight committee. The meetings of the privacy oversight committee shall take
145145 117place at least quarterly, and shall be open to the public. 7 of 7
146146 118 (b) For entities retaining criminal intelligence information, training manuals related to the
147147 119handling of personal data shall be available to the public.
148148 120 Section 2F. Personal data held in a criminal intelligence system shall not be exempt from
149149 121disclosure to the individual concerned, or to their attorney or their heirs, by reason of being held
150150 122in a criminal intelligence system; provided, that disclosure is otherwise proper.
151151 123 Section 2G. After notice and opportunity for a hearing, the office of the inspector general
152152 124may impose a monetary penalty on any person or group found to be in violation of any of the
153153 125provisions of sections two A to two F, inclusive, or of any rules or regulations promulgated
154154 126thereunder. The monetary penalty shall not exceed five hundred dollars for each act or violation.
155155 127The amount of any such monetary penalty shall be paid to the inspector general for general use.
156156 128 SECTION 6. After notice and opportunity for a hearing, the office of the inspector
157157 129general may impose a monetary penalty on any person or group found to be in violation of any of
158158 130the provisions of SECTION 5, inclusive, or of any rules or regulations promulgated thereunder.
159159 131The monetary penalty shall not exceed five hundred dollars for each act or violation. The amount
160160 132of any such monetary penalty shall be paid into the general fund.