BILL ANALYSIS SB 30 Page 1 Date of Hearing: June 19, 2007 ASSEMBLY COMMITTEE ON JUDICIARY Dave Jones, Chair SB 30 (Simitian) - As Amended: June 12, 2007 SENATE VOTE : 33-3 SUBJECT : IDENTIFY INFORMATION PROTECTION ACT OF 2007 KEY ISSUES : 1)Should the legislature enact interim measures to address the privacy and security issues raised by the increasing use of so-Called "RFID" devices in government-issued identification cards? 2)should the california research bureau conduct a study relating to RFID privacy and security issues, for the purpose OF providing informatIon that will guide the legislature in enacting PERMANENT MEASURES to replace the interim measures created by this bill? SYNOPSIS This bill is one of several by this author that seek to regulate the use of radio frequency identification devices (RFID) and other technologies that permit the remote reading of data stored on government-issued identification cards. This bill is quite similar to last year's SB 768, by the same author, insofar as it calls for interim security measures for government-issued RFID devices until such time as the Legislature enacts permanent measures based on a required study and report to be provided by the California Research Bureau. However, last year's bill also included criminal provisions making it unlawful for a person to "skim" or attempt to obtain information from an RFID card without the cardholder's knowledge or consent. This criminal provision has been removed from SB 30 and now exists as a stand alone bill SB 31, which will not likely be heard by this Committee. Last year's SB 768 was the result of extensive deliberations between the author, various privacy and consumer groups, and representatives from the technology industry, including businesses that develop, manufacture, or sell remote reading technology. Although the two sides apparently reached an accord of some sort and SB 768 passed both houses of the SB 30 Page 2 Legislature, it was vetoed by the Governor. It is not clear how, if at all, this year's SB 30 will address the Governor's concerns. The author and supporters contend that this bill is necessary to protect Californians from the serious privacy and security risks associated with RFID technology, especially in light of the fact that RFID devices can transmit personal information without the knowledge or consent of the device holder. Opponents contend that the bill is unnecessary, that there have been no real life cases linking RFID to identity theft, and that the author and supporters misrepresent the capabilities (and therefore the alleged risks) of RFID technology. In addition, the opponents claim that some of the specific provisions of this bill may unintentionally undermine safety and security. The interim measures proposed by this bill would sunset in 2012. In the meantime, the bill calls upon the California Research Bureau to conduct a study on RFID privacy and security issues and make a report to the Legislature no later than June 30, 2008. It is the intent of this bill that the Legislature will then enact permanent security measures based in part on that report in as timely a manner as possible. SUMMARY : Enacts the Identity Information Protection Act of 2007 to (1) establish interim privacy and security protections to apply to remotely readable identifications (IDs) created, mandated, purchased, or issued by government entities, until subsequent legislation or regulations are enacted, (2) require the California Research Bureau to submit a report to the Legislature on security and privacy for government-issued, remotely readable IDs on or before June 30, 2008, and (3) specify that it is the intent of the Legislature that the interim measures contained in the Act be replaced with permanent legislation or regulations in the most timely and expeditious fashion possible following the issuance of the California Research Bureau's report. Specifically, this bill : 1)Requires, generally, that a government entity that issues identification documents (IDs) that use radio waves to transmit data or enable data to be read remotely must implement certain security measures, depending for the most part upon the nature of information that is stored on, or transmitted by, the ID. Provides that ALL such IDs must at minimum incorporate tamper-resistant features and implement an authentication process. 2)Provides that if personal information, as defined, is SB 30 Page 3 transmitted remotely from the ID, the issuing entity must ensure all of the additional security features: (a) the ID and authorized readers must use a "mutual authentication process;" (b) the ID must make the information unreadable and unusable by an unauthorized reader through means of encryption or some other means that renders the information indecipherable; (c) the ID must implement an access control protocol that enables the holder to exercise direct control over the transmission of the data, not including a detachable shield device. 3)Provides that if a unique personal identifier is used to provide an individual with more than one type of application or service, then the issuing entity shall do one or more of the following, commensurate with the sensitivity of the application: (a) implement a secondary verification and identification procedure that does not use radio waves, including manual entry of a number on a keypad; (b) implement a mutual authentication process; (c) use encryption or some related security measure that makes the information unreadable and unusable; (d) implement an access control protocol that gives the holder direct control over the information, not including a detachable shield device. Specifies further one or more of these requirements must be met for certain remotely readable IDs issued by public schools, for purposes of accessing transit services, or issued to members of the public pursuant to Section 6552 of the Government Code, as specified. 4)Requires the issuing entity to make specified disclosures about the nature of the capability of the ID and its content, about countermeasures that the holder can take to control the transmission of information on the ID, and the location of authorized readers of the IDs. 5)Exempts from the security and disclosures requirements of this bill certain uses of remotely readable IDs, including systems implemented prior to January 1, 2008, or for which there is a contract or publicly issued proposal prior to September 30, 2007. Further exempts IDs issued in jails, prisons, or other detention facilities; IDs issued to law enforcement or emergency response personnel, subject to certain conditions; ID issued to specified persons or patients in certain institutions, including government-owned or operated medical facilities, if certain conditions are met; IDs issued for patients or personnel in various medical emergency contexts; SB 30 Page 4 and IDs that are issued for the limited purpose of accessing a secured public building or parking structure, so long as certain disclosure requirements are met. 6)Provides that government entities that issue remotely readable IDs in compliance with this bill shall not disclose operational key systems to other entities or third parties and shall take reasonable measures to keep operational key systems secure. 7)Provides that a government entity that issues a remotely readable ID in compliance with this bill shall not disclose information regarding the location of a person, derived from the use of radio waves, unless the disclosure is made pursuant to an exigent circumstance, and certain verification steps are taken, or the disclosure is required pursuant to a search warrant. 8)Provides that, where a government entity violates the provisions of this bill, an interested person may institute proceedings for injunctive or declaratory relief or other performance writ, but only after providing prior written notice of the violation and allowing 30 days for the entity to cure the violation. Further provides that a party bringing an action may be entitled to fees and costs, and also specifies that this provision does not preclude other legal remedies available in law or equity. 9)Requires the California Research Bureau to assemble an advisory committee and submit a report to the Legislature, no later than June 30, 2008, related to security and privacy issues related to the use of remotely readable government IDs. EXISTING LAW : 1)Provides that all people in this state have an inalienable, constitutional right to privacy. (Cal. Const., Art I, Sec. 1.) Protects people against significant intrusions upon their fundamental privacy and autonomy interests, except where the intrusion is "necessary to further a 'compelling'--i.e., an extremely important and vital--state interest," and where a feasible and effective alternative does not exist that would have a lesser impact on privacy interests. ( Acad. of Pediatrics v. Lungren , (1997) 16 Cal. 4th 307, 330, 341.) SB 30 Page 5 2)Precludes a state agency, under the Information Practices Act, from disclosing personal information it possesses "in a manner that would link the information disclosed to the individual to whom it pertains," except in specified circumstances. (Civ. Code Section 1798.24.) An agency is subject to a civil suit if it does not comply with these standards and a person suffers an adverse effect. (Civ. Code Section 1798.45.) FISCAL EFFECT : As currently in print this bill is keyed fiscal COMMENTS : This bill is one of several by this author that seek to regulate the use of radio frequency identification devices (RFID) and other technologies that permit the remote reading of data stored on government-issued identification cards. This bill is quite similar to the author's SB 768, of last year, insofar as it calls for interim security measures for government-issued RFID devices until such time as the Legislature enacts permanent measures based on a required study and report to be provided by the California Research Bureau. In general the bill does three things: (1) establishes interim privacy and security protections to apply to remotely readable identifications (IDs) created, mandated, purchased, or issued by government entities, until subsequent legislation or regulations are enacted, (2) requires the California Research Bureau to submit a report to the Legislature on security and privacy for government-issued, remotely readable IDs on or before June 30, 2008, and (3) specifies that it is the intent of the Legislature that the interim measures contained in this bill be replaced with permanent measures in the most timely and expeditious fashion possible following the issuance of the California Research Bureau's report. The specific security provisions, which are detailed above, essentially create three different levels of security protection depending upon the kind of information that is contained on the card and, to a lesser extent, depending on how the card will be used. First , all cards, including those without "personal information," will be required, at the very least, to use some tamper resistant feature to prevent duplication, forgery, or cloning, and to employ some form of authentication, which ensures that the reader is permitted to read the information on the ID. Second , for documents that contain "personal information" (which is defined to include name, address, social security number, etc.), the card must employ additional higher SB 30 Page 6 standards, including encryption, access control protocols, and "mutual authentication" (a means by which card and reader can essentially verify each other). Third , for cards that contain only a "unique personal identifier" (a randomly assigned string of numbers that, despite the name, identifies the document, not the individual) but is used for more than one purpose (e.g. a university student ID card used at the library and the cafeteria) must implement a system of secondary verification (such as manual entry into a keypad) or employ one or more of the measures required for the other two categories. Background: What is RFID and How Does it Work ? Despite the jargon-laden language sometimes used by both proponents and opponents, the basic outline of how RFID and related technologies works is fairly easy to understand. RFID "tags" can be embedded into objects, including documents, clothing, and even people. The tag typically consists of a microchip (that stores information) and one or more antennae. Remote "readers" can read this tag, via radio waves. The reader constantly emits radio signals. As a person or object with an RFID tag moves near the reader - the distance varies depending upon the device - the antennae pick up the signal and transmit the information stored on the microchip to the reader. Most RFID tags are "passive," which means that they can only be activated by the radio signal; others are "active," which means that they can actively search out readers in the area. In either case, an authorized reader can then transmit this information to a computer database. The distinction between "passive" and "active" tags is important because, despite some claims to the contrary, a passive tag cannot "broadcast" any information, personal or otherwise. In some ways, RFID technology is merely a higher-tech version of bar code and magnetic strip scanning. However, scanning requires direct contact between the scanner and the stored information (or at least the magnetic strip or barcode must be in the direct line of sight of a laser). RFID readers, on the other hand, can read the information stored on the RFID tag remotely. With existing technology, the reader's capacity may only be about an inch or several feet. Experts disagree on the potential range of RFID readers in the future. But most agree that the current technology typically only works at ranges of a few inches, though some devices may have ranges up to thirty feet. However, the fact that RFID tags can be read at any distance creates the possibility that information stored on an SB 30 Page 7 identification document can be read without the holder's knowledge or consent. A key issue that divides experts on both sides of the debate, however, concerns the nature of the information stored on the RFID tag, and the usefulness of that information to any unauthorized reader. Sometimes an RFID tag only contains a random number that has no meaning until the reader transmits it to a computer database, where the random number is then matched to other information. However, RFID tags apparently can contain other information, such as a name, address, a credit card number, or even a visual image. Experts on both sides of the debate disagree about the value of "encryption" or other security measures that make stored information intelligible only to authorized readers. Moreover, privacy advocates point out that security measures must address more than the ability of the reader to access intelligible information from the tag; they must also address potential security breaches along the entire transmission process from tag, to reader, to computer database. Proponents of RFID, on the other hand, claim that RFID applications are confined to a closed system of authorized tags, readers, and databases within that system. So that even if outsiders with remote readers obtained information from an RFID tag, that information is only intelligible to persons within the system. (The above summary of RFID technology, and the contours of the debate of privacy and security issues, is based, in part, on a host of documents representing the opinions of privacy rights and consumer groups, industry representatives, and government agencies. See for example www.privacyrights.org/are/RFIDposition.htm .) ARGUMENTS IN SUPPORT : According to the author, this bill is needed because "RFID-enabled IDs can be, and have been, easily compromised." In support of this contention, the author cites various news reports and three federal studies - one by the Department of Homeland Security (DHS) and two by the Governmental Accountability Office (GAO). These studies raised questions about both the effectiveness of RFID for purposes of human identification and the privacy and security implications of the widespread use of RFID. A 2005 study conducted by the Governmental Accountability Office (GAO), as the author summarizes it, "found multiple problems with the technology, including significant privacy and security implications, as well as numerous operational issues (false readings, unreadable tags) and potentially harmful environmental impact (e-waste)." (See SB 30 Page 8 Department of Homeland Security, Data Privacy and Integrity Advisory Committee, The Use of RFID for Human Identity Verification, Report No. 2006-02, December 6, 2006; and GAO Study 05-551, May 2005; and GAO Study 07-248, December 2006.) The author claims that "Government isn't alone in questioning security of RFID" and that "key actors in the technology sector recognize the privacy challenge RFID presents." In support of this bill and the others before this Committee, the author has submitted other reports, news stories, and anecdotal accounts that are supposed to demonstrate the risks and dangers of RFID technology. According to the author, RFID is an especially egregious form of identification document because it "broadcasts personal information" without the knowledge or consent of the cardholder. As noted below by the opponents, not all RFID have the capacity to "broadcast" information (most are passive) and most only transmit "personal information" if you include the random string of numbers that, according to the definitional section of this bill, only identify the identification document, not the individual card holder. Nonetheless the author and supporters contend that RFID, like most technologies, is ever evolving and expanding its capabilities. As would-be identity thieves hone their ability to construct make-shift "readers," any information "skimmed" from an RFID chip could potentially facilitate identity theft or work invasion of privacy. The author points out that, despite these risks, there is no existing law that regulates the use of RFID technology or the kinds of information that can be placed on an RFID-enabled identification device. This bill, according to the author, will fill that statutory void - both in the short term by creating interim measures and, in the long term, by creating permanent standards based on the CRB study, if appropriate. According to the ACLU, "data and identity theft are already rampant and the problems are getting worse." The uncontrolled and unregulated use of RFID technology, the ACLU believes, will only make this problem worse still. The ACLU, citing the 2005 GAO report (see above) claims that some of the key privacy issues raised by RFID include the need to notify individuals of the use or existence of the technology; the problem of tracking human movements and profiling individual habits; and the possible secondary uses of data skimmed from an RFID device. ACLU, therefore, supports this bill because it will create necessary interim measures that will protect the privacy and SB 30 Page 9 safety of Californians. A number of privacy rights groups and consumer groups support this bill for the essentially the same reasons as the ACLU, pointing again to the same GAO and DHS reports and suggesting at least the potential for abuse. ARGUMENTS IN OPPOSITION : This bill is opposed by a number of retail, banking, and business associations, as well as various companies that manufacture RFID and related technologies. Their opposition to this particular bill must be placed in the context of their opposition to the several pending bills attempting to prohibit, limit, or regulate the use of RFID technologies. To all of these bills, they raise at least three core objections. First, opponents contend that these bills are largely unnecessary because, to date, there is no evidence that RFID technology has been linked to any particular case of identity theft. They claim that the supporters of this bill point to the same few reports, and the few instances that they point to are not real life examples, but staged, unrealistic, controlled experiments. Second , opponents claim that authors and proponents of these bills misrepresent the capabilities of RFID and thereby exaggerate the risks associated with its use. For example, they point to the fact that the authors and proponents routinely claim that RFID technology "broadcasts personal information," even though most RFID technologies contain only "passive" chips that do not "broadcast" anything and can only be activated by a reader. Moreover, they point out that the vast majority of RFID devices contain only a random number, not "personal information" as usually defined. Furthermore, because the range of most RFID readers is limited to a few inches, RFID is virtually useless for "tracking" human beings. Third , opponents stress that "not all 'RFID' is the same." There are vast differences - and vastly different security implications - between "passive" cards and "active" cards, between "smart cards" and "proximity cards," and between cards that truly contain "personal information" and those that contain only a random number. Most importantly, they argue, there is a vast difference between what can done with existing technology and what proponents claim might conceivably could be done in the future. Beyond these general arguments, the opponents raise a number of more specific objections to this bill: Potential Security Threats : Opponents claim that far from protecting our security, some of the specific provisions of this SB 30 Page 10 bill may actually jeopardize security. By requiring government entities to disclose the location of all readers (proposed Section 1798.10(a)(9)), this bill, the opponents claim, will provide helpful information to criminals and terrorists, since disclosing locations with readers is also disclosing locations without readers, and hence without access security. "Exigent Circumstances" Requirements Excessive : Opponents also suggest that the "exigent circumstances" exemption is too burdensome. That is, proposed Section 1798.12(a) provides that a government entity shall not disclose any data or information regarding the location of a person using RFID technology unless there are exigent circumstances or disclosure is required by a search warrant. However, the bill qualifies the "exigent circumstances" exception by requiring that the issuing agency to first obtain from the person requesting the information (most likely an emergency medical responder) assurances that there is an immediate danger of death or serious bodily harm. The agency must also request various pieces of information, including the requester's name and title, the location and phone number of the office from which he or she works, and the name of that person's supervisor who has "ultimate operational responsibility" (a term that is not defined). After obtaining this information, the issuing entity then must contact the requester's supervisor in order to verify that the exigent circumstance exists. Opponents claim that this is an unrealistic requirement if a human life were truly in immediate threat of death or serious bodily injury. RELATED PENDING LEGISLATION : SB 28 (Simitian): Prohibits, until January 1, 2011, the Department of Motor Vehicles (DMV) from issuing, renewing, duplicating, or replacing a driver's license or identification card, if the license or card uses radio waves to either transmit personal information remotely or to enable personal information to be read from the license or card remotely. SB 29 (Simitian): Prohibits, until January 1, 2011, a public school, school district, and county office of education from issuing any device that uses radio waves to transmit personal information, as defined, or to enable personal information to be viewed remotely for the purposes of recording the attendance of a pupil at school, establishing or tracking the location of a pupil on school grounds, or both. SB 30 Page 11 SB 362 (Simitian): Provides that no person shall require, coerce, or compel another person to undergo a subcutaneous implantation of identification device that transmits personal information, and provides for corresponding penalties and causes of actions. SB 388 (Corbett): Requires any private entity that sells, furnishes, or otherwise issues a card or other item containing a radio frequency identification tag to make certain disclosures to the recipient cardholder. REGISTERED SUPPORT / OPPOSITION : Support ACLU (co-sponsor) Electronic Frontier Foundation (co-sponsor) Privacy Rights Clearing House (co-sponsor) ACLU of San Diego AARP Asian Americans for Civil Rights and Equality California Commission on the Status of Women California Federation of Teachers Consumer Federation of America California Immigrant Policy Center California Labor Federation Consumer Action Consumer Federation of California Consumers Union Eagle Forum of California Electronic Frontier Foundation Gun Owners of California Howard Jarvis Taxpayers Association National Council of La Raza Privacy Activism Privacy Rights Clearinghouse Protection and Advocacy, Inc. (PAI) State Building and Construction Trades Council Opposition HID Global Hi-Tech Trust Coalition: 3M AeA (American Electronics SB 30 Page 12 Association) ActivIdentity AIM Global Alvaka Networks Aubrey Group, Inc. American Express California Bankers Association California Business Properties Association California Chamber of Commerce California Financial Services Association California Retailers Association EDS Elpac Electronics, Inc. Grocery Manufacturers Association InCom Corp. Infineon Technologies North America Corp. Information Technology Association of America (ITAA) MAXIMUS Motorola Matheson Tri-Gas National Semiconductor Natoma Technologies, Inc. NXP Oberthur Card Systems Oracle Corporation Precision Dynamics Retail Industry Leaders Association San Jose Silicon Valley Chamber of Commerce SAS Secura Key SIA (Semiconductor Industry Association) Sonnet Technologies, Inc. Texas Instruments VEDC, Inc. Zebra Technologies Analysis Prepared by : Thomas Clark / JUD. / (916) 319-2334