SB 741, as amended, Hill. Mobile communications: privacy.
Existing law makes it a crime to manufacture, assemble, sell, advertise for sale, possess, transport, import, or furnish to another a device that is primarily or exclusively designed or intended for eavesdropping upon the communication of another, or any device that is primarily or exclusively designed or intended for the unauthorized interception of reception of communications between a cellular radio telephone, as defined, and a landline telephone or other cellular radio telephone. Existing law additionally makes it a crime to purchase, sell, offer to purchase or sell, or conspire to purchase or sell, any telephone calling pattern record or list, without the written consent of the subscriber, or to procure, obtain, attempt to obtain, or conspire to obtain, any calling pattern record or list through fraud or deceit. Existing law contains certain exemptions from these crimes for law enforcement agencies.
This bill would require every local agency that operates cellular communications interception technology, as defined, tobegin delete (1) ensure that information and data gathered through use of that technology is protected with reasonable operational, administrative, technical, and physical safeguards to ensure its confidentiality and integrity, (2) implement andend delete maintain reasonablebegin delete security procedures and practices in orderend deletebegin insert operational, administrative, technical, and physical safeguardsend insert to protect informationbegin delete and dataend delete gathered through use of the technology from unauthorized access, destruction, use,
modification, orbegin delete disclosure,end deletebegin insert
disclosureend insert andbegin delete (3)end delete implementbegin delete and maintainend delete a usage and privacy policy, as specified, to ensure that the collection, use, maintenance, sharing, and dissemination of informationbegin delete and dataend delete gathered through use of the technologybegin insert complies with applicable law andend insert is consistent with respect for an individual’s privacy and civil liberties. The bill would prohibit a local agency from acquiring or using cellular communications interception technology unless that acquisition or use is approved by a resolution or ordinance adopted by its legislature body at a regularly scheduled public meeting of the legislative body at which members
of the public are afforded a reasonable opportunity to comment. The bill would require that the resolution or ordinance set forth the policies of the localbegin delete agency as described above in (1), (2), and (3).end deletebegin insert agency.end insert The bill would require that the local agency make the usage and privacy policy available in writingbegin insert to the publicend insert and if the local agency maintains an Internet Web site, to conspicuously post the usage and privacy policies on that site. The bill would, in addition to any other sanctions, penalties, or remedies provided by law, authorize an individual who has been harmed by a violation of these provisions to bring a civil action in any court of competent jurisdiction against a person who knowingly caused
that violation.
Vote: majority. Appropriation: no. Fiscal committee: no. State-mandated local program: no.
The people of the State of California do enact as follows:
Article 11 (commencing with Section 53166) is
2added to Chapter 1 of Part 1 of Division 2 of Title 5 of the 3Government Code, to read:
4
(a) For purposes of this article, the following terms
8have the following meanings:
9(1) “Cellular communications interception technology” means
10any device that intercepts mobile telephony calling information
P3 1or content, including an international mobile subscriber identity
2catcher or other virtual base transceiver station that masquerades
3as a cellular station and logs mobile telephony calling information.
4(2) “Local agency” means any city, county, city and county,
5special district, authority, community redevelopment agency, or
6other political subdivision of the state, and includes every county
7sheriff and city
police department.
8(b) Every local agency that operates cellular communications
9interception technology shall dobegin delete allend deletebegin insert bothend insert of the following:
10(1) Ensure that information and data gathered through the use
11of cellular communications interception technology is protected
12with reasonable operational, administrative, technical, and physical
13safeguards to ensure its confidentiality and integrity.
14(2) Implement and maintain
end delete
15begin insert(1)end insertbegin insert end insertbegin insertMaintainend insert reasonable security procedures andbegin delete practices in begin insert practices, including operational, administrative, technical,
16orderend delete
17and physical safeguards,end insert to protect informationbegin delete and dataend delete gathered
18through the use of cellular communications interception technology
19from unauthorized access, destruction, use, modification, or
20disclosure.
21(3)
end delete
22begin insert(2)end insert Implementbegin delete and maintainend delete a usage and privacy policybegin delete in orderend delete
23 to ensure that the collection, use, maintenance, sharing, and
24dissemination of informationbegin delete and dataend delete gathered through the use of
25cellular communications interception technologybegin insert complies with
26all applicable law andend insert is consistent with respect for an individual’s
27privacy and civil liberties. This usage and privacy policy shall be
28available inbegin delete writing,end deletebegin insert
writing to the public,end insert and, if the local agency
29has an Internet Web site, the usage and privacy policy shall be
30posted conspicuously on that Internet Web site. The usage and
31privacy policy shall, at a minimum, include all of the following:
32(A) The authorized purposes for using cellular communications
33interception technology and for collecting informationbegin delete or dataend delete
34 using that technology.
35(B) A description of thebegin insert job title or other designation of theend insert
36 employees who are authorized to use, or access informationbegin delete or
collected through the use of, cellular communications
37dataend delete
38interception technology. The policy shall identify the training
39requirements necessary for those authorized employees.
P4 1(C) A description of how thebegin insert local agency will monitor its ownend insert
2 use of cellular communications interception technologybegin delete will be to ensurebegin insert the accuracy of the information collected andend insert
3monitoredend delete
4 compliance with all applicablebegin delete privacy laws and a process for begin insert
laws, including laws providing for process and time periodend insert
5periodicend delete
6 system audits.
7(D) A description of reasonable measures that will be used to
8ensure the accuracy of information or data gathered through the
9use of cellular communications
interception technology and a
10process to correct errors.
11(E) A description of how the local agency will comply with the
12security procedures and practices implemented and maintained
13pursuant to paragraph (2).
14(D) The existence of a memorandum of understanding or other
15agreement with another local agency or any other party for the
16shared use of cellular communications interception technology or
17the sharing of information collected through its use, including the
18identity of signatory parties.
19(E) The purpose of, process for, and restrictions on, the sharing
20of information gathered through the use of cellular communications
21interception technology with other local agencies and persons.
22(F) The length of time informationbegin delete or dataend delete gathered through the
23use of cellular communications interception technology will be
24begin delete stored orend delete retained, and the process the local agency will utilize to
25determine if and when to destroybegin delete stored orend delete retainedbegin delete information begin insert
information.end insert
26or data.end delete
27(G) The official custodian, or owner, of information or data
28gathered through the use of cellular communications interception
29technology and which employees have the responsibility and
30accountability for implementing this subdivision.
31(H) The purpose of, and process for, sharing or disseminating
32information or data gathered through the use of cellular
33communications interception technology with other persons. The
34policy shall also
identify how the use or further sharing or
35dissemination of that information or data will be restricted in order
36to ensure respect for an individual’s privacy and civil liberties.
37(c) No local agency may acquire or use cellular communications
38interception technology unless approved by its legislative body by
39begin delete adoptionend deletebegin insert adoption, at a regularly scheduled public meeting with
40an opportunity for public comment,end insert of a resolution or ordinance
P5 1authorizing that acquisition orbegin delete use.end deletebegin insert end insertbegin insertuse
and the usage and privacy
2policy required by this section.end insert
3(d) The legislative body of a local agency shall not approve a
4resolution or ordinance authorizing the acquisition or use of cellular
5communications interception technology, unless the resolution or
6ordinance is adopted at a regularly scheduled public meeting of
7the legislative body at which members of the public are afforded
8a reasonable opportunity to comment upon the proposed resolution
9or ordinance. The resolution or ordinance shall set forth the policies
10of the local agency as required by paragraph (3) of subdivision
11(b).
12(e)
end delete
13begin insert(d)end insert In addition to any other sanctions, penalties, or remedies
14provided by law, an individual who has been harmed by a violation
15of this section may bring a civil action in any court of competent
16
jurisdiction against a person who knowingly caused that violation.
17The court may award a combination of any one or more of the
18following:
19(1) Actual damages, but not less than liquidated damages in the
20amount of two thousand five hundred dollars ($2,500).
21(2) Punitive damages upon proof of willful or reckless disregard
22of the law.
23(3) Reasonable attorney’s fees and other litigation costs
24reasonably incurred.
25(4) Other preliminary and equitable relief as the court determines
26to be appropriate.
O
97