Skip to main content Skip to office menu Skip to footer
Minnesota Legislature

Office of the Revisor of Statutes

HF 2470

as introduced - 87th Legislature (2011 - 2012) Posted on 03/14/2012 04:44pm

KEY: stricken = removed, old language.
underscored = added, new language.

Bill Text Versions

Engrossments
Introduction Posted on 02/23/2012

Current Version - as introduced

Line numbers 1.1 1.2 1.3 1.5
1.6 1.7 1.8 1.9 1.10 1.11 1.12 1.13 1.14 1.15 1.16 1.17 1.18 1.19 1.20 1.21 1.22 1.23 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 2.9 2.10 2.11 2.12 2.13 2.14 2.15 2.16 2.17 2.18 2.19 2.20 2.21 2.22 2.23 2.24 2.25 2.26 2.27 2.28 2.29 2.30 2.31 2.32 2.33 2.34 2.35 2.36 3.1 3.2 3.3 3.4 3.5 3.6 3.7 3.8 3.9 3.10 3.11 3.12 3.13 3.14 3.15 3.16 3.17 3.18 3.19 3.20
3.21 3.22 3.23 3.24 3.25 3.26 3.27 3.28 3.29 3.30 3.31 3.32 3.33 3.34 3.35 4.1 4.2 4.3 4.4 4.5 4.6 4.7 4.8 4.9 4.10 4.11 4.12 4.13 4.14 4.15 4.16 4.17 4.18 4.19 4.20 4.21 4.22 4.23 4.24 4.25 4.26 4.27 4.28 4.29 4.30 4.31 4.32 4.33 4.34 4.35 4.36 5.1 5.2 5.3 5.4 5.5 5.6 5.7 5.8 5.9 5.10 5.11 5.12 5.13 5.14 5.15 5.16 5.17 5.18 5.19 5.20 5.21 5.22 5.23 5.24 5.25 5.26 5.27 5.28 5.29 5.30 5.31 5.32 5.33 5.34 5.35 6.1 6.2 6.3 6.4 6.5 6.6 6.7 6.8 6.9 6.10 6.11 6.12 6.13 6.14 6.15 6.16 6.17 6.18 6.19 6.20 6.21 6.22 6.23 6.24 6.25 6.26 6.27 6.28 6.29 6.30 6.31 6.32 6.33 6.34 6.35 6.36 7.1 7.2 7.3 7.4 7.5 7.6 7.7
7.8

A bill for an act
relating to public safety; classifying criminal intelligence data under the Data
Practices Act; establishing standards; proposing coding for new law in Minnesota Statutes, chapter 13.

BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF MINNESOTA:

Section 1.

new text begin [13.824] CRIMINAL INTELLIGENCE DATA.
new text end

new text begin Subdivision 1. new text end

new text begin Definitions. new text end

new text begin (a) The terms defined in this section have the meanings
given them.
new text end

new text begin (b) "Association data" means data that document the associations or activities of a
person and that are about that person's political, religious, or social views.
new text end

new text begin (c) "Criminal intelligence data" means data a law enforcement agency uses to
anticipate, prevent, or monitor possible criminal or terrorist activity by a person. Criminal
intelligence data does not include association data unless the association data have a direct
relationship to criminal or terrorist activities by a person.
new text end

new text begin (d) "Criminal intelligence data assessment" means an analysis based on criminal
intelligence data.
new text end

new text begin (e) "Criminal predicate" means sufficient, articulable facts, along with rational
inferences from those facts, to give employees working under the supervision of a law
enforcement agency a basis to believe that there is a reasonable possibility that a person is
involved in criminal or terrorist activity.
new text end

new text begin (f) "Critical infrastructure" means physical or virtual assets that, when incapacitated
or destroyed, would have a debilitating impact on the physical or economic security,
public health, or public safety of the citizens of the state.
new text end

new text begin (g) "Law enforcement agency" means a government agency at the federal, state, or
local level, including agencies in other states, that are charged with detecting criminal
activity, enforcing criminal laws, or protecting critical infrastructure.
new text end

new text begin (h) "Terrorist activity" means acts dangerous to human life that violate the criminal
laws of this state or the United States and appear to be intended to:
new text end

new text begin (1) intimidate or coerce the civilian population;
new text end

new text begin (2) influence the policy of the state by intimidation or coercion; or
new text end

new text begin (3) affect the state by mass destruction, assassination, or kidnapping.
new text end

new text begin (i) "Threat of imminent serious harm" means a credible impending threat to the
safety of a person, government entity, or property.
new text end

new text begin Subd. 2. new text end

new text begin Data classification and retention. new text end

new text begin (a) Criminal intelligence data are
classified as confidential data on individuals or protected nonpublic data for a period of
one year. After one year, the data classification changes to private data on individuals or
nonpublic data unless the following criteria are met:
new text end

new text begin (1) the source of the data is reliable and verifiable;
new text end

new text begin (2) the person alleged to be involved in criminal activity can be identified;
new text end

new text begin (3) the allegations of criminal activity are supported by a criminal predicate;
new text end

new text begin (4) the data were collected in a lawful manner; and
new text end

new text begin (5) the data are accurate and current.
new text end

new text begin If the criteria are met, the data remain classified as confidential data on individuals
or protected nonpublic data.
new text end

new text begin (b) The informed consent of the subject of the data is not effective if the data are
classified as private data on individuals or nonpublic data.
new text end

new text begin (c) Notwithstanding any other law to the contrary, data that have changed
classification as required by paragraph (a) shall not be maintained by a government entity
for more than three years from the last date the classification changed.
new text end

new text begin (d) If, prior to the destruction required by paragraph (c), the criteria in paragraph (a)
can be met, the data classification reverts to confidential data on individuals or protected
nonpublic data.
new text end

new text begin (e) Criminal intelligence data assessments and dissemination records are classified
as confidential data on individuals or protected nonpublic data.
new text end

new text begin Subd. 3. new text end

new text begin Sharing authorized. new text end

new text begin (a) Criminal intelligence data may be shared with:
new text end

new text begin (1) a law enforcement agency, if the recipient demonstrates a criminal predicate
related to the data requested;
new text end

new text begin (2) a law enforcement agency to charge a person with a crime or allege that a
juvenile is delinquent;
new text end

new text begin (3) a person or government entity when the dissemination is needed to protect the
person, government entity, or property from the threat of imminent serious harm;
new text end

new text begin (4) a person or government entity to protect critical infrastructure;
new text end

new text begin (5) a law enforcement agency conducting the background check required by section
626.87; or
new text end

new text begin (6) the public to promote public health or safety or to dispel widespread rumor
or unrest.
new text end

new text begin (b) Criminal intelligence data assessments may be shared with:
new text end

new text begin (1) a law enforcement agency;
new text end

new text begin (2) a person or government entity when the dissemination is needed to protect the
person, government entity, or property from the threat of imminent serious harm;
new text end

new text begin (3) a person or government entity to protect critical infrastructure; or
new text end

new text begin (4) the public to promote public health or safety or to dispel widespread rumor
or unrest.
new text end

new text begin Subd. 4. new text end

new text begin Data prohibitions. new text end

new text begin (a) Unless there is a criminal predicate, a law
enforcement agency may not maintain or use criminal intelligence data.
new text end

new text begin (b) Association data may not be maintained by a Minnesota law enforcement agency
or shared with any law enforcement agency.
new text end

new text begin Subd. 5. new text end

new text begin Dissemination record. new text end

new text begin A law enforcement agency shall keep a
dissemination record of each sharing made under subdivision 3, paragraph (a).
new text end

Sec. 2.

new text begin [13.8735] CRIMINAL INTELLIGENCE SYSTEMS.
new text end

new text begin Subdivision 1. new text end

new text begin Definitions. new text end

new text begin (a) For purposes of this section, the terms in this
subdivision have the meanings given them.
new text end

new text begin (b) "Criminal intelligence data" means data that has been evaluated to determine
that it:
new text end

new text begin (1) is relevant to the identification of and the criminal activity engaged in by an
individual or organization reasonably suspected of involvement in criminal activity; and
new text end

new text begin (2) meets criminal intelligence system submission criteria.
new text end

new text begin (c) "Criminal intelligence system" or "intelligence system" means the arrangements,
equipment, facilities, and procedures used for the receipt, storage, interagency exchange
or dissemination, and analysis of criminal intelligence data.
new text end

new text begin (d) "Intelligence project" or "project" means the organizational unit that operates an
intelligence system on behalf of and for the benefit of a single agency or the organization
that operates an interjurisdictional intelligence system on behalf of a group of participating
agencies.
new text end

new text begin (e) "Interjurisdictional intelligence system" means an intelligence system that
involves two or more participating agencies representing different government entities
or jurisdictions.
new text end

new text begin (f) "Participating agency" means an agency of local, county, state, federal, or other
governmental unit that exercises law enforcement or criminal investigation authority
and which is authorized to submit and receive criminal intelligence data through an
interjurisdictional intelligence system. A participating agency may be a member or a
nonmember of an interjurisdictional intelligence system.
new text end

new text begin (g) "Validation of data" means the procedures governing the periodic review of
criminal intelligence data to assure its continuing compliance with system submission
criteria established by regulation or program policy.
new text end

new text begin Subd. 2. new text end

new text begin Operating principles. new text end

new text begin (a) A project shall collect and maintain criminal
intelligence data concerning an individual only if there is reasonable suspicion that the
individual is involved in criminal conduct or activity and the information is relevant to
that criminal conduct or activity.
new text end

new text begin (b) A project shall not collect or maintain criminal intelligence data about the
political, religious, or social views, associations, or activities of any individual or any
group, association, corporation, business, partnership, or other organization unless the data
directly relates to criminal conduct or activity and there is reasonable suspicion that the
data subject is or may be involved in criminal conduct or activity.
new text end

new text begin (c) Reasonable suspicion or criminal predicate is established when data exists that
establishes sufficient facts to give a trained law enforcement or criminal investigative
agency officer, investigator, or employee a basis to believe that there is a reasonable
possibility that an individual or organization is involved in a definable criminal activity
or enterprise. In an interjurisdictional intelligence system, the project is responsible for
establishing the existence of reasonable suspicion of criminal activity either through
examination of supporting data submitted by a participating agency or by delegation
of this responsibility to a properly trained participating agency that is subject to audit
procedures established by subdivision 4.
new text end

new text begin (d) A project shall not include in any criminal intelligence system data that has
been obtained in violation of any applicable federal, state, or local law or ordinance.
In an interjurisdictional intelligence system, the project is responsible for establishing
that no information is entered in violation of federal, state, or local laws, either through
examination of supporting information submitted by a participating agency or by
delegation of this responsibility to a properly trained participating agency which is subject
to routine inspection and audit procedures established by subdivision 4.
new text end

new text begin (e) A project shall disseminate criminal intelligence data only where there is a need
to know and a right to know the data in the performance of a law enforcement activity.
new text end

new text begin (f) A project shall disseminate criminal intelligence data only to law enforcement
authorities who shall agree to follow procedures regarding data receipt, maintenance,
security, and dissemination which are consistent with this section. This paragraph shall
not limit the dissemination of an assessment of criminal intelligence data to a government
official or to any other individual, when necessary, to avoid imminent danger to life or
property.
new text end

new text begin (g) A project maintaining criminal intelligence data shall adopt administrative,
technical, and physical safeguards, including audit trails, to prevent unauthorized access
and against intentional or unintentional damage. A record indicating who has been
given data, the reason for release of the data, and the date of each dissemination outside
the project shall be kept. Data shall be labeled to indicate levels of sensitivity, levels of
confidence, and the identity of submitting agencies and control officials. Each project
must establish written definitions for the "need to know" and "right to know" standards for
dissemination to other agencies as provided in paragraph (e). The project is responsible
for establishing the existence of an inquirer's need to know and right to know the data
being requested either through inquiry or by delegation of this responsibility to a properly
trained participating agency that is subject to routine inspection and audit procedures
established by the project.
new text end

new text begin (h) A project:
new text end

new text begin (1) where appropriate, must adopt effective and technologically advanced computer
software and hardware designs to prevent unauthorized access to the information
contained in the system;
new text end

new text begin (2) must restrict access to its facilities, operating environment, and documentation
to organizations and personnel authorized by the project;
new text end

new text begin (3) must store data in the system in a manner that prevents the data from being
modified, destroyed, accessed, or purged without authorization;
new text end

new text begin (4) must institute procedures to protect criminal intelligence data from unauthorized
access, theft, sabotage, fire, flood, or other natural or man-made disaster;
new text end

new text begin (5) must adopt rules based on good cause to implement its authority to screen,
reject for employment, transfer, or remove personnel authorized to have direct access
to the system; and
new text end

new text begin (6) may authorize and utilize off-site system databases to the extent that they comply
with these security requirements.
new text end

new text begin (i) All projects shall adopt procedures to ensure that all data retained by a project
has relevancy and importance. The procedures shall provide for the periodic review of
data and the destruction of any data that is misleading, obsolete, or otherwise unreliable,
and shall require that any recipient agencies be advised of any errors or corrections. All
data retained as a result of this review must identify the name of the reviewer, date of
review, and explanation of the decision to retain. Data retained in the system must be
reviewed and validated for continuing compliance with system submission criteria before
the expiration of its retention period, which in no event shall be longer than five years.
new text end

new text begin (j) A project must not purchase or use in the course of the project any electronic,
mechanical, or other device for surveillance purposes that is in violation of sections
626A.01 to 626A.381 and the Electronic Communications Privacy Act of 1986, Public
Law 99-508, United States Code, title 18, sections 2510-2520, 2701-2709, and 3121-3125.
new text end

new text begin (k) A project must not harass or interfere with any lawful political activities as
part of the intelligence operation.
new text end

new text begin (l) A project shall adopt sanctions for unauthorized access, utilization, or disclosure
of data contained in the system.
new text end

new text begin (m) A participating agency of an interjurisdictional intelligence system must
maintain in its agency files data that documents each submission to the system and
supports compliance with project entry criteria. Participating agency files supporting
system submissions must be made available for reasonable audit and inspection as
provided in subdivision 4.
new text end

new text begin Subd. 3. new text end

new text begin Supervision. new text end

new text begin The head of an agency, or an individual expressly delegated
control and supervision by the head of the agency, maintaining an interjurisdictional
criminal intelligence system shall:
new text end

new text begin (1) assume official responsibility and accountability for actions taken in the name of
the joint entity; and
new text end

new text begin (2) certify in writing that the official takes full responsibility and will be accountable
for insuring that the data transmitted to the interjurisdictional system or to participating
agencies will be in compliance with the principles in this chapter.
new text end

new text begin The principles in this section shall be included in bylaws or operating procedures for
each system. Each participating agency, as a condition of participation, must accept in
writing those principles which govern the submission, maintenance, and dissemination
of data included as part of an interjurisdictional system.
new text end

new text begin Subd. 4. new text end

new text begin Audit of data submitted to system; reports. new text end

new text begin At least once every three
years, the Bureau of Criminal Apprehension shall conduct periodic audits of criminal
intelligence systems and interjurisdictional criminal intelligence systems for compliance
with this section. The bureau shall have access to the documenting data for purposes
of conducting an audit. The bureau shall conduct the audit in a manner that protects
the confidentiality and sensitivity of participating agency intelligence records. By
October 1 of each year, the bureau shall submit a report on the results of the audits to the
commissioner of public safety.
new text end

new text begin Subd. 5. new text end

new text begin Classification of intelligence data. new text end

new text begin Criminal intelligence data is classified
as confidential data on individuals, or protected nonpublic data.
new text end

new text begin EFFECTIVE DATE. new text end

new text begin This section is effective August 1, 2012.
new text end