Colorado Needs Comprehensive Protection For Government Compelled Data

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Issue Backgrounder

13952 Denver West Parkway • Suite 400• Golden, Colorado 80401


www.IndependenceInstitute.org • 303-279-6536

Colorado Needs Comprehensive Protection


for Government Compelled Data
IB-2006-B • February 2006
By Mike Krause
Justice Policy Initiative
One by-product of advancing technology is the ing data on them than from the government doing
unprecedented ability to collect, analyze, use and so.
store information generated by the day-to-day lives
of people. On one hand, this information gathering Writer P.J. O’Rourke makes this point, “Wal-Mart,
ability is highly beneficial, creating new efficiencies while it may sell guns, it doesn’t have guns.”2 In
in, among other things, medicine, credit-granting, other words, the worst a corporation can do with
shipping and commerce, and even in government. your data is to try to sell you things. The state, on
the other hand, has a legal monopoly on the use of
The information age also has a downside. force, and the government’s ability
Advancing technology often helps along identity to track and monitor the lives of The state, on the
theft and fraud, creates new ways its citizenry might be used to crim- other hand, has a
to invade individual privacy, and inalize, or otherwise marginalize, legal monopoly on
Advancing technol-
new ways to abuse authority. those who live their lives in a way the use of force, and
ogy often helps along
unpopular with whoever happens the government’s
identity theft and
Most laws empowering citizens to hold power. ability to track and
fraud, creates new
with regard to information col- monitor the lives of
ways to invade indi-
lected about them concerns the In other words if information is its citizenry might be
vidual privacy, and
private sector. For instance as of power, then information gathered used to criminalize,
new ways to abuse
July 2006, thanks to legislation and used by government needs to or otherwise margin-
authority. signed by Governor Bill Owens1, be regulated.
alize, those who live
Coloradoans will have the right to
their lives in a way
“freeze” their credit reports. This law still allows— The obvious answer is less govern-
unpopular with who-
with the individuals permission—credit reports to ment data collection, but unfor-
ever happens to hold
be used for credit-granting purposes, but empowers tunately state compelled informa-
power.
individuals to deny would be identity thieves the tion gathering is only going to
ability to open credit in their names. increase (more on this later).

But many Coloradoans inherently understand that


they have less to fear from the private sector collect-

Page 1
The next best thing is comprehensive data privacy Outright Abuse
legislation that state government has to obey, and
which empowers citizens. In 2002, the Detroit Free Press uncovered at least
The next best thing is 90 instances of criminal misuse, by dispatchers,
comprehensive data There are numerous good reasons police officers, and federal agents, of Michigan’s
privacy legislation for such a law: Law Enforcement Information System (LEIN),
that state govern- a database that utilizes the FBI’s National Crime
ment has to obey, Piecemeal Protections Information Center, Michigan vehicle registration
and which empowers often Fall Short and driving records, and other databases.
citizens.
In 2001, the Colorado Legislature The LEIN abuse included doing favors for friends,
allowed the state’s Division of stalking women, digging up dirt on an ex-spouse’s
Motor Vehicles (DMV) to use biometric technology new husband, tipping off criminal
to map applicants’ faces for driver’s licenses, allow- suspects to ongoing investigations
ing access to the DMV database to “aid a federal, and, in one case, identifying own- The LEIN abuse
state or local government agency in carrying out ers of cars with bumper stickers included doing
such agency’s official function,”3 in other words, supporting a candidate for sheriff, favors for friends,
for any purpose whatsoever. The legislature later by a deputy of the incumbent sher- stalking women,
refined the face-mapping scheme, requiring “a rea- iff.7 digging up dirt on
sonable suspicion that a crime has been committed an ex-spouse’s new
or will be committed and a reasonable suspicion that Despite the fact that it is a mis- husband, tipping off
the image requested is either the perpetrator of such demeanor crime to misuse the criminal suspects to
a crime or the victim of such a crime.”4 system, of the over three dozen ongoing investiga-
police officers found to have tions and, in one
• A comprehensive data law presupposes that abused the system only three faced case, identifying
of course there needs to be a good reason to criminal prosecution. Vagaries
8
owners of cars with
tap such a database. in Michigan law differentiated bumper stickers sup-
between “official misuse” and porting a candidate
Misuse of Data “general misuse”. In other words, for sheriff, by a dep-
if a police officer abused the sys- uty of the incumbent
In 2003, it was discovered that some Colorado tem for personal reasons, or to sheriff.
Sheriffs were entering concealed carry gun permit help a fellow officer, it did not rise
holders (those Coloradoans who go out of their to a criminal offense. Only if the
way to abide by state law) into the Colorado Crime information was shared with a civilian did the misde-
Information Center (CCIC). 5 CCIC is a statewide meanor kick in.
database that is used by law enforcement to, among
other things, identify “people and property involved • A comprehensive data law would set clear
in crime; members of criminal gangs; stolen prop- penalties, even for “official” abuse of data.
erty; criminal suspects; criminal methods of opera-
tion.”6 Government Data Collection is a
Growth Industry
• A comprehensive data law would make such
data private, and require notification as to Data collection on Coloradoans as a matter of law is
how the data will be used, thus allowing citi- only going to grow, making comprehensive protec-
zens to know if complying with the law will tion all the more important.
make them criminal suspects.

Page 2
1. The federal ‘Real ID Act’ is scheduled to • A data protection law would allow a private
go into effect in 2008.9 Real ID federalizes right of action against government employees
state drivers’ license standards and issuance. who misuse such an intrusive database.
Among other things, the Act will require the
Colorado Division of Motor Vehicles to veri- Identity Theft/Fraud
fy, copy and store electronically all the breed-
er documents such as the birth certificate According to the 2005 Identity Fraud Survey Report,11
and social security card, required to prove jointly released by the Better Business Bureau and
such things as your address and citizenship, Javelin Strategy and Research, the third most com-
and makes its databases “interoperable” with mon way information is obtained for identity theft
other states. The Colorado Division of Motor and fraud is “Corrupt employee who had access to
Vehicles will be fundamentally changed from the info.”12 In addition, the fourth most likely per-
an agency that administers driver’s licenses son to misuse your personal information (13 percent
and vehicle registrations to a centralized of cases) is “Someone at a company w/access to per-
national identity registry. sonal information.”13

• A data protection law would put clear bound- The key to identity theft is the Social Security
aries on how such a registry can, and cannot, Number (SSN). State government widely collects
be used. and uses the SSN for numerous purposes never
intended.14 Some examples include:
2. In 2005, the Colorado Legislature created an
electronic prescription drug-monitoring pro- 1. Colorado Department of Revenue uses the
gram.10 The names of patients and the types SSN as a taxpayer identification number.
of controlled substances they are prescribed
and purchase will be collected in 2. Division of Motor Vehicles uses the SSN as
The prescription a centralized database searchable a “unique identifier” for driver’s license and
drug monitoring by a number of different fields. identification card issuance.
database is a huge The prescription drug monitoring
threat to medical database is a huge threat to medi- 3. The SSN is required to obtain a Colorado
privacy, as with the cal privacy, as with the knowledge hunting or fishing license.
knowledge of what of what prescription drugs an indi-
prescription drugs an vidual takes, the medical condition In other words, the information needed to commit
individual takes, the of that individual can easily be identity theft and fraud is readily available at numer-
extrapolated. ous state agencies, and to numer-
medical condition of
ous state employees. ...the information
that individual can
The legislature made unauthorized needed to commit
easily be extrapo-
releasing, obtaining or attempt- In 2004, a computer hacker identity theft and
lated.
ing to obtain information from accessed more than 1.4 mil- fraud is readily
the program a civil offense, with lion records containing, among available at numer-
any fines paid being deposited back into the other things, names, addresses, ous state agencies,
prescription drug monitoring fund. In other and SSNs, from a University of and to numerous
words, the legislature has created a hugely California at Berkeley computer.15 state employees.
intrusive monitoring program that will actu- The data had been transferred
ally profit from its own misuse. to the University for a research
study from the California Department of Health and
Human Services.

Page 3
• A data protection law would clearly define why permission or oversight, and in near secrecy.
and when SSNs are collected and used by gov-
ernment, require notification to citizens as to A detailed opinion on the legality of MJNO as it per-
how they will be stored and used, require the tains to the Minnesota Data Practices Act. Among
stripping of SSNs from research data, crimi- the findings:
nalize misuse of the SSN, and allow a private
right of action for violations against both gov- 1. MJNO was collecting and sharing informa-
ernment agencies and employees. tion, including gun permit records, which are
considered private under Minnesota law and
Third Party Data require notification to the applicant as to how
it will be used, “There is
In May 2005, the New Jersey Court of appeals ruled no authority from the legis- MJNO was collecting
that police must obtain a warrant to examine power lature for these data to be and sharing infor-
company records. The case stems transferred to a statewide mation, including
from the case of a suspected mari- database like MJNO wheth- gun permit records,
In May 2005, the
juana grower. New Jersey State er operated by government which are consid-
New Jersey Court of
Police used a subpoena to obtain or a private party”. ered private under
appeals ruled that
the electricity bills of a New Jersey Minnesota law and
police must obtain
man and some of his neighbors. 2. MJNO contained among require notification
a warrant to exam-
The records were then used to other things, “arrest, request to the applicant as to
ine power company
obtain a search warrant for the for service and response or how it will be used...
records.
man’s home. In its ruling, the incident data,” and accord-
Court of Appeals bluntly stated, ing to the analysis, “These
“The warrantless seizure of defendant’s electric bills are data elements that are always public. In
was illegal.” other words they cannot be classified as ‘active
criminal investigation data.’”
• A data protection law would limit “fishing
expeditions” by government using third party 3. The MCPA as a private entity has no author-
data such as utility and banking records. ity to classify anything as confidential, “As the
MCPA is not a law enforcement agency, it
A Data Law in Action cannot make the determination that data are
active criminal investigative data.”
The state of Minnesota has a comprehensive data
protection law, the “Minnesota Data Practices Act.”16 It was determined that the MJNO was illegal under
the “Data Practices Act”, and the program was shut
In 2003, it was discovered that the Minnesota Chiefs down.
of Police Association, (MCPA) a private organiza-
tion, was operating a database called the Multiple • A data protection law would require legislative
Jurisdiction Network Organization (MJNO). permission and oversight of creation and use
of databases containing data collected by gov-
The MCPA uploaded files from various police agen- ernment.
cies, including gun permit and juvenile records,
and a variety of police “contact” information.17 The
MCPA then classified the information as confidential
“criminal investigative data” and made the database
available back to law enforcement agencies through-
out the state. MJNO was created with no legislative

Page 4
Elements of a Data Protection Law18 Classifications of Data

What Does a Data Privacy Law do? Data on Meaning of Data not on
Individuals Classification Individuals
• Controls how government data are collected,
Public Available to any- Public*
created, stored, used, and released.
one for any reason

• Applies to state entities and all political sub- Private Available only to Nonpublic
divisions including counties, cities, school dis- the data subject
tricts, special districts, boards, commissions, and anyone autho-
and districts and authorities created by state rized by the data
law, local ordinance, or charter provision. subject or by law
to see it
• Applies to persons or entities licensed or Confidential Not available to Protected
funded by, or under contract to, a govern- the public or the Nonpublic
ment entity. data subject**

What are government data? * Includes Private or confidential data which


have been stripped of any data that would
• Government data are any data recorded by identify an individual.
any government entity, or as a matter of law. ** For example: Criminal investigative data

• Includes data stored on paper, or in electron- In the Cato Institute paper “Watching You:
ic form, including audio or video tape. Systematic Federal Surveillance of Ordinary
Americans,” Law Professor Paul Swartz notes that
What a Data Privacy Law Would Regulate “Americans no longer know how their personal
information will be applied, who will gain access to
• What information can be collected it and what decisions will be made with it.”19
• The classification of specific types of govern-
ment data But at the state level, Coloradoans should be able to
• Duties of government personnel in adminis- know these things, and the Colorado Legislature has
tering provisions of the law the ability to make sure that they do.
• Minimum security standards for protecting
the integrity of data
• Procedures for classifying data as not public
• Civil and criminal penalties for violations of
the law

Page 5
Copyright ©2005, Independence Institute 11
“2005 Identity Fraud Survey Report,” Javelin Strategy and
Research, January 2005. http://www.javelinstrategy.com/
reports/2005IdentityFraudSurveyReport.html
INDEPENDENCE INSTITUTE is a non-profit, 12
The number one way information is obtained, “Lost/stolen
non-partisan Colorado think tank. It is governed by a wallet, checkbook, or credit card.” Number two is “Friends,
acquaintances, relatives w/ access to the info.”
statewide board of trustees and holds a 501(c)(3) tax 13
Three most likely people, according to the survey, are family
exemption from the IRS. Its public policy research member/relative, complete stranger, or a friend/neighbor/in-
focuses on economic growth, education reform, local home employee.”
14
government effectiveness, and Constitutional rights. The original purpose of the SSN was to administer Social
Security contributions and payments, nothing more.
15
Sullivan, Bob, “California data leak raises questions,”
JON CALDARA is President of the Independence MSNBC, October 27, 2004.
Institute. 16
Minnesota Revised Statutes, Chapter 13. http://www.revisor.
leg.state.mn.us/stats/13/01.html
17
Howe, Patrick, “Growing use of private police network raises
DAVID B. KOPEL is Research Director at the concerns,” Associated Press, October 30, 2003.
Independence Institute, and a columnist for the 18
These elements and definitions are taken from the “Minnesota
Rocky Mountain News. Data Practices Act,” Chapter 13 of the Minnesota Revised
Statutes.
19
Twight, Charlotte, “Watching You: Systematic Federal
MIKE KRAUSE directs the Justice Policy Inititative Surveillance of Ordinary Americans,” Cato Institute Briefing
at the Independence Institute. Paper No. 69, October 17, 2001. http://www.cato.org/pubs/
briefs/bp-069es.html

NOTHING WRITTEN here is to be construed


as necessarily representing the views of the
Independence Institute or as an attempt to influence
any election or legislative action.

PERMISSION TO REPRINT this paper in whole or


in part is hereby granted provided full credit is given
to the Independence Institute.

Endnotes
1
CRS 12-14.7-101 “Credit Report Security Freeze Act.”
2
O’Rourke, P.J., National Public Radio, Fresh Air, June 10, 2004.
3
“Governor doesn’t want face-recognition technology abused,”
7News, TheDenverChannel.com, July 2001. http://www.theden-
verchannel.com/news/879856/detail.html
4
Krause, Mike and Kopel, David, “Face the Facts,” Reason,
October 2002. http://www.reason.com/0210/fe.dk.face.shtml
5
“At Least One Colorado Sheriff Entering Concealed Carry
Permit Holders into Criminal Database,” Rocky Mountain Gun
Owners, January 20, 2003. http://www.rmgo.org/alerts/2003-
ccic.shtml
6
Colorado Bureau of Investigation, Program Support Unit,
Crime Information Center Unit Functions and Objectives.
http://cbi.state.co.us/ccic/default.asp
7
“Cops tap database to harass, intimidate,” Detroit Free Press,
July 31, 2001.
8
“Penalties uneven for data misuse,” Detroit Free Press, August
01, 2001.
9
The Real ID Act is part of the much broader Emergency
Supplemental Appropriations Act for Defense, the Global War
on Terror, and Tsunami Relief, 2005, Pub. L. No. 109-13, 119
Stat. 231 (May 11, 2005). http://thomas.loc.gov/cgi-bin/
bdquery/z?d109:h.r.00418:
10
CRS 12-22-7

Page 6

You might also like