国会记录:2003年7月29日(参议院)页S10142-S10153报表ON提出的法案和决议案联合[...]通过维登先生:1484 S.一项法案,要求对联邦政府利用商业和其他数据库的报告对于国家安全,情报和执法目的,以及用于其他目的;对司法委员会。维登先生。主席先生,我相信美国可以恶狠狠地打击恐怖主义,而不古亭公民自由。我今天介绍的立法的一点是所出现这个公式的第二部分地址的担忧:这已经得到了冷遇的隐私的区域。这是数以百万计的美国人的个人金融,医疗和其他数据,今天是从成千上万的联邦官僚的电脑不到鼠标点击了。对接入和联邦官员使用的个人信息不被任何全​​面的法律保护。技术,允许联邦政府窥探的数以百万计的美国人的个人生活的动力才刚刚开始被理解。这是一个惊人的力量,它已经部分地通过光国防部恐怖主义的意识计划(TIA),并通过美国运输安全管理局的计算机辅助乘客仿形系统II或CAPPSII计划。 These and more than two dozen other agencies wield that power with little or no restraint. The legislation I am introducing with the support of a bipartisan group of privacy watchdog organizations, the Citizens' Protection in Federal Databases Act, will put the breaks on unchecked Federal data sweeps. It requires the Federal agencies with law enforcement or intelligence authority to share with Congress exactly what they are doing with private or public databases, why they are doing it, and most importantly, what, if any, privacy protections the agencies are affording the individuals' whose sensitive information is caught up in those databases. The Citizens' Protection in Federal Databases Act also prohibits searches based on hypothetical scenarios. Apparently, some government agencies are using valuable Federal resources chasing hypothetical situations dreamed up without regard to actual intelligence or law enforcement information. The TIA Report to Congress in May of this year explained at length the program's intent to construct possible terrorist "scenarios" based on "historical examples, estimated capabilities, and imagination." These scenarios would then be fed into database searches in an effort to substantiate the hypotheticals. This Act bans such searches. This prohibition will promote the efficient use of Federal law enforcement time and money and help protect Americans from being subject to "virtual goose chases." Since 9/11, there has been an abundance of stories regarding Americans being stopped, searched, or detained due to some mistaken information. For example, after 9/11, the FBI decided to share with companies across the country a list with names of people wanted for possible association with terrorism. This list, as part of "Project Lookout," was sent to thousands of corporations, some of whom now use the list in lieu of background checks. Here's the problem--this list is not necessarily accurate. First of all, the list quickly became obsolete as the FBI checked people off. That means even if people were cleared by the FBI of suspicion, their names were still on this list. Secondly, the list has been shared so many times, and passed from person to person, group to group--many names have become misspelled and now folks, due to one or two typos, are being stopped as suspected terrorists. That story is just one example of what can happen when information is [[Page S10150]] mishandled. It is Congress's job to make sure mistakes like these do not happen. The Citizens' Protection in Federal Databases Act is not the end of this issue. After shedding some light on what exactly is happening with personal information--the Congress must then address how to protect Americans from the misuse of this information. I am happy to be working with a strong group of privacy advocates. The group includes the Electronic Privacy Information Center, the Electronic Frontier Foundation, the Center for Democracy and Technology, People for the American Way, the Free Congress Foundation, and the American Civil Liberties Union, and they have been instrumental in getting strong safeguards enacted against abuses in the TIA and other programs. I look forward to working with these groups, and my Senate colleagues, to see that this bill is enacted into law. When tens of thousands of bureaucrats have at their fingertips all- too-easy access to such personal information from private and public databases as the use of passports, driver's licenses, credit cards, ATMs, airline tickets, and rental cars, the American people want to know what is happening to their information. They want to know who wants access to it and why. Their personal information deserves strong privacy protection, and that is what this legislation is all about. I ask unanimous consent that the text of the bill be printed in the Record. There being no objection, the bill was ordered to be printed in the Record, as follows: S. 1484 Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, SECTION 1. SHORT TITLE. This Act may be cited as the "Citizens' Protection in Federal Databases Act". SEC. 2. FINDINGS. Congress makes the following findings: (1) Many Federal national security, law enforcement, and intelligence agencies are currently accessing large databases, both public and private, containing information that was not initially collected for national security, law enforcement, or intelligence purposes. (2) These databases contain personal and sensitive information on millions of United States persons. (3) Some of these databases are subject to Federal privacy protections when in private sector control. (4) Risks to personal privacy are heightened when personal information from different sources, including public records, is aggregated in a single file and made accessible to thousands of national security, law enforcement, and intelligence personnel. (5) It is unclear what standards, policies, procedures, and guidelines govern the access to or use of these public and private databases by the Federal Government. (6) It is unclear what Federal Government agencies believe they legally can and cannot do with the information once acquired. (7) The Federal Government should be required to adhere to clear civil liberties and privacy standards when accessing personal information. (8) There is a need for clear accountability standards with regard to the accessing or usage of information contained in public and private databases by Federal agencies. (9) Without accountability, individuals and the public have no way of knowing who is reading, using, or disseminating personal information. (10) The Federal Government should not access personal information on United States persons without some nexus to suspected counterintelligence, terrorist, or other illegal activity. SEC. 3. LIMITATION ON USE OF FUNDS FOR PROCUREMENT OR ACCESS OF COMMERCIAL DATABASES PENDING REPORT ON USE OF INFORMATION. (a) Limitation.--Notwithstanding any other provision of law, commencing 60 days after the date of the enactment of this Act, no funds appropriated or otherwise made available to the Department of Justice, the Department of Defense, the Department of Homeland Security, the Central Intelligence Agency, the Department of Treasury, or the Federal Bureau of Investigation may be obligated or expended by such department or agency on the procurement of or access to any commercially available database unless such head of such department or agency submits to Congress the report required by subsection (b) not later than 60 days after the date of the enactment of this Act. (b) Report.--(1) The Attorney General, the Secretary of Defense, the Secretary of Homeland Security, the Secretary of the Treasury, the Director of Central Intelligence, and the Director of the Federal Bureau of Investigation shall each prepare, submit to the appropriate committees of Congress, and make available to the public a report, in writing, containing a detailed description of any use by the department or agency under the jurisdiction of such official, or any national security, intelligence, or law enforcement element under the jurisdiction of the department or agency, of databases that were obtained from or remain under the control of a non-Federal entity, or that contain information that was acquired initially by another department or agency of the Federal Government for purposes other than national security, intelligence or law enforcement, regardless of whether any compensation was paid for such databases. (2) Each report shall include-- (A) a list of all contracts, memoranda of understanding, or other agreements entered into by the department or agency, or any other national security, intelligence, or law enforcement element under the jurisdiction of the department or agency for the use of, access to, or analysis of databases that were obtained from or remain under the control of a non-Federal entity, or that contain information that was acquired initially by another department or agency of the Federal Government for purposes other than national security, intelligence, or law enforcement; (B) the duration and dollar amount of such contracts; (C) the types of data contained in the databases referred to in subparagraph (A); (D) the purposes for which such databases are used, analyzed, or accessed; (E) the extent to which such databases are used, analyzed, or accessed; (F) the extent to which information from such databases is retained by the department or agency, or any national security, intelligence, or law enforcement element under the jurisdiction of the department or agency, including how long the information is retained and for what purpose; (G) a thorough description, in unclassified form, of any methodologies being used or developed by the department or agency, or any intelligence or law enforcement element under the jurisdiction of the department or agency, to search, access, or analyze such databases; (H) an assessment of the likely efficacy of such methodologies in identifying or locating criminals, terrorists, or terrorist groups, and in providing practically valuable predictive assessments of the plans, intentions, or capabilities of criminals, terrorists, or terrorist groups; (I) a thorough discussion of the plans for the use of such methodologies; (J) a thorough discussion of the activities of the personnel, if any, of the department or agency while assigned to the Terrorist Threat Integration Center; and (K) a thorough discussion of the policies, procedures, guidelines, regulations, and laws, if any, that have been or will be applied in the access, analysis, or other use of the databases referred to in subparagraph (A), including-- (i) the personnel permitted to access, analyze, or otherwise use such databases; (ii) standards governing the access, analysis, or use of such databases; (iii) any standards used to ensure that the personal information accessed, analyzed, or used is the minimum necessary to accomplish the intended legitimate Government purpose; (iv) standards limiting the retention and redisclosure of information obtained from such databases; (v) procedures ensuring that such data meets standards of accuracy, relevance, completeness, and timeliness; (vi) the auditing and security measures to protect against unauthorized access, analysis, use, or modification of data in such databases; (vii) applicable mechanisms by which individuals may secure timely redress for any adverse consequences wrongfully incurred due to the access, analysis, or use of such databases; (viii) mechanisms, if any, for the enforcement and independent oversight of existing or planned procedures, policies, or guidelines; and (ix) an outline of enforcement mechanisms for accountability to protect individuals and the public against unlawful or illegitimate access or use of databases. SEC. 4. GENERAL PROHIBITIONS. (a) In General.--Notwithstanding any other provision of law, no department, agency, or other element of the Federal Government, or officer or employee of the Federal Government, may conduct a search or other analysis for national security, intelligence, or law enforcement purposes of a database based solely on a hypothetical scenario or hypothetical supposition of who may commit a crime or pose a threat to national security. (b) Construction.--The limitation in subsection (a) shall not be construed to endorse or allow any other activity that involves use or access of databases referred to in section 3(b)(2)(A). SEC. 5. DEFINITIONS. In this Act: (1) Appropriate committees of congress.--The term "appropriate committees of Congress" means-- (A) the Select Committee on Intelligence and the Committee on the Judiciary of the Senate; and (B) the Permanent Select Committee on Intelligence and the Committee on the Judiciary of the House of Representatives. (2) Database.--The term "database" means any collection or grouping of information about individuals that contains personally identifiable information about individuals, such as individual's names, or identifying numbers, symbols, or other identifying [[Page S10151]] particulars associated with individuals, such as fingerprints, voice prints, photographs, or other biometrics. The term does not include telephone directories or information publicly available on the Internet without fee. (3) United states person.--The term "United States person" has the meaning given that term in section 101(i) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1801(i)). ______