1854-S2 AMH STOK BAKY 037

  

2SHB 1854 - H AMD 313

By Representative Stokesbary

NOT CONSIDERED 12/23/2019

On page 13, line 4, after "understand." insert "Providers of facial recognition services are not required to provide documentation that:

(a) Reveals proprietary data, trade secrets, or intellectual property; or

(b) Increases the risk of cyberattacks, including cyberattacks related to unique methods of conducting business, data unique to products or services, or determination of prices or rates to be charged for products or services."

On page 13, line 18, after "processed." insert "The requirements of this subsection do not apply to law enforcement agencies that are subject to the requirements in RCW 42.56.240(14)."

On page 13, line 27, after "testing." insert "In complying with this subsection, providers of commercial facial recognition services are not required to provide information that:

(a) Reveals proprietary data, trade secrets, or intellectual property; or

(b) Increases the risk of cyberattacks, including cyberattacks related to unique methods of conducting business, data unique to products or services, or determination of prices or rates to be charged for products or services."

On page 17, after line 12, insert the following:

"(3) This section does not apply to law enforcement agencies when such agencies use facial recognition technology for purposes other than ongoing surveillance."

EFFECT: Specifies that providers of facial recognition services are not required to provide certain documentation or information when complying with certain provisions related to facial recognition technology.

Exempts law enforcement agencies from the requirement that controllers must obtain consent from consumers prior to deploying facial recognition services if the agencies are subject to the Public Records Act provisions related to body-worn camera recordings, as set forth in RCW 42.56.240(14).

Exempts law enforcement agencies from the prohibition on using facial recognition technology to engage in ongoing surveillance when the agencies use the technology for purposes other than ongoing surveillance.    

--- END ---