HB 1508 - AS AMENDED BY THE HOUSE
10Mar2016... 0625h
2016 SESSION
\t16-2646
\t08/10
HOUSE BILL\t1508
AN ACT\tallowing public libraries to run certain privacy software.
SPONSORS:\tRep. Ammon, Hills. 40; Rep. Goulette, Hills. 23; Rep. S. Sweeney, Hills. 23; Rep. Schleien, Hills. 37; Rep. Kurk, Hills. 2; Rep. Aldrich, Belk. 2; Rep. Ferreira, Hills. 28
COMMITTEE:\tMunicipal and County Government
-----------------------------------------------------------------
ANALYSIS
\tThis bill allows public libraries to run certain privacy software.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Explanation:\tMatter added to current law appears in bold italics.
\t\tMatter removed from current law appears [in brackets and struckthrough.]
\t\tMatter which is either (a) all new or (b) repealed and reenacted appears in regular type.
10Mar2016... 0625h\t16-2646
\t08/10
STATE OF NEW HAMPSHIRE
In the Year of Our Lord Two Thousand Sixteen
AN ACT\tallowing public libraries to run certain privacy software.
Be it Enacted by the Senate and House of Representatives in General Court convened:
\t1 Findings. The general court is mindful that public libraries, through the American Library Association, have upheld and protected patron privacy as one of their core values since 1939, and mindful that, in a library (physical or virtual), the right to privacy is the right to open inquiry without having the subject of one’s interest examined or scrutinized by others.
\t2 New Section; Cryptographic Privacy Software. Amend RSA 202-A by inserting after section 25 the following new section:
\t202-A:26 Cryptographic Privacy Software. Public libraries may allow the installation and use of cryptographic privacy platforms on public library computers for library patrons use. Cryptographic privacy software shall include Tor or other privacy software that encrypts user's information to protect it from surveillance or collection. Public libraries may also support infrastructure for cryptographic software that helps to promote a free and open Internet, such as running Tor relays.
\t3 Effective Date. This act shall take effect 60 days after its passage.