City of Baltimore
Baltimore City Code

§ 18-1. Definitions.

(a) In general.

In this subtitle, the following terms have the meanings specified.

(b) Face surveillance.

"Face surveillance" means an automated or semi-automated process that assists in identifying or verifying an individual based on the physical characteristics of an individual's face.

(c) Face surveillance system.

(1) In general.

"Face surveillance system" means any computer software or application that performs face surveillance.

(2) Exclusions.

"Face surveillance system" does not include:

(i) a biometric security system designed specifically to protect against unauthorized access to a particular location or an electronic device;

(ii) the Maryland Image Repository System; or

(iii) surveillance technology.

(d) Person.

(1) In general.

"Person" has the meaning stated in § 1-107(a) {"Person: In general"} of the City Code's General Provisions Article.

(2) Qualified inclusion of City governmental units.

Notwithstanding § 1-107(b) {"Person: Exclusion"} of the General Provisions Article, in this subtitle "person" also includes, except as used in § 18-3 {"Penalties"} of this subtitle, any department, board, commission, council, authority, committee, office, or other unit of Baltimore City government.

(e) Surveillance technology.

(1) In general.

"Surveillance technology" means any software, electronic device, system utilizing an electronic device, or similar device used, designed, or primarily intended to collect, retain, process, or share audio, electronic, visual, location, thermal, olfactory, or similar information specifically associated with, or capable of being associated with, any individual or group.

(2) Inclusions.

"Surveillance technology" includes the following:

(i) international mobile subscriber identity (IMSI) catchers and other cell site simulators;

(ii) automatic license plate readers;

(iii) closed-circuit television cameras;

(iv) gunshot detection hardware and services;

(v) video and audio monitoring or recording technology, such as surveillance cameras, wide-angle cameras, and wearable body cameras;

(vi) mobile DNA capture technology;

(vii) software designed to monitor social media services;

(viii) x-ray vans;

(ix) software designed to forecast criminal activity or criminality; radio-frequency I.D. (RFID) scanners; and

(x) tools, including software and hardware, used to gain unauthorized access to a computer, computer service, or computer network.