You limited your search to:

 Collection: Congressional Research Service Reports
Data Security: Protecting the Privacy of Phone Records

Data Security: Protecting the Privacy of Phone Records

Date: February 28, 2006
Creator: Stevens, Gina Marie & Rainson, Tara Alexandra
Description: This report discusses recent legislative and regulatory efforts to protect the privacy of customer telephone records, and efforts to prevent the unauthorized use, disclosure, or sale of such records by data brokers. In addition, it provides a brief overview of the confidentiality protections for customer information established by the Communications Act of 1934.
Contributing Partner: UNT Libraries Government Documents Department
A Brief Summary of the HIPAA Medical Privacy Rule

A Brief Summary of the HIPAA Medical Privacy Rule

Date: April 30, 2003
Creator: Stevens, Gina Marie
Description: This report provides a brief overview of the modified HIPAA Privacy rule, “Standards for the Privacy of Individually Identifiable Health Information” (“privacy rule”) published on August 14, 2002 by the Department of Health and Human Services (HHS).
Contributing Partner: UNT Libraries Government Documents Department
A Brief Summary of the Medical Privacy Rule

A Brief Summary of the Medical Privacy Rule

Date: February 14, 2003
Creator: Stevens, Gina Marie
Description: This report provides a brief overview of the modified medical privacy rule, “Standards for the Privacy of Individually Identifiable Health Information”(“privacy rule”) published on August 14, 2002 by the Department of Health and Human Services (HHS). The privacy regulation creates a new federal floor of privacy protections while leaving in place more protective state rules or practices. The rule establishes a set of basic consumer protections and a series of regulatory permissions for uses and disclosures of protected health information.
Contributing Partner: UNT Libraries Government Documents Department
A Brief Summary of the Medical Privacy Rule

A Brief Summary of the Medical Privacy Rule

Date: August 27, 2002
Creator: Stevens, Gina Marie
Description: This report provides a brief overview of the recently modified medical privacy rule, “Standards for the Privacy of Individually Identifiable Health Information”(“privacy rule”) published on August 14, 2002 by the Department of Health and Human Services (HHS). The privacy rule went into effect April 14, 2001, with compliance required by April 2003 for most entities. The regulation creates a new federal floor of privacy protections while leaving in place more protective state rules or practices. The rule establishes a set of basic consumer protections and a series of regulatory permissions for uses and disclosures of protected health information.
Contributing Partner: UNT Libraries Government Documents Department
A Brief Summary of the Medical Privacy Rule

A Brief Summary of the Medical Privacy Rule

Date: April 10, 2002
Creator: Stevens, Gina Marie
Description: On March 27, 2002 the Department of Health and Human Services (HHS) published its proposed changes to the medical privacy regulations issued by the Clinton Administration under the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”). HHS is accepting comments on the proposed changes until April 26, 2002. This report provides an overview of the final rule for “Standards for the Privacy of Individually Identifiable Health Information” ( “privacy rule”) that went into effect on April 14, 2001, and an overview of the Bush Administration’s proposed changes to the privacy regulation.
Contributing Partner: UNT Libraries Government Documents Department
China's Relations with Central Asian States and Problems with Terrorism

China's Relations with Central Asian States and Problems with Terrorism

Date: October 7, 2002
Creator: McNeal, Dewardric L & Dumbaugh, Kerry
Description: This report provides an overview of the Muslim separatist movement in China’s northwestern Xinjiang Uighur Autonomous Region, China’s attempts to stifle activities which it considers terrorism, and implications for U.S. policy. Some analysts suggest that the U.S.-led campaign against terrorism may make it difficult to pressure the Chinese government on human rights and religious freedoms, particularly as they relate to Uighur Muslims in Xinjiang.
Contributing Partner: UNT Libraries Government Documents Department
Treatment of "Battlefield Detainees" in the War on Terrorism

Treatment of "Battlefield Detainees" in the War on Terrorism

Date: July 28, 2005
Creator: Elsea, Jennifer K
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Internet Privacy - Protecting Personal Information: Overview and Pending Legislation

Internet Privacy - Protecting Personal Information: Overview and Pending Legislation

Date: January 16, 2001
Creator: Smith, Marcia S
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Access to Government Information in the United States

Access to Government Information in the United States

Date: August 31, 2009
Creator: Ginsberg, Wendy R.
Description: The U.S. Constitution makes no specific allowance for any one of the three branches of the federal government to have access to information held by the others. No provision in the U.S. Constitution expressly establishes a procedure for public access to government information. Congress has legislated various public access laws. Among these laws are two records access statutes, The Freedom of Information Act, the Privacy Act, and two meetings access statutes, the Federal Advisory Committee Act, and the Government in the Sunshine Act. This report offers an overview of the four information access laws noted above, and provides citations to additional resources related to these tools.
Contributing Partner: UNT Libraries Government Documents Department
Encryption Technology: Congressional Issues

Encryption Technology: Congressional Issues

Date: July 9, 1998
Creator: Nunno, Richard M
Description: This report discusses primarily, the controversy over encryption concerns what access the government should have to encrypted stored computer data or electronic communications (voice and data, wired and wireless) for law enforcement purposes.
Contributing Partner: UNT Libraries Government Documents Department