You limited your search to:

 Collection: Congressional Research Service Reports
Security Classification Policy and Procedure: E.O. 12958, as Amended
This report describes security classification policy and procedure, largely prescribed in a series of successive presidential executive orders issued over the past 50 years. This policy provides the rationale and arrangements for designating information officially secret for reasons of national security, and for its declassification as well. digital.library.unt.edu/ark:/67531/metadc29520/
Security Classification Policy and Procedure: E.O. 12958, as Amended
This report describes security classification policy and procedure, largely prescribed in a series of successive presidential executive orders issued over the past 50 years. This policy provides the rationale and arrangements for designating information officially secret for reasons of national security, and for its declassification as well. digital.library.unt.edu/ark:/67531/metadc29519/
Researching Current Federal Legislation and Regulations: A Guide to Resources for Congressional Staff
This report is designed to introduce congressional staff to selected governmental and nongovernmental sources that are useful in tracking and obtaining information federal legislation and regulations. It includes governmental sources such as the Legislative Information System (LIS), THOMAS, the Government Printing Office's Federal Digital System (FDsys), and U.S. Senate and House websites. Nongovernmental or commercial sources include resources such as HeinOnline and the Congressional Quarterly (CQ) websites. It also highlights classes offered by the Congressional Research Service (CRS) and the Library of Congress Law Library. digital.library.unt.edu/ark:/67531/metadc122312/
Nuclear Weapons Complex Reconfiguration: Analysis of an Energy Department Task Force Report
No Description digital.library.unt.edu/ark:/67531/metacrs9210/
The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities
Report discussing the federal government's role in the country's information technology (IT) research and development (R&D) activities. digital.library.unt.edu/ark:/67531/metadc228042/
Critical Infrastructure: The National Asset Database
The purpose of this report is to discuss the National Asset Database: what is in it, how it is populated, what the Database apparently is, what it is not, and how it is intended to be used. The report also discusses some of the issues on which Congress could focus its oversight, including appropriation bill language. digital.library.unt.edu/ark:/67531/metacrs9556/
Critical Infrastructure Information Disclosure and Homeland Security
This report discusses the Freedom of Information Act (FOIA) that was passed to ensure by statute citizen access to government information. Nine categories of information may be exempted from disclosure. Three of the nine exemptions provide possible protection against the release of critical infrastructure information: exemption 1 (national security information); exemption 3 (information exempted by statute); and exemption 4 (confidential business information). Congress has considered several proposals to exempt critical infrastructure information from the FOIA. digital.library.unt.edu/ark:/67531/metacrs2244/
Critical Infrastructure Information Disclosure and Homeland Security
This report discusses the Freedom of Information Act (FOIA) that was passed to ensure by statute citizen access to government information. Nine categories of information may be exempted from disclosure. Three of the nine exemptions provide possible protection against the release of critical infrastructure information: exemption 1 (national security information); exemption 3 (information exempted by statute); and exemption 4 (confidential business information). Congress has considered several proposals to exempt critical infrastructure information from the FOIA. digital.library.unt.edu/ark:/67531/metacrs3914/
FY2005 Budget Documents: Internet Access and GPO Availability
No Description digital.library.unt.edu/ark:/67531/metacrs8197/
Iraq: Map Sources
No Description digital.library.unt.edu/ark:/67531/metacrs4989/
Iraq: Map Sources
No Description digital.library.unt.edu/ark:/67531/metacrs4992/
Iraq: Map Sources
No Description digital.library.unt.edu/ark:/67531/metacrs4991/
Iraq: Map Sources
No Description digital.library.unt.edu/ark:/67531/metacrs4990/
Department of Veteran Affairs: Information Security and Information Technology Management Reorganization
On May 3, 2006, the home of a Department of Veterans Affairs (VA) data analyst was burglarized, resulting in the theft of a laptop computer and an external data storage device that was reported to contain personal information on more than 26 million veterans and United States military personnel. The VA Secretary testified that he was not informed of the incident until May 16, 2006, almost two weeks after the data had been stolen. VA publicly announced the theft on May 22. On June 29, VA announced that the stolen laptop computer and external hard drive had been recovered intact and that, based on a forensic examination conducted by the Federal Bureau of Investigation (FBI), the files on the external hard drive had not been compromised. digital.library.unt.edu/ark:/67531/metacrs9513/
The Department of State's Patterns of Global Terrorism Report: Trends, State Sponsors, and Related Issues
This report highlights trends and data found in the State Department’s annual Patterns of Global Terrorism report, (Patterns 2003) and addresses selected issues relating to its content. digital.library.unt.edu/ark:/67531/metacrs5794/
Intelligence Whistleblower Protections: In Brief
This report describes three sources of Intelligence Community (IC) whistleblower protection including the Intelligence Community Whistleblower Protection Act of 1998 (ICWPA), Presidential Policy Directive 19 (PPD-19), and Title VI of the Intelligence Authorization Act for Fiscal Year 2014 (Title VI). Generally speaking, whistleblowers are those who expose misconduct (e.g., fraud, abuse, or illegal activity) within an organization. In the context of the IC, whistleblowers are generally employees or contractors of federal intelligence agencies who bring to light information on agency wrongdoings. digital.library.unt.edu/ark:/67531/metadc491255/
Federal Depository Library Program: Issues for Congress
A history and overview of current issues regarding the Federal Depository Library Program (FDLP). digital.library.unt.edu/ark:/67531/metadc85399/
Freedom of Information Act Amendments: 109th Congress
No Description digital.library.unt.edu/ark:/67531/metacrs6139/
Freedom of Information Act (FOIA) Amendments: 109th Congress
No Description digital.library.unt.edu/ark:/67531/metacrs6694/
Freedom of Information Act (FOIA) Amendments: 109th Congress
No Description digital.library.unt.edu/ark:/67531/metacrs6488/
Managing Secrecy: Security Classification Reform - The Government Secrecy Act Proposal
No Description digital.library.unt.edu/ark:/67531/metacrs705/
Public Printing Reform: Issues and Actions
No Description digital.library.unt.edu/ark:/67531/metacrs1803/
Public Printing Reform: Issues and Actions
No Description digital.library.unt.edu/ark:/67531/metacrs4985/
Public Printing Reform: Issues and Actions
No Description digital.library.unt.edu/ark:/67531/metacrs4986/
Public Printing Reform: Issues and Actions
No Description digital.library.unt.edu/ark:/67531/metacrs3115/
Public Printing Reform: Issues and Actions
No Description digital.library.unt.edu/ark:/67531/metacrs3116/
Secrecy Versus Openness: New Proposed Arrangements for Balancing Competing Needs
No Description digital.library.unt.edu/ark:/67531/metacrs5932/
Secrecy Versus Openness: New Proposed Arrangements for Balancing Competing Needs
No Description digital.library.unt.edu/ark:/67531/metacrs5933/
Security Classification Policy and Procedure: E.O. 12958, as Amended
No Description digital.library.unt.edu/ark:/67531/metacrs6258/
Informing Congress: The Role of the Executive in Times of War and Military Conflict, 1941-2001
No Description digital.library.unt.edu/ark:/67531/metacrs7484/
Access to Government Information in the United States
The Constitution of the United States makes no specific allowance for any one of the co-equal branches to have access to information held by the others and contains no provision expressly establishing a procedure for, or a right of, public access to government information. Nonetheless, Congress has legislated various public access laws. These include two records access statutes — the Freedom of Information Act (5 U.S.C. 552) and the Privacy Act (5 U.S.C. 552a) — and two meetings access statutes — the Federal Advisory Committee Act (5 U.S.C. App.) and the Government in the Sunshine Act (5 U.S.C. 552b). Moreover, due to the American separation of powers model of government, interbranch conflicts over the accessibility of information are neither unexpected nor necessarily destructive. The federal courts, historically, have been reluctant to review and resolve “political questions” involving information disputes between Congress and the executive branch. Although there is considerable interbranch cooperation, such conflicts probably will continue to occur on occasion. digital.library.unt.edu/ark:/67531/metacrs6257/
Access to Government Information in the United States
The Constitution of the United States makes no specific allowance for any one of the co-equal branches to have access to information held by the others and contains no provision expressly establishing a procedure for, or a right of, public access to government information. Nonetheless, Congress has legislated various public access laws. These include two records access statutes—the Freedom of Information Act (5 U.S.C. 552) and the Privacy Act (5 U.S.C. 552a)—and two meetings access statutes—the Federal Advisory Committee Act (5 U.S.C. App.) and the Government in the Sunshine Act (5 U.S.C. 552b). Moreover, due to the American separation of powers model of government, interbranch conflicts over the accessibility of information are neither unexpected nor necessarily destructive. The federal courts, historically, have been reluctant to review and resolve “political questions” involving information disputes between Congress and the executive branch. Although there is considerable interbranch cooperation, such conflicts probably will continue to occur on occasion. digital.library.unt.edu/ark:/67531/metacrs4982/
Freedom of Information Act (FOIA) Amendments: 109th Congress
Enacted in 1966, the Freedom of Information Act (FOIA) was designed to enable any person -- individual or corporate, regardless of citizenship -- to request, without explanation or justification, presumptive access to existing, identifiable, unpublished, executive branch agency records on any topic. The statute specified nine categories of information that may be permissibly exempted from the rule of disclosure. Disputes over the accessibility of requested records could be ultimately settled in court. The statute has become a somewhat popular tool of inquiry and information gathering for various quarters of American society. This report details the history of the Act, as well as relevant legislation and incidences and the efforts to amend the Act. digital.library.unt.edu/ark:/67531/metacrs10375/
Presidential Libraries: The Federal System and Related Legislation
Through the National Archives and Records Administration, the federal government currently manages and maintains 12 presidential libraries. Inaugurated with the Presidential Libraries Act of 1955, these entities are privately constructed on behalf of former Presidents and, upon completion, are deeded to the federal government. This report provides a brief overview of the federal presidential libraries system and tracks the progress of related legislation. digital.library.unt.edu/ark:/67531/metadc26307/
Presidential Libraries: The Federal System and Related Legislation
This report provides a brief overview of the federal presidential libraries system and tracks the progress of related legislation. digital.library.unt.edu/ark:/67531/metadc462372/
Security Classification Policy and Procedure: E.O. 12958, as Amended
This report describes security classification policy and procedure, largely prescribed in a series of successive presidential executive orders issued over the past 50 years. This policy provides the rationale and arrangements for designating information officially secret for reasons of national security, and for its declassification as well. digital.library.unt.edu/ark:/67531/metadc29518/
Fax-on-Demand Services Available from Federal Government Agencies
No Description digital.library.unt.edu/ark:/67531/metacrs4983/
Fax-on-Demand Services Available from Federal Government Agencies
No Description digital.library.unt.edu/ark:/67531/metacrs707/
Fax-on-Demand Services Available from Federal Government Agencies
No Description digital.library.unt.edu/ark:/67531/metacrs3114/
"Gang of Four" Congressional Intelligence Notifications
Report that reviews the history of the Gang of Four intelligence notification process and compares this procedure with that of the "Gang of Eight" notification procedure. digital.library.unt.edu/ark:/67531/metadc227648/
Presidential Claims of Executive Privilege: History, Law, Practice and Recent Developments
No Description digital.library.unt.edu/ark:/67531/metacrs6970/
Floor Consideration of Conference Reports in the House
No Description digital.library.unt.edu/ark:/67531/metacrs916/
Floor Consideration of Conference Reports in the House
No Description digital.library.unt.edu/ark:/67531/metacrs3977/
Floor Consideration of Conference Reports in the Senate
No Description digital.library.unt.edu/ark:/67531/metacrs3978/
Toxics Release Inventory: Do Communities Have a Right to Know More?
No Description digital.library.unt.edu/ark:/67531/metacrs454/
Federal Chief Information Officer (CIO): Opportunities and Challenges
No Description digital.library.unt.edu/ark:/67531/metacrs3117/
Federal Enterprise Architecture and E-Government: Issues for Information Technology Management
No Description digital.library.unt.edu/ark:/67531/metacrs9154/
A Primer on E-Government: Sectors, Stages, Opportunities, and Challenges of Online Governance
Electronic government (e-government) intersects many legislative issues, including privacy, digital divide (the lack of equal access to computers, whether due to a lack of financial resources or necessary skills), public access to government information, service delivery, and information security. E-government solutions are prominently represented in efforts to improve the management and efficiency of government information technology resources. To help policymakers discern e-government initiatives relative to their role in various issues, this report identifies and defines the principal e-government sectors and stages of development. It also outlines some of the opportunities and challenges associated with e-government. digital.library.unt.edu/ark:/67531/metacrs4987/
A Primer on E-Government: Sectors, Stages, Opportunities, and Challenges of Online Governance
Electronic government (e-government) intersects many legislative issues, including privacy, digital divide (the lack of equal access to computers, whether due to a lack of financial resources or necessary skills), public access to government information, service delivery, and information security. E-government solutions are prominently represented in efforts to improve the management and efficiency of government information technology resources. To help policymakers discern e-government initiatives relative to their role in various issues, this report identifies and defines the principal e-government sectors and stages of development. It also outlines some of the opportunities and challenges associated with e-government. digital.library.unt.edu/ark:/67531/metacrs3121/
Balancing Scientific Publication and National Security Concerns: Issues for Congress
There is a lack of consensus regarding the best method of balancing scientific publishing and national security. The current federal policy, as described in National Security Decision Directive 189, is that fundamental research should remain unrestricted and that in the rare case where it is necessary to restrict such information, classification is the appropriate vehicle to do so. Other mechanisms restrict international information flow, where Export Administration Regulations (EAR) and International Traffic in Arms Regulations (ITAR) control export of items and technical information on specific lists. Both EAR and ITAR contain a fundamental research exclusion, but this exclusion is lost if prepublication review of research results for sensitive information occurs. digital.library.unt.edu/ark:/67531/metacrs8579/