Search Results

Data Security: Federal and State Laws
Security breaches involving electronic personal data have come to light largely as a result of the California Security Breach Notification Act, a California notification law that went into effect in 2003. In response, the states and some Members have introduced bills that would require companies to notify persons affected by such security breaches. By December 2005, 35 states had introduced data security legislation and 22 states had enacted data security laws.
Data Security: Federal Legislative Approaches
This report discusses the core areas addressed in federal legislation, including the scope of coverage (who is covered and what information is covered); data privacy and security safeguards for sensitive personal information; requirements for security breach notification (when, how, triggers, frequency, and exceptions); restrictions on social security numbers (collection, use, and sale); credit freezes on consumer reports; identity theft penalties; causes of action; and preemption.
Net Neutrality: Background and Issues
As the 109th Congress continues to debate telecommunications reform, a major point of contention is the question of whether action is needed to ensure unfettered access to the Internet. The move to place restrictions on the owners of the networks that compose and provide access to the Internet, to ensure equal access and nondiscriminatory treatment, is referred to as “net neutrality.” There is no single accepted definition of “net neutrality.” However, most agree that any such definition should include the general principles that owners of the networks that compose and provide access to the Internet should not control how consumers lawfully use that network; and should not be able to discriminate against content provider access to that network.
Superconductivity: An Overview
No Description Available.
Superconductivity Research and Technology in the Federal Government
No Description Available.
Superconducting Super Collider: Issues
No Description Available.
Superconducting Super Collider
No Description Available.
The Federal Networking and Information Technology Research and Development Program: Funding Issues and Activities
This report discusses federal funding for IT research and development. Proponents assert that federal support of IT R&D has produced positive outcomes for the country and played a crucial role in supporting long-term research into fundamental aspects of computing. Critics assert that the government, through its funding mechanisms, may be picking “winners and losers” in technological development, a role more properly residing with the private sector.
Broadband Internet Regulation and Access: Background and Issues
This is one part in the series of reports that provide a background and analysis, and most recent developments regarding broadband or high-speed Internet access. The report starts out by answering questions; what is broadband and why is it important? This report also discusses broadband technologies, the status of broadband deployment and the related policy issues, as well as the legislation in congress.
Spyware: Background and Policy Issues for Congress
No Description Available.
Industrial Competitiveness and Technological Advancement: Debate Over Government Policy
This report summarizes the debate over government policy on industrial competitiveness and technological advancement and its connection to the U.S. economy. It also discusses congress' approach in the previous years on this topic, and the policy changes that have been implemented in recent years.
Cooperative R&D: Federal Efforts to Promote Industrial Competitiveness
In response to the foreign challenge in the global marketplace, the United States Congress has explored ways to stimulate technological advancement in the private sector. The government has supported various efforts to promote cooperative research and development activities among industry, universities, and the federal R&D establishment designed to increase the competitiveness of American industry and to encourage the generation of new products, processes, and services. Among the issues before Congress are whether joint ventures contribute to industrial competitiveness and what role, if any, the government has in facilitating such arrangements.
Broadband Internet Access: Background and Issues
From a public policy perspective, the goals are to ensure that broadband deployment is timely, that industry competes fairly, and that service is provided to all sectors and geographical locations of American society. The federal government -- through Congress and the Federal Communications Commission (FCC) -- is seeking to ensure fair competition among the players so that broadband will be available and affordable in a timely manner to all Americans who want it. While the FCC's position is not to intervene at this time, some assert that legislation is necessary to ensure fair competition and timely broadband deployment. One proposal would ease certain legal restrictions and requirements, imposed by the Telecommunications Act of 1996, on incumbent telephone companies who provide high speed data (broadband) access. Another proposal would compel cable companies to provide "open access" to competing Internet service providers.
Broadband Internet Access: Background and Issues
From a public policy perspective, the goals are to ensure that broadband deployment is timely, that industry competes fairly, and that service is provided to all sectors and geographical locations of American society. The federal government -- through Congress and the Federal Communications Commission (FCC) -- is seeking to ensure fair competition among the players so that broadband will be available and affordable in a timely manner to all Americans who want it. While the FCC's position is not to intervene at this time, some assert that legislation is necessary to ensure fair competition and timely broadband deployment. One proposal would ease certain legal restrictions and requirements, imposed by the Telecommunications Act of 1996, on incumbent telephone companies who provide high speed data (broadband) access. Another proposal would compel cable companies to provide "open access" to competing Internet service providers.
Broadband Internet Regulation and Access: Background and Issues
This is one part in the series of reports that provide a background and analysis, and most recent developments regarding broadband or high-speed Internet access. The report starts out by answering questions; what is broadband and why is it important? This report also discusses broadband technologies, the status of broadband deployment and the related policy issues, as well as the legislation in congress.
Information Services for Agriculture: The Role of Technology
Significant improvements in technology-supported information services have created opportunities for their utilization by the farmers and ranchers of our Nation. This report highlights the development and expanded offering of these systems, describes current operational and experimental systems, and presents salient legislative initiatives which address this priority area.
Science and Technology Policy: Issues for the 109th Congress
No Description Available.
Broadband Internet Access and the Digital Divide: Federal Assistance Programs
Some policymakers, believing that disparities in broadband access across American society could have adverse economic and social consequences on those left behind, assert that the federal government should play a more active role to avoid a “digital divide” in broadband access. One approach is for the federal government to provide financial assistance to support broadband deployment in underserved areas. Others, however, believe that federal assistance for broadband deployment is not appropriate. Some opponents question the reality of the “digital divide,” and argue that federal intervention in the broadband marketplace would be premature and, in some cases, counterproductive.
Internet Development and Information Control in the People's Republic of China
Since its founding in 1949, the People’s Republic of China (PRC) has exerted great effort in manipulating the flow of information and prohibiting the dissemination of viewpoints that criticize the government or stray from the official Communist party view. The introduction of Internet technology in the mid-1990’s presented a challenge to government control over news sources, and by extension, over public opinion. While the Internet has developed rapidly, broadened access to news, and facilitated mass communications in China, many forms of expression online, as in other mass media, are still significantly stifled. This report discusses the history of this issue and examines the U.S.'s response.
Technology Transfer: Use of Federally Funded Research and Development
Report on government spending for research and development of technology, with a focus on how that R&D can be transferred to other areas, including recent developments, background issues, the rationale behind federal activity, and more.
The Federal Networking and Information Technology Research and Development Program: Funding Issues and Activities
This report discusses the High-Performance Computing and Communications Program Act of 1991 (P.L. 102-194), which was passed to enhance the effectiveness of the various high-performance computing programs. The HPCC Program has evolved over time and is now called the Networking and Information Technology Research and Development (NITRD) Program, to better reflect its expanded mission.
High Performance Computers and Export Control Policy: Issues for Congress
Congress has a strong interest in export control policy with regard to technologies that may have both commercial and military applications outside of the United States. Through its constitutionally delegated authority to regulate foreign commerce, Congress has the authority to control exports for national security or foreign policy purposes. This report examines congressional interest in the exportation of High Performance Computers, which are either single computing machines (usually called supercomputers) or a cluster of easily available, high-end workstations or personal computers.
Data Mining and Homeland Security: An Overview
Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Personal Data Security Breaches: Context and Incident Summaries
Report on personal data security breaches, including examples, relevant laws, considered legislation, and more.
Broadband Internet Regulation and Access: Background and Issues
This is one part in the series of reports that provide a background and analysis, and most recent developments regarding broadband or high-speed Internet access. The report starts out by answering questions; what is broadband and why is it important? This report also discusses broadband technologies, the status of broadband deployment and the related policy issues, as well as the legislation in congress.
Computer Services Personnel: Overtime Pay Under the Fair Labor Standards Act
The Fair Labor Standards Act of 1938 (FLSA), as amended, is the primary federal statute in the area of minimum wages and overtime pay. Through administrative rulemaking, the Secretary of Labor has established two tests through which to define eligibility under the Section 13(a)(1) exemption: a duties test and an earnings test. In the 106th Congress, legislation was introduced by Representatives Andrews and Lazio that would have increased the scope of the exemption: first, by expanding the range of exempt job titles, and then, through a relative reduction in the value of the earnings threshold or test. For example, were the minimum wage increased to $6.15 per hour, as pending proposals would do, the value of the computer services exemption threshold would be 4.5 times the federal minimum wage. Ultimately, neither bill was enacted, but the issue has re-emerged as H.R. 1545 (Andrews) and H.R. 546 (Quinn).
Internet Taxation: Issues and Legislation in the 109th Congress
This report discusses issues of state and local taxation of Internet transactions because commerce conducted by parties in different states over the Internet.
Digital Television: An Overview
Digital television (DTV) is a new television service representing the most significant development in television technology since the advent of color television in the 1950s. DTV can provide sharper pictures, a wider screen, CD-quality sound, better color rendition, and other new services currently being developed. A successful deployment of DTV requires: the development by content providers of compelling digital programming; the delivery of digital signals to consumers by broadcast television stations, as well as cable and satellite television systems; and the widespread purchase and adoption by consumers of digital television equipment. A key issue in the Congressional debate over the digital transition has been addressing the millions of American over-the-air households whose existing analog televisions will require converter boxes in order to receive digital signals when the analog signal is turned off.
Digital Television: An Overview
Digital television (DTV) is a new television service representing the most significant development in television technology since the advent of color television in the 1950s. DTV can provide sharper pictures, a wider screen, CD-quality sound, better color rendition, and other new services currently being developed. A successful deployment of DTV requires: the development by content providers of compelling digital programming; the delivery of digital signals to consumers by broadcast television stations, as well as cable and satellite television systems; and the widespread purchase and adoption by consumers of digital television equipment. A key issue in the Congressional debate over the digital transition has been addressing the millions of American over-the-air households whose existing analog televisions will require converter boxes in order to receive digital signals when the analog signal is turned off.
Internet: An Overview of Key Technology Policy Issues Affecting Its Use and Growth
No Description Available.
Military and Civilian Satellites in Support of Allied Forces in the Persian Gulf War
This Congressional Research Service Report for Congress explains the use of military and civilian space programs to advance satellites for the support of military action.
Internet Development and Information Control in the People's Republic of China
Since its founding in 1949, the People’s Republic of China (PRC) has exerted great effort in manipulating the flow of information and prohibiting the dissemination of viewpoints that criticize the government or stray from the official Communist party view. The introduction of Internet technology in the mid-1990’s presented a challenge to government control over news sources, and by extension, over public opinion. While the Internet has developed rapidly, broadened access to news, and facilitated mass communications in China, many forms of expression online, as in other mass media, are still significantly stifled. This report discusses the history of this issue and examines the U.S.'s response.
Federal Voluntary Voting System Guidelines: Summary and Analysis of Issues
This report begins with a discussion of the historical context of the VVSG, followed by a summary of the guidelines and a discussion of each of the issues identified above. However, there are many specific issues, such as whether wireless communications should be permitted, that are not covered here. The report also briefly summarizes relevant legislative proposals in the 109th Congress
Internet Privacy: Overview and Pending Legislation
Internet privacy issues generally encompass two types of concerns. One is the collection of personally identifiable information (PII) by website operators from visitors to government and commercial websites, or by software that is surreptitiously installed on a user’s computer (“spyware”) and transmits the information to someone else. The other is the monitoring of electronic mail and Web usage by the government or law enforcement officials, employers, or email service providers.
Industrial Competitiveness and Technological Advancement: Debate Over Government Policy
There is an on-going interest in the pace of U.S. technological advancement due to its influence on U.S. economic growth, productivity, and international competitiveness. Because technology can contribute to economic growth and productivity increases, congressional interest has focused on how to augment private-sector technological development. Legislative activity over the past decade has created a policy for technology development, albeit an ad hoc one. Because of the lack of consensus on the scope and direction of a national policy, Congress has taken an incremental approach aimed at creating new mechanisms to facilitate technological advancement in particular areas and making changes and improvements as necessary
Cooperative R&D: Federal Efforts to Promote Industrial Competitiveness
In response to the foreign challenge in the global marketplace, the United States Congress has explored ways to stimulate technological advancement in the private sector. The government has supported various efforts to promote cooperative research and development activities among industry, universities, and the federal R&D establishment designed to increase the competitiveness of American industry and to encourage the generation of new products, processes, and services. Among the issues before Congress are whether joint ventures contribute to industrial competitiveness and what role, if any, the government has in facilitating such arrangements.
Technology Transfer: Use of Federally Funded Research and Development
The government spends approximately one-third of the $83 billion federal R&D budget for intramural research and development to meet mission requirements in over 700 government laboratories (including Federally Funded Research and Development Centers). The technology and expertise generated by this endeavor may have application beyond the immediate goals or intent of federally funded R&D.
Terrorist Capabilities for Cyberattack: Overview and Policy Issues
No Description Available.
Information Brokers: Federal and State Laws
This report discusses the federal and state laws that could be applicable to information brokers and legislation that has been introduced to address consumer concerns about the practice of information gathering, the selling of information, and identity theft resulting from security breaches.
Electronic Payments and the U.S. Payments System
This report provides a framework for understanding the paper-based and electronic components of the current U.S. payments system. It begins with a basic overview of the payments system, explaining the relative size and growth of various methods of payment. The report discusses paper-based payments and then examines the operations of wholesale and retail electronic payments. Finally, the report discusses some of the major policy issues concerning the regulation and supervision of electronic payments.
Broadband Internet Access and the Digital Divide: Federal Assistance Programs
Some policymakers, believing that disparities in broadband access across American society could have adverse economic and social consequences on those left behind, assert that the federal government should play a more active role to avoid a “digital divide” in broadband access. One approach is for the federal government to provide financial assistance to support broadband deployment in underserved areas. Others, however, believe that federal assistance for broadband deployment is not appropriate. Some opponents question the reality of the “digital divide,” and argue that federal intervention in the broadband marketplace would be premature and, in some cases, counterproductive.
Data Mining: An Overview
Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Data Mining: An Overview
Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Industrial Competitiveness and Technological Advancement: Debate over Government Policy
This report summarizes the debate on the government policy regarding industrial competitiveness and technological advancement and its influence on the U.S. economy. It discusses the most recent developments, dives into the background and analysis of the topic, and talks about congress' plans and approach.
Russian Missile Technology and Nuclear Reactor Transfers to Iran
Many in Congress and the Clinton Administration charge that Russian entities are assisting Iran in developing ballistic missiles. Russia is also building a nuclear power station and is finishing other nuclear services to, Iran. Congress has passed legislation requiring the President to impose sanctions for missile technology transfers, arms sales, nuclear technology transfers, and large-scale investments in Iran. H.R 2709, which includes the "Iran Missile Proliferation Sanctions Act of 1997," is one of several bills designed to tighten existing sanctions law. It was amended and passed by the Senate on May 22, 1998, and by the House on June 9 by very large bipartisan majorities. Nevertheless, President Clinton vetoed the bill on June 23 and said he would work to sustain the veto.
Data Mining: An Overview
Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Navy Network-Centric Warfare Concept: Key Programs and Issues for Congress
No Description Available.
Navy Network-Centric Warfare Concept: Key Programs and Issues for Congress
No Description Available.
Technology Transfer: Use of Federally Funded Research and Development
No Description Available.
Technology Transfer: Use of Federally Funded Research and Development
No Description Available.
Back to Top of Screen