Search Results

open access

Information Services for Agriculture: The Role of Technology

Description: Significant improvements in technology-supported information services have created opportunities for their utilization by the farmers and ranchers of our Nation. This report highlights the development and expanded offering of these systems, describes current operational and experimental systems, and presents salient legislative initiatives which address this priority area.
Date: November 16, 1982
Creator: Chartrand, Robert L.; Carr, A. B. & Miller, Nancy
Partner: UNT Libraries Government Documents Department
open access

The Potential of Systems, Tools, and Techniques for Social and Community Problems: Selected References

Description: This report provides a bibliography of resources related to the use of systems technology to solve social and community problems such as housing, pollution, transportation, and health services. Twenty areas of use are included in the bibliography.
Date: December 11, 1969
Creator: Chartrend, Robert L. & Ayton, Mauree W.
Partner: UNT Libraries Government Documents Department
open access

OPM Data Breach: Personnel Security Background Investigation Data

Description: This report provides information on the types of data that may be collected in a typical personnel security background investigation. In a July 9, 2015, news release on the cyber-intrusions of its systems, OPM "concluded with high confidence that sensitive information, including the Social Security Numbers (SSNs) of 21.5 million individuals, was stolen from the background investigation databases." This report is not an official statement of the data that was compromised in the OPM breach.
Date: July 24, 2015
Creator: Christensen, Michelle D.
Partner: UNT Libraries Government Documents Department
open access

Alternative Fuel and Advanced Vehicle Technology Incentives: A Summary of Federal Programs

Description: This report describes incentives and programs aimed at deploying alternative fuel and engines, such as tax deductions, federal grants for upgrading old cars, and mandates for biofuel use. The report lists incentives and programs by agency.
Date: June 2, 2015
Creator: Cunningham, Lynn J.; Cook, Beth; Canis, Bill & Yacobucci, Brent D.
Partner: UNT Libraries Government Documents Department
open access

Federal R&D Funding Under a Continuing Resolution

Description: This report discusses the continuing resolution, or CR (P.L. 109-383, H.J.Res. 102) which provides spending at FY2006 levels (through February 15, 2007), for those agencies lacking enacted FY2007 appropriations bills.
Date: December 14, 2006
Creator: Davey, Michael E.
Partner: UNT Libraries Government Documents Department
open access

Data Security and Breach Notification Legislation: Selected Legal Issues

Description: This report describes the common elements of several data security and breach notification bills that have been introduced in the 114th Congress, which broadly would impose security and notification requirements on businesses regardless of industry sector. It also discusses state laws that may apply in the event of a data breach and addresses two legal issues that may arise in consideration of new legislation about data security and breach notification.
Date: December 28, 2015
Creator: Dolan, Alissa M.
Partner: UNT Libraries Government Documents Department
open access

Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws

Description: This report discusses the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, which is a cyber security law that outlaws conduct that victimizes computer systems. It protects federal computers, bank computers, and computers connected to the Internet by shielding them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud.
Date: October 15, 2014
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department
open access

Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Description: This report discusses The Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, which is a cyber security law that outlaws conduct that victimizes computer systems. It protects federal computers, bank computers, and computers connected to the Internet from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud.
Date: October 15, 2014
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department
open access

Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Description: The federal computer fraud and abuse statute, 18 U.S.C. 1030, outlaws conduct that victimizes computer systems. It is a cyber security law. It protects federal computers, bank computers, and computers connected to the Internet. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills cracks and gaps in the protection afforded by other federal criminal laws. This is a brief sketc… more
Date: December 27, 2010
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Cyber Crime Protection Security Act (S. 2111, 112th Congress)— A Legal Analysis

Description: This report discusses the Cyber Crime Protection Security Act (S. 2111) that would enhance the criminal penalties for the cyber crimes outlawed in the Computer Fraud and Abuse Act (CFAA). Those offenses include espionage, hacking, fraud, destruction, password trafficking, and extortion committed against computers and computer networks. S. 2111 contains some of the enhancements approved by the Senate Judiciary Committee when it reported the Personal Data Privacy and Security Act (S. 1151), S.Rep… more
Date: January 28, 2013
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Cyber Crime Protection Security Act (S. 2111)—A Legal Analysis

Description: The Cyber Crime Protection Security Act (S. 2111) would enhance the criminal penalties for the cyber crimes outlawed in the Computer Fraud and Abuse Act (CFAA). Those offenses include espionage, hacking, fraud, destruction, password trafficking, and extortion committed against computers and computer networks. S. 2111 contains some of the enhancements approved by the Senate Judiciary Committee when it reported the Personal Data Privacy and Security Act (S. 1151), S.Rept. 112-91 (2011).
Date: March 12, 2012
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department
open access

Protecting Civil Aviation from Cyberattacks

Description: This report briefly discusses cyber-security issues in civil aviation. unclear. A recent probe into alleged hacking incidents unfolded just weeks after the Federal Bureau of Investigation (FBI) and the Transportation Security Administration (TSA) alerted airlines to be on the lookout for passengers trying to tap into aircraft electronics and for evidence of tampering or network intrusions.
Date: June 18, 2015
Creator: Elias, Bart
Partner: UNT Libraries Government Documents Department
open access

Telehealth Services Proposed for Medicare Part B Reimbursements, 2018: Fact Sheet

Description: This report discusses telehealth services covered under Medicare and describes the five conditions that a telehealth service must meet to be covered and paid for under Medicare Part B, provides an overview of how the Secretary of the Department of Health and Human Services (HHS) adds telehealth services to Medicare's reimbursable list, and includes a table listing the proposed telehealth services to be added to the CY2018 list for Medicare reimbursement.
Date: November 15, 2017
Creator: Elliott, Victoria L.
Partner: UNT Libraries Government Documents Department
open access

Digital Trade and U.S. Trade Policy

Description: This report discusses the role of digital trade in the U.S. economy, barriers to digital trade, digital trade agreement provisions, and other selected policy issues.
Date: January 13, 2017
Creator: Fefer, Rachel F.; Akhtar, Shayerah Ilias & Morrison, Wayne M.
Partner: UNT Libraries Government Documents Department
open access

Army Futures Command (AFC)

Description: This report summarizes the issue of development of major combat systems for the Army and the proposed solution: Army Futures Command. The report ends with possible issues for Congress to consider.
Date: July 16, 2018
Creator: Feickert, Andrew
Partner: UNT Libraries Government Documents Department
open access

Spyware: Background and Policy Issues for Congress

Description: This report discusses whether to enact new legislation specifically addressing spyware, or to rely on industry self-regulation and enforcement actions by the Federal Trade Commission (FTC) and the Department of Justice under existing law, as well as the opinions of both the opponents and the supporters of industry self-regulation.
Date: July 20, 2010
Creator: Figliola, Patricia M.
Partner: UNT Libraries Government Documents Department
open access

The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities

Description: This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
Date: October 22, 2013
Creator: Figliola, Patricia Moloney
Partner: UNT Libraries Government Documents Department
open access

The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities

Description: This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
Date: June 10, 2013
Creator: Figliola, Patricia Moloney
Partner: UNT Libraries Government Documents Department
open access

The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities

Description: This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
Date: April 10, 2015
Creator: Figliola, Patricia Moloney
Partner: UNT Libraries Government Documents Department
open access

The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities

Description: This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
Date: January 30, 2013
Creator: Figliola, Patricia Moloney
Partner: UNT Libraries Government Documents Department
Back to Top of Screen