You limited your search to:

 Decade: 2010-2019
 Collection: Congressional Research Service Reports
Clean Energy Standard: Potential Qualifying Energy Sources

Clean Energy Standard: Potential Qualifying Energy Sources

Date: May 3, 2011
Creator: Bracmort, Kelsi; Folger, Peter; Holt, Mark; Ratner, Michael & Sissine, Fred
Description: This report begins with a brief examination of clean energy, renewable energy, and alternative energy. It then presents possible selection criteria Congress could use to determine which sources could be eligible for a CES depending on the goal(s) of the CES. The report provides an overview of the energy sources most commonly discussed as potential CES qualifying sources: biomass, fossil fuels (natural gas combined-cycle and coal-fired power plants with carbon capture and sequestration), geothermal resources, nuclear, solar, water, and wind. The report describes where each source can be found in the United States, the estimated quantity available for electricity generation, technologies used to create electricity from the source, advantages and disadvantages of using the source for electricity generation, and policy implications should the source be included in a CES.5 The report also contains a section on energy efficiency and its potential inclusion in a CES.
Contributing Partner: UNT Libraries Government Documents Department
Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Date: December 27, 2010
Creator: Doyle, Charles
Description: The federal computer fraud and abuse statute, 18 U.S.C. 1030, outlaws conduct that victimizes computer systems. It is a cyber security law. It protects federal computers, bank computers, and computers connected to the Internet. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills cracks and gaps in the protection afforded by other federal criminal laws. This is a brief sketch of Section 1030 and some of its federal statutory companions, including the amendments found in the Identity Theft Enforcement and Restitution Act.
Contributing Partner: UNT Libraries Government Documents Department
Cybersecurity: Cyber Crime Protection Security Act (S. 2111)—A Legal Analysis

Cybersecurity: Cyber Crime Protection Security Act (S. 2111)—A Legal Analysis

Date: March 12, 2012
Creator: Doyle, Charles
Description: The Cyber Crime Protection Security Act (S. 2111) would enhance the criminal penalties for the cyber crimes outlawed in the Computer Fraud and Abuse Act (CFAA). Those offenses include espionage, hacking, fraud, destruction, password trafficking, and extortion committed against computers and computer networks. S. 2111 contains some of the enhancements approved by the Senate Judiciary Committee when it reported the Personal Data Privacy and Security Act (S. 1151), S.Rept. 112-91 (2011).
Contributing Partner: UNT Libraries Government Documents Department
The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities

The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities

Date: June 10, 2013
Creator: Figliola, Patricia Moloney
Description: This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
Contributing Partner: UNT Libraries Government Documents Department
The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities

The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities

Date: October 22, 2013
Creator: Figliola, Patricia Moloney
Description: This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
Contributing Partner: UNT Libraries Government Documents Department
The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities

The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities

Date: March 27, 2012
Creator: Figliola, Patricia Moloney
Description: In the early 1990s, Congress recognized that several federal agencies had ongoing high performance computing programs, but no central coordinating body existed to ensure long-term coordination and planning. To provide such a framework, Congress passed the High-Performance Computing and Communications Program Act of 1991 to enhance the effectiveness of the various programs. In conjunction with the passage of the act, the White House Office of Science and Technology Policy released Grand Challenges: High-Performance Computing and Communications. Current concerns are the role of the federal government in supporting IT R&D and the level of funding to allot to it. This report also looks at federal budgets for the Networking and Information Technology Research and Development Program.
Contributing Partner: UNT Libraries Government Documents Department
The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities

The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities

Date: January 13, 2012
Creator: Figliola, Patricia Moloney
Description: The federal government has long played a key role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
Contributing Partner: UNT Libraries Government Documents Department
Spyware: Background and Policy Issues for Congress

Spyware: Background and Policy Issues for Congress

Date: September 8, 2010
Creator: Figliola, Patricia Moloney
Description: The Anti-Spyware Coalition (ASC) defines spyware as "technologies deployed without appropriate user consent and/or implemented in ways that impair user control over (1) material changes that affect their user experience, privacy, or system security; (2) use of their system resources, including what programs are installed on their computers; and/or (3) collection, use, and distribution of their personal or other sensitive information. The main issue for Congress over spyware is whether to enact new legislation specifically addressing spyware, or to rely on industry self-regulation and enforcement actions by the Federal Trade Commission (FTC) and the Department of Justice under existing law. This report discusses this issue, as well as the opinions of both the opponents and the supporters of industry self-regulation.
Contributing Partner: UNT Libraries Government Documents Department
The Interplay of Borders, Turf, Cyberspace, and Jurisdiction: Issues Confronting U.S. Law Enforcement

The Interplay of Borders, Turf, Cyberspace, and Jurisdiction: Issues Confronting U.S. Law Enforcement

Date: February 15, 2012
Creator: Finklea, Kristin M.
Description: Globalization and technological innovation have fostered the expansion of both legitimate and criminal operations across physical borders as well as throughout cyberspace. U.S. law enforcement has increasingly relied on intelligence-led policing, enhanced interagency cooperation, and technological implementation to confront 21st century crime. Issues for Congress are how it can leverage its legislative and oversight roles to bolster U.S. law enforcement's abilities to confront modern-day crime. It may also examine whether federal law enforcement is utilizing existing mechanisms to effectively coordinate investigations and share information.
Contributing Partner: UNT Libraries Government Documents Department
The Interplay of Borders, Turf, Cyberspace, and Jurisdiction: Issues Confronting U.S. Law Enforcement

The Interplay of Borders, Turf, Cyberspace, and Jurisdiction: Issues Confronting U.S. Law Enforcement

Date: July 20, 2012
Creator: Finklea, Kristin M.
Description: This report looks at issues for Congress related to expansion of legitimate and criminal operations across physical borders and through cyberspace as a result of globalization and technological innovation. In particular, it considers how Congress can leverage its legislative and oversight roles to bolster U.S. law enforcement's abilities to confront modern-day crime and whether federal law enforcement is utilizing existing mechanisms to effectively coordinate investigations and share information.
Contributing Partner: UNT Libraries Government Documents Department
FIRST PREV 1 2 3 4 5 NEXT LAST