Search Results

Smart Meter Data: Privacy and Cybersecurity
Fueled by stimulus funding in the American Recovery and Reinvestment Act of 2009 (ARRA), electric utilities have accelerated their deployment of smart meters to millions of homes across the United States with help from the Department of Energy's Smart Grid Investment Grant program. As the meters multiply, so do issues concerning the privacy and security of the data collected by the new technology. Smart meters must record near-real time data on consumer electricity usage and transmit the data to utilities over great distances via communications networks that serve the smart grid. Detailed electricity usage data offers a window into the lives of people inside of a home by revealing what individual appliances they are using, and the transmission of the data potentially subjects this information to interception or theft by unauthorized third parties or hackers. Unforeseen consequences under federal law may result from the installation of smart meters and the communications technologies that accompany them. This report examines federal privacy and cybersecurity laws that may apply to consumer data collected by residential smart meters.
Japanese and U.S. Industrial Associations: Their Roles in High-Technology Policymaking
In both Japan and in the United States, industrial associations play an important role in enhancing government understanding and interaction with industries and in easing cooperative efforts among firms. This report examines the role of industrial associations and related organizations in high-technology policymaking and in accelerating technological development.
Bibliography on Environment and Natural Resources
This report is a Bibliography on Environment and Natural Resources
Cybersecurity and Information Sharing: Legal Challenges and Solutions
While considerable debate exists with regard to the best strategies for protecting America’s various cyber-systems and promoting cybersecurity, one point of general agreement amongst cyber-analysts is the perceived need for enhanced and timely exchange of cyber-threat intelligence both within the private sector and between the private sector and the government. This report examines the various legal issues that arise with respect to the sharing of cybersecurity intelligence, with a special focus on two distinct concepts: (1) sharing of cyberinformation within the government’s possession and (2) sharing of cyber-information within the possession of the private sector.
Extending the Internet Tax Moratorium and Related Issues
The Internet Tax Freedom Act, enacted in 1998, placed a 3-year moratorium on the ability of state and local governments 1) to impose new taxes on Internet access or 2) to impose multiple or discriminatory taxes on electronic commerce. It grandfathered existing taxes on Internet access. The original moratorium expired on October 21, 2001. Numerous bills to extend the moratorium were introduced in the first session of the 107th Congress. The Congress approved H.R. 1552 (P.L. 107-75, enacted November 28, 2001) which extended the prior moratorium by 2 years, until November 1, 2003.
Internet Tax Bills in the 105th Congress
This report tracks the evolution and content of the Internet tax freedom bills. In general, the bills would impose a federal moratorium on the ability of state and local governments to impose taxes on certain aspects of the Internet and would establish a temporary federal commission to study selected issues and make policy recommendations.
Internet Tax Bills in the 105th Congress
"This report tracks the evolution and content of the Internet tax freedom bills" (p. i).
Internet Tax Bills in the 107th Congress: A Brief Comparison
No Description Available.
Internet Tax Bills in the 108th Congress
No Description Available.
Internet Tax Bills in the 108th Congress
No Description Available.
Internet Tax Bills in the 108th Congress
No Description Available.
Internet Tax Bills in the 108th Congress
No Description Available.
Internet Tax Legislation: Distinguishing Issues
The Internet Tax Freedom Act (ITFA), enacted in 1998, placed a three-year moratorium on the ability of state and local governments to impose new taxes on Internet access, or to impose any multiple or discriminatory taxes on electronic commerce. The moratorium is scheduled to expire on October 21, 2001.
Internet Tax Legislation: Distinguishing Issues
No Description Available.
Internet Tax Legislation: Distinguishing Issues
No Description Available.
Electronic Signatures: Technology Developments and Legislative Issues
Electronic signatures, a means of verifying the identity of the user of a computer system to control access or authorize a transaction, are increasingly being used in electronic commerce. Several technologies can be used to produce electronic signatures, the most prominent being digital signatures, which use cryptographic techniques to provide data integrity and nonrepudiation. Legislation enacted in the 106th Congress enables the legal recognition of electronic signatures in interstate commerce. Other legislation introduced but not enacted was intended to promote federal agency use of electronic signatures to enable electronic filing of information.
Encryption Technology: Congressional Issues
This report discusses primarily, the controversy over encryption concerns what access the government should have to encrypted stored computer data or electronic communications (voice and data, wired and wireless) for law enforcement purposes.
Encryption Technology: the Debate in the th 105 and 106th Congresses
No Description Available.
Third Generation ("3G") Mobile Wireless Technologies and Services
No Description Available.
The Year 2000 Computer Problem: Congressional Issues
Many computers were designed to store a two-digit number for the year, which makes the year 2000 indistinguishable from 1900. Unless they are corrected, many computers will not be able to process dates beyond the year 2000, and may cause many costly problems in commerce and government. In the 106th Congress, hearings are being held and will continue to provide the public with the most accurate information available on the status of Y2K remediations at federal agencies, state and local agencies, private sector entities, and international organizations. Congress may also consider additional legislation to ensure that private sector systems are compliant, to establish emergency preparedness measures to address problems that might occur, and to limit liability associated with Y2K failures for manufacturers and industry groups.
Year 2000 Problem: Potential Impacts on National Infrastructures
The year 2000 (Y2K) computer problem poses a potential threat to the continued proper functioning of many national infrastructures. These include telecommunications, utilities, financial services, health care, transportation, government services, and military preparedness. Other sectors -- such as water, agriculture, food processing and distribution, emergency services, and small and medium sized businesses -- have also been identified as having potentially significant Y2K problems but, due to space constraints, are not discussed here. While public and private sector entities report progress toward resolving their Y2K problems, much uncertainty remains regarding which systems are most vulnerable to failures. The overall impact resulting from the Y2K problem to some degree still depends on remediation progress made in 1999.
Information Technology and Elementary and Secondary Education: Current Status and Federal Support
This report provides an analysis of selected issues involving the application of information technology to elementary and secondary education, and federal policymaking in this area.
Information Technology and Elementary and Secondary Education: Current Status and Federal Support
This report provides an analysis of issue involving the application of information technology to elementary and secondary education, and federal policy making in this area.
Electric-Drive Propulsion for U.S. Navy Ships: Background and Issues for Congress
This report provides background information and discusses issues for Congress regarding the use of electric-drive propulsion technology (as opposed to traditional mechanical-drive technology) on U.S. Navy ships. As a result of technological developments over the last few years, electric-drive technology has matured to the point where the Navy has selected it for use on its planned next-generation DD-21 land-attack destroyer and is considering it for use on other kinds of Navy ships as well.
Navy Network-Centric Warfare Concept: Key Programs and Issues for Congress
No Description Available.
Navy Network-Centric Warfare Concept: Key Programs and Issues for Congress
No Description Available.
Navy Network-Centric Warfare Concept: Key Programs and Issues for Congress
No Description Available.
Navy Network-Centric Warfare Concept: Key Programs and Issues for Congress
No Description Available.
Navy Network-Centric Warfare Concept: Key Programs and Issues for Congress
No Description Available.
Navy Network-Centric Warfare Concept: Key Programs and Issues for Congress
No Description Available.
Navy Network-Centric Warfare Concept: Key Programs and Issues for Congress
No Description Available.
Navy Network-Centric Warfare Concept: Key Programs and Issues for Congress
Programs for implementing network-centric warfare (NCW) in the Navy include the Cooperative Engagement Capability (CEC), the IT-21 program, and FORCEnet. A related program is the Navy-Marine Corps Intranet (NMCI). Congress has expressed concern for some of these programs, particularly NMCI.
Navy Network-Centric Warfare Concept: Key Programs and Issues for Congress
No Description Available.
Navy Network-Centric Warfare Concept: Key Programs and Issues for Congress
No Description Available.
Information Technology and Elementary and Secondary Education: Current Status and Federal Support
CRS Report for Congress entailing information about the current status and federal report of information technology and elementary and secondary education. Topics include, recent action, major issues, federal policy questions etc..
Information Technology and Elementary and Secondary Education: Current Status and Federal Support
CRS Report for Congress entailing information about the current status and federal report of information technology and elementary and secondary education. Topics include, recent action, major issues, federal policy questions etc..
Technology Challenge Programs in the Elementary and Secondary Education Act
Congressional Research Service (CRS) report entailing information about technology challenges programs in the elementary and secondary education act. Topics include, the technology literacy challenge fund, technology innovation challenge grant, program impact and evaluation, etc..
Assistive Technology Act: Programs and Funding
Mentions how the Assistive Technology Act is a source of funding for individuals with disabilities. Explains how Assistive Technology, such as a device or service, is used to assist people with disabilities to perform day to day activities.
Department of Veteran Affairs: Information Security and Information Technology Management Reorganization
On May 3, 2006, the home of a Department of Veterans Affairs (VA) data analyst was burglarized, resulting in the theft of a laptop computer and an external data storage device that was reported to contain personal information on more than 26 million veterans and United States military personnel. The VA Secretary testified that he was not informed of the incident until May 16, 2006, almost two weeks after the data had been stolen. VA publicly announced the theft on May 22. On June 29, VA announced that the stolen laptop computer and external hard drive had been recovered intact and that, based on a forensic examination conducted by the Federal Bureau of Investigation (FBI), the files on the external hard drive had not been compromised.
Energy Storage for Power Grids and Electric Transportation: A Technology Assessment
This report attempts to summarize the current state of knowledge regarding energy storage technologies for both electric power grid and electric vehicle applications. It is intended to serve as a reference for policymakers interested in understanding the range of technologies and applications associated with energy storage, comparing them, when possible, in a structured way to highlight key characteristics relevant to widespread use. While the emphasis is on technology, this report also addresses the significant policy, market, and other non-technical factors that may impede storage adoption. It considers eight major categories of storage technology: pumped hydro, compressed air, batteries, capacitors, superconducting magnetic energy storage, flywheels, thermal storage, and hydrogen.
Visibility, Regional Haze, and the Clean Air Act: Status of Implementation
This report provides an overview of the status of implementation of the visibility, regional haze, and clean air act.
The Electronic Funds Transfer System
This report discusses the development, use, and future outlook of electronic payment systems as well as addressing various electronic banking issues and policy.
Diversification and the Aerospace Community
This report addresses diversification in the aerospace community.
U.S. Semiconductor Manufacturing: Industry Trends, Global Competition, Federal Policy
This report provides background information on the Zika virus, discusses challenges faced by governments and implementing partners in the Latin America and Caribbean region that are attempting to control the ongoing outbreak, and analyzes these above issues in the context of the U.S. Zika response.
The future behind the Moon
This report's purpose is to show the ways in which man may utilize the moon in the future for his benefit.
The State of Technology in Non-Lethal Guns (a Preliminary Assessment)
This report covers research and experience in non-lethal incapacitating weapons in that which is developing for the capture of wild animals.
Voluntary Carbon Offsets: Overview and Assessment
This report provides an overview of carbon offsets and examines some of the issue that are generating debate. This report focuses on the voluntary offsets market.
The Health Information Technology for Economic and Clinical Health (HITECH) Act
This report provides a summary and explanation of the provisions in the HITECH Act, which is intended to promote the widespread adoption of health information technology (HIT) for the electronic sharing of clinical data among hospitals, physicians, and other health care stakeholders. It gives an overview of prior actions taken by Congress and the Administrations to promote HIT, and briefly describes efforts by the 109th and 110th Congresses to enact comprehensive HIT legislation.
Internships--A Guide to Information Sources
This report discusses the Internships, A Guide to Information Sources.
Terrorist Capabilities for Cyberattack: Overview and Policy Issues
No Description Available.
Back to Top of Screen